]> Git Repo - linux.git/blame - fs/cifs/inode.c
mm: Introduce kvcalloc()
[linux.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French ([email protected])
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
116 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
cc0bad75
JL
165 inode->i_atime = fattr->cf_atime;
166 inode->i_mtime = fattr->cf_mtime;
167 inode->i_ctime = fattr->cf_ctime;
cc0bad75 168 inode->i_rdev = fattr->cf_rdev;
74d290da 169 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
170 inode->i_uid = fattr->cf_uid;
171 inode->i_gid = fattr->cf_gid;
172
0b8f18e3
JL
173 /* if dynperm is set, don't clobber existing mode */
174 if (inode->i_state & I_NEW ||
175 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
176 inode->i_mode = fattr->cf_mode;
177
cc0bad75 178 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 179
0b8f18e3
JL
180 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
181 cifs_i->time = 0;
182 else
183 cifs_i->time = jiffies;
184
aff8d5ca
JL
185 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
186 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
187 else
188 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 189
835a36ca 190 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
191 /*
192 * Can't safely change the file size here if the client is writing to
193 * it due to potential races.
194 */
cc0bad75
JL
195 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
196 i_size_write(inode, fattr->cf_eof);
197
198 /*
199 * i_blocks is not related to (i_size / i_blksize),
200 * but instead 512 byte (2**9) size is required for
201 * calculating num blocks.
202 */
203 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
204 }
205 spin_unlock(&inode->i_lock);
206
01c64fea
DH
207 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
208 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
209 if (inode->i_state & I_NEW)
210 cifs_set_ops(inode);
cc0bad75
JL
211}
212
4065c802
JL
213void
214cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
215{
216 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
217
218 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
219 return;
220
221 fattr->cf_uniqueid = iunique(sb, ROOT_I);
222}
223
cc0bad75
JL
224/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
225void
226cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
227 struct cifs_sb_info *cifs_sb)
228{
229 memset(fattr, 0, sizeof(*fattr));
230 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
231 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
232 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
233
234 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
235 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
236 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
237 /* old POSIX extensions don't get create time */
238
cc0bad75 239 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
240
241 /*
242 * Since we set the inode type below we need to mask off
243 * to avoid strange results if bits set above.
244 */
cc0bad75 245 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
246 switch (le32_to_cpu(info->Type)) {
247 case UNIX_FILE:
cc0bad75
JL
248 fattr->cf_mode |= S_IFREG;
249 fattr->cf_dtype = DT_REG;
75f12983
CH
250 break;
251 case UNIX_SYMLINK:
cc0bad75
JL
252 fattr->cf_mode |= S_IFLNK;
253 fattr->cf_dtype = DT_LNK;
75f12983
CH
254 break;
255 case UNIX_DIR:
cc0bad75
JL
256 fattr->cf_mode |= S_IFDIR;
257 fattr->cf_dtype = DT_DIR;
75f12983
CH
258 break;
259 case UNIX_CHARDEV:
cc0bad75
JL
260 fattr->cf_mode |= S_IFCHR;
261 fattr->cf_dtype = DT_CHR;
262 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
263 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
264 break;
265 case UNIX_BLOCKDEV:
cc0bad75
JL
266 fattr->cf_mode |= S_IFBLK;
267 fattr->cf_dtype = DT_BLK;
268 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
269 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
270 break;
271 case UNIX_FIFO:
cc0bad75
JL
272 fattr->cf_mode |= S_IFIFO;
273 fattr->cf_dtype = DT_FIFO;
75f12983
CH
274 break;
275 case UNIX_SOCKET:
cc0bad75
JL
276 fattr->cf_mode |= S_IFSOCK;
277 fattr->cf_dtype = DT_SOCK;
75f12983
CH
278 break;
279 default:
280 /* safest to call it a file if we do not know */
cc0bad75
JL
281 fattr->cf_mode |= S_IFREG;
282 fattr->cf_dtype = DT_REG;
f96637be 283 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
284 break;
285 }
286
46bbc25f
EB
287 fattr->cf_uid = cifs_sb->mnt_uid;
288 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
289 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
290 if (id < ((uid_t)-1)) {
291 kuid_t uid = make_kuid(&init_user_ns, id);
292 if (uid_valid(uid))
293 fattr->cf_uid = uid;
294 }
46bbc25f
EB
295 }
296
297 fattr->cf_gid = cifs_sb->mnt_gid;
298 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
299 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
300 if (id < ((gid_t)-1)) {
301 kgid_t gid = make_kgid(&init_user_ns, id);
302 if (gid_valid(gid))
303 fattr->cf_gid = gid;
304 }
46bbc25f 305 }
75f12983 306
cc0bad75 307 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
308}
309
b9a3260f 310/*
cc0bad75
JL
311 * Fill a cifs_fattr struct with fake inode info.
312 *
313 * Needed to setup cifs_fattr data for the directory which is the
314 * junction to the new submount (ie to setup the fake directory
315 * which represents a DFS referral).
b9a3260f 316 */
f1230c97 317static void
cc0bad75 318cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 319{
cc0bad75 320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 321
f96637be 322 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
323
324 memset(fattr, 0, sizeof(*fattr));
325 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
326 fattr->cf_uid = cifs_sb->mnt_uid;
327 fattr->cf_gid = cifs_sb->mnt_gid;
e37fea58
DD
328 ktime_get_real_ts(&fattr->cf_mtime);
329 fattr->cf_mtime = timespec_trunc(fattr->cf_mtime, sb->s_time_gran);
330 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
331 fattr->cf_nlink = 2;
332 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
333}
334
4ad65044
PS
335static int
336cifs_get_file_info_unix(struct file *filp)
abab095d
JL
337{
338 int rc;
6d5786a3 339 unsigned int xid;
abab095d
JL
340 FILE_UNIX_BASIC_INFO find_data;
341 struct cifs_fattr fattr;
496ad9aa 342 struct inode *inode = file_inode(filp);
abab095d 343 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 344 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 345 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 346
6d5786a3 347 xid = get_xid();
4b4de76e 348 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
349 if (!rc) {
350 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
351 } else if (rc == -EREMOTE) {
352 cifs_create_dfs_fattr(&fattr, inode->i_sb);
353 rc = 0;
354 }
355
356 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 357 free_xid(xid);
abab095d
JL
358 return rc;
359}
360
1da177e4 361int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 362 const unsigned char *full_path,
6d5786a3 363 struct super_block *sb, unsigned int xid)
1da177e4 364{
cc0bad75 365 int rc;
0e4bbde9 366 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 367 struct cifs_fattr fattr;
96daf2b0 368 struct cifs_tcon *tcon;
7ffec372 369 struct tcon_link *tlink;
1da177e4 370 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 371
f96637be 372 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 373
7ffec372
JL
374 tlink = cifs_sb_tlink(cifs_sb);
375 if (IS_ERR(tlink))
376 return PTR_ERR(tlink);
377 tcon = tlink_tcon(tlink);
378
1da177e4 379 /* could have done a find first instead but this returns more info */
cc0bad75 380 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 381 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 382 cifs_put_tlink(tlink);
e911d0cc 383
cc0bad75
JL
384 if (!rc) {
385 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
386 } else if (rc == -EREMOTE) {
387 cifs_create_dfs_fattr(&fattr, sb);
388 rc = 0;
389 } else {
390 return rc;
391 }
1da177e4 392
1b12b9c1
SM
393 /* check for Minshall+French symlinks */
394 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
395 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
396 full_path);
1b12b9c1 397 if (tmprc)
cb084b1a 398 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
399 }
400
0e4bbde9 401 if (*pinode == NULL) {
cc0bad75 402 /* get new inode */
4065c802 403 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
404 *pinode = cifs_iget(sb, &fattr);
405 if (!*pinode)
0e4bbde9 406 rc = -ENOMEM;
cc0bad75
JL
407 } else {
408 /* we already have inode, update it */
7196ac11
NA
409
410 /* if uniqueid is different, return error */
411 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
412 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
413 rc = -ESTALE;
414 goto cgiiu_exit;
415 }
416
417 /* if filetype is different, return error */
418 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
419 (fattr.cf_mode & S_IFMT))) {
420 rc = -ESTALE;
421 goto cgiiu_exit;
422 }
423
cc0bad75 424 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 425 }
1da177e4 426
7196ac11 427cgiiu_exit:
1da177e4
LT
428 return rc;
429}
430
0b8f18e3 431static int
0360d605 432cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 433 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
434{
435 int rc;
db8b631d 436 __u32 oplock;
7ffec372 437 struct tcon_link *tlink;
96daf2b0 438 struct cifs_tcon *tcon;
d81b8a40
PS
439 struct cifs_fid fid;
440 struct cifs_open_parms oparms;
d4ffff1f 441 struct cifs_io_parms io_parms;
86c96b4b 442 char buf[24];
d6e2f2a4 443 unsigned int bytes_read;
fb8c4b14 444 char *pbuf;
0360d605 445 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
446
447 pbuf = buf;
448
0b8f18e3
JL
449 fattr->cf_mode &= ~S_IFMT;
450
451 if (fattr->cf_eof == 0) {
452 fattr->cf_mode |= S_IFIFO;
453 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 454 return 0;
0b8f18e3
JL
455 } else if (fattr->cf_eof < 8) {
456 fattr->cf_mode |= S_IFREG;
457 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
458 return -EINVAL; /* EOPNOTSUPP? */
459 }
50c2f753 460
7ffec372
JL
461 tlink = cifs_sb_tlink(cifs_sb);
462 if (IS_ERR(tlink))
463 return PTR_ERR(tlink);
464 tcon = tlink_tcon(tlink);
465
d81b8a40
PS
466 oparms.tcon = tcon;
467 oparms.cifs_sb = cifs_sb;
468 oparms.desired_access = GENERIC_READ;
469 oparms.create_options = CREATE_NOT_DIR;
470 oparms.disposition = FILE_OPEN;
471 oparms.path = path;
472 oparms.fid = &fid;
473 oparms.reconnect = false;
474
db8b631d
SF
475 if (tcon->ses->server->oplocks)
476 oplock = REQ_OPLOCK;
477 else
478 oplock = 0;
479 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 480 if (rc) {
db8b631d 481 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
482 cifs_put_tlink(tlink);
483 return rc;
484 }
485
486 /* Read header */
d81b8a40 487 io_parms.netfid = fid.netfid;
0360d605
PS
488 io_parms.pid = current->tgid;
489 io_parms.tcon = tcon;
490 io_parms.offset = 0;
491 io_parms.length = 24;
492
db8b631d
SF
493 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
494 &bytes_read, &pbuf, &buf_type);
0360d605
PS
495 if ((rc == 0) && (bytes_read >= 8)) {
496 if (memcmp("IntxBLK", pbuf, 8) == 0) {
497 cifs_dbg(FYI, "Block device\n");
498 fattr->cf_mode |= S_IFBLK;
499 fattr->cf_dtype = DT_BLK;
500 if (bytes_read == 24) {
501 /* we have enough to decode dev num */
502 __u64 mjr; /* major */
503 __u64 mnr; /* minor */
504 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
505 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
506 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 507 }
0360d605
PS
508 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
509 cifs_dbg(FYI, "Char device\n");
510 fattr->cf_mode |= S_IFCHR;
511 fattr->cf_dtype = DT_CHR;
512 if (bytes_read == 24) {
513 /* we have enough to decode dev num */
514 __u64 mjr; /* major */
515 __u64 mnr; /* minor */
516 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
517 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
518 fattr->cf_rdev = MKDEV(mjr, mnr);
519 }
520 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
521 cifs_dbg(FYI, "Symlink\n");
522 fattr->cf_mode |= S_IFLNK;
523 fattr->cf_dtype = DT_LNK;
3020a1f5 524 } else {
0360d605 525 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 526 fattr->cf_dtype = DT_REG;
0360d605 527 rc = -EOPNOTSUPP;
fb8c4b14 528 }
0360d605
PS
529 } else {
530 fattr->cf_mode |= S_IFREG; /* then it is a file */
531 fattr->cf_dtype = DT_REG;
532 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 533 }
db8b631d
SF
534
535 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 536 cifs_put_tlink(tlink);
d6e2f2a4 537 return rc;
d6e2f2a4
SF
538}
539
9e294f1c
SF
540#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
541
0b8f18e3
JL
542/*
543 * Fetch mode bits as provided by SFU.
