]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - fs/cifs/inode.c
Merge branch 'merge' of git://git.kernel.org/pub/scm/linux/kernel/git/benh/powerpc
[mirror_ubuntu-zesty-kernel.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f19159dc 94 cFYI(1, "%s: revalidating inode %llu", __func__, cifs_i->uniqueid);
df2cf170
JL
95
96 if (inode->i_state & I_NEW) {
f19159dc 97 cFYI(1, "%s: inode %llu is new", __func__, cifs_i->uniqueid);
df2cf170
JL
98 return;
99 }
100
101 /* don't bother with revalidation if we have an oplock */
102 if (cifs_i->clientCanCacheRead) {
f19159dc
SF
103 cFYI(1, "%s: inode %llu is oplocked", __func__,
104 cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* revalidate if mtime or size have changed */
109 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
110 cifs_i->server_eof == fattr->cf_eof) {
f19159dc
SF
111 cFYI(1, "%s: inode %llu is unchanged", __func__,
112 cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
f19159dc
SF
116 cFYI(1, "%s: invalidating inode %llu mapping", __func__,
117 cifs_i->uniqueid);
df2cf170
JL
118 cifs_i->invalid_mapping = true;
119}
120
cc0bad75
JL
121/* populate an inode with info from a cifs_fattr struct */
122void
123cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 124{
cc0bad75 125 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 127
df2cf170
JL
128 cifs_revalidate_cache(inode, fattr);
129
b7ca6928 130 spin_lock(&inode->i_lock);
cc0bad75
JL
131 inode->i_atime = fattr->cf_atime;
132 inode->i_mtime = fattr->cf_mtime;
133 inode->i_ctime = fattr->cf_ctime;
cc0bad75 134 inode->i_rdev = fattr->cf_rdev;
bfe86848 135 set_nlink(inode, fattr->cf_nlink);
cc0bad75
JL
136 inode->i_uid = fattr->cf_uid;
137 inode->i_gid = fattr->cf_gid;
138
0b8f18e3
JL
139 /* if dynperm is set, don't clobber existing mode */
140 if (inode->i_state & I_NEW ||
141 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
142 inode->i_mode = fattr->cf_mode;
143
cc0bad75 144 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 145
0b8f18e3
JL
146 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
147 cifs_i->time = 0;
148 else
149 cifs_i->time = jiffies;
150
0b8f18e3 151 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 152
835a36ca 153 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
154 /*
155 * Can't safely change the file size here if the client is writing to
156 * it due to potential races.
157 */
cc0bad75
JL
158 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
159 i_size_write(inode, fattr->cf_eof);
160
161 /*
162 * i_blocks is not related to (i_size / i_blksize),
163 * but instead 512 byte (2**9) size is required for
164 * calculating num blocks.
165 */
166 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
167 }
168 spin_unlock(&inode->i_lock);
169
01c64fea
DH
170 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
171 inode->i_flags |= S_AUTOMOUNT;
172 cifs_set_ops(inode);
cc0bad75
JL
173}
174
4065c802
JL
175void
176cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
177{
178 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
179
180 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
181 return;
182
183 fattr->cf_uniqueid = iunique(sb, ROOT_I);
184}
185
cc0bad75
JL
186/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
187void
188cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
189 struct cifs_sb_info *cifs_sb)
190{
191 memset(fattr, 0, sizeof(*fattr));
192 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
193 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
194 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
195
196 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
197 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
198 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
199 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
200
201 /*
202 * Since we set the inode type below we need to mask off
203 * to avoid strange results if bits set above.
204 */
cc0bad75 205 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
206 switch (le32_to_cpu(info->Type)) {
207 case UNIX_FILE:
cc0bad75
JL
208 fattr->cf_mode |= S_IFREG;
209 fattr->cf_dtype = DT_REG;
75f12983
CH
210 break;
211 case UNIX_SYMLINK:
cc0bad75
JL
212 fattr->cf_mode |= S_IFLNK;
213 fattr->cf_dtype = DT_LNK;
75f12983
CH
214 break;
215 case UNIX_DIR:
cc0bad75
JL
216 fattr->cf_mode |= S_IFDIR;
217 fattr->cf_dtype = DT_DIR;
75f12983
CH
218 break;
219 case UNIX_CHARDEV:
cc0bad75
JL
220 fattr->cf_mode |= S_IFCHR;
221 fattr->cf_dtype = DT_CHR;
222 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
223 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
224 break;
225 case UNIX_BLOCKDEV:
cc0bad75
JL
226 fattr->cf_mode |= S_IFBLK;
227 fattr->cf_dtype = DT_BLK;
228 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
229 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
230 break;
231 case UNIX_FIFO:
cc0bad75
JL
232 fattr->cf_mode |= S_IFIFO;
233 fattr->cf_dtype = DT_FIFO;
75f12983
CH
234 break;
235 case UNIX_SOCKET:
cc0bad75
JL
236 fattr->cf_mode |= S_IFSOCK;
237 fattr->cf_dtype = DT_SOCK;
75f12983
CH
238 break;
239 default:
240 /* safest to call it a file if we do not know */
cc0bad75
JL
241 fattr->cf_mode |= S_IFREG;
242 fattr->cf_dtype = DT_REG;
b6b38f70 243 cFYI(1, "unknown type %d", le32_to_cpu(info->Type));
75f12983
CH
244 break;
245 }
246
46bbc25f
EB
247 fattr->cf_uid = cifs_sb->mnt_uid;
248 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
249 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
250 if (id < ((uid_t)-1)) {
251 kuid_t uid = make_kuid(&init_user_ns, id);
252 if (uid_valid(uid))
253 fattr->cf_uid = uid;
254 }
46bbc25f
EB
255 }
256
257 fattr->cf_gid = cifs_sb->mnt_gid;
258 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
259 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
260 if (id < ((gid_t)-1)) {
261 kgid_t gid = make_kgid(&init_user_ns, id);
262 if (gid_valid(gid))
263 fattr->cf_gid = gid;
264 }
46bbc25f 265 }
75f12983 266
cc0bad75 267 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
268}
269
b9a3260f 270/*
cc0bad75
JL
271 * Fill a cifs_fattr struct with fake inode info.
272 *
273 * Needed to setup cifs_fattr data for the directory which is the
274 * junction to the new submount (ie to setup the fake directory
275 * which represents a DFS referral).
b9a3260f 276 */
f1230c97 277static void
cc0bad75 278cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 279{
cc0bad75 280 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 281
b6b38f70 282 cFYI(1, "creating fake fattr for DFS referral");
cc0bad75
JL
283
284 memset(fattr, 0, sizeof(*fattr));
285 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
286 fattr->cf_uid = cifs_sb->mnt_uid;
287 fattr->cf_gid = cifs_sb->mnt_gid;
288 fattr->cf_atime = CURRENT_TIME;
289 fattr->cf_ctime = CURRENT_TIME;
290 fattr->cf_mtime = CURRENT_TIME;
291 fattr->cf_nlink = 2;
292 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
293}
294
4ad65044
PS
295static int
296cifs_get_file_info_unix(struct file *filp)
abab095d
JL
297{
298 int rc;
6d5786a3 299 unsigned int xid;
abab095d
JL
300 FILE_UNIX_BASIC_INFO find_data;
301 struct cifs_fattr fattr;
496ad9aa 302 struct inode *inode = file_inode(filp);
abab095d 303 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 304 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 305 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 306
6d5786a3 307 xid = get_xid();
4b4de76e 308 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
309 if (!rc) {
310 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
311 } else if (rc == -EREMOTE) {
312 cifs_create_dfs_fattr(&fattr, inode->i_sb);
313 rc = 0;
314 }
315
316 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 317 free_xid(xid);
abab095d
JL
318 return rc;
319}
320
1da177e4 321int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 322 const unsigned char *full_path,
6d5786a3 323 struct super_block *sb, unsigned int xid)
1da177e4 324{
cc0bad75 325 int rc;
0e4bbde9 326 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 327 struct cifs_fattr fattr;
96daf2b0 328 struct cifs_tcon *tcon;
7ffec372 329 struct tcon_link *tlink;
1da177e4 330 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 331
b6b38f70 332 cFYI(1, "Getting info on %s", full_path);
7962670e 333
7ffec372
JL
334 tlink = cifs_sb_tlink(cifs_sb);
335 if (IS_ERR(tlink))
336 return PTR_ERR(tlink);
337 tcon = tlink_tcon(tlink);
338
1da177e4 339 /* could have done a find first instead but this returns more info */
cc0bad75 340 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
341 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
342 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 343 cifs_put_tlink(tlink);
e911d0cc 344
cc0bad75
