]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/file.c
Merge tag 'edac_for_4.1' of git://git.kernel.org/pub/scm/linux/kernel/git/bp/bp
[mirror_ubuntu-artful-kernel.git] / fs / cifs / file.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/file.c
3 *
4 * vfs operations that deal with files
fb8c4b14 5 *
f19159dc 6 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4 7 * Author(s): Steve French (sfrench@us.ibm.com)
7ee1af76 8 * Jeremy Allison (jra@samba.org)
1da177e4
LT
9 *
10 * This library is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU Lesser General Public License as published
12 * by the Free Software Foundation; either version 2.1 of the License, or
13 * (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
18 * the GNU Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public License
21 * along with this library; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 */
24#include <linux/fs.h>
37c0eb46 25#include <linux/backing-dev.h>
1da177e4
LT
26#include <linux/stat.h>
27#include <linux/fcntl.h>
28#include <linux/pagemap.h>
29#include <linux/pagevec.h>
37c0eb46 30#include <linux/writeback.h>
6f88cc2e 31#include <linux/task_io_accounting_ops.h>
23e7dd7d 32#include <linux/delay.h>
3bc303c2 33#include <linux/mount.h>
5a0e3ad6 34#include <linux/slab.h>
690c5e31 35#include <linux/swap.h>
1da177e4
LT
36#include <asm/div64.h>
37#include "cifsfs.h"
38#include "cifspdu.h"
39#include "cifsglob.h"
40#include "cifsproto.h"
41#include "cifs_unicode.h"
42#include "cifs_debug.h"
43#include "cifs_fs_sb.h"
9451a9a5 44#include "fscache.h"
1da177e4 45
07b92d0d 46
1da177e4
LT
47static inline int cifs_convert_flags(unsigned int flags)
48{
49 if ((flags & O_ACCMODE) == O_RDONLY)
50 return GENERIC_READ;
51 else if ((flags & O_ACCMODE) == O_WRONLY)
52 return GENERIC_WRITE;
53 else if ((flags & O_ACCMODE) == O_RDWR) {
54 /* GENERIC_ALL is too much permission to request
55 can cause unnecessary access denied on create */
56 /* return GENERIC_ALL; */
57 return (GENERIC_READ | GENERIC_WRITE);
58 }
59
e10f7b55
JL
60 return (READ_CONTROL | FILE_WRITE_ATTRIBUTES | FILE_READ_ATTRIBUTES |
61 FILE_WRITE_EA | FILE_APPEND_DATA | FILE_WRITE_DATA |
62 FILE_READ_DATA);
7fc8f4e9 63}
e10f7b55 64
608712fe 65static u32 cifs_posix_convert_flags(unsigned int flags)
7fc8f4e9 66{
608712fe 67 u32 posix_flags = 0;
e10f7b55 68
7fc8f4e9 69 if ((flags & O_ACCMODE) == O_RDONLY)
608712fe 70 posix_flags = SMB_O_RDONLY;
7fc8f4e9 71 else if ((flags & O_ACCMODE) == O_WRONLY)
608712fe
JL
72 posix_flags = SMB_O_WRONLY;
73 else if ((flags & O_ACCMODE) == O_RDWR)
74 posix_flags = SMB_O_RDWR;
75
07b92d0d 76 if (flags & O_CREAT) {
608712fe 77 posix_flags |= SMB_O_CREAT;
07b92d0d
SF
78 if (flags & O_EXCL)
79 posix_flags |= SMB_O_EXCL;
80 } else if (flags & O_EXCL)
f96637be
JP
81 cifs_dbg(FYI, "Application %s pid %d has incorrectly set O_EXCL flag but not O_CREAT on file open. Ignoring O_EXCL\n",
82 current->comm, current->tgid);
07b92d0d 83
608712fe
JL
84 if (flags & O_TRUNC)
85 posix_flags |= SMB_O_TRUNC;
86 /* be safe and imply O_SYNC for O_DSYNC */
6b2f3d1f 87 if (flags & O_DSYNC)
608712fe 88 posix_flags |= SMB_O_SYNC;
7fc8f4e9 89 if (flags & O_DIRECTORY)
608712fe 90 posix_flags |= SMB_O_DIRECTORY;
7fc8f4e9 91 if (flags & O_NOFOLLOW)
608712fe 92 posix_flags |= SMB_O_NOFOLLOW;
7fc8f4e9 93 if (flags & O_DIRECT)
608712fe 94 posix_flags |= SMB_O_DIRECT;
7fc8f4e9
SF
95
96 return posix_flags;
1da177e4
LT
97}
98
99static inline int cifs_get_disposition(unsigned int flags)
100{
101 if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
102 return FILE_CREATE;
103 else if ((flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
104 return FILE_OVERWRITE_IF;
105 else if ((flags & O_CREAT) == O_CREAT)
106 return FILE_OPEN_IF;
55aa2e09
SF
107 else if ((flags & O_TRUNC) == O_TRUNC)
108 return FILE_OVERWRITE;
1da177e4
LT
109 else
110 return FILE_OPEN;
111}
112
608712fe
JL
113int cifs_posix_open(char *full_path, struct inode **pinode,
114 struct super_block *sb, int mode, unsigned int f_flags,
6d5786a3 115 __u32 *poplock, __u16 *pnetfid, unsigned int xid)
608712fe
JL
116{
117 int rc;
118 FILE_UNIX_BASIC_INFO *presp_data;
119 __u32 posix_flags = 0;
120 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
121 struct cifs_fattr fattr;
122 struct tcon_link *tlink;
96daf2b0 123 struct cifs_tcon *tcon;
608712fe 124
f96637be 125 cifs_dbg(FYI, "posix open %s\n", full_path);
608712fe
JL
126
127 presp_data = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
128 if (presp_data == NULL)
129 return -ENOMEM;
130
131 tlink = cifs_sb_tlink(cifs_sb);
132 if (IS_ERR(tlink)) {
133 rc = PTR_ERR(tlink);
134 goto posix_open_ret;
135 }
136
137 tcon = tlink_tcon(tlink);
138 mode &= ~current_umask();
139
140 posix_flags = cifs_posix_convert_flags(f_flags);
141 rc = CIFSPOSIXCreate(xid, tcon, posix_flags, mode, pnetfid, presp_data,
142 poplock, full_path, cifs_sb->local_nls,
143 cifs_sb->mnt_cifs_flags &
144 CIFS_MOUNT_MAP_SPECIAL_CHR);
145 cifs_put_tlink(tlink);
146
147 if (rc)
148 goto posix_open_ret;
149
150 if (presp_data->Type == cpu_to_le32(-1))
151 goto posix_open_ret; /* open ok, caller does qpathinfo */
152
153 if (!pinode)
154 goto posix_open_ret; /* caller does not need info */
155
156 cifs_unix_basic_to_fattr(&fattr, presp_data, cifs_sb);
157
158 /* get new inode and set it up */
159 if (*pinode == NULL) {
160 cifs_fill_uniqueid(sb, &fattr);
161 *pinode = cifs_iget(sb, &fattr);
162 if (!*pinode) {
163 rc = -ENOMEM;
164 goto posix_open_ret;
165 }
166 } else {
167 cifs_fattr_to_inode(*pinode, &fattr);
168 }
169
170posix_open_ret:
171 kfree(presp_data);
172 return rc;
173}
174
eeb910a6
PS
175static int
176cifs_nt_open(char *full_path, struct inode *inode, struct cifs_sb_info *cifs_sb,
fb1214e4
PS
177 struct cifs_tcon *tcon, unsigned int f_flags, __u32 *oplock,
178 struct cifs_fid *fid, unsigned int xid)
eeb910a6
PS
179{
180 int rc;
fb1214e4 181 int desired_access;
eeb910a6 182 int disposition;
3d3ea8e6 183 int create_options = CREATE_NOT_DIR;
eeb910a6 184 FILE_ALL_INFO *buf;
b8c32dbb 185 struct TCP_Server_Info *server = tcon->ses->server;
226730b4 186 struct cifs_open_parms oparms;
eeb910a6 187
b8c32dbb 188 if (!server->ops->open)
fb1214e4
PS
189 return -ENOSYS;
190
191 desired_access = cifs_convert_flags(f_flags);
eeb910a6
PS
192
193/*********************************************************************
194 * open flag mapping table:
195 *
196 * POSIX Flag CIFS Disposition
197 * ---------- ----------------
198 * O_CREAT FILE_OPEN_IF
199 * O_CREAT | O_EXCL FILE_CREATE
200 * O_CREAT | O_TRUNC FILE_OVERWRITE_IF
201 * O_TRUNC FILE_OVERWRITE
202 * none of the above FILE_OPEN
203 *
204 * Note that there is not a direct match between disposition
205 * FILE_SUPERSEDE (ie create whether or not file exists although
206 * O_CREAT | O_TRUNC is similar but truncates the existing
207 * file rather than creating a new file as FILE_SUPERSEDE does
208 * (which uses the attributes / metadata passed in on open call)
209 *?
