CIFS: Fix memory leak in cifs_do_mount
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / inode.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/inode.c
3 *
f19159dc 4 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4
LT
5 * Author(s): Steve French (sfrench@us.ibm.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21#include <linux/fs.h>
1da177e4 22#include <linux/stat.h>
5a0e3ad6 23#include <linux/slab.h>
1da177e4
LT
24#include <linux/pagemap.h>
25#include <asm/div64.h>
26#include "cifsfs.h"
27#include "cifspdu.h"
28#include "cifsglob.h"
29#include "cifsproto.h"
30#include "cifs_debug.h"
31#include "cifs_fs_sb.h"
9451a9a5 32#include "fscache.h"
1da177e4 33
70eff55d 34
01c64fea 35static void cifs_set_ops(struct inode *inode)
70eff55d
CH
36{
37 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
38
39 switch (inode->i_mode & S_IFMT) {
40 case S_IFREG:
41 inode->i_op = &cifs_file_inode_ops;
42 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
43 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
44 inode->i_fop = &cifs_file_direct_nobrl_ops;
45 else
46 inode->i_fop = &cifs_file_direct_ops;
8be7e6ba
PS
47 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
48 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
49 inode->i_fop = &cifs_file_strict_nobrl_ops;
50 else
51 inode->i_fop = &cifs_file_strict_ops;
70eff55d
CH
52 } else if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
53 inode->i_fop = &cifs_file_nobrl_ops;
54 else { /* not direct, send byte range locks */
55 inode->i_fop = &cifs_file_ops;
56 }
57
70eff55d 58 /* check if server can support readpages */
0d424ad0 59 if (cifs_sb_master_tcon(cifs_sb)->ses->server->maxBuf <
70eff55d
CH
60 PAGE_CACHE_SIZE + MAX_CIFS_HDR_SIZE)
61 inode->i_data.a_ops = &cifs_addr_ops_smallbuf;
62 else
63 inode->i_data.a_ops = &cifs_addr_ops;
64 break;
65 case S_IFDIR:
bc5b6e24 66#ifdef CONFIG_CIFS_DFS_UPCALL
01c64fea 67 if (IS_AUTOMOUNT(inode)) {
7962670e
IM
68 inode->i_op = &cifs_dfs_referral_inode_operations;
69 } else {
bc5b6e24
SF
70#else /* NO DFS support, treat as a directory */
71 {
72#endif
7962670e
IM
73 inode->i_op = &cifs_dir_inode_ops;
74 inode->i_fop = &cifs_dir_ops;
75 }
70eff55d
CH
76 break;
77 case S_IFLNK:
78 inode->i_op = &cifs_symlink_inode_ops;
79 break;
80 default:
81 init_special_inode(inode, inode->i_mode, inode->i_rdev);
82 break;
83 }
84}
85
df2cf170
JL
86/* check inode attributes against fattr. If they don't match, tag the
87 * inode for cache invalidation
88 */
89static void
90cifs_revalidate_cache(struct inode *inode, struct cifs_fattr *fattr)
91{
92 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
93
f19159dc 94 cFYI(1, "%s: revalidating inode %llu", __func__, cifs_i->uniqueid);
df2cf170
JL
95
96 if (inode->i_state & I_NEW) {
f19159dc 97 cFYI(1, "%s: inode %llu is new", __func__, cifs_i->uniqueid);
df2cf170
JL
98 return;
99 }
100
101 /* don't bother with revalidation if we have an oplock */
102 if (cifs_i->clientCanCacheRead) {
f19159dc
SF
103 cFYI(1, "%s: inode %llu is oplocked", __func__,
104 cifs_i->uniqueid);
df2cf170
JL
105 return;
106 }
107
108 /* revalidate if mtime or size have changed */
109 if (timespec_equal(&inode->i_mtime, &fattr->cf_mtime) &&
110 cifs_i->server_eof == fattr->cf_eof) {
f19159dc
SF
111 cFYI(1, "%s: inode %llu is unchanged", __func__,
112 cifs_i->uniqueid);
df2cf170
JL
113 return;
114 }
115
f19159dc
SF
116 cFYI(1, "%s: invalidating inode %llu mapping", __func__,
117 cifs_i->uniqueid);
df2cf170
JL
118 cifs_i->invalid_mapping = true;
119}
120
cc0bad75
JL
121/* populate an inode with info from a cifs_fattr struct */
122void
123cifs_fattr_to_inode(struct inode *inode, struct cifs_fattr *fattr)
75f12983 124{
cc0bad75 125 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
0b8f18e3
JL
126 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
127 unsigned long oldtime = cifs_i->time;
cc0bad75 128
df2cf170
JL
129 cifs_revalidate_cache(inode, fattr);
130
cc0bad75
JL
131 inode->i_atime = fattr->cf_atime;
132 inode->i_mtime = fattr->cf_mtime;
133 inode->i_ctime = fattr->cf_ctime;
cc0bad75
JL
134 inode->i_rdev = fattr->cf_rdev;
135 inode->i_nlink = fattr->cf_nlink;
136 inode->i_uid = fattr->cf_uid;
137 inode->i_gid = fattr->cf_gid;
138
0b8f18e3
JL
139 /* if dynperm is set, don't clobber existing mode */
140 if (inode->i_state & I_NEW ||
141 !(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM))
142 inode->i_mode = fattr->cf_mode;
143
cc0bad75 144 cifs_i->cifsAttrs = fattr->cf_cifsattrs;
75f12983 145
0b8f18e3
JL
146 if (fattr->cf_flags & CIFS_FATTR_NEED_REVAL)
147 cifs_i->time = 0;
148 else
149 cifs_i->time = jiffies;
150
b6b38f70
JP
151 cFYI(1, "inode 0x%p old_time=%ld new_time=%ld", inode,
152 oldtime, cifs_i->time);
0b8f18e3
JL
153
154 cifs_i->delete_pending = fattr->cf_flags & CIFS_FATTR_DELETE_PENDING;
cc0bad75 155
835a36ca 156 cifs_i->server_eof = fattr->cf_eof;
cc0bad75
JL
157 /*
158 * Can't safely change the file size here if the client is writing to
159 * it due to potential races.
160 */
161 spin_lock(&inode->i_lock);
162 if (is_size_safe_to_change(cifs_i, fattr->cf_eof)) {
163 i_size_write(inode, fattr->cf_eof);
164
165 /*
166 * i_blocks is not related to (i_size / i_blksize),
167 * but instead 512 byte (2**9) size is required for
168 * calculating num blocks.
169 */
170 inode->i_blocks = (512 - 1 + fattr->cf_bytes) >> 9;
171 }
172 spin_unlock(&inode->i_lock);
173
01c64fea
DH
174 if (fattr->cf_flags & CIFS_FATTR_DFS_REFERRAL)
175 inode->i_flags |= S_AUTOMOUNT;
176 cifs_set_ops(inode);
cc0bad75
JL
177}
178
4065c802
JL
179void
180cifs_fill_uniqueid(struct super_block *sb, struct cifs_fattr *fattr)
181{
182 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
183
184 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM)
185 return;
186
187 fattr->cf_uniqueid = iunique(sb, ROOT_I);
188}
189
cc0bad75
JL
190/* Fill a cifs_fattr struct with info from FILE_UNIX_BASIC_INFO. */
191void
192cifs_unix_basic_to_fattr(struct cifs_fattr *fattr, FILE_UNIX_BASIC_INFO *info,
193 struct cifs_sb_info *cifs_sb)
194{
195 memset(fattr, 0, sizeof(*fattr));
196 fattr->cf_uniqueid = le64_to_cpu(info->UniqueId);
197 fattr->cf_bytes = le64_to_cpu(info->NumOfBytes);
198 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
199
200 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
201 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastModificationTime);
202 fattr->cf_ctime = cifs_NTtimeToUnix(info->LastStatusChange);
203 fattr->cf_mode = le64_to_cpu(info->Permissions);
75f12983
CH
204
205 /*
206 * Since we set the inode type below we need to mask off
207 * to avoid strange results if bits set above.
208 */
cc0bad75 209 fattr->cf_mode &= ~S_IFMT;
75f12983
CH
210 switch (le32_to_cpu(info->Type)) {
211 case UNIX_FILE:
cc0bad75
JL
212 fattr->cf_mode |= S_IFREG;
213 fattr->cf_dtype = DT_REG;
75f12983
CH
214 break;
215 case UNIX_SYMLINK:
cc0bad75
JL
216 fattr->cf_mode |= S_IFLNK;
217 fattr->cf_dtype = DT_LNK;
75f12983
CH
218 break;
219 case UNIX_DIR:
cc0bad75
JL
220 fattr->cf_mode |= S_IFDIR;
221 fattr->cf_dtype = DT_DIR;
75f12983
CH
222 break;
223 case UNIX_CHARDEV:
cc0bad75
JL
224 fattr->cf_mode |= S_IFCHR;
225 fattr->cf_dtype = DT_CHR;
226 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
227 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
228 break;
229 case UNIX_BLOCKDEV:
cc0bad75
JL
230 fattr->cf_mode |= S_IFBLK;
231 fattr->cf_dtype = DT_BLK;
232 fattr->cf_rdev = MKDEV(le64_to_cpu(info->DevMajor),
233 le64_to_cpu(info->DevMinor) & MINORMASK);
75f12983
CH
234 break;
235 case UNIX_FIFO:
cc0bad75
JL
236 fattr->cf_mode |= S_IFIFO;
237 fattr->cf_dtype = DT_FIFO;
75f12983
CH
238 break;
239 case UNIX_SOCKET:
cc0bad75
JL
240 fattr->cf_mode |= S_IFSOCK;
241 fattr->cf_dtype = DT_SOCK;
75f12983
CH
242 break;
243 default:
244 /* safest to call it a file if we do not know */
cc0bad75
JL
245 fattr->cf_mode |= S_IFREG;
246 fattr->cf_dtype = DT_REG;
b6b38f70 247 cFYI(1, "unknown type %d", le32_to_cpu(info->Type));
75f12983
CH
248 break;
249 }
250
cc0bad75
JL
251 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID)
252 fattr->cf_uid = cifs_sb->mnt_uid;
75f12983 253 else
cc0bad75 254 fattr->cf_uid = le64_to_cpu(info->Uid);
75f12983 255
cc0bad75
JL
256 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID)
257 fattr->cf_gid = cifs_sb->mnt_gid;
75f12983 258 else
cc0bad75 259 fattr->cf_gid = le64_to_cpu(info->Gid);
75f12983 260
cc0bad75 261 fattr->cf_nlink = le64_to_cpu(info->Nlinks);
75f12983
CH
262}
263
b9a3260f 264/*
cc0bad75
JL
265 * Fill a cifs_fattr struct with fake inode info.
266 *
267 * Needed to setup cifs_fattr data for the directory which is the
268 * junction to the new submount (ie to setup the fake directory
269 * which represents a DFS referral).
