cifs: Silence uninitialized variable warning
[linux-block.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
95582b00 98 struct timespec ts;
df2cf170 99
f96637be
JP
100 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
101 __func__, cifs_i->uniqueid);
df2cf170
JL
102
103 if (inode->i_state & I_NEW) {
f96637be
JP
104 cifs_dbg(FYI, "%s: inode %llu is new\n",
105 __func__, cifs_i->uniqueid);
df2cf170
JL
106 return;
107 }
108
109 /* don't bother with revalidation if we have an oplock */
18cceb6a 110 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
111 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
112 __func__, cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
116 /* revalidate if mtime or size have changed */
95582b00
DD
117 ts = timespec64_to_timespec(inode->i_mtime);
118 if (timespec_equal(&ts, &fattr->cf_mtime) &&
df2cf170 119 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
120 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
121 __func__, cifs_i->uniqueid);
df2cf170
JL
122 return;
123 }
124
f96637be
JP
125 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
126 __func__, cifs_i->uniqueid);
aff8d5ca 127 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
128}
129
74d290da
JM
130/*
131 * copy nlink to the inode, unless it wasn't provided. Provide
132 * sane values if we don't have an existing one and none was provided
133 */
134static void
135cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
136{
137 /*
138 * if we're in a situation where we can't trust what we
139 * got from the server (readdir, some non-unix cases)
140 * fake reasonable values
141 */
142 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
143 /* only provide fake values on a new inode */
144 if (inode->i_state & I_NEW) {
145 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
146 set_nlink(inode, 2);
147 else
148 set_nlink(inode, 1);
149 }
150 return;
151 }
152
153 /* we trust the server, so update it */
154 set_nlink(inode, fattr->cf_nlink);
155}
156
cc0bad75
JL
157/* populate an inode with info from a cifs_fattr struct */
158void
159cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 160{
cc0bad75 161 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 162 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 163
df2cf170
JL
164 cifs_revalidate_cache(inode, fattr);
165
b7ca6928 166 spin_lock(&inode->i_lock);
95582b00
DD
167 inode->i_atime = timespec_to_timespec64(fattr->cf_atime);
168 inode->i_mtime = timespec_to_timespec64(fattr->cf_mtime);
169 inode->i_ctime = timespec_to_timespec64(fattr->cf_ctime);
cc0bad75 170 inode->i_rdev = fattr->cf_rdev;
74d290da 171 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
172 inode->i_uid = fattr->cf_uid;
173 inode->i_gid = fattr->cf_gid;
174
0b8f18e3
JL
175 /* if dynperm is set, don't clobber existing mode */
176 if (inode->i_state & I_NEW ||
177 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
178 inode->i_mode = fattr->cf_mode;
179
cc0bad75 180 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 181
0b8f18e3
JL
182 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
183 cifs_i->time = 0;
184 else
185 cifs_i->time = jiffies;
186
aff8d5ca
JL
187 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
188 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
189 else
190 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 191
835a36ca 192 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
193 /*
194 * Can't safely change the file size here if the client is writing to
195 * it due to potential races.
196 */
cc0bad75
JL
197 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
198 i_size_write(inode, fattr->cf_eof);
199
200 /*
201 * i_blocks is not related to (i_size / i_blksize),
202 * but instead 512 byte (2**9) size is required for
203 * calculating num blocks.
204 */
205 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
206 }
207 spin_unlock(&inode->i_lock);
208
01c64fea
DH
209 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
210 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
211 if (inode->i_state & I_NEW)
212 cifs_set_ops(inode);
cc0bad75
JL
213}
214
4065c802
JL
215void
216cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
217{
218 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
219
220 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
221 return;
222
223 fattr->cf_uniqueid = iunique(sb, ROOT_I);
224}
225
cc0bad75
JL
226/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
227void
228cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
229 struct cifs_sb_info *cifs_sb)
230{
231 memset(fattr, 0, sizeof(*fattr));
232 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
233 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
234 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
235
236 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
237 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
238 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
239 /* old POSIX extensions don't get create time */
240
cc0bad75 241 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
242
243 /*
244 * Since we set the inode type below we need to mask off
245 * to avoid strange results if bits set above.
246 */
cc0bad75 247 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
248 switch (le32_to_cpu(info->Type)) {
249 case UNIX_FILE:
cc0bad75
JL
250 fattr->cf_mode |= S_IFREG;
251 fattr->cf_dtype = DT_REG;
75f12983
CH
252 break;
253 case UNIX_SYMLINK:
cc0bad75
JL
254 fattr->cf_mode |= S_IFLNK;
255 fattr->cf_dtype = DT_LNK;
75f12983
CH
256 break;
257 case UNIX_DIR:
cc0bad75
JL
258 fattr->cf_mode |= S_IFDIR;
259 fattr->cf_dtype = DT_DIR;
75f12983
CH
260 break;
261 case UNIX_CHARDEV:
cc0bad75
JL
262 fattr->cf_mode |= S_IFCHR;
263 fattr->cf_dtype = DT_CHR;
264 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
265 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
266 break;
267 case UNIX_BLOCKDEV:
cc0bad75
JL
268 fattr->cf_mode |= S_IFBLK;
269 fattr->cf_dtype = DT_BLK;
270 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
271 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
272 break;
273 case UNIX_FIFO:
cc0bad75
JL
274 fattr->cf_mode |= S_IFIFO;
275 fattr->cf_dtype = DT_FIFO;
75f12983
CH
276 break;
277 case UNIX_SOCKET:
cc0bad75
JL
278 fattr->cf_mode |= S_IFSOCK;
279 fattr->cf_dtype = DT_SOCK;
75f12983
CH
280 break;
281 default:
282 /* safest to call it a file if we do not know */
cc0bad75
JL
283 fattr->cf_mode |= S_IFREG;
284 fattr->cf_dtype = DT_REG;
f96637be 285 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
286 break;
287 }
288
46bbc25f
EB
289 fattr->cf_uid = cifs_sb->mnt_uid;
290 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
291 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
292 if (id < ((uid_t)-1)) {
293 kuid_t uid = make_kuid(&init_user_ns, id);
294 if (uid_valid(uid))
295 fattr->cf_uid = uid;
296 }
46bbc25f
EB
297 }
298
299 fattr->cf_gid = cifs_sb->mnt_gid;
300 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
301 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
302 if (id < ((gid_t)-1)) {
303 kgid_t gid = make_kgid(&init_user_ns, id);
304 if (gid_valid(gid))
305 fattr->cf_gid = gid;
306 }
46bbc25f 307 }
75f12983 308
cc0bad75 309 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
310}
311
b9a3260f 312/*
cc0bad75
JL
313 * Fill a cifs_fattr struct with fake inode info.
314 *
315 * Needed to setup cifs_fattr data for the directory which is the
316 * junction to the new submount (ie to setup the fake directory
317 * which represents a DFS referral).
b9a3260f 318 */
f1230c97 319static void
cc0bad75 320cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 321{
cc0bad75 322 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 323
f96637be 324 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
325
326 memset(fattr, 0, sizeof(*fattr));
327 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
328 fattr->cf_uid = cifs_sb->mnt_uid;
329 fattr->cf_gid = cifs_sb->mnt_gid;
e37fea58
DD
330 ktime_get_real_ts(&fattr->cf_mtime);
331 fattr->cf_mtime = timespec_trunc(fattr->cf_mtime, sb->s_time_gran);
332 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
333 fattr->cf_nlink = 2;
334 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
335}
336
4ad65044
PS
337static int
338cifs_get_file_info_unix(struct file *filp)
abab095d
JL
339{
340 int rc;
6d5786a3 341 unsigned int xid;
abab095d
JL
342 FILE_UNIX_BASIC_INFO find_data;
343 struct cifs_fattr fattr;
496ad9aa 344 struct inode *inode = file_inode(filp);
abab095d 345 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 346 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 347 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 348
6d5786a3 349 xid = get_xid();
4b4de76e 350 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
351 if (!rc) {
352 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
353 } else if (rc == -EREMOTE) {
354 cifs_create_dfs_fattr(&fattr, inode->i_sb);
355 rc = 0;
356 }
357
358 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 359 free_xid(xid);
abab095d
JL
360 return rc;
361}
362
1da177e4 363int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 364 const unsigned char *full_path,
6d5786a3 365 struct super_block *sb, unsigned int xid)
1da177e4 366{
cc0bad75 367 int rc;
0e4bbde9 368 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 369 struct cifs_fattr fattr;
96daf2b0 370 struct cifs_tcon *tcon;
7ffec372 371 struct tcon_link *tlink;
1da177e4 372 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 373
f96637be 374 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 375
7ffec372
JL
376 tlink = cifs_sb_tlink(cifs_sb);
377 if (IS_ERR(tlink))
378 return PTR_ERR(tlink);
379 tcon = tlink_tcon(tlink);
380
1da177e4 381 /* could have done a find first instead but this returns more info */
cc0bad75 382 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 383 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 384 cifs_put_tlink(tlink);
e911d0cc 385
cc0bad75
JL
386 if (!rc) {
387 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
388 } else if (rc == -EREMOTE) {
