]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/inode.c
Merge branches 'for-3.10/appleir', 'for-3.10/hid-debug', 'for-3.10/hid-driver-transpo...
[mirror_ubuntu-artful-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f19159dc 94 cFYI(1, "%s: revalidating inode %llu", __func__, cifs_i->uniqueid);
df2cf170
JL
95
96 if (inode->i_state & I_NEW) {
f19159dc 97 cFYI(1, "%s: inode %llu is new", __func__, cifs_i->uniqueid);
df2cf170
JL
98 return;
99 }
100
101 /* don't bother with revalidation if we have an oplock */
102 if (cifs_i->clientCanCacheRead) {
f19159dc
SF
103 cFYI(1, "%s: inode %llu is oplocked", __func__,
104 cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* revalidate if mtime or size have changed */
109 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
110 cifs_i->server_eof == fattr->cf_eof) {
f19159dc
SF
111 cFYI(1, "%s: inode %llu is unchanged", __func__,
112 cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
f19159dc
SF
116 cFYI(1, "%s: invalidating inode %llu mapping", __func__,
117 cifs_i->uniqueid);
df2cf170
JL
118 cifs_i->invalid_mapping = true;
119}
120
cc0bad75
JL
121/* populate an inode with info from a cifs_fattr struct */
122void
123cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 124{
cc0bad75 125 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 127
df2cf170
JL
128 cifs_revalidate_cache(inode, fattr);
129
b7ca6928 130 spin_lock(&inode->i_lock);
cc0bad75
JL
131 inode->i_atime = fattr->cf_atime;
132 inode->i_mtime = fattr->cf_mtime;
133 inode->i_ctime = fattr->cf_ctime;
cc0bad75 134 inode->i_rdev = fattr->cf_rdev;
bfe86848 135 set_nlink(inode, fattr->cf_nlink);
cc0bad75
JL
136 inode->i_uid = fattr->cf_uid;
137 inode->i_gid = fattr->cf_gid;
138
0b8f18e3
JL
139 /* if dynperm is set, don't clobber existing mode */
140 if (inode->i_state & I_NEW ||
141 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
142 inode->i_mode = fattr->cf_mode;
143
cc0bad75 144 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 145
0b8f18e3
JL
146 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
147 cifs_i->time = 0;
148 else
149 cifs_i->time = jiffies;
150
0b8f18e3 151 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 152
835a36ca 153 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
154 /*
155 * Can't safely change the file size here if the client is writing to
156 * it due to potential races.
157 */
cc0bad75
JL
158 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
159 i_size_write(inode, fattr->cf_eof);
160
161 /*
162 * i_blocks is not related to (i_size / i_blksize),
163 * but instead 512 byte (2**9) size is required for
164 * calculating num blocks.
165 */
166 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
167 }
168 spin_unlock(&inode->i_lock);
169
01c64fea
DH
170 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
171 inode->i_flags |= S_AUTOMOUNT;
172 cifs_set_ops(inode);
cc0bad75
JL
173}
174
4065c802
JL
175void
176cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
177{
178 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
179
180 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
181 return;
182
183 fattr->cf_uniqueid = iunique(sb, ROOT_I);
184}
185
cc0bad75
JL
186/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
187void
188cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
189 struct cifs_sb_info *cifs_sb)
190{
191 memset(fattr, 0, sizeof(*fattr));
192 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
193 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
194 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
195
196 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
197 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
198 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
199 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
200
201 /*
202 * Since we set the inode type below we need to mask off
203 * to avoid strange results if bits set above.
204 */
cc0bad75 205 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
206 switch (le32_to_cpu(info->Type)) {
207 case UNIX_FILE:
cc0bad75
JL
208 fattr->cf_mode |= S_IFREG;
209 fattr->cf_dtype = DT_REG;
75f12983
CH
210 break;
211 case UNIX_SYMLINK:
cc0bad75
JL
212 fattr->cf_mode |= S_IFLNK;
213 fattr->cf_dtype = DT_LNK;
75f12983
CH
214 break;
215 case UNIX_DIR:
cc0bad75
JL
216 fattr->cf_mode |= S_IFDIR;
217 fattr->cf_dtype = DT_DIR;
75f12983
CH
218 break;
219 case UNIX_CHARDEV:
cc0bad75
JL
220 fattr->cf_mode |= S_IFCHR;
221 fattr->cf_dtype = DT_CHR;
222 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
223 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
224 break;
225 case UNIX_BLOCKDEV:
cc0bad75
JL
226 fattr->cf_mode |= S_IFBLK;
227 fattr->cf_dtype = DT_BLK;
228 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
229 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
230 break;
231 case UNIX_FIFO:
cc0bad75
JL
232 fattr->cf_mode |= S_IFIFO;
233 fattr->cf_dtype = DT_FIFO;
75f12983
CH
234 break;
235 case UNIX_SOCKET:
cc0bad75
JL
236 fattr->cf_mode |= S_IFSOCK;
237 fattr->cf_dtype = DT_SOCK;
75f12983
CH
238 break;
239 default:
240 /* safest to call it a file if we do not know */
cc0bad75
JL
241 fattr->cf_mode |= S_IFREG;
242 fattr->cf_dtype = DT_REG;
b6b38f70 243 cFYI(1, "unknown type %d", le32_to_cpu(info->Type));
75f12983
CH
244 break;
245 }
246
46bbc25f
EB
247 fattr->cf_uid = cifs_sb->mnt_uid;
248 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
249 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
250 if (id < ((uid_t)-1)) {
251 kuid_t uid = make_kuid(&init_user_ns, id);
252 if (uid_valid(uid))
253 fattr->cf_uid = uid;
254 }
46bbc25f
EB
255 }
256
257 fattr->cf_gid = cifs_sb->mnt_gid;
258 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
259 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
260 if (id < ((gid_t)-1)) {
261 kgid_t gid = make_kgid(&init_user_ns, id);
262 if (gid_valid(gid))
263 fattr->cf_gid = gid;
264 }
46bbc25f 265 }
75f12983 266
cc0bad75 267 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
268}
269
b9a3260f 270/*
cc0bad75
JL
271 * Fill a cifs_fattr struct with fake inode info.
272 *
273 * Needed to setup cifs_fattr data for the directory which is the
274 * junction to the new submount (ie to setup the fake directory
275 * which represents a DFS referral).
b9a3260f 276 */
f1230c97 277static void
cc0bad75 278cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 279{
cc0bad75 280 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 281
b6b38f70 282 cFYI(1, "creating fake fattr for DFS referral");
cc0bad75
JL
283
284 memset(fattr, 0, sizeof(*fattr));
285 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
286 fattr->cf_uid = cifs_sb->mnt_uid;
287 fattr->cf_gid = cifs_sb->mnt_gid;
288 fattr->cf_atime = CURRENT_TIME;
289 fattr->cf_ctime = CURRENT_TIME;
290 fattr->cf_mtime = CURRENT_TIME;
291 fattr->cf_nlink = 2;
292 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
293}
294
4ad65044
PS
295static int
296cifs_get_file_info_unix(struct file *filp)
abab095d
JL
297{
298 int rc;
6d5786a3 299 unsigned int xid;
abab095d
JL
300 FILE_UNIX_BASIC_INFO find_data;
301 struct cifs_fattr fattr;
496ad9aa 302 struct inode *inode = file_inode(filp);
abab095d 303 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 304 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 305 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 306
6d5786a3 307 xid = get_xid();
4b4de76e 308 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
309 if (!rc) {
310 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
311 } else if (rc == -EREMOTE) {
312 cifs_create_dfs_fattr(&fattr, inode->i_sb);
313 rc = 0;
314 }
315
316 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 317 free_xid(xid);
abab095d
JL
318 return rc;
319}
320
1da177e4 321int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 322 const unsigned char *full_path,
6d5786a3 323 struct super_block *sb, unsigned int xid)
1da177e4 324{
cc0bad75 325 int rc;
0e4bbde9 326 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 327 struct cifs_fattr fattr;
96daf2b0 328 struct cifs_tcon *tcon;
7ffec372 329 struct tcon_link *tlink;
1da177e4 330 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 331
b6b38f70 332 cFYI(1, "Getting info on %s", full_path);
7962670e 333
7ffec372
JL
334 tlink = cifs_sb_tlink(cifs_sb);
335 if (IS_ERR(tlink))
336 return PTR_ERR(tlink);
337 tcon = tlink_tcon(tlink);
338
1da177e4 339 /* could have done a find first instead but this returns more info */
cc0bad75 340 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
341 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
342 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 343 cifs_put_tlink(tlink);
e911d0cc 344
cc0bad75
JL
