CIFS: Add SMB2 support for hardlink operation
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f19159dc 94 cFYI(1, "%s: revalidating inode %llu", __func__, cifs_i->uniqueid);
df2cf170
JL
95
96 if (inode->i_state & I_NEW) {
f19159dc 97 cFYI(1, "%s: inode %llu is new", __func__, cifs_i->uniqueid);
df2cf170
JL
98 return;
99 }
100
101 /* don't bother with revalidation if we have an oplock */
102 if (cifs_i->clientCanCacheRead) {
f19159dc
SF
103 cFYI(1, "%s: inode %llu is oplocked", __func__,
104 cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* revalidate if mtime or size have changed */
109 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
110 cifs_i->server_eof == fattr->cf_eof) {
f19159dc
SF
111 cFYI(1, "%s: inode %llu is unchanged", __func__,
112 cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
f19159dc
SF
116 cFYI(1, "%s: invalidating inode %llu mapping", __func__,
117 cifs_i->uniqueid);
df2cf170
JL
118 cifs_i->invalid_mapping = true;
119}
120
cc0bad75
JL
121/* populate an inode with info from a cifs_fattr struct */
122void
123cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 124{
cc0bad75 125 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3 126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cc0bad75 127
df2cf170
JL
128 cifs_revalidate_cache(inode, fattr);
129
b7ca6928 130 spin_lock(&inode->i_lock);
cc0bad75
JL
131 inode->i_atime = fattr->cf_atime;
132 inode->i_mtime = fattr->cf_mtime;
133 inode->i_ctime = fattr->cf_ctime;
cc0bad75 134 inode->i_rdev = fattr->cf_rdev;
bfe86848 135 set_nlink(inode, fattr->cf_nlink);
cc0bad75
JL
136 inode->i_uid = fattr->cf_uid;
137 inode->i_gid = fattr->cf_gid;
138
0b8f18e3
JL
139 /* if dynperm is set, don't clobber existing mode */
140 if (inode->i_state & I_NEW ||
141 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
142 inode->i_mode = fattr->cf_mode;
143
cc0bad75 144 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 145
0b8f18e3
JL
146 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
147 cifs_i->time = 0;
148 else
149 cifs_i->time = jiffies;
150
0b8f18e3 151 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 152
835a36ca 153 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
154 /*
155 * Can't safely change the file size here if the client is writing to
156 * it due to potential races.
157 */
cc0bad75
JL
158 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
159 i_size_write(inode, fattr->cf_eof);
160
161 /*
162 * i_blocks is not related to (i_size / i_blksize),
163 * but instead 512 byte (2**9) size is required for
164 * calculating num blocks.
165 */
166 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
167 }
168 spin_unlock(&inode->i_lock);
169
01c64fea
DH
170 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
171 inode->i_flags |= S_AUTOMOUNT;
172 cifs_set_ops(inode);
cc0bad75
JL
173}
174
4065c802
JL
175void
176cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
177{
178 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
179
180 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
181 return;
182
183 fattr->cf_uniqueid = iunique(sb, ROOT_I);
184}
185
cc0bad75
JL
186/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
187void
188cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
189 struct cifs_sb_info *cifs_sb)
190{
191 memset(fattr, 0, sizeof(*fattr));
192 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
193 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
194 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
195
196 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
197 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
198 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
199 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
200
201 /*
202 * Since we set the inode type below we need to mask off
203 * to avoid strange results if bits set above.
204 */
cc0bad75 205 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
206 switch (le32_to_cpu(info->Type)) {
207 case UNIX_FILE:
cc0bad75
JL
208 fattr->cf_mode |= S_IFREG;
209 fattr->cf_dtype = DT_REG;
75f12983
CH
210 break;
211 case UNIX_SYMLINK:
cc0bad75
JL
212 fattr->cf_mode |= S_IFLNK;
213 fattr->cf_dtype = DT_LNK;
75f12983
CH
214 break;
215 case UNIX_DIR:
cc0bad75
JL
216 fattr->cf_mode |= S_IFDIR;
217 fattr->cf_dtype = DT_DIR;
75f12983
CH
218 break;
219 case UNIX_CHARDEV:
cc0bad75
JL
220 fattr->cf_mode |= S_IFCHR;
221 fattr->cf_dtype = DT_CHR;
222 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
223 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
224 break;
225 case UNIX_BLOCKDEV:
cc0bad75
JL
226 fattr->cf_mode |= S_IFBLK;
227 fattr->cf_dtype = DT_BLK;
228 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
229 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
230 break;
231 case UNIX_FIFO:
cc0bad75
JL
232 fattr->cf_mode |= S_IFIFO;
233 fattr->cf_dtype = DT_FIFO;
75f12983
CH
234 break;
235 case UNIX_SOCKET:
cc0bad75
JL
236 fattr->cf_mode |= S_IFSOCK;
237 fattr->cf_dtype = DT_SOCK;
75f12983
CH
238 break;
239 default:
240 /* safest to call it a file if we do not know */
cc0bad75
JL
241 fattr->cf_mode |= S_IFREG;
242 fattr->cf_dtype = DT_REG;
b6b38f70 243 cFYI(1, "unknown type %d", le32_to_cpu(info->Type));
75f12983
CH
244 break;
245 }
246
cc0bad75
JL
247 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)
248 fattr->cf_uid = cifs_sb->mnt_uid;
75f12983 249 else
cc0bad75 250 fattr->cf_uid = le64_to_cpu(info->Uid);
75f12983 251
cc0bad75
JL
252 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)
253 fattr->cf_gid = cifs_sb->mnt_gid;
75f12983 254 else
cc0bad75 255 fattr->cf_gid = le64_to_cpu(info->Gid);
75f12983 256
cc0bad75 257 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
258}
259
b9a3260f 260/*
cc0bad75
JL
261 * Fill a cifs_fattr struct with fake inode info.
262 *
263 * Needed to setup cifs_fattr data for the directory which is the
264 * junction to the new submount (ie to setup the fake directory
265 * which represents a DFS referral).
b9a3260f 266 */
f1230c97 267static void
cc0bad75 268cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 269{
cc0bad75 270 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 271
b6b38f70 272 cFYI(1, "creating fake fattr for DFS referral");
cc0bad75
JL
273
274 memset(fattr, 0, sizeof(*fattr));
275 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
276 fattr->cf_uid = cifs_sb->mnt_uid;
277 fattr->cf_gid = cifs_sb->mnt_gid;
278 fattr->cf_atime = CURRENT_TIME;
279 fattr->cf_ctime = CURRENT_TIME;
280 fattr->cf_mtime = CURRENT_TIME;
281 fattr->cf_nlink = 2;
282 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
283}
284
4ad65044
PS
285static int
286cifs_get_file_info_unix(struct file *filp)
abab095d
JL
287{
288 int rc;
6d5786a3 289 unsigned int xid;
abab095d
JL
290 FILE_UNIX_BASIC_INFO find_data;
291 struct cifs_fattr fattr;
292 struct inode *inode = filp->f_path.dentry->d_inode;
293 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 294 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 295 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
abab095d 296
6d5786a3 297 xid = get_xid();
4b4de76e 298 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->fid.netfid, &find_data);
abab095d
JL
299 if (!rc) {
300 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
301 } else if (rc == -EREMOTE) {
302 cifs_create_dfs_fattr(&fattr, inode->i_sb);
303 rc = 0;
304 }
305
306 cifs_fattr_to_inode(inode, &fattr);
6d5786a3 307 free_xid(xid);
abab095d
JL
308 return rc;
309}
310
1da177e4 311int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75 312 const unsigned char *full_path,
6d5786a3 313 struct super_block *sb, unsigned int xid)
1da177e4 314{
cc0bad75 315 int rc;
0e4bbde9 316 FILE_UNIX_BASIC_INFO find_data;
cc0bad75 317 struct cifs_fattr fattr;
96daf2b0 318 struct cifs_tcon *tcon;
7ffec372 319 struct tcon_link *tlink;
1da177e4 320 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 321
b6b38f70 322 cFYI(1, "Getting info on %s", full_path);
7962670e 323
7ffec372
JL
324 tlink = cifs_sb_tlink(cifs_sb);
325 if (IS_ERR(tlink))
326 return PTR_ERR(tlink);
327 tcon = tlink_tcon(tlink);
328
1da177e4 329 /* could have done a find first instead but this returns more info */
cc0bad75 330 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
331 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
332 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 333 cifs_put_tlink(tlink);
e911d0cc 334
cc0bad75
JL
335 if (!rc) {
336 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
337 } else if (rc == -EREMOTE) {
338 cifs_create_dfs_fattr(&fattr, sb);
339 rc = 0;
340 } else {
341 return rc;
342 }
1da177e4 343
1b12b9c1
SM
344 /* check for Minshall+French symlinks */
345 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
346 int tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
347 if (tmprc)
348 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
349 }
350
0e4bbde9 351 if (*pinode == NULL) {
cc0bad75 352 /* get new inode */
4065c802 353 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
354 *pinode = cifs_iget(sb, &fattr);
355 if (!*pinode)
0e4bbde9 356 rc = -ENOMEM;
cc0bad75
JL
357 } else {
358 /* we already have inode, update it */
359 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 360 }
1da177e4 361
1da177e4
LT
362 return rc;
363}
364
0b8f18e3
JL
365static int
366cifs_sfu_type(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 367 struct cifs_sb_info *cifs_sb, unsigned int xid)
d6e2f2a4
SF
368{
369 int rc;
4b18f2a9 370 int oplock = 0;
d6e2f2a4 371 __u16 netfid;
7ffec372 372 struct tcon_link *tlink;
96daf2b0 373 struct cifs_tcon *tcon;
d4ffff1f 374 struct cifs_io_parms io_parms;
86c96b4b 375 char buf[24];
d6e2f2a4 376 unsigned int bytes_read;
fb8c4b14 377 char *pbuf;
d6e2f2a4
SF
378
