SMB3: Log at least once if tree connect fails during reconnect
[linux-block.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
116 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
cc0bad75
JL
165 inode->i_atime = fattr->cf_atime;
166 inode->i_mtime = fattr->cf_mtime;
167 inode->i_ctime = fattr->cf_ctime;
cc0bad75 168 inode->i_rdev = fattr->cf_rdev;
74d290da 169 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
170 inode->i_uid = fattr->cf_uid;
171 inode->i_gid = fattr->cf_gid;
172
0b8f18e3
JL
173 /* if dynperm is set, don't clobber existing mode */
174 if (inode->i_state & I_NEW ||
175 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
176 inode->i_mode = fattr->cf_mode;
177
cc0bad75 178 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 179
0b8f18e3
JL
180 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
181 cifs_i->time = 0;
182 else
183 cifs_i->time = jiffies;
184
aff8d5ca
JL
185 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
186 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
187 else
188 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 189
835a36ca 190 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
191 /*
192 * Can't safely change the file size here if the client is writing to
193 * it due to potential races.
194 */
cc0bad75
JL
195 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
196 i_size_write(inode, fattr->cf_eof);
197
198 /*
199 * i_blocks is not related to (i_size / i_blksize),
200 * but instead 512 byte (2**9) size is required for
201 * calculating num blocks.
202 */
203 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
204 }
205 spin_unlock(&inode->i_lock);
206
01c64fea
DH
207 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
208 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
209 if (inode->i_state & I_NEW)
210 cifs_set_ops(inode);
cc0bad75
JL
211}
212
4065c802
JL
213void
214cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
215{
216 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
217
218 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
219 return;
220
221 fattr->cf_uniqueid = iunique(sb, ROOT_I);
222}
223
cc0bad75
JL
224/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
225void
226cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
227 struct cifs_sb_info *cifs_sb)
228{
229 memset(fattr, 0, sizeof(*fattr));
230 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
231 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
232 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
233
234 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
235 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
236 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
237 /* old POSIX extensions don't get create time */
238
cc0bad75 239 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
240
241 /*
242 * Since we set the inode type below we need to mask off
243 * to avoid strange results if bits set above.
244 */
cc0bad75 245 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
246 switch (le32_to_cpu(info->Type)) {
247 case UNIX_FILE:
cc0bad75
JL
248 fattr->cf_mode |= S_IFREG;
249 fattr->cf_dtype = DT_REG;
75f12983
CH
250 break;
251 case UNIX_SYMLINK:
cc0bad75
JL
252 fattr->cf_mode |= S_IFLNK;
253 fattr->cf_dtype = DT_LNK;
75f12983
CH
254 break;
255 case UNIX_DIR:
cc0bad75
JL
256 fattr->cf_mode |= S_IFDIR;
257 fattr->cf_dtype = DT_DIR;
75f12983
CH
258 break;
259 case UNIX_CHARDEV:
cc0bad75
JL
260 fattr->cf_mode |= S_IFCHR;
261 fattr->cf_dtype = DT_CHR;
262 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
263 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
264 break;
265 case UNIX_BLOCKDEV:
cc0bad75
JL
266 fattr->cf_mode |= S_IFBLK;
267 fattr->cf_dtype = DT_BLK;
268 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
269 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
270 break;
271 case UNIX_FIFO:
cc0bad75
JL
272 fattr->cf_mode |= S_IFIFO;
273 fattr->cf_dtype = DT_FIFO;
75f12983
CH
274 break;
275 case UNIX_SOCKET:
cc0bad75
JL
276 fattr->cf_mode |= S_IFSOCK;
277 fattr->cf_dtype = DT_SOCK;
75f12983
CH
278 break;
279 default:
280 /* safest to call it a file if we do not know */
cc0bad75
JL
281 fattr->cf_mode |= S_IFREG;
282 fattr->cf_dtype = DT_REG;
f96637be 283 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
284 break;
285 }
286
46bbc25f
EB
287 fattr->cf_uid = cifs_sb->mnt_uid;
288 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
289 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
290 if (id < ((uid_t)-1)) {
291 kuid_t uid = make_kuid(&init_user_ns, id);
292 if (uid_valid(uid))
293 fattr->cf_uid = uid;
294 }
46bbc25f
EB
295 }
296
297 fattr->cf_gid = cifs_sb->mnt_gid;
298 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
299 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
300 if (id < ((gid_t)-1)) {
301 kgid_t gid = make_kgid(&init_user_ns, id);
302 if (gid_valid(gid))
303 fattr->cf_gid = gid;
304 }
46bbc25f 305 }
75f12983 306
cc0bad75 307 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
308}
309
b9a3260f 310/*
cc0bad75
JL
311 * Fill a cifs_fattr struct with fake inode info.
312 *
313 * Needed to setup cifs_fattr data for the directory which is the
314 * junction to the new submount (ie to setup the fake directory
315 * which represents a DFS referral).
b9a3260f 316 */
f1230c97 317static void
cc0bad75 318cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 319{
cc0bad75 320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 321
f96637be 322 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
323
324 memset(fattr, 0, sizeof(*fattr));
325 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
326 fattr->cf_uid = cifs_sb->mnt_uid;
327 fattr->cf_gid = cifs_sb->mnt_gid;
e37fea58
DD
328 ktime_get_real_ts(&fattr->cf_mtime);
329 fattr->cf_mtime = timespec_trunc(fattr->cf_mtime, sb->s_time_gran);
330 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
331 fattr->cf_nlink = 2;
332 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
333}
334
4ad65044
PS
335static int
336cifs_get_file_info_unix(struct file *filp)
abab095d
JL
337{
338 int rc;
6d5786a3 339 unsigned int xid;
abab095d
JL
340 FILE_UNIX_BASIC_INFO find_data;
341 struct cifs_fattr fattr;
496ad9aa 342 struct inode *inode = file_inode(filp);
abab095d 343 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 344 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 345 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 346
6d5786a3 347 xid = get_xid();
4b4de76e 348 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
349 if (!rc) {
350 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
351 } else if (rc == -EREMOTE) {
352 cifs_create_dfs_fattr(&fattr, inode->i_sb);
353 rc = 0;
354 }
355
356 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 357 free_xid(xid);
abab095d
JL
358 return rc;
359}
360
1da177e4 361int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 362 const unsigned char *full_path,
6d5786a3 363 struct super_block *sb, unsigned int xid)
1da177e4 364{
cc0bad75 365 int rc;
0e4bbde9 366 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 367 struct cifs_fattr fattr;
96daf2b0 368 struct cifs_tcon *tcon;
7ffec372 369 struct tcon_link *tlink;
1da177e4 370 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 371
f96637be 372 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 373
7ffec372
JL
374 tlink = cifs_sb_tlink(cifs_sb);
375 if (IS_ERR(tlink))
376 return PTR_ERR(tlink);
377 tcon = tlink_tcon(tlink);
378
1da177e4 379 /* could have done a find first instead but this returns more info */
cc0bad75 380 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 381 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 382 cifs_put_tlink(tlink);
e911d0cc 383
cc0bad75
JL
384 if (!rc) {
385 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
386 } else if (rc == -EREMOTE) {
387 cifs_create_dfs_fattr(&fattr, sb);
388 rc = 0;
389 } else {
390 return rc;
391 }
1da177e4 392
1b12b9c1
SM
393 /* check for Minshall+French symlinks */
394 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
395 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
396 full_path);
1b12b9c1 397 if (tmprc)
cb084b1a 398 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
399 }
400
0e4bbde9 401 if (*pinode == NULL) {
cc0bad75 402 /* get new inode */
4065c802 403 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
404 *pinode = cifs_iget(sb, &fattr);
405 if (!*pinode)
0e4bbde9 406 rc = -ENOMEM;
cc0bad75
JL
407 } else {
408 /* we already have inode, update it */
7196ac11
NA
409
410 /* if uniqueid is different, return error */
411 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
412 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
413 rc = -ESTALE;
414 goto cgiiu_exit;
415 }
416
417 /* if filetype is different, return error */
418 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
419 (fattr.cf_mode & S_IFMT))) {
420 rc = -ESTALE;
421 goto cgiiu_exit;
422 }
423
cc0bad75 424 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 425 }
1da177e4 426
7196ac11 427cgiiu_exit:
1da177e4
LT
428 return rc;
429}
430
0b8f18e3 431static int
0360d605 432cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 433 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
434{
435 int rc;
db8b631d 436 __u32 oplock;
7ffec372 437 struct tcon_link *tlink;
96daf2b0 438 struct cifs_tcon *tcon;
d81b8a40
PS
439 struct cifs_fid fid;
440 struct cifs_open_parms oparms;
d4ffff1f 441 struct cifs_io_parms io_parms;
86c96b4b 442 char buf[24];
d6e2f2a4 443 unsigned int bytes_read;
fb8c4b14 444 char *pbuf;
0360d605 445 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
446
447 pbuf = buf;
448
0b8f18e3
JL
449 fattr->cf_mode &= ~S_IFMT;
450
451 if (fattr->cf_eof == 0) {
452 fattr->cf_mode |= S_IFIFO;
453 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 454 return 0;
0b8f18e3
JL
455 } else if (fattr->cf_eof < 8) {
456 fattr->cf_mode |= S_IFREG;
457 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
458 return -EINVAL; /* EOPNOTSUPP? */
459 }
50c2f753 460
7ffec372
JL
461 tlink = cifs_sb_tlink(cifs_sb);
462 if (IS_ERR(tlink))
463 return PTR_ERR(tlink);
464 tcon = tlink_tcon(tlink);
465
d81b8a40
PS
466 oparms.tcon = tcon;
467 oparms.cifs_sb = cifs_sb;
468 oparms.desired_access = GENERIC_READ;
469 oparms.create_options = CREATE_NOT_DIR;
470 oparms.disposition = FILE_OPEN;
471 oparms.path = path;
472 oparms.fid = &fid;
473 oparms.reconnect = false;
474
db8b631d
SF
475 if (tcon->ses->server->oplocks)
476 oplock = REQ_OPLOCK;
477 else
478 oplock = 0;
479 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 480 if (rc) {
db8b631d 481 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
482 cifs_put_tlink(tlink);
483 return rc;
484 }
485
486 /* Read header */
d81b8a40 487 io_parms.netfid = fid.netfid;
0360d605
PS
488 io_parms.pid = current->tgid;
489 io_parms.tcon = tcon;
490 io_parms.offset = 0;
491 io_parms.length = 24;
492
db8b631d
SF
493 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
494 &bytes_read, &pbuf, &buf_type);
0360d605
PS
495 if ((rc == 0) && (bytes_read >= 8)) {
496 if (memcmp("IntxBLK", pbuf, 8) == 0) {
497 cifs_dbg(FYI, "Block device\n");
498 fattr->cf_mode |= S_IFBLK;
499 fattr->cf_dtype = DT_BLK;
500 if (bytes_read == 24) {
501 /* we have enough to decode dev num */
502 __u64 mjr; /* major */
503 __u64 mnr; /* minor */
504 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
505 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
506 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 507 }
0360d605
PS
508 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
509 cifs_dbg(FYI, "Char device\n");
510 fattr->cf_mode |= S_IFCHR;
511 fattr->cf_dtype = DT_CHR;
512 if (bytes_read == 24) {
513 /* we have enough to decode dev num */
514 __u64 mjr; /* major */
515 __u64 mnr; /* minor */
516 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
517 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
518 fattr->cf_rdev = MKDEV(mjr, mnr);
519 }
520 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
521 cifs_dbg(FYI, "Symlink\n");
522 fattr->cf_mode |= S_IFLNK;
523 fattr->cf_dtype = DT_LNK;
3020a1f5 524 } else {
0360d605 525 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 526 fattr->cf_dtype = DT_REG;
0360d605 527 rc = -EOPNOTSUPP;
fb8c4b14 528 }
0360d605
PS
529 } else {
530 fattr->cf_mode |= S_IFREG; /* then it is a file */
531 fattr->cf_dtype = DT_REG;
532 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 533 }
db8b631d
SF
534
535 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 536 cifs_put_tlink(tlink);
d6e2f2a4 537 return rc;
d6e2f2a4
SF
538}
539
9e294f1c
SF
540#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
541
0b8f18e3
JL
542/*
543 * Fetch mode bits as provided by SFU.