389 cifs_create_dfs_fattr(&fattr, sb);
390 rc = 0;
391 } else {
392 return rc;
393 }
1da177e4 394
1b12b9c1
SM
395 /* check for Minshall+French symlinks */
396 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
397 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
398 full_path);
1b12b9c1 399 if (tmprc)
cb084b1a 400 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
401 }
402
0e4bbde9 403 if (*pinode == NULL) {
cc0bad75 404 /* get new inode */
4065c802 405 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
406 *pinode = cifs_iget(sb, &fattr);
407 if (!*pinode)
0e4bbde9 408 rc = -ENOMEM;
cc0bad75
JL
409 } else {
410 /* we already have inode, update it */
7196ac11
NA
411
412 /* if uniqueid is different, return error */
413 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
414 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
415 rc = -ESTALE;
416 goto cgiiu_exit;
417 }
418
419 /* if filetype is different, return error */
420 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
421 (fattr.cf_mode & S_IFMT))) {
422 rc = -ESTALE;
423 goto cgiiu_exit;
424 }
425
cc0bad75 426 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 427 }
1da177e4 428
7196ac11 429cgiiu_exit:
1da177e4
LT
430 return rc;
431}
432
0b8f18e3 433static int
0360d605 434cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 435 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
436{
437 int rc;
db8b631d 438 __u32 oplock;
7ffec372 439 struct tcon_link *tlink;
96daf2b0 440 struct cifs_tcon *tcon;
d81b8a40
PS
441 struct cifs_fid fid;
442 struct cifs_open_parms oparms;
d4ffff1f 443 struct cifs_io_parms io_parms;
86c96b4b 444 char buf[24];
d6e2f2a4 445 unsigned int bytes_read;
fb8c4b14 446 char *pbuf;
0360d605 447 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
448
449 pbuf = buf;
450
0b8f18e3
JL
451 fattr->cf_mode &= ~S_IFMT;
452
453 if (fattr->cf_eof == 0) {
454 fattr->cf_mode |= S_IFIFO;
455 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 456 return 0;
0b8f18e3
JL
457 } else if (fattr->cf_eof < 8) {
458 fattr->cf_mode |= S_IFREG;
459 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
460 return -EINVAL; /* EOPNOTSUPP? */
461 }
50c2f753 462
7ffec372
JL
463 tlink = cifs_sb_tlink(cifs_sb);
464 if (IS_ERR(tlink))
465 return PTR_ERR(tlink);
466 tcon = tlink_tcon(tlink);
467
d81b8a40
PS
468 oparms.tcon = tcon;
469 oparms.cifs_sb = cifs_sb;
470 oparms.desired_access = GENERIC_READ;
471 oparms.create_options = CREATE_NOT_DIR;
472 oparms.disposition = FILE_OPEN;
473 oparms.path = path;
474 oparms.fid = &fid;
475 oparms.reconnect = false;
476
db8b631d
SF
477 if (tcon->ses->server->oplocks)
478 oplock = REQ_OPLOCK;
479 else
480 oplock = 0;
481 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 482 if (rc) {
db8b631d 483 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
484 cifs_put_tlink(tlink);
485 return rc;
486 }
487
488 /* Read header */
d81b8a40 489 io_parms.netfid = fid.netfid;
0360d605
PS
490 io_parms.pid = current->tgid;
491 io_parms.tcon = tcon;
492 io_parms.offset = 0;
493 io_parms.length = 24;
494
db8b631d
SF
495 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
496 &bytes_read, &pbuf, &buf_type);
0360d605
PS
497 if ((rc == 0) && (bytes_read >= 8)) {
498 if (memcmp("IntxBLK", pbuf, 8) == 0) {
499 cifs_dbg(FYI, "Block device\n");
500 fattr->cf_mode |= S_IFBLK;
501 fattr->cf_dtype = DT_BLK;
502 if (bytes_read == 24) {
503 /* we have enough to decode dev num */
504 __u64 mjr; /* major */
505 __u64 mnr; /* minor */
506 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
507 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
508 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 509 }
0360d605
PS
510 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
511 cifs_dbg(FYI, "Char device\n");
512 fattr->cf_mode |= S_IFCHR;
513 fattr->cf_dtype = DT_CHR;
514 if (bytes_read == 24) {
515 /* we have enough to decode dev num */
516 __u64 mjr; /* major */
517 __u64 mnr; /* minor */
518 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
519 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
520 fattr->cf_rdev = MKDEV(mjr, mnr);
521 }
522 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
523 cifs_dbg(FYI, "Symlink\n");
524 fattr->cf_mode |= S_IFLNK;
525 fattr->cf_dtype = DT_LNK;
3020a1f5 526 } else {
0360d605 527 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 528 fattr->cf_dtype = DT_REG;
0360d605 529 rc = -EOPNOTSUPP;
fb8c4b14 530 }
0360d605
PS
531 } else {
532 fattr->cf_mode |= S_IFREG; /* then it is a file */
533 fattr->cf_dtype = DT_REG;
534 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 535 }
db8b631d
SF
536
537 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 538 cifs_put_tlink(tlink);
d6e2f2a4 539 return rc;
d6e2f2a4
SF
540}
541
9e294f1c
SF
542#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
543
0b8f18e3
JL
544/*
545 * Fetch mode bits as provided by SFU.
546 *
547 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
548 */
549static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 550 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 551{
3020a1f5 552#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
553 ssize_t rc;
554 char ea_value[4];
555 __u32 mode;
7ffec372 556 struct tcon_link *tlink;
96daf2b0 557 struct cifs_tcon *tcon;
7ffec372
JL
558
559 tlink = cifs_sb_tlink(cifs_sb);
560 if (IS_ERR(tlink))
561 return PTR_ERR(tlink);
562 tcon = tlink_tcon(tlink);
9e294f1c 563
d979f3b0
SF
564 if (tcon->ses->server->ops->query_all_EAs == NULL) {
565 cifs_put_tlink(tlink);
566 return -EOPNOTSUPP;
567 }
568
569 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
570 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 571 cifs_sb);
7ffec372 572 cifs_put_tlink(tlink);
4523cc30 573 if (rc < 0)
9e294f1c
SF
574 return (int)rc;
575 else if (rc > 3) {
576 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 577 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
578 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
579 mode, fattr->cf_mode);
0b8f18e3 580 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 581 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 582 }
0b8f18e3
JL
583
584 return 0;
3020a1f5
SF
585#else
586 return -EOPNOTSUPP;
587#endif
9e294f1c
SF
588}
589
0b8f18e3 590/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 591static void
0b8f18e3 592cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 593 struct super_block *sb, bool adjust_tz,
eb85d94b 594 bool symlink)
b9a3260f 595{
e37fea58 596 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 597 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 598
0b8f18e3
JL
599 memset(fattr, 0, sizeof(*fattr));
600 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
601 if (info->DeletePending)
602 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
603
604 if (info->LastAccessTime)
605 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58
DD
606 else {
607 ktime_get_real_ts(&fattr->cf_atime);
608 fattr->cf_atime = timespec_trunc(fattr->cf_atime, sb->s_time_gran);
609 }
0b8f18e3
JL
610
611 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
612 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
613
614 if (adjust_tz) {
0d424ad0
JL
615 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
616 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
617 }
618
619 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
620 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 621 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 622
74d290da 623 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
624
625 if (symlink) {
626 fattr->cf_mode = S_IFLNK;
627 fattr->cf_dtype = DT_LNK;
628 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
629 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
630 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
631 /*
632 * Server can return wrong NumberOfLinks value for directories
633 * when Unix extensions are disabled - fake it.
634 */
74d290da
JM
635 if (!tcon->unix_ext)
636 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
637 } else {
638 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
639 fattr->cf_dtype = DT_REG;
0b8f18e3 640
d0c280d2
JL
641 /* clear write bits if ATTR_READONLY is set */
642 if (fattr->cf_cifsattrs & ATTR_READONLY)
643 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 644
74d290da
JM
645 /*
646 * Don't accept zero nlink from non-unix servers unless
647 * delete is pending. Instead mark it as unknown.
648 */
649 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
650 !info->DeletePending) {
651 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 652 fattr->cf_nlink);
74d290da 653 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 654 }
6de2ce42 655 }
0b8f18e3
JL
656
657 fattr->cf_uid = cifs_sb->mnt_uid;
658 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
659}
660
4ad65044
PS
661static int
662cifs_get_file_info(struct file *filp)
abab095d
JL
663{
664 int rc;
6d5786a3 665 unsigned int xid;
abab095d
JL
666 FILE_ALL_INFO find_data;
667 struct cifs_fattr fattr;
496ad9aa 668 struct inode *inode = file_inode(filp);
c21dfb69 669 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 670 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
671 struct TCP_Server_Info *server = tcon->ses->server;
672
673 if (!server->ops->query_file_info)
674 return -ENOSYS;
abab095d 675
6d5786a3 676 xid = get_xid();
4ad65044 677 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
678 switch (rc) {
679 case 0:
e37fea58 680 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 681 false);
42274bb2
PS
682 break;
683 case -EREMOTE:
684 cifs_create_dfs_fattr(&fattr, inode->i_sb);
685 rc = 0;
686 break;
687 case -EOPNOTSUPP:
688 case -EINVAL:
abab095d
JL
689 /*
690 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
691 * for now, just skip revalidating and mark inode for
692 * immediate reval.
693 */
abab095d
JL
694 rc = 0;
695 CIFS_I(inode)->time = 0;
42274bb2 696 default:
abab095d 697 goto cgfi_exit;
42274bb2 698 }
abab095d
JL
699
700 /*
701 * don't bother with SFU junk here -- just mark inode as needing
702 * revalidation.
