]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/cifs/file.c
UBUNTU: [Config] arm64: snapdragon: SND*=m
[mirror_ubuntu-bionic-kernel.git] / fs / cifs / file.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/file.c
3 *
4 * vfs operations that deal with files
fb8c4b14 5 *
f19159dc 6 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4 7 * Author(s): Steve French (sfrench@us.ibm.com)
7ee1af76 8 * Jeremy Allison (jra@samba.org)
1da177e4
LT
9 *
10 * This library is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU Lesser General Public License as published
12 * by the Free Software Foundation; either version 2.1 of the License, or
13 * (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
18 * the GNU Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public License
21 * along with this library; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 */
24#include <linux/fs.h>
37c0eb46 25#include <linux/backing-dev.h>
1da177e4
LT
26#include <linux/stat.h>
27#include <linux/fcntl.h>
28#include <linux/pagemap.h>
29#include <linux/pagevec.h>
37c0eb46 30#include <linux/writeback.h>
6f88cc2e 31#include <linux/task_io_accounting_ops.h>
23e7dd7d 32#include <linux/delay.h>
3bc303c2 33#include <linux/mount.h>
5a0e3ad6 34#include <linux/slab.h>
690c5e31 35#include <linux/swap.h>
1da177e4
LT
36#include <asm/div64.h>
37#include "cifsfs.h"
38#include "cifspdu.h"
39#include "cifsglob.h"
40#include "cifsproto.h"
41#include "cifs_unicode.h"
42#include "cifs_debug.h"
43#include "cifs_fs_sb.h"
9451a9a5 44#include "fscache.h"
1da177e4 45
07b92d0d 46
1da177e4
LT
47static inline int cifs_convert_flags(unsigned int flags)
48{
49 if ((flags & O_ACCMODE) == O_RDONLY)
50 return GENERIC_READ;
51 else if ((flags & O_ACCMODE) == O_WRONLY)
52 return GENERIC_WRITE;
53 else if ((flags & O_ACCMODE) == O_RDWR) {
54 /* GENERIC_ALL is too much permission to request
55 can cause unnecessary access denied on create */
56 /* return GENERIC_ALL; */
57 return (GENERIC_READ | GENERIC_WRITE);
58 }
59
e10f7b55
JL
60 return (READ_CONTROL | FILE_WRITE_ATTRIBUTES | FILE_READ_ATTRIBUTES |
61 FILE_WRITE_EA | FILE_APPEND_DATA | FILE_WRITE_DATA |
62 FILE_READ_DATA);
7fc8f4e9 63}
e10f7b55 64
608712fe 65static u32 cifs_posix_convert_flags(unsigned int flags)
7fc8f4e9 66{
608712fe 67 u32 posix_flags = 0;
e10f7b55 68
7fc8f4e9 69 if ((flags & O_ACCMODE) == O_RDONLY)
608712fe 70 posix_flags = SMB_O_RDONLY;
7fc8f4e9 71 else if ((flags & O_ACCMODE) == O_WRONLY)
608712fe
JL
72 posix_flags = SMB_O_WRONLY;
73 else if ((flags & O_ACCMODE) == O_RDWR)
74 posix_flags = SMB_O_RDWR;
75
07b92d0d 76 if (flags & O_CREAT) {
608712fe 77 posix_flags |= SMB_O_CREAT;
07b92d0d
SF
78 if (flags & O_EXCL)
79 posix_flags |= SMB_O_EXCL;
80 } else if (flags & O_EXCL)
f96637be
JP
81 cifs_dbg(FYI, "Application %s pid %d has incorrectly set O_EXCL flag but not O_CREAT on file open. Ignoring O_EXCL\n",
82 current->comm, current->tgid);
07b92d0d 83
608712fe
JL
84 if (flags & O_TRUNC)
85 posix_flags |= SMB_O_TRUNC;
86 /* be safe and imply O_SYNC for O_DSYNC */
6b2f3d1f 87 if (flags & O_DSYNC)
608712fe 88 posix_flags |= SMB_O_SYNC;
7fc8f4e9 89 if (flags & O_DIRECTORY)
608712fe 90 posix_flags |= SMB_O_DIRECTORY;
7fc8f4e9 91 if (flags & O_NOFOLLOW)
608712fe 92 posix_flags |= SMB_O_NOFOLLOW;
7fc8f4e9 93 if (flags & O_DIRECT)
608712fe 94 posix_flags |= SMB_O_DIRECT;
7fc8f4e9
SF
95
96 return posix_flags;
1da177e4
LT
97}
98
99static inline int cifs_get_disposition(unsigned int flags)
100{
101 if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
102 return FILE_CREATE;
103 else if ((flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
104 return FILE_OVERWRITE_IF;
105 else if ((flags & O_CREAT) == O_CREAT)
106 return FILE_OPEN_IF;
55aa2e09
SF
107 else if ((flags & O_TRUNC) == O_TRUNC)
108 return FILE_OVERWRITE;
1da177e4
LT
109 else
110 return FILE_OPEN;
111}
112
608712fe
JL
113int cifs_posix_open(char *full_path, struct inode **pinode,
114 struct super_block *sb, int mode, unsigned int f_flags,
6d5786a3 115 __u32 *poplock, __u16 *pnetfid, unsigned int xid)
608712fe
JL
116{
117 int rc;
118 FILE_UNIX_BASIC_INFO *presp_data;
119 __u32 posix_flags = 0;
120 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
121 struct cifs_fattr fattr;
122 struct tcon_link *tlink;
96daf2b0 123 struct cifs_tcon *tcon;
608712fe 124
f96637be 125 cifs_dbg(FYI, "posix open %s\n", full_path);
608712fe
JL
126
127 presp_data = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
128 if (presp_data == NULL)
129 return -ENOMEM;
130
131 tlink = cifs_sb_tlink(cifs_sb);
132 if (IS_ERR(tlink)) {
133 rc = PTR_ERR(tlink);
134 goto posix_open_ret;
135 }
136
137 tcon = tlink_tcon(tlink);
138 mode &= ~current_umask();
139
140 posix_flags = cifs_posix_convert_flags(f_flags);
141 rc = CIFSPOSIXCreate(xid, tcon, posix_flags, mode, pnetfid, presp_data,
142 poplock, full_path, cifs_sb->local_nls,
bc8ebdc4 143 cifs_remap(cifs_sb));
608712fe
JL
144 cifs_put_tlink(tlink);
145
146 if (rc)
147 goto posix_open_ret;
148
149 if (presp_data->Type == cpu_to_le32(-1))
150 goto posix_open_ret; /* open ok, caller does qpathinfo */
151
152 if (!pinode)
153 goto posix_open_ret; /* caller does not need info */
154
155 cifs_unix_basic_to_fattr(&fattr, presp_data, cifs_sb);
156
157 /* get new inode and set it up */
158 if (*pinode == NULL) {
159 cifs_fill_uniqueid(sb, &fattr);
160 *pinode = cifs_iget(sb, &fattr);
161 if (!*pinode) {
162 rc = -ENOMEM;
163 goto posix_open_ret;
164 }
165 } else {
166 cifs_fattr_to_inode(*pinode, &fattr);
167 }
168
169posix_open_ret:
170 kfree(presp_data);
171 return rc;
172}
173
eeb910a6
PS
174static int
175cifs_nt_open(char *full_path, struct inode *inode, struct cifs_sb_info *cifs_sb,
fb1214e4
PS
176 struct cifs_tcon *tcon, unsigned int f_flags, __u32 *oplock,
177 struct cifs_fid *fid, unsigned int xid)
eeb910a6
PS
178{
179 int rc;
fb1214e4 180 int desired_access;
eeb910a6 181 int disposition;
3d3ea8e6 182 int create_options = CREATE_NOT_DIR;
eeb910a6 183 FILE_ALL_INFO *buf;
b8c32dbb 184 struct TCP_Server_Info *server = tcon->ses->server;
226730b4 185 struct cifs_open_parms oparms;
eeb910a6 186
b8c32dbb 187 if (!server->ops->open)
fb1214e4
PS
188 return -ENOSYS;
189
190 desired_access = cifs_convert_flags(f_flags);
eeb910a6
PS
191
192/*********************************************************************
193 * open flag mapping table:
194 *
195 * POSIX Flag CIFS Disposition
196 * ---------- ----------------
197 * O_CREAT FILE_OPEN_IF
198 * O_CREAT | O_EXCL FILE_CREATE
199 * O_CREAT | O_TRUNC FILE_OVERWRITE_IF
200 * O_TRUNC FILE_OVERWRITE
201 * none of the above FILE_OPEN
202 *
203 * Note that there is not a direct match between disposition
204 * FILE_SUPERSEDE (ie create whether or not file exists although
205 * O_CREAT | O_TRUNC is similar but truncates the existing
206 * file rather than creating a new file as FILE_SUPERSEDE does
207 * (which uses the attributes / metadata passed in on open call)
208 *?
209 *? O_SYNC is a reasonable match to CIFS writethrough flag
210 *? and the read write flags match reasonably. O_LARGEFILE
211 *? is irrelevant because largefile support is always used
212 *? by this client. Flags O_APPEND, O_DIRECT, O_DIRECTORY,
213 * O_FASYNC, O_NOFOLLOW, O_NONBLOCK need further investigation
214 *********************************************************************/
215
216 disposition = cifs_get_disposition(f_flags);
217
218 /* BB pass O_SYNC flag through on file attributes .. BB */
219
220 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
221 if (!buf)
222 return -ENOMEM;
223
3d3ea8e6
SP
224 if (backup_cred(cifs_sb))
225 create_options |= CREATE_OPEN_BACKUP_INTENT;
226
1013e760
SF
227 /* O_SYNC also has bit for O_DSYNC so following check picks up either */
228 if (f_flags & O_SYNC)
229 create_options |= CREATE_WRITE_THROUGH;
230
231 if (f_flags & O_DIRECT)
232 create_options |= CREATE_NO_BUFFER;
233
226730b4
PS
234 oparms.tcon = tcon;
235 oparms.cifs_sb = cifs_sb;
236 oparms.desired_access = desired_access;
237 oparms.create_options = create_options;
238 oparms.disposition = disposition;
239 oparms.path = full_path;
240 oparms.fid = fid;
9cbc0b73 241 oparms.reconnect = false;
226730b4
PS
242
243 rc = server->ops->open(xid, &oparms, oplock, buf);
eeb910a6
PS
244
245 if (rc)
246 goto out;
247
248 if (tcon->unix_ext)
249 rc = cifs_get_inode_info_unix(&inode, full_path, inode->i_sb,
250 xid);
251 else
252 rc = cifs_get_inode_info(&inode, full_path, buf, inode->i_sb,
42eacf9e 253 xid, fid);
eeb910a6
PS
254
255out:
256 kfree(buf);
257 return rc;
258}
259
63b7d3a4
PS
260static bool
261cifs_has_mand_locks(struct cifsInodeInfo *cinode)
262{
263 struct cifs_fid_locks *cur;
264 bool has_locks = false;
265
266 down_read(&cinode->lock_sem);
267 list_for_each_entry(cur, &cinode->llist, llist) {
268 if (!list_empty(&cur->locks)) {
269 has_locks = true;
270 break;
271 }
272 }
273 up_read(&cinode->lock_sem);
274 return has_locks;
275}
276
15ecb436 277struct cifsFileInfo *
fb1214e4 278cifs_new_fileinfo(struct cifs_fid *fid, struct file *file,
15ecb436
JL
279 struct tcon_link *tlink, __u32 oplock)
280{
1f1735cb 281 struct dentry *dentry = file_dentry(file);
2b0143b5 282 struct inode *inode = d_inode(dentry);
4b4de76e
PS
283 struct cifsInodeInfo *cinode = CIFS_I(inode);
284 struct cifsFileInfo *cfile;
f45d3416 285 struct cifs_fid_locks *fdlocks;
233839b1 286 struct cifs_tcon *tcon = tlink_tcon(tlink);
63b7d3a4 287 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e
PS
288
289 cfile = kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
290 if (cfile == NULL)
291 return cfile;
292
f45d3416
PS
293 fdlocks = kzalloc(sizeof(struct cifs_fid_locks), GFP_KERNEL);
294 if (!fdlocks) {
295 kfree(cfile);
296 return NULL;
297 }
298
299 INIT_LIST_HEAD(&fdlocks->locks);
300 fdlocks->cfile = cfile;
301 cfile->llist = fdlocks;
1b4b55a1 302 down_write(&cinode->lock_sem);
f45d3416 303 list_add(&fdlocks->llist, &cinode->llist);
1b4b55a1 304 up_write(&cinode->lock_sem);
f45d3416 305
4b4de76e 306 cfile->count = 1;
4b4de76e
PS
307 cfile->pid = current->tgid;
308 cfile->uid = current_fsuid();
309 cfile->dentry = dget(dentry);
310 cfile->f_flags = file->f_flags;
311 cfile->invalidHandle = false;
312 cfile->tlink = cifs_get_tlink(tlink);
4b4de76e 313 INIT_WORK(&cfile->oplock_break, cifs_oplock_break);
f45d3416 314 mutex_init(&cfile->fh_mutex);
3afca265 315 spin_lock_init(&cfile->file_info_lock);
15ecb436 316
24261fc2
MG
317 cifs_sb_active(inode->i_sb);
318
63b7d3a4
PS
319 /*
320 * If the server returned a read oplock and we have mandatory brlocks,
321 * set oplock level to None.
322 */
53ef1016 323 if (server->ops->is_read_op(oplock) && cifs_has_mand_locks(cinode)) {
f96637be 324 cifs_dbg(FYI, "Reset oplock val from read to None due to mand locks\n");
63b7d3a4
PS
325 oplock = 0;
326 }
327
3afca265 328 spin_lock(&tcon->open_file_lock);
63b7d3a4 329 if (fid->pending_open->oplock != CIFS_OPLOCK_NO_CHANGE && oplock)
233839b1
PS
330 oplock = fid->pending_open->oplock;
331 list_del(&fid->pending_open->olist);
332
42873b0a 333 fid->purge_cache = false;
63b7d3a4 334 server->ops->set_fid(cfile, fid, oplock);
233839b1
PS
335
336 list_add(&cfile->tlist, &tcon->openFileList);
3afca265 337
15ecb436
JL
338 /* if readable file instance put first in list*/
339 if (file->f_mode & FMODE_READ)
4b4de76e 340 list_add(&cfile->flist, &cinode->openFileList);
15ecb436 341 else
4b4de76e 342 list_add_tail(&cfile->flist, &cinode->openFileList);
3afca265 343 spin_unlock(&tcon->open_file_lock);
15ecb436 344
42873b0a 345 if (fid->purge_cache)
4f73c7d3 346 cifs_zap_mapping(inode);
42873b0a 347
4b4de76e
PS
348 file->private_data = cfile;
349 return cfile;
15ecb436
JL
350}
351
764a1b1a
JL
352struct cifsFileInfo *
353cifsFileInfo_get(struct cifsFileInfo *cifs_file)
354{
3afca265 355 spin_lock(&cifs_file->file_info_lock);
764a1b1a 356 cifsFileInfo_get_locked(cifs_file);
3afca265 357 spin_unlock(&cifs_file->file_info_lock);
764a1b1a
JL
358 return cifs_file;
359}
360
cdff08e7
SF
361/*
362 * Release a reference on the file private data. This may involve closing
5f6dbc9e 363 * the filehandle out on the server. Must be called without holding
3afca265 364 * tcon->open_file_lock and cifs_file->file_info_lock.
cdff08e7 365 */
b33879aa
JL
366void cifsFileInfo_put(struct cifsFileInfo *cifs_file)
367{
2b0143b5 368 struct inode *inode = d_inode(cifs_file->dentry);
96daf2b0 369 struct cifs_tcon *tcon = tlink_tcon(cifs_file->tlink);
233839b1 370 struct TCP_Server_Info *server = tcon->ses->server;
e66673e3 371 struct cifsInodeInfo *cifsi = CIFS_I(inode);
24261fc2
MG
372 struct super_block *sb = inode->i_sb;
373 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cdff08e7 374 struct cifsLockInfo *li, *tmp;
233839b1
PS
375 struct cifs_fid fid;
376 struct cifs_pending_open open;
ca7df8e0 377 bool oplock_break_cancelled;
cdff08e7 378
3afca265
SF
379 spin_lock(&tcon->open_file_lock);
380
381 spin_lock(&cifs_file->file_info_lock);
5f6dbc9e 382 if (--cifs_file->count > 0) {
3afca265
SF
383 spin_unlock(&cifs_file->file_info_lock);
384 spin_unlock(&tcon->open_file_lock);
cdff08e7
SF
385 return;
386 }
3afca265 387 spin_unlock(&cifs_file->file_info_lock);
cdff08e7 388
233839b1
PS
389 if (server->ops->get_lease_key)
390 server->ops->get_lease_key(inode, &fid);
391
392 /* store open in pending opens to make sure we don't miss lease break */
393 cifs_add_pending_open_locked(&fid, cifs_file->tlink, &open);
394
cdff08e7
SF
395 /* remove it from the lists */
396 list_del(&cifs_file->flist);
397 list_del(&cifs_file->tlist);
398
399 if (list_empty(&cifsi->openFileList)) {
f96637be 400 cifs_dbg(FYI, "closing last open instance for inode %p\n",
2b0143b5 401 d_inode(cifs_file->dentry));
25364138
PS
402 /*
403 * In strict cache mode we need invalidate mapping on the last
404 * close because it may cause a error when we open this file
405 * again and get at least level II oplock.
406 */
4f8ba8a0 407 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO)
aff8d5ca 408 set_bit(CIFS_INO_INVALID_MAPPING, &cifsi->flags);
c6723628 409 cifs_set_oplock_level(cifsi, 0);
cdff08e7 410 }
3afca265
SF
411
412 spin_unlock(&tcon->open_file_lock);
cdff08e7 413
ca7df8e0 414 oplock_break_cancelled = cancel_work_sync(&cifs_file->oplock_break);
ad635942 415
cdff08e7 416 if (!tcon->need_reconnect && !cifs_file->invalidHandle) {
0ff78a22 417 struct TCP_Server_Info *server = tcon->ses->server;
6d5786a3 418 unsigned int xid;
0ff78a22 419
6d5786a3 420 xid = get_xid();
0ff78a22 421 if (server->ops->close)
760ad0ca
PS
422 server->ops->close(xid, tcon, &cifs_file->fid);
423 _free_xid(xid);
cdff08e7
SF
424 }
425
ca7df8e0
SP
426 if (oplock_break_cancelled)
427 cifs_done_oplock_break(cifsi);
428
233839b1
PS
429 cifs_del_pending_open(&open);
430
f45d3416
PS
431 /*
432 * Delete any outstanding lock records. We'll lose them when the file
cdff08e7
SF
433 * is closed anyway.
434 */
1b4b55a1 435 down_write(&cifsi->lock_sem);
f45d3416 436 list_for_each_entry_safe(li, tmp, &cifs_file->llist->locks, llist) {
cdff08e7 437 list_del(&li->llist);
85160e03 438 cifs_del_lock_waiters(li);
cdff08e7 439 kfree(li);
b33879aa 440 }
f45d3416
PS
441 list_del(&cifs_file->llist->llist);
442 kfree(cifs_file->llist);
1b4b55a1 443 up_write(&cifsi->lock_sem);
cdff08e7
SF
444
445 cifs_put_tlink(cifs_file->tlink);
446 dput(cifs_file->dentry);
24261fc2 447 cifs_sb_deactive(sb);
cdff08e7 448 kfree(cifs_file);
b33879aa
JL
449}
450
1da177e4 451int cifs_open(struct inode *inode, struct file *file)
233839b1 452
1da177e4
LT
453{
454 int rc = -EACCES;
6d5786a3 455 unsigned int xid;
590a3fe0 456 __u32 oplock;
1da177e4 457 struct cifs_sb_info *cifs_sb;
b8c32dbb 458 struct TCP_Server_Info *server;
96daf2b0 459 struct cifs_tcon *tcon;
7ffec372 460 struct tcon_link *tlink;
fb1214e4 461 struct cifsFileInfo *cfile = NULL;
1da177e4 462 char *full_path = NULL;
7e12eddb 463 bool posix_open_ok = false;
fb1214e4 464 struct cifs_fid fid;
233839b1 465 struct cifs_pending_open open;
1da177e4 466
6d5786a3 467 xid = get_xid();
1da177e4
LT
468
469 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
470 tlink = cifs_sb_tlink(cifs_sb);
471 if (IS_ERR(tlink)) {
6d5786a3 472 free_xid(xid);
7ffec372
JL
473 return PTR_ERR(tlink);
474 }
475 tcon = tlink_tcon(tlink);
b8c32dbb 476 server = tcon->ses->server;
1da177e4 477
1f1735cb 478 full_path = build_path_from_dentry(file_dentry(file));
1da177e4 479 if (full_path == NULL) {
0f3bc09e 480 rc = -ENOMEM;
232341ba 481 goto out;
1da177e4
LT
482 }
483
f96637be 484 cifs_dbg(FYI, "inode = 0x%p file flags are 0x%x for %s\n",
b6b38f70 485 inode, file->f_flags, full_path);
276a74a4 486
787aded6
NJ
487 if (file->f_flags & O_DIRECT &&
488 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
489 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
490 file->f_op = &cifs_file_direct_nobrl_ops;
491 else
492 file->f_op = &cifs_file_direct_ops;
493 }
494
233839b1 495 if (server->oplocks)
276a74a4
SF
496 oplock = REQ_OPLOCK;
497 else
498 oplock = 0;
499
64cc2c63 500 if (!tcon->broken_posix_open && tcon->unix_ext &&
29e20f9c
PS
501 cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
502 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
276a74a4 503 /* can not refresh inode info since size could be stale */
2422f676 504 rc = cifs_posix_open(full_path, &inode, inode->i_sb,
fa588e0c 505 cifs_sb->mnt_file_mode /* ignored */,
fb1214e4 506 file->f_flags, &oplock, &fid.netfid, xid);
276a74a4 507 if (rc == 0) {
f96637be 508 cifs_dbg(FYI, "posix open succeeded\n");
7e12eddb 509 posix_open_ok = true;
64cc2c63
SF
510 } else if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
511 if (tcon->ses->serverNOS)
f96637be
JP
512 cifs_dbg(VFS, "server %s of type %s returned unexpected error on SMB posix open, disabling posix open support. Check if server update available.\n",
513 tcon->ses->serverName,
514 tcon->ses->serverNOS);
64cc2c63 515 tcon->broken_posix_open = true;
276a74a4
SF
516 } else if ((rc != -EIO) && (rc != -EREMOTE) &&
517 (rc != -EOPNOTSUPP)) /* path not found or net err */
518 goto out;
fb1214e4
PS
519 /*
520 * Else fallthrough to retry open the old way on network i/o
521 * or DFS errors.