210 *? O_SYNC is a reasonable match to CIFS writethrough flag
211 *? and the read write flags match reasonably. O_LARGEFILE
212 *? is irrelevant because largefile support is always used
213 *? by this client. Flags O_APPEND, O_DIRECT, O_DIRECTORY,
214 * O_FASYNC, O_NOFOLLOW, O_NONBLOCK need further investigation
215 *********************************************************************/
216
217 disposition = cifs_get_disposition(f_flags);
218
219 /* BB pass O_SYNC flag through on file attributes .. BB */
220
221 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
222 if (!buf)
223 return -ENOMEM;
224
3d3ea8e6
SP
225 if (backup_cred(cifs_sb))
226 create_options |= CREATE_OPEN_BACKUP_INTENT;
227
226730b4
PS
228 oparms.tcon = tcon;
229 oparms.cifs_sb = cifs_sb;
230 oparms.desired_access = desired_access;
231 oparms.create_options = create_options;
232 oparms.disposition = disposition;
233 oparms.path = full_path;
234 oparms.fid = fid;
9cbc0b73 235 oparms.reconnect = false;
226730b4
PS
236
237 rc = server->ops->open(xid, &oparms, oplock, buf);
eeb910a6
PS
238
239 if (rc)
240 goto out;
241
242 if (tcon->unix_ext)
243 rc = cifs_get_inode_info_unix(&inode, full_path, inode->i_sb,
244 xid);
245 else
246 rc = cifs_get_inode_info(&inode, full_path, buf, inode->i_sb,
42eacf9e 247 xid, fid);
eeb910a6
PS
248
249out:
250 kfree(buf);
251 return rc;
252}
253
63b7d3a4
PS
254static bool
255cifs_has_mand_locks(struct cifsInodeInfo *cinode)
256{
257 struct cifs_fid_locks *cur;
258 bool has_locks = false;
259
260 down_read(&cinode->lock_sem);
261 list_for_each_entry(cur, &cinode->llist, llist) {
262 if (!list_empty(&cur->locks)) {
263 has_locks = true;
264 break;
265 }
266 }
267 up_read(&cinode->lock_sem);
268 return has_locks;
269}
270
15ecb436 271struct cifsFileInfo *
fb1214e4 272cifs_new_fileinfo(struct cifs_fid *fid, struct file *file,
15ecb436
JL
273 struct tcon_link *tlink, __u32 oplock)
274{
275 struct dentry *dentry = file->f_path.dentry;
276 struct inode *inode = dentry->d_inode;
4b4de76e
PS
277 struct cifsInodeInfo *cinode = CIFS_I(inode);
278 struct cifsFileInfo *cfile;
f45d3416 279 struct cifs_fid_locks *fdlocks;
233839b1 280 struct cifs_tcon *tcon = tlink_tcon(tlink);
63b7d3a4 281 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e
PS
282
283 cfile = kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
284 if (cfile == NULL)
285 return cfile;
286
f45d3416
PS
287 fdlocks = kzalloc(sizeof(struct cifs_fid_locks), GFP_KERNEL);
288 if (!fdlocks) {
289 kfree(cfile);
290 return NULL;
291 }
292
293 INIT_LIST_HEAD(&fdlocks->locks);
294 fdlocks->cfile = cfile;
295 cfile->llist = fdlocks;
1b4b55a1 296 down_write(&cinode->lock_sem);
f45d3416 297 list_add(&fdlocks->llist, &cinode->llist);
1b4b55a1 298 up_write(&cinode->lock_sem);
f45d3416 299
4b4de76e 300 cfile->count = 1;
4b4de76e
PS
301 cfile->pid = current->tgid;
302 cfile->uid = current_fsuid();
303 cfile->dentry = dget(dentry);
304 cfile->f_flags = file->f_flags;
305 cfile->invalidHandle = false;
306 cfile->tlink = cifs_get_tlink(tlink);
4b4de76e 307 INIT_WORK(&cfile->oplock_break, cifs_oplock_break);
f45d3416 308 mutex_init(&cfile->fh_mutex);
15ecb436 309
24261fc2
MG
310 cifs_sb_active(inode->i_sb);
311
63b7d3a4
PS
312 /*
313 * If the server returned a read oplock and we have mandatory brlocks,
314 * set oplock level to None.
315 */
53ef1016 316 if (server->ops->is_read_op(oplock) && cifs_has_mand_locks(cinode)) {
f96637be 317 cifs_dbg(FYI, "Reset oplock val from read to None due to mand locks\n");
63b7d3a4
PS
318 oplock = 0;
319 }
320
4477288a 321 spin_lock(&cifs_file_list_lock);
63b7d3a4 322 if (fid->pending_open->oplock != CIFS_OPLOCK_NO_CHANGE && oplock)
233839b1
PS
323 oplock = fid->pending_open->oplock;
324 list_del(&fid->pending_open->olist);
325
42873b0a 326 fid->purge_cache = false;
63b7d3a4 327 server->ops->set_fid(cfile, fid, oplock);
233839b1
PS
328
329 list_add(&cfile->tlist, &tcon->openFileList);
15ecb436
JL
330 /* if readable file instance put first in list*/
331 if (file->f_mode & FMODE_READ)
4b4de76e 332 list_add(&cfile->flist, &cinode->openFileList);
15ecb436 333 else
4b4de76e 334 list_add_tail(&cfile->flist, &cinode->openFileList);
4477288a 335 spin_unlock(&cifs_file_list_lock);
15ecb436 336
42873b0a 337 if (fid->purge_cache)
4f73c7d3 338 cifs_zap_mapping(inode);
42873b0a 339
4b4de76e
PS
340 file->private_data = cfile;
341 return cfile;
15ecb436
JL
342}
343
764a1b1a
JL
344struct cifsFileInfo *
345cifsFileInfo_get(struct cifsFileInfo *cifs_file)
346{
347 spin_lock(&cifs_file_list_lock);
348 cifsFileInfo_get_locked(cifs_file);
349 spin_unlock(&cifs_file_list_lock);
350 return cifs_file;
351}
352
cdff08e7
SF
353/*
354 * Release a reference on the file private data. This may involve closing
5f6dbc9e
JL
355 * the filehandle out on the server. Must be called without holding
356 * cifs_file_list_lock.
cdff08e7 357 */
b33879aa
JL
358void cifsFileInfo_put(struct cifsFileInfo *cifs_file)
359{
e66673e3 360 struct inode *inode = cifs_file->dentry->d_inode;
96daf2b0 361 struct cifs_tcon *tcon = tlink_tcon(cifs_file->tlink);
233839b1 362 struct TCP_Server_Info *server = tcon->ses->server;
e66673e3 363 struct cifsInodeInfo *cifsi = CIFS_I(inode);
24261fc2
MG
364 struct super_block *sb = inode->i_sb;
365 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cdff08e7 366 struct cifsLockInfo *li, *tmp;
233839b1
PS
367 struct cifs_fid fid;
368 struct cifs_pending_open open;
ca7df8e0 369 bool oplock_break_cancelled;
cdff08e7
SF
370
371 spin_lock(&cifs_file_list_lock);
5f6dbc9e 372 if (--cifs_file->count > 0) {
cdff08e7
SF
373 spin_unlock(&cifs_file_list_lock);
374 return;
375 }
376
233839b1
PS
377 if (server->ops->get_lease_key)
378 server->ops->get_lease_key(inode, &fid);
379
380 /* store open in pending opens to make sure we don't miss lease break */
381 cifs_add_pending_open_locked(&fid, cifs_file->tlink, &open);
382
cdff08e7
SF
383 /* remove it from the lists */
384 list_del(&cifs_file->flist);
385 list_del(&cifs_file->tlist);
386
387 if (list_empty(&cifsi->openFileList)) {
f96637be
JP
388 cifs_dbg(FYI, "closing last open instance for inode %p\n",
389 cifs_file->dentry->d_inode);
25364138
PS
390 /*
391 * In strict cache mode we need invalidate mapping on the last
392 * close because it may cause a error when we open this file
393 * again and get at least level II oplock.
