]> Git Repo - linux.git/blame - fs/cifs/inode.c
smb3: update default requested iosize to 4MB from 1MB for recent dialects
[linux.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French ([email protected])
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
95390201 116 if (timespec64_equal(&inode->i_mtime, &fattr->cf_mtime) &&
df2cf170 117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
95390201
AB
165 inode->i_atime = fattr->cf_atime;
166 inode->i_mtime = fattr->cf_mtime;
167 inode->i_ctime = fattr->cf_ctime;
cc0bad75 168 inode->i_rdev = fattr->cf_rdev;
74d290da 169 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
170 inode->i_uid = fattr->cf_uid;
171 inode->i_gid = fattr->cf_gid;
172
0b8f18e3
JL
173 /* if dynperm is set, don't clobber existing mode */
174 if (inode->i_state & I_NEW ||
175 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
176 inode->i_mode = fattr->cf_mode;
177
cc0bad75 178 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 179
0b8f18e3
JL
180 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
181 cifs_i->time = 0;
182 else
183 cifs_i->time = jiffies;
184
aff8d5ca
JL
185 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
186 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
187 else
188 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 189
835a36ca 190 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
191 /*
192 * Can't safely change the file size here if the client is writing to
193 * it due to potential races.
194 */
cc0bad75
JL
195 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
196 i_size_write(inode, fattr->cf_eof);
197
198 /*
199 * i_blocks is not related to (i_size / i_blksize),
200 * but instead 512 byte (2**9) size is required for
201 * calculating num blocks.
202 */
203 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
204 }
205 spin_unlock(&inode->i_lock);
206
01c64fea
DH
207 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
208 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
209 if (inode->i_state & I_NEW)
210 cifs_set_ops(inode);
cc0bad75
JL
211}
212
4065c802
JL
213void
214cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
215{
216 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
217
218 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
219 return;
220
221 fattr->cf_uniqueid = iunique(sb, ROOT_I);
222}
223
cc0bad75
JL
224/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
225void
226cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
227 struct cifs_sb_info *cifs_sb)
228{
229 memset(fattr, 0, sizeof(*fattr));
230 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
231 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
232 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
233
234 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
235 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
236 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
237 /* old POSIX extensions don't get create time */
238
cc0bad75 239 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
240
241 /*
242 * Since we set the inode type below we need to mask off
243 * to avoid strange results if bits set above.
244 */
cc0bad75 245 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
246 switch (le32_to_cpu(info->Type)) {
247 case UNIX_FILE:
cc0bad75
JL
248 fattr->cf_mode |= S_IFREG;
249 fattr->cf_dtype = DT_REG;
75f12983
CH
250 break;
251 case UNIX_SYMLINK:
cc0bad75
JL
252 fattr->cf_mode |= S_IFLNK;
253 fattr->cf_dtype = DT_LNK;
75f12983
CH
254 break;
255 case UNIX_DIR:
cc0bad75
JL
256 fattr->cf_mode |= S_IFDIR;
257 fattr->cf_dtype = DT_DIR;
75f12983
CH
258 break;
259 case UNIX_CHARDEV:
cc0bad75
JL
260 fattr->cf_mode |= S_IFCHR;
261 fattr->cf_dtype = DT_CHR;
262 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
263 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
264 break;
265 case UNIX_BLOCKDEV:
cc0bad75
JL
266 fattr->cf_mode |= S_IFBLK;
267 fattr->cf_dtype = DT_BLK;
268 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
269 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
270 break;
271 case UNIX_FIFO:
cc0bad75
JL
272 fattr->cf_mode |= S_IFIFO;
273 fattr->cf_dtype = DT_FIFO;
75f12983
CH
274 break;
275 case UNIX_SOCKET:
cc0bad75
JL
276 fattr->cf_mode |= S_IFSOCK;
277 fattr->cf_dtype = DT_SOCK;
75f12983
CH
278 break;
279 default:
280 /* safest to call it a file if we do not know */
cc0bad75
JL
281 fattr->cf_mode |= S_IFREG;
282 fattr->cf_dtype = DT_REG;
f96637be 283 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
284 break;
285 }
286
46bbc25f
EB
287 fattr->cf_uid = cifs_sb->mnt_uid;
288 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
289 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
290 if (id < ((uid_t)-1)) {
291 kuid_t uid = make_kuid(&init_user_ns, id);
292 if (uid_valid(uid))
293 fattr->cf_uid = uid;
294 }
46bbc25f
EB
295 }
296
297 fattr->cf_gid = cifs_sb->mnt_gid;
298 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
299 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
300 if (id < ((gid_t)-1)) {
301 kgid_t gid = make_kgid(&init_user_ns, id);
302 if (gid_valid(gid))
303 fattr->cf_gid = gid;
304 }
46bbc25f 305 }
75f12983 306
cc0bad75 307 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
308}
309
b9a3260f 310/*
cc0bad75
JL
311 * Fill a cifs_fattr struct with fake inode info.
312 *
313 * Needed to setup cifs_fattr data for the directory which is the
314 * junction to the new submount (ie to setup the fake directory
315 * which represents a DFS referral).
b9a3260f 316 */
f1230c97 317static void
cc0bad75 318cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 319{
cc0bad75 320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 321
f96637be 322 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
323
324 memset(fattr, 0, sizeof(*fattr));
325 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
326 fattr->cf_uid = cifs_sb->mnt_uid;
327 fattr->cf_gid = cifs_sb->mnt_gid;
95390201
AB
328 ktime_get_real_ts64(&fattr->cf_mtime);
329 fattr->cf_mtime = timespec64_trunc(fattr->cf_mtime, sb->s_time_gran);
e37fea58 330 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
331 fattr->cf_nlink = 2;
332 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
333}
334
4ad65044
PS
335static int
336cifs_get_file_info_unix(struct file *filp)
abab095d
JL
337{
338 int rc;
6d5786a3 339 unsigned int xid;
abab095d
JL
340 FILE_UNIX_BASIC_INFO find_data;
341 struct cifs_fattr fattr;
496ad9aa 342 struct inode *inode = file_inode(filp);
abab095d 343 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 344 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 345 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 346
6d5786a3 347 xid = get_xid();
4b4de76e 348 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
349 if (!rc) {
350 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
351 } else if (rc == -EREMOTE) {
352 cifs_create_dfs_fattr(&fattr, inode->i_sb);
353 rc = 0;
354 }
355
356 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 357 free_xid(xid);
abab095d
JL
358 return rc;
359}
360
1da177e4 361int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 362 const unsigned char *full_path,
6d5786a3 363 struct super_block *sb, unsigned int xid)
1da177e4 364{
cc0bad75 365 int rc;
0e4bbde9 366 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 367 struct cifs_fattr fattr;
96daf2b0 368 struct cifs_tcon *tcon;
7ffec372 369 struct tcon_link *tlink;
1da177e4 370 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 371
f96637be 372 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 373
7ffec372
JL
374 tlink = cifs_sb_tlink(cifs_sb);
375 if (IS_ERR(tlink))
376 return PTR_ERR(tlink);
377 tcon = tlink_tcon(tlink);
378
1da177e4 379 /* could have done a find first instead but this returns more info */
cc0bad75 380 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 381 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 382 cifs_put_tlink(tlink);
e911d0cc 383
cc0bad75
JL
384 if (!rc) {
385 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
386 } else if (rc == -EREMOTE) {
387 cifs_create_dfs_fattr(&fattr, sb);
388 rc = 0;
389 } else {
390 return rc;
391 }
1da177e4 392
1b12b9c1
SM
393 /* check for Minshall+French symlinks */
394 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
395 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
396 full_path);
1b12b9c1 397 if (tmprc)
cb084b1a 398 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
399 }
400
0e4bbde9 401 if (*pinode == NULL) {
cc0bad75 402 /* get new inode */
4065c802 403 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
404 *pinode = cifs_iget(sb, &fattr);
405 if (!*pinode)
0e4bbde9 406 rc = -ENOMEM;
cc0bad75
JL
407 } else {
408 /* we already have inode, update it */
7196ac11
NA
409
410 /* if uniqueid is different, return error */
411 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
412 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
413 rc = -ESTALE;
414 goto cgiiu_exit;
415 }
416
417 /* if filetype is different, return error */
418 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
419 (fattr.cf_mode & S_IFMT))) {
420 rc = -ESTALE;
421 goto cgiiu_exit;
422 }
423
cc0bad75 424 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 425 }
1da177e4 426
7196ac11 427cgiiu_exit:
1da177e4
LT
428 return rc;
429}
430
0b8f18e3 431static int
0360d605 432cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 433 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
434{
435 int rc;
db8b631d 436 __u32 oplock;
7ffec372 437 struct tcon_link *tlink;
96daf2b0 438 struct cifs_tcon *tcon;
d81b8a40
PS
439 struct cifs_fid fid;
440 struct cifs_open_parms oparms;
d4ffff1f 441 struct cifs_io_parms io_parms;
86c96b4b 442 char buf[24];
d6e2f2a4 443 unsigned int bytes_read;
fb8c4b14 444 char *pbuf;
0360d605 445 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
446
447 pbuf = buf;
448
0b8f18e3
JL
449 fattr->cf_mode &= ~S_IFMT;
450
451 if (fattr->cf_eof == 0) {
452 fattr->cf_mode |= S_IFIFO;
453 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 454 return 0;
0b8f18e3
JL
455 } else if (fattr->cf_eof < 8) {
456 fattr->cf_mode |= S_IFREG;
457 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
458 return -EINVAL; /* EOPNOTSUPP? */
459 }
50c2f753 460
7ffec372
JL
461 tlink = cifs_sb_tlink(cifs_sb);
462 if (IS_ERR(tlink))
463 return PTR_ERR(tlink);
464 tcon = tlink_tcon(tlink);
465
d81b8a40
PS
466 oparms.tcon = tcon;
467 oparms.cifs_sb = cifs_sb;
468 oparms.desired_access = GENERIC_READ;
469 oparms.create_options = CREATE_NOT_DIR;
5e19697b
SF
470 if (backup_cred(cifs_sb))
471 oparms.create_options |= CREATE_OPEN_BACKUP_INTENT;
d81b8a40
PS
472 oparms.disposition = FILE_OPEN;
473 oparms.path = path;
474 oparms.fid = &fid;
475 oparms.reconnect = false;
476
db8b631d
SF
477 if (tcon->ses->server->oplocks)
478 oplock = REQ_OPLOCK;
479 else
480 oplock = 0;
481 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 482 if (rc) {
db8b631d 483 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
484 cifs_put_tlink(tlink);
485 return rc;
486 }