703 */
abab095d
JL
704 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
705 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
706 cifs_fattr_to_inode(inode, &fattr);
707cgfi_exit:
6d5786a3 708 free_xid(xid);
abab095d
JL
709 return rc;
710}
711
7ea884c7
SF
712/* Simple function to return a 64 bit hash of string. Rarely called */
713static __u64 simple_hashstr(const char *str)
714{
3995bbf5 715 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
716 __u64 hash = 0;
717
718 while (*str)
719 hash = (hash + (__u64) *str++) * hash_mult;
720
721 return hash;
722}
723
1208ef1f
PS
724int
725cifs_get_inode_info(struct inode **inode, const char *full_path,
726 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 727 const struct cifs_fid *fid)
1da177e4 728{
c052e2b4
SP
729 bool validinum = false;
730 __u16 srchflgs;
731 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
732 struct cifs_tcon *tcon;
733 struct TCP_Server_Info *server;
7ffec372 734 struct tcon_link *tlink;
1da177e4 735 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 736 char *buf = NULL;
1208ef1f 737 bool adjust_tz = false;
0b8f18e3 738 struct cifs_fattr fattr;
c052e2b4 739 struct cifs_search_info *srchinf = NULL;
eb85d94b 740 bool symlink = false;
1da177e4 741
7ffec372
JL
742 tlink = cifs_sb_tlink(cifs_sb);
743 if (IS_ERR(tlink))
744 return PTR_ERR(tlink);
1208ef1f
PS
745 tcon = tlink_tcon(tlink);
746 server = tcon->ses->server;
7ffec372 747
f96637be 748 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 749
1208ef1f 750 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
751 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
752 CIFS_I(*inode)->time != 0) {
f96637be 753 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 754 goto cgii_exit;
1da177e4
LT
755 }
756 }
757
1208ef1f
PS
758 /* if inode info is not passed, get it from server */
759 if (data == NULL) {
760 if (!server->ops->query_path_info) {
761 rc = -ENOSYS;
762 goto cgii_exit;
763 }
1da177e4 764 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
765 if (buf == NULL) {
766 rc = -ENOMEM;
767 goto cgii_exit;
768 }
1208ef1f
PS
769 data = (FILE_ALL_INFO *)buf;
770 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 771 data, &adjust_tz, &symlink);
1da177e4 772 }
0b8f18e3
JL
773
774 if (!rc) {
e37fea58 775 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 776 symlink);
0b8f18e3
JL
777 } else if (rc == -EREMOTE) {
778 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 779 rc = 0;
c052e2b4
SP
780 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
781 srchinf = kzalloc(sizeof(struct cifs_search_info),
782 GFP_KERNEL);
783 if (srchinf == NULL) {
784 rc = -ENOMEM;
785 goto cgii_exit;
786 }
787
788 srchinf->endOfSearch = false;
789 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
790
791 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
792 CIFS_SEARCH_CLOSE_AT_END |
793 CIFS_SEARCH_BACKUP_SEARCH;
794
795 rc = CIFSFindFirst(xid, tcon, full_path,
796 cifs_sb, NULL, srchflgs, srchinf, false);
797 if (!rc) {
798 data =
799 (FILE_ALL_INFO *)srchinf->srch_entries_start;
800
801 cifs_dir_info_to_fattr(&fattr,
802 (FILE_DIRECTORY_INFO *)data, cifs_sb);
803 fattr.cf_uniqueid = le64_to_cpu(
804 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
805 validinum = true;
806
807 cifs_buf_release(srchinf->ntwrk_buf_start);
808 }
809 kfree(srchinf);
4c5930e8
SF
810 if (rc)
811 goto cgii_exit;
c052e2b4 812 } else
7962670e 813 goto cgii_exit;
1da177e4 814
0b8f18e3
JL
815 /*
816 * If an inode wasn't passed in, then get the inode number
817 *
818 * Is an i_ino of zero legal? Can we use that to check if the server
819 * supports returning inode numbers? Are there other sanity checks we
820 * can use to ensure that the server is really filling in that field?
0b8f18e3 821 */
1208ef1f 822 if (*inode == NULL) {
b9a3260f 823 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
824 if (validinum == false) {
825 if (server->ops->get_srv_inum)
826 tmprc = server->ops->get_srv_inum(xid,
827 tcon, cifs_sb, full_path,
828 &fattr.cf_uniqueid, data);
829 if (tmprc) {
f96637be
JP
830 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
831 tmprc);
c052e2b4
SP
832 fattr.cf_uniqueid = iunique(sb, ROOT_I);
833 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
834 } else if ((fattr.cf_uniqueid == 0) &&
835 strlen(full_path) == 0) {
836 /* some servers ret bad root ino ie 0 */
837 cifs_dbg(FYI, "Invalid (0) inodenum\n");
838 fattr.cf_flags |=
839 CIFS_FATTR_FAKE_ROOT_INO;
840 fattr.cf_uniqueid =
841 simple_hashstr(tcon->treeName);
c052e2b4 842 }
132ac7b7 843 }
c052e2b4 844 } else
0b8f18e3 845 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
846 } else {
847 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
848 validinum == false && server->ops->get_srv_inum) {
849 /*
850 * Pass a NULL tcon to ensure we don't make a round
851 * trip to the server. This only works for SMB2+.
852 */
853 tmprc = server->ops->get_srv_inum(xid,
854 NULL, cifs_sb, full_path,
855 &fattr.cf_uniqueid, data);
856 if (tmprc)
857 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
858 else if ((fattr.cf_uniqueid == 0) &&
859 strlen(full_path) == 0) {
860 /*
861 * Reuse existing root inode num since
862 * inum zero for root causes ls of . and .. to
863 * not be returned
864 */
865 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
866 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
867 }
a108471b
RL
868 } else
869 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
870 }
b9a3260f 871
0b8f18e3
JL
872 /* query for SFU type info if supported and needed */
873 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
874 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
875 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
876 if (tmprc)
f96637be 877 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 878 }
1da177e4 879
79df1bae 880#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
881 /* fill in 0777 bits from ACL */
882 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 883 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 884 if (rc) {
f96637be
JP
885 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
886 __func__, rc);
78415d2d
SP
887 goto cgii_exit;
888 }
b9a3260f 889 }
79df1bae 890#endif /* CONFIG_CIFS_ACL */
b9a3260f 891
0b8f18e3
JL
892 /* fill in remaining high mode bits e.g. SUID, VTX */
893 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
894 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 895
1b12b9c1
SM
896 /* check for Minshall+French symlinks */
897 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
898 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
899 full_path);
1b12b9c1 900 if (tmprc)
cb084b1a 901 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
902 }
903
1208ef1f
PS
904 if (!*inode) {
905 *inode = cifs_iget(sb, &fattr);
906 if (!*inode)
0b8f18e3
JL
907 rc = -ENOMEM;
908 } else {
7196ac11
NA
909 /* we already have inode, update it */
910
a108471b
RL
911 /* if uniqueid is different, return error */
912 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
913 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
914 rc = -ESTALE;
915 goto cgii_exit;
916 }
917
7196ac11
NA
918 /* if filetype is different, return error */
919 if (unlikely(((*inode)->i_mode & S_IFMT) !=
920 (fattr.cf_mode & S_IFMT))) {
921 rc = -ESTALE;
922 goto cgii_exit;
923 }
924
1208ef1f 925 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 926 }
b9a3260f 927
7962670e 928cgii_exit:
7ea884c7
SF
929 if ((*inode) && ((*inode)->i_ino == 0))
930 cifs_dbg(FYI, "inode number of zero returned\n");
931
1da177e4 932 kfree(buf);
7ffec372 933 cifs_put_tlink(tlink);
1da177e4
LT
934 return rc;
935}
936
7f8ed420
SF
937static const struct inode_operations cifs_ipc_inode_ops = {
938 .lookup = cifs_lookup,
939};
940
cc0bad75
JL
941static int
942cifs_find_inode(struct inode *inode, void *opaque)
943{
944 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
945
f30b9c11 946 /* don't match inode with different uniqueid */
cc0bad75
JL
947 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
948 return 0;
949
20054bd6
JL
950 /* use createtime like an i_generation field */
951 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
952 return 0;
953
f30b9c11
JL
954 /* don't match inode of different type */
955 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
956 return 0;
957
5acfec25 958 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 959 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 960 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 961
cc0bad75
JL
962 return 1;
963}
964
965static int
966cifs_init_inode(struct inode *inode, void *opaque)
967{
968 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
969
970 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 971 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
972 return 0;
973}
974
5acfec25
JL
975/*
976 * walk dentry list for an inode and report whether it has aliases that
977 * are hashed. We use this to determine if a directory inode can actually
978 * be used.