544 *
545 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
546 */
547static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 548 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 549{
3020a1f5 550#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
551 ssize_t rc;
552 char ea_value[4];
553 __u32 mode;
7ffec372 554 struct tcon_link *tlink;
96daf2b0 555 struct cifs_tcon *tcon;
7ffec372
JL
556
557 tlink = cifs_sb_tlink(cifs_sb);
558 if (IS_ERR(tlink))
559 return PTR_ERR(tlink);
560 tcon = tlink_tcon(tlink);
9e294f1c 561
d979f3b0
SF
562 if (tcon->ses->server->ops->query_all_EAs == NULL) {
563 cifs_put_tlink(tlink);
564 return -EOPNOTSUPP;
565 }
566
567 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
568 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 569 cifs_sb);
7ffec372 570 cifs_put_tlink(tlink);
4523cc30 571 if (rc < 0)
9e294f1c
SF
572 return (int)rc;
573 else if (rc > 3) {
574 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 575 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
576 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
577 mode, fattr->cf_mode);
0b8f18e3 578 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 579 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 580 }
0b8f18e3
JL
581
582 return 0;
3020a1f5
SF
583#else
584 return -EOPNOTSUPP;
585#endif
9e294f1c
SF
586}
587
0b8f18e3 588/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 589static void
0b8f18e3 590cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 591 struct super_block *sb, bool adjust_tz,
eb85d94b 592 bool symlink)
b9a3260f 593{
e37fea58 594 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 595 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 596
0b8f18e3
JL
597 memset(fattr, 0, sizeof(*fattr));
598 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
599 if (info->DeletePending)
600 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
601
602 if (info->LastAccessTime)
603 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58
DD
604 else {
605 ktime_get_real_ts(&fattr->cf_atime);
606 fattr->cf_atime = timespec_trunc(fattr->cf_atime, sb->s_time_gran);
607 }
0b8f18e3
JL
608
609 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
610 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
611
612 if (adjust_tz) {
0d424ad0
JL
613 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
614 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
615 }
616
617 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
618 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 619 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 620
74d290da 621 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
622
623 if (symlink) {
624 fattr->cf_mode = S_IFLNK;
625 fattr->cf_dtype = DT_LNK;
626 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
627 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
628 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
629 /*
630 * Server can return wrong NumberOfLinks value for directories
631 * when Unix extensions are disabled - fake it.
632 */
74d290da
JM
633 if (!tcon->unix_ext)
634 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
635 } else {
636 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
637 fattr->cf_dtype = DT_REG;
0b8f18e3 638
d0c280d2
JL
639 /* clear write bits if ATTR_READONLY is set */
640 if (fattr->cf_cifsattrs & ATTR_READONLY)
641 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 642
74d290da
JM
643 /*
644 * Don't accept zero nlink from non-unix servers unless
645 * delete is pending. Instead mark it as unknown.
646 */
647 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
648 !info->DeletePending) {
649 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 650 fattr->cf_nlink);
74d290da 651 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 652 }
6de2ce42 653 }
0b8f18e3
JL
654
655 fattr->cf_uid = cifs_sb->mnt_uid;
656 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
657}
658
4ad65044
PS
659static int
660cifs_get_file_info(struct file *filp)
abab095d
JL
661{
662 int rc;
6d5786a3 663 unsigned int xid;
abab095d
JL
664 FILE_ALL_INFO find_data;
665 struct cifs_fattr fattr;
496ad9aa 666 struct inode *inode = file_inode(filp);
c21dfb69 667 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 668 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
669 struct TCP_Server_Info *server = tcon->ses->server;
670
671 if (!server->ops->query_file_info)
672 return -ENOSYS;
abab095d 673
6d5786a3 674 xid = get_xid();
4ad65044 675 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
676 switch (rc) {
677 case 0:
e37fea58 678 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 679 false);
42274bb2
PS
680 break;
681 case -EREMOTE:
682 cifs_create_dfs_fattr(&fattr, inode->i_sb);
683 rc = 0;
684 break;
685 case -EOPNOTSUPP:
686 case -EINVAL:
abab095d
JL
687 /*
688 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
689 * for now, just skip revalidating and mark inode for
690 * immediate reval.
691 */
abab095d
JL
692 rc = 0;
693 CIFS_I(inode)->time = 0;
42274bb2 694 default:
abab095d 695 goto cgfi_exit;
42274bb2 696 }
abab095d
JL
697
698 /*
699 * don't bother with SFU junk here -- just mark inode as needing
700 * revalidation.
701 */
abab095d
JL
702 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
703 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
704 cifs_fattr_to_inode(inode, &fattr);
705cgfi_exit:
6d5786a3 706 free_xid(xid);
abab095d
JL
707 return rc;
708}
709
7ea884c7
SF
710/* Simple function to return a 64 bit hash of string. Rarely called */
711static __u64 simple_hashstr(const char *str)
712{
713 const __u64 hash_mult = 1125899906842597L; /* a big enough prime */
714 __u64 hash = 0;
715
716 while (*str)
717 hash = (hash + (__u64) *str++) * hash_mult;
718
719 return hash;
720}
721
1208ef1f
PS
722int
723cifs_get_inode_info(struct inode **inode, const char *full_path,
724 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 725 const struct cifs_fid *fid)
1da177e4 726{
c052e2b4
SP
727 bool validinum = false;
728 __u16 srchflgs;
729 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
730 struct cifs_tcon *tcon;
731 struct TCP_Server_Info *server;
7ffec372 732 struct tcon_link *tlink;
1da177e4 733 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 734 char *buf = NULL;
1208ef1f 735 bool adjust_tz = false;
0b8f18e3 736 struct cifs_fattr fattr;
c052e2b4 737 struct cifs_search_info *srchinf = NULL;
eb85d94b 738 bool symlink = false;
1da177e4 739
7ffec372
JL
740 tlink = cifs_sb_tlink(cifs_sb);
741 if (IS_ERR(tlink))
742 return PTR_ERR(tlink);
1208ef1f
PS
743 tcon = tlink_tcon(tlink);
744 server = tcon->ses->server;
7ffec372 745
f96637be 746 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 747
1208ef1f 748 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 749 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 750 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 751 goto cgii_exit;
1da177e4
LT
752 }
753 }
754
1208ef1f
PS
755 /* if inode info is not passed, get it from server */
756 if (data == NULL) {
757 if (!server->ops->query_path_info) {
758 rc = -ENOSYS;
759 goto cgii_exit;
760 }
1da177e4 761 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
762 if (buf == NULL) {
763 rc = -ENOMEM;
764 goto cgii_exit;
765 }
1208ef1f
PS
766 data = (FILE_ALL_INFO *)buf;
767 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 768 data, &adjust_tz, &symlink);
1da177e4 769 }
0b8f18e3
JL
770
771 if (!rc) {
e37fea58 772 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 773 symlink);
0b8f18e3
JL
774 } else if (rc == -EREMOTE) {
775 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 776 rc = 0;
c052e2b4
SP
777 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
778 srchinf = kzalloc(sizeof(struct cifs_search_info),
779 GFP_KERNEL);
780 if (srchinf == NULL) {
781 rc = -ENOMEM;
782 goto cgii_exit;
783 }
784
785 srchinf->endOfSearch = false;
786 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
787
788 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
789 CIFS_SEARCH_CLOSE_AT_END |
790 CIFS_SEARCH_BACKUP_SEARCH;
791
792 rc = CIFSFindFirst(xid, tcon, full_path,
793 cifs_sb, NULL, srchflgs, srchinf, false);
794 if (!rc) {
795 data =
796 (FILE_ALL_INFO *)srchinf->srch_entries_start;
797
798 cifs_dir_info_to_fattr(&fattr,
799 (FILE_DIRECTORY_INFO *)data, cifs_sb);
800 fattr.cf_uniqueid = le64_to_cpu(
801 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
802 validinum = true;
803
804 cifs_buf_release(srchinf->ntwrk_buf_start);
805 }
806 kfree(srchinf);
4c5930e8
SF
807 if (rc)
808 goto cgii_exit;
c052e2b4 809 } else
7962670e 810 goto cgii_exit;
1da177e4 811
0b8f18e3
JL
812 /*
813 * If an inode wasn't passed in, then get the inode number
814 *
815 * Is an i_ino of zero legal? Can we use that to check if the server
816 * supports returning inode numbers? Are there other sanity checks we
817 * can use to ensure that the server is really filling in that field?