522 */
276a74a4
SF
523 }
524
233839b1
PS
525 if (server->ops->get_lease_key)
526 server->ops->get_lease_key(inode, &fid);
527
528 cifs_add_pending_open(&fid, tlink, &open);
529
7e12eddb 530 if (!posix_open_ok) {
b8c32dbb
PS
531 if (server->ops->get_lease_key)
532 server->ops->get_lease_key(inode, &fid);
533
7e12eddb 534 rc = cifs_nt_open(full_path, inode, cifs_sb, tcon,
fb1214e4 535 file->f_flags, &oplock, &fid, xid);
233839b1
PS
536 if (rc) {
537 cifs_del_pending_open(&open);
7e12eddb 538 goto out;
233839b1 539 }
7e12eddb 540 }
47c78b7f 541
fb1214e4
PS
542 cfile = cifs_new_fileinfo(&fid, file, tlink, oplock);
543 if (cfile == NULL) {
b8c32dbb
PS
544 if (server->ops->close)
545 server->ops->close(xid, tcon, &fid);
233839b1 546 cifs_del_pending_open(&open);
1da177e4
LT
547 rc = -ENOMEM;
548 goto out;
549 }
1da177e4 550
9451a9a5
SJ
551 cifs_fscache_set_inode_cookie(inode, file);
552
7e12eddb 553 if ((oplock & CIFS_CREATE_ACTION) && !posix_open_ok && tcon->unix_ext) {
fb1214e4
PS
554 /*
555 * Time to set mode which we can not set earlier due to
556 * problems creating new read-only files.
557 */
7e12eddb
PS
558 struct cifs_unix_set_info_args args = {
559 .mode = inode->i_mode,
49418b2c
EB
560 .uid = INVALID_UID, /* no change */
561 .gid = INVALID_GID, /* no change */
7e12eddb
PS
562 .ctime = NO_CHANGE_64,
563 .atime = NO_CHANGE_64,
564 .mtime = NO_CHANGE_64,
565 .device = 0,
566 };
fb1214e4
PS
567 CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid.netfid,
568 cfile->pid);
1da177e4
LT
569 }
570
571out:
1da177e4 572 kfree(full_path);
6d5786a3 573 free_xid(xid);
7ffec372 574 cifs_put_tlink(tlink);
1da177e4
LT
575 return rc;
576}
577
f152fd5f
PS
578static int cifs_push_posix_locks(struct cifsFileInfo *cfile);
579
2ae78ba8
PS
580/*
581 * Try to reacquire byte range locks that were released when session
f152fd5f 582 * to server was lost.
2ae78ba8 583 */
f152fd5f
PS
584static int
585cifs_relock_file(struct cifsFileInfo *cfile)
1da177e4 586{
f152fd5f 587 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2b0143b5 588 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
f152fd5f 589 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1da177e4
LT
590 int rc = 0;
591
560d3889 592 down_read_nested(&cinode->lock_sem, SINGLE_DEPTH_NESTING);
f152fd5f 593 if (cinode->can_cache_brlcks) {
689c3db4
PS
594 /* can cache locks - no need to relock */
595 up_read(&cinode->lock_sem);
f152fd5f
PS
596 return rc;
597 }
598
599 if (cap_unix(tcon->ses) &&
600 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
601 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
602 rc = cifs_push_posix_locks(cfile);
603 else
604 rc = tcon->ses->server->ops->push_mand_locks(cfile);
1da177e4 605
689c3db4 606 up_read(&cinode->lock_sem);
1da177e4
LT
607 return rc;
608}
609
2ae78ba8
PS
610static int
611cifs_reopen_file(struct cifsFileInfo *cfile, bool can_flush)
1da177e4
LT
612{
613 int rc = -EACCES;
6d5786a3 614 unsigned int xid;
590a3fe0 615 __u32 oplock;
1da177e4 616 struct cifs_sb_info *cifs_sb;
96daf2b0 617 struct cifs_tcon *tcon;
2ae78ba8
PS
618 struct TCP_Server_Info *server;
619 struct cifsInodeInfo *cinode;
fb8c4b14 620 struct inode *inode;
1da177e4 621 char *full_path = NULL;
2ae78ba8 622 int desired_access;
1da177e4 623 int disposition = FILE_OPEN;
3d3ea8e6 624 int create_options = CREATE_NOT_DIR;
226730b4 625 struct cifs_open_parms oparms;
1da177e4 626
6d5786a3 627 xid = get_xid();
2ae78ba8
PS
628 mutex_lock(&cfile->fh_mutex);
629 if (!cfile->invalidHandle) {
630 mutex_unlock(&cfile->fh_mutex);
0f3bc09e 631 rc = 0;
6d5786a3 632 free_xid(xid);
0f3bc09e 633 return rc;
1da177e4
LT
634 }
635
2b0143b5 636 inode = d_inode(cfile->dentry);
1da177e4 637 cifs_sb = CIFS_SB(inode->i_sb);
2ae78ba8
PS
638 tcon = tlink_tcon(cfile->tlink);
639 server = tcon->ses->server;
640
641 /*
642 * Can not grab rename sem here because various ops, including those
643 * that already have the rename sem can end up causing writepage to get
644 * called and if the server was down that means we end up here, and we
645 * can never tell if the caller already has the rename_sem.
646 */
647 full_path = build_path_from_dentry(cfile->dentry);
1da177e4 648 if (full_path == NULL) {
3a9f462f 649 rc = -ENOMEM;
2ae78ba8 650 mutex_unlock(&cfile->fh_mutex);
6d5786a3 651 free_xid(xid);
3a9f462f 652 return rc;
1da177e4
LT
653 }
654
f96637be
JP
655 cifs_dbg(FYI, "inode = 0x%p file flags 0x%x for %s\n",
656 inode, cfile->f_flags, full_path);
1da177e4 657
10b9b98e 658 if (tcon->ses->server->oplocks)
1da177e4
LT
659 oplock = REQ_OPLOCK;
660 else
4b18f2a9 661 oplock = 0;
1da177e4 662
29e20f9c 663 if (tcon->unix_ext && cap_unix(tcon->ses) &&
7fc8f4e9 664 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
29e20f9c 665 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
608712fe
JL
666 /*
667 * O_CREAT, O_EXCL and O_TRUNC already had their effect on the
668 * original open. Must mask them off for a reopen.
669 */
2ae78ba8 670 unsigned int oflags = cfile->f_flags &
15886177 671 ~(O_CREAT | O_EXCL | O_TRUNC);
608712fe 672
2422f676 673 rc = cifs_posix_open(full_path, NULL, inode->i_sb,
2ae78ba8 674 cifs_sb->mnt_file_mode /* ignored */,
9cbc0b73 675 oflags, &oplock, &cfile->fid.netfid, xid);
7fc8f4e9 676 if (rc == 0) {
f96637be 677 cifs_dbg(FYI, "posix reopen succeeded\n");
fe090e4e 678 oparms.reconnect = true;
7fc8f4e9
SF
679 goto reopen_success;
680 }
2ae78ba8
PS
681 /*
682 * fallthrough to retry open the old way on errors, especially
683 * in the reconnect path it is important to retry hard
684 */
7fc8f4e9
SF
685 }
686
2ae78ba8 687 desired_access = cifs_convert_flags(cfile->f_flags);
7fc8f4e9 688
3d3ea8e6
SP
689 if (backup_cred(cifs_sb))
690 create_options |= CREATE_OPEN_BACKUP_INTENT;
691
b8c32dbb 692 if (server->ops->get_lease_key)
9cbc0b73 693 server->ops->get_lease_key(inode, &cfile->fid);
b8c32dbb 694
226730b4
PS
695 oparms.tcon = tcon;
696 oparms.cifs_sb = cifs_sb;
697 oparms.desired_access = desired_access;
698 oparms.create_options = create_options;
699 oparms.disposition = disposition;
700 oparms.path = full_path;
9cbc0b73
PS
701 oparms.fid = &cfile->fid;
702 oparms.reconnect = true;
226730b4 703
2ae78ba8
PS
704 /*
705 * Can not refresh inode by passing in file_info buf to be returned by
d81b8a40 706 * ops->open and then calling get_inode_info with returned buf since
2ae78ba8
PS
707 * file might have write behind data that needs to be flushed and server
708 * version of file size can be stale. If we knew for sure that inode was
709 * not dirty locally we could do this.
710 */
226730b4 711 rc = server->ops->open(xid, &oparms, &oplock, NULL);
b33fcf1c
PS
712 if (rc == -ENOENT && oparms.reconnect == false) {
713 /* durable handle timeout is expired - open the file again */
714 rc = server->ops->open(xid, &oparms, &oplock, NULL);
715 /* indicate that we need to relock the file */
716 oparms.reconnect = true;
717 }
718
1da177e4 719 if (rc) {
2ae78ba8 720 mutex_unlock(&cfile->fh_mutex);
f96637be
JP
721 cifs_dbg(FYI, "cifs_reopen returned 0x%x\n", rc);
722 cifs_dbg(FYI, "oplock: %d\n", oplock);
15886177
JL
723 goto reopen_error_exit;
724 }
725
7fc8f4e9 726reopen_success:
2ae78ba8
PS
727 cfile->invalidHandle = false;
728 mutex_unlock(&cfile->fh_mutex);
729 cinode = CIFS_I(inode);
15886177
JL
730
731 if (can_flush) {
732 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b 733 mapping_set_error(inode->i_mapping, rc);
15886177 734
15886177 735 if (tcon->unix_ext)
2ae78ba8
PS
736 rc = cifs_get_inode_info_unix(&inode, full_path,
737 inode->i_sb, xid);
15886177 738 else
2ae78ba8
PS
739 rc = cifs_get_inode_info(&inode, full_path, NULL,
740 inode->i_sb, xid, NULL);
741 }
742 /*
743 * Else we are writing out data to server already and could deadlock if
744 * we tried to flush data, and since we do not know if we have data that
745 * would invalidate the current end of file on the server we can not go
746 * to the server to get the new inode info.
747 */
748
de740250
PS
749 /*
750 * If the server returned a read oplock and we have mandatory brlocks,
751 * set oplock level to None.
752 */
753 if (server->ops->is_read_op(oplock) && cifs_has_mand_locks(cinode)) {
754 cifs_dbg(FYI, "Reset oplock val from read to None due to mand locks\n");
755 oplock = 0;
756 }
757
9cbc0b73
PS
758 server->ops->set_fid(cfile, &cfile->fid, oplock);
759 if (oparms.reconnect)
760 cifs_relock_file(cfile);
15886177
JL
761
762reopen_error_exit:
1da177e4 763 kfree(full_path);
6d5786a3 764 free_xid(xid);
1da177e4
LT
765 return rc;
766}
767
768int cifs_close(struct inode *inode, struct file *file)
769{
77970693
JL
770 if (file->private_data != NULL) {
771 cifsFileInfo_put(file->private_data);
772 file->private_data = NULL;
773 }
7ee1af76 774
cdff08e7
SF
775 /* return code from the ->release op is always ignored */
776 return 0;
1da177e4
LT
777}
778
52ace1ef
SF
779void
780cifs_reopen_persistent_handles(struct cifs_tcon *tcon)
781{
f2cca6a7 782 struct cifsFileInfo *open_file;
52ace1ef
SF
783 struct list_head *tmp;
784 struct list_head *tmp1;
f2cca6a7
PS
785 struct list_head tmp_list;
786
96a988ff
PS
787 if (!tcon->use_persistent || !tcon->need_reopen_files)
788 return;
789
790 tcon->need_reopen_files = false;
791
f2cca6a7
PS
792 cifs_dbg(FYI, "Reopen persistent handles");
793 INIT_LIST_HEAD(&tmp_list);
52ace1ef
SF
794
795 /* list all files open on tree connection, reopen resilient handles */
796 spin_lock(&tcon->open_file_lock);
f2cca6a7 797 list_for_each(tmp, &tcon->openFileList) {
52ace1ef 798 open_file = list_entry(tmp, struct cifsFileInfo, tlist);
f2cca6a7
PS
799 if (!open_file->invalidHandle)
800 continue;
801 cifsFileInfo_get(open_file);
802 list_add_tail(&open_file->rlist, &tmp_list);
52ace1ef
SF
803 }
804 spin_unlock(&tcon->open_file_lock);
f2cca6a7
PS
805
806 list_for_each_safe(tmp, tmp1, &tmp_list) {
807 open_file = list_entry(tmp, struct cifsFileInfo, rlist);
96a988ff
PS
808 if (cifs_reopen_file(open_file, false /* do not flush */))
809 tcon->need_reopen_files = true;
f2cca6a7
PS
810 list_del_init(&open_file->rlist);
811 cifsFileInfo_put(open_file);
812 }
52ace1ef
SF
813}
814
1da177e4
LT
815int cifs_closedir(struct inode *inode, struct file *file)
816{
817 int rc = 0;
6d5786a3 818 unsigned int xid;
4b4de76e 819 struct cifsFileInfo *cfile = file->private_data;
92fc65a7
PS
820 struct cifs_tcon *tcon;
821 struct TCP_Server_Info *server;
822 char *buf;
1da177e4 823
f96637be 824 cifs_dbg(FYI, "Closedir inode = 0x%p\n", inode);
1da177e4 825
92fc65a7
PS
826 if (cfile == NULL)
827 return rc;
828
6d5786a3 829 xid = get_xid();
92fc65a7
PS
830 tcon = tlink_tcon(cfile->tlink);
831 server = tcon->ses->server;
1da177e4 832
f96637be 833 cifs_dbg(FYI, "Freeing private data in close dir\n");
3afca265 834 spin_lock(&cfile->file_info_lock);
52755808 835 if (server->ops->dir_needs_close(cfile)) {
92fc65a7 836 cfile->invalidHandle = true;
3afca265 837 spin_unlock(&cfile->file_info_lock);
92fc65a7
PS
838 if (server->ops->close_dir)
839 rc = server->ops->close_dir(xid, tcon, &cfile->fid);
840 else
841 rc = -ENOSYS;
f96637be 842 cifs_dbg(FYI, "Closing uncompleted readdir with rc %d\n", rc);
92fc65a7
PS
843 /* not much we can do if it fails anyway, ignore rc */
844 rc = 0;
845 } else
3afca265 846 spin_unlock(&cfile->file_info_lock);
92fc65a7
PS
847
848 buf = cfile->srch_inf.ntwrk_buf_start;
849 if (buf) {
f96637be 850 cifs_dbg(FYI, "closedir free smb buf in srch struct\n");
92fc65a7
PS
851 cfile->srch_inf.ntwrk_buf_start = NULL;
852 if (cfile->srch_inf.smallBuf)
853 cifs_small_buf_release(buf);
854 else
855 cifs_buf_release(buf);
1da177e4 856 }
92fc65a7
PS
857
858 cifs_put_tlink(cfile->tlink);
859 kfree(file->private_data);
860 file->private_data = NULL;
1da177e4 861 /* BB can we lock the filestruct while this is going on? */
6d5786a3 862 free_xid(xid);
1da177e4
LT
863 return rc;
864}
865
85160e03 866static struct cifsLockInfo *
fbd35aca 867cifs_lock_init(__u64 offset, __u64 length, __u8 type)
7ee1af76 868{
a88b4707 869 struct cifsLockInfo *lock =
fb8c4b14 870 kmalloc(sizeof(struct cifsLockInfo), GFP_KERNEL);
a88b4707
PS
871 if (!lock)
872 return lock;
873 lock->offset = offset;
874 lock->length = length;
875 lock->type = type;
a88b4707
PS
876 lock->pid = current->tgid;
877 INIT_LIST_HEAD(&lock->blist);
878 init_waitqueue_head(&lock->block_q);
879 return lock;
85160e03
PS
880}
881
f7ba7fe6 882void
85160e03
PS
883cifs_del_lock_waiters(struct cifsLockInfo *lock)
884{
885 struct cifsLockInfo *li, *tmp;
886 list_for_each_entry_safe(li, tmp, &lock->blist, blist) {
887 list_del_init(&li->blist);
888 wake_up(&li->block_q);
889 }
890}
891
081c0414
PS
892#define CIFS_LOCK_OP 0
893#define CIFS_READ_OP 1
894#define CIFS_WRITE_OP 2
895
896/* @rw_check : 0 - no op, 1 - read, 2 - write */
85160e03 897static bool
f45d3416
PS
898cifs_find_fid_lock_conflict(struct cifs_fid_locks *fdlocks, __u64 offset,
899 __u64 length, __u8 type, struct cifsFileInfo *cfile,
081c0414 900 struct cifsLockInfo **conf_lock, int rw_check)
85160e03 901{
fbd35aca 902 struct cifsLockInfo *li;
f45d3416 903 struct cifsFileInfo *cur_cfile = fdlocks->cfile;
106dc538 904 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03 905
f45d3416 906 list_for_each_entry(li, &fdlocks->locks, llist) {
85160e03
PS
907 if (offset + length <= li->offset ||
908 offset >= li->offset + li->length)
909 continue;
081c0414
PS
910 if (rw_check != CIFS_LOCK_OP && current->tgid == li->pid &&
911 server->ops->compare_fids(cfile, cur_cfile)) {
912 /* shared lock prevents write op through the same fid */
913 if (!(li->type & server->vals->shared_lock_type) ||
914 rw_check != CIFS_WRITE_OP)
915 continue;
916 }
f45d3416
PS
917 if ((type & server->vals->shared_lock_type) &&
918 ((server->ops->compare_fids(cfile, cur_cfile) &&
919 current->tgid == li->pid) || type == li->type))
85160e03 920 continue;
579f9053
PS
921 if (conf_lock)
922 *conf_lock = li;
f45d3416 923 return true;
85160e03
PS
924 }
925 return false;
926}
927
579f9053 928bool
55157dfb 929cifs_find_lock_conflict(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
579f9053 930 __u8 type, struct cifsLockInfo **conf_lock,
081c0414 931 int rw_check)
161ebf9f 932{
fbd35aca 933 bool rc = false;
f45d3416 934 struct cifs_fid_locks *cur;
2b0143b5 935 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
fbd35aca 936
f45d3416
PS
937 list_for_each_entry(cur, &cinode->llist, llist) {
938 rc = cifs_find_fid_lock_conflict(cur, offset, length, type,
579f9053 939 cfile, conf_lock, rw_check);
fbd35aca
PS
940 if (rc)
941 break;
942 }
fbd35aca
PS
943
944 return rc;
161ebf9f
PS
945}
946
9a5101c8
PS
947/*
948 * Check if there is another lock that prevents us to set the lock (mandatory
949 * style). If such a lock exists, update the flock structure with its
950 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
951 * or leave it the same if we can't. Returns 0 if we don't need to request to
952 * the server or 1 otherwise.
953 */
85160e03 954static int
fbd35aca
PS
955cifs_lock_test(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
956 __u8 type, struct file_lock *flock)
85160e03
PS
957{
958 int rc = 0;
959 struct cifsLockInfo *conf_lock;
2b0143b5 960 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
106dc538 961 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03
PS
962 bool exist;
963
1b4b55a1 964 down_read(&cinode->lock_sem);
85160e03 965
55157dfb 966 exist = cifs_find_lock_conflict(cfile, offset, length, type,
081c0414 967 &conf_lock, CIFS_LOCK_OP);
85160e03
PS
968 if (exist) {
969 flock->fl_start = conf_lock->offset;
970 flock->fl_end = conf_lock->offset + conf_lock->length - 1;
971 flock->fl_pid = conf_lock->pid;
106dc538 972 if (conf_lock->type & server->vals->shared_lock_type)
85160e03
PS
973 flock->fl_type = F_RDLCK;
974 else
975 flock->fl_type = F_WRLCK;
976 } else if (!cinode->can_cache_brlcks)
977 rc = 1;
978 else
979 flock->fl_type = F_UNLCK;
980
1b4b55a1 981 up_read(&cinode->lock_sem);
85160e03
PS
982 return rc;
983}
984
161ebf9f 985static void
fbd35aca 986cifs_lock_add(struct cifsFileInfo *cfile, struct cifsLockInfo *lock)
85160e03 987{
2b0143b5 988 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
1b4b55a1 989 down_write(&cinode->lock_sem);
f45d3416 990 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 991 up_write(&cinode->lock_sem);
7ee1af76
JA
992}
993
9a5101c8
PS
994/*
995 * Set the byte-range lock (mandatory style). Returns:
996 * 1) 0, if we set the lock and don't need to request to the server;
997 * 2) 1, if no locks prevent us but we need to request to the server;
998 * 3) -EACCESS, if there is a lock that prevents us and wait is false.