544 *
545 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
546 */
547static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 548 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 549{
3020a1f5 550#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
551 ssize_t rc;
552 char ea_value[4];
553 __u32 mode;
7ffec372 554 struct tcon_link *tlink;
96daf2b0 555 struct cifs_tcon *tcon;
7ffec372
JL
556
557 tlink = cifs_sb_tlink(cifs_sb);
558 if (IS_ERR(tlink))
559 return PTR_ERR(tlink);
560 tcon = tlink_tcon(tlink);
9e294f1c 561
d979f3b0
SF
562 if (tcon->ses->server->ops->query_all_EAs == NULL) {
563 cifs_put_tlink(tlink);
564 return -EOPNOTSUPP;
565 }
566
567 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
568 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 569 cifs_sb);
7ffec372 570 cifs_put_tlink(tlink);
4523cc30 571 if (rc < 0)
9e294f1c
SF
572 return (int)rc;
573 else if (rc > 3) {
574 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 575 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
576 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
577 mode, fattr->cf_mode);
0b8f18e3 578 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 579 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 580 }
0b8f18e3
JL
581
582 return 0;
3020a1f5
SF
583#else
584 return -EOPNOTSUPP;
585#endif
9e294f1c
SF
586}
587
0b8f18e3 588/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 589static void
0b8f18e3 590cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 591 struct super_block *sb, bool adjust_tz,
eb85d94b 592 bool symlink)
b9a3260f 593{
e37fea58 594 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 595 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 596
0b8f18e3
JL
597 memset(fattr, 0, sizeof(*fattr));
598 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
599 if (info->DeletePending)
600 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
601
602 if (info->LastAccessTime)
603 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58
DD
604 else {
605 ktime_get_real_ts(&fattr->cf_atime);
606 fattr->cf_atime = timespec_trunc(fattr->cf_atime, sb->s_time_gran);
607 }
0b8f18e3
JL
608
609 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
610 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
611
612 if (adjust_tz) {
0d424ad0
JL
613 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
614 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
615 }
616
617 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
618 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 619 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 620
74d290da 621 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
622
623 if (symlink) {
624 fattr->cf_mode = S_IFLNK;
625 fattr->cf_dtype = DT_LNK;
626 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
627 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
628 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
629 /*
630 * Server can return wrong NumberOfLinks value for directories
631 * when Unix extensions are disabled - fake it.
632 */
74d290da
JM
633 if (!tcon->unix_ext)
634 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
635 } else {
636 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
637 fattr->cf_dtype = DT_REG;
0b8f18e3 638
d0c280d2
JL
639 /* clear write bits if ATTR_READONLY is set */
640 if (fattr->cf_cifsattrs & ATTR_READONLY)
641 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 642
74d290da
JM
643 /*
644 * Don't accept zero nlink from non-unix servers unless
645 * delete is pending. Instead mark it as unknown.
646 */
647 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
648 !info->DeletePending) {
649 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 650 fattr->cf_nlink);
74d290da 651 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 652 }
6de2ce42 653 }
0b8f18e3
JL
654
655 fattr->cf_uid = cifs_sb->mnt_uid;
656 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
657}
658
4ad65044
PS
659static int
660cifs_get_file_info(struct file *filp)
abab095d
JL
661{
662 int rc;
6d5786a3 663 unsigned int xid;
abab095d
JL
664 FILE_ALL_INFO find_data;
665 struct cifs_fattr fattr;
496ad9aa 666 struct inode *inode = file_inode(filp);
c21dfb69 667 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 668 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
669 struct TCP_Server_Info *server = tcon->ses->server;
670
671 if (!server->ops->query_file_info)
672 return -ENOSYS;
abab095d 673
6d5786a3 674 xid = get_xid();
4ad65044 675 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
676 switch (rc) {
677 case 0:
e37fea58 678 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 679 false);
42274bb2
PS
680 break;
681 case -EREMOTE:
682 cifs_create_dfs_fattr(&fattr, inode->i_sb);
683 rc = 0;
684 break;
685 case -EOPNOTSUPP:
686 case -EINVAL:
abab095d
JL
687 /*
688 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
689 * for now, just skip revalidating and mark inode for
690 * immediate reval.
691 */
abab095d
JL
692 rc = 0;
693 CIFS_I(inode)->time = 0;
42274bb2 694 default:
abab095d 695 goto cgfi_exit;
42274bb2 696 }
abab095d
JL
697
698 /*
699 * don't bother with SFU junk here -- just mark inode as needing
700 * revalidation.
701 */
abab095d
JL
702 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
703 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
704 cifs_fattr_to_inode(inode, &fattr);
705cgfi_exit:
6d5786a3 706 free_xid(xid);
abab095d
JL
707 return rc;
708}
709
7ea884c7
SF
710/* Simple function to return a 64 bit hash of string. Rarely called */
711static __u64 simple_hashstr(const char *str)
712{
3995bbf5 713 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
714 __u64 hash = 0;
715
716 while (*str)
717 hash = (hash + (__u64) *str++) * hash_mult;
718
719 return hash;
720}
721
1208ef1f
PS
722int
723cifs_get_inode_info(struct inode **inode, const char *full_path,
724 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 725 const struct cifs_fid *fid)
1da177e4 726{
c052e2b4
SP
727 bool validinum = false;
728 __u16 srchflgs;
729 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
730 struct cifs_tcon *tcon;
731 struct TCP_Server_Info *server;
7ffec372 732 struct tcon_link *tlink;
1da177e4 733 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 734 char *buf = NULL;
1208ef1f 735 bool adjust_tz = false;
0b8f18e3 736 struct cifs_fattr fattr;
c052e2b4 737 struct cifs_search_info *srchinf = NULL;
eb85d94b 738 bool symlink = false;
1da177e4 739
7ffec372
JL
740 tlink = cifs_sb_tlink(cifs_sb);
741 if (IS_ERR(tlink))
742 return PTR_ERR(tlink);
1208ef1f
PS
743 tcon = tlink_tcon(tlink);
744 server = tcon->ses->server;
7ffec372 745
f96637be 746 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 747
1208ef1f 748 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
749 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
750 CIFS_I(*inode)->time != 0) {
f96637be 751 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 752 goto cgii_exit;
1da177e4
LT
753 }
754 }
755
1208ef1f
PS
756 /* if inode info is not passed, get it from server */
757 if (data == NULL) {
758 if (!server->ops->query_path_info) {
759 rc = -ENOSYS;
760 goto cgii_exit;
761 }
1da177e4 762 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
763 if (buf == NULL) {
764 rc = -ENOMEM;
765 goto cgii_exit;
766 }
1208ef1f
PS
767 data = (FILE_ALL_INFO *)buf;
768 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 769 data, &adjust_tz, &symlink);
1da177e4 770 }
0b8f18e3
JL
771
772 if (!rc) {
e37fea58 773 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 774 symlink);
0b8f18e3
JL
775 } else if (rc == -EREMOTE) {
776 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 777 rc = 0;
c052e2b4
SP
778 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
779 srchinf = kzalloc(sizeof(struct cifs_search_info),
780 GFP_KERNEL);
781 if (srchinf == NULL) {
782 rc = -ENOMEM;
783 goto cgii_exit;
784 }
785
786 srchinf->endOfSearch = false;
787 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
788
789 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
790 CIFS_SEARCH_CLOSE_AT_END |
791 CIFS_SEARCH_BACKUP_SEARCH;
792
793 rc = CIFSFindFirst(xid, tcon, full_path,
794 cifs_sb, NULL, srchflgs, srchinf, false);
795 if (!rc) {
796 data =
797 (FILE_ALL_INFO *)srchinf->srch_entries_start;
798
799 cifs_dir_info_to_fattr(&fattr,
800 (FILE_DIRECTORY_INFO *)data, cifs_sb);
801 fattr.cf_uniqueid = le64_to_cpu(
802 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
803 validinum = true;
804
805 cifs_buf_release(srchinf->ntwrk_buf_start);
806 }
807 kfree(srchinf);
4c5930e8
SF
808 if (rc)
809 goto cgii_exit;
c052e2b4 810 } else
7962670e 811 goto cgii_exit;
1da177e4 812
0b8f18e3
JL
813 /*
814 * If an inode wasn't passed in, then get the inode number
815 *
816 * Is an i_ino of zero legal? Can we use that to check if the server
817 * supports returning inode numbers? Are there other sanity checks we
818 * can use to ensure that the server is really filling in that field?