JL
345 if (!rc) {
346 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
347 } else if (rc == -EREMOTE) {
348 cifs_create_dfs_fattr(&fattr, sb);
349 rc = 0;
350 } else {
351 return rc;
352 }
1da177e4 353
1b12b9c1
SM
354 /* check for Minshall+French symlinks */
355 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
356 int tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
357 if (tmprc)
358 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
359 }
360
0e4bbde9 361 if (*pinode == NULL) {
cc0bad75 362 /* get new inode */
4065c802 363 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
364 *pinode = cifs_iget(sb, &fattr);
365 if (!*pinode)
0e4bbde9 366 rc = -ENOMEM;
cc0bad75
JL
367 } else {
368 /* we already have inode, update it */
369 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 370 }
1da177e4 371
1da177e4
LT
372 return rc;
373}
374
0b8f18e3
JL
375static int
376cifs_sfu_type(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 377 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
378{
379 int rc;
4b18f2a9 380 int oplock = 0;
d6e2f2a4 381 __u16 netfid;
7ffec372 382 struct tcon_link *tlink;
96daf2b0 383 struct cifs_tcon *tcon;
d4ffff1f 384 struct cifs_io_parms io_parms;
86c96b4b 385 char buf[24];
d6e2f2a4 386 unsigned int bytes_read;
fb8c4b14 387 char *pbuf;
d6e2f2a4
SF
388
389 pbuf = buf;
390
0b8f18e3
JL
391 fattr->cf_mode &= ~S_IFMT;
392
393 if (fattr->cf_eof == 0) {
394 fattr->cf_mode |= S_IFIFO;
395 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 396 return 0;
0b8f18e3
JL
397 } else if (fattr->cf_eof < 8) {
398 fattr->cf_mode |= S_IFREG;
399 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
400 return -EINVAL; /* EOPNOTSUPP? */
401 }
50c2f753 402
7ffec372
JL
403 tlink = cifs_sb_tlink(cifs_sb);
404 if (IS_ERR(tlink))
405 return PTR_ERR(tlink);
406 tcon = tlink_tcon(tlink);
407
408 rc = CIFSSMBOpen(xid, tcon, path, FILE_OPEN, GENERIC_READ,
d6e2f2a4
SF
409 CREATE_NOT_DIR, &netfid, &oplock, NULL,
410 cifs_sb->local_nls,
411 cifs_sb->mnt_cifs_flags &
412 CIFS_MOUNT_MAP_SPECIAL_CHR);
fb8c4b14 413 if (rc == 0) {
ec637e3f 414 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4 415 /* Read header */
d4ffff1f
PS
416 io_parms.netfid = netfid;
417 io_parms.pid = current->tgid;
418 io_parms.tcon = tcon;
419 io_parms.offset = 0;
420 io_parms.length = 24;
421 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf,
422 &buf_type);
4523cc30
SF
423 if ((rc == 0) && (bytes_read >= 8)) {
424 if (memcmp("IntxBLK", pbuf, 8) == 0) {
b6b38f70 425 cFYI(1, "Block device");
0b8f18e3
JL
426 fattr->cf_mode |= S_IFBLK;
427 fattr->cf_dtype = DT_BLK;
4523cc30 428 if (bytes_read == 24) {
86c96b4b
SF
429 /* we have enough to decode dev num */
430 __u64 mjr; /* major */
431 __u64 mnr; /* minor */
432 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
433 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 434 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 435 }
4523cc30 436 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
b6b38f70 437 cFYI(1, "Char device");
0b8f18e3
JL
438 fattr->cf_mode |= S_IFCHR;
439 fattr->cf_dtype = DT_CHR;
4523cc30 440 if (bytes_read == 24) {
86c96b4b
SF
441 /* we have enough to decode dev num */
442 __u64 mjr; /* major */
443 __u64 mnr; /* minor */
444 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
445 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 446 fattr->cf_rdev = MKDEV(mjr, mnr);
fb8c4b14 447 }
4523cc30 448 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
b6b38f70 449 cFYI(1, "Symlink");
0b8f18e3
JL
450 fattr->cf_mode |= S_IFLNK;
451 fattr->cf_dtype = DT_LNK;
86c96b4b 452 } else {
0b8f18e3
JL
453 fattr->cf_mode |= S_IFREG; /* file? */
454 fattr->cf_dtype = DT_REG;
fb8c4b14 455 rc = -EOPNOTSUPP;
86c96b4b 456 }
3020a1f5 457 } else {
0b8f18e3
JL
458 fattr->cf_mode |= S_IFREG; /* then it is a file */
459 fattr->cf_dtype = DT_REG;
fb8c4b14
SF
460 rc = -EOPNOTSUPP; /* or some unknown SFU type */
461 }
7ffec372 462 CIFSSMBClose(xid, tcon, netfid);
d6e2f2a4 463 }
7ffec372 464 cifs_put_tlink(tlink);
d6e2f2a4 465 return rc;
d6e2f2a4
SF
466}
467
9e294f1c
SF
468#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
469
0b8f18e3
JL
470/*
471 * Fetch mode bits as provided by SFU.
472 *
473 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
474 */
475static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 476 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 477{
3020a1f5 478#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
479 ssize_t rc;
480 char ea_value[4];
481 __u32 mode;
7ffec372 482 struct tcon_link *tlink;
96daf2b0 483 struct cifs_tcon *tcon;
7ffec372
JL
484
485 tlink = cifs_sb_tlink(cifs_sb);
486 if (IS_ERR(tlink))
487 return PTR_ERR(tlink);
488 tcon = tlink_tcon(tlink);
9e294f1c 489
7ffec372 490 rc = CIFSSMBQAllEAs(xid, tcon, path, "SETFILEBITS",
0b8f18e3
JL
491 ea_value, 4 /* size of buf */, cifs_sb->local_nls,
492 cifs_sb->mnt_cifs_flags &
493 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 494 cifs_put_tlink(tlink);
4523cc30 495 if (rc < 0)
9e294f1c
SF
496 return (int)rc;
497 else if (rc > 3) {
498 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 499 fattr->cf_mode &= ~SFBITS_MASK;
b6b38f70
JP
500 cFYI(1, "special bits 0%o org mode 0%o", mode,
501 fattr->cf_mode);
0b8f18e3 502 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
b6b38f70 503 cFYI(1, "special mode bits 0%o", mode);
9e294f1c 504 }
0b8f18e3
JL
505
506 return 0;
3020a1f5
SF
507#else
508 return -EOPNOTSUPP;
509#endif
9e294f1c
SF
510}
511
0b8f18e3 512/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 513static void
0b8f18e3
JL
514cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
515 struct cifs_sb_info *cifs_sb, bool adjust_tz)
b9a3260f 516{
96daf2b0 517 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 518
0b8f18e3
JL
519 memset(fattr, 0, sizeof(*fattr));
520 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
521 if (info->DeletePending)
522 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
523
524 if (info->LastAccessTime)
525 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
526 else
527 fattr->cf_atime = CURRENT_TIME;
528
529 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
530 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
531
532 if (adjust_tz) {
0d424ad0
JL
533 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
534 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
535 }
536
537 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
538 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 539 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3
JL
540
541 if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
542 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
543 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
544 /*
545 * Server can return wrong NumberOfLinks value for directories
546 * when Unix extensions are disabled - fake it.
547 */
548 fattr->cf_nlink = 2;
0b8f18e3
JL
549 } else {
550 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
551 fattr->cf_dtype = DT_REG;
0b8f18e3 552
d0c280d2
JL
553 /* clear write bits if ATTR_READONLY is set */
554 if (fattr->cf_cifsattrs & ATTR_READONLY)
555 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 556
6de2ce42
PS
557 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
558 }
0b8f18e3
JL
559
560 fattr->cf_uid = cifs_sb->mnt_uid;
561 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
562}
563
4ad65044
PS
564static int
565cifs_get_file_info(struct file *filp)
abab095d
JL
566{
567 int rc;
6d5786a3 568 unsigned int xid;
abab095d
JL
569 FILE_ALL_INFO find_data;
570 struct cifs_fattr fattr;
496ad9aa 571 struct inode *inode = file_inode(filp);
abab095d 572 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 573 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 574 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
575 struct TCP_Server_Info *server = tcon->ses->server;
576
577 if (!server->ops->query_file_info)
578 return -ENOSYS;
abab095d 579
6d5786a3 580 xid = get_xid();
4ad65044 581 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
582 switch (rc) {
583 case 0:
584 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false);
585 break;
586 case -EREMOTE:
587 cifs_create_dfs_fattr(&fattr, inode->i_sb);
588 rc = 0;
589 break;
590 case -EOPNOTSUPP:
591 case -EINVAL:
abab095d
JL
592 /*
593 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
594 * for now, just skip revalidating and mark inode for
595 * immediate reval.
596 */
abab095d
JL
597 rc = 0;
598 CIFS_I(inode)->time = 0;
42274bb2 599 default:
abab095d 600 goto cgfi_exit;
42274bb2 601 }
abab095d
JL
602
603 /*
604 * don't bother with SFU junk here -- just mark inode as needing
605 * revalidation.