999 */
85160e03 1000static int
fbd35aca 1001cifs_lock_add_if(struct cifsFileInfo *cfile, struct cifsLockInfo *lock,
161ebf9f 1002 bool wait)
85160e03 1003{
161ebf9f 1004 struct cifsLockInfo *conf_lock;
2b0143b5 1005 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
85160e03
PS
1006 bool exist;
1007 int rc = 0;
1008
85160e03
PS
1009try_again:
1010 exist = false;
1b4b55a1 1011 down_write(&cinode->lock_sem);
85160e03 1012
55157dfb 1013 exist = cifs_find_lock_conflict(cfile, lock->offset, lock->length,
081c0414 1014 lock->type, &conf_lock, CIFS_LOCK_OP);
85160e03 1015 if (!exist && cinode->can_cache_brlcks) {
f45d3416 1016 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 1017 up_write(&cinode->lock_sem);
85160e03
PS
1018 return rc;
1019 }
1020
1021 if (!exist)
1022 rc = 1;
1023 else if (!wait)
1024 rc = -EACCES;
1025 else {
1026 list_add_tail(&lock->blist, &conf_lock->blist);
1b4b55a1 1027 up_write(&cinode->lock_sem);
85160e03
PS
1028 rc = wait_event_interruptible(lock->block_q,
1029 (lock->blist.prev == &lock->blist) &&
1030 (lock->blist.next == &lock->blist));
1031 if (!rc)
1032 goto try_again;
1b4b55a1 1033 down_write(&cinode->lock_sem);
a88b4707 1034 list_del_init(&lock->blist);
85160e03
PS
1035 }
1036
1b4b55a1 1037 up_write(&cinode->lock_sem);
85160e03
PS
1038 return rc;
1039}
1040
9a5101c8
PS
1041/*
1042 * Check if there is another lock that prevents us to set the lock (posix
1043 * style). If such a lock exists, update the flock structure with its
1044 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
1045 * or leave it the same if we can't. Returns 0 if we don't need to request to
1046 * the server or 1 otherwise.
1047 */
85160e03 1048static int
4f6bcec9
PS
1049cifs_posix_lock_test(struct file *file, struct file_lock *flock)
1050{
1051 int rc = 0;
496ad9aa 1052 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
4f6bcec9
PS
1053 unsigned char saved_type = flock->fl_type;
1054
50792760
PS
1055 if ((flock->fl_flags & FL_POSIX) == 0)
1056 return 1;
1057
1b4b55a1 1058 down_read(&cinode->lock_sem);
4f6bcec9
PS
1059 posix_test_lock(file, flock);
1060
1061 if (flock->fl_type == F_UNLCK && !cinode->can_cache_brlcks) {
1062 flock->fl_type = saved_type;
1063 rc = 1;
1064 }
1065
1b4b55a1 1066 up_read(&cinode->lock_sem);
4f6bcec9
PS
1067 return rc;
1068}
1069
9a5101c8
PS
1070/*
1071 * Set the byte-range lock (posix style). Returns:
1072 * 1) 0, if we set the lock and don't need to request to the server;
1073 * 2) 1, if we need to request to the server;
1074 * 3) <0, if the error occurs while setting the lock.
1075 */
4f6bcec9
PS
1076static int
1077cifs_posix_lock_set(struct file *file, struct file_lock *flock)
1078{
496ad9aa 1079 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
50792760
PS
1080 int rc = 1;
1081
1082 if ((flock->fl_flags & FL_POSIX) == 0)
1083 return rc;
4f6bcec9 1084
66189be7 1085try_again:
1b4b55a1 1086 down_write(&cinode->lock_sem);
4f6bcec9 1087 if (!cinode->can_cache_brlcks) {
1b4b55a1 1088 up_write(&cinode->lock_sem);
50792760 1089 return rc;
4f6bcec9 1090 }
66189be7
PS
1091
1092 rc = posix_lock_file(file, flock, NULL);
1b4b55a1 1093 up_write(&cinode->lock_sem);
66189be7
PS
1094 if (rc == FILE_LOCK_DEFERRED) {
1095 rc = wait_event_interruptible(flock->fl_wait, !flock->fl_next);
1096 if (!rc)
1097 goto try_again;
1a9e64a7 1098 posix_unblock_lock(flock);
66189be7 1099 }
9ebb389d 1100 return rc;
4f6bcec9
PS
1101}
1102
d39a4f71 1103int
4f6bcec9 1104cifs_push_mandatory_locks(struct cifsFileInfo *cfile)
85160e03 1105{
6d5786a3
PS
1106 unsigned int xid;
1107 int rc = 0, stored_rc;
85160e03
PS
1108 struct cifsLockInfo *li, *tmp;
1109 struct cifs_tcon *tcon;
0013fb4c 1110 unsigned int num, max_num, max_buf;
32b9aaf1 1111 LOCKING_ANDX_RANGE *buf, *cur;
4d61eda8
CIK
1112 static const int types[] = {
1113 LOCKING_ANDX_LARGE_FILES,
1114 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES
1115 };
32b9aaf1 1116 int i;
85160e03 1117
6d5786a3 1118 xid = get_xid();
85160e03
PS
1119 tcon = tlink_tcon(cfile->tlink);
1120
0013fb4c
PS
1121 /*
1122 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1123 * and check it for zero before using.
1124 */
1125 max_buf = tcon->ses->server->maxBuf;
1126 if (!max_buf) {
6d5786a3 1127 free_xid(xid);
0013fb4c
PS
1128 return -EINVAL;
1129 }
1130
1131 max_num = (max_buf - sizeof(struct smb_hdr)) /
1132 sizeof(LOCKING_ANDX_RANGE);
4b99d39b 1133 buf = kcalloc(max_num, sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
32b9aaf1 1134 if (!buf) {
6d5786a3 1135 free_xid(xid);
e2f2886a 1136 return -ENOMEM;
32b9aaf1
PS
1137 }
1138
1139 for (i = 0; i < 2; i++) {
1140 cur = buf;
1141 num = 0;
f45d3416 1142 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
32b9aaf1
PS
1143 if (li->type != types[i])
1144 continue;
1145 cur->Pid = cpu_to_le16(li->pid);
1146 cur->LengthLow = cpu_to_le32((u32)li->length);
1147 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1148 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1149 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1150 if (++num == max_num) {
4b4de76e
PS
1151 stored_rc = cifs_lockv(xid, tcon,
1152 cfile->fid.netfid,
04a6aa8a
PS
1153 (__u8)li->type, 0, num,
1154 buf);
32b9aaf1
PS
1155 if (stored_rc)
1156 rc = stored_rc;
1157 cur = buf;
1158 num = 0;
1159 } else
1160 cur++;
1161 }
1162
1163 if (num) {
4b4de76e 1164 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
04a6aa8a 1165 (__u8)types[i], 0, num, buf);
32b9aaf1
PS
1166 if (stored_rc)
1167 rc = stored_rc;
1168 }
85160e03
PS
1169 }
1170
32b9aaf1 1171 kfree(buf);
6d5786a3 1172 free_xid(xid);
85160e03
PS
1173 return rc;
1174}
1175
3d22462a
JL
1176static __u32
1177hash_lockowner(fl_owner_t owner)
1178{
1179 return cifs_lock_secret ^ hash32_ptr((const void *)owner);
1180}
1181
d5751469
PS
1182struct lock_to_push {
1183 struct list_head llist;
1184 __u64 offset;
1185 __u64 length;
1186 __u32 pid;
1187 __u16 netfid;
1188 __u8 type;
1189};
1190
4f6bcec9 1191static int
b8db928b 1192cifs_push_posix_locks(struct cifsFileInfo *cfile)
4f6bcec9 1193{
2b0143b5 1194 struct inode *inode = d_inode(cfile->dentry);
4f6bcec9 1195 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
bd61e0a9
JL
1196 struct file_lock *flock;
1197 struct file_lock_context *flctx = inode->i_flctx;
e084c1bd 1198 unsigned int count = 0, i;
4f6bcec9 1199 int rc = 0, xid, type;
d5751469
PS
1200 struct list_head locks_to_send, *el;
1201 struct lock_to_push *lck, *tmp;
4f6bcec9 1202 __u64 length;
4f6bcec9 1203
6d5786a3 1204 xid = get_xid();
4f6bcec9 1205
bd61e0a9
JL
1206 if (!flctx)
1207 goto out;
d5751469 1208
e084c1bd
JL
1209 spin_lock(&flctx->flc_lock);
1210 list_for_each(el, &flctx->flc_posix) {
1211 count++;
1212 }
1213 spin_unlock(&flctx->flc_lock);
1214
4f6bcec9
PS
1215 INIT_LIST_HEAD(&locks_to_send);
1216
d5751469 1217 /*
e084c1bd
JL
1218 * Allocating count locks is enough because no FL_POSIX locks can be
1219 * added to the list while we are holding cinode->lock_sem that
ce85852b 1220 * protects locking operations of this inode.
d5751469 1221 */
e084c1bd 1222 for (i = 0; i < count; i++) {
d5751469
PS
1223 lck = kmalloc(sizeof(struct lock_to_push), GFP_KERNEL);
1224 if (!lck) {
1225 rc = -ENOMEM;
1226 goto err_out;
1227 }
1228 list_add_tail(&lck->llist, &locks_to_send);
1229 }
1230
d5751469 1231 el = locks_to_send.next;
6109c850 1232 spin_lock(&flctx->flc_lock);
bd61e0a9 1233 list_for_each_entry(flock, &flctx->flc_posix, fl_list) {
d5751469 1234 if (el == &locks_to_send) {
ce85852b
PS
1235 /*
1236 * The list ended. We don't have enough allocated
1237 * structures - something is really wrong.
1238 */
f96637be 1239 cifs_dbg(VFS, "Can't push all brlocks!\n");
d5751469
PS
1240 break;
1241 }
4f6bcec9
PS
1242 length = 1 + flock->fl_end - flock->fl_start;
1243 if (flock->fl_type == F_RDLCK || flock->fl_type == F_SHLCK)
1244 type = CIFS_RDLCK;
1245 else
1246 type = CIFS_WRLCK;
d5751469 1247 lck = list_entry(el, struct lock_to_push, llist);
3d22462a 1248 lck->pid = hash_lockowner(flock->fl_owner);
4b4de76e 1249 lck->netfid = cfile->fid.netfid;
d5751469
PS
1250 lck->length = length;
1251 lck->type = type;
1252 lck->offset = flock->fl_start;
4f6bcec9 1253 }
6109c850 1254 spin_unlock(&flctx->flc_lock);
4f6bcec9
PS
1255
1256 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
4f6bcec9
PS
1257 int stored_rc;
1258
4f6bcec9 1259 stored_rc = CIFSSMBPosixLock(xid, tcon, lck->netfid, lck->pid,
c5fd363d 1260 lck->offset, lck->length, NULL,
4f6bcec9
PS
1261 lck->type, 0);
1262 if (stored_rc)
1263 rc = stored_rc;
1264 list_del(&lck->llist);
1265 kfree(lck);
1266 }
1267
d5751469 1268out:
6d5786a3 1269 free_xid(xid);
4f6bcec9 1270 return rc;
d5751469
PS
1271err_out:
1272 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
1273 list_del(&lck->llist);
1274 kfree(lck);
1275 }
1276 goto out;
4f6bcec9
PS
1277}
1278
9ec3c882 1279static int
b8db928b 1280cifs_push_locks(struct cifsFileInfo *cfile)
9ec3c882 1281{
b8db928b 1282 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2b0143b5 1283 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
b8db928b 1284 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
9ec3c882
PS
1285 int rc = 0;
1286
1287 /* we are going to update can_cache_brlcks here - need a write access */
1288 down_write(&cinode->lock_sem);
1289 if (!cinode->can_cache_brlcks) {
1290 up_write(&cinode->lock_sem);
1291 return rc;
1292 }
4f6bcec9 1293
29e20f9c 1294 if (cap_unix(tcon->ses) &&
4f6bcec9
PS
1295 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1296 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
b8db928b
PS
1297 rc = cifs_push_posix_locks(cfile);
1298 else
1299 rc = tcon->ses->server->ops->push_mand_locks(cfile);
4f6bcec9 1300
b8db928b
PS
1301 cinode->can_cache_brlcks = false;
1302 up_write(&cinode->lock_sem);
1303 return rc;
4f6bcec9
PS
1304}
1305
03776f45 1306static void
04a6aa8a 1307cifs_read_flock(struct file_lock *flock, __u32 *type, int *lock, int *unlock,
106dc538 1308 bool *wait_flag, struct TCP_Server_Info *server)
1da177e4 1309{
03776f45 1310 if (flock->fl_flags & FL_POSIX)
f96637be 1311 cifs_dbg(FYI, "Posix\n");
03776f45 1312 if (flock->fl_flags & FL_FLOCK)
f96637be 1313 cifs_dbg(FYI, "Flock\n");
03776f45 1314 if (flock->fl_flags & FL_SLEEP) {
f96637be 1315 cifs_dbg(FYI, "Blocking lock\n");
03776f45 1316 *wait_flag = true;
1da177e4 1317 }
03776f45 1318 if (flock->fl_flags & FL_ACCESS)
f96637be 1319 cifs_dbg(FYI, "Process suspended by mandatory locking - not implemented yet\n");
03776f45 1320 if (flock->fl_flags & FL_LEASE)
f96637be 1321 cifs_dbg(FYI, "Lease on file - not implemented yet\n");
03776f45 1322 if (flock->fl_flags &
3d6d854a
JL
1323 (~(FL_POSIX | FL_FLOCK | FL_SLEEP |
1324 FL_ACCESS | FL_LEASE | FL_CLOSE)))
f96637be 1325 cifs_dbg(FYI, "Unknown lock flags 0x%x\n", flock->fl_flags);
1da177e4 1326
106dc538 1327 *type = server->vals->large_lock_type;
03776f45 1328 if (flock->fl_type == F_WRLCK) {
f96637be 1329 cifs_dbg(FYI, "F_WRLCK\n");
106dc538 1330 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1331 *lock = 1;
1332 } else if (flock->fl_type == F_UNLCK) {
f96637be 1333 cifs_dbg(FYI, "F_UNLCK\n");
106dc538 1334 *type |= server->vals->unlock_lock_type;
03776f45
PS
1335 *unlock = 1;
1336 /* Check if unlock includes more than one lock range */
1337 } else if (flock->fl_type == F_RDLCK) {
f96637be 1338 cifs_dbg(FYI, "F_RDLCK\n");
106dc538 1339 *type |= server->vals->shared_lock_type;
03776f45
PS
1340 *lock = 1;
1341 } else if (flock->fl_type == F_EXLCK) {
f96637be 1342 cifs_dbg(FYI, "F_EXLCK\n");
106dc538 1343 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1344 *lock = 1;
1345 } else if (flock->fl_type == F_SHLCK) {
f96637be 1346 cifs_dbg(FYI, "F_SHLCK\n");
106dc538 1347 *type |= server->vals->shared_lock_type;
03776f45 1348 *lock = 1;
1da177e4 1349 } else
f96637be 1350 cifs_dbg(FYI, "Unknown type of lock\n");
03776f45 1351}
1da177e4 1352
03776f45 1353static int
04a6aa8a 1354cifs_getlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3 1355 bool wait_flag, bool posix_lck, unsigned int xid)
03776f45
PS
1356{
1357 int rc = 0;
1358 __u64 length = 1 + flock->fl_end - flock->fl_start;
4f6bcec9
PS
1359 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1360 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1361 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e 1362 __u16 netfid = cfile->fid.netfid;
f05337c6 1363
03776f45
PS
1364 if (posix_lck) {
1365 int posix_lock_type;
4f6bcec9
PS
1366
1367 rc = cifs_posix_lock_test(file, flock);
1368 if (!rc)
1369 return rc;
1370
106dc538 1371 if (type & server->vals->shared_lock_type)
03776f45
PS
1372 posix_lock_type = CIFS_RDLCK;
1373 else
1374 posix_lock_type = CIFS_WRLCK;
3d22462a
JL
1375 rc = CIFSSMBPosixLock(xid, tcon, netfid,
1376 hash_lockowner(flock->fl_owner),
c5fd363d 1377 flock->fl_start, length, flock,
4f6bcec9 1378 posix_lock_type, wait_flag);
03776f45
PS
1379 return rc;
1380 }
1da177e4 1381
fbd35aca 1382 rc = cifs_lock_test(cfile, flock->fl_start, length, type, flock);
85160e03
PS
1383 if (!rc)
1384 return rc;
1385
03776f45 1386 /* BB we could chain these into one lock request BB */
d39a4f71
PS
1387 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length, type,
1388 1, 0, false);
03776f45 1389 if (rc == 0) {
d39a4f71
PS
1390 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1391 type, 0, 1, false);
03776f45
PS
1392 flock->fl_type = F_UNLCK;
1393 if (rc != 0)
f96637be
JP
1394 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1395 rc);
a88b4707 1396 return 0;
1da177e4 1397 }
7ee1af76 1398
106dc538 1399 if (type & server->vals->shared_lock_type) {
03776f45 1400 flock->fl_type = F_WRLCK;
a88b4707 1401 return 0;
7ee1af76
JA
1402 }
1403
d39a4f71
PS
1404 type &= ~server->vals->exclusive_lock_type;
1405
1406 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1407 type | server->vals->shared_lock_type,
1408 1, 0, false);
03776f45 1409 if (rc == 0) {
d39a4f71
PS
1410 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1411 type | server->vals->shared_lock_type, 0, 1, false);
03776f45
PS
1412 flock->fl_type = F_RDLCK;
1413 if (rc != 0)
f96637be
JP
1414 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1415 rc);
03776f45
PS
1416 } else
1417 flock->fl_type = F_WRLCK;
1418
a88b4707 1419 return 0;
03776f45
PS
1420}
1421
f7ba7fe6 1422void
9ee305b7
PS
1423cifs_move_llist(struct list_head *source, struct list_head *dest)
1424{
1425 struct list_head *li, *tmp;
1426 list_for_each_safe(li, tmp, source)
1427 list_move(li, dest);
1428}
1429
f7ba7fe6 1430void
9ee305b7
PS
1431cifs_free_llist(struct list_head *llist)
1432{
1433 struct cifsLockInfo *li, *tmp;
1434 list_for_each_entry_safe(li, tmp, llist, llist) {
1435 cifs_del_lock_waiters(li);
1436 list_del(&li->llist);
1437 kfree(li);
1438 }
1439}
1440
d39a4f71 1441int
6d5786a3
PS
1442cifs_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
1443 unsigned int xid)
9ee305b7
PS
1444{
1445 int rc = 0, stored_rc;
4d61eda8
CIK
1446 static const int types[] = {
1447 LOCKING_ANDX_LARGE_FILES,
1448 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES
1449 };
9ee305b7 1450 unsigned int i;
0013fb4c 1451 unsigned int max_num, num, max_buf;
9ee305b7
PS
1452 LOCKING_ANDX_RANGE *buf, *cur;
1453 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
2b0143b5 1454 struct cifsInodeInfo *cinode = CIFS_I(d_inode(cfile->dentry));
9ee305b7
PS
1455 struct cifsLockInfo *li, *tmp;
1456 __u64 length = 1 + flock->fl_end - flock->fl_start;
1457 struct list_head tmp_llist;
1458
1459 INIT_LIST_HEAD(&tmp_llist);
1460
0013fb4c
PS
1461 /*
1462 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1463 * and check it for zero before using.
1464 */
1465 max_buf = tcon->ses->server->maxBuf;
1466 if (!max_buf)
1467 return -EINVAL;
1468
1469 max_num = (max_buf - sizeof(struct smb_hdr)) /
1470 sizeof(LOCKING_ANDX_RANGE);
4b99d39b 1471 buf = kcalloc(max_num, sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
9ee305b7
PS
1472 if (!buf)
1473 return -ENOMEM;
1474
1b4b55a1 1475 down_write(&cinode->lock_sem);
9ee305b7
PS
1476 for (i = 0; i < 2; i++) {
1477 cur = buf;
1478 num = 0;
f45d3416 1479 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
9ee305b7
PS
1480 if (flock->fl_start > li->offset ||
1481 (flock->fl_start + length) <
1482 (li->offset + li->length))
1483 continue;
1484 if (current->tgid != li->pid)
1485 continue;
9ee305b7
PS
1486 if (types[i] != li->type)
1487 continue;
ea319d57 1488 if (cinode->can_cache_brlcks) {
9ee305b7
PS
1489 /*
1490 * We can cache brlock requests - simply remove
fbd35aca 1491 * a lock from the file's list.
9ee305b7
PS
1492 */
1493 list_del(&li->llist);
1494 cifs_del_lock_waiters(li);
1495 kfree(li);
ea319d57 1496 continue;
9ee305b7 1497 }
ea319d57
PS
1498 cur->Pid = cpu_to_le16(li->pid);
1499 cur->LengthLow = cpu_to_le32((u32)li->length);
1500 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1501 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1502 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1503 /*
1504 * We need to save a lock here to let us add it again to
1505 * the file's list if the unlock range request fails on
1506 * the server.
1507 */
1508 list_move(&li->llist, &tmp_llist);
1509 if (++num == max_num) {
4b4de76e
PS
1510 stored_rc = cifs_lockv(xid, tcon,
1511 cfile->fid.netfid,
ea319d57
PS
1512 li->type, num, 0, buf);
1513 if (stored_rc) {
1514 /*
1515 * We failed on the unlock range
1516 * request - add all locks from the tmp
1517 * list to the head of the file's list.
1518 */
1519 cifs_move_llist(&tmp_llist,
f45d3416 1520 &cfile->llist->locks);
ea319d57
PS
1521 rc = stored_rc;
1522 } else
1523 /*
1524 * The unlock range request succeed -
1525 * free the tmp list.