979 */
980static bool
981inode_has_hashed_dentries(struct inode *inode)
982{
983 struct dentry *dentry;
984
873feea0 985 spin_lock(&inode->i_lock);
946e51f2 986 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 987 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 988 spin_unlock(&inode->i_lock);
5acfec25
JL
989 return true;
990 }
991 }
873feea0 992 spin_unlock(&inode->i_lock);
5acfec25
JL
993 return false;
994}
995
cc0bad75
JL
996/* Given fattrs, get a corresponding inode */
997struct inode *
998cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
999{
1000 unsigned long hash;
1001 struct inode *inode;
1002
3d694380 1003retry_iget5_locked:
f96637be 1004 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1005
1006 /* hash down to 32-bits on 32-bit arch */
1007 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1008
1009 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1010 if (inode) {
5acfec25 1011 /* was there a potentially problematic inode collision? */
3d694380 1012 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1013 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1014
1015 if (inode_has_hashed_dentries(inode)) {
1016 cifs_autodisable_serverino(CIFS_SB(sb));
1017 iput(inode);
1018 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1019 goto retry_iget5_locked;
1020 }
3d694380
JL
1021 }
1022
cc0bad75 1023 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1024 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1025 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1026 if (inode->i_state & I_NEW) {
1027 inode->i_ino = hash;
0ccd4802 1028#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1029 /* initialize per-inode cache cookie pointer */
1030 CIFS_I(inode)->fscache = NULL;
0ccd4802 1031#endif
cc0bad75
JL
1032 unlock_new_inode(inode);
1033 }
1034 }
1035
1036 return inode;
1037}
1038
1da177e4 1039/* gets root inode */
9b6763e0 1040struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1041{
6d5786a3 1042 unsigned int xid;
0d424ad0 1043 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1044 struct inode *inode = NULL;
ce634ab2 1045 long rc;
96daf2b0 1046 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1047 char *path = NULL;
1048 int len;
1049
1050 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1051 && cifs_sb->prepath) {
1052 len = strlen(cifs_sb->prepath);
1053 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1054 if (path == NULL)
1055 return ERR_PTR(-ENOMEM);
1056 path[0] = '/';
1057 memcpy(path+1, cifs_sb->prepath, len);
1058 } else {
1059 path = kstrdup("", GFP_KERNEL);
1060 if (path == NULL)
1061 return ERR_PTR(-ENOMEM);
1062 }
ce634ab2 1063
6d5786a3 1064 xid = get_xid();
b5b374ea 1065 if (tcon->unix_ext) {
a6b5058f 1066 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1067 /* some servers mistakenly claim POSIX support */
1068 if (rc != -EOPNOTSUPP)
1069 goto iget_no_retry;
1070 cifs_dbg(VFS, "server does not support POSIX extensions");
1071 tcon->unix_ext = false;
1072 }
1073
a6b5058f
AA
1074 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1075 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1076
b5b374ea 1077iget_no_retry:
a7851ce7
OS
1078 if (!inode) {
1079 inode = ERR_PTR(rc);
1080 goto out;
1081 }
cc0bad75 1082
0ccd4802 1083#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1084 /* populate tcon->resource_id */
0d424ad0 1085 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1086#endif
d03382ce 1087
b327a717 1088 if (rc && tcon->pipe) {
f96637be 1089 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1090 spin_lock(&inode->i_lock);
7f8ed420 1091 inode->i_mode |= S_IFDIR;
bfe86848 1092 set_nlink(inode, 2);
7f8ed420
SF
1093 inode->i_op = &cifs_ipc_inode_ops;
1094 inode->i_fop = &simple_dir_operations;
1095 inode->i_uid = cifs_sb->mnt_uid;
1096 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1097 spin_unlock(&inode->i_lock);
ad661334 1098 } else if (rc) {
ce634ab2 1099 iget_failed(inode);
a7851ce7 1100 inode = ERR_PTR(rc);
7f8ed420
SF
1101 }
1102
a7851ce7 1103out:
a6b5058f 1104 kfree(path);
31cd106b 1105 free_xid(xid);
ce634ab2 1106 return inode;
1da177e4
LT
1107}
1108
ed6875e0 1109int
6d5786a3 1110cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1111 char *full_path, __u32 dosattr)
388e57b2 1112{
388e57b2 1113 bool set_time = false;
388e57b2 1114 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1115 struct TCP_Server_Info *server;
388e57b2
SF
1116 FILE_BASIC_INFO info_buf;
1117
1adcb710
SF
1118 if (attrs == NULL)
1119 return -EINVAL;
1120
6bdf6dbd
PS
1121 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1122 if (!server->ops->set_file_info)
1123 return -ENOSYS;
1124
388e57b2
SF
1125 if (attrs->ia_valid & ATTR_ATIME) {
1126 set_time = true;
1127 info_buf.LastAccessTime =
95582b00 1128 cpu_to_le64(cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_atime)));
388e57b2
SF
1129 } else
1130 info_buf.LastAccessTime = 0;
1131
1132 if (attrs->ia_valid & ATTR_MTIME) {
1133 set_time = true;
1134 info_buf.LastWriteTime =
95582b00 1135 cpu_to_le64(cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_mtime)));
388e57b2
SF
1136 } else
1137 info_buf.LastWriteTime = 0;
1138
1139 /*
1140 * Samba throws this field away, but windows may actually use it.
1141 * Do not set ctime unless other time stamps are changed explicitly
1142 * (i.e. by utimes()) since we would then have a mix of client and
1143 * server times.
1144 */
1145 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1146 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2 1147 info_buf.ChangeTime =
95582b00 1148 cpu_to_le64(cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_ctime)));
388e57b2
SF
1149 } else
1150 info_buf.ChangeTime = 0;
1151
1152 info_buf.CreationTime = 0; /* don't change */
1153 info_buf.Attributes = cpu_to_le32(dosattr);
1154
6bdf6dbd 1155 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1156}
1157
a12a1ac7 1158/*
ed6875e0 1159 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1160 * and rename it to a random name that hopefully won't conflict with
1161 * anything else.
1162 */
ed6875e0
PS
1163int
1164cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1165 const unsigned int xid)
a12a1ac7
JL
1166{
1167 int oplock = 0;
1168 int rc;
d81b8a40
PS
1169 struct cifs_fid fid;
1170 struct cifs_open_parms oparms;
2b0143b5 1171 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1172 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1173 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1174 struct tcon_link *tlink;
96daf2b0 1175 struct cifs_tcon *tcon;
3270958b
SF
1176 __u32 dosattr, origattr;
1177 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1178
7ffec372
JL
1179 tlink = cifs_sb_tlink(cifs_sb);
1180 if (IS_ERR(tlink))
1181 return PTR_ERR(tlink);
1182 tcon = tlink_tcon(tlink);
1183
c483a984
SP
1184 /*
1185 * We cannot rename the file if the server doesn't support
1186 * CAP_INFOLEVEL_PASSTHRU
1187 */
1188 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1189 rc = -EBUSY;
1190 goto out;
1191 }
1192
d81b8a40
PS
1193 oparms.tcon = tcon;
1194 oparms.cifs_sb = cifs_sb;
1195 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1196 oparms.create_options = CREATE_NOT_DIR;
1197 oparms.disposition = FILE_OPEN;
1198 oparms.path = full_path;
1199 oparms.fid = &fid;
1200 oparms.reconnect = false;
1201
1202 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1203 if (rc != 0)
1204 goto out;
1205
3270958b
SF
1206 origattr = cifsInode->cifsAttrs;
1207 if (origattr == 0)
1208 origattr |= ATTR_NORMAL;
1209
1210 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1211 if (dosattr == 0)
1212 dosattr |= ATTR_NORMAL;
1213 dosattr |= ATTR_HIDDEN;
1214
3270958b
SF
1215 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1216 if (dosattr != origattr) {
1217 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1218 if (info_buf == NULL) {
1219 rc = -ENOMEM;
1220 goto out_close;
1221 }
1222 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1223 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1224 current->tgid);
1225 /* although we would like to mark the file hidden
1226 if that fails we will still try to rename it */
72d282dc 1227 if (!rc)
3270958b
SF
1228 cifsInode->cifsAttrs = dosattr;
1229 else
1230 dosattr = origattr; /* since not able to change them */
a12a1ac7 1231 }
a12a1ac7 1232
dd1db2de 1233 /* rename the file */
d81b8a40
PS
1234 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1235 cifs_sb->local_nls,
2baa2682 1236 cifs_remap(cifs_sb));
3270958b 1237 if (rc != 0) {
47c78f4a 1238 rc = -EBUSY;
3270958b
SF
1239 goto undo_setattr;
1240 }
6d22f098 1241
3270958b 1242 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1243 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1244 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1245 current->tgid);
1246 /*
1247 * some samba versions return -ENOENT when we try to set the
1248 * file disposition here. Likely a samba bug, but work around
1249 * it for now. This means that some cifsXXX files may hang
1250 * around after they shouldn't.
1251 *
1252 * BB: remove this hack after more servers have the fix
1253 */
1254 if (rc == -ENOENT)
1255 rc = 0;
1256 else if (rc != 0) {
47c78f4a 1257 rc = -EBUSY;
3270958b
SF
1258 goto undo_rename;
1259 }
aff8d5ca 1260 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1261 }
7ce86d5a 1262
a12a1ac7 1263out_close:
d81b8a40 1264 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1265out:
3270958b 1266 kfree(info_buf);
7ffec372 1267 cifs_put_tlink(tlink);
a12a1ac7 1268 return rc;
3270958b
SF
1269
1270 /*
1271 * reset everything back to the original state. Don't bother
1272 * dealing with errors here since we can't do anything about
1273 * them anyway.
1274 */
1275undo_rename:
d81b8a40 1276 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1277 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1278undo_setattr:
1279 if (dosattr != origattr) {
1280 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1281 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1282 current->tgid))
1283 cifsInode->cifsAttrs = origattr;
1284 }
1285
1286 goto out_close;
a12a1ac7
JL
1287}
1288
b7ca6928
SF
1289/* copied from fs/nfs/dir.c with small changes */
1290static void
1291cifs_drop_nlink(struct inode *inode)
1292{
1293 spin_lock(&inode->i_lock);
1294 if (inode->i_nlink > 0)
1295 drop_nlink(inode);
1296 spin_unlock(&inode->i_lock);
1297}
ff694527
SF
1298
1299/*
2b0143b5 1300 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1301 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1302 * if that fails we can not attempt the fall back mechanisms on EACCESS
1303 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1304 * unlink on negative dentries currently.