606 */
abab095d
JL
607 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
608 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
609 cifs_fattr_to_inode(inode, &fattr);
610cgfi_exit:
6d5786a3 611 free_xid(xid);
abab095d
JL
612 return rc;
613}
614
1208ef1f
PS
615int
616cifs_get_inode_info(struct inode **inode, const char *full_path,
617 FILE_ALL_INFO *data, struct super_block *sb, int xid,
618 const __u16 *fid)
1da177e4 619{
c052e2b4
SP
620 bool validinum = false;
621 __u16 srchflgs;
622 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
623 struct cifs_tcon *tcon;
624 struct TCP_Server_Info *server;
7ffec372 625 struct tcon_link *tlink;
1da177e4 626 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 627 char *buf = NULL;
1208ef1f 628 bool adjust_tz = false;
0b8f18e3 629 struct cifs_fattr fattr;
c052e2b4 630 struct cifs_search_info *srchinf = NULL;
1da177e4 631
7ffec372
JL
632 tlink = cifs_sb_tlink(cifs_sb);
633 if (IS_ERR(tlink))
634 return PTR_ERR(tlink);
1208ef1f
PS
635 tcon = tlink_tcon(tlink);
636 server = tcon->ses->server;
7ffec372 637
b6b38f70 638 cFYI(1, "Getting info on %s", full_path);
1da177e4 639
1208ef1f
PS
640 if ((data == NULL) && (*inode != NULL)) {
641 if (CIFS_I(*inode)->clientCanCacheRead) {
b6b38f70 642 cFYI(1, "No need to revalidate cached inode sizes");
7ffec372 643 goto cgii_exit;
1da177e4
LT
644 }
645 }
646
1208ef1f
PS
647 /* if inode info is not passed, get it from server */
648 if (data == NULL) {
649 if (!server->ops->query_path_info) {
650 rc = -ENOSYS;
651 goto cgii_exit;
652 }
1da177e4 653 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
654 if (buf == NULL) {
655 rc = -ENOMEM;
656 goto cgii_exit;
657 }
1208ef1f
PS
658 data = (FILE_ALL_INFO *)buf;
659 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
660 data, &adjust_tz);
1da177e4 661 }
0b8f18e3
JL
662
663 if (!rc) {
1208ef1f
PS
664 cifs_all_info_to_fattr(&fattr, (FILE_ALL_INFO *)data, cifs_sb,
665 adjust_tz);
0b8f18e3
JL
666 } else if (rc == -EREMOTE) {
667 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 668 rc = 0;
c052e2b4
SP
669 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
670 srchinf = kzalloc(sizeof(struct cifs_search_info),
671 GFP_KERNEL);
672 if (srchinf == NULL) {
673 rc = -ENOMEM;
674 goto cgii_exit;
675 }
676
677 srchinf->endOfSearch = false;
678 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
679
680 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
681 CIFS_SEARCH_CLOSE_AT_END |
682 CIFS_SEARCH_BACKUP_SEARCH;
683
684 rc = CIFSFindFirst(xid, tcon, full_path,
685 cifs_sb, NULL, srchflgs, srchinf, false);
686 if (!rc) {
687 data =
688 (FILE_ALL_INFO *)srchinf->srch_entries_start;
689
690 cifs_dir_info_to_fattr(&fattr,
691 (FILE_DIRECTORY_INFO *)data, cifs_sb);
692 fattr.cf_uniqueid = le64_to_cpu(
693 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
694 validinum = true;
695
696 cifs_buf_release(srchinf->ntwrk_buf_start);
697 }
698 kfree(srchinf);
699 } else
7962670e 700 goto cgii_exit;
1da177e4 701
0b8f18e3
JL
702 /*
703 * If an inode wasn't passed in, then get the inode number
704 *
705 * Is an i_ino of zero legal? Can we use that to check if the server
706 * supports returning inode numbers? Are there other sanity checks we
707 * can use to ensure that the server is really filling in that field?
0b8f18e3 708 */
1208ef1f 709 if (*inode == NULL) {
b9a3260f 710 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
711 if (validinum == false) {
712 if (server->ops->get_srv_inum)
713 tmprc = server->ops->get_srv_inum(xid,
714 tcon, cifs_sb, full_path,
715 &fattr.cf_uniqueid, data);
716 if (tmprc) {
717 cFYI(1, "GetSrvInodeNum rc %d", tmprc);
718 fattr.cf_uniqueid = iunique(sb, ROOT_I);
719 cifs_autodisable_serverino(cifs_sb);
720 }
132ac7b7 721 }
c052e2b4 722 } else
0b8f18e3 723 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 724 } else
1208ef1f 725 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 726
0b8f18e3
JL
727 /* query for SFU type info if supported and needed */
728 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
729 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
730 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
731 if (tmprc)
b6b38f70 732 cFYI(1, "cifs_sfu_type failed: %d", tmprc);
b9a3260f 733 }
1da177e4 734
79df1bae 735#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
736 /* fill in 0777 bits from ACL */
737 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 738 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d
SP
739 if (rc) {
740 cFYI(1, "%s: Getting ACL failed with error: %d",
741 __func__, rc);
742 goto cgii_exit;
743 }
b9a3260f 744 }
79df1bae 745#endif /* CONFIG_CIFS_ACL */
b9a3260f 746
0b8f18e3
JL
747 /* fill in remaining high mode bits e.g. SUID, VTX */
748 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
749 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 750
1b12b9c1
SM
751 /* check for Minshall+French symlinks */
752 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
753 tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
754 if (tmprc)
755 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
756 }
757
1208ef1f
PS
758 if (!*inode) {
759 *inode = cifs_iget(sb, &fattr);
760 if (!*inode)
0b8f18e3
JL
761 rc = -ENOMEM;
762 } else {
1208ef1f 763 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 764 }
b9a3260f 765
7962670e 766cgii_exit:
1da177e4 767 kfree(buf);
7ffec372 768 cifs_put_tlink(tlink);
1da177e4
LT
769 return rc;
770}
771
7f8ed420
SF
772static const struct inode_operations cifs_ipc_inode_ops = {
773 .lookup = cifs_lookup,
774};
775
cc0bad75
JL
776static int
777cifs_find_inode(struct inode *inode, void *opaque)
778{
779 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
780
f30b9c11 781 /* don't match inode with different uniqueid */
cc0bad75
JL
782 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
783 return 0;
784
20054bd6
JL
785 /* use createtime like an i_generation field */
786 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
787 return 0;
788
f30b9c11
JL
789 /* don't match inode of different type */
790 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
791 return 0;
792
5acfec25 793 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 794 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 795 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 796
cc0bad75
JL
797 return 1;
798}
799
800static int
801cifs_init_inode(struct inode *inode, void *opaque)
802{
803 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
804
805 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 806 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
807 return 0;
808}
809
5acfec25
JL
810/*
811 * walk dentry list for an inode and report whether it has aliases that
812 * are hashed. We use this to determine if a directory inode can actually
813 * be used.
814 */
815static bool
816inode_has_hashed_dentries(struct inode *inode)
817{
818 struct dentry *dentry;
819
873feea0 820 spin_lock(&inode->i_lock);
b67bfe0d 821 hlist_for_each_entry(dentry, &inode->i_dentry, d_alias) {
5acfec25 822 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 823 spin_unlock(&inode->i_lock);
5acfec25
JL
824 return true;
825 }
826 }
873feea0 827 spin_unlock(&inode->i_lock);
5acfec25
JL
828 return false;
829}
830
cc0bad75
JL
831/* Given fattrs, get a corresponding inode */
832struct inode *
833cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
834{
835 unsigned long hash;
836 struct inode *inode;
837
3d694380 838retry_iget5_locked:
b6b38f70 839 cFYI(1, "looking for uniqueid=%llu", fattr->cf_uniqueid);
cc0bad75
JL
840
841 /* hash down to 32-bits on 32-bit arch */
842 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
843
844 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 845 if (inode) {
5acfec25 846 /* was there a potentially problematic inode collision? */
3d694380 847 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 848 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
849
850 if (inode_has_hashed_dentries(inode)) {
851 cifs_autodisable_serverino(CIFS_SB(sb));
852 iput(inode);
853 fattr->cf_uniqueid = iunique(sb, ROOT_I);
854 goto retry_iget5_locked;
855 }
3d694380
JL
856 }
857
cc0bad75
JL
858 cifs_fattr_to_inode(inode, fattr);
859 if (sb->s_flags & MS_NOATIME)
860 inode->i_flags |= S_NOATIME | S_NOCMTIME;
861 if (inode->i_state & I_NEW) {
862 inode->i_ino = hash;
522440ed
JL
863 if (S_ISREG(inode->i_mode))
864 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 865#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
866 /* initialize per-inode cache cookie pointer */
867 CIFS_I(inode)->fscache = NULL;
0ccd4802 868#endif
cc0bad75
JL
869 unlock_new_inode(inode);
870 }
871 }
872
873 return inode;
874}
875
1da177e4 876/* gets root inode */
9b6763e0 877struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 878{
6d5786a3 879 unsigned int xid;
0d424ad0 880 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 881 struct inode *inode = NULL;
ce634ab2 882 long rc;
96daf2b0 883 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 884
6d5786a3 885 xid = get_xid();
0d424ad0 886 if (tcon->unix_ext)
f87d39d9 887 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 888 else
f87d39d9 889 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 890
a7851ce7
OS
891 if (!inode) {
892 inode = ERR_PTR(rc);
893 goto out;
894 }
cc0bad75 895
0ccd4802 896#ifdef CONFIG_CIFS_FSCACHE
d03382ce 897 /* populate tcon->resource_id */
0d424ad0 898 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 899#endif
d03382ce 900
0d424ad0 901 if (rc && tcon->ipc) {
b6b38f70 902 cFYI(1, "ipc connection - fake read inode");
b7ca6928 903 spin_lock(&inode->i_lock);
7f8ed420 904 inode->i_mode |= S_IFDIR;
bfe86848 905 set_nlink(inode, 2);
7f8ed420
SF
906 inode->i_op = &cifs_ipc_inode_ops;
907 inode->i_fop = &simple_dir_operations;
908 inode->i_uid = cifs_sb->mnt_uid;
909 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 910 spin_unlock(&inode->i_lock);
ad661334 911 } else if (rc) {
ce634ab2 912 iget_failed(inode);
a7851ce7 913 inode = ERR_PTR(rc);
7f8ed420
SF
914 }
915
a7851ce7 916out:
6d5786a3 917 /* can not call macro free_xid here since in a void func
ce634ab2
DH
918 * TODO: This is no longer true
919 */
6d5786a3 920 _free_xid(xid);
ce634ab2 921 return inode;
1da177e4
LT
922}
923
ed6875e0 924int
6d5786a3 925cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 926 char *full_path, __u32 dosattr)
388e57b2 927{
388e57b2 928 bool set_time = false;
388e57b2 929 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 930 struct TCP_Server_Info *server;
388e57b2
SF
931 FILE_BASIC_INFO info_buf;
932
1adcb710
SF
933 if (attrs == NULL)
934 return -EINVAL;
935
6bdf6dbd
PS
936 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
937 if (!server->ops->set_file_info)
938 return -ENOSYS;
939
388e57b2
SF
940 if (attrs->ia_valid & ATTR_ATIME) {
941 set_time = true;
942 info_buf.LastAccessTime =
943 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
944 } else
945 info_buf.LastAccessTime = 0;
946
947 if (attrs->ia_valid & ATTR_MTIME) {
948 set_time = true;
949 info_buf.LastWriteTime =
950 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
951 } else
952 info_buf.LastWriteTime = 0;
953
954 /*
955 * Samba throws this field away, but windows may actually use it.