379 pbuf = buf;
380
0b8f18e3
JL
381 fattr->cf_mode &= ~S_IFMT;
382
383 if (fattr->cf_eof == 0) {
384 fattr->cf_mode |= S_IFIFO;
385 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 386 return 0;
0b8f18e3
JL
387 } else if (fattr->cf_eof < 8) {
388 fattr->cf_mode |= S_IFREG;
389 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
390 return -EINVAL; /* EOPNOTSUPP? */
391 }
50c2f753 392
7ffec372
JL
393 tlink = cifs_sb_tlink(cifs_sb);
394 if (IS_ERR(tlink))
395 return PTR_ERR(tlink);
396 tcon = tlink_tcon(tlink);
397
398 rc = CIFSSMBOpen(xid, tcon, path, FILE_OPEN, GENERIC_READ,
d6e2f2a4
SF
399 CREATE_NOT_DIR, &netfid, &oplock, NULL,
400 cifs_sb->local_nls,
401 cifs_sb->mnt_cifs_flags &
402 CIFS_MOUNT_MAP_SPECIAL_CHR);
fb8c4b14 403 if (rc == 0) {
ec637e3f 404 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4 405 /* Read header */
d4ffff1f
PS
406 io_parms.netfid = netfid;
407 io_parms.pid = current->tgid;
408 io_parms.tcon = tcon;
409 io_parms.offset = 0;
410 io_parms.length = 24;
411 rc = CIFSSMBRead(xid, &io_parms, &bytes_read, &pbuf,
412 &buf_type);
4523cc30
SF
413 if ((rc == 0) && (bytes_read >= 8)) {
414 if (memcmp("IntxBLK", pbuf, 8) == 0) {
b6b38f70 415 cFYI(1, "Block device");
0b8f18e3
JL
416 fattr->cf_mode |= S_IFBLK;
417 fattr->cf_dtype = DT_BLK;
4523cc30 418 if (bytes_read == 24) {
86c96b4b
SF
419 /* we have enough to decode dev num */
420 __u64 mjr; /* major */
421 __u64 mnr; /* minor */
422 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
423 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 424 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 425 }
4523cc30 426 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
b6b38f70 427 cFYI(1, "Char device");
0b8f18e3
JL
428 fattr->cf_mode |= S_IFCHR;
429 fattr->cf_dtype = DT_CHR;
4523cc30 430 if (bytes_read == 24) {
86c96b4b
SF
431 /* we have enough to decode dev num */
432 __u64 mjr; /* major */
433 __u64 mnr; /* minor */
434 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
435 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 436 fattr->cf_rdev = MKDEV(mjr, mnr);
fb8c4b14 437 }
4523cc30 438 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
b6b38f70 439 cFYI(1, "Symlink");
0b8f18e3
JL
440 fattr->cf_mode |= S_IFLNK;
441 fattr->cf_dtype = DT_LNK;
86c96b4b 442 } else {
0b8f18e3
JL
443 fattr->cf_mode |= S_IFREG; /* file? */
444 fattr->cf_dtype = DT_REG;
fb8c4b14 445 rc = -EOPNOTSUPP;
86c96b4b 446 }
3020a1f5 447 } else {
0b8f18e3
JL
448 fattr->cf_mode |= S_IFREG; /* then it is a file */
449 fattr->cf_dtype = DT_REG;
fb8c4b14
SF
450 rc = -EOPNOTSUPP; /* or some unknown SFU type */
451 }
7ffec372 452 CIFSSMBClose(xid, tcon, netfid);
d6e2f2a4 453 }
7ffec372 454 cifs_put_tlink(tlink);
d6e2f2a4 455 return rc;
d6e2f2a4
SF
456}
457
9e294f1c
SF
458#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
459
0b8f18e3
JL
460/*
461 * Fetch mode bits as provided by SFU.
462 *
463 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
464 */
465static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
6d5786a3 466 struct cifs_sb_info *cifs_sb, unsigned int xid)
9e294f1c 467{
3020a1f5 468#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
469 ssize_t rc;
470 char ea_value[4];
471 __u32 mode;
7ffec372 472 struct tcon_link *tlink;
96daf2b0 473 struct cifs_tcon *tcon;
7ffec372
JL
474
475 tlink = cifs_sb_tlink(cifs_sb);
476 if (IS_ERR(tlink))
477 return PTR_ERR(tlink);
478 tcon = tlink_tcon(tlink);
9e294f1c 479
7ffec372 480 rc = CIFSSMBQAllEAs(xid, tcon, path, "SETFILEBITS",
0b8f18e3
JL
481 ea_value, 4 /* size of buf */, cifs_sb->local_nls,
482 cifs_sb->mnt_cifs_flags &
483 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 484 cifs_put_tlink(tlink);
4523cc30 485 if (rc < 0)
9e294f1c
SF
486 return (int)rc;
487 else if (rc > 3) {
488 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 489 fattr->cf_mode &= ~SFBITS_MASK;
b6b38f70
JP
490 cFYI(1, "special bits 0%o org mode 0%o", mode,
491 fattr->cf_mode);
0b8f18e3 492 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
b6b38f70 493 cFYI(1, "special mode bits 0%o", mode);
9e294f1c 494 }
0b8f18e3
JL
495
496 return 0;
3020a1f5
SF
497#else
498 return -EOPNOTSUPP;
499#endif
9e294f1c
SF
500}
501
0b8f18e3 502/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 503static void
0b8f18e3
JL
504cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
505 struct cifs_sb_info *cifs_sb, bool adjust_tz)
b9a3260f 506{
96daf2b0 507 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
0d424ad0 508
0b8f18e3
JL
509 memset(fattr, 0, sizeof(*fattr));
510 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
511 if (info->DeletePending)
512 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
513
514 if (info->LastAccessTime)
515 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
516 else
517 fattr->cf_atime = CURRENT_TIME;
518
519 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
520 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
521
522 if (adjust_tz) {
0d424ad0
JL
523 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
524 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
525 }
526
527 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
528 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 529 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3
JL
530
531 if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
532 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
533 fattr->cf_dtype = DT_DIR;
6de2ce42
PS
534 /*
535 * Server can return wrong NumberOfLinks value for directories
536 * when Unix extensions are disabled - fake it.
537 */
538 fattr->cf_nlink = 2;
0b8f18e3
JL
539 } else {
540 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
541 fattr->cf_dtype = DT_REG;
0b8f18e3 542
d0c280d2
JL
543 /* clear write bits if ATTR_READONLY is set */
544 if (fattr->cf_cifsattrs & ATTR_READONLY)
545 fattr->cf_mode &= ~(S_IWUGO);
0b8f18e3 546
6de2ce42
PS
547 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
548 }
0b8f18e3
JL
549
550 fattr->cf_uid = cifs_sb->mnt_uid;
551 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
552}
553
4ad65044
PS
554static int
555cifs_get_file_info(struct file *filp)
abab095d
JL
556{
557 int rc;
6d5786a3 558 unsigned int xid;
abab095d
JL
559 FILE_ALL_INFO find_data;
560 struct cifs_fattr fattr;
561 struct inode *inode = filp->f_path.dentry->d_inode;
562 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 563 struct cifsFileInfo *cfile = filp->private_data;
96daf2b0 564 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
4ad65044
PS
565 struct TCP_Server_Info *server = tcon->ses->server;
566
567 if (!server->ops->query_file_info)
568 return -ENOSYS;
abab095d 569
6d5786a3 570 xid = get_xid();
4ad65044 571 rc = server->ops->query_file_info(xid, tcon, &cfile->fid, &find_data);
42274bb2
PS
572 switch (rc) {
573 case 0:
574 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false);
575 break;
576 case -EREMOTE:
577 cifs_create_dfs_fattr(&fattr, inode->i_sb);
578 rc = 0;
579 break;
580 case -EOPNOTSUPP:
581 case -EINVAL:
abab095d
JL
582 /*
583 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
584 * for now, just skip revalidating and mark inode for
585 * immediate reval.
586 */
abab095d
JL
587 rc = 0;
588 CIFS_I(inode)->time = 0;
42274bb2 589 default:
abab095d 590 goto cgfi_exit;
42274bb2 591 }
abab095d
JL
592
593 /*
594 * don't bother with SFU junk here -- just mark inode as needing
595 * revalidation.
596 */
abab095d
JL
597 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
598 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
599 cifs_fattr_to_inode(inode, &fattr);
600cgfi_exit:
6d5786a3 601 free_xid(xid);
abab095d
JL
602 return rc;
603}
604
1208ef1f
PS
605int
606cifs_get_inode_info(struct inode **inode, const char *full_path,
607 FILE_ALL_INFO *data, struct super_block *sb, int xid,
608 const __u16 *fid)
1da177e4 609{
0b8f18e3 610 int rc = 0, tmprc;
1208ef1f
PS
611 struct cifs_tcon *tcon;
612 struct TCP_Server_Info *server;
7ffec372 613 struct tcon_link *tlink;
1da177e4 614 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 615 char *buf = NULL;
1208ef1f 616 bool adjust_tz = false;
0b8f18e3 617 struct cifs_fattr fattr;
1da177e4 618
7ffec372
JL
619 tlink = cifs_sb_tlink(cifs_sb);
620 if (IS_ERR(tlink))
621 return PTR_ERR(tlink);
1208ef1f
PS
622 tcon = tlink_tcon(tlink);
623 server = tcon->ses->server;
7ffec372 624
b6b38f70 625 cFYI(1, "Getting info on %s", full_path);
1da177e4 626
1208ef1f
PS
627 if ((data == NULL) && (*inode != NULL)) {
628 if (CIFS_I(*inode)->clientCanCacheRead) {
b6b38f70 629 cFYI(1, "No need to revalidate cached inode sizes");
7ffec372 630 goto cgii_exit;
1da177e4
LT
631 }
632 }
633
1208ef1f
PS
634 /* if inode info is not passed, get it from server */
635 if (data == NULL) {
636 if (!server->ops->query_path_info) {
637 rc = -ENOSYS;
638 goto cgii_exit;
639 }
1da177e4 640 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
641 if (buf == NULL) {
642 rc = -ENOMEM;
643 goto cgii_exit;
644 }
1208ef1f
PS
645 data = (FILE_ALL_INFO *)buf;
646 rc = server->ops->query_path_info(xid, tcon, cifs_sb, full_path,
647 data, &adjust_tz);
1da177e4 648 }
0b8f18e3
JL
649
650 if (!rc) {
1208ef1f
PS
651 cifs_all_info_to_fattr(&fattr, (FILE_ALL_INFO *)data, cifs_sb,
652 adjust_tz);
0b8f18e3
JL
653 } else if (rc == -EREMOTE) {
654 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 655 rc = 0;
0b8f18e3 656 } else {
7962670e 657 goto cgii_exit;
0b8f18e3 658 }
1da177e4 659
0b8f18e3
JL
660 /*
661 * If an inode wasn't passed in, then get the inode number
662 *
663 * Is an i_ino of zero legal? Can we use that to check if the server
664 * supports returning inode numbers? Are there other sanity checks we
665 * can use to ensure that the server is really filling in that field?
