]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - fs/cifs/inode.c
Merge remote-tracking branches 'spi/fix/armada', 'spi/fix/atmel', 'spi/fix/doc',...
[mirror_ubuntu-hirsute-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
116 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
cc0bad75
JL
165 inode->i_atime = fattr->cf_atime;
166 inode->i_mtime = fattr->cf_mtime;
167 inode->i_ctime = fattr->cf_ctime;
cc0bad75 168 inode->i_rdev = fattr->cf_rdev;
74d290da 169 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
170 inode->i_uid = fattr->cf_uid;
171 inode->i_gid = fattr->cf_gid;
172
0b8f18e3
JL
173 /* if dynperm is set, don't clobber existing mode */
174 if (inode->i_state & I_NEW ||
175 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
176 inode->i_mode = fattr->cf_mode;
177
cc0bad75 178 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 179
0b8f18e3
JL
180 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
181 cifs_i->time = 0;
182 else
183 cifs_i->time = jiffies;
184
aff8d5ca
JL
185 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
186 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
187 else
188 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 189
835a36ca 190 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
191 /*
192 * Can't safely change the file size here if the client is writing to
193 * it due to potential races.
194 */
cc0bad75
JL
195 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
196 i_size_write(inode, fattr->cf_eof);
197
198 /*
199 * i_blocks is not related to (i_size / i_blksize),
200 * but instead 512 byte (2**9) size is required for
201 * calculating num blocks.
202 */
203 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
204 }
205 spin_unlock(&inode->i_lock);
206
01c64fea
DH
207 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
208 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
209 if (inode->i_state & I_NEW)
210 cifs_set_ops(inode);
cc0bad75
JL
211}
212
4065c802
JL
213void
214cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
215{
216 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
217
218 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
219 return;
220
221 fattr->cf_uniqueid = iunique(sb, ROOT_I);
222}
223
cc0bad75
JL
224/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
225void
226cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
227 struct cifs_sb_info *cifs_sb)
228{
229 memset(fattr, 0, sizeof(*fattr));
230 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
231 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
232 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
233
234 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
235 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
236 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
237 /* old POSIX extensions don't get create time */
238
cc0bad75 239 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
240
241 /*
242 * Since we set the inode type below we need to mask off
243 * to avoid strange results if bits set above.
244 */
cc0bad75 245 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
246 switch (le32_to_cpu(info->Type)) {
247 case UNIX_FILE:
cc0bad75
JL
248 fattr->cf_mode |= S_IFREG;
249 fattr->cf_dtype = DT_REG;
75f12983
CH
250 break;
251 case UNIX_SYMLINK:
cc0bad75
JL
252 fattr->cf_mode |= S_IFLNK;
253 fattr->cf_dtype = DT_LNK;
75f12983
CH
254 break;
255 case UNIX_DIR:
cc0bad75
JL
256 fattr->cf_mode |= S_IFDIR;
257 fattr->cf_dtype = DT_DIR;
75f12983
CH
258 break;
259 case UNIX_CHARDEV:
cc0bad75
JL
260 fattr->cf_mode |= S_IFCHR;
261 fattr->cf_dtype = DT_CHR;
262 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
263 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
264 break;
265 case UNIX_BLOCKDEV:
cc0bad75
JL
266 fattr->cf_mode |= S_IFBLK;
267 fattr->cf_dtype = DT_BLK;
268 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
269 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
270 break;
271 case UNIX_FIFO:
cc0bad75
JL
272 fattr->cf_mode |= S_IFIFO;
273 fattr->cf_dtype = DT_FIFO;
75f12983
CH
274 break;
275 case UNIX_SOCKET:
cc0bad75
JL
276 fattr->cf_mode |= S_IFSOCK;
277 fattr->cf_dtype = DT_SOCK;
75f12983
CH
278 break;
279 default:
280 /* safest to call it a file if we do not know */
cc0bad75
JL
281 fattr->cf_mode |= S_IFREG;
282 fattr->cf_dtype = DT_REG;
f96637be 283 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
284 break;
285 }
286
46bbc25f
EB
287 fattr->cf_uid = cifs_sb->mnt_uid;
288 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
289 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
290 if (id < ((uid_t)-1)) {
291 kuid_t uid = make_kuid(&init_user_ns, id);
292 if (uid_valid(uid))
293 fattr->cf_uid = uid;
294 }
46bbc25f
EB
295 }
296
297 fattr->cf_gid = cifs_sb->mnt_gid;
298 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
299 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
300 if (id < ((gid_t)-1)) {
301 kgid_t gid = make_kgid(&init_user_ns, id);
302 if (gid_valid(gid))
303 fattr->cf_gid = gid;
304 }
46bbc25f 305 }
75f12983 306
cc0bad75 307 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
308}
309
b9a3260f 310/*
cc0bad75
JL
311 * Fill a cifs_fattr struct with fake inode info.
312 *
313 * Needed to setup cifs_fattr data for the directory which is the
314 * junction to the new submount (ie to setup the fake directory
315 * which represents a DFS referral).
b9a3260f 316 */
f1230c97 317static void
cc0bad75 318cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 319{
cc0bad75 320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 321
f96637be 322 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
323
324 memset(fattr, 0, sizeof(*fattr));
325 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
326 fattr->cf_uid = cifs_sb->mnt_uid;
327 fattr->cf_gid = cifs_sb->mnt_gid;
e37fea58
DD
328 ktime_get_real_ts(&fattr->cf_mtime);
329 fattr->cf_mtime = timespec_trunc(fattr->cf_mtime, sb->s_time_gran);
330 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
331 fattr->cf_nlink = 2;
332 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
333}
334
4ad65044
PS
335static int
336cifs_get_file_info_unix(struct file *filp)
abab095d
JL
337{
338 int rc;
6d5786a3 339 unsigned int xid;
abab095d
JL
340 FILE_UNIX_BASIC_INFO find_data;
341 struct cifs_fattr fattr;
496ad9aa 342 struct inode *inode = file_inode(filp);
abab095d 343 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 344 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 345 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 346
6d5786a3 347 xid = get_xid();
4b4de76e 348 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
349 if (!rc) {
350 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
351 } else if (rc == -EREMOTE) {
352 cifs_create_dfs_fattr(&fattr, inode->i_sb);
353 rc = 0;
354 }
355
356 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 357 free_xid(xid);
abab095d
JL
358 return rc;
359}
360
1da177e4 361int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 362 const unsigned char *full_path,
6d5786a3 363 struct super_block *sb, unsigned int xid)
1da177e4 364{
cc0bad75 365 int rc;
0e4bbde9 366 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 367 struct cifs_fattr fattr;
96daf2b0 368 struct cifs_tcon *tcon;
7ffec372 369 struct tcon_link *tlink;
1da177e4 370 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 371
f96637be 372 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 373
7ffec372
JL
374 tlink = cifs_sb_tlink(cifs_sb);
375 if (IS_ERR(tlink))
376 return PTR_ERR(tlink);
377 tcon = tlink_tcon(tlink);
378
1da177e4 379 /* could have done a find first instead but this returns more info */
cc0bad75 380 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 381 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 382 cifs_put_tlink(tlink);
e911d0cc 383
cc0bad75
JL
384 if (!rc) {
385 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
386 } else if (rc == -EREMOTE) {
387 cifs_create_dfs_fattr(&fattr, sb);
388 rc = 0;
389 } else {
390 return rc;
391 }
1da177e4 392
1b12b9c1
SM
393 /* check for Minshall+French symlinks */
394 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
395 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
396 full_path);
1b12b9c1 397 if (tmprc)
cb084b1a 398 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
399 }
400
0e4bbde9 401 if (*pinode == NULL) {
cc0bad75 402 /* get new inode */
4065c802 403 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
404 *pinode = cifs_iget(sb, &fattr);
405 if (!*pinode)
0e4bbde9 406 rc = -ENOMEM;
cc0bad75
JL
407 } else {
408 /* we already have inode, update it */
7196ac11
NA
409
410 /* if uniqueid is different, return error */
411 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
412 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
413 rc = -ESTALE;
414 goto cgiiu_exit;
415 }
416
417 /* if filetype is different, return error */
418 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
419 (fattr.cf_mode & S_IFMT))) {
420 rc = -ESTALE;
421 goto cgiiu_exit;
422 }
423
cc0bad75 424 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 425 }
1da177e4 426
7196ac11 427cgiiu_exit:
1da177e4
LT
428 return rc;
429}
430
0b8f18e3 431static int
0360d605 432cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 433 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
434{
435 int rc;
db8b631d 436 __u32 oplock;
7ffec372 437 struct tcon_link *tlink;
96daf2b0 438 struct cifs_tcon *tcon;
d81b8a40
PS
439 struct cifs_fid fid;
440 struct cifs_open_parms oparms;
d4ffff1f 441 struct cifs_io_parms io_parms;
86c96b4b 442 char buf[24];
d6e2f2a4 443 unsigned int bytes_read;
fb8c4b14 444 char *pbuf;
0360d605 445 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
446
447 pbuf = buf;
448
0b8f18e3
JL
449 fattr->cf_mode &= ~S_IFMT;
450
451 if (fattr->cf_eof == 0) {
452 fattr->cf_mode |= S_IFIFO;
453 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 454 return 0;
0b8f18e3
JL
455 } else if (fattr->cf_eof < 8) {
456 fattr->cf_mode |= S_IFREG;
457 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
458 return -EINVAL; /* EOPNOTSUPP? */
459 }
50c2f753 460
7ffec372
JL
461 tlink = cifs_sb_tlink(cifs_sb);
462 if (IS_ERR(tlink))
463 return PTR_ERR(tlink);
464 tcon = tlink_tcon(tlink);
465
d81b8a40
PS
466 oparms.tcon = tcon;
467 oparms.cifs_sb = cifs_sb;
468 oparms.desired_access = GENERIC_READ;
469 oparms.create_options = CREATE_NOT_DIR;
470 oparms.disposition = FILE_OPEN;
471 oparms.path = path;
472 oparms.fid = &fid;
473 oparms.reconnect = false;
474
db8b631d
SF
475 if (tcon->ses->server->oplocks)
476 oplock = REQ_OPLOCK;
477 else
478 oplock = 0;
479 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 480 if (rc) {
db8b631d 481 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
