smb3: do not attempt cifs operation in smb3 query info error path
[linux-2.6-block.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
95390201 116 if (timespec64_equal(&inode->i_mtime, &fattr->cf_mtime) &&
df2cf170 117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
9b9c5bea
SF
165 /* we do not want atime to be less than mtime, it broke some apps */
166 if (timespec64_compare(&fattr->cf_atime, &fattr->cf_mtime))
167 inode->i_atime = fattr->cf_mtime;
168 else
169 inode->i_atime = fattr->cf_atime;
95390201
AB
170 inode->i_mtime = fattr->cf_mtime;
171 inode->i_ctime = fattr->cf_ctime;
cc0bad75 172 inode->i_rdev = fattr->cf_rdev;
74d290da 173 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
174 inode->i_uid = fattr->cf_uid;
175 inode->i_gid = fattr->cf_gid;
176
0b8f18e3
JL
177 /* if dynperm is set, don't clobber existing mode */
178 if (inode->i_state & I_NEW ||
179 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
180 inode->i_mode = fattr->cf_mode;
181
cc0bad75 182 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 183
0b8f18e3
JL
184 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
185 cifs_i->time = 0;
186 else
187 cifs_i->time = jiffies;
188
aff8d5ca
JL
189 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
190 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
191 else
192 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 193
835a36ca 194 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
195 /*
196 * Can't safely change the file size here if the client is writing to
197 * it due to potential races.
198 */
cc0bad75
JL
199 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
200 i_size_write(inode, fattr->cf_eof);
201
202 /*
203 * i_blocks is not related to (i_size / i_blksize),
204 * but instead 512 byte (2**9) size is required for
205 * calculating num blocks.
206 */
207 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
208 }
209 spin_unlock(&inode->i_lock);
210
01c64fea
DH
211 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
212 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
213 if (inode->i_state & I_NEW)
214 cifs_set_ops(inode);
cc0bad75
JL
215}
216
4065c802
JL
217void
218cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
219{
220 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
221
222 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
223 return;
224
225 fattr->cf_uniqueid = iunique(sb, ROOT_I);
226}
227
cc0bad75
JL
228/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
229void
230cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
231 struct cifs_sb_info *cifs_sb)
232{
233 memset(fattr, 0, sizeof(*fattr));
234 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
235 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
236 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
237
238 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
239 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
240 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
241 /* old POSIX extensions don't get create time */
242
cc0bad75 243 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
244
245 /*
246 * Since we set the inode type below we need to mask off
247 * to avoid strange results if bits set above.
248 */
cc0bad75 249 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
250 switch (le32_to_cpu(info->Type)) {
251 case UNIX_FILE:
cc0bad75
JL
252 fattr->cf_mode |= S_IFREG;
253 fattr->cf_dtype = DT_REG;
75f12983
CH
254 break;
255 case UNIX_SYMLINK:
cc0bad75
JL
256 fattr->cf_mode |= S_IFLNK;
257 fattr->cf_dtype = DT_LNK;
75f12983
CH
258 break;
259 case UNIX_DIR:
cc0bad75
JL
260 fattr->cf_mode |= S_IFDIR;
261 fattr->cf_dtype = DT_DIR;
75f12983
CH
262 break;
263 case UNIX_CHARDEV:
cc0bad75
JL
264 fattr->cf_mode |= S_IFCHR;
265 fattr->cf_dtype = DT_CHR;
266 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
267 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
268 break;
269 case UNIX_BLOCKDEV:
cc0bad75
JL
270 fattr->cf_mode |= S_IFBLK;
271 fattr->cf_dtype = DT_BLK;
272 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
273 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
274 break;
275 case UNIX_FIFO:
cc0bad75
JL
276 fattr->cf_mode |= S_IFIFO;
277 fattr->cf_dtype = DT_FIFO;
75f12983
CH
278 break;
279 case UNIX_SOCKET:
cc0bad75
JL
280 fattr->cf_mode |= S_IFSOCK;
281 fattr->cf_dtype = DT_SOCK;
75f12983
CH
282 break;
283 default:
284 /* safest to call it a file if we do not know */
cc0bad75
JL
285 fattr->cf_mode |= S_IFREG;
286 fattr->cf_dtype = DT_REG;
f96637be 287 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
288 break;
289 }
290
46bbc25f
EB
291 fattr->cf_uid = cifs_sb->mnt_uid;
292 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
293 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
294 if (id < ((uid_t)-1)) {
295 kuid_t uid = make_kuid(&init_user_ns, id);
296 if (uid_valid(uid))
297 fattr->cf_uid = uid;
298 }
46bbc25f
EB
299 }
300
301 fattr->cf_gid = cifs_sb->mnt_gid;
302 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
303 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
304 if (id < ((gid_t)-1)) {
305 kgid_t gid = make_kgid(&init_user_ns, id);
306 if (gid_valid(gid))
307 fattr->cf_gid = gid;
308 }
46bbc25f 309 }
75f12983 310
cc0bad75 311 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
312}
313
b9a3260f 314/*
cc0bad75
JL
315 * Fill a cifs_fattr struct with fake inode info.
316 *
317 * Needed to setup cifs_fattr data for the directory which is the
318 * junction to the new submount (ie to setup the fake directory
319 * which represents a DFS referral).
b9a3260f 320 */
f1230c97 321static void
cc0bad75 322cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 323{
cc0bad75 324 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 325
f96637be 326 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
327
328 memset(fattr, 0, sizeof(*fattr));
329 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
330 fattr->cf_uid = cifs_sb->mnt_uid;
331 fattr->cf_gid = cifs_sb->mnt_gid;
95390201
AB
332 ktime_get_real_ts64(&fattr->cf_mtime);
333 fattr->cf_mtime = timespec64_trunc(fattr->cf_mtime, sb->s_time_gran);
e37fea58 334 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
335 fattr->cf_nlink = 2;
336 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
337}
338
4ad65044
PS
339static int
340cifs_get_file_info_unix(struct file *filp)
abab095d
JL
341{
342 int rc;
6d5786a3 343 unsigned int xid;
abab095d
JL
344 FILE_UNIX_BASIC_INFO find_data;
345 struct cifs_fattr fattr;
496ad9aa 346 struct inode *inode = file_inode(filp);
abab095d 347 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 348 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 349 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 350
6d5786a3 351 xid = get_xid();
4b4de76e 352 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
353 if (!rc) {
354 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
355 } else if (rc == -EREMOTE) {
356 cifs_create_dfs_fattr(&fattr, inode->i_sb);
357 rc = 0;
358 }
359
360 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 361 free_xid(xid);
abab095d
JL
362 return rc;
363}
364
1da177e4 365int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 366 const unsigned char *full_path,
6d5786a3 367 struct super_block *sb, unsigned int xid)
1da177e4 368{
cc0bad75 369 int rc;
0e4bbde9 370 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 371 struct cifs_fattr fattr;
96daf2b0 372 struct cifs_tcon *tcon;
7ffec372 373 struct tcon_link *tlink;
1da177e4 374 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 375
f96637be 376 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 377
7ffec372
JL
378 tlink = cifs_sb_tlink(cifs_sb);
379 if (IS_ERR(tlink))
380 return PTR_ERR(tlink);
381 tcon = tlink_tcon(tlink);
382
1da177e4 383 /* could have done a find first instead but this returns more info */
cc0bad75 384 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 385 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 386 cifs_put_tlink(tlink);
e911d0cc 387
cc0bad75
JL
388 if (!rc) {
389 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
390 } else if (rc == -EREMOTE) {
391 cifs_create_dfs_fattr(&fattr, sb);
392 rc = 0;
393 } else {
394 return rc;
395 }
1da177e4 396
1b12b9c1
SM
397 /* check for Minshall+French symlinks */
398 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
399 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
400 full_path);
1b12b9c1 401 if (tmprc)
cb084b1a 402 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
403 }
404
0e4bbde9 405 if (*pinode == NULL) {
cc0bad75 406 /* get new inode */
4065c802 407 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
408 *pinode = cifs_iget(sb, &fattr);
409 if (!*pinode)
0e4bbde9 410 rc = -ENOMEM;
cc0bad75
JL
411 } else {
412 /* we already have inode, update it */
7196ac11
NA
413
414 /* if uniqueid is different, return error */
415 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
416 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
417 rc = -ESTALE;
418 goto cgiiu_exit;
419 }
420
421 /* if filetype is different, return error */
422 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
423 (fattr.cf_mode & S_IFMT))) {
424 rc = -ESTALE;
425 goto cgiiu_exit;
426 }
427
cc0bad75 428 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 429 }
1da177e4 430
7196ac11 431cgiiu_exit:
1da177e4
LT
432 return rc;
433}
434
0b8f18e3 435static int
0360d605 436cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 437 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
438{
439 int rc;
db8b631d 440 __u32 oplock;
7ffec372 441 struct tcon_link *tlink;
96daf2b0 442 struct cifs_tcon *tcon;
d81b8a40
PS
443 struct cifs_fid fid;
444 struct cifs_open_parms oparms;
d4ffff1f 445 struct cifs_io_parms io_parms;
86c96b4b 446 char buf[24];
d6e2f2a4 447 unsigned int bytes_read;
fb8c4b14 448 char *pbuf;
0360d605 449 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
450
451 pbuf = buf;
452
0b8f18e3
JL
453 fattr->cf_mode &= ~S_IFMT;
454
455 if (fattr->cf_eof == 0) {
456 fattr->cf_mode |= S_IFIFO;
457 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 458 return 0;
0b8f18e3
JL
459 } else if (fattr->cf_eof < 8) {
460 fattr->cf_mode |= S_IFREG;
461 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
462 return -EINVAL; /* EOPNOTSUPP? */
463 }
50c2f753 464
7ffec372
JL
465 tlink = cifs_sb_tlink(cifs_sb);
466 if (IS_ERR(tlink))
467 return PTR_ERR(tlink);
468 tcon = tlink_tcon(tlink);
469
d81b8a40
PS
470 oparms.tcon = tcon;
471 oparms.cifs_sb = cifs_sb;
472 oparms.desired_access = GENERIC_READ;
473 oparms.create_options = CREATE_NOT_DIR;
5e19697b
SF
474 if (backup_cred(cifs_sb))
475 oparms.create_options |= CREATE_OPEN_BACKUP_INTENT;
d81b8a40
PS
476 oparms.disposition = FILE_OPEN;
477 oparms.path = path;
478 oparms.fid = &fid;
479 oparms.reconnect = false;
480
db8b631d
SF
481 if (tcon->ses->server->oplocks)
482 oplock = REQ_OPLOCK;
483 else
484 oplock = 0;
485 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 486 if (rc) {
db8b631d 487 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
488 cifs_put_tlink(tlink);
489 return rc;
490 }
491
492 /* Read header */
d81b8a40 493 io_parms.netfid = fid.netfid;
0360d605
PS
494 io_parms.pid = current->tgid;