0b8f18e3 818 */
1208ef1f 819 if (*inode == NULL) {
b9a3260f 820 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
821 if (validinum == false) {
822 if (server->ops->get_srv_inum)
823 tmprc = server->ops->get_srv_inum(xid,
824 tcon, cifs_sb, full_path,
825 &fattr.cf_uniqueid, data);
826 if (tmprc) {
f96637be
JP
827 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
828 tmprc);
c052e2b4
SP
829 fattr.cf_uniqueid = iunique(sb, ROOT_I);
830 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
831 } else if ((fattr.cf_uniqueid == 0) &&
832 strlen(full_path) == 0) {
833 /* some servers ret bad root ino ie 0 */
834 cifs_dbg(FYI, "Invalid (0) inodenum\n");
835 fattr.cf_flags |=
836 CIFS_FATTR_FAKE_ROOT_INO;
837 fattr.cf_uniqueid =
838 simple_hashstr(tcon->treeName);
c052e2b4 839 }
132ac7b7 840 }
c052e2b4 841 } else
0b8f18e3 842 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
843 } else {
844 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
845 validinum == false && server->ops->get_srv_inum) {
846 /*
847 * Pass a NULL tcon to ensure we don't make a round
848 * trip to the server. This only works for SMB2+.
849 */
850 tmprc = server->ops->get_srv_inum(xid,
851 NULL, cifs_sb, full_path,
852 &fattr.cf_uniqueid, data);
853 if (tmprc)
854 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
855 else if ((fattr.cf_uniqueid == 0) &&
856 strlen(full_path) == 0) {
857 /*
858 * Reuse existing root inode num since
859 * inum zero for root causes ls of . and .. to
860 * not be returned
861 */
862 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
863 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
864 }
a108471b
RL
865 } else
866 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
867 }
b9a3260f 868
0b8f18e3
JL
869 /* query for SFU type info if supported and needed */
870 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
871 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
872 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
873 if (tmprc)
f96637be 874 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 875 }
1da177e4 876
79df1bae 877#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
878 /* fill in 0777 bits from ACL */
879 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 880 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 881 if (rc) {
f96637be
JP
882 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
883 __func__, rc);
78415d2d
SP
884 goto cgii_exit;
885 }
b9a3260f 886 }
79df1bae 887#endif /* CONFIG_CIFS_ACL */
b9a3260f 888
0b8f18e3
JL
889 /* fill in remaining high mode bits e.g. SUID, VTX */
890 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
891 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 892
1b12b9c1
SM
893 /* check for Minshall+French symlinks */
894 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
895 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
896 full_path);
1b12b9c1 897 if (tmprc)
cb084b1a 898 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
899 }
900
1208ef1f
PS
901 if (!*inode) {
902 *inode = cifs_iget(sb, &fattr);
903 if (!*inode)
0b8f18e3
JL
904 rc = -ENOMEM;
905 } else {
7196ac11
NA
906 /* we already have inode, update it */
907
a108471b
RL
908 /* if uniqueid is different, return error */
909 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
910 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
911 rc = -ESTALE;
912 goto cgii_exit;
913 }
914
7196ac11
NA
915 /* if filetype is different, return error */
916 if (unlikely(((*inode)->i_mode & S_IFMT) !=
917 (fattr.cf_mode & S_IFMT))) {
918 rc = -ESTALE;
919 goto cgii_exit;
920 }
921
1208ef1f 922 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 923 }
b9a3260f 924
7962670e 925cgii_exit:
7ea884c7
SF
926 if ((*inode) && ((*inode)->i_ino == 0))
927 cifs_dbg(FYI, "inode number of zero returned\n");
928
1da177e4 929 kfree(buf);
7ffec372 930 cifs_put_tlink(tlink);
1da177e4
LT
931 return rc;
932}
933
7f8ed420
SF
934static const struct inode_operations cifs_ipc_inode_ops = {
935 .lookup = cifs_lookup,
936};
937
cc0bad75
JL
938static int
939cifs_find_inode(struct inode *inode, void *opaque)
940{
941 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
942
f30b9c11 943 /* don't match inode with different uniqueid */
cc0bad75
JL
944 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
945 return 0;
946
20054bd6
JL
947 /* use createtime like an i_generation field */
948 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
949 return 0;
950
f30b9c11
JL
951 /* don't match inode of different type */
952 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
953 return 0;
954
5acfec25 955 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 956 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 957 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 958
cc0bad75
JL
959 return 1;
960}
961
962static int
963cifs_init_inode(struct inode *inode, void *opaque)
964{
965 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
966
967 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 968 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
969 return 0;
970}
971
5acfec25
JL
972/*
973 * walk dentry list for an inode and report whether it has aliases that
974 * are hashed. We use this to determine if a directory inode can actually
975 * be used.
976 */
977static bool
978inode_has_hashed_dentries(struct inode *inode)
979{
980 struct dentry *dentry;
981
873feea0 982 spin_lock(&inode->i_lock);
946e51f2 983 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 984 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 985 spin_unlock(&inode->i_lock);
5acfec25
JL
986 return true;
987 }
988 }
873feea0 989 spin_unlock(&inode->i_lock);
5acfec25
JL
990 return false;
991}
992
cc0bad75
JL
993/* Given fattrs, get a corresponding inode */
994struct inode *
995cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
996{
997 unsigned long hash;
998 struct inode *inode;
999
3d694380 1000retry_iget5_locked:
f96637be 1001 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1002
1003 /* hash down to 32-bits on 32-bit arch */
1004 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1005
1006 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1007 if (inode) {
5acfec25 1008 /* was there a potentially problematic inode collision? */
3d694380 1009 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1010 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1011
1012 if (inode_has_hashed_dentries(inode)) {
1013 cifs_autodisable_serverino(CIFS_SB(sb));
1014 iput(inode);
1015 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1016 goto retry_iget5_locked;
1017 }
3d694380
JL
1018 }
1019
cc0bad75 1020 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1021 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1022 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1023 if (inode->i_state & I_NEW) {
1024 inode->i_ino = hash;
0ccd4802 1025#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1026 /* initialize per-inode cache cookie pointer */
1027 CIFS_I(inode)->fscache = NULL;
0ccd4802 1028#endif
cc0bad75
JL
1029 unlock_new_inode(inode);
1030 }
1031 }
1032
1033 return inode;
1034}
1035
1da177e4 1036/* gets root inode */
9b6763e0 1037struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1038{
6d5786a3 1039 unsigned int xid;
0d424ad0 1040 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1041 struct inode *inode = NULL;
ce634ab2 1042 long rc;
96daf2b0 1043 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1044 char *path = NULL;
1045 int len;
1046
1047 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1048 && cifs_sb->prepath) {
1049 len = strlen(cifs_sb->prepath);
1050 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1051 if (path == NULL)
1052 return ERR_PTR(-ENOMEM);
1053 path[0] = '/';
1054 memcpy(path+1, cifs_sb->prepath, len);
1055 } else {
1056 path = kstrdup("", GFP_KERNEL);
1057 if (path == NULL)
1058 return ERR_PTR(-ENOMEM);
1059 }
ce634ab2 1060
6d5786a3 1061 xid = get_xid();
b5b374ea 1062 if (tcon->unix_ext) {
a6b5058f 1063 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1064 /* some servers mistakenly claim POSIX support */
1065 if (rc != -EOPNOTSUPP)
1066 goto iget_no_retry;
1067 cifs_dbg(VFS, "server does not support POSIX extensions");
1068 tcon->unix_ext = false;
1069 }
1070
a6b5058f
AA
1071 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1072 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1073
b5b374ea 1074iget_no_retry:
a7851ce7
OS
1075 if (!inode) {
1076 inode = ERR_PTR(rc);
1077 goto out;
1078 }
cc0bad75 1079
0ccd4802 1080#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1081 /* populate tcon->resource_id */
0d424ad0 1082 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1083#endif
d03382ce 1084
b327a717 1085 if (rc && tcon->pipe) {
f96637be 1086 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1087 spin_lock(&inode->i_lock);
7f8ed420 1088 inode->i_mode |= S_IFDIR;
bfe86848 1089 set_nlink(inode, 2);
7f8ed420
SF
1090 inode->i_op = &cifs_ipc_inode_ops;
1091 inode->i_fop = &simple_dir_operations;
1092 inode->i_uid = cifs_sb->mnt_uid;
1093 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1094 spin_unlock(&inode->i_lock);
ad661334 1095 } else if (rc) {
ce634ab2 1096 iget_failed(inode);
a7851ce7 1097 inode = ERR_PTR(rc);
7f8ed420
SF
1098 }
1099
a7851ce7 1100out:
a6b5058f 1101 kfree(path);
31cd106b 1102 free_xid(xid);
ce634ab2 1103 return inode;
1da177e4
LT
1104}
1105
ed6875e0 1106int
6d5786a3 1107cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1108 char *full_path, __u32 dosattr)
388e57b2 1109{
388e57b2 1110 bool set_time = false;
388e57b2 1111 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1112 struct TCP_Server_Info *server;
388e57b2
SF
1113 FILE_BASIC_INFO info_buf;
1114
1adcb710
SF
1115 if (attrs == NULL)
1116 return -EINVAL;
1117
6bdf6dbd
PS
1118 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1119 if (!server->ops->set_file_info)
1120 return -ENOSYS;
1121
388e57b2
SF
1122 if (attrs->ia_valid & ATTR_ATIME) {
1123 set_time = true;
1124 info_buf.LastAccessTime =
1125 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1126 } else
1127 info_buf.LastAccessTime = 0;
1128
1129 if (attrs->ia_valid & ATTR_MTIME) {
1130 set_time = true;
1131 info_buf.LastWriteTime =
1132 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1133 } else
1134 info_buf.LastWriteTime = 0;
1135
1136 /*
1137 * Samba throws this field away, but windows may actually use it.
