cifs: new helper function: cifs_revalidate_mapping
[deliverable/linux.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f96637be
JP
94 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
95 __func__, cifs_i->uniqueid);
df2cf170
JL
96
97 if (inode->i_state & I_NEW) {
f96637be
JP
98 cifs_dbg(FYI, "%s: inode %llu is new\n",
99 __func__, cifs_i->uniqueid);
df2cf170
JL
100 return;
101 }
102
103 /* don't bother with revalidation if we have an oplock */
18cceb6a 104 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
105 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
106 __func__, cifs_i->uniqueid);
df2cf170
JL
107 return;
108 }
109
110 /* revalidate if mtime or size have changed */
111 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
112 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
113 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
114 __func__, cifs_i->uniqueid);
df2cf170
JL
115 return;
116 }
117
f96637be
JP
118 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
119 __func__, cifs_i->uniqueid);
aff8d5ca 120 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
121}
122
74d290da
JM
123/*
124 * copy nlink to the inode, unless it wasn't provided. Provide
125 * sane values if we don't have an existing one and none was provided
126 */
127static void
128cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
129{
130 /*
131 * if we're in a situation where we can't trust what we
132 * got from the server (readdir, some non-unix cases)
133 * fake reasonable values
134 */
135 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
136 /* only provide fake values on a new inode */
137 if (inode->i_state & I_NEW) {
138 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
139 set_nlink(inode, 2);
140 else
141 set_nlink(inode, 1);
142 }
143 return;
144 }
145
146 /* we trust the server, so update it */
147 set_nlink(inode, fattr->cf_nlink);
148}
149
cc0bad75
JL
150/* populate an inode with info from a cifs_fattr struct */
151void
152cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 153{
cc0bad75 154 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 155 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 156
df2cf170
JL
157 cifs_revalidate_cache(inode, fattr);
158
b7ca6928 159 spin_lock(&inode->i_lock);
cc0bad75
JL
160 inode->i_atime = fattr->cf_atime;
161 inode->i_mtime = fattr->cf_mtime;
162 inode->i_ctime = fattr->cf_ctime;
cc0bad75 163 inode->i_rdev = fattr->cf_rdev;
74d290da 164 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
165 inode->i_uid = fattr->cf_uid;
166 inode->i_gid = fattr->cf_gid;
167
0b8f18e3
JL
168 /* if dynperm is set, don't clobber existing mode */
169 if (inode->i_state & I_NEW ||
170 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
171 inode->i_mode = fattr->cf_mode;
172
cc0bad75 173 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 174
0b8f18e3
JL
175 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
176 cifs_i->time = 0;
177 else
178 cifs_i->time = jiffies;
179
aff8d5ca
JL
180 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
181 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
182 else
183 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 184
835a36ca 185 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
186 /*
187 * Can't safely change the file size here if the client is writing to
188 * it due to potential races.
189 */
cc0bad75
JL
190 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
191 i_size_write(inode, fattr->cf_eof);
192
193 /*
194 * i_blocks is not related to (i_size / i_blksize),
195 * but instead 512 byte (2**9) size is required for
196 * calculating num blocks.
197 */
198 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
199 }
200 spin_unlock(&inode->i_lock);
201
01c64fea
DH
202 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
203 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
204 if (inode->i_state & I_NEW)
205 cifs_set_ops(inode);
cc0bad75
JL
206}
207
4065c802
JL
208void
209cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
210{
211 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
212
213 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
214 return;
215
216 fattr->cf_uniqueid = iunique(sb, ROOT_I);
217}
218
cc0bad75
JL
219/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
220void
221cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
222 struct cifs_sb_info *cifs_sb)
223{
224 memset(fattr, 0, sizeof(*fattr));
225 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
226 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
227 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
228
229 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
230 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
231 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
232 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
233
234 /*
235 * Since we set the inode type below we need to mask off
236 * to avoid strange results if bits set above.
237 */
cc0bad75 238 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
239 switch (le32_to_cpu(info->Type)) {
240 case UNIX_FILE:
cc0bad75
JL
241 fattr->cf_mode |= S_IFREG;
242 fattr->cf_dtype = DT_REG;
75f12983
CH
243 break;
244 case UNIX_SYMLINK:
cc0bad75
JL
245 fattr->cf_mode |= S_IFLNK;
246 fattr->cf_dtype = DT_LNK;
75f12983
CH
247 break;
248 case UNIX_DIR:
cc0bad75
JL
249 fattr->cf_mode |= S_IFDIR;
250 fattr->cf_dtype = DT_DIR;
75f12983
CH
251 break;
252 case UNIX_CHARDEV:
cc0bad75
JL
253 fattr->cf_mode |= S_IFCHR;
254 fattr->cf_dtype = DT_CHR;
255 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
256 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
257 break;
258 case UNIX_BLOCKDEV:
cc0bad75
JL
259 fattr->cf_mode |= S_IFBLK;
260 fattr->cf_dtype = DT_BLK;
261 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
262 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
263 break;
264 case UNIX_FIFO:
cc0bad75
JL
265 fattr->cf_mode |= S_IFIFO;
266 fattr->cf_dtype = DT_FIFO;
75f12983
CH
267 break;
268 case UNIX_SOCKET:
cc0bad75
JL
269 fattr->cf_mode |= S_IFSOCK;
270 fattr->cf_dtype = DT_SOCK;
75f12983
CH
271 break;
272 default:
273 /* safest to call it a file if we do not know */
cc0bad75
JL
274 fattr->cf_mode |= S_IFREG;
275 fattr->cf_dtype = DT_REG;
f96637be 276 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
277 break;
278 }
279
46bbc25f
EB
280 fattr->cf_uid = cifs_sb->mnt_uid;
281 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
282 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
283 if (id < ((uid_t)-1)) {
284 kuid_t uid = make_kuid(&init_user_ns, id);
285 if (uid_valid(uid))
286 fattr->cf_uid = uid;
287 }
46bbc25f
EB
288 }
289
290 fattr->cf_gid = cifs_sb->mnt_gid;
291 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
292 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
293 if (id < ((gid_t)-1)) {
294 kgid_t gid = make_kgid(&init_user_ns, id);
295 if (gid_valid(gid))
296 fattr->cf_gid = gid;
297 }
46bbc25f 298 }
75f12983 299
cc0bad75 300 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
301}
302
b9a3260f 303/*
cc0bad75
JL
304 * Fill a cifs_fattr struct with fake inode info.
305 *
306 * Needed to setup cifs_fattr data for the directory which is the
307 * junction to the new submount (ie to setup the fake directory
308 * which represents a DFS referral).
b9a3260f 309 */
f1230c97 310static void
cc0bad75 311cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 312{
cc0bad75 313 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 314
f96637be 315 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
316
317 memset(fattr, 0, sizeof(*fattr));
318 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
319 fattr->cf_uid = cifs_sb->mnt_uid;
320 fattr->cf_gid = cifs_sb->mnt_gid;
321 fattr->cf_atime = CURRENT_TIME;
322 fattr->cf_ctime = CURRENT_TIME;
323 fattr->cf_mtime = CURRENT_TIME;
324 fattr->cf_nlink = 2;
325 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
326}
327
4ad65044
PS
328static int
329cifs_get_file_info_unix(struct file *filp)
abab095d
JL
330{
331 int rc;
6d5786a3 332 unsigned int xid;
abab095d
JL
333 FILE_UNIX_BASIC_INFO find_data;
334 struct cifs_fattr fattr;
496ad9aa 335 struct inode *inode = file_inode(filp);
abab095d 336 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 337 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 338 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 339
6d5786a3 340 xid = get_xid();
4b4de76e 341 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
342 if (!rc) {
343 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
344 } else if (rc == -EREMOTE) {
345 cifs_create_dfs_fattr(&fattr, inode->i_sb);
346 rc = 0;
347 }
348
349 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 350 free_xid(xid);
abab095d
JL
351 return rc;
352}
353
1da177e4 354int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 355 const unsigned char *full_path,
6d5786a3 356 struct super_block *sb, unsigned int xid)
1da177e4 357{
cc0bad75 358 int rc;
0e4bbde9 359 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 360 struct cifs_fattr fattr;
96daf2b0 361 struct cifs_tcon *tcon;
7ffec372 362 struct tcon_link *tlink;
1da177e4 363 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 364
f96637be 365 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 366
7ffec372
JL
367 tlink = cifs_sb_tlink(cifs_sb);
368 if (IS_ERR(tlink))
369 return PTR_ERR(tlink);
370 tcon = tlink_tcon(tlink);
371
1da177e4 372 /* could have done a find first instead but this returns more info */
cc0bad75 373 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
374 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