345 if (!rc) {
346 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
347 } else if (rc == -EREMOTE) {
348 cifs_create_dfs_fattr(&fattr, sb);
349 rc = 0;
350 } else {
351 return rc;
352 }
1da177e4 353
1b12b9c1
SM
354 /* check for Minshall+French symlinks */
355 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
356 int tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
357 if (tmprc)
358 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
359 }
360
0e4bbde9 361 if (*pinode == NULL) {
cc0bad75 362 /* get new inode */
4065c802 363 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
364 *pinode = cifs_iget(sb, &fattr);
365 if (!*pinode)
0e4bbde9 366 rc = -ENOMEM;
cc0bad75
JL
367 } else {
368 /* we already have inode, update it */
369 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 370 }
1da177e4 371
1da177e4
LT
372 return rc;
373}
374
0b8f18e3
JL
375static int
376cifs_sfu_type(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 377 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
378{
379 int rc;
4b18f2a9 380 int oplock = 0;
d6e2f2a4 381 __u16 netfid;
7ffec372 382 struct tcon_link *tlink;
96daf2b0 383 struct cifs_tcon *tcon;
d4ffff1f 384 struct cifs_io_parms io_parms;
86c96b4b 385 char buf[24];
d6e2f2a4 386 unsigned int bytes_read;
fb8c4b14 387 char *pbuf;
d6e2f2a4
SF
388
389 pbuf = buf;
390
0b8f18e3
JL
391 fattr->cf_mode &= ~S_IFMT;
392
393 if (fattr->cf_eof == 0) {
394 fattr->cf_mode |= S_IFIFO;
395 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 396 return 0;
0b8f18e3
JL
397 } else if (fattr->cf_eof < 8) {
398 fattr->cf_mode |= S_IFREG;
399 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
400 return -EINVAL; /* EOPNOTSUPP? */
401 }
50c2f753 402
7ffec372
JL
403 tlink = cifs_sb_tlink(cifs_sb);
404 if (IS_ERR(tlink))
405 return PTR_ERR(tlink);
406 tcon = tlink_tcon(tlink);
407
408 rc = CIFSSMBOpen(xid, tcon, path, FILE_OPEN, GENERIC_READ,
d6e2f2a4
SF
409 CREATE_NOT_DIR, &netfid, &oplock, NULL,
410 cifs_sb->local_nls,
411 cifs_sb->mnt_cifs_flags &
412 CIFS_MOUNT_MAP_SPECIAL_CHR);
fb8c4b14 413 if (rc == 0) {
ec637e3f 414 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4 415 /* Read header */
d4ffff1f
PS
416 io_parms.netfid = netfid;
417 io_parms.pid = current->tgid;
418 io_parms.tcon = tcon;
419 io_parms.offset = 0;
420 io_parms.length = 24;
421 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf,
422 &buf_type);
4523cc30
SF
423 if ((rc == 0) && (bytes_read >= 8)) {
424 if (memcmp("IntxBLK", pbuf, 8) == 0) {
b6b38f70 425 cFYI(1, "Block device");
0b8f18e3
JL
426 fattr->cf_mode |= S_IFBLK;
427 fattr->cf_dtype = DT_BLK;
4523cc30 428 if (bytes_read == 24) {
86c96b4b
SF
429 /* we have enough to decode dev num */
430 __u64 mjr; /* major */
431 __u64 mnr; /* minor */
432 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
433 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 434 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 435 }
4523cc30 436 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
b6b38f70 437 cFYI(1, "Char device");
0b8f18e3
JL
438 fattr->cf_mode |= S_IFCHR;
439 fattr->cf_dtype = DT_CHR;
4523cc30 440 if (bytes_read == 24) {
86c96b4b
SF
441 /* we have enough to decode dev num */
442 __u64 mjr; /* major */
443 __u64 mnr; /* minor */
444 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
445 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 446 fattr->cf_rdev = MKDEV(mjr, mnr);
fb8c4b14 447 }
4523cc30 448 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
b6b38f70 449 cFYI(1, "Symlink");
0b8f18e3
JL
450 fattr->cf_mode |= S_IFLNK;
451 fattr->cf_dtype = DT_LNK;
86c96b4b 452 } else {
0b8f18e3
JL
453 fattr->cf_mode |= S_IFREG; /* file? */
454 fattr->cf_dtype = DT_REG;
fb8c4b14 455 rc = -EOPNOTSUPP;
86c96b4b 456 }
3020a1f5 457 } else {
0b8f18e3
JL
458 fattr->cf_mode |= S_IFREG; /* then it is a file */
459 fattr->cf_dtype = DT_REG;
fb8c4b14
SF
460 rc = -EOPNOTSUPP; /* or some unknown SFU type */
461 }
7ffec372 462 CIFSSMBClose(xid, tcon, netfid);
d6e2f2a4 463 }
7ffec372 464 cifs_put_tlink(tlink);
d6e2f2a4 465 return rc;
d6e2f2a4
SF
466}
467
9e294f1c
SF
468#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
469
0b8f18e3
JL
470/*
471 * Fetch mode bits as provided by SFU.
472 *
473 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
474 */
475static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 476 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 477{
3020a1f5 478#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
479 ssize_t rc;
480 char ea_value[4];
481 __u32 mode;
7ffec372 482 struct tcon_link *tlink;
96daf2b0 483 struct cifs_tcon *tcon;
7ffec372
JL
484
485 tlink = cifs_sb_tlink(cifs_sb);
486 if (IS_ERR(tlink))
487 return PTR_ERR(tlink);
488 tcon = tlink_tcon(tlink);
9e294f1c 489
7ffec372 490 rc = CIFSSMBQAllEAs(xid, tcon, path, "SETFILEBITS",
0b8f18e3
JL
491 ea_value, 4 /* size of buf */, cifs_sb->local_nls,
492 cifs_sb->mnt_cifs_flags &
493 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 494 cifs_put_tlink(tlink);
4523cc30 495 if (rc < 0)
9e294f1c
SF
496 return (int)rc;
497 else if (rc > 3) {
498 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 499 fattr->cf_mode &= ~SFBITS_MASK;
b6b38f70
JP
500 cFYI(1, "special bits 0%o org mode 0%o", mode,
501 fattr->cf_mode);
0b8f18e3 502 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
b6b38f70 503 cFYI(1, "special mode bits 0%o", mode);
9e294f1c 504 }
0b8f18e3
JL
505
506 return 0;
3020a1f5
SF
507#else
508 return -EOPNOTSUPP;
509#endif
9e294f1c
SF
510}
511
0b8f18e3 512/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 513static void
0b8f18e3
JL
514cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
515 struct cifs_sb_info *cifs_sb, bool adjust_tz)
b9a3260f 516{
96daf2b0 517 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 518
0b8f18e3
JL
519 memset(fattr, 0, sizeof(*fattr));
520 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
521 if (info->DeletePending)
522 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
523
524 if (info->LastAccessTime)
525 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
526 else
527 fattr->cf_atime = CURRENT_TIME;
528
529 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
530 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
531
532 if (adjust_tz) {
0d424ad0
JL
533 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
534 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
535 }
536
537 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
538 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 539 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3
JL
540
541 if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
542 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
543 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
544 /*
545 * Server can return wrong NumberOfLinks value for directories
546 * when Unix extensions are disabled - fake it.
547 */
548 fattr->cf_nlink = 2;
0b8f18e3
JL
549 } else {
550 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
551 fattr->cf_dtype = DT_REG;
0b8f18e3 552
d0c280d2
JL
553 /* clear write bits if ATTR_READONLY is set */
554 if (fattr->cf_cifsattrs & ATTR_READONLY)
555 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 556
6de2ce42
PS
557 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
558 }
0b8f18e3
JL
559
560 fattr->cf_uid = cifs_sb->mnt_uid;
561 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
562}
563
4ad65044
PS
564static int
565cifs_get_file_info(struct file *filp)
abab095d
JL
566{
567 int rc;
6d5786a3 568 unsigned int xid;
abab095d
JL
569 FILE_ALL_INFO find_data;
570 struct cifs_fattr fattr;
496ad9aa 571 struct inode *inode = file_inode(filp);
abab095d 572 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 573 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 574 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
575 struct TCP_Server_Info *server = tcon->ses->server;
576
577 if (!server->ops->query_file_info)
578 return -ENOSYS;
abab095d 579
6d5786a3 580 xid = get_xid();
4ad65044 581 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
582 switch (rc) {
583 case 0:
584 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false);
585 break;
586 case -EREMOTE:
587 cifs_create_dfs_fattr(&fattr, inode->i_sb);
588 rc = 0;
589 break;
590 case -EOPNOTSUPP:
591 case -EINVAL:
abab095d
JL
592 /*
593 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
594 * for now, just skip revalidating and mark inode for
595 * immediate reval.
596 */
abab095d
JL
597 rc = 0;
598 CIFS_I(inode)->time = 0;
42274bb2 599 default:
abab095d 600 goto cgfi_exit;
42274bb2 601 }
abab095d
JL
602
603 /*
604 * don't bother with SFU junk here -- just mark inode as needing
605 * revalidation.