495 io_parms.tcon = tcon;
496 io_parms.offset = 0;
497 io_parms.length = 24;
498
db8b631d
SF
499 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
500 &bytes_read, &pbuf, &buf_type);
0360d605
PS
501 if ((rc == 0) && (bytes_read >= 8)) {
502 if (memcmp("IntxBLK", pbuf, 8) == 0) {
503 cifs_dbg(FYI, "Block device\n");
504 fattr->cf_mode |= S_IFBLK;
505 fattr->cf_dtype = DT_BLK;
506 if (bytes_read == 24) {
507 /* we have enough to decode dev num */
508 __u64 mjr; /* major */
509 __u64 mnr; /* minor */
510 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
511 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
512 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 513 }
0360d605
PS
514 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
515 cifs_dbg(FYI, "Char device\n");
516 fattr->cf_mode |= S_IFCHR;
517 fattr->cf_dtype = DT_CHR;
518 if (bytes_read == 24) {
519 /* we have enough to decode dev num */
520 __u64 mjr; /* major */
521 __u64 mnr; /* minor */
522 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
523 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
524 fattr->cf_rdev = MKDEV(mjr, mnr);
525 }
526 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
527 cifs_dbg(FYI, "Symlink\n");
528 fattr->cf_mode |= S_IFLNK;
529 fattr->cf_dtype = DT_LNK;
3020a1f5 530 } else {
0360d605 531 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 532 fattr->cf_dtype = DT_REG;
0360d605 533 rc = -EOPNOTSUPP;
fb8c4b14 534 }
0360d605
PS
535 } else {
536 fattr->cf_mode |= S_IFREG; /* then it is a file */
537 fattr->cf_dtype = DT_REG;
538 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 539 }
db8b631d
SF
540
541 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 542 cifs_put_tlink(tlink);
d6e2f2a4 543 return rc;
d6e2f2a4
SF
544}
545
9e294f1c
SF
546#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
547
0b8f18e3
JL
548/*
549 * Fetch mode bits as provided by SFU.
550 *
551 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
552 */
553static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 554 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 555{
3020a1f5 556#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
557 ssize_t rc;
558 char ea_value[4];
559 __u32 mode;
7ffec372 560 struct tcon_link *tlink;
96daf2b0 561 struct cifs_tcon *tcon;
7ffec372
JL
562
563 tlink = cifs_sb_tlink(cifs_sb);
564 if (IS_ERR(tlink))
565 return PTR_ERR(tlink);
566 tcon = tlink_tcon(tlink);
9e294f1c 567
d979f3b0
SF
568 if (tcon->ses->server->ops->query_all_EAs == NULL) {
569 cifs_put_tlink(tlink);
570 return -EOPNOTSUPP;
571 }
572
573 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
574 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 575 cifs_sb);
7ffec372 576 cifs_put_tlink(tlink);
4523cc30 577 if (rc < 0)
9e294f1c
SF
578 return (int)rc;
579 else if (rc > 3) {
580 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 581 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
582 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
583 mode, fattr->cf_mode);
0b8f18e3 584 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 585 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 586 }
0b8f18e3
JL
587
588 return 0;
3020a1f5
SF
589#else
590 return -EOPNOTSUPP;
591#endif
9e294f1c
SF
592}
593
0b8f18e3 594/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 595static void
0b8f18e3 596cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 597 struct super_block *sb, bool adjust_tz,
eb85d94b 598 bool symlink)
b9a3260f 599{
e37fea58 600 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 601 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 602
0b8f18e3
JL
603 memset(fattr, 0, sizeof(*fattr));
604 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
605 if (info->DeletePending)
606 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
607
608 if (info->LastAccessTime)
609 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58 610 else {
95390201
AB
611 ktime_get_real_ts64(&fattr->cf_atime);
612 fattr->cf_atime = timespec64_trunc(fattr->cf_atime, sb->s_time_gran);
e37fea58 613 }
0b8f18e3
JL
614
615 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
616 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
617
618 if (adjust_tz) {
0d424ad0
JL
619 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
620 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
621 }
622
623 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
624 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 625 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 626
74d290da 627 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
628
629 if (symlink) {
630 fattr->cf_mode = S_IFLNK;
631 fattr->cf_dtype = DT_LNK;
632 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
633 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
634 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
635 /*
636 * Server can return wrong NumberOfLinks value for directories
637 * when Unix extensions are disabled - fake it.
638 */
74d290da
JM
639 if (!tcon->unix_ext)
640 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
641 } else {
642 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
643 fattr->cf_dtype = DT_REG;
0b8f18e3 644
d0c280d2
JL
645 /* clear write bits if ATTR_READONLY is set */
646 if (fattr->cf_cifsattrs & ATTR_READONLY)
647 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 648
74d290da
JM
649 /*
650 * Don't accept zero nlink from non-unix servers unless
651 * delete is pending. Instead mark it as unknown.
652 */
653 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
654 !info->DeletePending) {
655 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 656 fattr->cf_nlink);
74d290da 657 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 658 }
6de2ce42 659 }
0b8f18e3
JL
660
661 fattr->cf_uid = cifs_sb->mnt_uid;
662 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
663}
664
4ad65044
PS
665static int
666cifs_get_file_info(struct file *filp)
abab095d
JL
667{
668 int rc;
6d5786a3 669 unsigned int xid;
abab095d
JL
670 FILE_ALL_INFO find_data;
671 struct cifs_fattr fattr;
496ad9aa 672 struct inode *inode = file_inode(filp);
c21dfb69 673 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 674 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
675 struct TCP_Server_Info *server = tcon->ses->server;
676
677 if (!server->ops->query_file_info)
678 return -ENOSYS;
abab095d 679
6d5786a3 680 xid = get_xid();
4ad65044 681 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
682 switch (rc) {
683 case 0:
e37fea58 684 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 685 false);
42274bb2
PS
686 break;
687 case -EREMOTE:
688 cifs_create_dfs_fattr(&fattr, inode->i_sb);
689 rc = 0;
690 break;
691 case -EOPNOTSUPP:
692 case -EINVAL:
abab095d
JL
693 /*
694 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
695 * for now, just skip revalidating and mark inode for
696 * immediate reval.
697 */
abab095d
JL
698 rc = 0;
699 CIFS_I(inode)->time = 0;
42274bb2 700 default:
abab095d 701 goto cgfi_exit;
42274bb2 702 }
abab095d
JL
703
704 /*
705 * don't bother with SFU junk here -- just mark inode as needing
706 * revalidation.
707 */
abab095d
JL
708 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
709 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
710 cifs_fattr_to_inode(inode, &fattr);
711cgfi_exit:
6d5786a3 712 free_xid(xid);
abab095d
JL
713 return rc;
714}
715
7ea884c7
SF
716/* Simple function to return a 64 bit hash of string. Rarely called */
717static __u64 simple_hashstr(const char *str)
718{
3995bbf5 719 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
720 __u64 hash = 0;
721
722 while (*str)
723 hash = (hash + (__u64) *str++) * hash_mult;
724
725 return hash;
726}
727
1208ef1f
PS
728int
729cifs_get_inode_info(struct inode **inode, const char *full_path,
730 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 731 const struct cifs_fid *fid)
1da177e4 732{
c052e2b4
SP
733 bool validinum = false;
734 __u16 srchflgs;
735 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
736 struct cifs_tcon *tcon;
737 struct TCP_Server_Info *server;
7ffec372 738 struct tcon_link *tlink;
1da177e4 739 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 740 char *buf = NULL;
1208ef1f 741 bool adjust_tz = false;
0b8f18e3 742 struct cifs_fattr fattr;
c052e2b4 743 struct cifs_search_info *srchinf = NULL;
eb85d94b 744 bool symlink = false;
1da177e4 745
7ffec372
JL
746 tlink = cifs_sb_tlink(cifs_sb);
747 if (IS_ERR(tlink))
748 return PTR_ERR(tlink);
1208ef1f
PS
749 tcon = tlink_tcon(tlink);
750 server = tcon->ses->server;
7ffec372 751
f96637be 752 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 753
1208ef1f 754 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
755 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
756 CIFS_I(*inode)->time != 0) {
f96637be 757 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 758 goto cgii_exit;
1da177e4
LT
759 }
760 }
761
1208ef1f
PS
762 /* if inode info is not passed, get it from server */
763 if (data == NULL) {
764 if (!server->ops->query_path_info) {
765 rc = -ENOSYS;
766 goto cgii_exit;
767 }
1da177e4 768 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
769 if (buf == NULL) {
770 rc = -ENOMEM;
771 goto cgii_exit;
772 }
1208ef1f
PS
773 data = (FILE_ALL_INFO *)buf;
774 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 775 data, &adjust_tz, &symlink);
1da177e4 776 }
0b8f18e3
JL
777
778 if (!rc) {
e37fea58 779 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 780 symlink);
0b8f18e3
JL
781 } else if (rc == -EREMOTE) {
782 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 783 rc = 0;
1e77a8c2
SF
784 } else if ((rc == -EACCES) && backup_cred(cifs_sb) &&
785 (strcmp(server->vals->version_string, SMB1_VERSION_STRING)
786 == 0)) {
787 /*
788 * For SMB2 and later the backup intent flag is already
789 * sent if needed on open and there is no path based
790 * FindFirst operation to use to retry with
791 */
792
c052e2b4
SP
793 srchinf = kzalloc(sizeof(struct cifs_search_info),
794 GFP_KERNEL);
795 if (srchinf == NULL) {
796 rc = -ENOMEM;
797 goto cgii_exit;
798 }
799
800 srchinf->endOfSearch = false;
801 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
802
803 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
804 CIFS_SEARCH_CLOSE_AT_END |
805 CIFS_SEARCH_BACKUP_SEARCH;
806
807 rc = CIFSFindFirst(xid, tcon, full_path,
808 cifs_sb, NULL, srchflgs, srchinf, false);
809 if (!rc) {
810 data =
811 (FILE_ALL_INFO *)srchinf->srch_entries_start;
812
813 cifs_dir_info_to_fattr(&fattr,
814 (FILE_DIRECTORY_INFO *)data, cifs_sb);
815 fattr.cf_uniqueid = le64_to_cpu(
816 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
817 validinum = true;
818
819 cifs_buf_release(srchinf->ntwrk_buf_start);
820 }
821 kfree(srchinf);
4c5930e8
SF
822 if (rc)
823 goto cgii_exit;
c052e2b4 824 } else
7962670e 825 goto cgii_exit;
1da177e4 826
0b8f18e3
JL
827 /*
828 * If an inode wasn't passed in, then get the inode number
829 *
830 * Is an i_ino of zero legal? Can we use that to check if the server
831 * supports returning inode numbers? Are there other sanity checks we
832 * can use to ensure that the server is really filling in that field?