1526 */
1527 cifs_free_llist(&tmp_llist);
1528 cur = buf;
1529 num = 0;
1530 } else
1531 cur++;
9ee305b7
PS
1532 }
1533 if (num) {
4b4de76e 1534 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
9ee305b7
PS
1535 types[i], num, 0, buf);
1536 if (stored_rc) {
f45d3416
PS
1537 cifs_move_llist(&tmp_llist,
1538 &cfile->llist->locks);
9ee305b7
PS
1539 rc = stored_rc;
1540 } else
1541 cifs_free_llist(&tmp_llist);
1542 }
1543 }
1544
1b4b55a1 1545 up_write(&cinode->lock_sem);
9ee305b7
PS
1546 kfree(buf);
1547 return rc;
1548}
1549
03776f45 1550static int
f45d3416 1551cifs_setlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3
PS
1552 bool wait_flag, bool posix_lck, int lock, int unlock,
1553 unsigned int xid)
03776f45
PS
1554{
1555 int rc = 0;
1556 __u64 length = 1 + flock->fl_end - flock->fl_start;
1557 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1558 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1559 struct TCP_Server_Info *server = tcon->ses->server;
2b0143b5 1560 struct inode *inode = d_inode(cfile->dentry);
03776f45
PS
1561
1562 if (posix_lck) {
08547b03 1563 int posix_lock_type;
4f6bcec9
PS
1564
1565 rc = cifs_posix_lock_set(file, flock);
1566 if (!rc || rc < 0)
1567 return rc;
1568
106dc538 1569 if (type & server->vals->shared_lock_type)
08547b03
SF
1570 posix_lock_type = CIFS_RDLCK;
1571 else
1572 posix_lock_type = CIFS_WRLCK;
50c2f753 1573
03776f45 1574 if (unlock == 1)
beb84dc8 1575 posix_lock_type = CIFS_UNLCK;
7ee1af76 1576
f45d3416 1577 rc = CIFSSMBPosixLock(xid, tcon, cfile->fid.netfid,
3d22462a
JL
1578 hash_lockowner(flock->fl_owner),
1579 flock->fl_start, length,
f45d3416 1580 NULL, posix_lock_type, wait_flag);
03776f45
PS
1581 goto out;
1582 }
7ee1af76 1583
03776f45 1584 if (lock) {
161ebf9f
PS
1585 struct cifsLockInfo *lock;
1586
fbd35aca 1587 lock = cifs_lock_init(flock->fl_start, length, type);
161ebf9f
PS
1588 if (!lock)
1589 return -ENOMEM;
1590
fbd35aca 1591 rc = cifs_lock_add_if(cfile, lock, wait_flag);
21cb2d90 1592 if (rc < 0) {
161ebf9f 1593 kfree(lock);
21cb2d90
PS
1594 return rc;
1595 }
1596 if (!rc)
85160e03
PS
1597 goto out;
1598
63b7d3a4
PS
1599 /*
1600 * Windows 7 server can delay breaking lease from read to None
1601 * if we set a byte-range lock on a file - break it explicitly
1602 * before sending the lock to the server to be sure the next
1603 * read won't conflict with non-overlapted locks due to
1604 * pagereading.
1605 */
18cceb6a
PS
1606 if (!CIFS_CACHE_WRITE(CIFS_I(inode)) &&
1607 CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 1608 cifs_zap_mapping(inode);
f96637be
JP
1609 cifs_dbg(FYI, "Set no oplock for inode=%p due to mand locks\n",
1610 inode);
18cceb6a 1611 CIFS_I(inode)->oplock = 0;
63b7d3a4
PS
1612 }
1613
d39a4f71
PS
1614 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1615 type, 1, 0, wait_flag);
161ebf9f
PS
1616 if (rc) {
1617 kfree(lock);
21cb2d90 1618 return rc;
03776f45 1619 }
161ebf9f 1620
fbd35aca 1621 cifs_lock_add(cfile, lock);
9ee305b7 1622 } else if (unlock)
d39a4f71 1623 rc = server->ops->mand_unlock_range(cfile, flock, xid);
03776f45 1624
03776f45 1625out:
00b8c95b 1626 if (flock->fl_flags & FL_POSIX && !rc)
4f656367 1627 rc = locks_lock_file_wait(file, flock);
03776f45
PS
1628 return rc;
1629}
1630
1631int cifs_lock(struct file *file, int cmd, struct file_lock *flock)
1632{
1633 int rc, xid;
1634 int lock = 0, unlock = 0;
1635 bool wait_flag = false;
1636 bool posix_lck = false;
1637 struct cifs_sb_info *cifs_sb;
1638 struct cifs_tcon *tcon;
1639 struct cifsInodeInfo *cinode;
1640 struct cifsFileInfo *cfile;
1641 __u16 netfid;
04a6aa8a 1642 __u32 type;
03776f45
PS
1643
1644 rc = -EACCES;
6d5786a3 1645 xid = get_xid();
03776f45 1646
f96637be
JP
1647 cifs_dbg(FYI, "Lock parm: 0x%x flockflags: 0x%x flocktype: 0x%x start: %lld end: %lld\n",
1648 cmd, flock->fl_flags, flock->fl_type,
1649 flock->fl_start, flock->fl_end);
03776f45 1650
03776f45
PS
1651 cfile = (struct cifsFileInfo *)file->private_data;
1652 tcon = tlink_tcon(cfile->tlink);
106dc538
PS
1653
1654 cifs_read_flock(flock, &type, &lock, &unlock, &wait_flag,
1655 tcon->ses->server);
1656
7119e220 1657 cifs_sb = CIFS_FILE_SB(file);
4b4de76e 1658 netfid = cfile->fid.netfid;
496ad9aa 1659 cinode = CIFS_I(file_inode(file));
03776f45 1660
29e20f9c 1661 if (cap_unix(tcon->ses) &&
03776f45
PS
1662 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1663 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
1664 posix_lck = true;
1665 /*
1666 * BB add code here to normalize offset and length to account for
1667 * negative length which we can not accept over the wire.
1668 */
1669 if (IS_GETLK(cmd)) {
4f6bcec9 1670 rc = cifs_getlk(file, flock, type, wait_flag, posix_lck, xid);
6d5786a3 1671 free_xid(xid);
03776f45
PS
1672 return rc;
1673 }
1674
1675 if (!lock && !unlock) {
1676 /*
1677 * if no lock or unlock then nothing to do since we do not
1678 * know what it is
1679 */
6d5786a3 1680 free_xid(xid);
03776f45 1681 return -EOPNOTSUPP;
7ee1af76
JA
1682 }
1683
03776f45
PS
1684 rc = cifs_setlk(file, flock, type, wait_flag, posix_lck, lock, unlock,
1685 xid);
6d5786a3 1686 free_xid(xid);
1da177e4
LT
1687 return rc;
1688}
1689
597b027f
JL
1690/*
1691 * update the file size (if needed) after a write. Should be called with
1692 * the inode->i_lock held
1693 */
72432ffc 1694void
fbec9ab9
JL
1695cifs_update_eof(struct cifsInodeInfo *cifsi, loff_t offset,
1696 unsigned int bytes_written)
1697{
1698 loff_t end_of_write = offset + bytes_written;
1699
1700 if (end_of_write > cifsi->server_eof)
1701 cifsi->server_eof = end_of_write;
1702}
1703
ba9ad725
PS
1704static ssize_t
1705cifs_write(struct cifsFileInfo *open_file, __u32 pid, const char *write_data,
1706 size_t write_size, loff_t *offset)
1da177e4
LT
1707{
1708 int rc = 0;
1709 unsigned int bytes_written = 0;
1710 unsigned int total_written;
1711 struct cifs_sb_info *cifs_sb;
ba9ad725
PS
1712 struct cifs_tcon *tcon;
1713 struct TCP_Server_Info *server;
6d5786a3 1714 unsigned int xid;
7da4b49a 1715 struct dentry *dentry = open_file->dentry;
2b0143b5 1716 struct cifsInodeInfo *cifsi = CIFS_I(d_inode(dentry));
fa2989f4 1717 struct cifs_io_parms io_parms;
1da177e4 1718
7da4b49a 1719 cifs_sb = CIFS_SB(dentry->d_sb);
1da177e4 1720
35c265e0
AV
1721 cifs_dbg(FYI, "write %zd bytes to offset %lld of %pd\n",
1722 write_size, *offset, dentry);
1da177e4 1723
ba9ad725
PS
1724 tcon = tlink_tcon(open_file->tlink);
1725 server = tcon->ses->server;
1726
1727 if (!server->ops->sync_write)
1728 return -ENOSYS;
50c2f753 1729
6d5786a3 1730 xid = get_xid();
1da177e4 1731
1da177e4
LT
1732 for (total_written = 0; write_size > total_written;
1733 total_written += bytes_written) {
1734 rc = -EAGAIN;
1735 while (rc == -EAGAIN) {
ca83ce3d
JL
1736 struct kvec iov[2];
1737 unsigned int len;
1738
1da177e4 1739 if (open_file->invalidHandle) {
1da177e4
LT
1740 /* we could deadlock if we called
1741 filemap_fdatawait from here so tell
fb8c4b14 1742 reopen_file not to flush data to
1da177e4 1743 server now */
15886177 1744 rc = cifs_reopen_file(open_file, false);
1da177e4
LT
1745 if (rc != 0)
1746 break;
1747 }
ca83ce3d 1748
2b0143b5 1749 len = min(server->ops->wp_retry_size(d_inode(dentry)),
cb7e9eab 1750 (unsigned int)write_size - total_written);
ca83ce3d
JL
1751 /* iov[0] is reserved for smb header */
1752 iov[1].iov_base = (char *)write_data + total_written;
1753 iov[1].iov_len = len;
fa2989f4 1754 io_parms.pid = pid;
ba9ad725
PS
1755 io_parms.tcon = tcon;
1756 io_parms.offset = *offset;
fa2989f4 1757 io_parms.length = len;
db8b631d
SF
1758 rc = server->ops->sync_write(xid, &open_file->fid,
1759 &io_parms, &bytes_written, iov, 1);
1da177e4
LT
1760 }
1761 if (rc || (bytes_written == 0)) {
1762 if (total_written)
1763 break;
1764 else {
6d5786a3 1765 free_xid(xid);
1da177e4
LT
1766 return rc;
1767 }
fbec9ab9 1768 } else {
2b0143b5 1769 spin_lock(&d_inode(dentry)->i_lock);
ba9ad725 1770 cifs_update_eof(cifsi, *offset, bytes_written);
2b0143b5 1771 spin_unlock(&d_inode(dentry)->i_lock);
ba9ad725 1772 *offset += bytes_written;
fbec9ab9 1773 }
1da177e4
LT
1774 }
1775
ba9ad725 1776 cifs_stats_bytes_written(tcon, total_written);
1da177e4 1777
7da4b49a 1778 if (total_written > 0) {
2b0143b5
DH
1779 spin_lock(&d_inode(dentry)->i_lock);
1780 if (*offset > d_inode(dentry)->i_size)
1781 i_size_write(d_inode(dentry), *offset);
1782 spin_unlock(&d_inode(dentry)->i_lock);
1da177e4 1783 }
2b0143b5 1784 mark_inode_dirty_sync(d_inode(dentry));
6d5786a3 1785 free_xid(xid);
1da177e4
LT
1786 return total_written;
1787}
1788
6508d904
JL
1789struct cifsFileInfo *find_readable_file(struct cifsInodeInfo *cifs_inode,
1790 bool fsuid_only)
630f3f0c
SF
1791{
1792 struct cifsFileInfo *open_file = NULL;
6508d904 1793 struct cifs_sb_info *cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
3afca265 1794 struct cifs_tcon *tcon = cifs_sb_master_tcon(cifs_sb);
6508d904
JL
1795
1796 /* only filter by fsuid on multiuser mounts */
1797 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1798 fsuid_only = false;
630f3f0c 1799
3afca265 1800 spin_lock(&tcon->open_file_lock);
630f3f0c
SF
1801 /* we could simply get the first_list_entry since write-only entries
1802 are always at the end of the list but since the first entry might
1803 have a close pending, we go through the whole list */
1804 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
fef59fd7 1805 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6508d904 1806 continue;
2e396b83 1807 if (OPEN_FMODE(open_file->f_flags) & FMODE_READ) {
630f3f0c
SF
1808 if (!open_file->invalidHandle) {
1809 /* found a good file */
1810 /* lock it so it will not be closed on us */
3afca265
SF
1811 cifsFileInfo_get(open_file);
1812 spin_unlock(&tcon->open_file_lock);
630f3f0c
SF
1813 return open_file;
1814 } /* else might as well continue, and look for
1815 another, or simply have the caller reopen it
1816 again rather than trying to fix this handle */
1817 } else /* write only file */
1818 break; /* write only files are last so must be done */
1819 }
3afca265 1820 spin_unlock(&tcon->open_file_lock);
630f3f0c
SF
1821 return NULL;
1822}
630f3f0c 1823
6508d904
JL
1824struct cifsFileInfo *find_writable_file(struct cifsInodeInfo *cifs_inode,
1825 bool fsuid_only)
6148a742 1826{
2c0c2a08 1827 struct cifsFileInfo *open_file, *inv_file = NULL;
d3892294 1828 struct cifs_sb_info *cifs_sb;
3afca265 1829 struct cifs_tcon *tcon;
2846d386 1830 bool any_available = false;
dd99cd80 1831 int rc;
2c0c2a08 1832 unsigned int refind = 0;
6148a742 1833
60808233
SF
1834 /* Having a null inode here (because mapping->host was set to zero by
1835 the VFS or MM) should not happen but we had reports of on oops (due to
1836 it being zero) during stress testcases so we need to check for it */
1837
fb8c4b14 1838 if (cifs_inode == NULL) {
f96637be 1839 cifs_dbg(VFS, "Null inode passed to cifs_writeable_file\n");
60808233
SF
1840 dump_stack();
1841 return NULL;
1842 }
1843
d3892294 1844 cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
3afca265 1845 tcon = cifs_sb_master_tcon(cifs_sb);
d3892294 1846
6508d904
JL
1847 /* only filter by fsuid on multiuser mounts */
1848 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1849 fsuid_only = false;
1850
3afca265 1851 spin_lock(&tcon->open_file_lock);
9b22b0b7 1852refind_writable:
2c0c2a08 1853 if (refind > MAX_REOPEN_ATT) {
3afca265 1854 spin_unlock(&tcon->open_file_lock);
2c0c2a08
SP
1855 return NULL;
1856 }
6148a742 1857 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
6508d904
JL
1858 if (!any_available && open_file->pid != current->tgid)
1859 continue;
fef59fd7 1860 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6148a742 1861 continue;
2e396b83 1862 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
9b22b0b7
SF
1863 if (!open_file->invalidHandle) {
1864 /* found a good writable file */
3afca265
SF
1865 cifsFileInfo_get(open_file);
1866 spin_unlock(&tcon->open_file_lock);
9b22b0b7 1867 return open_file;
2c0c2a08
SP
1868 } else {
1869 if (!inv_file)
1870 inv_file = open_file;
9b22b0b7 1871 }
6148a742
SF
1872 }
1873 }
2846d386
JL
1874 /* couldn't find useable FH with same pid, try any available */
1875 if (!any_available) {
1876 any_available = true;
1877 goto refind_writable;
1878 }
2c0c2a08
SP
1879
1880 if (inv_file) {
1881 any_available = false;
3afca265 1882 cifsFileInfo_get(inv_file);
2c0c2a08
SP
1883 }
1884
3afca265 1885 spin_unlock(&tcon->open_file_lock);
2c0c2a08
SP
1886
1887 if (inv_file) {
1888 rc = cifs_reopen_file(inv_file, false);
1889 if (!rc)
1890 return inv_file;
1891 else {
3afca265 1892 spin_lock(&tcon->open_file_lock);
2c0c2a08
SP
1893 list_move_tail(&inv_file->flist,
1894 &cifs_inode->openFileList);
3afca265 1895 spin_unlock(&tcon->open_file_lock);
2c0c2a08 1896 cifsFileInfo_put(inv_file);
2c0c2a08 1897 ++refind;
e1e9bda2 1898 inv_file = NULL;
3afca265 1899 spin_lock(&tcon->open_file_lock);
2c0c2a08
SP
1900 goto refind_writable;
1901 }
1902 }
1903
6148a742
SF
1904 return NULL;
1905}
1906
1da177e4
LT
1907static int cifs_partialpagewrite(struct page *page, unsigned from, unsigned to)
1908{
1909 struct address_space *mapping = page->mapping;
09cbfeaf 1910 loff_t offset = (loff_t)page->index << PAGE_SHIFT;
1da177e4
LT
1911 char *write_data;
1912 int rc = -EFAULT;
1913 int bytes_written = 0;
1da177e4 1914 struct inode *inode;
6148a742 1915 struct cifsFileInfo *open_file;
1da177e4
LT
1916
1917 if (!mapping || !mapping->host)
1918 return -EFAULT;
1919
1920 inode = page->mapping->host;
1da177e4
LT
1921
1922 offset += (loff_t)from;
1923 write_data = kmap(page);
1924 write_data += from;
1925
09cbfeaf 1926 if ((to > PAGE_SIZE) || (from > to)) {
1da177e4
LT
1927 kunmap(page);
1928 return -EIO;
1929 }
1930
1931 /* racing with truncate? */
1932 if (offset > mapping->host->i_size) {
1933 kunmap(page);
1934 return 0; /* don't care */
1935 }
1936
1937 /* check to make sure that we are not extending the file */
1938 if (mapping->host->i_size - offset < (loff_t)to)
fb8c4b14 1939 to = (unsigned)(mapping->host->i_size - offset);
1da177e4 1940
6508d904 1941 open_file = find_writable_file(CIFS_I(mapping->host), false);
6148a742 1942 if (open_file) {
fa2989f4
PS
1943 bytes_written = cifs_write(open_file, open_file->pid,
1944 write_data, to - from, &offset);
6ab409b5 1945 cifsFileInfo_put(open_file);
1da177e4 1946 /* Does mm or vfs already set times? */
c2050a45 1947 inode->i_atime = inode->i_mtime = current_time(inode);
bb5a9a04 1948 if ((bytes_written > 0) && (offset))
6148a742 1949 rc = 0;
bb5a9a04
SF
1950 else if (bytes_written < 0)
1951 rc = bytes_written;
6148a742 1952 } else {
f96637be 1953 cifs_dbg(FYI, "No writeable filehandles for inode\n");
1da177e4
LT
1954 rc = -EIO;
1955 }
1956
1957 kunmap(page);
1958 return rc;
1959}
1960
90ac1387
PS
1961static struct cifs_writedata *
1962wdata_alloc_and_fillpages(pgoff_t tofind, struct address_space *mapping,
1963 pgoff_t end, pgoff_t *index,
1964 unsigned int *found_pages)
1965{
90ac1387
PS
1966 struct cifs_writedata *wdata;
1967
1968 wdata = cifs_writedata_alloc((unsigned int)tofind,
1969 cifs_writev_complete);
1970 if (!wdata)
1971 return NULL;
1972
9c19a9cb
JK
1973 *found_pages = find_get_pages_range_tag(mapping, index, end,
1974 PAGECACHE_TAG_DIRTY, tofind, wdata->pages);
90ac1387
PS
1975 return wdata;
1976}
1977
7e48ff82
PS
1978static unsigned int
1979wdata_prepare_pages(struct cifs_writedata *wdata, unsigned int found_pages,
1980 struct address_space *mapping,
1981 struct writeback_control *wbc,
1982 pgoff_t end, pgoff_t *index, pgoff_t *next, bool *done)
1983{
1984 unsigned int nr_pages = 0, i;
1985 struct page *page;
1986
1987 for (i = 0; i < found_pages; i++) {
1988 page = wdata->pages[i];
1989 /*
1990 * At this point we hold neither mapping->tree_lock nor
1991 * lock on the page itself: the page may be truncated or
1992 * invalidated (changing page->mapping to NULL), or even
1993 * swizzled back from swapper_space to tmpfs file
1994 * mapping
1995 */
1996
1997 if (nr_pages == 0)
1998 lock_page(page);
1999 else if (!trylock_page(page))
2000 break;
2001
2002 if (unlikely(page->mapping != mapping)) {
2003 unlock_page(page);
2004 break;
2005 }
2006
2007 if (!wbc->range_cyclic && page->index > end) {
2008 *done = true;
2009 unlock_page(page);
2010 break;
2011 }
2012
2013 if (*next && (page->index != *next)) {
2014 /* Not next consecutive page */
2015 unlock_page(page);
2016 break;
2017 }
2018
2019 if (wbc->sync_mode != WB_SYNC_NONE)
2020 wait_on_page_writeback(page);
2021
2022 if (PageWriteback(page) ||
2023 !clear_page_dirty_for_io(page)) {
2024 unlock_page(page);
2025 break;
2026 }
2027
2028 /*
2029 * This actually clears the dirty bit in the radix tree.
2030 * See cifs_writepage() for more commentary.
