Fix another dereference before null check warning
[deliverable/linux.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
1da177e4
LT
26#include <asm/div64.h>
27#include "cifsfs.h"
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
32#include "cifs_fs_sb.h"
2baa2682 33#include "cifs_unicode.h"
9451a9a5 34#include "fscache.h"
1da177e4 35
70eff55d 36
01c64fea 37static void cifs_set_ops(struct inode *inode)
70eff55d
CH
38{
39 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
40
41 switch (inode->i_mode & S_IFMT) {
42 case S_IFREG:
43 inode->i_op = &cifs_file_inode_ops;
44 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
45 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
46 inode->i_fop = &cifs_file_direct_nobrl_ops;
47 else
48 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
49 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
50 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
51 inode->i_fop = &cifs_file_strict_nobrl_ops;
52 else
53 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
54 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
55 inode->i_fop = &cifs_file_nobrl_ops;
56 else { /* not direct, send byte range locks */
57 inode->i_fop = &cifs_file_ops;
58 }
59
70eff55d 60 /* check if server can support readpages */
0d424ad0 61 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
62 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
63 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
64 else
65 inode->i_data.a_ops = &cifs_addr_ops;
66 break;
67 case S_IFDIR:
bc5b6e24 68#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 69 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
70 inode->i_op = &cifs_dfs_referral_inode_operations;
71 } else {
bc5b6e24
SF
72#else /* NO DFS support, treat as a directory */
73 {
74#endif
7962670e
IM
75 inode->i_op = &cifs_dir_inode_ops;
76 inode->i_fop = &cifs_dir_ops;
77 }
70eff55d
CH
78 break;
79 case S_IFLNK:
80 inode->i_op = &cifs_symlink_inode_ops;
81 break;
82 default:
83 init_special_inode(inode, inode->i_mode, inode->i_rdev);
84 break;
85 }
86}
87
df2cf170
JL
88/* check inode attributes against fattr. If they don't match, tag the
89 * inode for cache invalidation
90 */
91static void
92cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
93{
94 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
95
f96637be
JP
96 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
97 __func__, cifs_i->uniqueid);
df2cf170
JL
98
99 if (inode->i_state & I_NEW) {
f96637be
JP
100 cifs_dbg(FYI, "%s: inode %llu is new\n",
101 __func__, cifs_i->uniqueid);
df2cf170
JL
102 return;
103 }
104
105 /* don't bother with revalidation if we have an oplock */
18cceb6a 106 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
107 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
108 __func__, cifs_i->uniqueid);
df2cf170
JL
109 return;
110 }
111
112 /* revalidate if mtime or size have changed */
113 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
114 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
115 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
116 __func__, cifs_i->uniqueid);
df2cf170
JL
117 return;
118 }
119
f96637be
JP
120 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
121 __func__, cifs_i->uniqueid);
aff8d5ca 122 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
123}
124
74d290da
JM
125/*
126 * copy nlink to the inode, unless it wasn't provided. Provide
127 * sane values if we don't have an existing one and none was provided
128 */
129static void
130cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
131{
132 /*
133 * if we're in a situation where we can't trust what we
134 * got from the server (readdir, some non-unix cases)
135 * fake reasonable values
136 */
137 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
138 /* only provide fake values on a new inode */
139 if (inode->i_state & I_NEW) {
140 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
141 set_nlink(inode, 2);
142 else
143 set_nlink(inode, 1);
144 }
145 return;
146 }
147
148 /* we trust the server, so update it */
149 set_nlink(inode, fattr->cf_nlink);
150}
151
cc0bad75
JL
152/* populate an inode with info from a cifs_fattr struct */
153void
154cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 155{
cc0bad75 156 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 157 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 158
df2cf170
JL
159 cifs_revalidate_cache(inode, fattr);
160
b7ca6928 161 spin_lock(&inode->i_lock);
cc0bad75
JL
162 inode->i_atime = fattr->cf_atime;
163 inode->i_mtime = fattr->cf_mtime;
164 inode->i_ctime = fattr->cf_ctime;
cc0bad75 165 inode->i_rdev = fattr->cf_rdev;
74d290da 166 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
167 inode->i_uid = fattr->cf_uid;
168 inode->i_gid = fattr->cf_gid;
169
0b8f18e3
JL
170 /* if dynperm is set, don't clobber existing mode */
171 if (inode->i_state & I_NEW ||
172 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
173 inode->i_mode = fattr->cf_mode;
174
cc0bad75 175 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 176
0b8f18e3
JL
177 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
178 cifs_i->time = 0;
179 else
180 cifs_i->time = jiffies;
181
aff8d5ca
JL
182 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
183 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
184 else
185 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 186
835a36ca 187 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
188 /*
189 * Can't safely change the file size here if the client is writing to
190 * it due to potential races.
191 */
cc0bad75
JL
192 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
193 i_size_write(inode, fattr->cf_eof);
194
195 /*
196 * i_blocks is not related to (i_size / i_blksize),
197 * but instead 512 byte (2**9) size is required for
198 * calculating num blocks.
199 */
200 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
201 }
202 spin_unlock(&inode->i_lock);
203
01c64fea
DH
204 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
205 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
206 if (inode->i_state & I_NEW)
207 cifs_set_ops(inode);
cc0bad75
JL
208}
209
4065c802
JL
210void
211cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
212{
213 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
214
215 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
216 return;
217
218 fattr->cf_uniqueid = iunique(sb, ROOT_I);
219}
220
cc0bad75
JL
221/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
222void
223cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
224 struct cifs_sb_info *cifs_sb)
225{
226 memset(fattr, 0, sizeof(*fattr));
227 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
228 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
229 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
230
231 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
232 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
233 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
234 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
235
236 /*
237 * Since we set the inode type below we need to mask off
238 * to avoid strange results if bits set above.
239 */
cc0bad75 240 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
241 switch (le32_to_cpu(info->Type)) {
242 case UNIX_FILE:
cc0bad75
JL
243 fattr->cf_mode |= S_IFREG;
244 fattr->cf_dtype = DT_REG;
75f12983
CH
245 break;
246 case UNIX_SYMLINK:
cc0bad75
JL
247 fattr->cf_mode |= S_IFLNK;
248 fattr->cf_dtype = DT_LNK;
75f12983
CH
249 break;
250 case UNIX_DIR:
cc0bad75
JL
251 fattr->cf_mode |= S_IFDIR;
252 fattr->cf_dtype = DT_DIR;
75f12983
CH
253 break;
254 case UNIX_CHARDEV:
cc0bad75
JL
255 fattr->cf_mode |= S_IFCHR;
256 fattr->cf_dtype = DT_CHR;
257 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
258 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
259 break;
260 case UNIX_BLOCKDEV:
cc0bad75
JL
261 fattr->cf_mode |= S_IFBLK;
262 fattr->cf_dtype = DT_BLK;
263 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
264 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
265 break;
266 case UNIX_FIFO:
cc0bad75
JL
267 fattr->cf_mode |= S_IFIFO;
268 fattr->cf_dtype = DT_FIFO;
75f12983
CH
269 break;
270 case UNIX_SOCKET:
cc0bad75
JL
271 fattr->cf_mode |= S_IFSOCK;
272 fattr->cf_dtype = DT_SOCK;
75f12983
CH
273 break;
274 default:
275 /* safest to call it a file if we do not know */
cc0bad75
JL
276 fattr->cf_mode |= S_IFREG;
277 fattr->cf_dtype = DT_REG;
f96637be 278 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
279 break;
280 }
281
46bbc25f
EB
282 fattr->cf_uid = cifs_sb->mnt_uid;
283 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
284 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
285 if (id < ((uid_t)-1)) {
286 kuid_t uid = make_kuid(&init_user_ns, id);
287 if (uid_valid(uid))
288 fattr->cf_uid = uid;
289 }
46bbc25f
EB
290 }
291
292 fattr->cf_gid = cifs_sb->mnt_gid;
293 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
294 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
295 if (id < ((gid_t)-1)) {
296 kgid_t gid = make_kgid(&init_user_ns, id);
297 if (gid_valid(gid))
298 fattr->cf_gid = gid;
299 }
46bbc25f 300 }
75f12983 301
cc0bad75 302 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
303}
304
b9a3260f 305/*
cc0bad75
JL
306 * Fill a cifs_fattr struct with fake inode info.
307 *
308 * Needed to setup cifs_fattr data for the directory which is the
309 * junction to the new submount (ie to setup the fake directory
310 * which represents a DFS referral).