487
488 /* Read header */
d81b8a40 489 io_parms.netfid = fid.netfid;
0360d605
PS
490 io_parms.pid = current->tgid;
491 io_parms.tcon = tcon;
492 io_parms.offset = 0;
493 io_parms.length = 24;
494
db8b631d
SF
495 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
496 &bytes_read, &pbuf, &buf_type);
0360d605
PS
497 if ((rc == 0) && (bytes_read >= 8)) {
498 if (memcmp("IntxBLK", pbuf, 8) == 0) {
499 cifs_dbg(FYI, "Block device\n");
500 fattr->cf_mode |= S_IFBLK;
501 fattr->cf_dtype = DT_BLK;
502 if (bytes_read == 24) {
503 /* we have enough to decode dev num */
504 __u64 mjr; /* major */
505 __u64 mnr; /* minor */
506 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
507 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
508 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 509 }
0360d605
PS
510 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
511 cifs_dbg(FYI, "Char device\n");
512 fattr->cf_mode |= S_IFCHR;
513 fattr->cf_dtype = DT_CHR;
514 if (bytes_read == 24) {
515 /* we have enough to decode dev num */
516 __u64 mjr; /* major */
517 __u64 mnr; /* minor */
518 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
519 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
520 fattr->cf_rdev = MKDEV(mjr, mnr);
521 }
522 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
523 cifs_dbg(FYI, "Symlink\n");
524 fattr->cf_mode |= S_IFLNK;
525 fattr->cf_dtype = DT_LNK;
3020a1f5 526 } else {
0360d605 527 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 528 fattr->cf_dtype = DT_REG;
0360d605 529 rc = -EOPNOTSUPP;
fb8c4b14 530 }
0360d605
PS
531 } else {
532 fattr->cf_mode |= S_IFREG; /* then it is a file */
533 fattr->cf_dtype = DT_REG;
534 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 535 }
db8b631d
SF
536
537 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 538 cifs_put_tlink(tlink);
d6e2f2a4 539 return rc;
d6e2f2a4
SF
540}
541
9e294f1c
SF
542#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
543
0b8f18e3
JL
544/*
545 * Fetch mode bits as provided by SFU.
546 *
547 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
548 */
549static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 550 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 551{
3020a1f5 552#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
553 ssize_t rc;
554 char ea_value[4];
555 __u32 mode;
7ffec372 556 struct tcon_link *tlink;
96daf2b0 557 struct cifs_tcon *tcon;
7ffec372
JL
558
559 tlink = cifs_sb_tlink(cifs_sb);
560 if (IS_ERR(tlink))
561 return PTR_ERR(tlink);
562 tcon = tlink_tcon(tlink);
9e294f1c 563
d979f3b0
SF
564 if (tcon->ses->server->ops->query_all_EAs == NULL) {
565 cifs_put_tlink(tlink);
566 return -EOPNOTSUPP;
567 }
568
569 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
570 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 571 cifs_sb);
7ffec372 572 cifs_put_tlink(tlink);
4523cc30 573 if (rc < 0)
9e294f1c
SF
574 return (int)rc;
575 else if (rc > 3) {
576 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 577 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
578 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
579 mode, fattr->cf_mode);
0b8f18e3 580 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 581 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 582 }
0b8f18e3
JL
583
584 return 0;
3020a1f5
SF
585#else
586 return -EOPNOTSUPP;
587#endif
9e294f1c
SF
588}
589
0b8f18e3 590/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 591static void
0b8f18e3 592cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 593 struct super_block *sb, bool adjust_tz,
eb85d94b 594 bool symlink)
b9a3260f 595{
e37fea58 596 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 597 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 598
0b8f18e3
JL
599 memset(fattr, 0, sizeof(*fattr));
600 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
601 if (info->DeletePending)
602 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
603
604 if (info->LastAccessTime)
605 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58 606 else {
95390201
AB
607 ktime_get_real_ts64(&fattr->cf_atime);
608 fattr->cf_atime = timespec64_trunc(fattr->cf_atime, sb->s_time_gran);
e37fea58 609 }
0b8f18e3
JL
610
611 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
612 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
613
614 if (adjust_tz) {
0d424ad0
JL
615 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
616 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
617 }
618
619 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
620 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 621 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 622
74d290da 623 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
624
625 if (symlink) {
626 fattr->cf_mode = S_IFLNK;
627 fattr->cf_dtype = DT_LNK;
628 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
629 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
630 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
631 /*
632 * Server can return wrong NumberOfLinks value for directories
633 * when Unix extensions are disabled - fake it.
634 */
74d290da
JM
635 if (!tcon->unix_ext)
636 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
637 } else {
638 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
639 fattr->cf_dtype = DT_REG;
0b8f18e3 640
d0c280d2
JL
641 /* clear write bits if ATTR_READONLY is set */
642 if (fattr->cf_cifsattrs & ATTR_READONLY)
643 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 644
74d290da
JM
645 /*
646 * Don't accept zero nlink from non-unix servers unless
647 * delete is pending. Instead mark it as unknown.
648 */
649 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
650 !info->DeletePending) {
651 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 652 fattr->cf_nlink);
74d290da 653 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 654 }
6de2ce42 655 }
0b8f18e3
JL
656
657 fattr->cf_uid = cifs_sb->mnt_uid;
658 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
659}
660
4ad65044
PS
661static int
662cifs_get_file_info(struct file *filp)
abab095d
JL
663{
664 int rc;
6d5786a3 665 unsigned int xid;
abab095d
JL
666 FILE_ALL_INFO find_data;
667 struct cifs_fattr fattr;
496ad9aa 668 struct inode *inode = file_inode(filp);
c21dfb69 669 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 670 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
671 struct TCP_Server_Info *server = tcon->ses->server;
672
673 if (!server->ops->query_file_info)
674 return -ENOSYS;
abab095d 675
6d5786a3 676 xid = get_xid();
4ad65044 677 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
678 switch (rc) {
679 case 0:
e37fea58 680 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 681 false);
42274bb2
PS
682 break;
683 case -EREMOTE:
684 cifs_create_dfs_fattr(&fattr, inode->i_sb);
685 rc = 0;
686 break;
687 case -EOPNOTSUPP:
688 case -EINVAL:
abab095d
JL
689 /*
690 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
691 * for now, just skip revalidating and mark inode for
692 * immediate reval.
693 */
abab095d
JL
694 rc = 0;
695 CIFS_I(inode)->time = 0;
42274bb2 696 default:
abab095d 697 goto cgfi_exit;
42274bb2 698 }
abab095d
JL
699
700 /*
701 * don't bother with SFU junk here -- just mark inode as needing
702 * revalidation.
703 */
abab095d
JL
704 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
705 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
706 cifs_fattr_to_inode(inode, &fattr);
707cgfi_exit:
6d5786a3 708 free_xid(xid);
abab095d
JL
709 return rc;
710}
711
7ea884c7
SF
712/* Simple function to return a 64 bit hash of string. Rarely called */
713static __u64 simple_hashstr(const char *str)
714{
3995bbf5 715 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
716 __u64 hash = 0;
717
718 while (*str)
719 hash = (hash + (__u64) *str++) * hash_mult;
720
721 return hash;
722}
723
1208ef1f
PS
724int
725cifs_get_inode_info(struct inode **inode, const char *full_path,
726 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 727 const struct cifs_fid *fid)
1da177e4 728{
c052e2b4
SP
729 bool validinum = false;
730 __u16 srchflgs;
731 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
732 struct cifs_tcon *tcon;
733 struct TCP_Server_Info *server;
7ffec372 734 struct tcon_link *tlink;
1da177e4 735 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 736 char *buf = NULL;
1208ef1f 737 bool adjust_tz = false;
0b8f18e3 738 struct cifs_fattr fattr;
c052e2b4 739 struct cifs_search_info *srchinf = NULL;
eb85d94b 740 bool symlink = false;
1da177e4 741
7ffec372
JL
742 tlink = cifs_sb_tlink(cifs_sb);
743 if (IS_ERR(tlink))
744 return PTR_ERR(tlink);
1208ef1f
PS
745 tcon = tlink_tcon(tlink);
746 server = tcon->ses->server;
7ffec372 747
f96637be 748 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 749
1208ef1f 750 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
751 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
752 CIFS_I(*inode)->time != 0) {
f96637be 753 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 754 goto cgii_exit;
1da177e4
LT
755 }
756 }
757
1208ef1f
PS
758 /* if inode info is not passed, get it from server */
759 if (data == NULL) {
760 if (!server->ops->query_path_info) {
761 rc = -ENOSYS;
762 goto cgii_exit;
763 }
1da177e4 764 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
765 if (buf == NULL) {
766 rc = -ENOMEM;
767 goto cgii_exit;
768 }
1208ef1f
PS
769 data = (FILE_ALL_INFO *)buf;
770 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 771 data, &adjust_tz, &symlink);
1da177e4 772 }
0b8f18e3
JL
773
774 if (!rc) {
e37fea58 775 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 776 symlink);
0b8f18e3
JL
777 } else if (rc == -EREMOTE) {
778 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 779 rc = 0;
c052e2b4
SP
780 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
781 srchinf = kzalloc(sizeof(struct cifs_search_info),
782 GFP_KERNEL);
783 if (srchinf == NULL) {
784 rc = -ENOMEM;
785 goto cgii_exit;
786 }
787
788 srchinf->endOfSearch = false;
789 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
790
791 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
792 CIFS_SEARCH_CLOSE_AT_END |
793 CIFS_SEARCH_BACKUP_SEARCH;
794
795 rc = CIFSFindFirst(xid, tcon, full_path,
796 cifs_sb, NULL, srchflgs, srchinf, false);
797 if (!rc) {
798 data =
799 (FILE_ALL_INFO *)srchinf->srch_entries_start;
800
801 cifs_dir_info_to_fattr(&fattr,
802 (FILE_DIRECTORY_INFO *)data, cifs_sb);
803 fattr.cf_uniqueid = le64_to_cpu(
804 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
805 validinum = true;
806
807 cifs_buf_release(srchinf->ntwrk_buf_start);
808 }
809 kfree(srchinf);
4c5930e8
SF
810 if (rc)
811 goto cgii_exit;
c052e2b4 812 } else
7962670e 813 goto cgii_exit;
1da177e4 814
0b8f18e3
JL
815 /*
816 * If an inode wasn't passed in, then get the inode number
817 *
818 * Is an i_ino of zero legal? Can we use that to check if the server
819 * supports returning inode numbers? Are there other sanity checks we
820 * can use to ensure that the server is really filling in that field?