482 cifs_put_tlink(tlink);
483 return rc;
484 }
485
486 /* Read header */
d81b8a40 487 io_parms.netfid = fid.netfid;
0360d605
PS
488 io_parms.pid = current->tgid;
489 io_parms.tcon = tcon;
490 io_parms.offset = 0;
491 io_parms.length = 24;
492
db8b631d
SF
493 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
494 &bytes_read, &pbuf, &buf_type);
0360d605
PS
495 if ((rc == 0) && (bytes_read >= 8)) {
496 if (memcmp("IntxBLK", pbuf, 8) == 0) {
497 cifs_dbg(FYI, "Block device\n");
498 fattr->cf_mode |= S_IFBLK;
499 fattr->cf_dtype = DT_BLK;
500 if (bytes_read == 24) {
501 /* we have enough to decode dev num */
502 __u64 mjr; /* major */
503 __u64 mnr; /* minor */
504 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
505 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
506 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 507 }
0360d605
PS
508 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
509 cifs_dbg(FYI, "Char device\n");
510 fattr->cf_mode |= S_IFCHR;
511 fattr->cf_dtype = DT_CHR;
512 if (bytes_read == 24) {
513 /* we have enough to decode dev num */
514 __u64 mjr; /* major */
515 __u64 mnr; /* minor */
516 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
517 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
518 fattr->cf_rdev = MKDEV(mjr, mnr);
519 }
520 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
521 cifs_dbg(FYI, "Symlink\n");
522 fattr->cf_mode |= S_IFLNK;
523 fattr->cf_dtype = DT_LNK;
3020a1f5 524 } else {
0360d605 525 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 526 fattr->cf_dtype = DT_REG;
0360d605 527 rc = -EOPNOTSUPP;
fb8c4b14 528 }
0360d605
PS
529 } else {
530 fattr->cf_mode |= S_IFREG; /* then it is a file */
531 fattr->cf_dtype = DT_REG;
532 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 533 }
db8b631d
SF
534
535 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 536 cifs_put_tlink(tlink);
d6e2f2a4 537 return rc;
d6e2f2a4
SF
538}
539
9e294f1c
SF
540#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
541
0b8f18e3
JL
542/*
543 * Fetch mode bits as provided by SFU.
544 *
545 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
546 */
547static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 548 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 549{
3020a1f5 550#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
551 ssize_t rc;
552 char ea_value[4];
553 __u32 mode;
7ffec372 554 struct tcon_link *tlink;
96daf2b0 555 struct cifs_tcon *tcon;
7ffec372
JL
556
557 tlink = cifs_sb_tlink(cifs_sb);
558 if (IS_ERR(tlink))
559 return PTR_ERR(tlink);
560 tcon = tlink_tcon(tlink);
9e294f1c 561
d979f3b0
SF
562 if (tcon->ses->server->ops->query_all_EAs == NULL) {
563 cifs_put_tlink(tlink);
564 return -EOPNOTSUPP;
565 }
566
567 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
568 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 569 cifs_sb);
7ffec372 570 cifs_put_tlink(tlink);
4523cc30 571 if (rc < 0)
9e294f1c
SF
572 return (int)rc;
573 else if (rc > 3) {
574 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 575 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
576 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
577 mode, fattr->cf_mode);
0b8f18e3 578 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 579 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 580 }
0b8f18e3
JL
581
582 return 0;
3020a1f5
SF
583#else
584 return -EOPNOTSUPP;
585#endif
9e294f1c
SF
586}
587
0b8f18e3 588/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 589static void
0b8f18e3 590cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 591 struct super_block *sb, bool adjust_tz,
eb85d94b 592 bool symlink)
b9a3260f 593{
e37fea58 594 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 595 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 596
0b8f18e3
JL
597 memset(fattr, 0, sizeof(*fattr));
598 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
599 if (info->DeletePending)
600 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
601
602 if (info->LastAccessTime)
603 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58
DD
604 else {
605 ktime_get_real_ts(&fattr->cf_atime);
606 fattr->cf_atime = timespec_trunc(fattr->cf_atime, sb->s_time_gran);
607 }
0b8f18e3
JL
608
609 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
610 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
611
612 if (adjust_tz) {
0d424ad0
JL
613 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
614 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
615 }
616
617 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
618 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 619 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 620
74d290da 621 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
622
623 if (symlink) {
624 fattr->cf_mode = S_IFLNK;
625 fattr->cf_dtype = DT_LNK;
626 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
627 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
628 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
629 /*
630 * Server can return wrong NumberOfLinks value for directories
631 * when Unix extensions are disabled - fake it.
632 */
74d290da
JM
633 if (!tcon->unix_ext)
634 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
635 } else {
636 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
637 fattr->cf_dtype = DT_REG;
0b8f18e3 638
d0c280d2
JL
639 /* clear write bits if ATTR_READONLY is set */
640 if (fattr->cf_cifsattrs & ATTR_READONLY)
641 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 642
74d290da
JM
643 /*
644 * Don't accept zero nlink from non-unix servers unless
645 * delete is pending. Instead mark it as unknown.
646 */
647 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
648 !info->DeletePending) {
649 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 650 fattr->cf_nlink);
74d290da 651 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 652 }
6de2ce42 653 }
0b8f18e3
JL
654
655 fattr->cf_uid = cifs_sb->mnt_uid;
656 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
657}
658
4ad65044
PS
659static int
660cifs_get_file_info(struct file *filp)
abab095d
JL
661{
662 int rc;
6d5786a3 663 unsigned int xid;
abab095d
JL
664 FILE_ALL_INFO find_data;
665 struct cifs_fattr fattr;
496ad9aa 666 struct inode *inode = file_inode(filp);
c21dfb69 667 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 668 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
669 struct TCP_Server_Info *server = tcon->ses->server;
670
671 if (!server->ops->query_file_info)
672 return -ENOSYS;
abab095d 673
6d5786a3 674 xid = get_xid();
4ad65044 675 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
676 switch (rc) {
677 case 0:
e37fea58 678 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 679 false);
42274bb2
PS
680 break;
681 case -EREMOTE:
682 cifs_create_dfs_fattr(&fattr, inode->i_sb);
683 rc = 0;
684 break;
685 case -EOPNOTSUPP:
686 case -EINVAL:
abab095d
JL
687 /*
688 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
689 * for now, just skip revalidating and mark inode for
690 * immediate reval.
691 */
abab095d
JL
692 rc = 0;
693 CIFS_I(inode)->time = 0;
42274bb2 694 default:
abab095d 695 goto cgfi_exit;
42274bb2 696 }
abab095d
JL
697
698 /*
699 * don't bother with SFU junk here -- just mark inode as needing
700 * revalidation.
701 */
abab095d
JL
702 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
703 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
704 cifs_fattr_to_inode(inode, &fattr);
705cgfi_exit:
6d5786a3 706 free_xid(xid);
abab095d
JL
707 return rc;
708}
709
1208ef1f
PS
710int
711cifs_get_inode_info(struct inode **inode, const char *full_path,
712 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 713 const struct cifs_fid *fid)
1da177e4 714{
c052e2b4
SP
715 bool validinum = false;
716 __u16 srchflgs;
717 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
718 struct cifs_tcon *tcon;
719 struct TCP_Server_Info *server;
7ffec372 720 struct tcon_link *tlink;
1da177e4 721 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 722 char *buf = NULL;
1208ef1f 723 bool adjust_tz = false;
0b8f18e3 724 struct cifs_fattr fattr;
c052e2b4 725 struct cifs_search_info *srchinf = NULL;
eb85d94b 726 bool symlink = false;
1da177e4 727
7ffec372
JL
728 tlink = cifs_sb_tlink(cifs_sb);
729 if (IS_ERR(tlink))
730 return PTR_ERR(tlink);
1208ef1f
PS
731 tcon = tlink_tcon(tlink);
732 server = tcon->ses->server;
7ffec372 733
f96637be 734 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 735
1208ef1f 736 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 737 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 738 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 739 goto cgii_exit;
1da177e4
LT
740 }
741 }
742
1208ef1f
PS
743 /* if inode info is not passed, get it from server */
744 if (data == NULL) {
745 if (!server->ops->query_path_info) {
746 rc = -ENOSYS;
747 goto cgii_exit;
748 }
1da177e4 749 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
750 if (buf == NULL) {
751 rc = -ENOMEM;
752 goto cgii_exit;
753 }
1208ef1f
PS
754 data = (FILE_ALL_INFO *)buf;
755 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 756 data, &adjust_tz, &symlink);
1da177e4 757 }
0b8f18e3
JL
758
759 if (!rc) {
e37fea58 760 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 761 symlink);
0b8f18e3
JL
762 } else if (rc == -EREMOTE) {
763 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 764 rc = 0;
c052e2b4
SP
765 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
766 srchinf = kzalloc(sizeof(struct cifs_search_info),
767 GFP_KERNEL);
768 if (srchinf == NULL) {
769 rc = -ENOMEM;
770 goto cgii_exit;
771 }
772
773 srchinf->endOfSearch = false;
774 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
775
776 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
777 CIFS_SEARCH_CLOSE_AT_END |
778 CIFS_SEARCH_BACKUP_SEARCH;
779
780 rc = CIFSFindFirst(xid, tcon, full_path,
781 cifs_sb, NULL, srchflgs, srchinf, false);
782 if (!rc) {
783 data =
784 (FILE_ALL_INFO *)srchinf->srch_entries_start;
785
786 cifs_dir_info_to_fattr(&fattr,
787 (FILE_DIRECTORY_INFO *)data, cifs_sb);
788 fattr.cf_uniqueid = le64_to_cpu(
789 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
790 validinum = true;
791
792 cifs_buf_release(srchinf->ntwrk_buf_start);
793 }
794 kfree(srchinf);
4c5930e8
SF
795 if (rc)
796 goto cgii_exit;
c052e2b4 797 } else
7962670e 798 goto cgii_exit;
1da177e4 799
0b8f18e3
JL
800 /*
801 * If an inode wasn't passed in, then get the inode number
802 *
803 * Is an i_ino of zero legal? Can we use that to check if the server
804 * supports returning inode numbers? Are there other sanity checks we
805 * can use to ensure that the server is really filling in that field?