606 */
abab095d
JL
607 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
608 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
609 cifs_fattr_to_inode(inode, &fattr);
610cgfi_exit:
6d5786a3 611 free_xid(xid);
abab095d
JL
612 return rc;
613}
614
1208ef1f
PS
615int
616cifs_get_inode_info(struct inode **inode, const char *full_path,
617 FILE_ALL_INFO *data, struct super_block *sb, int xid,
618 const __u16 *fid)
1da177e4 619{
c052e2b4
SP
620 bool validinum = false;
621 __u16 srchflgs;
622 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
623 struct cifs_tcon *tcon;
624 struct TCP_Server_Info *server;
7ffec372 625 struct tcon_link *tlink;
1da177e4 626 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 627 char *buf = NULL;
1208ef1f 628 bool adjust_tz = false;
0b8f18e3 629 struct cifs_fattr fattr;
c052e2b4 630 struct cifs_search_info *srchinf = NULL;
1da177e4 631
7ffec372
JL
632 tlink = cifs_sb_tlink(cifs_sb);
633 if (IS_ERR(tlink))
634 return PTR_ERR(tlink);
1208ef1f
PS
635 tcon = tlink_tcon(tlink);
636 server = tcon->ses->server;
7ffec372 637
b6b38f70 638 cFYI(1, "Getting info on %s", full_path);
1da177e4 639
1208ef1f
PS
640 if ((data == NULL) && (*inode != NULL)) {
641 if (CIFS_I(*inode)->clientCanCacheRead) {
b6b38f70 642 cFYI(1, "No need to revalidate cached inode sizes");
7ffec372 643 goto cgii_exit;
1da177e4
LT
644 }
645 }
646
1208ef1f
PS
647 /* if inode info is not passed, get it from server */
648 if (data == NULL) {
649 if (!server->ops->query_path_info) {
650 rc = -ENOSYS;
651 goto cgii_exit;
652 }
1da177e4 653 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
654 if (buf == NULL) {
655 rc = -ENOMEM;
656 goto cgii_exit;
657 }
1208ef1f
PS
658 data = (FILE_ALL_INFO *)buf;
659 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
660 data, &adjust_tz);
1da177e4 661 }
0b8f18e3
JL
662
663 if (!rc) {
1208ef1f
PS
664 cifs_all_info_to_fattr(&fattr, (FILE_ALL_INFO *)data, cifs_sb,
665 adjust_tz);
0b8f18e3
JL
666 } else if (rc == -EREMOTE) {
667 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 668 rc = 0;
c052e2b4
SP
669 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
670 srchinf = kzalloc(sizeof(struct cifs_search_info),
671 GFP_KERNEL);
672 if (srchinf == NULL) {
673 rc = -ENOMEM;
674 goto cgii_exit;
675 }
676
677 srchinf->endOfSearch = false;
678 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
679
680 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
681 CIFS_SEARCH_CLOSE_AT_END |
682 CIFS_SEARCH_BACKUP_SEARCH;
683
684 rc = CIFSFindFirst(xid, tcon, full_path,
685 cifs_sb, NULL, srchflgs, srchinf, false);
686 if (!rc) {
687 data =
688 (FILE_ALL_INFO *)srchinf->srch_entries_start;
689
690 cifs_dir_info_to_fattr(&fattr,
691 (FILE_DIRECTORY_INFO *)data, cifs_sb);
692 fattr.cf_uniqueid = le64_to_cpu(
693 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
694 validinum = true;
695
696 cifs_buf_release(srchinf->ntwrk_buf_start);
697 }
698 kfree(srchinf);
699 } else
7962670e 700 goto cgii_exit;
1da177e4 701
0b8f18e3
JL
702 /*
703 * If an inode wasn't passed in, then get the inode number
704 *
705 * Is an i_ino of zero legal? Can we use that to check if the server
706 * supports returning inode numbers? Are there other sanity checks we
707 * can use to ensure that the server is really filling in that field?
0b8f18e3 708 */
1208ef1f 709 if (*inode == NULL) {
b9a3260f 710 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
711 if (validinum == false) {
712 if (server->ops->get_srv_inum)
713 tmprc = server->ops->get_srv_inum(xid,
714 tcon, cifs_sb, full_path,
715 &fattr.cf_uniqueid, data);
716 if (tmprc) {
717 cFYI(1, "GetSrvInodeNum rc %d", tmprc);
718 fattr.cf_uniqueid = iunique(sb, ROOT_I);
719 cifs_autodisable_serverino(cifs_sb);
720 }
132ac7b7 721 }
c052e2b4 722 } else
0b8f18e3 723 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 724 } else
1208ef1f 725 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 726
0b8f18e3
JL
727 /* query for SFU type info if supported and needed */
728 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
729 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
730 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
731 if (tmprc)
b6b38f70 732 cFYI(1, "cifs_sfu_type failed: %d", tmprc);
b9a3260f 733 }
1da177e4 734
79df1bae 735#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
736 /* fill in 0777 bits from ACL */
737 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 738 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d
SP
739 if (rc) {
740 cFYI(1, "%s: Getting ACL failed with error: %d",
741 __func__, rc);
742 goto cgii_exit;
743 }
b9a3260f 744 }
79df1bae 745#endif /* CONFIG_CIFS_ACL */
b9a3260f 746
0b8f18e3
JL
747 /* fill in remaining high mode bits e.g. SUID, VTX */
748 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
749 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 750
1b12b9c1
SM
751 /* check for Minshall+French symlinks */
752 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
753 tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
754 if (tmprc)
755 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
756 }
757
1208ef1f
PS
758 if (!*inode) {
759 *inode = cifs_iget(sb, &fattr);
760 if (!*inode)
0b8f18e3
JL
761 rc = -ENOMEM;
762 } else {
1208ef1f 763 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 764 }
b9a3260f 765
7962670e 766cgii_exit:
1da177e4 767 kfree(buf);
7ffec372 768 cifs_put_tlink(tlink);
1da177e4
LT
769 return rc;
770}
771
7f8ed420
SF
772static const struct inode_operations cifs_ipc_inode_ops = {
773 .lookup = cifs_lookup,
774};
775
cc0bad75
JL
776static int
777cifs_find_inode(struct inode *inode, void *opaque)
778{
779 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
780
f30b9c11 781 /* don't match inode with different uniqueid */
cc0bad75
JL
782 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
783 return 0;
784
20054bd6
JL
785 /* use createtime like an i_generation field */
786 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
787 return 0;
788
f30b9c11
JL
789 /* don't match inode of different type */
790 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
791 return 0;
792
5acfec25 793 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 794 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 795 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 796
cc0bad75
JL
797 return 1;
798}
799
800static int
801cifs_init_inode(struct inode *inode, void *opaque)
802{
803 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
804
805 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 806 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
807 return 0;
808}
809
5acfec25
JL
810/*
811 * walk dentry list for an inode and report whether it has aliases that
812 * are hashed. We use this to determine if a directory inode can actually
813 * be used.
814 */
815static bool
816inode_has_hashed_dentries(struct inode *inode)
817{
818 struct dentry *dentry;
819
873feea0 820 spin_lock(&inode->i_lock);
b67bfe0d 821 hlist_for_each_entry(dentry, &inode->i_dentry, d_alias) {
5acfec25 822 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 823 spin_unlock(&inode->i_lock);
5acfec25
JL
824 return true;
825 }
826 }
873feea0 827 spin_unlock(&inode->i_lock);
5acfec25
JL
828 return false;
829}
830
cc0bad75
JL
831/* Given fattrs, get a corresponding inode */
832struct inode *
833cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
834{
835 unsigned long hash;
836 struct inode *inode;
837
3d694380 838retry_iget5_locked:
b6b38f70 839 cFYI(1, "looking for uniqueid=%llu", fattr->cf_uniqueid);
cc0bad75
JL
840
841 /* hash down to 32-bits on 32-bit arch */
842 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
843
844 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 845 if (inode) {
5acfec25 846 /* was there a potentially problematic inode collision? */
3d694380 847 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 848 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
849
850 if (inode_has_hashed_dentries(inode)) {
851 cifs_autodisable_serverino(CIFS_SB(sb));
852 iput(inode);
853 fattr->cf_uniqueid = iunique(sb, ROOT_I);
854 goto retry_iget5_locked;
855 }
3d694380
JL
856 }
857
cc0bad75
JL
858 cifs_fattr_to_inode(inode, fattr);
859 if (sb->s_flags & MS_NOATIME)
860 inode->i_flags |= S_NOATIME | S_NOCMTIME;
861 if (inode->i_state & I_NEW) {
862 inode->i_ino = hash;
522440ed
JL
863 if (S_ISREG(inode->i_mode))
864 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 865#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
866 /* initialize per-inode cache cookie pointer */
867 CIFS_I(inode)->fscache = NULL;
0ccd4802 868#endif
cc0bad75
JL
869 unlock_new_inode(inode);
870 }
871 }
872
873 return inode;
874}
875
1da177e4 876/* gets root inode */
9b6763e0 877struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 878{
6d5786a3 879 unsigned int xid;
0d424ad0 880 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 881 struct inode *inode = NULL;
ce634ab2 882 long rc;
96daf2b0 883 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 884
6d5786a3 885 xid = get_xid();
0d424ad0 886 if (tcon->unix_ext)
f87d39d9 887 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 888 else
f87d39d9 889 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 890
a7851ce7
OS
891 if (!inode) {
892 inode = ERR_PTR(rc);
893 goto out;
894 }
cc0bad75 895
0ccd4802 896#ifdef CONFIG_CIFS_FSCACHE
d03382ce 897 /* populate tcon->resource_id */
0d424ad0 898 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 899#endif
d03382ce 900
0d424ad0 901 if (rc && tcon->ipc) {
b6b38f70 902 cFYI(1, "ipc connection - fake read inode");
b7ca6928 903 spin_lock(&inode->i_lock);
7f8ed420 904 inode->i_mode |= S_IFDIR;
bfe86848 905 set_nlink(inode, 2);
7f8ed420
SF
906 inode->i_op = &cifs_ipc_inode_ops;
907 inode->i_fop = &simple_dir_operations;
908 inode->i_uid = cifs_sb->mnt_uid;
909 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 910 spin_unlock(&inode->i_lock);
ad661334 911 } else if (rc) {
ce634ab2 912 iget_failed(inode);
a7851ce7 913 inode = ERR_PTR(rc);
7f8ed420
SF
914 }
915
a7851ce7 916out:
6d5786a3 917 /* can not call macro free_xid here since in a void func
ce634ab2
DH
918 * TODO: This is no longer true
919 */
6d5786a3 920 _free_xid(xid);
ce634ab2 921 return inode;
1da177e4
LT
922}
923
ed6875e0 924int
6d5786a3 925cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 926 char *full_path, __u32 dosattr)
388e57b2 927{
388e57b2 928 bool set_time = false;
388e57b2 929 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 930 struct TCP_Server_Info *server;
388e57b2
SF
931 FILE_BASIC_INFO info_buf;
932
1adcb710
SF
933 if (attrs == NULL)
934 return -EINVAL;
935
6bdf6dbd
PS
936 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
937 if (!server->ops->set_file_info)
938 return -ENOSYS;
939
388e57b2
SF
940 if (attrs->ia_valid & ATTR_ATIME) {
941 set_time = true;
942 info_buf.LastAccessTime =
943 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
944 } else
945 info_buf.LastAccessTime = 0;
946
947 if (attrs->ia_valid & ATTR_MTIME) {
948 set_time = true;
949 info_buf.LastWriteTime =
950 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
951 } else
952 info_buf.LastWriteTime = 0;
953
954 /*
955 * Samba throws this field away, but windows may actually use it.