0b8f18e3 833 */
1208ef1f 834 if (*inode == NULL) {
b9a3260f 835 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
836 if (validinum == false) {
837 if (server->ops->get_srv_inum)
838 tmprc = server->ops->get_srv_inum(xid,
839 tcon, cifs_sb, full_path,
840 &fattr.cf_uniqueid, data);
841 if (tmprc) {
f96637be
JP
842 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
843 tmprc);
c052e2b4
SP
844 fattr.cf_uniqueid = iunique(sb, ROOT_I);
845 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
846 } else if ((fattr.cf_uniqueid == 0) &&
847 strlen(full_path) == 0) {
848 /* some servers ret bad root ino ie 0 */
849 cifs_dbg(FYI, "Invalid (0) inodenum\n");
850 fattr.cf_flags |=
851 CIFS_FATTR_FAKE_ROOT_INO;
852 fattr.cf_uniqueid =
853 simple_hashstr(tcon->treeName);
c052e2b4 854 }
132ac7b7 855 }
c052e2b4 856 } else
0b8f18e3 857 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
858 } else {
859 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
860 validinum == false && server->ops->get_srv_inum) {
861 /*
862 * Pass a NULL tcon to ensure we don't make a round
863 * trip to the server. This only works for SMB2+.
864 */
865 tmprc = server->ops->get_srv_inum(xid,
866 NULL, cifs_sb, full_path,
867 &fattr.cf_uniqueid, data);
868 if (tmprc)
869 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
870 else if ((fattr.cf_uniqueid == 0) &&
871 strlen(full_path) == 0) {
872 /*
873 * Reuse existing root inode num since
874 * inum zero for root causes ls of . and .. to
875 * not be returned
876 */
877 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
878 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
879 }
a108471b
RL
880 } else
881 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
882 }
b9a3260f 883
0b8f18e3
JL
884 /* query for SFU type info if supported and needed */
885 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
886 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
887 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
888 if (tmprc)
f96637be 889 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 890 }
1da177e4 891
79df1bae 892#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
893 /* fill in 0777 bits from ACL */
894 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 895 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 896 if (rc) {
f96637be
JP
897 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
898 __func__, rc);
78415d2d
SP
899 goto cgii_exit;
900 }
b9a3260f 901 }
79df1bae 902#endif /* CONFIG_CIFS_ACL */
b9a3260f 903
0b8f18e3
JL
904 /* fill in remaining high mode bits e.g. SUID, VTX */
905 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
906 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 907
1b12b9c1
SM
908 /* check for Minshall+French symlinks */
909 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
910 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
911 full_path);
1b12b9c1 912 if (tmprc)
cb084b1a 913 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
914 }
915
1208ef1f
PS
916 if (!*inode) {
917 *inode = cifs_iget(sb, &fattr);
918 if (!*inode)
0b8f18e3
JL
919 rc = -ENOMEM;
920 } else {
7196ac11
NA
921 /* we already have inode, update it */
922
a108471b
RL
923 /* if uniqueid is different, return error */
924 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
925 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
926 rc = -ESTALE;
927 goto cgii_exit;
928 }
929
7196ac11
NA
930 /* if filetype is different, return error */
931 if (unlikely(((*inode)->i_mode & S_IFMT) !=
932 (fattr.cf_mode & S_IFMT))) {
933 rc = -ESTALE;
934 goto cgii_exit;
935 }
936
1208ef1f 937 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 938 }
b9a3260f 939
7962670e 940cgii_exit:
7ea884c7
SF
941 if ((*inode) && ((*inode)->i_ino == 0))
942 cifs_dbg(FYI, "inode number of zero returned\n");
943
1da177e4 944 kfree(buf);
7ffec372 945 cifs_put_tlink(tlink);
1da177e4
LT
946 return rc;
947}
948
7f8ed420
SF
949static const struct inode_operations cifs_ipc_inode_ops = {
950 .lookup = cifs_lookup,
951};
952
cc0bad75
JL
953static int
954cifs_find_inode(struct inode *inode, void *opaque)
955{
956 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
957
f30b9c11 958 /* don't match inode with different uniqueid */
cc0bad75
JL
959 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
960 return 0;
961
20054bd6
JL
962 /* use createtime like an i_generation field */
963 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
964 return 0;
965
f30b9c11
JL
966 /* don't match inode of different type */
967 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
968 return 0;
969
5acfec25 970 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 971 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 972 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 973
cc0bad75
JL
974 return 1;
975}
976
977static int
978cifs_init_inode(struct inode *inode, void *opaque)
979{
980 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
981
982 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 983 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
984 return 0;
985}
986
5acfec25
JL
987/*
988 * walk dentry list for an inode and report whether it has aliases that
989 * are hashed. We use this to determine if a directory inode can actually
990 * be used.
991 */
992static bool
993inode_has_hashed_dentries(struct inode *inode)
994{
995 struct dentry *dentry;
996
873feea0 997 spin_lock(&inode->i_lock);
946e51f2 998 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 999 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 1000 spin_unlock(&inode->i_lock);
5acfec25
JL
1001 return true;
1002 }
1003 }
873feea0 1004 spin_unlock(&inode->i_lock);
5acfec25
JL
1005 return false;
1006}
1007
cc0bad75
JL
1008/* Given fattrs, get a corresponding inode */
1009struct inode *
1010cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
1011{
1012 unsigned long hash;
1013 struct inode *inode;
1014
3d694380 1015retry_iget5_locked:
f96637be 1016 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1017
1018 /* hash down to 32-bits on 32-bit arch */
1019 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1020
1021 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1022 if (inode) {
5acfec25 1023 /* was there a potentially problematic inode collision? */
3d694380 1024 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1025 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1026
1027 if (inode_has_hashed_dentries(inode)) {
1028 cifs_autodisable_serverino(CIFS_SB(sb));
1029 iput(inode);
1030 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1031 goto retry_iget5_locked;
1032 }
3d694380
JL
1033 }
1034
cc0bad75 1035 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1036 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1037 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1038 if (inode->i_state & I_NEW) {
1039 inode->i_ino = hash;
0ccd4802 1040#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1041 /* initialize per-inode cache cookie pointer */
1042 CIFS_I(inode)->fscache = NULL;
0ccd4802 1043#endif
cc0bad75
JL
1044 unlock_new_inode(inode);
1045 }
1046 }
1047
1048 return inode;
1049}
1050
1da177e4 1051/* gets root inode */
9b6763e0 1052struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1053{
6d5786a3 1054 unsigned int xid;
0d424ad0 1055 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1056 struct inode *inode = NULL;
ce634ab2 1057 long rc;
96daf2b0 1058 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1059 char *path = NULL;
1060 int len;
1061
1062 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1063 && cifs_sb->prepath) {
1064 len = strlen(cifs_sb->prepath);
1065 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1066 if (path == NULL)
1067 return ERR_PTR(-ENOMEM);
1068 path[0] = '/';
1069 memcpy(path+1, cifs_sb->prepath, len);
1070 } else {
1071 path = kstrdup("", GFP_KERNEL);
1072 if (path == NULL)
1073 return ERR_PTR(-ENOMEM);
1074 }
ce634ab2 1075
6d5786a3 1076 xid = get_xid();
b5b374ea 1077 if (tcon->unix_ext) {
a6b5058f 1078 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1079 /* some servers mistakenly claim POSIX support */
1080 if (rc != -EOPNOTSUPP)
1081 goto iget_no_retry;
1082 cifs_dbg(VFS, "server does not support POSIX extensions");
1083 tcon->unix_ext = false;
1084 }
1085
a6b5058f
AA
1086 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1087 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1088
b5b374ea 1089iget_no_retry:
a7851ce7
OS
1090 if (!inode) {
1091 inode = ERR_PTR(rc);
1092 goto out;
1093 }
cc0bad75 1094
0ccd4802 1095#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1096 /* populate tcon->resource_id */
0d424ad0 1097 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1098#endif
d03382ce 1099
b327a717 1100 if (rc && tcon->pipe) {
f96637be 1101 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1102 spin_lock(&inode->i_lock);
7f8ed420 1103 inode->i_mode |= S_IFDIR;
bfe86848 1104 set_nlink(inode, 2);
7f8ed420
SF
1105 inode->i_op = &cifs_ipc_inode_ops;
1106 inode->i_fop = &simple_dir_operations;
1107 inode->i_uid = cifs_sb->mnt_uid;
1108 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1109 spin_unlock(&inode->i_lock);
ad661334 1110 } else if (rc) {
ce634ab2 1111 iget_failed(inode);
a7851ce7 1112 inode = ERR_PTR(rc);
7f8ed420
SF
1113 }
1114
a7851ce7 1115out:
a6b5058f 1116 kfree(path);
31cd106b 1117 free_xid(xid);
ce634ab2 1118 return inode;
1da177e4
LT
1119}
1120
ed6875e0 1121int
6d5786a3 1122cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1123 char *full_path, __u32 dosattr)
388e57b2 1124{
388e57b2 1125 bool set_time = false;
388e57b2 1126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1127 struct TCP_Server_Info *server;
388e57b2
SF
1128 FILE_BASIC_INFO info_buf;
1129
1adcb710
SF
1130 if (attrs == NULL)
1131 return -EINVAL;
1132
6bdf6dbd
PS
1133 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1134 if (!server->ops->set_file_info)
1135 return -ENOSYS;
1136
fd09b7d3
SF
1137 info_buf.Pad = 0;
1138
388e57b2
SF
1139 if (attrs->ia_valid & ATTR_ATIME) {
1140 set_time = true;
1141 info_buf.LastAccessTime =
95390201 1142 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
388e57b2
SF
1143 } else
1144 info_buf.LastAccessTime = 0;
1145
1146 if (attrs->ia_valid & ATTR_MTIME) {
1147 set_time = true;
1148 info_buf.LastWriteTime =
95390201 1149 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
388e57b2
SF
1150 } else
1151 info_buf.LastWriteTime = 0;
1152
1153 /*
1154 * Samba throws this field away, but windows may actually use it.