0b8f18e3 819 */
1208ef1f 820 if (*inode == NULL) {
b9a3260f 821 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
822 if (validinum == false) {
823 if (server->ops->get_srv_inum)
824 tmprc = server->ops->get_srv_inum(xid,
825 tcon, cifs_sb, full_path,
826 &fattr.cf_uniqueid, data);
827 if (tmprc) {
f96637be
JP
828 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
829 tmprc);
c052e2b4
SP
830 fattr.cf_uniqueid = iunique(sb, ROOT_I);
831 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
832 } else if ((fattr.cf_uniqueid == 0) &&
833 strlen(full_path) == 0) {
834 /* some servers ret bad root ino ie 0 */
835 cifs_dbg(FYI, "Invalid (0) inodenum\n");
836 fattr.cf_flags |=
837 CIFS_FATTR_FAKE_ROOT_INO;
838 fattr.cf_uniqueid =
839 simple_hashstr(tcon->treeName);
c052e2b4 840 }
132ac7b7 841 }
c052e2b4 842 } else
0b8f18e3 843 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
844 } else {
845 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
846 validinum == false && server->ops->get_srv_inum) {
847 /*
848 * Pass a NULL tcon to ensure we don't make a round
849 * trip to the server. This only works for SMB2+.
850 */
851 tmprc = server->ops->get_srv_inum(xid,
852 NULL, cifs_sb, full_path,
853 &fattr.cf_uniqueid, data);
854 if (tmprc)
855 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
856 else if ((fattr.cf_uniqueid == 0) &&
857 strlen(full_path) == 0) {
858 /*
859 * Reuse existing root inode num since
860 * inum zero for root causes ls of . and .. to
861 * not be returned
862 */
863 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
864 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
865 }
a108471b
RL
866 } else
867 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
868 }
b9a3260f 869
0b8f18e3
JL
870 /* query for SFU type info if supported and needed */
871 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
872 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
873 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
874 if (tmprc)
f96637be 875 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 876 }
1da177e4 877
79df1bae 878#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
879 /* fill in 0777 bits from ACL */
880 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 881 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 882 if (rc) {
f96637be
JP
883 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
884 __func__, rc);
78415d2d
SP
885 goto cgii_exit;
886 }
b9a3260f 887 }
79df1bae 888#endif /* CONFIG_CIFS_ACL */
b9a3260f 889
0b8f18e3
JL
890 /* fill in remaining high mode bits e.g. SUID, VTX */
891 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
892 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 893
1b12b9c1
SM
894 /* check for Minshall+French symlinks */
895 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
896 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
897 full_path);
1b12b9c1 898 if (tmprc)
cb084b1a 899 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
900 }
901
1208ef1f
PS
902 if (!*inode) {
903 *inode = cifs_iget(sb, &fattr);
904 if (!*inode)
0b8f18e3
JL
905 rc = -ENOMEM;
906 } else {
7196ac11
NA
907 /* we already have inode, update it */
908
a108471b
RL
909 /* if uniqueid is different, return error */
910 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
911 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
912 rc = -ESTALE;
913 goto cgii_exit;
914 }
915
7196ac11
NA
916 /* if filetype is different, return error */
917 if (unlikely(((*inode)->i_mode & S_IFMT) !=
918 (fattr.cf_mode & S_IFMT))) {
919 rc = -ESTALE;
920 goto cgii_exit;
921 }
922
1208ef1f 923 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 924 }
b9a3260f 925
7962670e 926cgii_exit:
7ea884c7
SF
927 if ((*inode) && ((*inode)->i_ino == 0))
928 cifs_dbg(FYI, "inode number of zero returned\n");
929
1da177e4 930 kfree(buf);
7ffec372 931 cifs_put_tlink(tlink);
1da177e4
LT
932 return rc;
933}
934
7f8ed420
SF
935static const struct inode_operations cifs_ipc_inode_ops = {
936 .lookup = cifs_lookup,
937};
938
cc0bad75
JL
939static int
940cifs_find_inode(struct inode *inode, void *opaque)
941{
942 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
943
f30b9c11 944 /* don't match inode with different uniqueid */
cc0bad75
JL
945 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
946 return 0;
947
20054bd6
JL
948 /* use createtime like an i_generation field */
949 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
950 return 0;
951
f30b9c11
JL
952 /* don't match inode of different type */
953 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
954 return 0;
955
5acfec25 956 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 957 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 958 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 959
cc0bad75
JL
960 return 1;
961}
962
963static int
964cifs_init_inode(struct inode *inode, void *opaque)
965{
966 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
967
968 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 969 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
970 return 0;
971}
972
5acfec25
JL
973/*
974 * walk dentry list for an inode and report whether it has aliases that
975 * are hashed. We use this to determine if a directory inode can actually
976 * be used.
977 */
978static bool
979inode_has_hashed_dentries(struct inode *inode)
980{
981 struct dentry *dentry;
982
873feea0 983 spin_lock(&inode->i_lock);
946e51f2 984 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 985 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 986 spin_unlock(&inode->i_lock);
5acfec25
JL
987 return true;
988 }
989 }
873feea0 990 spin_unlock(&inode->i_lock);
5acfec25
JL
991 return false;
992}
993
cc0bad75
JL
994/* Given fattrs, get a corresponding inode */
995struct inode *
996cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
997{
998 unsigned long hash;
999 struct inode *inode;
1000
3d694380 1001retry_iget5_locked:
f96637be 1002 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1003
1004 /* hash down to 32-bits on 32-bit arch */
1005 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1006
1007 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1008 if (inode) {
5acfec25 1009 /* was there a potentially problematic inode collision? */
3d694380 1010 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1011 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1012
1013 if (inode_has_hashed_dentries(inode)) {
1014 cifs_autodisable_serverino(CIFS_SB(sb));
1015 iput(inode);
1016 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1017 goto retry_iget5_locked;
1018 }
3d694380
JL
1019 }
1020
cc0bad75 1021 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1022 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1023 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1024 if (inode->i_state & I_NEW) {
1025 inode->i_ino = hash;
0ccd4802 1026#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1027 /* initialize per-inode cache cookie pointer */
1028 CIFS_I(inode)->fscache = NULL;
0ccd4802 1029#endif
cc0bad75
JL
1030 unlock_new_inode(inode);
1031 }
1032 }
1033
1034 return inode;
1035}
1036
1da177e4 1037/* gets root inode */
9b6763e0 1038struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1039{
6d5786a3 1040 unsigned int xid;
0d424ad0 1041 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1042 struct inode *inode = NULL;
ce634ab2 1043 long rc;
96daf2b0 1044 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1045 char *path = NULL;
1046 int len;
1047
1048 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1049 && cifs_sb->prepath) {
1050 len = strlen(cifs_sb->prepath);
1051 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1052 if (path == NULL)
1053 return ERR_PTR(-ENOMEM);
1054 path[0] = '/';
1055 memcpy(path+1, cifs_sb->prepath, len);
1056 } else {
1057 path = kstrdup("", GFP_KERNEL);
1058 if (path == NULL)
1059 return ERR_PTR(-ENOMEM);
1060 }
ce634ab2 1061
6d5786a3 1062 xid = get_xid();
b5b374ea 1063 if (tcon->unix_ext) {
a6b5058f 1064 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1065 /* some servers mistakenly claim POSIX support */
1066 if (rc != -EOPNOTSUPP)
1067 goto iget_no_retry;
1068 cifs_dbg(VFS, "server does not support POSIX extensions");
1069 tcon->unix_ext = false;
1070 }
1071
a6b5058f
AA
1072 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1073 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1074
b5b374ea 1075iget_no_retry:
a7851ce7
OS
1076 if (!inode) {
1077 inode = ERR_PTR(rc);
1078 goto out;
1079 }
cc0bad75 1080
0ccd4802 1081#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1082 /* populate tcon->resource_id */
0d424ad0 1083 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1084#endif
d03382ce 1085
b327a717 1086 if (rc && tcon->pipe) {
f96637be 1087 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1088 spin_lock(&inode->i_lock);
7f8ed420 1089 inode->i_mode |= S_IFDIR;
bfe86848 1090 set_nlink(inode, 2);
7f8ed420
SF
1091 inode->i_op = &cifs_ipc_inode_ops;
1092 inode->i_fop = &simple_dir_operations;
1093 inode->i_uid = cifs_sb->mnt_uid;
1094 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1095 spin_unlock(&inode->i_lock);
ad661334 1096 } else if (rc) {
ce634ab2 1097 iget_failed(inode);
a7851ce7 1098 inode = ERR_PTR(rc);
7f8ed420
SF
1099 }
1100
a7851ce7 1101out:
a6b5058f 1102 kfree(path);
31cd106b 1103 free_xid(xid);
ce634ab2 1104 return inode;
1da177e4
LT
1105}
1106
ed6875e0 1107int
6d5786a3 1108cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1109 char *full_path, __u32 dosattr)
388e57b2 1110{
388e57b2 1111 bool set_time = false;
388e57b2 1112 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1113 struct TCP_Server_Info *server;
388e57b2
SF
1114 FILE_BASIC_INFO info_buf;
1115
1adcb710
SF
1116 if (attrs == NULL)
1117 return -EINVAL;
1118
6bdf6dbd
PS
1119 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1120 if (!server->ops->set_file_info)
1121 return -ENOSYS;
1122
388e57b2
SF
1123 if (attrs->ia_valid & ATTR_ATIME) {
1124 set_time = true;
1125 info_buf.LastAccessTime =
1126 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
1127 } else
1128 info_buf.LastAccessTime = 0;
1129
1130 if (attrs->ia_valid & ATTR_MTIME) {
1131 set_time = true;
1132 info_buf.LastWriteTime =
1133 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
1134 } else
1135 info_buf.LastWriteTime = 0;
1136
1137 /*
1138 * Samba throws this field away, but windows may actually use it.