0b8f18e3 666 */
1208ef1f 667 if (*inode == NULL) {
b9a3260f 668 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
1208ef1f
PS
669 if (server->ops->get_srv_inum)
670 tmprc = server->ops->get_srv_inum(xid, tcon,
671 cifs_sb, full_path, &fattr.cf_uniqueid,
672 data);
673 else
674 tmprc = -ENOSYS;
675 if (tmprc || !fattr.cf_uniqueid) {
676 cFYI(1, "GetSrvInodeNum rc %d", tmprc);
0b8f18e3 677 fattr.cf_uniqueid = iunique(sb, ROOT_I);
ec06aedd 678 cifs_autodisable_serverino(cifs_sb);
132ac7b7 679 }
132ac7b7 680 } else {
0b8f18e3 681 fattr.cf_uniqueid = iunique(sb, ROOT_I);
132ac7b7 682 }
b9a3260f 683 } else {
1208ef1f 684 fattr.cf_uniqueid = CIFS_I(*inode)->uniqueid;
b9a3260f
SF
685 }
686
0b8f18e3
JL
687 /* query for SFU type info if supported and needed */
688 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
689 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
690 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
691 if (tmprc)
b6b38f70 692 cFYI(1, "cifs_sfu_type failed: %d", tmprc);
b9a3260f 693 }
1da177e4 694
79df1bae 695#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
696 /* fill in 0777 bits from ACL */
697 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
1208ef1f 698 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *inode, full_path, fid);
78415d2d
SP
699 if (rc) {
700 cFYI(1, "%s: Getting ACL failed with error: %d",
701 __func__, rc);
702 goto cgii_exit;
703 }
b9a3260f 704 }
79df1bae 705#endif /* CONFIG_CIFS_ACL */
b9a3260f 706
0b8f18e3
JL
707 /* fill in remaining high mode bits e.g. SUID, VTX */
708 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
709 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 710
1b12b9c1
SM
711 /* check for Minshall+French symlinks */
712 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
713 tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
714 if (tmprc)
715 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
716 }
717
1208ef1f
PS
718 if (!*inode) {
719 *inode = cifs_iget(sb, &fattr);
720 if (!*inode)
0b8f18e3
JL
721 rc = -ENOMEM;
722 } else {
1208ef1f 723 cifs_fattr_to_inode(*inode, &fattr);
0b8f18e3 724 }
b9a3260f 725
7962670e 726cgii_exit:
1da177e4 727 kfree(buf);
7ffec372 728 cifs_put_tlink(tlink);
1da177e4
LT
729 return rc;
730}
731
7f8ed420
SF
732static const struct inode_operations cifs_ipc_inode_ops = {
733 .lookup = cifs_lookup,
734};
735
cc0bad75
JL
736static int
737cifs_find_inode(struct inode *inode, void *opaque)
738{
739 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
740
f30b9c11 741 /* don't match inode with different uniqueid */
cc0bad75
JL
742 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
743 return 0;
744
20054bd6
JL
745 /* use createtime like an i_generation field */
746 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
747 return 0;
748
f30b9c11
JL
749 /* don't match inode of different type */
750 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
751 return 0;
752
5acfec25 753 /* if it's not a directory or has no dentries, then flag it */
b3d9b7a3 754 if (S_ISDIR(inode->i_mode) && !hlist_empty(&inode->i_dentry))
3d694380 755 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 756
cc0bad75
JL
757 return 1;
758}
759
760static int
761cifs_init_inode(struct inode *inode, void *opaque)
762{
763 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
764
765 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 766 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
767 return 0;
768}
769
5acfec25
JL
770/*
771 * walk dentry list for an inode and report whether it has aliases that
772 * are hashed. We use this to determine if a directory inode can actually
773 * be used.
774 */
775static bool
776inode_has_hashed_dentries(struct inode *inode)
777{
778 struct dentry *dentry;
b3d9b7a3 779 struct hlist_node *p;
5acfec25 780
873feea0 781 spin_lock(&inode->i_lock);
b3d9b7a3 782 hlist_for_each_entry(dentry, p, &inode->i_dentry, d_alias) {
5acfec25 783 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 784 spin_unlock(&inode->i_lock);
5acfec25
JL
785 return true;
786 }
787 }
873feea0 788 spin_unlock(&inode->i_lock);
5acfec25
JL
789 return false;
790}
791
cc0bad75
JL
792/* Given fattrs, get a corresponding inode */
793struct inode *
794cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
795{
796 unsigned long hash;
797 struct inode *inode;
798
3d694380 799retry_iget5_locked:
b6b38f70 800 cFYI(1, "looking for uniqueid=%llu", fattr->cf_uniqueid);
cc0bad75
JL
801
802 /* hash down to 32-bits on 32-bit arch */
803 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
804
805 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 806 if (inode) {
5acfec25 807 /* was there a potentially problematic inode collision? */
3d694380 808 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 809 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
810
811 if (inode_has_hashed_dentries(inode)) {
812 cifs_autodisable_serverino(CIFS_SB(sb));
813 iput(inode);
814 fattr->cf_uniqueid = iunique(sb, ROOT_I);
815 goto retry_iget5_locked;
816 }
3d694380
JL
817 }
818
cc0bad75
JL
819 cifs_fattr_to_inode(inode, fattr);
820 if (sb->s_flags & MS_NOATIME)
821 inode->i_flags |= S_NOATIME | S_NOCMTIME;
822 if (inode->i_state & I_NEW) {
823 inode->i_ino = hash;
522440ed
JL
824 if (S_ISREG(inode->i_mode))
825 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 826#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
827 /* initialize per-inode cache cookie pointer */
828 CIFS_I(inode)->fscache = NULL;
0ccd4802 829#endif
cc0bad75
JL
830 unlock_new_inode(inode);
831 }
832 }
833
834 return inode;
835}
836
1da177e4 837/* gets root inode */
9b6763e0 838struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 839{
6d5786a3 840 unsigned int xid;
0d424ad0 841 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 842 struct inode *inode = NULL;
ce634ab2 843 long rc;
96daf2b0 844 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 845
6d5786a3 846 xid = get_xid();
0d424ad0 847 if (tcon->unix_ext)
f87d39d9 848 rc = cifs_get_inode_info_unix(&inode, "", sb, xid);
0b8f18e3 849 else
f87d39d9 850 rc = cifs_get_inode_info(&inode, "", NULL, sb, xid, NULL);
0b8f18e3 851
a7851ce7
OS
852 if (!inode) {
853 inode = ERR_PTR(rc);
854 goto out;
855 }
cc0bad75 856
0ccd4802 857#ifdef CONFIG_CIFS_FSCACHE
d03382ce 858 /* populate tcon->resource_id */
0d424ad0 859 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 860#endif
d03382ce 861
0d424ad0 862 if (rc && tcon->ipc) {
b6b38f70 863 cFYI(1, "ipc connection - fake read inode");
b7ca6928 864 spin_lock(&inode->i_lock);
7f8ed420 865 inode->i_mode |= S_IFDIR;
bfe86848 866 set_nlink(inode, 2);
7f8ed420
SF
867 inode->i_op = &cifs_ipc_inode_ops;
868 inode->i_fop = &simple_dir_operations;
869 inode->i_uid = cifs_sb->mnt_uid;
870 inode->i_gid = cifs_sb->mnt_gid;
b7ca6928 871 spin_unlock(&inode->i_lock);
ad661334 872 } else if (rc) {
ce634ab2 873 iget_failed(inode);
a7851ce7 874 inode = ERR_PTR(rc);
7f8ed420
SF
875 }
876
a7851ce7 877out:
6d5786a3 878 /* can not call macro free_xid here since in a void func
ce634ab2
DH
879 * TODO: This is no longer true
880 */
6d5786a3 881 _free_xid(xid);
ce634ab2 882 return inode;
1da177e4
LT
883}
884
ed6875e0 885int
6d5786a3 886cifs_set_file_info(struct inode *inode, struct iattr *attrs, unsigned int xid,
ed6875e0 887 char *full_path, __u32 dosattr)
388e57b2
SF
888{
889 int rc;
890 int oplock = 0;
891 __u16 netfid;
892 __u32 netpid;
893 bool set_time = false;
894 struct cifsFileInfo *open_file;
895 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
896 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 897 struct tcon_link *tlink = NULL;
96daf2b0 898 struct cifs_tcon *pTcon;
388e57b2
SF
899 FILE_BASIC_INFO info_buf;
900
1adcb710
SF
901 if (attrs == NULL)
902 return -EINVAL;
903
388e57b2
SF
904 if (attrs->ia_valid & ATTR_ATIME) {
905 set_time = true;
906 info_buf.LastAccessTime =
907 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
908 } else
909 info_buf.LastAccessTime = 0;
910
911 if (attrs->ia_valid & ATTR_MTIME) {
912 set_time = true;
913 info_buf.LastWriteTime =
914 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
915 } else
916 info_buf.LastWriteTime = 0;
917
918 /*
919 * Samba throws this field away, but windows may actually use it.
920 * Do not set ctime unless other time stamps are changed explicitly
921 * (i.e. by utimes()) since we would then have a mix of client and
922 * server times.
923 */
924 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
b6b38f70 925 cFYI(1, "CIFS - CTIME changed");
388e57b2
SF
926 info_buf.ChangeTime =
927 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
928 } else
929 info_buf.ChangeTime = 0;
930
931 info_buf.CreationTime = 0; /* don't change */
932 info_buf.Attributes = cpu_to_le32(dosattr);
933
934 /*
935 * If the file is already open for write, just use that fileid
936 */
6508d904 937 open_file = find_writable_file(cifsInode, true);
388e57b2 938 if (open_file) {
4b4de76e 939 netfid = open_file->fid.netfid;
388e57b2 940 netpid = open_file->pid;
13cfb733 941 pTcon = tlink_tcon(open_file->tlink);
388e57b2
SF
942 goto set_via_filehandle;
943 }
944
7ffec372
JL
945 tlink = cifs_sb_tlink(cifs_sb);
946 if (IS_ERR(tlink)) {
947 rc = PTR_ERR(tlink);
948 tlink = NULL;
949 goto out;
950 }
951 pTcon = tlink_tcon(tlink);
ba00ba64 952
388e57b2
SF
953 /*
954 * NT4 apparently returns success on this call, but it doesn't
955 * really work.