0b8f18e3 806 */
1208ef1f 807 if (*inode == NULL) {
b9a3260f 808 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
809 if (validinum == false) {
810 if (server->ops->get_srv_inum)
811 tmprc = server->ops->get_srv_inum(xid,
812 tcon, cifs_sb, full_path,
813 &fattr.cf_uniqueid, data);
814 if (tmprc) {
f96637be
JP
815 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
816 tmprc);
c052e2b4
SP
817 fattr.cf_uniqueid = iunique(sb, ROOT_I);
818 cifs_autodisable_serverino(cifs_sb);
819 }
132ac7b7 820 }
c052e2b4 821 } else
0b8f18e3 822 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
823 } else {
824 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
825 validinum == false && server->ops->get_srv_inum) {
826 /*
827 * Pass a NULL tcon to ensure we don't make a round
828 * trip to the server. This only works for SMB2+.
829 */
830 tmprc = server->ops->get_srv_inum(xid,
831 NULL, cifs_sb, full_path,
832 &fattr.cf_uniqueid, data);
833 if (tmprc)
834 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
835 } else
836 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
837 }
b9a3260f 838
0b8f18e3
JL
839 /* query for SFU type info if supported and needed */
840 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
841 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
842 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
843 if (tmprc)
f96637be 844 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 845 }
1da177e4 846
79df1bae 847#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
848 /* fill in 0777 bits from ACL */
849 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 850 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 851 if (rc) {
f96637be
JP
852 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
853 __func__, rc);
78415d2d
SP
854 goto cgii_exit;
855 }
b9a3260f 856 }
79df1bae 857#endif /* CONFIG_CIFS_ACL */
b9a3260f 858
0b8f18e3
JL
859 /* fill in remaining high mode bits e.g. SUID, VTX */
860 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
861 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 862
1b12b9c1
SM
863 /* check for Minshall+French symlinks */
864 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
865 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
866 full_path);
1b12b9c1 867 if (tmprc)
cb084b1a 868 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
869 }
870
1208ef1f
PS
871 if (!*inode) {
872 *inode = cifs_iget(sb, &fattr);
873 if (!*inode)
0b8f18e3
JL
874 rc = -ENOMEM;
875 } else {
7196ac11
NA
876 /* we already have inode, update it */
877
a108471b
RL
878 /* if uniqueid is different, return error */
879 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
880 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
881 rc = -ESTALE;
882 goto cgii_exit;
883 }
884
7196ac11
NA
885 /* if filetype is different, return error */
886 if (unlikely(((*inode)->i_mode & S_IFMT) !=
887 (fattr.cf_mode & S_IFMT))) {
888 rc = -ESTALE;
889 goto cgii_exit;
890 }
891
1208ef1f 892 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 893 }
b9a3260f 894
7962670e 895cgii_exit:
1da177e4 896 kfree(buf);
7ffec372 897 cifs_put_tlink(tlink);
1da177e4
LT
898 return rc;
899}
900
7f8ed420
SF
901static const struct inode_operations cifs_ipc_inode_ops = {
902 .lookup = cifs_lookup,
903};
904
cc0bad75
JL
905static int
906cifs_find_inode(struct inode *inode, void *opaque)
907{
908 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
909
f30b9c11 910 /* don't match inode with different uniqueid */
cc0bad75
JL
911 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
912 return 0;
913
20054bd6
JL
914 /* use createtime like an i_generation field */
915 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
916 return 0;
917
f30b9c11
JL
918 /* don't match inode of different type */
919 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
920 return 0;
921
5acfec25 922 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 923 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 924 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 925
cc0bad75
JL
926 return 1;
927}
928
929static int
930cifs_init_inode(struct inode *inode, void *opaque)
931{
932 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
933
934 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 935 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
936 return 0;
937}
938
5acfec25
JL
939/*
940 * walk dentry list for an inode and report whether it has aliases that
941 * are hashed. We use this to determine if a directory inode can actually
942 * be used.
943 */
944static bool
945inode_has_hashed_dentries(struct inode *inode)
946{
947 struct dentry *dentry;
948
873feea0 949 spin_lock(&inode->i_lock);
946e51f2 950 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 951 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 952 spin_unlock(&inode->i_lock);
5acfec25
JL
953 return true;
954 }
955 }
873feea0 956 spin_unlock(&inode->i_lock);
5acfec25
JL
957 return false;
958}
959
cc0bad75
JL
960/* Given fattrs, get a corresponding inode */
961struct inode *
962cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
963{
964 unsigned long hash;
965 struct inode *inode;
966
3d694380 967retry_iget5_locked:
f96637be 968 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
969
970 /* hash down to 32-bits on 32-bit arch */
971 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
972
973 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 974 if (inode) {
5acfec25 975 /* was there a potentially problematic inode collision? */
3d694380 976 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 977 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
978
979 if (inode_has_hashed_dentries(inode)) {
980 cifs_autodisable_serverino(CIFS_SB(sb));
981 iput(inode);
982 fattr->cf_uniqueid = iunique(sb, ROOT_I);
983 goto retry_iget5_locked;
984 }
3d694380
JL
985 }
986
cc0bad75 987 cifs_fattr_to_inode(inode, fattr);
1751e8a6 988 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
989 inode->i_flags |= S_NOATIME | S_NOCMTIME;
990 if (inode->i_state & I_NEW) {
991 inode->i_ino = hash;
0ccd4802 992#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
993 /* initialize per-inode cache cookie pointer */
994 CIFS_I(inode)->fscache = NULL;
0ccd4802 995#endif
cc0bad75
JL
996 unlock_new_inode(inode);
997 }
998 }
999
1000 return inode;
1001}
1002
1da177e4 1003/* gets root inode */
9b6763e0 1004struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1005{
6d5786a3 1006 unsigned int xid;
0d424ad0 1007 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1008 struct inode *inode = NULL;
ce634ab2 1009 long rc;
96daf2b0 1010 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1011 char *path = NULL;
1012 int len;
1013
1014 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1015 && cifs_sb->prepath) {
1016 len = strlen(cifs_sb->prepath);
1017 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1018 if (path == NULL)
1019 return ERR_PTR(-ENOMEM);
1020 path[0] = '/';
1021 memcpy(path+1, cifs_sb->prepath, len);
1022 } else {
1023 path = kstrdup("", GFP_KERNEL);
1024 if (path == NULL)
1025 return ERR_PTR(-ENOMEM);
1026 }
ce634ab2 1027
6d5786a3 1028 xid = get_xid();
b5b374ea 1029 if (tcon->unix_ext) {
a6b5058f 1030 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1031 /* some servers mistakenly claim POSIX support */
1032 if (rc != -EOPNOTSUPP)
1033 goto iget_no_retry;
1034 cifs_dbg(VFS, "server does not support POSIX extensions");
1035 tcon->unix_ext = false;
1036 }
1037
a6b5058f
AA
1038 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1039 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1040
b5b374ea 1041iget_no_retry:
a7851ce7
OS
1042 if (!inode) {
1043 inode = ERR_PTR(rc);
1044 goto out;
1045 }
cc0bad75 1046
0ccd4802 1047#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1048 /* populate tcon->resource_id */
0d424ad0 1049 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1050#endif
d03382ce 1051
0d424ad0 1052 if (rc && tcon->ipc) {
f96637be 1053 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1054 spin_lock(&inode->i_lock);
7f8ed420 1055 inode->i_mode |= S_IFDIR;
bfe86848 1056 set_nlink(inode, 2);
7f8ed420
SF
1057 inode->i_op = &cifs_ipc_inode_ops;
1058 inode->i_fop = &simple_dir_operations;
1059 inode->i_uid = cifs_sb->mnt_uid;
1060 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1061 spin_unlock(&inode->i_lock);
ad661334 1062 } else if (rc) {
ce634ab2 1063 iget_failed(inode);
a7851ce7 1064 inode = ERR_PTR(rc);
7f8ed420
SF
1065 }
1066
a7851ce7 1067out:
a6b5058f 1068 kfree(path);
6d5786a3 1069 /* can not call macro free_xid here since in a void func
ce634ab2
DH
1070 * TODO: This is no longer true
1071 */
6d5786a3 1072 _free_xid(xid);
ce634ab2 1073 return inode;
1da177e4
LT
1074}
1075
ed6875e0 1076int
6d5786a3 1077cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1078 char *full_path, __u32 dosattr)
388e57b2 1079{
388e57b2 1080 bool set_time = false;
388e57b2 1081 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1082 struct TCP_Server_Info *server;
388e57b2
SF
1083 FILE_BASIC_INFO info_buf;
1084
1adcb710
SF
1085 if (attrs == NULL)
1086 return -EINVAL;
1087
6bdf6dbd
PS
1088 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1089 if (!server->ops->set_file_info)
1090 return -ENOSYS;
1091
388e57b2
SF
1092 if (attrs->ia_valid & ATTR_ATIME) {
1093 set_time = true;
1094 info_buf.LastAccessTime =
1095 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1096 } else
1097 info_buf.LastAccessTime = 0;
1098
1099 if (attrs->ia_valid & ATTR_MTIME) {
1100 set_time = true;
1101 info_buf.LastWriteTime =
1102 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1103 } else
1104 info_buf.LastWriteTime = 0;
1105
1106 /*
1107 * Samba throws this field away, but windows may actually use it.