1155 * Do not set ctime unless other time stamps are changed explicitly
1156 * (i.e. by utimes()) since we would then have a mix of client and
1157 * server times.
1158 */
1159 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1160 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2 1161 info_buf.ChangeTime =
95390201 1162 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
388e57b2
SF
1163 } else
1164 info_buf.ChangeTime = 0;
1165
1166 info_buf.CreationTime = 0; /* don't change */
1167 info_buf.Attributes = cpu_to_le32(dosattr);
1168
6bdf6dbd 1169 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1170}
1171
a12a1ac7 1172/*
ed6875e0 1173 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1174 * and rename it to a random name that hopefully won't conflict with
1175 * anything else.
1176 */
ed6875e0
PS
1177int
1178cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1179 const unsigned int xid)
a12a1ac7
JL
1180{
1181 int oplock = 0;
1182 int rc;
d81b8a40
PS
1183 struct cifs_fid fid;
1184 struct cifs_open_parms oparms;
2b0143b5 1185 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1186 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1187 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1188 struct tcon_link *tlink;
96daf2b0 1189 struct cifs_tcon *tcon;
3270958b
SF
1190 __u32 dosattr, origattr;
1191 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1192
7ffec372
JL
1193 tlink = cifs_sb_tlink(cifs_sb);
1194 if (IS_ERR(tlink))
1195 return PTR_ERR(tlink);
1196 tcon = tlink_tcon(tlink);
1197
c483a984
SP
1198 /*
1199 * We cannot rename the file if the server doesn't support
1200 * CAP_INFOLEVEL_PASSTHRU
1201 */
1202 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1203 rc = -EBUSY;
1204 goto out;
1205 }
1206
d81b8a40
PS
1207 oparms.tcon = tcon;
1208 oparms.cifs_sb = cifs_sb;
1209 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1210 oparms.create_options = CREATE_NOT_DIR;
1211 oparms.disposition = FILE_OPEN;
1212 oparms.path = full_path;
1213 oparms.fid = &fid;
1214 oparms.reconnect = false;
1215
1216 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1217 if (rc != 0)
1218 goto out;
1219
3270958b
SF
1220 origattr = cifsInode->cifsAttrs;
1221 if (origattr == 0)
1222 origattr |= ATTR_NORMAL;
1223
1224 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1225 if (dosattr == 0)
1226 dosattr |= ATTR_NORMAL;
1227 dosattr |= ATTR_HIDDEN;
1228
3270958b
SF
1229 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1230 if (dosattr != origattr) {
1231 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1232 if (info_buf == NULL) {
1233 rc = -ENOMEM;
1234 goto out_close;
1235 }
1236 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1237 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1238 current->tgid);
1239 /* although we would like to mark the file hidden
1240 if that fails we will still try to rename it */
72d282dc 1241 if (!rc)
3270958b
SF
1242 cifsInode->cifsAttrs = dosattr;
1243 else
1244 dosattr = origattr; /* since not able to change them */
a12a1ac7 1245 }
a12a1ac7 1246
dd1db2de 1247 /* rename the file */
d81b8a40
PS
1248 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1249 cifs_sb->local_nls,
2baa2682 1250 cifs_remap(cifs_sb));
3270958b 1251 if (rc != 0) {
47c78f4a 1252 rc = -EBUSY;
3270958b
SF
1253 goto undo_setattr;
1254 }
6d22f098 1255
3270958b 1256 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1257 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1258 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1259 current->tgid);
1260 /*
1261 * some samba versions return -ENOENT when we try to set the
1262 * file disposition here. Likely a samba bug, but work around
1263 * it for now. This means that some cifsXXX files may hang
1264 * around after they shouldn't.
1265 *
1266 * BB: remove this hack after more servers have the fix
1267 */
1268 if (rc == -ENOENT)
1269 rc = 0;
1270 else if (rc != 0) {
47c78f4a 1271 rc = -EBUSY;
3270958b
SF
1272 goto undo_rename;
1273 }
aff8d5ca 1274 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1275 }
7ce86d5a 1276
a12a1ac7 1277out_close:
d81b8a40 1278 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1279out:
3270958b 1280 kfree(info_buf);
7ffec372 1281 cifs_put_tlink(tlink);
a12a1ac7 1282 return rc;
3270958b
SF
1283
1284 /*
1285 * reset everything back to the original state. Don't bother
1286 * dealing with errors here since we can't do anything about
1287 * them anyway.
1288 */
1289undo_rename:
d81b8a40 1290 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1291 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1292undo_setattr:
1293 if (dosattr != origattr) {
1294 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1295 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1296 current->tgid))
1297 cifsInode->cifsAttrs = origattr;
1298 }
1299
1300 goto out_close;
a12a1ac7
JL
1301}
1302
b7ca6928
SF
1303/* copied from fs/nfs/dir.c with small changes */
1304static void
1305cifs_drop_nlink(struct inode *inode)
1306{
1307 spin_lock(&inode->i_lock);
1308 if (inode->i_nlink > 0)
1309 drop_nlink(inode);
1310 spin_unlock(&inode->i_lock);
1311}
ff694527
SF
1312
1313/*
2b0143b5 1314 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1315 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1316 * if that fails we can not attempt the fall back mechanisms on EACCESS
1317 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1318 * unlink on negative dentries currently.