956 */
957 if (!(pTcon->ses->flags & CIFS_SES_NT4)) {
958 rc = CIFSSMBSetPathInfo(xid, pTcon, full_path,
959 &info_buf, cifs_sb->local_nls,
960 cifs_sb->mnt_cifs_flags &
961 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b37faa1
JL
962 if (rc == 0) {
963 cifsInode->cifsAttrs = dosattr;
964 goto out;
965 } else if (rc != -EOPNOTSUPP && rc != -EINVAL)
388e57b2
SF
966 goto out;
967 }
968
b6b38f70
JP
969 cFYI(1, "calling SetFileInfo since SetPathInfo for "
970 "times not supported by this server");
388e57b2
SF
971 rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN,
972 SYNCHRONIZE | FILE_WRITE_ATTRIBUTES,
973 CREATE_NOT_DIR, &netfid, &oplock,
974 NULL, cifs_sb->local_nls,
975 cifs_sb->mnt_cifs_flags &
976 CIFS_MOUNT_MAP_SPECIAL_CHR);
977
978 if (rc != 0) {
979 if (rc == -EIO)
980 rc = -EINVAL;
981 goto out;
982 }
983
984 netpid = current->tgid;
985
986set_via_filehandle:
987 rc = CIFSSMBSetFileInfo(xid, pTcon, &info_buf, netfid, netpid);
d388908e
SF
988 if (!rc)
989 cifsInode->cifsAttrs = dosattr;
990
388e57b2
SF
991 if (open_file == NULL)
992 CIFSSMBClose(xid, pTcon, netfid);
993 else
6ab409b5 994 cifsFileInfo_put(open_file);
388e57b2 995out:
7ffec372
JL
996 if (tlink != NULL)
997 cifs_put_tlink(tlink);
388e57b2
SF
998 return rc;
999}
1000
a12a1ac7 1001/*
ed6875e0 1002 * Open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
a12a1ac7
JL
1003 * and rename it to a random name that hopefully won't conflict with
1004 * anything else.
1005 */
ed6875e0
PS
1006int
1007cifs_rename_pending_delete(const char *full_path, struct dentry *dentry,
1008 const unsigned int xid)
a12a1ac7
JL
1009{
1010 int oplock = 0;
1011 int rc;
1012 __u16 netfid;
3270958b 1013 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1014 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1015 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1016 struct tcon_link *tlink;
96daf2b0 1017 struct cifs_tcon *tcon;
3270958b
SF
1018 __u32 dosattr, origattr;
1019 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1020
7ffec372
JL
1021 tlink = cifs_sb_tlink(cifs_sb);
1022 if (IS_ERR(tlink))
1023 return PTR_ERR(tlink);
1024 tcon = tlink_tcon(tlink);
1025
a12a1ac7 1026 rc = CIFSSMBOpen(xid, tcon, full_path, FILE_OPEN,
dd1db2de 1027 DELETE|FILE_WRITE_ATTRIBUTES, CREATE_NOT_DIR,
a12a1ac7
JL
1028 &netfid, &oplock, NULL, cifs_sb->local_nls,
1029 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1030 if (rc != 0)
1031 goto out;
1032
3270958b
SF
1033 origattr = cifsInode->cifsAttrs;
1034 if (origattr == 0)
1035 origattr |= ATTR_NORMAL;
1036
1037 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1038 if (dosattr == 0)
1039 dosattr |= ATTR_NORMAL;
1040 dosattr |= ATTR_HIDDEN;
1041
3270958b
SF
1042 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1043 if (dosattr != origattr) {
1044 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1045 if (info_buf == NULL) {
1046 rc = -ENOMEM;
1047 goto out_close;
1048 }
1049 info_buf->Attributes = cpu_to_le32(dosattr);
1050 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1051 current->tgid);
1052 /* although we would like to mark the file hidden
1053 if that fails we will still try to rename it */
41346098 1054 if (rc != 0)
3270958b
SF
1055 cifsInode->cifsAttrs = dosattr;
1056 else
1057 dosattr = origattr; /* since not able to change them */
a12a1ac7 1058 }
a12a1ac7 1059
dd1db2de
JL
1060 /* rename the file */
1061 rc = CIFSSMBRenameOpenFile(xid, tcon, netfid, NULL, cifs_sb->local_nls,
a12a1ac7
JL
1062 cifs_sb->mnt_cifs_flags &
1063 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b
SF
1064 if (rc != 0) {
1065 rc = -ETXTBSY;
1066 goto undo_setattr;
1067 }
6d22f098 1068
3270958b
SF
1069 /* try to set DELETE_ON_CLOSE */
1070 if (!cifsInode->delete_pending) {
1071 rc = CIFSSMBSetFileDisposition(xid, tcon, true, netfid,
1072 current->tgid);
1073 /*
1074 * some samba versions return -ENOENT when we try to set the
1075 * file disposition here. Likely a samba bug, but work around
1076 * it for now. This means that some cifsXXX files may hang
1077 * around after they shouldn't.
1078 *
1079 * BB: remove this hack after more servers have the fix
1080 */
1081 if (rc == -ENOENT)
1082 rc = 0;
1083 else if (rc != 0) {
1084 rc = -ETXTBSY;
1085 goto undo_rename;
1086 }
1087 cifsInode->delete_pending = true;
1088 }
7ce86d5a 1089
a12a1ac7
JL
1090out_close:
1091 CIFSSMBClose(xid, tcon, netfid);
1092out:
3270958b 1093 kfree(info_buf);
7ffec372 1094 cifs_put_tlink(tlink);
a12a1ac7 1095 return rc;
3270958b
SF
1096
1097 /*
1098 * reset everything back to the original state. Don't bother
1099 * dealing with errors here since we can't do anything about
1100 * them anyway.
1101 */
1102undo_rename:
1103 CIFSSMBRenameOpenFile(xid, tcon, netfid, dentry->d_name.name,
1104 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1105 CIFS_MOUNT_MAP_SPECIAL_CHR);
1106undo_setattr:
1107 if (dosattr != origattr) {
1108 info_buf->Attributes = cpu_to_le32(origattr);
1109 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1110 current->tgid))
1111 cifsInode->cifsAttrs = origattr;
1112 }
1113
1114 goto out_close;
a12a1ac7
JL
1115}
1116
b7ca6928
SF
1117/* copied from fs/nfs/dir.c with small changes */
1118static void
1119cifs_drop_nlink(struct inode *inode)
1120{
1121 spin_lock(&inode->i_lock);
1122 if (inode->i_nlink > 0)
1123 drop_nlink(inode);
1124 spin_unlock(&inode->i_lock);
1125}
ff694527
SF
1126
1127/*
1128 * If dentry->d_inode is null (usually meaning the cached dentry
1129 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1130 * if that fails we can not attempt the fall back mechanisms on EACCESS
1131 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1132 * unlink on negative dentries currently.
1133 */
5f0319a7 1134int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1135{
1136 int rc = 0;
6d5786a3 1137 unsigned int xid;
1da177e4 1138 char *full_path = NULL;
5f0319a7 1139 struct inode *inode = dentry->d_inode;
ff694527 1140 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1141 struct super_block *sb = dir->i_sb;
1142 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372 1143 struct tcon_link *tlink;
96daf2b0 1144 struct cifs_tcon *tcon;
ed6875e0 1145 struct TCP_Server_Info *server;
6050247d
SF
1146 struct iattr *attrs = NULL;
1147 __u32 dosattr = 0, origattr = 0;
1da177e4 1148
b6b38f70 1149 cFYI(1, "cifs_unlink, dir=0x%p, dentry=0x%p", dir, dentry);
1da177e4 1150
7ffec372
JL
1151 tlink = cifs_sb_tlink(cifs_sb);
1152 if (IS_ERR(tlink))
1153 return PTR_ERR(tlink);
1154 tcon = tlink_tcon(tlink);
ed6875e0 1155 server = tcon->ses->server;
7ffec372 1156
6d5786a3 1157 xid = get_xid();
1da177e4 1158
5f0319a7
JL
1159 /* Unlink can be called from rename so we can not take the
1160 * sb->s_vfs_rename_mutex here */
1161 full_path = build_path_from_dentry(dentry);
1da177e4 1162 if (full_path == NULL) {
0f3bc09e 1163 rc = -ENOMEM;
7ffec372 1164 goto unlink_out;
1da177e4 1165 }
2d785a50 1166
29e20f9c
PS
1167 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1168 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
5f0319a7 1169 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1170 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1171 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1172 cFYI(1, "posix del rc %d", rc);
2d785a50
SF
1173 if ((rc == 0) || (rc == -ENOENT))
1174 goto psx_del_no_retry;
1175 }
1da177e4 1176
6050247d 1177retry_std_delete:
ed6875e0
PS
1178 if (!server->ops->unlink) {
1179 rc = -ENOSYS;
1180 goto psx_del_no_retry;
1181 }
1182
1183 rc = server->ops->unlink(xid, tcon, full_path, cifs_sb);
6050247d 1184
2d785a50 1185psx_del_no_retry:
1da177e4 1186 if (!rc) {
5f0319a7 1187 if (inode)
b7ca6928 1188 cifs_drop_nlink(inode);
1da177e4 1189 } else if (rc == -ENOENT) {
5f0319a7 1190 d_drop(dentry);
1da177e4 1191 } else if (rc == -ETXTBSY) {
ed6875e0
PS
1192 if (server->ops->rename_pending_delete) {