375 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 376 cifs_put_tlink(tlink);
e911d0cc 377
cc0bad75
JL
378 if (!rc) {
379 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
380 } else if (rc == -EREMOTE) {
381 cifs_create_dfs_fattr(&fattr, sb);
382 rc = 0;
383 } else {
384 return rc;
385 }
1da177e4 386
1b12b9c1
SM
387 /* check for Minshall+French symlinks */
388 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
389 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
390 full_path);
1b12b9c1 391 if (tmprc)
cb084b1a 392 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
393 }
394
0e4bbde9 395 if (*pinode == NULL) {
cc0bad75 396 /* get new inode */
4065c802 397 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
398 *pinode = cifs_iget(sb, &fattr);
399 if (!*pinode)
0e4bbde9 400 rc = -ENOMEM;
cc0bad75
JL
401 } else {
402 /* we already have inode, update it */
403 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 404 }
1da177e4 405
1da177e4
LT
406 return rc;
407}
408
0b8f18e3 409static int
0360d605 410cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 411 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
412{
413 int rc;
4b18f2a9 414 int oplock = 0;
7ffec372 415 struct tcon_link *tlink;
96daf2b0 416 struct cifs_tcon *tcon;
d81b8a40
PS
417 struct cifs_fid fid;
418 struct cifs_open_parms oparms;
d4ffff1f 419 struct cifs_io_parms io_parms;
86c96b4b 420 char buf[24];
d6e2f2a4 421 unsigned int bytes_read;
fb8c4b14 422 char *pbuf;
0360d605 423 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
424
425 pbuf = buf;
426
0b8f18e3
JL
427 fattr->cf_mode &= ~S_IFMT;
428
429 if (fattr->cf_eof == 0) {
430 fattr->cf_mode |= S_IFIFO;
431 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 432 return 0;
0b8f18e3
JL
433 } else if (fattr->cf_eof < 8) {
434 fattr->cf_mode |= S_IFREG;
435 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
436 return -EINVAL; /* EOPNOTSUPP? */
437 }
50c2f753 438
7ffec372
JL
439 tlink = cifs_sb_tlink(cifs_sb);
440 if (IS_ERR(tlink))
441 return PTR_ERR(tlink);
442 tcon = tlink_tcon(tlink);
443
d81b8a40
PS
444 oparms.tcon = tcon;
445 oparms.cifs_sb = cifs_sb;
446 oparms.desired_access = GENERIC_READ;
447 oparms.create_options = CREATE_NOT_DIR;
448 oparms.disposition = FILE_OPEN;
449 oparms.path = path;
450 oparms.fid = &fid;
451 oparms.reconnect = false;
452
453 rc = CIFS_open(xid, &oparms, &oplock, NULL);
0360d605
PS
454 if (rc) {
455 cifs_put_tlink(tlink);
456 return rc;
457 }
458
459 /* Read header */
d81b8a40 460 io_parms.netfid = fid.netfid;
0360d605
PS
461 io_parms.pid = current->tgid;
462 io_parms.tcon = tcon;
463 io_parms.offset = 0;
464 io_parms.length = 24;
465
466 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf, &buf_type);
467 if ((rc == 0) && (bytes_read >= 8)) {
468 if (memcmp("IntxBLK", pbuf, 8) == 0) {
469 cifs_dbg(FYI, "Block device\n");
470 fattr->cf_mode |= S_IFBLK;
471 fattr->cf_dtype = DT_BLK;
472 if (bytes_read == 24) {
473 /* we have enough to decode dev num */
474 __u64 mjr; /* major */
475 __u64 mnr; /* minor */
476 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
477 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
478 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 479 }
0360d605
PS
480 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
481 cifs_dbg(FYI, "Char device\n");
482 fattr->cf_mode |= S_IFCHR;
483 fattr->cf_dtype = DT_CHR;
484 if (bytes_read == 24) {
485 /* we have enough to decode dev num */
486 __u64 mjr; /* major */
487 __u64 mnr; /* minor */
488 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
489 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
490 fattr->cf_rdev = MKDEV(mjr, mnr);
491 }
492 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
493 cifs_dbg(FYI, "Symlink\n");
494 fattr->cf_mode |= S_IFLNK;
495 fattr->cf_dtype = DT_LNK;
3020a1f5 496 } else {
0360d605 497 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 498 fattr->cf_dtype = DT_REG;
0360d605 499 rc = -EOPNOTSUPP;
fb8c4b14 500 }
0360d605
PS
501 } else {
502 fattr->cf_mode |= S_IFREG; /* then it is a file */
503 fattr->cf_dtype = DT_REG;
504 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 505 }
d81b8a40 506 CIFSSMBClose(xid, tcon, fid.netfid);
7ffec372 507 cifs_put_tlink(tlink);
d6e2f2a4 508 return rc;
d6e2f2a4
SF
509}
510
9e294f1c
SF
511#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
512
0b8f18e3
JL
513/*
514 * Fetch mode bits as provided by SFU.
515 *
516 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
517 */
518static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 519 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 520{
3020a1f5 521#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
522 ssize_t rc;
523 char ea_value[4];
524 __u32 mode;
7ffec372 525 struct tcon_link *tlink;
96daf2b0 526 struct cifs_tcon *tcon;
7ffec372
JL
527
528 tlink = cifs_sb_tlink(cifs_sb);
529 if (IS_ERR(tlink))
530 return PTR_ERR(tlink);
531 tcon = tlink_tcon(tlink);
9e294f1c 532
d979f3b0
SF
533 if (tcon->ses->server->ops->query_all_EAs == NULL) {
534 cifs_put_tlink(tlink);
535 return -EOPNOTSUPP;
536 }
537
538 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
539 "SETFILEBITS", ea_value, 4 /* size of buf */,
540 cifs_sb->local_nls,
541 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 542 cifs_put_tlink(tlink);
4523cc30 543 if (rc < 0)
9e294f1c
SF
544 return (int)rc;
545 else if (rc > 3) {
546 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 547 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
548 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
549 mode, fattr->cf_mode);
0b8f18e3 550 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 551 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 552 }
0b8f18e3
JL
553
554 return 0;
3020a1f5
SF
555#else
556 return -EOPNOTSUPP;
557#endif
9e294f1c
SF
558}
559
0b8f18e3 560/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 561static void
0b8f18e3 562cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
eb85d94b
PS
563 struct cifs_sb_info *cifs_sb, bool adjust_tz,
564 bool symlink)
b9a3260f 565{
96daf2b0 566 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 567
0b8f18e3
JL
568 memset(fattr, 0, sizeof(*fattr));
569 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
570 if (info->DeletePending)
571 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
572
573 if (info->LastAccessTime)
574 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
575 else
576 fattr->cf_atime = CURRENT_TIME;
577
578 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
579 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
580
581 if (adjust_tz) {
0d424ad0
JL
582 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
583 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
584 }
585
586 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
587 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 588 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 589
74d290da 590 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
591
592 if (symlink) {
593 fattr->cf_mode = S_IFLNK;
594 fattr->cf_dtype = DT_LNK;
595 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
596 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
597 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
598 /*
599 * Server can return wrong NumberOfLinks value for directories
600 * when Unix extensions are disabled - fake it.
601 */
74d290da
JM
602 if (!tcon->unix_ext)
603 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
604 } else {
605 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
606 fattr->cf_dtype = DT_REG;
0b8f18e3 607
d0c280d2
JL
608 /* clear write bits if ATTR_READONLY is set */
609 if (fattr->cf_cifsattrs & ATTR_READONLY)
610 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 611
74d290da
JM
612 /*
613 * Don't accept zero nlink from non-unix servers unless
614 * delete is pending. Instead mark it as unknown.
615 */
616 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
617 !info->DeletePending) {
618 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 619 fattr->cf_nlink);
74d290da 620 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 621 }
6de2ce42 622 }
0b8f18e3
JL
623
624 fattr->cf_uid = cifs_sb->mnt_uid;
625 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
626}
627
4ad65044
PS
628static int
629cifs_get_file_info(struct file *filp)
abab095d
JL
630{
631 int rc;
6d5786a3 632 unsigned int xid;
abab095d
JL
633 FILE_ALL_INFO find_data;
634 struct cifs_fattr fattr;
496ad9aa 635 struct inode *inode = file_inode(filp);
abab095d 636 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 637 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 638 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
639 struct TCP_Server_Info *server = tcon->ses->server;
640
641 if (!server->ops->query_file_info)
642 return -ENOSYS;
abab095d 643
6d5786a3 644 xid = get_xid();
4ad65044 645 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
646 switch (rc) {
647 case 0:
eb85d94b
PS
648 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false,
649 false);
42274bb2
PS
650 break;
651 case -EREMOTE:
652 cifs_create_dfs_fattr(&fattr, inode->i_sb);
653 rc = 0;
654 break;
655 case -EOPNOTSUPP:
656 case -EINVAL:
abab095d
JL
657 /*
658 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
659 * for now, just skip revalidating and mark inode for
660 * immediate reval.
661 */
abab095d
JL
662 rc = 0;
663 CIFS_I(inode)->time = 0;
42274bb2 664 default:
abab095d 665 goto cgfi_exit;
42274bb2 666 }
abab095d
JL
667
668 /*
669 * don't bother with SFU junk here -- just mark inode as needing
670 * revalidation.