1305 */
5f0319a7 1306int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1307{
1308 int rc = 0;
6d5786a3 1309 unsigned int xid;
1da177e4 1310 char *full_path = NULL;
2b0143b5 1311 struct inode *inode = d_inode(dentry);
ff694527 1312 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1313 struct super_block *sb = dir->i_sb;
1314 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1315 struct tcon_link *tlink;
96daf2b0 1316 struct cifs_tcon *tcon;
ed6875e0 1317 struct TCP_Server_Info *server;
6050247d
SF
1318 struct iattr *attrs = NULL;
1319 __u32 dosattr = 0, origattr = 0;
1da177e4 1320
f96637be 1321 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1322
7ffec372
JL
1323 tlink = cifs_sb_tlink(cifs_sb);
1324 if (IS_ERR(tlink))
1325 return PTR_ERR(tlink);
1326 tcon = tlink_tcon(tlink);
ed6875e0 1327 server = tcon->ses->server;
7ffec372 1328
6d5786a3 1329 xid = get_xid();
1da177e4 1330
5f0319a7
JL
1331 /* Unlink can be called from rename so we can not take the
1332 * sb->s_vfs_rename_mutex here */
1333 full_path = build_path_from_dentry(dentry);
1da177e4 1334 if (full_path == NULL) {
0f3bc09e 1335 rc = -ENOMEM;
7ffec372 1336 goto unlink_out;
1da177e4 1337 }
2d785a50 1338
29e20f9c
PS
1339 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1340 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1341 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1342 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1343 cifs_remap(cifs_sb));
f96637be 1344 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1345 if ((rc == 0) || (rc == -ENOENT))
1346 goto psx_del_no_retry;
1347 }
1da177e4 1348
6050247d 1349retry_std_delete:
ed6875e0
PS
1350 if (!server->ops->unlink) {
1351 rc = -ENOSYS;
1352 goto psx_del_no_retry;
1353 }
1354
1355 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1356
2d785a50 1357psx_del_no_retry:
1da177e4 1358 if (!rc) {
5f0319a7 1359 if (inode)
b7ca6928 1360 cifs_drop_nlink(inode);
1da177e4 1361 } else if (rc == -ENOENT) {
5f0319a7 1362 d_drop(dentry);
47c78f4a 1363 } else if (rc == -EBUSY) {
ed6875e0
PS
1364 if (server->ops->rename_pending_delete) {
1365 rc = server->ops->rename_pending_delete(full_path,
1366 dentry, xid);
1367 if (rc == 0)
1368 cifs_drop_nlink(inode);
1369 }
ff694527 1370 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1371 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1372 if (attrs == NULL) {
1373 rc = -ENOMEM;
1374 goto out_reval;
1da177e4 1375 }
388e57b2
SF
1376
1377 /* try to reset dos attributes */
ff694527
SF
1378 cifs_inode = CIFS_I(inode);
1379 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1380 if (origattr == 0)
1381 origattr |= ATTR_NORMAL;
1382 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1383 if (dosattr == 0)
1384 dosattr |= ATTR_NORMAL;
1385 dosattr |= ATTR_HIDDEN;
1386
1387 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1388 if (rc != 0)
1389 goto out_reval;
6050247d
SF
1390
1391 goto retry_std_delete;
1da177e4 1392 }
6050247d
SF
1393
1394 /* undo the setattr if we errored out and it's needed */
1395 if (rc != 0 && dosattr != 0)
1396 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1397
388e57b2 1398out_reval:
4523cc30 1399 if (inode) {
ff694527
SF
1400 cifs_inode = CIFS_I(inode);
1401 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1402 when needed */
e37fea58 1403 inode->i_ctime = current_time(inode);
06bcfedd 1404 }
e37fea58 1405 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1406 cifs_inode = CIFS_I(dir);
6050247d 1407 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1408unlink_out:
1da177e4 1409 kfree(full_path);
6050247d 1410 kfree(attrs);
6d5786a3 1411 free_xid(xid);
7ffec372 1412 cifs_put_tlink(tlink);
1da177e4
LT
1413 return rc;
1414}
1415
ff691e96 1416static int
101b92d9 1417cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1418 const char *full_path, struct cifs_sb_info *cifs_sb,
1419 struct cifs_tcon *tcon, const unsigned int xid)
1420{
1421 int rc = 0;
101b92d9 1422 struct inode *inode = NULL;
ff691e96
PS
1423
1424 if (tcon->unix_ext)
101b92d9 1425 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1426 xid);
1427 else
101b92d9
JL
1428 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1429 xid, NULL);
1430
ff691e96
PS
1431 if (rc)
1432 return rc;
1433
ff691e96
PS
1434 /*
1435 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1436 * from the server or was set bogus. Also, since this is a brand new
1437 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1438 */
101b92d9
JL
1439 if (inode->i_nlink < 2)
1440 set_nlink(inode, 2);
ff691e96
PS
1441 mode &= ~current_umask();
1442 /* must turn on setgid bit if parent dir has it */
101b92d9 1443 if (parent->i_mode & S_ISGID)
ff691e96
PS
1444 mode |= S_ISGID;
1445
1446 if (tcon->unix_ext) {
1447 struct cifs_unix_set_info_args args = {
1448 .mode = mode,
1449 .ctime = NO_CHANGE_64,
1450 .atime = NO_CHANGE_64,
1451 .mtime = NO_CHANGE_64,
1452 .device = 0,
1453 };
1454 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1455 args.uid = current_fsuid();
101b92d9 1456 if (parent->i_mode & S_ISGID)
49418b2c 1457 args.gid = parent->i_gid;
ff691e96 1458 else
49418b2c 1459 args.gid = current_fsgid();
ff691e96 1460 } else {
49418b2c
EB
1461 args.uid = INVALID_UID; /* no change */
1462 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1463 }
1464 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1465 cifs_sb->local_nls,
2baa2682 1466 cifs_remap(cifs_sb));
ff691e96 1467 } else {
f436720e 1468 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1469 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1470 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1471 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1472 tcon, xid);
101b92d9
JL
1473 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1474 inode->i_mode = (mode | S_IFDIR);
1475
1476 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1477 inode->i_uid = current_fsuid();
1478 if (inode->i_mode & S_ISGID)
1479 inode->i_gid = parent->i_gid;
1480 else
1481 inode->i_gid = current_fsgid();
ff691e96
PS
1482 }
1483 }
101b92d9 1484 d_instantiate(dentry, inode);
ff691e96
PS
1485 return rc;
1486}
1487
1488static int
1489cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1490 const char *full_path, struct cifs_sb_info *cifs_sb,
1491 struct cifs_tcon *tcon, const unsigned int xid)
1492{
1493 int rc = 0;
1494 u32 oplock = 0;
1495 FILE_UNIX_BASIC_INFO *info = NULL;
1496 struct inode *newinode = NULL;
1497 struct cifs_fattr fattr;
1498
1499 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1500 if (info == NULL) {
1501 rc = -ENOMEM;
1502 goto posix_mkdir_out;
1503 }
1504
1505 mode &= ~current_umask();
1506 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1507 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1508 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1509 if (rc == -EOPNOTSUPP)
1510 goto posix_mkdir_out;
1511 else if (rc) {
f96637be 1512 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1513 d_drop(dentry);
1514 goto posix_mkdir_out;
1515 }
1516
1517 if (info->Type == cpu_to_le32(-1))
1518 /* no return info, go query for it */
1519 goto posix_mkdir_get_info;
1520 /*
1521 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1522 * need to set uid/gid.
1523 */
1524
1525 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1526 cifs_fill_uniqueid(inode->i_sb, &fattr);
1527 newinode = cifs_iget(inode->i_sb, &fattr);
1528 if (!newinode)
1529 goto posix_mkdir_get_info;
1530
1531 d_instantiate(dentry, newinode);
1532
1533#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1534 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1535 dentry, dentry, newinode);
ff691e96
PS
1536
1537 if (newinode->i_nlink != 2)
f96637be
JP
1538 cifs_dbg(FYI, "unexpected number of links %d\n",
1539 newinode->i_nlink);
ff691e96
PS
1540#endif
1541
1542posix_mkdir_out:
1543 kfree(info);
1544 return rc;
1545posix_mkdir_get_info:
1546 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1547 xid);
1548 goto posix_mkdir_out;
1549}
1550
18bb1db3 1551int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1552{
ff691e96 1553 int rc = 0;
6d5786a3 1554 unsigned int xid;
1da177e4 1555 struct cifs_sb_info *cifs_sb;
7ffec372 1556 struct tcon_link *tlink;
29e20f9c 1557 struct cifs_tcon *tcon;
f436720e 1558 struct TCP_Server_Info *server;
ff691e96 1559 char *full_path;
1da177e4 1560
f96637be
JP
1561 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1562 mode, inode);
1da177e4 1563
1da177e4 1564 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1565 tlink = cifs_sb_tlink(cifs_sb);
1566 if (IS_ERR(tlink))
1567 return PTR_ERR(tlink);
29e20f9c 1568 tcon = tlink_tcon(tlink);
7ffec372 1569
6d5786a3 1570 xid = get_xid();
1da177e4 1571
7f57356b 1572 full_path = build_path_from_dentry(direntry);
1da177e4 1573 if (full_path == NULL) {
0f3bc09e 1574 rc = -ENOMEM;
7ffec372 1575 goto mkdir_out;
1da177e4 1576 }
50c2f753 1577
bea851b8
SF
1578 server = tcon->ses->server;
1579
1580#ifdef CONFIG_CIFS_SMB311
1581 if ((server->ops->posix_mkdir) && (tcon->posix_extensions)) {
1582 rc = server->ops->posix_mkdir(xid, inode, mode, tcon, full_path,
1583 cifs_sb);
1584 d_drop(direntry); /* for time being always refresh inode info */
1585 goto mkdir_out;
1586 }
1587#endif /* SMB311 */
1588
29e20f9c
PS
1589 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1590 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1591 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1592 tcon, xid);
1593 if (rc != -EOPNOTSUPP)
2dd29d31 1594 goto mkdir_out;
fb8c4b14 1595 }
ff691e96 1596
f436720e
PS
1597 if (!server->ops->mkdir) {
1598 rc = -ENOSYS;
1599 goto mkdir_out;
1600 }
1601
1da177e4 1602 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1603 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1604 if (rc) {
f96637be 1605 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1606 d_drop(direntry);
ff691e96 1607 goto mkdir_out;
1da177e4 1608 }
ff691e96
PS
1609
1610 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1611 xid);
fb8c4b14 1612mkdir_out:
6de2ce42
PS
1613 /*
1614 * Force revalidate to get parent dir info when needed since cached
1615 * attributes are invalid now.
1616 */
1617 CIFS_I(inode)->time = 0;
1da177e4 1618 kfree(full_path);
6d5786a3 1619 free_xid(xid);
7ffec372 1620 cifs_put_tlink(tlink);
1da177e4
LT
1621 return rc;
1622}
1623
1624int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1625{
1626 int rc = 0;
6d5786a3 1627 unsigned int xid;
1da177e4 1628 struct cifs_sb_info *cifs_sb;
7ffec372 1629 struct tcon_link *tlink;
f958ca5d
PS
1630 struct cifs_tcon *tcon;
1631 struct TCP_Server_Info *server;
1da177e4
LT
1632 char *full_path = NULL;
1633 struct cifsInodeInfo *cifsInode;
1634
f96637be 1635 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1636
6d5786a3 1637 xid = get_xid();
1da177e4 1638
7f57356b 1639 full_path = build_path_from_dentry(direntry);
1da177e4 1640 if (full_path == NULL) {
0f3bc09e 1641 rc = -ENOMEM;
7ffec372 1642 goto rmdir_exit;
1da177e4
LT
1643 }
1644
7ffec372
JL
1645 cifs_sb = CIFS_SB(inode->i_sb);
1646 tlink = cifs_sb_tlink(cifs_sb);
1647 if (IS_ERR(tlink)) {
1648 rc = PTR_ERR(tlink);
1649 goto rmdir_exit;
1650 }
f958ca5d
PS
1651 tcon = tlink_tcon(tlink);
1652 server = tcon->ses->server;
1653
1654 if (!server->ops->rmdir) {
1655 rc = -ENOSYS;
1656 cifs_put_tlink(tlink);
1657 goto rmdir_exit;
1658 }
7ffec372 1659
f958ca5d 1660 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1661 cifs_put_tlink(tlink);
1da177e4
LT
1662
1663 if (!rc) {
2b0143b5
DH
1664 spin_lock(&d_inode(direntry)->i_lock);
1665 i_size_write(d_inode(direntry), 0);
1666 clear_nlink(d_inode(direntry));
1667 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1668 }
1669
2b0143b5 1670 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1671 /* force revalidate to go get info when needed */
1672 cifsInode->time = 0;
42c24544
SF
1673
1674 cifsInode = CIFS_I(inode);
6de2ce42
PS
1675 /*
1676 * Force revalidate to get parent dir info when needed since cached
1677 * attributes are invalid now.