956 * Do not set ctime unless other time stamps are changed explicitly
957 * (i.e. by utimes()) since we would then have a mix of client and
958 * server times.
959 */
960 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
b6b38f70 961 cFYI(1, "CIFS - CTIME changed");
388e57b2
SF
962 info_buf.ChangeTime =
963 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
964 } else
965 info_buf.ChangeTime = 0;
966
967 info_buf.CreationTime = 0; /* don't change */
968 info_buf.Attributes = cpu_to_le32(dosattr);
969
6bdf6dbd 970 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
971}
972
a12a1ac7 973/*
ed6875e0 974 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
975 * and rename it to a random name that hopefully won't conflict with
976 * anything else.
977 */
ed6875e0
PS
978int
979cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
980 const unsigned int xid)
a12a1ac7
JL
981{
982 int oplock = 0;
983 int rc;
984 __u16 netfid;
3270958b 985 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
986 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
987 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 988 struct tcon_link *tlink;
96daf2b0 989 struct cifs_tcon *tcon;
3270958b
SF
990 __u32 dosattr, origattr;
991 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 992
7ffec372
JL
993 tlink = cifs_sb_tlink(cifs_sb);
994 if (IS_ERR(tlink))
995 return PTR_ERR(tlink);
996 tcon = tlink_tcon(tlink);
997
a12a1ac7 998 rc = CIFSSMBOpen(xid, tcon, full_path, FILE_OPEN,
dd1db2de 999 DELETE|FILE_WRITE_ATTRIBUTES, CREATE_NOT_DIR,
a12a1ac7
JL
1000 &netfid, &oplock, NULL, cifs_sb->local_nls,
1001 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1002 if (rc != 0)
1003 goto out;
1004
3270958b
SF
1005 origattr = cifsInode->cifsAttrs;
1006 if (origattr == 0)
1007 origattr |= ATTR_NORMAL;
1008
1009 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1010 if (dosattr == 0)
1011 dosattr |= ATTR_NORMAL;
1012 dosattr |= ATTR_HIDDEN;
1013
3270958b
SF
1014 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1015 if (dosattr != origattr) {
1016 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1017 if (info_buf == NULL) {
1018 rc = -ENOMEM;
1019 goto out_close;
1020 }
1021 info_buf->Attributes = cpu_to_le32(dosattr);
1022 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1023 current->tgid);
1024 /* although we would like to mark the file hidden
1025 if that fails we will still try to rename it */
41346098 1026 if (rc != 0)
3270958b
SF
1027 cifsInode->cifsAttrs = dosattr;
1028 else
1029 dosattr = origattr; /* since not able to change them */
a12a1ac7 1030 }
a12a1ac7 1031
dd1db2de
JL
1032 /* rename the file */
1033 rc = CIFSSMBRenameOpenFile(xid, tcon, netfid, NULL, cifs_sb->local_nls,
a12a1ac7
JL
1034 cifs_sb->mnt_cifs_flags &
1035 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b
SF
1036 if (rc != 0) {
1037 rc = -ETXTBSY;
1038 goto undo_setattr;
1039 }
6d22f098 1040
3270958b
SF
1041 /* try to set DELETE_ON_CLOSE */
1042 if (!cifsInode->delete_pending) {
1043 rc = CIFSSMBSetFileDisposition(xid, tcon, true, netfid,
1044 current->tgid);
1045 /*
1046 * some samba versions return -ENOENT when we try to set the
1047 * file disposition here. Likely a samba bug, but work around
1048 * it for now. This means that some cifsXXX files may hang
1049 * around after they shouldn't.
1050 *
1051 * BB: remove this hack after more servers have the fix
1052 */
1053 if (rc == -ENOENT)
1054 rc = 0;
1055 else if (rc != 0) {
1056 rc = -ETXTBSY;
1057 goto undo_rename;
1058 }
1059 cifsInode->delete_pending = true;
1060 }
7ce86d5a 1061
a12a1ac7
JL
1062out_close:
1063 CIFSSMBClose(xid, tcon, netfid);
1064out:
3270958b 1065 kfree(info_buf);
7ffec372 1066 cifs_put_tlink(tlink);
a12a1ac7 1067 return rc;
3270958b
SF
1068
1069 /*
1070 * reset everything back to the original state. Don't bother
1071 * dealing with errors here since we can't do anything about
1072 * them anyway.
1073 */
1074undo_rename:
1075 CIFSSMBRenameOpenFile(xid, tcon, netfid, dentry->d_name.name,
1076 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1077 CIFS_MOUNT_MAP_SPECIAL_CHR);
1078undo_setattr:
1079 if (dosattr != origattr) {
1080 info_buf->Attributes = cpu_to_le32(origattr);
1081 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1082 current->tgid))
1083 cifsInode->cifsAttrs = origattr;
1084 }
1085
1086 goto out_close;
a12a1ac7
JL
1087}
1088
b7ca6928
SF
1089/* copied from fs/nfs/dir.c with small changes */
1090static void
1091cifs_drop_nlink(struct inode *inode)
1092{
1093 spin_lock(&inode->i_lock);
1094 if (inode->i_nlink > 0)
1095 drop_nlink(inode);
1096 spin_unlock(&inode->i_lock);
1097}
ff694527
SF
1098
1099/*
1100 * If dentry->d_inode is null (usually meaning the cached dentry
1101 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1102 * if that fails we can not attempt the fall back mechanisms on EACCESS
1103 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1104 * unlink on negative dentries currently.
1105 */
5f0319a7 1106int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1107{
1108 int rc = 0;
6d5786a3 1109 unsigned int xid;
1da177e4 1110 char *full_path = NULL;
5f0319a7 1111 struct inode *inode = dentry->d_inode;
ff694527 1112 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1113 struct super_block *sb = dir->i_sb;
1114 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1115 struct tcon_link *tlink;
96daf2b0 1116 struct cifs_tcon *tcon;
ed6875e0 1117 struct TCP_Server_Info *server;
6050247d
SF
1118 struct iattr *attrs = NULL;
1119 __u32 dosattr = 0, origattr = 0;
1da177e4 1120
b6b38f70 1121 cFYI(1, "cifs_unlink, dir=0x%p, dentry=0x%p", dir, dentry);
1da177e4 1122
7ffec372
JL
1123 tlink = cifs_sb_tlink(cifs_sb);
1124 if (IS_ERR(tlink))
1125 return PTR_ERR(tlink);
1126 tcon = tlink_tcon(tlink);
ed6875e0 1127 server = tcon->ses->server;
7ffec372 1128
6d5786a3 1129 xid = get_xid();
1da177e4 1130
5f0319a7
JL
1131 /* Unlink can be called from rename so we can not take the
1132 * sb->s_vfs_rename_mutex here */
1133 full_path = build_path_from_dentry(dentry);
1da177e4 1134 if (full_path == NULL) {
0f3bc09e 1135 rc = -ENOMEM;
7ffec372 1136 goto unlink_out;
1da177e4 1137 }
2d785a50 1138
29e20f9c
PS
1139 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1140 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1141 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1142 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1143 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1144 cFYI(1, "posix del rc %d", rc);
2d785a50
SF
1145 if ((rc == 0) || (rc == -ENOENT))
1146 goto psx_del_no_retry;
1147 }
1da177e4 1148
6050247d 1149retry_std_delete:
ed6875e0
PS
1150 if (!server->ops->unlink) {
1151 rc = -ENOSYS;
1152 goto psx_del_no_retry;
1153 }
1154
1155 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1156
2d785a50 1157psx_del_no_retry:
1da177e4 1158 if (!rc) {
5f0319a7 1159 if (inode)
b7ca6928 1160 cifs_drop_nlink(inode);
1da177e4 1161 } else if (rc == -ENOENT) {
5f0319a7 1162 d_drop(dentry);
1da177e4 1163 } else if (rc == -ETXTBSY) {
ed6875e0
PS
1164 if (server->ops->rename_pending_delete) {
1165 rc = server->ops->rename_pending_delete(full_path,
1166 dentry, xid);
1167 if (rc == 0)
1168 cifs_drop_nlink(inode);
1169 }
1170 if (rc == -ETXTBSY)
1171 rc = -EBUSY;
ff694527 1172 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1173 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1174 if (attrs == NULL) {
1175 rc = -ENOMEM;
1176 goto out_reval;
1da177e4 1177 }
388e57b2
SF
1178
1179 /* try to reset dos attributes */
ff694527
SF
1180 cifs_inode = CIFS_I(inode);
1181 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1182 if (origattr == 0)
1183 origattr |= ATTR_NORMAL;
1184 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1185 if (dosattr == 0)
1186 dosattr |= ATTR_NORMAL;
1187 dosattr |= ATTR_HIDDEN;
1188
1189 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1190 if (rc != 0)
1191 goto out_reval;
6050247d
SF
1192
1193 goto retry_std_delete;
1da177e4 1194 }
6050247d
SF
1195
1196 /* undo the setattr if we errored out and it's needed */
1197 if (rc != 0 && dosattr != 0)
1198 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1199
388e57b2 1200out_reval:
4523cc30 1201 if (inode) {
ff694527
SF
1202 cifs_inode = CIFS_I(inode);
1203 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1204 when needed */