1108 * Do not set ctime unless other time stamps are changed explicitly
1109 * (i.e. by utimes()) since we would then have a mix of client and
1110 * server times.
1111 */
1112 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1113 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1114 info_buf.ChangeTime =
1115 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1116 } else
1117 info_buf.ChangeTime = 0;
1118
1119 info_buf.CreationTime = 0; /* don't change */
1120 info_buf.Attributes = cpu_to_le32(dosattr);
1121
6bdf6dbd 1122 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1123}
1124
a12a1ac7 1125/*
ed6875e0 1126 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1127 * and rename it to a random name that hopefully won't conflict with
1128 * anything else.
1129 */
ed6875e0
PS
1130int
1131cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1132 const unsigned int xid)
a12a1ac7
JL
1133{
1134 int oplock = 0;
1135 int rc;
d81b8a40
PS
1136 struct cifs_fid fid;
1137 struct cifs_open_parms oparms;
2b0143b5 1138 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1139 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1140 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1141 struct tcon_link *tlink;
96daf2b0 1142 struct cifs_tcon *tcon;
3270958b
SF
1143 __u32 dosattr, origattr;
1144 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1145
7ffec372
JL
1146 tlink = cifs_sb_tlink(cifs_sb);
1147 if (IS_ERR(tlink))
1148 return PTR_ERR(tlink);
1149 tcon = tlink_tcon(tlink);
1150
c483a984
SP
1151 /*
1152 * We cannot rename the file if the server doesn't support
1153 * CAP_INFOLEVEL_PASSTHRU
1154 */
1155 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1156 rc = -EBUSY;
1157 goto out;
1158 }
1159
d81b8a40
PS
1160 oparms.tcon = tcon;
1161 oparms.cifs_sb = cifs_sb;
1162 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1163 oparms.create_options = CREATE_NOT_DIR;
1164 oparms.disposition = FILE_OPEN;
1165 oparms.path = full_path;
1166 oparms.fid = &fid;
1167 oparms.reconnect = false;
1168
1169 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1170 if (rc != 0)
1171 goto out;
1172
3270958b
SF
1173 origattr = cifsInode->cifsAttrs;
1174 if (origattr == 0)
1175 origattr |= ATTR_NORMAL;
1176
1177 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1178 if (dosattr == 0)
1179 dosattr |= ATTR_NORMAL;
1180 dosattr |= ATTR_HIDDEN;
1181
3270958b
SF
1182 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1183 if (dosattr != origattr) {
1184 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1185 if (info_buf == NULL) {
1186 rc = -ENOMEM;
1187 goto out_close;
1188 }
1189 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1190 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1191 current->tgid);
1192 /* although we would like to mark the file hidden
1193 if that fails we will still try to rename it */
72d282dc 1194 if (!rc)
3270958b
SF
1195 cifsInode->cifsAttrs = dosattr;
1196 else
1197 dosattr = origattr; /* since not able to change them */
a12a1ac7 1198 }
a12a1ac7 1199
dd1db2de 1200 /* rename the file */
d81b8a40
PS
1201 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1202 cifs_sb->local_nls,
2baa2682 1203 cifs_remap(cifs_sb));
3270958b 1204 if (rc != 0) {
47c78f4a 1205 rc = -EBUSY;
3270958b
SF
1206 goto undo_setattr;
1207 }
6d22f098 1208
3270958b 1209 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1210 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1211 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1212 current->tgid);
1213 /*
1214 * some samba versions return -ENOENT when we try to set the
1215 * file disposition here. Likely a samba bug, but work around
1216 * it for now. This means that some cifsXXX files may hang
1217 * around after they shouldn't.
1218 *
1219 * BB: remove this hack after more servers have the fix
1220 */
1221 if (rc == -ENOENT)
1222 rc = 0;
1223 else if (rc != 0) {
47c78f4a 1224 rc = -EBUSY;
3270958b
SF
1225 goto undo_rename;
1226 }
aff8d5ca 1227 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1228 }
7ce86d5a 1229
a12a1ac7 1230out_close:
d81b8a40 1231 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1232out:
3270958b 1233 kfree(info_buf);
7ffec372 1234 cifs_put_tlink(tlink);
a12a1ac7 1235 return rc;
3270958b
SF
1236
1237 /*
1238 * reset everything back to the original state. Don't bother
1239 * dealing with errors here since we can't do anything about
1240 * them anyway.
1241 */
1242undo_rename:
d81b8a40 1243 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1244 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1245undo_setattr:
1246 if (dosattr != origattr) {
1247 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1248 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1249 current->tgid))
1250 cifsInode->cifsAttrs = origattr;
1251 }
1252
1253 goto out_close;
a12a1ac7
JL
1254}
1255
b7ca6928
SF
1256/* copied from fs/nfs/dir.c with small changes */
1257static void
1258cifs_drop_nlink(struct inode *inode)
1259{
1260 spin_lock(&inode->i_lock);
1261 if (inode->i_nlink > 0)
1262 drop_nlink(inode);
1263 spin_unlock(&inode->i_lock);
1264}
ff694527
SF
1265
1266/*
2b0143b5 1267 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1268 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1269 * if that fails we can not attempt the fall back mechanisms on EACCESS
1270 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1271 * unlink on negative dentries currently.
1272 */
5f0319a7 1273int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1274{
1275 int rc = 0;
6d5786a3 1276 unsigned int xid;
1da177e4 1277 char *full_path = NULL;
2b0143b5 1278 struct inode *inode = d_inode(dentry);
ff694527 1279 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1280 struct super_block *sb = dir->i_sb;
1281 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1282 struct tcon_link *tlink;
96daf2b0 1283 struct cifs_tcon *tcon;
ed6875e0 1284 struct TCP_Server_Info *server;
6050247d
SF
1285 struct iattr *attrs = NULL;
1286 __u32 dosattr = 0, origattr = 0;
1da177e4 1287
f96637be 1288 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1289
7ffec372
JL
1290 tlink = cifs_sb_tlink(cifs_sb);
1291 if (IS_ERR(tlink))
1292 return PTR_ERR(tlink);
1293 tcon = tlink_tcon(tlink);
ed6875e0 1294 server = tcon->ses->server;
7ffec372 1295
6d5786a3 1296 xid = get_xid();
1da177e4 1297
5f0319a7
JL
1298 /* Unlink can be called from rename so we can not take the
1299 * sb->s_vfs_rename_mutex here */
1300 full_path = build_path_from_dentry(dentry);
1da177e4 1301 if (full_path == NULL) {
0f3bc09e 1302 rc = -ENOMEM;
7ffec372 1303 goto unlink_out;
1da177e4 1304 }
2d785a50 1305
29e20f9c
PS
1306 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1307 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1308 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1309 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1310 cifs_remap(cifs_sb));
f96637be 1311 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1312 if ((rc == 0) || (rc == -ENOENT))
1313 goto psx_del_no_retry;
1314 }
1da177e4 1315
6050247d 1316retry_std_delete:
ed6875e0
PS
1317 if (!server->ops->unlink) {
1318 rc = -ENOSYS;
1319 goto psx_del_no_retry;
1320 }
1321
1322 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1323
2d785a50 1324psx_del_no_retry:
1da177e4 1325 if (!rc) {
5f0319a7 1326 if (inode)
b7ca6928 1327 cifs_drop_nlink(inode);
1da177e4 1328 } else if (rc == -ENOENT) {
5f0319a7 1329 d_drop(dentry);
47c78f4a 1330 } else if (rc == -EBUSY) {
ed6875e0
PS
1331 if (server->ops->rename_pending_delete) {
1332 rc = server->ops->rename_pending_delete(full_path,
1333 dentry, xid);
1334 if (rc == 0)
1335 cifs_drop_nlink(inode);
1336 }
ff694527 1337 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1338 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1339 if (attrs == NULL) {
1340 rc = -ENOMEM;
1341 goto out_reval;
1da177e4 1342 }
388e57b2
SF
1343
1344 /* try to reset dos attributes */
ff694527
SF
1345 cifs_inode = CIFS_I(inode);
1346 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1347 if (origattr == 0)
1348 origattr |= ATTR_NORMAL;
1349 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1350 if (dosattr == 0)
1351 dosattr |= ATTR_NORMAL;
1352 dosattr |= ATTR_HIDDEN;
1353
1354 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1355 if (rc != 0)
1356 goto out_reval;
6050247d
SF
1357
1358 goto retry_std_delete;
1da177e4 1359 }
6050247d
SF
1360
1361 /* undo the setattr if we errored out and it's needed */
1362 if (rc != 0 && dosattr != 0)
1363 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1364