956 * Do not set ctime unless other time stamps are changed explicitly
957 * (i.e. by utimes()) since we would then have a mix of client and
958 * server times.
959 */
960 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
b6b38f70 961 cFYI(1, "CIFS - CTIME changed");
388e57b2
SF
962 info_buf.ChangeTime =
963 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
964 } else
965 info_buf.ChangeTime = 0;
966
967 info_buf.CreationTime = 0; /* don't change */
968 info_buf.Attributes = cpu_to_le32(dosattr);
969
6bdf6dbd 970 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
971}
972
a12a1ac7 973/*
ed6875e0 974 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
975 * and rename it to a random name that hopefully won't conflict with
976 * anything else.
977 */
ed6875e0
PS
978int
979cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
980 const unsigned int xid)
a12a1ac7
JL
981{
982 int oplock = 0;
983 int rc;
984 __u16 netfid;
3270958b 985 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
986 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
987 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 988 struct tcon_link *tlink;
96daf2b0 989 struct cifs_tcon *tcon;
3270958b
SF
990 __u32 dosattr, origattr;
991 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 992
7ffec372
JL
993 tlink = cifs_sb_tlink(cifs_sb);
994 if (IS_ERR(tlink))
995 return PTR_ERR(tlink);
996 tcon = tlink_tcon(tlink);
997
c483a984
SP
998 /*
999 * We cannot rename the file if the server doesn't support
1000 * CAP_INFOLEVEL_PASSTHRU
1001 */
1002 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1003 rc = -EBUSY;
1004 goto out;
1005 }
1006
a12a1ac7 1007 rc = CIFSSMBOpen(xid, tcon, full_path, FILE_OPEN,
dd1db2de 1008 DELETE|FILE_WRITE_ATTRIBUTES, CREATE_NOT_DIR,
a12a1ac7
JL
1009 &netfid, &oplock, NULL, cifs_sb->local_nls,
1010 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1011 if (rc != 0)
1012 goto out;
1013
3270958b
SF
1014 origattr = cifsInode->cifsAttrs;
1015 if (origattr == 0)
1016 origattr |= ATTR_NORMAL;
1017
1018 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1019 if (dosattr == 0)
1020 dosattr |= ATTR_NORMAL;
1021 dosattr |= ATTR_HIDDEN;
1022
3270958b
SF
1023 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1024 if (dosattr != origattr) {
1025 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1026 if (info_buf == NULL) {
1027 rc = -ENOMEM;
1028 goto out_close;
1029 }
1030 info_buf->Attributes = cpu_to_le32(dosattr);
1031 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1032 current->tgid);
1033 /* although we would like to mark the file hidden
1034 if that fails we will still try to rename it */
72d282dc 1035 if (!rc)
3270958b
SF
1036 cifsInode->cifsAttrs = dosattr;
1037 else
1038 dosattr = origattr; /* since not able to change them */
a12a1ac7 1039 }
a12a1ac7 1040
dd1db2de
JL
1041 /* rename the file */
1042 rc = CIFSSMBRenameOpenFile(xid, tcon, netfid, NULL, cifs_sb->local_nls,
a12a1ac7
JL
1043 cifs_sb->mnt_cifs_flags &
1044 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b 1045 if (rc != 0) {
47c78f4a 1046 rc = -EBUSY;
3270958b
SF
1047 goto undo_setattr;
1048 }
6d22f098 1049
3270958b
SF
1050 /* try to set DELETE_ON_CLOSE */
1051 if (!cifsInode->delete_pending) {
1052 rc = CIFSSMBSetFileDisposition(xid, tcon, true, netfid,
1053 current->tgid);
1054 /*
1055 * some samba versions return -ENOENT when we try to set the
1056 * file disposition here. Likely a samba bug, but work around
1057 * it for now. This means that some cifsXXX files may hang
1058 * around after they shouldn't.
1059 *
1060 * BB: remove this hack after more servers have the fix
1061 */
1062 if (rc == -ENOENT)
1063 rc = 0;
1064 else if (rc != 0) {
47c78f4a 1065 rc = -EBUSY;
3270958b
SF
1066 goto undo_rename;
1067 }
1068 cifsInode->delete_pending = true;
1069 }
7ce86d5a 1070
a12a1ac7
JL
1071out_close:
1072 CIFSSMBClose(xid, tcon, netfid);
1073out:
3270958b 1074 kfree(info_buf);
7ffec372 1075 cifs_put_tlink(tlink);
a12a1ac7 1076 return rc;
3270958b
SF
1077
1078 /*
1079 * reset everything back to the original state. Don't bother
1080 * dealing with errors here since we can't do anything about
1081 * them anyway.
1082 */
1083undo_rename:
1084 CIFSSMBRenameOpenFile(xid, tcon, netfid, dentry->d_name.name,
1085 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1086 CIFS_MOUNT_MAP_SPECIAL_CHR);
1087undo_setattr:
1088 if (dosattr != origattr) {
1089 info_buf->Attributes = cpu_to_le32(origattr);
1090 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1091 current->tgid))
1092 cifsInode->cifsAttrs = origattr;
1093 }
1094
1095 goto out_close;
a12a1ac7
JL
1096}
1097
b7ca6928
SF
1098/* copied from fs/nfs/dir.c with small changes */
1099static void
1100cifs_drop_nlink(struct inode *inode)
1101{
1102 spin_lock(&inode->i_lock);
1103 if (inode->i_nlink > 0)
1104 drop_nlink(inode);
1105 spin_unlock(&inode->i_lock);
1106}
ff694527
SF
1107
1108/*
1109 * If dentry->d_inode is null (usually meaning the cached dentry
1110 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1111 * if that fails we can not attempt the fall back mechanisms on EACCESS
1112 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1113 * unlink on negative dentries currently.
1114 */
5f0319a7 1115int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1116{
1117 int rc = 0;
6d5786a3 1118 unsigned int xid;
1da177e4 1119 char *full_path = NULL;
5f0319a7 1120 struct inode *inode = dentry->d_inode;
ff694527 1121 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1122 struct super_block *sb = dir->i_sb;
1123 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1124 struct tcon_link *tlink;
96daf2b0 1125 struct cifs_tcon *tcon;
ed6875e0 1126 struct TCP_Server_Info *server;
6050247d
SF
1127 struct iattr *attrs = NULL;
1128 __u32 dosattr = 0, origattr = 0;
1da177e4 1129
b6b38f70 1130 cFYI(1, "cifs_unlink, dir=0x%p, dentry=0x%p", dir, dentry);
1da177e4 1131
7ffec372
JL
1132 tlink = cifs_sb_tlink(cifs_sb);
1133 if (IS_ERR(tlink))
1134 return PTR_ERR(tlink);
1135 tcon = tlink_tcon(tlink);
ed6875e0 1136 server = tcon->ses->server;
7ffec372 1137
6d5786a3 1138 xid = get_xid();
1da177e4 1139
5f0319a7
JL
1140 /* Unlink can be called from rename so we can not take the
1141 * sb->s_vfs_rename_mutex here */
1142 full_path = build_path_from_dentry(dentry);
1da177e4 1143 if (full_path == NULL) {
0f3bc09e 1144 rc = -ENOMEM;
7ffec372 1145 goto unlink_out;
1da177e4 1146 }
2d785a50 1147
29e20f9c
PS
1148 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1149 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1150 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1151 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1152 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1153 cFYI(1, "posix del rc %d", rc);
2d785a50
SF
1154 if ((rc == 0) || (rc == -ENOENT))
1155 goto psx_del_no_retry;
1156 }
1da177e4 1157
6050247d 1158retry_std_delete:
ed6875e0
PS
1159 if (!server->ops->unlink) {
1160 rc = -ENOSYS;
1161 goto psx_del_no_retry;
1162 }
1163
1164 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1165
2d785a50 1166psx_del_no_retry:
1da177e4 1167 if (!rc) {
5f0319a7 1168 if (inode)
b7ca6928 1169 cifs_drop_nlink(inode);
1da177e4 1170 } else if (rc == -ENOENT) {
5f0319a7 1171 d_drop(dentry);
47c78f4a 1172 } else if (rc == -EBUSY) {
ed6875e0
PS
1173 if (server->ops->rename_pending_delete) {
1174 rc = server->ops->rename_pending_delete(full_path,
1175 dentry, xid);
1176 if (rc == 0)
1177 cifs_drop_nlink(inode);
1178 }
ff694527 1179 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1180 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1181 if (attrs == NULL) {
1182 rc = -ENOMEM;
1183 goto out_reval;
1da177e4 1184 }
388e57b2
SF
1185
1186 /* try to reset dos attributes */
ff694527
SF
1187 cifs_inode = CIFS_I(inode);
1188 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1189 if (origattr == 0)
1190 origattr |= ATTR_NORMAL;
1191 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1192 if (dosattr == 0)
1193 dosattr |= ATTR_NORMAL;
1194 dosattr |= ATTR_HIDDEN;
1195
1196 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1197 if (rc != 0)
1198 goto out_reval;
6050247d
SF
1199
1200 goto retry_std_delete;
1da177e4 1201 }
6050247d
SF
1202
1203 /* undo the setattr if we errored out and it's needed */
1204 if (rc != 0 && dosattr != 0)
1205 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1206
388e57b2 1207out_reval:
4523cc30 1208 if (inode) {
ff694527
SF