1205 inode->i_ctime = current_fs_time(sb);
06bcfedd 1206 }
5f0319a7 1207 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1208 cifs_inode = CIFS_I(dir);
6050247d 1209 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1210unlink_out:
1da177e4 1211 kfree(full_path);
6050247d 1212 kfree(attrs);
6d5786a3 1213 free_xid(xid);
7ffec372 1214 cifs_put_tlink(tlink);
1da177e4
LT
1215 return rc;
1216}
1217
ff691e96 1218static int
101b92d9 1219cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1220 const char *full_path, struct cifs_sb_info *cifs_sb,
1221 struct cifs_tcon *tcon, const unsigned int xid)
1222{
1223 int rc = 0;
101b92d9 1224 struct inode *inode = NULL;
ff691e96
PS
1225
1226 if (tcon->unix_ext)
101b92d9 1227 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1228 xid);
1229 else
101b92d9
JL
1230 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1231 xid, NULL);
1232
ff691e96
PS
1233 if (rc)
1234 return rc;
1235
ff691e96
PS
1236 /*
1237 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1238 * from the server or was set bogus. Also, since this is a brand new
1239 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1240 */
101b92d9
JL
1241 if (inode->i_nlink < 2)
1242 set_nlink(inode, 2);
ff691e96
PS
1243 mode &= ~current_umask();
1244 /* must turn on setgid bit if parent dir has it */
101b92d9 1245 if (parent->i_mode & S_ISGID)
ff691e96
PS
1246 mode |= S_ISGID;
1247
1248 if (tcon->unix_ext) {
1249 struct cifs_unix_set_info_args args = {
1250 .mode = mode,
1251 .ctime = NO_CHANGE_64,
1252 .atime = NO_CHANGE_64,
1253 .mtime = NO_CHANGE_64,
1254 .device = 0,
1255 };
1256 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1257 args.uid = current_fsuid();
101b92d9 1258 if (parent->i_mode & S_ISGID)
49418b2c 1259 args.gid = parent->i_gid;
ff691e96 1260 else
49418b2c 1261 args.gid = current_fsgid();
ff691e96 1262 } else {
49418b2c
EB
1263 args.uid = INVALID_UID; /* no change */
1264 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1265 }
1266 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1267 cifs_sb->local_nls,
1268 cifs_sb->mnt_cifs_flags &
1269 CIFS_MOUNT_MAP_SPECIAL_CHR);
1270 } else {
f436720e 1271 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1272 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1273 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1274 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1275 tcon, xid);
101b92d9
JL
1276 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1277 inode->i_mode = (mode | S_IFDIR);
1278
1279 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1280 inode->i_uid = current_fsuid();
1281 if (inode->i_mode & S_ISGID)
1282 inode->i_gid = parent->i_gid;
1283 else
1284 inode->i_gid = current_fsgid();
ff691e96
PS
1285 }
1286 }
101b92d9 1287 d_instantiate(dentry, inode);
ff691e96
PS
1288 return rc;
1289}
1290
1291static int
1292cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1293 const char *full_path, struct cifs_sb_info *cifs_sb,
1294 struct cifs_tcon *tcon, const unsigned int xid)
1295{
1296 int rc = 0;
1297 u32 oplock = 0;
1298 FILE_UNIX_BASIC_INFO *info = NULL;
1299 struct inode *newinode = NULL;
1300 struct cifs_fattr fattr;
1301
1302 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1303 if (info == NULL) {
1304 rc = -ENOMEM;
1305 goto posix_mkdir_out;
1306 }
1307
1308 mode &= ~current_umask();
1309 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1310 NULL /* netfid */, info, &oplock, full_path,
1311 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1312 CIFS_MOUNT_MAP_SPECIAL_CHR);
1313 if (rc == -EOPNOTSUPP)
1314 goto posix_mkdir_out;
1315 else if (rc) {
1316 cFYI(1, "posix mkdir returned 0x%x", rc);
1317 d_drop(dentry);
1318 goto posix_mkdir_out;
1319 }
1320
1321 if (info->Type == cpu_to_le32(-1))
1322 /* no return info, go query for it */
1323 goto posix_mkdir_get_info;
1324 /*
1325 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1326 * need to set uid/gid.
1327 */
1328
1329 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1330 cifs_fill_uniqueid(inode->i_sb, &fattr);
1331 newinode = cifs_iget(inode->i_sb, &fattr);
1332 if (!newinode)
1333 goto posix_mkdir_get_info;
1334
1335 d_instantiate(dentry, newinode);
1336
1337#ifdef CONFIG_CIFS_DEBUG2
1338 cFYI(1, "instantiated dentry %p %s to inode %p", dentry,
1339 dentry->d_name.name, newinode);
1340
1341 if (newinode->i_nlink != 2)
1342 cFYI(1, "unexpected number of links %d", newinode->i_nlink);
1343#endif
1344
1345posix_mkdir_out:
1346 kfree(info);
1347 return rc;
1348posix_mkdir_get_info:
1349 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1350 xid);
1351 goto posix_mkdir_out;
1352}
1353
18bb1db3 1354int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1355{
ff691e96 1356 int rc = 0;
6d5786a3 1357 unsigned int xid;
1da177e4 1358 struct cifs_sb_info *cifs_sb;
7ffec372 1359 struct tcon_link *tlink;
29e20f9c 1360 struct cifs_tcon *tcon;
f436720e 1361 struct TCP_Server_Info *server;
ff691e96 1362 char *full_path;
1da177e4 1363
18bb1db3 1364 cFYI(1, "In cifs_mkdir, mode = 0x%hx inode = 0x%p", mode, inode);
1da177e4 1365
1da177e4 1366 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1367 tlink = cifs_sb_tlink(cifs_sb);
1368 if (IS_ERR(tlink))
1369 return PTR_ERR(tlink);
29e20f9c 1370 tcon = tlink_tcon(tlink);
7ffec372 1371
6d5786a3 1372 xid = get_xid();
1da177e4 1373
7f57356b 1374 full_path = build_path_from_dentry(direntry);
1da177e4 1375 if (full_path == NULL) {
0f3bc09e 1376 rc = -ENOMEM;
7ffec372 1377 goto mkdir_out;
1da177e4 1378 }
50c2f753 1379
29e20f9c
PS
1380 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1381 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1382 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1383 tcon, xid);
1384 if (rc != -EOPNOTSUPP)
2dd29d31 1385 goto mkdir_out;
fb8c4b14 1386 }
ff691e96 1387
f436720e
PS
1388 server = tcon->ses->server;
1389
1390 if (!server->ops->mkdir) {
1391 rc = -ENOSYS;
1392 goto mkdir_out;
1393 }
1394
1da177e4 1395 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1396 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1397 if (rc) {
b6b38f70 1398 cFYI(1, "cifs_mkdir returned 0x%x", rc);
1da177e4 1399 d_drop(direntry);
ff691e96 1400 goto mkdir_out;
1da177e4 1401 }
ff691e96
PS
1402
1403 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1404 xid);
fb8c4b14 1405mkdir_out:
6de2ce42
PS
1406 /*
1407 * Force revalidate to get parent dir info when needed since cached
1408 * attributes are invalid now.
1409 */
1410 CIFS_I(inode)->time = 0;
1da177e4 1411 kfree(full_path);
6d5786a3 1412 free_xid(xid);
7ffec372 1413 cifs_put_tlink(tlink);
1da177e4
LT
1414 return rc;
1415}
1416
1417int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1418{
1419 int rc = 0;
6d5786a3 1420 unsigned int xid;
1da177e4 1421 struct cifs_sb_info *cifs_sb;
7ffec372 1422 struct tcon_link *tlink;
f958ca5d
PS
1423 struct cifs_tcon *tcon;
1424 struct TCP_Server_Info *server;
1da177e4
LT
1425 char *full_path = NULL;
1426 struct cifsInodeInfo *cifsInode;
1427
b6b38f70 1428 cFYI(1, "cifs_rmdir, inode = 0x%p", inode);
1da177e4 1429
6d5786a3 1430 xid = get_xid();
1da177e4 1431
7f57356b 1432 full_path = build_path_from_dentry(direntry);
1da177e4 1433 if (full_path == NULL) {
0f3bc09e 1434 rc = -ENOMEM;
7ffec372 1435 goto rmdir_exit;
1da177e4
LT
1436 }
1437
7ffec372
JL
1438 cifs_sb = CIFS_SB(inode->i_sb);
1439 tlink = cifs_sb_tlink(cifs_sb);
1440 if (IS_ERR(tlink)) {
1441 rc = PTR_ERR(tlink);
1442 goto rmdir_exit;
1443 }
f958ca5d
PS
1444 tcon = tlink_tcon(tlink);
1445 server = tcon->ses->server;
1446
1447 if (!server->ops->rmdir) {
1448 rc = -ENOSYS;
1449 cifs_put_tlink(tlink);
1450 goto rmdir_exit;
1451 }
7ffec372 1452
f958ca5d 1453 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1454 cifs_put_tlink(tlink);
1da177e4
LT
1455
1456 if (!rc) {
3677db10 1457 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1458 i_size_write(direntry->d_inode, 0);
ce71ec36 1459 clear_nlink(direntry->d_inode);
3677db10 1460 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1461 }
1462
1463 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1464 /* force revalidate to go get info when needed */
1465 cifsInode->time = 0;
42c24544
SF
1466
1467 cifsInode = CIFS_I(inode);
6de2ce42
PS
1468 /*
1469 * Force revalidate to get parent dir info when needed since cached
1470 * attributes are invalid now.
