cifs: auto disable 'serverino' in dfs mounts
[linux-2.6-block.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
95390201 116 if (timespec64_equal(&inode->i_mtime, &fattr->cf_mtime) &&
df2cf170 117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
9b9c5bea
SF
165 /* we do not want atime to be less than mtime, it broke some apps */
166 if (timespec64_compare(&fattr->cf_atime, &fattr->cf_mtime))
167 inode->i_atime = fattr->cf_mtime;
168 else
169 inode->i_atime = fattr->cf_atime;
95390201
AB
170 inode->i_mtime = fattr->cf_mtime;
171 inode->i_ctime = fattr->cf_ctime;
cc0bad75 172 inode->i_rdev = fattr->cf_rdev;
74d290da 173 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
174 inode->i_uid = fattr->cf_uid;
175 inode->i_gid = fattr->cf_gid;
176
0b8f18e3
JL
177 /* if dynperm is set, don't clobber existing mode */
178 if (inode->i_state & I_NEW ||
179 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
180 inode->i_mode = fattr->cf_mode;
181
cc0bad75 182 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 183
0b8f18e3
JL
184 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
185 cifs_i->time = 0;
186 else
187 cifs_i->time = jiffies;
188
aff8d5ca
JL
189 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
190 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
191 else
192 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 193
835a36ca 194 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
195 /*
196 * Can't safely change the file size here if the client is writing to
197 * it due to potential races.
198 */
cc0bad75
JL
199 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
200 i_size_write(inode, fattr->cf_eof);
201
202 /*
203 * i_blocks is not related to (i_size / i_blksize),
204 * but instead 512 byte (2**9) size is required for
205 * calculating num blocks.
206 */
207 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
208 }
209 spin_unlock(&inode->i_lock);
210
01c64fea
DH
211 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
212 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
213 if (inode->i_state & I_NEW)
214 cifs_set_ops(inode);
cc0bad75
JL
215}
216
4065c802
JL
217void
218cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
219{
220 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
221
222 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
223 return;
224
225 fattr->cf_uniqueid = iunique(sb, ROOT_I);
226}
227
cc0bad75
JL
228/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
229void
230cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
231 struct cifs_sb_info *cifs_sb)
232{
233 memset(fattr, 0, sizeof(*fattr));
234 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
235 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
236 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
237
238 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
239 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
240 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
241 /* old POSIX extensions don't get create time */
242
cc0bad75 243 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
244
245 /*
246 * Since we set the inode type below we need to mask off
247 * to avoid strange results if bits set above.
248 */
cc0bad75 249 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
250 switch (le32_to_cpu(info->Type)) {
251 case UNIX_FILE:
cc0bad75
JL
252 fattr->cf_mode |= S_IFREG;
253 fattr->cf_dtype = DT_REG;
75f12983
CH
254 break;
255 case UNIX_SYMLINK:
cc0bad75
JL
256 fattr->cf_mode |= S_IFLNK;
257 fattr->cf_dtype = DT_LNK;
75f12983
CH
258 break;
259 case UNIX_DIR:
cc0bad75
JL
260 fattr->cf_mode |= S_IFDIR;
261 fattr->cf_dtype = DT_DIR;
75f12983
CH
262 break;
263 case UNIX_CHARDEV:
cc0bad75
JL
264 fattr->cf_mode |= S_IFCHR;
265 fattr->cf_dtype = DT_CHR;
266 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
267 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
268 break;
269 case UNIX_BLOCKDEV:
cc0bad75
JL
270 fattr->cf_mode |= S_IFBLK;
271 fattr->cf_dtype = DT_BLK;
272 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
273 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
274 break;
275 case UNIX_FIFO:
cc0bad75
JL
276 fattr->cf_mode |= S_IFIFO;
277 fattr->cf_dtype = DT_FIFO;
75f12983
CH
278 break;
279 case UNIX_SOCKET:
cc0bad75
JL
280 fattr->cf_mode |= S_IFSOCK;
281 fattr->cf_dtype = DT_SOCK;
75f12983
CH
282 break;
283 default:
284 /* safest to call it a file if we do not know */
cc0bad75
JL
285 fattr->cf_mode |= S_IFREG;
286 fattr->cf_dtype = DT_REG;
f96637be 287 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
288 break;
289 }
290
46bbc25f
EB
291 fattr->cf_uid = cifs_sb->mnt_uid;
292 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
293 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
294 if (id < ((uid_t)-1)) {
295 kuid_t uid = make_kuid(&init_user_ns, id);
296 if (uid_valid(uid))
297 fattr->cf_uid = uid;
298 }
46bbc25f
EB
299 }
300
301 fattr->cf_gid = cifs_sb->mnt_gid;
302 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
303 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
304 if (id < ((gid_t)-1)) {
305 kgid_t gid = make_kgid(&init_user_ns, id);
306 if (gid_valid(gid))
307 fattr->cf_gid = gid;
308 }
46bbc25f 309 }
75f12983 310
cc0bad75 311 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
312}
313
b9a3260f 314/*
cc0bad75
JL
315 * Fill a cifs_fattr struct with fake inode info.
316 *
317 * Needed to setup cifs_fattr data for the directory which is the
318 * junction to the new submount (ie to setup the fake directory
319 * which represents a DFS referral).
b9a3260f 320 */
f1230c97 321static void
cc0bad75 322cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 323{
cc0bad75 324 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 325
f96637be 326 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
327
328 memset(fattr, 0, sizeof(*fattr));
329 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
330 fattr->cf_uid = cifs_sb->mnt_uid;
331 fattr->cf_gid = cifs_sb->mnt_gid;
95390201
AB
332 ktime_get_real_ts64(&fattr->cf_mtime);
333 fattr->cf_mtime = timespec64_trunc(fattr->cf_mtime, sb->s_time_gran);
e37fea58 334 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75 335 fattr->cf_nlink = 2;
97aa495a 336 fattr->cf_flags = CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
337}
338
4ad65044
PS
339static int
340cifs_get_file_info_unix(struct file *filp)
abab095d
JL
341{
342 int rc;
6d5786a3 343 unsigned int xid;
abab095d
JL
344 FILE_UNIX_BASIC_INFO find_data;
345 struct cifs_fattr fattr;
496ad9aa 346 struct inode *inode = file_inode(filp);
abab095d 347 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 348 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 349 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 350
6d5786a3 351 xid = get_xid();
4b4de76e 352 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
353 if (!rc) {
354 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
355 } else if (rc == -EREMOTE) {
356 cifs_create_dfs_fattr(&fattr, inode->i_sb);
357 rc = 0;
358 }
359
360 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 361 free_xid(xid);
abab095d
JL
362 return rc;
363}
364
1da177e4 365int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 366 const unsigned char *full_path,
6d5786a3 367 struct super_block *sb, unsigned int xid)
1da177e4 368{
cc0bad75 369 int rc;
0e4bbde9 370 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 371 struct cifs_fattr fattr;
96daf2b0 372 struct cifs_tcon *tcon;
7ffec372 373 struct tcon_link *tlink;
1da177e4 374 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 375
f96637be 376 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 377
7ffec372
JL
378 tlink = cifs_sb_tlink(cifs_sb);
379 if (IS_ERR(tlink))
380 return PTR_ERR(tlink);
381 tcon = tlink_tcon(tlink);
382
1da177e4 383 /* could have done a find first instead but this returns more info */
cc0bad75 384 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 385 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 386 cifs_put_tlink(tlink);
e911d0cc 387
cc0bad75
JL
388 if (!rc) {
389 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
390 } else if (rc == -EREMOTE) {
391 cifs_create_dfs_fattr(&fattr, sb);
392 rc = 0;
393 } else {
394 return rc;
395 }
1da177e4 396
1b12b9c1
SM
397 /* check for Minshall+French symlinks */
398 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
399 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
400 full_path);
1b12b9c1 401 if (tmprc)
cb084b1a 402 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
403 }
404
0e4bbde9 405 if (*pinode == NULL) {
cc0bad75 406 /* get new inode */
4065c802 407 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
408 *pinode = cifs_iget(sb, &fattr);
409 if (!*pinode)
0e4bbde9 410 rc = -ENOMEM;
cc0bad75
JL
411 } else {
412 /* we already have inode, update it */
7196ac11
NA
413
414 /* if uniqueid is different, return error */
415 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
416 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
417 rc = -ESTALE;
418 goto cgiiu_exit;
419 }
420
421 /* if filetype is different, return error */
422 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
423 (fattr.cf_mode & S_IFMT))) {
424 rc = -ESTALE;
425 goto cgiiu_exit;
426 }
427
cc0bad75 428 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 429 }
1da177e4 430
7196ac11 431cgiiu_exit:
1da177e4
LT
432 return rc;
433}
434
0b8f18e3 435static int
0360d605 436cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 437 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
438{
439 int rc;
db8b631d 440 __u32 oplock;
7ffec372 441 struct tcon_link *tlink;
96daf2b0 442 struct cifs_tcon *tcon;
d81b8a40
PS
443 struct cifs_fid fid;
444 struct cifs_open_parms oparms;
d4ffff1f 445 struct cifs_io_parms io_parms;
86c96b4b 446 char buf[24];
d6e2f2a4 447 unsigned int bytes_read;
fb8c4b14 448 char *pbuf;
0360d605 449 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
450
451 pbuf = buf;
452
0b8f18e3
JL
453 fattr->cf_mode &= ~S_IFMT;
454
455 if (fattr->cf_eof == 0) {
456 fattr->cf_mode |= S_IFIFO;
457 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 458 return 0;
0b8f18e3
JL
459 } else if (fattr->cf_eof < 8) {
460 fattr->cf_mode |= S_IFREG;
461 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
462 return -EINVAL; /* EOPNOTSUPP? */
463 }
50c2f753 464
7ffec372
JL
465 tlink = cifs_sb_tlink(cifs_sb);
466 if (IS_ERR(tlink))
467 return PTR_ERR(tlink);
468 tcon = tlink_tcon(tlink);
469
d81b8a40
PS
470 oparms.tcon = tcon;
471 oparms.cifs_sb = cifs_sb;
472 oparms.desired_access = GENERIC_READ;
473 oparms.create_options = CREATE_NOT_DIR;
5e19697b
SF
474 if (backup_cred(cifs_sb))
475 oparms.create_options |= CREATE_OPEN_BACKUP_INTENT;
d81b8a40
PS
476 oparms.disposition = FILE_OPEN;
477 oparms.path = path;
478 oparms.fid = &fid;
479 oparms.reconnect = false;
480
db8b631d
SF
481 if (tcon->ses->server->oplocks)
482 oplock = REQ_OPLOCK;
483 else
484 oplock = 0;
485 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 486 if (rc) {
db8b631d 487 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
488 cifs_put_tlink(tlink);
489 return rc;
490 }
491
492 /* Read header */
d81b8a40 493 io_parms.netfid = fid.netfid;
0360d605
PS
494 io_parms.pid = current->tgid;
495 io_parms.tcon = tcon;
496 io_parms.offset = 0;
497 io_parms.length = 24;
498
db8b631d
SF
499 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
500 &bytes_read, &pbuf, &buf_type);
0360d605
PS