b9a3260f 270 */
f1230c97 271static void
cc0bad75 272cifs_create_dfs_fattr(struct cifs_fattr *fattr, struct super_block *sb)
0e4bbde9 273{
cc0bad75 274 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
0e4bbde9 275
b6b38f70 276 cFYI(1, "creating fake fattr for DFS referral");
cc0bad75
JL
277
278 memset(fattr, 0, sizeof(*fattr));
279 fattr->cf_mode = S_IFDIR | S_IXUGO | S_IRWXU;
280 fattr->cf_uid = cifs_sb->mnt_uid;
281 fattr->cf_gid = cifs_sb->mnt_gid;
282 fattr->cf_atime = CURRENT_TIME;
283 fattr->cf_ctime = CURRENT_TIME;
284 fattr->cf_mtime = CURRENT_TIME;
285 fattr->cf_nlink = 2;
286 fattr->cf_flags |= CIFS_FATTR_DFS_REFERRAL;
0e4bbde9
SF
287}
288
abab095d
JL
289int cifs_get_file_info_unix(struct file *filp)
290{
291 int rc;
292 int xid;
293 FILE_UNIX_BASIC_INFO find_data;
294 struct cifs_fattr fattr;
295 struct inode *inode = filp->f_path.dentry->d_inode;
296 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 297 struct cifsFileInfo *cfile = filp->private_data;
13cfb733 298 struct cifsTconInfo *tcon = tlink_tcon(cfile->tlink);
abab095d
JL
299
300 xid = GetXid();
301 rc = CIFSSMBUnixQFileInfo(xid, tcon, cfile->netfid, &find_data);
302 if (!rc) {
303 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
304 } else if (rc == -EREMOTE) {
305 cifs_create_dfs_fattr(&fattr, inode->i_sb);
306 rc = 0;
307 }
308
309 cifs_fattr_to_inode(inode, &fattr);
310 FreeXid(xid);
311 return rc;
312}
313
1da177e4 314int cifs_get_inode_info_unix(struct inode **pinode,
cc0bad75
JL
315 const unsigned char *full_path,
316 struct super_block *sb, int xid)
1da177e4 317{
cc0bad75 318 int rc;
0e4bbde9 319 FILE_UNIX_BASIC_INFO find_data;
cc0bad75
JL
320 struct cifs_fattr fattr;
321 struct cifsTconInfo *tcon;
7ffec372 322 struct tcon_link *tlink;
1da177e4 323 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 324
b6b38f70 325 cFYI(1, "Getting info on %s", full_path);
7962670e 326
7ffec372
JL
327 tlink = cifs_sb_tlink(cifs_sb);
328 if (IS_ERR(tlink))
329 return PTR_ERR(tlink);
330 tcon = tlink_tcon(tlink);
331
1da177e4 332 /* could have done a find first instead but this returns more info */
cc0bad75 333 rc = CIFSSMBUnixQPathInfo(xid, tcon, full_path, &find_data,
737b758c
SF
334 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
335 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 336 cifs_put_tlink(tlink);
e911d0cc 337
cc0bad75
JL
338 if (!rc) {
339 cifs_unix_basic_to_fattr(&fattr, &find_data, cifs_sb);
340 } else if (rc == -EREMOTE) {
341 cifs_create_dfs_fattr(&fattr, sb);
342 rc = 0;
343 } else {
344 return rc;
345 }
1da177e4 346
1b12b9c1
SM
347 /* check for Minshall+French symlinks */
348 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
349 int tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
350 if (tmprc)
351 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
352 }
353
0e4bbde9 354 if (*pinode == NULL) {
cc0bad75 355 /* get new inode */
4065c802 356 cifs_fill_uniqueid(sb, &fattr);
cc0bad75
JL
357 *pinode = cifs_iget(sb, &fattr);
358 if (!*pinode)
0e4bbde9 359 rc = -ENOMEM;
cc0bad75
JL
360 } else {
361 /* we already have inode, update it */
362 cifs_fattr_to_inode(*pinode, &fattr);
0e4bbde9 363 }
1da177e4 364
1da177e4
LT
365 return rc;
366}
367
0b8f18e3
JL
368static int
369cifs_sfu_type(struct cifs_fattr *fattr, const unsigned char *path,
370 struct cifs_sb_info *cifs_sb, int xid)
d6e2f2a4
SF
371{
372 int rc;
4b18f2a9 373 int oplock = 0;
d6e2f2a4 374 __u16 netfid;
7ffec372
JL
375 struct tcon_link *tlink;
376 struct cifsTconInfo *tcon;
86c96b4b 377 char buf[24];
d6e2f2a4 378 unsigned int bytes_read;
fb8c4b14 379 char *pbuf;
d6e2f2a4
SF
380
381 pbuf = buf;
382
0b8f18e3
JL
383 fattr->cf_mode &= ~S_IFMT;
384
385 if (fattr->cf_eof == 0) {
386 fattr->cf_mode |= S_IFIFO;
387 fattr->cf_dtype = DT_FIFO;
d6e2f2a4 388 return 0;
0b8f18e3
JL
389 } else if (fattr->cf_eof < 8) {
390 fattr->cf_mode |= S_IFREG;
391 fattr->cf_dtype = DT_REG;
d6e2f2a4
SF
392 return -EINVAL; /* EOPNOTSUPP? */
393 }
50c2f753 394
7ffec372
JL
395 tlink = cifs_sb_tlink(cifs_sb);
396 if (IS_ERR(tlink))
397 return PTR_ERR(tlink);
398 tcon = tlink_tcon(tlink);
399
400 rc = CIFSSMBOpen(xid, tcon, path, FILE_OPEN, GENERIC_READ,
d6e2f2a4
SF
401 CREATE_NOT_DIR, &netfid, &oplock, NULL,
402 cifs_sb->local_nls,
403 cifs_sb->mnt_cifs_flags &
404 CIFS_MOUNT_MAP_SPECIAL_CHR);
fb8c4b14 405 if (rc == 0) {
ec637e3f 406 int buf_type = CIFS_NO_BUFFER;
d6e2f2a4 407 /* Read header */
7ffec372 408 rc = CIFSSMBRead(xid, tcon, netfid,
86c96b4b 409 24 /* length */, 0 /* offset */,
ec637e3f 410 &bytes_read, &pbuf, &buf_type);
4523cc30
SF
411 if ((rc == 0) && (bytes_read >= 8)) {
412 if (memcmp("IntxBLK", pbuf, 8) == 0) {
b6b38f70 413 cFYI(1, "Block device");
0b8f18e3
JL
414 fattr->cf_mode |= S_IFBLK;
415 fattr->cf_dtype = DT_BLK;
4523cc30 416 if (bytes_read == 24) {
86c96b4b
SF
417 /* we have enough to decode dev num */
418 __u64 mjr; /* major */
419 __u64 mnr; /* minor */
420 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
421 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 422 fattr->cf_rdev = MKDEV(mjr, mnr);
86c96b4b 423 }
4523cc30 424 } else if (memcmp("IntxCHR", pbuf, 8) == 0) {
b6b38f70 425 cFYI(1, "Char device");
0b8f18e3
JL
426 fattr->cf_mode |= S_IFCHR;
427 fattr->cf_dtype = DT_CHR;
4523cc30 428 if (bytes_read == 24) {
86c96b4b
SF
429 /* we have enough to decode dev num */
430 __u64 mjr; /* major */
431 __u64 mnr; /* minor */
432 mjr = le64_to_cpu(*(__le64 *)(pbuf+8));
433 mnr = le64_to_cpu(*(__le64 *)(pbuf+16));
0b8f18e3 434 fattr->cf_rdev = MKDEV(mjr, mnr);
fb8c4b14 435 }
4523cc30 436 } else if (memcmp("IntxLNK", pbuf, 7) == 0) {
b6b38f70 437 cFYI(1, "Symlink");
0b8f18e3
JL
438 fattr->cf_mode |= S_IFLNK;
439 fattr->cf_dtype = DT_LNK;
86c96b4b 440 } else {
0b8f18e3
JL
441 fattr->cf_mode |= S_IFREG; /* file? */
442 fattr->cf_dtype = DT_REG;
fb8c4b14 443 rc = -EOPNOTSUPP;
86c96b4b 444 }
3020a1f5 445 } else {
0b8f18e3
JL
446 fattr->cf_mode |= S_IFREG; /* then it is a file */
447 fattr->cf_dtype = DT_REG;
fb8c4b14
SF
448 rc = -EOPNOTSUPP; /* or some unknown SFU type */
449 }
7ffec372 450 CIFSSMBClose(xid, tcon, netfid);
d6e2f2a4 451 }
7ffec372 452 cifs_put_tlink(tlink);
d6e2f2a4 453 return rc;
d6e2f2a4
SF
454}
455
9e294f1c
SF
456#define SFBITS_MASK (S_ISVTX | S_ISGID | S_ISUID) /* SETFILEBITS valid bits */
457
0b8f18e3
JL
458/*
459 * Fetch mode bits as provided by SFU.
460 *
461 * FIXME: Doesn't this clobber the type bit we got from cifs_sfu_type ?
462 */
463static int cifs_sfu_mode(struct cifs_fattr *fattr, const unsigned char *path,
464 struct cifs_sb_info *cifs_sb, int xid)
9e294f1c 465{
3020a1f5 466#ifdef CONFIG_CIFS_XATTR
9e294f1c
SF
467 ssize_t rc;
468 char ea_value[4];
469 __u32 mode;
7ffec372
JL
470 struct tcon_link *tlink;
471 struct cifsTconInfo *tcon;
472
473 tlink = cifs_sb_tlink(cifs_sb);
474 if (IS_ERR(tlink))
475 return PTR_ERR(tlink);
476 tcon = tlink_tcon(tlink);
9e294f1c 477
7ffec372 478 rc = CIFSSMBQAllEAs(xid, tcon, path, "SETFILEBITS",
0b8f18e3
JL
479 ea_value, 4 /* size of buf */, cifs_sb->local_nls,
480 cifs_sb->mnt_cifs_flags &
481 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 482 cifs_put_tlink(tlink);
4523cc30 483 if (rc < 0)
9e294f1c
SF
484 return (int)rc;
485 else if (rc > 3) {
486 mode = le32_to_cpu(*((__le32 *)ea_value));
0b8f18e3 487 fattr->cf_mode &= ~SFBITS_MASK;
b6b38f70
JP
488 cFYI(1, "special bits 0%o org mode 0%o", mode,
489 fattr->cf_mode);
0b8f18e3 490 fattr->cf_mode = (mode & SFBITS_MASK) | fattr->cf_mode;
b6b38f70 491 cFYI(1, "special mode bits 0%o", mode);
9e294f1c 492 }
0b8f18e3
JL
493
494 return 0;
3020a1f5
SF
495#else
496 return -EOPNOTSUPP;
497#endif
9e294f1c
SF
498}
499
0b8f18e3 500/* Fill a cifs_fattr struct with info from FILE_ALL_INFO */
f1230c97 501static void
0b8f18e3
JL
502cifs_all_info_to_fattr(struct cifs_fattr *fattr, FILE_ALL_INFO *info,
503 struct cifs_sb_info *cifs_sb, bool adjust_tz)
b9a3260f 504{
0d424ad0
JL
505 struct cifsTconInfo *tcon = cifs_sb_master_tcon(cifs_sb);
506
0b8f18e3
JL
507 memset(fattr, 0, sizeof(*fattr));
508 fattr->cf_cifsattrs = le32_to_cpu(info->Attributes);
509 if (info->DeletePending)
510 fattr->cf_flags |= CIFS_FATTR_DELETE_PENDING;
511
512 if (info->LastAccessTime)
513 fattr->cf_atime = cifs_NTtimeToUnix(info->LastAccessTime);
514 else
515 fattr->cf_atime = CURRENT_TIME;
516
517 fattr->cf_ctime = cifs_NTtimeToUnix(info->ChangeTime);
518 fattr->cf_mtime = cifs_NTtimeToUnix(info->LastWriteTime);
519
520 if (adjust_tz) {
0d424ad0
JL
521 fattr->cf_ctime.tv_sec += tcon->ses->server->timeAdj;
522 fattr->cf_mtime.tv_sec += tcon->ses->server->timeAdj;
0b8f18e3
JL
523 }
524
525 fattr->cf_eof = le64_to_cpu(info->EndOfFile);
526 fattr->cf_bytes = le64_to_cpu(info->AllocationSize);
20054bd6 527 fattr->cf_createtime = le64_to_cpu(info->CreationTime);
0b8f18e3
JL
528
529 if (fattr->cf_cifsattrs & ATTR_DIRECTORY) {
530 fattr->cf_mode = S_IFDIR | cifs_sb->mnt_dir_mode;
531 fattr->cf_dtype = DT_DIR;
532 } else {
533 fattr->cf_mode = S_IFREG | cifs_sb->mnt_file_mode;
534 fattr->cf_dtype = DT_REG;
0b8f18e3 535
d0c280d2
JL
536 /* clear write bits if ATTR_READONLY is set */
537 if (fattr->cf_cifsattrs & ATTR_READONLY)
538 fattr->cf_mode &= ~(S_IWUGO);
539 }
0b8f18e3
JL
540
541 fattr->cf_nlink = le32_to_cpu(info->NumberOfLinks);
542
543 fattr->cf_uid = cifs_sb->mnt_uid;
544 fattr->cf_gid = cifs_sb->mnt_gid;
b9a3260f
SF
545}
546
abab095d
JL
547int cifs_get_file_info(struct file *filp)
548{
549 int rc;
550 int xid;
551 FILE_ALL_INFO find_data;
552 struct cifs_fattr fattr;
553 struct inode *inode = filp->f_path.dentry->d_inode;
554 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
c21dfb69 555 struct cifsFileInfo *cfile = filp->private_data;
13cfb733 556 struct cifsTconInfo *tcon = tlink_tcon(cfile->tlink);
abab095d
JL
557
558 xid = GetXid();
559 rc = CIFSSMBQFileInfo(xid, tcon, cfile->netfid, &find_data);
560 if (rc == -EOPNOTSUPP || rc == -EINVAL) {
561 /*
562 * FIXME: legacy server -- fall back to path-based call?
ff215713
SF
563 * for now, just skip revalidating and mark inode for
564 * immediate reval.
565 */
abab095d
JL
566 rc = 0;
567 CIFS_I(inode)->time = 0;
568 goto cgfi_exit;
569 } else if (rc == -EREMOTE) {
570 cifs_create_dfs_fattr(&fattr, inode->i_sb);
571 rc = 0;
572 } else if (rc)
573 goto cgfi_exit;
574
575 /*
576 * don't bother with SFU junk here -- just mark inode as needing
577 * revalidation.