388e57b2 1365out_reval:
4523cc30 1366 if (inode) {
ff694527
SF
1367 cifs_inode = CIFS_I(inode);
1368 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1369 when needed */
e37fea58 1370 inode->i_ctime = current_time(inode);
06bcfedd 1371 }
e37fea58 1372 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1373 cifs_inode = CIFS_I(dir);
6050247d 1374 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1375unlink_out:
1da177e4 1376 kfree(full_path);
6050247d 1377 kfree(attrs);
6d5786a3 1378 free_xid(xid);
7ffec372 1379 cifs_put_tlink(tlink);
1da177e4
LT
1380 return rc;
1381}
1382
ff691e96 1383static int
101b92d9 1384cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1385 const char *full_path, struct cifs_sb_info *cifs_sb,
1386 struct cifs_tcon *tcon, const unsigned int xid)
1387{
1388 int rc = 0;
101b92d9 1389 struct inode *inode = NULL;
ff691e96
PS
1390
1391 if (tcon->unix_ext)
101b92d9 1392 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1393 xid);
1394 else
101b92d9
JL
1395 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1396 xid, NULL);
1397
ff691e96
PS
1398 if (rc)
1399 return rc;
1400
ff691e96
PS
1401 /*
1402 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1403 * from the server or was set bogus. Also, since this is a brand new
1404 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1405 */
101b92d9
JL
1406 if (inode->i_nlink < 2)
1407 set_nlink(inode, 2);
ff691e96
PS
1408 mode &= ~current_umask();
1409 /* must turn on setgid bit if parent dir has it */
101b92d9 1410 if (parent->i_mode & S_ISGID)
ff691e96
PS
1411 mode |= S_ISGID;
1412
1413 if (tcon->unix_ext) {
1414 struct cifs_unix_set_info_args args = {
1415 .mode = mode,
1416 .ctime = NO_CHANGE_64,
1417 .atime = NO_CHANGE_64,
1418 .mtime = NO_CHANGE_64,
1419 .device = 0,
1420 };
1421 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1422 args.uid = current_fsuid();
101b92d9 1423 if (parent->i_mode & S_ISGID)
49418b2c 1424 args.gid = parent->i_gid;
ff691e96 1425 else
49418b2c 1426 args.gid = current_fsgid();
ff691e96 1427 } else {
49418b2c
EB
1428 args.uid = INVALID_UID; /* no change */
1429 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1430 }
1431 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1432 cifs_sb->local_nls,
2baa2682 1433 cifs_remap(cifs_sb));
ff691e96 1434 } else {
f436720e 1435 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1436 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1437 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1438 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1439 tcon, xid);
101b92d9
JL
1440 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1441 inode->i_mode = (mode | S_IFDIR);
1442
1443 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1444 inode->i_uid = current_fsuid();
1445 if (inode->i_mode & S_ISGID)
1446 inode->i_gid = parent->i_gid;
1447 else
1448 inode->i_gid = current_fsgid();
ff691e96
PS
1449 }
1450 }
101b92d9 1451 d_instantiate(dentry, inode);
ff691e96
PS
1452 return rc;
1453}
1454
1455static int
1456cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1457 const char *full_path, struct cifs_sb_info *cifs_sb,
1458 struct cifs_tcon *tcon, const unsigned int xid)
1459{
1460 int rc = 0;
1461 u32 oplock = 0;
1462 FILE_UNIX_BASIC_INFO *info = NULL;
1463 struct inode *newinode = NULL;
1464 struct cifs_fattr fattr;
1465
1466 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1467 if (info == NULL) {
1468 rc = -ENOMEM;
1469 goto posix_mkdir_out;
1470 }
1471
1472 mode &= ~current_umask();
1473 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1474 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1475 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1476 if (rc == -EOPNOTSUPP)
1477 goto posix_mkdir_out;
1478 else if (rc) {
f96637be 1479 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1480 d_drop(dentry);
1481 goto posix_mkdir_out;
1482 }
1483
1484 if (info->Type == cpu_to_le32(-1))
1485 /* no return info, go query for it */
1486 goto posix_mkdir_get_info;
1487 /*
1488 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1489 * need to set uid/gid.
1490 */
1491
1492 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1493 cifs_fill_uniqueid(inode->i_sb, &fattr);
1494 newinode = cifs_iget(inode->i_sb, &fattr);
1495 if (!newinode)
1496 goto posix_mkdir_get_info;
1497
1498 d_instantiate(dentry, newinode);
1499
1500#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1501 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1502 dentry, dentry, newinode);
ff691e96
PS
1503
1504 if (newinode->i_nlink != 2)
f96637be
JP
1505 cifs_dbg(FYI, "unexpected number of links %d\n",
1506 newinode->i_nlink);
ff691e96
PS
1507#endif
1508
1509posix_mkdir_out:
1510 kfree(info);
1511 return rc;
1512posix_mkdir_get_info:
1513 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1514 xid);
1515 goto posix_mkdir_out;
1516}
1517
18bb1db3 1518int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1519{
ff691e96 1520 int rc = 0;
6d5786a3 1521 unsigned int xid;
1da177e4 1522 struct cifs_sb_info *cifs_sb;
7ffec372 1523 struct tcon_link *tlink;
29e20f9c 1524 struct cifs_tcon *tcon;
f436720e 1525 struct TCP_Server_Info *server;
ff691e96 1526 char *full_path;
1da177e4 1527
f96637be
JP
1528 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1529 mode, inode);
1da177e4 1530
1da177e4 1531 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1532 tlink = cifs_sb_tlink(cifs_sb);
1533 if (IS_ERR(tlink))
1534 return PTR_ERR(tlink);
29e20f9c 1535 tcon = tlink_tcon(tlink);
7ffec372 1536
6d5786a3 1537 xid = get_xid();
1da177e4 1538
7f57356b 1539 full_path = build_path_from_dentry(direntry);
1da177e4 1540 if (full_path == NULL) {
0f3bc09e 1541 rc = -ENOMEM;
7ffec372 1542 goto mkdir_out;
1da177e4 1543 }
50c2f753 1544
29e20f9c
PS
1545 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1546 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1547 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1548 tcon, xid);
1549 if (rc != -EOPNOTSUPP)
2dd29d31 1550 goto mkdir_out;
fb8c4b14 1551 }
ff691e96 1552
f436720e
PS
1553 server = tcon->ses->server;
1554
1555 if (!server->ops->mkdir) {
1556 rc = -ENOSYS;
1557 goto mkdir_out;
1558 }
1559
1da177e4 1560 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1561 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1562 if (rc) {
f96637be 1563 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1564 d_drop(direntry);
ff691e96 1565 goto mkdir_out;
1da177e4 1566 }
ff691e96
PS
1567
1568 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1569 xid);
fb8c4b14 1570mkdir_out:
6de2ce42
PS
1571 /*
1572 * Force revalidate to get parent dir info when needed since cached
1573 * attributes are invalid now.
1574 */
1575 CIFS_I(inode)->time = 0;
1da177e4 1576 kfree(full_path);
6d5786a3 1577 free_xid(xid);
7ffec372 1578 cifs_put_tlink(tlink);
1da177e4
LT
1579 return rc;
1580}
1581
1582int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1583{
1584 int rc = 0;
6d5786a3 1585 unsigned int xid;
1da177e4 1586 struct cifs_sb_info *cifs_sb;
7ffec372 1587 struct tcon_link *tlink;
f958ca5d
PS
1588 struct cifs_tcon *tcon;
1589 struct TCP_Server_Info *server;
1da177e4
LT
1590 char *full_path = NULL;
1591 struct cifsInodeInfo *cifsInode;
1592
f96637be 1593 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1594
6d5786a3 1595 xid = get_xid();
1da177e4 1596
7f57356b 1597 full_path = build_path_from_dentry(direntry);
1da177e4 1598 if (full_path == NULL) {
0f3bc09e 1599 rc = -ENOMEM;
7ffec372 1600 goto rmdir_exit;
1da177e4
LT
1601 }
1602
7ffec372
JL
1603 cifs_sb = CIFS_SB(inode->i_sb);
1604 tlink = cifs_sb_tlink(cifs_sb);
1605 if (IS_ERR(tlink)) {
1606 rc = PTR_ERR(tlink);
1607 goto rmdir_exit;
1608 }
f958ca5d
PS
1609 tcon = tlink_tcon(tlink);
1610 server = tcon->ses->server;
1611
1612 if (!server->ops->rmdir) {
1613 rc = -ENOSYS;
1614 cifs_put_tlink(tlink);
1615 goto rmdir_exit;
1616 }
7ffec372 1617
f958ca5d 1618 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1619 cifs_put_tlink(tlink);
1da177e4
LT
1620
1621 if (!rc) {
2b0143b5
DH
1622 spin_lock(&d_inode(direntry)->i_lock);
1623 i_size_write(d_inode(direntry), 0);
1624 clear_nlink(d_inode(direntry));
1625 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1626 }
1627
2b0143b5 1628 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1629 /* force revalidate to go get info when needed */
1630 cifsInode->time = 0;
42c24544
SF
1631
1632 cifsInode = CIFS_I(inode);
6de2ce42
PS
1633 /*
1634 * Force revalidate to get parent dir info when needed since cached
1635 * attributes are invalid now.