1193 rc = server->ops->rename_pending_delete(full_path,
1194 dentry, xid);
1195 if (rc == 0)
1196 cifs_drop_nlink(inode);
1197 }
1198 if (rc == -ETXTBSY)
1199 rc = -EBUSY;
ff694527 1200 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1201 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1202 if (attrs == NULL) {
1203 rc = -ENOMEM;
1204 goto out_reval;
1da177e4 1205 }
388e57b2
SF
1206
1207 /* try to reset dos attributes */
ff694527
SF
1208 cifs_inode = CIFS_I(inode);
1209 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1210 if (origattr == 0)
1211 origattr |= ATTR_NORMAL;
1212 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1213 if (dosattr == 0)
1214 dosattr |= ATTR_NORMAL;
1215 dosattr |= ATTR_HIDDEN;
1216
1217 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1218 if (rc != 0)
1219 goto out_reval;
6050247d
SF
1220
1221 goto retry_std_delete;
1da177e4 1222 }
6050247d
SF
1223
1224 /* undo the setattr if we errored out and it's needed */
1225 if (rc != 0 && dosattr != 0)
1226 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1227
388e57b2 1228out_reval:
4523cc30 1229 if (inode) {
ff694527
SF
1230 cifs_inode = CIFS_I(inode);
1231 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1232 when needed */
1233 inode->i_ctime = current_fs_time(sb);
06bcfedd 1234 }
5f0319a7 1235 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1236 cifs_inode = CIFS_I(dir);
6050247d 1237 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1238unlink_out:
1da177e4 1239 kfree(full_path);
6050247d 1240 kfree(attrs);
6d5786a3 1241 free_xid(xid);
7ffec372 1242 cifs_put_tlink(tlink);
1da177e4
LT
1243 return rc;
1244}
1245
ff691e96
PS
1246static int
1247cifs_mkdir_qinfo(struct inode *inode, struct dentry *dentry, umode_t mode,
1248 const char *full_path, struct cifs_sb_info *cifs_sb,
1249 struct cifs_tcon *tcon, const unsigned int xid)
1250{
1251 int rc = 0;
1252 struct inode *newinode = NULL;
1253
1254 if (tcon->unix_ext)
1255 rc = cifs_get_inode_info_unix(&newinode, full_path, inode->i_sb,
1256 xid);
1257 else
1258 rc = cifs_get_inode_info(&newinode, full_path, NULL,
1259 inode->i_sb, xid, NULL);
1260 if (rc)
1261 return rc;
1262
1263 d_instantiate(dentry, newinode);
1264 /*
1265 * setting nlink not necessary except in cases where we failed to get it
1266 * from the server or was set bogus
1267 */
b7ca6928 1268 spin_lock(&dentry->d_inode->i_lock);
ff691e96
PS
1269 if ((dentry->d_inode) && (dentry->d_inode->i_nlink < 2))
1270 set_nlink(dentry->d_inode, 2);
b7ca6928 1271 spin_unlock(&dentry->d_inode->i_lock);
ff691e96
PS
1272 mode &= ~current_umask();
1273 /* must turn on setgid bit if parent dir has it */
1274 if (inode->i_mode & S_ISGID)
1275 mode |= S_ISGID;
1276
1277 if (tcon->unix_ext) {
1278 struct cifs_unix_set_info_args args = {
1279 .mode = mode,
1280 .ctime = NO_CHANGE_64,
1281 .atime = NO_CHANGE_64,
1282 .mtime = NO_CHANGE_64,
1283 .device = 0,
1284 };
1285 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1286 args.uid = (__u64)current_fsuid();
1287 if (inode->i_mode & S_ISGID)
1288 args.gid = (__u64)inode->i_gid;
1289 else
1290 args.gid = (__u64)current_fsgid();
1291 } else {
1292 args.uid = NO_CHANGE_64;
1293 args.gid = NO_CHANGE_64;
1294 }
1295 CIFSSMBUnixSetPathInfo(xid, tcon, full_path, &args,
1296 cifs_sb->local_nls,
1297 cifs_sb->mnt_cifs_flags &
1298 CIFS_MOUNT_MAP_SPECIAL_CHR);
1299 } else {
f436720e 1300 struct TCP_Server_Info *server = tcon->ses->server;
ff691e96 1301 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
f436720e
PS
1302 (mode & S_IWUGO) == 0 && server->ops->mkdir_setinfo)
1303 server->ops->mkdir_setinfo(newinode, full_path, cifs_sb,
1304 tcon, xid);
ff691e96
PS
1305 if (dentry->d_inode) {
1306 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)
1307 dentry->d_inode->i_mode = (mode | S_IFDIR);
1308
1309 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1310 dentry->d_inode->i_uid = current_fsuid();
1311 if (inode->i_mode & S_ISGID)
1312 dentry->d_inode->i_gid = inode->i_gid;
1313 else
1314 dentry->d_inode->i_gid =
1315 current_fsgid();
1316 }
1317 }
1318 }
1319 return rc;
1320}
1321
1322static int
1323cifs_posix_mkdir(struct inode *inode, struct dentry *dentry, umode_t mode,
1324 const char *full_path, struct cifs_sb_info *cifs_sb,
1325 struct cifs_tcon *tcon, const unsigned int xid)
1326{
1327 int rc = 0;
1328 u32 oplock = 0;
1329 FILE_UNIX_BASIC_INFO *info = NULL;
1330 struct inode *newinode = NULL;
1331 struct cifs_fattr fattr;
1332
1333 info = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
1334 if (info == NULL) {
1335 rc = -ENOMEM;
1336 goto posix_mkdir_out;
1337 }
1338
1339 mode &= ~current_umask();
1340 rc = CIFSPOSIXCreate(xid, tcon, SMB_O_DIRECTORY | SMB_O_CREAT, mode,
1341 NULL /* netfid */, info, &oplock, full_path,
1342 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1343 CIFS_MOUNT_MAP_SPECIAL_CHR);
1344 if (rc == -EOPNOTSUPP)
1345 goto posix_mkdir_out;
1346 else if (rc) {
1347 cFYI(1, "posix mkdir returned 0x%x", rc);
1348 d_drop(dentry);
1349 goto posix_mkdir_out;
1350 }
1351
1352 if (info->Type == cpu_to_le32(-1))
1353 /* no return info, go query for it */
1354 goto posix_mkdir_get_info;
1355 /*
1356 * BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if
1357 * need to set uid/gid.
1358 */
1359
1360 cifs_unix_basic_to_fattr(&fattr, info, cifs_sb);
1361 cifs_fill_uniqueid(inode->i_sb, &fattr);
1362 newinode = cifs_iget(inode->i_sb, &fattr);
1363 if (!newinode)
1364 goto posix_mkdir_get_info;
1365
1366 d_instantiate(dentry, newinode);
1367
1368#ifdef CONFIG_CIFS_DEBUG2
1369 cFYI(1, "instantiated dentry %p %s to inode %p", dentry,
1370 dentry->d_name.name, newinode);
1371
1372 if (newinode->i_nlink != 2)
1373 cFYI(1, "unexpected number of links %d", newinode->i_nlink);
1374#endif
1375
1376posix_mkdir_out:
1377 kfree(info);
1378 return rc;
1379posix_mkdir_get_info:
1380 rc = cifs_mkdir_qinfo(inode, dentry, mode, full_path, cifs_sb, tcon,
1381 xid);
1382 goto posix_mkdir_out;
1383}
1384
18bb1db3 1385int cifs_mkdir(struct inode *inode, struct dentry *direntry, umode_t mode)
1da177e4 1386{
ff691e96 1387 int rc = 0;
6d5786a3 1388 unsigned int xid;
1da177e4 1389 struct cifs_sb_info *cifs_sb;
7ffec372 1390 struct tcon_link *tlink;
29e20f9c 1391 struct cifs_tcon *tcon;
f436720e 1392 struct TCP_Server_Info *server;
ff691e96 1393 char *full_path;
1da177e4 1394
18bb1db3 1395 cFYI(1, "In cifs_mkdir, mode = 0x%hx inode = 0x%p", mode, inode);
1da177e4 1396
1da177e4 1397 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1398 tlink = cifs_sb_tlink(cifs_sb);
1399 if (IS_ERR(tlink))
1400 return PTR_ERR(tlink);
29e20f9c 1401 tcon = tlink_tcon(tlink);
7ffec372 1402
6d5786a3 1403 xid = get_xid();
1da177e4 1404
7f57356b 1405 full_path = build_path_from_dentry(direntry);
1da177e4 1406 if (full_path == NULL) {
0f3bc09e 1407 rc = -ENOMEM;
7ffec372 1408 goto mkdir_out;
1da177e4 1409 }
50c2f753 1410
29e20f9c
PS
1411 if (cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
1412 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
ff691e96
PS
1413 rc = cifs_posix_mkdir(inode, direntry, mode, full_path, cifs_sb,
1414 tcon, xid);
1415 if (rc != -EOPNOTSUPP)
2dd29d31 1416 goto mkdir_out;
fb8c4b14 1417 }
ff691e96 1418
f436720e
PS
1419 server = tcon->ses->server;
1420
1421 if (!server->ops->mkdir) {
1422 rc = -ENOSYS;
1423 goto mkdir_out;
1424 }
1425
1da177e4 1426 /* BB add setting the equivalent of mode via CreateX w/ACLs */
f436720e 1427 rc = server->ops->mkdir(xid, tcon, full_path, cifs_sb);
1da177e4 1428 if (rc) {
b6b38f70 1429 cFYI(1, "cifs_mkdir returned 0x%x", rc);
1da177e4 1430 d_drop(direntry);
ff691e96 1431 goto mkdir_out;
1da177e4 1432 }
ff691e96
PS
1433
1434 rc = cifs_mkdir_qinfo(inode, direntry, mode, full_path, cifs_sb, tcon,
1435 xid);
fb8c4b14 1436mkdir_out:
6de2ce42
PS
1437 /*
1438 * Force revalidate to get parent dir info when needed since cached
1439 * attributes are invalid now.