501 if ((rc == 0) && (bytes_read >= 8)) {
502 if (memcmp("IntxBLK", pbuf, 8) == 0) {
503 cifs_dbg(FYI, "Block device\n");
504 fattr->cf_mode |= S_IFBLK;
505 fattr->cf_dtype = DT_BLK;
506 if (bytes_read == 24) {
507 /* we have enough to decode dev num */
508 __u64 mjr; /* major */
509 __u64 mnr; /* minor */
510 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
511 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
512 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 513 }
0360d605
PS
514 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
515 cifs_dbg(FYI, "Char device\n");
516 fattr->cf_mode |= S_IFCHR;
517 fattr->cf_dtype = DT_CHR;
518 if (bytes_read == 24) {
519 /* we have enough to decode dev num */
520 __u64 mjr; /* major */
521 __u64 mnr; /* minor */
522 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
523 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
524 fattr->cf_rdev = MKDEV(mjr, mnr);
525 }
526 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
527 cifs_dbg(FYI, "Symlink\n");
528 fattr->cf_mode |= S_IFLNK;
529 fattr->cf_dtype = DT_LNK;
3020a1f5 530 } else {
0360d605 531 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 532 fattr->cf_dtype = DT_REG;
0360d605 533 rc = -EOPNOTSUPP;
fb8c4b14 534 }
0360d605
PS
535 } else {
536 fattr->cf_mode |= S_IFREG; /* then it is a file */
537 fattr->cf_dtype = DT_REG;
538 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 539 }
db8b631d
SF
540
541 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 542 cifs_put_tlink(tlink);
d6e2f2a4 543 return rc;
d6e2f2a4
SF
544}
545
9e294f1c
SF
546#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
547
0b8f18e3
JL
548/*
549 * Fetch mode bits as provided by SFU.
550 *
551 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
552 */
553static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 554 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 555{
3020a1f5 556#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
557 ssize_t rc;
558 char ea_value[4];
559 __u32 mode;
7ffec372 560 struct tcon_link *tlink;
96daf2b0 561 struct cifs_tcon *tcon;
7ffec372
JL
562
563 tlink = cifs_sb_tlink(cifs_sb);
564 if (IS_ERR(tlink))
565 return PTR_ERR(tlink);
566 tcon = tlink_tcon(tlink);
9e294f1c 567
d979f3b0
SF
568 if (tcon->ses->server->ops->query_all_EAs == NULL) {
569 cifs_put_tlink(tlink);
570 return -EOPNOTSUPP;
571 }
572
573 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
574 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 575 cifs_sb);
7ffec372 576 cifs_put_tlink(tlink);
4523cc30 577 if (rc < 0)
9e294f1c
SF
578 return (int)rc;
579 else if (rc > 3) {
580 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 581 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
582 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
583 mode, fattr->cf_mode);
0b8f18e3 584 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 585 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 586 }
0b8f18e3
JL
587
588 return 0;
3020a1f5
SF
589#else
590 return -EOPNOTSUPP;
591#endif
9e294f1c
SF
592}
593
0b8f18e3 594/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 595static void
0b8f18e3 596cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 597 struct super_block *sb, bool adjust_tz,
eb85d94b 598 bool symlink)
b9a3260f 599{
e37fea58 600 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 601 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 602
0b8f18e3
JL
603 memset(fattr, 0, sizeof(*fattr));
604 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
605 if (info->DeletePending)
606 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
607
608 if (info->LastAccessTime)
609 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58 610 else {
95390201
AB
611 ktime_get_real_ts64(&fattr->cf_atime);
612 fattr->cf_atime = timespec64_trunc(fattr->cf_atime, sb->s_time_gran);
e37fea58 613 }
0b8f18e3
JL
614
615 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
616 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
617
618 if (adjust_tz) {
0d424ad0
JL
619 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
620 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
621 }
622
623 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
624 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 625 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 626
74d290da 627 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
628
629 if (symlink) {
630 fattr->cf_mode = S_IFLNK;
631 fattr->cf_dtype = DT_LNK;
632 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
633 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
634 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
635 /*
636 * Server can return wrong NumberOfLinks value for directories
637 * when Unix extensions are disabled - fake it.
638 */
74d290da
JM
639 if (!tcon->unix_ext)
640 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
641 } else {
642 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
643 fattr->cf_dtype = DT_REG;
0b8f18e3 644
d0c280d2
JL
645 /* clear write bits if ATTR_READONLY is set */
646 if (fattr->cf_cifsattrs & ATTR_READONLY)
647 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 648
74d290da
JM
649 /*
650 * Don't accept zero nlink from non-unix servers unless
651 * delete is pending. Instead mark it as unknown.
652 */
653 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
654 !info->DeletePending) {
655 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 656 fattr->cf_nlink);
74d290da 657 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 658 }
6de2ce42 659 }
0b8f18e3
JL
660
661 fattr->cf_uid = cifs_sb->mnt_uid;
662 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
663}
664
4ad65044
PS
665static int
666cifs_get_file_info(struct file *filp)
abab095d
JL
667{
668 int rc;
6d5786a3 669 unsigned int xid;
abab095d
JL
670 FILE_ALL_INFO find_data;
671 struct cifs_fattr fattr;
496ad9aa 672 struct inode *inode = file_inode(filp);
c21dfb69 673 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 674 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
675 struct TCP_Server_Info *server = tcon->ses->server;
676
677 if (!server->ops->query_file_info)
678 return -ENOSYS;
abab095d 679
6d5786a3 680 xid = get_xid();
4ad65044 681 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
682 switch (rc) {
683 case 0:
e37fea58 684 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 685 false);
42274bb2
PS
686 break;
687 case -EREMOTE:
688 cifs_create_dfs_fattr(&fattr, inode->i_sb);
689 rc = 0;
690 break;
691 case -EOPNOTSUPP:
692 case -EINVAL:
abab095d
JL
693 /*
694 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
695 * for now, just skip revalidating and mark inode for
696 * immediate reval.
697 */
abab095d
JL
698 rc = 0;
699 CIFS_I(inode)->time = 0;
42274bb2 700 default:
abab095d 701 goto cgfi_exit;
42274bb2 702 }
abab095d
JL
703
704 /*
705 * don't bother with SFU junk here -- just mark inode as needing
706 * revalidation.
707 */
abab095d
JL
708 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
709 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
710 cifs_fattr_to_inode(inode, &fattr);
711cgfi_exit:
6d5786a3 712 free_xid(xid);
abab095d
JL
713 return rc;
714}
715
7ea884c7
SF
716/* Simple function to return a 64 bit hash of string. Rarely called */
717static __u64 simple_hashstr(const char *str)
718{
3995bbf5 719 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
720 __u64 hash = 0;
721
722 while (*str)
723 hash = (hash + (__u64) *str++) * hash_mult;
724
725 return hash;
726}
727
1208ef1f
PS
728int
729cifs_get_inode_info(struct inode **inode, const char *full_path,
730 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 731 const struct cifs_fid *fid)
1da177e4 732{
c052e2b4
SP
733 __u16 srchflgs;
734 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
735 struct cifs_tcon *tcon;
736 struct TCP_Server_Info *server;
7ffec372 737 struct tcon_link *tlink;
1da177e4 738 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 739 char *buf = NULL;
1208ef1f 740 bool adjust_tz = false;
0b8f18e3 741 struct cifs_fattr fattr;
c052e2b4 742 struct cifs_search_info *srchinf = NULL;
eb85d94b 743 bool symlink = false;
1da177e4 744
7ffec372
JL
745 tlink = cifs_sb_tlink(cifs_sb);
746 if (IS_ERR(tlink))
747 return PTR_ERR(tlink);
1208ef1f
PS
748 tcon = tlink_tcon(tlink);
749 server = tcon->ses->server;
7ffec372 750
f96637be 751 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 752
1208ef1f 753 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
754 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
755 CIFS_I(*inode)->time != 0) {
f96637be 756 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 757 goto cgii_exit;
1da177e4
LT
758 }
759 }
760
1208ef1f
PS
761 /* if inode info is not passed, get it from server */
762 if (data == NULL) {
763 if (!server->ops->query_path_info) {
764 rc = -ENOSYS;
765 goto cgii_exit;
766 }
1da177e4 767 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
768 if (buf == NULL) {
769 rc = -ENOMEM;
770 goto cgii_exit;
771 }
1208ef1f
PS
772 data = (FILE_ALL_INFO *)buf;
773 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 774 data, &adjust_tz, &symlink);
1da177e4 775 }
0b8f18e3
JL
776
777 if (!rc) {
e37fea58 778 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 779 symlink);
0b8f18e3
JL
780 } else if (rc == -EREMOTE) {
781 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 782 rc = 0;
1e77a8c2
SF
783 } else if ((rc == -EACCES) && backup_cred(cifs_sb) &&
784 (strcmp(server->vals->version_string, SMB1_VERSION_STRING)
785 == 0)) {
3b7960ca
SF
786 /*
787 * For SMB2 and later the backup intent flag is already
788 * sent if needed on open and there is no path based
789 * FindFirst operation to use to retry with
790 */
791
792 srchinf = kzalloc(sizeof(struct cifs_search_info),
793 GFP_KERNEL);
794 if (srchinf == NULL) {
795 rc = -ENOMEM;
796 goto cgii_exit;
797 }
c052e2b4 798
3b7960ca
SF
799 srchinf->endOfSearch = false;
800 if (tcon->unix_ext)
801 srchinf->info_level = SMB_FIND_FILE_UNIX;
802 else if ((tcon->ses->capabilities &
803 tcon->ses->server->vals->cap_nt_find) == 0)
804 srchinf->info_level = SMB_FIND_FILE_INFO_STANDARD;
805 else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
c052e2b4 806 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
3b7960ca
SF
807 else /* no srvino useful for fallback to some netapp */
808 srchinf->info_level = SMB_FIND_FILE_DIRECTORY_INFO;
c052e2b4 809
3b7960ca
SF
810 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
811 CIFS_SEARCH_CLOSE_AT_END |
812 CIFS_SEARCH_BACKUP_SEARCH;
c052e2b4 813
3b7960ca
SF
814 rc = CIFSFindFirst(xid, tcon, full_path,
815 cifs_sb, NULL, srchflgs, srchinf, false);
816 if (!rc) {
817 data = (FILE_ALL_INFO *)srchinf->srch_entries_start;
c052e2b4 818
3b7960ca
SF
819 cifs_dir_info_to_fattr(&fattr,
820 (FILE_DIRECTORY_INFO *)data, cifs_sb);
821 fattr.cf_uniqueid = le64_to_cpu(
822 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
c052e2b4 823
3b7960ca
SF
824 cifs_buf_release(srchinf->ntwrk_buf_start);
825 }
826 kfree(srchinf);
827 if (rc)
828 goto cgii_exit;
c052e2b4 829 } else
7962670e 830 goto cgii_exit;
1da177e4 831
0b8f18e3
JL
832 /*
833 * If an inode wasn't passed in, then get the inode number
834 *
835 * Is an i_ino of zero legal? Can we use that to check if the server
836 * supports returning inode numbers? Are there other sanity checks we
837 * can use to ensure that the server is really filling in that field?