1139 * Do not set ctime unless other time stamps are changed explicitly
1140 * (i.e. by utimes()) since we would then have a mix of client and
1141 * server times.
1142 */
1143 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1144 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2
SF
1145 info_buf.ChangeTime =
1146 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
1147 } else
1148 info_buf.ChangeTime = 0;
1149
1150 info_buf.CreationTime = 0; /* don't change */
1151 info_buf.Attributes = cpu_to_le32(dosattr);
1152
6bdf6dbd 1153 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1154}
1155
a12a1ac7 1156/*
ed6875e0 1157 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1158 * and rename it to a random name that hopefully won't conflict with
1159 * anything else.
1160 */
ed6875e0
PS
1161int
1162cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1163 const unsigned int xid)
a12a1ac7
JL
1164{
1165 int oplock = 0;
1166 int rc;
d81b8a40
PS
1167 struct cifs_fid fid;
1168 struct cifs_open_parms oparms;
2b0143b5 1169 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1170 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1171 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1172 struct tcon_link *tlink;
96daf2b0 1173 struct cifs_tcon *tcon;
3270958b
SF
1174 __u32 dosattr, origattr;
1175 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1176
7ffec372
JL
1177 tlink = cifs_sb_tlink(cifs_sb);
1178 if (IS_ERR(tlink))
1179 return PTR_ERR(tlink);
1180 tcon = tlink_tcon(tlink);
1181
c483a984
SP
1182 /*
1183 * We cannot rename the file if the server doesn't support
1184 * CAP_INFOLEVEL_PASSTHRU
1185 */
1186 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1187 rc = -EBUSY;
1188 goto out;
1189 }
1190
d81b8a40
PS
1191 oparms.tcon = tcon;
1192 oparms.cifs_sb = cifs_sb;
1193 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1194 oparms.create_options = CREATE_NOT_DIR;
1195 oparms.disposition = FILE_OPEN;
1196 oparms.path = full_path;
1197 oparms.fid = &fid;
1198 oparms.reconnect = false;
1199
1200 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1201 if (rc != 0)
1202 goto out;
1203
3270958b
SF
1204 origattr = cifsInode->cifsAttrs;
1205 if (origattr == 0)
1206 origattr |= ATTR_NORMAL;
1207
1208 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1209 if (dosattr == 0)
1210 dosattr |= ATTR_NORMAL;
1211 dosattr |= ATTR_HIDDEN;
1212
3270958b
SF
1213 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1214 if (dosattr != origattr) {
1215 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1216 if (info_buf == NULL) {
1217 rc = -ENOMEM;
1218 goto out_close;
1219 }
1220 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1221 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1222 current->tgid);
1223 /* although we would like to mark the file hidden
1224 if that fails we will still try to rename it */
72d282dc 1225 if (!rc)
3270958b
SF
1226 cifsInode->cifsAttrs = dosattr;
1227 else
1228 dosattr = origattr; /* since not able to change them */
a12a1ac7 1229 }
a12a1ac7 1230
dd1db2de 1231 /* rename the file */
d81b8a40
PS
1232 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1233 cifs_sb->local_nls,
2baa2682 1234 cifs_remap(cifs_sb));
3270958b 1235 if (rc != 0) {
47c78f4a 1236 rc = -EBUSY;
3270958b
SF
1237 goto undo_setattr;
1238 }
6d22f098 1239
3270958b 1240 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1241 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1242 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1243 current->tgid);
1244 /*
1245 * some samba versions return -ENOENT when we try to set the
1246 * file disposition here. Likely a samba bug, but work around
1247 * it for now. This means that some cifsXXX files may hang
1248 * around after they shouldn't.
1249 *
1250 * BB: remove this hack after more servers have the fix
1251 */
1252 if (rc == -ENOENT)
1253 rc = 0;
1254 else if (rc != 0) {
47c78f4a 1255 rc = -EBUSY;
3270958b
SF
1256 goto undo_rename;
1257 }
aff8d5ca 1258 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1259 }
7ce86d5a 1260
a12a1ac7 1261out_close:
d81b8a40 1262 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1263out:
3270958b 1264 kfree(info_buf);
7ffec372 1265 cifs_put_tlink(tlink);
a12a1ac7 1266 return rc;
3270958b
SF
1267
1268 /*
1269 * reset everything back to the original state. Don't bother
1270 * dealing with errors here since we can't do anything about
1271 * them anyway.
1272 */
1273undo_rename:
d81b8a40 1274 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1275 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1276undo_setattr:
1277 if (dosattr != origattr) {
1278 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1279 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1280 current->tgid))
1281 cifsInode->cifsAttrs = origattr;
1282 }
1283
1284 goto out_close;
a12a1ac7
JL
1285}
1286
b7ca6928
SF
1287/* copied from fs/nfs/dir.c with small changes */
1288static void
1289cifs_drop_nlink(struct inode *inode)
1290{
1291 spin_lock(&inode->i_lock);
1292 if (inode->i_nlink > 0)
1293 drop_nlink(inode);
1294 spin_unlock(&inode->i_lock);
1295}
ff694527
SF
1296
1297/*
2b0143b5 1298 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1299 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1300 * if that fails we can not attempt the fall back mechanisms on EACCESS
1301 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1302 * unlink on negative dentries currently.