0b8f18e3 821 */
1208ef1f 822 if (*inode == NULL) {
b9a3260f 823 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
824 if (validinum == false) {
825 if (server->ops->get_srv_inum)
826 tmprc = server->ops->get_srv_inum(xid,
827 tcon, cifs_sb, full_path,
828 &fattr.cf_uniqueid, data);
829 if (tmprc) {
f96637be
JP
830 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
831 tmprc);
c052e2b4
SP
832 fattr.cf_uniqueid = iunique(sb, ROOT_I);
833 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
834 } else if ((fattr.cf_uniqueid == 0) &&
835 strlen(full_path) == 0) {
836 /* some servers ret bad root ino ie 0 */
837 cifs_dbg(FYI, "Invalid (0) inodenum\n");
838 fattr.cf_flags |=
839 CIFS_FATTR_FAKE_ROOT_INO;
840 fattr.cf_uniqueid =
841 simple_hashstr(tcon->treeName);
c052e2b4 842 }
132ac7b7 843 }
c052e2b4 844 } else
0b8f18e3 845 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
846 } else {
847 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
848 validinum == false && server->ops->get_srv_inum) {
849 /*
850 * Pass a NULL tcon to ensure we don't make a round
851 * trip to the server. This only works for SMB2+.
852 */
853 tmprc = server->ops->get_srv_inum(xid,
854 NULL, cifs_sb, full_path,
855 &fattr.cf_uniqueid, data);
856 if (tmprc)
857 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
858 else if ((fattr.cf_uniqueid == 0) &&
859 strlen(full_path) == 0) {
860 /*
861 * Reuse existing root inode num since
862 * inum zero for root causes ls of . and .. to
863 * not be returned
864 */
865 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
866 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
867 }
a108471b
RL
868 } else
869 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
870 }
b9a3260f 871
0b8f18e3
JL
872 /* query for SFU type info if supported and needed */
873 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
874 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
875 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
876 if (tmprc)
f96637be 877 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 878 }
1da177e4 879
79df1bae 880#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
881 /* fill in 0777 bits from ACL */
882 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 883 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 884 if (rc) {
f96637be
JP
885 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
886 __func__, rc);
78415d2d
SP
887 goto cgii_exit;
888 }
b9a3260f 889 }
79df1bae 890#endif /* CONFIG_CIFS_ACL */
b9a3260f 891
0b8f18e3
JL
892 /* fill in remaining high mode bits e.g. SUID, VTX */
893 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
894 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 895
1b12b9c1
SM
896 /* check for Minshall+French symlinks */
897 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
898 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
899 full_path);
1b12b9c1 900 if (tmprc)
cb084b1a 901 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
902 }
903
1208ef1f
PS
904 if (!*inode) {
905 *inode = cifs_iget(sb, &fattr);
906 if (!*inode)
0b8f18e3
JL
907 rc = -ENOMEM;
908 } else {
7196ac11
NA
909 /* we already have inode, update it */
910
a108471b
RL
911 /* if uniqueid is different, return error */
912 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
913 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
914 rc = -ESTALE;
915 goto cgii_exit;
916 }
917
7196ac11
NA
918 /* if filetype is different, return error */
919 if (unlikely(((*inode)->i_mode & S_IFMT) !=
920 (fattr.cf_mode & S_IFMT))) {
921 rc = -ESTALE;
922 goto cgii_exit;
923 }
924
1208ef1f 925 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 926 }
b9a3260f 927
7962670e 928cgii_exit:
7ea884c7
SF
929 if ((*inode) && ((*inode)->i_ino == 0))
930 cifs_dbg(FYI, "inode number of zero returned\n");
931
1da177e4 932 kfree(buf);
7ffec372 933 cifs_put_tlink(tlink);
1da177e4
LT
934 return rc;
935}
936
7f8ed420
SF
937static const struct inode_operations cifs_ipc_inode_ops = {
938 .lookup = cifs_lookup,
939};
940
cc0bad75
JL
941static int
942cifs_find_inode(struct inode *inode, void *opaque)
943{
944 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
945
f30b9c11 946 /* don't match inode with different uniqueid */
cc0bad75
JL
947 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
948 return 0;
949
20054bd6
JL
950 /* use createtime like an i_generation field */
951 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
952 return 0;
953
f30b9c11
JL
954 /* don't match inode of different type */
955 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
956 return 0;
957
5acfec25 958 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 959 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 960 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 961
cc0bad75
JL
962 return 1;
963}
964
965static int
966cifs_init_inode(struct inode *inode, void *opaque)
967{
968 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
969
970 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 971 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
972 return 0;
973}
974
5acfec25
JL
975/*
976 * walk dentry list for an inode and report whether it has aliases that
977 * are hashed. We use this to determine if a directory inode can actually
978 * be used.
979 */
980static bool
981inode_has_hashed_dentries(struct inode *inode)
982{
983 struct dentry *dentry;
984
873feea0 985 spin_lock(&inode->i_lock);
946e51f2 986 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 987 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 988 spin_unlock(&inode->i_lock);
5acfec25
JL
989 return true;
990 }
991 }
873feea0 992 spin_unlock(&inode->i_lock);
5acfec25
JL
993 return false;
994}
995
cc0bad75
JL
996/* Given fattrs, get a corresponding inode */
997struct inode *
998cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
999{
1000 unsigned long hash;
1001 struct inode *inode;
1002
3d694380 1003retry_iget5_locked:
f96637be 1004 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1005
1006 /* hash down to 32-bits on 32-bit arch */
1007 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1008
1009 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1010 if (inode) {
5acfec25 1011 /* was there a potentially problematic inode collision? */
3d694380 1012 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1013 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1014
1015 if (inode_has_hashed_dentries(inode)) {
1016 cifs_autodisable_serverino(CIFS_SB(sb));
1017 iput(inode);
1018 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1019 goto retry_iget5_locked;
1020 }
3d694380
JL
1021 }
1022
cc0bad75 1023 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1024 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1025 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1026 if (inode->i_state & I_NEW) {
1027 inode->i_ino = hash;
0ccd4802 1028#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1029 /* initialize per-inode cache cookie pointer */
1030 CIFS_I(inode)->fscache = NULL;
0ccd4802 1031#endif
cc0bad75
JL
1032 unlock_new_inode(inode);
1033 }
1034 }
1035
1036 return inode;
1037}
1038
1da177e4 1039/* gets root inode */
9b6763e0 1040struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1041{
6d5786a3 1042 unsigned int xid;
0d424ad0 1043 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1044 struct inode *inode = NULL;
ce634ab2 1045 long rc;
96daf2b0 1046 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1047 char *path = NULL;
1048 int len;
1049
1050 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1051 && cifs_sb->prepath) {
1052 len = strlen(cifs_sb->prepath);
1053 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1054 if (path == NULL)
1055 return ERR_PTR(-ENOMEM);
1056 path[0] = '/';
1057 memcpy(path+1, cifs_sb->prepath, len);
1058 } else {
1059 path = kstrdup("", GFP_KERNEL);
1060 if (path == NULL)
1061 return ERR_PTR(-ENOMEM);
1062 }
ce634ab2 1063
6d5786a3 1064 xid = get_xid();
b5b374ea 1065 if (tcon->unix_ext) {
a6b5058f 1066 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1067 /* some servers mistakenly claim POSIX support */
1068 if (rc != -EOPNOTSUPP)
1069 goto iget_no_retry;
1070 cifs_dbg(VFS, "server does not support POSIX extensions");
1071 tcon->unix_ext = false;
1072 }
1073
a6b5058f
AA
1074 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1075 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1076
b5b374ea 1077iget_no_retry:
a7851ce7
OS
1078 if (!inode) {
1079 inode = ERR_PTR(rc);
1080 goto out;
1081 }
cc0bad75 1082
0ccd4802 1083#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1084 /* populate tcon->resource_id */
0d424ad0 1085 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1086#endif
d03382ce 1087
b327a717 1088 if (rc && tcon->pipe) {
f96637be 1089 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1090 spin_lock(&inode->i_lock);
7f8ed420 1091 inode->i_mode |= S_IFDIR;
bfe86848 1092 set_nlink(inode, 2);
7f8ed420
SF
1093 inode->i_op = &cifs_ipc_inode_ops;
1094 inode->i_fop = &simple_dir_operations;
1095 inode->i_uid = cifs_sb->mnt_uid;
1096 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1097 spin_unlock(&inode->i_lock);
ad661334 1098 } else if (rc) {
ce634ab2 1099 iget_failed(inode);
a7851ce7 1100 inode = ERR_PTR(rc);
7f8ed420
SF
1101 }
1102
a7851ce7 1103out:
a6b5058f 1104 kfree(path);
31cd106b 1105 free_xid(xid);
ce634ab2 1106 return inode;
1da177e4
LT
1107}
1108
ed6875e0 1109int
6d5786a3 1110cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1111 char *full_path, __u32 dosattr)
388e57b2 1112{
388e57b2 1113 bool set_time = false;
388e57b2 1114 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1115 struct TCP_Server_Info *server;
388e57b2
SF
1116 FILE_BASIC_INFO info_buf;
1117
1adcb710
SF
1118 if (attrs == NULL)
1119 return -EINVAL;
1120
6bdf6dbd
PS
1121 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1122 if (!server->ops->set_file_info)
1123 return -ENOSYS;
1124
fd09b7d3
SF
1125 info_buf.Pad = 0;
1126
388e57b2
SF
1127 if (attrs->ia_valid & ATTR_ATIME) {
1128 set_time = true;
1129 info_buf.LastAccessTime =
95390201 1130 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
388e57b2
SF
1131 } else
1132 info_buf.LastAccessTime = 0;
1133
1134 if (attrs->ia_valid & ATTR_MTIME) {
1135 set_time = true;
1136 info_buf.LastWriteTime =
95390201 1137 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
388e57b2
SF
1138 } else
1139 info_buf.LastWriteTime = 0;
1140
1141 /*
1142 * Samba throws this field away, but windows may actually use it.