b9a3260f 311 */
f1230c97 312static void
cc0bad75 313cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 314{
cc0bad75 315 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 316
f96637be 317 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
318
319 memset(fattr, 0, sizeof(*fattr));
320 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
321 fattr->cf_uid = cifs_sb->mnt_uid;
322 fattr->cf_gid = cifs_sb->mnt_gid;
323 fattr->cf_atime = CURRENT_TIME;
324 fattr->cf_ctime = CURRENT_TIME;
325 fattr->cf_mtime = CURRENT_TIME;
326 fattr->cf_nlink = 2;
327 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
328}
329
4ad65044
PS
330static int
331cifs_get_file_info_unix(struct file *filp)
abab095d
JL
332{
333 int rc;
6d5786a3 334 unsigned int xid;
abab095d
JL
335 FILE_UNIX_BASIC_INFO find_data;
336 struct cifs_fattr fattr;
496ad9aa 337 struct inode *inode = file_inode(filp);
abab095d 338 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 339 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 340 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 341
6d5786a3 342 xid = get_xid();
4b4de76e 343 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
344 if (!rc) {
345 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
346 } else if (rc == -EREMOTE) {
347 cifs_create_dfs_fattr(&fattr, inode->i_sb);
348 rc = 0;
349 }
350
351 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 352 free_xid(xid);
abab095d
JL
353 return rc;
354}
355
1da177e4 356int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 357 const unsigned char *full_path,
6d5786a3 358 struct super_block *sb, unsigned int xid)
1da177e4 359{
cc0bad75 360 int rc;
0e4bbde9 361 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 362 struct cifs_fattr fattr;
96daf2b0 363 struct cifs_tcon *tcon;
7ffec372 364 struct tcon_link *tlink;
1da177e4 365 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 366
f96637be 367 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 368
7ffec372
JL
369 tlink = cifs_sb_tlink(cifs_sb);
370 if (IS_ERR(tlink))
371 return PTR_ERR(tlink);
372 tcon = tlink_tcon(tlink);
373
1da177e4 374 /* could have done a find first instead but this returns more info */
cc0bad75 375 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
376 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
377 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 378 cifs_put_tlink(tlink);
e911d0cc 379
cc0bad75
JL
380 if (!rc) {
381 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
382 } else if (rc == -EREMOTE) {
383 cifs_create_dfs_fattr(&fattr, sb);
384 rc = 0;
385 } else {
386 return rc;
387 }
1da177e4 388
1b12b9c1
SM
389 /* check for Minshall+French symlinks */
390 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
391 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
392 full_path);
1b12b9c1 393 if (tmprc)
cb084b1a 394 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
395 }
396
0e4bbde9 397 if (*pinode == NULL) {
cc0bad75 398 /* get new inode */
4065c802 399 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
400 *pinode = cifs_iget(sb, &fattr);
401 if (!*pinode)
0e4bbde9 402 rc = -ENOMEM;
cc0bad75
JL
403 } else {
404 /* we already have inode, update it */
405 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 406 }
1da177e4 407
1da177e4
LT
408 return rc;
409}
410
0b8f18e3 411static int
0360d605 412cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 413 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
414{
415 int rc;
db8b631d 416 __u32 oplock;
7ffec372 417 struct tcon_link *tlink;
96daf2b0 418 struct cifs_tcon *tcon;
d81b8a40
PS
419 struct cifs_fid fid;
420 struct cifs_open_parms oparms;
d4ffff1f 421 struct cifs_io_parms io_parms;
86c96b4b 422 char buf[24];
d6e2f2a4 423 unsigned int bytes_read;
fb8c4b14 424 char *pbuf;
0360d605 425 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
426
427 pbuf = buf;
428
0b8f18e3
JL
429 fattr->cf_mode &= ~S_IFMT;
430
431 if (fattr->cf_eof == 0) {
432 fattr->cf_mode |= S_IFIFO;
433 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 434 return 0;
0b8f18e3
JL
435 } else if (fattr->cf_eof < 8) {
436 fattr->cf_mode |= S_IFREG;
437 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
438 return -EINVAL; /* EOPNOTSUPP? */
439 }
50c2f753 440
7ffec372
JL
441 tlink = cifs_sb_tlink(cifs_sb);
442 if (IS_ERR(tlink))
443 return PTR_ERR(tlink);
444 tcon = tlink_tcon(tlink);
445
d81b8a40
PS
446 oparms.tcon = tcon;
447 oparms.cifs_sb = cifs_sb;
448 oparms.desired_access = GENERIC_READ;
449 oparms.create_options = CREATE_NOT_DIR;
450 oparms.disposition = FILE_OPEN;
451 oparms.path = path;
452 oparms.fid = &fid;
453 oparms.reconnect = false;
454
db8b631d
SF
455 if (tcon->ses->server->oplocks)
456 oplock = REQ_OPLOCK;
457 else
458 oplock = 0;
459 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 460 if (rc) {
db8b631d 461 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
462 cifs_put_tlink(tlink);
463 return rc;
464 }
465
466 /* Read header */
d81b8a40 467 io_parms.netfid = fid.netfid;
0360d605
PS
468 io_parms.pid = current->tgid;
469 io_parms.tcon = tcon;
470 io_parms.offset = 0;
471 io_parms.length = 24;
472
db8b631d
SF
473 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
474 &bytes_read, &pbuf, &buf_type);
0360d605
PS
475 if ((rc == 0) && (bytes_read >= 8)) {
476 if (memcmp("IntxBLK", pbuf, 8) == 0) {
477 cifs_dbg(FYI, "Block device\n");
478 fattr->cf_mode |= S_IFBLK;
479 fattr->cf_dtype = DT_BLK;
480 if (bytes_read == 24) {
481 /* we have enough to decode dev num */
482 __u64 mjr; /* major */
483 __u64 mnr; /* minor */
484 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
485 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
486 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 487 }
0360d605
PS
488 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
489 cifs_dbg(FYI, "Char device\n");
490 fattr->cf_mode |= S_IFCHR;
491 fattr->cf_dtype = DT_CHR;
492 if (bytes_read == 24) {
493 /* we have enough to decode dev num */
494 __u64 mjr; /* major */
495 __u64 mnr; /* minor */
496 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
497 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
498 fattr->cf_rdev = MKDEV(mjr, mnr);
499 }
500 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
501 cifs_dbg(FYI, "Symlink\n");
502 fattr->cf_mode |= S_IFLNK;
503 fattr->cf_dtype = DT_LNK;
3020a1f5 504 } else {
0360d605 505 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 506 fattr->cf_dtype = DT_REG;
0360d605 507 rc = -EOPNOTSUPP;
fb8c4b14 508 }
0360d605
PS
509 } else {
510 fattr->cf_mode |= S_IFREG; /* then it is a file */
511 fattr->cf_dtype = DT_REG;
512 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 513 }
db8b631d
SF
514
515 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 516 cifs_put_tlink(tlink);
d6e2f2a4 517 return rc;
d6e2f2a4
SF
518}
519
9e294f1c
SF
520#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
521
0b8f18e3
JL
522/*
523 * Fetch mode bits as provided by SFU.
524 *
525 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
526 */
527static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 528 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 529{
3020a1f5 530#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
531 ssize_t rc;
532 char ea_value[4];
533 __u32 mode;
7ffec372 534 struct tcon_link *tlink;
96daf2b0 535 struct cifs_tcon *tcon;
7ffec372
JL
536
537 tlink = cifs_sb_tlink(cifs_sb);
538 if (IS_ERR(tlink))
539 return PTR_ERR(tlink);
540 tcon = tlink_tcon(tlink);
9e294f1c 541
d979f3b0
SF
542 if (tcon->ses->server->ops->query_all_EAs == NULL) {
543 cifs_put_tlink(tlink);
544 return -EOPNOTSUPP;
545 }
546
547 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
548 "SETFILEBITS", ea_value, 4 /* size of buf */,
549 cifs_sb->local_nls,
2baa2682 550 cifs_remap(cifs_sb));
7ffec372 551 cifs_put_tlink(tlink);
4523cc30 552 if (rc < 0)
9e294f1c
SF
553 return (int)rc;
554 else if (rc > 3) {
555 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 556 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
557 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
558 mode, fattr->cf_mode);
0b8f18e3 559 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 560 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 561 }
0b8f18e3
JL
562
563 return 0;
3020a1f5
SF
564#else
565 return -EOPNOTSUPP;
566#endif
9e294f1c
SF
567}
568
0b8f18e3 569/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 570static void
0b8f18e3 571cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
eb85d94b
PS
572 struct cifs_sb_info *cifs_sb, bool adjust_tz,
573 bool symlink)
b9a3260f 574{
96daf2b0 575 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 576
0b8f18e3
JL
577 memset(fattr, 0, sizeof(*fattr));
578 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
579 if (info->DeletePending)
580 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
581
582 if (info->LastAccessTime)
583 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
584 else
585 fattr->cf_atime = CURRENT_TIME;
586
587 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
588 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
589
590 if (adjust_tz) {
0d424ad0
JL
591 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
592 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
593 }
594
595 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
596 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 597 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 598
74d290da 599 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
600
601 if (symlink) {
602 fattr->cf_mode = S_IFLNK;
603 fattr->cf_dtype = DT_LNK;
604 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
605 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
606 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
607 /*
608 * Server can return wrong NumberOfLinks value for directories
609 * when Unix extensions are disabled - fake it.
610 */
74d290da
JM
611 if (!tcon->unix_ext)
612 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
613 } else {
614 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
615 fattr->cf_dtype = DT_REG;
0b8f18e3 616
d0c280d2
JL
617 /* clear write bits if ATTR_READONLY is set */
618 if (fattr->cf_cifsattrs & ATTR_READONLY)
619 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 620
74d290da
JM
621 /*
622 * Don't accept zero nlink from non-unix servers unless
623 * delete is pending. Instead mark it as unknown.
624 */
625 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
626 !info->DeletePending) {
627 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 628 fattr->cf_nlink);
74d290da 629 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 630 }
6de2ce42 631 }
0b8f18e3
JL
632
633 fattr->cf_uid = cifs_sb->mnt_uid;
634 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
635}
636
4ad65044
PS
637static int
638cifs_get_file_info(struct file *filp)
abab095d
JL
639{
640 int rc;
6d5786a3 641 unsigned int xid;
abab095d
JL
642 FILE_ALL_INFO find_data;
643 struct cifs_fattr fattr;
496ad9aa 644 struct inode *inode = file_inode(filp);
abab095d 645 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 646 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 647 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
648 struct TCP_Server_Info *server = tcon->ses->server;
649
650 if (!server->ops->query_file_info)
651 return -ENOSYS;
abab095d 652
6d5786a3 653 xid = get_xid();
4ad65044 654 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
655 switch (rc) {
656 case 0:
eb85d94b
PS
657 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false,
658 false);
42274bb2
PS
659 break;
660 case -EREMOTE:
661 cifs_create_dfs_fattr(&fattr, inode->i_sb);
662 rc = 0;
663 break;
664 case -EOPNOTSUPP:
665 case -EINVAL:
abab095d
JL
666 /*
667 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
668 * for now, just skip revalidating and mark inode for
669 * immediate reval.