1471 */
1472 cifsInode->time = 0;
42c24544 1473
1da177e4
LT
1474 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1475 current_fs_time(inode->i_sb);
1476
7ffec372 1477rmdir_exit:
1da177e4 1478 kfree(full_path);
6d5786a3 1479 free_xid(xid);
1da177e4
LT
1480 return rc;
1481}
1482
ee2fd967 1483static int
8ceb9843
PS
1484cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1485 const char *from_path, struct dentry *to_dentry,
1486 const char *to_path)
ee2fd967
SF
1487{
1488 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1489 struct tcon_link *tlink;
8ceb9843
PS
1490 struct cifs_tcon *tcon;
1491 struct TCP_Server_Info *server;
ee2fd967
SF
1492 __u16 srcfid;
1493 int oplock, rc;
1494
7ffec372
JL
1495 tlink = cifs_sb_tlink(cifs_sb);
1496 if (IS_ERR(tlink))
1497 return PTR_ERR(tlink);
8ceb9843
PS
1498 tcon = tlink_tcon(tlink);
1499 server = tcon->ses->server;
1500
1501 if (!server->ops->rename)
1502 return -ENOSYS;
7ffec372 1503
ee2fd967 1504 /* try path-based rename first */
8ceb9843 1505 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1506
1507 /*
8ceb9843
PS
1508 * Don't bother with rename by filehandle unless file is busy and
1509 * source. Note that cross directory moves do not work with
ee2fd967
SF
1510 * rename by filehandle to various Windows servers.
1511 */
1512 if (rc == 0 || rc != -ETXTBSY)
7ffec372 1513 goto do_rename_exit;
ee2fd967 1514
ed0e3ace
JL
1515 /* open-file renames don't work across directories */
1516 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1517 goto do_rename_exit;
ed0e3ace 1518
ee2fd967 1519 /* open the file to be renamed -- we need DELETE perms */
8ceb9843 1520 rc = CIFSSMBOpen(xid, tcon, from_path, FILE_OPEN, DELETE,
ee2fd967
SF
1521 CREATE_NOT_DIR, &srcfid, &oplock, NULL,
1522 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1523 CIFS_MOUNT_MAP_SPECIAL_CHR);
ee2fd967 1524 if (rc == 0) {
8ceb9843 1525 rc = CIFSSMBRenameOpenFile(xid, tcon, srcfid,
ee2fd967
SF
1526 (const char *) to_dentry->d_name.name,
1527 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1528 CIFS_MOUNT_MAP_SPECIAL_CHR);
8ceb9843 1529 CIFSSMBClose(xid, tcon, srcfid);
ee2fd967 1530 }
7ffec372
JL
1531do_rename_exit:
1532 cifs_put_tlink(tlink);
ee2fd967
SF
1533 return rc;
1534}
1535
8ceb9843
PS
1536int
1537cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1538 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1539{
8ceb9843
PS
1540 char *from_name = NULL;
1541 char *to_name = NULL;
639e7a91 1542 struct cifs_sb_info *cifs_sb;
7ffec372 1543 struct tcon_link *tlink;
96daf2b0 1544 struct cifs_tcon *tcon;
ee2fd967
SF
1545 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1546 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1547 unsigned int xid;
1548 int rc, tmprc;
1da177e4 1549
639e7a91 1550 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1551 tlink = cifs_sb_tlink(cifs_sb);
1552 if (IS_ERR(tlink))
1553 return PTR_ERR(tlink);
1554 tcon = tlink_tcon(tlink);
1da177e4 1555
6d5786a3 1556 xid = get_xid();
ee2fd967 1557
ee2fd967
SF
1558 /*
1559 * we already have the rename sem so we do not need to
1560 * grab it again here to protect the path integrity
1561 */
8ceb9843
PS
1562 from_name = build_path_from_dentry(source_dentry);
1563 if (from_name == NULL) {
ee2fd967
SF
1564 rc = -ENOMEM;
1565 goto cifs_rename_exit;
1566 }
1567
8ceb9843
PS
1568 to_name = build_path_from_dentry(target_dentry);
1569 if (to_name == NULL) {
1da177e4
LT
1570 rc = -ENOMEM;
1571 goto cifs_rename_exit;
1572 }
1573
8ceb9843
PS
1574 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1575 to_name);
ee2fd967 1576
14121bdc
JL
1577 if (rc == -EEXIST && tcon->unix_ext) {
1578 /*
8ceb9843
PS
1579 * Are src and dst hardlinks of same inode? We can only tell
1580 * with unix extensions enabled.
14121bdc
JL
1581 */
1582 info_buf_source =
1583 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1584 GFP_KERNEL);
1585 if (info_buf_source == NULL) {
1586 rc = -ENOMEM;
1587 goto cifs_rename_exit;
1588 }
1589
1590 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1591 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1592 info_buf_source,
1593 cifs_sb->local_nls,
1594 cifs_sb->mnt_cifs_flags &
1595 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1596 if (tmprc != 0)
14121bdc 1597 goto unlink_target;
ee2fd967 1598
8ceb9843
PS
1599 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1600 info_buf_target,
1601 cifs_sb->local_nls,
1602 cifs_sb->mnt_cifs_flags &
1603 CIFS_MOUNT_MAP_SPECIAL_CHR);
14121bdc 1604
8d281efb 1605 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1606 info_buf_target->UniqueId)) {
14121bdc 1607 /* same file, POSIX says that this is a noop */
ae6884a9 1608 rc = 0;
14121bdc 1609 goto cifs_rename_exit;
ae6884a9 1610 }
8ceb9843
PS
1611 }
1612 /*
1613 * else ... BB we could add the same check for Windows by
1614 * checking the UniqueId via FILE_INTERNAL_INFO
1615 */
14121bdc 1616
ee2fd967 1617unlink_target:
fc6f3943
JL
1618 /* Try unlinking the target dentry if it's not negative */
1619 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1620 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1621 if (tmprc)
1622 goto cifs_rename_exit;
8ceb9843
PS
1623 rc = cifs_do_rename(xid, source_dentry, from_name,
1624 target_dentry, to_name);
1da177e4
LT
1625 }
1626
1627cifs_rename_exit:
ee2fd967 1628 kfree(info_buf_source);
8ceb9843
PS
1629 kfree(from_name);
1630 kfree(to_name);
6d5786a3 1631 free_xid(xid);
7ffec372 1632 cifs_put_tlink(tlink);
1da177e4
LT
1633 return rc;
1634}
1635
df2cf170
JL
1636static bool
1637cifs_inode_needs_reval(struct inode *inode)
1da177e4 1638{
df2cf170 1639 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1640 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1641
df2cf170
JL
1642 if (cifs_i->clientCanCacheRead)
1643 return false;
1da177e4 1644
df2cf170
JL
1645 if (!lookupCacheEnabled)
1646 return true;
1da177e4 1647
df2cf170
JL
1648 if (cifs_i->time == 0)
1649 return true;
1da177e4 1650
6d20e840
SJ
1651 if (!time_in_range(jiffies, cifs_i->time,
1652 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1653 return true;
1654
db19272e 1655 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1656 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1657 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1658 return true;
1659
df2cf170
JL
1660 return false;
1661}
1662
523fb8c8
SJ
1663/*
1664 * Zap the cache. Called when invalid_mapping flag is set.
1665 */
6feb9891 1666int
df2cf170
JL
1667cifs_invalidate_mapping(struct inode *inode)
1668{
6feb9891 1669 int rc = 0;
df2cf170
JL
1670 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1671
1672 cifs_i->invalid_mapping = false;
1673
df2cf170 1674 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1675 rc = invalidate_inode_pages2(inode->i_mapping);
1676 if (rc) {
1677 cERROR(1, "%s: could not invalidate inode %p", __func__,
1678 inode);
1679 cifs_i->invalid_mapping = true;
1680 }
df2cf170 1681 }
257fb1f1 1682
9451a9a5 1683 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1684 return rc;
df2cf170
JL
1685}
1686
6feb9891 1687int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1688{
1689 int rc = 0;
496ad9aa 1690 struct inode *inode = file_inode(filp);
ba00ba64 1691 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1692
1693 if (!cifs_inode_needs_reval(inode))
6feb9891 1694 return rc;
abab095d 1695
13cfb733 1696 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1697 rc = cifs_get_file_info_unix(filp);
1698 else
1699 rc = cifs_get_file_info(filp);
1700
abab095d
JL
1701 return rc;
1702}
1703
6feb9891 1704int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1705{
6d5786a3 1706 unsigned int xid;
df2cf170 1707 int rc = 0;
df2cf170
JL
1708 struct inode *inode = dentry->d_inode;
1709 struct super_block *sb = dentry->d_sb;
6feb9891 1710 char *full_path = NULL;
df2cf170
JL
1711
1712 if (inode == NULL)
1713 return -ENOENT;
1da177e4 1714
df2cf170 1715 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1716 return rc;
1717
6d5786a3 1718 xid = get_xid();
1da177e4
LT
1719
1720 /* can not safely grab the rename sem here if rename calls revalidate
1721 since that would deadlock */
df2cf170 1722 full_path = build_path_from_dentry(dentry);
1da177e4 1723 if (full_path == NULL) {
0f3bc09e 1724 rc = -ENOMEM;
6feb9891 1725 goto out;
1da177e4
LT
1726 }
1727
6feb9891
PS
1728 cFYI(1, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time "
1729 "%ld jiffies %ld", full_path, inode, inode->i_count.counter,
f19159dc 1730 dentry, dentry->d_time, jiffies);
1da177e4 1731
0d424ad0 1732 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1733 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1734 else
1735 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1736 xid, NULL);
1da177e4 1737
6feb9891 1738out:
1da177e4 1739 kfree(full_path);
6d5786a3 1740 free_xid(xid);
1da177e4
LT
1741 return rc;
1742}
1743
6feb9891
PS
1744int cifs_revalidate_file(struct file *filp)
1745{
1746 int rc;
496ad9aa 1747 struct inode *inode = file_inode(filp);
6feb9891
PS
1748
1749 rc = cifs_revalidate_file_attr(filp);
1750 if (rc)
1751 return rc;
1752
1753 if (CIFS_I(inode)->invalid_mapping)
1754 rc = cifs_invalidate_mapping(inode);
1755 return rc;
1756}
1757
1758/* revalidate a dentry's inode attributes */
1759int cifs_revalidate_dentry(struct dentry *dentry)
1760{
1761 int rc;
1762 struct inode *inode = dentry->d_inode;
1763
1764 rc = cifs_revalidate_dentry_attr(dentry);
1765 if (rc)
1766 return rc;
1767
1768 if (CIFS_I(inode)->invalid_mapping)
1769 rc = cifs_invalidate_mapping(inode);
1770 return rc;
1771}
1772
1da177e4 1773int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1774 struct kstat *stat)
1da177e4 1775{
3aa1c8c2 1776 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1777 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1778 struct inode *inode = dentry->d_inode;
1779 int rc;
3aa1c8c2 1780
6feb9891
PS
1781 /*
1782 * We need to be sure that all dirty pages are written and the server
1783 * has actual ctime, mtime and file length.