1303 */
5f0319a7 1304int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1305{
1306 int rc = 0;
6d5786a3 1307 unsigned int xid;
1da177e4 1308 char *full_path = NULL;
2b0143b5 1309 struct inode *inode = d_inode(dentry);
ff694527 1310 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1311 struct super_block *sb = dir->i_sb;
1312 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1313 struct tcon_link *tlink;
96daf2b0 1314 struct cifs_tcon *tcon;
ed6875e0 1315 struct TCP_Server_Info *server;
6050247d
SF
1316 struct iattr *attrs = NULL;
1317 __u32 dosattr = 0, origattr = 0;
1da177e4 1318
f96637be 1319 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1320
7ffec372
JL
1321 tlink = cifs_sb_tlink(cifs_sb);
1322 if (IS_ERR(tlink))
1323 return PTR_ERR(tlink);
1324 tcon = tlink_tcon(tlink);
ed6875e0 1325 server = tcon->ses->server;
7ffec372 1326
6d5786a3 1327 xid = get_xid();
1da177e4 1328
5f0319a7
JL
1329 /* Unlink can be called from rename so we can not take the
1330 * sb->s_vfs_rename_mutex here */
1331 full_path = build_path_from_dentry(dentry);
1da177e4 1332 if (full_path == NULL) {
0f3bc09e 1333 rc = -ENOMEM;
7ffec372 1334 goto unlink_out;
1da177e4 1335 }
2d785a50 1336
29e20f9c
PS
1337 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1338 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1339 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1340 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1341 cifs_remap(cifs_sb));
f96637be 1342 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1343 if ((rc == 0) || (rc == -ENOENT))
1344 goto psx_del_no_retry;
1345 }
1da177e4 1346
6050247d 1347retry_std_delete:
ed6875e0
PS
1348 if (!server->ops->unlink) {
1349 rc = -ENOSYS;
1350 goto psx_del_no_retry;
1351 }
1352
1353 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1354
2d785a50 1355psx_del_no_retry:
1da177e4 1356 if (!rc) {
5f0319a7 1357 if (inode)
b7ca6928 1358 cifs_drop_nlink(inode);
1da177e4 1359 } else if (rc == -ENOENT) {
5f0319a7 1360 d_drop(dentry);
47c78f4a 1361 } else if (rc == -EBUSY) {
ed6875e0
PS
1362 if (server->ops->rename_pending_delete) {
1363 rc = server->ops->rename_pending_delete(full_path,
1364 dentry, xid);
1365 if (rc == 0)
1366 cifs_drop_nlink(inode);
1367 }
ff694527 1368 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1369 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1370 if (attrs == NULL) {
1371 rc = -ENOMEM;
1372 goto out_reval;
1da177e4 1373 }
388e57b2
SF
1374
1375 /* try to reset dos attributes */
ff694527
SF
1376 cifs_inode = CIFS_I(inode);
1377 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1378 if (origattr == 0)
1379 origattr |= ATTR_NORMAL;
1380 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1381 if (dosattr == 0)
1382 dosattr |= ATTR_NORMAL;
1383 dosattr |= ATTR_HIDDEN;
1384
1385 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1386 if (rc != 0)
1387 goto out_reval;
6050247d
SF
1388
1389 goto retry_std_delete;
1da177e4 1390 }
6050247d
SF
1391
1392 /* undo the setattr if we errored out and it's needed */
1393 if (rc != 0 && dosattr != 0)
1394 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1395
388e57b2 1396out_reval:
4523cc30 1397 if (inode) {
ff694527
SF
1398 cifs_inode = CIFS_I(inode);
1399 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1400 when needed */
e37fea58 1401 inode->i_ctime = current_time(inode);
06bcfedd 1402 }
e37fea58 1403 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1404 cifs_inode = CIFS_I(dir);
6050247d 1405 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1406unlink_out:
1da177e4 1407 kfree(full_path);
6050247d 1408 kfree(attrs);
6d5786a3 1409 free_xid(xid);
7ffec372 1410 cifs_put_tlink(tlink);
1da177e4
LT
1411 return rc;
1412}
1413
ff691e96 1414static int
101b92d9 1415cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1416 const char *full_path, struct cifs_sb_info *cifs_sb,
1417 struct cifs_tcon *tcon, const unsigned int xid)
1418{
1419 int rc = 0;
101b92d9 1420 struct inode *inode = NULL;
ff691e96
PS
1421
1422 if (tcon->unix_ext)
101b92d9 1423 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1424 xid);
1425 else
101b92d9
JL
1426 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1427 xid, NULL);
1428
ff691e96
PS
1429 if (rc)
1430 return rc;
1431
ff691e96
PS
1432 /*
1433 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1434 * from the server or was set bogus. Also, since this is a brand new
1435 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1436 */
101b92d9
JL
1437 if (inode->i_nlink < 2)
1438 set_nlink(inode, 2);
ff691e96
PS
1439 mode &= ~current_umask();
1440 /* must turn on setgid bit if parent dir has it */
101b92d9 1441 if (parent->i_mode & S_ISGID)
ff691e96
PS
1442 mode |= S_ISGID;
1443
1444 if (tcon->unix_ext) {
1445 struct cifs_unix_set_info_args args = {
1446 .mode = mode,
1447 .ctime = NO_CHANGE_64,
1448 .atime = NO_CHANGE_64,
1449 .mtime = NO_CHANGE_64,
1450 .device = 0,
1451 };
1452 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1453 args.uid = current_fsuid();
101b92d9 1454 if (parent->i_mode & S_ISGID)
49418b2c 1455 args.gid = parent->i_gid;
ff691e96 1456 else
49418b2c 1457 args.gid = current_fsgid();
ff691e96 1458 } else {
49418b2c
EB
1459 args.uid = INVALID_UID; /* no change */
1460 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1461 }
1462 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1463 cifs_sb->local_nls,
2baa2682 1464 cifs_remap(cifs_sb));
ff691e96 1465 } else {
f436720e 1466 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1467 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1468 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1469 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1470 tcon, xid);
101b92d9
JL
1471 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1472 inode->i_mode = (mode | S_IFDIR);
1473
1474 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1475 inode->i_uid = current_fsuid();
1476 if (inode->i_mode & S_ISGID)
1477 inode->i_gid = parent->i_gid;
1478 else
1479 inode->i_gid = current_fsgid();
ff691e96
PS
1480 }
1481 }
101b92d9 1482 d_instantiate(dentry, inode);
ff691e96
PS
1483 return rc;
1484}
1485
1486static int
1487cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1488 const char *full_path, struct cifs_sb_info *cifs_sb,
1489 struct cifs_tcon *tcon, const unsigned int xid)
1490{
1491 int rc = 0;
1492 u32 oplock = 0;
1493 FILE_UNIX_BASIC_INFO *info = NULL;
1494 struct inode *newinode = NULL;
1495 struct cifs_fattr fattr;
1496
1497 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1498 if (info == NULL) {
1499 rc = -ENOMEM;
1500 goto posix_mkdir_out;
1501 }
1502
1503 mode &= ~current_umask();
1504 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1505 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1506 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1507 if (rc == -EOPNOTSUPP)
1508 goto posix_mkdir_out;
1509 else if (rc) {
f96637be 1510 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1511 d_drop(dentry);
1512 goto posix_mkdir_out;
1513 }
1514
1515 if (info->Type == cpu_to_le32(-1))
1516 /* no return info, go query for it */
1517 goto posix_mkdir_get_info;
1518 /*
1519 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1520 * need to set uid/gid.
1521 */
1522
1523 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1524 cifs_fill_uniqueid(inode->i_sb, &fattr);
1525 newinode = cifs_iget(inode->i_sb, &fattr);
1526 if (!newinode)
1527 goto posix_mkdir_get_info;
1528
1529 d_instantiate(dentry, newinode);
1530
1531#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1532 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1533 dentry, dentry, newinode);
ff691e96
PS
1534
1535 if (newinode->i_nlink != 2)
f96637be
JP
1536 cifs_dbg(FYI, "unexpected number of links %d\n",
1537 newinode->i_nlink);
ff691e96
PS
1538#endif
1539
1540posix_mkdir_out:
1541 kfree(info);
1542 return rc;
1543posix_mkdir_get_info:
1544 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1545 xid);
1546 goto posix_mkdir_out;
1547}
1548
18bb1db3 1549int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1550{
ff691e96 1551 int rc = 0;
6d5786a3 1552 unsigned int xid;
1da177e4 1553 struct cifs_sb_info *cifs_sb;
7ffec372 1554 struct tcon_link *tlink;
29e20f9c 1555 struct cifs_tcon *tcon;
f436720e 1556 struct TCP_Server_Info *server;
ff691e96 1557 char *full_path;
1da177e4 1558
f96637be
JP
1559 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1560 mode, inode);
1da177e4 1561
1da177e4 1562 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1563 tlink = cifs_sb_tlink(cifs_sb);
1564 if (IS_ERR(tlink))
1565 return PTR_ERR(tlink);
29e20f9c 1566 tcon = tlink_tcon(tlink);
7ffec372 1567
6d5786a3 1568 xid = get_xid();
1da177e4 1569
7f57356b 1570 full_path = build_path_from_dentry(direntry);
1da177e4 1571 if (full_path == NULL) {
0f3bc09e 1572 rc = -ENOMEM;
7ffec372 1573 goto mkdir_out;
1da177e4 1574 }
50c2f753 1575
29e20f9c
PS
1576 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1577 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1578 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1579 tcon, xid);
1580 if (rc != -EOPNOTSUPP)
2dd29d31 1581 goto mkdir_out;
fb8c4b14 1582 }
ff691e96 1583
f436720e
PS
1584 server = tcon->ses->server;
1585
1586 if (!server->ops->mkdir) {
1587 rc = -ENOSYS;
1588 goto mkdir_out;
1589 }
1590
1da177e4 1591 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1592 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1593 if (rc) {
f96637be 1594 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1595 d_drop(direntry);
ff691e96 1596 goto mkdir_out;
1da177e4 1597 }
ff691e96
PS
1598
1599 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1600 xid);
fb8c4b14 1601mkdir_out:
6de2ce42
PS
1602 /*
1603 * Force revalidate to get parent dir info when needed since cached
1604 * attributes are invalid now.
1605 */
1606 CIFS_I(inode)->time = 0;
1da177e4 1607 kfree(full_path);
6d5786a3 1608 free_xid(xid);
7ffec372 1609 cifs_put_tlink(tlink);
1da177e4
LT
1610 return rc;
1611}
1612
1613int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1614{
1615 int rc = 0;
6d5786a3 1616 unsigned int xid;
1da177e4 1617 struct cifs_sb_info *cifs_sb;
7ffec372 1618 struct tcon_link *tlink;
f958ca5d
PS
1619 struct cifs_tcon *tcon;
1620 struct TCP_Server_Info *server;
1da177e4
LT
1621 char *full_path = NULL;
1622 struct cifsInodeInfo *cifsInode;
1623
f96637be 1624 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1625
6d5786a3 1626 xid = get_xid();
1da177e4 1627
7f57356b 1628 full_path = build_path_from_dentry(direntry);
1da177e4 1629 if (full_path == NULL) {
0f3bc09e 1630 rc = -ENOMEM;
7ffec372 1631 goto rmdir_exit;
1da177e4
LT
1632 }
1633
7ffec372
JL
1634 cifs_sb = CIFS_SB(inode->i_sb);
1635 tlink = cifs_sb_tlink(cifs_sb);
1636 if (IS_ERR(tlink)) {
1637 rc = PTR_ERR(tlink);
1638 goto rmdir_exit;
1639 }
f958ca5d
PS
1640 tcon = tlink_tcon(tlink);
1641 server = tcon->ses->server;
1642
1643 if (!server->ops->rmdir) {
1644 rc = -ENOSYS;
1645 cifs_put_tlink(tlink);
1646 goto rmdir_exit;
1647 }
7ffec372 1648
f958ca5d 1649 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1650 cifs_put_tlink(tlink);
1da177e4
LT
1651
1652 if (!rc) {
2b0143b5
DH
1653 spin_lock(&d_inode(direntry)->i_lock);
1654 i_size_write(d_inode(direntry), 0);
1655 clear_nlink(d_inode(direntry));
1656 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1657 }
1658
2b0143b5 1659 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1660 /* force revalidate to go get info when needed */
1661 cifsInode->time = 0;
42c24544
SF
1662
1663 cifsInode = CIFS_I(inode);
6de2ce42
PS
1664 /*
1665 * Force revalidate to get parent dir info when needed since cached
1666 * attributes are invalid now.