1143 * Do not set ctime unless other time stamps are changed explicitly
1144 * (i.e. by utimes()) since we would then have a mix of client and
1145 * server times.
1146 */
1147 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1148 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2 1149 info_buf.ChangeTime =
95390201 1150 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
388e57b2
SF
1151 } else
1152 info_buf.ChangeTime = 0;
1153
1154 info_buf.CreationTime = 0; /* don't change */
1155 info_buf.Attributes = cpu_to_le32(dosattr);
1156
6bdf6dbd 1157 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1158}
1159
a12a1ac7 1160/*
ed6875e0 1161 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1162 * and rename it to a random name that hopefully won't conflict with
1163 * anything else.
1164 */
ed6875e0
PS
1165int
1166cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1167 const unsigned int xid)
a12a1ac7
JL
1168{
1169 int oplock = 0;
1170 int rc;
d81b8a40
PS
1171 struct cifs_fid fid;
1172 struct cifs_open_parms oparms;
2b0143b5 1173 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1174 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1175 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1176 struct tcon_link *tlink;
96daf2b0 1177 struct cifs_tcon *tcon;
3270958b
SF
1178 __u32 dosattr, origattr;
1179 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1180
7ffec372
JL
1181 tlink = cifs_sb_tlink(cifs_sb);
1182 if (IS_ERR(tlink))
1183 return PTR_ERR(tlink);
1184 tcon = tlink_tcon(tlink);
1185
c483a984
SP
1186 /*
1187 * We cannot rename the file if the server doesn't support
1188 * CAP_INFOLEVEL_PASSTHRU
1189 */
1190 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1191 rc = -EBUSY;
1192 goto out;
1193 }
1194
d81b8a40
PS
1195 oparms.tcon = tcon;
1196 oparms.cifs_sb = cifs_sb;
1197 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1198 oparms.create_options = CREATE_NOT_DIR;
1199 oparms.disposition = FILE_OPEN;
1200 oparms.path = full_path;
1201 oparms.fid = &fid;
1202 oparms.reconnect = false;
1203
1204 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1205 if (rc != 0)
1206 goto out;
1207
3270958b
SF
1208 origattr = cifsInode->cifsAttrs;
1209 if (origattr == 0)
1210 origattr |= ATTR_NORMAL;
1211
1212 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1213 if (dosattr == 0)
1214 dosattr |= ATTR_NORMAL;
1215 dosattr |= ATTR_HIDDEN;
1216
3270958b
SF
1217 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1218 if (dosattr != origattr) {
1219 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1220 if (info_buf == NULL) {
1221 rc = -ENOMEM;
1222 goto out_close;
1223 }
1224 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1225 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1226 current->tgid);
1227 /* although we would like to mark the file hidden
1228 if that fails we will still try to rename it */
72d282dc 1229 if (!rc)
3270958b
SF
1230 cifsInode->cifsAttrs = dosattr;
1231 else
1232 dosattr = origattr; /* since not able to change them */
a12a1ac7 1233 }
a12a1ac7 1234
dd1db2de 1235 /* rename the file */
d81b8a40
PS
1236 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1237 cifs_sb->local_nls,
2baa2682 1238 cifs_remap(cifs_sb));
3270958b 1239 if (rc != 0) {
47c78f4a 1240 rc = -EBUSY;
3270958b
SF
1241 goto undo_setattr;
1242 }
6d22f098 1243
3270958b 1244 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1245 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1246 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1247 current->tgid);
1248 /*
1249 * some samba versions return -ENOENT when we try to set the
1250 * file disposition here. Likely a samba bug, but work around
1251 * it for now. This means that some cifsXXX files may hang
1252 * around after they shouldn't.
1253 *
1254 * BB: remove this hack after more servers have the fix
1255 */
1256 if (rc == -ENOENT)
1257 rc = 0;
1258 else if (rc != 0) {
47c78f4a 1259 rc = -EBUSY;
3270958b
SF
1260 goto undo_rename;
1261 }
aff8d5ca 1262 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1263 }
7ce86d5a 1264
a12a1ac7 1265out_close:
d81b8a40 1266 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1267out:
3270958b 1268 kfree(info_buf);
7ffec372 1269 cifs_put_tlink(tlink);
a12a1ac7 1270 return rc;
3270958b
SF
1271
1272 /*
1273 * reset everything back to the original state. Don't bother
1274 * dealing with errors here since we can't do anything about
1275 * them anyway.
1276 */
1277undo_rename:
d81b8a40 1278 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1279 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1280undo_setattr:
1281 if (dosattr != origattr) {
1282 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1283 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1284 current->tgid))
1285 cifsInode->cifsAttrs = origattr;
1286 }
1287
1288 goto out_close;
a12a1ac7
JL
1289}
1290
b7ca6928
SF
1291/* copied from fs/nfs/dir.c with small changes */
1292static void
1293cifs_drop_nlink(struct inode *inode)
1294{
1295 spin_lock(&inode->i_lock);
1296 if (inode->i_nlink > 0)
1297 drop_nlink(inode);
1298 spin_unlock(&inode->i_lock);
1299}
ff694527
SF
1300
1301/*
2b0143b5 1302 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1303 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1304 * if that fails we can not attempt the fall back mechanisms on EACCESS
1305 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1306 * unlink on negative dentries currently.