671 */
abab095d
JL
672 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
673 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
674 cifs_fattr_to_inode(inode, &fattr);
675cgfi_exit:
6d5786a3 676 free_xid(xid);
abab095d
JL
677 return rc;
678}
679
1208ef1f
PS
680int
681cifs_get_inode_info(struct inode **inode, const char *full_path,
682 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 683 const struct cifs_fid *fid)
1da177e4 684{
c052e2b4
SP
685 bool validinum = false;
686 __u16 srchflgs;
687 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
688 struct cifs_tcon *tcon;
689 struct TCP_Server_Info *server;
7ffec372 690 struct tcon_link *tlink;
1da177e4 691 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 692 char *buf = NULL;
1208ef1f 693 bool adjust_tz = false;
0b8f18e3 694 struct cifs_fattr fattr;
c052e2b4 695 struct cifs_search_info *srchinf = NULL;
eb85d94b 696 bool symlink = false;
1da177e4 697
7ffec372
JL
698 tlink = cifs_sb_tlink(cifs_sb);
699 if (IS_ERR(tlink))
700 return PTR_ERR(tlink);
1208ef1f
PS
701 tcon = tlink_tcon(tlink);
702 server = tcon->ses->server;
7ffec372 703
f96637be 704 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 705
1208ef1f 706 if ((data == NULL) && (*inode != NULL)) {
18cceb6a 707 if (CIFS_CACHE_READ(CIFS_I(*inode))) {
f96637be 708 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 709 goto cgii_exit;
1da177e4
LT
710 }
711 }
712
1208ef1f
PS
713 /* if inode info is not passed, get it from server */
714 if (data == NULL) {
715 if (!server->ops->query_path_info) {
716 rc = -ENOSYS;
717 goto cgii_exit;
718 }
1da177e4 719 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
720 if (buf == NULL) {
721 rc = -ENOMEM;
722 goto cgii_exit;
723 }
1208ef1f
PS
724 data = (FILE_ALL_INFO *)buf;
725 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 726 data, &adjust_tz, &symlink);
1da177e4 727 }
0b8f18e3
JL
728
729 if (!rc) {
eb85d94b
PS
730 cifs_all_info_to_fattr(&fattr, data, cifs_sb, adjust_tz,
731 symlink);
0b8f18e3
JL
732 } else if (rc == -EREMOTE) {
733 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 734 rc = 0;
c052e2b4
SP
735 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
736 srchinf = kzalloc(sizeof(struct cifs_search_info),
737 GFP_KERNEL);
738 if (srchinf == NULL) {
739 rc = -ENOMEM;
740 goto cgii_exit;
741 }
742
743 srchinf->endOfSearch = false;
744 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
745
746 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
747 CIFS_SEARCH_CLOSE_AT_END |
748 CIFS_SEARCH_BACKUP_SEARCH;
749
750 rc = CIFSFindFirst(xid, tcon, full_path,
751 cifs_sb, NULL, srchflgs, srchinf, false);
752 if (!rc) {
753 data =
754 (FILE_ALL_INFO *)srchinf->srch_entries_start;
755
756 cifs_dir_info_to_fattr(&fattr,
757 (FILE_DIRECTORY_INFO *)data, cifs_sb);
758 fattr.cf_uniqueid = le64_to_cpu(
759 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
760 validinum = true;
761
762 cifs_buf_release(srchinf->ntwrk_buf_start);
763 }
764 kfree(srchinf);
765 } else
7962670e 766 goto cgii_exit;
1da177e4 767
0b8f18e3
JL
768 /*
769 * If an inode wasn't passed in, then get the inode number
770 *
771 * Is an i_ino of zero legal? Can we use that to check if the server
772 * supports returning inode numbers? Are there other sanity checks we
773 * can use to ensure that the server is really filling in that field?
0b8f18e3 774 */
1208ef1f 775 if (*inode == NULL) {
b9a3260f 776 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
777 if (validinum == false) {
778 if (server->ops->get_srv_inum)
779 tmprc = server->ops->get_srv_inum(xid,
780 tcon, cifs_sb, full_path,
781 &fattr.cf_uniqueid, data);
782 if (tmprc) {
f96637be
JP
783 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
784 tmprc);
c052e2b4
SP
785 fattr.cf_uniqueid = iunique(sb, ROOT_I);
786 cifs_autodisable_serverino(cifs_sb);
787 }
132ac7b7 788 }
c052e2b4 789 } else
0b8f18e3 790 fattr.cf_uniqueid = iunique(sb, ROOT_I);
c052e2b4 791 } else
1208ef1f 792 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f 793
0b8f18e3
JL
794 /* query for SFU type info if supported and needed */
795 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
796 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
797 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
798 if (tmprc)
f96637be 799 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 800 }
1da177e4 801
79df1bae 802#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
803 /* fill in 0777 bits from ACL */
804 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 805 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 806 if (rc) {
f96637be
JP
807 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
808 __func__, rc);
78415d2d
SP
809 goto cgii_exit;
810 }
b9a3260f 811 }
79df1bae 812#endif /* CONFIG_CIFS_ACL */
b9a3260f 813
0b8f18e3
JL
814 /* fill in remaining high mode bits e.g. SUID, VTX */
815 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
816 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 817
1b12b9c1
SM
818 /* check for Minshall+French symlinks */
819 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
820 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
821 full_path);
1b12b9c1 822 if (tmprc)
cb084b1a 823 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
824 }
825
1208ef1f
PS
826 if (!*inode) {
827 *inode = cifs_iget(sb, &fattr);
828 if (!*inode)
0b8f18e3
JL
829 rc = -ENOMEM;
830 } else {
1208ef1f 831 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 832 }
b9a3260f 833
7962670e 834cgii_exit:
1da177e4 835 kfree(buf);
7ffec372 836 cifs_put_tlink(tlink);
1da177e4
LT
837 return rc;
838}
839
7f8ed420
SF
840static const struct inode_operations cifs_ipc_inode_ops = {
841 .lookup = cifs_lookup,
842};
843
cc0bad75
JL
844static int
845cifs_find_inode(struct inode *inode, void *opaque)
846{
847 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
848
f30b9c11 849 /* don't match inode with different uniqueid */
cc0bad75
JL
850 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
851 return 0;
852
20054bd6
JL
853 /* use createtime like an i_generation field */
854 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
855 return 0;
856
f30b9c11
JL
857 /* don't match inode of different type */
858 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
859 return 0;
860
5acfec25 861 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 862 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 863 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 864
cc0bad75
JL
865 return 1;
866}
867
868static int
869cifs_init_inode(struct inode *inode, void *opaque)
870{
871 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
872
873 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 874 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
875 return 0;
876}
877
5acfec25
JL
878/*
879 * walk dentry list for an inode and report whether it has aliases that
880 * are hashed. We use this to determine if a directory inode can actually
881 * be used.
882 */
883static bool
884inode_has_hashed_dentries(struct inode *inode)
885{
886 struct dentry *dentry;
887
873feea0 888 spin_lock(&inode->i_lock);
b67bfe0d 889 hlist_for_each_entry(dentry, &inode->i_dentry, d_alias) {
5acfec25 890 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 891 spin_unlock(&inode->i_lock);
5acfec25
JL
892 return true;
893 }
894 }
873feea0 895 spin_unlock(&inode->i_lock);
5acfec25
JL
896 return false;
897}
898
cc0bad75
JL
899/* Given fattrs, get a corresponding inode */
900struct inode *
901cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
902{
903 unsigned long hash;
904 struct inode *inode;
905
3d694380 906retry_iget5_locked:
f96637be 907 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
908
909 /* hash down to 32-bits on 32-bit arch */
910 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
911
912 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 913 if (inode) {
5acfec25 914 /* was there a potentially problematic inode collision? */
3d694380 915 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 916 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
917
918 if (inode_has_hashed_dentries(inode)) {
919 cifs_autodisable_serverino(CIFS_SB(sb));
920 iput(inode);
921 fattr->cf_uniqueid = iunique(sb, ROOT_I);
922 goto retry_iget5_locked;
923 }
3d694380
JL
924 }
925
cc0bad75
JL
926 cifs_fattr_to_inode(inode, fattr);
927 if (sb->s_flags & MS_NOATIME)
928 inode->i_flags |= S_NOATIME | S_NOCMTIME;
929 if (inode->i_state & I_NEW) {
930 inode->i_ino = hash;
522440ed
JL
931 if (S_ISREG(inode->i_mode))
932 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 933#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
934 /* initialize per-inode cache cookie pointer */
935 CIFS_I(inode)->fscache = NULL;
0ccd4802 936#endif
cc0bad75
JL
937 unlock_new_inode(inode);
938 }
939 }
940
941 return inode;
942}
943
1da177e4 944/* gets root inode */
9b6763e0 945struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 946{
6d5786a3 947 unsigned int xid;
0d424ad0 948 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 949 struct inode *inode = NULL;
ce634ab2 950 long rc;
96daf2b0 951 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 952
6d5786a3 953 xid = get_xid();
0d424ad0 954 if (tcon->unix_ext)
f87d39d9 955 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 956 else
f87d39d9 957 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 958
a7851ce7
OS
959 if (!inode) {
960 inode = ERR_PTR(rc);
961 goto out;
962 }
cc0bad75 963
0ccd4802 964#ifdef CONFIG_CIFS_FSCACHE
d03382ce 965 /* populate tcon->resource_id */
0d424ad0 966 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 967#endif
d03382ce 968
0d424ad0 969 if (rc && tcon->ipc) {
f96637be 970 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 971 spin_lock(&inode->i_lock);
7f8ed420 972 inode->i_mode |= S_IFDIR;
bfe86848 973 set_nlink(inode, 2);
7f8ed420
SF
974 inode->i_op = &cifs_ipc_inode_ops;
975 inode->i_fop = &simple_dir_operations;
976 inode->i_uid = cifs_sb->mnt_uid;
977 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 978 spin_unlock(&inode->i_lock);
ad661334 979 } else if (rc) {
ce634ab2 980 iget_failed(inode);
a7851ce7 981 inode = ERR_PTR(rc);
7f8ed420
SF
982 }
983
a7851ce7 984out:
6d5786a3 985 /* can not call macro free_xid here since in a void func
ce634ab2
DH
986 * TODO: This is no longer true
987 */
6d5786a3 988 _free_xid(xid);
ce634ab2 989 return inode;
1da177e4
LT
990}
991
ed6875e0 992int
6d5786a3 993cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 994 char *full_path, __u32 dosattr)
388e57b2 995{
388e57b2 996 bool set_time = false;
388e57b2 997 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 998 struct TCP_Server_Info *server;
388e57b2
SF
999 FILE_BASIC_INFO info_buf;
1000
1adcb710
SF
1001 if (attrs == NULL)
1002 return -EINVAL;
1003
6bdf6dbd
PS
1004 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1005 if (!server->ops->set_file_info)
1006 return -ENOSYS;
1007
388e57b2
SF
1008 if (attrs->ia_valid & ATTR_ATIME) {
1009 set_time = true;
1010 info_buf.LastAccessTime =
1011 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1012 } else
1013 info_buf.LastAccessTime = 0;
1014
1015 if (attrs->ia_valid & ATTR_MTIME) {
1016 set_time = true;
1017 info_buf.LastWriteTime =
1018 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1019 } else
1020 info_buf.LastWriteTime = 0;
1021
1022 /*
1023 * Samba throws this field away, but windows may actually use it.