578 */
579 cifs_all_info_to_fattr(&fattr, &find_data, cifs_sb, false);
580 fattr.cf_uniqueid = CIFS_I(inode)->uniqueid;
581 fattr.cf_flags |= CIFS_FATTR_NEED_REVAL;
582 cifs_fattr_to_inode(inode, &fattr);
583cgfi_exit:
584 FreeXid(xid);
585 return rc;
586}
587
1da177e4 588int cifs_get_inode_info(struct inode **pinode,
646dd539 589 const unsigned char *full_path, FILE_ALL_INFO *pfindData,
8b1327f6 590 struct super_block *sb, int xid, const __u16 *pfid)
1da177e4 591{
0b8f18e3 592 int rc = 0, tmprc;
1da177e4 593 struct cifsTconInfo *pTcon;
7ffec372 594 struct tcon_link *tlink;
1da177e4 595 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
1da177e4 596 char *buf = NULL;
5ade9dea 597 bool adjustTZ = false;
0b8f18e3 598 struct cifs_fattr fattr;
1da177e4 599
7ffec372
JL
600 tlink = cifs_sb_tlink(cifs_sb);
601 if (IS_ERR(tlink))
602 return PTR_ERR(tlink);
603 pTcon = tlink_tcon(tlink);
604
b6b38f70 605 cFYI(1, "Getting info on %s", full_path);
1da177e4 606
d0d2f2df
SF
607 if ((pfindData == NULL) && (*pinode != NULL)) {
608 if (CIFS_I(*pinode)->clientCanCacheRead) {
b6b38f70 609 cFYI(1, "No need to revalidate cached inode sizes");
7ffec372 610 goto cgii_exit;
1da177e4
LT
611 }
612 }
613
614 /* if file info not passed in then get it from server */
d0d2f2df 615 if (pfindData == NULL) {
1da177e4 616 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
7ffec372
JL
617 if (buf == NULL) {
618 rc = -ENOMEM;
619 goto cgii_exit;
620 }
1da177e4 621 pfindData = (FILE_ALL_INFO *)buf;
7962670e 622
1da177e4 623 /* could do find first instead but this returns more info */
7962670e 624 rc = CIFSSMBQPathInfo(xid, pTcon, full_path, pfindData,
acf1a1b1 625 0 /* not legacy */,
6b8edfe0 626 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
737b758c 627 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b8edfe0
SF
628 /* BB optimize code so we do not make the above call
629 when server claims no NT SMB support and the above call
630 failed at least once - set flag in tcon or mount */
4523cc30 631 if ((rc == -EOPNOTSUPP) || (rc == -EINVAL)) {
7962670e 632 rc = SMBQueryInformation(xid, pTcon, full_path,
fb8c4b14 633 pfindData, cifs_sb->local_nls,
6b8edfe0
SF
634 cifs_sb->mnt_cifs_flags &
635 CIFS_MOUNT_MAP_SPECIAL_CHR);
4b18f2a9 636 adjustTZ = true;
6b8edfe0 637 }
1da177e4 638 }
0b8f18e3
JL
639
640 if (!rc) {
641 cifs_all_info_to_fattr(&fattr, (FILE_ALL_INFO *) pfindData,
642 cifs_sb, adjustTZ);
643 } else if (rc == -EREMOTE) {
644 cifs_create_dfs_fattr(&fattr, sb);
b9a3260f 645 rc = 0;
0b8f18e3 646 } else {
7962670e 647 goto cgii_exit;
0b8f18e3 648 }
1da177e4 649
0b8f18e3
JL
650 /*
651 * If an inode wasn't passed in, then get the inode number
652 *
653 * Is an i_ino of zero legal? Can we use that to check if the server
654 * supports returning inode numbers? Are there other sanity checks we
655 * can use to ensure that the server is really filling in that field?
656 *
657 * We can not use the IndexNumber field by default from Windows or
658 * Samba (in ALL_INFO buf) but we can request it explicitly. The SNIA
659 * CIFS spec claims that this value is unique within the scope of a
660 * share, and the windows docs hint that it's actually unique
661 * per-machine.
662 *
663 * There may be higher info levels that work but are there Windows
664 * server or network appliances for which IndexNumber field is not
665 * guaranteed unique?
666 */
b9a3260f 667 if (*pinode == NULL) {
b9a3260f
SF
668 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) {
669 int rc1 = 0;
b9a3260f
SF
670
671 rc1 = CIFSGetSrvInodeNumber(xid, pTcon,
0b8f18e3 672 full_path, &fattr.cf_uniqueid,
737b758c
SF
673 cifs_sb->local_nls,
674 cifs_sb->mnt_cifs_flags &
675 CIFS_MOUNT_MAP_SPECIAL_CHR);
ec06aedd 676 if (rc1 || !fattr.cf_uniqueid) {
b6b38f70 677 cFYI(1, "GetSrvInodeNum rc %d", rc1);
0b8f18e3 678 fattr.cf_uniqueid = iunique(sb, ROOT_I);
ec06aedd 679 cifs_autodisable_serverino(cifs_sb);
132ac7b7 680 }
132ac7b7 681 } else {
0b8f18e3 682 fattr.cf_uniqueid = iunique(sb, ROOT_I);
132ac7b7 683 }
b9a3260f 684 } else {
0b8f18e3 685 fattr.cf_uniqueid = CIFS_I(*pinode)->uniqueid;
b9a3260f
SF
686 }
687
0b8f18e3
JL
688 /* query for SFU type info if supported and needed */
689 if (fattr.cf_cifsattrs & ATTR_SYSTEM &&
690 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
691 tmprc = cifs_sfu_type(&fattr, full_path, cifs_sb, xid);
692 if (tmprc)
b6b38f70 693 cFYI(1, "cifs_sfu_type failed: %d", tmprc);
b9a3260f 694 }
1da177e4 695
79df1bae 696#ifdef CONFIG_CIFS_ACL
b9a3260f
SF
697 /* fill in 0777 bits from ACL */
698 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
78415d2d
SP
699 rc = cifs_acl_to_fattr(cifs_sb, &fattr, *pinode, full_path,
700 pfid);
701 if (rc) {
702 cFYI(1, "%s: Getting ACL failed with error: %d",
703 __func__, rc);
704 goto cgii_exit;
705 }
b9a3260f 706 }
79df1bae 707#endif /* CONFIG_CIFS_ACL */
b9a3260f 708
0b8f18e3
JL
709 /* fill in remaining high mode bits e.g. SUID, VTX */
710 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL)
711 cifs_sfu_mode(&fattr, full_path, cifs_sb, xid);
b9a3260f 712
1b12b9c1
SM
713 /* check for Minshall+French symlinks */
714 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MF_SYMLINKS) {
715 tmprc = CIFSCheckMFSymlink(&fattr, full_path, cifs_sb, xid);
716 if (tmprc)
717 cFYI(1, "CIFSCheckMFSymlink: %d", tmprc);
718 }
719
0b8f18e3
JL
720 if (!*pinode) {
721 *pinode = cifs_iget(sb, &fattr);
722 if (!*pinode)
723 rc = -ENOMEM;
724 } else {
725 cifs_fattr_to_inode(*pinode, &fattr);
726 }
b9a3260f 727
7962670e 728cgii_exit:
1da177e4 729 kfree(buf);
7ffec372 730 cifs_put_tlink(tlink);
1da177e4
LT
731 return rc;
732}
733
7f8ed420
SF
734static const struct inode_operations cifs_ipc_inode_ops = {
735 .lookup = cifs_lookup,
736};
737
7d161b7f
JL
738char *cifs_build_path_to_root(struct cifs_sb_info *cifs_sb,
739 struct cifsTconInfo *tcon)
8be0ed44
SF
740{
741 int pplen = cifs_sb->prepathlen;
742 int dfsplen;
743 char *full_path = NULL;
744
745 /* if no prefix path, simply set path to the root of share to "" */
746 if (pplen == 0) {
747 full_path = kmalloc(1, GFP_KERNEL);
748 if (full_path)
749 full_path[0] = 0;
750 return full_path;
751 }
752
0d424ad0
JL
753 if (tcon->Flags & SMB_SHARE_IS_IN_DFS)
754 dfsplen = strnlen(tcon->treeName, MAX_TREE_SIZE + 1);
8be0ed44
SF
755 else
756 dfsplen = 0;
757
758 full_path = kmalloc(dfsplen + pplen + 1, GFP_KERNEL);
759 if (full_path == NULL)
760 return full_path;
761
762 if (dfsplen) {
0d424ad0 763 strncpy(full_path, tcon->treeName, dfsplen);
8be0ed44
SF
764 /* switch slash direction in prepath depending on whether
765 * windows or posix style path names
766 */
767 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS) {
768 int i;
769 for (i = 0; i < dfsplen; i++) {
770 if (full_path[i] == '\\')
771 full_path[i] = '/';
772 }
773 }
774 }
775 strncpy(full_path + dfsplen, cifs_sb->prepath, pplen);
776 full_path[dfsplen + pplen] = 0; /* add trailing null */
777 return full_path;
778}
779
cc0bad75
JL
780static int
781cifs_find_inode(struct inode *inode, void *opaque)
782{
783 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
784
f30b9c11 785 /* don't match inode with different uniqueid */
cc0bad75
JL
786 if (CIFS_I(inode)->uniqueid != fattr->cf_uniqueid)
787 return 0;
788
20054bd6
JL
789 /* use createtime like an i_generation field */
790 if (CIFS_I(inode)->createtime != fattr->cf_createtime)
791 return 0;
792
f30b9c11
JL
793 /* don't match inode of different type */
794 if ((inode->i_mode & S_IFMT) != (fattr->cf_mode & S_IFMT))
795 return 0;
796
5acfec25
JL
797 /* if it's not a directory or has no dentries, then flag it */
798 if (S_ISDIR(inode->i_mode) && !list_empty(&inode->i_dentry))
3d694380 799 fattr->cf_flags |= CIFS_FATTR_INO_COLLISION;
3d694380 800
cc0bad75
JL
801 return 1;
802}
803
804static int
805cifs_init_inode(struct inode *inode, void *opaque)
806{
807 struct cifs_fattr *fattr = (struct cifs_fattr *) opaque;
808
809 CIFS_I(inode)->uniqueid = fattr->cf_uniqueid;
20054bd6 810 CIFS_I(inode)->createtime = fattr->cf_createtime;
cc0bad75
JL
811 return 0;
812}
813
5acfec25
JL
814/*
815 * walk dentry list for an inode and report whether it has aliases that
816 * are hashed. We use this to determine if a directory inode can actually
817 * be used.