670 */
abab095d
JL
671 rc = 0;
672 CIFS_I(inode)->time = 0;
42274bb2 673 default:
abab095d 674 goto cgfi_exit;
42274bb2 675 }
abab095d
JL
676
677 /*
678 * don't bother with SFU junk here -- just mark inode as needing
679 * revalidation.
680 */
abab095d
JL
681 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
682 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
683 cifs_fattr_to_inode(inode, &fattr);
684cgfi_exit:
6d5786a3 685 free_xid(xid);
abab095d
JL
686 return rc;
687}
688
1208ef1f
PS
689int
690cifs_get_inode_info(struct inode **inode, const char *full_path,
691 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 692 const struct cifs_fid *fid)
1da177e4 693{
c052e2b4
SP
694 bool validinum = false;
695 __u16 srchflgs;
696 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
697 struct cifs_tcon *tcon;
698 struct TCP_Server_Info *server;
7ffec372 699 struct tcon_link *tlink;
1da177e4 700 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 701 char *buf = NULL;
1208ef1f 702 bool adjust_tz = false;
0b8f18e3 703 struct cifs_fattr fattr;
c052e2b4 704 struct cifs_search_info *srchinf = NULL;
eb85d94b 705 bool symlink = false;
1da177e4 706
7ffec372
JL
707 tlink = cifs_sb_tlink(cifs_sb);
708 if (IS_ERR(tlink))
709 return PTR_ERR(tlink);
1208ef1f
PS
710 tcon = tlink_tcon(tlink);
711 server = tcon->ses->server;
7ffec372 712
f96637be 713 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 714
1208ef1f 715 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 716 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 717 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 718 goto cgii_exit;
1da177e4
LT
719 }
720 }
721
1208ef1f
PS
722 /* if inode info is not passed, get it from server */
723 if (data == NULL) {
724 if (!server->ops->query_path_info) {
725 rc = -ENOSYS;
726 goto cgii_exit;
727 }
1da177e4 728 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
729 if (buf == NULL) {
730 rc = -ENOMEM;
731 goto cgii_exit;
732 }
1208ef1f
PS
733 data = (FILE_ALL_INFO *)buf;
734 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 735 data, &adjust_tz, &symlink);
1da177e4 736 }
0b8f18e3
JL
737
738 if (!rc) {
eb85d94b
PS
739 cifs_all_info_to_fattr(&fattr, data, cifs_sb, adjust_tz,
740 symlink);
0b8f18e3
JL
741 } else if (rc == -EREMOTE) {
742 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 743 rc = 0;
c052e2b4
SP
744 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
745 srchinf = kzalloc(sizeof(struct cifs_search_info),
746 GFP_KERNEL);
747 if (srchinf == NULL) {
748 rc = -ENOMEM;
749 goto cgii_exit;
750 }
751
752 srchinf->endOfSearch = false;
753 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
754
755 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
756 CIFS_SEARCH_CLOSE_AT_END |
757 CIFS_SEARCH_BACKUP_SEARCH;
758
759 rc = CIFSFindFirst(xid, tcon, full_path,
760 cifs_sb, NULL, srchflgs, srchinf, false);
761 if (!rc) {
762 data =
763 (FILE_ALL_INFO *)srchinf->srch_entries_start;
764
765 cifs_dir_info_to_fattr(&fattr,
766 (FILE_DIRECTORY_INFO *)data, cifs_sb);
767 fattr.cf_uniqueid = le64_to_cpu(
768 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
769 validinum = true;
770
771 cifs_buf_release(srchinf->ntwrk_buf_start);
772 }
773 kfree(srchinf);
774 } else
7962670e 775 goto cgii_exit;
1da177e4 776
0b8f18e3
JL
777 /*
778 * If an inode wasn't passed in, then get the inode number
779 *
780 * Is an i_ino of zero legal? Can we use that to check if the server
781 * supports returning inode numbers? Are there other sanity checks we
782 * can use to ensure that the server is really filling in that field?
0b8f18e3 783 */
1208ef1f 784 if (*inode == NULL) {
b9a3260f 785 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
786 if (validinum == false) {
787 if (server->ops->get_srv_inum)
788 tmprc = server->ops->get_srv_inum(xid,
789 tcon, cifs_sb, full_path,
790 &fattr.cf_uniqueid, data);
791 if (tmprc) {
f96637be
JP
792 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
793 tmprc);
c052e2b4
SP
794 fattr.cf_uniqueid = iunique(sb, ROOT_I);
795 cifs_autodisable_serverino(cifs_sb);
796 }
132ac7b7 797 }
c052e2b4 798 } else
0b8f18e3 799 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 800 } else
1208ef1f 801 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 802
0b8f18e3
JL
803 /* query for SFU type info if supported and needed */
804 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
805 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
806 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
807 if (tmprc)
f96637be 808 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 809 }
1da177e4 810
79df1bae 811#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
812 /* fill in 0777 bits from ACL */
813 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 814 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 815 if (rc) {
f96637be
JP
816 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
817 __func__, rc);
78415d2d
SP
818 goto cgii_exit;
819 }
b9a3260f 820 }
79df1bae 821#endif /* CONFIG_CIFS_ACL */
b9a3260f 822
0b8f18e3
JL
823 /* fill in remaining high mode bits e.g. SUID, VTX */
824 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
825 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 826
1b12b9c1
SM
827 /* check for Minshall+French symlinks */
828 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
829 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
830 full_path);
1b12b9c1 831 if (tmprc)
cb084b1a 832 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
833 }
834
1208ef1f
PS
835 if (!*inode) {
836 *inode = cifs_iget(sb, &fattr);
837 if (!*inode)
0b8f18e3
JL
838 rc = -ENOMEM;
839 } else {
1208ef1f 840 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 841 }
b9a3260f 842
7962670e 843cgii_exit:
1da177e4 844 kfree(buf);
7ffec372 845 cifs_put_tlink(tlink);
1da177e4
LT
846 return rc;
847}
848
7f8ed420
SF
849static const struct inode_operations cifs_ipc_inode_ops = {
850 .lookup = cifs_lookup,
851};
852
cc0bad75
JL
853static int
854cifs_find_inode(struct inode *inode, void *opaque)
855{
856 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
857
f30b9c11 858 /* don't match inode with different uniqueid */
cc0bad75
JL
859 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
860 return 0;
861
20054bd6
JL
862 /* use createtime like an i_generation field */
863 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
864 return 0;
865
f30b9c11
JL
866 /* don't match inode of different type */
867 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
868 return 0;
869
5acfec25 870 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 871 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 872 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 873
cc0bad75
JL
874 return 1;
875}
876
877static int
878cifs_init_inode(struct inode *inode, void *opaque)
879{
880 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
881
882 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 883 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
884 return 0;
885}
886
5acfec25
JL
887/*
888 * walk dentry list for an inode and report whether it has aliases that
889 * are hashed. We use this to determine if a directory inode can actually
890 * be used.
891 */
892static bool
893inode_has_hashed_dentries(struct inode *inode)
894{
895 struct dentry *dentry;
896
873feea0 897 spin_lock(&inode->i_lock);
946e51f2 898 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 899 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 900 spin_unlock(&inode->i_lock);
5acfec25
JL
901 return true;
902 }
903 }
873feea0 904 spin_unlock(&inode->i_lock);
5acfec25
JL
905 return false;
906}
907
cc0bad75
JL
908/* Given fattrs, get a corresponding inode */
909struct inode *
910cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
911{
912 unsigned long hash;
913 struct inode *inode;
914
3d694380 915retry_iget5_locked:
f96637be 916 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
917
918 /* hash down to 32-bits on 32-bit arch */
919 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
920
921 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 922 if (inode) {
5acfec25 923 /* was there a potentially problematic inode collision? */
3d694380 924 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 925 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
926
927 if (inode_has_hashed_dentries(inode)) {
928 cifs_autodisable_serverino(CIFS_SB(sb));
929 iput(inode);
930 fattr->cf_uniqueid = iunique(sb, ROOT_I);
931 goto retry_iget5_locked;
932 }
3d694380
JL
933 }
934
cc0bad75
JL
935 cifs_fattr_to_inode(inode, fattr);
936 if (sb->s_flags & MS_NOATIME)
937 inode->i_flags |= S_NOATIME | S_NOCMTIME;
938 if (inode->i_state & I_NEW) {
939 inode->i_ino = hash;
0ccd4802 940#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
941 /* initialize per-inode cache cookie pointer */
942 CIFS_I(inode)->fscache = NULL;
0ccd4802 943#endif
cc0bad75
JL
944 unlock_new_inode(inode);
945 }
946 }
947
948 return inode;
949}
950
1da177e4 951/* gets root inode */
9b6763e0 952struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 953{
6d5786a3 954 unsigned int xid;
0d424ad0 955 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 956 struct inode *inode = NULL;
ce634ab2 957 long rc;
96daf2b0 958 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 959
6d5786a3 960 xid = get_xid();
b5b374ea 961 if (tcon->unix_ext) {
f87d39d9 962 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
b5b374ea
SF
963 /* some servers mistakenly claim POSIX support */
964 if (rc != -EOPNOTSUPP)
965 goto iget_no_retry;
966 cifs_dbg(VFS, "server does not support POSIX extensions");
967 tcon->unix_ext = false;
968 }
969
970 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 971
b5b374ea 972iget_no_retry:
a7851ce7
OS
973 if (!inode) {
974 inode = ERR_PTR(rc);
975 goto out;
976 }
cc0bad75 977
0ccd4802 978#ifdef CONFIG_CIFS_FSCACHE
d03382ce 979 /* populate tcon->resource_id */
0d424ad0 980 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 981#endif
d03382ce 982
0d424ad0 983 if (rc && tcon->ipc) {
f96637be 984 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 985 spin_lock(&inode->i_lock);
7f8ed420 986 inode->i_mode |= S_IFDIR;
bfe86848 987 set_nlink(inode, 2);
7f8ed420
SF
988 inode->i_op = &cifs_ipc_inode_ops;
989 inode->i_fop = &simple_dir_operations;
990 inode->i_uid = cifs_sb->mnt_uid;
991 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 992 spin_unlock(&inode->i_lock);
ad661334 993 } else if (rc) {
ce634ab2 994 iget_failed(inode);
a7851ce7 995 inode = ERR_PTR(rc);
7f8ed420
SF
996 }
997
a7851ce7 998out:
6d5786a3 999 /* can not call macro free_xid here since in a void func
ce634ab2
DH
1000 * TODO: This is no longer true
1001 */
6d5786a3 1002 _free_xid(xid);
ce634ab2 1003 return inode;
1da177e4
LT
1004}
1005
ed6875e0 1006int
6d5786a3 1007cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1008 char *full_path, __u32 dosattr)
388e57b2 1009{
388e57b2 1010 bool set_time = false;
388e57b2 1011 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1012 struct TCP_Server_Info *server;
388e57b2
SF
1013 FILE_BASIC_INFO info_buf;
1014
1adcb710
SF
1015 if (attrs == NULL)
1016 return -EINVAL;
1017
6bdf6dbd
PS
1018 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1019 if (!server->ops->set_file_info)
1020 return -ENOSYS;
1021
388e57b2
SF
1022 if (attrs->ia_valid & ATTR_ATIME) {
1023 set_time = true;
1024 info_buf.LastAccessTime =
1025 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1026 } else
1027 info_buf.LastAccessTime = 0;
1028
1029 if (attrs->ia_valid & ATTR_MTIME) {
1030 set_time = true;
1031 info_buf.LastWriteTime =
1032 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1033 } else
1034 info_buf.LastWriteTime = 0;
1035
1036 /*
1037 * Samba throws this field away, but windows may actually use it.