1024 * Do not set ctime unless other time stamps are changed explicitly
1025 * (i.e. by utimes()) since we would then have a mix of client and
1026 * server times.
1027 */
1028 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1029 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1030 info_buf.ChangeTime =
1031 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1032 } else
1033 info_buf.ChangeTime = 0;
1034
1035 info_buf.CreationTime = 0; /* don't change */
1036 info_buf.Attributes = cpu_to_le32(dosattr);
1037
6bdf6dbd 1038 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1039}
1040
a12a1ac7 1041/*
ed6875e0 1042 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1043 * and rename it to a random name that hopefully won't conflict with
1044 * anything else.
1045 */
ed6875e0
PS
1046int
1047cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1048 const unsigned int xid)
a12a1ac7
JL
1049{
1050 int oplock = 0;
1051 int rc;
d81b8a40
PS
1052 struct cifs_fid fid;
1053 struct cifs_open_parms oparms;
3270958b 1054 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1055 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1056 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1057 struct tcon_link *tlink;
96daf2b0 1058 struct cifs_tcon *tcon;
3270958b
SF
1059 __u32 dosattr, origattr;
1060 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1061
7ffec372
JL
1062 tlink = cifs_sb_tlink(cifs_sb);
1063 if (IS_ERR(tlink))
1064 return PTR_ERR(tlink);
1065 tcon = tlink_tcon(tlink);
1066
c483a984
SP
1067 /*
1068 * We cannot rename the file if the server doesn't support
1069 * CAP_INFOLEVEL_PASSTHRU
1070 */
1071 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1072 rc = -EBUSY;
1073 goto out;
1074 }
1075
d81b8a40
PS
1076 oparms.tcon = tcon;
1077 oparms.cifs_sb = cifs_sb;
1078 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1079 oparms.create_options = CREATE_NOT_DIR;
1080 oparms.disposition = FILE_OPEN;
1081 oparms.path = full_path;
1082 oparms.fid = &fid;
1083 oparms.reconnect = false;
1084
1085 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1086 if (rc != 0)
1087 goto out;
1088
3270958b
SF
1089 origattr = cifsInode->cifsAttrs;
1090 if (origattr == 0)
1091 origattr |= ATTR_NORMAL;
1092
1093 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1094 if (dosattr == 0)
1095 dosattr |= ATTR_NORMAL;
1096 dosattr |= ATTR_HIDDEN;
1097
3270958b
SF
1098 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1099 if (dosattr != origattr) {
1100 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1101 if (info_buf == NULL) {
1102 rc = -ENOMEM;
1103 goto out_close;
1104 }
1105 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1106 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1107 current->tgid);
1108 /* although we would like to mark the file hidden
1109 if that fails we will still try to rename it */
72d282dc 1110 if (!rc)
3270958b
SF
1111 cifsInode->cifsAttrs = dosattr;
1112 else
1113 dosattr = origattr; /* since not able to change them */
a12a1ac7 1114 }
a12a1ac7 1115
dd1db2de 1116 /* rename the file */
d81b8a40
PS
1117 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1118 cifs_sb->local_nls,
a12a1ac7
JL
1119 cifs_sb->mnt_cifs_flags &
1120 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b 1121 if (rc != 0) {
47c78f4a 1122 rc = -EBUSY;
3270958b
SF
1123 goto undo_setattr;
1124 }
6d22f098 1125
3270958b 1126 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1127 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1128 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1129 current->tgid);
1130 /*
1131 * some samba versions return -ENOENT when we try to set the
1132 * file disposition here. Likely a samba bug, but work around
1133 * it for now. This means that some cifsXXX files may hang
1134 * around after they shouldn't.
1135 *
1136 * BB: remove this hack after more servers have the fix
1137 */
1138 if (rc == -ENOENT)
1139 rc = 0;
1140 else if (rc != 0) {
47c78f4a 1141 rc = -EBUSY;
3270958b
SF
1142 goto undo_rename;
1143 }
aff8d5ca 1144 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1145 }
7ce86d5a 1146
a12a1ac7 1147out_close:
d81b8a40 1148 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1149out:
3270958b 1150 kfree(info_buf);
7ffec372 1151 cifs_put_tlink(tlink);
a12a1ac7 1152 return rc;
3270958b
SF
1153
1154 /*
1155 * reset everything back to the original state. Don't bother
1156 * dealing with errors here since we can't do anything about
1157 * them anyway.
1158 */
1159undo_rename:
d81b8a40 1160 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
3270958b
SF
1161 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1162 CIFS_MOUNT_MAP_SPECIAL_CHR);
1163undo_setattr:
1164 if (dosattr != origattr) {
1165 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1166 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1167 current->tgid))
1168 cifsInode->cifsAttrs = origattr;
1169 }
1170
1171 goto out_close;
a12a1ac7
JL
1172}
1173
b7ca6928
SF
1174/* copied from fs/nfs/dir.c with small changes */
1175static void
1176cifs_drop_nlink(struct inode *inode)
1177{
1178 spin_lock(&inode->i_lock);
1179 if (inode->i_nlink > 0)
1180 drop_nlink(inode);
1181 spin_unlock(&inode->i_lock);
1182}
ff694527
SF
1183
1184/*
1185 * If dentry->d_inode is null (usually meaning the cached dentry
1186 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1187 * if that fails we can not attempt the fall back mechanisms on EACCESS
1188 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1189 * unlink on negative dentries currently.
1190 */
5f0319a7 1191int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1192{
1193 int rc = 0;
6d5786a3 1194 unsigned int xid;
1da177e4 1195 char *full_path = NULL;
5f0319a7 1196 struct inode *inode = dentry->d_inode;
ff694527 1197 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1198 struct super_block *sb = dir->i_sb;
1199 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1200 struct tcon_link *tlink;
96daf2b0 1201 struct cifs_tcon *tcon;
ed6875e0 1202 struct TCP_Server_Info *server;
6050247d
SF
1203 struct iattr *attrs = NULL;
1204 __u32 dosattr = 0, origattr = 0;
1da177e4 1205
f96637be 1206 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1207
7ffec372
JL
1208 tlink = cifs_sb_tlink(cifs_sb);
1209 if (IS_ERR(tlink))
1210 return PTR_ERR(tlink);
1211 tcon = tlink_tcon(tlink);
ed6875e0 1212 server = tcon->ses->server;
7ffec372 1213
6d5786a3 1214 xid = get_xid();
1da177e4 1215
5f0319a7
JL
1216 /* Unlink can be called from rename so we can not take the
1217 * sb->s_vfs_rename_mutex here */
1218 full_path = build_path_from_dentry(dentry);
1da177e4 1219 if (full_path == NULL) {
0f3bc09e 1220 rc = -ENOMEM;
7ffec372 1221 goto unlink_out;
1da177e4 1222 }
2d785a50 1223
29e20f9c
PS
1224 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1225 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1226 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1227 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1228 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
f96637be 1229 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1230 if ((rc == 0) || (rc == -ENOENT))
1231 goto psx_del_no_retry;
1232 }
1da177e4 1233
6050247d 1234retry_std_delete:
ed6875e0
PS
1235 if (!server->ops->unlink) {
1236 rc = -ENOSYS;
1237 goto psx_del_no_retry;
1238 }
1239
1240 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1241
2d785a50 1242psx_del_no_retry:
1da177e4 1243 if (!rc) {
5f0319a7 1244 if (inode)
b7ca6928 1245 cifs_drop_nlink(inode);
1da177e4 1246 } else if (rc == -ENOENT) {
5f0319a7 1247 d_drop(dentry);
47c78f4a 1248 } else if (rc == -EBUSY) {
ed6875e0
PS
1249 if (server->ops->rename_pending_delete) {
1250 rc = server->ops->rename_pending_delete(full_path,
1251 dentry, xid);
1252 if (rc == 0)
1253 cifs_drop_nlink(inode);
1254 }
ff694527 1255 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1256 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1257 if (attrs == NULL) {
1258 rc = -ENOMEM;
1259 goto out_reval;
1da177e4 1260 }
388e57b2
SF
1261
1262 /* try to reset dos attributes */
ff694527
SF
1263 cifs_inode = CIFS_I(inode);
1264 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1265 if (origattr == 0)
1266 origattr |= ATTR_NORMAL;
1267 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1268 if (dosattr == 0)
1269 dosattr |= ATTR_NORMAL;
1270 dosattr |= ATTR_HIDDEN;
1271
1272 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1273 if (rc != 0)
1274 goto out_reval;
6050247d
SF
1275
1276 goto retry_std_delete;
1da177e4 1277 }
6050247d
SF
1278
1279 /* undo the setattr if we errored out and it's needed */
1280 if (rc != 0 && dosattr != 0)