1784 */
1785 if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping &&
1786 inode->i_mapping->nrpages != 0) {
1787 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1788 if (rc) {
1789 mapping_set_error(inode->i_mapping, rc);
1790 return rc;
1791 }
6feb9891 1792 }
1c456013 1793
6feb9891
PS
1794 rc = cifs_revalidate_dentry_attr(dentry);
1795 if (rc)
1796 return rc;
1797
1798 generic_fillattr(inode, stat);
1799 stat->blksize = CIFS_MAX_MSGSIZE;
1800 stat->ino = CIFS_I(inode)->uniqueid;
1801
1802 /*
d3d1fce1
JL
1803 * If on a multiuser mount without unix extensions or cifsacl being
1804 * enabled, and the admin hasn't overridden them, set the ownership
1805 * to the fsuid/fsgid of the current process.
6feb9891
PS
1806 */
1807 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1808 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1809 !tcon->unix_ext) {
1810 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1811 stat->uid = current_fsuid();
1812 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1813 stat->gid = current_fsgid();
5fe14c85 1814 }
6feb9891 1815 return rc;
1da177e4
LT
1816}
1817
1818static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1819{
1820 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1821 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1822 struct page *page;
1da177e4
LT
1823 int rc = 0;
1824
1825 page = grab_cache_page(mapping, index);
1826 if (!page)
1827 return -ENOMEM;
1828
eebd2aa3 1829 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1830 unlock_page(page);
1831 page_cache_release(page);
1832 return rc;
1833}
1834
1b947463 1835static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1836{
c08d3b0e 1837 loff_t oldsize;
3677db10 1838
ba6a46a0 1839 spin_lock(&inode->i_lock);
c08d3b0e 1840 oldsize = inode->i_size;
3677db10 1841 i_size_write(inode, offset);
ba6a46a0 1842 spin_unlock(&inode->i_lock);
1b947463 1843
c08d3b0e 1844 truncate_pagecache(inode, oldsize, offset);
3677db10
SF
1845}
1846
8efdbde6
JL
1847static int
1848cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1849 unsigned int xid, char *full_path)
8efdbde6
JL
1850{
1851 int rc;
1852 struct cifsFileInfo *open_file;
1853 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1854 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1855 struct tcon_link *tlink = NULL;
d1433418
PS
1856 struct cifs_tcon *tcon = NULL;
1857 struct TCP_Server_Info *server;
fa2989f4 1858 struct cifs_io_parms io_parms;
8efdbde6
JL
1859
1860 /*
1861 * To avoid spurious oplock breaks from server, in the case of
1862 * inodes that we already have open, avoid doing path based
1863 * setting of file size if we can do it by handle.
1864 * This keeps our caching token (oplock) and avoids timeouts
1865 * when the local oplock break takes longer to flush
1866 * writebehind data than the SMB timeout for the SetPathInfo
1867 * request would allow
1868 */
6508d904 1869 open_file = find_writable_file(cifsInode, true);
8efdbde6 1870 if (open_file) {
d1433418
PS
1871 tcon = tlink_tcon(open_file->tlink);
1872 server = tcon->ses->server;
1873 if (server->ops->set_file_size)
1874 rc = server->ops->set_file_size(xid, tcon, open_file,
1875 attrs->ia_size, false);
1876 else
1877 rc = -ENOSYS;
6ab409b5 1878 cifsFileInfo_put(open_file);
b6b38f70 1879 cFYI(1, "SetFSize for attrs rc = %d", rc);
8efdbde6
JL
1880 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1881 unsigned int bytes_written;
fa2989f4 1882
d1433418
PS
1883 io_parms.netfid = open_file->fid.netfid;
1884 io_parms.pid = open_file->pid;
1885 io_parms.tcon = tcon;
fa2989f4
PS
1886 io_parms.offset = 0;
1887 io_parms.length = attrs->ia_size;
1888 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1889 NULL, NULL, 1);
b6b38f70 1890 cFYI(1, "Wrt seteof rc %d", rc);
8efdbde6
JL
1891 }
1892 } else
1893 rc = -EINVAL;
1894
d1433418
PS
1895 if (!rc)
1896 goto set_size_out;
1897
1898 if (tcon == NULL) {
1899 tlink = cifs_sb_tlink(cifs_sb);
1900 if (IS_ERR(tlink))
1901 return PTR_ERR(tlink);
1902 tcon = tlink_tcon(tlink);
1903 server = tcon->ses->server;
1904 }
ba00ba64 1905
d1433418
PS
1906 /*
1907 * Set file size by pathname rather than by handle either because no
1908 * valid, writeable file handle for it was found or because there was
1909 * an error setting it by handle.
1910 */
1911 if (server->ops->set_path_size)
1912 rc = server->ops->set_path_size(xid, tcon, full_path,
1913 attrs->ia_size, cifs_sb, false);
1914 else
1915 rc = -ENOSYS;
1916 cFYI(1, "SetEOF by path (setattrs) rc = %d", rc);
1917 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1918 __u16 netfid;
1919 int oplock = 0;
1920
1921 rc = SMBLegacyOpen(xid, tcon, full_path, FILE_OPEN,
1922 GENERIC_WRITE, CREATE_NOT_DIR, &netfid,
1923 &oplock, NULL, cifs_sb->local_nls,
8efdbde6 1924 cifs_sb->mnt_cifs_flags &
d1433418
PS
1925 CIFS_MOUNT_MAP_SPECIAL_CHR);
1926 if (rc == 0) {
1927 unsigned int bytes_written;
1928
1929 io_parms.netfid = netfid;
1930 io_parms.pid = current->tgid;
1931 io_parms.tcon = tcon;
1932 io_parms.offset = 0;
1933 io_parms.length = attrs->ia_size;
1934 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written, NULL,
1935 NULL, 1);
1936 cFYI(1, "wrt seteof rc %d", rc);
1937 CIFSSMBClose(xid, tcon, netfid);
8efdbde6
JL
1938 }
1939 }
d1433418
PS
1940 if (tlink)
1941 cifs_put_tlink(tlink);
8efdbde6 1942
d1433418 1943set_size_out:
8efdbde6 1944 if (rc == 0) {
fbec9ab9 1945 cifsInode->server_eof = attrs->ia_size;
1b947463 1946 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
1947 cifs_truncate_page(inode->i_mapping, inode->i_size);
1948 }
1949
1950 return rc;
1951}
1952
3fe5c1dd
JL
1953static int
1954cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
1955{
1956 int rc;
6d5786a3 1957 unsigned int xid;
3fe5c1dd
JL
1958 char *full_path = NULL;
1959 struct inode *inode = direntry->d_inode;
1960 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1961 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1962 struct tcon_link *tlink;
96daf2b0 1963 struct cifs_tcon *pTcon;
3fe5c1dd 1964 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 1965 struct cifsFileInfo *open_file;
3fe5c1dd 1966
b6b38f70
JP
1967 cFYI(1, "setattr_unix on file %s attrs->ia_valid=0x%x",
1968 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 1969
6d5786a3 1970 xid = get_xid();
3fe5c1dd 1971
db78b877
CH
1972 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
1973 attrs->ia_valid |= ATTR_FORCE;
1974
1975 rc = inode_change_ok(inode, attrs);
1976 if (rc < 0)
1977 goto out;
3fe5c1dd
JL
1978
1979 full_path = build_path_from_dentry(direntry);
1980 if (full_path == NULL) {
1981 rc = -ENOMEM;
1982 goto out;
1983 }
1984
0f4d634c
JL
1985 /*
1986 * Attempt to flush data before changing attributes. We need to do
1987 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
1988 * ownership or mode then we may also need to do this. Here, we take
1989 * the safe way out and just do the flush on all setattr requests. If
1990 * the flush returns error, store it to report later and continue.