0b8f18e3 838 */
1208ef1f 839 if (*inode == NULL) {
b9a3260f 840 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
5fc7fcd0
AA
841 if (server->ops->get_srv_inum)
842 tmprc = server->ops->get_srv_inum(xid,
843 tcon, cifs_sb, full_path,
844 &fattr.cf_uniqueid, data);
845 if (tmprc) {
846 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
847 tmprc);
848 fattr.cf_uniqueid = iunique(sb, ROOT_I);
849 cifs_autodisable_serverino(cifs_sb);
850 } else if ((fattr.cf_uniqueid == 0) &&
851 strlen(full_path) == 0) {
852 /* some servers ret bad root ino ie 0 */
853 cifs_dbg(FYI, "Invalid (0) inodenum\n");
854 fattr.cf_flags |=
855 CIFS_FATTR_FAKE_ROOT_INO;
856 fattr.cf_uniqueid =
857 simple_hashstr(tcon->treeName);
132ac7b7 858 }
c052e2b4 859 } else
0b8f18e3 860 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b 861 } else {
5fc7fcd0
AA
862 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
863 && server->ops->get_srv_inum) {
a108471b
RL
864 /*
865 * Pass a NULL tcon to ensure we don't make a round
866 * trip to the server. This only works for SMB2+.
867 */
868 tmprc = server->ops->get_srv_inum(xid,
869 NULL, cifs_sb, full_path,
870 &fattr.cf_uniqueid, data);
871 if (tmprc)
872 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
873 else if ((fattr.cf_uniqueid == 0) &&
874 strlen(full_path) == 0) {
875 /*
876 * Reuse existing root inode num since
877 * inum zero for root causes ls of . and .. to
878 * not be returned
879 */
880 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
881 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
882 }
a108471b
RL
883 } else
884 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
885 }
b9a3260f 886
0b8f18e3
JL
887 /* query for SFU type info if supported and needed */
888 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
889 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
890 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
891 if (tmprc)
f96637be 892 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 893 }
1da177e4 894
79df1bae 895#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
896 /* fill in 0777 bits from ACL */
897 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 898 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 899 if (rc) {
f96637be
JP
900 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
901 __func__, rc);
78415d2d
SP
902 goto cgii_exit;
903 }
b9a3260f 904 }
79df1bae 905#endif /* CONFIG_CIFS_ACL */
b9a3260f 906
0b8f18e3
JL
907 /* fill in remaining high mode bits e.g. SUID, VTX */
908 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
909 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 910
1b12b9c1
SM
911 /* check for Minshall+French symlinks */
912 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
913 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
914 full_path);
1b12b9c1 915 if (tmprc)
cb084b1a 916 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
917 }
918
1208ef1f
PS
919 if (!*inode) {
920 *inode = cifs_iget(sb, &fattr);
921 if (!*inode)
0b8f18e3
JL
922 rc = -ENOMEM;
923 } else {
7196ac11
NA
924 /* we already have inode, update it */
925
a108471b
RL
926 /* if uniqueid is different, return error */
927 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
928 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
929 rc = -ESTALE;
930 goto cgii_exit;
931 }
932
7196ac11
NA
933 /* if filetype is different, return error */
934 if (unlikely(((*inode)->i_mode & S_IFMT) !=
935 (fattr.cf_mode & S_IFMT))) {
936 rc = -ESTALE;
937 goto cgii_exit;
938 }
939
1208ef1f 940 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 941 }
b9a3260f 942
7962670e 943cgii_exit:
7ea884c7
SF
944 if ((*inode) && ((*inode)->i_ino == 0))
945 cifs_dbg(FYI, "inode number of zero returned\n");
946
1da177e4 947 kfree(buf);
7ffec372 948 cifs_put_tlink(tlink);
1da177e4
LT
949 return rc;
950}
951
7f8ed420
SF
952static const struct inode_operations cifs_ipc_inode_ops = {
953 .lookup = cifs_lookup,
954};
955
cc0bad75
JL
956static int
957cifs_find_inode(struct inode *inode, void *opaque)
958{
959 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
960
f30b9c11 961 /* don't match inode with different uniqueid */
cc0bad75
JL
962 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
963 return 0;
964
20054bd6
JL
965 /* use createtime like an i_generation field */
966 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
967 return 0;
968
f30b9c11
JL
969 /* don't match inode of different type */
970 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
971 return 0;
972
5acfec25 973 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 974 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 975 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 976
cc0bad75
JL
977 return 1;
978}
979
980static int
981cifs_init_inode(struct inode *inode, void *opaque)
982{
983 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
984
985 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 986 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
987 return 0;
988}
989
5acfec25
JL
990/*
991 * walk dentry list for an inode and report whether it has aliases that
992 * are hashed. We use this to determine if a directory inode can actually
993 * be used.
994 */
995static bool
996inode_has_hashed_dentries(struct inode *inode)
997{
998 struct dentry *dentry;
999
873feea0 1000 spin_lock(&inode->i_lock);
946e51f2 1001 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 1002 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 1003 spin_unlock(&inode->i_lock);
5acfec25
JL
1004 return true;
1005 }
1006 }
873feea0 1007 spin_unlock(&inode->i_lock);
5acfec25
JL
1008 return false;
1009}
1010
cc0bad75
JL
1011/* Given fattrs, get a corresponding inode */
1012struct inode *
1013cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
1014{
1015 unsigned long hash;
1016 struct inode *inode;
1017
3d694380 1018retry_iget5_locked:
f96637be 1019 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1020
1021 /* hash down to 32-bits on 32-bit arch */
1022 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1023
1024 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1025 if (inode) {
5acfec25 1026 /* was there a potentially problematic inode collision? */
3d694380 1027 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1028 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1029
1030 if (inode_has_hashed_dentries(inode)) {
1031 cifs_autodisable_serverino(CIFS_SB(sb));
1032 iput(inode);
1033 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1034 goto retry_iget5_locked;
1035 }
3d694380
JL
1036 }
1037
cc0bad75 1038 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1039 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1040 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1041 if (inode->i_state & I_NEW) {
1042 inode->i_ino = hash;
0ccd4802 1043#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1044 /* initialize per-inode cache cookie pointer */
1045 CIFS_I(inode)->fscache = NULL;
0ccd4802 1046#endif
cc0bad75
JL
1047 unlock_new_inode(inode);
1048 }
1049 }
1050
1051 return inode;
1052}
1053
1da177e4 1054/* gets root inode */
9b6763e0 1055struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1056{
6d5786a3 1057 unsigned int xid;
0d424ad0 1058 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1059 struct inode *inode = NULL;
ce634ab2 1060 long rc;
96daf2b0 1061 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1062 char *path = NULL;
1063 int len;
1064
1065 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1066 && cifs_sb->prepath) {
1067 len = strlen(cifs_sb->prepath);
1068 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1069 if (path == NULL)
1070 return ERR_PTR(-ENOMEM);
1071 path[0] = '/';
1072 memcpy(path+1, cifs_sb->prepath, len);
1073 } else {
1074 path = kstrdup("", GFP_KERNEL);
1075 if (path == NULL)
1076 return ERR_PTR(-ENOMEM);
1077 }
ce634ab2 1078
6d5786a3 1079 xid = get_xid();
b5b374ea 1080 if (tcon->unix_ext) {
a6b5058f 1081 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1082 /* some servers mistakenly claim POSIX support */
1083 if (rc != -EOPNOTSUPP)
1084 goto iget_no_retry;
1085 cifs_dbg(VFS, "server does not support POSIX extensions");
1086 tcon->unix_ext = false;
1087 }
1088
a6b5058f
AA
1089 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1090 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1091
b5b374ea 1092iget_no_retry:
a7851ce7
OS
1093 if (!inode) {
1094 inode = ERR_PTR(rc);
1095 goto out;
1096 }
cc0bad75 1097
0ccd4802 1098#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1099 /* populate tcon->resource_id */
0d424ad0 1100 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1101#endif
d03382ce 1102
b327a717 1103 if (rc && tcon->pipe) {
f96637be 1104 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1105 spin_lock(&inode->i_lock);
7f8ed420 1106 inode->i_mode |= S_IFDIR;
bfe86848 1107 set_nlink(inode, 2);
7f8ed420
SF
1108 inode->i_op = &cifs_ipc_inode_ops;
1109 inode->i_fop = &simple_dir_operations;
1110 inode->i_uid = cifs_sb->mnt_uid;
1111 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1112 spin_unlock(&inode->i_lock);
ad661334 1113 } else if (rc) {
ce634ab2 1114 iget_failed(inode);
a7851ce7 1115 inode = ERR_PTR(rc);
7f8ed420
SF
1116 }
1117
a7851ce7 1118out:
a6b5058f 1119 kfree(path);
31cd106b 1120 free_xid(xid);
ce634ab2 1121 return inode;
1da177e4
LT
1122}
1123
ed6875e0 1124int
6d5786a3 1125cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1126 char *full_path, __u32 dosattr)
388e57b2 1127{
388e57b2 1128 bool set_time = false;
388e57b2 1129 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1130 struct TCP_Server_Info *server;
388e57b2
SF
1131 FILE_BASIC_INFO info_buf;
1132
1adcb710
SF
1133 if (attrs == NULL)
1134 return -EINVAL;
1135
6bdf6dbd
PS
1136 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1137 if (!server->ops->set_file_info)
1138 return -ENOSYS;
1139
fd09b7d3
SF
1140 info_buf.Pad = 0;
1141
388e57b2
SF
1142 if (attrs->ia_valid & ATTR_ATIME) {
1143 set_time = true;
1144 info_buf.LastAccessTime =
95390201 1145 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
388e57b2
SF
1146 } else
1147 info_buf.LastAccessTime = 0;
1148
1149 if (attrs->ia_valid & ATTR_MTIME) {
1150 set_time = true;
1151 info_buf.LastWriteTime =
95390201 1152 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
388e57b2
SF
1153 } else
1154 info_buf.LastWriteTime = 0;
1155
1156 /*
1157 * Samba throws this field away, but windows may actually use it.