394 */
4f8ba8a0 395 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO)
aff8d5ca 396 set_bit(CIFS_INO_INVALID_MAPPING, &cifsi->flags);
c6723628 397 cifs_set_oplock_level(cifsi, 0);
cdff08e7
SF
398 }
399 spin_unlock(&cifs_file_list_lock);
400
ca7df8e0 401 oplock_break_cancelled = cancel_work_sync(&cifs_file->oplock_break);
ad635942 402
cdff08e7 403 if (!tcon->need_reconnect && !cifs_file->invalidHandle) {
0ff78a22 404 struct TCP_Server_Info *server = tcon->ses->server;
6d5786a3 405 unsigned int xid;
0ff78a22 406
6d5786a3 407 xid = get_xid();
0ff78a22 408 if (server->ops->close)
760ad0ca
PS
409 server->ops->close(xid, tcon, &cifs_file->fid);
410 _free_xid(xid);
cdff08e7
SF
411 }
412
ca7df8e0
SP
413 if (oplock_break_cancelled)
414 cifs_done_oplock_break(cifsi);
415
233839b1
PS
416 cifs_del_pending_open(&open);
417
f45d3416
PS
418 /*
419 * Delete any outstanding lock records. We'll lose them when the file
cdff08e7
SF
420 * is closed anyway.
421 */
1b4b55a1 422 down_write(&cifsi->lock_sem);
f45d3416 423 list_for_each_entry_safe(li, tmp, &cifs_file->llist->locks, llist) {
cdff08e7 424 list_del(&li->llist);
85160e03 425 cifs_del_lock_waiters(li);
cdff08e7 426 kfree(li);
b33879aa 427 }
f45d3416
PS
428 list_del(&cifs_file->llist->llist);
429 kfree(cifs_file->llist);
1b4b55a1 430 up_write(&cifsi->lock_sem);
cdff08e7
SF
431
432 cifs_put_tlink(cifs_file->tlink);
433 dput(cifs_file->dentry);
24261fc2 434 cifs_sb_deactive(sb);
cdff08e7 435 kfree(cifs_file);
b33879aa
JL
436}
437
1da177e4 438int cifs_open(struct inode *inode, struct file *file)
233839b1 439
1da177e4
LT
440{
441 int rc = -EACCES;
6d5786a3 442 unsigned int xid;
590a3fe0 443 __u32 oplock;
1da177e4 444 struct cifs_sb_info *cifs_sb;
b8c32dbb 445 struct TCP_Server_Info *server;
96daf2b0 446 struct cifs_tcon *tcon;
7ffec372 447 struct tcon_link *tlink;
fb1214e4 448 struct cifsFileInfo *cfile = NULL;
1da177e4 449 char *full_path = NULL;
7e12eddb 450 bool posix_open_ok = false;
fb1214e4 451 struct cifs_fid fid;
233839b1 452 struct cifs_pending_open open;
1da177e4 453
6d5786a3 454 xid = get_xid();
1da177e4
LT
455
456 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
457 tlink = cifs_sb_tlink(cifs_sb);
458 if (IS_ERR(tlink)) {
6d5786a3 459 free_xid(xid);
7ffec372
JL
460 return PTR_ERR(tlink);
461 }
462 tcon = tlink_tcon(tlink);
b8c32dbb 463 server = tcon->ses->server;
1da177e4 464
e6a00296 465 full_path = build_path_from_dentry(file->f_path.dentry);
1da177e4 466 if (full_path == NULL) {
0f3bc09e 467 rc = -ENOMEM;
232341ba 468 goto out;
1da177e4
LT
469 }
470
f96637be 471 cifs_dbg(FYI, "inode = 0x%p file flags are 0x%x for %s\n",
b6b38f70 472 inode, file->f_flags, full_path);
276a74a4 473
787aded6
NJ
474 if (file->f_flags & O_DIRECT &&
475 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO) {
476 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_BRL)
477 file->f_op = &cifs_file_direct_nobrl_ops;
478 else
479 file->f_op = &cifs_file_direct_ops;
480 }
481
233839b1 482 if (server->oplocks)
276a74a4
SF
483 oplock = REQ_OPLOCK;
484 else
485 oplock = 0;
486
64cc2c63 487 if (!tcon->broken_posix_open && tcon->unix_ext &&
29e20f9c
PS
488 cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
489 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
276a74a4 490 /* can not refresh inode info since size could be stale */
2422f676 491 rc = cifs_posix_open(full_path, &inode, inode->i_sb,
fa588e0c 492 cifs_sb->mnt_file_mode /* ignored */,
fb1214e4 493 file->f_flags, &oplock, &fid.netfid, xid);
276a74a4 494 if (rc == 0) {
f96637be 495 cifs_dbg(FYI, "posix open succeeded\n");
7e12eddb 496 posix_open_ok = true;
64cc2c63
SF
497 } else if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
498 if (tcon->ses->serverNOS)
f96637be
JP
499 cifs_dbg(VFS, "server %s of type %s returned unexpected error on SMB posix open, disabling posix open support. Check if server update available.\n",
500 tcon->ses->serverName,
501 tcon->ses->serverNOS);
64cc2c63 502 tcon->broken_posix_open = true;
276a74a4
SF
503 } else if ((rc != -EIO) && (rc != -EREMOTE) &&
504 (rc != -EOPNOTSUPP)) /* path not found or net err */
505 goto out;
fb1214e4
PS
506 /*
507 * Else fallthrough to retry open the old way on network i/o
508 * or DFS errors.
509 */
276a74a4
SF
510 }
511
233839b1
PS
512 if (server->ops->get_lease_key)
513 server->ops->get_lease_key(inode, &fid);
514
515 cifs_add_pending_open(&fid, tlink, &open);
516
7e12eddb 517 if (!posix_open_ok) {
b8c32dbb
PS
518 if (server->ops->get_lease_key)
519 server->ops->get_lease_key(inode, &fid);
520
7e12eddb 521 rc = cifs_nt_open(full_path, inode, cifs_sb, tcon,
fb1214e4 522 file->f_flags, &oplock, &fid, xid);
233839b1
PS
523 if (rc) {
524 cifs_del_pending_open(&open);
7e12eddb 525 goto out;
233839b1 526 }
7e12eddb 527 }
47c78b7f 528
fb1214e4
PS
529 cfile = cifs_new_fileinfo(&fid, file, tlink, oplock);
530 if (cfile == NULL) {
b8c32dbb
PS
531 if (server->ops->close)
532 server->ops->close(xid, tcon, &fid);
233839b1 533 cifs_del_pending_open(&open);
1da177e4
LT
534 rc = -ENOMEM;
535 goto out;
536 }
1da177e4 537
9451a9a5
SJ
538 cifs_fscache_set_inode_cookie(inode, file);
539
7e12eddb 540 if ((oplock & CIFS_CREATE_ACTION) && !posix_open_ok && tcon->unix_ext) {
fb1214e4
PS
541 /*
542 * Time to set mode which we can not set earlier due to
543 * problems creating new read-only files.