818 */
819static bool
820inode_has_hashed_dentries(struct inode *inode)
821{
822 struct dentry *dentry;
823
873feea0 824 spin_lock(&inode->i_lock);
5acfec25
JL
825 list_for_each_entry(dentry, &inode->i_dentry, d_alias) {
826 if (!d_unhashed(dentry) || IS_ROOT(dentry)) {
873feea0 827 spin_unlock(&inode->i_lock);
5acfec25
JL
828 return true;
829 }
830 }
873feea0 831 spin_unlock(&inode->i_lock);
5acfec25
JL
832 return false;
833}
834
cc0bad75
JL
835/* Given fattrs, get a corresponding inode */
836struct inode *
837cifs_iget(struct super_block *sb, struct cifs_fattr *fattr)
838{
839 unsigned long hash;
840 struct inode *inode;
841
3d694380 842retry_iget5_locked:
b6b38f70 843 cFYI(1, "looking for uniqueid=%llu", fattr->cf_uniqueid);
cc0bad75
JL
844
845 /* hash down to 32-bits on 32-bit arch */
846 hash = cifs_uniqueid_to_ino_t(fattr->cf_uniqueid);
847
848 inode = iget5_locked(sb, hash, cifs_find_inode, cifs_init_inode, fattr);
cc0bad75 849 if (inode) {
5acfec25 850 /* was there a potentially problematic inode collision? */
3d694380 851 if (fattr->cf_flags & CIFS_FATTR_INO_COLLISION) {
3d694380 852 fattr->cf_flags &= ~CIFS_FATTR_INO_COLLISION;
5acfec25
JL
853
854 if (inode_has_hashed_dentries(inode)) {
855 cifs_autodisable_serverino(CIFS_SB(sb));
856 iput(inode);
857 fattr->cf_uniqueid = iunique(sb, ROOT_I);
858 goto retry_iget5_locked;
859 }
3d694380
JL
860 }
861
cc0bad75
JL
862 cifs_fattr_to_inode(inode, fattr);
863 if (sb->s_flags & MS_NOATIME)
864 inode->i_flags |= S_NOATIME | S_NOCMTIME;
865 if (inode->i_state & I_NEW) {
866 inode->i_ino = hash;
522440ed
JL
867 if (S_ISREG(inode->i_mode))
868 inode->i_data.backing_dev_info = sb->s_bdi;
0ccd4802 869#ifdef CONFIG_CIFS_FSCACHE
9451a9a5
SJ
870 /* initialize per-inode cache cookie pointer */
871 CIFS_I(inode)->fscache = NULL;
0ccd4802 872#endif
cc0bad75
JL
873 unlock_new_inode(inode);
874 }
875 }
876
877 return inode;
878}
879
1da177e4 880/* gets root inode */
9b6763e0 881struct inode *cifs_root_iget(struct super_block *sb)
1da177e4 882{
ce634ab2 883 int xid;
0d424ad0 884 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cc0bad75 885 struct inode *inode = NULL;
ce634ab2 886 long rc;
8be0ed44 887 char *full_path;
0d424ad0 888 struct cifsTconInfo *tcon = cifs_sb_master_tcon(cifs_sb);
ce634ab2 889
7d161b7f 890 full_path = cifs_build_path_to_root(cifs_sb, tcon);
8be0ed44
SF
891 if (full_path == NULL)
892 return ERR_PTR(-ENOMEM);
c18c842b 893
8be0ed44 894 xid = GetXid();
0d424ad0 895 if (tcon->unix_ext)
cc0bad75 896 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
0b8f18e3
JL
897 else
898 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
8be0ed44 899 xid, NULL);
0b8f18e3 900
a7851ce7
OS
901 if (!inode) {
902 inode = ERR_PTR(rc);
903 goto out;
904 }
cc0bad75 905
0ccd4802 906#ifdef CONFIG_CIFS_FSCACHE
d03382ce 907 /* populate tcon->resource_id */
0d424ad0 908 tcon->resource_id = CIFS_I(inode)->uniqueid;
0ccd4802 909#endif
d03382ce 910
0d424ad0 911 if (rc && tcon->ipc) {
b6b38f70 912 cFYI(1, "ipc connection - fake read inode");
7f8ed420
SF
913 inode->i_mode |= S_IFDIR;
914 inode->i_nlink = 2;
915 inode->i_op = &cifs_ipc_inode_ops;
916 inode->i_fop = &simple_dir_operations;
917 inode->i_uid = cifs_sb->mnt_uid;
918 inode->i_gid = cifs_sb->mnt_gid;
ad661334 919 } else if (rc) {
ce634ab2 920 iget_failed(inode);
a7851ce7 921 inode = ERR_PTR(rc);
7f8ed420
SF
922 }
923
a7851ce7 924out:
8be0ed44 925 kfree(full_path);
ce634ab2
DH
926 /* can not call macro FreeXid here since in a void func
927 * TODO: This is no longer true
928 */
1da177e4 929 _FreeXid(xid);
ce634ab2 930 return inode;
1da177e4
LT
931}
932
388e57b2
SF
933static int
934cifs_set_file_info(struct inode *inode, struct iattr *attrs, int xid,
935 char *full_path, __u32 dosattr)
936{
937 int rc;
938 int oplock = 0;
939 __u16 netfid;
940 __u32 netpid;
941 bool set_time = false;
942 struct cifsFileInfo *open_file;
943 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
944 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 945 struct tcon_link *tlink = NULL;
ba00ba64 946 struct cifsTconInfo *pTcon;
388e57b2
SF
947 FILE_BASIC_INFO info_buf;
948
1adcb710
SF
949 if (attrs == NULL)
950 return -EINVAL;
951
388e57b2
SF
952 if (attrs->ia_valid & ATTR_ATIME) {
953 set_time = true;
954 info_buf.LastAccessTime =
955 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_atime));
956 } else
957 info_buf.LastAccessTime = 0;
958
959 if (attrs->ia_valid & ATTR_MTIME) {
960 set_time = true;
961 info_buf.LastWriteTime =
962 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_mtime));
963 } else
964 info_buf.LastWriteTime = 0;
965
966 /*
967 * Samba throws this field away, but windows may actually use it.
968 * Do not set ctime unless other time stamps are changed explicitly
969 * (i.e. by utimes()) since we would then have a mix of client and
970 * server times.
971 */
972 if (set_time && (attrs->ia_valid & ATTR_CTIME)) {
b6b38f70 973 cFYI(1, "CIFS - CTIME changed");
388e57b2
SF
974 info_buf.ChangeTime =
975 cpu_to_le64(cifs_UnixTimeToNT(attrs->ia_ctime));
976 } else
977 info_buf.ChangeTime = 0;
978
979 info_buf.CreationTime = 0; /* don't change */
980 info_buf.Attributes = cpu_to_le32(dosattr);
981
982 /*
983 * If the file is already open for write, just use that fileid
984 */
6508d904 985 open_file = find_writable_file(cifsInode, true);
388e57b2
SF
986 if (open_file) {
987 netfid = open_file->netfid;
988 netpid = open_file->pid;
13cfb733 989 pTcon = tlink_tcon(open_file->tlink);
388e57b2
SF
990 goto set_via_filehandle;
991 }
992
7ffec372
JL
993 tlink = cifs_sb_tlink(cifs_sb);
994 if (IS_ERR(tlink)) {
995 rc = PTR_ERR(tlink);
996 tlink = NULL;
997 goto out;
998 }
999 pTcon = tlink_tcon(tlink);
ba00ba64 1000
388e57b2
SF
1001 /*
1002 * NT4 apparently returns success on this call, but it doesn't
1003 * really work.
1004 */
1005 if (!(pTcon->ses->flags & CIFS_SES_NT4)) {
1006 rc = CIFSSMBSetPathInfo(xid, pTcon, full_path,
1007 &info_buf, cifs_sb->local_nls,
1008 cifs_sb->mnt_cifs_flags &
1009 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b37faa1
JL
1010 if (rc == 0) {
1011 cifsInode->cifsAttrs = dosattr;
1012 goto out;
1013 } else if (rc != -EOPNOTSUPP && rc != -EINVAL)
388e57b2
SF
1014 goto out;
1015 }
1016
b6b38f70
JP
1017 cFYI(1, "calling SetFileInfo since SetPathInfo for "
1018 "times not supported by this server");
388e57b2
SF
1019 rc = CIFSSMBOpen(xid, pTcon, full_path, FILE_OPEN,
1020 SYNCHRONIZE | FILE_WRITE_ATTRIBUTES,
1021 CREATE_NOT_DIR, &netfid, &oplock,
1022 NULL, cifs_sb->local_nls,
1023 cifs_sb->mnt_cifs_flags &
1024 CIFS_MOUNT_MAP_SPECIAL_CHR);
1025
1026 if (rc != 0) {
1027 if (rc == -EIO)
1028 rc = -EINVAL;
1029 goto out;
1030 }
1031
1032 netpid = current->tgid;
1033
1034set_via_filehandle:
1035 rc = CIFSSMBSetFileInfo(xid, pTcon, &info_buf, netfid, netpid);
d388908e
SF
1036 if (!rc)
1037 cifsInode->cifsAttrs = dosattr;
1038
388e57b2
SF
1039 if (open_file == NULL)
1040 CIFSSMBClose(xid, pTcon, netfid);
1041 else
6ab409b5 1042 cifsFileInfo_put(open_file);
388e57b2 1043out:
7ffec372
JL
1044 if (tlink != NULL)
1045 cifs_put_tlink(tlink);
388e57b2
SF
1046 return rc;
1047}
1048
a12a1ac7
JL
1049/*
1050 * open the given file (if it isn't already), set the DELETE_ON_CLOSE bit
1051 * and rename it to a random name that hopefully won't conflict with
1052 * anything else.
1053 */
1054static int
3270958b 1055cifs_rename_pending_delete(char *full_path, struct dentry *dentry, int xid)
a12a1ac7
JL
1056{
1057 int oplock = 0;
1058 int rc;
1059 __u16 netfid;
3270958b 1060 struct inode *inode = dentry->d_inode;
a12a1ac7
JL
1061 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1062 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1063 struct tcon_link *tlink;
1064 struct cifsTconInfo *tcon;
3270958b
SF
1065 __u32 dosattr, origattr;
1066 FILE_BASIC_INFO *info_buf = NULL;
a12a1ac7 1067
7ffec372
JL
1068 tlink = cifs_sb_tlink(cifs_sb);
1069 if (IS_ERR(tlink))
1070 return PTR_ERR(tlink);
1071 tcon = tlink_tcon(tlink);
1072
a12a1ac7 1073 rc = CIFSSMBOpen(xid, tcon, full_path, FILE_OPEN,
dd1db2de 1074 DELETE|FILE_WRITE_ATTRIBUTES, CREATE_NOT_DIR,
a12a1ac7
JL
1075 &netfid, &oplock, NULL, cifs_sb->local_nls,
1076 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1077 if (rc != 0)
1078 goto out;
1079
3270958b
SF
1080 origattr = cifsInode->cifsAttrs;
1081 if (origattr == 0)
1082 origattr |= ATTR_NORMAL;
1083
1084 dosattr = origattr & ~ATTR_READONLY;
a12a1ac7
JL
1085 if (dosattr == 0)
1086 dosattr |= ATTR_NORMAL;
1087 dosattr |= ATTR_HIDDEN;
1088
3270958b
SF
1089 /* set ATTR_HIDDEN and clear ATTR_READONLY, but only if needed */
1090 if (dosattr != origattr) {
1091 info_buf = kzalloc(sizeof(*info_buf), GFP_KERNEL);
1092 if (info_buf == NULL) {
1093 rc = -ENOMEM;
1094 goto out_close;
1095 }
1096 info_buf->Attributes = cpu_to_le32(dosattr);
1097 rc = CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1098 current->tgid);
1099 /* although we would like to mark the file hidden
1100 if that fails we will still try to rename it */
41346098 1101 if (rc != 0)
3270958b
SF
1102 cifsInode->cifsAttrs = dosattr;
1103 else
1104 dosattr = origattr; /* since not able to change them */
a12a1ac7 1105 }
a12a1ac7 1106
dd1db2de
JL
1107 /* rename the file */
1108 rc = CIFSSMBRenameOpenFile(xid, tcon, netfid, NULL, cifs_sb->local_nls,
a12a1ac7
JL
1109 cifs_sb->mnt_cifs_flags &
1110 CIFS_MOUNT_MAP_SPECIAL_CHR);
3270958b
SF
1111 if (rc != 0) {
1112 rc = -ETXTBSY;
1113 goto undo_setattr;
1114 }
6d22f098 1115
3270958b
SF
1116 /* try to set DELETE_ON_CLOSE */
1117 if (!cifsInode->delete_pending) {
1118 rc = CIFSSMBSetFileDisposition(xid, tcon, true, netfid,
1119 current->tgid);
1120 /*
1121 * some samba versions return -ENOENT when we try to set the
1122 * file disposition here. Likely a samba bug, but work around
1123 * it for now. This means that some cifsXXX files may hang
1124 * around after they shouldn't.
1125 *
1126 * BB: remove this hack after more servers have the fix
1127 */
1128 if (rc == -ENOENT)
1129 rc = 0;
1130 else if (rc != 0) {
1131 rc = -ETXTBSY;
1132 goto undo_rename;
1133 }
1134 cifsInode->delete_pending = true;
1135 }
7ce86d5a 1136
a12a1ac7
JL
1137out_close:
1138 CIFSSMBClose(xid, tcon, netfid);
1139out:
3270958b 1140 kfree(info_buf);
7ffec372 1141 cifs_put_tlink(tlink);
a12a1ac7 1142 return rc;
3270958b
SF
1143
1144 /*
1145 * reset everything back to the original state. Don't bother
1146 * dealing with errors here since we can't do anything about
1147 * them anyway.
1148 */
1149undo_rename:
1150 CIFSSMBRenameOpenFile(xid, tcon, netfid, dentry->d_name.name,
1151 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1152 CIFS_MOUNT_MAP_SPECIAL_CHR);
1153undo_setattr:
1154 if (dosattr != origattr) {
1155 info_buf->Attributes = cpu_to_le32(origattr);
1156 if (!CIFSSMBSetFileInfo(xid, tcon, info_buf, netfid,
1157 current->tgid))
1158 cifsInode->cifsAttrs = origattr;
1159 }
1160
1161 goto out_close;
a12a1ac7
JL
1162}
1163
ff694527
SF
1164
1165/*
1166 * If dentry->d_inode is null (usually meaning the cached dentry
1167 * is a negative dentry) then we would attempt a standard SMB delete, but
af901ca1
AGR
1168 * if that fails we can not attempt the fall back mechanisms on EACCESS
1169 * but will return the EACCESS to the caller. Note that the VFS does not call
ff694527
SF
1170 * unlink on negative dentries currently.