1281 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1282
388e57b2 1283out_reval:
4523cc30 1284 if (inode) {
ff694527
SF
1285 cifs_inode = CIFS_I(inode);
1286 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1287 when needed */
1288 inode->i_ctime = current_fs_time(sb);
06bcfedd 1289 }
5f0319a7 1290 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1291 cifs_inode = CIFS_I(dir);
6050247d 1292 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1293unlink_out:
1da177e4 1294 kfree(full_path);
6050247d 1295 kfree(attrs);
6d5786a3 1296 free_xid(xid);
7ffec372 1297 cifs_put_tlink(tlink);
1da177e4
LT
1298 return rc;
1299}
1300
ff691e96 1301static int
101b92d9 1302cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1303 const char *full_path, struct cifs_sb_info *cifs_sb,
1304 struct cifs_tcon *tcon, const unsigned int xid)
1305{
1306 int rc = 0;
101b92d9 1307 struct inode *inode = NULL;
ff691e96
PS
1308
1309 if (tcon->unix_ext)
101b92d9 1310 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1311 xid);
1312 else
101b92d9
JL
1313 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1314 xid, NULL);
1315
ff691e96
PS
1316 if (rc)
1317 return rc;
1318
ff691e96
PS
1319 /*
1320 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1321 * from the server or was set bogus. Also, since this is a brand new
1322 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1323 */
101b92d9
JL
1324 if (inode->i_nlink < 2)
1325 set_nlink(inode, 2);
ff691e96
PS
1326 mode &= ~current_umask();
1327 /* must turn on setgid bit if parent dir has it */
101b92d9 1328 if (parent->i_mode & S_ISGID)
ff691e96
PS
1329 mode |= S_ISGID;
1330
1331 if (tcon->unix_ext) {
1332 struct cifs_unix_set_info_args args = {
1333 .mode = mode,
1334 .ctime = NO_CHANGE_64,
1335 .atime = NO_CHANGE_64,
1336 .mtime = NO_CHANGE_64,
1337 .device = 0,
1338 };
1339 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1340 args.uid = current_fsuid();
101b92d9 1341 if (parent->i_mode & S_ISGID)
49418b2c 1342 args.gid = parent->i_gid;
ff691e96 1343 else
49418b2c 1344 args.gid = current_fsgid();
ff691e96 1345 } else {
49418b2c
EB
1346 args.uid = INVALID_UID; /* no change */
1347 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1348 }
1349 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1350 cifs_sb->local_nls,
1351 cifs_sb->mnt_cifs_flags &
1352 CIFS_MOUNT_MAP_SPECIAL_CHR);
1353 } else {
f436720e 1354 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1355 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1356 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1357 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1358 tcon, xid);
101b92d9
JL
1359 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1360 inode->i_mode = (mode | S_IFDIR);
1361
1362 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1363 inode->i_uid = current_fsuid();
1364 if (inode->i_mode & S_ISGID)
1365 inode->i_gid = parent->i_gid;
1366 else
1367 inode->i_gid = current_fsgid();
ff691e96
PS
1368 }
1369 }
101b92d9 1370 d_instantiate(dentry, inode);
ff691e96
PS
1371 return rc;
1372}
1373
1374static int
1375cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1376 const char *full_path, struct cifs_sb_info *cifs_sb,
1377 struct cifs_tcon *tcon, const unsigned int xid)
1378{
1379 int rc = 0;
1380 u32 oplock = 0;
1381 FILE_UNIX_BASIC_INFO *info = NULL;
1382 struct inode *newinode = NULL;
1383 struct cifs_fattr fattr;
1384
1385 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1386 if (info == NULL) {
1387 rc = -ENOMEM;
1388 goto posix_mkdir_out;
1389 }
1390
1391 mode &= ~current_umask();
1392 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1393 NULL /* netfid */, info, &oplock, full_path,
1394 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1395 CIFS_MOUNT_MAP_SPECIAL_CHR);
1396 if (rc == -EOPNOTSUPP)
1397 goto posix_mkdir_out;
1398 else if (rc) {
f96637be 1399 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1400 d_drop(dentry);
1401 goto posix_mkdir_out;
1402 }
1403
1404 if (info->Type == cpu_to_le32(-1))
1405 /* no return info, go query for it */
1406 goto posix_mkdir_get_info;
1407 /*
1408 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1409 * need to set uid/gid.
1410 */
1411
1412 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1413 cifs_fill_uniqueid(inode->i_sb, &fattr);
1414 newinode = cifs_iget(inode->i_sb, &fattr);
1415 if (!newinode)
1416 goto posix_mkdir_get_info;
1417
1418 d_instantiate(dentry, newinode);
1419
1420#ifdef CONFIG_CIFS_DEBUG2
f96637be
JP
1421 cifs_dbg(FYI, "instantiated dentry %p %s to inode %p\n",
1422 dentry, dentry->d_name.name, newinode);
ff691e96
PS
1423
1424 if (newinode->i_nlink != 2)
f96637be
JP
1425 cifs_dbg(FYI, "unexpected number of links %d\n",
1426 newinode->i_nlink);
ff691e96
PS
1427#endif
1428
1429posix_mkdir_out:
1430 kfree(info);
1431 return rc;
1432posix_mkdir_get_info:
1433 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1434 xid);
1435 goto posix_mkdir_out;
1436}
1437
18bb1db3 1438int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1439{
ff691e96 1440 int rc = 0;
6d5786a3 1441 unsigned int xid;
1da177e4 1442 struct cifs_sb_info *cifs_sb;
7ffec372 1443 struct tcon_link *tlink;
29e20f9c 1444 struct cifs_tcon *tcon;
f436720e 1445 struct TCP_Server_Info *server;
ff691e96 1446 char *full_path;
1da177e4 1447
f96637be
JP
1448 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1449 mode, inode);
1da177e4 1450
1da177e4 1451 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1452 tlink = cifs_sb_tlink(cifs_sb);
1453 if (IS_ERR(tlink))
1454 return PTR_ERR(tlink);
29e20f9c 1455 tcon = tlink_tcon(tlink);
7ffec372 1456
6d5786a3 1457 xid = get_xid();
1da177e4 1458
7f57356b 1459 full_path = build_path_from_dentry(direntry);
1da177e4 1460 if (full_path == NULL) {
0f3bc09e 1461 rc = -ENOMEM;
7ffec372 1462 goto mkdir_out;
1da177e4 1463 }
50c2f753 1464
29e20f9c
PS
1465 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1466 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1467 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1468 tcon, xid);
1469 if (rc != -EOPNOTSUPP)
2dd29d31 1470 goto mkdir_out;
fb8c4b14 1471 }
ff691e96 1472
f436720e
PS
1473 server = tcon->ses->server;
1474
1475 if (!server->ops->mkdir) {
1476 rc = -ENOSYS;
1477 goto mkdir_out;
1478 }
1479
1da177e4 1480 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1481 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1482 if (rc) {
f96637be 1483 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1484 d_drop(direntry);
ff691e96 1485 goto mkdir_out;
1da177e4 1486 }
ff691e96
PS
1487
1488 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1489 xid);
fb8c4b14 1490mkdir_out:
6de2ce42
PS
1491 /*
1492 * Force revalidate to get parent dir info when needed since cached
1493 * attributes are invalid now.
1494 */
1495 CIFS_I(inode)->time = 0;
1da177e4 1496 kfree(full_path);
6d5786a3 1497 free_xid(xid);
7ffec372 1498 cifs_put_tlink(tlink);
1da177e4
LT
1499 return rc;
1500}
1501
1502int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1503{
1504 int rc = 0;
6d5786a3 1505 unsigned int xid;
1da177e4 1506 struct cifs_sb_info *cifs_sb;
7ffec372 1507 struct tcon_link *tlink;
f958ca5d
PS
1508 struct cifs_tcon *tcon;
1509 struct TCP_Server_Info *server;
1da177e4
LT
1510 char *full_path = NULL;
1511 struct cifsInodeInfo *cifsInode;
1512
f96637be 1513 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1514
6d5786a3 1515 xid = get_xid();
1da177e4 1516
7f57356b 1517 full_path = build_path_from_dentry(direntry);
1da177e4 1518 if (full_path == NULL) {
0f3bc09e 1519 rc = -ENOMEM;
7ffec372 1520 goto rmdir_exit;
1da177e4
LT
1521 }
1522
7ffec372
JL
1523 cifs_sb = CIFS_SB(inode->i_sb);
1524 tlink = cifs_sb_tlink(cifs_sb);
1525 if (IS_ERR(tlink)) {
1526 rc = PTR_ERR(tlink);
1527 goto rmdir_exit;
1528 }
f958ca5d
PS
1529 tcon = tlink_tcon(tlink);
1530 server = tcon->ses->server;
1531
1532 if (!server->ops->rmdir) {
1533 rc = -ENOSYS;
1534 cifs_put_tlink(tlink);
1535 goto rmdir_exit;
1536 }
7ffec372 1537
f958ca5d 1538 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1539 cifs_put_tlink(tlink);
1da177e4
LT
1540
1541 if (!rc) {
3677db10 1542 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1543 i_size_write(direntry->d_inode, 0);
ce71ec36 1544 clear_nlink(direntry->d_inode);
3677db10 1545 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1546 }
1547
1548 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1549 /* force revalidate to go get info when needed */
1550 cifsInode->time = 0;
42c24544
SF
1551
1552 cifsInode = CIFS_I(inode);
6de2ce42
PS
1553 /*
1554 * Force revalidate to get parent dir info when needed since cached
1555 * attributes are invalid now.
