]> Git Repo - linux.git/blame - fs/cifs/inode.c
smb3: send backup intent on compounded query info
[linux.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French ([email protected])
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4 24#include <linux/pagemap.h>
4f73c7d3 25#include <linux/freezer.h>
174cd4b1 26#include <linux/sched/signal.h>
5dd43ce2 27#include <linux/wait_bit.h>
174cd4b1 28
1da177e4
LT
29#include <asm/div64.h>
30#include "cifsfs.h"
31#include "cifspdu.h"
32#include "cifsglob.h"
33#include "cifsproto.h"
34#include "cifs_debug.h"
35#include "cifs_fs_sb.h"
2baa2682 36#include "cifs_unicode.h"
9451a9a5 37#include "fscache.h"
1da177e4 38
70eff55d 39
01c64fea 40static void cifs_set_ops(struct inode *inode)
70eff55d
CH
41{
42 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
43
44 switch (inode->i_mode & S_IFMT) {
45 case S_IFREG:
46 inode->i_op = &cifs_file_inode_ops;
47 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_direct_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
53 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
54 inode->i_fop = &cifs_file_strict_nobrl_ops;
55 else
56 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
57 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
58 inode->i_fop = &cifs_file_nobrl_ops;
59 else { /* not direct, send byte range locks */
60 inode->i_fop = &cifs_file_ops;
61 }
62
70eff55d 63 /* check if server can support readpages */
0d424ad0 64 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
09cbfeaf 65 PAGE_SIZE + MAX_CIFS_HDR_SIZE)
70eff55d
CH
66 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
67 else
68 inode->i_data.a_ops = &cifs_addr_ops;
69 break;
70 case S_IFDIR:
bc5b6e24 71#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 72 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
73 inode->i_op = &cifs_dfs_referral_inode_operations;
74 } else {
bc5b6e24
SF
75#else /* NO DFS support, treat as a directory */
76 {
77#endif
7962670e
IM
78 inode->i_op = &cifs_dir_inode_ops;
79 inode->i_fop = &cifs_dir_ops;
80 }
70eff55d
CH
81 break;
82 case S_IFLNK:
83 inode->i_op = &cifs_symlink_inode_ops;
84 break;
85 default:
86 init_special_inode(inode, inode->i_mode, inode->i_rdev);
87 break;
88 }
89}
90
df2cf170
JL
91/* check inode attributes against fattr. If they don't match, tag the
92 * inode for cache invalidation
93 */
94static void
95cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
96{
97 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
98
f96637be
JP
99 cifs_dbg(FYI, "%s: revalidating inode %llu\n",
100 __func__, cifs_i->uniqueid);
df2cf170
JL
101
102 if (inode->i_state & I_NEW) {
f96637be
JP
103 cifs_dbg(FYI, "%s: inode %llu is new\n",
104 __func__, cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* don't bother with revalidation if we have an oplock */
18cceb6a 109 if (CIFS_CACHE_READ(cifs_i)) {
f96637be
JP
110 cifs_dbg(FYI, "%s: inode %llu is oplocked\n",
111 __func__, cifs_i->uniqueid);
df2cf170
JL
112 return;
113 }
114
115 /* revalidate if mtime or size have changed */
95390201 116 if (timespec64_equal(&inode->i_mtime, &fattr->cf_mtime) &&
df2cf170 117 cifs_i->server_eof == fattr->cf_eof) {
f96637be
JP
118 cifs_dbg(FYI, "%s: inode %llu is unchanged\n",
119 __func__, cifs_i->uniqueid);
df2cf170
JL
120 return;
121 }
122
f96637be
JP
123 cifs_dbg(FYI, "%s: invalidating inode %llu mapping\n",
124 __func__, cifs_i->uniqueid);
aff8d5ca 125 set_bit(CIFS_INO_INVALID_MAPPING, &cifs_i->flags);
df2cf170
JL
126}
127
74d290da
JM
128/*
129 * copy nlink to the inode, unless it wasn't provided. Provide
130 * sane values if we don't have an existing one and none was provided
131 */
132static void
133cifs_nlink_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
134{
135 /*
136 * if we're in a situation where we can't trust what we
137 * got from the server (readdir, some non-unix cases)
138 * fake reasonable values
139 */
140 if (fattr->cf_flags & CIFS_FATTR_UNKNOWN_NLINK) {
141 /* only provide fake values on a new inode */
142 if (inode->i_state & I_NEW) {
143 if (fattr->cf_cifsattrs & ATTR_DIRECTORY)
144 set_nlink(inode, 2);
145 else
146 set_nlink(inode, 1);
147 }
148 return;
149 }
150
151 /* we trust the server, so update it */
152 set_nlink(inode, fattr->cf_nlink);
153}
154
cc0bad75
JL
155/* populate an inode with info from a cifs_fattr struct */
156void
157cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 158{
cc0bad75 159 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 160 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 161
df2cf170
JL
162 cifs_revalidate_cache(inode, fattr);
163
b7ca6928 164 spin_lock(&inode->i_lock);
9b9c5bea
SF
165 /* we do not want atime to be less than mtime, it broke some apps */
166 if (timespec64_compare(&fattr->cf_atime, &fattr->cf_mtime))
167 inode->i_atime = fattr->cf_mtime;
168 else
169 inode->i_atime = fattr->cf_atime;
95390201
AB
170 inode->i_mtime = fattr->cf_mtime;
171 inode->i_ctime = fattr->cf_ctime;
cc0bad75 172 inode->i_rdev = fattr->cf_rdev;
74d290da 173 cifs_nlink_fattr_to_inode(inode, fattr);
cc0bad75
JL
174 inode->i_uid = fattr->cf_uid;
175 inode->i_gid = fattr->cf_gid;
176
0b8f18e3
JL
177 /* if dynperm is set, don't clobber existing mode */
178 if (inode->i_state & I_NEW ||
179 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
180 inode->i_mode = fattr->cf_mode;
181
cc0bad75 182 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 183
0b8f18e3
JL
184 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
185 cifs_i->time = 0;
186 else
187 cifs_i->time = jiffies;
188
aff8d5ca
JL
189 if (fattr->cf_flags & CIFS_FATTR_DELETE_PENDING)
190 set_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
191 else
192 clear_bit(CIFS_INO_DELETE_PENDING, &cifs_i->flags);
cc0bad75 193
835a36ca 194 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
195 /*
196 * Can't safely change the file size here if the client is writing to
197 * it due to potential races.
198 */
cc0bad75
JL
199 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
200 i_size_write(inode, fattr->cf_eof);
201
202 /*
203 * i_blocks is not related to (i_size / i_blksize),
204 * but instead 512 byte (2**9) size is required for
205 * calculating num blocks.
206 */
207 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
208 }
209 spin_unlock(&inode->i_lock);
210
01c64fea
DH
211 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
212 inode->i_flags |= S_AUTOMOUNT;
c2b93e06
JL
213 if (inode->i_state & I_NEW)
214 cifs_set_ops(inode);
cc0bad75
JL
215}
216
4065c802
JL
217void
218cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
219{
220 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
221
222 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
223 return;
224
225 fattr->cf_uniqueid = iunique(sb, ROOT_I);
226}
227
cc0bad75
JL
228/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
229void
230cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
231 struct cifs_sb_info *cifs_sb)
232{
233 memset(fattr, 0, sizeof(*fattr));
234 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
235 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
236 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
237
238 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
239 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
240 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
6e70e26d
SF
241 /* old POSIX extensions don't get create time */
242
cc0bad75 243 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
244
245 /*
246 * Since we set the inode type below we need to mask off
247 * to avoid strange results if bits set above.
248 */
cc0bad75 249 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
250 switch (le32_to_cpu(info->Type)) {
251 case UNIX_FILE:
cc0bad75
JL
252 fattr->cf_mode |= S_IFREG;
253 fattr->cf_dtype = DT_REG;
75f12983
CH
254 break;
255 case UNIX_SYMLINK:
cc0bad75
JL
256 fattr->cf_mode |= S_IFLNK;
257 fattr->cf_dtype = DT_LNK;
75f12983
CH
258 break;
259 case UNIX_DIR:
cc0bad75
JL
260 fattr->cf_mode |= S_IFDIR;
261 fattr->cf_dtype = DT_DIR;
75f12983
CH
262 break;
263 case UNIX_CHARDEV:
cc0bad75
JL
264 fattr->cf_mode |= S_IFCHR;
265 fattr->cf_dtype = DT_CHR;
266 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
267 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
268 break;
269 case UNIX_BLOCKDEV:
cc0bad75
JL
270 fattr->cf_mode |= S_IFBLK;
271 fattr->cf_dtype = DT_BLK;
272 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
273 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
274 break;
275 case UNIX_FIFO:
cc0bad75
JL
276 fattr->cf_mode |= S_IFIFO;
277 fattr->cf_dtype = DT_FIFO;
75f12983
CH
278 break;
279 case UNIX_SOCKET:
cc0bad75
JL
280 fattr->cf_mode |= S_IFSOCK;
281 fattr->cf_dtype = DT_SOCK;
75f12983
CH
282 break;
283 default:
284 /* safest to call it a file if we do not know */
cc0bad75
JL
285 fattr->cf_mode |= S_IFREG;
286 fattr->cf_dtype = DT_REG;
f96637be 287 cifs_dbg(FYI, "unknown type %d\n", le32_to_cpu(info->Type));
75f12983
CH
288 break;
289 }
290
46bbc25f
EB
291 fattr->cf_uid = cifs_sb->mnt_uid;
292 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)) {
293 u64 id = le64_to_cpu(info->Uid);
4a2c8cf5
EB
294 if (id < ((uid_t)-1)) {
295 kuid_t uid = make_kuid(&init_user_ns, id);
296 if (uid_valid(uid))
297 fattr->cf_uid = uid;
298 }
46bbc25f
EB
299 }
300
301 fattr->cf_gid = cifs_sb->mnt_gid;
302 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)) {
303 u64 id = le64_to_cpu(info->Gid);
4a2c8cf5
EB
304 if (id < ((gid_t)-1)) {
305 kgid_t gid = make_kgid(&init_user_ns, id);
306 if (gid_valid(gid))
307 fattr->cf_gid = gid;
308 }
46bbc25f 309 }
75f12983 310
cc0bad75 311 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
312}
313
b9a3260f 314/*
cc0bad75
JL
315 * Fill a cifs_fattr struct with fake inode info.