1158 * Do not set ctime unless other time stamps are changed explicitly
1159 * (i.e. by utimes()) since we would then have a mix of client and
1160 * server times.
1161 */
1162 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1163 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2 1164 info_buf.ChangeTime =
95390201 1165 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
388e57b2
SF
1166 } else
1167 info_buf.ChangeTime = 0;
1168
1169 info_buf.CreationTime = 0; /* don't change */
1170 info_buf.Attributes = cpu_to_le32(dosattr);
1171
6bdf6dbd 1172 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1173}
1174
a12a1ac7 1175/*
ed6875e0 1176 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1177 * and rename it to a random name that hopefully won't conflict with
1178 * anything else.
1179 */
ed6875e0
PS
1180int
1181cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1182 const unsigned int xid)
a12a1ac7
JL
1183{
1184 int oplock = 0;
1185 int rc;
d81b8a40
PS
1186 struct cifs_fid fid;
1187 struct cifs_open_parms oparms;
2b0143b5 1188 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1189 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1190 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1191 struct tcon_link *tlink;
96daf2b0 1192 struct cifs_tcon *tcon;
3270958b
SF
1193 __u32 dosattr, origattr;
1194 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1195
7ffec372
JL
1196 tlink = cifs_sb_tlink(cifs_sb);
1197 if (IS_ERR(tlink))
1198 return PTR_ERR(tlink);
1199 tcon = tlink_tcon(tlink);
1200
c483a984
SP
1201 /*
1202 * We cannot rename the file if the server doesn't support
1203 * CAP_INFOLEVEL_PASSTHRU
1204 */
1205 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1206 rc = -EBUSY;
1207 goto out;
1208 }
1209
d81b8a40
PS
1210 oparms.tcon = tcon;
1211 oparms.cifs_sb = cifs_sb;
1212 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1213 oparms.create_options = CREATE_NOT_DIR;
1214 oparms.disposition = FILE_OPEN;
1215 oparms.path = full_path;
1216 oparms.fid = &fid;
1217 oparms.reconnect = false;
1218
1219 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1220 if (rc != 0)
1221 goto out;
1222
3270958b
SF
1223 origattr = cifsInode->cifsAttrs;
1224 if (origattr == 0)
1225 origattr |= ATTR_NORMAL;
1226
1227 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1228 if (dosattr == 0)
1229 dosattr |= ATTR_NORMAL;
1230 dosattr |= ATTR_HIDDEN;
1231
3270958b
SF
1232 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1233 if (dosattr != origattr) {
1234 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1235 if (info_buf == NULL) {
1236 rc = -ENOMEM;
1237 goto out_close;
1238 }
1239 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1240 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1241 current->tgid);
1242 /* although we would like to mark the file hidden
1243 if that fails we will still try to rename it */
72d282dc 1244 if (!rc)
3270958b
SF
1245 cifsInode->cifsAttrs = dosattr;
1246 else
1247 dosattr = origattr; /* since not able to change them */
a12a1ac7 1248 }
a12a1ac7 1249
dd1db2de 1250 /* rename the file */
d81b8a40
PS
1251 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1252 cifs_sb->local_nls,
2baa2682 1253 cifs_remap(cifs_sb));
3270958b 1254 if (rc != 0) {
47c78f4a 1255 rc = -EBUSY;
3270958b
SF
1256 goto undo_setattr;
1257 }
6d22f098 1258
3270958b 1259 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1260 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1261 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1262 current->tgid);
1263 /*
1264 * some samba versions return -ENOENT when we try to set the
1265 * file disposition here. Likely a samba bug, but work around
1266 * it for now. This means that some cifsXXX files may hang
1267 * around after they shouldn't.
1268 *
1269 * BB: remove this hack after more servers have the fix
1270 */
1271 if (rc == -ENOENT)
1272 rc = 0;
1273 else if (rc != 0) {
47c78f4a 1274 rc = -EBUSY;
3270958b
SF
1275 goto undo_rename;
1276 }
aff8d5ca 1277 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1278 }
7ce86d5a 1279
a12a1ac7 1280out_close:
d81b8a40 1281 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1282out:
3270958b 1283 kfree(info_buf);
7ffec372 1284 cifs_put_tlink(tlink);
a12a1ac7 1285 return rc;
3270958b
SF
1286
1287 /*
1288 * reset everything back to the original state. Don't bother
1289 * dealing with errors here since we can't do anything about
1290 * them anyway.
1291 */
1292undo_rename:
d81b8a40 1293 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1294 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1295undo_setattr:
1296 if (dosattr != origattr) {
1297 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1298 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1299 current->tgid))
1300 cifsInode->cifsAttrs = origattr;
1301 }
1302
1303 goto out_close;
a12a1ac7
JL
1304}
1305
b7ca6928
SF
1306/* copied from fs/nfs/dir.c with small changes */
1307static void
1308cifs_drop_nlink(struct inode *inode)
1309{
1310 spin_lock(&inode->i_lock);
1311 if (inode->i_nlink > 0)
1312 drop_nlink(inode);
1313 spin_unlock(&inode->i_lock);
1314}
ff694527
SF
1315
1316/*
2b0143b5 1317 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1318 * is a negative dentry) then we would attempt a standard SMB delete, but
413d6100
CIK
1319 * if that fails we can not attempt the fall back mechanisms on EACCES
1320 * but will return the EACCES to the caller. Note that the VFS does not call
ff694527
SF
1321 * unlink on negative dentries currently.