1556 */
1557 cifsInode->time = 0;
42c24544 1558
1da177e4
LT
1559 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1560 current_fs_time(inode->i_sb);
1561
7ffec372 1562rmdir_exit:
1da177e4 1563 kfree(full_path);
6d5786a3 1564 free_xid(xid);
1da177e4
LT
1565 return rc;
1566}
1567
ee2fd967 1568static int
8ceb9843
PS
1569cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1570 const char *from_path, struct dentry *to_dentry,
1571 const char *to_path)
ee2fd967
SF
1572{
1573 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1574 struct tcon_link *tlink;
8ceb9843
PS
1575 struct cifs_tcon *tcon;
1576 struct TCP_Server_Info *server;
d81b8a40
PS
1577 struct cifs_fid fid;
1578 struct cifs_open_parms oparms;
ee2fd967
SF
1579 int oplock, rc;
1580
7ffec372
JL
1581 tlink = cifs_sb_tlink(cifs_sb);
1582 if (IS_ERR(tlink))
1583 return PTR_ERR(tlink);
8ceb9843
PS
1584 tcon = tlink_tcon(tlink);
1585 server = tcon->ses->server;
1586
1587 if (!server->ops->rename)
1588 return -ENOSYS;
7ffec372 1589
ee2fd967 1590 /* try path-based rename first */
8ceb9843 1591 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1592
1593 /*
8ceb9843
PS
1594 * Don't bother with rename by filehandle unless file is busy and
1595 * source. Note that cross directory moves do not work with
ee2fd967
SF
1596 * rename by filehandle to various Windows servers.
1597 */
47c78f4a 1598 if (rc == 0 || rc != -EBUSY)
7ffec372 1599 goto do_rename_exit;
ee2fd967 1600
ed0e3ace
JL
1601 /* open-file renames don't work across directories */
1602 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1603 goto do_rename_exit;
ed0e3ace 1604
d81b8a40
PS
1605 oparms.tcon = tcon;
1606 oparms.cifs_sb = cifs_sb;
ee2fd967 1607 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1608 oparms.desired_access = DELETE;
1609 oparms.create_options = CREATE_NOT_DIR;
1610 oparms.disposition = FILE_OPEN;
1611 oparms.path = from_path;
1612 oparms.fid = &fid;
1613 oparms.reconnect = false;
1614
1615 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1616 if (rc == 0) {
d81b8a40 1617 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967
SF
1618 (const char *) to_dentry->d_name.name,
1619 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1620 CIFS_MOUNT_MAP_SPECIAL_CHR);
d81b8a40 1621 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1622 }
7ffec372
JL
1623do_rename_exit:
1624 cifs_put_tlink(tlink);
ee2fd967
SF
1625 return rc;
1626}
1627
8ceb9843
PS
1628int
1629cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1630 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1631{
8ceb9843
PS
1632 char *from_name = NULL;
1633 char *to_name = NULL;
639e7a91 1634 struct cifs_sb_info *cifs_sb;
7ffec372 1635 struct tcon_link *tlink;
96daf2b0 1636 struct cifs_tcon *tcon;
ee2fd967
SF
1637 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1638 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1639 unsigned int xid;
1640 int rc, tmprc;
1da177e4 1641
639e7a91 1642 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1643 tlink = cifs_sb_tlink(cifs_sb);
1644 if (IS_ERR(tlink))
1645 return PTR_ERR(tlink);
1646 tcon = tlink_tcon(tlink);
1da177e4 1647
6d5786a3 1648 xid = get_xid();
ee2fd967 1649
ee2fd967
SF
1650 /*
1651 * we already have the rename sem so we do not need to
1652 * grab it again here to protect the path integrity
1653 */
8ceb9843
PS
1654 from_name = build_path_from_dentry(source_dentry);
1655 if (from_name == NULL) {
ee2fd967
SF
1656 rc = -ENOMEM;
1657 goto cifs_rename_exit;
1658 }
1659
8ceb9843
PS
1660 to_name = build_path_from_dentry(target_dentry);
1661 if (to_name == NULL) {
1da177e4
LT
1662 rc = -ENOMEM;
1663 goto cifs_rename_exit;
1664 }
1665
8ceb9843
PS
1666 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1667 to_name);
ee2fd967 1668
14121bdc
JL
1669 if (rc == -EEXIST && tcon->unix_ext) {
1670 /*
8ceb9843
PS
1671 * Are src and dst hardlinks of same inode? We can only tell
1672 * with unix extensions enabled.
14121bdc
JL
1673 */
1674 info_buf_source =
1675 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1676 GFP_KERNEL);
1677 if (info_buf_source == NULL) {
1678 rc = -ENOMEM;
1679 goto cifs_rename_exit;
1680 }
1681
1682 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1683 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1684 info_buf_source,
1685 cifs_sb->local_nls,
1686 cifs_sb->mnt_cifs_flags &
1687 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1688 if (tmprc != 0)
14121bdc 1689 goto unlink_target;
ee2fd967 1690
8ceb9843
PS
1691 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1692 info_buf_target,
1693 cifs_sb->local_nls,
1694 cifs_sb->mnt_cifs_flags &
1695 CIFS_MOUNT_MAP_SPECIAL_CHR);
14121bdc 1696
8d281efb 1697 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1698 info_buf_target->UniqueId)) {
14121bdc 1699 /* same file, POSIX says that this is a noop */
ae6884a9 1700 rc = 0;
14121bdc 1701 goto cifs_rename_exit;
ae6884a9 1702 }
8ceb9843
PS
1703 }
1704 /*
1705 * else ... BB we could add the same check for Windows by
1706 * checking the UniqueId via FILE_INTERNAL_INFO
1707 */
14121bdc 1708
ee2fd967 1709unlink_target:
fc6f3943
JL
1710 /* Try unlinking the target dentry if it's not negative */
1711 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1712 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1713 if (tmprc)
1714 goto cifs_rename_exit;
8ceb9843
PS
1715 rc = cifs_do_rename(xid, source_dentry, from_name,
1716 target_dentry, to_name);
1da177e4
LT
1717 }
1718
1719cifs_rename_exit:
ee2fd967 1720 kfree(info_buf_source);
8ceb9843
PS
1721 kfree(from_name);
1722 kfree(to_name);
6d5786a3 1723 free_xid(xid);
7ffec372 1724 cifs_put_tlink(tlink);
1da177e4
LT
1725 return rc;
1726}
1727
df2cf170
JL
1728static bool
1729cifs_inode_needs_reval(struct inode *inode)
1da177e4 1730{
df2cf170 1731 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1732 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1733
18cceb6a 1734 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1735 return false;
1da177e4 1736
df2cf170
JL
1737 if (!lookupCacheEnabled)
1738 return true;
1da177e4 1739
df2cf170
JL
1740 if (cifs_i->time == 0)
1741 return true;
1da177e4 1742
a87c9ad9
JL
1743 if (!cifs_sb->actimeo)
1744 return true;
1745
6d20e840
SJ
1746 if (!time_in_range(jiffies, cifs_i->time,
1747 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1748 return true;
1749
db19272e 1750 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1751 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1752 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1753 return true;
1754
df2cf170
JL
1755 return false;
1756}
1757
523fb8c8
SJ
1758/*
1759 * Zap the cache. Called when invalid_mapping flag is set.