1171 */
5f0319a7 1172int cifs_unlink(struct inode *dir, struct dentry *dentry)
1da177e4
LT
1173{
1174 int rc = 0;
1175 int xid;
1da177e4 1176 char *full_path = NULL;
5f0319a7 1177 struct inode *inode = dentry->d_inode;
ff694527 1178 struct cifsInodeInfo *cifs_inode;
5f0319a7
JL
1179 struct super_block *sb = dir->i_sb;
1180 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
7ffec372
JL
1181 struct tcon_link *tlink;
1182 struct cifsTconInfo *tcon;
6050247d
SF
1183 struct iattr *attrs = NULL;
1184 __u32 dosattr = 0, origattr = 0;
1da177e4 1185
b6b38f70 1186 cFYI(1, "cifs_unlink, dir=0x%p, dentry=0x%p", dir, dentry);
1da177e4 1187
7ffec372
JL
1188 tlink = cifs_sb_tlink(cifs_sb);
1189 if (IS_ERR(tlink))
1190 return PTR_ERR(tlink);
1191 tcon = tlink_tcon(tlink);
1192
1da177e4
LT
1193 xid = GetXid();
1194
5f0319a7
JL
1195 /* Unlink can be called from rename so we can not take the
1196 * sb->s_vfs_rename_mutex here */
1197 full_path = build_path_from_dentry(dentry);
1da177e4 1198 if (full_path == NULL) {
0f3bc09e 1199 rc = -ENOMEM;
7ffec372 1200 goto unlink_out;
1da177e4 1201 }
2d785a50 1202
5f0319a7 1203 if ((tcon->ses->capabilities & CAP_UNIX) &&
2d785a50 1204 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
5f0319a7
JL
1205 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
1206 rc = CIFSPOSIXDelFile(xid, tcon, full_path,
2d785a50 1207 SMB_POSIX_UNLINK_FILE_TARGET, cifs_sb->local_nls,
737b758c 1208 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1209 cFYI(1, "posix del rc %d", rc);
2d785a50
SF
1210 if ((rc == 0) || (rc == -ENOENT))
1211 goto psx_del_no_retry;
1212 }
1da177e4 1213
6050247d 1214retry_std_delete:
5f0319a7 1215 rc = CIFSSMBDelFile(xid, tcon, full_path, cifs_sb->local_nls,
2d785a50 1216 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
6050247d 1217
2d785a50 1218psx_del_no_retry:
1da177e4 1219 if (!rc) {
5f0319a7
JL
1220 if (inode)
1221 drop_nlink(inode);
1da177e4 1222 } else if (rc == -ENOENT) {
5f0319a7 1223 d_drop(dentry);
1da177e4 1224 } else if (rc == -ETXTBSY) {
3270958b 1225 rc = cifs_rename_pending_delete(full_path, dentry, xid);
a12a1ac7
JL
1226 if (rc == 0)
1227 drop_nlink(inode);
ff694527 1228 } else if ((rc == -EACCES) && (dosattr == 0) && inode) {
388e57b2
SF
1229 attrs = kzalloc(sizeof(*attrs), GFP_KERNEL);
1230 if (attrs == NULL) {
1231 rc = -ENOMEM;
1232 goto out_reval;
1da177e4 1233 }
388e57b2
SF
1234
1235 /* try to reset dos attributes */
ff694527
SF
1236 cifs_inode = CIFS_I(inode);
1237 origattr = cifs_inode->cifsAttrs;
6050247d
SF
1238 if (origattr == 0)
1239 origattr |= ATTR_NORMAL;
1240 dosattr = origattr & ~ATTR_READONLY;
388e57b2
SF
1241 if (dosattr == 0)
1242 dosattr |= ATTR_NORMAL;
1243 dosattr |= ATTR_HIDDEN;
1244
1245 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
388e57b2
SF
1246 if (rc != 0)
1247 goto out_reval;
6050247d
SF
1248
1249 goto retry_std_delete;
1da177e4 1250 }
6050247d
SF
1251
1252 /* undo the setattr if we errored out and it's needed */
1253 if (rc != 0 && dosattr != 0)
1254 cifs_set_file_info(inode, attrs, xid, full_path, origattr);
1255
388e57b2 1256out_reval:
4523cc30 1257 if (inode) {
ff694527
SF
1258 cifs_inode = CIFS_I(inode);
1259 cifs_inode->time = 0; /* will force revalidate to get info
5f0319a7
JL
1260 when needed */
1261 inode->i_ctime = current_fs_time(sb);
06bcfedd 1262 }
5f0319a7 1263 dir->i_ctime = dir->i_mtime = current_fs_time(sb);
ff694527 1264 cifs_inode = CIFS_I(dir);
6050247d 1265 CIFS_I(dir)->time = 0; /* force revalidate of dir as well */
7ffec372 1266unlink_out:
1da177e4 1267 kfree(full_path);
6050247d 1268 kfree(attrs);
1da177e4 1269 FreeXid(xid);
7ffec372 1270 cifs_put_tlink(tlink);
1da177e4
LT
1271 return rc;
1272}
1273
1274int cifs_mkdir(struct inode *inode, struct dentry *direntry, int mode)
1275{
6b37faa1 1276 int rc = 0, tmprc;
1da177e4
LT
1277 int xid;
1278 struct cifs_sb_info *cifs_sb;
7ffec372 1279 struct tcon_link *tlink;
1da177e4
LT
1280 struct cifsTconInfo *pTcon;
1281 char *full_path = NULL;
1282 struct inode *newinode = NULL;
cc0bad75 1283 struct cifs_fattr fattr;
1da177e4 1284
b6b38f70 1285 cFYI(1, "In cifs_mkdir, mode = 0x%x inode = 0x%p", mode, inode);
1da177e4 1286
1da177e4 1287 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
1288 tlink = cifs_sb_tlink(cifs_sb);
1289 if (IS_ERR(tlink))
1290 return PTR_ERR(tlink);
1291 pTcon = tlink_tcon(tlink);
1292
1293 xid = GetXid();
1da177e4 1294
7f57356b 1295 full_path = build_path_from_dentry(direntry);
1da177e4 1296 if (full_path == NULL) {
0f3bc09e 1297 rc = -ENOMEM;
7ffec372 1298 goto mkdir_out;
1da177e4 1299 }
50c2f753 1300
fb8c4b14
SF
1301 if ((pTcon->ses->capabilities & CAP_UNIX) &&
1302 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
2dd29d31
SF
1303 le64_to_cpu(pTcon->fsUnixInfo.Capability))) {
1304 u32 oplock = 0;
f6d09982 1305 FILE_UNIX_BASIC_INFO *pInfo =
2dd29d31 1306 kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
fb8c4b14 1307 if (pInfo == NULL) {
2dd29d31
SF
1308 rc = -ENOMEM;
1309 goto mkdir_out;
1310 }
50c2f753 1311
ce3b0f8d 1312 mode &= ~current_umask();
2dd29d31
SF
1313 rc = CIFSPOSIXCreate(xid, pTcon, SMB_O_DIRECTORY | SMB_O_CREAT,
1314 mode, NULL /* netfid */, pInfo, &oplock,
fb8c4b14
SF
1315 full_path, cifs_sb->local_nls,
1316 cifs_sb->mnt_cifs_flags &
2dd29d31 1317 CIFS_MOUNT_MAP_SPECIAL_CHR);
c45d707f
SF
1318 if (rc == -EOPNOTSUPP) {
1319 kfree(pInfo);
1320 goto mkdir_retry_old;
1321 } else if (rc) {
b6b38f70 1322 cFYI(1, "posix mkdir returned 0x%x", rc);
2dd29d31
SF
1323 d_drop(direntry);
1324 } else {
8f2376ad
CG
1325 if (pInfo->Type == cpu_to_le32(-1)) {
1326 /* no return info, go query for it */
5a07cdf8 1327 kfree(pInfo);
fb8c4b14 1328 goto mkdir_get_info;
5a07cdf8 1329 }
fb8c4b14
SF
1330/*BB check (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID ) to see if need
1331 to set uid/gid */
2dd29d31 1332 inc_nlink(inode);
cbac3cba 1333
cc0bad75 1334 cifs_unix_basic_to_fattr(&fattr, pInfo, cifs_sb);
4065c802 1335 cifs_fill_uniqueid(inode->i_sb, &fattr);
cc0bad75
JL
1336 newinode = cifs_iget(inode->i_sb, &fattr);
1337 if (!newinode) {
5a07cdf8 1338 kfree(pInfo);
cbac3cba 1339 goto mkdir_get_info;
5a07cdf8 1340 }
6b37faa1 1341
2dd29d31 1342 d_instantiate(direntry, newinode);
cbac3cba 1343
cbac3cba 1344#ifdef CONFIG_CIFS_DEBUG2
b6b38f70
JP
1345 cFYI(1, "instantiated dentry %p %s to inode %p",
1346 direntry, direntry->d_name.name, newinode);
cbac3cba 1347
fb8c4b14 1348 if (newinode->i_nlink != 2)
b6b38f70
JP
1349 cFYI(1, "unexpected number of links %d",
1350 newinode->i_nlink);
cbac3cba 1351#endif
2dd29d31
SF
1352 }
1353 kfree(pInfo);
1354 goto mkdir_out;
fb8c4b14 1355 }
c45d707f 1356mkdir_retry_old:
1da177e4 1357 /* BB add setting the equivalent of mode via CreateX w/ACLs */
737b758c
SF
1358 rc = CIFSSMBMkDir(xid, pTcon, full_path, cifs_sb->local_nls,
1359 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4 1360 if (rc) {
b6b38f70 1361 cFYI(1, "cifs_mkdir returned 0x%x", rc);
1da177e4
LT
1362 d_drop(direntry);
1363 } else {
fb8c4b14 1364mkdir_get_info:
d8c76e6f 1365 inc_nlink(inode);
c18c842b 1366 if (pTcon->unix_ext)
1da177e4 1367 rc = cifs_get_inode_info_unix(&newinode, full_path,
fb8c4b14 1368 inode->i_sb, xid);
1da177e4
LT
1369 else
1370 rc = cifs_get_inode_info(&newinode, full_path, NULL,
8b1327f6 1371 inode->i_sb, xid, NULL);
1da177e4 1372
1da177e4 1373 d_instantiate(direntry, newinode);
2dd29d31 1374 /* setting nlink not necessary except in cases where we
fb8c4b14 1375 * failed to get it from the server or was set bogus */
2dd29d31 1376 if ((direntry->d_inode) && (direntry->d_inode->i_nlink < 2))
fb8c4b14 1377 direntry->d_inode->i_nlink = 2;
95089910 1378
ce3b0f8d 1379 mode &= ~current_umask();
95089910
JL
1380 /* must turn on setgid bit if parent dir has it */
1381 if (inode->i_mode & S_ISGID)
1382 mode |= S_ISGID;
1383
c18c842b 1384 if (pTcon->unix_ext) {
4e1e7fb9
JL
1385 struct cifs_unix_set_info_args args = {
1386 .mode = mode,
1387 .ctime = NO_CHANGE_64,
1388 .atime = NO_CHANGE_64,
1389 .mtime = NO_CHANGE_64,
1390 .device = 0,
1391 };
d0d2f2df 1392 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
a001e5b5 1393 args.uid = (__u64)current_fsuid();
95089910
JL
1394 if (inode->i_mode & S_ISGID)
1395 args.gid = (__u64)inode->i_gid;
1396 else
a001e5b5 1397 args.gid = (__u64)current_fsgid();
1da177e4 1398 } else {
4e1e7fb9
JL
1399 args.uid = NO_CHANGE_64;
1400 args.gid = NO_CHANGE_64;
1da177e4 1401 }
01ea95e3
JL
1402 CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, &args,
1403 cifs_sb->local_nls,
1404 cifs_sb->mnt_cifs_flags &
1405 CIFS_MOUNT_MAP_SPECIAL_CHR);
3ce53fc4 1406 } else {
67750fb9
JL
1407 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) &&
1408 (mode & S_IWUGO) == 0) {
1409 FILE_BASIC_INFO pInfo;
6b37faa1
JL
1410 struct cifsInodeInfo *cifsInode;
1411 u32 dosattrs;
1412
67750fb9 1413 memset(&pInfo, 0, sizeof(pInfo));
6b37faa1
JL