1322 */
5f0319a7 1323int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1324{
1325 int rc = 0;
6d5786a3 1326 unsigned int xid;
1da177e4 1327 char *full_path = NULL;
2b0143b5 1328 struct inode *inode = d_inode(dentry);
ff694527 1329 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1330 struct super_block *sb = dir->i_sb;
1331 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1332 struct tcon_link *tlink;
96daf2b0 1333 struct cifs_tcon *tcon;
ed6875e0 1334 struct TCP_Server_Info *server;
6050247d
SF
1335 struct iattr *attrs = NULL;
1336 __u32 dosattr = 0, origattr = 0;
1da177e4 1337
f96637be 1338 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1339
7ffec372
JL
1340 tlink = cifs_sb_tlink(cifs_sb);
1341 if (IS_ERR(tlink))
1342 return PTR_ERR(tlink);
1343 tcon = tlink_tcon(tlink);
ed6875e0 1344 server = tcon->ses->server;
7ffec372 1345
6d5786a3 1346 xid = get_xid();
1da177e4 1347
5f0319a7
JL
1348 /* Unlink can be called from rename so we can not take the
1349 * sb->s_vfs_rename_mutex here */
1350 full_path = build_path_from_dentry(dentry);
1da177e4 1351 if (full_path == NULL) {
0f3bc09e 1352 rc = -ENOMEM;
7ffec372 1353 goto unlink_out;
1da177e4 1354 }
2d785a50 1355
29e20f9c
PS
1356 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1357 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1358 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1359 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1360 cifs_remap(cifs_sb));
f96637be 1361 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1362 if ((rc == 0) || (rc == -ENOENT))
1363 goto psx_del_no_retry;
1364 }
1da177e4 1365
6050247d 1366retry_std_delete:
ed6875e0
PS
1367 if (!server->ops->unlink) {
1368 rc = -ENOSYS;
1369 goto psx_del_no_retry;
1370 }
1371
1372 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1373
2d785a50 1374psx_del_no_retry:
1da177e4 1375 if (!rc) {
5f0319a7 1376 if (inode)
b7ca6928 1377 cifs_drop_nlink(inode);
1da177e4 1378 } else if (rc == -ENOENT) {
5f0319a7 1379 d_drop(dentry);
47c78f4a 1380 } else if (rc == -EBUSY) {
ed6875e0
PS
1381 if (server->ops->rename_pending_delete) {
1382 rc = server->ops->rename_pending_delete(full_path,
1383 dentry, xid);
1384 if (rc == 0)
1385 cifs_drop_nlink(inode);
1386 }
ff694527 1387 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1388 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1389 if (attrs == NULL) {
1390 rc = -ENOMEM;
1391 goto out_reval;
1da177e4 1392 }
388e57b2
SF
1393
1394 /* try to reset dos attributes */
ff694527
SF
1395 cifs_inode = CIFS_I(inode);
1396 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1397 if (origattr == 0)
1398 origattr |= ATTR_NORMAL;
1399 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1400 if (dosattr == 0)
1401 dosattr |= ATTR_NORMAL;
1402 dosattr |= ATTR_HIDDEN;
1403
1404 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1405 if (rc != 0)
1406 goto out_reval;
6050247d
SF
1407
1408 goto retry_std_delete;
1da177e4 1409 }
6050247d
SF
1410
1411 /* undo the setattr if we errored out and it's needed */
1412 if (rc != 0 && dosattr != 0)
1413 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1414
388e57b2 1415out_reval:
4523cc30 1416 if (inode) {
ff694527
SF
1417 cifs_inode = CIFS_I(inode);
1418 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1419 when needed */
e37fea58 1420 inode->i_ctime = current_time(inode);
06bcfedd 1421 }
e37fea58 1422 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1423 cifs_inode = CIFS_I(dir);
6050247d 1424 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1425unlink_out:
1da177e4 1426 kfree(full_path);
6050247d 1427 kfree(attrs);
6d5786a3 1428 free_xid(xid);
7ffec372 1429 cifs_put_tlink(tlink);
1da177e4
LT
1430 return rc;
1431}
1432
ff691e96 1433static int
101b92d9 1434cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1435 const char *full_path, struct cifs_sb_info *cifs_sb,
1436 struct cifs_tcon *tcon, const unsigned int xid)
1437{
1438 int rc = 0;
101b92d9 1439 struct inode *inode = NULL;
ff691e96
PS
1440
1441 if (tcon->unix_ext)
101b92d9 1442 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1443 xid);
1444 else
101b92d9
JL
1445 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1446 xid, NULL);
1447
ff691e96
PS
1448 if (rc)
1449 return rc;
1450
ff691e96
PS
1451 /*
1452 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1453 * from the server or was set bogus. Also, since this is a brand new
1454 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1455 */
101b92d9
JL
1456 if (inode->i_nlink < 2)
1457 set_nlink(inode, 2);
ff691e96
PS
1458 mode &= ~current_umask();
1459 /* must turn on setgid bit if parent dir has it */
101b92d9 1460 if (parent->i_mode & S_ISGID)
ff691e96
PS
1461 mode |= S_ISGID;
1462
1463 if (tcon->unix_ext) {
1464 struct cifs_unix_set_info_args args = {
1465 .mode = mode,
1466 .ctime = NO_CHANGE_64,
1467 .atime = NO_CHANGE_64,
1468 .mtime = NO_CHANGE_64,
1469 .device = 0,
1470 };
1471 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1472 args.uid = current_fsuid();
101b92d9 1473 if (parent->i_mode & S_ISGID)
49418b2c 1474 args.gid = parent->i_gid;
ff691e96 1475 else
49418b2c 1476 args.gid = current_fsgid();
ff691e96 1477 } else {
49418b2c
EB
1478 args.uid = INVALID_UID; /* no change */
1479 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1480 }
1481 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1482 cifs_sb->local_nls,
2baa2682 1483 cifs_remap(cifs_sb));
ff691e96 1484 } else {
f436720e 1485 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1486 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1487 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1488 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1489 tcon, xid);
101b92d9
JL
1490 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1491 inode->i_mode = (mode | S_IFDIR);
1492
1493 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1494 inode->i_uid = current_fsuid();
1495 if (inode->i_mode & S_ISGID)
1496 inode->i_gid = parent->i_gid;
1497 else
1498 inode->i_gid = current_fsgid();
ff691e96
PS
1499 }
1500 }
101b92d9 1501 d_instantiate(dentry, inode);
ff691e96
PS
1502 return rc;
1503}
1504
1505static int
1506cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1507 const char *full_path, struct cifs_sb_info *cifs_sb,
1508 struct cifs_tcon *tcon, const unsigned int xid)
1509{
1510 int rc = 0;
1511 u32 oplock = 0;
1512 FILE_UNIX_BASIC_INFO *info = NULL;
1513 struct inode *newinode = NULL;
1514 struct cifs_fattr fattr;
1515
1516 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1517 if (info == NULL) {
1518 rc = -ENOMEM;
1519 goto posix_mkdir_out;
1520 }
1521
1522 mode &= ~current_umask();
1523 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1524 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1525 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1526 if (rc == -EOPNOTSUPP)
1527 goto posix_mkdir_out;
1528 else if (rc) {
f96637be 1529 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1530 d_drop(dentry);
1531 goto posix_mkdir_out;
1532 }
1533
1534 if (info->Type == cpu_to_le32(-1))
1535 /* no return info, go query for it */
1536 goto posix_mkdir_get_info;
1537 /*
1538 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1539 * need to set uid/gid.
1540 */
1541
1542 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1543 cifs_fill_uniqueid(inode->i_sb, &fattr);
1544 newinode = cifs_iget(inode->i_sb, &fattr);
1545 if (!newinode)
1546 goto posix_mkdir_get_info;
1547
1548 d_instantiate(dentry, newinode);
1549
1550#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1551 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1552 dentry, dentry, newinode);
ff691e96
PS
1553
1554 if (newinode->i_nlink != 2)
f96637be
JP
1555 cifs_dbg(FYI, "unexpected number of links %d\n",
1556 newinode->i_nlink);
ff691e96
PS
1557#endif
1558
1559posix_mkdir_out:
1560 kfree(info);
1561 return rc;
1562posix_mkdir_get_info:
1563 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1564 xid);
1565 goto posix_mkdir_out;
1566}
1567
18bb1db3 1568int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1569{
ff691e96 1570 int rc = 0;
6d5786a3 1571 unsigned int xid;
1da177e4 1572 struct cifs_sb_info *cifs_sb;
7ffec372 1573 struct tcon_link *tlink;
29e20f9c 1574 struct cifs_tcon *tcon;
f436720e 1575 struct TCP_Server_Info *server;
ff691e96 1576 char *full_path;
1da177e4 1577
f96637be
JP
1578 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1579 mode, inode);
1da177e4 1580
1da177e4 1581 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1582 tlink = cifs_sb_tlink(cifs_sb);
1583 if (IS_ERR(tlink))
1584 return PTR_ERR(tlink);
29e20f9c 1585 tcon = tlink_tcon(tlink);
7ffec372 1586
6d5786a3 1587 xid = get_xid();
1da177e4 1588
7f57356b 1589 full_path = build_path_from_dentry(direntry);
1da177e4 1590 if (full_path == NULL) {
0f3bc09e 1591 rc = -ENOMEM;
7ffec372 1592 goto mkdir_out;
1da177e4 1593 }
50c2f753 1594
bea851b8
SF
1595 server = tcon->ses->server;
1596
bea851b8
SF
1597 if ((server->ops->posix_mkdir) && (tcon->posix_extensions)) {
1598 rc = server->ops->posix_mkdir(xid, inode, mode, tcon, full_path,
1599 cifs_sb);
1600 d_drop(direntry); /* for time being always refresh inode info */
1601 goto mkdir_out;
1602 }
bea851b8 1603
29e20f9c
PS
1604 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1605 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1606 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1607 tcon, xid);
1608 if (rc != -EOPNOTSUPP)
2dd29d31 1609 goto mkdir_out;
fb8c4b14 1610 }
ff691e96 1611
f436720e
PS
1612 if (!server->ops->mkdir) {
1613 rc = -ENOSYS;
1614 goto mkdir_out;
1615 }
1616
1da177e4 1617 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1618 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1619 if (rc) {
f96637be 1620 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1621 d_drop(direntry);
ff691e96 1622 goto mkdir_out;
1da177e4 1623 }
ff691e96
PS
1624
1625 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1626 xid);
fb8c4b14 1627mkdir_out:
6de2ce42
PS
1628 /*
1629 * Force revalidate to get parent dir info when needed since cached
1630 * attributes are invalid now.
1631 */
1632 CIFS_I(inode)->time = 0;
1da177e4 1633 kfree(full_path);
6d5786a3 1634 free_xid(xid);
7ffec372 1635 cifs_put_tlink(tlink);
1da177e4
LT
1636 return rc;
1637}
1638
1639int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1640{
1641 int rc = 0;
6d5786a3 1642 unsigned int xid;
1da177e4 1643 struct cifs_sb_info *cifs_sb;
7ffec372 1644 struct tcon_link *tlink;
f958ca5d
PS
1645 struct cifs_tcon *tcon;
1646 struct TCP_Server_Info *server;
1da177e4
LT
1647 char *full_path = NULL;
1648 struct cifsInodeInfo *cifsInode;
1649
f96637be 1650 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1651
6d5786a3 1652 xid = get_xid();
1da177e4 1653
7f57356b 1654 full_path = build_path_from_dentry(direntry);
1da177e4 1655 if (full_path == NULL) {
0f3bc09e 1656 rc = -ENOMEM;
7ffec372 1657 goto rmdir_exit;
1da177e4
LT
1658 }
1659
7ffec372
JL
1660 cifs_sb = CIFS_SB(inode->i_sb);
1661 tlink = cifs_sb_tlink(cifs_sb);
1662 if (IS_ERR(tlink)) {
1663 rc = PTR_ERR(tlink);
1664 goto rmdir_exit;
1665 }
f958ca5d
PS
1666 tcon = tlink_tcon(tlink);
1667 server = tcon->ses->server;
1668
1669 if (!server->ops->rmdir) {
1670 rc = -ENOSYS;
1671 cifs_put_tlink(tlink);
1672 goto rmdir_exit;
1673 }
7ffec372 1674
f958ca5d 1675 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1676 cifs_put_tlink(tlink);
1da177e4
LT
1677
1678 if (!rc) {
2b0143b5
DH
1679 spin_lock(&d_inode(direntry)->i_lock);
1680 i_size_write(d_inode(direntry), 0);
1681 clear_nlink(d_inode(direntry));
1682 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1683 }
1684
2b0143b5 1685 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1686 /* force revalidate to go get info when needed */
1687 cifsInode->time = 0;
42c24544
SF
1688
1689 cifsInode = CIFS_I(inode);
6de2ce42
PS
1690 /*
1691 * Force revalidate to get parent dir info when needed since cached
1692 * attributes are invalid now.