1667 */
1668 cifsInode->time = 0;
42c24544 1669
2b0143b5 1670 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1671 current_time(inode);
1da177e4 1672
7ffec372 1673rmdir_exit:
1da177e4 1674 kfree(full_path);
6d5786a3 1675 free_xid(xid);
1da177e4
LT
1676 return rc;
1677}
1678
ee2fd967 1679static int
8ceb9843
PS
1680cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1681 const char *from_path, struct dentry *to_dentry,
1682 const char *to_path)
ee2fd967
SF
1683{
1684 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1685 struct tcon_link *tlink;
8ceb9843
PS
1686 struct cifs_tcon *tcon;
1687 struct TCP_Server_Info *server;
d81b8a40
PS
1688 struct cifs_fid fid;
1689 struct cifs_open_parms oparms;
ee2fd967
SF
1690 int oplock, rc;
1691
7ffec372
JL
1692 tlink = cifs_sb_tlink(cifs_sb);
1693 if (IS_ERR(tlink))
1694 return PTR_ERR(tlink);
8ceb9843
PS
1695 tcon = tlink_tcon(tlink);
1696 server = tcon->ses->server;
1697
1698 if (!server->ops->rename)
1699 return -ENOSYS;
7ffec372 1700
ee2fd967 1701 /* try path-based rename first */
8ceb9843 1702 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1703
1704 /*
8ceb9843
PS
1705 * Don't bother with rename by filehandle unless file is busy and
1706 * source. Note that cross directory moves do not work with
ee2fd967
SF
1707 * rename by filehandle to various Windows servers.
1708 */
47c78f4a 1709 if (rc == 0 || rc != -EBUSY)
7ffec372 1710 goto do_rename_exit;
ee2fd967 1711
ed0e3ace
JL
1712 /* open-file renames don't work across directories */
1713 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1714 goto do_rename_exit;
ed0e3ace 1715
d81b8a40
PS
1716 oparms.tcon = tcon;
1717 oparms.cifs_sb = cifs_sb;
ee2fd967 1718 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1719 oparms.desired_access = DELETE;
1720 oparms.create_options = CREATE_NOT_DIR;
1721 oparms.disposition = FILE_OPEN;
1722 oparms.path = from_path;
1723 oparms.fid = &fid;
1724 oparms.reconnect = false;
1725
1726 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1727 if (rc == 0) {
d81b8a40 1728 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1729 (const char *) to_dentry->d_name.name,
2baa2682 1730 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1731 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1732 }
7ffec372
JL
1733do_rename_exit:
1734 cifs_put_tlink(tlink);
ee2fd967
SF
1735 return rc;
1736}
1737
8ceb9843 1738int
7c33d597
MS
1739cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1740 struct inode *target_dir, struct dentry *target_dentry,
1741 unsigned int flags)
1da177e4 1742{
8ceb9843
PS
1743 char *from_name = NULL;
1744 char *to_name = NULL;
639e7a91 1745 struct cifs_sb_info *cifs_sb;
7ffec372 1746 struct tcon_link *tlink;
96daf2b0 1747 struct cifs_tcon *tcon;
ee2fd967
SF
1748 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1749 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1750 unsigned int xid;
1751 int rc, tmprc;
1da177e4 1752
7c33d597
MS
1753 if (flags & ~RENAME_NOREPLACE)
1754 return -EINVAL;
1755
639e7a91 1756 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1757 tlink = cifs_sb_tlink(cifs_sb);
1758 if (IS_ERR(tlink))
1759 return PTR_ERR(tlink);
1760 tcon = tlink_tcon(tlink);
1da177e4 1761
6d5786a3 1762 xid = get_xid();
ee2fd967 1763
ee2fd967
SF
1764 /*
1765 * we already have the rename sem so we do not need to
1766 * grab it again here to protect the path integrity
1767 */
8ceb9843
PS
1768 from_name = build_path_from_dentry(source_dentry);
1769 if (from_name == NULL) {
ee2fd967
SF
1770 rc = -ENOMEM;
1771 goto cifs_rename_exit;
1772 }
1773
8ceb9843
PS
1774 to_name = build_path_from_dentry(target_dentry);
1775 if (to_name == NULL) {
1da177e4
LT
1776 rc = -ENOMEM;
1777 goto cifs_rename_exit;
1778 }
1779
8ceb9843
PS
1780 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1781 to_name);
ee2fd967 1782
7c33d597
MS
1783 /*
1784 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1785 */
1786 if (flags & RENAME_NOREPLACE)
1787 goto cifs_rename_exit;
1788
14121bdc
JL
1789 if (rc == -EEXIST && tcon->unix_ext) {
1790 /*
8ceb9843
PS
1791 * Are src and dst hardlinks of same inode? We can only tell
1792 * with unix extensions enabled.
14121bdc
JL
1793 */
1794 info_buf_source =
1795 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1796 GFP_KERNEL);
1797 if (info_buf_source == NULL) {
1798 rc = -ENOMEM;
1799 goto cifs_rename_exit;
1800 }
1801
1802 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1803 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1804 info_buf_source,
1805 cifs_sb->local_nls,
2baa2682 1806 cifs_remap(cifs_sb));
8d281efb 1807 if (tmprc != 0)
14121bdc 1808 goto unlink_target;
ee2fd967 1809
8ceb9843
PS
1810 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1811 info_buf_target,
1812 cifs_sb->local_nls,
2baa2682 1813 cifs_remap(cifs_sb));
14121bdc 1814
8d281efb 1815 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1816 info_buf_target->UniqueId)) {
14121bdc 1817 /* same file, POSIX says that this is a noop */
ae6884a9 1818 rc = 0;
14121bdc 1819 goto cifs_rename_exit;
ae6884a9 1820 }
8ceb9843
PS
1821 }
1822 /*
1823 * else ... BB we could add the same check for Windows by
1824 * checking the UniqueId via FILE_INTERNAL_INFO
1825 */
14121bdc 1826
ee2fd967 1827unlink_target:
fc6f3943 1828 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1829 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1830 if (d_is_dir(target_dentry))
1831 tmprc = cifs_rmdir(target_dir, target_dentry);
1832 else
1833 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1834 if (tmprc)
1835 goto cifs_rename_exit;
8ceb9843
PS
1836 rc = cifs_do_rename(xid, source_dentry, from_name,
1837 target_dentry, to_name);
1da177e4
LT
1838 }
1839
b46799a8
PS
1840 /* force revalidate to go get info when needed */
1841 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1842
1843 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1844 target_dir->i_mtime = current_time(source_dir);
b46799a8 1845
1da177e4 1846cifs_rename_exit:
ee2fd967 1847 kfree(info_buf_source);
8ceb9843
PS
1848 kfree(from_name);
1849 kfree(to_name);
6d5786a3 1850 free_xid(xid);
7ffec372 1851 cifs_put_tlink(tlink);
1da177e4
LT
1852 return rc;
1853}
1854
df2cf170
JL
1855static bool
1856cifs_inode_needs_reval(struct inode *inode)
1da177e4 1857{
df2cf170 1858 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1859 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1860
57c55cd7
RS
1861 if (cifs_i->time == 0)
1862 return true;
1863
18cceb6a 1864 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1865 return false;
1da177e4 1866
df2cf170
JL
1867 if (!lookupCacheEnabled)
1868 return true;
1da177e4 1869
a87c9ad9
JL
1870 if (!cifs_sb->actimeo)
1871 return true;
1872
6d20e840
SJ
1873 if (!time_in_range(jiffies, cifs_i->time,
1874 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1875 return true;
1876
db19272e 1877 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1878 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1879 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1880 return true;
1881
df2cf170
JL
1882 return false;
1883}
1884
523fb8c8
SJ
1885/*
1886 * Zap the cache. Called when invalid_mapping flag is set.