544 */
7e12eddb
PS
545 struct cifs_unix_set_info_args args = {
546 .mode = inode->i_mode,
49418b2c
EB
547 .uid = INVALID_UID, /* no change */
548 .gid = INVALID_GID, /* no change */
7e12eddb
PS
549 .ctime = NO_CHANGE_64,
550 .atime = NO_CHANGE_64,
551 .mtime = NO_CHANGE_64,
552 .device = 0,
553 };
fb1214e4
PS
554 CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid.netfid,
555 cfile->pid);
1da177e4
LT
556 }
557
558out:
1da177e4 559 kfree(full_path);
6d5786a3 560 free_xid(xid);
7ffec372 561 cifs_put_tlink(tlink);
1da177e4
LT
562 return rc;
563}
564
f152fd5f
PS
565static int cifs_push_posix_locks(struct cifsFileInfo *cfile);
566
2ae78ba8
PS
567/*
568 * Try to reacquire byte range locks that were released when session
f152fd5f 569 * to server was lost.
2ae78ba8 570 */
f152fd5f
PS
571static int
572cifs_relock_file(struct cifsFileInfo *cfile)
1da177e4 573{
f152fd5f
PS
574 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
575 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
576 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1da177e4
LT
577 int rc = 0;
578
689c3db4 579 down_read(&cinode->lock_sem);
f152fd5f 580 if (cinode->can_cache_brlcks) {
689c3db4
PS
581 /* can cache locks - no need to relock */
582 up_read(&cinode->lock_sem);
f152fd5f
PS
583 return rc;
584 }
585
586 if (cap_unix(tcon->ses) &&
587 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
588 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
589 rc = cifs_push_posix_locks(cfile);
590 else
591 rc = tcon->ses->server->ops->push_mand_locks(cfile);
1da177e4 592
689c3db4 593 up_read(&cinode->lock_sem);
1da177e4
LT
594 return rc;
595}
596
2ae78ba8
PS
597static int
598cifs_reopen_file(struct cifsFileInfo *cfile, bool can_flush)
1da177e4
LT
599{
600 int rc = -EACCES;
6d5786a3 601 unsigned int xid;
590a3fe0 602 __u32 oplock;
1da177e4 603 struct cifs_sb_info *cifs_sb;
96daf2b0 604 struct cifs_tcon *tcon;
2ae78ba8
PS
605 struct TCP_Server_Info *server;
606 struct cifsInodeInfo *cinode;
fb8c4b14 607 struct inode *inode;
1da177e4 608 char *full_path = NULL;
2ae78ba8 609 int desired_access;
1da177e4 610 int disposition = FILE_OPEN;
3d3ea8e6 611 int create_options = CREATE_NOT_DIR;
226730b4 612 struct cifs_open_parms oparms;
1da177e4 613
6d5786a3 614 xid = get_xid();
2ae78ba8
PS
615 mutex_lock(&cfile->fh_mutex);
616 if (!cfile->invalidHandle) {
617 mutex_unlock(&cfile->fh_mutex);
0f3bc09e 618 rc = 0;
6d5786a3 619 free_xid(xid);
0f3bc09e 620 return rc;
1da177e4
LT
621 }
622
2ae78ba8 623 inode = cfile->dentry->d_inode;
1da177e4 624 cifs_sb = CIFS_SB(inode->i_sb);
2ae78ba8
PS
625 tcon = tlink_tcon(cfile->tlink);
626 server = tcon->ses->server;
627
628 /*
629 * Can not grab rename sem here because various ops, including those
630 * that already have the rename sem can end up causing writepage to get
631 * called and if the server was down that means we end up here, and we
632 * can never tell if the caller already has the rename_sem.
633 */
634 full_path = build_path_from_dentry(cfile->dentry);
1da177e4 635 if (full_path == NULL) {
3a9f462f 636 rc = -ENOMEM;
2ae78ba8 637 mutex_unlock(&cfile->fh_mutex);
6d5786a3 638 free_xid(xid);
3a9f462f 639 return rc;
1da177e4
LT
640 }
641
f96637be
JP
642 cifs_dbg(FYI, "inode = 0x%p file flags 0x%x for %s\n",
643 inode, cfile->f_flags, full_path);
1da177e4 644
10b9b98e 645 if (tcon->ses->server->oplocks)
1da177e4
LT
646 oplock = REQ_OPLOCK;
647 else
4b18f2a9 648 oplock = 0;
1da177e4 649
29e20f9c 650 if (tcon->unix_ext && cap_unix(tcon->ses) &&
7fc8f4e9 651 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
29e20f9c 652 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
608712fe
JL
653 /*
654 * O_CREAT, O_EXCL and O_TRUNC already had their effect on the
655 * original open. Must mask them off for a reopen.
656 */
2ae78ba8 657 unsigned int oflags = cfile->f_flags &
15886177 658 ~(O_CREAT | O_EXCL | O_TRUNC);
608712fe 659
2422f676 660 rc = cifs_posix_open(full_path, NULL, inode->i_sb,
2ae78ba8 661 cifs_sb->mnt_file_mode /* ignored */,
9cbc0b73 662 oflags, &oplock, &cfile->fid.netfid, xid);
7fc8f4e9 663 if (rc == 0) {
f96637be 664 cifs_dbg(FYI, "posix reopen succeeded\n");
fe090e4e 665 oparms.reconnect = true;
7fc8f4e9
SF
666 goto reopen_success;
667 }
2ae78ba8
PS
668 /*
669 * fallthrough to retry open the old way on errors, especially
670 * in the reconnect path it is important to retry hard
671 */
7fc8f4e9
SF
672 }
673
2ae78ba8 674 desired_access = cifs_convert_flags(cfile->f_flags);
7fc8f4e9 675
3d3ea8e6
SP
676 if (backup_cred(cifs_sb))
677 create_options |= CREATE_OPEN_BACKUP_INTENT;
678
b8c32dbb 679 if (server->ops->get_lease_key)
9cbc0b73 680 server->ops->get_lease_key(inode, &cfile->fid);
b8c32dbb 681
226730b4
PS
682 oparms.tcon = tcon;
683 oparms.cifs_sb = cifs_sb;
684 oparms.desired_access = desired_access;
685 oparms.create_options = create_options;
686 oparms.disposition = disposition;
687 oparms.path = full_path;
9cbc0b73
PS
688 oparms.fid = &cfile->fid;
689 oparms.reconnect = true;
226730b4 690
2ae78ba8
PS
691 /*
692 * Can not refresh inode by passing in file_info buf to be returned by
d81b8a40 693 * ops->open and then calling get_inode_info with returned buf since
2ae78ba8
PS
694 * file might have write behind data that needs to be flushed and server
695 * version of file size can be stale. If we knew for sure that inode was
696 * not dirty locally we could do this.
697 */
226730b4 698 rc = server->ops->open(xid, &oparms, &oplock, NULL);
b33fcf1c
PS
699 if (rc == -ENOENT && oparms.reconnect == false) {
700 /* durable handle timeout is expired - open the file again */
701 rc = server->ops->open(xid, &oparms, &oplock, NULL);
702 /* indicate that we need to relock the file */
703 oparms.reconnect = true;
704 }
705
1da177e4 706 if (rc) {
2ae78ba8 707 mutex_unlock(&cfile->fh_mutex);
f96637be
JP
708 cifs_dbg(FYI, "cifs_reopen returned 0x%x\n", rc);
709 cifs_dbg(FYI, "oplock: %d\n", oplock);
15886177
JL
710 goto reopen_error_exit;
711 }
712
7fc8f4e9 713reopen_success:
2ae78ba8
PS
714 cfile->invalidHandle = false;
715 mutex_unlock(&cfile->fh_mutex);
716 cinode = CIFS_I(inode);
15886177
JL
717
718 if (can_flush) {
719 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b 720 mapping_set_error(inode->i_mapping, rc);
15886177 721
15886177 722 if (tcon->unix_ext)
2ae78ba8
PS
723 rc = cifs_get_inode_info_unix(&inode, full_path,
724 inode->i_sb, xid);
15886177 725 else
2ae78ba8
PS
726 rc = cifs_get_inode_info(&inode, full_path, NULL,
727 inode->i_sb, xid, NULL);
728 }
729 /*
730 * Else we are writing out data to server already and could deadlock if
731 * we tried to flush data, and since we do not know if we have data that
732 * would invalidate the current end of file on the server we can not go
733 * to the server to get the new inode info.