2031 */
2032 set_page_writeback(page);
2033 if (page_offset(page) >= i_size_read(mapping->host)) {
2034 *done = true;
2035 unlock_page(page);
2036 end_page_writeback(page);
2037 break;
2038 }
2039
2040 wdata->pages[i] = page;
2041 *next = page->index + 1;
2042 ++nr_pages;
2043 }
2044
2045 /* reset index to refind any pages skipped */
2046 if (nr_pages == 0)
2047 *index = wdata->pages[0]->index + 1;
2048
2049 /* put any pages we aren't going to use */
2050 for (i = nr_pages; i < found_pages; i++) {
09cbfeaf 2051 put_page(wdata->pages[i]);
7e48ff82
PS
2052 wdata->pages[i] = NULL;
2053 }
2054
2055 return nr_pages;
2056}
2057
619aa48e
PS
2058static int
2059wdata_send_pages(struct cifs_writedata *wdata, unsigned int nr_pages,
2060 struct address_space *mapping, struct writeback_control *wbc)
2061{
2062 int rc = 0;
2063 struct TCP_Server_Info *server;
2064 unsigned int i;
2065
2066 wdata->sync_mode = wbc->sync_mode;
2067 wdata->nr_pages = nr_pages;
2068 wdata->offset = page_offset(wdata->pages[0]);
09cbfeaf 2069 wdata->pagesz = PAGE_SIZE;
619aa48e
PS
2070 wdata->tailsz = min(i_size_read(mapping->host) -
2071 page_offset(wdata->pages[nr_pages - 1]),
09cbfeaf
KS
2072 (loff_t)PAGE_SIZE);
2073 wdata->bytes = ((nr_pages - 1) * PAGE_SIZE) + wdata->tailsz;
619aa48e 2074
66231a47
PS
2075 if (wdata->cfile != NULL)
2076 cifsFileInfo_put(wdata->cfile);
2077 wdata->cfile = find_writable_file(CIFS_I(mapping->host), false);
2078 if (!wdata->cfile) {
2079 cifs_dbg(VFS, "No writable handles for inode\n");
2080 rc = -EBADF;
2081 } else {
619aa48e
PS
2082 wdata->pid = wdata->cfile->pid;
2083 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
2084 rc = server->ops->async_writev(wdata, cifs_writedata_release);
66231a47 2085 }
619aa48e
PS
2086
2087 for (i = 0; i < nr_pages; ++i)
2088 unlock_page(wdata->pages[i]);
2089
2090 return rc;
2091}
2092
1da177e4 2093static int cifs_writepages(struct address_space *mapping,
37c0eb46 2094 struct writeback_control *wbc)
1da177e4 2095{
c3d17b63 2096 struct cifs_sb_info *cifs_sb = CIFS_SB(mapping->host->i_sb);
cb7e9eab 2097 struct TCP_Server_Info *server;
c3d17b63
JL
2098 bool done = false, scanned = false, range_whole = false;
2099 pgoff_t end, index;
2100 struct cifs_writedata *wdata;
37c0eb46 2101 int rc = 0;
50c2f753 2102
37c0eb46 2103 /*
c3d17b63 2104 * If wsize is smaller than the page cache size, default to writing
37c0eb46
SF
2105 * one page at a time via cifs_writepage
2106 */
09cbfeaf 2107 if (cifs_sb->wsize < PAGE_SIZE)
37c0eb46
SF
2108 return generic_writepages(mapping, wbc);
2109
111ebb6e 2110 if (wbc->range_cyclic) {
37c0eb46 2111 index = mapping->writeback_index; /* Start from prev offset */
111ebb6e
OH
2112 end = -1;
2113 } else {
09cbfeaf
KS
2114 index = wbc->range_start >> PAGE_SHIFT;
2115 end = wbc->range_end >> PAGE_SHIFT;
111ebb6e 2116 if (wbc->range_start == 0 && wbc->range_end == LLONG_MAX)
c3d17b63
JL
2117 range_whole = true;
2118 scanned = true;
37c0eb46 2119 }
cb7e9eab 2120 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
37c0eb46 2121retry:
c3d17b63 2122 while (!done && index <= end) {
cb7e9eab 2123 unsigned int i, nr_pages, found_pages, wsize, credits;
66231a47 2124 pgoff_t next = 0, tofind, saved_index = index;
c3d17b63 2125
cb7e9eab
PS
2126 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2127 &wsize, &credits);
2128 if (rc)
2129 break;
c3d17b63 2130
09cbfeaf 2131 tofind = min((wsize / PAGE_SIZE) - 1, end - index) + 1;
c3d17b63 2132
90ac1387
PS
2133 wdata = wdata_alloc_and_fillpages(tofind, mapping, end, &index,
2134 &found_pages);
c3d17b63
JL
2135 if (!wdata) {
2136 rc = -ENOMEM;
cb7e9eab 2137 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2138 break;
2139 }
2140
c3d17b63
JL
2141 if (found_pages == 0) {
2142 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2143 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2144 break;
2145 }
2146
7e48ff82
PS
2147 nr_pages = wdata_prepare_pages(wdata, found_pages, mapping, wbc,
2148 end, &index, &next, &done);
37c0eb46 2149
c3d17b63
JL
2150 /* nothing to write? */
2151 if (nr_pages == 0) {
2152 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2153 add_credits_and_wake_if(server, credits, 0);
c3d17b63 2154 continue;
37c0eb46 2155 }
fbec9ab9 2156
cb7e9eab 2157 wdata->credits = credits;
941b853d 2158
619aa48e 2159 rc = wdata_send_pages(wdata, nr_pages, mapping, wbc);
f3983c21 2160
c3d17b63
JL
2161 /* send failure -- clean up the mess */
2162 if (rc != 0) {
cb7e9eab 2163 add_credits_and_wake_if(server, wdata->credits, 0);
c3d17b63 2164 for (i = 0; i < nr_pages; ++i) {
941b853d 2165 if (rc == -EAGAIN)
c3d17b63
JL
2166 redirty_page_for_writepage(wbc,
2167 wdata->pages[i]);
2168 else
2169 SetPageError(wdata->pages[i]);
2170 end_page_writeback(wdata->pages[i]);
09cbfeaf 2171 put_page(wdata->pages[i]);
37c0eb46 2172 }
941b853d
JL
2173 if (rc != -EAGAIN)
2174 mapping_set_error(mapping, rc);
c3d17b63
JL
2175 }
2176 kref_put(&wdata->refcount, cifs_writedata_release);
941b853d 2177
66231a47
PS
2178 if (wbc->sync_mode == WB_SYNC_ALL && rc == -EAGAIN) {
2179 index = saved_index;
2180 continue;
2181 }
2182
c3d17b63
JL
2183 wbc->nr_to_write -= nr_pages;
2184 if (wbc->nr_to_write <= 0)
2185 done = true;
b066a48c 2186
c3d17b63 2187 index = next;
37c0eb46 2188 }
c3d17b63 2189
37c0eb46
SF
2190 if (!scanned && !done) {
2191 /*
2192 * We hit the last page and there is more work to be done: wrap
2193 * back to the start of the file
2194 */
c3d17b63 2195 scanned = true;
37c0eb46
SF
2196 index = 0;
2197 goto retry;
2198 }
c3d17b63 2199
111ebb6e 2200 if (wbc->range_cyclic || (range_whole && wbc->nr_to_write > 0))
37c0eb46
SF
2201 mapping->writeback_index = index;
2202
1da177e4
LT
2203 return rc;
2204}
1da177e4 2205
9ad1506b
PS
2206static int
2207cifs_writepage_locked(struct page *page, struct writeback_control *wbc)
1da177e4 2208{
9ad1506b 2209 int rc;
6d5786a3 2210 unsigned int xid;
1da177e4 2211
6d5786a3 2212 xid = get_xid();
1da177e4 2213/* BB add check for wbc flags */
09cbfeaf 2214 get_page(page);
ad7a2926 2215 if (!PageUptodate(page))
f96637be 2216 cifs_dbg(FYI, "ppw - page not up to date\n");
cb876f45
LT
2217
2218 /*
2219 * Set the "writeback" flag, and clear "dirty" in the radix tree.
2220 *
2221 * A writepage() implementation always needs to do either this,
2222 * or re-dirty the page with "redirty_page_for_writepage()" in
2223 * the case of a failure.
2224 *
2225 * Just unlocking the page will cause the radix tree tag-bits
2226 * to fail to update with the state of the page correctly.
2227 */
fb8c4b14 2228 set_page_writeback(page);
9ad1506b 2229retry_write:
09cbfeaf 2230 rc = cifs_partialpagewrite(page, 0, PAGE_SIZE);
97b37f24
JL
2231 if (rc == -EAGAIN) {
2232 if (wbc->sync_mode == WB_SYNC_ALL)
2233 goto retry_write;
9ad1506b 2234 redirty_page_for_writepage(wbc, page);
97b37f24 2235 } else if (rc != 0) {
9ad1506b 2236 SetPageError(page);
97b37f24
JL
2237 mapping_set_error(page->mapping, rc);
2238 } else {
9ad1506b 2239 SetPageUptodate(page);
97b37f24 2240 }
cb876f45 2241 end_page_writeback(page);
09cbfeaf 2242 put_page(page);
6d5786a3 2243 free_xid(xid);
1da177e4
LT
2244 return rc;
2245}
2246
9ad1506b
PS
2247static int cifs_writepage(struct page *page, struct writeback_control *wbc)
2248{
2249 int rc = cifs_writepage_locked(page, wbc);
2250 unlock_page(page);
2251 return rc;
2252}
2253
d9414774
NP
2254static int cifs_write_end(struct file *file, struct address_space *mapping,
2255 loff_t pos, unsigned len, unsigned copied,
2256 struct page *page, void *fsdata)
1da177e4 2257{
d9414774
NP
2258 int rc;
2259 struct inode *inode = mapping->host;
d4ffff1f
PS
2260 struct cifsFileInfo *cfile = file->private_data;
2261 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2262 __u32 pid;
2263
2264 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2265 pid = cfile->pid;
2266 else
2267 pid = current->tgid;
1da177e4 2268
f96637be 2269 cifs_dbg(FYI, "write_end for page %p from pos %lld with %d bytes\n",
b6b38f70 2270 page, pos, copied);
d9414774 2271
a98ee8c1
JL
2272 if (PageChecked(page)) {
2273 if (copied == len)
2274 SetPageUptodate(page);
2275 ClearPageChecked(page);
09cbfeaf 2276 } else if (!PageUptodate(page) && copied == PAGE_SIZE)
d9414774 2277 SetPageUptodate(page);
ad7a2926 2278
1da177e4 2279 if (!PageUptodate(page)) {
d9414774 2280 char *page_data;
09cbfeaf 2281 unsigned offset = pos & (PAGE_SIZE - 1);
6d5786a3 2282 unsigned int xid;
d9414774 2283
6d5786a3 2284 xid = get_xid();
1da177e4
LT
2285 /* this is probably better than directly calling
2286 partialpage_write since in this function the file handle is
2287 known which we might as well leverage */
2288 /* BB check if anything else missing out of ppw
2289 such as updating last write time */
2290 page_data = kmap(page);
d4ffff1f 2291 rc = cifs_write(cfile, pid, page_data + offset, copied, &pos);
d9414774 2292 /* if (rc < 0) should we set writebehind rc? */
1da177e4 2293 kunmap(page);
d9414774 2294
6d5786a3 2295 free_xid(xid);
fb8c4b14 2296 } else {
d9414774
NP
2297 rc = copied;
2298 pos += copied;
ca8aa29c 2299 set_page_dirty(page);
1da177e4
LT
2300 }
2301
d9414774
NP
2302 if (rc > 0) {
2303 spin_lock(&inode->i_lock);
2304 if (pos > inode->i_size)
2305 i_size_write(inode, pos);
2306 spin_unlock(&inode->i_lock);
2307 }
2308
2309 unlock_page(page);
09cbfeaf 2310 put_page(page);
d9414774 2311
1da177e4
LT
2312 return rc;
2313}
2314
02c24a82
JB
2315int cifs_strict_fsync(struct file *file, loff_t start, loff_t end,
2316 int datasync)
1da177e4 2317{
6d5786a3 2318 unsigned int xid;
1da177e4 2319 int rc = 0;
96daf2b0 2320 struct cifs_tcon *tcon;
1d8c4c00 2321 struct TCP_Server_Info *server;
c21dfb69 2322 struct cifsFileInfo *smbfile = file->private_data;
496ad9aa 2323 struct inode *inode = file_inode(file);
8be7e6ba 2324 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 2325
3b49c9a1 2326 rc = file_write_and_wait_range(file, start, end);
02c24a82
JB
2327 if (rc)
2328 return rc;
5955102c 2329 inode_lock(inode);
02c24a82 2330
6d5786a3 2331 xid = get_xid();
1da177e4 2332
35c265e0
AV
2333 cifs_dbg(FYI, "Sync file - name: %pD datasync: 0x%x\n",
2334 file, datasync);
50c2f753 2335
18cceb6a 2336 if (!CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 2337 rc = cifs_zap_mapping(inode);
6feb9891 2338 if (rc) {
f96637be 2339 cifs_dbg(FYI, "rc: %d during invalidate phase\n", rc);
6feb9891
PS
2340 rc = 0; /* don't care about it in fsync */
2341 }
2342 }
eb4b756b 2343
8be7e6ba 2344 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2345 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2346 server = tcon->ses->server;
2347 if (server->ops->flush)
2348 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2349 else
2350 rc = -ENOSYS;
2351 }
8be7e6ba 2352
6d5786a3 2353 free_xid(xid);
5955102c 2354 inode_unlock(inode);
8be7e6ba
PS
2355 return rc;
2356}
2357
02c24a82 2358int cifs_fsync(struct file *file, loff_t start, loff_t end, int datasync)
8be7e6ba 2359{
6d5786a3 2360 unsigned int xid;
8be7e6ba 2361 int rc = 0;
96daf2b0 2362 struct cifs_tcon *tcon;
1d8c4c00 2363 struct TCP_Server_Info *server;
8be7e6ba 2364 struct cifsFileInfo *smbfile = file->private_data;
7119e220 2365 struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file);
02c24a82
JB
2366 struct inode *inode = file->f_mapping->host;
2367
3b49c9a1 2368 rc = file_write_and_wait_range(file, start, end);
02c24a82
JB
2369 if (rc)
2370 return rc;
5955102c 2371 inode_lock(inode);
8be7e6ba 2372
6d5786a3 2373 xid = get_xid();
8be7e6ba 2374
35c265e0
AV
2375 cifs_dbg(FYI, "Sync file - name: %pD datasync: 0x%x\n",
2376 file, datasync);
8be7e6ba
PS
2377
2378 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2379 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2380 server = tcon->ses->server;
2381 if (server->ops->flush)
2382 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2383 else
2384 rc = -ENOSYS;
2385 }
b298f223 2386
6d5786a3 2387 free_xid(xid);
5955102c 2388 inode_unlock(inode);
1da177e4
LT
2389 return rc;
2390}
2391
1da177e4
LT
2392/*
2393 * As file closes, flush all cached write data for this inode checking
2394 * for write behind errors.
2395 */
75e1fcc0 2396int cifs_flush(struct file *file, fl_owner_t id)
1da177e4 2397{
496ad9aa 2398 struct inode *inode = file_inode(file);
1da177e4
LT
2399 int rc = 0;
2400
eb4b756b 2401 if (file->f_mode & FMODE_WRITE)
d3f1322a 2402 rc = filemap_write_and_wait(inode->i_mapping);
50c2f753 2403
f96637be 2404 cifs_dbg(FYI, "Flush inode %p file %p rc %d\n", inode, file, rc);
1da177e4
LT
2405
2406 return rc;
2407}
2408
72432ffc
PS
2409static int
2410cifs_write_allocate_pages(struct page **pages, unsigned long num_pages)
2411{
2412 int rc = 0;
2413 unsigned long i;
2414
2415 for (i = 0; i < num_pages; i++) {
e94f7ba1 2416 pages[i] = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
72432ffc
PS
2417 if (!pages[i]) {
2418 /*
2419 * save number of pages we have already allocated and
2420 * return with ENOMEM error
2421 */
2422 num_pages = i;
2423 rc = -ENOMEM;
e94f7ba1 2424 break;
72432ffc
PS
2425 }
2426 }
2427
e94f7ba1
JL
2428 if (rc) {
2429 for (i = 0; i < num_pages; i++)
2430 put_page(pages[i]);
2431 }
72432ffc
PS
2432 return rc;
2433}
2434
2435static inline
2436size_t get_numpages(const size_t wsize, const size_t len, size_t *cur_len)
2437{
2438 size_t num_pages;
2439 size_t clen;
2440
2441 clen = min_t(const size_t, len, wsize);
a7103b99 2442 num_pages = DIV_ROUND_UP(clen, PAGE_SIZE);
72432ffc
PS
2443
2444 if (cur_len)
2445 *cur_len = clen;
2446
2447 return num_pages;
2448}
2449
da82f7e7 2450static void
4a5c80d7 2451cifs_uncached_writedata_release(struct kref *refcount)
da82f7e7
JL
2452{
2453 int i;
4a5c80d7
SF
2454 struct cifs_writedata *wdata = container_of(refcount,
2455 struct cifs_writedata, refcount);
2456
c610c4b6 2457 kref_put(&wdata->ctx->refcount, cifs_aio_ctx_release);
4a5c80d7
SF
2458 for (i = 0; i < wdata->nr_pages; i++)
2459 put_page(wdata->pages[i]);
2460 cifs_writedata_release(refcount);
2461}
2462
c610c4b6
PS
2463static void collect_uncached_write_data(struct cifs_aio_ctx *ctx);
2464
4a5c80d7
SF
2465static void
2466cifs_uncached_writev_complete(struct work_struct *work)
2467{
da82f7e7
JL
2468 struct cifs_writedata *wdata = container_of(work,
2469 struct cifs_writedata, work);
2b0143b5 2470 struct inode *inode = d_inode(wdata->cfile->dentry);
da82f7e7
JL
2471 struct cifsInodeInfo *cifsi = CIFS_I(inode);
2472
2473 spin_lock(&inode->i_lock);
2474 cifs_update_eof(cifsi, wdata->offset, wdata->bytes);
2475 if (cifsi->server_eof > inode->i_size)
2476 i_size_write(inode, cifsi->server_eof);
2477 spin_unlock(&inode->i_lock);
2478
2479 complete(&wdata->done);
c610c4b6
PS
2480 collect_uncached_write_data(wdata->ctx);
2481 /* the below call can possibly free the last ref to aio ctx */
4a5c80d7 2482 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
da82f7e7
JL
2483}
2484
da82f7e7 2485static int
66386c08
PS
2486wdata_fill_from_iovec(struct cifs_writedata *wdata, struct iov_iter *from,
2487 size_t *len, unsigned long *num_pages)
da82f7e7 2488{
66386c08
PS
2489 size_t save_len, copied, bytes, cur_len = *len;
2490 unsigned long i, nr_pages = *num_pages;
c9de5c80 2491
66386c08
PS
2492 save_len = cur_len;
2493 for (i = 0; i < nr_pages; i++) {
2494 bytes = min_t(const size_t, cur_len, PAGE_SIZE);
2495 copied = copy_page_from_iter(wdata->pages[i], 0, bytes, from);
2496 cur_len -= copied;
2497 /*
2498 * If we didn't copy as much as we expected, then that
2499 * may mean we trod into an unmapped area. Stop copying
2500 * at that point. On the next pass through the big
2501 * loop, we'll likely end up getting a zero-length
2502 * write and bailing out of it.
2503 */
2504 if (copied < bytes)
2505 break;
2506 }
2507 cur_len = save_len - cur_len;
2508 *len = cur_len;
da82f7e7 2509
66386c08
PS
2510 /*
2511 * If we have no data to send, then that probably means that
2512 * the copy above failed altogether. That's most likely because
2513 * the address in the iovec was bogus. Return -EFAULT and let
2514 * the caller free anything we allocated and bail out.
2515 */
2516 if (!cur_len)
2517 return -EFAULT;
da82f7e7 2518
66386c08
PS
2519 /*
2520 * i + 1 now represents the number of pages we actually used in
2521 * the copy phase above.
2522 */
2523 *num_pages = i + 1;
2524 return 0;
da82f7e7
JL
2525}
2526
43de94ea
PS
2527static int
2528cifs_write_from_iter(loff_t offset, size_t len, struct iov_iter *from,
2529 struct cifsFileInfo *open_file,
c610c4b6
PS
2530 struct cifs_sb_info *cifs_sb, struct list_head *wdata_list,
2531 struct cifs_aio_ctx *ctx)
72432ffc 2532{
43de94ea
PS
2533 int rc = 0;
2534 size_t cur_len;
66386c08 2535 unsigned long nr_pages, num_pages, i;
43de94ea 2536 struct cifs_writedata *wdata;
fc56b983 2537 struct iov_iter saved_from = *from;
6ec0b01b 2538 loff_t saved_offset = offset;
da82f7e7 2539 pid_t pid;
6ec0b01b 2540 struct TCP_Server_Info *server;
d4ffff1f
PS
2541
2542 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2543 pid = open_file->pid;
2544 else
2545 pid = current->tgid;
2546
6ec0b01b 2547 server = tlink_tcon(open_file->tlink)->ses->server;
6ec0b01b 2548
72432ffc 2549 do {
cb7e9eab
PS
2550 unsigned int wsize, credits;
2551
2552 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2553 &wsize, &credits);
2554 if (rc)
2555 break;
da82f7e7 2556
cb7e9eab 2557 nr_pages = get_numpages(wsize, len, &cur_len);
da82f7e7
JL
2558 wdata = cifs_writedata_alloc(nr_pages,
2559 cifs_uncached_writev_complete);
2560 if (!wdata) {
2561 rc = -ENOMEM;
cb7e9eab 2562 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2563 break;
2564 }
2565
2566 rc = cifs_write_allocate_pages(wdata->pages, nr_pages);
2567 if (rc) {
2568 kfree(wdata);
cb7e9eab 2569 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2570 break;
2571 }
2572
66386c08
PS
2573 num_pages = nr_pages;
2574 rc = wdata_fill_from_iovec(wdata, from, &cur_len, &num_pages);
2575 if (rc) {
5d81de8e
JL
2576 for (i = 0; i < nr_pages; i++)
2577 put_page(wdata->pages[i]);
2578 kfree(wdata);
cb7e9eab 2579 add_credits_and_wake_if(server, credits, 0);
5d81de8e
JL
2580 break;
2581 }
2582
2583 /*
66386c08
PS
2584 * Bring nr_pages down to the number of pages we actually used,
2585 * and free any pages that we didn't use.