1138 * Do not set ctime unless other time stamps are changed explicitly
1139 * (i.e. by utimes()) since we would then have a mix of client and
1140 * server times.
1141 */
1142 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1143 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1144 info_buf.ChangeTime =
1145 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1146 } else
1147 info_buf.ChangeTime = 0;
1148
1149 info_buf.CreationTime = 0; /* don't change */
1150 info_buf.Attributes = cpu_to_le32(dosattr);
1151
6bdf6dbd 1152 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1153}
1154
a12a1ac7 1155/*
ed6875e0 1156 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1157 * and rename it to a random name that hopefully won't conflict with
1158 * anything else.
1159 */
ed6875e0
PS
1160int
1161cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1162 const unsigned int xid)
a12a1ac7
JL
1163{
1164 int oplock = 0;
1165 int rc;
d81b8a40
PS
1166 struct cifs_fid fid;
1167 struct cifs_open_parms oparms;
2b0143b5 1168 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1169 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1170 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1171 struct tcon_link *tlink;
96daf2b0 1172 struct cifs_tcon *tcon;
3270958b
SF
1173 __u32 dosattr, origattr;
1174 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1175
7ffec372
JL
1176 tlink = cifs_sb_tlink(cifs_sb);
1177 if (IS_ERR(tlink))
1178 return PTR_ERR(tlink);
1179 tcon = tlink_tcon(tlink);
1180
c483a984
SP
1181 /*
1182 * We cannot rename the file if the server doesn't support
1183 * CAP_INFOLEVEL_PASSTHRU
1184 */
1185 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1186 rc = -EBUSY;
1187 goto out;
1188 }
1189
d81b8a40
PS
1190 oparms.tcon = tcon;
1191 oparms.cifs_sb = cifs_sb;
1192 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1193 oparms.create_options = CREATE_NOT_DIR;
1194 oparms.disposition = FILE_OPEN;
1195 oparms.path = full_path;
1196 oparms.fid = &fid;
1197 oparms.reconnect = false;
1198
1199 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1200 if (rc != 0)
1201 goto out;
1202
3270958b
SF
1203 origattr = cifsInode->cifsAttrs;
1204 if (origattr == 0)
1205 origattr |= ATTR_NORMAL;
1206
1207 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1208 if (dosattr == 0)
1209 dosattr |= ATTR_NORMAL;
1210 dosattr |= ATTR_HIDDEN;
1211
3270958b
SF
1212 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1213 if (dosattr != origattr) {
1214 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1215 if (info_buf == NULL) {
1216 rc = -ENOMEM;
1217 goto out_close;
1218 }
1219 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1220 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1221 current->tgid);
1222 /* although we would like to mark the file hidden
1223 if that fails we will still try to rename it */
72d282dc 1224 if (!rc)
3270958b
SF
1225 cifsInode->cifsAttrs = dosattr;
1226 else
1227 dosattr = origattr; /* since not able to change them */
a12a1ac7 1228 }
a12a1ac7 1229
dd1db2de 1230 /* rename the file */
d81b8a40
PS
1231 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1232 cifs_sb->local_nls,
2baa2682 1233 cifs_remap(cifs_sb));
3270958b 1234 if (rc != 0) {
47c78f4a 1235 rc = -EBUSY;
3270958b
SF
1236 goto undo_setattr;
1237 }
6d22f098 1238
3270958b 1239 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1240 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1241 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1242 current->tgid);
1243 /*
1244 * some samba versions return -ENOENT when we try to set the
1245 * file disposition here. Likely a samba bug, but work around
1246 * it for now. This means that some cifsXXX files may hang
1247 * around after they shouldn't.
1248 *
1249 * BB: remove this hack after more servers have the fix
1250 */
1251 if (rc == -ENOENT)
1252 rc = 0;
1253 else if (rc != 0) {
47c78f4a 1254 rc = -EBUSY;
3270958b
SF
1255 goto undo_rename;
1256 }
aff8d5ca 1257 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1258 }
7ce86d5a 1259
a12a1ac7 1260out_close:
d81b8a40 1261 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1262out:
3270958b 1263 kfree(info_buf);
7ffec372 1264 cifs_put_tlink(tlink);
a12a1ac7 1265 return rc;
3270958b
SF
1266
1267 /*
1268 * reset everything back to the original state. Don't bother
1269 * dealing with errors here since we can't do anything about
1270 * them anyway.
1271 */
1272undo_rename:
d81b8a40 1273 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1274 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1275undo_setattr:
1276 if (dosattr != origattr) {
1277 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1278 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1279 current->tgid))
1280 cifsInode->cifsAttrs = origattr;
1281 }
1282
1283 goto out_close;
a12a1ac7
JL
1284}
1285
b7ca6928
SF
1286/* copied from fs/nfs/dir.c with small changes */
1287static void
1288cifs_drop_nlink(struct inode *inode)
1289{
1290 spin_lock(&inode->i_lock);
1291 if (inode->i_nlink > 0)
1292 drop_nlink(inode);
1293 spin_unlock(&inode->i_lock);
1294}
ff694527
SF
1295
1296/*
2b0143b5 1297 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1298 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1299 * if that fails we can not attempt the fall back mechanisms on EACCESS
1300 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1301 * unlink on negative dentries currently.