1887 */
6feb9891 1888int
df2cf170
JL
1889cifs_invalidate_mapping(struct inode *inode)
1890{
6feb9891 1891 int rc = 0;
df2cf170 1892
df2cf170 1893 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1894 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1895 if (rc)
f96637be
JP
1896 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1897 __func__, inode);
df2cf170 1898 }
257fb1f1 1899
9451a9a5 1900 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1901 return rc;
df2cf170
JL
1902}
1903
4f73c7d3
JL
1904/**
1905 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1906 * @word: long word containing the bit lock
1907 */
1908static int
dfd01f02 1909cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1910{
4f73c7d3 1911 freezable_schedule_unsafe();
dfd01f02
PZ
1912 if (signal_pending_state(mode, current))
1913 return -ERESTARTSYS;
4f73c7d3
JL
1914 return 0;
1915}
1916
e284e53f
JL
1917int
1918cifs_revalidate_mapping(struct inode *inode)
1919{
4f73c7d3
JL
1920 int rc;
1921 unsigned long *flags = &CIFS_I(inode)->flags;
1922
74316201
N
1923 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1924 TASK_KILLABLE);
4f73c7d3
JL
1925 if (rc)
1926 return rc;
1927
1928 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1929 rc = cifs_invalidate_mapping(inode);
1930 if (rc)
1931 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1932 }
1933
1934 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1935 smp_mb__after_atomic();
4f73c7d3
JL
1936 wake_up_bit(flags, CIFS_INO_LOCK);
1937
1938 return rc;
1939}
1940
1941int
1942cifs_zap_mapping(struct inode *inode)
1943{
1944 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1945 return cifs_revalidate_mapping(inode);
e284e53f
JL
1946}
1947
6feb9891 1948int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1949{
1950 int rc = 0;
496ad9aa 1951 struct inode *inode = file_inode(filp);
ba00ba64 1952 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1953
1954 if (!cifs_inode_needs_reval(inode))
6feb9891 1955 return rc;
abab095d 1956
13cfb733 1957 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1958 rc = cifs_get_file_info_unix(filp);
1959 else
1960 rc = cifs_get_file_info(filp);
1961
abab095d
JL
1962 return rc;
1963}
1964
6feb9891 1965int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1966{
6d5786a3 1967 unsigned int xid;
df2cf170 1968 int rc = 0;
2b0143b5 1969 struct inode *inode = d_inode(dentry);
df2cf170 1970 struct super_block *sb = dentry->d_sb;
6feb9891 1971 char *full_path = NULL;
df2cf170
JL
1972
1973 if (inode == NULL)
1974 return -ENOENT;
1da177e4 1975
df2cf170 1976 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1977 return rc;
1978
6d5786a3 1979 xid = get_xid();
1da177e4
LT
1980
1981 /* can not safely grab the rename sem here if rename calls revalidate
1982 since that would deadlock */
df2cf170 1983 full_path = build_path_from_dentry(dentry);
1da177e4 1984 if (full_path == NULL) {
0f3bc09e 1985 rc = -ENOMEM;
6feb9891 1986 goto out;
1da177e4
LT
1987 }
1988
f96637be
JP
1989 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
1990 full_path, inode, inode->i_count.counter,
a00be0e3 1991 dentry, cifs_get_time(dentry), jiffies);
1da177e4 1992
0d424ad0 1993 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1994 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1995 else
1996 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1997 xid, NULL);
1da177e4 1998
6feb9891 1999out:
1da177e4 2000 kfree(full_path);
6d5786a3 2001 free_xid(xid);
1da177e4
LT
2002 return rc;
2003}
2004
6feb9891
PS
2005int cifs_revalidate_file(struct file *filp)
2006{
2007 int rc;
496ad9aa 2008 struct inode *inode = file_inode(filp);
6feb9891
PS
2009
2010 rc = cifs_revalidate_file_attr(filp);
2011 if (rc)
2012 return rc;
2013
e284e53f 2014 return cifs_revalidate_mapping(inode);
6feb9891
PS
2015}
2016
2017/* revalidate a dentry's inode attributes */
2018int cifs_revalidate_dentry(struct dentry *dentry)
2019{
2020 int rc;
2b0143b5 2021 struct inode *inode = d_inode(dentry);
6feb9891
PS
2022
2023 rc = cifs_revalidate_dentry_attr(dentry);
2024 if (rc)
2025 return rc;
2026
e284e53f 2027 return cifs_revalidate_mapping(inode);
6feb9891
PS
2028}
2029
a528d35e
DH
2030int cifs_getattr(const struct path *path, struct kstat *stat,
2031 u32 request_mask, unsigned int flags)
1da177e4 2032{
a528d35e 2033 struct dentry *dentry = path->dentry;
3aa1c8c2 2034 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2035 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2036 struct inode *inode = d_inode(dentry);
6feb9891 2037 int rc;
3aa1c8c2 2038
6feb9891
PS
2039 /*
2040 * We need to be sure that all dirty pages are written and the server
2041 * has actual ctime, mtime and file length.
2042 */
18cceb6a 2043 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2044 inode->i_mapping->nrpages != 0) {
2045 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2046 if (rc) {
2047 mapping_set_error(inode->i_mapping, rc);
2048 return rc;
2049 }
6feb9891 2050 }
1c456013 2051
6feb9891
PS
2052 rc = cifs_revalidate_dentry_attr(dentry);
2053 if (rc)
2054 return rc;
2055
2056 generic_fillattr(inode, stat);
2057 stat->blksize = CIFS_MAX_MSGSIZE;
2058 stat->ino = CIFS_I(inode)->uniqueid;
2059
6e70e26d
SF
2060 /* old CIFS Unix Extensions doesn't return create time */
2061 if (CIFS_I(inode)->createtime) {
2062 stat->result_mask |= STATX_BTIME;
2063 stat->btime =
2064 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
2065 }
2066
2067 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2068 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2069 stat->attributes |= STATX_ATTR_COMPRESSED;
2070 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2071 stat->attributes |= STATX_ATTR_ENCRYPTED;
2072
6feb9891 2073 /*
d3d1fce1
JL
2074 * If on a multiuser mount without unix extensions or cifsacl being
2075 * enabled, and the admin hasn't overridden them, set the ownership
2076 * to the fsuid/fsgid of the current process.
6feb9891
PS
2077 */
2078 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2079 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2080 !tcon->unix_ext) {
2081 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2082 stat->uid = current_fsuid();
2083 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2084 stat->gid = current_fsgid();
5fe14c85 2085 }
6feb9891 2086 return rc;
1da177e4
LT
2087}
2088
2089static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2090{
09cbfeaf
KS
2091 pgoff_t index = from >> PAGE_SHIFT;
2092 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2093 struct page *page;
1da177e4
LT
2094 int rc = 0;
2095
2096 page = grab_cache_page(mapping, index);
2097 if (!page)
2098 return -ENOMEM;
2099
09cbfeaf 2100 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2101 unlock_page(page);
09cbfeaf 2102 put_page(page);
1da177e4
LT
2103 return rc;
2104}
2105
1b947463 2106static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2107{
57c55cd7
RS
2108 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2109
ba6a46a0 2110 spin_lock(&inode->i_lock);
3677db10 2111 i_size_write(inode, offset);
ba6a46a0 2112 spin_unlock(&inode->i_lock);
1b947463 2113
57c55cd7
RS
2114 /* Cached inode must be refreshed on truncate */
2115 cifs_i->time = 0;
7caef267 2116 truncate_pagecache(inode, offset);
3677db10
SF
2117}
2118
8efdbde6
JL
2119static int
2120cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2121 unsigned int xid, char *full_path)
8efdbde6
JL
2122{
2123 int rc;
2124 struct cifsFileInfo *open_file;
2125 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2127 struct tcon_link *tlink = NULL;
d1433418
PS
2128 struct cifs_tcon *tcon = NULL;
2129 struct TCP_Server_Info *server;
8efdbde6
JL
2130
2131 /*
2132 * To avoid spurious oplock breaks from server, in the case of
2133 * inodes that we already have open, avoid doing path based
2134 * setting of file size if we can do it by handle.
2135 * This keeps our caching token (oplock) and avoids timeouts
2136 * when the local oplock break takes longer to flush
2137 * writebehind data than the SMB timeout for the SetPathInfo
2138 * request would allow
2139 */
6508d904 2140 open_file = find_writable_file(cifsInode, true);
8efdbde6 2141 if (open_file) {
d1433418
PS
2142 tcon = tlink_tcon(open_file->tlink);
2143 server = tcon->ses->server;
2144 if (server->ops->set_file_size)
2145 rc = server->ops->set_file_size(xid, tcon, open_file,
2146 attrs->ia_size, false);
2147 else
2148 rc = -ENOSYS;
6ab409b5 2149 cifsFileInfo_put(open_file);
f96637be 2150 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2151 } else
2152 rc = -EINVAL;
2153
d1433418
PS
2154 if (!rc)
2155 goto set_size_out;
2156
2157 if (tcon == NULL) {
2158 tlink = cifs_sb_tlink(cifs_sb);
2159 if (IS_ERR(tlink))
2160 return PTR_ERR(tlink);
2161 tcon = tlink_tcon(tlink);
2162 server = tcon->ses->server;
2163 }
ba00ba64 2164
d1433418
PS
2165 /*
2166 * Set file size by pathname rather than by handle either because no
2167 * valid, writeable file handle for it was found or because there was
2168 * an error setting it by handle.
2169 */
2170 if (server->ops->set_path_size)
2171 rc = server->ops->set_path_size(xid, tcon, full_path,
2172 attrs->ia_size, cifs_sb, false);
2173 else
2174 rc = -ENOSYS;
f96637be 2175 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2176
d1433418
PS
2177 if (tlink)
2178 cifs_put_tlink(tlink);
8efdbde6 2179
d1433418 2180set_size_out:
8efdbde6 2181 if (rc == 0) {
fbec9ab9 2182 cifsInode->server_eof = attrs->ia_size;
1b947463 2183 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2184 cifs_truncate_page(inode->i_mapping, inode->i_size);
2185 }
2186
2187 return rc;
2188}
2189
3fe5c1dd
JL
2190static int
2191cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2192{
2193 int rc;
6d5786a3 2194 unsigned int xid;
3fe5c1dd 2195 char *full_path = NULL;
2b0143b5 2196 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2197 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2198 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2199 struct tcon_link *tlink;
96daf2b0 2200 struct cifs_tcon *pTcon;
3fe5c1dd 2201 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2202 struct cifsFileInfo *open_file;
3fe5c1dd 2203
35c265e0
AV
2204 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2205 direntry, attrs->ia_valid);
3fe5c1dd 2206
6d5786a3 2207 xid = get_xid();
3fe5c1dd 2208
db78b877
CH
2209 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2210 attrs->ia_valid |= ATTR_FORCE;
2211
31051c85 2212 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2213 if (rc < 0)
2214 goto out;
3fe5c1dd
JL
2215
2216 full_path = build_path_from_dentry(direntry);
2217 if (full_path == NULL) {
2218 rc = -ENOMEM;
2219 goto out;
2220 }
2221
0f4d634c
JL
2222 /*
2223 * Attempt to flush data before changing attributes. We need to do
2224 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2225 * ownership or mode then we may also need to do this. Here, we take
2226 * the safe way out and just do the flush on all setattr requests. If
2227 * the flush returns error, store it to report later and continue.