1636 */
1637 cifsInode->time = 0;
42c24544 1638
2b0143b5 1639 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1640 current_time(inode);
1da177e4 1641
7ffec372 1642rmdir_exit:
1da177e4 1643 kfree(full_path);
6d5786a3 1644 free_xid(xid);
1da177e4
LT
1645 return rc;
1646}
1647
ee2fd967 1648static int
8ceb9843
PS
1649cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1650 const char *from_path, struct dentry *to_dentry,
1651 const char *to_path)
ee2fd967
SF
1652{
1653 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1654 struct tcon_link *tlink;
8ceb9843
PS
1655 struct cifs_tcon *tcon;
1656 struct TCP_Server_Info *server;
d81b8a40
PS
1657 struct cifs_fid fid;
1658 struct cifs_open_parms oparms;
ee2fd967
SF
1659 int oplock, rc;
1660
7ffec372
JL
1661 tlink = cifs_sb_tlink(cifs_sb);
1662 if (IS_ERR(tlink))
1663 return PTR_ERR(tlink);
8ceb9843
PS
1664 tcon = tlink_tcon(tlink);
1665 server = tcon->ses->server;
1666
1667 if (!server->ops->rename)
1668 return -ENOSYS;
7ffec372 1669
ee2fd967 1670 /* try path-based rename first */
8ceb9843 1671 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1672
1673 /*
8ceb9843
PS
1674 * Don't bother with rename by filehandle unless file is busy and
1675 * source. Note that cross directory moves do not work with
ee2fd967
SF
1676 * rename by filehandle to various Windows servers.
1677 */
47c78f4a 1678 if (rc == 0 || rc != -EBUSY)
7ffec372 1679 goto do_rename_exit;
ee2fd967 1680
ed0e3ace
JL
1681 /* open-file renames don't work across directories */
1682 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1683 goto do_rename_exit;
ed0e3ace 1684
d81b8a40
PS
1685 oparms.tcon = tcon;
1686 oparms.cifs_sb = cifs_sb;
ee2fd967 1687 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1688 oparms.desired_access = DELETE;
1689 oparms.create_options = CREATE_NOT_DIR;
1690 oparms.disposition = FILE_OPEN;
1691 oparms.path = from_path;
1692 oparms.fid = &fid;
1693 oparms.reconnect = false;
1694
1695 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1696 if (rc == 0) {
d81b8a40 1697 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1698 (const char *) to_dentry->d_name.name,
2baa2682 1699 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1700 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1701 }
7ffec372
JL
1702do_rename_exit:
1703 cifs_put_tlink(tlink);
ee2fd967
SF
1704 return rc;
1705}
1706
8ceb9843 1707int
7c33d597
MS
1708cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1709 struct inode *target_dir, struct dentry *target_dentry,
1710 unsigned int flags)
1da177e4 1711{
8ceb9843
PS
1712 char *from_name = NULL;
1713 char *to_name = NULL;
639e7a91 1714 struct cifs_sb_info *cifs_sb;
7ffec372 1715 struct tcon_link *tlink;
96daf2b0 1716 struct cifs_tcon *tcon;
ee2fd967
SF
1717 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1718 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1719 unsigned int xid;
1720 int rc, tmprc;
1da177e4 1721
7c33d597
MS
1722 if (flags & ~RENAME_NOREPLACE)
1723 return -EINVAL;
1724
639e7a91 1725 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1726 tlink = cifs_sb_tlink(cifs_sb);
1727 if (IS_ERR(tlink))
1728 return PTR_ERR(tlink);
1729 tcon = tlink_tcon(tlink);
1da177e4 1730
6d5786a3 1731 xid = get_xid();
ee2fd967 1732
ee2fd967
SF
1733 /*
1734 * we already have the rename sem so we do not need to
1735 * grab it again here to protect the path integrity
1736 */
8ceb9843
PS
1737 from_name = build_path_from_dentry(source_dentry);
1738 if (from_name == NULL) {
ee2fd967
SF
1739 rc = -ENOMEM;
1740 goto cifs_rename_exit;
1741 }
1742
8ceb9843
PS
1743 to_name = build_path_from_dentry(target_dentry);
1744 if (to_name == NULL) {
1da177e4
LT
1745 rc = -ENOMEM;
1746 goto cifs_rename_exit;
1747 }
1748
8ceb9843
PS
1749 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1750 to_name);
ee2fd967 1751
7c33d597
MS
1752 /*
1753 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1754 */
1755 if (flags & RENAME_NOREPLACE)
1756 goto cifs_rename_exit;
1757
14121bdc
JL
1758 if (rc == -EEXIST && tcon->unix_ext) {
1759 /*
8ceb9843
PS
1760 * Are src and dst hardlinks of same inode? We can only tell
1761 * with unix extensions enabled.
14121bdc
JL
1762 */
1763 info_buf_source =
1764 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1765 GFP_KERNEL);
1766 if (info_buf_source == NULL) {
1767 rc = -ENOMEM;
1768 goto cifs_rename_exit;
1769 }
1770
1771 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1772 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1773 info_buf_source,
1774 cifs_sb->local_nls,
2baa2682 1775 cifs_remap(cifs_sb));
8d281efb 1776 if (tmprc != 0)
14121bdc 1777 goto unlink_target;
ee2fd967 1778
8ceb9843
PS
1779 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1780 info_buf_target,
1781 cifs_sb->local_nls,
2baa2682 1782 cifs_remap(cifs_sb));
14121bdc 1783
8d281efb 1784 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1785 info_buf_target->UniqueId)) {
14121bdc 1786 /* same file, POSIX says that this is a noop */
ae6884a9 1787 rc = 0;
14121bdc 1788 goto cifs_rename_exit;
ae6884a9 1789 }
8ceb9843
PS
1790 }
1791 /*
1792 * else ... BB we could add the same check for Windows by
1793 * checking the UniqueId via FILE_INTERNAL_INFO
1794 */
14121bdc 1795
ee2fd967 1796unlink_target:
fc6f3943 1797 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1798 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1799 if (d_is_dir(target_dentry))
1800 tmprc = cifs_rmdir(target_dir, target_dentry);
1801 else
1802 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1803 if (tmprc)
1804 goto cifs_rename_exit;
8ceb9843
PS
1805 rc = cifs_do_rename(xid, source_dentry, from_name,
1806 target_dentry, to_name);
1da177e4
LT
1807 }
1808
b46799a8
PS
1809 /* force revalidate to go get info when needed */
1810 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1811
1812 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1813 target_dir->i_mtime = current_time(source_dir);
b46799a8 1814
1da177e4 1815cifs_rename_exit:
ee2fd967 1816 kfree(info_buf_source);
8ceb9843
PS
1817 kfree(from_name);
1818 kfree(to_name);
6d5786a3 1819 free_xid(xid);
7ffec372 1820 cifs_put_tlink(tlink);
1da177e4
LT
1821 return rc;
1822}
1823
df2cf170
JL
1824static bool
1825cifs_inode_needs_reval(struct inode *inode)
1da177e4 1826{
df2cf170 1827 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1828 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1829
18cceb6a 1830 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1831 return false;
1da177e4 1832
df2cf170
JL
1833 if (!lookupCacheEnabled)
1834 return true;
1da177e4 1835
df2cf170
JL
1836 if (cifs_i->time == 0)
1837 return true;
1da177e4 1838
a87c9ad9
JL
1839 if (!cifs_sb->actimeo)
1840 return true;
1841
6d20e840
SJ
1842 if (!time_in_range(jiffies, cifs_i->time,
1843 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1844 return true;
1845
db19272e 1846 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1847 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1848 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1849 return true;
1850
df2cf170
JL
1851 return false;
1852}
1853
523fb8c8
SJ
1854/*
1855 * Zap the cache. Called when invalid_mapping flag is set.