316 *
317 * Needed to setup cifs_fattr data for the directory which is the
318 * junction to the new submount (ie to setup the fake directory
319 * which represents a DFS referral).
b9a3260f 320 */
f1230c97 321static void
cc0bad75 322cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 323{
cc0bad75 324 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 325
f96637be 326 cifs_dbg(FYI, "creating fake fattr for DFS referral\n");
cc0bad75
JL
327
328 memset(fattr, 0, sizeof(*fattr));
329 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
330 fattr->cf_uid = cifs_sb->mnt_uid;
331 fattr->cf_gid = cifs_sb->mnt_gid;
95390201
AB
332 ktime_get_real_ts64(&fattr->cf_mtime);
333 fattr->cf_mtime = timespec64_trunc(fattr->cf_mtime, sb->s_time_gran);
e37fea58 334 fattr->cf_atime = fattr->cf_ctime = fattr->cf_mtime;
cc0bad75
JL
335 fattr->cf_nlink = 2;
336 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
337}
338
4ad65044
PS
339static int
340cifs_get_file_info_unix(struct file *filp)
abab095d
JL
341{
342 int rc;
6d5786a3 343 unsigned int xid;
abab095d
JL
344 FILE_UNIX_BASIC_INFO find_data;
345 struct cifs_fattr fattr;
496ad9aa 346 struct inode *inode = file_inode(filp);
abab095d 347 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 348 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 349 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 350
6d5786a3 351 xid = get_xid();
4b4de76e 352 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
353 if (!rc) {
354 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
355 } else if (rc == -EREMOTE) {
356 cifs_create_dfs_fattr(&fattr, inode->i_sb);
357 rc = 0;
358 }
359
360 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 361 free_xid(xid);
abab095d
JL
362 return rc;
363}
364
1da177e4 365int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 366 const unsigned char *full_path,
6d5786a3 367 struct super_block *sb, unsigned int xid)
1da177e4 368{
cc0bad75 369 int rc;
0e4bbde9 370 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 371 struct cifs_fattr fattr;
96daf2b0 372 struct cifs_tcon *tcon;
7ffec372 373 struct tcon_link *tlink;
1da177e4 374 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 375
f96637be 376 cifs_dbg(FYI, "Getting info on %s\n", full_path);
7962670e 377
7ffec372
JL
378 tlink = cifs_sb_tlink(cifs_sb);
379 if (IS_ERR(tlink))
380 return PTR_ERR(tlink);
381 tcon = tlink_tcon(tlink);
382
1da177e4 383 /* could have done a find first instead but this returns more info */
cc0bad75 384 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
bc8ebdc4 385 cifs_sb->local_nls, cifs_remap(cifs_sb));
7ffec372 386 cifs_put_tlink(tlink);
e911d0cc 387
cc0bad75
JL
388 if (!rc) {
389 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
390 } else if (rc == -EREMOTE) {
391 cifs_create_dfs_fattr(&fattr, sb);
392 rc = 0;
393 } else {
394 return rc;
395 }
1da177e4 396
1b12b9c1
SM
397 /* check for Minshall+French symlinks */
398 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
399 int tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
400 full_path);
1b12b9c1 401 if (tmprc)
cb084b1a 402 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
403 }
404
0e4bbde9 405 if (*pinode == NULL) {
cc0bad75 406 /* get new inode */
4065c802 407 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
408 *pinode = cifs_iget(sb, &fattr);
409 if (!*pinode)
0e4bbde9 410 rc = -ENOMEM;
cc0bad75
JL
411 } else {
412 /* we already have inode, update it */
7196ac11
NA
413
414 /* if uniqueid is different, return error */
415 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
416 CIFS_I(*pinode)->uniqueid != fattr.cf_uniqueid)) {
417 rc = -ESTALE;
418 goto cgiiu_exit;
419 }
420
421 /* if filetype is different, return error */
422 if (unlikely(((*pinode)->i_mode & S_IFMT) !=
423 (fattr.cf_mode & S_IFMT))) {
424 rc = -ESTALE;
425 goto cgiiu_exit;
426 }
427
cc0bad75 428 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 429 }
1da177e4 430
7196ac11 431cgiiu_exit:
1da177e4
LT
432 return rc;
433}
434
0b8f18e3 435static int
0360d605 436cifs_sfu_type(struct cifs_fattr *fattr, const char *path,
6d5786a3 437 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
438{
439 int rc;
db8b631d 440 __u32 oplock;
7ffec372 441 struct tcon_link *tlink;
96daf2b0 442 struct cifs_tcon *tcon;
d81b8a40
PS
443 struct cifs_fid fid;
444 struct cifs_open_parms oparms;
d4ffff1f 445 struct cifs_io_parms io_parms;
86c96b4b 446 char buf[24];
d6e2f2a4 447 unsigned int bytes_read;
fb8c4b14 448 char *pbuf;
0360d605 449 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4
SF
450
451 pbuf = buf;
452
0b8f18e3
JL
453 fattr->cf_mode &= ~S_IFMT;
454
455 if (fattr->cf_eof == 0) {
456 fattr->cf_mode |= S_IFIFO;
457 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 458 return 0;
0b8f18e3
JL
459 } else if (fattr->cf_eof < 8) {
460 fattr->cf_mode |= S_IFREG;
461 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
462 return -EINVAL; /* EOPNOTSUPP? */
463 }
50c2f753 464
7ffec372
JL
465 tlink = cifs_sb_tlink(cifs_sb);
466 if (IS_ERR(tlink))
467 return PTR_ERR(tlink);
468 tcon = tlink_tcon(tlink);
469
d81b8a40
PS
470 oparms.tcon = tcon;
471 oparms.cifs_sb = cifs_sb;
472 oparms.desired_access = GENERIC_READ;
473 oparms.create_options = CREATE_NOT_DIR;
5e19697b
SF
474 if (backup_cred(cifs_sb))
475 oparms.create_options |= CREATE_OPEN_BACKUP_INTENT;
d81b8a40
PS
476 oparms.disposition = FILE_OPEN;
477 oparms.path = path;
478 oparms.fid = &fid;
479 oparms.reconnect = false;
480
db8b631d
SF
481 if (tcon->ses->server->oplocks)
482 oplock = REQ_OPLOCK;
483 else
484 oplock = 0;
485 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, NULL);
0360d605 486 if (rc) {
db8b631d 487 cifs_dbg(FYI, "check sfu type of %s, open rc = %d\n", path, rc);
0360d605
PS
488 cifs_put_tlink(tlink);
489 return rc;
490 }
491
492 /* Read header */
d81b8a40 493 io_parms.netfid = fid.netfid;
0360d605
PS
494 io_parms.pid = current->tgid;
495 io_parms.tcon = tcon;
496 io_parms.offset = 0;
497 io_parms.length = 24;
498
db8b631d
SF
499 rc = tcon->ses->server->ops->sync_read(xid, &fid, &io_parms,
500 &bytes_read, &pbuf, &buf_type);
0360d605
PS
501 if ((rc == 0) && (bytes_read >= 8)) {
502 if (memcmp("IntxBLK", pbuf, 8) == 0) {
503 cifs_dbg(FYI, "Block device\n");
504 fattr->cf_mode |= S_IFBLK;
505 fattr->cf_dtype = DT_BLK;
506 if (bytes_read == 24) {
507 /* we have enough to decode dev num */
508 __u64 mjr; /* major */
509 __u64 mnr; /* minor */
510 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
511 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
512 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 513 }
0360d605
PS
514 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
515 cifs_dbg(FYI, "Char device\n");
516 fattr->cf_mode |= S_IFCHR;
517 fattr->cf_dtype = DT_CHR;
518 if (bytes_read == 24) {
519 /* we have enough to decode dev num */
520 __u64 mjr; /* major */
521 __u64 mnr; /* minor */
522 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
523 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
524 fattr->cf_rdev = MKDEV(mjr, mnr);
525 }
526 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
527 cifs_dbg(FYI, "Symlink\n");
528 fattr->cf_mode |= S_IFLNK;
529 fattr->cf_dtype = DT_LNK;
3020a1f5 530 } else {
0360d605 531 fattr->cf_mode |= S_IFREG; /* file? */
0b8f18e3 532 fattr->cf_dtype = DT_REG;
0360d605 533 rc = -EOPNOTSUPP;
fb8c4b14 534 }
0360d605
PS
535 } else {
536 fattr->cf_mode |= S_IFREG; /* then it is a file */
537 fattr->cf_dtype = DT_REG;
538 rc = -EOPNOTSUPP; /* or some unknown SFU type */
d6e2f2a4 539 }
db8b631d
SF
540
541 tcon->ses->server->ops->close(xid, tcon, &fid);
7ffec372 542 cifs_put_tlink(tlink);
d6e2f2a4 543 return rc;
d6e2f2a4
SF
544}
545
9e294f1c
SF
546#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
547
0b8f18e3
JL
548/*
549 * Fetch mode bits as provided by SFU.
550 *
551 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
552 */
553static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 554 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 555{
3020a1f5 556#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
557 ssize_t rc;
558 char ea_value[4];
559 __u32 mode;
7ffec372 560 struct tcon_link *tlink;
96daf2b0 561 struct cifs_tcon *tcon;
7ffec372
JL
562
563 tlink = cifs_sb_tlink(cifs_sb);
564 if (IS_ERR(tlink))
565 return PTR_ERR(tlink);
566 tcon = tlink_tcon(tlink);
9e294f1c 567
d979f3b0
SF
568 if (tcon->ses->server->ops->query_all_EAs == NULL) {
569 cifs_put_tlink(tlink);
570 return -EOPNOTSUPP;
571 }
572
573 rc = tcon->ses->server->ops->query_all_EAs(xid, tcon, path,
574 "SETFILEBITS", ea_value, 4 /* size of buf */,
67b4c889 575 cifs_sb);
7ffec372 576 cifs_put_tlink(tlink);
4523cc30 577 if (rc < 0)
9e294f1c
SF
578 return (int)rc;
579 else if (rc > 3) {
580 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 581 fattr->cf_mode &= ~SFBITS_MASK;
f96637be
JP
582 cifs_dbg(FYI, "special bits 0%o org mode 0%o\n",
583 mode, fattr->cf_mode);
0b8f18e3 584 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
f96637be 585 cifs_dbg(FYI, "special mode bits 0%o\n", mode);
9e294f1c 586 }
0b8f18e3
JL
587
588 return 0;
3020a1f5
SF
589#else
590 return -EOPNOTSUPP;
591#endif
9e294f1c
SF
592}
593
0b8f18e3 594/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 595static void
0b8f18e3 596cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
e37fea58 597 struct super_block *sb, bool adjust_tz,
eb85d94b 598 bool symlink)
b9a3260f 599{
e37fea58 600 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
96daf2b0 601 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 602
0b8f18e3
JL
603 memset(fattr, 0, sizeof(*fattr));
604 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
605 if (info->DeletePending)
606 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
607
608 if (info->LastAccessTime)
609 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
e37fea58 610 else {
95390201
AB
611 ktime_get_real_ts64(&fattr->cf_atime);
612 fattr->cf_atime = timespec64_trunc(fattr->cf_atime, sb->s_time_gran);
e37fea58 613 }
0b8f18e3
JL
614
615 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
616 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
617
618 if (adjust_tz) {
0d424ad0
JL
619 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
620 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
621 }
622
623 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
624 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 625 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3 626
74d290da 627 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
eb85d94b
PS
628
629 if (symlink) {
630 fattr->cf_mode = S_IFLNK;
631 fattr->cf_dtype = DT_LNK;
632 } else if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
0b8f18e3
JL
633 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
634 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
635 /*
636 * Server can return wrong NumberOfLinks value for directories
637 * when Unix extensions are disabled - fake it.
638 */
74d290da
JM
639 if (!tcon->unix_ext)
640 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
0b8f18e3
JL
641 } else {
642 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
643 fattr->cf_dtype = DT_REG;
0b8f18e3 644
d0c280d2
JL
645 /* clear write bits if ATTR_READONLY is set */
646 if (fattr->cf_cifsattrs & ATTR_READONLY)
647 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 648
74d290da
JM
649 /*
650 * Don't accept zero nlink from non-unix servers unless
651 * delete is pending. Instead mark it as unknown.
652 */
653 if ((fattr->cf_nlink < 1) && !tcon->unix_ext &&
654 !info->DeletePending) {
655 cifs_dbg(1, "bogus file nlink value %u\n",
6658b9f7 656 fattr->cf_nlink);
74d290da 657 fattr->cf_flags |= CIFS_FATTR_UNKNOWN_NLINK;
6658b9f7 658 }
6de2ce42 659 }
0b8f18e3
JL
660
661 fattr->cf_uid = cifs_sb->mnt_uid;
662 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
663}
664
4ad65044
PS
665static int
666cifs_get_file_info(struct file *filp)
abab095d
JL
667{
668 int rc;
6d5786a3 669 unsigned int xid;
abab095d
JL
670 FILE_ALL_INFO find_data;
671 struct cifs_fattr fattr;
496ad9aa 672 struct inode *inode = file_inode(filp);
c21dfb69 673 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 674 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
675 struct TCP_Server_Info *server = tcon->ses->server;
676
677 if (!server->ops->query_file_info)
678 return -ENOSYS;
abab095d 679
6d5786a3 680 xid = get_xid();
4ad65044 681 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
682 switch (rc) {
683 case 0:
e37fea58 684 cifs_all_info_to_fattr(&fattr, &find_data, inode->i_sb, false,
eb85d94b 685 false);
42274bb2
PS
686 break;
687 case -EREMOTE:
688 cifs_create_dfs_fattr(&fattr, inode->i_sb);
689 rc = 0;
690 break;
691 case -EOPNOTSUPP:
692 case -EINVAL:
abab095d
JL
693 /*
694 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
695 * for now, just skip revalidating and mark inode for
696 * immediate reval.