1319 */
5f0319a7 1320int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1321{
1322 int rc = 0;
6d5786a3 1323 unsigned int xid;
1da177e4 1324 char *full_path = NULL;
2b0143b5 1325 struct inode *inode = d_inode(dentry);
ff694527 1326 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1327 struct super_block *sb = dir->i_sb;
1328 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1329 struct tcon_link *tlink;
96daf2b0 1330 struct cifs_tcon *tcon;
ed6875e0 1331 struct TCP_Server_Info *server;
6050247d
SF
1332 struct iattr *attrs = NULL;
1333 __u32 dosattr = 0, origattr = 0;
1da177e4 1334
f96637be 1335 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1336
7ffec372
JL
1337 tlink = cifs_sb_tlink(cifs_sb);
1338 if (IS_ERR(tlink))
1339 return PTR_ERR(tlink);
1340 tcon = tlink_tcon(tlink);
ed6875e0 1341 server = tcon->ses->server;
7ffec372 1342
6d5786a3 1343 xid = get_xid();
1da177e4 1344
5f0319a7
JL
1345 /* Unlink can be called from rename so we can not take the
1346 * sb->s_vfs_rename_mutex here */
1347 full_path = build_path_from_dentry(dentry);
1da177e4 1348 if (full_path == NULL) {
0f3bc09e 1349 rc = -ENOMEM;
7ffec372 1350 goto unlink_out;
1da177e4 1351 }
2d785a50 1352
29e20f9c
PS
1353 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1354 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1355 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1356 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1357 cifs_remap(cifs_sb));
f96637be 1358 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1359 if ((rc == 0) || (rc == -ENOENT))
1360 goto psx_del_no_retry;
1361 }
1da177e4 1362
6050247d 1363retry_std_delete:
ed6875e0
PS
1364 if (!server->ops->unlink) {
1365 rc = -ENOSYS;
1366 goto psx_del_no_retry;
1367 }
1368
1369 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1370
2d785a50 1371psx_del_no_retry:
1da177e4 1372 if (!rc) {
5f0319a7 1373 if (inode)
b7ca6928 1374 cifs_drop_nlink(inode);
1da177e4 1375 } else if (rc == -ENOENT) {
5f0319a7 1376 d_drop(dentry);
47c78f4a 1377 } else if (rc == -EBUSY) {
ed6875e0
PS
1378 if (server->ops->rename_pending_delete) {
1379 rc = server->ops->rename_pending_delete(full_path,
1380 dentry, xid);
1381 if (rc == 0)
1382 cifs_drop_nlink(inode);
1383 }
ff694527 1384 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1385 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1386 if (attrs == NULL) {
1387 rc = -ENOMEM;
1388 goto out_reval;
1da177e4 1389 }
388e57b2
SF
1390
1391 /* try to reset dos attributes */
ff694527
SF
1392 cifs_inode = CIFS_I(inode);
1393 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1394 if (origattr == 0)
1395 origattr |= ATTR_NORMAL;
1396 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1397 if (dosattr == 0)
1398 dosattr |= ATTR_NORMAL;
1399 dosattr |= ATTR_HIDDEN;
1400
1401 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1402 if (rc != 0)
1403 goto out_reval;
6050247d
SF
1404
1405 goto retry_std_delete;
1da177e4 1406 }
6050247d
SF
1407
1408 /* undo the setattr if we errored out and it's needed */
1409 if (rc != 0 && dosattr != 0)
1410 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1411
388e57b2 1412out_reval:
4523cc30 1413 if (inode) {
ff694527
SF
1414 cifs_inode = CIFS_I(inode);
1415 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1416 when needed */
e37fea58 1417 inode->i_ctime = current_time(inode);
06bcfedd 1418 }
e37fea58 1419 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1420 cifs_inode = CIFS_I(dir);
6050247d 1421 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1422unlink_out:
1da177e4 1423 kfree(full_path);
6050247d 1424 kfree(attrs);
6d5786a3 1425 free_xid(xid);
7ffec372 1426 cifs_put_tlink(tlink);
1da177e4
LT
1427 return rc;
1428}
1429
ff691e96 1430static int
101b92d9 1431cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1432 const char *full_path, struct cifs_sb_info *cifs_sb,
1433 struct cifs_tcon *tcon, const unsigned int xid)
1434{
1435 int rc = 0;
101b92d9 1436 struct inode *inode = NULL;
ff691e96
PS
1437
1438 if (tcon->unix_ext)
101b92d9 1439 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1440 xid);
1441 else
101b92d9
JL
1442 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1443 xid, NULL);
1444
ff691e96
PS
1445 if (rc)
1446 return rc;
1447
ff691e96
PS
1448 /*
1449 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1450 * from the server or was set bogus. Also, since this is a brand new
1451 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1452 */
101b92d9
JL
1453 if (inode->i_nlink < 2)
1454 set_nlink(inode, 2);
ff691e96
PS
1455 mode &= ~current_umask();
1456 /* must turn on setgid bit if parent dir has it */
101b92d9 1457 if (parent->i_mode & S_ISGID)
ff691e96
PS
1458 mode |= S_ISGID;
1459
1460 if (tcon->unix_ext) {
1461 struct cifs_unix_set_info_args args = {
1462 .mode = mode,
1463 .ctime = NO_CHANGE_64,
1464 .atime = NO_CHANGE_64,
1465 .mtime = NO_CHANGE_64,
1466 .device = 0,
1467 };
1468 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1469 args.uid = current_fsuid();
101b92d9 1470 if (parent->i_mode & S_ISGID)
49418b2c 1471 args.gid = parent->i_gid;
ff691e96 1472 else
49418b2c 1473 args.gid = current_fsgid();
ff691e96 1474 } else {
49418b2c
EB
1475 args.uid = INVALID_UID; /* no change */
1476 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1477 }
1478 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1479 cifs_sb->local_nls,
2baa2682 1480 cifs_remap(cifs_sb));
ff691e96 1481 } else {
f436720e 1482 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1483 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1484 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1485 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1486 tcon, xid);
101b92d9
JL
1487 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1488 inode->i_mode = (mode | S_IFDIR);
1489
1490 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1491 inode->i_uid = current_fsuid();
1492 if (inode->i_mode & S_ISGID)
1493 inode->i_gid = parent->i_gid;
1494 else
1495 inode->i_gid = current_fsgid();
ff691e96
PS
1496 }
1497 }
101b92d9 1498 d_instantiate(dentry, inode);
ff691e96
PS
1499 return rc;
1500}
1501
1502static int
1503cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1504 const char *full_path, struct cifs_sb_info *cifs_sb,
1505 struct cifs_tcon *tcon, const unsigned int xid)
1506{
1507 int rc = 0;
1508 u32 oplock = 0;
1509 FILE_UNIX_BASIC_INFO *info = NULL;
1510 struct inode *newinode = NULL;
1511 struct cifs_fattr fattr;
1512
1513 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1514 if (info == NULL) {
1515 rc = -ENOMEM;
1516 goto posix_mkdir_out;
1517 }
1518
1519 mode &= ~current_umask();
1520 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1521 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1522 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1523 if (rc == -EOPNOTSUPP)
1524 goto posix_mkdir_out;
1525 else if (rc) {
f96637be 1526 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1527 d_drop(dentry);
1528 goto posix_mkdir_out;
1529 }
1530
1531 if (info->Type == cpu_to_le32(-1))
1532 /* no return info, go query for it */
1533 goto posix_mkdir_get_info;
1534 /*
1535 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1536 * need to set uid/gid.
1537 */
1538
1539 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1540 cifs_fill_uniqueid(inode->i_sb, &fattr);
1541 newinode = cifs_iget(inode->i_sb, &fattr);
1542 if (!newinode)
1543 goto posix_mkdir_get_info;
1544
1545 d_instantiate(dentry, newinode);
1546
1547#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1548 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1549 dentry, dentry, newinode);
ff691e96
PS
1550
1551 if (newinode->i_nlink != 2)
f96637be
JP
1552 cifs_dbg(FYI, "unexpected number of links %d\n",
1553 newinode->i_nlink);
ff691e96
PS
1554#endif
1555
1556posix_mkdir_out:
1557 kfree(info);
1558 return rc;
1559posix_mkdir_get_info:
1560 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1561 xid);
1562 goto posix_mkdir_out;
1563}
1564
18bb1db3 1565int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1566{
ff691e96 1567 int rc = 0;
6d5786a3 1568 unsigned int xid;
1da177e4 1569 struct cifs_sb_info *cifs_sb;
7ffec372 1570 struct tcon_link *tlink;
29e20f9c 1571 struct cifs_tcon *tcon;
f436720e 1572 struct TCP_Server_Info *server;
ff691e96 1573 char *full_path;
1da177e4 1574
f96637be
JP
1575 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1576 mode, inode);
1da177e4 1577
1da177e4 1578 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1579 tlink = cifs_sb_tlink(cifs_sb);
1580 if (IS_ERR(tlink))
1581 return PTR_ERR(tlink);
29e20f9c 1582 tcon = tlink_tcon(tlink);
7ffec372 1583
6d5786a3 1584 xid = get_xid();
1da177e4 1585
7f57356b 1586 full_path = build_path_from_dentry(direntry);
1da177e4 1587 if (full_path == NULL) {
0f3bc09e 1588 rc = -ENOMEM;
7ffec372 1589 goto mkdir_out;
1da177e4 1590 }
50c2f753 1591
bea851b8
SF
1592 server = tcon->ses->server;
1593
bea851b8
SF
1594 if ((server->ops->posix_mkdir) && (tcon->posix_extensions)) {
1595 rc = server->ops->posix_mkdir(xid, inode, mode, tcon, full_path,
1596 cifs_sb);
1597 d_drop(direntry); /* for time being always refresh inode info */
1598 goto mkdir_out;
1599 }
bea851b8 1600
29e20f9c
PS
1601 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1602 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1603 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1604 tcon, xid);
1605 if (rc != -EOPNOTSUPP)
2dd29d31 1606 goto mkdir_out;
fb8c4b14 1607 }
ff691e96 1608
f436720e
PS
1609 if (!server->ops->mkdir) {
1610 rc = -ENOSYS;
1611 goto mkdir_out;
1612 }
1613
1da177e4 1614 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1615 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1616 if (rc) {
f96637be 1617 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1618 d_drop(direntry);
ff691e96 1619 goto mkdir_out;
1da177e4 1620 }
ff691e96
PS
1621
1622 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1623 xid);
fb8c4b14 1624mkdir_out:
6de2ce42
PS
1625 /*
1626 * Force revalidate to get parent dir info when needed since cached
1627 * attributes are invalid now.
1628 */
1629 CIFS_I(inode)->time = 0;
1da177e4 1630 kfree(full_path);
6d5786a3 1631 free_xid(xid);
7ffec372 1632 cifs_put_tlink(tlink);
1da177e4
LT
1633 return rc;
1634}
1635
1636int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1637{
1638 int rc = 0;
6d5786a3 1639 unsigned int xid;
1da177e4 1640 struct cifs_sb_info *cifs_sb;
7ffec372 1641 struct tcon_link *tlink;
f958ca5d
PS
1642 struct cifs_tcon *tcon;
1643 struct TCP_Server_Info *server;
1da177e4
LT
1644 char *full_path = NULL;
1645 struct cifsInodeInfo *cifsInode;
1646
f96637be 1647 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1648
6d5786a3 1649 xid = get_xid();
1da177e4 1650
7f57356b 1651 full_path = build_path_from_dentry(direntry);
1da177e4 1652 if (full_path == NULL) {
0f3bc09e 1653 rc = -ENOMEM;
7ffec372 1654 goto rmdir_exit;
1da177e4
LT
1655 }
1656
7ffec372
JL
1657 cifs_sb = CIFS_SB(inode->i_sb);
1658 tlink = cifs_sb_tlink(cifs_sb);
1659 if (IS_ERR(tlink)) {
1660 rc = PTR_ERR(tlink);
1661 goto rmdir_exit;
1662 }
f958ca5d
PS
1663 tcon = tlink_tcon(tlink);
1664 server = tcon->ses->server;
1665
1666 if (!server->ops->rmdir) {
1667 rc = -ENOSYS;
1668 cifs_put_tlink(tlink);
1669 goto rmdir_exit;
1670 }
7ffec372 1671
f958ca5d 1672 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1673 cifs_put_tlink(tlink);
1da177e4
LT
1674
1675 if (!rc) {
2b0143b5
DH
1676 spin_lock(&d_inode(direntry)->i_lock);
1677 i_size_write(d_inode(direntry), 0);
1678 clear_nlink(d_inode(direntry));
1679 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1680 }
1681
2b0143b5 1682 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1683 /* force revalidate to go get info when needed */
1684 cifsInode->time = 0;
42c24544
SF
1685
1686 cifsInode = CIFS_I(inode);
6de2ce42
PS
1687 /*
1688 * Force revalidate to get parent dir info when needed since cached
1689 * attributes are invalid now.