1760 */
6feb9891 1761int
df2cf170
JL
1762cifs_invalidate_mapping(struct inode *inode)
1763{
6feb9891 1764 int rc = 0;
df2cf170
JL
1765 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1766
aff8d5ca 1767 clear_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170 1768
df2cf170 1769 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1770 rc = invalidate_inode_pages2(inode->i_mapping);
1771 if (rc) {
f96637be
JP
1772 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1773 __func__, inode);
aff8d5ca 1774 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
257fb1f1 1775 }
df2cf170 1776 }
257fb1f1 1777
9451a9a5 1778 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1779 return rc;
df2cf170
JL
1780}
1781
e284e53f
JL
1782int
1783cifs_revalidate_mapping(struct inode *inode)
1784{
1785 if (test_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags))
1786 return cifs_invalidate_mapping(inode);
1787 return 0;
1788}
1789
6feb9891 1790int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1791{
1792 int rc = 0;
496ad9aa 1793 struct inode *inode = file_inode(filp);
ba00ba64 1794 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1795
1796 if (!cifs_inode_needs_reval(inode))
6feb9891 1797 return rc;
abab095d 1798
13cfb733 1799 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1800 rc = cifs_get_file_info_unix(filp);
1801 else
1802 rc = cifs_get_file_info(filp);
1803
abab095d
JL
1804 return rc;
1805}
1806
6feb9891 1807int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1808{
6d5786a3 1809 unsigned int xid;
df2cf170 1810 int rc = 0;
df2cf170
JL
1811 struct inode *inode = dentry->d_inode;
1812 struct super_block *sb = dentry->d_sb;
6feb9891 1813 char *full_path = NULL;
df2cf170
JL
1814
1815 if (inode == NULL)
1816 return -ENOENT;
1da177e4 1817
df2cf170 1818 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1819 return rc;
1820
6d5786a3 1821 xid = get_xid();
1da177e4
LT
1822
1823 /* can not safely grab the rename sem here if rename calls revalidate
1824 since that would deadlock */
df2cf170 1825 full_path = build_path_from_dentry(dentry);
1da177e4 1826 if (full_path == NULL) {
0f3bc09e 1827 rc = -ENOMEM;
6feb9891 1828 goto out;
1da177e4
LT
1829 }
1830
f96637be
JP
1831 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1832 full_path, inode, inode->i_count.counter,
f19159dc 1833 dentry, dentry->d_time, jiffies);
1da177e4 1834
0d424ad0 1835 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1836 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1837 else
1838 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1839 xid, NULL);
1da177e4 1840
6feb9891 1841out:
1da177e4 1842 kfree(full_path);
6d5786a3 1843 free_xid(xid);
1da177e4
LT
1844 return rc;
1845}
1846
6feb9891
PS
1847int cifs_revalidate_file(struct file *filp)
1848{
1849 int rc;
496ad9aa 1850 struct inode *inode = file_inode(filp);
6feb9891
PS
1851
1852 rc = cifs_revalidate_file_attr(filp);
1853 if (rc)
1854 return rc;
1855
e284e53f 1856 return cifs_revalidate_mapping(inode);
6feb9891
PS
1857}
1858
1859/* revalidate a dentry's inode attributes */
1860int cifs_revalidate_dentry(struct dentry *dentry)
1861{
1862 int rc;
1863 struct inode *inode = dentry->d_inode;
1864
1865 rc = cifs_revalidate_dentry_attr(dentry);
1866 if (rc)
1867 return rc;
1868
e284e53f 1869 return cifs_revalidate_mapping(inode);
6feb9891
PS
1870}
1871
1da177e4 1872int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1873 struct kstat *stat)
1da177e4 1874{
3aa1c8c2 1875 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1876 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1877 struct inode *inode = dentry->d_inode;
1878 int rc;
3aa1c8c2 1879
6feb9891
PS
1880 /*
1881 * We need to be sure that all dirty pages are written and the server
1882 * has actual ctime, mtime and file length.
1883 */
18cceb6a 1884 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
1885 inode->i_mapping->nrpages != 0) {
1886 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1887 if (rc) {
1888 mapping_set_error(inode->i_mapping, rc);
1889 return rc;
1890 }
6feb9891 1891 }
1c456013 1892
6feb9891
PS
1893 rc = cifs_revalidate_dentry_attr(dentry);
1894 if (rc)
1895 return rc;
1896
1897 generic_fillattr(inode, stat);
1898 stat->blksize = CIFS_MAX_MSGSIZE;
1899 stat->ino = CIFS_I(inode)->uniqueid;
1900
1901 /*
d3d1fce1
JL
1902 * If on a multiuser mount without unix extensions or cifsacl being
1903 * enabled, and the admin hasn't overridden them, set the ownership
1904 * to the fsuid/fsgid of the current process.
6feb9891
PS
1905 */
1906 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 1907 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
1908 !tcon->unix_ext) {
1909 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1910 stat->uid = current_fsuid();
1911 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1912 stat->gid = current_fsgid();
5fe14c85 1913 }
6feb9891 1914 return rc;
1da177e4
LT
1915}
1916
1917static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1918{
1919 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1920 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1921 struct page *page;
1da177e4
LT
1922 int rc = 0;
1923
1924 page = grab_cache_page(mapping, index);
1925 if (!page)
1926 return -ENOMEM;
1927
eebd2aa3 1928 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1929 unlock_page(page);
1930 page_cache_release(page);
1931 return rc;
1932}
1933
1b947463 1934static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1935{
ba6a46a0 1936 spin_lock(&inode->i_lock);
3677db10 1937 i_size_write(inode, offset);
ba6a46a0 1938 spin_unlock(&inode->i_lock);
1b947463 1939
7caef267 1940 truncate_pagecache(inode, offset);
3677db10
SF
1941}
1942
8efdbde6
JL
1943static int
1944cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1945 unsigned int xid, char *full_path)
8efdbde6
JL
1946{
1947 int rc;
1948 struct cifsFileInfo *open_file;
1949 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1950 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1951 struct tcon_link *tlink = NULL;
d1433418
PS
1952 struct cifs_tcon *tcon = NULL;
1953 struct TCP_Server_Info *server;
fa2989f4 1954 struct cifs_io_parms io_parms;
8efdbde6
JL
1955
1956 /*
1957 * To avoid spurious oplock breaks from server, in the case of
1958 * inodes that we already have open, avoid doing path based
1959 * setting of file size if we can do it by handle.
1960 * This keeps our caching token (oplock) and avoids timeouts
1961 * when the local oplock break takes longer to flush
1962 * writebehind data than the SMB timeout for the SetPathInfo
1963 * request would allow
1964 */
6508d904 1965 open_file = find_writable_file(cifsInode, true);
8efdbde6 1966 if (open_file) {
d1433418
PS
1967 tcon = tlink_tcon(open_file->tlink);
1968 server = tcon->ses->server;
1969 if (server->ops->set_file_size)
1970 rc = server->ops->set_file_size(xid, tcon, open_file,
1971 attrs->ia_size, false);
1972 else
1973 rc = -ENOSYS;
6ab409b5 1974 cifsFileInfo_put(open_file);
f96637be 1975 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
1976 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1977 unsigned int bytes_written;
fa2989f4 1978
d1433418
PS
1979 io_parms.netfid = open_file->fid.netfid;
1980 io_parms.pid = open_file->pid;
1981 io_parms.tcon = tcon;
fa2989f4
PS
1982 io_parms.offset = 0;
1983 io_parms.length = attrs->ia_size;
1984 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1985 NULL, NULL, 1);
f96637be 1986 cifs_dbg(FYI, "Wrt seteof rc %d\n", rc);
8efdbde6
JL
1987 }
1988 } else
1989 rc = -EINVAL;
1990
d1433418
PS
1991 if (!rc)
1992 goto set_size_out;
1993
1994 if (tcon == NULL) {
1995 tlink = cifs_sb_tlink(cifs_sb);
1996 if (IS_ERR(tlink))
1997 return PTR_ERR(tlink);
1998 tcon = tlink_tcon(tlink);
1999 server = tcon->ses->server;
2000 }
ba00ba64 2001
d1433418
PS
2002 /*
2003 * Set file size by pathname rather than by handle either because no
2004 * valid, writeable file handle for it was found or because there was
2005 * an error setting it by handle.
2006 */
2007 if (server->ops->set_path_size)
2008 rc = server->ops->set_path_size(xid, tcon, full_path,
2009 attrs->ia_size, cifs_sb, false);
2010 else
2011 rc = -ENOSYS;
f96637be 2012 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418
PS
2013 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
2014 __u16 netfid;
2015 int oplock = 0;
2016
2017 rc = SMBLegacyOpen(xid, tcon, full_path, FILE_OPEN,
2018 GENERIC_WRITE, CREATE_NOT_DIR, &netfid,
2019 &oplock, NULL, cifs_sb->local_nls,
8efdbde6 2020 cifs_sb->mnt_cifs_flags &
d1433418
PS
2021 CIFS_MOUNT_MAP_SPECIAL_CHR);
2022 if (rc == 0) {
2023 unsigned int bytes_written;
2024
2025 io_parms.netfid = netfid;
2026 io_parms.pid = current->tgid;
2027 io_parms.tcon = tcon;
2028 io_parms.offset = 0;
2029 io_parms.length = attrs->ia_size;
2030 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written, NULL,
2031 NULL, 1);
f96637be 2032 cifs_dbg(FYI, "wrt seteof rc %d\n", rc);
d1433418 2033 CIFSSMBClose(xid, tcon, netfid);
8efdbde6
JL
2034 }
2035 }
d1433418
PS
2036 if (tlink)
2037 cifs_put_tlink(tlink);
8efdbde6 2038
d1433418 2039set_size_out:
8efdbde6 2040 if (rc == 0) {
fbec9ab9 2041 cifsInode->server_eof = attrs->ia_size;
1b947463 2042 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2043 cifs_truncate_page(inode->i_mapping, inode->i_size);
2044 }
2045
2046 return rc;
2047}
2048
3fe5c1dd
JL
2049static int
2050cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2051{
2052 int rc;
6d5786a3 2053 unsigned int xid;
3fe5c1dd
JL
2054 char *full_path = NULL;
2055 struct inode *inode = direntry->d_inode;
2056 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2057 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2058 struct tcon_link *tlink;
96daf2b0 2059 struct cifs_tcon *pTcon;
3fe5c1dd 2060 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2061 struct cifsFileInfo *open_file;
3fe5c1dd 2062
f96637be 2063 cifs_dbg(FYI, "setattr_unix on file %s attrs->ia_valid=0x%x\n",
b6b38f70 2064 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 2065
6d5786a3 2066 xid = get_xid();
3fe5c1dd 2067
db78b877
CH
2068 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2069 attrs->ia_valid |= ATTR_FORCE;
2070
2071 rc = inode_change_ok(inode, attrs);
2072 if (rc < 0)
2073 goto out;
3fe5c1dd
JL
2074
2075 full_path = build_path_from_dentry(direntry);
2076 if (full_path == NULL) {
2077 rc = -ENOMEM;
2078 goto out;
2079 }
2080
0f4d634c
JL
2081 /*
2082 * Attempt to flush data before changing attributes. We need to do
2083 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2084 * ownership or mode then we may also need to do this. Here, we take
2085 * the safe way out and just do the flush on all setattr requests. If
2086 * the flush returns error, store it to report later and continue.