697 */
abab095d
JL
698 rc = 0;
699 CIFS_I(inode)->time = 0;
42274bb2 700 default:
abab095d 701 goto cgfi_exit;
42274bb2 702 }
abab095d
JL
703
704 /*
705 * don't bother with SFU junk here -- just mark inode as needing
706 * revalidation.
707 */
abab095d
JL
708 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
709 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
710 cifs_fattr_to_inode(inode, &fattr);
711cgfi_exit:
6d5786a3 712 free_xid(xid);
abab095d
JL
713 return rc;
714}
715
7ea884c7
SF
716/* Simple function to return a 64 bit hash of string. Rarely called */
717static __u64 simple_hashstr(const char *str)
718{
3995bbf5 719 const __u64 hash_mult = 1125899906842597ULL; /* a big enough prime */
7ea884c7
SF
720 __u64 hash = 0;
721
722 while (*str)
723 hash = (hash + (__u64) *str++) * hash_mult;
724
725 return hash;
726}
727
1208ef1f
PS
728int
729cifs_get_inode_info(struct inode **inode, const char *full_path,
730 FILE_ALL_INFO *data, struct super_block *sb, int xid,
42eacf9e 731 const struct cifs_fid *fid)
1da177e4 732{
c052e2b4
SP
733 bool validinum = false;
734 __u16 srchflgs;
735 int rc = 0, tmprc = ENOSYS;
1208ef1f
PS
736 struct cifs_tcon *tcon;
737 struct TCP_Server_Info *server;
7ffec372 738 struct tcon_link *tlink;
1da177e4 739 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 740 char *buf = NULL;
1208ef1f 741 bool adjust_tz = false;
0b8f18e3 742 struct cifs_fattr fattr;
c052e2b4 743 struct cifs_search_info *srchinf = NULL;
eb85d94b 744 bool symlink = false;
1da177e4 745
7ffec372
JL
746 tlink = cifs_sb_tlink(cifs_sb);
747 if (IS_ERR(tlink))
748 return PTR_ERR(tlink);
1208ef1f
PS
749 tcon = tlink_tcon(tlink);
750 server = tcon->ses->server;
7ffec372 751
f96637be 752 cifs_dbg(FYI, "Getting info on %s\n", full_path);
1da177e4 753
1208ef1f 754 if ((data == NULL) && (*inode != NULL)) {
57c55cd7
RS
755 if (CIFS_CACHE_READ(CIFS_I(*inode)) &&
756 CIFS_I(*inode)->time != 0) {
f96637be 757 cifs_dbg(FYI, "No need to revalidate cached inode sizes\n");
7ffec372 758 goto cgii_exit;
1da177e4
LT
759 }
760 }
761
1208ef1f
PS
762 /* if inode info is not passed, get it from server */
763 if (data == NULL) {
764 if (!server->ops->query_path_info) {
765 rc = -ENOSYS;
766 goto cgii_exit;
767 }
1da177e4 768 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
769 if (buf == NULL) {
770 rc = -ENOMEM;
771 goto cgii_exit;
772 }
1208ef1f
PS
773 data = (FILE_ALL_INFO *)buf;
774 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
eb85d94b 775 data, &adjust_tz, &symlink);
1da177e4 776 }
0b8f18e3
JL
777
778 if (!rc) {
e37fea58 779 cifs_all_info_to_fattr(&fattr, data, sb, adjust_tz,
eb85d94b 780 symlink);
0b8f18e3
JL
781 } else if (rc == -EREMOTE) {
782 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 783 rc = 0;
c052e2b4
SP
784 } else if (rc == -EACCES && backup_cred(cifs_sb)) {
785 srchinf = kzalloc(sizeof(struct cifs_search_info),
786 GFP_KERNEL);
787 if (srchinf == NULL) {
788 rc = -ENOMEM;
789 goto cgii_exit;
790 }
791
792 srchinf->endOfSearch = false;
793 srchinf->info_level = SMB_FIND_FILE_ID_FULL_DIR_INFO;
794
795 srchflgs = CIFS_SEARCH_CLOSE_ALWAYS |
796 CIFS_SEARCH_CLOSE_AT_END |
797 CIFS_SEARCH_BACKUP_SEARCH;
798
799 rc = CIFSFindFirst(xid, tcon, full_path,
800 cifs_sb, NULL, srchflgs, srchinf, false);
801 if (!rc) {
802 data =
803 (FILE_ALL_INFO *)srchinf->srch_entries_start;
804
805 cifs_dir_info_to_fattr(&fattr,
806 (FILE_DIRECTORY_INFO *)data, cifs_sb);
807 fattr.cf_uniqueid = le64_to_cpu(
808 ((SEARCH_ID_FULL_DIR_INFO *)data)->UniqueId);
809 validinum = true;
810
811 cifs_buf_release(srchinf->ntwrk_buf_start);
812 }
813 kfree(srchinf);
4c5930e8
SF
814 if (rc)
815 goto cgii_exit;
c052e2b4 816 } else
7962670e 817 goto cgii_exit;
1da177e4 818
0b8f18e3
JL
819 /*
820 * If an inode wasn't passed in, then get the inode number
821 *
822 * Is an i_ino of zero legal? Can we use that to check if the server
823 * supports returning inode numbers? Are there other sanity checks we
824 * can use to ensure that the server is really filling in that field?
0b8f18e3 825 */
1208ef1f 826 if (*inode == NULL) {
b9a3260f 827 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
c052e2b4
SP
828 if (validinum == false) {
829 if (server->ops->get_srv_inum)
830 tmprc = server->ops->get_srv_inum(xid,
831 tcon, cifs_sb, full_path,
832 &fattr.cf_uniqueid, data);
833 if (tmprc) {
f96637be
JP
834 cifs_dbg(FYI, "GetSrvInodeNum rc %d\n",
835 tmprc);
c052e2b4
SP
836 fattr.cf_uniqueid = iunique(sb, ROOT_I);
837 cifs_autodisable_serverino(cifs_sb);
7ea884c7
SF
838 } else if ((fattr.cf_uniqueid == 0) &&
839 strlen(full_path) == 0) {
840 /* some servers ret bad root ino ie 0 */
841 cifs_dbg(FYI, "Invalid (0) inodenum\n");
842 fattr.cf_flags |=
843 CIFS_FATTR_FAKE_ROOT_INO;
844 fattr.cf_uniqueid =
845 simple_hashstr(tcon->treeName);
c052e2b4 846 }
132ac7b7 847 }
c052e2b4 848 } else
0b8f18e3 849 fattr.cf_uniqueid = iunique(sb, ROOT_I);
a108471b
RL
850 } else {
851 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
852 validinum == false && server->ops->get_srv_inum) {
853 /*
854 * Pass a NULL tcon to ensure we don't make a round
855 * trip to the server. This only works for SMB2+.
856 */
857 tmprc = server->ops->get_srv_inum(xid,
858 NULL, cifs_sb, full_path,
859 &fattr.cf_uniqueid, data);
860 if (tmprc)
861 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
7ea884c7
SF
862 else if ((fattr.cf_uniqueid == 0) &&
863 strlen(full_path) == 0) {
864 /*
865 * Reuse existing root inode num since
866 * inum zero for root causes ls of . and .. to
867 * not be returned
868 */
869 cifs_dbg(FYI, "Srv ret 0 inode num for root\n");
870 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
871 }
a108471b
RL
872 } else
873 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
874 }
b9a3260f 875
0b8f18e3
JL
876 /* query for SFU type info if supported and needed */
877 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
878 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
879 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
880 if (tmprc)
f96637be 881 cifs_dbg(FYI, "cifs_sfu_type failed: %d\n", tmprc);
b9a3260f 882 }
1da177e4 883
79df1bae 884#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
885 /* fill in 0777 bits from ACL */
886 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 887 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d 888 if (rc) {
f96637be
JP
889 cifs_dbg(FYI, "%s: Getting ACL failed with error: %d\n",
890 __func__, rc);
78415d2d
SP
891 goto cgii_exit;
892 }
b9a3260f 893 }
79df1bae 894#endif /* CONFIG_CIFS_ACL */
b9a3260f 895
0b8f18e3
JL
896 /* fill in remaining high mode bits e.g. SUID, VTX */
897 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
898 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 899
1b12b9c1
SM
900 /* check for Minshall+French symlinks */
901 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
cb084b1a
SP
902 tmprc = check_mf_symlink(xid, tcon, cifs_sb, &fattr,
903 full_path);
1b12b9c1 904 if (tmprc)
cb084b1a 905 cifs_dbg(FYI, "check_mf_symlink: %d\n", tmprc);
1b12b9c1
SM
906 }
907
1208ef1f
PS
908 if (!*inode) {
909 *inode = cifs_iget(sb, &fattr);
910 if (!*inode)
0b8f18e3
JL
911 rc = -ENOMEM;
912 } else {
7196ac11
NA
913 /* we already have inode, update it */
914
a108471b
RL
915 /* if uniqueid is different, return error */
916 if (unlikely(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM &&
917 CIFS_I(*inode)->uniqueid != fattr.cf_uniqueid)) {
918 rc = -ESTALE;
919 goto cgii_exit;
920 }
921
7196ac11
NA
922 /* if filetype is different, return error */
923 if (unlikely(((*inode)->i_mode & S_IFMT) !=
924 (fattr.cf_mode & S_IFMT))) {
925 rc = -ESTALE;
926 goto cgii_exit;
927 }
928
1208ef1f 929 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 930 }
b9a3260f 931
7962670e 932cgii_exit:
7ea884c7
SF
933 if ((*inode) && ((*inode)->i_ino == 0))
934 cifs_dbg(FYI, "inode number of zero returned\n");
935
1da177e4 936 kfree(buf);
7ffec372 937 cifs_put_tlink(tlink);
1da177e4
LT
938 return rc;
939}
940
7f8ed420
SF
941static const struct inode_operations cifs_ipc_inode_ops = {
942 .lookup = cifs_lookup,
943};
944
cc0bad75
JL
945static int
946cifs_find_inode(struct inode *inode, void *opaque)
947{
948 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
949
f30b9c11 950 /* don't match inode with different uniqueid */
cc0bad75
JL
951 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
952 return 0;
953
20054bd6
JL
954 /* use createtime like an i_generation field */
955 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
956 return 0;
957
f30b9c11
JL
958 /* don't match inode of different type */
959 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
960 return 0;
961
5acfec25 962 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 963 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 964 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 965
cc0bad75
JL
966 return 1;
967}
968
969static int
970cifs_init_inode(struct inode *inode, void *opaque)
971{
972 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
973
974 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 975 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
976 return 0;
977}
978
5acfec25
JL
979/*
980 * walk dentry list for an inode and report whether it has aliases that
981 * are hashed. We use this to determine if a directory inode can actually
982 * be used.