1038 * Do not set ctime unless other time stamps are changed explicitly
1039 * (i.e. by utimes()) since we would then have a mix of client and
1040 * server times.
1041 */
1042 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1043 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1044 info_buf.ChangeTime =
1045 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1046 } else
1047 info_buf.ChangeTime = 0;
1048
1049 info_buf.CreationTime = 0; /* don't change */
1050 info_buf.Attributes = cpu_to_le32(dosattr);
1051
6bdf6dbd 1052 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1053}
1054
a12a1ac7 1055/*
ed6875e0 1056 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1057 * and rename it to a random name that hopefully won't conflict with
1058 * anything else.
1059 */
ed6875e0
PS
1060int
1061cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1062 const unsigned int xid)
a12a1ac7
JL
1063{
1064 int oplock = 0;
1065 int rc;
d81b8a40
PS
1066 struct cifs_fid fid;
1067 struct cifs_open_parms oparms;
3270958b 1068 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1069 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1070 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1071 struct tcon_link *tlink;
96daf2b0 1072 struct cifs_tcon *tcon;
3270958b
SF
1073 __u32 dosattr, origattr;
1074 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1075
7ffec372
JL
1076 tlink = cifs_sb_tlink(cifs_sb);
1077 if (IS_ERR(tlink))
1078 return PTR_ERR(tlink);
1079 tcon = tlink_tcon(tlink);
1080
c483a984
SP
1081 /*
1082 * We cannot rename the file if the server doesn't support
1083 * CAP_INFOLEVEL_PASSTHRU
1084 */
1085 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1086 rc = -EBUSY;
1087 goto out;
1088 }
1089
d81b8a40
PS
1090 oparms.tcon = tcon;
1091 oparms.cifs_sb = cifs_sb;
1092 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1093 oparms.create_options = CREATE_NOT_DIR;
1094 oparms.disposition = FILE_OPEN;
1095 oparms.path = full_path;
1096 oparms.fid = &fid;
1097 oparms.reconnect = false;
1098
1099 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1100 if (rc != 0)
1101 goto out;
1102
3270958b
SF
1103 origattr = cifsInode->cifsAttrs;
1104 if (origattr == 0)
1105 origattr |= ATTR_NORMAL;
1106
1107 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1108 if (dosattr == 0)
1109 dosattr |= ATTR_NORMAL;
1110 dosattr |= ATTR_HIDDEN;
1111
3270958b
SF
1112 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1113 if (dosattr != origattr) {
1114 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1115 if (info_buf == NULL) {
1116 rc = -ENOMEM;
1117 goto out_close;
1118 }
1119 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1120 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1121 current->tgid);
1122 /* although we would like to mark the file hidden
1123 if that fails we will still try to rename it */
72d282dc 1124 if (!rc)
3270958b
SF
1125 cifsInode->cifsAttrs = dosattr;
1126 else
1127 dosattr = origattr; /* since not able to change them */
a12a1ac7 1128 }
a12a1ac7 1129
dd1db2de 1130 /* rename the file */
d81b8a40
PS
1131 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1132 cifs_sb->local_nls,
2baa2682 1133 cifs_remap(cifs_sb));
3270958b 1134 if (rc != 0) {
47c78f4a 1135 rc = -EBUSY;
3270958b
SF
1136 goto undo_setattr;
1137 }
6d22f098 1138
3270958b 1139 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1140 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1141 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1142 current->tgid);
1143 /*
1144 * some samba versions return -ENOENT when we try to set the
1145 * file disposition here. Likely a samba bug, but work around
1146 * it for now. This means that some cifsXXX files may hang
1147 * around after they shouldn't.
1148 *
1149 * BB: remove this hack after more servers have the fix
1150 */
1151 if (rc == -ENOENT)
1152 rc = 0;
1153 else if (rc != 0) {
47c78f4a 1154 rc = -EBUSY;
3270958b
SF
1155 goto undo_rename;
1156 }
aff8d5ca 1157 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1158 }
7ce86d5a 1159
a12a1ac7 1160out_close:
d81b8a40 1161 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1162out:
3270958b 1163 kfree(info_buf);
7ffec372 1164 cifs_put_tlink(tlink);
a12a1ac7 1165 return rc;
3270958b
SF
1166
1167 /*
1168 * reset everything back to the original state. Don't bother
1169 * dealing with errors here since we can't do anything about
1170 * them anyway.
1171 */
1172undo_rename:
d81b8a40 1173 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1174 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1175undo_setattr:
1176 if (dosattr != origattr) {
1177 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1178 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1179 current->tgid))
1180 cifsInode->cifsAttrs = origattr;
1181 }
1182
1183 goto out_close;
a12a1ac7
JL
1184}
1185
b7ca6928
SF
1186/* copied from fs/nfs/dir.c with small changes */
1187static void
1188cifs_drop_nlink(struct inode *inode)
1189{
1190 spin_lock(&inode->i_lock);
1191 if (inode->i_nlink > 0)
1192 drop_nlink(inode);
1193 spin_unlock(&inode->i_lock);
1194}
ff694527
SF
1195
1196/*
1197 * If dentry->d_inode is null (usually meaning the cached dentry
1198 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1199 * if that fails we can not attempt the fall back mechanisms on EACCESS
1200 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1201 * unlink on negative dentries currently.