2087 *
2088 * BB: This should be smarter. Why bother flushing pages that
2089 * will be truncated anyway? Also, should we error out here if
2090 * the flush returns error?
2091 */
2092 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2093 mapping_set_error(inode->i_mapping, rc);
2094 rc = 0;
3fe5c1dd
JL
2095
2096 if (attrs->ia_valid & ATTR_SIZE) {
2097 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2098 if (rc != 0)
2099 goto out;
2100 }
2101
2102 /* skip mode change if it's just for clearing setuid/setgid */
2103 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2104 attrs->ia_valid &= ~ATTR_MODE;
2105
2106 args = kmalloc(sizeof(*args), GFP_KERNEL);
2107 if (args == NULL) {
2108 rc = -ENOMEM;
2109 goto out;
2110 }
2111
2112 /* set up the struct */
2113 if (attrs->ia_valid & ATTR_MODE)
2114 args->mode = attrs->ia_mode;
2115 else
2116 args->mode = NO_CHANGE_64;
2117
2118 if (attrs->ia_valid & ATTR_UID)
2119 args->uid = attrs->ia_uid;
2120 else
49418b2c 2121 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2122
2123 if (attrs->ia_valid & ATTR_GID)
2124 args->gid = attrs->ia_gid;
2125 else
49418b2c 2126 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2127
2128 if (attrs->ia_valid & ATTR_ATIME)
2129 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2130 else
2131 args->atime = NO_CHANGE_64;
2132
2133 if (attrs->ia_valid & ATTR_MTIME)
2134 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2135 else
2136 args->mtime = NO_CHANGE_64;
2137
2138 if (attrs->ia_valid & ATTR_CTIME)
2139 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2140 else
2141 args->ctime = NO_CHANGE_64;
2142
2143 args->device = 0;
6508d904 2144 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2145 if (open_file) {
4b4de76e 2146 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2147 u32 npid = open_file->pid;
13cfb733 2148 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2149 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2150 cifsFileInfo_put(open_file);
3bbeeb3c 2151 } else {
7ffec372
JL
2152 tlink = cifs_sb_tlink(cifs_sb);
2153 if (IS_ERR(tlink)) {
2154 rc = PTR_ERR(tlink);
2155 goto out;
2156 }
2157 pTcon = tlink_tcon(tlink);
3bbeeb3c 2158 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2159 cifs_sb->local_nls,
2160 cifs_sb->mnt_cifs_flags &
2161 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2162 cifs_put_tlink(tlink);
3bbeeb3c 2163 }
3fe5c1dd 2164
1025774c
CH
2165 if (rc)
2166 goto out;
ccd4bb1b 2167
1025774c 2168 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2169 attrs->ia_size != i_size_read(inode))
2170 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2171
2172 setattr_copy(inode, attrs);
2173 mark_inode_dirty(inode);
2174
2175 /* force revalidate when any of these times are set since some
2176 of the fs types (eg ext3, fat) do not have fine enough
2177 time granularity to match protocol, and we do not have a
2178 a way (yet) to query the server fs's time granularity (and
2179 whether it rounds times down).
2180 */
2181 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2182 cifsInode->time = 0;
3fe5c1dd
JL
2183out:
2184 kfree(args);
2185 kfree(full_path);
6d5786a3 2186 free_xid(xid);
3fe5c1dd
JL
2187 return rc;
2188}
2189
0510eeb7
JL
2190static int
2191cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2192{
6d5786a3 2193 unsigned int xid;
8abf2775
EB
2194 kuid_t uid = INVALID_UID;
2195 kgid_t gid = INVALID_GID;
3fe5c1dd
JL
2196 struct inode *inode = direntry->d_inode;
2197 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2198 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2199 char *full_path = NULL;
2200 int rc = -EACCES;
feb3e20c 2201 __u32 dosattr = 0;
4e1e7fb9 2202 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2203
6d5786a3 2204 xid = get_xid();
1da177e4 2205
f96637be 2206 cifs_dbg(FYI, "setattr on file %s attrs->iavalid 0x%x\n",
b6b38f70 2207 direntry->d_name.name, attrs->ia_valid);
6473a559 2208
db78b877
CH
2209 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2210 attrs->ia_valid |= ATTR_FORCE;
2211
2212 rc = inode_change_ok(inode, attrs);
2213 if (rc < 0) {
6d5786a3 2214 free_xid(xid);
db78b877 2215 return rc;
6473a559 2216 }
50c2f753 2217
7f57356b 2218 full_path = build_path_from_dentry(direntry);
1da177e4 2219 if (full_path == NULL) {
0f3bc09e 2220 rc = -ENOMEM;
6d5786a3 2221 free_xid(xid);
0f3bc09e 2222 return rc;
1da177e4 2223 }
1da177e4 2224
0f4d634c
JL
2225 /*
2226 * Attempt to flush data before changing attributes. We need to do
2227 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2228 * ownership or mode then we may also need to do this. Here, we take
2229 * the safe way out and just do the flush on all setattr requests. If
2230 * the flush returns error, store it to report later and continue.
2231 *
2232 * BB: This should be smarter. Why bother flushing pages that
2233 * will be truncated anyway? Also, should we error out here if
2234 * the flush returns error?
2235 */
2236 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2237 mapping_set_error(inode->i_mapping, rc);
2238 rc = 0;
cea21805 2239
50531444 2240 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2241 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2242 if (rc != 0)
e30dcf3a 2243 goto cifs_setattr_exit;
1da177e4 2244 }
4ca691a8 2245
a5ff3769
SP
2246 if (attrs->ia_valid & ATTR_UID)
2247 uid = attrs->ia_uid;
2248
2249 if (attrs->ia_valid & ATTR_GID)
2250 gid = attrs->ia_gid;
2251
2252#ifdef CONFIG_CIFS_ACL
2253 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2254 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2255 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2256 uid, gid);
2257 if (rc) {
f96637be
JP
2258 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2259 __func__, rc);
a5ff3769
SP
2260 goto cifs_setattr_exit;
2261 }
2262 }
2263 } else
2264#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2265 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2266 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2267
d32c4f26
JL
2268 /* skip mode change if it's just for clearing setuid/setgid */
2269 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2270 attrs->ia_valid &= ~ATTR_MODE;
2271
1da177e4 2272 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2273 mode = attrs->ia_mode;
cdbce9c8 2274 rc = 0;
79df1bae 2275#ifdef CONFIG_CIFS_ACL
78415d2d 2276 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2277 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2278 INVALID_UID, INVALID_GID);
78415d2d 2279 if (rc) {
f96637be
JP
2280 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2281 __func__, rc);
78415d2d
SP
2282 goto cifs_setattr_exit;
2283 }
2284 } else
79df1bae 2285#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2286 if (((mode & S_IWUGO) == 0) &&
2287 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2288
2289 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2290
5132861a
JL
2291 /* fix up mode if we're not using dynperm */
2292 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2293 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2294 } else if ((mode & S_IWUGO) &&
2295 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2296
2297 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2298 /* Attributes of 0 are ignored */
2299 if (dosattr == 0)
2300 dosattr |= ATTR_NORMAL;
5132861a
JL
2301
2302 /* reset local inode permissions to normal */
2303 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2304 attrs->ia_mode &= ~(S_IALLUGO);
2305 if (S_ISDIR(inode->i_mode))
2306 attrs->ia_mode |=
2307 cifs_sb->mnt_dir_mode;
2308 else
2309 attrs->ia_mode |=
2310 cifs_sb->mnt_file_mode;
2311 }
2312 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2313 /* ignore mode change - ATTR_READONLY hasn't changed */
2314 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2315 }
1da177e4
LT
2316 }
2317
feb3e20c
JL
2318 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2319 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2320 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2321 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2322
e30dcf3a
SF
2323 /* Even if error on time set, no sense failing the call if
2324 the server would set the time to a reasonable value anyway,
2325 and this check ensures that we are not being called from
2326 sys_utimes in which case we ought to fail the call back to
2327 the user when the server rejects the call */
fb8c4b14 2328 if ((rc) && (attrs->ia_valid &
feb3e20c 2329 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2330 rc = 0;
1da177e4
LT
2331 }
2332
2333 /* do not need local check to inode_check_ok since the server does
2334 that */
1025774c
CH
2335 if (rc)
2336 goto cifs_setattr_exit;
2337
2338 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2339 attrs->ia_size != i_size_read(inode))
2340 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2341
2342 setattr_copy(inode, attrs);
2343 mark_inode_dirty(inode);
1025774c 2344
e30dcf3a 2345cifs_setattr_exit:
1da177e4 2346 kfree(full_path);
6d5786a3 2347 free_xid(xid);
1da177e4
LT
2348 return rc;
2349}
2350
0510eeb7
JL
2351int
2352cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2353{
2354 struct inode *inode = direntry->d_inode;
2355 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2356 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2357
2358 if (pTcon->unix_ext)
2359 return cifs_setattr_unix(direntry, attrs);
2360
2361 return cifs_setattr_nounix(direntry, attrs);
2362
2363 /* BB: add cifs_setattr_legacy for really old servers */
2364}
2365
99ee4dbd 2366#if 0
1da177e4
LT
2367void cifs_delete_inode(struct inode *inode)
2368{
f96637be 2369 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2370 /* may have to add back in if and when safe distributed caching of
2371 directories added e.g. via FindNotify */
2372}
99ee4dbd 2373#endif
This page took 0.663696 seconds and 5 git commands to generate.