983 */
984static bool
985inode_has_hashed_dentries(struct inode *inode)
986{
987 struct dentry *dentry;
988
873feea0 989 spin_lock(&inode->i_lock);
946e51f2 990 hlist_for_each_entry(dentry, &inode->i_dentry, d_u.d_alias) {
5acfec25 991 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 992 spin_unlock(&inode->i_lock);
5acfec25
JL
993 return true;
994 }
995 }
873feea0 996 spin_unlock(&inode->i_lock);
5acfec25
JL
997 return false;
998}
999
cc0bad75
JL
1000/* Given fattrs, get a corresponding inode */
1001struct inode *
1002cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
1003{
1004 unsigned long hash;
1005 struct inode *inode;
1006
3d694380 1007retry_iget5_locked:
f96637be 1008 cifs_dbg(FYI, "looking for uniqueid=%llu\n", fattr->cf_uniqueid);
cc0bad75
JL
1009
1010 /* hash down to 32-bits on 32-bit arch */
1011 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
1012
1013 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 1014 if (inode) {
5acfec25 1015 /* was there a potentially problematic inode collision? */
3d694380 1016 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 1017 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
1018
1019 if (inode_has_hashed_dentries(inode)) {
1020 cifs_autodisable_serverino(CIFS_SB(sb));
1021 iput(inode);
1022 fattr->cf_uniqueid = iunique(sb, ROOT_I);
1023 goto retry_iget5_locked;
1024 }
3d694380
JL
1025 }
1026
cc0bad75 1027 cifs_fattr_to_inode(inode, fattr);
1751e8a6 1028 if (sb->s_flags & SB_NOATIME)
cc0bad75
JL
1029 inode->i_flags |= S_NOATIME | S_NOCMTIME;
1030 if (inode->i_state & I_NEW) {
1031 inode->i_ino = hash;
0ccd4802 1032#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
1033 /* initialize per-inode cache cookie pointer */
1034 CIFS_I(inode)->fscache = NULL;
0ccd4802 1035#endif
cc0bad75
JL
1036 unlock_new_inode(inode);
1037 }
1038 }
1039
1040 return inode;
1041}
1042
1da177e4 1043/* gets root inode */
9b6763e0 1044struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 1045{
6d5786a3 1046 unsigned int xid;
0d424ad0 1047 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 1048 struct inode *inode = NULL;
ce634ab2 1049 long rc;
96daf2b0 1050 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
a6b5058f
AA
1051 char *path = NULL;
1052 int len;
1053
1054 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_USE_PREFIX_PATH)
1055 && cifs_sb->prepath) {
1056 len = strlen(cifs_sb->prepath);
1057 path = kzalloc(len + 2 /* leading sep + null */, GFP_KERNEL);
1058 if (path == NULL)
1059 return ERR_PTR(-ENOMEM);
1060 path[0] = '/';
1061 memcpy(path+1, cifs_sb->prepath, len);
1062 } else {
1063 path = kstrdup("", GFP_KERNEL);
1064 if (path == NULL)
1065 return ERR_PTR(-ENOMEM);
1066 }
ce634ab2 1067
6d5786a3 1068 xid = get_xid();
b5b374ea 1069 if (tcon->unix_ext) {
a6b5058f 1070 rc = cifs_get_inode_info_unix(&inode, path, sb, xid);
b5b374ea
SF
1071 /* some servers mistakenly claim POSIX support */
1072 if (rc != -EOPNOTSUPP)
1073 goto iget_no_retry;
1074 cifs_dbg(VFS, "server does not support POSIX extensions");
1075 tcon->unix_ext = false;
1076 }
1077
a6b5058f
AA
1078 convert_delimiter(path, CIFS_DIR_SEP(cifs_sb));
1079 rc = cifs_get_inode_info(&inode, path, NULL, sb, xid, NULL);
0b8f18e3 1080
b5b374ea 1081iget_no_retry:
a7851ce7
OS
1082 if (!inode) {
1083 inode = ERR_PTR(rc);
1084 goto out;
1085 }
cc0bad75 1086
0ccd4802 1087#ifdef CONFIG_CIFS_FSCACHE
d03382ce 1088 /* populate tcon->resource_id */
0d424ad0 1089 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 1090#endif
d03382ce 1091
b327a717 1092 if (rc && tcon->pipe) {
f96637be 1093 cifs_dbg(FYI, "ipc connection - fake read inode\n");
b7ca6928 1094 spin_lock(&inode->i_lock);
7f8ed420 1095 inode->i_mode |= S_IFDIR;
bfe86848 1096 set_nlink(inode, 2);
7f8ed420
SF
1097 inode->i_op = &cifs_ipc_inode_ops;
1098 inode->i_fop = &simple_dir_operations;
1099 inode->i_uid = cifs_sb->mnt_uid;
1100 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 1101 spin_unlock(&inode->i_lock);
ad661334 1102 } else if (rc) {
ce634ab2 1103 iget_failed(inode);
a7851ce7 1104 inode = ERR_PTR(rc);
7f8ed420
SF
1105 }
1106
a7851ce7 1107out:
a6b5058f 1108 kfree(path);
31cd106b 1109 free_xid(xid);
ce634ab2 1110 return inode;
1da177e4
LT
1111}
1112
ed6875e0 1113int
6d5786a3 1114cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 1115 char *full_path, __u32 dosattr)
388e57b2 1116{
388e57b2 1117 bool set_time = false;
388e57b2 1118 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
6bdf6dbd 1119 struct TCP_Server_Info *server;
388e57b2
SF
1120 FILE_BASIC_INFO info_buf;
1121
1adcb710
SF
1122 if (attrs == NULL)
1123 return -EINVAL;
1124
6bdf6dbd
PS
1125 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
1126 if (!server->ops->set_file_info)
1127 return -ENOSYS;
1128
fd09b7d3
SF
1129 info_buf.Pad = 0;
1130
388e57b2
SF
1131 if (attrs->ia_valid & ATTR_ATIME) {
1132 set_time = true;
1133 info_buf.LastAccessTime =
95390201 1134 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
388e57b2
SF
1135 } else
1136 info_buf.LastAccessTime = 0;
1137
1138 if (attrs->ia_valid & ATTR_MTIME) {
1139 set_time = true;
1140 info_buf.LastWriteTime =
95390201 1141 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
388e57b2
SF
1142 } else
1143 info_buf.LastWriteTime = 0;
1144
1145 /*
1146 * Samba throws this field away, but windows may actually use it.
1147 * Do not set ctime unless other time stamps are changed explicitly
1148 * (i.e. by utimes()) since we would then have a mix of client and
1149 * server times.
1150 */
1151 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
f96637be 1152 cifs_dbg(FYI, "CIFS - CTIME changed\n");
388e57b2 1153 info_buf.ChangeTime =
95390201 1154 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
388e57b2
SF
1155 } else
1156 info_buf.ChangeTime = 0;
1157
1158 info_buf.CreationTime = 0; /* don't change */
1159 info_buf.Attributes = cpu_to_le32(dosattr);
1160
6bdf6dbd 1161 return server->ops->set_file_info(inode, full_path, &info_buf, xid);
388e57b2
SF
1162}
1163
a12a1ac7 1164/*
ed6875e0 1165 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1166 * and rename it to a random name that hopefully won't conflict with
1167 * anything else.
1168 */
ed6875e0
PS
1169int
1170cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1171 const unsigned int xid)
a12a1ac7
JL
1172{
1173 int oplock = 0;
1174 int rc;
d81b8a40
PS
1175 struct cifs_fid fid;
1176 struct cifs_open_parms oparms;
2b0143b5 1177 struct inode *inode = d_inode(dentry);
a12a1ac7
JL
1178 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1179 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1180 struct tcon_link *tlink;
96daf2b0 1181 struct cifs_tcon *tcon;
3270958b
SF
1182 __u32 dosattr, origattr;
1183 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1184
7ffec372
JL
1185 tlink = cifs_sb_tlink(cifs_sb);
1186 if (IS_ERR(tlink))
1187 return PTR_ERR(tlink);
1188 tcon = tlink_tcon(tlink);
1189
c483a984
SP
1190 /*
1191 * We cannot rename the file if the server doesn't support
1192 * CAP_INFOLEVEL_PASSTHRU
1193 */
1194 if (!(tcon->ses->capabilities & CAP_INFOLEVEL_PASSTHRU)) {
1195 rc = -EBUSY;
1196 goto out;
1197 }
1198
d81b8a40
PS
1199 oparms.tcon = tcon;
1200 oparms.cifs_sb = cifs_sb;
1201 oparms.desired_access = DELETE | FILE_WRITE_ATTRIBUTES;
1202 oparms.create_options = CREATE_NOT_DIR;
1203 oparms.disposition = FILE_OPEN;
1204 oparms.path = full_path;
1205 oparms.fid = &fid;
1206 oparms.reconnect = false;
1207
1208 rc = CIFS_open(xid, &oparms, &oplock, NULL);
a12a1ac7
JL
1209 if (rc != 0)
1210 goto out;
1211
3270958b
SF
1212 origattr = cifsInode->cifsAttrs;
1213 if (origattr == 0)
1214 origattr |= ATTR_NORMAL;
1215
1216 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1217 if (dosattr == 0)
1218 dosattr |= ATTR_NORMAL;
1219 dosattr |= ATTR_HIDDEN;
1220
3270958b
SF
1221 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1222 if (dosattr != origattr) {
1223 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1224 if (info_buf == NULL) {
1225 rc = -ENOMEM;
1226 goto out_close;
1227 }
1228 info_buf->Attributes = cpu_to_le32(dosattr);
d81b8a40 1229 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1230 current->tgid);
1231 /* although we would like to mark the file hidden
1232 if that fails we will still try to rename it */
72d282dc 1233 if (!rc)
3270958b
SF
1234 cifsInode->cifsAttrs = dosattr;
1235 else
1236 dosattr = origattr; /* since not able to change them */
a12a1ac7 1237 }
a12a1ac7 1238
dd1db2de 1239 /* rename the file */
d81b8a40
PS
1240 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, NULL,
1241 cifs_sb->local_nls,
2baa2682 1242 cifs_remap(cifs_sb));
3270958b 1243 if (rc != 0) {
47c78f4a 1244 rc = -EBUSY;
3270958b
SF
1245 goto undo_setattr;
1246 }
6d22f098 1247
3270958b 1248 /* try to set DELETE_ON_CLOSE */
aff8d5ca 1249 if (!test_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags)) {
d81b8a40 1250 rc = CIFSSMBSetFileDisposition(xid, tcon, true, fid.netfid,
3270958b
SF
1251 current->tgid);
1252 /*
1253 * some samba versions return -ENOENT when we try to set the
1254 * file disposition here. Likely a samba bug, but work around
1255 * it for now. This means that some cifsXXX files may hang
1256 * around after they shouldn't.
1257 *
1258 * BB: remove this hack after more servers have the fix
1259 */
1260 if (rc == -ENOENT)
1261 rc = 0;
1262 else if (rc != 0) {
47c78f4a 1263 rc = -EBUSY;
3270958b
SF
1264 goto undo_rename;
1265 }
aff8d5ca 1266 set_bit(CIFS_INO_DELETE_PENDING, &cifsInode->flags);
3270958b 1267 }
7ce86d5a 1268
a12a1ac7 1269out_close:
d81b8a40 1270 CIFSSMBClose(xid, tcon, fid.netfid);
a12a1ac7 1271out:
3270958b 1272 kfree(info_buf);
7ffec372 1273 cifs_put_tlink(tlink);
a12a1ac7 1274 return rc;
3270958b
SF
1275
1276 /*
1277 * reset everything back to the original state. Don't bother
1278 * dealing with errors here since we can't do anything about
1279 * them anyway.
1280 */
1281undo_rename:
d81b8a40 1282 CIFSSMBRenameOpenFile(xid, tcon, fid.netfid, dentry->d_name.name,
2baa2682 1283 cifs_sb->local_nls, cifs_remap(cifs_sb));
3270958b
SF
1284undo_setattr:
1285 if (dosattr != origattr) {
1286 info_buf->Attributes = cpu_to_le32(origattr);
d81b8a40 1287 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, fid.netfid,
3270958b
SF
1288 current->tgid))
1289 cifsInode->cifsAttrs = origattr;
1290 }
1291
1292 goto out_close;
a12a1ac7
JL
1293}
1294
b7ca6928
SF
1295/* copied from fs/nfs/dir.c with small changes */
1296static void
1297cifs_drop_nlink(struct inode *inode)
1298{
1299 spin_lock(&inode->i_lock);
1300 if (inode->i_nlink > 0)
1301 drop_nlink(inode);
1302 spin_unlock(&inode->i_lock);
1303}
ff694527
SF
1304
1305/*
2b0143b5 1306 * If d_inode(dentry) is null (usually meaning the cached dentry
ff694527 1307 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1308 * if that fails we can not attempt the fall back mechanisms on EACCESS
1309 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1310 * unlink on negative dentries currently.