1307 */
5f0319a7 1308int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1309{
1310 int rc = 0;
6d5786a3 1311 unsigned int xid;
1da177e4 1312 char *full_path = NULL;
2b0143b5 1313 struct inode *inode = d_inode(dentry);
ff694527 1314 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1315 struct super_block *sb = dir->i_sb;
1316 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1317 struct tcon_link *tlink;
96daf2b0 1318 struct cifs_tcon *tcon;
ed6875e0 1319 struct TCP_Server_Info *server;
6050247d
SF
1320 struct iattr *attrs = NULL;
1321 __u32 dosattr = 0, origattr = 0;
1da177e4 1322
f96637be 1323 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1324
7ffec372
JL
1325 tlink = cifs_sb_tlink(cifs_sb);
1326 if (IS_ERR(tlink))
1327 return PTR_ERR(tlink);
1328 tcon = tlink_tcon(tlink);
ed6875e0 1329 server = tcon->ses->server;
7ffec372 1330
6d5786a3 1331 xid = get_xid();
1da177e4 1332
5f0319a7
JL
1333 /* Unlink can be called from rename so we can not take the
1334 * sb->s_vfs_rename_mutex here */
1335 full_path = build_path_from_dentry(dentry);
1da177e4 1336 if (full_path == NULL) {
0f3bc09e 1337 rc = -ENOMEM;
7ffec372 1338 goto unlink_out;
1da177e4 1339 }
2d785a50 1340
29e20f9c
PS
1341 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1342 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1343 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1344 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1345 cifs_remap(cifs_sb));
f96637be 1346 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1347 if ((rc == 0) || (rc == -ENOENT))
1348 goto psx_del_no_retry;
1349 }
1da177e4 1350
6050247d 1351retry_std_delete:
ed6875e0
PS
1352 if (!server->ops->unlink) {
1353 rc = -ENOSYS;
1354 goto psx_del_no_retry;
1355 }
1356
1357 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1358
2d785a50 1359psx_del_no_retry:
1da177e4 1360 if (!rc) {
5f0319a7 1361 if (inode)
b7ca6928 1362 cifs_drop_nlink(inode);
1da177e4 1363 } else if (rc == -ENOENT) {
5f0319a7 1364 d_drop(dentry);
47c78f4a 1365 } else if (rc == -EBUSY) {
ed6875e0
PS
1366 if (server->ops->rename_pending_delete) {
1367 rc = server->ops->rename_pending_delete(full_path,
1368 dentry, xid);
1369 if (rc == 0)
1370 cifs_drop_nlink(inode);
1371 }
ff694527 1372 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1373 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1374 if (attrs == NULL) {
1375 rc = -ENOMEM;
1376 goto out_reval;
1da177e4 1377 }
388e57b2
SF
1378
1379 /* try to reset dos attributes */
ff694527
SF
1380 cifs_inode = CIFS_I(inode);
1381 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1382 if (origattr == 0)
1383 origattr |= ATTR_NORMAL;
1384 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1385 if (dosattr == 0)
1386 dosattr |= ATTR_NORMAL;
1387 dosattr |= ATTR_HIDDEN;
1388
1389 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1390 if (rc != 0)
1391 goto out_reval;
6050247d
SF
1392
1393 goto retry_std_delete;
1da177e4 1394 }
6050247d
SF
1395
1396 /* undo the setattr if we errored out and it's needed */
1397 if (rc != 0 && dosattr != 0)
1398 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1399
388e57b2 1400out_reval:
4523cc30 1401 if (inode) {
ff694527
SF
1402 cifs_inode = CIFS_I(inode);
1403 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1404 when needed */
e37fea58 1405 inode->i_ctime = current_time(inode);
06bcfedd 1406 }
e37fea58 1407 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1408 cifs_inode = CIFS_I(dir);
6050247d 1409 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1410unlink_out:
1da177e4 1411 kfree(full_path);
6050247d 1412 kfree(attrs);
6d5786a3 1413 free_xid(xid);
7ffec372 1414 cifs_put_tlink(tlink);
1da177e4
LT
1415 return rc;
1416}
1417
ff691e96 1418static int
101b92d9 1419cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1420 const char *full_path, struct cifs_sb_info *cifs_sb,
1421 struct cifs_tcon *tcon, const unsigned int xid)
1422{
1423 int rc = 0;
101b92d9 1424 struct inode *inode = NULL;
ff691e96
PS
1425
1426 if (tcon->unix_ext)
101b92d9 1427 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1428 xid);
1429 else
101b92d9
JL
1430 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1431 xid, NULL);
1432
ff691e96
PS
1433 if (rc)
1434 return rc;
1435
ff691e96
PS
1436 /*
1437 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1438 * from the server or was set bogus. Also, since this is a brand new
1439 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1440 */
101b92d9
JL
1441 if (inode->i_nlink < 2)
1442 set_nlink(inode, 2);
ff691e96
PS
1443 mode &= ~current_umask();
1444 /* must turn on setgid bit if parent dir has it */
101b92d9 1445 if (parent->i_mode & S_ISGID)
ff691e96
PS
1446 mode |= S_ISGID;
1447
1448 if (tcon->unix_ext) {
1449 struct cifs_unix_set_info_args args = {
1450 .mode = mode,
1451 .ctime = NO_CHANGE_64,
1452 .atime = NO_CHANGE_64,
1453 .mtime = NO_CHANGE_64,
1454 .device = 0,
1455 };
1456 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1457 args.uid = current_fsuid();
101b92d9 1458 if (parent->i_mode & S_ISGID)
49418b2c 1459 args.gid = parent->i_gid;
ff691e96 1460 else
49418b2c 1461 args.gid = current_fsgid();
ff691e96 1462 } else {
49418b2c
EB
1463 args.uid = INVALID_UID; /* no change */
1464 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1465 }
1466 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1467 cifs_sb->local_nls,
2baa2682 1468 cifs_remap(cifs_sb));
ff691e96 1469 } else {
f436720e 1470 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1471 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1472 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1473 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1474 tcon, xid);
101b92d9
JL
1475 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1476 inode->i_mode = (mode | S_IFDIR);
1477
1478 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1479 inode->i_uid = current_fsuid();
1480 if (inode->i_mode & S_ISGID)
1481 inode->i_gid = parent->i_gid;
1482 else
1483 inode->i_gid = current_fsgid();
ff691e96
PS
1484 }
1485 }
101b92d9 1486 d_instantiate(dentry, inode);
ff691e96
PS
1487 return rc;
1488}
1489
1490static int
1491cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1492 const char *full_path, struct cifs_sb_info *cifs_sb,
1493 struct cifs_tcon *tcon, const unsigned int xid)
1494{
1495 int rc = 0;
1496 u32 oplock = 0;
1497 FILE_UNIX_BASIC_INFO *info = NULL;
1498 struct inode *newinode = NULL;
1499 struct cifs_fattr fattr;
1500
1501 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1502 if (info == NULL) {
1503 rc = -ENOMEM;
1504 goto posix_mkdir_out;
1505 }
1506
1507 mode &= ~current_umask();
1508 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1509 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1510 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1511 if (rc == -EOPNOTSUPP)
1512 goto posix_mkdir_out;
1513 else if (rc) {
f96637be 1514 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1515 d_drop(dentry);
1516 goto posix_mkdir_out;
1517 }
1518
1519 if (info->Type == cpu_to_le32(-1))
1520 /* no return info, go query for it */
1521 goto posix_mkdir_get_info;
1522 /*
1523 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1524 * need to set uid/gid.
1525 */
1526
1527 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1528 cifs_fill_uniqueid(inode->i_sb, &fattr);
1529 newinode = cifs_iget(inode->i_sb, &fattr);
1530 if (!newinode)
1531 goto posix_mkdir_get_info;
1532
1533 d_instantiate(dentry, newinode);
1534
1535#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1536 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1537 dentry, dentry, newinode);
ff691e96
PS
1538
1539 if (newinode->i_nlink != 2)
f96637be
JP
1540 cifs_dbg(FYI, "unexpected number of links %d\n",
1541 newinode->i_nlink);
ff691e96
PS
1542#endif
1543
1544posix_mkdir_out:
1545 kfree(info);
1546 return rc;
1547posix_mkdir_get_info:
1548 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1549 xid);
1550 goto posix_mkdir_out;
1551}
1552
18bb1db3 1553int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1554{
ff691e96 1555 int rc = 0;
6d5786a3 1556 unsigned int xid;
1da177e4 1557 struct cifs_sb_info *cifs_sb;
7ffec372 1558 struct tcon_link *tlink;
29e20f9c 1559 struct cifs_tcon *tcon;
f436720e 1560 struct TCP_Server_Info *server;
ff691e96 1561 char *full_path;
1da177e4 1562
f96637be
JP
1563 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1564 mode, inode);
1da177e4 1565
1da177e4 1566 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1567 tlink = cifs_sb_tlink(cifs_sb);
1568 if (IS_ERR(tlink))
1569 return PTR_ERR(tlink);
29e20f9c 1570 tcon = tlink_tcon(tlink);
7ffec372 1571
6d5786a3 1572 xid = get_xid();
1da177e4 1573
7f57356b 1574 full_path = build_path_from_dentry(direntry);
1da177e4 1575 if (full_path == NULL) {
0f3bc09e 1576 rc = -ENOMEM;
7ffec372 1577 goto mkdir_out;
1da177e4 1578 }
50c2f753 1579
bea851b8
SF
1580 server = tcon->ses->server;
1581
bea851b8
SF
1582 if ((server->ops->posix_mkdir) && (tcon->posix_extensions)) {
1583 rc = server->ops->posix_mkdir(xid, inode, mode, tcon, full_path,
1584 cifs_sb);
1585 d_drop(direntry); /* for time being always refresh inode info */
1586 goto mkdir_out;
1587 }
bea851b8 1588
29e20f9c
PS
1589 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1590 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1591 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1592 tcon, xid);
1593 if (rc != -EOPNOTSUPP)
2dd29d31 1594 goto mkdir_out;
fb8c4b14 1595 }
ff691e96 1596
f436720e
PS
1597 if (!server->ops->mkdir) {
1598 rc = -ENOSYS;
1599 goto mkdir_out;
1600 }
1601
1da177e4 1602 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1603 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1604 if (rc) {
f96637be 1605 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1606 d_drop(direntry);
ff691e96 1607 goto mkdir_out;
1da177e4 1608 }
ff691e96
PS
1609
1610 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1611 xid);
fb8c4b14 1612mkdir_out:
6de2ce42
PS
1613 /*
1614 * Force revalidate to get parent dir info when needed since cached
1615 * attributes are invalid now.
1616 */
1617 CIFS_I(inode)->time = 0;
1da177e4 1618 kfree(full_path);
6d5786a3 1619 free_xid(xid);
7ffec372 1620 cifs_put_tlink(tlink);
1da177e4
LT
1621 return rc;
1622}
1623
1624int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1625{
1626 int rc = 0;
6d5786a3 1627 unsigned int xid;
1da177e4 1628 struct cifs_sb_info *cifs_sb;
7ffec372 1629 struct tcon_link *tlink;
f958ca5d
PS
1630 struct cifs_tcon *tcon;
1631 struct TCP_Server_Info *server;
1da177e4
LT
1632 char *full_path = NULL;
1633 struct cifsInodeInfo *cifsInode;
1634
f96637be 1635 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1636
6d5786a3 1637 xid = get_xid();
1da177e4 1638
7f57356b 1639 full_path = build_path_from_dentry(direntry);
1da177e4 1640 if (full_path == NULL) {
0f3bc09e 1641 rc = -ENOMEM;
7ffec372 1642 goto rmdir_exit;
1da177e4
LT
1643 }
1644
7ffec372
JL
1645 cifs_sb = CIFS_SB(inode->i_sb);
1646 tlink = cifs_sb_tlink(cifs_sb);
1647 if (IS_ERR(tlink)) {
1648 rc = PTR_ERR(tlink);
1649 goto rmdir_exit;
1650 }
f958ca5d
PS
1651 tcon = tlink_tcon(tlink);
1652 server = tcon->ses->server;
1653
1654 if (!server->ops->rmdir) {
1655 rc = -ENOSYS;
1656 cifs_put_tlink(tlink);
1657 goto rmdir_exit;
1658 }
7ffec372 1659
f958ca5d 1660 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1661 cifs_put_tlink(tlink);
1da177e4
LT
1662
1663 if (!rc) {
2b0143b5
DH
1664 spin_lock(&d_inode(direntry)->i_lock);
1665 i_size_write(d_inode(direntry), 0);
1666 clear_nlink(d_inode(direntry));
1667 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1668 }
1669
2b0143b5 1670 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1671 /* force revalidate to go get info when needed */
1672 cifsInode->time = 0;
42c24544
SF
1673
1674 cifsInode = CIFS_I(inode);
6de2ce42
PS
1675 /*
1676 * Force revalidate to get parent dir info when needed since cached
1677 * attributes are invalid now.