1690 */
1691 cifsInode->time = 0;
42c24544 1692
2b0143b5 1693 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1694 current_time(inode);
1da177e4 1695
7ffec372 1696rmdir_exit:
1da177e4 1697 kfree(full_path);
6d5786a3 1698 free_xid(xid);
1da177e4
LT
1699 return rc;
1700}
1701
ee2fd967 1702static int
8ceb9843
PS
1703cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1704 const char *from_path, struct dentry *to_dentry,
1705 const char *to_path)
ee2fd967
SF
1706{
1707 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1708 struct tcon_link *tlink;
8ceb9843
PS
1709 struct cifs_tcon *tcon;
1710 struct TCP_Server_Info *server;
d81b8a40
PS
1711 struct cifs_fid fid;
1712 struct cifs_open_parms oparms;
ee2fd967
SF
1713 int oplock, rc;
1714
7ffec372
JL
1715 tlink = cifs_sb_tlink(cifs_sb);
1716 if (IS_ERR(tlink))
1717 return PTR_ERR(tlink);
8ceb9843
PS
1718 tcon = tlink_tcon(tlink);
1719 server = tcon->ses->server;
1720
1721 if (!server->ops->rename)
1722 return -ENOSYS;
7ffec372 1723
ee2fd967 1724 /* try path-based rename first */
8ceb9843 1725 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1726
1727 /*
8ceb9843
PS
1728 * Don't bother with rename by filehandle unless file is busy and
1729 * source. Note that cross directory moves do not work with
ee2fd967
SF
1730 * rename by filehandle to various Windows servers.
1731 */
47c78f4a 1732 if (rc == 0 || rc != -EBUSY)
7ffec372 1733 goto do_rename_exit;
ee2fd967 1734
ed0e3ace
JL
1735 /* open-file renames don't work across directories */
1736 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1737 goto do_rename_exit;
ed0e3ace 1738
d81b8a40
PS
1739 oparms.tcon = tcon;
1740 oparms.cifs_sb = cifs_sb;
ee2fd967 1741 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1742 oparms.desired_access = DELETE;
1743 oparms.create_options = CREATE_NOT_DIR;
1744 oparms.disposition = FILE_OPEN;
1745 oparms.path = from_path;
1746 oparms.fid = &fid;
1747 oparms.reconnect = false;
1748
1749 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1750 if (rc == 0) {
d81b8a40 1751 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1752 (const char *) to_dentry->d_name.name,
2baa2682 1753 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1754 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1755 }
7ffec372
JL
1756do_rename_exit:
1757 cifs_put_tlink(tlink);
ee2fd967
SF
1758 return rc;
1759}
1760
8ceb9843 1761int
7c33d597
MS
1762cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1763 struct inode *target_dir, struct dentry *target_dentry,
1764 unsigned int flags)
1da177e4 1765{
8ceb9843
PS
1766 char *from_name = NULL;
1767 char *to_name = NULL;
639e7a91 1768 struct cifs_sb_info *cifs_sb;
7ffec372 1769 struct tcon_link *tlink;
96daf2b0 1770 struct cifs_tcon *tcon;
ee2fd967
SF
1771 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1772 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1773 unsigned int xid;
1774 int rc, tmprc;
1da177e4 1775
7c33d597
MS
1776 if (flags & ~RENAME_NOREPLACE)
1777 return -EINVAL;
1778
639e7a91 1779 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1780 tlink = cifs_sb_tlink(cifs_sb);
1781 if (IS_ERR(tlink))
1782 return PTR_ERR(tlink);
1783 tcon = tlink_tcon(tlink);
1da177e4 1784
6d5786a3 1785 xid = get_xid();
ee2fd967 1786
ee2fd967
SF
1787 /*
1788 * we already have the rename sem so we do not need to
1789 * grab it again here to protect the path integrity
1790 */
8ceb9843
PS
1791 from_name = build_path_from_dentry(source_dentry);
1792 if (from_name == NULL) {
ee2fd967
SF
1793 rc = -ENOMEM;
1794 goto cifs_rename_exit;
1795 }
1796
8ceb9843
PS
1797 to_name = build_path_from_dentry(target_dentry);
1798 if (to_name == NULL) {
1da177e4
LT
1799 rc = -ENOMEM;
1800 goto cifs_rename_exit;
1801 }
1802
8ceb9843
PS
1803 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1804 to_name);
ee2fd967 1805
7c33d597
MS
1806 /*
1807 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1808 */
1809 if (flags & RENAME_NOREPLACE)
1810 goto cifs_rename_exit;
1811
14121bdc
JL
1812 if (rc == -EEXIST && tcon->unix_ext) {
1813 /*
8ceb9843
PS
1814 * Are src and dst hardlinks of same inode? We can only tell
1815 * with unix extensions enabled.
14121bdc
JL
1816 */
1817 info_buf_source =
6da2ec56 1818 kmalloc_array(2, sizeof(FILE_UNIX_BASIC_INFO),
14121bdc
JL
1819 GFP_KERNEL);
1820 if (info_buf_source == NULL) {
1821 rc = -ENOMEM;
1822 goto cifs_rename_exit;
1823 }
1824
1825 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1826 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1827 info_buf_source,
1828 cifs_sb->local_nls,
2baa2682 1829 cifs_remap(cifs_sb));
8d281efb 1830 if (tmprc != 0)
14121bdc 1831 goto unlink_target;
ee2fd967 1832
8ceb9843
PS
1833 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1834 info_buf_target,
1835 cifs_sb->local_nls,
2baa2682 1836 cifs_remap(cifs_sb));
14121bdc 1837
8d281efb 1838 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1839 info_buf_target->UniqueId)) {
14121bdc 1840 /* same file, POSIX says that this is a noop */
ae6884a9 1841 rc = 0;
14121bdc 1842 goto cifs_rename_exit;
ae6884a9 1843 }
8ceb9843
PS
1844 }
1845 /*
1846 * else ... BB we could add the same check for Windows by
1847 * checking the UniqueId via FILE_INTERNAL_INFO
1848 */
14121bdc 1849
ee2fd967 1850unlink_target:
fc6f3943 1851 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1852 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1853 if (d_is_dir(target_dentry))
1854 tmprc = cifs_rmdir(target_dir, target_dentry);
1855 else
1856 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1857 if (tmprc)
1858 goto cifs_rename_exit;
8ceb9843
PS
1859 rc = cifs_do_rename(xid, source_dentry, from_name,
1860 target_dentry, to_name);
1da177e4
LT
1861 }
1862
b46799a8
PS
1863 /* force revalidate to go get info when needed */
1864 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1865
1866 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1867 target_dir->i_mtime = current_time(source_dir);
b46799a8 1868
1da177e4 1869cifs_rename_exit:
ee2fd967 1870 kfree(info_buf_source);
8ceb9843
PS
1871 kfree(from_name);
1872 kfree(to_name);
6d5786a3 1873 free_xid(xid);
7ffec372 1874 cifs_put_tlink(tlink);
1da177e4
LT
1875 return rc;
1876}
1877
df2cf170
JL
1878static bool
1879cifs_inode_needs_reval(struct inode *inode)
1da177e4 1880{
df2cf170 1881 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1882 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1883
57c55cd7
RS
1884 if (cifs_i->time == 0)
1885 return true;
1886
18cceb6a 1887 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1888 return false;
1da177e4 1889
df2cf170
JL
1890 if (!lookupCacheEnabled)
1891 return true;
1da177e4 1892
a87c9ad9
JL
1893 if (!cifs_sb->actimeo)
1894 return true;
1895
6d20e840
SJ
1896 if (!time_in_range(jiffies, cifs_i->time,
1897 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1898 return true;
1899
db19272e 1900 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1901 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1902 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1903 return true;
1904
df2cf170
JL
1905 return false;
1906}
1907
523fb8c8
SJ
1908/*
1909 * Zap the cache. Called when invalid_mapping flag is set.