1678 */
1679 cifsInode->time = 0;
42c24544 1680
2b0143b5 1681 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1682 current_time(inode);
1da177e4 1683
7ffec372 1684rmdir_exit:
1da177e4 1685 kfree(full_path);
6d5786a3 1686 free_xid(xid);
1da177e4
LT
1687 return rc;
1688}
1689
ee2fd967 1690static int
8ceb9843
PS
1691cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1692 const char *from_path, struct dentry *to_dentry,
1693 const char *to_path)
ee2fd967
SF
1694{
1695 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1696 struct tcon_link *tlink;
8ceb9843
PS
1697 struct cifs_tcon *tcon;
1698 struct TCP_Server_Info *server;
d81b8a40
PS
1699 struct cifs_fid fid;
1700 struct cifs_open_parms oparms;
ee2fd967
SF
1701 int oplock, rc;
1702
7ffec372
JL
1703 tlink = cifs_sb_tlink(cifs_sb);
1704 if (IS_ERR(tlink))
1705 return PTR_ERR(tlink);
8ceb9843
PS
1706 tcon = tlink_tcon(tlink);
1707 server = tcon->ses->server;
1708
1709 if (!server->ops->rename)
1710 return -ENOSYS;
7ffec372 1711
ee2fd967 1712 /* try path-based rename first */
8ceb9843 1713 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1714
1715 /*
8ceb9843
PS
1716 * Don't bother with rename by filehandle unless file is busy and
1717 * source. Note that cross directory moves do not work with
ee2fd967
SF
1718 * rename by filehandle to various Windows servers.
1719 */
47c78f4a 1720 if (rc == 0 || rc != -EBUSY)
7ffec372 1721 goto do_rename_exit;
ee2fd967 1722
ed0e3ace
JL
1723 /* open-file renames don't work across directories */
1724 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1725 goto do_rename_exit;
ed0e3ace 1726
d81b8a40
PS
1727 oparms.tcon = tcon;
1728 oparms.cifs_sb = cifs_sb;
ee2fd967 1729 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1730 oparms.desired_access = DELETE;
1731 oparms.create_options = CREATE_NOT_DIR;
1732 oparms.disposition = FILE_OPEN;
1733 oparms.path = from_path;
1734 oparms.fid = &fid;
1735 oparms.reconnect = false;
1736
1737 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1738 if (rc == 0) {
d81b8a40 1739 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1740 (const char *) to_dentry->d_name.name,
2baa2682 1741 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1742 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1743 }
7ffec372
JL
1744do_rename_exit:
1745 cifs_put_tlink(tlink);
ee2fd967
SF
1746 return rc;
1747}
1748
8ceb9843 1749int
7c33d597
MS
1750cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1751 struct inode *target_dir, struct dentry *target_dentry,
1752 unsigned int flags)
1da177e4 1753{
8ceb9843
PS
1754 char *from_name = NULL;
1755 char *to_name = NULL;
639e7a91 1756 struct cifs_sb_info *cifs_sb;
7ffec372 1757 struct tcon_link *tlink;
96daf2b0 1758 struct cifs_tcon *tcon;
ee2fd967
SF
1759 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1760 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1761 unsigned int xid;
1762 int rc, tmprc;
1da177e4 1763
7c33d597
MS
1764 if (flags & ~RENAME_NOREPLACE)
1765 return -EINVAL;
1766
639e7a91 1767 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1768 tlink = cifs_sb_tlink(cifs_sb);
1769 if (IS_ERR(tlink))
1770 return PTR_ERR(tlink);
1771 tcon = tlink_tcon(tlink);
1da177e4 1772
6d5786a3 1773 xid = get_xid();
ee2fd967 1774
ee2fd967
SF
1775 /*
1776 * we already have the rename sem so we do not need to
1777 * grab it again here to protect the path integrity
1778 */
8ceb9843
PS
1779 from_name = build_path_from_dentry(source_dentry);
1780 if (from_name == NULL) {
ee2fd967
SF
1781 rc = -ENOMEM;
1782 goto cifs_rename_exit;
1783 }
1784
8ceb9843
PS
1785 to_name = build_path_from_dentry(target_dentry);
1786 if (to_name == NULL) {
1da177e4
LT
1787 rc = -ENOMEM;
1788 goto cifs_rename_exit;
1789 }
1790
8ceb9843
PS
1791 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1792 to_name);
ee2fd967 1793
7c33d597
MS
1794 /*
1795 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1796 */
1797 if (flags & RENAME_NOREPLACE)
1798 goto cifs_rename_exit;
1799
14121bdc
JL
1800 if (rc == -EEXIST && tcon->unix_ext) {
1801 /*
8ceb9843
PS
1802 * Are src and dst hardlinks of same inode? We can only tell
1803 * with unix extensions enabled.
14121bdc
JL
1804 */
1805 info_buf_source =
6da2ec56 1806 kmalloc_array(2, sizeof(FILE_UNIX_BASIC_INFO),
14121bdc
JL
1807 GFP_KERNEL);
1808 if (info_buf_source == NULL) {
1809 rc = -ENOMEM;
1810 goto cifs_rename_exit;
1811 }
1812
1813 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1814 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1815 info_buf_source,
1816 cifs_sb->local_nls,
2baa2682 1817 cifs_remap(cifs_sb));
8d281efb 1818 if (tmprc != 0)
14121bdc 1819 goto unlink_target;
ee2fd967 1820
8ceb9843
PS
1821 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1822 info_buf_target,
1823 cifs_sb->local_nls,
2baa2682 1824 cifs_remap(cifs_sb));
14121bdc 1825
8d281efb 1826 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1827 info_buf_target->UniqueId)) {
14121bdc 1828 /* same file, POSIX says that this is a noop */
ae6884a9 1829 rc = 0;
14121bdc 1830 goto cifs_rename_exit;
ae6884a9 1831 }
8ceb9843
PS
1832 }
1833 /*
1834 * else ... BB we could add the same check for Windows by
1835 * checking the UniqueId via FILE_INTERNAL_INFO
1836 */
14121bdc 1837
ee2fd967 1838unlink_target:
fc6f3943 1839 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1840 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1841 if (d_is_dir(target_dentry))
1842 tmprc = cifs_rmdir(target_dir, target_dentry);
1843 else
1844 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1845 if (tmprc)
1846 goto cifs_rename_exit;
8ceb9843
PS
1847 rc = cifs_do_rename(xid, source_dentry, from_name,
1848 target_dentry, to_name);
1da177e4
LT
1849 }
1850
b46799a8
PS
1851 /* force revalidate to go get info when needed */
1852 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1853
1854 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1855 target_dir->i_mtime = current_time(source_dir);
b46799a8 1856
1da177e4 1857cifs_rename_exit:
ee2fd967 1858 kfree(info_buf_source);
8ceb9843
PS
1859 kfree(from_name);
1860 kfree(to_name);
6d5786a3 1861 free_xid(xid);
7ffec372 1862 cifs_put_tlink(tlink);
1da177e4
LT
1863 return rc;
1864}
1865
df2cf170
JL
1866static bool
1867cifs_inode_needs_reval(struct inode *inode)
1da177e4 1868{
df2cf170 1869 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1870 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1871
57c55cd7
RS
1872 if (cifs_i->time == 0)
1873 return true;
1874
18cceb6a 1875 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1876 return false;
1da177e4 1877
df2cf170
JL
1878 if (!lookupCacheEnabled)
1879 return true;
1da177e4 1880
a87c9ad9
JL
1881 if (!cifs_sb->actimeo)
1882 return true;
1883
6d20e840
SJ
1884 if (!time_in_range(jiffies, cifs_i->time,
1885 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1886 return true;
1887
db19272e 1888 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1889 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1890 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1891 return true;
1892
df2cf170
JL
1893 return false;
1894}
1895
523fb8c8
SJ
1896/*
1897 * Zap the cache. Called when invalid_mapping flag is set.