1678 */
1679 cifsInode->time = 0;
42c24544 1680
2b0143b5 1681 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1682 current_time(inode);
1da177e4 1683
7ffec372 1684rmdir_exit:
1da177e4 1685 kfree(full_path);
6d5786a3 1686 free_xid(xid);
1da177e4
LT
1687 return rc;
1688}
1689
ee2fd967 1690static int
8ceb9843
PS
1691cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1692 const char *from_path, struct dentry *to_dentry,
1693 const char *to_path)
ee2fd967
SF
1694{
1695 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1696 struct tcon_link *tlink;
8ceb9843
PS
1697 struct cifs_tcon *tcon;
1698 struct TCP_Server_Info *server;
d81b8a40
PS
1699 struct cifs_fid fid;
1700 struct cifs_open_parms oparms;
ee2fd967
SF
1701 int oplock, rc;
1702
7ffec372
JL
1703 tlink = cifs_sb_tlink(cifs_sb);
1704 if (IS_ERR(tlink))
1705 return PTR_ERR(tlink);
8ceb9843
PS
1706 tcon = tlink_tcon(tlink);
1707 server = tcon->ses->server;
1708
1709 if (!server->ops->rename)
1710 return -ENOSYS;
7ffec372 1711
ee2fd967 1712 /* try path-based rename first */
8ceb9843 1713 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1714
1715 /*
8ceb9843
PS
1716 * Don't bother with rename by filehandle unless file is busy and
1717 * source. Note that cross directory moves do not work with
ee2fd967
SF
1718 * rename by filehandle to various Windows servers.
1719 */
47c78f4a 1720 if (rc == 0 || rc != -EBUSY)
7ffec372 1721 goto do_rename_exit;
ee2fd967 1722
ed0e3ace
JL
1723 /* open-file renames don't work across directories */
1724 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1725 goto do_rename_exit;
ed0e3ace 1726
d81b8a40
PS
1727 oparms.tcon = tcon;
1728 oparms.cifs_sb = cifs_sb;
ee2fd967 1729 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1730 oparms.desired_access = DELETE;
1731 oparms.create_options = CREATE_NOT_DIR;
1732 oparms.disposition = FILE_OPEN;
1733 oparms.path = from_path;
1734 oparms.fid = &fid;
1735 oparms.reconnect = false;
1736
1737 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1738 if (rc == 0) {
d81b8a40 1739 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1740 (const char *) to_dentry->d_name.name,
2baa2682 1741 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1742 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1743 }
7ffec372
JL
1744do_rename_exit:
1745 cifs_put_tlink(tlink);
ee2fd967
SF
1746 return rc;
1747}
1748
8ceb9843 1749int
7c33d597
MS
1750cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1751 struct inode *target_dir, struct dentry *target_dentry,
1752 unsigned int flags)
1da177e4 1753{
8ceb9843
PS
1754 char *from_name = NULL;
1755 char *to_name = NULL;
639e7a91 1756 struct cifs_sb_info *cifs_sb;
7ffec372 1757 struct tcon_link *tlink;
96daf2b0 1758 struct cifs_tcon *tcon;
ee2fd967
SF
1759 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1760 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1761 unsigned int xid;
1762 int rc, tmprc;
1da177e4 1763
7c33d597
MS
1764 if (flags & ~RENAME_NOREPLACE)
1765 return -EINVAL;
1766
639e7a91 1767 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1768 tlink = cifs_sb_tlink(cifs_sb);
1769 if (IS_ERR(tlink))
1770 return PTR_ERR(tlink);
1771 tcon = tlink_tcon(tlink);
1da177e4 1772
6d5786a3 1773 xid = get_xid();
ee2fd967 1774
ee2fd967
SF
1775 /*
1776 * we already have the rename sem so we do not need to
1777 * grab it again here to protect the path integrity
1778 */
8ceb9843
PS
1779 from_name = build_path_from_dentry(source_dentry);
1780 if (from_name == NULL) {
ee2fd967
SF
1781 rc = -ENOMEM;
1782 goto cifs_rename_exit;
1783 }
1784
8ceb9843
PS
1785 to_name = build_path_from_dentry(target_dentry);
1786 if (to_name == NULL) {
1da177e4
LT
1787 rc = -ENOMEM;
1788 goto cifs_rename_exit;
1789 }
1790
8ceb9843
PS
1791 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1792 to_name);
ee2fd967 1793
7c33d597
MS
1794 /*
1795 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1796 */
1797 if (flags & RENAME_NOREPLACE)
1798 goto cifs_rename_exit;
1799
14121bdc
JL
1800 if (rc == -EEXIST && tcon->unix_ext) {
1801 /*
8ceb9843
PS
1802 * Are src and dst hardlinks of same inode? We can only tell
1803 * with unix extensions enabled.
14121bdc
JL
1804 */
1805 info_buf_source =
6da2ec56 1806 kmalloc_array(2, sizeof(FILE_UNIX_BASIC_INFO),
14121bdc
JL
1807 GFP_KERNEL);
1808 if (info_buf_source == NULL) {
1809 rc = -ENOMEM;
1810 goto cifs_rename_exit;
1811 }
1812
1813 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1814 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1815 info_buf_source,
1816 cifs_sb->local_nls,
2baa2682 1817 cifs_remap(cifs_sb));
8d281efb 1818 if (tmprc != 0)
14121bdc 1819 goto unlink_target;
ee2fd967 1820
8ceb9843
PS
1821 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1822 info_buf_target,
1823 cifs_sb->local_nls,
2baa2682 1824 cifs_remap(cifs_sb));
14121bdc 1825
8d281efb 1826 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1827 info_buf_target->UniqueId)) {
14121bdc 1828 /* same file, POSIX says that this is a noop */
ae6884a9 1829 rc = 0;
14121bdc 1830 goto cifs_rename_exit;
ae6884a9 1831 }
8ceb9843
PS
1832 }
1833 /*
1834 * else ... BB we could add the same check for Windows by
1835 * checking the UniqueId via FILE_INTERNAL_INFO
1836 */
14121bdc 1837
ee2fd967 1838unlink_target:
fc6f3943 1839 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1840 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1841 if (d_is_dir(target_dentry))
1842 tmprc = cifs_rmdir(target_dir, target_dentry);
1843 else
1844 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1845 if (tmprc)
1846 goto cifs_rename_exit;
8ceb9843
PS
1847 rc = cifs_do_rename(xid, source_dentry, from_name,
1848 target_dentry, to_name);
1da177e4
LT
1849 }
1850
b46799a8
PS
1851 /* force revalidate to go get info when needed */
1852 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1853
1854 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1855 target_dir->i_mtime = current_time(source_dir);
b46799a8 1856
1da177e4 1857cifs_rename_exit:
ee2fd967 1858 kfree(info_buf_source);
8ceb9843
PS
1859 kfree(from_name);
1860 kfree(to_name);
6d5786a3 1861 free_xid(xid);
7ffec372 1862 cifs_put_tlink(tlink);
1da177e4
LT
1863 return rc;
1864}
1865
df2cf170
JL
1866static bool
1867cifs_inode_needs_reval(struct inode *inode)
1da177e4 1868{
df2cf170 1869 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1870 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1871
57c55cd7
RS
1872 if (cifs_i->time == 0)
1873 return true;
1874
18cceb6a 1875 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1876 return false;
1da177e4 1877
df2cf170
JL
1878 if (!lookupCacheEnabled)
1879 return true;
1da177e4 1880
a87c9ad9
JL
1881 if (!cifs_sb->actimeo)
1882 return true;
1883
6d20e840
SJ
1884 if (!time_in_range(jiffies, cifs_i->time,
1885 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1886 return true;
1887
db19272e 1888 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1889 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1890 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1891 return true;
1892
df2cf170
JL
1893 return false;
1894}
1895
523fb8c8
SJ
1896/*
1897 * Zap the cache. Called when invalid_mapping flag is set.