1311 */
5f0319a7 1312int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1313{
1314 int rc = 0;
6d5786a3 1315 unsigned int xid;
1da177e4 1316 char *full_path = NULL;
2b0143b5 1317 struct inode *inode = d_inode(dentry);
ff694527 1318 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1319 struct super_block *sb = dir->i_sb;
1320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1321 struct tcon_link *tlink;
96daf2b0 1322 struct cifs_tcon *tcon;
ed6875e0 1323 struct TCP_Server_Info *server;
6050247d
SF
1324 struct iattr *attrs = NULL;
1325 __u32 dosattr = 0, origattr = 0;
1da177e4 1326
f96637be 1327 cifs_dbg(FYI, "cifs_unlink, dir=0x%p, dentry=0x%p\n", dir, dentry);
1da177e4 1328
7ffec372
JL
1329 tlink = cifs_sb_tlink(cifs_sb);
1330 if (IS_ERR(tlink))
1331 return PTR_ERR(tlink);
1332 tcon = tlink_tcon(tlink);
ed6875e0 1333 server = tcon->ses->server;
7ffec372 1334
6d5786a3 1335 xid = get_xid();
1da177e4 1336
5f0319a7
JL
1337 /* Unlink can be called from rename so we can not take the
1338 * sb->s_vfs_rename_mutex here */
1339 full_path = build_path_from_dentry(dentry);
1da177e4 1340 if (full_path == NULL) {
0f3bc09e 1341 rc = -ENOMEM;
7ffec372 1342 goto unlink_out;
1da177e4 1343 }
2d785a50 1344
29e20f9c
PS
1345 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1346 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1347 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1348 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
2baa2682 1349 cifs_remap(cifs_sb));
f96637be 1350 cifs_dbg(FYI, "posix del rc %d\n", rc);
2d785a50
SF
1351 if ((rc == 0) || (rc == -ENOENT))
1352 goto psx_del_no_retry;
1353 }
1da177e4 1354
6050247d 1355retry_std_delete:
ed6875e0
PS
1356 if (!server->ops->unlink) {
1357 rc = -ENOSYS;
1358 goto psx_del_no_retry;
1359 }
1360
1361 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1362
2d785a50 1363psx_del_no_retry:
1da177e4 1364 if (!rc) {
5f0319a7 1365 if (inode)
b7ca6928 1366 cifs_drop_nlink(inode);
1da177e4 1367 } else if (rc == -ENOENT) {
5f0319a7 1368 d_drop(dentry);
47c78f4a 1369 } else if (rc == -EBUSY) {
ed6875e0
PS
1370 if (server->ops->rename_pending_delete) {
1371 rc = server->ops->rename_pending_delete(full_path,
1372 dentry, xid);
1373 if (rc == 0)
1374 cifs_drop_nlink(inode);
1375 }
ff694527 1376 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1377 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1378 if (attrs == NULL) {
1379 rc = -ENOMEM;
1380 goto out_reval;
1da177e4 1381 }
388e57b2
SF
1382
1383 /* try to reset dos attributes */
ff694527
SF
1384 cifs_inode = CIFS_I(inode);
1385 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1386 if (origattr == 0)
1387 origattr |= ATTR_NORMAL;
1388 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1389 if (dosattr == 0)
1390 dosattr |= ATTR_NORMAL;
1391 dosattr |= ATTR_HIDDEN;
1392
1393 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1394 if (rc != 0)
1395 goto out_reval;
6050247d
SF
1396
1397 goto retry_std_delete;
1da177e4 1398 }
6050247d
SF
1399
1400 /* undo the setattr if we errored out and it's needed */
1401 if (rc != 0 && dosattr != 0)
1402 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1403
388e57b2 1404out_reval:
4523cc30 1405 if (inode) {
ff694527
SF
1406 cifs_inode = CIFS_I(inode);
1407 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7 1408 when needed */
e37fea58 1409 inode->i_ctime = current_time(inode);
06bcfedd 1410 }
e37fea58 1411 dir->i_ctime = dir->i_mtime = current_time(dir);
ff694527 1412 cifs_inode = CIFS_I(dir);
6050247d 1413 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1414unlink_out:
1da177e4 1415 kfree(full_path);
6050247d 1416 kfree(attrs);
6d5786a3 1417 free_xid(xid);
7ffec372 1418 cifs_put_tlink(tlink);
1da177e4
LT
1419 return rc;
1420}
1421
ff691e96 1422static int
101b92d9 1423cifs_mkdir_qinfo(struct inode *parent, struct dentry *dentry, umode_t mode,
ff691e96
PS
1424 const char *full_path, struct cifs_sb_info *cifs_sb,
1425 struct cifs_tcon *tcon, const unsigned int xid)
1426{
1427 int rc = 0;
101b92d9 1428 struct inode *inode = NULL;
ff691e96
PS
1429
1430 if (tcon->unix_ext)
101b92d9 1431 rc = cifs_get_inode_info_unix(&inode, full_path, parent->i_sb,
ff691e96
PS
1432 xid);
1433 else
101b92d9
JL
1434 rc = cifs_get_inode_info(&inode, full_path, NULL, parent->i_sb,
1435 xid, NULL);
1436
ff691e96
PS
1437 if (rc)
1438 return rc;
1439
ff691e96
PS
1440 /*
1441 * setting nlink not necessary except in cases where we failed to get it
101b92d9
JL
1442 * from the server or was set bogus. Also, since this is a brand new
1443 * inode, no need to grab the i_lock before setting the i_nlink.
ff691e96 1444 */
101b92d9
JL
1445 if (inode->i_nlink < 2)
1446 set_nlink(inode, 2);
ff691e96
PS
1447 mode &= ~current_umask();
1448 /* must turn on setgid bit if parent dir has it */
101b92d9 1449 if (parent->i_mode & S_ISGID)
ff691e96
PS
1450 mode |= S_ISGID;
1451
1452 if (tcon->unix_ext) {
1453 struct cifs_unix_set_info_args args = {
1454 .mode = mode,
1455 .ctime = NO_CHANGE_64,
1456 .atime = NO_CHANGE_64,
1457 .mtime = NO_CHANGE_64,
1458 .device = 0,
1459 };
1460 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
49418b2c 1461 args.uid = current_fsuid();
101b92d9 1462 if (parent->i_mode & S_ISGID)
49418b2c 1463 args.gid = parent->i_gid;
ff691e96 1464 else
49418b2c 1465 args.gid = current_fsgid();
ff691e96 1466 } else {
49418b2c
EB
1467 args.uid = INVALID_UID; /* no change */
1468 args.gid = INVALID_GID; /* no change */
ff691e96
PS
1469 }
1470 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1471 cifs_sb->local_nls,
2baa2682 1472 cifs_remap(cifs_sb));
ff691e96 1473 } else {
f436720e 1474 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1475 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e 1476 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
101b92d9 1477 server->ops->mkdir_setinfo(inode, full_path, cifs_sb,
f436720e 1478 tcon, xid);
101b92d9
JL
1479 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1480 inode->i_mode = (mode | S_IFDIR);
1481
1482 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1483 inode->i_uid = current_fsuid();
1484 if (inode->i_mode & S_ISGID)
1485 inode->i_gid = parent->i_gid;
1486 else
1487 inode->i_gid = current_fsgid();
ff691e96
PS
1488 }
1489 }
101b92d9 1490 d_instantiate(dentry, inode);
ff691e96
PS
1491 return rc;
1492}
1493
1494static int
1495cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1496 const char *full_path, struct cifs_sb_info *cifs_sb,
1497 struct cifs_tcon *tcon, const unsigned int xid)
1498{
1499 int rc = 0;
1500 u32 oplock = 0;
1501 FILE_UNIX_BASIC_INFO *info = NULL;
1502 struct inode *newinode = NULL;
1503 struct cifs_fattr fattr;
1504
1505 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1506 if (info == NULL) {
1507 rc = -ENOMEM;
1508 goto posix_mkdir_out;
1509 }
1510
1511 mode &= ~current_umask();
1512 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1513 NULL /* netfid */, info, &oplock, full_path,
2baa2682 1514 cifs_sb->local_nls, cifs_remap(cifs_sb));
ff691e96
PS
1515 if (rc == -EOPNOTSUPP)
1516 goto posix_mkdir_out;
1517 else if (rc) {
f96637be 1518 cifs_dbg(FYI, "posix mkdir returned 0x%x\n", rc);
ff691e96
PS
1519 d_drop(dentry);
1520 goto posix_mkdir_out;
1521 }
1522
1523 if (info->Type == cpu_to_le32(-1))
1524 /* no return info, go query for it */
1525 goto posix_mkdir_get_info;
1526 /*
1527 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1528 * need to set uid/gid.
1529 */
1530
1531 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1532 cifs_fill_uniqueid(inode->i_sb, &fattr);
1533 newinode = cifs_iget(inode->i_sb, &fattr);
1534 if (!newinode)
1535 goto posix_mkdir_get_info;
1536
1537 d_instantiate(dentry, newinode);
1538
1539#ifdef CONFIG_CIFS_DEBUG2
35c265e0
AV
1540 cifs_dbg(FYI, "instantiated dentry %p %pd to inode %p\n",
1541 dentry, dentry, newinode);
ff691e96
PS
1542
1543 if (newinode->i_nlink != 2)
f96637be
JP
1544 cifs_dbg(FYI, "unexpected number of links %d\n",
1545 newinode->i_nlink);
ff691e96
PS
1546#endif
1547
1548posix_mkdir_out:
1549 kfree(info);
1550 return rc;
1551posix_mkdir_get_info:
1552 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1553 xid);
1554 goto posix_mkdir_out;
1555}
1556
18bb1db3 1557int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1558{
ff691e96 1559 int rc = 0;
6d5786a3 1560 unsigned int xid;
1da177e4 1561 struct cifs_sb_info *cifs_sb;
7ffec372 1562 struct tcon_link *tlink;
29e20f9c 1563 struct cifs_tcon *tcon;
f436720e 1564 struct TCP_Server_Info *server;
ff691e96 1565 char *full_path;
1da177e4 1566
f96637be
JP
1567 cifs_dbg(FYI, "In cifs_mkdir, mode = 0x%hx inode = 0x%p\n",
1568 mode, inode);
1da177e4 1569
1da177e4 1570 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1571 tlink = cifs_sb_tlink(cifs_sb);
1572 if (IS_ERR(tlink))
1573 return PTR_ERR(tlink);
29e20f9c 1574 tcon = tlink_tcon(tlink);
7ffec372 1575
6d5786a3 1576 xid = get_xid();
1da177e4 1577
7f57356b 1578 full_path = build_path_from_dentry(direntry);
1da177e4 1579 if (full_path == NULL) {
0f3bc09e 1580 rc = -ENOMEM;
7ffec372 1581 goto mkdir_out;
1da177e4 1582 }
50c2f753 1583
bea851b8
SF
1584 server = tcon->ses->server;
1585
bea851b8
SF
1586 if ((server->ops->posix_mkdir) && (tcon->posix_extensions)) {
1587 rc = server->ops->posix_mkdir(xid, inode, mode, tcon, full_path,
1588 cifs_sb);
1589 d_drop(direntry); /* for time being always refresh inode info */
1590 goto mkdir_out;
1591 }
bea851b8 1592
29e20f9c
PS
1593 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1594 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1595 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1596 tcon, xid);
1597 if (rc != -EOPNOTSUPP)
2dd29d31 1598 goto mkdir_out;
fb8c4b14 1599 }
ff691e96 1600
f436720e
PS
1601 if (!server->ops->mkdir) {
1602 rc = -ENOSYS;
1603 goto mkdir_out;
1604 }
1605
1da177e4 1606 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1607 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1608 if (rc) {
f96637be 1609 cifs_dbg(FYI, "cifs_mkdir returned 0x%x\n", rc);
1da177e4 1610 d_drop(direntry);
ff691e96 1611 goto mkdir_out;
1da177e4 1612 }
ff691e96
PS
1613
1614 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1615 xid);
fb8c4b14 1616mkdir_out:
6de2ce42
PS
1617 /*
1618 * Force revalidate to get parent dir info when needed since cached
1619 * attributes are invalid now.