1856 */
6feb9891 1857int
df2cf170
JL
1858cifs_invalidate_mapping(struct inode *inode)
1859{
6feb9891 1860 int rc = 0;
df2cf170 1861
df2cf170 1862 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1863 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1864 if (rc)
f96637be
JP
1865 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1866 __func__, inode);
df2cf170 1867 }
257fb1f1 1868
9451a9a5 1869 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1870 return rc;
df2cf170
JL
1871}
1872
4f73c7d3
JL
1873/**
1874 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1875 * @word: long word containing the bit lock
1876 */
1877static int
dfd01f02 1878cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1879{
4f73c7d3 1880 freezable_schedule_unsafe();
dfd01f02
PZ
1881 if (signal_pending_state(mode, current))
1882 return -ERESTARTSYS;
4f73c7d3
JL
1883 return 0;
1884}
1885
e284e53f
JL
1886int
1887cifs_revalidate_mapping(struct inode *inode)
1888{
4f73c7d3
JL
1889 int rc;
1890 unsigned long *flags = &CIFS_I(inode)->flags;
1891
74316201
N
1892 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1893 TASK_KILLABLE);
4f73c7d3
JL
1894 if (rc)
1895 return rc;
1896
1897 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1898 rc = cifs_invalidate_mapping(inode);
1899 if (rc)
1900 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1901 }
1902
1903 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1904 smp_mb__after_atomic();
4f73c7d3
JL
1905 wake_up_bit(flags, CIFS_INO_LOCK);
1906
1907 return rc;
1908}
1909
1910int
1911cifs_zap_mapping(struct inode *inode)
1912{
1913 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1914 return cifs_revalidate_mapping(inode);
e284e53f
JL
1915}
1916
6feb9891 1917int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1918{
1919 int rc = 0;
496ad9aa 1920 struct inode *inode = file_inode(filp);
ba00ba64 1921 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1922
1923 if (!cifs_inode_needs_reval(inode))
6feb9891 1924 return rc;
abab095d 1925
13cfb733 1926 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1927 rc = cifs_get_file_info_unix(filp);
1928 else
1929 rc = cifs_get_file_info(filp);
1930
abab095d
JL
1931 return rc;
1932}
1933
6feb9891 1934int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1935{
6d5786a3 1936 unsigned int xid;
df2cf170 1937 int rc = 0;
2b0143b5 1938 struct inode *inode = d_inode(dentry);
df2cf170 1939 struct super_block *sb = dentry->d_sb;
6feb9891 1940 char *full_path = NULL;
df2cf170
JL
1941
1942 if (inode == NULL)
1943 return -ENOENT;
1da177e4 1944
df2cf170 1945 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1946 return rc;
1947
6d5786a3 1948 xid = get_xid();
1da177e4
LT
1949
1950 /* can not safely grab the rename sem here if rename calls revalidate
1951 since that would deadlock */
df2cf170 1952 full_path = build_path_from_dentry(dentry);
1da177e4 1953 if (full_path == NULL) {
0f3bc09e 1954 rc = -ENOMEM;
6feb9891 1955 goto out;
1da177e4
LT
1956 }
1957
f96637be
JP
1958 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1959 full_path, inode, inode->i_count.counter,
a00be0e3 1960 dentry, cifs_get_time(dentry), jiffies);
1da177e4 1961
0d424ad0 1962 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1963 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1964 else
1965 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1966 xid, NULL);
1da177e4 1967
6feb9891 1968out:
1da177e4 1969 kfree(full_path);
6d5786a3 1970 free_xid(xid);
1da177e4
LT
1971 return rc;
1972}
1973
6feb9891
PS
1974int cifs_revalidate_file(struct file *filp)
1975{
1976 int rc;
496ad9aa 1977 struct inode *inode = file_inode(filp);
6feb9891
PS
1978
1979 rc = cifs_revalidate_file_attr(filp);
1980 if (rc)
1981 return rc;
1982
e284e53f 1983 return cifs_revalidate_mapping(inode);
6feb9891
PS
1984}
1985
1986/* revalidate a dentry's inode attributes */
1987int cifs_revalidate_dentry(struct dentry *dentry)
1988{
1989 int rc;
2b0143b5 1990 struct inode *inode = d_inode(dentry);
6feb9891
PS
1991
1992 rc = cifs_revalidate_dentry_attr(dentry);
1993 if (rc)
1994 return rc;
1995
e284e53f 1996 return cifs_revalidate_mapping(inode);
6feb9891
PS
1997}
1998
a528d35e
DH
1999int cifs_getattr(const struct path *path, struct kstat *stat,
2000 u32 request_mask, unsigned int flags)
1da177e4 2001{
a528d35e 2002 struct dentry *dentry = path->dentry;
3aa1c8c2 2003 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2004 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2005 struct inode *inode = d_inode(dentry);
6feb9891 2006 int rc;
3aa1c8c2 2007
6feb9891
PS
2008 /*
2009 * We need to be sure that all dirty pages are written and the server
2010 * has actual ctime, mtime and file length.
2011 */
18cceb6a 2012 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2013 inode->i_mapping->nrpages != 0) {
2014 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2015 if (rc) {
2016 mapping_set_error(inode->i_mapping, rc);
2017 return rc;
2018 }
6feb9891 2019 }
1c456013 2020
6feb9891
PS
2021 rc = cifs_revalidate_dentry_attr(dentry);
2022 if (rc)
2023 return rc;
2024
2025 generic_fillattr(inode, stat);
2026 stat->blksize = CIFS_MAX_MSGSIZE;
2027 stat->ino = CIFS_I(inode)->uniqueid;
2028
6e70e26d
SF
2029 /* old CIFS Unix Extensions doesn't return create time */
2030 if (CIFS_I(inode)->createtime) {
2031 stat->result_mask |= STATX_BTIME;
2032 stat->btime =
2033 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
2034 }
2035
2036 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2037 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2038 stat->attributes |= STATX_ATTR_COMPRESSED;
2039 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2040 stat->attributes |= STATX_ATTR_ENCRYPTED;
2041
6feb9891 2042 /*
d3d1fce1
JL
2043 * If on a multiuser mount without unix extensions or cifsacl being
2044 * enabled, and the admin hasn't overridden them, set the ownership
2045 * to the fsuid/fsgid of the current process.
6feb9891
PS
2046 */
2047 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2048 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2049 !tcon->unix_ext) {
2050 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2051 stat->uid = current_fsuid();
2052 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2053 stat->gid = current_fsgid();
5fe14c85 2054 }
6feb9891 2055 return rc;
1da177e4
LT
2056}
2057
2058static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2059{
09cbfeaf
KS
2060 pgoff_t index = from >> PAGE_SHIFT;
2061 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2062 struct page *page;
1da177e4
LT
2063 int rc = 0;
2064
2065 page = grab_cache_page(mapping, index);
2066 if (!page)
2067 return -ENOMEM;
2068
09cbfeaf 2069 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2070 unlock_page(page);
09cbfeaf 2071 put_page(page);
1da177e4
LT
2072 return rc;
2073}
2074
1b947463 2075static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2076{
ba6a46a0 2077 spin_lock(&inode->i_lock);
3677db10 2078 i_size_write(inode, offset);
ba6a46a0 2079 spin_unlock(&inode->i_lock);
1b947463 2080
7caef267 2081 truncate_pagecache(inode, offset);
3677db10
SF
2082}
2083
8efdbde6
JL
2084static int
2085cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2086 unsigned int xid, char *full_path)
8efdbde6
JL
2087{
2088 int rc;
2089 struct cifsFileInfo *open_file;
2090 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2091 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2092 struct tcon_link *tlink = NULL;
d1433418
PS
2093 struct cifs_tcon *tcon = NULL;
2094 struct TCP_Server_Info *server;
8efdbde6
JL
2095
2096 /*
2097 * To avoid spurious oplock breaks from server, in the case of
2098 * inodes that we already have open, avoid doing path based
2099 * setting of file size if we can do it by handle.
2100 * This keeps our caching token (oplock) and avoids timeouts
2101 * when the local oplock break takes longer to flush
2102 * writebehind data than the SMB timeout for the SetPathInfo
2103 * request would allow
2104 */
6508d904 2105 open_file = find_writable_file(cifsInode, true);
8efdbde6 2106 if (open_file) {
d1433418
PS
2107 tcon = tlink_tcon(open_file->tlink);
2108 server = tcon->ses->server;
2109 if (server->ops->set_file_size)
2110 rc = server->ops->set_file_size(xid, tcon, open_file,
2111 attrs->ia_size, false);
2112 else
2113 rc = -ENOSYS;
6ab409b5 2114 cifsFileInfo_put(open_file);
f96637be 2115 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2116 } else
2117 rc = -EINVAL;
2118
d1433418
PS
2119 if (!rc)
2120 goto set_size_out;
2121
2122 if (tcon == NULL) {
2123 tlink = cifs_sb_tlink(cifs_sb);
2124 if (IS_ERR(tlink))
2125 return PTR_ERR(tlink);
2126 tcon = tlink_tcon(tlink);
2127 server = tcon->ses->server;
2128 }
ba00ba64 2129
d1433418
PS
2130 /*
2131 * Set file size by pathname rather than by handle either because no
2132 * valid, writeable file handle for it was found or because there was
2133 * an error setting it by handle.
2134 */
2135 if (server->ops->set_path_size)
2136 rc = server->ops->set_path_size(xid, tcon, full_path,
2137 attrs->ia_size, cifs_sb, false);
2138 else
2139 rc = -ENOSYS;
f96637be 2140 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2141
d1433418
PS
2142 if (tlink)
2143 cifs_put_tlink(tlink);
8efdbde6 2144
d1433418 2145set_size_out:
8efdbde6 2146 if (rc == 0) {
fbec9ab9 2147 cifsInode->server_eof = attrs->ia_size;
1b947463 2148 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2149 cifs_truncate_page(inode->i_mapping, inode->i_size);
2150 }
2151
2152 return rc;
2153}
2154
3fe5c1dd
JL
2155static int
2156cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2157{
2158 int rc;
6d5786a3 2159 unsigned int xid;
3fe5c1dd 2160 char *full_path = NULL;
2b0143b5 2161 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2162 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2163 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2164 struct tcon_link *tlink;
96daf2b0 2165 struct cifs_tcon *pTcon;
3fe5c1dd 2166 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2167 struct cifsFileInfo *open_file;
3fe5c1dd 2168
35c265e0
AV
2169 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2170 direntry, attrs->ia_valid);
3fe5c1dd 2171
6d5786a3 2172 xid = get_xid();
3fe5c1dd 2173
db78b877
CH
2174 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2175 attrs->ia_valid |= ATTR_FORCE;
2176
31051c85 2177 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2178 if (rc < 0)
2179 goto out;
3fe5c1dd
JL
2180
2181 full_path = build_path_from_dentry(direntry);
2182 if (full_path == NULL) {
2183 rc = -ENOMEM;
2184 goto out;
2185 }
2186
0f4d634c
JL
2187 /*
2188 * Attempt to flush data before changing attributes. We need to do
2189 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2190 * ownership or mode then we may also need to do this. Here, we take
2191 * the safe way out and just do the flush on all setattr requests. If
2192 * the flush returns error, store it to report later and continue.