1414 cifsInode = CIFS_I(newinode);
1415 dosattrs = cifsInode->cifsAttrs|ATTR_READONLY;
1416 pInfo.Attributes = cpu_to_le32(dosattrs);
1417 tmprc = CIFSSMBSetPathInfo(xid, pTcon,
1418 full_path, &pInfo,
1419 cifs_sb->local_nls,
67750fb9
JL
1420 cifs_sb->mnt_cifs_flags &
1421 CIFS_MOUNT_MAP_SPECIAL_CHR);
6b37faa1
JL
1422 if (tmprc == 0)
1423 cifsInode->cifsAttrs = dosattrs;
67750fb9 1424 }
fb8c4b14 1425 if (direntry->d_inode) {
b0fd30d3
JL
1426 if (cifs_sb->mnt_cifs_flags &
1427 CIFS_MOUNT_DYNPERM)
1428 direntry->d_inode->i_mode =
1429 (mode | S_IFDIR);
4e94a105 1430
fb8c4b14 1431 if (cifs_sb->mnt_cifs_flags &
6473a559 1432 CIFS_MOUNT_SET_UID) {
fb8c4b14 1433 direntry->d_inode->i_uid =
a001e5b5 1434 current_fsuid();
95089910
JL
1435 if (inode->i_mode & S_ISGID)
1436 direntry->d_inode->i_gid =
1437 inode->i_gid;
1438 else
1439 direntry->d_inode->i_gid =
a001e5b5 1440 current_fsgid();
6473a559
SF
1441 }
1442 }
2a138ebb 1443 }
1da177e4 1444 }
fb8c4b14 1445mkdir_out:
1da177e4
LT
1446 kfree(full_path);
1447 FreeXid(xid);
7ffec372 1448 cifs_put_tlink(tlink);
1da177e4
LT
1449 return rc;
1450}
1451
1452int cifs_rmdir(struct inode *inode, struct dentry *direntry)
1453{
1454 int rc = 0;
1455 int xid;
1456 struct cifs_sb_info *cifs_sb;
7ffec372 1457 struct tcon_link *tlink;
1da177e4
LT
1458 struct cifsTconInfo *pTcon;
1459 char *full_path = NULL;
1460 struct cifsInodeInfo *cifsInode;
1461
b6b38f70 1462 cFYI(1, "cifs_rmdir, inode = 0x%p", inode);
1da177e4
LT
1463
1464 xid = GetXid();
1465
7f57356b 1466 full_path = build_path_from_dentry(direntry);
1da177e4 1467 if (full_path == NULL) {
0f3bc09e 1468 rc = -ENOMEM;
7ffec372 1469 goto rmdir_exit;
1da177e4
LT
1470 }
1471
7ffec372
JL
1472 cifs_sb = CIFS_SB(inode->i_sb);
1473 tlink = cifs_sb_tlink(cifs_sb);
1474 if (IS_ERR(tlink)) {
1475 rc = PTR_ERR(tlink);
1476 goto rmdir_exit;
1477 }
1478 pTcon = tlink_tcon(tlink);
1479
737b758c
SF
1480 rc = CIFSSMBRmDir(xid, pTcon, full_path, cifs_sb->local_nls,
1481 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 1482 cifs_put_tlink(tlink);
1da177e4
LT
1483
1484 if (!rc) {
9a53c3a7 1485 drop_nlink(inode);
3677db10 1486 spin_lock(&direntry->d_inode->i_lock);
fb8c4b14 1487 i_size_write(direntry->d_inode, 0);
ce71ec36 1488 clear_nlink(direntry->d_inode);
3677db10 1489 spin_unlock(&direntry->d_inode->i_lock);
1da177e4
LT
1490 }
1491
1492 cifsInode = CIFS_I(direntry->d_inode);
1493 cifsInode->time = 0; /* force revalidate to go get info when
1494 needed */
42c24544
SF
1495
1496 cifsInode = CIFS_I(inode);
1497 cifsInode->time = 0; /* force revalidate to get parent dir info
1498 since cached search results now invalid */
1499
1da177e4
LT
1500 direntry->d_inode->i_ctime = inode->i_ctime = inode->i_mtime =
1501 current_fs_time(inode->i_sb);
1502
7ffec372 1503rmdir_exit:
1da177e4
LT
1504 kfree(full_path);
1505 FreeXid(xid);
1506 return rc;
1507}
1508
ee2fd967
SF
1509static int
1510cifs_do_rename(int xid, struct dentry *from_dentry, const char *fromPath,
1511 struct dentry *to_dentry, const char *toPath)
1512{
1513 struct cifs_sb_info *cifs_sb = CIFS_SB(from_dentry->d_sb);
7ffec372
JL
1514 struct tcon_link *tlink;
1515 struct cifsTconInfo *pTcon;
ee2fd967
SF
1516 __u16 srcfid;
1517 int oplock, rc;
1518
7ffec372
JL
1519 tlink = cifs_sb_tlink(cifs_sb);
1520 if (IS_ERR(tlink))
1521 return PTR_ERR(tlink);
1522 pTcon = tlink_tcon(tlink);
1523
ee2fd967
SF
1524 /* try path-based rename first */
1525 rc = CIFSSMBRename(xid, pTcon, fromPath, toPath, cifs_sb->local_nls,
1526 cifs_sb->mnt_cifs_flags &
1527 CIFS_MOUNT_MAP_SPECIAL_CHR);
1528
1529 /*
1530 * don't bother with rename by filehandle unless file is busy and
1531 * source Note that cross directory moves do not work with
1532 * rename by filehandle to various Windows servers.
1533 */
1534 if (rc == 0 || rc != -ETXTBSY)
7ffec372 1535 goto do_rename_exit;
ee2fd967 1536
ed0e3ace
JL
1537 /* open-file renames don't work across directories */
1538 if (to_dentry->d_parent != from_dentry->d_parent)
7ffec372 1539 goto do_rename_exit;
ed0e3ace 1540
ee2fd967
SF
1541 /* open the file to be renamed -- we need DELETE perms */
1542 rc = CIFSSMBOpen(xid, pTcon, fromPath, FILE_OPEN, DELETE,
1543 CREATE_NOT_DIR, &srcfid, &oplock, NULL,
1544 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1545 CIFS_MOUNT_MAP_SPECIAL_CHR);
1546
1547 if (rc == 0) {
1548 rc = CIFSSMBRenameOpenFile(xid, pTcon, srcfid,
1549 (const char *) to_dentry->d_name.name,
1550 cifs_sb->local_nls, cifs_sb->mnt_cifs_flags &
1551 CIFS_MOUNT_MAP_SPECIAL_CHR);
1552
1553 CIFSSMBClose(xid, pTcon, srcfid);
1554 }
7ffec372
JL
1555do_rename_exit:
1556 cifs_put_tlink(tlink);
ee2fd967
SF
1557 return rc;
1558}
1559
14121bdc
JL
1560int cifs_rename(struct inode *source_dir, struct dentry *source_dentry,
1561 struct inode *target_dir, struct dentry *target_dentry)
1da177e4 1562{
ee2fd967
SF
1563 char *fromName = NULL;
1564 char *toName = NULL;
639e7a91 1565 struct cifs_sb_info *cifs_sb;
7ffec372 1566 struct tcon_link *tlink;
14121bdc 1567 struct cifsTconInfo *tcon;
ee2fd967
SF
1568 FILE_UNIX_BASIC_INFO *info_buf_source = NULL;
1569 FILE_UNIX_BASIC_INFO *info_buf_target;
8d281efb 1570 int xid, rc, tmprc;
1da177e4 1571
639e7a91 1572 cifs_sb = CIFS_SB(source_dir->i_sb);
7ffec372
JL
1573 tlink = cifs_sb_tlink(cifs_sb);
1574 if (IS_ERR(tlink))
1575 return PTR_ERR(tlink);
1576 tcon = tlink_tcon(tlink);
1da177e4 1577
ee2fd967
SF
1578 xid = GetXid();
1579
ee2fd967
SF
1580 /*
1581 * we already have the rename sem so we do not need to
1582 * grab it again here to protect the path integrity
1583 */
14121bdc 1584 fromName = build_path_from_dentry(source_dentry);
ee2fd967
SF
1585 if (fromName == NULL) {
1586 rc = -ENOMEM;
1587 goto cifs_rename_exit;
1588 }
1589
14121bdc 1590 toName = build_path_from_dentry(target_dentry);
ee2fd967 1591 if (toName == NULL) {
1da177e4
LT
1592 rc = -ENOMEM;
1593 goto cifs_rename_exit;
1594 }
1595
14121bdc
JL
1596 rc = cifs_do_rename(xid, source_dentry, fromName,
1597 target_dentry, toName);
ee2fd967 1598
14121bdc
JL
1599 if (rc == -EEXIST && tcon->unix_ext) {
1600 /*
1601 * Are src and dst hardlinks of same inode? We can
1602 * only tell with unix extensions enabled
1603 */
1604 info_buf_source =
1605 kmalloc(2 * sizeof(FILE_UNIX_BASIC_INFO),
1606 GFP_KERNEL);
1607 if (info_buf_source == NULL) {
1608 rc = -ENOMEM;
1609 goto cifs_rename_exit;
1610 }
1611
1612 info_buf_target = info_buf_source + 1;
8d281efb 1613 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, fromName,
14121bdc 1614 info_buf_source,
639e7a91
JL
1615 cifs_sb->local_nls,
1616 cifs_sb->mnt_cifs_flags &
14121bdc 1617 CIFS_MOUNT_MAP_SPECIAL_CHR);
8d281efb 1618 if (tmprc != 0)
14121bdc 1619 goto unlink_target;
ee2fd967 1620
639e7a91
JL
1621 tmprc = CIFSSMBUnixQPathInfo(xid, tcon, toName,
1622 info_buf_target,
1623 cifs_sb->local_nls,
1624 cifs_sb->mnt_cifs_flags &
14121bdc
JL
1625 CIFS_MOUNT_MAP_SPECIAL_CHR);
1626
8d281efb 1627 if (tmprc == 0 && (info_buf_source->UniqueId ==
ae6884a9 1628 info_buf_target->UniqueId)) {
14121bdc 1629 /* same file, POSIX says that this is a noop */
ae6884a9 1630 rc = 0;
14121bdc 1631 goto cifs_rename_exit;
ae6884a9 1632 }
14121bdc 1633 } /* else ... BB we could add the same check for Windows by
ee2fd967 1634 checking the UniqueId via FILE_INTERNAL_INFO */
14121bdc 1635
ee2fd967 1636unlink_target:
fc6f3943
JL
1637 /* Try unlinking the target dentry if it's not negative */
1638 if (target_dentry->d_inode && (rc == -EACCES || rc == -EEXIST)) {
8d281efb 1639 tmprc = cifs_unlink(target_dir, target_dentry);
14121bdc
JL
1640 if (tmprc)
1641 goto cifs_rename_exit;
1642
14121bdc
JL
1643 rc = cifs_do_rename(xid, source_dentry, fromName,
1644 target_dentry, toName);
1da177e4
LT
1645 }
1646
1647cifs_rename_exit:
ee2fd967 1648 kfree(info_buf_source);
1da177e4
LT
1649 kfree(fromName);
1650 kfree(toName);
1651 FreeXid(xid);
7ffec372 1652 cifs_put_tlink(tlink);
1da177e4
LT
1653 return rc;
1654}
1655
df2cf170
JL
1656static bool
1657cifs_inode_needs_reval(struct inode *inode)
1da177e4 1658{
df2cf170 1659 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
6d20e840 1660 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 1661
df2cf170
JL
1662 if (cifs_i->clientCanCacheRead)
1663 return false;
1da177e4 1664
df2cf170
JL
1665 if (!lookupCacheEnabled)
1666 return true;
1da177e4 1667
df2cf170
JL
1668 if (cifs_i->time == 0)
1669 return true;
1da177e4 1670
6d20e840
SJ
1671 if (!time_in_range(jiffies, cifs_i->time,
1672 cifs_i->time + cifs_sb->actimeo))
df2cf170
JL
1673 return true;
1674
db19272e 1675 /* hardlinked files w/ noserverino get "special" treatment */
6d20e840 1676 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SERVER_INUM) &&
db19272e
JL
1677 S_ISREG(inode->i_mode) && inode->i_nlink != 1)
1678 return true;
1679
df2cf170
JL
1680 return false;
1681}
1682
523fb8c8
SJ
1683/*
1684 * Zap the cache. Called when invalid_mapping flag is set.