1302 */
5f0319a7 1303int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1304{
1305 int rc = 0;
6d5786a3 1306 unsigned int xid;
1da177e4 1307 char *full_path = NULL;
2b0143b5 1308 struct inode *inode = d_inode(dentry);
ff694527 1309 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1310 struct super_block *sb = dir->i_sb;
1311 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1312 struct tcon_link *tlink;
96daf2b0 1313 struct cifs_tcon *tcon;
ed6875e0 1314 struct TCP_Server_Info *server;
6050247d
SF
1315 struct iattr *attrs = NULL;
1316 __u32 dosattr = 0, origattr = 0;
1da177e4 1317
f96637be 1318 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1319
7ffec372
JL
1320 tlink = cifs_sb_tlink(cifs_sb);
1321 if (IS_ERR(tlink))
1322 return PTR_ERR(tlink);
1323 tcon = tlink_tcon(tlink);
ed6875e0 1324 server = tcon->ses->server;
7ffec372 1325
6d5786a3 1326 xid = get_xid();
1da177e4 1327
5f0319a7
JL
1328 /* Unlink can be called from rename so we can not take the
1329 * sb->s_vfs_rename_mutex here */
1330 full_path = build_path_from_dentry(dentry);
1da177e4 1331 if (full_path == NULL) {
0f3bc09e 1332 rc = -ENOMEM;
7ffec372 1333 goto unlink_out;
1da177e4 1334 }
2d785a50 1335
29e20f9c
PS
1336 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1337 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1338 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1339 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1340 cifs_remap(cifs_sb));
f96637be 1341 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1342 if ((rc == 0) || (rc == -ENOENT))
1343 goto psx_del_no_retry;
1344 }
1da177e4 1345
6050247d 1346retry_std_delete:
ed6875e0
PS
1347 if (!server->ops->unlink) {
1348 rc = -ENOSYS;
1349 goto psx_del_no_retry;
1350 }
1351
1352 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1353
2d785a50 1354psx_del_no_retry:
1da177e4 1355 if (!rc) {
5f0319a7 1356 if (inode)
b7ca6928 1357 cifs_drop_nlink(inode);
1da177e4 1358 } else if (rc == -ENOENT) {
5f0319a7 1359 d_drop(dentry);
47c78f4a 1360 } else if (rc == -EBUSY) {
ed6875e0
PS
1361 if (server->ops->rename_pending_delete) {
1362 rc = server->ops->rename_pending_delete(full_path,
1363 dentry, xid);
1364 if (rc == 0)
1365 cifs_drop_nlink(inode);
1366 }
ff694527 1367 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1368 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1369 if (attrs == NULL) {
1370 rc = -ENOMEM;
1371 goto out_reval;
1da177e4 1372 }
388e57b2
SF
1373
1374 /* try to reset dos attributes */
ff694527
SF
1375 cifs_inode = CIFS_I(inode);
1376 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1377 if (origattr == 0)
1378 origattr |= ATTR_NORMAL;
1379 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1380 if (dosattr == 0)
1381 dosattr |= ATTR_NORMAL;
1382 dosattr |= ATTR_HIDDEN;
1383
1384 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1385 if (rc != 0)
1386 goto out_reval;
6050247d
SF
1387
1388 goto retry_std_delete;
1da177e4 1389 }
6050247d
SF
1390
1391 /* undo the setattr if we errored out and it's needed */
1392 if (rc != 0 && dosattr != 0)
1393 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1394
388e57b2 1395out_reval:
4523cc30 1396 if (inode) {
ff694527
SF
1397 cifs_inode = CIFS_I(inode);
1398 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1399 when needed */
e37fea58 1400 inode->i_ctime = current_time(inode);
06bcfedd 1401 }
e37fea58 1402 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1403 cifs_inode = CIFS_I(dir);
6050247d 1404 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1405unlink_out:
1da177e4 1406 kfree(full_path);
6050247d 1407 kfree(attrs);
6d5786a3 1408 free_xid(xid);
7ffec372 1409 cifs_put_tlink(tlink);
1da177e4
LT
1410 return rc;
1411}
1412
ff691e96 1413static int
101b92d9 1414cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1415 const char *full_path, struct cifs_sb_info *cifs_sb,
1416 struct cifs_tcon *tcon, const unsigned int xid)
1417{
1418 int rc = 0;
101b92d9 1419 struct inode *inode = NULL;
ff691e96
PS
1420
1421 if (tcon->unix_ext)
101b92d9 1422 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1423 xid);
1424 else
101b92d9
JL
1425 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1426 xid, NULL);
1427
ff691e96
PS
1428 if (rc)
1429 return rc;
1430
ff691e96
PS
1431 /*
1432 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1433 * from the server or was set bogus. Also, since this is a brand new
1434 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1435 */
101b92d9
JL
1436 if (inode->i_nlink < 2)
1437 set_nlink(inode, 2);
ff691e96
PS
1438 mode &= ~current_umask();
1439 /* must turn on setgid bit if parent dir has it */
101b92d9 1440 if (parent->i_mode & S_ISGID)
ff691e96
PS
1441 mode |= S_ISGID;
1442
1443 if (tcon->unix_ext) {
1444 struct cifs_unix_set_info_args args = {
1445 .mode = mode,
1446 .ctime = NO_CHANGE_64,
1447 .atime = NO_CHANGE_64,
1448 .mtime = NO_CHANGE_64,
1449 .device = 0,
1450 };
1451 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1452 args.uid = current_fsuid();
101b92d9 1453 if (parent->i_mode & S_ISGID)
49418b2c 1454 args.gid = parent->i_gid;
ff691e96 1455 else
49418b2c 1456 args.gid = current_fsgid();
ff691e96 1457 } else {
49418b2c
EB
1458 args.uid = INVALID_UID; /* no change */
1459 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1460 }
1461 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1462 cifs_sb->local_nls,
2baa2682 1463 cifs_remap(cifs_sb));
ff691e96 1464 } else {
f436720e 1465 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1466 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1467 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1468 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1469 tcon, xid);
101b92d9
JL
1470 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1471 inode->i_mode = (mode | S_IFDIR);
1472
1473 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1474 inode->i_uid = current_fsuid();
1475 if (inode->i_mode & S_ISGID)
1476 inode->i_gid = parent->i_gid;
1477 else
1478 inode->i_gid = current_fsgid();
ff691e96
PS
1479 }
1480 }
101b92d9 1481 d_instantiate(dentry, inode);
ff691e96
PS
1482 return rc;
1483}
1484
1485static int
1486cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1487 const char *full_path, struct cifs_sb_info *cifs_sb,
1488 struct cifs_tcon *tcon, const unsigned int xid)
1489{
1490 int rc = 0;
1491 u32 oplock = 0;
1492 FILE_UNIX_BASIC_INFO *info = NULL;
1493 struct inode *newinode = NULL;
1494 struct cifs_fattr fattr;
1495
1496 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1497 if (info == NULL) {
1498 rc = -ENOMEM;
1499 goto posix_mkdir_out;
1500 }
1501
1502 mode &= ~current_umask();
1503 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1504 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1505 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1506 if (rc == -EOPNOTSUPP)
1507 goto posix_mkdir_out;
1508 else if (rc) {
f96637be 1509 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1510 d_drop(dentry);
1511 goto posix_mkdir_out;
1512 }
1513
1514 if (info->Type == cpu_to_le32(-1))
1515 /* no return info, go query for it */
1516 goto posix_mkdir_get_info;
1517 /*
1518 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1519 * need to set uid/gid.
1520 */
1521
1522 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1523 cifs_fill_uniqueid(inode->i_sb, &fattr);
1524 newinode = cifs_iget(inode->i_sb, &fattr);
1525 if (!newinode)
1526 goto posix_mkdir_get_info;
1527
1528 d_instantiate(dentry, newinode);
1529
1530#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1531 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1532 dentry, dentry, newinode);
ff691e96
PS
1533
1534 if (newinode->i_nlink != 2)
f96637be
JP
1535 cifs_dbg(FYI, "unexpected number of links %d\n",
1536 newinode->i_nlink);
ff691e96
PS
1537#endif
1538
1539posix_mkdir_out:
1540 kfree(info);
1541 return rc;
1542posix_mkdir_get_info:
1543 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1544 xid);
1545 goto posix_mkdir_out;
1546}
1547
18bb1db3 1548int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1549{
ff691e96 1550 int rc = 0;
6d5786a3 1551 unsigned int xid;
1da177e4 1552 struct cifs_sb_info *cifs_sb;
7ffec372 1553 struct tcon_link *tlink;
29e20f9c 1554 struct cifs_tcon *tcon;
f436720e 1555 struct TCP_Server_Info *server;
ff691e96 1556 char *full_path;
1da177e4 1557
f96637be
JP
1558 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1559 mode, inode);
1da177e4 1560
1da177e4 1561 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1562 tlink = cifs_sb_tlink(cifs_sb);
1563 if (IS_ERR(tlink))
1564 return PTR_ERR(tlink);
29e20f9c 1565 tcon = tlink_tcon(tlink);
7ffec372 1566
6d5786a3 1567 xid = get_xid();
1da177e4 1568
7f57356b 1569 full_path = build_path_from_dentry(direntry);
1da177e4 1570 if (full_path == NULL) {
0f3bc09e 1571 rc = -ENOMEM;
7ffec372 1572 goto mkdir_out;
1da177e4 1573 }
50c2f753 1574
29e20f9c
PS
1575 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1576 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1577 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1578 tcon, xid);
1579 if (rc != -EOPNOTSUPP)
2dd29d31 1580 goto mkdir_out;
fb8c4b14 1581 }
ff691e96 1582
f436720e
PS
1583 server = tcon->ses->server;
1584
1585 if (!server->ops->mkdir) {
1586 rc = -ENOSYS;
1587 goto mkdir_out;
1588 }
1589
1da177e4 1590 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1591 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1592 if (rc) {
f96637be 1593 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1594 d_drop(direntry);
ff691e96 1595 goto mkdir_out;
1da177e4 1596 }
ff691e96
PS
1597
1598 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1599 xid);
fb8c4b14 1600mkdir_out:
6de2ce42
PS
1601 /*
1602 * Force revalidate to get parent dir info when needed since cached
1603 * attributes are invalid now.
1604 */
1605 CIFS_I(inode)->time = 0;
1da177e4 1606 kfree(full_path);
6d5786a3 1607 free_xid(xid);
7ffec372 1608 cifs_put_tlink(tlink);
1da177e4
LT
1609 return rc;
1610}
1611
1612int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1613{
1614 int rc = 0;
6d5786a3 1615 unsigned int xid;
1da177e4 1616 struct cifs_sb_info *cifs_sb;
7ffec372 1617 struct tcon_link *tlink;
f958ca5d
PS
1618 struct cifs_tcon *tcon;
1619 struct TCP_Server_Info *server;
1da177e4
LT
1620 char *full_path = NULL;
1621 struct cifsInodeInfo *cifsInode;
1622
f96637be 1623 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1624
6d5786a3 1625 xid = get_xid();
1da177e4 1626
7f57356b 1627 full_path = build_path_from_dentry(direntry);
1da177e4 1628 if (full_path == NULL) {
0f3bc09e 1629 rc = -ENOMEM;
7ffec372 1630 goto rmdir_exit;
1da177e4
LT
1631 }
1632
7ffec372
JL
1633 cifs_sb = CIFS_SB(inode->i_sb);
1634 tlink = cifs_sb_tlink(cifs_sb);
1635 if (IS_ERR(tlink)) {
1636 rc = PTR_ERR(tlink);
1637 goto rmdir_exit;
1638 }
f958ca5d
PS
1639 tcon = tlink_tcon(tlink);
1640 server = tcon->ses->server;
1641
1642 if (!server->ops->rmdir) {
1643 rc = -ENOSYS;
1644 cifs_put_tlink(tlink);
1645 goto rmdir_exit;
1646 }
7ffec372 1647
f958ca5d 1648 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1649 cifs_put_tlink(tlink);
1da177e4
LT
1650
1651 if (!rc) {
2b0143b5
DH
1652 spin_lock(&d_inode(direntry)->i_lock);
1653 i_size_write(d_inode(direntry), 0);
1654 clear_nlink(d_inode(direntry));
1655 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1656 }
1657
2b0143b5 1658 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1659 /* force revalidate to go get info when needed */
1660 cifsInode->time = 0;
42c24544
SF
1661
1662 cifsInode = CIFS_I(inode);
6de2ce42
PS
1663 /*
1664 * Force revalidate to get parent dir info when needed since cached
1665 * attributes are invalid now.