1202 */
5f0319a7 1203int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1204{
1205 int rc = 0;
6d5786a3 1206 unsigned int xid;
1da177e4 1207 char *full_path = NULL;
5f0319a7 1208 struct inode *inode = dentry->d_inode;
ff694527 1209 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1210 struct super_block *sb = dir->i_sb;
1211 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1212 struct tcon_link *tlink;
96daf2b0 1213 struct cifs_tcon *tcon;
ed6875e0 1214 struct TCP_Server_Info *server;
6050247d
SF
1215 struct iattr *attrs = NULL;
1216 __u32 dosattr = 0, origattr = 0;
1da177e4 1217
f96637be 1218 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1219
7ffec372
JL
1220 tlink = cifs_sb_tlink(cifs_sb);
1221 if (IS_ERR(tlink))
1222 return PTR_ERR(tlink);
1223 tcon = tlink_tcon(tlink);
ed6875e0 1224 server = tcon->ses->server;
7ffec372 1225
6d5786a3 1226 xid = get_xid();
1da177e4 1227
5f0319a7
JL
1228 /* Unlink can be called from rename so we can not take the
1229 * sb->s_vfs_rename_mutex here */
1230 full_path = build_path_from_dentry(dentry);
1da177e4 1231 if (full_path == NULL) {
0f3bc09e 1232 rc = -ENOMEM;
7ffec372 1233 goto unlink_out;
1da177e4 1234 }
2d785a50 1235
29e20f9c
PS
1236 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1237 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1238 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1239 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1240 cifs_remap(cifs_sb));
f96637be 1241 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1242 if ((rc == 0) || (rc == -ENOENT))
1243 goto psx_del_no_retry;
1244 }
1da177e4 1245
6050247d 1246retry_std_delete:
ed6875e0
PS
1247 if (!server->ops->unlink) {
1248 rc = -ENOSYS;
1249 goto psx_del_no_retry;
1250 }
1251
1252 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1253
2d785a50 1254psx_del_no_retry:
1da177e4 1255 if (!rc) {
5f0319a7 1256 if (inode)
b7ca6928 1257 cifs_drop_nlink(inode);
1da177e4 1258 } else if (rc == -ENOENT) {
5f0319a7 1259 d_drop(dentry);
47c78f4a 1260 } else if (rc == -EBUSY) {
ed6875e0
PS
1261 if (server->ops->rename_pending_delete) {
1262 rc = server->ops->rename_pending_delete(full_path,
1263 dentry, xid);
1264 if (rc == 0)
1265 cifs_drop_nlink(inode);
1266 }
ff694527 1267 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1268 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1269 if (attrs == NULL) {
1270 rc = -ENOMEM;
1271 goto out_reval;
1da177e4 1272 }
388e57b2
SF
1273
1274 /* try to reset dos attributes */
ff694527
SF
1275 cifs_inode = CIFS_I(inode);
1276 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1277 if (origattr == 0)
1278 origattr |= ATTR_NORMAL;
1279 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1280 if (dosattr == 0)
1281 dosattr |= ATTR_NORMAL;
1282 dosattr |= ATTR_HIDDEN;
1283
1284 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1285 if (rc != 0)
1286 goto out_reval;
6050247d
SF
1287
1288 goto retry_std_delete;
1da177e4 1289 }
6050247d
SF
1290
1291 /* undo the setattr if we errored out and it's needed */
1292 if (rc != 0 && dosattr != 0)
1293 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1294
388e57b2 1295out_reval:
4523cc30 1296 if (inode) {
ff694527
SF
1297 cifs_inode = CIFS_I(inode);
1298 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1299 when needed */
1300 inode->i_ctime = current_fs_time(sb);
06bcfedd 1301 }
5f0319a7 1302 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1303 cifs_inode = CIFS_I(dir);
6050247d 1304 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1305unlink_out:
1da177e4 1306 kfree(full_path);
6050247d 1307 kfree(attrs);
6d5786a3 1308 free_xid(xid);
7ffec372 1309 cifs_put_tlink(tlink);
1da177e4
LT
1310 return rc;
1311}
1312
ff691e96 1313static int
101b92d9 1314cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1315 const char *full_path, struct cifs_sb_info *cifs_sb,
1316 struct cifs_tcon *tcon, const unsigned int xid)
1317{
1318 int rc = 0;
101b92d9 1319 struct inode *inode = NULL;
ff691e96
PS
1320
1321 if (tcon->unix_ext)
101b92d9 1322 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1323 xid);
1324 else
101b92d9
JL
1325 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1326 xid, NULL);
1327
ff691e96
PS
1328 if (rc)
1329 return rc;
1330
ff691e96
PS
1331 /*
1332 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1333 * from the server or was set bogus. Also, since this is a brand new
1334 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1335 */
101b92d9
JL
1336 if (inode->i_nlink < 2)
1337 set_nlink(inode, 2);
ff691e96
PS
1338 mode &= ~current_umask();
1339 /* must turn on setgid bit if parent dir has it */
101b92d9 1340 if (parent->i_mode & S_ISGID)
ff691e96
PS
1341 mode |= S_ISGID;
1342
1343 if (tcon->unix_ext) {
1344 struct cifs_unix_set_info_args args = {
1345 .mode = mode,
1346 .ctime = NO_CHANGE_64,
1347 .atime = NO_CHANGE_64,
1348 .mtime = NO_CHANGE_64,
1349 .device = 0,
1350 };
1351 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1352 args.uid = current_fsuid();
101b92d9 1353 if (parent->i_mode & S_ISGID)
49418b2c 1354 args.gid = parent->i_gid;
ff691e96 1355 else
49418b2c 1356 args.gid = current_fsgid();
ff691e96 1357 } else {
49418b2c
EB
1358 args.uid = INVALID_UID; /* no change */
1359 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1360 }
1361 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1362 cifs_sb->local_nls,
2baa2682 1363 cifs_remap(cifs_sb));
ff691e96 1364 } else {
f436720e 1365 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1366 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1367 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1368 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1369 tcon, xid);
101b92d9
JL
1370 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1371 inode->i_mode = (mode | S_IFDIR);
1372
1373 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1374 inode->i_uid = current_fsuid();
1375 if (inode->i_mode & S_ISGID)
1376 inode->i_gid = parent->i_gid;
1377 else
1378 inode->i_gid = current_fsgid();
ff691e96
PS
1379 }
1380 }
101b92d9 1381 d_instantiate(dentry, inode);
ff691e96
PS
1382 return rc;
1383}
1384
1385static int
1386cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1387 const char *full_path, struct cifs_sb_info *cifs_sb,
1388 struct cifs_tcon *tcon, const unsigned int xid)
1389{
1390 int rc = 0;
1391 u32 oplock = 0;
1392 FILE_UNIX_BASIC_INFO *info = NULL;
1393 struct inode *newinode = NULL;
1394 struct cifs_fattr fattr;
1395
1396 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1397 if (info == NULL) {
1398 rc = -ENOMEM;
1399 goto posix_mkdir_out;
1400 }
1401
1402 mode &= ~current_umask();
1403 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1404 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1405 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1406 if (rc == -EOPNOTSUPP)
1407 goto posix_mkdir_out;
1408 else if (rc) {
f96637be 1409 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1410 d_drop(dentry);
1411 goto posix_mkdir_out;
1412 }
1413
1414 if (info->Type == cpu_to_le32(-1))
1415 /* no return info, go query for it */
1416 goto posix_mkdir_get_info;
1417 /*
1418 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1419 * need to set uid/gid.
1420 */
1421
1422 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1423 cifs_fill_uniqueid(inode->i_sb, &fattr);
1424 newinode = cifs_iget(inode->i_sb, &fattr);
1425 if (!newinode)
1426 goto posix_mkdir_get_info;
1427
1428 d_instantiate(dentry, newinode);
1429
1430#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1431 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1432 dentry, dentry, newinode);
ff691e96
PS
1433
1434 if (newinode->i_nlink != 2)
f96637be
JP
1435 cifs_dbg(FYI, "unexpected number of links %d\n",
1436 newinode->i_nlink);
ff691e96
PS
1437#endif
1438
1439posix_mkdir_out:
1440 kfree(info);
1441 return rc;
1442posix_mkdir_get_info:
1443 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1444 xid);
1445 goto posix_mkdir_out;
1446}
1447
18bb1db3 1448int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1449{
ff691e96 1450 int rc = 0;
6d5786a3 1451 unsigned int xid;
1da177e4 1452 struct cifs_sb_info *cifs_sb;
7ffec372 1453 struct tcon_link *tlink;
29e20f9c 1454 struct cifs_tcon *tcon;
f436720e 1455 struct TCP_Server_Info *server;
ff691e96 1456 char *full_path;
1da177e4 1457
f96637be
JP
1458 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1459 mode, inode);
1da177e4 1460
1da177e4 1461 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1462 tlink = cifs_sb_tlink(cifs_sb);
1463 if (IS_ERR(tlink))
1464 return PTR_ERR(tlink);
29e20f9c 1465 tcon = tlink_tcon(tlink);
7ffec372 1466
6d5786a3 1467 xid = get_xid();
1da177e4 1468
7f57356b 1469 full_path = build_path_from_dentry(direntry);
1da177e4 1470 if (full_path == NULL) {
0f3bc09e 1471 rc = -ENOMEM;
7ffec372 1472 goto mkdir_out;
1da177e4 1473 }
50c2f753 1474
29e20f9c
PS
1475 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1476 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1477 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1478 tcon, xid);
1479 if (rc != -EOPNOTSUPP)
2dd29d31 1480 goto mkdir_out;
fb8c4b14 1481 }
ff691e96 1482
f436720e
PS
1483 server = tcon->ses->server;
1484
1485 if (!server->ops->mkdir) {
1486 rc = -ENOSYS;
1487 goto mkdir_out;
1488 }
1489
1da177e4 1490 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1491 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1492 if (rc) {
f96637be 1493 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1494 d_drop(direntry);
ff691e96 1495 goto mkdir_out;
1da177e4 1496 }
ff691e96
PS
1497
1498 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1499 xid);
fb8c4b14 1500mkdir_out:
6de2ce42
PS
1501 /*
1502 * Force revalidate to get parent dir info when needed since cached
1503 * attributes are invalid now.
1504 */
1505 CIFS_I(inode)->time = 0;
1da177e4 1506 kfree(full_path);
6d5786a3 1507 free_xid(xid);
7ffec372 1508 cifs_put_tlink(tlink);
1da177e4
LT
1509 return rc;
1510}
1511
1512int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1513{
1514 int rc = 0;
6d5786a3 1515 unsigned int xid;
1da177e4 1516 struct cifs_sb_info *cifs_sb;
7ffec372 1517 struct tcon_link *tlink;
f958ca5d
PS
1518 struct cifs_tcon *tcon;
1519 struct TCP_Server_Info *server;
1da177e4
LT
1520 char *full_path = NULL;
1521 struct cifsInodeInfo *cifsInode;
1522
f96637be 1523 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1524
6d5786a3 1525 xid = get_xid();
1da177e4 1526
7f57356b 1527 full_path = build_path_from_dentry(direntry);
1da177e4 1528 if (full_path == NULL) {
0f3bc09e 1529 rc = -ENOMEM;
7ffec372 1530 goto rmdir_exit;
1da177e4
LT
1531 }
1532
7ffec372
JL
1533 cifs_sb = CIFS_SB(inode->i_sb);
1534 tlink = cifs_sb_tlink(cifs_sb);
1535 if (IS_ERR(tlink)) {
1536 rc = PTR_ERR(tlink);
1537 goto rmdir_exit;
1538 }
f958ca5d
PS
1539 tcon = tlink_tcon(tlink);
1540 server = tcon->ses->server;
1541
1542 if (!server->ops->rmdir) {
1543 rc = -ENOSYS;
1544 cifs_put_tlink(tlink);
1545 goto rmdir_exit;
1546 }
7ffec372 1547
f958ca5d 1548 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1549 cifs_put_tlink(tlink);
1da177e4
LT
1550
1551 if (!rc) {
3677db10 1552 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1553 i_size_write(direntry->d_inode, 0);
ce71ec36 1554 clear_nlink(direntry->d_inode);
3677db10 1555 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1556 }
1557
1558 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1559 /* force revalidate to go get info when needed */
1560 cifsInode->time = 0;
42c24544
SF
1561
1562 cifsInode = CIFS_I(inode);
6de2ce42
PS
1563 /*
1564 * Force revalidate to get parent dir info when needed since cached
1565 * attributes are invalid now.