1685 */
6feb9891 1686int
df2cf170
JL
1687cifs_invalidate_mapping(struct inode *inode)
1688{
6feb9891 1689 int rc = 0;
df2cf170
JL
1690 struct cifsInodeInfo *cifs_i = CIFS_I(inode);
1691
1692 cifs_i->invalid_mapping = false;
1693
df2cf170 1694 if (inode->i_mapping && inode->i_mapping->nrpages != 0) {
257fb1f1
PS
1695 rc = invalidate_inode_pages2(inode->i_mapping);
1696 if (rc) {
1697 cERROR(1, "%s: could not invalidate inode %p", __func__,
1698 inode);
1699 cifs_i->invalid_mapping = true;
1700 }
df2cf170 1701 }
257fb1f1 1702
9451a9a5 1703 cifs_fscache_reset_inode_cookie(inode);
6feb9891 1704 return rc;
df2cf170
JL
1705}
1706
6feb9891 1707int cifs_revalidate_file_attr(struct file *filp)
abab095d
JL
1708{
1709 int rc = 0;
1710 struct inode *inode = filp->f_path.dentry->d_inode;
ba00ba64 1711 struct cifsFileInfo *cfile = (struct cifsFileInfo *) filp->private_data;
abab095d
JL
1712
1713 if (!cifs_inode_needs_reval(inode))
6feb9891 1714 return rc;
abab095d 1715
13cfb733 1716 if (tlink_tcon(cfile->tlink)->unix_ext)
abab095d
JL
1717 rc = cifs_get_file_info_unix(filp);
1718 else
1719 rc = cifs_get_file_info(filp);
1720
abab095d
JL
1721 return rc;
1722}
1723
6feb9891 1724int cifs_revalidate_dentry_attr(struct dentry *dentry)
df2cf170
JL
1725{
1726 int xid;
1727 int rc = 0;
df2cf170
JL
1728 struct inode *inode = dentry->d_inode;
1729 struct super_block *sb = dentry->d_sb;
6feb9891 1730 char *full_path = NULL;
df2cf170
JL
1731
1732 if (inode == NULL)
1733 return -ENOENT;
1da177e4 1734
df2cf170 1735 if (!cifs_inode_needs_reval(inode))
6feb9891
PS
1736 return rc;
1737
1738 xid = GetXid();
1da177e4
LT
1739
1740 /* can not safely grab the rename sem here if rename calls revalidate
1741 since that would deadlock */
df2cf170 1742 full_path = build_path_from_dentry(dentry);
1da177e4 1743 if (full_path == NULL) {
0f3bc09e 1744 rc = -ENOMEM;
6feb9891 1745 goto out;
1da177e4
LT
1746 }
1747
6feb9891
PS
1748 cFYI(1, "Update attributes: %s inode 0x%p count %d dentry: 0x%p d_time "
1749 "%ld jiffies %ld", full_path, inode, inode->i_count.counter,
f19159dc 1750 dentry, dentry->d_time, jiffies);
1da177e4 1751
0d424ad0 1752 if (cifs_sb_master_tcon(CIFS_SB(sb))->unix_ext)
df2cf170
JL
1753 rc = cifs_get_inode_info_unix(&inode, full_path, sb, xid);
1754 else
1755 rc = cifs_get_inode_info(&inode, full_path, NULL, sb,
1756 xid, NULL);
1da177e4 1757
6feb9891 1758out:
1da177e4
LT
1759 kfree(full_path);
1760 FreeXid(xid);
1761 return rc;
1762}
1763
6feb9891
PS
1764int cifs_revalidate_file(struct file *filp)
1765{
1766 int rc;
1767 struct inode *inode = filp->f_path.dentry->d_inode;
1768
1769 rc = cifs_revalidate_file_attr(filp);
1770 if (rc)
1771 return rc;
1772
1773 if (CIFS_I(inode)->invalid_mapping)
1774 rc = cifs_invalidate_mapping(inode);
1775 return rc;
1776}
1777
1778/* revalidate a dentry's inode attributes */
1779int cifs_revalidate_dentry(struct dentry *dentry)
1780{
1781 int rc;
1782 struct inode *inode = dentry->d_inode;
1783
1784 rc = cifs_revalidate_dentry_attr(dentry);
1785 if (rc)
1786 return rc;
1787
1788 if (CIFS_I(inode)->invalid_mapping)
1789 rc = cifs_invalidate_mapping(inode);
1790 return rc;
1791}
1792
1da177e4 1793int cifs_getattr(struct vfsmount *mnt, struct dentry *dentry,
1c456013 1794 struct kstat *stat)
1da177e4 1795{
3aa1c8c2
JL
1796 struct cifs_sb_info *cifs_sb = CIFS_SB(dentry->d_sb);
1797 struct cifsTconInfo *tcon = cifs_sb_master_tcon(cifs_sb);
6feb9891
PS
1798 struct inode *inode = dentry->d_inode;
1799 int rc;
3aa1c8c2 1800
6feb9891
PS
1801 /*
1802 * We need to be sure that all dirty pages are written and the server
1803 * has actual ctime, mtime and file length.
1804 */
1805 if (!CIFS_I(inode)->clientCanCacheRead && inode->i_mapping &&
1806 inode->i_mapping->nrpages != 0) {
1807 rc = filemap_fdatawait(inode->i_mapping);
156ecb2d
SF
1808 if (rc) {
1809 mapping_set_error(inode->i_mapping, rc);
1810 return rc;
1811 }
6feb9891 1812 }
1c456013 1813
6feb9891
PS
1814 rc = cifs_revalidate_dentry_attr(dentry);
1815 if (rc)
1816 return rc;
1817
1818 generic_fillattr(inode, stat);
1819 stat->blksize = CIFS_MAX_MSGSIZE;
1820 stat->ino = CIFS_I(inode)->uniqueid;
1821
1822 /*
1823 * If on a multiuser mount without unix extensions, and the admin hasn't
1824 * overridden them, set the ownership to the fsuid/fsgid of the current
1825 * process.
1826 */
1827 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER) &&
1828 !tcon->unix_ext) {
1829 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_UID))
1830 stat->uid = current_fsuid();
1831 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_OVERR_GID))
1832 stat->gid = current_fsgid();
5fe14c85 1833 }
6feb9891 1834 return rc;
1da177e4
LT
1835}
1836
1837static int cifs_truncate_page(struct address_space *mapping, loff_t from)
1838{
1839 pgoff_t index = from >> PAGE_CACHE_SHIFT;
1840 unsigned offset = from & (PAGE_CACHE_SIZE - 1);
1841 struct page *page;
1da177e4
LT
1842 int rc = 0;
1843
1844 page = grab_cache_page(mapping, index);
1845 if (!page)
1846 return -ENOMEM;
1847
eebd2aa3 1848 zero_user_segment(page, offset, PAGE_CACHE_SIZE);
1da177e4
LT
1849 unlock_page(page);
1850 page_cache_release(page);
1851 return rc;
1852}
1853
1b947463 1854static void cifs_setsize(struct inode *inode, loff_t offset)
3677db10 1855{
c08d3b0e 1856 loff_t oldsize;
3677db10 1857
ba6a46a0 1858 spin_lock(&inode->i_lock);
c08d3b0e 1859 oldsize = inode->i_size;
3677db10 1860 i_size_write(inode, offset);
ba6a46a0 1861 spin_unlock(&inode->i_lock);
1b947463 1862
c08d3b0e 1863 truncate_pagecache(inode, oldsize, offset);
3677db10
SF
1864}
1865
8efdbde6
JL
1866static int
1867cifs_set_file_size(struct inode *inode, struct iattr *attrs,
1868 int xid, char *full_path)
1869{
1870 int rc;
1871 struct cifsFileInfo *open_file;
1872 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1873 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1874 struct tcon_link *tlink = NULL;
ba00ba64 1875 struct cifsTconInfo *pTcon = NULL;
fa2989f4 1876 struct cifs_io_parms io_parms;
8efdbde6
JL
1877
1878 /*
1879 * To avoid spurious oplock breaks from server, in the case of
1880 * inodes that we already have open, avoid doing path based
1881 * setting of file size if we can do it by handle.
1882 * This keeps our caching token (oplock) and avoids timeouts
1883 * when the local oplock break takes longer to flush
1884 * writebehind data than the SMB timeout for the SetPathInfo
1885 * request would allow
1886 */
6508d904 1887 open_file = find_writable_file(cifsInode, true);
8efdbde6
JL
1888 if (open_file) {
1889 __u16 nfid = open_file->netfid;
1890 __u32 npid = open_file->pid;
13cfb733 1891 pTcon = tlink_tcon(open_file->tlink);
8efdbde6
JL
1892 rc = CIFSSMBSetFileSize(xid, pTcon, attrs->ia_size, nfid,
1893 npid, false);
6ab409b5 1894 cifsFileInfo_put(open_file);
b6b38f70 1895 cFYI(1, "SetFSize for attrs rc = %d", rc);
8efdbde6
JL
1896 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1897 unsigned int bytes_written;
fa2989f4
PS
1898
1899 io_parms.netfid = nfid;
1900 io_parms.pid = npid;
1901 io_parms.tcon = pTcon;
1902 io_parms.offset = 0;
1903 io_parms.length = attrs->ia_size;
1904 rc = CIFSSMBWrite(xid, &io_parms, &bytes_written,
1905 NULL, NULL, 1);
b6b38f70 1906 cFYI(1, "Wrt seteof rc %d", rc);
8efdbde6
JL
1907 }
1908 } else
1909 rc = -EINVAL;
1910
1911 if (rc != 0) {
7ffec372
JL
1912 if (pTcon == NULL) {
1913 tlink = cifs_sb_tlink(cifs_sb);
1914 if (IS_ERR(tlink))
1915 return PTR_ERR(tlink);
1916 pTcon = tlink_tcon(tlink);
1917 }
ba00ba64 1918
8efdbde6
JL
1919 /* Set file size by pathname rather than by handle
1920 either because no valid, writeable file handle for
1921 it was found or because there was an error setting
1922 it by handle */
1923 rc = CIFSSMBSetEOF(xid, pTcon, full_path, attrs->ia_size,
1924 false, cifs_sb->local_nls,
1925 cifs_sb->mnt_cifs_flags &
1926 CIFS_MOUNT_MAP_SPECIAL_CHR);
b6b38f70 1927 cFYI(1, "SetEOF by path (setattrs) rc = %d", rc);
8efdbde6
JL
1928 if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
1929 __u16 netfid;
1930 int oplock = 0;
1931
1932 rc = SMBLegacyOpen(xid, pTcon, full_path,
1933 FILE_OPEN, GENERIC_WRITE,
1934 CREATE_NOT_DIR, &netfid, &oplock, NULL,
1935 cifs_sb->local_nls,
1936 cifs_sb->mnt_cifs_flags &
1937 CIFS_MOUNT_MAP_SPECIAL_CHR);
1938 if (rc == 0) {
1939 unsigned int bytes_written;
fa2989f4
PS
1940
1941 io_parms.netfid = netfid;
1942 io_parms.pid = current->tgid;
1943 io_parms.tcon = pTcon;
1944 io_parms.offset = 0;
1945 io_parms.length = attrs->ia_size;
1946 rc = CIFSSMBWrite(xid, &io_parms,
1947 &bytes_written,
1948 NULL, NULL, 1);
b6b38f70 1949 cFYI(1, "wrt seteof rc %d", rc);
8efdbde6
JL
1950 CIFSSMBClose(xid, pTcon, netfid);
1951 }
1952 }
7ffec372
JL
1953 if (tlink)
1954 cifs_put_tlink(tlink);
8efdbde6
JL
1955 }
1956
1957 if (rc == 0) {
fbec9ab9 1958 cifsInode->server_eof = attrs->ia_size;
1b947463 1959 cifs_setsize(inode, attrs->ia_size);
8efdbde6
JL
1960 cifs_truncate_page(inode->i_mapping, inode->i_size);
1961 }
1962
1963 return rc;
1964}
1965
3fe5c1dd
JL
1966static int
1967cifs_setattr_unix(struct dentry *direntry, struct iattr *attrs)
1968{
1969 int rc;
1970 int xid;
1971 char *full_path = NULL;
1972 struct inode *inode = direntry->d_inode;
1973 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1974 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
7ffec372 1975 struct tcon_link *tlink;
ba00ba64 1976 struct cifsTconInfo *pTcon;
3fe5c1dd 1977 struct cifs_unix_set_info_args *args = NULL;
3bbeeb3c 1978 struct cifsFileInfo *open_file;
3fe5c1dd 1979
b6b38f70
JP
1980 cFYI(1, "setattr_unix on file %s attrs->ia_valid=0x%x",
1981 direntry->d_name.name, attrs->ia_valid);
3fe5c1dd
JL
1982
1983 xid = GetXid();
1984
db78b877
CH
1985 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
1986 attrs->ia_valid |= ATTR_FORCE;
1987
1988 rc = inode_change_ok(inode, attrs);
1989 if (rc < 0)
1990 goto out;
3fe5c1dd
JL
1991
1992 full_path = build_path_from_dentry(direntry);
1993 if (full_path == NULL) {
1994 rc = -ENOMEM;
1995 goto out;
1996 }
1997
0f4d634c
JL
1998 /*
1999 * Attempt to flush data before changing attributes. We need to do
2000 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2001 * ownership or mode then we may also need to do this. Here, we take
2002 * the safe way out and just do the flush on all setattr requests. If
2003 * the flush returns error, store it to report later and continue.