1620 */
1621 CIFS_I(inode)->time = 0;
1da177e4 1622 kfree(full_path);
6d5786a3 1623 free_xid(xid);
7ffec372 1624 cifs_put_tlink(tlink);
1da177e4
LT
1625 return rc;
1626}
1627
1628int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1629{
1630 int rc = 0;
6d5786a3 1631 unsigned int xid;
1da177e4 1632 struct cifs_sb_info *cifs_sb;
7ffec372 1633 struct tcon_link *tlink;
f958ca5d
PS
1634 struct cifs_tcon *tcon;
1635 struct TCP_Server_Info *server;
1da177e4
LT
1636 char *full_path = NULL;
1637 struct cifsInodeInfo *cifsInode;
1638
f96637be 1639 cifs_dbg(FYI, "cifs_rmdir, inode = 0x%p\n", inode);
1da177e4 1640
6d5786a3 1641 xid = get_xid();
1da177e4 1642
7f57356b 1643 full_path = build_path_from_dentry(direntry);
1da177e4 1644 if (full_path == NULL) {
0f3bc09e 1645 rc = -ENOMEM;
7ffec372 1646 goto rmdir_exit;
1da177e4
LT
1647 }
1648
7ffec372
JL
1649 cifs_sb = CIFS_SB(inode->i_sb);
1650 tlink = cifs_sb_tlink(cifs_sb);
1651 if (IS_ERR(tlink)) {
1652 rc = PTR_ERR(tlink);
1653 goto rmdir_exit;
1654 }
f958ca5d
PS
1655 tcon = tlink_tcon(tlink);
1656 server = tcon->ses->server;
1657
1658 if (!server->ops->rmdir) {
1659 rc = -ENOSYS;
1660 cifs_put_tlink(tlink);
1661 goto rmdir_exit;
1662 }
7ffec372 1663
f958ca5d 1664 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1665 cifs_put_tlink(tlink);
1da177e4
LT
1666
1667 if (!rc) {
2b0143b5
DH
1668 spin_lock(&d_inode(direntry)->i_lock);
1669 i_size_write(d_inode(direntry), 0);
1670 clear_nlink(d_inode(direntry));
1671 spin_unlock(&d_inode(direntry)->i_lock);
1da177e4
LT
1672 }
1673
2b0143b5 1674 cifsInode = CIFS_I(d_inode(direntry));
6de2ce42
PS
1675 /* force revalidate to go get info when needed */
1676 cifsInode->time = 0;
42c24544
SF
1677
1678 cifsInode = CIFS_I(inode);
6de2ce42
PS
1679 /*
1680 * Force revalidate to get parent dir info when needed since cached
1681 * attributes are invalid now.
1682 */
1683 cifsInode->time = 0;
42c24544 1684
2b0143b5 1685 d_inode(direntry)->i_ctime = inode->i_ctime = inode->i_mtime =
e37fea58 1686 current_time(inode);
1da177e4 1687
7ffec372 1688rmdir_exit:
1da177e4 1689 kfree(full_path);
6d5786a3 1690 free_xid(xid);
1da177e4
LT
1691 return rc;
1692}
1693
ee2fd967 1694static int
8ceb9843
PS
1695cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1696 const char *from_path, struct dentry *to_dentry,
1697 const char *to_path)
ee2fd967
SF
1698{
1699 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1700 struct tcon_link *tlink;
8ceb9843
PS
1701 struct cifs_tcon *tcon;
1702 struct TCP_Server_Info *server;
d81b8a40
PS
1703 struct cifs_fid fid;
1704 struct cifs_open_parms oparms;
ee2fd967
SF
1705 int oplock, rc;
1706
7ffec372
JL
1707 tlink = cifs_sb_tlink(cifs_sb);
1708 if (IS_ERR(tlink))
1709 return PTR_ERR(tlink);
8ceb9843
PS
1710 tcon = tlink_tcon(tlink);
1711 server = tcon->ses->server;
1712
1713 if (!server->ops->rename)
1714 return -ENOSYS;
7ffec372 1715
ee2fd967 1716 /* try path-based rename first */
8ceb9843 1717 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1718
1719 /*
8ceb9843
PS
1720 * Don't bother with rename by filehandle unless file is busy and
1721 * source. Note that cross directory moves do not work with
ee2fd967
SF
1722 * rename by filehandle to various Windows servers.
1723 */
47c78f4a 1724 if (rc == 0 || rc != -EBUSY)
7ffec372 1725 goto do_rename_exit;
ee2fd967 1726
ed0e3ace
JL
1727 /* open-file renames don't work across directories */
1728 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1729 goto do_rename_exit;
ed0e3ace 1730
d81b8a40
PS
1731 oparms.tcon = tcon;
1732 oparms.cifs_sb = cifs_sb;
ee2fd967 1733 /* open the file to be renamed -- we need DELETE perms */
d81b8a40
PS
1734 oparms.desired_access = DELETE;
1735 oparms.create_options = CREATE_NOT_DIR;
1736 oparms.disposition = FILE_OPEN;
1737 oparms.path = from_path;
1738 oparms.fid = &fid;
1739 oparms.reconnect = false;
1740
1741 rc = CIFS_open(xid, &oparms, &oplock, NULL);
ee2fd967 1742 if (rc == 0) {
d81b8a40 1743 rc = CIFSSMBRenameOpenFile(xid, tcon, fid.netfid,
ee2fd967 1744 (const char *) to_dentry->d_name.name,
2baa2682 1745 cifs_sb->local_nls, cifs_remap(cifs_sb));
d81b8a40 1746 CIFSSMBClose(xid, tcon, fid.netfid);
ee2fd967 1747 }
7ffec372
JL
1748do_rename_exit:
1749 cifs_put_tlink(tlink);
ee2fd967
SF
1750 return rc;
1751}
1752
8ceb9843 1753int
7c33d597
MS
1754cifs_rename2(struct inode *source_dir, struct dentry *source_dentry,
1755 struct inode *target_dir, struct dentry *target_dentry,
1756 unsigned int flags)
1da177e4 1757{
8ceb9843
PS
1758 char *from_name = NULL;
1759 char *to_name = NULL;
639e7a91 1760 struct cifs_sb_info *cifs_sb;
7ffec372 1761 struct tcon_link *tlink;
96daf2b0 1762 struct cifs_tcon *tcon;
ee2fd967
SF
1763 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1764 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1765 unsigned int xid;
1766 int rc, tmprc;
1da177e4 1767
7c33d597
MS
1768 if (flags & ~RENAME_NOREPLACE)
1769 return -EINVAL;
1770
639e7a91 1771 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1772 tlink = cifs_sb_tlink(cifs_sb);
1773 if (IS_ERR(tlink))
1774 return PTR_ERR(tlink);
1775 tcon = tlink_tcon(tlink);
1da177e4 1776
6d5786a3 1777 xid = get_xid();
ee2fd967 1778
ee2fd967
SF
1779 /*
1780 * we already have the rename sem so we do not need to
1781 * grab it again here to protect the path integrity
1782 */
8ceb9843
PS
1783 from_name = build_path_from_dentry(source_dentry);
1784 if (from_name == NULL) {
ee2fd967
SF
1785 rc = -ENOMEM;
1786 goto cifs_rename_exit;
1787 }
1788
8ceb9843
PS
1789 to_name = build_path_from_dentry(target_dentry);
1790 if (to_name == NULL) {
1da177e4
LT
1791 rc = -ENOMEM;
1792 goto cifs_rename_exit;
1793 }
1794
8ceb9843
PS
1795 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1796 to_name);
ee2fd967 1797
7c33d597
MS
1798 /*
1799 * No-replace is the natural behavior for CIFS, so skip unlink hacks.
1800 */
1801 if (flags & RENAME_NOREPLACE)
1802 goto cifs_rename_exit;
1803
14121bdc
JL
1804 if (rc == -EEXIST && tcon->unix_ext) {
1805 /*
8ceb9843
PS
1806 * Are src and dst hardlinks of same inode? We can only tell
1807 * with unix extensions enabled.
14121bdc
JL
1808 */
1809 info_buf_source =
6da2ec56 1810 kmalloc_array(2, sizeof(FILE_UNIX_BASIC_INFO),
14121bdc
JL
1811 GFP_KERNEL);
1812 if (info_buf_source == NULL) {
1813 rc = -ENOMEM;
1814 goto cifs_rename_exit;
1815 }
1816
1817 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1818 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1819 info_buf_source,
1820 cifs_sb->local_nls,
2baa2682 1821 cifs_remap(cifs_sb));
8d281efb 1822 if (tmprc != 0)
14121bdc 1823 goto unlink_target;
ee2fd967 1824
8ceb9843
PS
1825 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1826 info_buf_target,
1827 cifs_sb->local_nls,
2baa2682 1828 cifs_remap(cifs_sb));
14121bdc 1829
8d281efb 1830 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1831 info_buf_target->UniqueId)) {
14121bdc 1832 /* same file, POSIX says that this is a noop */
ae6884a9 1833 rc = 0;
14121bdc 1834 goto cifs_rename_exit;
ae6884a9 1835 }
8ceb9843
PS
1836 }
1837 /*
1838 * else ... BB we could add the same check for Windows by
1839 * checking the UniqueId via FILE_INTERNAL_INFO
1840 */
14121bdc 1841
ee2fd967 1842unlink_target:
fc6f3943 1843 /* Try unlinking the target dentry if it's not negative */
2b0143b5 1844 if (d_really_is_positive(target_dentry) && (rc == -EACCES || rc == -EEXIST)) {
a07d3220
PS
1845 if (d_is_dir(target_dentry))
1846 tmprc = cifs_rmdir(target_dir, target_dentry);
1847 else
1848 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1849 if (tmprc)
1850 goto cifs_rename_exit;
8ceb9843
PS
1851 rc = cifs_do_rename(xid, source_dentry, from_name,
1852 target_dentry, to_name);
1da177e4
LT
1853 }
1854
b46799a8
PS
1855 /* force revalidate to go get info when needed */
1856 CIFS_I(source_dir)->time = CIFS_I(target_dir)->time = 0;
1857
1858 source_dir->i_ctime = source_dir->i_mtime = target_dir->i_ctime =
e37fea58 1859 target_dir->i_mtime = current_time(source_dir);
b46799a8 1860
1da177e4 1861cifs_rename_exit:
ee2fd967 1862 kfree(info_buf_source);
8ceb9843
PS
1863 kfree(from_name);
1864 kfree(to_name);
6d5786a3 1865 free_xid(xid);
7ffec372 1866 cifs_put_tlink(tlink);
1da177e4
LT
1867 return rc;
1868}
1869
df2cf170
JL
1870static bool
1871cifs_inode_needs_reval(struct inode *inode)
1da177e4 1872{
df2cf170 1873 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1874 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1875
57c55cd7
RS
1876 if (cifs_i->time == 0)
1877 return true;
1878
18cceb6a 1879 if (CIFS_CACHE_READ(cifs_i))
df2cf170 1880 return false;
1da177e4 1881
df2cf170
JL
1882 if (!lookupCacheEnabled)
1883 return true;
1da177e4 1884
a87c9ad9
JL
1885 if (!cifs_sb->actimeo)
1886 return true;
1887
6d20e840
SJ
1888 if (!time_in_range(jiffies, cifs_i->time,
1889 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1890 return true;
1891
db19272e 1892 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1893 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1894 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1895 return true;
1896
df2cf170
JL
1897 return false;
1898}
1899
523fb8c8
SJ
1900/*
1901 * Zap the cache. Called when invalid_mapping flag is set.