1666 */
1667 cifsInode->time = 0;
42c24544 1668
2b0143b5 1669 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1670 current_time(inode);
1da177e4 1671
7ffec372 1672rmdir_exit:
1da177e4 1673 kfree(full_path);
6d5786a3 1674 free_xid(xid);
1da177e4
LT
1675 return rc;
1676}
1677
ee2fd967 1678static int
8ceb9843
PS
1679cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1680 const char *from_path, struct dentry *to_dentry,
1681 const char *to_path)
ee2fd967
SF
1682{
1683 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1684 struct tcon_link *tlink;
8ceb9843
PS
1685 struct cifs_tcon *tcon;
1686 struct TCP_Server_Info *server;
d81b8a40
PS
1687 struct cifs_fid fid;
1688 struct cifs_open_parms oparms;
ee2fd967
SF
1689 int oplock, rc;
1690
7ffec372
JL
1691 tlink = cifs_sb_tlink(cifs_sb);
1692 if (IS_ERR(tlink))
1693 return PTR_ERR(tlink);
8ceb9843
PS
1694 tcon = tlink_tcon(tlink);
1695 server = tcon->ses->server;
1696
1697 if (!server->ops->rename)
1698 return -ENOSYS;
7ffec372 1699
ee2fd967 1700 /* try path-based rename first */
8ceb9843 1701 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1702
1703 /*
8ceb9843
PS
1704 * Don't bother with rename by filehandle unless file is busy and
1705 * source. Note that cross directory moves do not work with
ee2fd967
SF
1706 * rename by filehandle to various Windows servers.
1707 */
47c78f4a 1708 if (rc == 0 || rc != -EBUSY)
7ffec372 1709 goto do_rename_exit;
ee2fd967 1710
ed0e3ace
JL
1711 /* open-file renames don't work across directories */
1712 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1713 goto do_rename_exit;
ed0e3ace 1714
d81b8a40
PS
1715 oparms.tcon = tcon;
1716 oparms.cifs_sb = cifs_sb;
ee2fd967 1717 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1718 oparms.desired_access = DELETE;
1719 oparms.create_options = CREATE_NOT_DIR;
1720 oparms.disposition = FILE_OPEN;
1721 oparms.path = from_path;
1722 oparms.fid = &fid;
1723 oparms.reconnect = false;
1724
1725 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1726 if (rc == 0) {
d81b8a40 1727 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1728 (const char *) to_dentry->d_name.name,
2baa2682 1729 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1730 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1731 }
7ffec372
JL
1732do_rename_exit:
1733 cifs_put_tlink(tlink);
ee2fd967
SF
1734 return rc;
1735}
1736
8ceb9843 1737int
7c33d597
MS
1738cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1739 struct inode *target_dir, struct dentry *target_dentry,
1740 unsigned int flags)
1da177e4 1741{
8ceb9843
PS
1742 char *from_name = NULL;
1743 char *to_name = NULL;
639e7a91 1744 struct cifs_sb_info *cifs_sb;
7ffec372 1745 struct tcon_link *tlink;
96daf2b0 1746 struct cifs_tcon *tcon;
ee2fd967
SF
1747 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1748 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1749 unsigned int xid;
1750 int rc, tmprc;
1da177e4 1751
7c33d597
MS
1752 if (flags & ~RENAME_NOREPLACE)
1753 return -EINVAL;
1754
639e7a91 1755 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1756 tlink = cifs_sb_tlink(cifs_sb);
1757 if (IS_ERR(tlink))
1758 return PTR_ERR(tlink);
1759 tcon = tlink_tcon(tlink);
1da177e4 1760
6d5786a3 1761 xid = get_xid();
ee2fd967 1762
ee2fd967
SF
1763 /*
1764 * we already have the rename sem so we do not need to
1765 * grab it again here to protect the path integrity
1766 */
8ceb9843
PS
1767 from_name = build_path_from_dentry(source_dentry);
1768 if (from_name == NULL) {
ee2fd967
SF
1769 rc = -ENOMEM;
1770 goto cifs_rename_exit;
1771 }
1772
8ceb9843
PS
1773 to_name = build_path_from_dentry(target_dentry);
1774 if (to_name == NULL) {
1da177e4
LT
1775 rc = -ENOMEM;
1776 goto cifs_rename_exit;
1777 }
1778
8ceb9843
PS
1779 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1780 to_name);
ee2fd967 1781
7c33d597
MS
1782 /*
1783 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1784 */
1785 if (flags & RENAME_NOREPLACE)
1786 goto cifs_rename_exit;
1787
14121bdc
JL
1788 if (rc == -EEXIST && tcon->unix_ext) {
1789 /*
8ceb9843
PS
1790 * Are src and dst hardlinks of same inode? We can only tell
1791 * with unix extensions enabled.
14121bdc
JL
1792 */
1793 info_buf_source =
1794 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1795 GFP_KERNEL);
1796 if (info_buf_source == NULL) {
1797 rc = -ENOMEM;
1798 goto cifs_rename_exit;
1799 }
1800
1801 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1802 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1803 info_buf_source,
1804 cifs_sb->local_nls,
2baa2682 1805 cifs_remap(cifs_sb));
8d281efb 1806 if (tmprc != 0)
14121bdc 1807 goto unlink_target;
ee2fd967 1808
8ceb9843
PS
1809 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1810 info_buf_target,
1811 cifs_sb->local_nls,
2baa2682 1812 cifs_remap(cifs_sb));
14121bdc 1813
8d281efb 1814 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1815 info_buf_target->UniqueId)) {
14121bdc 1816 /* same file, POSIX says that this is a noop */
ae6884a9 1817 rc = 0;
14121bdc 1818 goto cifs_rename_exit;
ae6884a9 1819 }
8ceb9843
PS
1820 }
1821 /*
1822 * else ... BB we could add the same check for Windows by
1823 * checking the UniqueId via FILE_INTERNAL_INFO
1824 */
14121bdc 1825
ee2fd967 1826unlink_target:
fc6f3943 1827 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1828 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1829 if (d_is_dir(target_dentry))
1830 tmprc = cifs_rmdir(target_dir, target_dentry);
1831 else
1832 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1833 if (tmprc)
1834 goto cifs_rename_exit;
8ceb9843
PS
1835 rc = cifs_do_rename(xid, source_dentry, from_name,
1836 target_dentry, to_name);
1da177e4
LT
1837 }
1838
b46799a8
PS
1839 /* force revalidate to go get info when needed */
1840 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1841
1842 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1843 target_dir->i_mtime = current_time(source_dir);
b46799a8 1844
1da177e4 1845cifs_rename_exit:
ee2fd967 1846 kfree(info_buf_source);
8ceb9843
PS
1847 kfree(from_name);
1848 kfree(to_name);
6d5786a3 1849 free_xid(xid);
7ffec372 1850 cifs_put_tlink(tlink);
1da177e4
LT
1851 return rc;
1852}
1853
df2cf170
JL
1854static bool
1855cifs_inode_needs_reval(struct inode *inode)
1da177e4 1856{
df2cf170 1857 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1858 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1859
18cceb6a 1860 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1861 return false;
1da177e4 1862
df2cf170
JL
1863 if (!lookupCacheEnabled)
1864 return true;
1da177e4 1865
df2cf170
JL
1866 if (cifs_i->time == 0)
1867 return true;
1da177e4 1868
a87c9ad9
JL
1869 if (!cifs_sb->actimeo)
1870 return true;
1871
6d20e840
SJ
1872 if (!time_in_range(jiffies, cifs_i->time,
1873 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1874 return true;
1875
db19272e 1876 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1877 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1878 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1879 return true;
1880
df2cf170
JL
1881 return false;
1882}
1883
523fb8c8
SJ
1884/*
1885 * Zap the cache. Called when invalid_mapping flag is set.