1209 cifs_inode = CIFS_I(inode);
1210 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1211 when needed */
1212 inode->i_ctime = current_fs_time(sb);
06bcfedd 1213 }
5f0319a7 1214 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1215 cifs_inode = CIFS_I(dir);
6050247d 1216 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1217unlink_out:
1da177e4 1218 kfree(full_path);
6050247d 1219 kfree(attrs);
6d5786a3 1220 free_xid(xid);
7ffec372 1221 cifs_put_tlink(tlink);
1da177e4
LT
1222 return rc;
1223}
1224
ff691e96 1225static int
101b92d9 1226cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1227 const char *full_path, struct cifs_sb_info *cifs_sb,
1228 struct cifs_tcon *tcon, const unsigned int xid)
1229{
1230 int rc = 0;
101b92d9 1231 struct inode *inode = NULL;
ff691e96
PS
1232
1233 if (tcon->unix_ext)
101b92d9 1234 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1235 xid);
1236 else
101b92d9
JL
1237 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1238 xid, NULL);
1239
ff691e96
PS
1240 if (rc)
1241 return rc;
1242
ff691e96
PS
1243 /*
1244 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1245 * from the server or was set bogus. Also, since this is a brand new
1246 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1247 */
101b92d9
JL
1248 if (inode->i_nlink < 2)
1249 set_nlink(inode, 2);
ff691e96
PS
1250 mode &= ~current_umask();
1251 /* must turn on setgid bit if parent dir has it */
101b92d9 1252 if (parent->i_mode & S_ISGID)
ff691e96
PS
1253 mode |= S_ISGID;
1254
1255 if (tcon->unix_ext) {
1256 struct cifs_unix_set_info_args args = {
1257 .mode = mode,
1258 .ctime = NO_CHANGE_64,
1259 .atime = NO_CHANGE_64,
1260 .mtime = NO_CHANGE_64,
1261 .device = 0,
1262 };
1263 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1264 args.uid = current_fsuid();
101b92d9 1265 if (parent->i_mode & S_ISGID)
49418b2c 1266 args.gid = parent->i_gid;
ff691e96 1267 else
49418b2c 1268 args.gid = current_fsgid();
ff691e96 1269 } else {
49418b2c
EB
1270 args.uid = INVALID_UID; /* no change */
1271 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1272 }
1273 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1274 cifs_sb->local_nls,
1275 cifs_sb->mnt_cifs_flags &
1276 CIFS_MOUNT_MAP_SPECIAL_CHR);
1277 } else {
f436720e 1278 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1279 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1280 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1281 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1282 tcon, xid);
101b92d9
JL
1283 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1284 inode->i_mode = (mode | S_IFDIR);
1285
1286 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1287 inode->i_uid = current_fsuid();
1288 if (inode->i_mode & S_ISGID)
1289 inode->i_gid = parent->i_gid;
1290 else
1291 inode->i_gid = current_fsgid();
ff691e96
PS
1292 }
1293 }
101b92d9 1294 d_instantiate(dentry, inode);
ff691e96
PS
1295 return rc;
1296}
1297
1298static int
1299cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1300 const char *full_path, struct cifs_sb_info *cifs_sb,
1301 struct cifs_tcon *tcon, const unsigned int xid)
1302{
1303 int rc = 0;
1304 u32 oplock = 0;
1305 FILE_UNIX_BASIC_INFO *info = NULL;
1306 struct inode *newinode = NULL;
1307 struct cifs_fattr fattr;
1308
1309 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1310 if (info == NULL) {
1311 rc = -ENOMEM;
1312 goto posix_mkdir_out;
1313 }
1314
1315 mode &= ~current_umask();
1316 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1317 NULL /* netfid */, info, &oplock, full_path,
1318 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1319 CIFS_MOUNT_MAP_SPECIAL_CHR);
1320 if (rc == -EOPNOTSUPP)
1321 goto posix_mkdir_out;
1322 else if (rc) {
1323 cFYI(1, "posix mkdir returned 0x%x", rc);
1324 d_drop(dentry);
1325 goto posix_mkdir_out;
1326 }
1327
1328 if (info->Type == cpu_to_le32(-1))
1329 /* no return info, go query for it */
1330 goto posix_mkdir_get_info;
1331 /*
1332 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1333 * need to set uid/gid.
1334 */
1335
1336 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1337 cifs_fill_uniqueid(inode->i_sb, &fattr);
1338 newinode = cifs_iget(inode->i_sb, &fattr);
1339 if (!newinode)
1340 goto posix_mkdir_get_info;
1341
1342 d_instantiate(dentry, newinode);
1343
1344#ifdef CONFIG_CIFS_DEBUG2
1345 cFYI(1, "instantiated dentry %p %s to inode %p", dentry,
1346 dentry->d_name.name, newinode);
1347
1348 if (newinode->i_nlink != 2)
1349 cFYI(1, "unexpected number of links %d", newinode->i_nlink);
1350#endif
1351
1352posix_mkdir_out:
1353 kfree(info);
1354 return rc;
1355posix_mkdir_get_info:
1356 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1357 xid);
1358 goto posix_mkdir_out;
1359}
1360
18bb1db3 1361int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1362{
ff691e96 1363 int rc = 0;
6d5786a3 1364 unsigned int xid;
1da177e4 1365 struct cifs_sb_info *cifs_sb;
7ffec372 1366 struct tcon_link *tlink;
29e20f9c 1367 struct cifs_tcon *tcon;
f436720e 1368 struct TCP_Server_Info *server;
ff691e96 1369 char *full_path;
1da177e4 1370
18bb1db3 1371 cFYI(1, "In cifs_mkdir, mode = 0x%hx inode = 0x%p", mode, inode);
1da177e4 1372
1da177e4 1373 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1374 tlink = cifs_sb_tlink(cifs_sb);
1375 if (IS_ERR(tlink))
1376 return PTR_ERR(tlink);
29e20f9c 1377 tcon = tlink_tcon(tlink);
7ffec372 1378
6d5786a3 1379 xid = get_xid();
1da177e4 1380
7f57356b 1381 full_path = build_path_from_dentry(direntry);
1da177e4 1382 if (full_path == NULL) {
0f3bc09e 1383 rc = -ENOMEM;
7ffec372 1384 goto mkdir_out;
1da177e4 1385 }
50c2f753 1386
29e20f9c
PS
1387 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1388 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1389 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1390 tcon, xid);
1391 if (rc != -EOPNOTSUPP)
2dd29d31 1392 goto mkdir_out;
fb8c4b14 1393 }
ff691e96 1394
f436720e
PS
1395 server = tcon->ses->server;
1396
1397 if (!server->ops->mkdir) {
1398 rc = -ENOSYS;
1399 goto mkdir_out;
1400 }
1401
1da177e4 1402 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1403 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1404 if (rc) {
b6b38f70 1405 cFYI(1, "cifs_mkdir returned 0x%x", rc);
1da177e4 1406 d_drop(direntry);
ff691e96 1407 goto mkdir_out;
1da177e4 1408 }
ff691e96
PS
1409
1410 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1411 xid);
fb8c4b14 1412mkdir_out:
6de2ce42
PS
1413 /*
1414 * Force revalidate to get parent dir info when needed since cached
1415 * attributes are invalid now.
1416 */
1417 CIFS_I(inode)->time = 0;
1da177e4 1418 kfree(full_path);
6d5786a3 1419 free_xid(xid);
7ffec372 1420 cifs_put_tlink(tlink);
1da177e4
LT
1421 return rc;
1422}
1423
1424int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1425{
1426 int rc = 0;
6d5786a3 1427 unsigned int xid;
1da177e4 1428 struct cifs_sb_info *cifs_sb;
7ffec372 1429 struct tcon_link *tlink;
f958ca5d
PS
1430 struct cifs_tcon *tcon;
1431 struct TCP_Server_Info *server;
1da177e4
LT
1432 char *full_path = NULL;
1433 struct cifsInodeInfo *cifsInode;
1434
b6b38f70 1435 cFYI(1, "cifs_rmdir, inode = 0x%p", inode);
1da177e4 1436
6d5786a3 1437 xid = get_xid();
1da177e4 1438
7f57356b 1439 full_path = build_path_from_dentry(direntry);
1da177e4 1440 if (full_path == NULL) {
0f3bc09e 1441 rc = -ENOMEM;
7ffec372 1442 goto rmdir_exit;
1da177e4
LT
1443 }
1444
7ffec372
JL
1445 cifs_sb = CIFS_SB(inode->i_sb);
1446 tlink = cifs_sb_tlink(cifs_sb);
1447 if (IS_ERR(tlink)) {
1448 rc = PTR_ERR(tlink);
1449 goto rmdir_exit;
1450 }
f958ca5d
PS
1451 tcon = tlink_tcon(tlink);
1452 server = tcon->ses->server;
1453
1454 if (!server->ops->rmdir) {
1455 rc = -ENOSYS;
1456 cifs_put_tlink(tlink);
1457 goto rmdir_exit;
1458 }
7ffec372 1459
f958ca5d 1460 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1461 cifs_put_tlink(tlink);
1da177e4
LT
1462
1463 if (!rc) {
3677db10 1464 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1465 i_size_write(direntry->d_inode, 0);
ce71ec36 1466 clear_nlink(direntry->d_inode);
3677db10 1467 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1468 }
1469
1470 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1471 /* force revalidate to go get info when needed */
1472 cifsInode->time = 0;
42c24544
SF
1473
1474 cifsInode = CIFS_I(inode);
6de2ce42
PS
1475 /*
1476 * Force revalidate to get parent dir info when needed since cached
1477 * attributes are invalid now.