1910 */
6feb9891 1911int
df2cf170
JL
1912cifs_invalidate_mapping(struct inode *inode)
1913{
6feb9891 1914 int rc = 0;
df2cf170 1915
df2cf170 1916 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1917 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1918 if (rc)
f96637be
JP
1919 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1920 __func__, inode);
df2cf170 1921 }
257fb1f1 1922
9451a9a5 1923 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1924 return rc;
df2cf170
JL
1925}
1926
4f73c7d3
JL
1927/**
1928 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1929 * @word: long word containing the bit lock
1930 */
1931static int
dfd01f02 1932cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1933{
4f73c7d3 1934 freezable_schedule_unsafe();
dfd01f02
PZ
1935 if (signal_pending_state(mode, current))
1936 return -ERESTARTSYS;
4f73c7d3
JL
1937 return 0;
1938}
1939
e284e53f
JL
1940int
1941cifs_revalidate_mapping(struct inode *inode)
1942{
4f73c7d3
JL
1943 int rc;
1944 unsigned long *flags = &CIFS_I(inode)->flags;
1945
74316201
N
1946 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1947 TASK_KILLABLE);
4f73c7d3
JL
1948 if (rc)
1949 return rc;
1950
1951 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1952 rc = cifs_invalidate_mapping(inode);
1953 if (rc)
1954 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1955 }
1956
1957 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1958 smp_mb__after_atomic();
4f73c7d3
JL
1959 wake_up_bit(flags, CIFS_INO_LOCK);
1960
1961 return rc;
1962}
1963
1964int
1965cifs_zap_mapping(struct inode *inode)
1966{
1967 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1968 return cifs_revalidate_mapping(inode);
e284e53f
JL
1969}
1970
6feb9891 1971int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1972{
1973 int rc = 0;
496ad9aa 1974 struct inode *inode = file_inode(filp);
ba00ba64 1975 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1976
1977 if (!cifs_inode_needs_reval(inode))
6feb9891 1978 return rc;
abab095d 1979
13cfb733 1980 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1981 rc = cifs_get_file_info_unix(filp);
1982 else
1983 rc = cifs_get_file_info(filp);
1984
abab095d
JL
1985 return rc;
1986}
1987
6feb9891 1988int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1989{
6d5786a3 1990 unsigned int xid;
df2cf170 1991 int rc = 0;
2b0143b5 1992 struct inode *inode = d_inode(dentry);
df2cf170 1993 struct super_block *sb = dentry->d_sb;
6feb9891 1994 char *full_path = NULL;
df2cf170
JL
1995
1996 if (inode == NULL)
1997 return -ENOENT;
1da177e4 1998
df2cf170 1999 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
2000 return rc;
2001
6d5786a3 2002 xid = get_xid();
1da177e4
LT
2003
2004 /* can not safely grab the rename sem here if rename calls revalidate
2005 since that would deadlock */
df2cf170 2006 full_path = build_path_from_dentry(dentry);
1da177e4 2007 if (full_path == NULL) {
0f3bc09e 2008 rc = -ENOMEM;
6feb9891 2009 goto out;
1da177e4
LT
2010 }
2011
f96637be
JP
2012 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
2013 full_path, inode, inode->i_count.counter,
a00be0e3 2014 dentry, cifs_get_time(dentry), jiffies);
1da177e4 2015
0d424ad0 2016 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
2017 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
2018 else
2019 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
2020 xid, NULL);
1da177e4 2021
6feb9891 2022out:
1da177e4 2023 kfree(full_path);
6d5786a3 2024 free_xid(xid);
1da177e4
LT
2025 return rc;
2026}
2027
6feb9891
PS
2028int cifs_revalidate_file(struct file *filp)
2029{
2030 int rc;
496ad9aa 2031 struct inode *inode = file_inode(filp);
6feb9891
PS
2032
2033 rc = cifs_revalidate_file_attr(filp);
2034 if (rc)
2035 return rc;
2036
e284e53f 2037 return cifs_revalidate_mapping(inode);
6feb9891
PS
2038}
2039
2040/* revalidate a dentry's inode attributes */
2041int cifs_revalidate_dentry(struct dentry *dentry)
2042{
2043 int rc;
2b0143b5 2044 struct inode *inode = d_inode(dentry);
6feb9891
PS
2045
2046 rc = cifs_revalidate_dentry_attr(dentry);
2047 if (rc)
2048 return rc;
2049
e284e53f 2050 return cifs_revalidate_mapping(inode);
6feb9891
PS
2051}
2052
a528d35e
DH
2053int cifs_getattr(const struct path *path, struct kstat *stat,
2054 u32 request_mask, unsigned int flags)
1da177e4 2055{
a528d35e 2056 struct dentry *dentry = path->dentry;
3aa1c8c2 2057 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2058 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2059 struct inode *inode = d_inode(dentry);
6feb9891 2060 int rc;
3aa1c8c2 2061
6feb9891
PS
2062 /*
2063 * We need to be sure that all dirty pages are written and the server
2064 * has actual ctime, mtime and file length.
2065 */
18cceb6a 2066 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2067 inode->i_mapping->nrpages != 0) {
2068 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2069 if (rc) {
2070 mapping_set_error(inode->i_mapping, rc);
2071 return rc;
2072 }
6feb9891 2073 }
1c456013 2074
6feb9891
PS
2075 rc = cifs_revalidate_dentry_attr(dentry);
2076 if (rc)
2077 return rc;
2078
2079 generic_fillattr(inode, stat);
2080 stat->blksize = CIFS_MAX_MSGSIZE;
2081 stat->ino = CIFS_I(inode)->uniqueid;
2082
6e70e26d
SF
2083 /* old CIFS Unix Extensions doesn't return create time */
2084 if (CIFS_I(inode)->createtime) {
2085 stat->result_mask |= STATX_BTIME;
95390201
AB
2086 stat->btime =
2087 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
6e70e26d
SF
2088 }
2089
2090 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2091 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2092 stat->attributes |= STATX_ATTR_COMPRESSED;
2093 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2094 stat->attributes |= STATX_ATTR_ENCRYPTED;
2095
6feb9891 2096 /*
d3d1fce1
JL
2097 * If on a multiuser mount without unix extensions or cifsacl being
2098 * enabled, and the admin hasn't overridden them, set the ownership
2099 * to the fsuid/fsgid of the current process.
6feb9891
PS
2100 */
2101 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2102 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2103 !tcon->unix_ext) {
2104 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2105 stat->uid = current_fsuid();
2106 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2107 stat->gid = current_fsgid();
5fe14c85 2108 }
6feb9891 2109 return rc;
1da177e4
LT
2110}
2111
2112static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2113{
09cbfeaf
KS
2114 pgoff_t index = from >> PAGE_SHIFT;
2115 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2116 struct page *page;
1da177e4
LT
2117 int rc = 0;
2118
2119 page = grab_cache_page(mapping, index);
2120 if (!page)
2121 return -ENOMEM;
2122
09cbfeaf 2123 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2124 unlock_page(page);
09cbfeaf 2125 put_page(page);
1da177e4
LT
2126 return rc;
2127}
2128
1b947463 2129static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2130{
57c55cd7
RS
2131 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2132
ba6a46a0 2133 spin_lock(&inode->i_lock);
3677db10 2134 i_size_write(inode, offset);
ba6a46a0 2135 spin_unlock(&inode->i_lock);
1b947463 2136
57c55cd7
RS
2137 /* Cached inode must be refreshed on truncate */
2138 cifs_i->time = 0;
7caef267 2139 truncate_pagecache(inode, offset);
3677db10
SF
2140}
2141
8efdbde6
JL
2142static int
2143cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2144 unsigned int xid, char *full_path)
8efdbde6
JL
2145{
2146 int rc;
2147 struct cifsFileInfo *open_file;
2148 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2149 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2150 struct tcon_link *tlink = NULL;
d1433418
PS
2151 struct cifs_tcon *tcon = NULL;
2152 struct TCP_Server_Info *server;
8efdbde6
JL
2153
2154 /*
2155 * To avoid spurious oplock breaks from server, in the case of
2156 * inodes that we already have open, avoid doing path based
2157 * setting of file size if we can do it by handle.
2158 * This keeps our caching token (oplock) and avoids timeouts
2159 * when the local oplock break takes longer to flush
2160 * writebehind data than the SMB timeout for the SetPathInfo
2161 * request would allow
2162 */
6508d904 2163 open_file = find_writable_file(cifsInode, true);
8efdbde6 2164 if (open_file) {
d1433418
PS
2165 tcon = tlink_tcon(open_file->tlink);
2166 server = tcon->ses->server;
2167 if (server->ops->set_file_size)
2168 rc = server->ops->set_file_size(xid, tcon, open_file,
2169 attrs->ia_size, false);
2170 else
2171 rc = -ENOSYS;
6ab409b5 2172 cifsFileInfo_put(open_file);
f96637be 2173 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2174 } else
2175 rc = -EINVAL;
2176
d1433418
PS
2177 if (!rc)
2178 goto set_size_out;
2179
2180 if (tcon == NULL) {
2181 tlink = cifs_sb_tlink(cifs_sb);
2182 if (IS_ERR(tlink))
2183 return PTR_ERR(tlink);
2184 tcon = tlink_tcon(tlink);
2185 server = tcon->ses->server;
2186 }
ba00ba64 2187
d1433418
PS
2188 /*
2189 * Set file size by pathname rather than by handle either because no
2190 * valid, writeable file handle for it was found or because there was
2191 * an error setting it by handle.
2192 */
2193 if (server->ops->set_path_size)
2194 rc = server->ops->set_path_size(xid, tcon, full_path,
2195 attrs->ia_size, cifs_sb, false);
2196 else
2197 rc = -ENOSYS;
f96637be 2198 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2199
d1433418
PS
2200 if (tlink)
2201 cifs_put_tlink(tlink);
8efdbde6 2202
d1433418 2203set_size_out:
8efdbde6 2204 if (rc == 0) {
fbec9ab9 2205 cifsInode->server_eof = attrs->ia_size;
1b947463 2206 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2207 cifs_truncate_page(inode->i_mapping, inode->i_size);
2208 }
2209
2210 return rc;
2211}
2212
3fe5c1dd
JL
2213static int
2214cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2215{
2216 int rc;
6d5786a3 2217 unsigned int xid;
3fe5c1dd 2218 char *full_path = NULL;
2b0143b5 2219 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2220 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2221 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2222 struct tcon_link *tlink;
96daf2b0 2223 struct cifs_tcon *pTcon;
3fe5c1dd 2224 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2225 struct cifsFileInfo *open_file;
3fe5c1dd 2226
35c265e0
AV
2227 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2228 direntry, attrs->ia_valid);
3fe5c1dd 2229
6d5786a3 2230 xid = get_xid();
3fe5c1dd 2231
db78b877
CH
2232 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2233 attrs->ia_valid |= ATTR_FORCE;
2234
31051c85 2235 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2236 if (rc < 0)
2237 goto out;
3fe5c1dd
JL
2238
2239 full_path = build_path_from_dentry(direntry);
2240 if (full_path == NULL) {
2241 rc = -ENOMEM;
2242 goto out;
2243 }
2244
0f4d634c
JL
2245 /*
2246 * Attempt to flush data before changing attributes. We need to do
2247 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2248 * ownership or mode then we may also need to do this. Here, we take
2249 * the safe way out and just do the flush on all setattr requests. If
2250 * the flush returns error, store it to report later and continue.