5d81de8e 2586 */
66386c08 2587 for ( ; nr_pages > num_pages; nr_pages--)
5d81de8e
JL
2588 put_page(wdata->pages[nr_pages - 1]);
2589
da82f7e7
JL
2590 wdata->sync_mode = WB_SYNC_ALL;
2591 wdata->nr_pages = nr_pages;
2592 wdata->offset = (__u64)offset;
2593 wdata->cfile = cifsFileInfo_get(open_file);
2594 wdata->pid = pid;
2595 wdata->bytes = cur_len;
eddb079d
JL
2596 wdata->pagesz = PAGE_SIZE;
2597 wdata->tailsz = cur_len - ((nr_pages - 1) * PAGE_SIZE);
cb7e9eab 2598 wdata->credits = credits;
c610c4b6
PS
2599 wdata->ctx = ctx;
2600 kref_get(&ctx->refcount);
6ec0b01b
PS
2601
2602 if (!wdata->cfile->invalidHandle ||
1fa839b4 2603 !(rc = cifs_reopen_file(wdata->cfile, false)))
6ec0b01b
PS
2604 rc = server->ops->async_writev(wdata,
2605 cifs_uncached_writedata_release);
da82f7e7 2606 if (rc) {
cb7e9eab 2607 add_credits_and_wake_if(server, wdata->credits, 0);
4a5c80d7
SF
2608 kref_put(&wdata->refcount,
2609 cifs_uncached_writedata_release);
6ec0b01b 2610 if (rc == -EAGAIN) {
fc56b983 2611 *from = saved_from;
6ec0b01b
PS
2612 iov_iter_advance(from, offset - saved_offset);
2613 continue;
2614 }
72432ffc
PS
2615 break;
2616 }
2617
43de94ea 2618 list_add_tail(&wdata->list, wdata_list);
da82f7e7
JL
2619 offset += cur_len;
2620 len -= cur_len;
72432ffc
PS
2621 } while (len > 0);
2622
43de94ea
PS
2623 return rc;
2624}
2625
c610c4b6 2626static void collect_uncached_write_data(struct cifs_aio_ctx *ctx)
43de94ea 2627{
c610c4b6 2628 struct cifs_writedata *wdata, *tmp;
43de94ea
PS
2629 struct cifs_tcon *tcon;
2630 struct cifs_sb_info *cifs_sb;
c610c4b6
PS
2631 struct dentry *dentry = ctx->cfile->dentry;
2632 unsigned int i;
43de94ea
PS
2633 int rc;
2634
c610c4b6
PS
2635 tcon = tlink_tcon(ctx->cfile->tlink);
2636 cifs_sb = CIFS_SB(dentry->d_sb);
43de94ea 2637
c610c4b6 2638 mutex_lock(&ctx->aio_mutex);
43de94ea 2639
c610c4b6
PS
2640 if (list_empty(&ctx->list)) {
2641 mutex_unlock(&ctx->aio_mutex);
2642 return;
2643 }
da82f7e7 2644
c610c4b6 2645 rc = ctx->rc;
da82f7e7
JL
2646 /*
2647 * Wait for and collect replies for any successful sends in order of
c610c4b6
PS
2648 * increasing offset. Once an error is hit, then return without waiting
2649 * for any more replies.
da82f7e7
JL
2650 */
2651restart_loop:
c610c4b6 2652 list_for_each_entry_safe(wdata, tmp, &ctx->list, list) {
da82f7e7 2653 if (!rc) {
c610c4b6
PS
2654 if (!try_wait_for_completion(&wdata->done)) {
2655 mutex_unlock(&ctx->aio_mutex);
2656 return;
2657 }
2658
2659 if (wdata->result)
da82f7e7
JL
2660 rc = wdata->result;
2661 else
c610c4b6 2662 ctx->total_len += wdata->bytes;
da82f7e7
JL
2663
2664 /* resend call if it's a retryable error */
2665 if (rc == -EAGAIN) {
6ec0b01b 2666 struct list_head tmp_list;
c610c4b6 2667 struct iov_iter tmp_from = ctx->iter;
6ec0b01b
PS
2668
2669 INIT_LIST_HEAD(&tmp_list);
2670 list_del_init(&wdata->list);
2671
6ec0b01b 2672 iov_iter_advance(&tmp_from,
c610c4b6 2673 wdata->offset - ctx->pos);
6ec0b01b
PS
2674
2675 rc = cifs_write_from_iter(wdata->offset,
2676 wdata->bytes, &tmp_from,
c610c4b6
PS
2677 ctx->cfile, cifs_sb, &tmp_list,
2678 ctx);
6ec0b01b 2679
c610c4b6 2680 list_splice(&tmp_list, &ctx->list);
6ec0b01b
PS
2681
2682 kref_put(&wdata->refcount,
2683 cifs_uncached_writedata_release);
da82f7e7
JL
2684 goto restart_loop;
2685 }
2686 }
2687 list_del_init(&wdata->list);
4a5c80d7 2688 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
72432ffc
PS
2689 }
2690
c610c4b6
PS
2691 for (i = 0; i < ctx->npages; i++)
2692 put_page(ctx->bv[i].bv_page);
2693
2694 cifs_stats_bytes_written(tcon, ctx->total_len);
2695 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(dentry->d_inode)->flags);
2696
2697 ctx->rc = (rc == 0) ? ctx->total_len : rc;
2698
2699 mutex_unlock(&ctx->aio_mutex);
2700
2701 if (ctx->iocb && ctx->iocb->ki_complete)
2702 ctx->iocb->ki_complete(ctx->iocb, ctx->rc, 0);
2703 else
2704 complete(&ctx->done);
2705}
2706
2707ssize_t cifs_user_writev(struct kiocb *iocb, struct iov_iter *from)
2708{
2709 struct file *file = iocb->ki_filp;
2710 ssize_t total_written = 0;
2711 struct cifsFileInfo *cfile;
2712 struct cifs_tcon *tcon;
2713 struct cifs_sb_info *cifs_sb;
2714 struct cifs_aio_ctx *ctx;
2715 struct iov_iter saved_from = *from;
2716 int rc;
2717
2718 /*
2719 * BB - optimize the way when signing is disabled. We can drop this
2720 * extra memory-to-memory copying and use iovec buffers for constructing
2721 * write request.
2722 */
2723
2724 rc = generic_write_checks(iocb, from);
2725 if (rc <= 0)
2726 return rc;
2727
2728 cifs_sb = CIFS_FILE_SB(file);
2729 cfile = file->private_data;
2730 tcon = tlink_tcon(cfile->tlink);
2731
2732 if (!tcon->ses->server->ops->async_writev)
2733 return -ENOSYS;
2734
2735 ctx = cifs_aio_ctx_alloc();
2736 if (!ctx)
2737 return -ENOMEM;
2738
2739 ctx->cfile = cifsFileInfo_get(cfile);
2740
2741 if (!is_sync_kiocb(iocb))
2742 ctx->iocb = iocb;
2743
2744 ctx->pos = iocb->ki_pos;
2745
2746 rc = setup_aio_ctx_iter(ctx, from, WRITE);
2747 if (rc) {
2748 kref_put(&ctx->refcount, cifs_aio_ctx_release);
2749 return rc;
2750 }
2751
2752 /* grab a lock here due to read response handlers can access ctx */
2753 mutex_lock(&ctx->aio_mutex);
2754
2755 rc = cifs_write_from_iter(iocb->ki_pos, ctx->len, &saved_from,
2756 cfile, cifs_sb, &ctx->list, ctx);
2757
2758 /*
2759 * If at least one write was successfully sent, then discard any rc
2760 * value from the later writes. If the other write succeeds, then
2761 * we'll end up returning whatever was written. If it fails, then
2762 * we'll get a new rc value from that.
2763 */
2764 if (!list_empty(&ctx->list))
2765 rc = 0;
2766
2767 mutex_unlock(&ctx->aio_mutex);
2768
2769 if (rc) {
2770 kref_put(&ctx->refcount, cifs_aio_ctx_release);
2771 return rc;
2772 }
2773
2774 if (!is_sync_kiocb(iocb)) {
2775 kref_put(&ctx->refcount, cifs_aio_ctx_release);
2776 return -EIOCBQUEUED;
2777 }
2778
2779 rc = wait_for_completion_killable(&ctx->done);
2780 if (rc) {
2781 mutex_lock(&ctx->aio_mutex);
2782 ctx->rc = rc = -EINTR;
2783 total_written = ctx->total_len;
2784 mutex_unlock(&ctx->aio_mutex);
2785 } else {
2786 rc = ctx->rc;
2787 total_written = ctx->total_len;
2788 }
2789
2790 kref_put(&ctx->refcount, cifs_aio_ctx_release);
2791
e9d1593d
AV
2792 if (unlikely(!total_written))
2793 return rc;
72432ffc 2794
e9d1593d 2795 iocb->ki_pos += total_written;
e9d1593d 2796 return total_written;
72432ffc
PS
2797}
2798
579f9053 2799static ssize_t
3dae8750 2800cifs_writev(struct kiocb *iocb, struct iov_iter *from)
72432ffc 2801{
579f9053
PS
2802 struct file *file = iocb->ki_filp;
2803 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
2804 struct inode *inode = file->f_mapping->host;
2805 struct cifsInodeInfo *cinode = CIFS_I(inode);
2806 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
5f380c7f 2807 ssize_t rc;
72432ffc 2808
966681c9 2809 inode_lock(inode);
579f9053
PS
2810 /*
2811 * We need to hold the sem to be sure nobody modifies lock list
2812 * with a brlock that prevents writing.
2813 */
2814 down_read(&cinode->lock_sem);
5f380c7f 2815
3309dd04
AV
2816 rc = generic_write_checks(iocb, from);
2817 if (rc <= 0)
5f380c7f
AV
2818 goto out;
2819
5f380c7f 2820 if (!cifs_find_lock_conflict(cfile, iocb->ki_pos, iov_iter_count(from),
579f9053 2821 server->vals->exclusive_lock_type, NULL,
5f380c7f 2822 CIFS_WRITE_OP))
3dae8750 2823 rc = __generic_file_write_iter(iocb, from);
5f380c7f
AV
2824 else
2825 rc = -EACCES;
2826out:
966681c9 2827 up_read(&cinode->lock_sem);
5955102c 2828 inode_unlock(inode);
19dfc1f5 2829
e2592217
CH
2830 if (rc > 0)
2831 rc = generic_write_sync(iocb, rc);
579f9053
PS
2832 return rc;
2833}
2834
2835ssize_t
3dae8750 2836cifs_strict_writev(struct kiocb *iocb, struct iov_iter *from)
579f9053 2837{
496ad9aa 2838 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
2839 struct cifsInodeInfo *cinode = CIFS_I(inode);
2840 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
2841 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
2842 iocb->ki_filp->private_data;
2843 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
88cf75aa 2844 ssize_t written;
ca8aa29c 2845
c11f1df5
SP
2846 written = cifs_get_writer(cinode);
2847 if (written)
2848 return written;
2849
18cceb6a 2850 if (CIFS_CACHE_WRITE(cinode)) {
88cf75aa
PS
2851 if (cap_unix(tcon->ses) &&
2852 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability))
c11f1df5 2853 && ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0)) {
3dae8750 2854 written = generic_file_write_iter(iocb, from);
c11f1df5
SP
2855 goto out;
2856 }
3dae8750 2857 written = cifs_writev(iocb, from);
c11f1df5 2858 goto out;
25078105 2859 }
25078105 2860 /*
ca8aa29c
PS
2861 * For non-oplocked files in strict cache mode we need to write the data
2862 * to the server exactly from the pos to pos+len-1 rather than flush all
2863 * affected pages because it may cause a error with mandatory locks on
2864 * these pages but not on the region from pos to ppos+len-1.
72432ffc 2865 */
3dae8750 2866 written = cifs_user_writev(iocb, from);
18cceb6a 2867 if (written > 0 && CIFS_CACHE_READ(cinode)) {
88cf75aa
PS
2868 /*
2869 * Windows 7 server can delay breaking level2 oplock if a write
2870 * request comes - break it on the client to prevent reading
2871 * an old data.
2872 */
4f73c7d3 2873 cifs_zap_mapping(inode);
f96637be
JP
2874 cifs_dbg(FYI, "Set no oplock for inode=%p after a write operation\n",
2875 inode);
18cceb6a 2876 cinode->oplock = 0;
88cf75aa 2877 }
c11f1df5
SP
2878out:
2879 cifs_put_writer(cinode);
88cf75aa 2880 return written;
72432ffc
PS
2881}
2882
0471ca3f 2883static struct cifs_readdata *
f4e49cd2 2884cifs_readdata_alloc(unsigned int nr_pages, work_func_t complete)
0471ca3f
JL
2885{
2886 struct cifs_readdata *rdata;
f4e49cd2 2887
c5fab6f4
JL
2888 rdata = kzalloc(sizeof(*rdata) + (sizeof(struct page *) * nr_pages),
2889 GFP_KERNEL);
0471ca3f 2890 if (rdata != NULL) {
6993f74a 2891 kref_init(&rdata->refcount);
1c892549
JL
2892 INIT_LIST_HEAD(&rdata->list);
2893 init_completion(&rdata->done);
0471ca3f 2894 INIT_WORK(&rdata->work, complete);
0471ca3f 2895 }
f4e49cd2 2896
0471ca3f
JL
2897 return rdata;
2898}
2899
6993f74a
JL
2900void
2901cifs_readdata_release(struct kref *refcount)
0471ca3f 2902{
6993f74a
JL
2903 struct cifs_readdata *rdata = container_of(refcount,
2904 struct cifs_readdata, refcount);
2905
2906 if (rdata->cfile)
2907 cifsFileInfo_put(rdata->cfile);
2908
0471ca3f
JL
2909 kfree(rdata);
2910}
2911
1c892549 2912static int
c5fab6f4 2913cifs_read_allocate_pages(struct cifs_readdata *rdata, unsigned int nr_pages)
1c892549
JL
2914{
2915 int rc = 0;
c5fab6f4 2916 struct page *page;
1c892549
JL
2917 unsigned int i;
2918
c5fab6f4 2919 for (i = 0; i < nr_pages; i++) {
1c892549
JL
2920 page = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
2921 if (!page) {
2922 rc = -ENOMEM;
2923 break;
2924 }
c5fab6f4 2925 rdata->pages[i] = page;
1c892549
JL
2926 }
2927
2928 if (rc) {
c5fab6f4
JL
2929 for (i = 0; i < nr_pages; i++) {
2930 put_page(rdata->pages[i]);
2931 rdata->pages[i] = NULL;
1c892549
JL
2932 }
2933 }
2934 return rc;
2935}
2936
2937static void
2938cifs_uncached_readdata_release(struct kref *refcount)
2939{
1c892549
JL
2940 struct cifs_readdata *rdata = container_of(refcount,
2941 struct cifs_readdata, refcount);
c5fab6f4 2942 unsigned int i;
1c892549 2943
6685c5e2 2944 kref_put(&rdata->ctx->refcount, cifs_aio_ctx_release);
c5fab6f4
JL
2945 for (i = 0; i < rdata->nr_pages; i++) {
2946 put_page(rdata->pages[i]);
2947 rdata->pages[i] = NULL;
1c892549
JL
2948 }
2949 cifs_readdata_release(refcount);
2950}
2951
1c892549
JL
2952/**
2953 * cifs_readdata_to_iov - copy data from pages in response to an iovec
2954 * @rdata: the readdata response with list of pages holding data
7f25bba8 2955 * @iter: destination for our data
1c892549
JL
2956 *
2957 * This function copies data from a list of pages in a readdata response into
2958 * an array of iovecs. It will first calculate where the data should go
2959 * based on the info in the readdata and then copy the data into that spot.
2960 */
7f25bba8
AV
2961static int
2962cifs_readdata_to_iov(struct cifs_readdata *rdata, struct iov_iter *iter)
1c892549 2963{
34a54d61 2964 size_t remaining = rdata->got_bytes;
c5fab6f4 2965 unsigned int i;
1c892549 2966
c5fab6f4 2967 for (i = 0; i < rdata->nr_pages; i++) {
c5fab6f4 2968 struct page *page = rdata->pages[i];
e686bd8d 2969 size_t copy = min_t(size_t, remaining, PAGE_SIZE);
9c25702c
PS
2970 size_t written;
2971
2972 if (unlikely(iter->type & ITER_PIPE)) {
2973 void *addr = kmap_atomic(page);
2974
2975 written = copy_to_iter(addr, copy, iter);
2976 kunmap_atomic(addr);
2977 } else
2978 written = copy_page_to_iter(page, 0, copy, iter);
7f25bba8
AV
2979 remaining -= written;
2980 if (written < copy && iov_iter_count(iter) > 0)
2981 break;
1c892549 2982 }
7f25bba8 2983 return remaining ? -EFAULT : 0;
1c892549
JL
2984}
2985
6685c5e2
PS
2986static void collect_uncached_read_data(struct cifs_aio_ctx *ctx);
2987
1c892549
JL
2988static void
2989cifs_uncached_readv_complete(struct work_struct *work)
2990{
2991 struct cifs_readdata *rdata = container_of(work,
2992 struct cifs_readdata, work);
1c892549
JL
2993
2994 complete(&rdata->done);
6685c5e2
PS
2995 collect_uncached_read_data(rdata->ctx);
2996 /* the below call can possibly free the last ref to aio ctx */
1c892549
JL
2997 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
2998}
2999
3000static int
d70b9104
PS
3001uncached_fill_pages(struct TCP_Server_Info *server,
3002 struct cifs_readdata *rdata, struct iov_iter *iter,
3003 unsigned int len)
1c892549 3004{
b3160aeb 3005 int result = 0;
c5fab6f4
JL
3006 unsigned int i;
3007 unsigned int nr_pages = rdata->nr_pages;
1c892549 3008
b3160aeb 3009 rdata->got_bytes = 0;
8321fec4 3010 rdata->tailsz = PAGE_SIZE;
c5fab6f4
JL
3011 for (i = 0; i < nr_pages; i++) {
3012 struct page *page = rdata->pages[i];
71335664 3013 size_t n;
c5fab6f4 3014
71335664 3015 if (len <= 0) {
1c892549 3016 /* no need to hold page hostage */
c5fab6f4
JL
3017 rdata->pages[i] = NULL;
3018 rdata->nr_pages--;
1c892549 3019 put_page(page);
8321fec4 3020 continue;
1c892549 3021 }
71335664
AV
3022 n = len;
3023 if (len >= PAGE_SIZE) {
3024 /* enough data to fill the page */
3025 n = PAGE_SIZE;
3026 len -= n;
3027 } else {
3028 zero_user(page, len, PAGE_SIZE - len);
3029 rdata->tailsz = len;
3030 len = 0;
3031 }
d70b9104
PS
3032 if (iter)
3033 result = copy_page_from_iter(page, 0, n, iter);
3034 else
3035 result = cifs_read_page_from_socket(server, page, n);
8321fec4
JL
3036 if (result < 0)
3037 break;
3038
b3160aeb 3039 rdata->got_bytes += result;
1c892549
JL
3040 }
3041
b3160aeb
PS
3042 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
3043 rdata->got_bytes : result;
1c892549
JL
3044}
3045
d70b9104
PS
3046static int
3047cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
3048 struct cifs_readdata *rdata, unsigned int len)
3049{
3050 return uncached_fill_pages(server, rdata, NULL, len);
3051}
3052
3053static int
3054cifs_uncached_copy_into_pages(struct TCP_Server_Info *server,
3055 struct cifs_readdata *rdata,
3056 struct iov_iter *iter)
3057{
3058 return uncached_fill_pages(server, rdata, iter, iter->count);
3059}
3060
0ada36b2
PS
3061static int
3062cifs_send_async_read(loff_t offset, size_t len, struct cifsFileInfo *open_file,
6685c5e2
PS
3063 struct cifs_sb_info *cifs_sb, struct list_head *rdata_list,
3064 struct cifs_aio_ctx *ctx)
1da177e4 3065{
0ada36b2 3066 struct cifs_readdata *rdata;
bed9da02 3067 unsigned int npages, rsize, credits;
0ada36b2
PS
3068 size_t cur_len;
3069 int rc;
1c892549 3070 pid_t pid;
25f40259 3071 struct TCP_Server_Info *server;
a70307ee 3072
25f40259 3073 server = tlink_tcon(open_file->tlink)->ses->server;
fc9c5966 3074
d4ffff1f
PS
3075 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3076 pid = open_file->pid;
3077 else
3078 pid = current->tgid;
3079
1c892549 3080 do {
bed9da02
PS
3081 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
3082 &rsize, &credits);
3083 if (rc)
3084 break;
3085
3086 cur_len = min_t(const size_t, len, rsize);
1c892549 3087 npages = DIV_ROUND_UP(cur_len, PAGE_SIZE);
a70307ee 3088
1c892549
JL
3089 /* allocate a readdata struct */
3090 rdata = cifs_readdata_alloc(npages,
3091 cifs_uncached_readv_complete);
3092 if (!rdata) {
bed9da02 3093 add_credits_and_wake_if(server, credits, 0);
1c892549 3094 rc = -ENOMEM;
bae9f746 3095 break;
1da177e4 3096 }
a70307ee 3097
c5fab6f4 3098 rc = cifs_read_allocate_pages(rdata, npages);
1c892549
JL
3099 if (rc)
3100 goto error;
3101
3102 rdata->cfile = cifsFileInfo_get(open_file);
c5fab6f4 3103 rdata->nr_pages = npages;
1c892549
JL
3104 rdata->offset = offset;
3105 rdata->bytes = cur_len;
3106 rdata->pid = pid;
8321fec4
JL
3107 rdata->pagesz = PAGE_SIZE;
3108 rdata->read_into_pages = cifs_uncached_read_into_pages;
d70b9104 3109 rdata->copy_into_pages = cifs_uncached_copy_into_pages;
bed9da02 3110 rdata->credits = credits;
6685c5e2
PS
3111 rdata->ctx = ctx;
3112 kref_get(&ctx->refcount);
1c892549 3113
25f40259 3114 if (!rdata->cfile->invalidHandle ||
1fa839b4 3115 !(rc = cifs_reopen_file(rdata->cfile, true)))
25f40259 3116 rc = server->ops->async_readv(rdata);
1c892549
JL
3117error:
3118 if (rc) {
bed9da02 3119 add_credits_and_wake_if(server, rdata->credits, 0);
1c892549
JL
3120 kref_put(&rdata->refcount,
3121 cifs_uncached_readdata_release);
25f40259
PS
3122 if (rc == -EAGAIN)
3123 continue;
1c892549
JL
3124 break;
3125 }
3126
0ada36b2 3127 list_add_tail(&rdata->list, rdata_list);
1c892549
JL
3128 offset += cur_len;
3129 len -= cur_len;
3130 } while (len > 0);
3131
0ada36b2
PS
3132 return rc;
3133}
3134
6685c5e2
PS
3135static void
3136collect_uncached_read_data(struct cifs_aio_ctx *ctx)
0ada36b2 3137{
6685c5e2
PS
3138 struct cifs_readdata *rdata, *tmp;
3139 struct iov_iter *to = &ctx->iter;
0ada36b2
PS
3140 struct cifs_sb_info *cifs_sb;
3141 struct cifs_tcon *tcon;
6685c5e2
PS
3142 unsigned int i;
3143 int rc;
0ada36b2 3144
6685c5e2
PS
3145 tcon = tlink_tcon(ctx->cfile->tlink);
3146 cifs_sb = CIFS_SB(ctx->cfile->dentry->d_sb);
0ada36b2 3147
6685c5e2 3148 mutex_lock(&ctx->aio_mutex);
0ada36b2 3149
6685c5e2
PS
3150 if (list_empty(&ctx->list)) {
3151 mutex_unlock(&ctx->aio_mutex);
3152 return;
3153 }
1c892549 3154
6685c5e2 3155 rc = ctx->rc;
1c892549 3156 /* the loop below should proceed in the order of increasing offsets */
25f40259 3157again:
6685c5e2 3158 list_for_each_entry_safe(rdata, tmp, &ctx->list, list) {
1c892549 3159 if (!rc) {
6685c5e2
PS
3160 if (!try_wait_for_completion(&rdata->done)) {
3161 mutex_unlock(&ctx->aio_mutex);
3162 return;
3163 }
3164
3165 if (rdata->result == -EAGAIN) {
74027f4a 3166 /* resend call if it's a retryable error */
fb8a3e52 3167 struct list_head tmp_list;
d913ed17 3168 unsigned int got_bytes = rdata->got_bytes;
25f40259 3169
fb8a3e52
PS
3170 list_del_init(&rdata->list);
3171 INIT_LIST_HEAD(&tmp_list);
25f40259 3172
d913ed17
PS
3173 /*
3174 * Got a part of data and then reconnect has
3175 * happened -- fill the buffer and continue
3176 * reading.