1440 */
1441 CIFS_I(inode)->time = 0;
1da177e4 1442 kfree(full_path);
6d5786a3 1443 free_xid(xid);
7ffec372 1444 cifs_put_tlink(tlink);
1da177e4
LT
1445 return rc;
1446}
1447
1448int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1449{
1450 int rc = 0;
6d5786a3 1451 unsigned int xid;
1da177e4 1452 struct cifs_sb_info *cifs_sb;
7ffec372 1453 struct tcon_link *tlink;
f958ca5d
PS
1454 struct cifs_tcon *tcon;
1455 struct TCP_Server_Info *server;
1da177e4
LT
1456 char *full_path = NULL;
1457 struct cifsInodeInfo *cifsInode;
1458
b6b38f70 1459 cFYI(1, "cifs_rmdir, inode = 0x%p", inode);
1da177e4 1460
6d5786a3 1461 xid = get_xid();
1da177e4 1462
7f57356b 1463 full_path = build_path_from_dentry(direntry);
1da177e4 1464 if (full_path == NULL) {
0f3bc09e 1465 rc = -ENOMEM;
7ffec372 1466 goto rmdir_exit;
1da177e4
LT
1467 }
1468
7ffec372
JL
1469 cifs_sb = CIFS_SB(inode->i_sb);
1470 tlink = cifs_sb_tlink(cifs_sb);
1471 if (IS_ERR(tlink)) {
1472 rc = PTR_ERR(tlink);
1473 goto rmdir_exit;
1474 }
f958ca5d
PS
1475 tcon = tlink_tcon(tlink);
1476 server = tcon->ses->server;
1477
1478 if (!server->ops->rmdir) {
1479 rc = -ENOSYS;
1480 cifs_put_tlink(tlink);
1481 goto rmdir_exit;
1482 }
7ffec372 1483
f958ca5d 1484 rc = server->ops->rmdir(xid, tcon, full_path, cifs_sb);
7ffec372 1485 cifs_put_tlink(tlink);
1da177e4
LT
1486
1487 if (!rc) {
3677db10 1488 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1489 i_size_write(direntry->d_inode, 0);
ce71ec36 1490 clear_nlink(direntry->d_inode);
3677db10 1491 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1492 }
1493
1494 cifsInode = CIFS_I(direntry->d_inode);
6de2ce42
PS
1495 /* force revalidate to go get info when needed */
1496 cifsInode->time = 0;
42c24544
SF
1497
1498 cifsInode = CIFS_I(inode);
6de2ce42
PS
1499 /*
1500 * Force revalidate to get parent dir info when needed since cached
1501 * attributes are invalid now.
1502 */
1503 cifsInode->time = 0;
42c24544 1504
1da177e4
LT
1505 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1506 current_fs_time(inode->i_sb);
1507
7ffec372 1508rmdir_exit:
1da177e4 1509 kfree(full_path);
6d5786a3 1510 free_xid(xid);
1da177e4
LT
1511 return rc;
1512}
1513
ee2fd967 1514static int
8ceb9843
PS
1515cifs_do_rename(const unsigned int xid, struct dentry *from_dentry,
1516 const char *from_path, struct dentry *to_dentry,
1517 const char *to_path)
ee2fd967
SF
1518{
1519 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372 1520 struct tcon_link *tlink;
8ceb9843
PS
1521 struct cifs_tcon *tcon;
1522 struct TCP_Server_Info *server;
ee2fd967
SF
1523 __u16 srcfid;
1524 int oplock, rc;
1525
7ffec372
JL
1526 tlink = cifs_sb_tlink(cifs_sb);
1527 if (IS_ERR(tlink))
1528 return PTR_ERR(tlink);
8ceb9843
PS
1529 tcon = tlink_tcon(tlink);
1530 server = tcon->ses->server;
1531
1532 if (!server->ops->rename)
1533 return -ENOSYS;
7ffec372 1534
ee2fd967 1535 /* try path-based rename first */
8ceb9843 1536 rc = server->ops->rename(xid, tcon, from_path, to_path, cifs_sb);
ee2fd967
SF
1537
1538 /*
8ceb9843
PS
1539 * Don't bother with rename by filehandle unless file is busy and
1540 * source. Note that cross directory moves do not work with
ee2fd967
SF
1541 * rename by filehandle to various Windows servers.
1542 */
1543 if (rc == 0 || rc != -ETXTBSY)
7ffec372 1544 goto do_rename_exit;
ee2fd967 1545
ed0e3ace
JL
1546 /* open-file renames don't work across directories */
1547 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1548 goto do_rename_exit;
ed0e3ace 1549
ee2fd967 1550 /* open the file to be renamed -- we need DELETE perms */
8ceb9843 1551 rc = CIFSSMBOpen(xid, tcon, from_path, FILE_OPEN, DELETE,
ee2fd967
SF
1552 CREATE_NOT_DIR, &srcfid, &oplock, NULL,
1553 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1554 CIFS_MOUNT_MAP_SPECIAL_CHR);
ee2fd967 1555 if (rc == 0) {
8ceb9843 1556 rc = CIFSSMBRenameOpenFile(xid, tcon, srcfid,
ee2fd967
SF
1557 (const char *) to_dentry->d_name.name,
1558 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1559 CIFS_MOUNT_MAP_SPECIAL_CHR);
8ceb9843 1560 CIFSSMBClose(xid, tcon, srcfid);
ee2fd967 1561 }
7ffec372
JL
1562do_rename_exit:
1563 cifs_put_tlink(tlink);
ee2fd967
SF
1564 return rc;
1565}
1566
8ceb9843
PS
1567int
1568cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1569 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1570{
8ceb9843
PS
1571 char *from_name = NULL;
1572 char *to_name = NULL;
639e7a91 1573 struct cifs_sb_info *cifs_sb;
7ffec372 1574 struct tcon_link *tlink;
96daf2b0 1575 struct cifs_tcon *tcon;
ee2fd967
SF
1576 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1577 FILE_UNIX_BASIC_INFO *info_buf_target;
6d5786a3
PS
1578 unsigned int xid;
1579 int rc, tmprc;
1da177e4 1580
639e7a91 1581 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1582 tlink = cifs_sb_tlink(cifs_sb);
1583 if (IS_ERR(tlink))
1584 return PTR_ERR(tlink);
1585 tcon = tlink_tcon(tlink);
1da177e4 1586
6d5786a3 1587 xid = get_xid();
ee2fd967 1588
ee2fd967
SF
1589 /*
1590 * we already have the rename sem so we do not need to
1591 * grab it again here to protect the path integrity
1592 */
8ceb9843
PS
1593 from_name = build_path_from_dentry(source_dentry);
1594 if (from_name == NULL) {
ee2fd967
SF
1595 rc = -ENOMEM;
1596 goto cifs_rename_exit;
1597 }
1598
8ceb9843
PS
1599 to_name = build_path_from_dentry(target_dentry);
1600 if (to_name == NULL) {
1da177e4
LT
1601 rc = -ENOMEM;
1602 goto cifs_rename_exit;
1603 }
1604
8ceb9843
PS
1605 rc = cifs_do_rename(xid, source_dentry, from_name, target_dentry,
1606 to_name);
ee2fd967 1607
14121bdc
JL
1608 if (rc == -EEXIST && tcon->unix_ext) {
1609 /*
8ceb9843
PS
1610 * Are src and dst hardlinks of same inode? We can only tell
1611 * with unix extensions enabled.
14121bdc
JL
1612 */
1613 info_buf_source =
1614 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1615 GFP_KERNEL);
1616 if (info_buf_source == NULL) {
1617 rc = -ENOMEM;
1618 goto cifs_rename_exit;
1619 }
1620
1621 info_buf_target = info_buf_source + 1;
8ceb9843
PS
1622 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, from_name,
1623 info_buf_source,
1624 cifs_sb->local_nls,
1625 cifs_sb->mnt_cifs_flags &
1626 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1627 if (tmprc != 0)
14121bdc 1628 goto unlink_target;
ee2fd967 1629
8ceb9843
PS
1630 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, to_name,
1631 info_buf_target,
1632 cifs_sb->local_nls,
1633 cifs_sb->mnt_cifs_flags &
1634 CIFS_MOUNT_MAP_SPECIAL_CHR);
14121bdc 1635
8d281efb 1636 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1637 info_buf_target->UniqueId)) {
14121bdc 1638 /* same file, POSIX says that this is a noop */
ae6884a9 1639 rc = 0;
14121bdc 1640 goto cifs_rename_exit;
ae6884a9 1641 }
8ceb9843
PS
1642 }
1643 /*
1644 * else ... BB we could add the same check for Windows by
1645 * checking the UniqueId via FILE_INTERNAL_INFO
1646 */
14121bdc 1647
ee2fd967 1648unlink_target:
fc6f3943
JL
1649 /* Try unlinking the target dentry if it's not negative */
1650 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1651 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1652 if (tmprc)
1653 goto cifs_rename_exit;
8ceb9843
PS
1654 rc = cifs_do_rename(xid, source_dentry, from_name,
1655 target_dentry, to_name);
1da177e4
LT
1656 }
1657
1658cifs_rename_exit:
ee2fd967 1659 kfree(info_buf_source);
8ceb9843
PS
1660 kfree(from_name);
1661 kfree(to_name);
6d5786a3 1662 free_xid(xid);
7ffec372 1663 cifs_put_tlink(tlink);
1da177e4
LT
1664 return rc;
1665}
1666
df2cf170
JL
1667static bool
1668cifs_inode_needs_reval(struct inode *inode)
1da177e4 1669{
df2cf170 1670 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1671 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1672
df2cf170
JL
1673 if (cifs_i->clientCanCacheRead)
1674 return false;
1da177e4 1675
df2cf170
JL
1676 if (!lookupCacheEnabled)
1677 return true;
1da177e4 1678
df2cf170
JL
1679 if (cifs_i->time == 0)
1680 return true;
1da177e4 1681
6d20e840
SJ
1682 if (!time_in_range(jiffies, cifs_i->time,
1683 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1684 return true;
1685
db19272e 1686 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1687 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1688 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1689 return true;
1690
df2cf170
JL
1691 return false;
1692}
1693
523fb8c8
SJ
1694/*
1695 * Zap the cache. Called when invalid_mapping flag is set.