1478 */
1479 cifsInode->time = 0;
42c24544 1480
1da177e4
LT
1481 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1482 current_fs_time(inode->i_sb);
1483
7ffec372 1484rmdir_exit:
1da177e4 1485 kfree(full_path);
6d5786a3 1486 free_xid(xid);
1da177e4
LT
1487 return rc;
1488}
1489
ee2fd967 1490static int
8ceb9843
PS
1491cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1492 const char *from_path, struct dentry *to_dentry,
1493 const char *to_path)
ee2fd967
SF
1494{
1495 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1496 struct tcon_link *tlink;
8ceb9843
PS
1497 struct cifs_tcon *tcon;
1498 struct TCP_Server_Info *server;
ee2fd967
SF
1499 __u16 srcfid;
1500 int oplock, rc;
1501
7ffec372
JL
1502 tlink = cifs_sb_tlink(cifs_sb);
1503 if (IS_ERR(tlink))
1504 return PTR_ERR(tlink);
8ceb9843
PS
1505 tcon = tlink_tcon(tlink);
1506 server = tcon->ses->server;
1507
1508 if (!server->ops->rename)
1509 return -ENOSYS;
7ffec372 1510
ee2fd967 1511 /* try path-based rename first */
8ceb9843 1512 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1513
1514 /*
8ceb9843
PS
1515 * Don't bother with rename by filehandle unless file is busy and
1516 * source. Note that cross directory moves do not work with
ee2fd967
SF
1517 * rename by filehandle to various Windows servers.
1518 */
47c78f4a 1519 if (rc == 0 || rc != -EBUSY)
7ffec372 1520 goto do_rename_exit;
ee2fd967 1521
ed0e3ace
JL
1522 /* open-file renames don't work across directories */
1523 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1524 goto do_rename_exit;
ed0e3ace 1525
ee2fd967 1526 /* open the file to be renamed -- we need DELETE perms */
8ceb9843 1527 rc = CIFSSMBOpen(xid, tcon, from_path, FILE_OPEN, DELETE,
ee2fd967
SF
1528 CREATE_NOT_DIR, &srcfid, &oplock, NULL,
1529 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1530 CIFS_MOUNT_MAP_SPECIAL_CHR);
ee2fd967 1531 if (rc == 0) {
8ceb9843 1532 rc = CIFSSMBRenameOpenFile(xid, tcon, srcfid,
ee2fd967
SF
1533 (const char *) to_dentry->d_name.name,
1534 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1535 CIFS_MOUNT_MAP_SPECIAL_CHR);
8ceb9843 1536 CIFSSMBClose(xid, tcon, srcfid);
ee2fd967 1537 }
7ffec372
JL
1538do_rename_exit:
1539 cifs_put_tlink(tlink);
ee2fd967
SF
1540 return rc;
1541}
1542
8ceb9843
PS
1543int
1544cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1545 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1546{
8ceb9843
PS
1547 char *from_name = NULL;
1548 char *to_name = NULL;
639e7a91 1549 struct cifs_sb_info *cifs_sb;
7ffec372 1550 struct tcon_link *tlink;
96daf2b0 1551 struct cifs_tcon *tcon;
ee2fd967
SF
1552 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1553 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1554 unsigned int xid;
1555 int rc, tmprc;
1da177e4 1556
639e7a91 1557 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1558 tlink = cifs_sb_tlink(cifs_sb);
1559 if (IS_ERR(tlink))
1560 return PTR_ERR(tlink);
1561 tcon = tlink_tcon(tlink);
1da177e4 1562
6d5786a3 1563 xid = get_xid();
ee2fd967 1564
ee2fd967
SF
1565 /*
1566 * we already have the rename sem so we do not need to
1567 * grab it again here to protect the path integrity
1568 */
8ceb9843
PS
1569 from_name = build_path_from_dentry(source_dentry);
1570 if (from_name == NULL) {
ee2fd967
SF
1571 rc = -ENOMEM;
1572 goto cifs_rename_exit;
1573 }
1574
8ceb9843
PS
1575 to_name = build_path_from_dentry(target_dentry);
1576 if (to_name == NULL) {
1da177e4
LT
1577 rc = -ENOMEM;
1578 goto cifs_rename_exit;
1579 }
1580
8ceb9843
PS
1581 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1582 to_name);
ee2fd967 1583
14121bdc
JL
1584 if (rc == -EEXIST && tcon->unix_ext) {
1585 /*
8ceb9843
PS
1586 * Are src and dst hardlinks of same inode? We can only tell
1587 * with unix extensions enabled.
14121bdc
JL
1588 */
1589 info_buf_source =
1590 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1591 GFP_KERNEL);
1592 if (info_buf_source == NULL) {
1593 rc = -ENOMEM;
1594 goto cifs_rename_exit;
1595 }
1596
1597 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1598 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1599 info_buf_source,
1600 cifs_sb->local_nls,
1601 cifs_sb->mnt_cifs_flags &
1602 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1603 if (tmprc != 0)
14121bdc 1604 goto unlink_target;
ee2fd967 1605
8ceb9843
PS
1606 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1607 info_buf_target,
1608 cifs_sb->local_nls,
1609 cifs_sb->mnt_cifs_flags &
1610 CIFS_MOUNT_MAP_SPECIAL_CHR);
14121bdc 1611
8d281efb 1612 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1613 info_buf_target->UniqueId)) {
14121bdc 1614 /* same file, POSIX says that this is a noop */
ae6884a9 1615 rc = 0;
14121bdc 1616 goto cifs_rename_exit;
ae6884a9 1617 }
8ceb9843
PS
1618 }
1619 /*
1620 * else ... BB we could add the same check for Windows by
1621 * checking the UniqueId via FILE_INTERNAL_INFO
1622 */
14121bdc 1623
ee2fd967 1624unlink_target:
fc6f3943
JL
1625 /* Try unlinking the target dentry if it's not negative */
1626 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1627 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1628 if (tmprc)
1629 goto cifs_rename_exit;
8ceb9843
PS
1630 rc = cifs_do_rename(xid, source_dentry, from_name,
1631 target_dentry, to_name);
1da177e4
LT
1632 }
1633
1634cifs_rename_exit:
ee2fd967 1635 kfree(info_buf_source);
8ceb9843
PS
1636 kfree(from_name);
1637 kfree(to_name);
6d5786a3 1638 free_xid(xid);
7ffec372 1639 cifs_put_tlink(tlink);
1da177e4
LT
1640 return rc;
1641}
1642
df2cf170
JL
1643static bool
1644cifs_inode_needs_reval(struct inode *inode)
1da177e4 1645{
df2cf170 1646 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1647 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1648
df2cf170
JL
1649 if (cifs_i->clientCanCacheRead)
1650 return false;
1da177e4 1651
df2cf170
JL
1652 if (!lookupCacheEnabled)
1653 return true;
1da177e4 1654
df2cf170
JL
1655 if (cifs_i->time == 0)
1656 return true;
1da177e4 1657
6d20e840
SJ
1658 if (!time_in_range(jiffies, cifs_i->time,
1659 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1660 return true;
1661
db19272e 1662 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1663 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1664 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1665 return true;
1666
df2cf170
JL
1667 return false;
1668}
1669
523fb8c8
SJ
1670/*
1671 * Zap the cache. Called when invalid_mapping flag is set.