1693 */
1694 cifsInode->time = 0;
42c24544 1695
2b0143b5 1696 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1697 current_time(inode);
1da177e4 1698
7ffec372 1699rmdir_exit:
1da177e4 1700 kfree(full_path);
6d5786a3 1701 free_xid(xid);
1da177e4
LT
1702 return rc;
1703}
1704
ee2fd967 1705static int
8ceb9843
PS
1706cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1707 const char *from_path, struct dentry *to_dentry,
1708 const char *to_path)
ee2fd967
SF
1709{
1710 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1711 struct tcon_link *tlink;
8ceb9843
PS
1712 struct cifs_tcon *tcon;
1713 struct TCP_Server_Info *server;
d81b8a40
PS
1714 struct cifs_fid fid;
1715 struct cifs_open_parms oparms;
ee2fd967
SF
1716 int oplock, rc;
1717
7ffec372
JL
1718 tlink = cifs_sb_tlink(cifs_sb);
1719 if (IS_ERR(tlink))
1720 return PTR_ERR(tlink);
8ceb9843
PS
1721 tcon = tlink_tcon(tlink);
1722 server = tcon->ses->server;
1723
1724 if (!server->ops->rename)
1725 return -ENOSYS;
7ffec372 1726
ee2fd967 1727 /* try path-based rename first */
8ceb9843 1728 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1729
1730 /*
8ceb9843
PS
1731 * Don't bother with rename by filehandle unless file is busy and
1732 * source. Note that cross directory moves do not work with
ee2fd967
SF
1733 * rename by filehandle to various Windows servers.
1734 */
47c78f4a 1735 if (rc == 0 || rc != -EBUSY)
7ffec372 1736 goto do_rename_exit;
ee2fd967 1737
ed0e3ace
JL
1738 /* open-file renames don't work across directories */
1739 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1740 goto do_rename_exit;
ed0e3ace 1741
d81b8a40
PS
1742 oparms.tcon = tcon;
1743 oparms.cifs_sb = cifs_sb;
ee2fd967 1744 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1745 oparms.desired_access = DELETE;
1746 oparms.create_options = CREATE_NOT_DIR;
1747 oparms.disposition = FILE_OPEN;
1748 oparms.path = from_path;
1749 oparms.fid = &fid;
1750 oparms.reconnect = false;
1751
1752 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1753 if (rc == 0) {
d81b8a40 1754 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1755 (const char *) to_dentry->d_name.name,
2baa2682 1756 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1757 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1758 }
7ffec372
JL
1759do_rename_exit:
1760 cifs_put_tlink(tlink);
ee2fd967
SF
1761 return rc;
1762}
1763
8ceb9843 1764int
7c33d597
MS
1765cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1766 struct inode *target_dir, struct dentry *target_dentry,
1767 unsigned int flags)
1da177e4 1768{
8ceb9843
PS
1769 char *from_name = NULL;
1770 char *to_name = NULL;
639e7a91 1771 struct cifs_sb_info *cifs_sb;
7ffec372 1772 struct tcon_link *tlink;
96daf2b0 1773 struct cifs_tcon *tcon;
ee2fd967
SF
1774 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1775 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1776 unsigned int xid;
1777 int rc, tmprc;
1da177e4 1778
7c33d597
MS
1779 if (flags & ~RENAME_NOREPLACE)
1780 return -EINVAL;
1781
639e7a91 1782 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1783 tlink = cifs_sb_tlink(cifs_sb);
1784 if (IS_ERR(tlink))
1785 return PTR_ERR(tlink);
1786 tcon = tlink_tcon(tlink);
1da177e4 1787
6d5786a3 1788 xid = get_xid();
ee2fd967 1789
ee2fd967
SF
1790 /*
1791 * we already have the rename sem so we do not need to
1792 * grab it again here to protect the path integrity
1793 */
8ceb9843
PS
1794 from_name = build_path_from_dentry(source_dentry);
1795 if (from_name == NULL) {
ee2fd967
SF
1796 rc = -ENOMEM;
1797 goto cifs_rename_exit;
1798 }
1799
8ceb9843
PS
1800 to_name = build_path_from_dentry(target_dentry);
1801 if (to_name == NULL) {
1da177e4
LT
1802 rc = -ENOMEM;
1803 goto cifs_rename_exit;
1804 }
1805
8ceb9843
PS
1806 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1807 to_name);
ee2fd967 1808
7c33d597
MS
1809 /*
1810 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1811 */
1812 if (flags & RENAME_NOREPLACE)
1813 goto cifs_rename_exit;
1814
14121bdc
JL
1815 if (rc == -EEXIST && tcon->unix_ext) {
1816 /*
8ceb9843
PS
1817 * Are src and dst hardlinks of same inode? We can only tell
1818 * with unix extensions enabled.
14121bdc
JL
1819 */
1820 info_buf_source =
6da2ec56 1821 kmalloc_array(2, sizeof(FILE_UNIX_BASIC_INFO),
14121bdc
JL
1822 GFP_KERNEL);
1823 if (info_buf_source == NULL) {
1824 rc = -ENOMEM;
1825 goto cifs_rename_exit;
1826 }
1827
1828 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1829 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1830 info_buf_source,
1831 cifs_sb->local_nls,
2baa2682 1832 cifs_remap(cifs_sb));
8d281efb 1833 if (tmprc != 0)
14121bdc 1834 goto unlink_target;
ee2fd967 1835
8ceb9843
PS
1836 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1837 info_buf_target,
1838 cifs_sb->local_nls,
2baa2682 1839 cifs_remap(cifs_sb));
14121bdc 1840
8d281efb 1841 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1842 info_buf_target->UniqueId)) {
14121bdc 1843 /* same file, POSIX says that this is a noop */
ae6884a9 1844 rc = 0;
14121bdc 1845 goto cifs_rename_exit;
ae6884a9 1846 }
8ceb9843
PS
1847 }
1848 /*
1849 * else ... BB we could add the same check for Windows by
1850 * checking the UniqueId via FILE_INTERNAL_INFO
1851 */
14121bdc 1852
ee2fd967 1853unlink_target:
fc6f3943 1854 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1855 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1856 if (d_is_dir(target_dentry))
1857 tmprc = cifs_rmdir(target_dir, target_dentry);
1858 else
1859 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1860 if (tmprc)
1861 goto cifs_rename_exit;
8ceb9843
PS
1862 rc = cifs_do_rename(xid, source_dentry, from_name,
1863 target_dentry, to_name);
1da177e4
LT
1864 }
1865
b46799a8
PS
1866 /* force revalidate to go get info when needed */
1867 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1868
1869 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1870 target_dir->i_mtime = current_time(source_dir);
b46799a8 1871
1da177e4 1872cifs_rename_exit:
ee2fd967 1873 kfree(info_buf_source);
8ceb9843
PS
1874 kfree(from_name);
1875 kfree(to_name);
6d5786a3 1876 free_xid(xid);
7ffec372 1877 cifs_put_tlink(tlink);
1da177e4
LT
1878 return rc;
1879}
1880
df2cf170
JL
1881static bool
1882cifs_inode_needs_reval(struct inode *inode)
1da177e4 1883{
df2cf170 1884 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1885 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1886
57c55cd7
RS
1887 if (cifs_i->time == 0)
1888 return true;
1889
18cceb6a 1890 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1891 return false;
1da177e4 1892
df2cf170
JL
1893 if (!lookupCacheEnabled)
1894 return true;
1da177e4 1895
a87c9ad9
JL
1896 if (!cifs_sb->actimeo)
1897 return true;
1898
6d20e840
SJ
1899 if (!time_in_range(jiffies, cifs_i->time,
1900 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1901 return true;
1902
db19272e 1903 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1904 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1905 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1906 return true;
1907
df2cf170
JL
1908 return false;
1909}
1910
523fb8c8
SJ
1911/*
1912 * Zap the cache. Called when invalid_mapping flag is set.