1696 */
6feb9891 1697int
df2cf170
JL
1698cifs_invalidate_mapping(struct inode *inode)
1699{
6feb9891 1700 int rc = 0;
df2cf170
JL
1701 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1702
1703 cifs_i->invalid_mapping = false;
1704
df2cf170 1705 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1706 rc = invalidate_inode_pages2(inode->i_mapping);
1707 if (rc) {
1708 cERROR(1, "%s: could not invalidate inode %p", __func__,
1709 inode);
1710 cifs_i->invalid_mapping = true;
1711 }
df2cf170 1712 }
257fb1f1 1713
9451a9a5 1714 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1715 return rc;
df2cf170
JL
1716}
1717
6feb9891 1718int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1719{
1720 int rc = 0;
1721 struct inode *inode = filp->f_path.dentry->d_inode;
ba00ba64 1722 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1723
1724 if (!cifs_inode_needs_reval(inode))
6feb9891 1725 return rc;
abab095d 1726
13cfb733 1727 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1728 rc = cifs_get_file_info_unix(filp);
1729 else
1730 rc = cifs_get_file_info(filp);
1731
abab095d
JL
1732 return rc;
1733}
1734
6feb9891 1735int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170 1736{
6d5786a3 1737 unsigned int xid;
df2cf170 1738 int rc = 0;
df2cf170
JL
1739 struct inode *inode = dentry->d_inode;
1740 struct super_block *sb = dentry->d_sb;
6feb9891 1741 char *full_path = NULL;
df2cf170
JL
1742
1743 if (inode == NULL)
1744 return -ENOENT;
1da177e4 1745
df2cf170 1746 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1747 return rc;
1748
6d5786a3 1749 xid = get_xid();
1da177e4
LT
1750
1751 /* can not safely grab the rename sem here if rename calls revalidate
1752 since that would deadlock */
df2cf170 1753 full_path = build_path_from_dentry(dentry);
1da177e4 1754 if (full_path == NULL) {
0f3bc09e 1755 rc = -ENOMEM;
6feb9891 1756 goto out;
1da177e4
LT
1757 }
1758
6feb9891
PS
1759 cFYI(1, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time "
1760 "%ld jiffies %ld", full_path, inode, inode->i_count.counter,
f19159dc 1761 dentry, dentry->d_time, jiffies);
1da177e4 1762
0d424ad0 1763 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1764 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1765 else
1766 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1767 xid, NULL);
1da177e4 1768
6feb9891 1769out:
1da177e4 1770 kfree(full_path);
6d5786a3 1771 free_xid(xid);
1da177e4
LT
1772 return rc;
1773}
1774
6feb9891
PS
1775int cifs_revalidate_file(struct file *filp)
1776{
1777 int rc;
1778 struct inode *inode = filp->f_path.dentry->d_inode;
1779
1780 rc = cifs_revalidate_file_attr(filp);
1781 if (rc)
1782 return rc;
1783
1784 if (CIFS_I(inode)->invalid_mapping)
1785 rc = cifs_invalidate_mapping(inode);
1786 return rc;
1787}
1788
1789/* revalidate a dentry's inode attributes */
1790int cifs_revalidate_dentry(struct dentry *dentry)
1791{
1792 int rc;
1793 struct inode *inode = dentry->d_inode;
1794
1795 rc = cifs_revalidate_dentry_attr(dentry);
1796 if (rc)
1797 return rc;
1798
1799 if (CIFS_I(inode)->invalid_mapping)
1800 rc = cifs_invalidate_mapping(inode);
1801 return rc;
1802}
1803
1da177e4 1804int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1805 struct kstat *stat)
1da177e4 1806{
3aa1c8c2 1807 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
96daf2b0 1808 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1809 struct inode *inode = dentry->d_inode;
1810 int rc;
3aa1c8c2 1811
6feb9891
PS
1812 /*
1813 * We need to be sure that all dirty pages are written and the server
1814 * has actual ctime, mtime and file length.
1815 */
1816 if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping &&
1817 inode->i_mapping->nrpages != 0) {
1818 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1819 if (rc) {
1820 mapping_set_error(inode->i_mapping, rc);
1821 return rc;
1822 }
6feb9891 1823 }
1c456013 1824
6feb9891
PS
1825 rc = cifs_revalidate_dentry_attr(dentry);
1826 if (rc)
1827 return rc;
1828
1829 generic_fillattr(inode, stat);
1830 stat->blksize = CIFS_MAX_MSGSIZE;
1831 stat->ino = CIFS_I(inode)->uniqueid;
1832
1833 /*
1834 * If on a multiuser mount without unix extensions, and the admin hasn't
1835 * overridden them, set the ownership to the fsuid/fsgid of the current
1836 * process.
1837 */
1838 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
1839 !tcon->unix_ext) {
1840 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1841 stat->uid = current_fsuid();
1842 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1843 stat->gid = current_fsgid();
5fe14c85 1844 }
6feb9891 1845 return rc;
1da177e4
LT
1846}
1847
1848static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1849{
1850 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1851 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1852 struct page *page;
1da177e4
LT
1853 int rc = 0;
1854
1855 page = grab_cache_page(mapping, index);
1856 if (!page)
1857 return -ENOMEM;
1858
eebd2aa3 1859 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1860 unlock_page(page);
1861 page_cache_release(page);
1862 return rc;
1863}
1864
1b947463 1865static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1866{
c08d3b0e 1867 loff_t oldsize;
3677db10 1868
ba6a46a0 1869 spin_lock(&inode->i_lock);
c08d3b0e 1870 oldsize = inode->i_size;
3677db10 1871 i_size_write(inode, offset);
ba6a46a0 1872 spin_unlock(&inode->i_lock);
1b947463 1873
c08d3b0e 1874 truncate_pagecache(inode, oldsize, offset);
3677db10
SF
1875}
1876
8efdbde6
JL
1877static int
1878cifs_set_file_size(struct inode *inode, struct iattr *attrs,
6d5786a3 1879 unsigned int xid, char *full_path)
8efdbde6
JL
1880{
1881 int rc;
1882 struct cifsFileInfo *open_file;
1883 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1884 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1885 struct tcon_link *tlink = NULL;
96daf2b0 1886 struct cifs_tcon *pTcon = NULL;
fa2989f4 1887 struct cifs_io_parms io_parms;
8efdbde6
JL
1888
1889 /*
1890 * To avoid spurious oplock breaks from server, in the case of
1891 * inodes that we already have open, avoid doing path based
1892 * setting of file size if we can do it by handle.
1893 * This keeps our caching token (oplock) and avoids timeouts
1894 * when the local oplock break takes longer to flush
1895 * writebehind data than the SMB timeout for the SetPathInfo
1896 * request would allow
1897 */
6508d904 1898 open_file = find_writable_file(cifsInode, true);
8efdbde6 1899 if (open_file) {
4b4de76e 1900 __u16 nfid = open_file->fid.netfid;
8efdbde6 1901 __u32 npid = open_file->pid;
13cfb733 1902 pTcon = tlink_tcon(open_file->tlink);
8efdbde6
JL
1903 rc = CIFSSMBSetFileSize(xid, pTcon, attrs->ia_size, nfid,
1904 npid, false);
6ab409b5 1905 cifsFileInfo_put(open_file);
b6b38f70 1906 cFYI(1, "SetFSize for attrs rc = %d", rc);
8efdbde6
JL
1907 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1908 unsigned int bytes_written;
fa2989f4
PS
1909
1910 io_parms.netfid = nfid;
1911 io_parms.pid = npid;
1912 io_parms.tcon = pTcon;
1913 io_parms.offset = 0;
1914 io_parms.length = attrs->ia_size;
1915 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1916 NULL, NULL, 1);
b6b38f70 1917 cFYI(1, "Wrt seteof rc %d", rc);
8efdbde6
JL
1918 }
1919 } else
1920 rc = -EINVAL;
1921
1922 if (rc != 0) {
7ffec372
JL
1923 if (pTcon == NULL) {
1924 tlink = cifs_sb_tlink(cifs_sb);
1925 if (IS_ERR(tlink))
1926 return PTR_ERR(tlink);
1927 pTcon = tlink_tcon(tlink);
1928 }
ba00ba64 1929
8efdbde6
JL
1930 /* Set file size by pathname rather than by handle
1931 either because no valid, writeable file handle for
1932 it was found or because there was an error setting
1933 it by handle */
1934 rc = CIFSSMBSetEOF(xid, pTcon, full_path, attrs->ia_size,
1935 false, cifs_sb->local_nls,
1936 cifs_sb->mnt_cifs_flags &
1937 CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1938 cFYI(1, "SetEOF by path (setattrs) rc = %d", rc);
8efdbde6
JL
1939 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1940 __u16 netfid;
1941 int oplock = 0;
1942
1943 rc = SMBLegacyOpen(xid, pTcon, full_path,
1944 FILE_OPEN, GENERIC_WRITE,
1945 CREATE_NOT_DIR, &netfid, &oplock, NULL,
1946 cifs_sb->local_nls,
1947 cifs_sb->mnt_cifs_flags &
1948 CIFS_MOUNT_MAP_SPECIAL_CHR);
1949 if (rc == 0) {
1950 unsigned int bytes_written;
fa2989f4
PS
1951
1952 io_parms.netfid = netfid;
1953 io_parms.pid = current->tgid;
1954 io_parms.tcon = pTcon;
1955 io_parms.offset = 0;
1956 io_parms.length = attrs->ia_size;
1957 rc = CIFSSMBWrite(xid, &io_parms,
1958 &bytes_written,
1959 NULL, NULL, 1);
b6b38f70 1960 cFYI(1, "wrt seteof rc %d", rc);
8efdbde6
JL
1961 CIFSSMBClose(xid, pTcon, netfid);
1962 }
1963 }
7ffec372
JL
1964 if (tlink)
1965 cifs_put_tlink(tlink);
8efdbde6
JL
1966 }
1967
1968 if (rc == 0) {
fbec9ab9 1969 cifsInode->server_eof = attrs->ia_size;
1b947463 1970 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
1971 cifs_truncate_page(inode->i_mapping, inode->i_size);
1972 }
1973
1974 return rc;
1975}
1976
3fe5c1dd
JL
1977static int
1978cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
1979{
1980 int rc;
6d5786a3 1981 unsigned int xid;
3fe5c1dd
JL
1982 char *full_path = NULL;
1983 struct inode *inode = direntry->d_inode;
1984 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1985 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1986 struct tcon_link *tlink;
96daf2b0 1987 struct cifs_tcon *pTcon;
3fe5c1dd 1988 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 1989 struct cifsFileInfo *open_file;
3fe5c1dd 1990
b6b38f70
JP
1991 cFYI(1, "setattr_unix on file %s attrs->ia_valid=0x%x",
1992 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd 1993
6d5786a3 1994 xid = get_xid();
3fe5c1dd 1995
db78b877
CH
1996 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
1997 attrs->ia_valid |= ATTR_FORCE;
1998
1999 rc = inode_change_ok(inode, attrs);
2000 if (rc < 0)
2001 goto out;
3fe5c1dd
JL
2002
2003 full_path = build_path_from_dentry(direntry);
2004 if (full_path == NULL) {
2005 rc = -ENOMEM;
2006 goto out;
2007 }
2008
0f4d634c
JL
2009 /*
2010 * Attempt to flush data before changing attributes. We need to do
2011 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2012 * ownership or mode then we may also need to do this. Here, we take
2013 * the safe way out and just do the flush on all setattr requests. If
2014 * the flush returns error, store it to report later and continue.