1566 */
1567 cifsInode->time = 0;
42c24544 1568
1da177e4
LT
1569 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1570 current_fs_time(inode->i_sb);
1571
7ffec372 1572rmdir_exit:
1da177e4 1573 kfree(full_path);
6d5786a3 1574 free_xid(xid);
1da177e4
LT
1575 return rc;
1576}
1577
ee2fd967 1578static int
8ceb9843
PS
1579cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1580 const char *from_path, struct dentry *to_dentry,
1581 const char *to_path)
ee2fd967
SF
1582{
1583 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1584 struct tcon_link *tlink;
8ceb9843
PS
1585 struct cifs_tcon *tcon;
1586 struct TCP_Server_Info *server;
d81b8a40
PS
1587 struct cifs_fid fid;
1588 struct cifs_open_parms oparms;
ee2fd967
SF
1589 int oplock, rc;
1590
7ffec372
JL
1591 tlink = cifs_sb_tlink(cifs_sb);
1592 if (IS_ERR(tlink))
1593 return PTR_ERR(tlink);
8ceb9843
PS
1594 tcon = tlink_tcon(tlink);
1595 server = tcon->ses->server;
1596
1597 if (!server->ops->rename)
1598 return -ENOSYS;
7ffec372 1599
ee2fd967 1600 /* try path-based rename first */
8ceb9843 1601 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1602
1603 /*
8ceb9843
PS
1604 * Don't bother with rename by filehandle unless file is busy and
1605 * source. Note that cross directory moves do not work with
ee2fd967
SF
1606 * rename by filehandle to various Windows servers.
1607 */
47c78f4a 1608 if (rc == 0 || rc != -EBUSY)
7ffec372 1609 goto do_rename_exit;
ee2fd967 1610
ed0e3ace
JL
1611 /* open-file renames don't work across directories */
1612 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1613 goto do_rename_exit;
ed0e3ace 1614
d81b8a40
PS
1615 oparms.tcon = tcon;
1616 oparms.cifs_sb = cifs_sb;
ee2fd967 1617 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1618 oparms.desired_access = DELETE;
1619 oparms.create_options = CREATE_NOT_DIR;
1620 oparms.disposition = FILE_OPEN;
1621 oparms.path = from_path;
1622 oparms.fid = &fid;
1623 oparms.reconnect = false;
1624
1625 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1626 if (rc == 0) {
d81b8a40 1627 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1628 (const char *) to_dentry->d_name.name,
2baa2682 1629 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1630 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1631 }
7ffec372
JL
1632do_rename_exit:
1633 cifs_put_tlink(tlink);
ee2fd967
SF
1634 return rc;
1635}
1636
8ceb9843 1637int
7c33d597
MS
1638cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1639 struct inode *target_dir, struct dentry *target_dentry,
1640 unsigned int flags)
1da177e4 1641{
8ceb9843
PS
1642 char *from_name = NULL;
1643 char *to_name = NULL;
639e7a91 1644 struct cifs_sb_info *cifs_sb;
7ffec372 1645 struct tcon_link *tlink;
96daf2b0 1646 struct cifs_tcon *tcon;
ee2fd967
SF
1647 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1648 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1649 unsigned int xid;
1650 int rc, tmprc;
1da177e4 1651
7c33d597
MS
1652 if (flags & ~RENAME_NOREPLACE)
1653 return -EINVAL;
1654
639e7a91 1655 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1656 tlink = cifs_sb_tlink(cifs_sb);
1657 if (IS_ERR(tlink))
1658 return PTR_ERR(tlink);
1659 tcon = tlink_tcon(tlink);
1da177e4 1660
6d5786a3 1661 xid = get_xid();
ee2fd967 1662
ee2fd967
SF
1663 /*
1664 * we already have the rename sem so we do not need to
1665 * grab it again here to protect the path integrity
1666 */
8ceb9843
PS
1667 from_name = build_path_from_dentry(source_dentry);
1668 if (from_name == NULL) {
ee2fd967
SF
1669 rc = -ENOMEM;
1670 goto cifs_rename_exit;
1671 }
1672
8ceb9843
PS
1673 to_name = build_path_from_dentry(target_dentry);
1674 if (to_name == NULL) {
1da177e4
LT
1675 rc = -ENOMEM;
1676 goto cifs_rename_exit;
1677 }
1678
8ceb9843
PS
1679 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1680 to_name);
ee2fd967 1681
7c33d597
MS
1682 /*
1683 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1684 */
1685 if (flags & RENAME_NOREPLACE)
1686 goto cifs_rename_exit;
1687
14121bdc
JL
1688 if (rc == -EEXIST && tcon->unix_ext) {
1689 /*
8ceb9843
PS
1690 * Are src and dst hardlinks of same inode? We can only tell
1691 * with unix extensions enabled.
14121bdc
JL
1692 */
1693 info_buf_source =
1694 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1695 GFP_KERNEL);
1696 if (info_buf_source == NULL) {
1697 rc = -ENOMEM;
1698 goto cifs_rename_exit;
1699 }
1700
1701 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1702 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1703 info_buf_source,
1704 cifs_sb->local_nls,
2baa2682 1705 cifs_remap(cifs_sb));
8d281efb 1706 if (tmprc != 0)
14121bdc 1707 goto unlink_target;
ee2fd967 1708
8ceb9843
PS
1709 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1710 info_buf_target,
1711 cifs_sb->local_nls,
2baa2682 1712 cifs_remap(cifs_sb));
14121bdc 1713
8d281efb 1714 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1715 info_buf_target->UniqueId)) {
14121bdc 1716 /* same file, POSIX says that this is a noop */
ae6884a9 1717 rc = 0;
14121bdc 1718 goto cifs_rename_exit;
ae6884a9 1719 }
8ceb9843
PS
1720 }
1721 /*
1722 * else ... BB we could add the same check for Windows by
1723 * checking the UniqueId via FILE_INTERNAL_INFO
1724 */
14121bdc 1725
ee2fd967 1726unlink_target:
fc6f3943
JL
1727 /* Try unlinking the target dentry if it's not negative */
1728 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1729 if (d_is_dir(target_dentry))
1730 tmprc = cifs_rmdir(target_dir, target_dentry);
1731 else
1732 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1733 if (tmprc)
1734 goto cifs_rename_exit;
8ceb9843
PS
1735 rc = cifs_do_rename(xid, source_dentry, from_name,
1736 target_dentry, to_name);
1da177e4
LT
1737 }
1738
b46799a8
PS
1739 /* force revalidate to go get info when needed */
1740 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1741
1742 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
1743 target_dir->i_mtime = current_fs_time(source_dir->i_sb);
1744
1da177e4 1745cifs_rename_exit:
ee2fd967 1746 kfree(info_buf_source);
8ceb9843
PS
1747 kfree(from_name);
1748 kfree(to_name);
6d5786a3 1749 free_xid(xid);
7ffec372 1750 cifs_put_tlink(tlink);
1da177e4
LT
1751 return rc;
1752}
1753
df2cf170
JL
1754static bool
1755cifs_inode_needs_reval(struct inode *inode)
1da177e4 1756{
df2cf170 1757 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1758 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1759
18cceb6a 1760 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1761 return false;
1da177e4 1762
df2cf170
JL
1763 if (!lookupCacheEnabled)
1764 return true;
1da177e4 1765
df2cf170
JL
1766 if (cifs_i->time == 0)
1767 return true;
1da177e4 1768
a87c9ad9
JL
1769 if (!cifs_sb->actimeo)
1770 return true;
1771
6d20e840
SJ
1772 if (!time_in_range(jiffies, cifs_i->time,
1773 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1774 return true;
1775
db19272e 1776 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1777 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1778 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1779 return true;
1780
df2cf170
JL
1781 return false;
1782}
1783
523fb8c8
SJ
1784/*
1785 * Zap the cache. Called when invalid_mapping flag is set.