3177 */
3178 if (got_bytes && got_bytes < rdata->bytes) {
3179 rc = cifs_readdata_to_iov(rdata, to);
3180 if (rc) {
3181 kref_put(&rdata->refcount,
3182 cifs_uncached_readdata_release);
3183 continue;
3184 }
74027f4a 3185 }
d913ed17
PS
3186
3187 rc = cifs_send_async_read(
3188 rdata->offset + got_bytes,
3189 rdata->bytes - got_bytes,
3190 rdata->cfile, cifs_sb,
6685c5e2 3191 &tmp_list, ctx);
25f40259 3192
6685c5e2 3193 list_splice(&tmp_list, &ctx->list);
25f40259 3194
fb8a3e52
PS
3195 kref_put(&rdata->refcount,
3196 cifs_uncached_readdata_release);
3197 goto again;
3198 } else if (rdata->result)
3199 rc = rdata->result;
3200 else
e6a7bcb4 3201 rc = cifs_readdata_to_iov(rdata, to);
1c892549 3202
2e8a05d8
PS
3203 /* if there was a short read -- discard anything left */
3204 if (rdata->got_bytes && rdata->got_bytes < rdata->bytes)
3205 rc = -ENODATA;
1da177e4 3206 }
1c892549
JL
3207 list_del_init(&rdata->list);
3208 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
1da177e4 3209 }
a70307ee 3210
6685c5e2
PS
3211 for (i = 0; i < ctx->npages; i++) {
3212 if (ctx->should_dirty)
3213 set_page_dirty(ctx->bv[i].bv_page);
3214 put_page(ctx->bv[i].bv_page);
3215 }
7f25bba8 3216
6685c5e2
PS
3217 ctx->total_len = ctx->len - iov_iter_count(to);
3218
3219 cifs_stats_bytes_read(tcon, ctx->total_len);
1c892549 3220
09a4707e
PS
3221 /* mask nodata case */
3222 if (rc == -ENODATA)
3223 rc = 0;
3224
6685c5e2
PS
3225 ctx->rc = (rc == 0) ? ctx->total_len : rc;
3226
3227 mutex_unlock(&ctx->aio_mutex);
3228
3229 if (ctx->iocb && ctx->iocb->ki_complete)
3230 ctx->iocb->ki_complete(ctx->iocb, ctx->rc, 0);
3231 else
3232 complete(&ctx->done);
3233}
3234
3235ssize_t cifs_user_readv(struct kiocb *iocb, struct iov_iter *to)
3236{
3237 struct file *file = iocb->ki_filp;
3238 ssize_t rc;
3239 size_t len;
3240 ssize_t total_read = 0;
3241 loff_t offset = iocb->ki_pos;
3242 struct cifs_sb_info *cifs_sb;
3243 struct cifs_tcon *tcon;
3244 struct cifsFileInfo *cfile;
3245 struct cifs_aio_ctx *ctx;
3246
3247 len = iov_iter_count(to);
3248 if (!len)
3249 return 0;
3250
3251 cifs_sb = CIFS_FILE_SB(file);
3252 cfile = file->private_data;
3253 tcon = tlink_tcon(cfile->tlink);
3254
3255 if (!tcon->ses->server->ops->async_readv)
3256 return -ENOSYS;
3257
3258 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
3259 cifs_dbg(FYI, "attempting read on write only file instance\n");
3260
3261 ctx = cifs_aio_ctx_alloc();
3262 if (!ctx)
3263 return -ENOMEM;
3264
3265 ctx->cfile = cifsFileInfo_get(cfile);
3266
3267 if (!is_sync_kiocb(iocb))
3268 ctx->iocb = iocb;
3269
8a7b0d8e 3270 if (to->type == ITER_IOVEC)
6685c5e2
PS
3271 ctx->should_dirty = true;
3272
3273 rc = setup_aio_ctx_iter(ctx, to, READ);
3274 if (rc) {
3275 kref_put(&ctx->refcount, cifs_aio_ctx_release);
3276 return rc;
3277 }
3278
3279 len = ctx->len;
3280
3281 /* grab a lock here due to read response handlers can access ctx */
3282 mutex_lock(&ctx->aio_mutex);
3283
3284 rc = cifs_send_async_read(offset, len, cfile, cifs_sb, &ctx->list, ctx);
3285
3286 /* if at least one read request send succeeded, then reset rc */
3287 if (!list_empty(&ctx->list))
3288 rc = 0;
3289
3290 mutex_unlock(&ctx->aio_mutex);
3291
3292 if (rc) {
3293 kref_put(&ctx->refcount, cifs_aio_ctx_release);
3294 return rc;
3295 }
3296
3297 if (!is_sync_kiocb(iocb)) {
3298 kref_put(&ctx->refcount, cifs_aio_ctx_release);
3299 return -EIOCBQUEUED;
3300 }
3301
3302 rc = wait_for_completion_killable(&ctx->done);
3303 if (rc) {
3304 mutex_lock(&ctx->aio_mutex);
3305 ctx->rc = rc = -EINTR;
3306 total_read = ctx->total_len;
3307 mutex_unlock(&ctx->aio_mutex);
3308 } else {
3309 rc = ctx->rc;
3310 total_read = ctx->total_len;
3311 }
3312
3313 kref_put(&ctx->refcount, cifs_aio_ctx_release);
3314
0165e810 3315 if (total_read) {
e6a7bcb4 3316 iocb->ki_pos += total_read;
0165e810
AV
3317 return total_read;
3318 }
3319 return rc;
a70307ee
PS
3320}
3321
579f9053 3322ssize_t
e6a7bcb4 3323cifs_strict_readv(struct kiocb *iocb, struct iov_iter *to)
a70307ee 3324{
496ad9aa 3325 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
3326 struct cifsInodeInfo *cinode = CIFS_I(inode);
3327 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3328 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
3329 iocb->ki_filp->private_data;
3330 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
3331 int rc = -EACCES;
a70307ee
PS
3332
3333 /*
3334 * In strict cache mode we need to read from the server all the time
3335 * if we don't have level II oplock because the server can delay mtime
3336 * change - so we can't make a decision about inode invalidating.
3337 * And we can also fail with pagereading if there are mandatory locks
3338 * on pages affected by this read but not on the region from pos to
3339 * pos+len-1.
3340 */
18cceb6a 3341 if (!CIFS_CACHE_READ(cinode))
e6a7bcb4 3342 return cifs_user_readv(iocb, to);
a70307ee 3343
579f9053
PS
3344 if (cap_unix(tcon->ses) &&
3345 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
3346 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
e6a7bcb4 3347 return generic_file_read_iter(iocb, to);
579f9053
PS
3348
3349 /*
3350 * We need to hold the sem to be sure nobody modifies lock list
3351 * with a brlock that prevents reading.
3352 */
3353 down_read(&cinode->lock_sem);
e6a7bcb4 3354 if (!cifs_find_lock_conflict(cfile, iocb->ki_pos, iov_iter_count(to),
579f9053 3355 tcon->ses->server->vals->shared_lock_type,
081c0414 3356 NULL, CIFS_READ_OP))
e6a7bcb4 3357 rc = generic_file_read_iter(iocb, to);
579f9053
PS
3358 up_read(&cinode->lock_sem);
3359 return rc;
a70307ee 3360}
1da177e4 3361
f9c6e234
PS
3362static ssize_t
3363cifs_read(struct file *file, char *read_data, size_t read_size, loff_t *offset)
1da177e4
LT
3364{
3365 int rc = -EACCES;
3366 unsigned int bytes_read = 0;
3367 unsigned int total_read;
3368 unsigned int current_read_size;
5eba8ab3 3369 unsigned int rsize;
1da177e4 3370 struct cifs_sb_info *cifs_sb;
29e20f9c 3371 struct cifs_tcon *tcon;
f9c6e234 3372 struct TCP_Server_Info *server;
6d5786a3 3373 unsigned int xid;
f9c6e234 3374 char *cur_offset;
1da177e4 3375 struct cifsFileInfo *open_file;
d4ffff1f 3376 struct cifs_io_parms io_parms;
ec637e3f 3377 int buf_type = CIFS_NO_BUFFER;
d4ffff1f 3378 __u32 pid;
1da177e4 3379
6d5786a3 3380 xid = get_xid();
7119e220 3381 cifs_sb = CIFS_FILE_SB(file);
1da177e4 3382
5eba8ab3
JL
3383 /* FIXME: set up handlers for larger reads and/or convert to async */
3384 rsize = min_t(unsigned int, cifs_sb->rsize, CIFSMaxBufSize);
3385
1da177e4 3386 if (file->private_data == NULL) {
0f3bc09e 3387 rc = -EBADF;
6d5786a3 3388 free_xid(xid);
0f3bc09e 3389 return rc;
1da177e4 3390 }
c21dfb69 3391 open_file = file->private_data;
29e20f9c 3392 tcon = tlink_tcon(open_file->tlink);
f9c6e234
PS
3393 server = tcon->ses->server;
3394
3395 if (!server->ops->sync_read) {
3396 free_xid(xid);
3397 return -ENOSYS;
3398 }
1da177e4 3399
d4ffff1f
PS
3400 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3401 pid = open_file->pid;
3402 else
3403 pid = current->tgid;
3404
1da177e4 3405 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
f96637be 3406 cifs_dbg(FYI, "attempting read on write only file instance\n");
1da177e4 3407
f9c6e234
PS
3408 for (total_read = 0, cur_offset = read_data; read_size > total_read;
3409 total_read += bytes_read, cur_offset += bytes_read) {
e374d90f
PS
3410 do {
3411 current_read_size = min_t(uint, read_size - total_read,
3412 rsize);
3413 /*
3414 * For windows me and 9x we do not want to request more
3415 * than it negotiated since it will refuse the read
3416 * then.
3417 */
3418 if ((tcon->ses) && !(tcon->ses->capabilities &
29e20f9c 3419 tcon->ses->server->vals->cap_large_files)) {
e374d90f
PS
3420 current_read_size = min_t(uint,
3421 current_read_size, CIFSMaxBufSize);
3422 }
cdff08e7 3423 if (open_file->invalidHandle) {
15886177 3424 rc = cifs_reopen_file(open_file, true);
1da177e4
LT
3425 if (rc != 0)
3426 break;
3427 }
d4ffff1f 3428 io_parms.pid = pid;
29e20f9c 3429 io_parms.tcon = tcon;
f9c6e234 3430 io_parms.offset = *offset;
d4ffff1f 3431 io_parms.length = current_read_size;
db8b631d 3432 rc = server->ops->sync_read(xid, &open_file->fid, &io_parms,
f9c6e234
PS
3433 &bytes_read, &cur_offset,
3434 &buf_type);
e374d90f
PS
3435 } while (rc == -EAGAIN);
3436
1da177e4
LT
3437 if (rc || (bytes_read == 0)) {
3438 if (total_read) {
3439 break;
3440 } else {
6d5786a3 3441 free_xid(xid);
1da177e4
LT
3442 return rc;
3443 }
3444 } else {
29e20f9c 3445 cifs_stats_bytes_read(tcon, total_read);
f9c6e234 3446 *offset += bytes_read;
1da177e4
LT
3447 }
3448 }
6d5786a3 3449 free_xid(xid);
1da177e4
LT
3450 return total_read;
3451}
3452
ca83ce3d
JL
3453/*
3454 * If the page is mmap'ed into a process' page tables, then we need to make
3455 * sure that it doesn't change while being written back.
3456 */
3457static int
11bac800 3458cifs_page_mkwrite(struct vm_fault *vmf)
ca83ce3d
JL
3459{
3460 struct page *page = vmf->page;
3461
3462 lock_page(page);
3463 return VM_FAULT_LOCKED;
3464}
3465
7cbea8dc 3466static const struct vm_operations_struct cifs_file_vm_ops = {
ca83ce3d 3467 .fault = filemap_fault,
f1820361 3468 .map_pages = filemap_map_pages,
ca83ce3d
JL
3469 .page_mkwrite = cifs_page_mkwrite,
3470};
3471
7a6a19b1
PS
3472int cifs_file_strict_mmap(struct file *file, struct vm_area_struct *vma)
3473{
f44c5827 3474 int xid, rc = 0;
496ad9aa 3475 struct inode *inode = file_inode(file);
7a6a19b1 3476
6d5786a3 3477 xid = get_xid();
7a6a19b1 3478
f44c5827 3479 if (!CIFS_CACHE_READ(CIFS_I(inode)))
4f73c7d3 3480 rc = cifs_zap_mapping(inode);
f44c5827
MW
3481 if (!rc)
3482 rc = generic_file_mmap(file, vma);
3483 if (!rc)
ca83ce3d 3484 vma->vm_ops = &cifs_file_vm_ops;
f44c5827 3485
6d5786a3 3486 free_xid(xid);
7a6a19b1
PS
3487 return rc;
3488}
3489
1da177e4
LT
3490int cifs_file_mmap(struct file *file, struct vm_area_struct *vma)
3491{
1da177e4
LT
3492 int rc, xid;
3493
6d5786a3 3494 xid = get_xid();
f44c5827 3495
abab095d 3496 rc = cifs_revalidate_file(file);
f44c5827 3497 if (rc)
f96637be
JP
3498 cifs_dbg(FYI, "Validation prior to mmap failed, error=%d\n",
3499 rc);
f44c5827
MW
3500 if (!rc)
3501 rc = generic_file_mmap(file, vma);
3502 if (!rc)
ca83ce3d 3503 vma->vm_ops = &cifs_file_vm_ops;
f44c5827 3504
6d5786a3 3505 free_xid(xid);
1da177e4
LT
3506 return rc;
3507}
3508
0471ca3f
JL
3509static void
3510cifs_readv_complete(struct work_struct *work)
3511{
b770ddfa 3512 unsigned int i, got_bytes;
0471ca3f
JL
3513 struct cifs_readdata *rdata = container_of(work,
3514 struct cifs_readdata, work);
0471ca3f 3515
b770ddfa 3516 got_bytes = rdata->got_bytes;
c5fab6f4
JL
3517 for (i = 0; i < rdata->nr_pages; i++) {
3518 struct page *page = rdata->pages[i];
3519
0471ca3f
JL
3520 lru_cache_add_file(page);
3521
b770ddfa
PS
3522 if (rdata->result == 0 ||
3523 (rdata->result == -EAGAIN && got_bytes)) {
0471ca3f
JL
3524 flush_dcache_page(page);
3525 SetPageUptodate(page);
3526 }
3527
3528 unlock_page(page);
3529
b770ddfa
PS
3530 if (rdata->result == 0 ||
3531 (rdata->result == -EAGAIN && got_bytes))
0471ca3f
JL
3532 cifs_readpage_to_fscache(rdata->mapping->host, page);
3533
09cbfeaf 3534 got_bytes -= min_t(unsigned int, PAGE_SIZE, got_bytes);
b770ddfa 3535
09cbfeaf 3536 put_page(page);
c5fab6f4 3537 rdata->pages[i] = NULL;
0471ca3f 3538 }
6993f74a 3539 kref_put(&rdata->refcount, cifs_readdata_release);
0471ca3f
JL
3540}
3541
8d5ce4d2 3542static int
d70b9104
PS
3543readpages_fill_pages(struct TCP_Server_Info *server,
3544 struct cifs_readdata *rdata, struct iov_iter *iter,
3545 unsigned int len)
8d5ce4d2 3546{
b3160aeb 3547 int result = 0;
c5fab6f4 3548 unsigned int i;
8d5ce4d2
JL
3549 u64 eof;
3550 pgoff_t eof_index;
c5fab6f4 3551 unsigned int nr_pages = rdata->nr_pages;
8d5ce4d2
JL
3552
3553 /* determine the eof that the server (probably) has */
3554 eof = CIFS_I(rdata->mapping->host)->server_eof;
09cbfeaf 3555 eof_index = eof ? (eof - 1) >> PAGE_SHIFT : 0;
f96637be 3556 cifs_dbg(FYI, "eof=%llu eof_index=%lu\n", eof, eof_index);
8d5ce4d2 3557
b3160aeb 3558 rdata->got_bytes = 0;
09cbfeaf 3559 rdata->tailsz = PAGE_SIZE;
c5fab6f4
JL
3560 for (i = 0; i < nr_pages; i++) {
3561 struct page *page = rdata->pages[i];
442c9ac9 3562 size_t n = PAGE_SIZE;
c5fab6f4 3563
09cbfeaf 3564 if (len >= PAGE_SIZE) {
09cbfeaf 3565 len -= PAGE_SIZE;
8321fec4 3566 } else if (len > 0) {
8d5ce4d2 3567 /* enough for partial page, fill and zero the rest */
442c9ac9 3568 zero_user(page, len, PAGE_SIZE - len);
71335664 3569 n = rdata->tailsz = len;
8321fec4 3570 len = 0;
8d5ce4d2
JL
3571 } else if (page->index > eof_index) {
3572 /*
3573 * The VFS will not try to do readahead past the
3574 * i_size, but it's possible that we have outstanding
3575 * writes with gaps in the middle and the i_size hasn't
3576 * caught up yet. Populate those with zeroed out pages
3577 * to prevent the VFS from repeatedly attempting to
3578 * fill them until the writes are flushed.
3579 */
09cbfeaf 3580 zero_user(page, 0, PAGE_SIZE);
8d5ce4d2
JL
3581 lru_cache_add_file(page);
3582 flush_dcache_page(page);
3583 SetPageUptodate(page);
3584 unlock_page(page);
09cbfeaf 3585 put_page(page);
c5fab6f4
JL
3586 rdata->pages[i] = NULL;
3587 rdata->nr_pages--;
8321fec4 3588 continue;
8d5ce4d2
JL
3589 } else {
3590 /* no need to hold page hostage */
8d5ce4d2
JL
3591 lru_cache_add_file(page);
3592 unlock_page(page);
09cbfeaf 3593 put_page(page);
c5fab6f4
JL
3594 rdata->pages[i] = NULL;
3595 rdata->nr_pages--;
8321fec4 3596 continue;
8d5ce4d2 3597 }
8321fec4 3598
d70b9104
PS
3599 if (iter)
3600 result = copy_page_from_iter(page, 0, n, iter);
3601 else
3602 result = cifs_read_page_from_socket(server, page, n);
8321fec4
JL
3603 if (result < 0)
3604 break;
3605
b3160aeb 3606 rdata->got_bytes += result;
8d5ce4d2
JL
3607 }
3608
b3160aeb
PS
3609 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
3610 rdata->got_bytes : result;
8d5ce4d2
JL
3611}
3612
d70b9104
PS
3613static int
3614cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
3615 struct cifs_readdata *rdata, unsigned int len)
3616{
3617 return readpages_fill_pages(server, rdata, NULL, len);
3618}
3619
3620static int
3621cifs_readpages_copy_into_pages(struct TCP_Server_Info *server,
3622 struct cifs_readdata *rdata,
3623 struct iov_iter *iter)
3624{
3625 return readpages_fill_pages(server, rdata, iter, iter->count);
3626}
3627
387eb92a
PS
3628static int
3629readpages_get_pages(struct address_space *mapping, struct list_head *page_list,
3630 unsigned int rsize, struct list_head *tmplist,
3631 unsigned int *nr_pages, loff_t *offset, unsigned int *bytes)
3632{
3633 struct page *page, *tpage;
3634 unsigned int expected_index;
3635 int rc;
8a5c743e 3636 gfp_t gfp = readahead_gfp_mask(mapping);
387eb92a 3637
69cebd75
PS
3638 INIT_LIST_HEAD(tmplist);
3639
387eb92a
PS
3640 page = list_entry(page_list->prev, struct page, lru);
3641
3642 /*
3643 * Lock the page and put it in the cache. Since no one else
3644 * should have access to this page, we're safe to simply set
3645 * PG_locked without checking it first.