1898 */
6feb9891 1899int
df2cf170
JL
1900cifs_invalidate_mapping(struct inode *inode)
1901{
6feb9891 1902 int rc = 0;
df2cf170 1903
df2cf170 1904 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1905 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1906 if (rc)
f96637be
JP
1907 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1908 __func__, inode);
df2cf170 1909 }
257fb1f1 1910
9451a9a5 1911 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1912 return rc;
df2cf170
JL
1913}
1914
4f73c7d3
JL
1915/**
1916 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1917 * @word: long word containing the bit lock
1918 */
1919static int
dfd01f02 1920cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1921{
4f73c7d3 1922 freezable_schedule_unsafe();
dfd01f02
PZ
1923 if (signal_pending_state(mode, current))
1924 return -ERESTARTSYS;
4f73c7d3
JL
1925 return 0;
1926}
1927
e284e53f
JL
1928int
1929cifs_revalidate_mapping(struct inode *inode)
1930{
4f73c7d3
JL
1931 int rc;
1932 unsigned long *flags = &CIFS_I(inode)->flags;
1933
74316201
N
1934 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1935 TASK_KILLABLE);
4f73c7d3
JL
1936 if (rc)
1937 return rc;
1938
1939 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1940 rc = cifs_invalidate_mapping(inode);
1941 if (rc)
1942 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1943 }
1944
1945 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1946 smp_mb__after_atomic();
4f73c7d3
JL
1947 wake_up_bit(flags, CIFS_INO_LOCK);
1948
1949 return rc;
1950}
1951
1952int
1953cifs_zap_mapping(struct inode *inode)
1954{
1955 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1956 return cifs_revalidate_mapping(inode);
e284e53f
JL
1957}
1958
6feb9891 1959int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1960{
1961 int rc = 0;
496ad9aa 1962 struct inode *inode = file_inode(filp);
ba00ba64 1963 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1964
1965 if (!cifs_inode_needs_reval(inode))
6feb9891 1966 return rc;
abab095d 1967
13cfb733 1968 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1969 rc = cifs_get_file_info_unix(filp);
1970 else
1971 rc = cifs_get_file_info(filp);
1972
abab095d
JL
1973 return rc;
1974}
1975
6feb9891 1976int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1977{
6d5786a3 1978 unsigned int xid;
df2cf170 1979 int rc = 0;
2b0143b5 1980 struct inode *inode = d_inode(dentry);
df2cf170 1981 struct super_block *sb = dentry->d_sb;
6feb9891 1982 char *full_path = NULL;
df2cf170
JL
1983
1984 if (inode == NULL)
1985 return -ENOENT;
1da177e4 1986
df2cf170 1987 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1988 return rc;
1989
6d5786a3 1990 xid = get_xid();
1da177e4
LT
1991
1992 /* can not safely grab the rename sem here if rename calls revalidate
1993 since that would deadlock */
df2cf170 1994 full_path = build_path_from_dentry(dentry);
1da177e4 1995 if (full_path == NULL) {
0f3bc09e 1996 rc = -ENOMEM;
6feb9891 1997 goto out;
1da177e4
LT
1998 }
1999
f96637be
JP
2000 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
2001 full_path, inode, inode->i_count.counter,
a00be0e3 2002 dentry, cifs_get_time(dentry), jiffies);
1da177e4 2003
0d424ad0 2004 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
2005 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
2006 else
2007 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
2008 xid, NULL);
1da177e4 2009
6feb9891 2010out:
1da177e4 2011 kfree(full_path);
6d5786a3 2012 free_xid(xid);
1da177e4
LT
2013 return rc;
2014}
2015
6feb9891
PS
2016int cifs_revalidate_file(struct file *filp)
2017{
2018 int rc;
496ad9aa 2019 struct inode *inode = file_inode(filp);
6feb9891
PS
2020
2021 rc = cifs_revalidate_file_attr(filp);
2022 if (rc)
2023 return rc;
2024
e284e53f 2025 return cifs_revalidate_mapping(inode);
6feb9891
PS
2026}
2027
2028/* revalidate a dentry's inode attributes */
2029int cifs_revalidate_dentry(struct dentry *dentry)
2030{
2031 int rc;
2b0143b5 2032 struct inode *inode = d_inode(dentry);
6feb9891
PS
2033
2034 rc = cifs_revalidate_dentry_attr(dentry);
2035 if (rc)
2036 return rc;
2037
e284e53f 2038 return cifs_revalidate_mapping(inode);
6feb9891
PS
2039}
2040
a528d35e
DH
2041int cifs_getattr(const struct path *path, struct kstat *stat,
2042 u32 request_mask, unsigned int flags)
1da177e4 2043{
a528d35e 2044 struct dentry *dentry = path->dentry;
3aa1c8c2 2045 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2046 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2047 struct inode *inode = d_inode(dentry);
6feb9891 2048 int rc;
3aa1c8c2 2049
6feb9891
PS
2050 /*
2051 * We need to be sure that all dirty pages are written and the server
2052 * has actual ctime, mtime and file length.
2053 */
18cceb6a 2054 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2055 inode->i_mapping->nrpages != 0) {
2056 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2057 if (rc) {
2058 mapping_set_error(inode->i_mapping, rc);
2059 return rc;
2060 }
6feb9891 2061 }
1c456013 2062
6feb9891
PS
2063 rc = cifs_revalidate_dentry_attr(dentry);
2064 if (rc)
2065 return rc;
2066
2067 generic_fillattr(inode, stat);
2068 stat->blksize = CIFS_MAX_MSGSIZE;
2069 stat->ino = CIFS_I(inode)->uniqueid;
2070
6e70e26d
SF
2071 /* old CIFS Unix Extensions doesn't return create time */
2072 if (CIFS_I(inode)->createtime) {
2073 stat->result_mask |= STATX_BTIME;
95582b00
DD
2074 stat->btime = timespec_to_timespec64(
2075 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime)));
6e70e26d
SF
2076 }
2077
2078 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2079 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2080 stat->attributes |= STATX_ATTR_COMPRESSED;
2081 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2082 stat->attributes |= STATX_ATTR_ENCRYPTED;
2083
6feb9891 2084 /*
d3d1fce1
JL
2085 * If on a multiuser mount without unix extensions or cifsacl being
2086 * enabled, and the admin hasn't overridden them, set the ownership
2087 * to the fsuid/fsgid of the current process.
6feb9891
PS
2088 */
2089 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2090 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2091 !tcon->unix_ext) {
2092 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2093 stat->uid = current_fsuid();
2094 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2095 stat->gid = current_fsgid();
5fe14c85 2096 }
6feb9891 2097 return rc;
1da177e4
LT
2098}
2099
2100static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2101{
09cbfeaf
KS
2102 pgoff_t index = from >> PAGE_SHIFT;
2103 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2104 struct page *page;
1da177e4
LT
2105 int rc = 0;
2106
2107 page = grab_cache_page(mapping, index);
2108 if (!page)
2109 return -ENOMEM;
2110
09cbfeaf 2111 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2112 unlock_page(page);
09cbfeaf 2113 put_page(page);
1da177e4
LT
2114 return rc;
2115}
2116
1b947463 2117static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2118{
57c55cd7
RS
2119 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2120
ba6a46a0 2121 spin_lock(&inode->i_lock);
3677db10 2122 i_size_write(inode, offset);
ba6a46a0 2123 spin_unlock(&inode->i_lock);
1b947463 2124
57c55cd7
RS
2125 /* Cached inode must be refreshed on truncate */
2126 cifs_i->time = 0;
7caef267 2127 truncate_pagecache(inode, offset);
3677db10
SF
2128}
2129
8efdbde6
JL
2130static int
2131cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2132 unsigned int xid, char *full_path)
8efdbde6
JL
2133{
2134 int rc;
2135 struct cifsFileInfo *open_file;
2136 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2137 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2138 struct tcon_link *tlink = NULL;
d1433418
PS
2139 struct cifs_tcon *tcon = NULL;
2140 struct TCP_Server_Info *server;
8efdbde6
JL
2141
2142 /*
2143 * To avoid spurious oplock breaks from server, in the case of
2144 * inodes that we already have open, avoid doing path based
2145 * setting of file size if we can do it by handle.
2146 * This keeps our caching token (oplock) and avoids timeouts
2147 * when the local oplock break takes longer to flush
2148 * writebehind data than the SMB timeout for the SetPathInfo
2149 * request would allow
2150 */
6508d904 2151 open_file = find_writable_file(cifsInode, true);
8efdbde6 2152 if (open_file) {
d1433418
PS
2153 tcon = tlink_tcon(open_file->tlink);
2154 server = tcon->ses->server;
2155 if (server->ops->set_file_size)
2156 rc = server->ops->set_file_size(xid, tcon, open_file,
2157 attrs->ia_size, false);
2158 else
2159 rc = -ENOSYS;
6ab409b5 2160 cifsFileInfo_put(open_file);
f96637be 2161 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2162 } else
2163 rc = -EINVAL;
2164
d1433418
PS
2165 if (!rc)
2166 goto set_size_out;
2167
2168 if (tcon == NULL) {
2169 tlink = cifs_sb_tlink(cifs_sb);
2170 if (IS_ERR(tlink))
2171 return PTR_ERR(tlink);
2172 tcon = tlink_tcon(tlink);
2173 server = tcon->ses->server;
2174 }
ba00ba64 2175
d1433418
PS
2176 /*
2177 * Set file size by pathname rather than by handle either because no
2178 * valid, writeable file handle for it was found or because there was
2179 * an error setting it by handle.
2180 */
2181 if (server->ops->set_path_size)
2182 rc = server->ops->set_path_size(xid, tcon, full_path,
2183 attrs->ia_size, cifs_sb, false);
2184 else
2185 rc = -ENOSYS;
f96637be 2186 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2187
d1433418
PS
2188 if (tlink)
2189 cifs_put_tlink(tlink);
8efdbde6 2190
d1433418 2191set_size_out:
8efdbde6 2192 if (rc == 0) {
fbec9ab9 2193 cifsInode->server_eof = attrs->ia_size;
1b947463 2194 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2195 cifs_truncate_page(inode->i_mapping, inode->i_size);
2196 }
2197
2198 return rc;
2199}
2200
3fe5c1dd
JL
2201static int
2202cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2203{
2204 int rc;
6d5786a3 2205 unsigned int xid;
3fe5c1dd 2206 char *full_path = NULL;
2b0143b5 2207 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2208 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2209 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2210 struct tcon_link *tlink;
96daf2b0 2211 struct cifs_tcon *pTcon;
3fe5c1dd 2212 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2213 struct cifsFileInfo *open_file;
3fe5c1dd 2214
35c265e0
AV
2215 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2216 direntry, attrs->ia_valid);
3fe5c1dd 2217
6d5786a3 2218 xid = get_xid();
3fe5c1dd 2219
db78b877
CH
2220 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2221 attrs->ia_valid |= ATTR_FORCE;
2222
31051c85 2223 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2224 if (rc < 0)
2225 goto out;
3fe5c1dd
JL
2226
2227 full_path = build_path_from_dentry(direntry);
2228 if (full_path == NULL) {
2229 rc = -ENOMEM;
2230 goto out;
2231 }
2232
0f4d634c
JL
2233 /*
2234 * Attempt to flush data before changing attributes. We need to do
2235 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2236 * ownership or mode then we may also need to do this. Here, we take
2237 * the safe way out and just do the flush on all setattr requests. If
2238 * the flush returns error, store it to report later and continue.