1786 */
6feb9891 1787int
df2cf170
JL
1788cifs_invalidate_mapping(struct inode *inode)
1789{
6feb9891 1790 int rc = 0;
df2cf170 1791
df2cf170 1792 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1793 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1794 if (rc)
f96637be
JP
1795 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1796 __func__, inode);
df2cf170 1797 }
257fb1f1 1798
9451a9a5 1799 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1800 return rc;
df2cf170
JL
1801}
1802
4f73c7d3
JL
1803/**
1804 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1805 * @word: long word containing the bit lock
1806 */
1807static int
c1221321 1808cifs_wait_bit_killable(struct wait_bit_key *key)
4f73c7d3
JL
1809{
1810 if (fatal_signal_pending(current))
1811 return -ERESTARTSYS;
1812 freezable_schedule_unsafe();
1813 return 0;
1814}
1815
e284e53f
JL
1816int
1817cifs_revalidate_mapping(struct inode *inode)
1818{
4f73c7d3
JL
1819 int rc;
1820 unsigned long *flags = &CIFS_I(inode)->flags;
1821
74316201
N
1822 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1823 TASK_KILLABLE);
4f73c7d3
JL
1824 if (rc)
1825 return rc;
1826
1827 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1828 rc = cifs_invalidate_mapping(inode);
1829 if (rc)
1830 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1831 }
1832
1833 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1834 smp_mb__after_atomic();
4f73c7d3
JL
1835 wake_up_bit(flags, CIFS_INO_LOCK);
1836
1837 return rc;
1838}
1839
1840int
1841cifs_zap_mapping(struct inode *inode)
1842{
1843 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1844 return cifs_revalidate_mapping(inode);
e284e53f
JL
1845}
1846
6feb9891 1847int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1848{
1849 int rc = 0;
496ad9aa 1850 struct inode *inode = file_inode(filp);
ba00ba64 1851 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1852
1853 if (!cifs_inode_needs_reval(inode))
6feb9891 1854 return rc;
abab095d 1855
13cfb733 1856 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1857 rc = cifs_get_file_info_unix(filp);
1858 else
1859 rc = cifs_get_file_info(filp);
1860
abab095d
JL
1861 return rc;
1862}
1863
6feb9891 1864int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1865{
6d5786a3 1866 unsigned int xid;
df2cf170 1867 int rc = 0;
df2cf170
JL
1868 struct inode *inode = dentry->d_inode;
1869 struct super_block *sb = dentry->d_sb;
6feb9891 1870 char *full_path = NULL;
df2cf170
JL
1871
1872 if (inode == NULL)
1873 return -ENOENT;
1da177e4 1874
df2cf170 1875 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1876 return rc;
1877
6d5786a3 1878 xid = get_xid();
1da177e4
LT
1879
1880 /* can not safely grab the rename sem here if rename calls revalidate
1881 since that would deadlock */
df2cf170 1882 full_path = build_path_from_dentry(dentry);
1da177e4 1883 if (full_path == NULL) {
0f3bc09e 1884 rc = -ENOMEM;
6feb9891 1885 goto out;
1da177e4
LT
1886 }
1887
f96637be
JP
1888 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1889 full_path, inode, inode->i_count.counter,
f19159dc 1890 dentry, dentry->d_time, jiffies);
1da177e4 1891
0d424ad0 1892 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1893 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1894 else
1895 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1896 xid, NULL);
1da177e4 1897
6feb9891 1898out:
1da177e4 1899 kfree(full_path);
6d5786a3 1900 free_xid(xid);
1da177e4
LT
1901 return rc;
1902}
1903
6feb9891
PS
1904int cifs_revalidate_file(struct file *filp)
1905{
1906 int rc;
496ad9aa 1907 struct inode *inode = file_inode(filp);
6feb9891
PS
1908
1909 rc = cifs_revalidate_file_attr(filp);
1910 if (rc)
1911 return rc;
1912
e284e53f 1913 return cifs_revalidate_mapping(inode);
6feb9891
PS
1914}
1915
1916/* revalidate a dentry's inode attributes */
1917int cifs_revalidate_dentry(struct dentry *dentry)
1918{
1919 int rc;
1920 struct inode *inode = dentry->d_inode;
1921
1922 rc = cifs_revalidate_dentry_attr(dentry);
1923 if (rc)
1924 return rc;
1925
e284e53f 1926 return cifs_revalidate_mapping(inode);
6feb9891
PS
1927}
1928
1da177e4 1929int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1930 struct kstat *stat)
1da177e4 1931{
3aa1c8c2 1932 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1933 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1934 struct inode *inode = dentry->d_inode;
1935 int rc;
3aa1c8c2 1936
6feb9891
PS
1937 /*
1938 * We need to be sure that all dirty pages are written and the server
1939 * has actual ctime, mtime and file length.
1940 */
18cceb6a 1941 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
1942 inode->i_mapping->nrpages != 0) {
1943 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1944 if (rc) {
1945 mapping_set_error(inode->i_mapping, rc);
1946 return rc;
1947 }
6feb9891 1948 }
1c456013 1949
6feb9891
PS
1950 rc = cifs_revalidate_dentry_attr(dentry);
1951 if (rc)
1952 return rc;
1953
1954 generic_fillattr(inode, stat);
1955 stat->blksize = CIFS_MAX_MSGSIZE;
1956 stat->ino = CIFS_I(inode)->uniqueid;
1957
1958 /*
d3d1fce1
JL
1959 * If on a multiuser mount without unix extensions or cifsacl being
1960 * enabled, and the admin hasn't overridden them, set the ownership
1961 * to the fsuid/fsgid of the current process.
6feb9891
PS
1962 */
1963 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1964 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1965 !tcon->unix_ext) {
1966 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1967 stat->uid = current_fsuid();
1968 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1969 stat->gid = current_fsgid();
5fe14c85 1970 }
6feb9891 1971 return rc;
1da177e4
LT
1972}
1973
1974static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1975{
1976 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1977 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1978 struct page *page;
1da177e4
LT
1979 int rc = 0;
1980
1981 page = grab_cache_page(mapping, index);
1982 if (!page)
1983 return -ENOMEM;
1984
eebd2aa3 1985 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1986 unlock_page(page);
1987 page_cache_release(page);
1988 return rc;
1989}
1990
1b947463 1991static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1992{
ba6a46a0 1993 spin_lock(&inode->i_lock);
3677db10 1994 i_size_write(inode, offset);
ba6a46a0 1995 spin_unlock(&inode->i_lock);
1b947463 1996
7caef267 1997 truncate_pagecache(inode, offset);
3677db10
SF
1998}
1999
8efdbde6
JL
2000static int
2001cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2002 unsigned int xid, char *full_path)
8efdbde6
JL
2003{
2004 int rc;
2005 struct cifsFileInfo *open_file;
2006 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2007 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2008 struct tcon_link *tlink = NULL;
d1433418
PS
2009 struct cifs_tcon *tcon = NULL;
2010 struct TCP_Server_Info *server;
fa2989f4 2011 struct cifs_io_parms io_parms;
8efdbde6
JL
2012
2013 /*
2014 * To avoid spurious oplock breaks from server, in the case of
2015 * inodes that we already have open, avoid doing path based
2016 * setting of file size if we can do it by handle.
2017 * This keeps our caching token (oplock) and avoids timeouts
2018 * when the local oplock break takes longer to flush
2019 * writebehind data than the SMB timeout for the SetPathInfo
2020 * request would allow
2021 */
6508d904 2022 open_file = find_writable_file(cifsInode, true);
8efdbde6 2023 if (open_file) {
d1433418
PS
2024 tcon = tlink_tcon(open_file->tlink);
2025 server = tcon->ses->server;
2026 if (server->ops->set_file_size)
2027 rc = server->ops->set_file_size(xid, tcon, open_file,
2028 attrs->ia_size, false);
2029 else
2030 rc = -ENOSYS;
6ab409b5 2031 cifsFileInfo_put(open_file);
f96637be 2032 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2033 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
2034 unsigned int bytes_written;
fa2989f4 2035
d1433418
PS
2036 io_parms.netfid = open_file->fid.netfid;
2037 io_parms.pid = open_file->pid;
2038 io_parms.tcon = tcon;
fa2989f4
PS
2039 io_parms.offset = 0;
2040 io_parms.length = attrs->ia_size;
2041 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
2042 NULL, NULL, 1);
f96637be 2043 cifs_dbg(FYI, "Wrt seteof rc %d\n", rc);
8efdbde6
JL
2044 }
2045 } else
2046 rc = -EINVAL;
2047
d1433418
PS
2048 if (!rc)
2049 goto set_size_out;
2050
2051 if (tcon == NULL) {
2052 tlink = cifs_sb_tlink(cifs_sb);
2053 if (IS_ERR(tlink))
2054 return PTR_ERR(tlink);
2055 tcon = tlink_tcon(tlink);
2056 server = tcon->ses->server;
2057 }
ba00ba64 2058
d1433418
PS
2059 /*
2060 * Set file size by pathname rather than by handle either because no
2061 * valid, writeable file handle for it was found or because there was
2062 * an error setting it by handle.
2063 */
2064 if (server->ops->set_path_size)
2065 rc = server->ops->set_path_size(xid, tcon, full_path,
2066 attrs->ia_size, cifs_sb, false);
2067 else
2068 rc = -ENOSYS;
f96637be 2069 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418
PS
2070 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
2071 __u16 netfid;
2072 int oplock = 0;
2073
2074 rc = SMBLegacyOpen(xid, tcon, full_path, FILE_OPEN,
2075 GENERIC_WRITE, CREATE_NOT_DIR, &netfid,
2076 &oplock, NULL, cifs_sb->local_nls,
2baa2682 2077 cifs_remap(cifs_sb));
d1433418
PS
2078 if (rc == 0) {
2079 unsigned int bytes_written;
2080
2081 io_parms.netfid = netfid;
2082 io_parms.pid = current->tgid;
2083 io_parms.tcon = tcon;
2084 io_parms.offset = 0;
2085 io_parms.length = attrs->ia_size;
2086 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written, NULL,
2087 NULL, 1);
f96637be 2088 cifs_dbg(FYI, "wrt seteof rc %d\n", rc);
d1433418 2089 CIFSSMBClose(xid, tcon, netfid);
8efdbde6
JL
2090 }
2091 }
d1433418
PS
2092 if (tlink)
2093 cifs_put_tlink(tlink);
8efdbde6 2094
d1433418 2095set_size_out:
8efdbde6 2096 if (rc == 0) {
fbec9ab9 2097 cifsInode->server_eof = attrs->ia_size;
1b947463 2098 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2099 cifs_truncate_page(inode->i_mapping, inode->i_size);
2100 }
2101
2102 return rc;
2103}
2104
3fe5c1dd
JL
2105static int
2106cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2107{
2108 int rc;
6d5786a3 2109 unsigned int xid;
3fe5c1dd
JL
2110 char *full_path = NULL;
2111 struct inode *inode = direntry->d_inode;
2112 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2113 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2114 struct tcon_link *tlink;
96daf2b0 2115 struct cifs_tcon *pTcon;
3fe5c1dd 2116 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2117 struct cifsFileInfo *open_file;
3fe5c1dd 2118
35c265e0
AV
2119 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2120 direntry, attrs->ia_valid);
3fe5c1dd 2121
6d5786a3 2122 xid = get_xid();
3fe5c1dd 2123
db78b877
CH
2124 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2125 attrs->ia_valid |= ATTR_FORCE;
2126
2127 rc = inode_change_ok(inode, attrs);
2128 if (rc < 0)
2129 goto out;
3fe5c1dd
JL
2130
2131 full_path = build_path_from_dentry(direntry);
2132 if (full_path == NULL) {
2133 rc = -ENOMEM;
2134 goto out;
2135 }
2136
0f4d634c
JL
2137 /*
2138 * Attempt to flush data before changing attributes. We need to do
2139 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2140 * ownership or mode then we may also need to do this. Here, we take
2141 * the safe way out and just do the flush on all setattr requests. If
2142 * the flush returns error, store it to report later and continue.