1898 */
6feb9891 1899int
df2cf170
JL
1900cifs_invalidate_mapping(struct inode *inode)
1901{
6feb9891 1902 int rc = 0;
df2cf170 1903
df2cf170 1904 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1905 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1906 if (rc)
f96637be
JP
1907 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1908 __func__, inode);
df2cf170 1909 }
257fb1f1 1910
9451a9a5 1911 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1912 return rc;
df2cf170
JL
1913}
1914
4f73c7d3
JL
1915/**
1916 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1917 * @word: long word containing the bit lock
1918 */
1919static int
dfd01f02 1920cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1921{
4f73c7d3 1922 freezable_schedule_unsafe();
dfd01f02
PZ
1923 if (signal_pending_state(mode, current))
1924 return -ERESTARTSYS;
4f73c7d3
JL
1925 return 0;
1926}
1927
e284e53f
JL
1928int
1929cifs_revalidate_mapping(struct inode *inode)
1930{
4f73c7d3
JL
1931 int rc;
1932 unsigned long *flags = &CIFS_I(inode)->flags;
1933
74316201
N
1934 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1935 TASK_KILLABLE);
4f73c7d3
JL
1936 if (rc)
1937 return rc;
1938
1939 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1940 rc = cifs_invalidate_mapping(inode);
1941 if (rc)
1942 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1943 }
1944
1945 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1946 smp_mb__after_atomic();
4f73c7d3
JL
1947 wake_up_bit(flags, CIFS_INO_LOCK);
1948
1949 return rc;
1950}
1951
1952int
1953cifs_zap_mapping(struct inode *inode)
1954{
1955 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1956 return cifs_revalidate_mapping(inode);
e284e53f
JL
1957}
1958
6feb9891 1959int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1960{
1961 int rc = 0;
496ad9aa 1962 struct inode *inode = file_inode(filp);
ba00ba64 1963 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1964
1965 if (!cifs_inode_needs_reval(inode))
6feb9891 1966 return rc;
abab095d 1967
13cfb733 1968 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1969 rc = cifs_get_file_info_unix(filp);
1970 else
1971 rc = cifs_get_file_info(filp);
1972
abab095d
JL
1973 return rc;
1974}
1975
6feb9891 1976int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1977{
6d5786a3 1978 unsigned int xid;
df2cf170 1979 int rc = 0;
2b0143b5 1980 struct inode *inode = d_inode(dentry);
df2cf170 1981 struct super_block *sb = dentry->d_sb;
6feb9891 1982 char *full_path = NULL;
df2cf170
JL
1983
1984 if (inode == NULL)
1985 return -ENOENT;
1da177e4 1986
df2cf170 1987 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1988 return rc;
1989
6d5786a3 1990 xid = get_xid();
1da177e4
LT
1991
1992 /* can not safely grab the rename sem here if rename calls revalidate
1993 since that would deadlock */
df2cf170 1994 full_path = build_path_from_dentry(dentry);
1da177e4 1995 if (full_path == NULL) {
0f3bc09e 1996 rc = -ENOMEM;
6feb9891 1997 goto out;
1da177e4
LT
1998 }
1999
f96637be
JP
2000 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
2001 full_path, inode, inode->i_count.counter,
a00be0e3 2002 dentry, cifs_get_time(dentry), jiffies);
1da177e4 2003
0d424ad0 2004 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
2005 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
2006 else
2007 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
2008 xid, NULL);
1da177e4 2009
6feb9891 2010out:
1da177e4 2011 kfree(full_path);
6d5786a3 2012 free_xid(xid);
1da177e4
LT
2013 return rc;
2014}
2015
6feb9891
PS
2016int cifs_revalidate_file(struct file *filp)
2017{
2018 int rc;
496ad9aa 2019 struct inode *inode = file_inode(filp);
6feb9891
PS
2020
2021 rc = cifs_revalidate_file_attr(filp);
2022 if (rc)
2023 return rc;
2024
e284e53f 2025 return cifs_revalidate_mapping(inode);
6feb9891
PS
2026}
2027
2028/* revalidate a dentry's inode attributes */
2029int cifs_revalidate_dentry(struct dentry *dentry)
2030{
2031 int rc;
2b0143b5 2032 struct inode *inode = d_inode(dentry);
6feb9891
PS
2033
2034 rc = cifs_revalidate_dentry_attr(dentry);
2035 if (rc)
2036 return rc;
2037
e284e53f 2038 return cifs_revalidate_mapping(inode);
6feb9891
PS
2039}
2040
a528d35e
DH
2041int cifs_getattr(const struct path *path, struct kstat *stat,
2042 u32 request_mask, unsigned int flags)
1da177e4 2043{
a528d35e 2044 struct dentry *dentry = path->dentry;
3aa1c8c2 2045 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2046 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2047 struct inode *inode = d_inode(dentry);
6feb9891 2048 int rc;
3aa1c8c2 2049
6feb9891
PS
2050 /*
2051 * We need to be sure that all dirty pages are written and the server
2052 * has actual ctime, mtime and file length.
2053 */
18cceb6a 2054 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2055 inode->i_mapping->nrpages != 0) {
2056 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2057 if (rc) {
2058 mapping_set_error(inode->i_mapping, rc);
2059 return rc;
2060 }
6feb9891 2061 }
1c456013 2062
6feb9891
PS
2063 rc = cifs_revalidate_dentry_attr(dentry);
2064 if (rc)
2065 return rc;
2066
2067 generic_fillattr(inode, stat);
2068 stat->blksize = CIFS_MAX_MSGSIZE;
2069 stat->ino = CIFS_I(inode)->uniqueid;
2070
6e70e26d
SF
2071 /* old CIFS Unix Extensions doesn't return create time */
2072 if (CIFS_I(inode)->createtime) {
2073 stat->result_mask |= STATX_BTIME;
95390201
AB
2074 stat->btime =
2075 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
6e70e26d
SF
2076 }
2077
2078 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2079 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2080 stat->attributes |= STATX_ATTR_COMPRESSED;
2081 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2082 stat->attributes |= STATX_ATTR_ENCRYPTED;
2083
6feb9891 2084 /*
d3d1fce1
JL
2085 * If on a multiuser mount without unix extensions or cifsacl being
2086 * enabled, and the admin hasn't overridden them, set the ownership
2087 * to the fsuid/fsgid of the current process.
6feb9891
PS
2088 */
2089 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2090 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2091 !tcon->unix_ext) {
2092 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2093 stat->uid = current_fsuid();
2094 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2095 stat->gid = current_fsgid();
5fe14c85 2096 }
6feb9891 2097 return rc;
1da177e4
LT
2098}
2099
2100static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2101{
09cbfeaf
KS
2102 pgoff_t index = from >> PAGE_SHIFT;
2103 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2104 struct page *page;
1da177e4
LT
2105 int rc = 0;
2106
2107 page = grab_cache_page(mapping, index);
2108 if (!page)
2109 return -ENOMEM;
2110
09cbfeaf 2111 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2112 unlock_page(page);
09cbfeaf 2113 put_page(page);
1da177e4
LT
2114 return rc;
2115}
2116
1b947463 2117static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2118{
57c55cd7
RS
2119 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2120
ba6a46a0 2121 spin_lock(&inode->i_lock);
3677db10 2122 i_size_write(inode, offset);
ba6a46a0 2123 spin_unlock(&inode->i_lock);
1b947463 2124
57c55cd7
RS
2125 /* Cached inode must be refreshed on truncate */
2126 cifs_i->time = 0;
7caef267 2127 truncate_pagecache(inode, offset);
3677db10
SF
2128}
2129
8efdbde6
JL
2130static int
2131cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2132 unsigned int xid, char *full_path)
8efdbde6
JL
2133{
2134 int rc;
2135 struct cifsFileInfo *open_file;
2136 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2137 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2138 struct tcon_link *tlink = NULL;
d1433418
PS
2139 struct cifs_tcon *tcon = NULL;
2140 struct TCP_Server_Info *server;
8efdbde6
JL
2141
2142 /*
2143 * To avoid spurious oplock breaks from server, in the case of
2144 * inodes that we already have open, avoid doing path based
2145 * setting of file size if we can do it by handle.
2146 * This keeps our caching token (oplock) and avoids timeouts
2147 * when the local oplock break takes longer to flush
2148 * writebehind data than the SMB timeout for the SetPathInfo
2149 * request would allow
2150 */
6508d904 2151 open_file = find_writable_file(cifsInode, true);
8efdbde6 2152 if (open_file) {
d1433418
PS
2153 tcon = tlink_tcon(open_file->tlink);
2154 server = tcon->ses->server;
2155 if (server->ops->set_file_size)
2156 rc = server->ops->set_file_size(xid, tcon, open_file,
2157 attrs->ia_size, false);
2158 else
2159 rc = -ENOSYS;
6ab409b5 2160 cifsFileInfo_put(open_file);
f96637be 2161 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2162 } else
2163 rc = -EINVAL;
2164
d1433418
PS
2165 if (!rc)
2166 goto set_size_out;
2167
2168 if (tcon == NULL) {
2169 tlink = cifs_sb_tlink(cifs_sb);
2170 if (IS_ERR(tlink))
2171 return PTR_ERR(tlink);
2172 tcon = tlink_tcon(tlink);
2173 server = tcon->ses->server;
2174 }
ba00ba64 2175
d1433418
PS
2176 /*
2177 * Set file size by pathname rather than by handle either because no
2178 * valid, writeable file handle for it was found or because there was
2179 * an error setting it by handle.
2180 */
2181 if (server->ops->set_path_size)
2182 rc = server->ops->set_path_size(xid, tcon, full_path,
2183 attrs->ia_size, cifs_sb, false);
2184 else
2185 rc = -ENOSYS;
f96637be 2186 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2187
d1433418
PS
2188 if (tlink)
2189 cifs_put_tlink(tlink);
8efdbde6 2190
d1433418 2191set_size_out:
8efdbde6 2192 if (rc == 0) {
fbec9ab9 2193 cifsInode->server_eof = attrs->ia_size;
1b947463 2194 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2195 cifs_truncate_page(inode->i_mapping, inode->i_size);
2196 }
2197
2198 return rc;
2199}
2200
3fe5c1dd
JL
2201static int
2202cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2203{
2204 int rc;
6d5786a3 2205 unsigned int xid;
3fe5c1dd 2206 char *full_path = NULL;
2b0143b5 2207 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2208 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2209 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2210 struct tcon_link *tlink;
96daf2b0 2211 struct cifs_tcon *pTcon;
3fe5c1dd 2212 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2213 struct cifsFileInfo *open_file;
3fe5c1dd 2214
35c265e0
AV
2215 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2216 direntry, attrs->ia_valid);
3fe5c1dd 2217
6d5786a3 2218 xid = get_xid();
3fe5c1dd 2219
db78b877
CH
2220 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2221 attrs->ia_valid |= ATTR_FORCE;
2222
31051c85 2223 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2224 if (rc < 0)
2225 goto out;
3fe5c1dd
JL
2226
2227 full_path = build_path_from_dentry(direntry);
2228 if (full_path == NULL) {
2229 rc = -ENOMEM;
2230 goto out;
2231 }
2232
0f4d634c
JL
2233 /*
2234 * Attempt to flush data before changing attributes. We need to do
2235 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2236 * ownership or mode then we may also need to do this. Here, we take
2237 * the safe way out and just do the flush on all setattr requests. If
2238 * the flush returns error, store it to report later and continue.