1902 */
6feb9891 1903int
df2cf170
JL
1904cifs_invalidate_mapping(struct inode *inode)
1905{
6feb9891 1906 int rc = 0;
df2cf170 1907
df2cf170 1908 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1 1909 rc = invalidate_inode_pages2(inode->i_mapping);
4f73c7d3 1910 if (rc)
f96637be
JP
1911 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
1912 __func__, inode);
df2cf170 1913 }
257fb1f1 1914
9451a9a5 1915 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1916 return rc;
df2cf170
JL
1917}
1918
4f73c7d3
JL
1919/**
1920 * cifs_wait_bit_killable - helper for functions that are sleeping on bit locks
1921 * @word: long word containing the bit lock
1922 */
1923static int
dfd01f02 1924cifs_wait_bit_killable(struct wait_bit_key *key, int mode)
4f73c7d3 1925{
4f73c7d3 1926 freezable_schedule_unsafe();
dfd01f02
PZ
1927 if (signal_pending_state(mode, current))
1928 return -ERESTARTSYS;
4f73c7d3
JL
1929 return 0;
1930}
1931
e284e53f
JL
1932int
1933cifs_revalidate_mapping(struct inode *inode)
1934{
4f73c7d3
JL
1935 int rc;
1936 unsigned long *flags = &CIFS_I(inode)->flags;
1937
74316201
N
1938 rc = wait_on_bit_lock_action(flags, CIFS_INO_LOCK, cifs_wait_bit_killable,
1939 TASK_KILLABLE);
4f73c7d3
JL
1940 if (rc)
1941 return rc;
1942
1943 if (test_and_clear_bit(CIFS_INO_INVALID_MAPPING, flags)) {
1944 rc = cifs_invalidate_mapping(inode);
1945 if (rc)
1946 set_bit(CIFS_INO_INVALID_MAPPING, flags);
1947 }
1948
1949 clear_bit_unlock(CIFS_INO_LOCK, flags);
b1cce803 1950 smp_mb__after_atomic();
4f73c7d3
JL
1951 wake_up_bit(flags, CIFS_INO_LOCK);
1952
1953 return rc;
1954}
1955
1956int
1957cifs_zap_mapping(struct inode *inode)
1958{
1959 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
1960 return cifs_revalidate_mapping(inode);
e284e53f
JL
1961}
1962
6feb9891 1963int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1964{
1965 int rc = 0;
496ad9aa 1966 struct inode *inode = file_inode(filp);
ba00ba64 1967 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1968
1969 if (!cifs_inode_needs_reval(inode))
6feb9891 1970 return rc;
abab095d 1971
13cfb733 1972 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1973 rc = cifs_get_file_info_unix(filp);
1974 else
1975 rc = cifs_get_file_info(filp);
1976
abab095d
JL
1977 return rc;
1978}
1979
6feb9891 1980int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1981{
6d5786a3 1982 unsigned int xid;
df2cf170 1983 int rc = 0;
2b0143b5 1984 struct inode *inode = d_inode(dentry);
df2cf170 1985 struct super_block *sb = dentry->d_sb;
6feb9891 1986 char *full_path = NULL;
df2cf170
JL
1987
1988 if (inode == NULL)
1989 return -ENOENT;
1da177e4 1990
df2cf170 1991 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1992 return rc;
1993
6d5786a3 1994 xid = get_xid();
1da177e4
LT
1995
1996 /* can not safely grab the rename sem here if rename calls revalidate
1997 since that would deadlock */
df2cf170 1998 full_path = build_path_from_dentry(dentry);
1da177e4 1999 if (full_path == NULL) {
0f3bc09e 2000 rc = -ENOMEM;
6feb9891 2001 goto out;
1da177e4
LT
2002 }
2003
f96637be
JP
2004 cifs_dbg(FYI, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time %ld jiffies %ld\n",
2005 full_path, inode, inode->i_count.counter,
a00be0e3 2006 dentry, cifs_get_time(dentry), jiffies);
1da177e4 2007
0d424ad0 2008 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
2009 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
2010 else
2011 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
2012 xid, NULL);
1da177e4 2013
6feb9891 2014out:
1da177e4 2015 kfree(full_path);
6d5786a3 2016 free_xid(xid);
1da177e4
LT
2017 return rc;
2018}
2019
6feb9891
PS
2020int cifs_revalidate_file(struct file *filp)
2021{
2022 int rc;
496ad9aa 2023 struct inode *inode = file_inode(filp);
6feb9891
PS
2024
2025 rc = cifs_revalidate_file_attr(filp);
2026 if (rc)
2027 return rc;
2028
e284e53f 2029 return cifs_revalidate_mapping(inode);
6feb9891
PS
2030}
2031
2032/* revalidate a dentry's inode attributes */
2033int cifs_revalidate_dentry(struct dentry *dentry)
2034{
2035 int rc;
2b0143b5 2036 struct inode *inode = d_inode(dentry);
6feb9891
PS
2037
2038 rc = cifs_revalidate_dentry_attr(dentry);
2039 if (rc)
2040 return rc;
2041
e284e53f 2042 return cifs_revalidate_mapping(inode);
6feb9891
PS
2043}
2044
a528d35e
DH
2045int cifs_getattr(const struct path *path, struct kstat *stat,
2046 u32 request_mask, unsigned int flags)
1da177e4 2047{
a528d35e 2048 struct dentry *dentry = path->dentry;
3aa1c8c2 2049 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 2050 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
2b0143b5 2051 struct inode *inode = d_inode(dentry);
6feb9891 2052 int rc;
3aa1c8c2 2053
6feb9891
PS
2054 /*
2055 * We need to be sure that all dirty pages are written and the server
2056 * has actual ctime, mtime and file length.
2057 */
18cceb6a 2058 if (!CIFS_CACHE_READ(CIFS_I(inode)) && inode->i_mapping &&
6feb9891
PS
2059 inode->i_mapping->nrpages != 0) {
2060 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
2061 if (rc) {
2062 mapping_set_error(inode->i_mapping, rc);
2063 return rc;
2064 }
6feb9891 2065 }
1c456013 2066
6feb9891
PS
2067 rc = cifs_revalidate_dentry_attr(dentry);
2068 if (rc)
2069 return rc;
2070
2071 generic_fillattr(inode, stat);
2072 stat->blksize = CIFS_MAX_MSGSIZE;
2073 stat->ino = CIFS_I(inode)->uniqueid;
2074
6e70e26d
SF
2075 /* old CIFS Unix Extensions doesn't return create time */
2076 if (CIFS_I(inode)->createtime) {
2077 stat->result_mask |= STATX_BTIME;
95390201
AB
2078 stat->btime =
2079 cifs_NTtimeToUnix(cpu_to_le64(CIFS_I(inode)->createtime));
6e70e26d
SF
2080 }
2081
2082 stat->attributes_mask |= (STATX_ATTR_COMPRESSED | STATX_ATTR_ENCRYPTED);
2083 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_COMPRESSED)
2084 stat->attributes |= STATX_ATTR_COMPRESSED;
2085 if (CIFS_I(inode)->cifsAttrs & FILE_ATTRIBUTE_ENCRYPTED)
2086 stat->attributes |= STATX_ATTR_ENCRYPTED;
2087
6feb9891 2088 /*
d3d1fce1
JL
2089 * If on a multiuser mount without unix extensions or cifsacl being
2090 * enabled, and the admin hasn't overridden them, set the ownership
2091 * to the fsuid/fsgid of the current process.
6feb9891
PS
2092 */
2093 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
d3d1fce1 2094 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
6feb9891
PS
2095 !tcon->unix_ext) {
2096 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
2097 stat->uid = current_fsuid();
2098 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
2099 stat->gid = current_fsgid();
5fe14c85 2100 }
6feb9891 2101 return rc;
1da177e4
LT
2102}
2103
2104static int cifs_truncate_page(struct address_space *mapping, loff_t from)
2105{
09cbfeaf
KS
2106 pgoff_t index = from >> PAGE_SHIFT;
2107 unsigned offset = from & (PAGE_SIZE - 1);
1da177e4 2108 struct page *page;
1da177e4
LT
2109 int rc = 0;
2110
2111 page = grab_cache_page(mapping, index);
2112 if (!page)
2113 return -ENOMEM;
2114
09cbfeaf 2115 zero_user_segment(page, offset, PAGE_SIZE);
1da177e4 2116 unlock_page(page);
09cbfeaf 2117 put_page(page);
1da177e4
LT
2118 return rc;
2119}
2120
1b947463 2121static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 2122{
57c55cd7
RS
2123 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
2124
ba6a46a0 2125 spin_lock(&inode->i_lock);
3677db10 2126 i_size_write(inode, offset);
ba6a46a0 2127 spin_unlock(&inode->i_lock);
1b947463 2128
57c55cd7
RS
2129 /* Cached inode must be refreshed on truncate */
2130 cifs_i->time = 0;
7caef267 2131 truncate_pagecache(inode, offset);
3677db10
SF
2132}
2133
8efdbde6
JL
2134static int
2135cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 2136 unsigned int xid, char *full_path)
8efdbde6
JL
2137{
2138 int rc;
2139 struct cifsFileInfo *open_file;
2140 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2141 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2142 struct tcon_link *tlink = NULL;
d1433418
PS
2143 struct cifs_tcon *tcon = NULL;
2144 struct TCP_Server_Info *server;
8efdbde6
JL
2145
2146 /*
2147 * To avoid spurious oplock breaks from server, in the case of
2148 * inodes that we already have open, avoid doing path based
2149 * setting of file size if we can do it by handle.
2150 * This keeps our caching token (oplock) and avoids timeouts
2151 * when the local oplock break takes longer to flush
2152 * writebehind data than the SMB timeout for the SetPathInfo
2153 * request would allow
2154 */
6508d904 2155 open_file = find_writable_file(cifsInode, true);
8efdbde6 2156 if (open_file) {
d1433418
PS
2157 tcon = tlink_tcon(open_file->tlink);
2158 server = tcon->ses->server;
2159 if (server->ops->set_file_size)
2160 rc = server->ops->set_file_size(xid, tcon, open_file,
2161 attrs->ia_size, false);
2162 else
2163 rc = -ENOSYS;
6ab409b5 2164 cifsFileInfo_put(open_file);
f96637be 2165 cifs_dbg(FYI, "SetFSize for attrs rc = %d\n", rc);
8efdbde6
JL
2166 } else
2167 rc = -EINVAL;
2168
d1433418
PS
2169 if (!rc)
2170 goto set_size_out;
2171
2172 if (tcon == NULL) {
2173 tlink = cifs_sb_tlink(cifs_sb);
2174 if (IS_ERR(tlink))
2175 return PTR_ERR(tlink);
2176 tcon = tlink_tcon(tlink);
2177 server = tcon->ses->server;
2178 }
ba00ba64 2179
d1433418
PS
2180 /*
2181 * Set file size by pathname rather than by handle either because no
2182 * valid, writeable file handle for it was found or because there was
2183 * an error setting it by handle.