1672 */
6feb9891 1673int
df2cf170
JL
1674cifs_invalidate_mapping(struct inode *inode)
1675{
6feb9891 1676 int rc = 0;
df2cf170
JL
1677 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1678
1679 cifs_i->invalid_mapping = false;
1680
df2cf170 1681 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1682 rc = invalidate_inode_pages2(inode->i_mapping);
1683 if (rc) {
1684 cERROR(1, "%s: could not invalidate inode %p", __func__,
1685 inode);
1686 cifs_i->invalid_mapping = true;
1687 }
df2cf170 1688 }
257fb1f1 1689
9451a9a5 1690 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1691 return rc;
df2cf170
JL
1692}
1693
6feb9891 1694int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1695{
1696 int rc = 0;
496ad9aa 1697 struct inode *inode = file_inode(filp);
ba00ba64 1698 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1699
1700 if (!cifs_inode_needs_reval(inode))
6feb9891 1701 return rc;
abab095d 1702
13cfb733 1703 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1704 rc = cifs_get_file_info_unix(filp);
1705 else
1706 rc = cifs_get_file_info(filp);
1707
abab095d
JL
1708 return rc;
1709}
1710
6feb9891 1711int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1712{
6d5786a3 1713 unsigned int xid;
df2cf170 1714 int rc = 0;
df2cf170
JL
1715 struct inode *inode = dentry->d_inode;
1716 struct super_block *sb = dentry->d_sb;
6feb9891 1717 char *full_path = NULL;
df2cf170
JL
1718
1719 if (inode == NULL)
1720 return -ENOENT;
1da177e4 1721
df2cf170 1722 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1723 return rc;
1724
6d5786a3 1725 xid = get_xid();
1da177e4
LT
1726
1727 /* can not safely grab the rename sem here if rename calls revalidate
1728 since that would deadlock */
df2cf170 1729 full_path = build_path_from_dentry(dentry);
1da177e4 1730 if (full_path == NULL) {
0f3bc09e 1731 rc = -ENOMEM;
6feb9891 1732 goto out;
1da177e4
LT
1733 }
1734
6feb9891
PS
1735 cFYI(1, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time "
1736 "%ld jiffies %ld", full_path, inode, inode->i_count.counter,
f19159dc 1737 dentry, dentry->d_time, jiffies);
1da177e4 1738
0d424ad0 1739 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1740 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1741 else
1742 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1743 xid, NULL);
1da177e4 1744
6feb9891 1745out:
1da177e4 1746 kfree(full_path);
6d5786a3 1747 free_xid(xid);
1da177e4
LT
1748 return rc;
1749}
1750
6feb9891
PS
1751int cifs_revalidate_file(struct file *filp)
1752{
1753 int rc;
496ad9aa 1754 struct inode *inode = file_inode(filp);
6feb9891
PS
1755
1756 rc = cifs_revalidate_file_attr(filp);
1757 if (rc)
1758 return rc;
1759
1760 if (CIFS_I(inode)->invalid_mapping)
1761 rc = cifs_invalidate_mapping(inode);
1762 return rc;
1763}
1764
1765/* revalidate a dentry's inode attributes */
1766int cifs_revalidate_dentry(struct dentry *dentry)
1767{
1768 int rc;
1769 struct inode *inode = dentry->d_inode;
1770
1771 rc = cifs_revalidate_dentry_attr(dentry);
1772 if (rc)
1773 return rc;
1774
1775 if (CIFS_I(inode)->invalid_mapping)
1776 rc = cifs_invalidate_mapping(inode);
1777 return rc;
1778}
1779
1da177e4 1780int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1781 struct kstat *stat)
1da177e4 1782{
3aa1c8c2 1783 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1784 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1785 struct inode *inode = dentry->d_inode;
1786 int rc;
3aa1c8c2 1787
6feb9891
PS
1788 /*
1789 * We need to be sure that all dirty pages are written and the server
1790 * has actual ctime, mtime and file length.
1791 */
1792 if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping &&
1793 inode->i_mapping->nrpages != 0) {
1794 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1795 if (rc) {
1796 mapping_set_error(inode->i_mapping, rc);
1797 return rc;
1798 }
6feb9891 1799 }
1c456013 1800
6feb9891
PS
1801 rc = cifs_revalidate_dentry_attr(dentry);
1802 if (rc)
1803 return rc;
1804
1805 generic_fillattr(inode, stat);
1806 stat->blksize = CIFS_MAX_MSGSIZE;
1807 stat->ino = CIFS_I(inode)->uniqueid;
1808
1809 /*
d3d1fce1
JL
1810 * If on a multiuser mount without unix extensions or cifsacl being
1811 * enabled, and the admin hasn't overridden them, set the ownership
1812 * to the fsuid/fsgid of the current process.
6feb9891
PS
1813 */
1814 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1815 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1816 !tcon->unix_ext) {
1817 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1818 stat->uid = current_fsuid();
1819 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1820 stat->gid = current_fsgid();
5fe14c85 1821 }
6feb9891 1822 return rc;
1da177e4
LT
1823}
1824
1825static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1826{
1827 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1828 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1829 struct page *page;
1da177e4
LT
1830 int rc = 0;
1831
1832 page = grab_cache_page(mapping, index);
1833 if (!page)
1834 return -ENOMEM;
1835
eebd2aa3 1836 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1837 unlock_page(page);
1838 page_cache_release(page);
1839 return rc;
1840}
1841
1b947463 1842static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1843{
c08d3b0e 1844 loff_t oldsize;
3677db10 1845
ba6a46a0 1846 spin_lock(&inode->i_lock);
c08d3b0e 1847 oldsize = inode->i_size;
3677db10 1848 i_size_write(inode, offset);
ba6a46a0 1849 spin_unlock(&inode->i_lock);
1b947463 1850
c08d3b0e 1851 truncate_pagecache(inode, oldsize, offset);
3677db10
SF
1852}
1853
8efdbde6
JL
1854static int
1855cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1856 unsigned int xid, char *full_path)
8efdbde6
JL
1857{
1858 int rc;
1859 struct cifsFileInfo *open_file;
1860 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1861 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1862 struct tcon_link *tlink = NULL;
d1433418
PS
1863 struct cifs_tcon *tcon = NULL;
1864 struct TCP_Server_Info *server;
fa2989f4 1865 struct cifs_io_parms io_parms;
8efdbde6
JL
1866
1867 /*
1868 * To avoid spurious oplock breaks from server, in the case of
1869 * inodes that we already have open, avoid doing path based
1870 * setting of file size if we can do it by handle.
1871 * This keeps our caching token (oplock) and avoids timeouts
1872 * when the local oplock break takes longer to flush
1873 * writebehind data than the SMB timeout for the SetPathInfo
1874 * request would allow
1875 */
6508d904 1876 open_file = find_writable_file(cifsInode, true);
8efdbde6 1877 if (open_file) {
d1433418
PS
1878 tcon = tlink_tcon(open_file->tlink);
1879 server = tcon->ses->server;
1880 if (server->ops->set_file_size)
1881 rc = server->ops->set_file_size(xid, tcon, open_file,
1882 attrs->ia_size, false);
1883 else
1884 rc = -ENOSYS;
6ab409b5 1885 cifsFileInfo_put(open_file);
b6b38f70 1886 cFYI(1, "SetFSize for attrs rc = %d", rc);
8efdbde6
JL
1887 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1888 unsigned int bytes_written;
fa2989f4 1889
d1433418
PS
1890 io_parms.netfid = open_file->fid.netfid;
1891 io_parms.pid = open_file->pid;
1892 io_parms.tcon = tcon;
fa2989f4
PS
1893 io_parms.offset = 0;
1894 io_parms.length = attrs->ia_size;
1895 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1896 NULL, NULL, 1);
b6b38f70 1897 cFYI(1, "Wrt seteof rc %d", rc);
8efdbde6
JL
1898 }
1899 } else
1900 rc = -EINVAL;
1901
d1433418
PS
1902 if (!rc)
1903 goto set_size_out;
1904
1905 if (tcon == NULL) {
1906 tlink = cifs_sb_tlink(cifs_sb);
1907 if (IS_ERR(tlink))
1908 return PTR_ERR(tlink);
1909 tcon = tlink_tcon(tlink);
1910 server = tcon->ses->server;
1911 }
ba00ba64 1912
d1433418
PS
1913 /*
1914 * Set file size by pathname rather than by handle either because no
1915 * valid, writeable file handle for it was found or because there was
1916 * an error setting it by handle.
1917 */
1918 if (server->ops->set_path_size)
1919 rc = server->ops->set_path_size(xid, tcon, full_path,
1920 attrs->ia_size, cifs_sb, false);
1921 else
1922 rc = -ENOSYS;
1923 cFYI(1, "SetEOF by path (setattrs) rc = %d", rc);
1924 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1925 __u16 netfid;
1926 int oplock = 0;
1927
1928 rc = SMBLegacyOpen(xid, tcon, full_path, FILE_OPEN,
1929 GENERIC_WRITE, CREATE_NOT_DIR, &netfid,
1930 &oplock, NULL, cifs_sb->local_nls,
8efdbde6 1931 cifs_sb->mnt_cifs_flags &
d1433418
PS
1932 CIFS_MOUNT_MAP_SPECIAL_CHR);
1933 if (rc == 0) {
1934 unsigned int bytes_written;
1935
1936 io_parms.netfid = netfid;
1937 io_parms.pid = current->tgid;
1938 io_parms.tcon = tcon;
1939 io_parms.offset = 0;
1940 io_parms.length = attrs->ia_size;
1941 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written, NULL,
1942 NULL, 1);
1943 cFYI(1, "wrt seteof rc %d", rc);
1944 CIFSSMBClose(xid, tcon, netfid);
8efdbde6
JL
1945 }
1946 }
d1433418
PS
1947 if (tlink)
1948 cifs_put_tlink(tlink);
8efdbde6 1949
d1433418 1950set_size_out:
8efdbde6 1951 if (rc == 0) {
fbec9ab9 1952 cifsInode->server_eof = attrs->ia_size;
1b947463 1953 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
1954 cifs_truncate_page(inode->i_mapping, inode->i_size);
1955 }
1956
1957 return rc;
1958}
1959
3fe5c1dd
JL
1960static int
1961cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
1962{
1963 int rc;
6d5786a3 1964 unsigned int xid;
3fe5c1dd
JL
1965 char *full_path = NULL;
1966 struct inode *inode = direntry->d_inode;
1967 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1968 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1969 struct tcon_link *tlink;
96daf2b0 1970 struct cifs_tcon *pTcon;
3fe5c1dd 1971 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 1972 struct cifsFileInfo *open_file;
3fe5c1dd 1973
b6b38f70
JP
1974 cFYI(1, "setattr_unix on file %s attrs->ia_valid=0x%x",
1975 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 1976
6d5786a3 1977 xid = get_xid();
3fe5c1dd 1978
db78b877
CH
1979 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
1980 attrs->ia_valid |= ATTR_FORCE;
1981
1982 rc = inode_change_ok(inode, attrs);
1983 if (rc < 0)
1984 goto out;
3fe5c1dd
JL
1985
1986 full_path = build_path_from_dentry(direntry);
1987 if (full_path == NULL) {
1988 rc = -ENOMEM;
1989 goto out;
1990 }
1991
0f4d634c
JL
1992 /*
1993 * Attempt to flush data before changing attributes. We need to do
1994 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
1995 * ownership or mode then we may also need to do this. Here, we take
1996 * the safe way out and just do the flush on all setattr requests. If
1997 * the flush returns error, store it to report later and continue.