2239 *
2240 * BB: This should be smarter. Why bother flushing pages that
2241 * will be truncated anyway? Also, should we error out here if
2242 * the flush returns error?
2243 */
2244 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2245 mapping_set_error(inode->i_mapping, rc);
2246 rc = 0;
3fe5c1dd
JL
2247
2248 if (attrs->ia_valid & ATTR_SIZE) {
2249 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2250 if (rc != 0)
2251 goto out;
2252 }
2253
2254 /* skip mode change if it's just for clearing setuid/setgid */
2255 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2256 attrs->ia_valid &= ~ATTR_MODE;
2257
2258 args = kmalloc(sizeof(*args), GFP_KERNEL);
2259 if (args == NULL) {
2260 rc = -ENOMEM;
2261 goto out;
2262 }
2263
2264 /* set up the struct */
2265 if (attrs->ia_valid & ATTR_MODE)
2266 args->mode = attrs->ia_mode;
2267 else
2268 args->mode = NO_CHANGE_64;
2269
2270 if (attrs->ia_valid & ATTR_UID)
2271 args->uid = attrs->ia_uid;
2272 else
49418b2c 2273 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2274
2275 if (attrs->ia_valid & ATTR_GID)
2276 args->gid = attrs->ia_gid;
2277 else
49418b2c 2278 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2279
2280 if (attrs->ia_valid & ATTR_ATIME)
95582b00 2281 args->atime = cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_atime));
3fe5c1dd
JL
2282 else
2283 args->atime = NO_CHANGE_64;
2284
2285 if (attrs->ia_valid & ATTR_MTIME)
95582b00 2286 args->mtime = cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_mtime));
3fe5c1dd
JL
2287 else
2288 args->mtime = NO_CHANGE_64;
2289
2290 if (attrs->ia_valid & ATTR_CTIME)
95582b00 2291 args->ctime = cifs_UnixTimeToNT(timespec64_to_timespec(attrs->ia_ctime));
3fe5c1dd
JL
2292 else
2293 args->ctime = NO_CHANGE_64;
2294
2295 args->device = 0;
6508d904 2296 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2297 if (open_file) {
4b4de76e 2298 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2299 u32 npid = open_file->pid;
13cfb733 2300 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2301 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2302 cifsFileInfo_put(open_file);
3bbeeb3c 2303 } else {
7ffec372
JL
2304 tlink = cifs_sb_tlink(cifs_sb);
2305 if (IS_ERR(tlink)) {
2306 rc = PTR_ERR(tlink);
2307 goto out;
2308 }
2309 pTcon = tlink_tcon(tlink);
3bbeeb3c 2310 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2311 cifs_sb->local_nls,
bc8ebdc4 2312 cifs_remap(cifs_sb));
7ffec372 2313 cifs_put_tlink(tlink);
3bbeeb3c 2314 }
3fe5c1dd 2315
1025774c
CH
2316 if (rc)
2317 goto out;
ccd4bb1b 2318
1025774c 2319 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2320 attrs->ia_size != i_size_read(inode))
2321 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2322
2323 setattr_copy(inode, attrs);
2324 mark_inode_dirty(inode);
2325
2326 /* force revalidate when any of these times are set since some
2327 of the fs types (eg ext3, fat) do not have fine enough
2328 time granularity to match protocol, and we do not have a
2329 a way (yet) to query the server fs's time granularity (and
2330 whether it rounds times down).
2331 */
2332 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2333 cifsInode->time = 0;
3fe5c1dd
JL
2334out:
2335 kfree(args);
2336 kfree(full_path);
6d5786a3 2337 free_xid(xid);
3fe5c1dd
JL
2338 return rc;
2339}
2340
0510eeb7
JL
2341static int
2342cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2343{
6d5786a3 2344 unsigned int xid;
8abf2775
EB
2345 kuid_t uid = INVALID_UID;
2346 kgid_t gid = INVALID_GID;
2b0143b5 2347 struct inode *inode = d_inode(direntry);
3fe5c1dd 2348 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2349 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2350 char *full_path = NULL;
2351 int rc = -EACCES;
feb3e20c 2352 __u32 dosattr = 0;
4e1e7fb9 2353 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2354
6d5786a3 2355 xid = get_xid();
1da177e4 2356
35c265e0
AV
2357 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2358 direntry, attrs->ia_valid);
6473a559 2359
db78b877
CH
2360 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2361 attrs->ia_valid |= ATTR_FORCE;
2362
31051c85 2363 rc = setattr_prepare(direntry, attrs);
db78b877 2364 if (rc < 0) {
6d5786a3 2365 free_xid(xid);
db78b877 2366 return rc;
6473a559 2367 }
50c2f753 2368
7f57356b 2369 full_path = build_path_from_dentry(direntry);
1da177e4 2370 if (full_path == NULL) {
0f3bc09e 2371 rc = -ENOMEM;
6d5786a3 2372 free_xid(xid);
0f3bc09e 2373 return rc;
1da177e4 2374 }
1da177e4 2375
0f4d634c
JL
2376 /*
2377 * Attempt to flush data before changing attributes. We need to do
2378 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2379 * ownership or mode then we may also need to do this. Here, we take
2380 * the safe way out and just do the flush on all setattr requests. If
2381 * the flush returns error, store it to report later and continue.
2382 *
2383 * BB: This should be smarter. Why bother flushing pages that
2384 * will be truncated anyway? Also, should we error out here if
2385 * the flush returns error?
2386 */
2387 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2388 mapping_set_error(inode->i_mapping, rc);
2389 rc = 0;
cea21805 2390
50531444 2391 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2392 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2393 if (rc != 0)
e30dcf3a 2394 goto cifs_setattr_exit;
1da177e4 2395 }
4ca691a8 2396
a5ff3769
SP
2397 if (attrs->ia_valid & ATTR_UID)
2398 uid = attrs->ia_uid;
2399
2400 if (attrs->ia_valid & ATTR_GID)
2401 gid = attrs->ia_gid;
2402
2403#ifdef CONFIG_CIFS_ACL
2404 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2405 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2406 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2407 uid, gid);
2408 if (rc) {
f96637be
JP
2409 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2410 __func__, rc);
a5ff3769
SP
2411 goto cifs_setattr_exit;
2412 }
2413 }
2414 } else
2415#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2416 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2417 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2418
d32c4f26
JL
2419 /* skip mode change if it's just for clearing setuid/setgid */
2420 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2421 attrs->ia_valid &= ~ATTR_MODE;
2422
1da177e4 2423 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2424 mode = attrs->ia_mode;
cdbce9c8 2425 rc = 0;
79df1bae 2426#ifdef CONFIG_CIFS_ACL
78415d2d 2427 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2428 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2429 INVALID_UID, INVALID_GID);
78415d2d 2430 if (rc) {
f96637be
JP
2431 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2432 __func__, rc);
78415d2d
SP
2433 goto cifs_setattr_exit;
2434 }
2435 } else
79df1bae 2436#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2437 if (((mode & S_IWUGO) == 0) &&
2438 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2439
2440 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2441
5132861a
JL
2442 /* fix up mode if we're not using dynperm */
2443 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2444 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2445 } else if ((mode & S_IWUGO) &&
2446 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2447
2448 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2449 /* Attributes of 0 are ignored */
2450 if (dosattr == 0)
2451 dosattr |= ATTR_NORMAL;
5132861a
JL
2452
2453 /* reset local inode permissions to normal */
2454 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2455 attrs->ia_mode &= ~(S_IALLUGO);
2456 if (S_ISDIR(inode->i_mode))
2457 attrs->ia_mode |=
2458 cifs_sb->mnt_dir_mode;
2459 else
2460 attrs->ia_mode |=
2461 cifs_sb->mnt_file_mode;
2462 }
2463 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2464 /* ignore mode change - ATTR_READONLY hasn't changed */
2465 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2466 }
1da177e4
LT
2467 }
2468
feb3e20c
JL
2469 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2470 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2471 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2472 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2473
e30dcf3a
SF
2474 /* Even if error on time set, no sense failing the call if
2475 the server would set the time to a reasonable value anyway,
2476 and this check ensures that we are not being called from
2477 sys_utimes in which case we ought to fail the call back to
2478 the user when the server rejects the call */
fb8c4b14 2479 if ((rc) && (attrs->ia_valid &
feb3e20c 2480 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2481 rc = 0;
1da177e4
LT
2482 }
2483
2484 /* do not need local check to inode_check_ok since the server does
2485 that */
1025774c
CH
2486 if (rc)
2487 goto cifs_setattr_exit;
2488
2489 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2490 attrs->ia_size != i_size_read(inode))
2491 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2492
2493 setattr_copy(inode, attrs);
2494 mark_inode_dirty(inode);
1025774c 2495
e30dcf3a 2496cifs_setattr_exit:
1da177e4 2497 kfree(full_path);
6d5786a3 2498 free_xid(xid);
1da177e4
LT
2499 return rc;
2500}
2501
0510eeb7
JL
2502int
2503cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2504{
fc64005c 2505 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2506 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2507
2508 if (pTcon->unix_ext)
2509 return cifs_setattr_unix(direntry, attrs);
2510
2511 return cifs_setattr_nounix(direntry, attrs);
2512
2513 /* BB: add cifs_setattr_legacy for really old servers */
2514}
2515
99ee4dbd 2516#if 0
1da177e4
LT
2517void cifs_delete_inode(struct inode *inode)
2518{
f96637be 2519 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2520 /* may have to add back in if and when safe distributed caching of
2521 directories added e.g. via FindNotify */
2522}
99ee4dbd 2523#endif