2251 *
2252 * BB: This should be smarter. Why bother flushing pages that
2253 * will be truncated anyway? Also, should we error out here if
2254 * the flush returns error?
2255 */
2256 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2257 mapping_set_error(inode->i_mapping, rc);
2258 rc = 0;
3fe5c1dd
JL
2259
2260 if (attrs->ia_valid & ATTR_SIZE) {
2261 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2262 if (rc != 0)
2263 goto out;
2264 }
2265
2266 /* skip mode change if it's just for clearing setuid/setgid */
2267 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2268 attrs->ia_valid &= ~ATTR_MODE;
2269
2270 args = kmalloc(sizeof(*args), GFP_KERNEL);
2271 if (args == NULL) {
2272 rc = -ENOMEM;
2273 goto out;
2274 }
2275
2276 /* set up the struct */
2277 if (attrs->ia_valid & ATTR_MODE)
2278 args->mode = attrs->ia_mode;
2279 else
2280 args->mode = NO_CHANGE_64;
2281
2282 if (attrs->ia_valid & ATTR_UID)
2283 args->uid = attrs->ia_uid;
2284 else
49418b2c 2285 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2286
2287 if (attrs->ia_valid & ATTR_GID)
2288 args->gid = attrs->ia_gid;
2289 else
49418b2c 2290 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2291
2292 if (attrs->ia_valid & ATTR_ATIME)
95390201 2293 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
3fe5c1dd
JL
2294 else
2295 args->atime = NO_CHANGE_64;
2296
2297 if (attrs->ia_valid & ATTR_MTIME)
95390201 2298 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
3fe5c1dd
JL
2299 else
2300 args->mtime = NO_CHANGE_64;
2301
2302 if (attrs->ia_valid & ATTR_CTIME)
95390201 2303 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
3fe5c1dd
JL
2304 else
2305 args->ctime = NO_CHANGE_64;
2306
2307 args->device = 0;
6508d904 2308 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2309 if (open_file) {
4b4de76e 2310 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2311 u32 npid = open_file->pid;
13cfb733 2312 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2313 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2314 cifsFileInfo_put(open_file);
3bbeeb3c 2315 } else {
7ffec372
JL
2316 tlink = cifs_sb_tlink(cifs_sb);
2317 if (IS_ERR(tlink)) {
2318 rc = PTR_ERR(tlink);
2319 goto out;
2320 }
2321 pTcon = tlink_tcon(tlink);
3bbeeb3c 2322 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2323 cifs_sb->local_nls,
bc8ebdc4 2324 cifs_remap(cifs_sb));
7ffec372 2325 cifs_put_tlink(tlink);
3bbeeb3c 2326 }
3fe5c1dd 2327
1025774c
CH
2328 if (rc)
2329 goto out;
ccd4bb1b 2330
1025774c 2331 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2332 attrs->ia_size != i_size_read(inode))
2333 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2334
2335 setattr_copy(inode, attrs);
2336 mark_inode_dirty(inode);
2337
2338 /* force revalidate when any of these times are set since some
2339 of the fs types (eg ext3, fat) do not have fine enough
2340 time granularity to match protocol, and we do not have a
2341 a way (yet) to query the server fs's time granularity (and
2342 whether it rounds times down).
2343 */
2344 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2345 cifsInode->time = 0;
3fe5c1dd
JL
2346out:
2347 kfree(args);
2348 kfree(full_path);
6d5786a3 2349 free_xid(xid);
3fe5c1dd
JL
2350 return rc;
2351}
2352
0510eeb7
JL
2353static int
2354cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2355{
6d5786a3 2356 unsigned int xid;
8abf2775
EB
2357 kuid_t uid = INVALID_UID;
2358 kgid_t gid = INVALID_GID;
2b0143b5 2359 struct inode *inode = d_inode(direntry);
3fe5c1dd 2360 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2361 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2362 char *full_path = NULL;
2363 int rc = -EACCES;
feb3e20c 2364 __u32 dosattr = 0;
4e1e7fb9 2365 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2366
6d5786a3 2367 xid = get_xid();
1da177e4 2368
35c265e0
AV
2369 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2370 direntry, attrs->ia_valid);
6473a559 2371
db78b877
CH
2372 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2373 attrs->ia_valid |= ATTR_FORCE;
2374
31051c85 2375 rc = setattr_prepare(direntry, attrs);
db78b877 2376 if (rc < 0) {
6d5786a3 2377 free_xid(xid);
db78b877 2378 return rc;
6473a559 2379 }
50c2f753 2380
7f57356b 2381 full_path = build_path_from_dentry(direntry);
1da177e4 2382 if (full_path == NULL) {
0f3bc09e 2383 rc = -ENOMEM;
6d5786a3 2384 free_xid(xid);
0f3bc09e 2385 return rc;
1da177e4 2386 }
1da177e4 2387
0f4d634c
JL
2388 /*
2389 * Attempt to flush data before changing attributes. We need to do
2390 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2391 * ownership or mode then we may also need to do this. Here, we take
2392 * the safe way out and just do the flush on all setattr requests. If
2393 * the flush returns error, store it to report later and continue.
2394 *
2395 * BB: This should be smarter. Why bother flushing pages that
2396 * will be truncated anyway? Also, should we error out here if
2397 * the flush returns error?
2398 */
2399 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2400 mapping_set_error(inode->i_mapping, rc);
2401 rc = 0;
cea21805 2402
50531444 2403 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2404 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2405 if (rc != 0)
e30dcf3a 2406 goto cifs_setattr_exit;
1da177e4 2407 }
4ca691a8 2408
a5ff3769
SP
2409 if (attrs->ia_valid & ATTR_UID)
2410 uid = attrs->ia_uid;
2411
2412 if (attrs->ia_valid & ATTR_GID)
2413 gid = attrs->ia_gid;
2414
2415#ifdef CONFIG_CIFS_ACL
2416 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2417 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2418 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2419 uid, gid);
2420 if (rc) {
f96637be
JP
2421 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2422 __func__, rc);
a5ff3769
SP
2423 goto cifs_setattr_exit;
2424 }
2425 }
2426 } else
2427#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2428 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2429 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2430
d32c4f26
JL
2431 /* skip mode change if it's just for clearing setuid/setgid */
2432 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2433 attrs->ia_valid &= ~ATTR_MODE;
2434
1da177e4 2435 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2436 mode = attrs->ia_mode;
cdbce9c8 2437 rc = 0;
79df1bae 2438#ifdef CONFIG_CIFS_ACL
78415d2d 2439 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2440 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2441 INVALID_UID, INVALID_GID);
78415d2d 2442 if (rc) {
f96637be
JP
2443 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2444 __func__, rc);
78415d2d
SP
2445 goto cifs_setattr_exit;
2446 }
2447 } else
79df1bae 2448#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2449 if (((mode & S_IWUGO) == 0) &&
2450 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2451
2452 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2453
5132861a
JL
2454 /* fix up mode if we're not using dynperm */
2455 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2456 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2457 } else if ((mode & S_IWUGO) &&
2458 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2459
2460 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2461 /* Attributes of 0 are ignored */
2462 if (dosattr == 0)
2463 dosattr |= ATTR_NORMAL;
5132861a
JL
2464
2465 /* reset local inode permissions to normal */
2466 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2467 attrs->ia_mode &= ~(S_IALLUGO);
2468 if (S_ISDIR(inode->i_mode))
2469 attrs->ia_mode |=
2470 cifs_sb->mnt_dir_mode;
2471 else
2472 attrs->ia_mode |=
2473 cifs_sb->mnt_file_mode;
2474 }
2475 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2476 /* ignore mode change - ATTR_READONLY hasn't changed */
2477 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2478 }
1da177e4
LT
2479 }
2480
feb3e20c
JL
2481 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2482 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2483 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2484 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2485
e30dcf3a
SF
2486 /* Even if error on time set, no sense failing the call if
2487 the server would set the time to a reasonable value anyway,
2488 and this check ensures that we are not being called from
2489 sys_utimes in which case we ought to fail the call back to
2490 the user when the server rejects the call */
fb8c4b14 2491 if ((rc) && (attrs->ia_valid &
feb3e20c 2492 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2493 rc = 0;
1da177e4
LT
2494 }
2495
2496 /* do not need local check to inode_check_ok since the server does
2497 that */
1025774c
CH
2498 if (rc)
2499 goto cifs_setattr_exit;
2500
2501 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2502 attrs->ia_size != i_size_read(inode))
2503 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2504
2505 setattr_copy(inode, attrs);
2506 mark_inode_dirty(inode);
1025774c 2507
e30dcf3a 2508cifs_setattr_exit:
1da177e4 2509 kfree(full_path);
6d5786a3 2510 free_xid(xid);
1da177e4
LT
2511 return rc;
2512}
2513
0510eeb7
JL
2514int
2515cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2516{
fc64005c 2517 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2518 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2519
2520 if (pTcon->unix_ext)
2521 return cifs_setattr_unix(direntry, attrs);
2522
2523 return cifs_setattr_nounix(direntry, attrs);
2524
2525 /* BB: add cifs_setattr_legacy for really old servers */
2526}
2527
99ee4dbd 2528#if 0
1da177e4
LT
2529void cifs_delete_inode(struct inode *inode)
2530{
f96637be 2531 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2532 /* may have to add back in if and when safe distributed caching of
2533 directories added e.g. via FindNotify */
2534}
99ee4dbd 2535#endif