2228 *
2229 * BB: This should be smarter. Why bother flushing pages that
2230 * will be truncated anyway? Also, should we error out here if
2231 * the flush returns error?
2232 */
2233 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2234 mapping_set_error(inode->i_mapping, rc);
2235 rc = 0;
3fe5c1dd
JL
2236
2237 if (attrs->ia_valid & ATTR_SIZE) {
2238 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2239 if (rc != 0)
2240 goto out;
2241 }
2242
2243 /* skip mode change if it's just for clearing setuid/setgid */
2244 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2245 attrs->ia_valid &= ~ATTR_MODE;
2246
2247 args = kmalloc(sizeof(*args), GFP_KERNEL);
2248 if (args == NULL) {
2249 rc = -ENOMEM;
2250 goto out;
2251 }
2252
2253 /* set up the struct */
2254 if (attrs->ia_valid & ATTR_MODE)
2255 args->mode = attrs->ia_mode;
2256 else
2257 args->mode = NO_CHANGE_64;
2258
2259 if (attrs->ia_valid & ATTR_UID)
2260 args->uid = attrs->ia_uid;
2261 else
49418b2c 2262 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2263
2264 if (attrs->ia_valid & ATTR_GID)
2265 args->gid = attrs->ia_gid;
2266 else
49418b2c 2267 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2268
2269 if (attrs->ia_valid & ATTR_ATIME)
2270 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2271 else
2272 args->atime = NO_CHANGE_64;
2273
2274 if (attrs->ia_valid & ATTR_MTIME)
2275 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2276 else
2277 args->mtime = NO_CHANGE_64;
2278
2279 if (attrs->ia_valid & ATTR_CTIME)
2280 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2281 else
2282 args->ctime = NO_CHANGE_64;
2283
2284 args->device = 0;
6508d904 2285 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2286 if (open_file) {
4b4de76e 2287 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2288 u32 npid = open_file->pid;
13cfb733 2289 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2290 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2291 cifsFileInfo_put(open_file);
3bbeeb3c 2292 } else {
7ffec372
JL
2293 tlink = cifs_sb_tlink(cifs_sb);
2294 if (IS_ERR(tlink)) {
2295 rc = PTR_ERR(tlink);
2296 goto out;
2297 }
2298 pTcon = tlink_tcon(tlink);
3bbeeb3c 2299 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2300 cifs_sb->local_nls,
bc8ebdc4 2301 cifs_remap(cifs_sb));
7ffec372 2302 cifs_put_tlink(tlink);
3bbeeb3c 2303 }
3fe5c1dd 2304
1025774c
CH
2305 if (rc)
2306 goto out;
ccd4bb1b 2307
1025774c 2308 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2309 attrs->ia_size != i_size_read(inode))
2310 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2311
2312 setattr_copy(inode, attrs);
2313 mark_inode_dirty(inode);
2314
2315 /* force revalidate when any of these times are set since some
2316 of the fs types (eg ext3, fat) do not have fine enough
2317 time granularity to match protocol, and we do not have a
2318 a way (yet) to query the server fs's time granularity (and
2319 whether it rounds times down).
2320 */
2321 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2322 cifsInode->time = 0;
3fe5c1dd
JL
2323out:
2324 kfree(args);
2325 kfree(full_path);
6d5786a3 2326 free_xid(xid);
3fe5c1dd
JL
2327 return rc;
2328}
2329
0510eeb7
JL
2330static int
2331cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2332{
6d5786a3 2333 unsigned int xid;
8abf2775
EB
2334 kuid_t uid = INVALID_UID;
2335 kgid_t gid = INVALID_GID;
2b0143b5 2336 struct inode *inode = d_inode(direntry);
3fe5c1dd 2337 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2338 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2339 char *full_path = NULL;
2340 int rc = -EACCES;
feb3e20c 2341 __u32 dosattr = 0;
4e1e7fb9 2342 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2343
6d5786a3 2344 xid = get_xid();
1da177e4 2345
35c265e0
AV
2346 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2347 direntry, attrs->ia_valid);
6473a559 2348
db78b877
CH
2349 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2350 attrs->ia_valid |= ATTR_FORCE;
2351
31051c85 2352 rc = setattr_prepare(direntry, attrs);
db78b877 2353 if (rc < 0) {
6d5786a3 2354 free_xid(xid);
db78b877 2355 return rc;
6473a559 2356 }
50c2f753 2357
7f57356b 2358 full_path = build_path_from_dentry(direntry);
1da177e4 2359 if (full_path == NULL) {
0f3bc09e 2360 rc = -ENOMEM;
6d5786a3 2361 free_xid(xid);
0f3bc09e 2362 return rc;
1da177e4 2363 }
1da177e4 2364
0f4d634c
JL
2365 /*
2366 * Attempt to flush data before changing attributes. We need to do
2367 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2368 * ownership or mode then we may also need to do this. Here, we take
2369 * the safe way out and just do the flush on all setattr requests. If
2370 * the flush returns error, store it to report later and continue.
2371 *
2372 * BB: This should be smarter. Why bother flushing pages that
2373 * will be truncated anyway? Also, should we error out here if
2374 * the flush returns error?
2375 */
2376 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2377 mapping_set_error(inode->i_mapping, rc);
2378 rc = 0;
cea21805 2379
50531444 2380 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2381 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2382 if (rc != 0)
e30dcf3a 2383 goto cifs_setattr_exit;
1da177e4 2384 }
4ca691a8 2385
a5ff3769
SP
2386 if (attrs->ia_valid & ATTR_UID)
2387 uid = attrs->ia_uid;
2388
2389 if (attrs->ia_valid & ATTR_GID)
2390 gid = attrs->ia_gid;
2391
2392#ifdef CONFIG_CIFS_ACL
2393 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2394 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2395 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2396 uid, gid);
2397 if (rc) {
f96637be
JP
2398 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2399 __func__, rc);
a5ff3769
SP
2400 goto cifs_setattr_exit;
2401 }
2402 }
2403 } else
2404#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2405 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2406 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2407
d32c4f26
JL
2408 /* skip mode change if it's just for clearing setuid/setgid */
2409 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2410 attrs->ia_valid &= ~ATTR_MODE;
2411
1da177e4 2412 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2413 mode = attrs->ia_mode;
cdbce9c8 2414 rc = 0;
79df1bae 2415#ifdef CONFIG_CIFS_ACL
78415d2d 2416 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2417 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2418 INVALID_UID, INVALID_GID);
78415d2d 2419 if (rc) {
f96637be
JP
2420 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2421 __func__, rc);
78415d2d
SP
2422 goto cifs_setattr_exit;
2423 }
2424 } else
79df1bae 2425#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2426 if (((mode & S_IWUGO) == 0) &&
2427 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2428
2429 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2430
5132861a
JL
2431 /* fix up mode if we're not using dynperm */
2432 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2433 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2434 } else if ((mode & S_IWUGO) &&
2435 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2436
2437 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2438 /* Attributes of 0 are ignored */
2439 if (dosattr == 0)
2440 dosattr |= ATTR_NORMAL;
5132861a
JL
2441
2442 /* reset local inode permissions to normal */
2443 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2444 attrs->ia_mode &= ~(S_IALLUGO);
2445 if (S_ISDIR(inode->i_mode))
2446 attrs->ia_mode |=
2447 cifs_sb->mnt_dir_mode;
2448 else
2449 attrs->ia_mode |=
2450 cifs_sb->mnt_file_mode;
2451 }
2452 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2453 /* ignore mode change - ATTR_READONLY hasn't changed */
2454 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2455 }
1da177e4
LT
2456 }
2457
feb3e20c
JL
2458 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2459 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2460 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2461 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2462
e30dcf3a
SF
2463 /* Even if error on time set, no sense failing the call if
2464 the server would set the time to a reasonable value anyway,
2465 and this check ensures that we are not being called from
2466 sys_utimes in which case we ought to fail the call back to
2467 the user when the server rejects the call */
fb8c4b14 2468 if ((rc) && (attrs->ia_valid &
feb3e20c 2469 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2470 rc = 0;
1da177e4
LT
2471 }
2472
2473 /* do not need local check to inode_check_ok since the server does
2474 that */
1025774c
CH
2475 if (rc)
2476 goto cifs_setattr_exit;
2477
2478 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2479 attrs->ia_size != i_size_read(inode))
2480 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2481
2482 setattr_copy(inode, attrs);
2483 mark_inode_dirty(inode);
1025774c 2484
e30dcf3a 2485cifs_setattr_exit:
1da177e4 2486 kfree(full_path);
6d5786a3 2487 free_xid(xid);
1da177e4
LT
2488 return rc;
2489}
2490
0510eeb7
JL
2491int
2492cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2493{
fc64005c 2494 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2495 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2496
2497 if (pTcon->unix_ext)
2498 return cifs_setattr_unix(direntry, attrs);
2499
2500 return cifs_setattr_nounix(direntry, attrs);
2501
2502 /* BB: add cifs_setattr_legacy for really old servers */
2503}
2504
99ee4dbd 2505#if 0
1da177e4
LT
2506void cifs_delete_inode(struct inode *inode)
2507{
f96637be 2508 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2509 /* may have to add back in if and when safe distributed caching of
2510 directories added e.g. via FindNotify */
2511}
99ee4dbd 2512#endif
This page took 1.154677 seconds and 4 git commands to generate.