734 */
735
9cbc0b73
PS
736 server->ops->set_fid(cfile, &cfile->fid, oplock);
737 if (oparms.reconnect)
738 cifs_relock_file(cfile);
15886177
JL
739
740reopen_error_exit:
1da177e4 741 kfree(full_path);
6d5786a3 742 free_xid(xid);
1da177e4
LT
743 return rc;
744}
745
746int cifs_close(struct inode *inode, struct file *file)
747{
77970693
JL
748 if (file->private_data != NULL) {
749 cifsFileInfo_put(file->private_data);
750 file->private_data = NULL;
751 }
7ee1af76 752
cdff08e7
SF
753 /* return code from the ->release op is always ignored */
754 return 0;
1da177e4
LT
755}
756
757int cifs_closedir(struct inode *inode, struct file *file)
758{
759 int rc = 0;
6d5786a3 760 unsigned int xid;
4b4de76e 761 struct cifsFileInfo *cfile = file->private_data;
92fc65a7
PS
762 struct cifs_tcon *tcon;
763 struct TCP_Server_Info *server;
764 char *buf;
1da177e4 765
f96637be 766 cifs_dbg(FYI, "Closedir inode = 0x%p\n", inode);
1da177e4 767
92fc65a7
PS
768 if (cfile == NULL)
769 return rc;
770
6d5786a3 771 xid = get_xid();
92fc65a7
PS
772 tcon = tlink_tcon(cfile->tlink);
773 server = tcon->ses->server;
1da177e4 774
f96637be 775 cifs_dbg(FYI, "Freeing private data in close dir\n");
92fc65a7 776 spin_lock(&cifs_file_list_lock);
52755808 777 if (server->ops->dir_needs_close(cfile)) {
92fc65a7
PS
778 cfile->invalidHandle = true;
779 spin_unlock(&cifs_file_list_lock);
780 if (server->ops->close_dir)
781 rc = server->ops->close_dir(xid, tcon, &cfile->fid);
782 else
783 rc = -ENOSYS;
f96637be 784 cifs_dbg(FYI, "Closing uncompleted readdir with rc %d\n", rc);
92fc65a7
PS
785 /* not much we can do if it fails anyway, ignore rc */
786 rc = 0;
787 } else
788 spin_unlock(&cifs_file_list_lock);
789
790 buf = cfile->srch_inf.ntwrk_buf_start;
791 if (buf) {
f96637be 792 cifs_dbg(FYI, "closedir free smb buf in srch struct\n");
92fc65a7
PS
793 cfile->srch_inf.ntwrk_buf_start = NULL;
794 if (cfile->srch_inf.smallBuf)
795 cifs_small_buf_release(buf);
796 else
797 cifs_buf_release(buf);
1da177e4 798 }
92fc65a7
PS
799
800 cifs_put_tlink(cfile->tlink);
801 kfree(file->private_data);
802 file->private_data = NULL;
1da177e4 803 /* BB can we lock the filestruct while this is going on? */
6d5786a3 804 free_xid(xid);
1da177e4
LT
805 return rc;
806}
807
85160e03 808static struct cifsLockInfo *
fbd35aca 809cifs_lock_init(__u64 offset, __u64 length, __u8 type)
7ee1af76 810{
a88b4707 811 struct cifsLockInfo *lock =
fb8c4b14 812 kmalloc(sizeof(struct cifsLockInfo), GFP_KERNEL);
a88b4707
PS
813 if (!lock)
814 return lock;
815 lock->offset = offset;
816 lock->length = length;
817 lock->type = type;
a88b4707
PS
818 lock->pid = current->tgid;
819 INIT_LIST_HEAD(&lock->blist);
820 init_waitqueue_head(&lock->block_q);
821 return lock;
85160e03
PS
822}
823
f7ba7fe6 824void
85160e03
PS
825cifs_del_lock_waiters(struct cifsLockInfo *lock)
826{
827 struct cifsLockInfo *li, *tmp;
828 list_for_each_entry_safe(li, tmp, &lock->blist, blist) {
829 list_del_init(&li->blist);
830 wake_up(&li->block_q);
831 }
832}
833
081c0414
PS
834#define CIFS_LOCK_OP 0
835#define CIFS_READ_OP 1
836#define CIFS_WRITE_OP 2
837
838/* @rw_check : 0 - no op, 1 - read, 2 - write */
85160e03 839static bool
f45d3416
PS
840cifs_find_fid_lock_conflict(struct cifs_fid_locks *fdlocks, __u64 offset,
841 __u64 length, __u8 type, struct cifsFileInfo *cfile,
081c0414 842 struct cifsLockInfo **conf_lock, int rw_check)
85160e03 843{
fbd35aca 844 struct cifsLockInfo *li;
f45d3416 845 struct cifsFileInfo *cur_cfile = fdlocks->cfile;
106dc538 846 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03 847
f45d3416 848 list_for_each_entry(li, &fdlocks->locks, llist) {
85160e03
PS
849 if (offset + length <= li->offset ||
850 offset >= li->offset + li->length)
851 continue;
081c0414
PS
852 if (rw_check != CIFS_LOCK_OP && current->tgid == li->pid &&
853 server->ops->compare_fids(cfile, cur_cfile)) {
854 /* shared lock prevents write op through the same fid */
855 if (!(li->type & server->vals->shared_lock_type) ||
856 rw_check != CIFS_WRITE_OP)
857 continue;
858 }
f45d3416
PS
859 if ((type & server->vals->shared_lock_type) &&
860 ((server->ops->compare_fids(cfile, cur_cfile) &&
861 current->tgid == li->pid) || type == li->type))
85160e03 862 continue;
579f9053
PS
863 if (conf_lock)
864 *conf_lock = li;
f45d3416 865 return true;
85160e03
PS
866 }
867 return false;
868}
869
579f9053 870bool
55157dfb 871cifs_find_lock_conflict(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
579f9053 872 __u8 type, struct cifsLockInfo **conf_lock,
081c0414 873 int rw_check)
161ebf9f 874{
fbd35aca 875 bool rc = false;
f45d3416 876 struct cifs_fid_locks *cur;
55157dfb 877 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
fbd35aca 878
f45d3416
PS
879 list_for_each_entry(cur, &cinode->llist, llist) {
880 rc = cifs_find_fid_lock_conflict(cur, offset, length, type,
579f9053 881 cfile, conf_lock, rw_check);
fbd35aca
PS
882 if (rc)
883 break;
884 }
fbd35aca
PS
885
886 return rc;
161ebf9f
PS
887}
888
9a5101c8
PS
889/*
890 * Check if there is another lock that prevents us to set the lock (mandatory
891 * style). If such a lock exists, update the flock structure with its
892 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
893 * or leave it the same if we can't. Returns 0 if we don't need to request to
894 * the server or 1 otherwise.