1998 *
1999 * BB: This should be smarter. Why bother flushing pages that
2000 * will be truncated anyway? Also, should we error out here if
2001 * the flush returns error?
2002 */
2003 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2004 mapping_set_error(inode->i_mapping, rc);
2005 rc = 0;
3fe5c1dd
JL
2006
2007 if (attrs->ia_valid & ATTR_SIZE) {
2008 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2009 if (rc != 0)
2010 goto out;
2011 }
2012
2013 /* skip mode change if it's just for clearing setuid/setgid */
2014 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2015 attrs->ia_valid &= ~ATTR_MODE;
2016
2017 args = kmalloc(sizeof(*args), GFP_KERNEL);
2018 if (args == NULL) {
2019 rc = -ENOMEM;
2020 goto out;
2021 }
2022
2023 /* set up the struct */
2024 if (attrs->ia_valid & ATTR_MODE)
2025 args->mode = attrs->ia_mode;
2026 else
2027 args->mode = NO_CHANGE_64;
2028
2029 if (attrs->ia_valid & ATTR_UID)
2030 args->uid = attrs->ia_uid;
2031 else
49418b2c 2032 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2033
2034 if (attrs->ia_valid & ATTR_GID)
2035 args->gid = attrs->ia_gid;
2036 else
49418b2c 2037 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2038
2039 if (attrs->ia_valid & ATTR_ATIME)
2040 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2041 else
2042 args->atime = NO_CHANGE_64;
2043
2044 if (attrs->ia_valid & ATTR_MTIME)
2045 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2046 else
2047 args->mtime = NO_CHANGE_64;
2048
2049 if (attrs->ia_valid & ATTR_CTIME)
2050 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2051 else
2052 args->ctime = NO_CHANGE_64;
2053
2054 args->device = 0;
6508d904 2055 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2056 if (open_file) {
4b4de76e 2057 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2058 u32 npid = open_file->pid;
13cfb733 2059 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2060 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2061 cifsFileInfo_put(open_file);
3bbeeb3c 2062 } else {
7ffec372
JL
2063 tlink = cifs_sb_tlink(cifs_sb);
2064 if (IS_ERR(tlink)) {
2065 rc = PTR_ERR(tlink);
2066 goto out;
2067 }
2068 pTcon = tlink_tcon(tlink);
3bbeeb3c 2069 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2070 cifs_sb->local_nls,
2071 cifs_sb->mnt_cifs_flags &
2072 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2073 cifs_put_tlink(tlink);
3bbeeb3c 2074 }
3fe5c1dd 2075
1025774c
CH
2076 if (rc)
2077 goto out;
ccd4bb1b 2078
1025774c 2079 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2080 attrs->ia_size != i_size_read(inode))
2081 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2082
2083 setattr_copy(inode, attrs);
2084 mark_inode_dirty(inode);
2085
2086 /* force revalidate when any of these times are set since some
2087 of the fs types (eg ext3, fat) do not have fine enough
2088 time granularity to match protocol, and we do not have a
2089 a way (yet) to query the server fs's time granularity (and
2090 whether it rounds times down).
2091 */
2092 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2093 cifsInode->time = 0;
3fe5c1dd
JL
2094out:
2095 kfree(args);
2096 kfree(full_path);
6d5786a3 2097 free_xid(xid);
3fe5c1dd
JL
2098 return rc;
2099}
2100
0510eeb7
JL
2101static int
2102cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2103{
6d5786a3 2104 unsigned int xid;
8abf2775
EB
2105 kuid_t uid = INVALID_UID;
2106 kgid_t gid = INVALID_GID;
3fe5c1dd
JL
2107 struct inode *inode = direntry->d_inode;
2108 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2109 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2110 char *full_path = NULL;
2111 int rc = -EACCES;
feb3e20c 2112 __u32 dosattr = 0;
4e1e7fb9 2113 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2114
6d5786a3 2115 xid = get_xid();
1da177e4 2116
b6b38f70
JP
2117 cFYI(1, "setattr on file %s attrs->iavalid 0x%x",
2118 direntry->d_name.name, attrs->ia_valid);
6473a559 2119
db78b877
CH
2120 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2121 attrs->ia_valid |= ATTR_FORCE;
2122
2123 rc = inode_change_ok(inode, attrs);
2124 if (rc < 0) {
6d5786a3 2125 free_xid(xid);
db78b877 2126 return rc;
6473a559 2127 }
50c2f753 2128
7f57356b 2129 full_path = build_path_from_dentry(direntry);
1da177e4 2130 if (full_path == NULL) {
0f3bc09e 2131 rc = -ENOMEM;
6d5786a3 2132 free_xid(xid);
0f3bc09e 2133 return rc;
1da177e4 2134 }
1da177e4 2135
0f4d634c
JL
2136 /*
2137 * Attempt to flush data before changing attributes. We need to do
2138 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2139 * ownership or mode then we may also need to do this. Here, we take
2140 * the safe way out and just do the flush on all setattr requests. If
2141 * the flush returns error, store it to report later and continue.
2142 *
2143 * BB: This should be smarter. Why bother flushing pages that
2144 * will be truncated anyway? Also, should we error out here if
2145 * the flush returns error?
2146 */
2147 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2148 mapping_set_error(inode->i_mapping, rc);
2149 rc = 0;
cea21805 2150
50531444 2151 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2152 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2153 if (rc != 0)
e30dcf3a 2154 goto cifs_setattr_exit;
1da177e4 2155 }
4ca691a8 2156
a5ff3769
SP
2157 if (attrs->ia_valid & ATTR_UID)
2158 uid = attrs->ia_uid;
2159
2160 if (attrs->ia_valid & ATTR_GID)
2161 gid = attrs->ia_gid;
2162
2163#ifdef CONFIG_CIFS_ACL
2164 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2165 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2166 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2167 uid, gid);
2168 if (rc) {
2169 cFYI(1, "%s: Setting id failed with error: %d",
2170 __func__, rc);
2171 goto cifs_setattr_exit;
2172 }
2173 }
2174 } else
2175#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2176 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2177 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2178
d32c4f26
JL
2179 /* skip mode change if it's just for clearing setuid/setgid */
2180 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2181 attrs->ia_valid &= ~ATTR_MODE;
2182
1da177e4 2183 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2184 mode = attrs->ia_mode;
cdbce9c8 2185 rc = 0;
79df1bae 2186#ifdef CONFIG_CIFS_ACL
78415d2d 2187 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2188 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2189 INVALID_UID, INVALID_GID);
78415d2d
SP
2190 if (rc) {
2191 cFYI(1, "%s: Setting ACL failed with error: %d",
2192 __func__, rc);
2193 goto cifs_setattr_exit;
2194 }
2195 } else
79df1bae 2196#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2197 if (((mode & S_IWUGO) == 0) &&
2198 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2199
2200 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2201
5132861a
JL
2202 /* fix up mode if we're not using dynperm */
2203 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2204 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2205 } else if ((mode & S_IWUGO) &&
2206 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2207
2208 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2209 /* Attributes of 0 are ignored */
2210 if (dosattr == 0)
2211 dosattr |= ATTR_NORMAL;
5132861a
JL
2212
2213 /* reset local inode permissions to normal */
2214 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2215 attrs->ia_mode &= ~(S_IALLUGO);
2216 if (S_ISDIR(inode->i_mode))
2217 attrs->ia_mode |=
2218 cifs_sb->mnt_dir_mode;
2219 else
2220 attrs->ia_mode |=
2221 cifs_sb->mnt_file_mode;
2222 }
2223 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2224 /* ignore mode change - ATTR_READONLY hasn't changed */
2225 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2226 }
1da177e4
LT
2227 }
2228
feb3e20c
JL
2229 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2230 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2231 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2232 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2233
e30dcf3a
SF
2234 /* Even if error on time set, no sense failing the call if
2235 the server would set the time to a reasonable value anyway,
2236 and this check ensures that we are not being called from
2237 sys_utimes in which case we ought to fail the call back to
2238 the user when the server rejects the call */
fb8c4b14 2239 if ((rc) && (attrs->ia_valid &
feb3e20c 2240 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2241 rc = 0;
1da177e4
LT
2242 }
2243
2244 /* do not need local check to inode_check_ok since the server does
2245 that */
1025774c
CH
2246 if (rc)
2247 goto cifs_setattr_exit;
2248
2249 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2250 attrs->ia_size != i_size_read(inode))
2251 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2252
2253 setattr_copy(inode, attrs);
2254 mark_inode_dirty(inode);
1025774c 2255
e30dcf3a 2256cifs_setattr_exit:
1da177e4 2257 kfree(full_path);
6d5786a3 2258 free_xid(xid);
1da177e4
LT
2259 return rc;
2260}
2261
0510eeb7
JL
2262int
2263cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2264{
2265 struct inode *inode = direntry->d_inode;
2266 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2267 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2268
2269 if (pTcon->unix_ext)
2270 return cifs_setattr_unix(direntry, attrs);
2271
2272 return cifs_setattr_nounix(direntry, attrs);
2273
2274 /* BB: add cifs_setattr_legacy for really old servers */
2275}
2276
99ee4dbd 2277#if 0
1da177e4
LT
2278void cifs_delete_inode(struct inode *inode)
2279{
b6b38f70 2280 cFYI(1, "In cifs_delete_inode, inode = 0x%p", inode);
1da177e4
LT
2281 /* may have to add back in if and when safe distributed caching of
2282 directories added e.g. via FindNotify */
2283}
99ee4dbd 2284#endif