2004 *
2005 * BB: This should be smarter. Why bother flushing pages that
2006 * will be truncated anyway? Also, should we error out here if
2007 * the flush returns error?
2008 */
2009 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2010 mapping_set_error(inode->i_mapping, rc);
2011 rc = 0;
3fe5c1dd
JL
2012
2013 if (attrs->ia_valid & ATTR_SIZE) {
2014 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2015 if (rc != 0)
2016 goto out;
2017 }
2018
2019 /* skip mode change if it's just for clearing setuid/setgid */
2020 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2021 attrs->ia_valid &= ~ATTR_MODE;
2022
2023 args = kmalloc(sizeof(*args), GFP_KERNEL);
2024 if (args == NULL) {
2025 rc = -ENOMEM;
2026 goto out;
2027 }
2028
2029 /* set up the struct */
2030 if (attrs->ia_valid & ATTR_MODE)
2031 args->mode = attrs->ia_mode;
2032 else
2033 args->mode = NO_CHANGE_64;
2034
2035 if (attrs->ia_valid & ATTR_UID)
2036 args->uid = attrs->ia_uid;
2037 else
2038 args->uid = NO_CHANGE_64;
2039
2040 if (attrs->ia_valid & ATTR_GID)
2041 args->gid = attrs->ia_gid;
2042 else
2043 args->gid = NO_CHANGE_64;
2044
2045 if (attrs->ia_valid & ATTR_ATIME)
2046 args->atime = cifs_UnixTimeToNT(attrs->ia_atime);
2047 else
2048 args->atime = NO_CHANGE_64;
2049
2050 if (attrs->ia_valid & ATTR_MTIME)
2051 args->mtime = cifs_UnixTimeToNT(attrs->ia_mtime);
2052 else
2053 args->mtime = NO_CHANGE_64;
2054
2055 if (attrs->ia_valid & ATTR_CTIME)
2056 args->ctime = cifs_UnixTimeToNT(attrs->ia_ctime);
2057 else
2058 args->ctime = NO_CHANGE_64;
2059
2060 args->device = 0;
6508d904 2061 open_file = find_writable_file(cifsInode, true);
3bbeeb3c
JL
2062 if (open_file) {
2063 u16 nfid = open_file->netfid;
2064 u32 npid = open_file->pid;
13cfb733 2065 pTcon = tlink_tcon(open_file->tlink);
3bbeeb3c 2066 rc = CIFSSMBUnixSetFileInfo(xid, pTcon, args, nfid, npid);
6ab409b5 2067 cifsFileInfo_put(open_file);
3bbeeb3c 2068 } else {
7ffec372
JL
2069 tlink = cifs_sb_tlink(cifs_sb);
2070 if (IS_ERR(tlink)) {
2071 rc = PTR_ERR(tlink);
2072 goto out;
2073 }
2074 pTcon = tlink_tcon(tlink);
3bbeeb3c 2075 rc = CIFSSMBUnixSetPathInfo(xid, pTcon, full_path, args,
01ea95e3
JL
2076 cifs_sb->local_nls,
2077 cifs_sb->mnt_cifs_flags &
2078 CIFS_MOUNT_MAP_SPECIAL_CHR);
7ffec372 2079 cifs_put_tlink(tlink);
3bbeeb3c 2080 }
3fe5c1dd 2081
1025774c
CH
2082 if (rc)
2083 goto out;
ccd4bb1b 2084
1025774c 2085 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2086 attrs->ia_size != i_size_read(inode))
2087 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2088
2089 setattr_copy(inode, attrs);
2090 mark_inode_dirty(inode);
2091
2092 /* force revalidate when any of these times are set since some
2093 of the fs types (eg ext3, fat) do not have fine enough
2094 time granularity to match protocol, and we do not have a
2095 a way (yet) to query the server fs's time granularity (and
2096 whether it rounds times down).
2097 */
2098 if (attrs->ia_valid & (ATTR_MTIME | ATTR_CTIME))
2099 cifsInode->time = 0;
3fe5c1dd
JL
2100out:
2101 kfree(args);
2102 kfree(full_path);
2103 FreeXid(xid);
2104 return rc;
2105}
2106
0510eeb7
JL
2107static int
2108cifs_setattr_nounix(struct dentry *direntry, struct iattr *attrs)
1da177e4
LT
2109{
2110 int xid;
3fe5c1dd
JL
2111 struct inode *inode = direntry->d_inode;
2112 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3fe5c1dd 2113 struct cifsInodeInfo *cifsInode = CIFS_I(inode);
1da177e4
LT
2114 char *full_path = NULL;
2115 int rc = -EACCES;
feb3e20c 2116 __u32 dosattr = 0;
4e1e7fb9 2117 __u64 mode = NO_CHANGE_64;
3fe5c1dd 2118
1da177e4
LT
2119 xid = GetXid();
2120
b6b38f70
JP
2121 cFYI(1, "setattr on file %s attrs->iavalid 0x%x",
2122 direntry->d_name.name, attrs->ia_valid);
6473a559 2123
db78b877
CH
2124 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM)
2125 attrs->ia_valid |= ATTR_FORCE;
2126
2127 rc = inode_change_ok(inode, attrs);
2128 if (rc < 0) {
2129 FreeXid(xid);
2130 return rc;
6473a559 2131 }
50c2f753 2132
7f57356b 2133 full_path = build_path_from_dentry(direntry);
1da177e4 2134 if (full_path == NULL) {
0f3bc09e 2135 rc = -ENOMEM;
1da177e4 2136 FreeXid(xid);
0f3bc09e 2137 return rc;
1da177e4 2138 }
1da177e4 2139
0f4d634c
JL
2140 /*
2141 * Attempt to flush data before changing attributes. We need to do
2142 * this for ATTR_SIZE and ATTR_MTIME for sure, and if we change the
2143 * ownership or mode then we may also need to do this. Here, we take
2144 * the safe way out and just do the flush on all setattr requests. If
2145 * the flush returns error, store it to report later and continue.
2146 *
2147 * BB: This should be smarter. Why bother flushing pages that
2148 * will be truncated anyway? Also, should we error out here if
2149 * the flush returns error?
2150 */
2151 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b
JL
2152 mapping_set_error(inode->i_mapping, rc);
2153 rc = 0;
cea21805 2154
50531444 2155 if (attrs->ia_valid & ATTR_SIZE) {
8efdbde6
JL
2156 rc = cifs_set_file_size(inode, attrs, xid, full_path);
2157 if (rc != 0)
e30dcf3a 2158 goto cifs_setattr_exit;
1da177e4 2159 }
4ca691a8
JL
2160
2161 /*
2162 * Without unix extensions we can't send ownership changes to the
2163 * server, so silently ignore them. This is consistent with how
2164 * local DOS/Windows filesystems behave (VFAT, NTFS, etc). With
2165 * CIFSACL support + proper Windows to Unix idmapping, we may be
2166 * able to support this in the future.
2167 */
3fe5c1dd 2168 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID))
4ca691a8 2169 attrs->ia_valid &= ~(ATTR_UID | ATTR_GID);
1da177e4 2170
d32c4f26
JL
2171 /* skip mode change if it's just for clearing setuid/setgid */
2172 if (attrs->ia_valid & (ATTR_KILL_SUID|ATTR_KILL_SGID))
2173 attrs->ia_valid &= ~ATTR_MODE;
2174
1da177e4 2175 if (attrs->ia_valid & ATTR_MODE) {
b6b38f70 2176 cFYI(1, "Mode changed to 0%o", attrs->ia_mode);
1da177e4 2177 mode = attrs->ia_mode;
1da177e4
LT
2178 }
2179
3fe5c1dd 2180 if (attrs->ia_valid & ATTR_MODE) {
cdbce9c8 2181 rc = 0;
79df1bae 2182#ifdef CONFIG_CIFS_ACL
78415d2d
SP
2183 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_CIFS_ACL) {
2184 rc = mode_to_cifs_acl(inode, full_path, mode);
2185 if (rc) {
2186 cFYI(1, "%s: Setting ACL failed with error: %d",
2187 __func__, rc);
2188 goto cifs_setattr_exit;
2189 }
2190 } else
79df1bae 2191#endif /* CONFIG_CIFS_ACL */
5132861a
JL
2192 if (((mode & S_IWUGO) == 0) &&
2193 (cifsInode->cifsAttrs & ATTR_READONLY) == 0) {
feb3e20c
JL
2194
2195 dosattr = cifsInode->cifsAttrs | ATTR_READONLY;
2196
5132861a
JL
2197 /* fix up mode if we're not using dynperm */
2198 if ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM) == 0)
2199 attrs->ia_mode = inode->i_mode & ~S_IWUGO;
2200 } else if ((mode & S_IWUGO) &&
2201 (cifsInode->cifsAttrs & ATTR_READONLY)) {
feb3e20c
JL
2202
2203 dosattr = cifsInode->cifsAttrs & ~ATTR_READONLY;
2204 /* Attributes of 0 are ignored */
2205 if (dosattr == 0)
2206 dosattr |= ATTR_NORMAL;
5132861a
JL
2207
2208 /* reset local inode permissions to normal */
2209 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2210 attrs->ia_mode &= ~(S_IALLUGO);
2211 if (S_ISDIR(inode->i_mode))
2212 attrs->ia_mode |=
2213 cifs_sb->mnt_dir_mode;
2214 else
2215 attrs->ia_mode |=
2216 cifs_sb->mnt_file_mode;
2217 }
2218 } else if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DYNPERM)) {
2219 /* ignore mode change - ATTR_READONLY hasn't changed */
2220 attrs->ia_valid &= ~ATTR_MODE;
1da177e4 2221 }
1da177e4
LT
2222 }
2223
feb3e20c
JL
2224 if (attrs->ia_valid & (ATTR_MTIME|ATTR_ATIME|ATTR_CTIME) ||
2225 ((attrs->ia_valid & ATTR_MODE) && dosattr)) {
2226 rc = cifs_set_file_info(inode, attrs, xid, full_path, dosattr);
2227 /* BB: check for rc = -EOPNOTSUPP and switch to legacy mode */
1da177e4 2228
e30dcf3a
SF
2229 /* Even if error on time set, no sense failing the call if
2230 the server would set the time to a reasonable value anyway,
2231 and this check ensures that we are not being called from
2232 sys_utimes in which case we ought to fail the call back to
2233 the user when the server rejects the call */
fb8c4b14 2234 if ((rc) && (attrs->ia_valid &
feb3e20c 2235 (ATTR_MODE | ATTR_GID | ATTR_UID | ATTR_SIZE)))
e30dcf3a 2236 rc = 0;
1da177e4
LT
2237 }
2238
2239 /* do not need local check to inode_check_ok since the server does
2240 that */
1025774c
CH
2241 if (rc)
2242 goto cifs_setattr_exit;
2243
2244 if ((attrs->ia_valid & ATTR_SIZE) &&
1b947463
CH
2245 attrs->ia_size != i_size_read(inode))
2246 truncate_setsize(inode, attrs->ia_size);
1025774c
CH
2247
2248 setattr_copy(inode, attrs);
2249 mark_inode_dirty(inode);
1025774c 2250
e30dcf3a 2251cifs_setattr_exit:
1da177e4
LT
2252 kfree(full_path);
2253 FreeXid(xid);
2254 return rc;
2255}
2256
0510eeb7
JL
2257int
2258cifs_setattr(struct dentry *direntry, struct iattr *attrs)
2259{
2260 struct inode *inode = direntry->d_inode;
2261 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
0d424ad0 2262 struct cifsTconInfo *pTcon = cifs_sb_master_tcon(cifs_sb);
0510eeb7
JL
2263
2264 if (pTcon->unix_ext)
2265 return cifs_setattr_unix(direntry, attrs);
2266
2267 return cifs_setattr_nounix(direntry, attrs);
2268
2269 /* BB: add cifs_setattr_legacy for really old servers */
2270}
2271
99ee4dbd 2272#if 0
1da177e4
LT
2273void cifs_delete_inode(struct inode *inode)
2274{
b6b38f70 2275 cFYI(1, "In cifs_delete_inode, inode = 0x%p", inode);
1da177e4
LT
2276 /* may have to add back in if and when safe distributed caching of
2277 directories added e.g. via FindNotify */
2278}
99ee4dbd 2279#endif