1991 *
1992 * BB: This should be smarter. Why bother flushing pages that
1993 * will be truncated anyway? Also, should we error out here if
1994 * the flush returns error?
1995 */
1996 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
1997 mapping_set_error(inode->i_mapping, rc);
1998 rc = 0;
3fe5c1dd
JL
1999
2000 if (attrs->ia_valid & ATTR_SIZE) {
2001 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2002 if (rc != 0)
2003 goto out;
2004 }
2005
2006 /* skip mode change if it's just for clearing setuid/setgid */
2007 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2008 attrs->ia_valid &= ~ATTR_MODE;
2009
2010 args = kmalloc(sizeof(*args), GFP_KERNEL);
2011 if (args == NULL) {
2012 rc = -ENOMEM;
2013 goto out;
2014 }
2015
2016 /* set up the struct */
2017 if (attrs->ia_valid & ATTR_MODE)
2018 args->mode = attrs->ia_mode;
2019 else
2020 args->mode = NO_CHANGE_64;
2021
2022 if (attrs->ia_valid & ATTR_UID)
2023 args->uid = attrs->ia_uid;
2024 else
49418b2c 2025 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2026
2027 if (attrs->ia_valid & ATTR_GID)
2028 args->gid = attrs->ia_gid;
2029 else
49418b2c 2030 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2031
2032 if (attrs->ia_valid & ATTR_ATIME)
2033 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2034 else
2035 args->atime = NO_CHANGE_64;
2036
2037 if (attrs->ia_valid & ATTR_MTIME)
2038 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2039 else
2040 args->mtime = NO_CHANGE_64;
2041
2042 if (attrs->ia_valid & ATTR_CTIME)
2043 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2044 else
2045 args->ctime = NO_CHANGE_64;
2046
2047 args->device = 0;
6508d904 2048 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2049 if (open_file) {
4b4de76e 2050 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2051 u32 npid = open_file->pid;
13cfb733 2052 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2053 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2054 cifsFileInfo_put(open_file);
3bbeeb3c 2055 } else {
7ffec372
JL
2056 tlink = cifs_sb_tlink(cifs_sb);
2057 if (IS_ERR(tlink)) {
2058 rc = PTR_ERR(tlink);
2059 goto out;
2060 }
2061 pTcon = tlink_tcon(tlink);
3bbeeb3c 2062 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2063 cifs_sb->local_nls,
2064 cifs_sb->mnt_cifs_flags &
2065 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2066 cifs_put_tlink(tlink);
3bbeeb3c 2067 }
3fe5c1dd 2068
1025774c
CH
2069 if (rc)
2070 goto out;
ccd4bb1b 2071
1025774c 2072 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2073 attrs->ia_size != i_size_read(inode))
2074 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2075
2076 setattr_copy(inode, attrs);
2077 mark_inode_dirty(inode);
2078
2079 /* force revalidate when any of these times are set since some
2080 of the fs types (eg ext3, fat) do not have fine enough
2081 time granularity to match protocol, and we do not have a
2082 a way (yet) to query the server fs's time granularity (and
2083 whether it rounds times down).
2084 */
2085 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2086 cifsInode->time = 0;
3fe5c1dd
JL
2087out:
2088 kfree(args);
2089 kfree(full_path);
6d5786a3 2090 free_xid(xid);
3fe5c1dd
JL
2091 return rc;
2092}
2093
0510eeb7
JL
2094static int
2095cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2096{
6d5786a3 2097 unsigned int xid;
8abf2775
EB
2098 kuid_t uid = INVALID_UID;
2099 kgid_t gid = INVALID_GID;
3fe5c1dd
JL
2100 struct inode *inode = direntry->d_inode;
2101 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2102 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2103 char *full_path = NULL;
2104 int rc = -EACCES;
feb3e20c 2105 __u32 dosattr = 0;
4e1e7fb9 2106 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2107
6d5786a3 2108 xid = get_xid();
1da177e4 2109
b6b38f70
JP
2110 cFYI(1, "setattr on file %s attrs->iavalid 0x%x",
2111 direntry->d_name.name, attrs->ia_valid);
6473a559 2112
db78b877
CH
2113 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2114 attrs->ia_valid |= ATTR_FORCE;
2115
2116 rc = inode_change_ok(inode, attrs);
2117 if (rc < 0) {
6d5786a3 2118 free_xid(xid);
db78b877 2119 return rc;
6473a559 2120 }
50c2f753 2121
7f57356b 2122 full_path = build_path_from_dentry(direntry);
1da177e4 2123 if (full_path == NULL) {
0f3bc09e 2124 rc = -ENOMEM;
6d5786a3 2125 free_xid(xid);
0f3bc09e 2126 return rc;
1da177e4 2127 }
1da177e4 2128
0f4d634c
JL
2129 /*
2130 * Attempt to flush data before changing attributes. We need to do
2131 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2132 * ownership or mode then we may also need to do this. Here, we take
2133 * the safe way out and just do the flush on all setattr requests. If
2134 * the flush returns error, store it to report later and continue.
2135 *
2136 * BB: This should be smarter. Why bother flushing pages that
2137 * will be truncated anyway? Also, should we error out here if
2138 * the flush returns error?
2139 */
2140 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2141 mapping_set_error(inode->i_mapping, rc);
2142 rc = 0;
cea21805 2143
50531444 2144 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2145 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2146 if (rc != 0)
e30dcf3a 2147 goto cifs_setattr_exit;
1da177e4 2148 }
4ca691a8 2149
a5ff3769
SP
2150 if (attrs->ia_valid & ATTR_UID)
2151 uid = attrs->ia_uid;
2152
2153 if (attrs->ia_valid & ATTR_GID)
2154 gid = attrs->ia_gid;
2155
2156#ifdef CONFIG_CIFS_ACL
2157 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2158 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2159 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2160 uid, gid);
2161 if (rc) {
2162 cFYI(1, "%s: Setting id failed with error: %d",
2163 __func__, rc);
2164 goto cifs_setattr_exit;
2165 }
2166 }
2167 } else
2168#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2169 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2170 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2171
d32c4f26
JL
2172 /* skip mode change if it's just for clearing setuid/setgid */
2173 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2174 attrs->ia_valid &= ~ATTR_MODE;
2175
1da177e4 2176 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2177 mode = attrs->ia_mode;
cdbce9c8 2178 rc = 0;
79df1bae 2179#ifdef CONFIG_CIFS_ACL
78415d2d 2180 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2181 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2182 INVALID_UID, INVALID_GID);
78415d2d
SP
2183 if (rc) {
2184 cFYI(1, "%s: Setting ACL failed with error: %d",
2185 __func__, rc);
2186 goto cifs_setattr_exit;
2187 }
2188 } else
79df1bae 2189#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2190 if (((mode & S_IWUGO) == 0) &&
2191 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2192
2193 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2194
5132861a
JL
2195 /* fix up mode if we're not using dynperm */
2196 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2197 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2198 } else if ((mode & S_IWUGO) &&
2199 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2200
2201 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2202 /* Attributes of 0 are ignored */
2203 if (dosattr == 0)
2204 dosattr |= ATTR_NORMAL;
5132861a
JL
2205
2206 /* reset local inode permissions to normal */
2207 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2208 attrs->ia_mode &= ~(S_IALLUGO);
2209 if (S_ISDIR(inode->i_mode))
2210 attrs->ia_mode |=
2211 cifs_sb->mnt_dir_mode;
2212 else
2213 attrs->ia_mode |=
2214 cifs_sb->mnt_file_mode;
2215 }
2216 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2217 /* ignore mode change - ATTR_READONLY hasn't changed */
2218 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2219 }
1da177e4
LT
2220 }
2221
feb3e20c
JL
2222 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2223 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2224 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2225 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2226
e30dcf3a
SF
2227 /* Even if error on time set, no sense failing the call if
2228 the server would set the time to a reasonable value anyway,
2229 and this check ensures that we are not being called from
2230 sys_utimes in which case we ought to fail the call back to
2231 the user when the server rejects the call */
fb8c4b14 2232 if ((rc) && (attrs->ia_valid &
feb3e20c 2233 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2234 rc = 0;
1da177e4
LT
2235 }
2236
2237 /* do not need local check to inode_check_ok since the server does
2238 that */
1025774c
CH
2239 if (rc)
2240 goto cifs_setattr_exit;
2241
2242 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2243 attrs->ia_size != i_size_read(inode))
2244 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2245
2246 setattr_copy(inode, attrs);
2247 mark_inode_dirty(inode);
1025774c 2248
e30dcf3a 2249cifs_setattr_exit:
1da177e4 2250 kfree(full_path);
6d5786a3 2251 free_xid(xid);
1da177e4
LT
2252 return rc;
2253}
2254
0510eeb7
JL
2255int
2256cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2257{
2258 struct inode *inode = direntry->d_inode;
2259 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2260 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2261
2262 if (pTcon->unix_ext)
2263 return cifs_setattr_unix(direntry, attrs);
2264
2265 return cifs_setattr_nounix(direntry, attrs);
2266
2267 /* BB: add cifs_setattr_legacy for really old servers */
2268}
2269
99ee4dbd 2270#if 0
1da177e4
LT
2271void cifs_delete_inode(struct inode *inode)
2272{
b6b38f70 2273 cFYI(1, "In cifs_delete_inode, inode = 0x%p", inode);
1da177e4
LT
2274 /* may have to add back in if and when safe distributed caching of
2275 directories added e.g. via FindNotify */
2276}
99ee4dbd 2277#endif