1886 */
6feb9891 1887int
df2cf170
JL
1888cifs_invalidate_mapping(struct inode *inode)
1889{
6feb9891 1890 int rc = 0;
df2cf170 1891
df2cf170 1892 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1893 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1894 if (rc)
f96637be
JP
1895 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1896 __func__, inode);
df2cf170 1897 }
257fb1f1 1898
9451a9a5 1899 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1900 return rc;
df2cf170
JL
1901}
1902
4f73c7d3
JL
1903/**
1904 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1905 * @word: long word containing the bit lock
1906 */
1907static int
dfd01f02 1908cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1909{
4f73c7d3 1910 freezable_schedule_unsafe();
dfd01f02
PZ
1911 if (signal_pending_state(mode, current))
1912 return -ERESTARTSYS;
4f73c7d3
JL
1913 return 0;
1914}
1915
e284e53f
JL
1916int
1917cifs_revalidate_mapping(struct inode *inode)
1918{
4f73c7d3
JL
1919 int rc;
1920 unsigned long *flags = &CIFS_I(inode)->flags;
1921
74316201
N
1922 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1923 TASK_KILLABLE);
4f73c7d3
JL
1924 if (rc)
1925 return rc;
1926
1927 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1928 rc = cifs_invalidate_mapping(inode);
1929 if (rc)
1930 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1931 }
1932
1933 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1934 smp_mb__after_atomic();
4f73c7d3
JL
1935 wake_up_bit(flags, CIFS_INO_LOCK);
1936
1937 return rc;
1938}
1939
1940int
1941cifs_zap_mapping(struct inode *inode)
1942{
1943 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1944 return cifs_revalidate_mapping(inode);
e284e53f
JL
1945}
1946
6feb9891 1947int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1948{
1949 int rc = 0;
496ad9aa 1950 struct inode *inode = file_inode(filp);
ba00ba64 1951 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1952
1953 if (!cifs_inode_needs_reval(inode))
6feb9891 1954 return rc;
abab095d 1955
13cfb733 1956 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1957 rc = cifs_get_file_info_unix(filp);
1958 else
1959 rc = cifs_get_file_info(filp);
1960
abab095d
JL
1961 return rc;
1962}
1963
6feb9891 1964int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1965{
6d5786a3 1966 unsigned int xid;
df2cf170 1967 int rc = 0;
2b0143b5 1968 struct inode *inode = d_inode(dentry);
df2cf170 1969 struct super_block *sb = dentry->d_sb;
6feb9891 1970 char *full_path = NULL;
df2cf170
JL
1971
1972 if (inode == NULL)
1973 return -ENOENT;
1da177e4 1974
df2cf170 1975 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1976 return rc;
1977
6d5786a3 1978 xid = get_xid();
1da177e4
LT
1979
1980 /* can not safely grab the rename sem here if rename calls revalidate
1981 since that would deadlock */
df2cf170 1982 full_path = build_path_from_dentry(dentry);
1da177e4 1983 if (full_path == NULL) {
0f3bc09e 1984 rc = -ENOMEM;
6feb9891 1985 goto out;
1da177e4
LT
1986 }
1987
f96637be
JP
1988 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1989 full_path, inode, inode->i_count.counter,
a00be0e3 1990 dentry, cifs_get_time(dentry), jiffies);
1da177e4 1991
0d424ad0 1992 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1993 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1994 else
1995 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1996 xid, NULL);
1da177e4 1997
6feb9891 1998out:
1da177e4 1999 kfree(full_path);
6d5786a3 2000 free_xid(xid);
1da177e4
LT
2001 return rc;
2002}
2003
6feb9891
PS
2004int cifs_revalidate_file(struct file *filp)
2005{
2006 int rc;
496ad9aa 2007 struct inode *inode = file_inode(filp);
6feb9891
PS
2008
2009 rc = cifs_revalidate_file_attr(filp);
2010 if (rc)
2011 return rc;
2012
e284e53f 2013 return cifs_revalidate_mapping(inode);
6feb9891
PS
2014}
2015
2016/* revalidate a dentry's inode attributes */
2017int cifs_revalidate_dentry(struct dentry *dentry)
2018{
2019 int rc;
2b0143b5 2020 struct inode *inode = d_inode(dentry);
6feb9891
PS
2021
2022 rc = cifs_revalidate_dentry_attr(dentry);
2023 if (rc)
2024 return rc;
2025
e284e53f 2026 return cifs_revalidate_mapping(inode);
6feb9891
PS
2027}
2028
a528d35e
DH
2029int cifs_getattr(const struct path *path, struct kstat *stat,
2030 u32 request_mask, unsigned int flags)
1da177e4 2031{
a528d35e 2032 struct dentry *dentry = path->dentry;
3aa1c8c2 2033 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2034 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2035 struct inode *inode = d_inode(dentry);
6feb9891 2036 int rc;
3aa1c8c2 2037
6feb9891
PS
2038 /*
2039 * We need to be sure that all dirty pages are written and the server
2040 * has actual ctime, mtime and file length.
2041 */
18cceb6a 2042 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2043 inode->i_mapping->nrpages != 0) {
2044 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2045 if (rc) {
2046 mapping_set_error(inode->i_mapping, rc);
2047 return rc;
2048 }
6feb9891 2049 }
1c456013 2050
6feb9891
PS
2051 rc = cifs_revalidate_dentry_attr(dentry);
2052 if (rc)
2053 return rc;
2054
2055 generic_fillattr(inode, stat);
2056 stat->blksize = CIFS_MAX_MSGSIZE;
2057 stat->ino = CIFS_I(inode)->uniqueid;
2058
6e70e26d
SF
2059 /* old CIFS Unix Extensions doesn't return create time */
2060 if (CIFS_I(inode)->createtime) {
2061 stat->result_mask |= STATX_BTIME;
2062 stat->btime =
2063 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
2064 }
2065
2066 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2067 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2068 stat->attributes |= STATX_ATTR_COMPRESSED;
2069 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2070 stat->attributes |= STATX_ATTR_ENCRYPTED;
2071
6feb9891 2072 /*
d3d1fce1
JL
2073 * If on a multiuser mount without unix extensions or cifsacl being
2074 * enabled, and the admin hasn't overridden them, set the ownership
2075 * to the fsuid/fsgid of the current process.
6feb9891
PS
2076 */
2077 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2078 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2079 !tcon->unix_ext) {
2080 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2081 stat->uid = current_fsuid();
2082 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2083 stat->gid = current_fsgid();
5fe14c85 2084 }
6feb9891 2085 return rc;
1da177e4
LT
2086}
2087
2088static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2089{
09cbfeaf
KS
2090 pgoff_t index = from >> PAGE_SHIFT;
2091 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2092 struct page *page;
1da177e4
LT
2093 int rc = 0;
2094
2095 page = grab_cache_page(mapping, index);
2096 if (!page)
2097 return -ENOMEM;
2098
09cbfeaf 2099 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2100 unlock_page(page);
09cbfeaf 2101 put_page(page);
1da177e4
LT
2102 return rc;
2103}
2104
1b947463 2105static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2106{
ba6a46a0 2107 spin_lock(&inode->i_lock);
3677db10 2108 i_size_write(inode, offset);
ba6a46a0 2109 spin_unlock(&inode->i_lock);
1b947463 2110
7caef267 2111 truncate_pagecache(inode, offset);
3677db10
SF
2112}
2113
8efdbde6
JL
2114static int
2115cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2116 unsigned int xid, char *full_path)
8efdbde6
JL
2117{
2118 int rc;
2119 struct cifsFileInfo *open_file;
2120 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2121 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2122 struct tcon_link *tlink = NULL;
d1433418
PS
2123 struct cifs_tcon *tcon = NULL;
2124 struct TCP_Server_Info *server;
8efdbde6
JL
2125
2126 /*
2127 * To avoid spurious oplock breaks from server, in the case of
2128 * inodes that we already have open, avoid doing path based
2129 * setting of file size if we can do it by handle.
2130 * This keeps our caching token (oplock) and avoids timeouts
2131 * when the local oplock break takes longer to flush
2132 * writebehind data than the SMB timeout for the SetPathInfo
2133 * request would allow
2134 */
6508d904 2135 open_file = find_writable_file(cifsInode, true);
8efdbde6 2136 if (open_file) {
d1433418
PS
2137 tcon = tlink_tcon(open_file->tlink);
2138 server = tcon->ses->server;
2139 if (server->ops->set_file_size)
2140 rc = server->ops->set_file_size(xid, tcon, open_file,
2141 attrs->ia_size, false);
2142 else
2143 rc = -ENOSYS;
6ab409b5 2144 cifsFileInfo_put(open_file);
f96637be 2145 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2146 } else
2147 rc = -EINVAL;
2148
d1433418
PS
2149 if (!rc)
2150 goto set_size_out;
2151
2152 if (tcon == NULL) {
2153 tlink = cifs_sb_tlink(cifs_sb);
2154 if (IS_ERR(tlink))
2155 return PTR_ERR(tlink);
2156 tcon = tlink_tcon(tlink);
2157 server = tcon->ses->server;
2158 }
ba00ba64 2159
d1433418
PS
2160 /*
2161 * Set file size by pathname rather than by handle either because no
2162 * valid, writeable file handle for it was found or because there was
2163 * an error setting it by handle.
2164 */
2165 if (server->ops->set_path_size)
2166 rc = server->ops->set_path_size(xid, tcon, full_path,
2167 attrs->ia_size, cifs_sb, false);
2168 else
2169 rc = -ENOSYS;
f96637be 2170 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2171
d1433418
PS
2172 if (tlink)
2173 cifs_put_tlink(tlink);
8efdbde6 2174
d1433418 2175set_size_out:
8efdbde6 2176 if (rc == 0) {
fbec9ab9 2177 cifsInode->server_eof = attrs->ia_size;
1b947463 2178 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2179 cifs_truncate_page(inode->i_mapping, inode->i_size);
2180 }
2181
2182 return rc;
2183}
2184
3fe5c1dd
JL
2185static int
2186cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2187{
2188 int rc;
6d5786a3 2189 unsigned int xid;
3fe5c1dd 2190 char *full_path = NULL;
2b0143b5 2191 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2192 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2193 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2194 struct tcon_link *tlink;
96daf2b0 2195 struct cifs_tcon *pTcon;
3fe5c1dd 2196 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2197 struct cifsFileInfo *open_file;
3fe5c1dd 2198
35c265e0
AV
2199 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2200 direntry, attrs->ia_valid);
3fe5c1dd 2201
6d5786a3 2202 xid = get_xid();
3fe5c1dd 2203
db78b877
CH
2204 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2205 attrs->ia_valid |= ATTR_FORCE;
2206
31051c85 2207 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2208 if (rc < 0)
2209 goto out;
3fe5c1dd
JL
2210
2211 full_path = build_path_from_dentry(direntry);
2212 if (full_path == NULL) {
2213 rc = -ENOMEM;
2214 goto out;
2215 }
2216
0f4d634c
JL
2217 /*
2218 * Attempt to flush data before changing attributes. We need to do
2219 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2220 * ownership or mode then we may also need to do this. Here, we take
2221 * the safe way out and just do the flush on all setattr requests. If
2222 * the flush returns error, store it to report later and continue.