895 */
85160e03 896static int
fbd35aca
PS
897cifs_lock_test(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
898 __u8 type, struct file_lock *flock)
85160e03
PS
899{
900 int rc = 0;
901 struct cifsLockInfo *conf_lock;
fbd35aca 902 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
106dc538 903 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03
PS
904 bool exist;
905
1b4b55a1 906 down_read(&cinode->lock_sem);
85160e03 907
55157dfb 908 exist = cifs_find_lock_conflict(cfile, offset, length, type,
081c0414 909 &conf_lock, CIFS_LOCK_OP);
85160e03
PS
910 if (exist) {
911 flock->fl_start = conf_lock->offset;
912 flock->fl_end = conf_lock->offset + conf_lock->length - 1;
913 flock->fl_pid = conf_lock->pid;
106dc538 914 if (conf_lock->type & server->vals->shared_lock_type)
85160e03
PS
915 flock->fl_type = F_RDLCK;
916 else
917 flock->fl_type = F_WRLCK;
918 } else if (!cinode->can_cache_brlcks)
919 rc = 1;
920 else
921 flock->fl_type = F_UNLCK;
922
1b4b55a1 923 up_read(&cinode->lock_sem);
85160e03
PS
924 return rc;
925}
926
161ebf9f 927static void
fbd35aca 928cifs_lock_add(struct cifsFileInfo *cfile, struct cifsLockInfo *lock)
85160e03 929{
fbd35aca 930 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1b4b55a1 931 down_write(&cinode->lock_sem);
f45d3416 932 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 933 up_write(&cinode->lock_sem);
7ee1af76
JA
934}
935
9a5101c8
PS
936/*
937 * Set the byte-range lock (mandatory style). Returns:
938 * 1) 0, if we set the lock and don't need to request to the server;
939 * 2) 1, if no locks prevent us but we need to request to the server;
940 * 3) -EACCESS, if there is a lock that prevents us and wait is false.
941 */
85160e03 942static int
fbd35aca 943cifs_lock_add_if(struct cifsFileInfo *cfile, struct cifsLockInfo *lock,
161ebf9f 944 bool wait)
85160e03 945{
161ebf9f 946 struct cifsLockInfo *conf_lock;
fbd35aca 947 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
85160e03
PS
948 bool exist;
949 int rc = 0;
950
85160e03
PS
951try_again:
952 exist = false;
1b4b55a1 953 down_write(&cinode->lock_sem);
85160e03 954
55157dfb 955 exist = cifs_find_lock_conflict(cfile, lock->offset, lock->length,
081c0414 956 lock->type, &conf_lock, CIFS_LOCK_OP);
85160e03 957 if (!exist && cinode->can_cache_brlcks) {
f45d3416 958 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 959 up_write(&cinode->lock_sem);
85160e03
PS
960 return rc;
961 }
962
963 if (!exist)
964 rc = 1;
965 else if (!wait)
966 rc = -EACCES;
967 else {
968 list_add_tail(&lock->blist, &conf_lock->blist);
1b4b55a1 969 up_write(&cinode->lock_sem);
85160e03
PS
970 rc = wait_event_interruptible(lock->block_q,
971 (lock->blist.prev == &lock->blist) &&
972 (lock->blist.next == &lock->blist));
973 if (!rc)
974 goto try_again;
1b4b55a1 975 down_write(&cinode->lock_sem);
a88b4707 976 list_del_init(&lock->blist);
85160e03
PS
977 }
978
1b4b55a1 979 up_write(&cinode->lock_sem);
85160e03
PS
980 return rc;
981}
982
9a5101c8
PS
983/*
984 * Check if there is another lock that prevents us to set the lock (posix
985 * style). If such a lock exists, update the flock structure with its
986 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
987 * or leave it the same if we can't. Returns 0 if we don't need to request to
988 * the server or 1 otherwise.
989 */
85160e03 990static int
4f6bcec9
PS
991cifs_posix_lock_test(struct file *file, struct file_lock *flock)
992{
993 int rc = 0;
496ad9aa 994 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
4f6bcec9
PS
995 unsigned char saved_type = flock->fl_type;
996
50792760
PS
997 if ((flock->fl_flags & FL_POSIX) == 0)
998 return 1;
999
1b4b55a1 1000 down_read(&cinode->lock_sem);
4f6bcec9
PS
1001 posix_test_lock(file, flock);
1002
1003 if (flock->fl_type == F_UNLCK && !cinode->can_cache_brlcks) {
1004 flock->fl_type = saved_type;
1005 rc = 1;
1006 }
1007
1b4b55a1 1008 up_read(&cinode->lock_sem);
4f6bcec9
PS
1009 return rc;
1010}
1011
9a5101c8
PS
1012/*
1013 * Set the byte-range lock (posix style). Returns:
1014 * 1) 0, if we set the lock and don't need to request to the server;
1015 * 2) 1, if we need to request to the server;
1016 * 3) <0, if the error occurs while setting the lock.
1017 */
4f6bcec9
PS
1018static int
1019cifs_posix_lock_set(struct file *file, struct file_lock *flock)
1020{
496ad9aa 1021 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
50792760
PS
1022 int rc = 1;
1023
1024 if ((flock->fl_flags & FL_POSIX) == 0)
1025 return rc;
4f6bcec9 1026
66189be7 1027try_again:
1b4b55a1 1028 down_write(&cinode->lock_sem);
4f6bcec9 1029 if (!cinode->can_cache_brlcks) {
1b4b55a1 1030 up_write(&cinode->lock_sem);
50792760 1031 return rc;
4f6bcec9 1032 }
66189be7
PS
1033
1034 rc = posix_lock_file(file, flock, NULL);
1b4b55a1 1035 up_write(&cinode->lock_sem);
66189be7
PS
1036 if (rc == FILE_LOCK_DEFERRED) {
1037 rc = wait_event_interruptible(flock->fl_wait, !flock->fl_next);
1038 if (!rc)
1039 goto try_again;
1a9e64a7 1040 posix_unblock_lock(flock);
66189be7 1041 }
9ebb389d 1042 return rc;
4f6bcec9
PS
1043}
1044
d39a4f71 1045int
4f6bcec9 1046cifs_push_mandatory_locks(struct cifsFileInfo *cfile)
85160e03 1047{
6d5786a3
PS
1048 unsigned int xid;
1049 int rc = 0, stored_rc;
85160e03
PS
1050 struct cifsLockInfo *li, *tmp;
1051 struct cifs_tcon *tcon;
0013fb4c 1052 unsigned int num, max_num, max_buf;
32b9aaf1
PS
1053 LOCKING_ANDX_RANGE *buf, *cur;
1054 int types[] = {LOCKING_ANDX_LARGE_FILES,
1055 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
1056 int i;
85160e03 1057
6d5786a3 1058 xid = get_xid();
85160e03
PS
1059 tcon = tlink_tcon(cfile->tlink);
1060
0013fb4c
PS
1061 /*
1062 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1063 * and check it for zero before using.
1064 */
1065 max_buf = tcon->ses->server->maxBuf;
1066 if (!max_buf) {
6d5786a3 1067 free_xid(xid);
0013fb4c
PS
1068 return -EINVAL;
1069 }
1070
1071 max_num = (max_buf - sizeof(struct smb_hdr)) /
1072 sizeof(LOCKING_ANDX_RANGE);
4b99d39b 1073 buf = kcalloc(max_num, sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
32b9aaf1 1074 if (!buf) {
6d5786a3 1075 free_xid(xid);
e2f2886a 1076 return -ENOMEM;
32b9aaf1
PS
1077 }
1078
1079 for (i = 0; i < 2; i++) {
1080 cur = buf;
1081 num = 0;
f45d3416 1082 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
32b9aaf1
PS
1083 if (li->type != types[i])
1084 continue;
1085 cur->Pid = cpu_to_le16(li->pid);
1086 cur->LengthLow = cpu_to_le32((u32)li->length);
1087 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1088 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1089 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1090 if (++num == max_num) {
4b4de76e
PS
1091 stored_rc = cifs_lockv(xid, tcon,
1092 cfile->fid.netfid,
04a6aa8a
PS
1093 (__u8)li->type, 0, num,
1094 buf);
32b9aaf1
PS
1095 if (stored_rc)
1096 rc = stored_rc;
1097 cur = buf;
1098 num = 0;
1099 } else
1100 cur++;
1101 }
1102
1103 if (num) {
4b4de76e 1104 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
04a6aa8a 1105 (__u8)types[i], 0, num, buf);
32b9aaf1
PS
1106 if (stored_rc)
1107 rc = stored_rc;
1108 }
85160e03
PS
1109 }
1110
32b9aaf1 1111 kfree(buf);
6d5786a3 1112 free_xid(xid);
85160e03
PS
1113 return rc;
1114}
1115
d5751469
PS
1116struct lock_to_push {
1117 struct list_head llist;
1118 __u64 offset;
1119 __u64 length;
1120 __u32 pid;
1121 __u16 netfid;
1122 __u8 type;
1123};
1124
4f6bcec9 1125static int
b8db928b 1126cifs_push_posix_locks(struct cifsFileInfo *cfile)
4f6bcec9 1127{
1c8c601a 1128 struct inode *inode = cfile->dentry->d_inode;
4f6bcec9 1129 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
bd61e0a9
JL
1130 struct file_lock *flock;
1131 struct file_lock_context *flctx = inode->i_flctx;
e084c1bd 1132 unsigned int count = 0, i;
4f6bcec9 1133 int rc = 0, xid, type;
d5751469
PS
1134 struct list_head locks_to_send, *el;
1135 struct lock_to_push *lck, *tmp;
4f6bcec9 1136 __u64 length;
4f6bcec9 1137
6d5786a3 1138 xid = get_xid();
4f6bcec9 1139
bd61e0a9
JL
1140 if (!flctx)
1141 goto out;
d5751469 1142
e084c1bd
JL
1143 spin_lock(&flctx->flc_lock);
1144 list_for_each(el, &flctx->flc_posix) {
1145 count++;
1146 }
1147 spin_unlock(&flctx->flc_lock);
1148
4f6bcec9
PS
1149 INIT_LIST_HEAD(&locks_to_send);
1150
d5751469 1151 /*
e084c1bd
JL
1152 * Allocating count locks is enough because no FL_POSIX locks can be
1153 * added to the list while we are holding cinode->lock_sem that
ce85852b 1154 * protects locking operations of this inode.