2015 *
2016 * BB: This should be smarter. Why bother flushing pages that
2017 * will be truncated anyway? Also, should we error out here if
2018 * the flush returns error?
2019 */
2020 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2021 mapping_set_error(inode->i_mapping, rc);
2022 rc = 0;
3fe5c1dd
JL
2023
2024 if (attrs->ia_valid & ATTR_SIZE) {
2025 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2026 if (rc != 0)
2027 goto out;
2028 }
2029
2030 /* skip mode change if it's just for clearing setuid/setgid */
2031 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2032 attrs->ia_valid &= ~ATTR_MODE;
2033
2034 args = kmalloc(sizeof(*args), GFP_KERNEL);
2035 if (args == NULL) {
2036 rc = -ENOMEM;
2037 goto out;
2038 }
2039
2040 /* set up the struct */
2041 if (attrs->ia_valid & ATTR_MODE)
2042 args->mode = attrs->ia_mode;
2043 else
2044 args->mode = NO_CHANGE_64;
2045
2046 if (attrs->ia_valid & ATTR_UID)
2047 args->uid = attrs->ia_uid;
2048 else
2049 args->uid = NO_CHANGE_64;
2050
2051 if (attrs->ia_valid & ATTR_GID)
2052 args->gid = attrs->ia_gid;
2053 else
2054 args->gid = NO_CHANGE_64;
2055
2056 if (attrs->ia_valid & ATTR_ATIME)
2057 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2058 else
2059 args->atime = NO_CHANGE_64;
2060
2061 if (attrs->ia_valid & ATTR_MTIME)
2062 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2063 else
2064 args->mtime = NO_CHANGE_64;
2065
2066 if (attrs->ia_valid & ATTR_CTIME)
2067 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2068 else
2069 args->ctime = NO_CHANGE_64;
2070
2071 args->device = 0;
6508d904 2072 open_file = find_writable_file(cifsInode, true);
3bbeeb3c 2073 if (open_file) {
4b4de76e 2074 u16 nfid = open_file->fid.netfid;
3bbeeb3c 2075 u32 npid = open_file->pid;
13cfb733 2076 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2077 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2078 cifsFileInfo_put(open_file);
3bbeeb3c 2079 } else {
7ffec372
JL
2080 tlink = cifs_sb_tlink(cifs_sb);
2081 if (IS_ERR(tlink)) {
2082 rc = PTR_ERR(tlink);
2083 goto out;
2084 }
2085 pTcon = tlink_tcon(tlink);
3bbeeb3c 2086 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2087 cifs_sb->local_nls,
2088 cifs_sb->mnt_cifs_flags &
2089 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2090 cifs_put_tlink(tlink);
3bbeeb3c 2091 }
3fe5c1dd 2092
1025774c
CH
2093 if (rc)
2094 goto out;
ccd4bb1b 2095
1025774c 2096 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2097 attrs->ia_size != i_size_read(inode))
2098 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2099
2100 setattr_copy(inode, attrs);
2101 mark_inode_dirty(inode);
2102
2103 /* force revalidate when any of these times are set since some
2104 of the fs types (eg ext3, fat) do not have fine enough
2105 time granularity to match protocol, and we do not have a
2106 a way (yet) to query the server fs's time granularity (and
2107 whether it rounds times down).
2108 */
2109 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2110 cifsInode->time = 0;
3fe5c1dd
JL
2111out:
2112 kfree(args);
2113 kfree(full_path);
6d5786a3 2114 free_xid(xid);
3fe5c1dd
JL
2115 return rc;
2116}
2117
0510eeb7
JL
2118static int
2119cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4 2120{
6d5786a3 2121 unsigned int xid;
a5ff3769
SP
2122 uid_t uid = NO_CHANGE_32;
2123 gid_t gid = NO_CHANGE_32;
3fe5c1dd
JL
2124 struct inode *inode = direntry->d_inode;
2125 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2126 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2127 char *full_path = NULL;
2128 int rc = -EACCES;
feb3e20c 2129 __u32 dosattr = 0;
4e1e7fb9 2130 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2131
6d5786a3 2132 xid = get_xid();
1da177e4 2133
b6b38f70
JP
2134 cFYI(1, "setattr on file %s attrs->iavalid 0x%x",
2135 direntry->d_name.name, attrs->ia_valid);
6473a559 2136
db78b877
CH
2137 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2138 attrs->ia_valid |= ATTR_FORCE;
2139
2140 rc = inode_change_ok(inode, attrs);
2141 if (rc < 0) {
6d5786a3 2142 free_xid(xid);
db78b877 2143 return rc;
6473a559 2144 }
50c2f753 2145
7f57356b 2146 full_path = build_path_from_dentry(direntry);
1da177e4 2147 if (full_path == NULL) {
0f3bc09e 2148 rc = -ENOMEM;
6d5786a3 2149 free_xid(xid);
0f3bc09e 2150 return rc;
1da177e4 2151 }
1da177e4 2152
0f4d634c
JL
2153 /*
2154 * Attempt to flush data before changing attributes. We need to do
2155 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2156 * ownership or mode then we may also need to do this. Here, we take
2157 * the safe way out and just do the flush on all setattr requests. If
2158 * the flush returns error, store it to report later and continue.
2159 *
2160 * BB: This should be smarter. Why bother flushing pages that
2161 * will be truncated anyway? Also, should we error out here if
2162 * the flush returns error?
2163 */
2164 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2165 mapping_set_error(inode->i_mapping, rc);
2166 rc = 0;
cea21805 2167
50531444 2168 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2169 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2170 if (rc != 0)
e30dcf3a 2171 goto cifs_setattr_exit;
1da177e4 2172 }
4ca691a8 2173
a5ff3769
SP
2174 if (attrs->ia_valid & ATTR_UID)
2175 uid = attrs->ia_uid;
2176
2177 if (attrs->ia_valid & ATTR_GID)
2178 gid = attrs->ia_gid;
2179
2180#ifdef CONFIG_CIFS_ACL
2181 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
2182 if (uid != NO_CHANGE_32 || gid != NO_CHANGE_32) {
2183 rc = id_mode_to_cifs_acl(inode, full_path, NO_CHANGE_64,
2184 uid, gid);
2185 if (rc) {
2186 cFYI(1, "%s: Setting id failed with error: %d",
2187 __func__, rc);
2188 goto cifs_setattr_exit;
2189 }
2190 }
2191 } else
2192#endif /* CONFIG_CIFS_ACL */
3fe5c1dd 2193 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2194 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2195
d32c4f26
JL
2196 /* skip mode change if it's just for clearing setuid/setgid */
2197 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2198 attrs->ia_valid &= ~ATTR_MODE;
2199
1da177e4 2200 if (attrs->ia_valid & ATTR_MODE) {
1da177e4 2201 mode = attrs->ia_mode;
cdbce9c8 2202 rc = 0;
79df1bae 2203#ifdef CONFIG_CIFS_ACL
78415d2d 2204 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
a5ff3769
SP
2205 rc = id_mode_to_cifs_acl(inode, full_path, mode,
2206 NO_CHANGE_32, NO_CHANGE_32);
78415d2d
SP
2207 if (rc) {
2208 cFYI(1, "%s: Setting ACL failed with error: %d",
2209 __func__, rc);
2210 goto cifs_setattr_exit;
2211 }
2212 } else
79df1bae 2213#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2214 if (((mode & S_IWUGO) == 0) &&
2215 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2216
2217 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2218
5132861a
JL
2219 /* fix up mode if we're not using dynperm */
2220 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2221 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2222 } else if ((mode & S_IWUGO) &&
2223 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2224
2225 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2226 /* Attributes of 0 are ignored */
2227 if (dosattr == 0)
2228 dosattr |= ATTR_NORMAL;
5132861a
JL
2229
2230 /* reset local inode permissions to normal */
2231 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2232 attrs->ia_mode &= ~(S_IALLUGO);
2233 if (S_ISDIR(inode->i_mode))
2234 attrs->ia_mode |=
2235 cifs_sb->mnt_dir_mode;
2236 else
2237 attrs->ia_mode |=
2238 cifs_sb->mnt_file_mode;
2239 }
2240 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2241 /* ignore mode change - ATTR_READONLY hasn't changed */
2242 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2243 }
1da177e4
LT
2244 }
2245
feb3e20c
JL
2246 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2247 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2248 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2249 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2250
e30dcf3a
SF
2251 /* Even if error on time set, no sense failing the call if
2252 the server would set the time to a reasonable value anyway,
2253 and this check ensures that we are not being called from
2254 sys_utimes in which case we ought to fail the call back to
2255 the user when the server rejects the call */
fb8c4b14 2256 if ((rc) && (attrs->ia_valid &
feb3e20c 2257 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2258 rc = 0;
1da177e4
LT
2259 }
2260
2261 /* do not need local check to inode_check_ok since the server does
2262 that */
1025774c
CH
2263 if (rc)
2264 goto cifs_setattr_exit;
2265
2266 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2267 attrs->ia_size != i_size_read(inode))
2268 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2269
2270 setattr_copy(inode, attrs);
2271 mark_inode_dirty(inode);
1025774c 2272
e30dcf3a 2273cifs_setattr_exit:
1da177e4 2274 kfree(full_path);
6d5786a3 2275 free_xid(xid);
1da177e4
LT
2276 return rc;
2277}
2278
0510eeb7
JL
2279int
2280cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2281{
2282 struct inode *inode = direntry->d_inode;
2283 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
96daf2b0 2284 struct cifs_tcon *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2285
2286 if (pTcon->unix_ext)
2287 return cifs_setattr_unix(direntry, attrs);
2288
2289 return cifs_setattr_nounix(direntry, attrs);
2290
2291 /* BB: add cifs_setattr_legacy for really old servers */
2292}
2293
99ee4dbd 2294#if 0
1da177e4
LT
2295void cifs_delete_inode(struct inode *inode)
2296{
b6b38f70 2297 cFYI(1, "In cifs_delete_inode, inode = 0x%p", inode);
1da177e4
LT
2298 /* may have to add back in if and when safe distributed caching of
2299 directories added e.g. via FindNotify */
2300}
99ee4dbd 2301#endif