3646 */
48c935ad 3647 __SetPageLocked(page);
387eb92a 3648 rc = add_to_page_cache_locked(page, mapping,
063d99b4 3649 page->index, gfp);
387eb92a
PS
3650
3651 /* give up if we can't stick it in the cache */
3652 if (rc) {
48c935ad 3653 __ClearPageLocked(page);
387eb92a
PS
3654 return rc;
3655 }
3656
3657 /* move first page to the tmplist */
09cbfeaf
KS
3658 *offset = (loff_t)page->index << PAGE_SHIFT;
3659 *bytes = PAGE_SIZE;
387eb92a
PS
3660 *nr_pages = 1;
3661 list_move_tail(&page->lru, tmplist);
3662
3663 /* now try and add more pages onto the request */
3664 expected_index = page->index + 1;
3665 list_for_each_entry_safe_reverse(page, tpage, page_list, lru) {
3666 /* discontinuity ? */
3667 if (page->index != expected_index)
3668 break;
3669
3670 /* would this page push the read over the rsize? */
09cbfeaf 3671 if (*bytes + PAGE_SIZE > rsize)
387eb92a
PS
3672 break;
3673
48c935ad 3674 __SetPageLocked(page);
063d99b4 3675 if (add_to_page_cache_locked(page, mapping, page->index, gfp)) {
48c935ad 3676 __ClearPageLocked(page);
387eb92a
PS
3677 break;
3678 }
3679 list_move_tail(&page->lru, tmplist);
09cbfeaf 3680 (*bytes) += PAGE_SIZE;
387eb92a
PS
3681 expected_index++;
3682 (*nr_pages)++;
3683 }
3684 return rc;
8d5ce4d2
JL
3685}
3686
1da177e4
LT
3687static int cifs_readpages(struct file *file, struct address_space *mapping,
3688 struct list_head *page_list, unsigned num_pages)
3689{
690c5e31
JL
3690 int rc;
3691 struct list_head tmplist;
3692 struct cifsFileInfo *open_file = file->private_data;
7119e220 3693 struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file);
69cebd75 3694 struct TCP_Server_Info *server;
690c5e31 3695 pid_t pid;
1da177e4 3696
56698236
SJ
3697 /*
3698 * Reads as many pages as possible from fscache. Returns -ENOBUFS
3699 * immediately if the cookie is negative
54afa990
DH
3700 *
3701 * After this point, every page in the list might have PG_fscache set,
3702 * so we will need to clean that up off of every page we don't use.
56698236
SJ
3703 */
3704 rc = cifs_readpages_from_fscache(mapping->host, mapping, page_list,
3705 &num_pages);
3706 if (rc == 0)
690c5e31 3707 return rc;
56698236 3708
d4ffff1f
PS
3709 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3710 pid = open_file->pid;
3711 else
3712 pid = current->tgid;
3713
690c5e31 3714 rc = 0;
69cebd75 3715 server = tlink_tcon(open_file->tlink)->ses->server;
1da177e4 3716
f96637be
JP
3717 cifs_dbg(FYI, "%s: file=%p mapping=%p num_pages=%u\n",
3718 __func__, file, mapping, num_pages);
690c5e31
JL
3719
3720 /*
3721 * Start with the page at end of list and move it to private
3722 * list. Do the same with any following pages until we hit
3723 * the rsize limit, hit an index discontinuity, or run out of
3724 * pages. Issue the async read and then start the loop again
3725 * until the list is empty.
3726 *
3727 * Note that list order is important. The page_list is in
3728 * the order of declining indexes. When we put the pages in
3729 * the rdata->pages, then we want them in increasing order.
3730 */
3731 while (!list_empty(page_list)) {
bed9da02 3732 unsigned int i, nr_pages, bytes, rsize;
690c5e31
JL
3733 loff_t offset;
3734 struct page *page, *tpage;
3735 struct cifs_readdata *rdata;
bed9da02 3736 unsigned credits;
1da177e4 3737
bed9da02
PS
3738 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
3739 &rsize, &credits);
3740 if (rc)
3741 break;
690c5e31
JL
3742
3743 /*
69cebd75
PS
3744 * Give up immediately if rsize is too small to read an entire
3745 * page. The VFS will fall back to readpage. We should never
3746 * reach this point however since we set ra_pages to 0 when the
3747 * rsize is smaller than a cache page.
690c5e31 3748 */
09cbfeaf 3749 if (unlikely(rsize < PAGE_SIZE)) {
bed9da02 3750 add_credits_and_wake_if(server, credits, 0);
69cebd75 3751 return 0;
bed9da02 3752 }
690c5e31 3753
bed9da02
PS
3754 rc = readpages_get_pages(mapping, page_list, rsize, &tmplist,
3755 &nr_pages, &offset, &bytes);
690c5e31 3756 if (rc) {
bed9da02 3757 add_credits_and_wake_if(server, credits, 0);
690c5e31
JL
3758 break;
3759 }
3760
0471ca3f 3761 rdata = cifs_readdata_alloc(nr_pages, cifs_readv_complete);
690c5e31
JL
3762 if (!rdata) {
3763 /* best to give up if we're out of mem */
3764 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3765 list_del(&page->lru);
3766 lru_cache_add_file(page);
3767 unlock_page(page);
09cbfeaf 3768 put_page(page);
690c5e31
JL
3769 }
3770 rc = -ENOMEM;
bed9da02 3771 add_credits_and_wake_if(server, credits, 0);
690c5e31
JL
3772 break;
3773 }
3774
6993f74a 3775 rdata->cfile = cifsFileInfo_get(open_file);
690c5e31
JL
3776 rdata->mapping = mapping;
3777 rdata->offset = offset;
3778 rdata->bytes = bytes;
3779 rdata->pid = pid;
09cbfeaf 3780 rdata->pagesz = PAGE_SIZE;
8321fec4 3781 rdata->read_into_pages = cifs_readpages_read_into_pages;
d70b9104 3782 rdata->copy_into_pages = cifs_readpages_copy_into_pages;
bed9da02 3783 rdata->credits = credits;
c5fab6f4
JL
3784
3785 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3786 list_del(&page->lru);
3787 rdata->pages[rdata->nr_pages++] = page;
3788 }
690c5e31 3789
69cebd75 3790 if (!rdata->cfile->invalidHandle ||
1fa839b4 3791 !(rc = cifs_reopen_file(rdata->cfile, true)))
69cebd75
PS
3792 rc = server->ops->async_readv(rdata);
3793 if (rc) {
bed9da02 3794 add_credits_and_wake_if(server, rdata->credits, 0);
c5fab6f4
JL
3795 for (i = 0; i < rdata->nr_pages; i++) {
3796 page = rdata->pages[i];
690c5e31
JL
3797 lru_cache_add_file(page);
3798 unlock_page(page);
09cbfeaf 3799 put_page(page);
1da177e4 3800 }
1209bbdf 3801 /* Fallback to the readpage in error/reconnect cases */
6993f74a 3802 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3803 break;
3804 }
6993f74a
JL
3805
3806 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3807 }
3808
54afa990
DH
3809 /* Any pages that have been shown to fscache but didn't get added to
3810 * the pagecache must be uncached before they get returned to the
3811 * allocator.
3812 */
3813 cifs_fscache_readpages_cancel(mapping->host, page_list);
1da177e4
LT
3814 return rc;
3815}
3816
a9e9b7bc
SP
3817/*
3818 * cifs_readpage_worker must be called with the page pinned
3819 */
1da177e4
LT
3820static int cifs_readpage_worker(struct file *file, struct page *page,
3821 loff_t *poffset)
3822{
3823 char *read_data;
3824 int rc;
3825
56698236 3826 /* Is the page cached? */
496ad9aa 3827 rc = cifs_readpage_from_fscache(file_inode(file), page);
56698236
SJ
3828 if (rc == 0)
3829 goto read_complete;
3830
1da177e4
LT
3831 read_data = kmap(page);
3832 /* for reads over a certain size could initiate async read ahead */
fb8c4b14 3833
09cbfeaf 3834 rc = cifs_read(file, read_data, PAGE_SIZE, poffset);
fb8c4b14 3835
1da177e4
LT
3836 if (rc < 0)
3837 goto io_error;
3838 else
f96637be 3839 cifs_dbg(FYI, "Bytes read %d\n", rc);
fb8c4b14 3840
496ad9aa 3841 file_inode(file)->i_atime =
c2050a45 3842 current_time(file_inode(file));
fb8c4b14 3843
09cbfeaf
KS
3844 if (PAGE_SIZE > rc)
3845 memset(read_data + rc, 0, PAGE_SIZE - rc);
1da177e4
LT
3846
3847 flush_dcache_page(page);
3848 SetPageUptodate(page);
9dc06558
SJ
3849
3850 /* send this page to the cache */
496ad9aa 3851 cifs_readpage_to_fscache(file_inode(file), page);
9dc06558 3852
1da177e4 3853 rc = 0;
fb8c4b14 3854
1da177e4 3855io_error:
fb8c4b14 3856 kunmap(page);
466bd31b 3857 unlock_page(page);
56698236
SJ
3858
3859read_complete:
1da177e4
LT
3860 return rc;
3861}
3862
3863static int cifs_readpage(struct file *file, struct page *page)
3864{
09cbfeaf 3865 loff_t offset = (loff_t)page->index << PAGE_SHIFT;
1da177e4 3866 int rc = -EACCES;
6d5786a3 3867 unsigned int xid;
1da177e4 3868
6d5786a3 3869 xid = get_xid();
1da177e4
LT
3870
3871 if (file->private_data == NULL) {
0f3bc09e 3872 rc = -EBADF;
6d5786a3 3873 free_xid(xid);
0f3bc09e 3874 return rc;
1da177e4
LT
3875 }
3876
f96637be 3877 cifs_dbg(FYI, "readpage %p at offset %d 0x%x\n",
b6b38f70 3878 page, (int)offset, (int)offset);
1da177e4
LT
3879
3880 rc = cifs_readpage_worker(file, page, &offset);
3881
6d5786a3 3882 free_xid(xid);
1da177e4
LT
3883 return rc;
3884}
3885
a403a0a3
SF
3886static int is_inode_writable(struct cifsInodeInfo *cifs_inode)
3887{
3888 struct cifsFileInfo *open_file;
3afca265
SF
3889 struct cifs_tcon *tcon =
3890 cifs_sb_master_tcon(CIFS_SB(cifs_inode->vfs_inode.i_sb));
a403a0a3 3891
3afca265 3892 spin_lock(&tcon->open_file_lock);
a403a0a3 3893 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
2e396b83 3894 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
3afca265 3895 spin_unlock(&tcon->open_file_lock);
a403a0a3
SF
3896 return 1;
3897 }
3898 }
3afca265 3899 spin_unlock(&tcon->open_file_lock);
a403a0a3
SF
3900 return 0;
3901}
3902
1da177e4
LT
3903/* We do not want to update the file size from server for inodes
3904 open for write - to avoid races with writepage extending
3905 the file - in the future we could consider allowing
fb8c4b14 3906 refreshing the inode only on increases in the file size
1da177e4
LT
3907 but this is tricky to do without racing with writebehind
3908 page caching in the current Linux kernel design */
4b18f2a9 3909bool is_size_safe_to_change(struct cifsInodeInfo *cifsInode, __u64 end_of_file)
1da177e4 3910{
a403a0a3 3911 if (!cifsInode)
4b18f2a9 3912 return true;
50c2f753 3913
a403a0a3
SF
3914 if (is_inode_writable(cifsInode)) {
3915 /* This inode is open for write at least once */
c32a0b68
SF
3916 struct cifs_sb_info *cifs_sb;
3917
c32a0b68 3918 cifs_sb = CIFS_SB(cifsInode->vfs_inode.i_sb);
ad7a2926 3919 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
fb8c4b14 3920 /* since no page cache to corrupt on directio
c32a0b68 3921 we can change size safely */
4b18f2a9 3922 return true;
c32a0b68
SF
3923 }
3924
fb8c4b14 3925 if (i_size_read(&cifsInode->vfs_inode) < end_of_file)
4b18f2a9 3926 return true;
7ba52631 3927
4b18f2a9 3928 return false;
23e7dd7d 3929 } else
4b18f2a9 3930 return true;
1da177e4
LT
3931}
3932
d9414774
NP
3933static int cifs_write_begin(struct file *file, struct address_space *mapping,
3934 loff_t pos, unsigned len, unsigned flags,
3935 struct page **pagep, void **fsdata)
1da177e4 3936{
466bd31b 3937 int oncethru = 0;
09cbfeaf
KS
3938 pgoff_t index = pos >> PAGE_SHIFT;
3939 loff_t offset = pos & (PAGE_SIZE - 1);
a98ee8c1
JL
3940 loff_t page_start = pos & PAGE_MASK;
3941 loff_t i_size;
3942 struct page *page;
3943 int rc = 0;
d9414774 3944
f96637be 3945 cifs_dbg(FYI, "write_begin from %lld len %d\n", (long long)pos, len);
d9414774 3946
466bd31b 3947start:
54566b2c 3948 page = grab_cache_page_write_begin(mapping, index, flags);
a98ee8c1
JL
3949 if (!page) {
3950 rc = -ENOMEM;
3951 goto out;
3952 }
8a236264 3953
a98ee8c1
JL
3954 if (PageUptodate(page))
3955 goto out;
8a236264 3956
a98ee8c1
JL
3957 /*
3958 * If we write a full page it will be up to date, no need to read from
3959 * the server. If the write is short, we'll end up doing a sync write
3960 * instead.
3961 */
09cbfeaf 3962 if (len == PAGE_SIZE)
a98ee8c1 3963 goto out;
8a236264 3964
a98ee8c1
JL
3965 /*
3966 * optimize away the read when we have an oplock, and we're not
3967 * expecting to use any of the data we'd be reading in. That
3968 * is, when the page lies beyond the EOF, or straddles the EOF
3969 * and the write will cover all of the existing data.
3970 */
18cceb6a 3971 if (CIFS_CACHE_READ(CIFS_I(mapping->host))) {
a98ee8c1
JL
3972 i_size = i_size_read(mapping->host);
3973 if (page_start >= i_size ||
3974 (offset == 0 && (pos + len) >= i_size)) {
3975 zero_user_segments(page, 0, offset,
3976 offset + len,
09cbfeaf 3977 PAGE_SIZE);
a98ee8c1
JL
3978 /*
3979 * PageChecked means that the parts of the page
3980 * to which we're not writing are considered up
3981 * to date. Once the data is copied to the
3982 * page, it can be set uptodate.
3983 */
3984 SetPageChecked(page);
3985 goto out;
3986 }
3987 }
d9414774 3988
466bd31b 3989 if ((file->f_flags & O_ACCMODE) != O_WRONLY && !oncethru) {
a98ee8c1
JL
3990 /*
3991 * might as well read a page, it is fast enough. If we get
3992 * an error, we don't need to return it. cifs_write_end will
3993 * do a sync write instead since PG_uptodate isn't set.
3994 */
3995 cifs_readpage_worker(file, page, &page_start);
09cbfeaf 3996 put_page(page);
466bd31b
SP
3997 oncethru = 1;
3998 goto start;
8a236264
SF
3999 } else {
4000 /* we could try using another file handle if there is one -
4001 but how would we lock it to prevent close of that handle
4002 racing with this read? In any case
d9414774 4003 this will be written out by write_end so is fine */
1da177e4 4004 }
a98ee8c1
JL
4005out:
4006 *pagep = page;
4007 return rc;
1da177e4
LT
4008}
4009
85f2d6b4
SJ
4010static int cifs_release_page(struct page *page, gfp_t gfp)
4011{
4012 if (PagePrivate(page))
4013 return 0;
4014
4015 return cifs_fscache_release_page(page, gfp);
4016}
4017
d47992f8
LC
4018static void cifs_invalidate_page(struct page *page, unsigned int offset,
4019 unsigned int length)
85f2d6b4
SJ
4020{
4021 struct cifsInodeInfo *cifsi = CIFS_I(page->mapping->host);
4022
09cbfeaf 4023 if (offset == 0 && length == PAGE_SIZE)
85f2d6b4
SJ
4024 cifs_fscache_invalidate_page(page, &cifsi->vfs_inode);
4025}
4026
9ad1506b
PS
4027static int cifs_launder_page(struct page *page)
4028{
4029 int rc = 0;
4030 loff_t range_start = page_offset(page);
09cbfeaf 4031 loff_t range_end = range_start + (loff_t)(PAGE_SIZE - 1);
9ad1506b
PS
4032 struct writeback_control wbc = {
4033 .sync_mode = WB_SYNC_ALL,
4034 .nr_to_write = 0,
4035 .range_start = range_start,
4036 .range_end = range_end,
4037 };
4038
f96637be 4039 cifs_dbg(FYI, "Launder page: %p\n", page);
9ad1506b
PS
4040
4041 if (clear_page_dirty_for_io(page))
4042 rc = cifs_writepage_locked(page, &wbc);
4043
4044 cifs_fscache_invalidate_page(page, page->mapping->host);
4045 return rc;
4046}
4047
9b646972 4048void cifs_oplock_break(struct work_struct *work)
3bc303c2
JL
4049{
4050 struct cifsFileInfo *cfile = container_of(work, struct cifsFileInfo,
4051 oplock_break);
2b0143b5 4052 struct inode *inode = d_inode(cfile->dentry);
3bc303c2 4053 struct cifsInodeInfo *cinode = CIFS_I(inode);
95a3f2f3 4054 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
c11f1df5 4055 struct TCP_Server_Info *server = tcon->ses->server;
eb4b756b 4056 int rc = 0;
3bc303c2 4057
c11f1df5 4058 wait_on_bit(&cinode->flags, CIFS_INODE_PENDING_WRITERS,
74316201 4059 TASK_UNINTERRUPTIBLE);
c11f1df5
SP
4060
4061 server->ops->downgrade_oplock(server, cinode,
4062 test_bit(CIFS_INODE_DOWNGRADE_OPLOCK_TO_L2, &cinode->flags));
4063
18cceb6a 4064 if (!CIFS_CACHE_WRITE(cinode) && CIFS_CACHE_READ(cinode) &&
63b7d3a4 4065 cifs_has_mand_locks(cinode)) {
f96637be
JP
4066 cifs_dbg(FYI, "Reset oplock to None for inode=%p due to mand locks\n",
4067 inode);
18cceb6a 4068 cinode->oplock = 0;
63b7d3a4
PS
4069 }
4070
3bc303c2 4071 if (inode && S_ISREG(inode->i_mode)) {
18cceb6a 4072 if (CIFS_CACHE_READ(cinode))
8737c930 4073 break_lease(inode, O_RDONLY);
d54ff732 4074 else
8737c930 4075 break_lease(inode, O_WRONLY);
3bc303c2 4076 rc = filemap_fdatawrite(inode->i_mapping);
18cceb6a 4077 if (!CIFS_CACHE_READ(cinode)) {
eb4b756b
JL
4078 rc = filemap_fdatawait(inode->i_mapping);
4079 mapping_set_error(inode->i_mapping, rc);
4f73c7d3 4080 cifs_zap_mapping(inode);
3bc303c2 4081 }
f96637be 4082 cifs_dbg(FYI, "Oplock flush inode %p rc %d\n", inode, rc);
3bc303c2
JL
4083 }
4084
85160e03
PS
4085 rc = cifs_push_locks(cfile);
4086 if (rc)
f96637be 4087 cifs_dbg(VFS, "Push locks rc = %d\n", rc);
85160e03 4088
3bc303c2
JL
4089 /*
4090 * releasing stale oplock after recent reconnect of smb session using
4091 * a now incorrect file handle is not a data integrity issue but do
4092 * not bother sending an oplock release if session to server still is
4093 * disconnected since oplock already released by the server
4094 */
cdff08e7 4095 if (!cfile->oplock_break_cancelled) {
95a3f2f3
PS
4096 rc = tcon->ses->server->ops->oplock_response(tcon, &cfile->fid,
4097 cinode);
f96637be 4098 cifs_dbg(FYI, "Oplock release rc = %d\n", rc);
3bc303c2 4099 }
c11f1df5 4100 cifs_done_oplock_break(cinode);
3bc303c2
JL
4101}
4102
dca69288
SF
4103/*
4104 * The presence of cifs_direct_io() in the address space ops vector
4105 * allowes open() O_DIRECT flags which would have failed otherwise.
4106 *
4107 * In the non-cached mode (mount with cache=none), we shunt off direct read and write requests
4108 * so this method should never be called.
4109 *
4110 * Direct IO is not yet supported in the cached mode.
4111 */
4112static ssize_t
c8b8e32d 4113cifs_direct_io(struct kiocb *iocb, struct iov_iter *iter)
dca69288
SF
4114{
4115 /*
4116 * FIXME
4117 * Eventually need to support direct IO for non forcedirectio mounts
4118 */
4119 return -EINVAL;
4120}
4121
4122
f5e54d6e 4123const struct address_space_operations cifs_addr_ops = {
1da177e4
LT
4124 .readpage = cifs_readpage,
4125 .readpages = cifs_readpages,
4126 .writepage = cifs_writepage,
37c0eb46 4127 .writepages = cifs_writepages,
d9414774
NP
4128 .write_begin = cifs_write_begin,
4129 .write_end = cifs_write_end,
1da177e4 4130 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4 4131 .releasepage = cifs_release_page,
dca69288 4132 .direct_IO = cifs_direct_io,
85f2d6b4 4133 .invalidatepage = cifs_invalidate_page,
9ad1506b 4134 .launder_page = cifs_launder_page,
1da177e4 4135};
273d81d6
DK
4136
4137/*
4138 * cifs_readpages requires the server to support a buffer large enough to
4139 * contain the header plus one complete page of data. Otherwise, we need
4140 * to leave cifs_readpages out of the address space operations.
4141 */
f5e54d6e 4142const struct address_space_operations cifs_addr_ops_smallbuf = {
273d81d6
DK
4143 .readpage = cifs_readpage,
4144 .writepage = cifs_writepage,
4145 .writepages = cifs_writepages,
d9414774
NP
4146 .write_begin = cifs_write_begin,
4147 .write_end = cifs_write_end,
273d81d6 4148 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4
SJ
4149 .releasepage = cifs_release_page,
4150 .invalidatepage = cifs_invalidate_page,
9ad1506b 4151 .launder_page = cifs_launder_page,
273d81d6 4152};