d5751469 1155 */
e084c1bd 1156 for (i = 0; i < count; i++) {
d5751469
PS
1157 lck = kmalloc(sizeof(struct lock_to_push), GFP_KERNEL);
1158 if (!lck) {
1159 rc = -ENOMEM;
1160 goto err_out;
1161 }
1162 list_add_tail(&lck->llist, &locks_to_send);
1163 }
1164
d5751469 1165 el = locks_to_send.next;
6109c850 1166 spin_lock(&flctx->flc_lock);
bd61e0a9 1167 list_for_each_entry(flock, &flctx->flc_posix, fl_list) {
d5751469 1168 if (el == &locks_to_send) {
ce85852b
PS
1169 /*
1170 * The list ended. We don't have enough allocated
1171 * structures - something is really wrong.
1172 */
f96637be 1173 cifs_dbg(VFS, "Can't push all brlocks!\n");
d5751469
PS
1174 break;
1175 }
4f6bcec9
PS
1176 length = 1 + flock->fl_end - flock->fl_start;
1177 if (flock->fl_type == F_RDLCK || flock->fl_type == F_SHLCK)
1178 type = CIFS_RDLCK;
1179 else
1180 type = CIFS_WRLCK;
d5751469 1181 lck = list_entry(el, struct lock_to_push, llist);
4f6bcec9 1182 lck->pid = flock->fl_pid;
4b4de76e 1183 lck->netfid = cfile->fid.netfid;
d5751469
PS
1184 lck->length = length;
1185 lck->type = type;
1186 lck->offset = flock->fl_start;
4f6bcec9 1187 }
6109c850 1188 spin_unlock(&flctx->flc_lock);
4f6bcec9
PS
1189
1190 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
4f6bcec9
PS
1191 int stored_rc;
1192
4f6bcec9 1193 stored_rc = CIFSSMBPosixLock(xid, tcon, lck->netfid, lck->pid,
c5fd363d 1194 lck->offset, lck->length, NULL,
4f6bcec9
PS
1195 lck->type, 0);
1196 if (stored_rc)
1197 rc = stored_rc;
1198 list_del(&lck->llist);
1199 kfree(lck);
1200 }
1201
d5751469 1202out:
6d5786a3 1203 free_xid(xid);
4f6bcec9 1204 return rc;
d5751469
PS
1205err_out:
1206 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
1207 list_del(&lck->llist);
1208 kfree(lck);
1209 }
1210 goto out;
4f6bcec9
PS
1211}
1212
9ec3c882 1213static int
b8db928b 1214cifs_push_locks(struct cifsFileInfo *cfile)
9ec3c882 1215{
b8db928b 1216 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
9ec3c882 1217 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
b8db928b 1218 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
9ec3c882
PS
1219 int rc = 0;
1220
1221 /* we are going to update can_cache_brlcks here - need a write access */
1222 down_write(&cinode->lock_sem);
1223 if (!cinode->can_cache_brlcks) {
1224 up_write(&cinode->lock_sem);
1225 return rc;
1226 }
4f6bcec9 1227
29e20f9c 1228 if (cap_unix(tcon->ses) &&
4f6bcec9
PS
1229 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1230 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
b8db928b
PS
1231 rc = cifs_push_posix_locks(cfile);
1232 else
1233 rc = tcon->ses->server->ops->push_mand_locks(cfile);
4f6bcec9 1234
b8db928b
PS
1235 cinode->can_cache_brlcks = false;
1236 up_write(&cinode->lock_sem);
1237 return rc;
4f6bcec9
PS
1238}
1239
03776f45 1240static void
04a6aa8a 1241cifs_read_flock(struct file_lock *flock, __u32 *type, int *lock, int *unlock,
106dc538 1242 bool *wait_flag, struct TCP_Server_Info *server)
1da177e4 1243{
03776f45 1244 if (flock->fl_flags & FL_POSIX)
f96637be 1245 cifs_dbg(FYI, "Posix\n");
03776f45 1246 if (flock->fl_flags & FL_FLOCK)
f96637be 1247 cifs_dbg(FYI, "Flock\n");
03776f45 1248 if (flock->fl_flags & FL_SLEEP) {
f96637be 1249 cifs_dbg(FYI, "Blocking lock\n");
03776f45 1250 *wait_flag = true;
1da177e4 1251 }
03776f45 1252 if (flock->fl_flags & FL_ACCESS)
f96637be 1253 cifs_dbg(FYI, "Process suspended by mandatory locking - not implemented yet\n");
03776f45 1254 if (flock->fl_flags & FL_LEASE)
f96637be 1255 cifs_dbg(FYI, "Lease on file - not implemented yet\n");
03776f45 1256 if (flock->fl_flags &
3d6d854a
JL
1257 (~(FL_POSIX | FL_FLOCK | FL_SLEEP |
1258 FL_ACCESS | FL_LEASE | FL_CLOSE)))
f96637be 1259 cifs_dbg(FYI, "Unknown lock flags 0x%x\n", flock->fl_flags);
1da177e4 1260
106dc538 1261 *type = server->vals->large_lock_type;
03776f45 1262 if (flock->fl_type == F_WRLCK) {
f96637be 1263 cifs_dbg(FYI, "F_WRLCK\n");
106dc538 1264 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1265 *lock = 1;
1266 } else if (flock->fl_type == F_UNLCK) {
f96637be 1267 cifs_dbg(FYI, "F_UNLCK\n");
106dc538 1268 *type |= server->vals->unlock_lock_type;
03776f45
PS
1269 *unlock = 1;
1270 /* Check if unlock includes more than one lock range */
1271 } else if (flock->fl_type == F_RDLCK) {
f96637be 1272 cifs_dbg(FYI, "F_RDLCK\n");
106dc538 1273 *type |= server->vals->shared_lock_type;
03776f45
PS
1274 *lock = 1;
1275 } else if (flock->fl_type == F_EXLCK) {
f96637be 1276 cifs_dbg(FYI, "F_EXLCK\n");
106dc538 1277 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1278 *lock = 1;
1279 } else if (flock->fl_type == F_SHLCK) {
f96637be 1280 cifs_dbg(FYI, "F_SHLCK\n");
106dc538 1281 *type |= server->vals->shared_lock_type;
03776f45 1282 *lock = 1;
1da177e4 1283 } else
f96637be 1284 cifs_dbg(FYI, "Unknown type of lock\n");
03776f45 1285}
1da177e4 1286
03776f45 1287static int
04a6aa8a 1288cifs_getlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3 1289 bool wait_flag, bool posix_lck, unsigned int xid)
03776f45
PS
1290{
1291 int rc = 0;
1292 __u64 length = 1 + flock->fl_end - flock->fl_start;
4f6bcec9
PS
1293 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1294 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1295 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e 1296 __u16 netfid = cfile->fid.netfid;
f05337c6 1297
03776f45
PS
1298 if (posix_lck) {
1299 int posix_lock_type;
4f6bcec9
PS
1300
1301 rc = cifs_posix_lock_test(file, flock);
1302 if (!rc)
1303 return rc;
1304
106dc538 1305 if (type & server->vals->shared_lock_type)
03776f45
PS
1306 posix_lock_type = CIFS_RDLCK;
1307 else
1308 posix_lock_type = CIFS_WRLCK;
4f6bcec9 1309 rc = CIFSSMBPosixLock(xid, tcon, netfid, current->tgid,
c5fd363d 1310 flock->fl_start, length, flock,
4f6bcec9 1311 posix_lock_type, wait_flag);
03776f45
PS
1312 return rc;
1313 }
1da177e4 1314
fbd35aca 1315 rc = cifs_lock_test(cfile, flock->fl_start, length, type, flock);