2239 *
2240 * BB: This should be smarter. Why bother flushing pages that
2241 * will be truncated anyway? Also, should we error out here if
2242 * the flush returns error?
2243 */
2244 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2245 mapping_set_error(inode->i_mapping, rc);
2246 rc = 0;
3fe5c1dd
JL
2247
2248 if (attrs->ia_valid & ATTR_SIZE) {
2249 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2250 if (rc != 0)
2251 goto out;
2252 }
2253
2254 /* skip mode change if it's just for clearing setuid/setgid */
2255 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2256 attrs->ia_valid &= ~ATTR_MODE;
2257
2258 args = kmalloc(sizeof(*args), GFP_KERNEL);
2259 if (args == NULL) {
2260 rc = -ENOMEM;
2261 goto out;
2262 }
2263
2264 /* set up the struct */
2265 if (attrs->ia_valid & ATTR_MODE)
2266 args->mode = attrs->ia_mode;
2267 else
2268 args->mode = NO_CHANGE_64;
2269
2270 if (attrs->ia_valid & ATTR_UID)
2271 args->uid = attrs->ia_uid;
2272 else
49418b2c 2273 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2274
2275 if (attrs->ia_valid & ATTR_GID)
2276 args->gid = attrs->ia_gid;
2277 else
49418b2c 2278 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2279
2280 if (attrs->ia_valid & ATTR_ATIME)
95390201 2281 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
3fe5c1dd
JL
2282 else
2283 args->atime = NO_CHANGE_64;
2284
2285 if (attrs->ia_valid & ATTR_MTIME)
95390201 2286 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
3fe5c1dd
JL
2287 else
2288 args->mtime = NO_CHANGE_64;
2289
2290 if (attrs->ia_valid & ATTR_CTIME)
95390201 2291 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
3fe5c1dd
JL
2292 else
2293 args->ctime = NO_CHANGE_64;
2294
2295 args->device = 0;
6508d904 2296 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2297 if (open_file) {
4b4de76e 2298 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2299 u32 npid = open_file->pid;
13cfb733 2300 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2301 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2302 cifsFileInfo_put(open_file);
3bbeeb3c 2303 } else {
7ffec372
JL
2304 tlink = cifs_sb_tlink(cifs_sb);
2305 if (IS_ERR(tlink)) {
2306 rc = PTR_ERR(tlink);
2307 goto out;
2308 }
2309 pTcon = tlink_tcon(tlink);
3bbeeb3c 2310 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2311 cifs_sb->local_nls,
bc8ebdc4 2312 cifs_remap(cifs_sb));
7ffec372 2313 cifs_put_tlink(tlink);
3bbeeb3c 2314 }
3fe5c1dd 2315
1025774c
CH
2316 if (rc)
2317 goto out;
ccd4bb1b 2318
1025774c 2319 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2320 attrs->ia_size != i_size_read(inode))
2321 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2322
2323 setattr_copy(inode, attrs);
2324 mark_inode_dirty(inode);
2325
2326 /* force revalidate when any of these times are set since some
2327 of the fs types (eg ext3, fat) do not have fine enough
2328 time granularity to match protocol, and we do not have a
2329 a way (yet) to query the server fs's time granularity (and
2330 whether it rounds times down).
2331 */
2332 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2333 cifsInode->time = 0;
3fe5c1dd
JL
2334out:
2335 kfree(args);
2336 kfree(full_path);
6d5786a3 2337 free_xid(xid);
3fe5c1dd
JL
2338 return rc;
2339}
2340
0510eeb7
JL
2341static int
2342cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2343{
6d5786a3 2344 unsigned int xid;
8abf2775
EB
2345 kuid_t uid = INVALID_UID;
2346 kgid_t gid = INVALID_GID;
2b0143b5 2347 struct inode *inode = d_inode(direntry);
3fe5c1dd 2348 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2349 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2350 char *full_path = NULL;
2351 int rc = -EACCES;
feb3e20c 2352 __u32 dosattr = 0;
4e1e7fb9 2353 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2354
6d5786a3 2355 xid = get_xid();
1da177e4 2356
35c265e0
AV
2357 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2358 direntry, attrs->ia_valid);
6473a559 2359
db78b877
CH
2360 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2361 attrs->ia_valid |= ATTR_FORCE;
2362
31051c85 2363 rc = setattr_prepare(direntry, attrs);
db78b877 2364 if (rc < 0) {
6d5786a3 2365 free_xid(xid);
db78b877 2366 return rc;
6473a559 2367 }
50c2f753 2368
7f57356b 2369 full_path = build_path_from_dentry(direntry);
1da177e4 2370 if (full_path == NULL) {
0f3bc09e 2371 rc = -ENOMEM;
6d5786a3 2372 free_xid(xid);
0f3bc09e 2373 return rc;
1da177e4 2374 }
1da177e4 2375
0f4d634c
JL
2376 /*
2377 * Attempt to flush data before changing attributes. We need to do
2378 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2379 * ownership or mode then we may also need to do this. Here, we take
2380 * the safe way out and just do the flush on all setattr requests. If
2381 * the flush returns error, store it to report later and continue.
2382 *
2383 * BB: This should be smarter. Why bother flushing pages that
2384 * will be truncated anyway? Also, should we error out here if
2385 * the flush returns error?
2386 */
2387 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2388 mapping_set_error(inode->i_mapping, rc);
2389 rc = 0;
cea21805 2390
50531444 2391 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2392 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2393 if (rc != 0)
e30dcf3a 2394 goto cifs_setattr_exit;
1da177e4 2395 }
4ca691a8 2396
a5ff3769
SP
2397 if (attrs->ia_valid & ATTR_UID)
2398 uid = attrs->ia_uid;
2399
2400 if (attrs->ia_valid & ATTR_GID)
2401 gid = attrs->ia_gid;
2402
2403#ifdef CONFIG_CIFS_ACL
2404 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2405 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2406 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2407 uid, gid);
2408 if (rc) {
f96637be
JP
2409 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2410 __func__, rc);
a5ff3769
SP
2411 goto cifs_setattr_exit;
2412 }
2413 }
2414 } else
2415#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2416 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2417 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2418
d32c4f26
JL
2419 /* skip mode change if it's just for clearing setuid/setgid */
2420 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2421 attrs->ia_valid &= ~ATTR_MODE;
2422
1da177e4 2423 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2424 mode = attrs->ia_mode;
cdbce9c8 2425 rc = 0;
79df1bae 2426#ifdef CONFIG_CIFS_ACL
78415d2d 2427 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2428 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2429 INVALID_UID, INVALID_GID);
78415d2d 2430 if (rc) {
f96637be
JP
2431 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2432 __func__, rc);
78415d2d
SP
2433 goto cifs_setattr_exit;
2434 }
2435 } else
79df1bae 2436#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2437 if (((mode & S_IWUGO) == 0) &&
2438 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2439
2440 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2441
5132861a
JL
2442 /* fix up mode if we're not using dynperm */
2443 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2444 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2445 } else if ((mode & S_IWUGO) &&
2446 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2447
2448 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2449 /* Attributes of 0 are ignored */
2450 if (dosattr == 0)
2451 dosattr |= ATTR_NORMAL;
5132861a
JL
2452
2453 /* reset local inode permissions to normal */
2454 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2455 attrs->ia_mode &= ~(S_IALLUGO);
2456 if (S_ISDIR(inode->i_mode))
2457 attrs->ia_mode |=
2458 cifs_sb->mnt_dir_mode;
2459 else
2460 attrs->ia_mode |=
2461 cifs_sb->mnt_file_mode;
2462 }
2463 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2464 /* ignore mode change - ATTR_READONLY hasn't changed */
2465 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2466 }
1da177e4
LT
2467 }
2468
feb3e20c
JL
2469 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2470 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2471 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2472 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2473
e30dcf3a
SF
2474 /* Even if error on time set, no sense failing the call if
2475 the server would set the time to a reasonable value anyway,
2476 and this check ensures that we are not being called from
2477 sys_utimes in which case we ought to fail the call back to
2478 the user when the server rejects the call */
fb8c4b14 2479 if ((rc) && (attrs->ia_valid &
feb3e20c 2480 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2481 rc = 0;
1da177e4
LT
2482 }
2483
2484 /* do not need local check to inode_check_ok since the server does
2485 that */
1025774c
CH
2486 if (rc)
2487 goto cifs_setattr_exit;
2488
2489 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2490 attrs->ia_size != i_size_read(inode))
2491 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2492
2493 setattr_copy(inode, attrs);
2494 mark_inode_dirty(inode);
1025774c 2495
e30dcf3a 2496cifs_setattr_exit:
1da177e4 2497 kfree(full_path);
6d5786a3 2498 free_xid(xid);
1da177e4
LT
2499 return rc;
2500}
2501
0510eeb7
JL
2502int
2503cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2504{
fc64005c 2505 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2506 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2507
2508 if (pTcon->unix_ext)
2509 return cifs_setattr_unix(direntry, attrs);
2510
2511 return cifs_setattr_nounix(direntry, attrs);
2512
2513 /* BB: add cifs_setattr_legacy for really old servers */
2514}
2515
99ee4dbd 2516#if 0
1da177e4
LT
2517void cifs_delete_inode(struct inode *inode)
2518{
f96637be 2519 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2520 /* may have to add back in if and when safe distributed caching of
2521 directories added e.g. via FindNotify */
2522}
99ee4dbd 2523#endif
This page took 1.18212 seconds and 4 git commands to generate.