1913 */
6feb9891 1914int
df2cf170
JL
1915cifs_invalidate_mapping(struct inode *inode)
1916{
6feb9891 1917 int rc = 0;
df2cf170 1918
df2cf170 1919 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1920 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1921 if (rc)
f96637be
JP
1922 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1923 __func__, inode);
df2cf170 1924 }
257fb1f1 1925
9451a9a5 1926 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1927 return rc;
df2cf170
JL
1928}
1929
4f73c7d3
JL
1930/**
1931 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1932 * @word: long word containing the bit lock
1933 */
1934static int
dfd01f02 1935cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1936{
4f73c7d3 1937 freezable_schedule_unsafe();
dfd01f02
PZ
1938 if (signal_pending_state(mode, current))
1939 return -ERESTARTSYS;
4f73c7d3
JL
1940 return 0;
1941}
1942
e284e53f
JL
1943int
1944cifs_revalidate_mapping(struct inode *inode)
1945{
4f73c7d3
JL
1946 int rc;
1947 unsigned long *flags = &CIFS_I(inode)->flags;
1948
74316201
N
1949 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1950 TASK_KILLABLE);
4f73c7d3
JL
1951 if (rc)
1952 return rc;
1953
1954 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1955 rc = cifs_invalidate_mapping(inode);
1956 if (rc)
1957 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1958 }
1959
1960 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1961 smp_mb__after_atomic();
4f73c7d3
JL
1962 wake_up_bit(flags, CIFS_INO_LOCK);
1963
1964 return rc;
1965}
1966
1967int
1968cifs_zap_mapping(struct inode *inode)
1969{
1970 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1971 return cifs_revalidate_mapping(inode);
e284e53f
JL
1972}
1973
6feb9891 1974int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1975{
1976 int rc = 0;
496ad9aa 1977 struct inode *inode = file_inode(filp);
ba00ba64 1978 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1979
1980 if (!cifs_inode_needs_reval(inode))
6feb9891 1981 return rc;
abab095d 1982
13cfb733 1983 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1984 rc = cifs_get_file_info_unix(filp);
1985 else
1986 rc = cifs_get_file_info(filp);
1987
abab095d
JL
1988 return rc;
1989}
1990
6feb9891 1991int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1992{
6d5786a3 1993 unsigned int xid;
df2cf170 1994 int rc = 0;
2b0143b5 1995 struct inode *inode = d_inode(dentry);
df2cf170 1996 struct super_block *sb = dentry->d_sb;
6feb9891 1997 char *full_path = NULL;
df2cf170
JL
1998
1999 if (inode == NULL)
2000 return -ENOENT;
1da177e4 2001
df2cf170 2002 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
2003 return rc;
2004
6d5786a3 2005 xid = get_xid();
1da177e4
LT
2006
2007 /* can not safely grab the rename sem here if rename calls revalidate
2008 since that would deadlock */
df2cf170 2009 full_path = build_path_from_dentry(dentry);
1da177e4 2010 if (full_path == NULL) {
0f3bc09e 2011 rc = -ENOMEM;
6feb9891 2012 goto out;
1da177e4
LT
2013 }
2014
f96637be
JP
2015 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
2016 full_path, inode, inode->i_count.counter,
a00be0e3 2017 dentry, cifs_get_time(dentry), jiffies);
1da177e4 2018
0d424ad0 2019 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
2020 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
2021 else
2022 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
2023 xid, NULL);
1da177e4 2024
6feb9891 2025out:
1da177e4 2026 kfree(full_path);
6d5786a3 2027 free_xid(xid);
1da177e4
LT
2028 return rc;
2029}
2030
6feb9891
PS
2031int cifs_revalidate_file(struct file *filp)
2032{
2033 int rc;
496ad9aa 2034 struct inode *inode = file_inode(filp);
6feb9891
PS
2035
2036 rc = cifs_revalidate_file_attr(filp);
2037 if (rc)
2038 return rc;
2039
e284e53f 2040 return cifs_revalidate_mapping(inode);
6feb9891
PS
2041}
2042
2043/* revalidate a dentry's inode attributes */
2044int cifs_revalidate_dentry(struct dentry *dentry)
2045{
2046 int rc;
2b0143b5 2047 struct inode *inode = d_inode(dentry);
6feb9891
PS
2048
2049 rc = cifs_revalidate_dentry_attr(dentry);
2050 if (rc)
2051 return rc;
2052
e284e53f 2053 return cifs_revalidate_mapping(inode);
6feb9891
PS
2054}
2055
a528d35e
DH
2056int cifs_getattr(const struct path *path, struct kstat *stat,
2057 u32 request_mask, unsigned int flags)
1da177e4 2058{
a528d35e 2059 struct dentry *dentry = path->dentry;
3aa1c8c2 2060 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2061 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2062 struct inode *inode = d_inode(dentry);
6feb9891 2063 int rc;
3aa1c8c2 2064
6feb9891
PS
2065 /*
2066 * We need to be sure that all dirty pages are written and the server
2067 * has actual ctime, mtime and file length.
2068 */
18cceb6a 2069 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2070 inode->i_mapping->nrpages != 0) {
2071 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2072 if (rc) {
2073 mapping_set_error(inode->i_mapping, rc);
2074 return rc;
2075 }
6feb9891 2076 }
1c456013 2077
6feb9891
PS
2078 rc = cifs_revalidate_dentry_attr(dentry);
2079 if (rc)
2080 return rc;
2081
2082 generic_fillattr(inode, stat);
2083 stat->blksize = CIFS_MAX_MSGSIZE;
2084 stat->ino = CIFS_I(inode)->uniqueid;
2085
6e70e26d
SF
2086 /* old CIFS Unix Extensions doesn't return create time */
2087 if (CIFS_I(inode)->createtime) {
2088 stat->result_mask |= STATX_BTIME;
95390201
AB
2089 stat->btime =
2090 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
6e70e26d
SF
2091 }
2092
2093 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2094 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2095 stat->attributes |= STATX_ATTR_COMPRESSED;
2096 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2097 stat->attributes |= STATX_ATTR_ENCRYPTED;
2098
6feb9891 2099 /*
d3d1fce1
JL
2100 * If on a multiuser mount without unix extensions or cifsacl being
2101 * enabled, and the admin hasn't overridden them, set the ownership
2102 * to the fsuid/fsgid of the current process.
6feb9891
PS
2103 */
2104 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2105 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2106 !tcon->unix_ext) {
2107 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2108 stat->uid = current_fsuid();
2109 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2110 stat->gid = current_fsgid();
5fe14c85 2111 }
6feb9891 2112 return rc;
1da177e4
LT
2113}
2114
2115static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2116{
09cbfeaf
KS
2117 pgoff_t index = from >> PAGE_SHIFT;
2118 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2119 struct page *page;
1da177e4
LT
2120 int rc = 0;
2121
2122 page = grab_cache_page(mapping, index);
2123 if (!page)
2124 return -ENOMEM;
2125
09cbfeaf 2126 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2127 unlock_page(page);
09cbfeaf 2128 put_page(page);
1da177e4
LT
2129 return rc;
2130}
2131
1b947463 2132static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2133{
57c55cd7
RS
2134 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2135
ba6a46a0 2136 spin_lock(&inode->i_lock);
3677db10 2137 i_size_write(inode, offset);
ba6a46a0 2138 spin_unlock(&inode->i_lock);
1b947463 2139
57c55cd7
RS
2140 /* Cached inode must be refreshed on truncate */
2141 cifs_i->time = 0;
7caef267 2142 truncate_pagecache(inode, offset);
3677db10
SF
2143}
2144
8efdbde6
JL
2145static int
2146cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2147 unsigned int xid, char *full_path)
8efdbde6
JL
2148{
2149 int rc;
2150 struct cifsFileInfo *open_file;
2151 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2152 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2153 struct tcon_link *tlink = NULL;
d1433418
PS
2154 struct cifs_tcon *tcon = NULL;
2155 struct TCP_Server_Info *server;
8efdbde6
JL
2156
2157 /*
2158 * To avoid spurious oplock breaks from server, in the case of
2159 * inodes that we already have open, avoid doing path based
2160 * setting of file size if we can do it by handle.
2161 * This keeps our caching token (oplock) and avoids timeouts
2162 * when the local oplock break takes longer to flush
2163 * writebehind data than the SMB timeout for the SetPathInfo
2164 * request would allow
2165 */
6508d904 2166 open_file = find_writable_file(cifsInode, true);
8efdbde6 2167 if (open_file) {
d1433418
PS
2168 tcon = tlink_tcon(open_file->tlink);
2169 server = tcon->ses->server;
2170 if (server->ops->set_file_size)
2171 rc = server->ops->set_file_size(xid, tcon, open_file,
2172 attrs->ia_size, false);
2173 else
2174 rc = -ENOSYS;
6ab409b5 2175 cifsFileInfo_put(open_file);
f96637be 2176 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2177 } else
2178 rc = -EINVAL;
2179
d1433418
PS
2180 if (!rc)
2181 goto set_size_out;
2182
2183 if (tcon == NULL) {
2184 tlink = cifs_sb_tlink(cifs_sb);
2185 if (IS_ERR(tlink))
2186 return PTR_ERR(tlink);
2187 tcon = tlink_tcon(tlink);
2188 server = tcon->ses->server;
2189 }
ba00ba64 2190
d1433418
PS
2191 /*
2192 * Set file size by pathname rather than by handle either because no
2193 * valid, writeable file handle for it was found or because there was
2194 * an error setting it by handle.
2195 */
2196 if (server->ops->set_path_size)
2197 rc = server->ops->set_path_size(xid, tcon, full_path,
2198 attrs->ia_size, cifs_sb, false);
2199 else
2200 rc = -ENOSYS;
f96637be 2201 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2202
d1433418
PS
2203 if (tlink)
2204 cifs_put_tlink(tlink);
8efdbde6 2205
d1433418 2206set_size_out:
8efdbde6 2207 if (rc == 0) {
fbec9ab9 2208 cifsInode->server_eof = attrs->ia_size;
1b947463 2209 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2210 cifs_truncate_page(inode->i_mapping, inode->i_size);
2211 }
2212
2213 return rc;
2214}
2215
3fe5c1dd
JL
2216static int
2217cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2218{
2219 int rc;
6d5786a3 2220 unsigned int xid;
3fe5c1dd 2221 char *full_path = NULL;
2b0143b5 2222 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2223 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2224 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2225 struct tcon_link *tlink;
96daf2b0 2226 struct cifs_tcon *pTcon;
3fe5c1dd 2227 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2228 struct cifsFileInfo *open_file;
3fe5c1dd 2229
35c265e0
AV
2230 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2231 direntry, attrs->ia_valid);
3fe5c1dd 2232
6d5786a3 2233 xid = get_xid();
3fe5c1dd 2234
db78b877
CH
2235 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2236 attrs->ia_valid |= ATTR_FORCE;
2237
31051c85 2238 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2239 if (rc < 0)
2240 goto out;
3fe5c1dd
JL
2241
2242 full_path = build_path_from_dentry(direntry);
2243 if (full_path == NULL) {
2244 rc = -ENOMEM;
2245 goto out;
2246 }
2247
0f4d634c
JL
2248 /*
2249 * Attempt to flush data before changing attributes. We need to do
2250 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2251 * ownership or mode then we may also need to do this. Here, we take
2252 * the safe way out and just do the flush on all setattr requests. If
2253 * the flush returns error, store it to report later and continue.