2193 *
2194 * BB: This should be smarter. Why bother flushing pages that
2195 * will be truncated anyway? Also, should we error out here if
2196 * the flush returns error?
2197 */
2198 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2199 mapping_set_error(inode->i_mapping, rc);
2200 rc = 0;
3fe5c1dd
JL
2201
2202 if (attrs->ia_valid & ATTR_SIZE) {
2203 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2204 if (rc != 0)
2205 goto out;
2206 }
2207
2208 /* skip mode change if it's just for clearing setuid/setgid */
2209 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2210 attrs->ia_valid &= ~ATTR_MODE;
2211
2212 args = kmalloc(sizeof(*args), GFP_KERNEL);
2213 if (args == NULL) {
2214 rc = -ENOMEM;
2215 goto out;
2216 }
2217
2218 /* set up the struct */
2219 if (attrs->ia_valid & ATTR_MODE)
2220 args->mode = attrs->ia_mode;
2221 else
2222 args->mode = NO_CHANGE_64;
2223
2224 if (attrs->ia_valid & ATTR_UID)
2225 args->uid = attrs->ia_uid;
2226 else
49418b2c 2227 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2228
2229 if (attrs->ia_valid & ATTR_GID)
2230 args->gid = attrs->ia_gid;
2231 else
49418b2c 2232 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2233
2234 if (attrs->ia_valid & ATTR_ATIME)
2235 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2236 else
2237 args->atime = NO_CHANGE_64;
2238
2239 if (attrs->ia_valid & ATTR_MTIME)
2240 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2241 else
2242 args->mtime = NO_CHANGE_64;
2243
2244 if (attrs->ia_valid & ATTR_CTIME)
2245 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2246 else
2247 args->ctime = NO_CHANGE_64;
2248
2249 args->device = 0;
6508d904 2250 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2251 if (open_file) {
4b4de76e 2252 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2253 u32 npid = open_file->pid;
13cfb733 2254 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2255 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2256 cifsFileInfo_put(open_file);
3bbeeb3c 2257 } else {
7ffec372
JL
2258 tlink = cifs_sb_tlink(cifs_sb);
2259 if (IS_ERR(tlink)) {
2260 rc = PTR_ERR(tlink);
2261 goto out;
2262 }
2263 pTcon = tlink_tcon(tlink);
3bbeeb3c 2264 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2265 cifs_sb->local_nls,
bc8ebdc4 2266 cifs_remap(cifs_sb));
7ffec372 2267 cifs_put_tlink(tlink);
3bbeeb3c 2268 }
3fe5c1dd 2269
1025774c
CH
2270 if (rc)
2271 goto out;
ccd4bb1b 2272
1025774c 2273 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2274 attrs->ia_size != i_size_read(inode))
2275 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2276
2277 setattr_copy(inode, attrs);
2278 mark_inode_dirty(inode);
2279
2280 /* force revalidate when any of these times are set since some
2281 of the fs types (eg ext3, fat) do not have fine enough
2282 time granularity to match protocol, and we do not have a
2283 a way (yet) to query the server fs's time granularity (and
2284 whether it rounds times down).
2285 */
2286 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2287 cifsInode->time = 0;
3fe5c1dd
JL
2288out:
2289 kfree(args);
2290 kfree(full_path);
6d5786a3 2291 free_xid(xid);
3fe5c1dd
JL
2292 return rc;
2293}
2294
0510eeb7
JL
2295static int
2296cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2297{
6d5786a3 2298 unsigned int xid;
8abf2775
EB
2299 kuid_t uid = INVALID_UID;
2300 kgid_t gid = INVALID_GID;
2b0143b5 2301 struct inode *inode = d_inode(direntry);
3fe5c1dd 2302 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2303 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2304 char *full_path = NULL;
2305 int rc = -EACCES;
feb3e20c 2306 __u32 dosattr = 0;
4e1e7fb9 2307 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2308
6d5786a3 2309 xid = get_xid();
1da177e4 2310
35c265e0
AV
2311 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2312 direntry, attrs->ia_valid);
6473a559 2313
db78b877
CH
2314 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2315 attrs->ia_valid |= ATTR_FORCE;
2316
31051c85 2317 rc = setattr_prepare(direntry, attrs);
db78b877 2318 if (rc < 0) {
6d5786a3 2319 free_xid(xid);
db78b877 2320 return rc;
6473a559 2321 }
50c2f753 2322
7f57356b 2323 full_path = build_path_from_dentry(direntry);
1da177e4 2324 if (full_path == NULL) {
0f3bc09e 2325 rc = -ENOMEM;
6d5786a3 2326 free_xid(xid);
0f3bc09e 2327 return rc;
1da177e4 2328 }
1da177e4 2329
0f4d634c
JL
2330 /*
2331 * Attempt to flush data before changing attributes. We need to do
2332 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2333 * ownership or mode then we may also need to do this. Here, we take
2334 * the safe way out and just do the flush on all setattr requests. If
2335 * the flush returns error, store it to report later and continue.
2336 *
2337 * BB: This should be smarter. Why bother flushing pages that
2338 * will be truncated anyway? Also, should we error out here if
2339 * the flush returns error?
2340 */
2341 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2342 mapping_set_error(inode->i_mapping, rc);
2343 rc = 0;
cea21805 2344
50531444 2345 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2346 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2347 if (rc != 0)
e30dcf3a 2348 goto cifs_setattr_exit;
1da177e4 2349 }
4ca691a8 2350
a5ff3769
SP
2351 if (attrs->ia_valid & ATTR_UID)
2352 uid = attrs->ia_uid;
2353
2354 if (attrs->ia_valid & ATTR_GID)
2355 gid = attrs->ia_gid;
2356
2357#ifdef CONFIG_CIFS_ACL
2358 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2359 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2360 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2361 uid, gid);
2362 if (rc) {
f96637be
JP
2363 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2364 __func__, rc);
a5ff3769
SP
2365 goto cifs_setattr_exit;
2366 }
2367 }
2368 } else
2369#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2370 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2371 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2372
d32c4f26
JL
2373 /* skip mode change if it's just for clearing setuid/setgid */
2374 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2375 attrs->ia_valid &= ~ATTR_MODE;
2376
1da177e4 2377 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2378 mode = attrs->ia_mode;
cdbce9c8 2379 rc = 0;
79df1bae 2380#ifdef CONFIG_CIFS_ACL
78415d2d 2381 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2382 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2383 INVALID_UID, INVALID_GID);
78415d2d 2384 if (rc) {
f96637be
JP
2385 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2386 __func__, rc);
78415d2d
SP
2387 goto cifs_setattr_exit;
2388 }
2389 } else
79df1bae 2390#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2391 if (((mode & S_IWUGO) == 0) &&
2392 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2393
2394 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2395
5132861a
JL
2396 /* fix up mode if we're not using dynperm */
2397 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2398 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2399 } else if ((mode & S_IWUGO) &&
2400 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2401
2402 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2403 /* Attributes of 0 are ignored */
2404 if (dosattr == 0)
2405 dosattr |= ATTR_NORMAL;
5132861a
JL
2406
2407 /* reset local inode permissions to normal */
2408 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2409 attrs->ia_mode &= ~(S_IALLUGO);
2410 if (S_ISDIR(inode->i_mode))
2411 attrs->ia_mode |=
2412 cifs_sb->mnt_dir_mode;
2413 else
2414 attrs->ia_mode |=
2415 cifs_sb->mnt_file_mode;
2416 }
2417 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2418 /* ignore mode change - ATTR_READONLY hasn't changed */
2419 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2420 }
1da177e4
LT
2421 }
2422
feb3e20c
JL
2423 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2424 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2425 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2426 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2427
e30dcf3a
SF
2428 /* Even if error on time set, no sense failing the call if
2429 the server would set the time to a reasonable value anyway,
2430 and this check ensures that we are not being called from
2431 sys_utimes in which case we ought to fail the call back to
2432 the user when the server rejects the call */
fb8c4b14 2433 if ((rc) && (attrs->ia_valid &
feb3e20c 2434 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2435 rc = 0;
1da177e4
LT
2436 }
2437
2438 /* do not need local check to inode_check_ok since the server does
2439 that */
1025774c
CH
2440 if (rc)
2441 goto cifs_setattr_exit;
2442
2443 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2444 attrs->ia_size != i_size_read(inode))
2445 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2446
2447 setattr_copy(inode, attrs);
2448 mark_inode_dirty(inode);
1025774c 2449
e30dcf3a 2450cifs_setattr_exit:
1da177e4 2451 kfree(full_path);
6d5786a3 2452 free_xid(xid);
1da177e4
LT
2453 return rc;
2454}
2455
0510eeb7
JL
2456int
2457cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2458{
fc64005c 2459 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2460 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2461
2462 if (pTcon->unix_ext)
2463 return cifs_setattr_unix(direntry, attrs);
2464
2465 return cifs_setattr_nounix(direntry, attrs);
2466
2467 /* BB: add cifs_setattr_legacy for really old servers */
2468}
2469
99ee4dbd 2470#if 0
1da177e4
LT
2471void cifs_delete_inode(struct inode *inode)
2472{
f96637be 2473 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2474 /* may have to add back in if and when safe distributed caching of
2475 directories added e.g. via FindNotify */
2476}
99ee4dbd 2477#endif