2223 *
2224 * BB: This should be smarter. Why bother flushing pages that
2225 * will be truncated anyway? Also, should we error out here if
2226 * the flush returns error?
2227 */
2228 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2229 mapping_set_error(inode->i_mapping, rc);
2230 rc = 0;
3fe5c1dd
JL
2231
2232 if (attrs->ia_valid & ATTR_SIZE) {
2233 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2234 if (rc != 0)
2235 goto out;
2236 }
2237
2238 /* skip mode change if it's just for clearing setuid/setgid */
2239 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2240 attrs->ia_valid &= ~ATTR_MODE;
2241
2242 args = kmalloc(sizeof(*args), GFP_KERNEL);
2243 if (args == NULL) {
2244 rc = -ENOMEM;
2245 goto out;
2246 }
2247
2248 /* set up the struct */
2249 if (attrs->ia_valid & ATTR_MODE)
2250 args->mode = attrs->ia_mode;
2251 else
2252 args->mode = NO_CHANGE_64;
2253
2254 if (attrs->ia_valid & ATTR_UID)
2255 args->uid = attrs->ia_uid;
2256 else
49418b2c 2257 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2258
2259 if (attrs->ia_valid & ATTR_GID)
2260 args->gid = attrs->ia_gid;
2261 else
49418b2c 2262 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2263
2264 if (attrs->ia_valid & ATTR_ATIME)
2265 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2266 else
2267 args->atime = NO_CHANGE_64;
2268
2269 if (attrs->ia_valid & ATTR_MTIME)
2270 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2271 else
2272 args->mtime = NO_CHANGE_64;
2273
2274 if (attrs->ia_valid & ATTR_CTIME)
2275 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2276 else
2277 args->ctime = NO_CHANGE_64;
2278
2279 args->device = 0;
6508d904 2280 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2281 if (open_file) {
4b4de76e 2282 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2283 u32 npid = open_file->pid;
13cfb733 2284 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2285 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2286 cifsFileInfo_put(open_file);
3bbeeb3c 2287 } else {
7ffec372
JL
2288 tlink = cifs_sb_tlink(cifs_sb);
2289 if (IS_ERR(tlink)) {
2290 rc = PTR_ERR(tlink);
2291 goto out;
2292 }
2293 pTcon = tlink_tcon(tlink);
3bbeeb3c 2294 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2295 cifs_sb->local_nls,
bc8ebdc4 2296 cifs_remap(cifs_sb));
7ffec372 2297 cifs_put_tlink(tlink);
3bbeeb3c 2298 }
3fe5c1dd 2299
1025774c
CH
2300 if (rc)
2301 goto out;
ccd4bb1b 2302
1025774c 2303 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2304 attrs->ia_size != i_size_read(inode))
2305 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2306
2307 setattr_copy(inode, attrs);
2308 mark_inode_dirty(inode);
2309
2310 /* force revalidate when any of these times are set since some
2311 of the fs types (eg ext3, fat) do not have fine enough
2312 time granularity to match protocol, and we do not have a
2313 a way (yet) to query the server fs's time granularity (and
2314 whether it rounds times down).
2315 */
2316 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2317 cifsInode->time = 0;
3fe5c1dd
JL
2318out:
2319 kfree(args);
2320 kfree(full_path);
6d5786a3 2321 free_xid(xid);
3fe5c1dd
JL
2322 return rc;
2323}
2324
0510eeb7
JL
2325static int
2326cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2327{
6d5786a3 2328 unsigned int xid;
8abf2775
EB
2329 kuid_t uid = INVALID_UID;
2330 kgid_t gid = INVALID_GID;
2b0143b5 2331 struct inode *inode = d_inode(direntry);
3fe5c1dd 2332 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2333 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2334 char *full_path = NULL;
2335 int rc = -EACCES;
feb3e20c 2336 __u32 dosattr = 0;
4e1e7fb9 2337 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2338
6d5786a3 2339 xid = get_xid();
1da177e4 2340
35c265e0
AV
2341 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2342 direntry, attrs->ia_valid);
6473a559 2343
db78b877
CH
2344 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2345 attrs->ia_valid |= ATTR_FORCE;
2346
31051c85 2347 rc = setattr_prepare(direntry, attrs);
db78b877 2348 if (rc < 0) {
6d5786a3 2349 free_xid(xid);
db78b877 2350 return rc;
6473a559 2351 }
50c2f753 2352
7f57356b 2353 full_path = build_path_from_dentry(direntry);
1da177e4 2354 if (full_path == NULL) {
0f3bc09e 2355 rc = -ENOMEM;
6d5786a3 2356 free_xid(xid);
0f3bc09e 2357 return rc;
1da177e4 2358 }
1da177e4 2359
0f4d634c
JL
2360 /*
2361 * Attempt to flush data before changing attributes. We need to do
2362 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2363 * ownership or mode then we may also need to do this. Here, we take
2364 * the safe way out and just do the flush on all setattr requests. If
2365 * the flush returns error, store it to report later and continue.
2366 *
2367 * BB: This should be smarter. Why bother flushing pages that
2368 * will be truncated anyway? Also, should we error out here if
2369 * the flush returns error?
2370 */
2371 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2372 mapping_set_error(inode->i_mapping, rc);
2373 rc = 0;
cea21805 2374
50531444 2375 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2376 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2377 if (rc != 0)
e30dcf3a 2378 goto cifs_setattr_exit;
1da177e4 2379 }
4ca691a8 2380
a5ff3769
SP
2381 if (attrs->ia_valid & ATTR_UID)
2382 uid = attrs->ia_uid;
2383
2384 if (attrs->ia_valid & ATTR_GID)
2385 gid = attrs->ia_gid;
2386
2387#ifdef CONFIG_CIFS_ACL
2388 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2389 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2390 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2391 uid, gid);
2392 if (rc) {
f96637be
JP
2393 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2394 __func__, rc);
a5ff3769
SP
2395 goto cifs_setattr_exit;
2396 }
2397 }
2398 } else
2399#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2400 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2401 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2402
d32c4f26
JL
2403 /* skip mode change if it's just for clearing setuid/setgid */
2404 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2405 attrs->ia_valid &= ~ATTR_MODE;
2406
1da177e4 2407 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2408 mode = attrs->ia_mode;
cdbce9c8 2409 rc = 0;
79df1bae 2410#ifdef CONFIG_CIFS_ACL
78415d2d 2411 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2412 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2413 INVALID_UID, INVALID_GID);
78415d2d 2414 if (rc) {
f96637be
JP
2415 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2416 __func__, rc);
78415d2d
SP
2417 goto cifs_setattr_exit;
2418 }
2419 } else
79df1bae 2420#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2421 if (((mode & S_IWUGO) == 0) &&
2422 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2423
2424 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2425
5132861a
JL
2426 /* fix up mode if we're not using dynperm */
2427 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2428 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2429 } else if ((mode & S_IWUGO) &&
2430 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2431
2432 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2433 /* Attributes of 0 are ignored */
2434 if (dosattr == 0)
2435 dosattr |= ATTR_NORMAL;
5132861a
JL
2436
2437 /* reset local inode permissions to normal */
2438 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2439 attrs->ia_mode &= ~(S_IALLUGO);
2440 if (S_ISDIR(inode->i_mode))
2441 attrs->ia_mode |=
2442 cifs_sb->mnt_dir_mode;
2443 else
2444 attrs->ia_mode |=
2445 cifs_sb->mnt_file_mode;
2446 }
2447 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2448 /* ignore mode change - ATTR_READONLY hasn't changed */
2449 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2450 }
1da177e4
LT
2451 }
2452
feb3e20c
JL
2453 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2454 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2455 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2456 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2457
e30dcf3a
SF
2458 /* Even if error on time set, no sense failing the call if
2459 the server would set the time to a reasonable value anyway,
2460 and this check ensures that we are not being called from
2461 sys_utimes in which case we ought to fail the call back to
2462 the user when the server rejects the call */
fb8c4b14 2463 if ((rc) && (attrs->ia_valid &
feb3e20c 2464 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2465 rc = 0;
1da177e4
LT
2466 }
2467
2468 /* do not need local check to inode_check_ok since the server does
2469 that */
1025774c
CH
2470 if (rc)
2471 goto cifs_setattr_exit;
2472
2473 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2474 attrs->ia_size != i_size_read(inode))
2475 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2476
2477 setattr_copy(inode, attrs);
2478 mark_inode_dirty(inode);
1025774c 2479
e30dcf3a 2480cifs_setattr_exit:
1da177e4 2481 kfree(full_path);
6d5786a3 2482 free_xid(xid);
1da177e4
LT
2483 return rc;
2484}
2485
0510eeb7
JL
2486int
2487cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2488{
fc64005c 2489 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2490 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2491
2492 if (pTcon->unix_ext)
2493 return cifs_setattr_unix(direntry, attrs);
2494
2495 return cifs_setattr_nounix(direntry, attrs);
2496
2497 /* BB: add cifs_setattr_legacy for really old servers */
2498}
2499
99ee4dbd 2500#if 0
1da177e4
LT
2501void cifs_delete_inode(struct inode *inode)
2502{
f96637be 2503 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2504 /* may have to add back in if and when safe distributed caching of
2505 directories added e.g. via FindNotify */
2506}
99ee4dbd 2507#endif