2143 *
2144 * BB: This should be smarter. Why bother flushing pages that
2145 * will be truncated anyway? Also, should we error out here if
2146 * the flush returns error?
2147 */
2148 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2149 mapping_set_error(inode->i_mapping, rc);
2150 rc = 0;
3fe5c1dd
JL
2151
2152 if (attrs->ia_valid & ATTR_SIZE) {
2153 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2154 if (rc != 0)
2155 goto out;
2156 }
2157
2158 /* skip mode change if it's just for clearing setuid/setgid */
2159 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2160 attrs->ia_valid &= ~ATTR_MODE;
2161
2162 args = kmalloc(sizeof(*args), GFP_KERNEL);
2163 if (args == NULL) {
2164 rc = -ENOMEM;
2165 goto out;
2166 }
2167
2168 /* set up the struct */
2169 if (attrs->ia_valid & ATTR_MODE)
2170 args->mode = attrs->ia_mode;
2171 else
2172 args->mode = NO_CHANGE_64;
2173
2174 if (attrs->ia_valid & ATTR_UID)
2175 args->uid = attrs->ia_uid;
2176 else
49418b2c 2177 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2178
2179 if (attrs->ia_valid & ATTR_GID)
2180 args->gid = attrs->ia_gid;
2181 else
49418b2c 2182 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2183
2184 if (attrs->ia_valid & ATTR_ATIME)
2185 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2186 else
2187 args->atime = NO_CHANGE_64;
2188
2189 if (attrs->ia_valid & ATTR_MTIME)
2190 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2191 else
2192 args->mtime = NO_CHANGE_64;
2193
2194 if (attrs->ia_valid & ATTR_CTIME)
2195 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2196 else
2197 args->ctime = NO_CHANGE_64;
2198
2199 args->device = 0;
6508d904 2200 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2201 if (open_file) {
4b4de76e 2202 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2203 u32 npid = open_file->pid;
13cfb733 2204 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2205 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2206 cifsFileInfo_put(open_file);
3bbeeb3c 2207 } else {
7ffec372
JL
2208 tlink = cifs_sb_tlink(cifs_sb);
2209 if (IS_ERR(tlink)) {
2210 rc = PTR_ERR(tlink);
2211 goto out;
2212 }
2213 pTcon = tlink_tcon(tlink);
3bbeeb3c 2214 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2215 cifs_sb->local_nls,
2216 cifs_sb->mnt_cifs_flags &
2217 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2218 cifs_put_tlink(tlink);
3bbeeb3c 2219 }
3fe5c1dd 2220
1025774c
CH
2221 if (rc)
2222 goto out;
ccd4bb1b 2223
1025774c 2224 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2225 attrs->ia_size != i_size_read(inode))
2226 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2227
2228 setattr_copy(inode, attrs);
2229 mark_inode_dirty(inode);
2230
2231 /* force revalidate when any of these times are set since some
2232 of the fs types (eg ext3, fat) do not have fine enough
2233 time granularity to match protocol, and we do not have a
2234 a way (yet) to query the server fs's time granularity (and
2235 whether it rounds times down).
2236 */
2237 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2238 cifsInode->time = 0;
3fe5c1dd
JL
2239out:
2240 kfree(args);
2241 kfree(full_path);
6d5786a3 2242 free_xid(xid);
3fe5c1dd
JL
2243 return rc;
2244}
2245
0510eeb7
JL
2246static int
2247cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2248{
6d5786a3 2249 unsigned int xid;
8abf2775
EB
2250 kuid_t uid = INVALID_UID;
2251 kgid_t gid = INVALID_GID;
3fe5c1dd
JL
2252 struct inode *inode = direntry->d_inode;
2253 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2254 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2255 char *full_path = NULL;
2256 int rc = -EACCES;
feb3e20c 2257 __u32 dosattr = 0;
4e1e7fb9 2258 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2259
6d5786a3 2260 xid = get_xid();
1da177e4 2261
35c265e0
AV
2262 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2263 direntry, attrs->ia_valid);
6473a559 2264
db78b877
CH
2265 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2266 attrs->ia_valid |= ATTR_FORCE;
2267
2268 rc = inode_change_ok(inode, attrs);
2269 if (rc < 0) {
6d5786a3 2270 free_xid(xid);
db78b877 2271 return rc;
6473a559 2272 }
50c2f753 2273
7f57356b 2274 full_path = build_path_from_dentry(direntry);
1da177e4 2275 if (full_path == NULL) {
0f3bc09e 2276 rc = -ENOMEM;
6d5786a3 2277 free_xid(xid);
0f3bc09e 2278 return rc;
1da177e4 2279 }
1da177e4 2280
0f4d634c
JL
2281 /*
2282 * Attempt to flush data before changing attributes. We need to do
2283 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2284 * ownership or mode then we may also need to do this. Here, we take
2285 * the safe way out and just do the flush on all setattr requests. If
2286 * the flush returns error, store it to report later and continue.
2287 *
2288 * BB: This should be smarter. Why bother flushing pages that
2289 * will be truncated anyway? Also, should we error out here if
2290 * the flush returns error?
2291 */
2292 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2293 mapping_set_error(inode->i_mapping, rc);
2294 rc = 0;
cea21805 2295
50531444 2296 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2297 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2298 if (rc != 0)
e30dcf3a 2299 goto cifs_setattr_exit;
1da177e4 2300 }
4ca691a8 2301
a5ff3769
SP
2302 if (attrs->ia_valid & ATTR_UID)
2303 uid = attrs->ia_uid;
2304
2305 if (attrs->ia_valid & ATTR_GID)
2306 gid = attrs->ia_gid;
2307
2308#ifdef CONFIG_CIFS_ACL
2309 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2310 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2311 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2312 uid, gid);
2313 if (rc) {
f96637be
JP
2314 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2315 __func__, rc);
a5ff3769
SP
2316 goto cifs_setattr_exit;
2317 }
2318 }
2319 } else
2320#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2321 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2322 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2323
d32c4f26
JL
2324 /* skip mode change if it's just for clearing setuid/setgid */
2325 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2326 attrs->ia_valid &= ~ATTR_MODE;
2327
1da177e4 2328 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2329 mode = attrs->ia_mode;
cdbce9c8 2330 rc = 0;
79df1bae 2331#ifdef CONFIG_CIFS_ACL
78415d2d 2332 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2333 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2334 INVALID_UID, INVALID_GID);
78415d2d 2335 if (rc) {
f96637be
JP
2336 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2337 __func__, rc);
78415d2d
SP
2338 goto cifs_setattr_exit;
2339 }
2340 } else
79df1bae 2341#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2342 if (((mode & S_IWUGO) == 0) &&
2343 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2344
2345 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2346
5132861a
JL
2347 /* fix up mode if we're not using dynperm */
2348 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2349 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2350 } else if ((mode & S_IWUGO) &&
2351 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2352
2353 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2354 /* Attributes of 0 are ignored */
2355 if (dosattr == 0)
2356 dosattr |= ATTR_NORMAL;
5132861a
JL
2357
2358 /* reset local inode permissions to normal */
2359 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2360 attrs->ia_mode &= ~(S_IALLUGO);
2361 if (S_ISDIR(inode->i_mode))
2362 attrs->ia_mode |=
2363 cifs_sb->mnt_dir_mode;
2364 else
2365 attrs->ia_mode |=
2366 cifs_sb->mnt_file_mode;
2367 }
2368 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2369 /* ignore mode change - ATTR_READONLY hasn't changed */
2370 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2371 }
1da177e4
LT
2372 }
2373
feb3e20c
JL
2374 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2375 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2376 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2377 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2378
e30dcf3a
SF
2379 /* Even if error on time set, no sense failing the call if
2380 the server would set the time to a reasonable value anyway,
2381 and this check ensures that we are not being called from
2382 sys_utimes in which case we ought to fail the call back to
2383 the user when the server rejects the call */
fb8c4b14 2384 if ((rc) && (attrs->ia_valid &
feb3e20c 2385 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2386 rc = 0;
1da177e4
LT
2387 }
2388
2389 /* do not need local check to inode_check_ok since the server does
2390 that */
1025774c
CH
2391 if (rc)
2392 goto cifs_setattr_exit;
2393
2394 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2395 attrs->ia_size != i_size_read(inode))
2396 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2397
2398 setattr_copy(inode, attrs);
2399 mark_inode_dirty(inode);
1025774c 2400
e30dcf3a 2401cifs_setattr_exit:
1da177e4 2402 kfree(full_path);
6d5786a3 2403 free_xid(xid);
1da177e4
LT
2404 return rc;
2405}
2406
0510eeb7
JL
2407int
2408cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2409{
2410 struct inode *inode = direntry->d_inode;
2411 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2412 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2413
2414 if (pTcon->unix_ext)
2415 return cifs_setattr_unix(direntry, attrs);
2416
2417 return cifs_setattr_nounix(direntry, attrs);
2418
2419 /* BB: add cifs_setattr_legacy for really old servers */
2420}
2421
99ee4dbd 2422#if 0
1da177e4
LT
2423void cifs_delete_inode(struct inode *inode)
2424{
f96637be 2425 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2426 /* may have to add back in if and when safe distributed caching of
2427 directories added e.g. via FindNotify */
2428}
99ee4dbd 2429#endif
This page took 0.676123 seconds and 5 git commands to generate.