2184 */
2185 if (server->ops->set_path_size)
2186 rc = server->ops->set_path_size(xid, tcon, full_path,
2187 attrs->ia_size, cifs_sb, false);
2188 else
2189 rc = -ENOSYS;
f96637be 2190 cifs_dbg(FYI, "SetEOF by path (setattrs) rc = %d\n", rc);
d1433418 2191
d1433418
PS
2192 if (tlink)
2193 cifs_put_tlink(tlink);
8efdbde6 2194
d1433418 2195set_size_out:
8efdbde6 2196 if (rc == 0) {
fbec9ab9 2197 cifsInode->server_eof = attrs->ia_size;
1b947463 2198 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
2199 cifs_truncate_page(inode->i_mapping, inode->i_size);
2200 }
2201
2202 return rc;
2203}
2204
3fe5c1dd
JL
2205static int
2206cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
2207{
2208 int rc;
6d5786a3 2209 unsigned int xid;
3fe5c1dd 2210 char *full_path = NULL;
2b0143b5 2211 struct inode *inode = d_inode(direntry);
3fe5c1dd
JL
2212 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
2213 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 2214 struct tcon_link *tlink;
96daf2b0 2215 struct cifs_tcon *pTcon;
3fe5c1dd 2216 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 2217 struct cifsFileInfo *open_file;
3fe5c1dd 2218
35c265e0
AV
2219 cifs_dbg(FYI, "setattr_unix on file %pd attrs->ia_valid=0x%x\n",
2220 direntry, attrs->ia_valid);
3fe5c1dd 2221
6d5786a3 2222 xid = get_xid();
3fe5c1dd 2223
db78b877
CH
2224 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2225 attrs->ia_valid |= ATTR_FORCE;
2226
31051c85 2227 rc = setattr_prepare(direntry, attrs);
db78b877
CH
2228 if (rc < 0)
2229 goto out;
3fe5c1dd
JL
2230
2231 full_path = build_path_from_dentry(direntry);
2232 if (full_path == NULL) {
2233 rc = -ENOMEM;
2234 goto out;
2235 }
2236
0f4d634c
JL
2237 /*
2238 * Attempt to flush data before changing attributes. We need to do
2239 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2240 * ownership or mode then we may also need to do this. Here, we take
2241 * the safe way out and just do the flush on all setattr requests. If
2242 * the flush returns error, store it to report later and continue.
2243 *
2244 * BB: This should be smarter. Why bother flushing pages that
2245 * will be truncated anyway? Also, should we error out here if
2246 * the flush returns error?
2247 */
2248 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2249 mapping_set_error(inode->i_mapping, rc);
2250 rc = 0;
3fe5c1dd
JL
2251
2252 if (attrs->ia_valid & ATTR_SIZE) {
2253 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2254 if (rc != 0)
2255 goto out;
2256 }
2257
2258 /* skip mode change if it's just for clearing setuid/setgid */
2259 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2260 attrs->ia_valid &= ~ATTR_MODE;
2261
2262 args = kmalloc(sizeof(*args), GFP_KERNEL);
2263 if (args == NULL) {
2264 rc = -ENOMEM;
2265 goto out;
2266 }
2267
2268 /* set up the struct */
2269 if (attrs->ia_valid & ATTR_MODE)
2270 args->mode = attrs->ia_mode;
2271 else
2272 args->mode = NO_CHANGE_64;
2273
2274 if (attrs->ia_valid & ATTR_UID)
2275 args->uid = attrs->ia_uid;
2276 else
49418b2c 2277 args->uid = INVALID_UID; /* no change */
3fe5c1dd
JL
2278
2279 if (attrs->ia_valid & ATTR_GID)
2280 args->gid = attrs->ia_gid;
2281 else
49418b2c 2282 args->gid = INVALID_GID; /* no change */
3fe5c1dd
JL
2283
2284 if (attrs->ia_valid & ATTR_ATIME)
95390201 2285 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
3fe5c1dd
JL
2286 else
2287 args->atime = NO_CHANGE_64;
2288
2289 if (attrs->ia_valid & ATTR_MTIME)
95390201 2290 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
3fe5c1dd
JL
2291 else
2292 args->mtime = NO_CHANGE_64;
2293
2294 if (attrs->ia_valid & ATTR_CTIME)
95390201 2295 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
3fe5c1dd
JL
2296 else
2297 args->ctime = NO_CHANGE_64;
2298
2299 args->device = 0;
6508d904 2300 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2301 if (open_file) {
4b4de76e 2302 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2303 u32 npid = open_file->pid;
13cfb733 2304 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2305 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2306 cifsFileInfo_put(open_file);
3bbeeb3c 2307 } else {
7ffec372
JL
2308 tlink = cifs_sb_tlink(cifs_sb);
2309 if (IS_ERR(tlink)) {
2310 rc = PTR_ERR(tlink);
2311 goto out;
2312 }
2313 pTcon = tlink_tcon(tlink);
3bbeeb3c 2314 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3 2315 cifs_sb->local_nls,
bc8ebdc4 2316 cifs_remap(cifs_sb));
7ffec372 2317 cifs_put_tlink(tlink);
3bbeeb3c 2318 }
3fe5c1dd 2319
1025774c
CH
2320 if (rc)
2321 goto out;
ccd4bb1b 2322
1025774c 2323 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2324 attrs->ia_size != i_size_read(inode))
2325 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2326
2327 setattr_copy(inode, attrs);
2328 mark_inode_dirty(inode);
2329
2330 /* force revalidate when any of these times are set since some
2331 of the fs types (eg ext3, fat) do not have fine enough
2332 time granularity to match protocol, and we do not have a
2333 a way (yet) to query the server fs's time granularity (and
2334 whether it rounds times down).
2335 */
2336 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2337 cifsInode->time = 0;
3fe5c1dd
JL
2338out:
2339 kfree(args);
2340 kfree(full_path);
6d5786a3 2341 free_xid(xid);
3fe5c1dd
JL
2342 return rc;
2343}
2344
0510eeb7
JL
2345static int
2346cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2347{
6d5786a3 2348 unsigned int xid;
8abf2775
EB
2349 kuid_t uid = INVALID_UID;
2350 kgid_t gid = INVALID_GID;
2b0143b5 2351 struct inode *inode = d_inode(direntry);
3fe5c1dd 2352 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2353 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2354 char *full_path = NULL;
2355 int rc = -EACCES;
feb3e20c 2356 __u32 dosattr = 0;
4e1e7fb9 2357 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2358
6d5786a3 2359 xid = get_xid();
1da177e4 2360
35c265e0
AV
2361 cifs_dbg(FYI, "setattr on file %pd attrs->iavalid 0x%x\n",
2362 direntry, attrs->ia_valid);
6473a559 2363
db78b877
CH
2364 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2365 attrs->ia_valid |= ATTR_FORCE;
2366
31051c85 2367 rc = setattr_prepare(direntry, attrs);
db78b877 2368 if (rc < 0) {
6d5786a3 2369 free_xid(xid);
db78b877 2370 return rc;
6473a559 2371 }
50c2f753 2372
7f57356b 2373 full_path = build_path_from_dentry(direntry);
1da177e4 2374 if (full_path == NULL) {
0f3bc09e 2375 rc = -ENOMEM;
6d5786a3 2376 free_xid(xid);
0f3bc09e 2377 return rc;
1da177e4 2378 }
1da177e4 2379
0f4d634c
JL
2380 /*
2381 * Attempt to flush data before changing attributes. We need to do
2382 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2383 * ownership or mode then we may also need to do this. Here, we take
2384 * the safe way out and just do the flush on all setattr requests. If
2385 * the flush returns error, store it to report later and continue.
2386 *
2387 * BB: This should be smarter. Why bother flushing pages that
2388 * will be truncated anyway? Also, should we error out here if
2389 * the flush returns error?
2390 */
2391 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2392 mapping_set_error(inode->i_mapping, rc);
2393 rc = 0;
cea21805 2394
50531444 2395 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2396 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2397 if (rc != 0)
e30dcf3a 2398 goto cifs_setattr_exit;
1da177e4 2399 }
4ca691a8 2400
a5ff3769
SP
2401 if (attrs->ia_valid & ATTR_UID)
2402 uid = attrs->ia_uid;
2403
2404 if (attrs->ia_valid & ATTR_GID)
2405 gid = attrs->ia_gid;
2406
2407#ifdef CONFIG_CIFS_ACL
2408 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
8abf2775 2409 if (uid_valid(uid) || gid_valid(gid)) {
a5ff3769
SP
2410 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2411 uid, gid);
2412 if (rc) {
f96637be
JP
2413 cifs_dbg(FYI, "%s: Setting id failed with error: %d\n",
2414 __func__, rc);
a5ff3769
SP
2415 goto cifs_setattr_exit;
2416 }
2417 }
2418 } else
2419#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2420 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2421 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2422
d32c4f26
JL
2423 /* skip mode change if it's just for clearing setuid/setgid */
2424 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2425 attrs->ia_valid &= ~ATTR_MODE;
2426
1da177e4 2427 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2428 mode = attrs->ia_mode;
cdbce9c8 2429 rc = 0;
79df1bae 2430#ifdef CONFIG_CIFS_ACL
78415d2d 2431 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769 2432 rc = id_mode_to_cifs_acl(inode, full_path, mode,
8abf2775 2433 INVALID_UID, INVALID_GID);
78415d2d 2434 if (rc) {
f96637be
JP
2435 cifs_dbg(FYI, "%s: Setting ACL failed with error: %d\n",
2436 __func__, rc);
78415d2d
SP
2437 goto cifs_setattr_exit;
2438 }
2439 } else
79df1bae 2440#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2441 if (((mode & S_IWUGO) == 0) &&
2442 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2443
2444 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2445
5132861a
JL
2446 /* fix up mode if we're not using dynperm */
2447 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2448 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2449 } else if ((mode & S_IWUGO) &&
2450 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2451
2452 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2453 /* Attributes of 0 are ignored */
2454 if (dosattr == 0)
2455 dosattr |= ATTR_NORMAL;
5132861a
JL
2456
2457 /* reset local inode permissions to normal */
2458 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2459 attrs->ia_mode &= ~(S_IALLUGO);
2460 if (S_ISDIR(inode->i_mode))
2461 attrs->ia_mode |=
2462 cifs_sb->mnt_dir_mode;
2463 else
2464 attrs->ia_mode |=
2465 cifs_sb->mnt_file_mode;
2466 }
2467 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2468 /* ignore mode change - ATTR_READONLY hasn't changed */
2469 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2470 }
1da177e4
LT
2471 }
2472
feb3e20c
JL
2473 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2474 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2475 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2476 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2477
e30dcf3a
SF
2478 /* Even if error on time set, no sense failing the call if
2479 the server would set the time to a reasonable value anyway,
2480 and this check ensures that we are not being called from
2481 sys_utimes in which case we ought to fail the call back to
2482 the user when the server rejects the call */
fb8c4b14 2483 if ((rc) && (attrs->ia_valid &
feb3e20c 2484 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2485 rc = 0;
1da177e4
LT
2486 }
2487
2488 /* do not need local check to inode_check_ok since the server does
2489 that */
1025774c
CH
2490 if (rc)
2491 goto cifs_setattr_exit;
2492
2493 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2494 attrs->ia_size != i_size_read(inode))
2495 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2496
2497 setattr_copy(inode, attrs);
2498 mark_inode_dirty(inode);
1025774c 2499
e30dcf3a 2500cifs_setattr_exit:
1da177e4 2501 kfree(full_path);
6d5786a3 2502 free_xid(xid);
1da177e4
LT
2503 return rc;
2504}
2505
0510eeb7
JL
2506int
2507cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2508{
fc64005c 2509 struct cifs_sb_info *cifs_sb = CIFS_SB(direntry->d_sb);
96daf2b0 2510 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2511
2512 if (pTcon->unix_ext)
2513 return cifs_setattr_unix(direntry, attrs);
2514
2515 return cifs_setattr_nounix(direntry, attrs);
2516
2517 /* BB: add cifs_setattr_legacy for really old servers */
2518}
2519
99ee4dbd 2520#if 0
1da177e4
LT
2521void cifs_delete_inode(struct inode *inode)
2522{
f96637be 2523 cifs_dbg(FYI, "In cifs_delete_inode, inode = 0x%p\n", inode);
1da177e4
LT
2524 /* may have to add back in if and when safe distributed caching of
2525 directories added e.g. via FindNotify */
2526}
99ee4dbd 2527#endif
This page took 1.160672 seconds and 4 git commands to generate.