2254 *
2255 * BB: This should be smarter. Why bother flushing pages that
2256 * will be truncated anyway? Also, should we error out here if
2257 * the flush returns error?
2258 */
2259 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2260 mapping_set_error(inode->i_mapping, rc);
2261 rc = 0;
3fe5c1dd
JL
2262
2263 if (attrs->ia_valid & ATTR_SIZE) {
2264 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2265 if (rc != 0)
2266 goto out;
2267 }
2268
2269 /* skip mode change if it's just for clearing setuid/setgid */
2270 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2271 attrs->ia_valid &= ~ATTR_MODE;
2272
2273 args = kmalloc(sizeof(*args), GFP_KERNEL);
2274 if (args == NULL) {
2275 rc = -ENOMEM;
2276 goto out;
2277 }
2278
2279 /* set up the struct */
2280 if (attrs->ia_valid & ATTR_MODE)
2281 args->mode = attrs->ia_mode;
2282 else
2283 args->mode = NO_CHANGE_64;
2284
2285 if (attrs->ia_valid & ATTR_UID)
2286 args->uid = attrs->ia_uid;
2287 else
49418b2c 2288 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2289
2290 if (attrs->ia_valid & ATTR_GID)
2291 args->gid = attrs->ia_gid;
2292 else
49418b2c 2293 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2294
2295 if (attrs->ia_valid & ATTR_ATIME)
95390201 2296 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
3fe5c1dd
JL
2297 else
2298 args->atime = NO_CHANGE_64;
2299
2300 if (attrs->ia_valid & ATTR_MTIME)
95390201 2301 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
3fe5c1dd
JL
2302 else
2303 args->mtime = NO_CHANGE_64;
2304
2305 if (attrs->ia_valid & ATTR_CTIME)
95390201 2306 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
3fe5c1dd
JL
2307 else
2308 args->ctime = NO_CHANGE_64;
2309
2310 args->device = 0;
6508d904 2311 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2312 if (open_file) {
4b4de76e 2313 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2314 u32 npid = open_file->pid;
13cfb733 2315 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2316 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2317 cifsFileInfo_put(open_file);
3bbeeb3c 2318 } else {
7ffec372
JL
2319 tlink = cifs_sb_tlink(cifs_sb);
2320 if (IS_ERR(tlink)) {
2321 rc = PTR_ERR(tlink);
2322 goto out;
2323 }
2324 pTcon = tlink_tcon(tlink);
3bbeeb3c 2325 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2326 cifs_sb->local_nls,
bc8ebdc4 2327 cifs_remap(cifs_sb));
7ffec372 2328 cifs_put_tlink(tlink);
3bbeeb3c 2329 }
3fe5c1dd 2330
1025774c
CH
2331 if (rc)
2332 goto out;
ccd4bb1b 2333
1025774c 2334 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2335 attrs->ia_size != i_size_read(inode))
2336 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2337
2338 setattr_copy(inode, attrs);
2339 mark_inode_dirty(inode);
2340
2341 /* force revalidate when any of these times are set since some
2342 of the fs types (eg ext3, fat) do not have fine enough
2343 time granularity to match protocol, and we do not have a
2344 a way (yet) to query the server fs's time granularity (and
2345 whether it rounds times down).
2346 */
2347 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2348 cifsInode->time = 0;
3fe5c1dd
JL
2349out:
2350 kfree(args);
2351 kfree(full_path);
6d5786a3 2352 free_xid(xid);
3fe5c1dd
JL
2353 return rc;
2354}
2355
0510eeb7
JL
2356static int
2357cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2358{
6d5786a3 2359 unsigned int xid;
8abf2775
EB
2360 kuid_t uid = INVALID_UID;
2361 kgid_t gid = INVALID_GID;
2b0143b5 2362 struct inode *inode = d_inode(direntry);
3fe5c1dd 2363 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2364 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2365 char *full_path = NULL;
2366 int rc = -EACCES;
feb3e20c 2367 __u32 dosattr = 0;
4e1e7fb9 2368 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2369
6d5786a3 2370 xid = get_xid();
1da177e4 2371
35c265e0
AV
2372 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2373 direntry, attrs->ia_valid);
6473a559 2374
db78b877
CH
2375 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2376 attrs->ia_valid |= ATTR_FORCE;
2377
31051c85 2378 rc = setattr_prepare(direntry, attrs);
db78b877 2379 if (rc < 0) {
6d5786a3 2380 free_xid(xid);
db78b877 2381 return rc;
6473a559 2382 }
50c2f753 2383
7f57356b 2384 full_path = build_path_from_dentry(direntry);
1da177e4 2385 if (full_path == NULL) {
0f3bc09e 2386 rc = -ENOMEM;
6d5786a3 2387 free_xid(xid);
0f3bc09e 2388 return rc;
1da177e4 2389 }
1da177e4 2390
0f4d634c
JL
2391 /*
2392 * Attempt to flush data before changing attributes. We need to do
2393 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2394 * ownership or mode then we may also need to do this. Here, we take
2395 * the safe way out and just do the flush on all setattr requests. If
2396 * the flush returns error, store it to report later and continue.
2397 *
2398 * BB: This should be smarter. Why bother flushing pages that
2399 * will be truncated anyway? Also, should we error out here if
2400 * the flush returns error?
2401 */
2402 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2403 mapping_set_error(inode->i_mapping, rc);
2404 rc = 0;
cea21805 2405
50531444 2406 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2407 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2408 if (rc != 0)
e30dcf3a 2409 goto cifs_setattr_exit;
1da177e4 2410 }
4ca691a8 2411
a5ff3769
SP
2412 if (attrs->ia_valid & ATTR_UID)
2413 uid = attrs->ia_uid;
2414
2415 if (attrs->ia_valid & ATTR_GID)
2416 gid = attrs->ia_gid;
2417
2418#ifdef CONFIG_CIFS_ACL
2419 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2420 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2421 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2422 uid, gid);
2423 if (rc) {
f96637be
JP
2424 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2425 __func__, rc);
a5ff3769
SP
2426 goto cifs_setattr_exit;
2427 }
2428 }
2429 } else
2430#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2431 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2432 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2433
d32c4f26
JL
2434 /* skip mode change if it's just for clearing setuid/setgid */
2435 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2436 attrs->ia_valid &= ~ATTR_MODE;
2437
1da177e4 2438 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2439 mode = attrs->ia_mode;
cdbce9c8 2440 rc = 0;
79df1bae 2441#ifdef CONFIG_CIFS_ACL
78415d2d 2442 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2443 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2444 INVALID_UID, INVALID_GID);
78415d2d 2445 if (rc) {
f96637be
JP
2446 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2447 __func__, rc);
78415d2d
SP
2448 goto cifs_setattr_exit;
2449 }
2450 } else
79df1bae 2451#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2452 if (((mode & S_IWUGO) == 0) &&
2453 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2454
2455 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2456
5132861a
JL
2457 /* fix up mode if we're not using dynperm */
2458 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2459 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2460 } else if ((mode & S_IWUGO) &&
2461 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2462
2463 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2464 /* Attributes of 0 are ignored */
2465 if (dosattr == 0)
2466 dosattr |= ATTR_NORMAL;
5132861a
JL
2467
2468 /* reset local inode permissions to normal */
2469 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2470 attrs->ia_mode &= ~(S_IALLUGO);
2471 if (S_ISDIR(inode->i_mode))
2472 attrs->ia_mode |=
2473 cifs_sb->mnt_dir_mode;
2474 else
2475 attrs->ia_mode |=
2476 cifs_sb->mnt_file_mode;
2477 }
2478 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2479 /* ignore mode change - ATTR_READONLY hasn't changed */
2480 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2481 }
1da177e4
LT
2482 }
2483
feb3e20c
JL
2484 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2485 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2486 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2487 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2488
e30dcf3a
SF
2489 /* Even if error on time set, no sense failing the call if
2490 the server would set the time to a reasonable value anyway,
2491 and this check ensures that we are not being called from
2492 sys_utimes in which case we ought to fail the call back to
2493 the user when the server rejects the call */
fb8c4b14 2494 if ((rc) && (attrs->ia_valid &
feb3e20c 2495 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2496 rc = 0;
1da177e4
LT
2497 }
2498
2499 /* do not need local check to inode_check_ok since the server does
2500 that */
1025774c
CH
2501 if (rc)
2502 goto cifs_setattr_exit;
2503
2504 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2505 attrs->ia_size != i_size_read(inode))
2506 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2507
2508 setattr_copy(inode, attrs);
2509 mark_inode_dirty(inode);
1025774c 2510
e30dcf3a 2511cifs_setattr_exit:
1da177e4 2512 kfree(full_path);
6d5786a3 2513 free_xid(xid);
1da177e4
LT
2514 return rc;
2515}
2516
0510eeb7
JL
2517int
2518cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2519{
fc64005c 2520 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2521 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2522
2523 if (pTcon->unix_ext)
2524 return cifs_setattr_unix(direntry, attrs);
2525
2526 return cifs_setattr_nounix(direntry, attrs);
2527
2528 /* BB: add cifs_setattr_legacy for really old servers */
2529}
2530
99ee4dbd 2531#if 0
1da177e4
LT
2532void cifs_delete_inode(struct inode *inode)
2533{
f96637be 2534 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2535 /* may have to add back in if and when safe distributed caching of
2536 directories added e.g. via FindNotify */
2537}
99ee4dbd 2538#endif