85160e03
PS
1316 if (!rc)
1317 return rc;
1318
03776f45 1319 /* BB we could chain these into one lock request BB */
d39a4f71
PS
1320 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length, type,
1321 1, 0, false);
03776f45 1322 if (rc == 0) {
d39a4f71
PS
1323 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1324 type, 0, 1, false);
03776f45
PS
1325 flock->fl_type = F_UNLCK;
1326 if (rc != 0)
f96637be
JP
1327 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1328 rc);
a88b4707 1329 return 0;
1da177e4 1330 }
7ee1af76 1331
106dc538 1332 if (type & server->vals->shared_lock_type) {
03776f45 1333 flock->fl_type = F_WRLCK;
a88b4707 1334 return 0;
7ee1af76
JA
1335 }
1336
d39a4f71
PS
1337 type &= ~server->vals->exclusive_lock_type;
1338
1339 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1340 type | server->vals->shared_lock_type,
1341 1, 0, false);
03776f45 1342 if (rc == 0) {
d39a4f71
PS
1343 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1344 type | server->vals->shared_lock_type, 0, 1, false);
03776f45
PS
1345 flock->fl_type = F_RDLCK;
1346 if (rc != 0)
f96637be
JP
1347 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1348 rc);
03776f45
PS
1349 } else
1350 flock->fl_type = F_WRLCK;
1351
a88b4707 1352 return 0;
03776f45
PS
1353}
1354
f7ba7fe6 1355void
9ee305b7
PS
1356cifs_move_llist(struct list_head *source, struct list_head *dest)
1357{
1358 struct list_head *li, *tmp;
1359 list_for_each_safe(li, tmp, source)
1360 list_move(li, dest);
1361}
1362
f7ba7fe6 1363void
9ee305b7
PS
1364cifs_free_llist(struct list_head *llist)
1365{
1366 struct cifsLockInfo *li, *tmp;
1367 list_for_each_entry_safe(li, tmp, llist, llist) {
1368 cifs_del_lock_waiters(li);
1369 list_del(&li->llist);
1370 kfree(li);
1371 }
1372}
1373
d39a4f71 1374int
6d5786a3
PS
1375cifs_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
1376 unsigned int xid)
9ee305b7
PS
1377{
1378 int rc = 0, stored_rc;
1379 int types[] = {LOCKING_ANDX_LARGE_FILES,
1380 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
1381 unsigned int i;
0013fb4c 1382 unsigned int max_num, num, max_buf;
9ee305b7
PS
1383 LOCKING_ANDX_RANGE *buf, *cur;
1384 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1385 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1386 struct cifsLockInfo *li, *tmp;
1387 __u64 length = 1 + flock->fl_end - flock->fl_start;
1388 struct list_head tmp_llist;
1389
1390 INIT_LIST_HEAD(&tmp_llist);
1391
0013fb4c
PS
1392 /*
1393 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1394 * and check it for zero before using.
1395 */
1396 max_buf = tcon->ses->server->maxBuf;
1397 if (!max_buf)
1398 return -EINVAL;
1399
1400 max_num = (max_buf - sizeof(struct smb_hdr)) /
1401 sizeof(LOCKING_ANDX_RANGE);
4b99d39b 1402 buf = kcalloc(max_num, sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
9ee305b7
PS
1403 if (!buf)
1404 return -ENOMEM;
1405
1b4b55a1 1406 down_write(&cinode->lock_sem);
9ee305b7
PS
1407 for (i = 0; i < 2; i++) {
1408 cur = buf;
1409 num = 0;
f45d3416 1410 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
9ee305b7
PS
1411 if (flock->fl_start > li->offset ||
1412 (flock->fl_start + length) <
1413 (li->offset + li->length))
1414 continue;
1415 if (current->tgid != li->pid)
1416 continue;
9ee305b7
PS
1417 if (types[i] != li->type)
1418 continue;
ea319d57 1419 if (cinode->can_cache_brlcks) {
9ee305b7
PS
1420 /*
1421 * We can cache brlock requests - simply remove
fbd35aca 1422 * a lock from the file's list.
9ee305b7
PS
1423 */
1424 list_del(&li->llist);
1425 cifs_del_lock_waiters(li);
1426 kfree(li);
ea319d57 1427 continue;
9ee305b7 1428 }
ea319d57
PS
1429 cur->Pid = cpu_to_le16(li->pid);
1430 cur->LengthLow = cpu_to_le32((u32)li->length);
1431 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1432 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1433 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1434 /*
1435 * We need to save a lock here to let us add it again to
1436 * the file's list if the unlock range request fails on
1437 * the server.
1438 */
1439 list_move(&li->llist, &tmp_llist);
1440 if (++num == max_num) {
4b4de76e
PS
1441 stored_rc = cifs_lockv(xid, tcon,
1442 cfile->fid.netfid,
ea319d57
PS
1443 li->type, num, 0, buf);
1444 if (stored_rc) {
1445 /*
1446 * We failed on the unlock range
1447 * request - add all locks from the tmp
1448 * list to the head of the file's list.
1449 */
1450 cifs_move_llist(&tmp_llist,
f45d3416 1451 &cfile->llist->locks);
ea319d57
PS
1452 rc = stored_rc;
1453 } else
1454 /*
1455 * The unlock range request succeed -
1456 * free the tmp list.
1457 */
1458 cifs_free_llist(&tmp_llist);
1459 cur = buf;
1460 num = 0;
1461 } else
1462 cur++;
9ee305b7
PS
1463 }
1464 if (num) {
4b4de76e 1465 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
9ee305b7
PS
1466 types[i], num, 0, buf);
1467 if (stored_rc) {
f45d3416
PS
1468 cifs_move_llist(&tmp_llist,
1469 &cfile->llist->locks);
9ee305b7
PS
1470 rc = stored_rc;
1471 } else
1472 cifs_free_llist(&tmp_llist);
1473 }
1474 }
1475
1b4b55a1 1476 up_write(&cinode->lock_sem);
9ee305b7
PS
1477 kfree(buf);
1478 return rc;
1479}
1480
03776f45 1481static int
f45d3416 1482cifs_setlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3
PS
1483 bool wait_flag, bool posix_lck, int lock, int unlock,
1484 unsigned int xid)
03776f45
PS
1485{
1486 int rc = 0;
1487 __u64 length = 1 + flock->fl_end - flock->fl_start;
1488 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1489 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1490 struct TCP_Server_Info *server = tcon->ses->server;
63b7d3a4 1491 struct inode *inode = cfile->dentry->d_inode;
03776f45
PS
1492
1493 if (posix_lck) {
08547b03 1494 int posix_lock_type;
4f6bcec9
PS
1495
1496 rc = cifs_posix_lock_set(file, flock);
1497 if (!rc || rc < 0)
1498 return rc;
1499
106dc538 1500 if (type & server->vals->shared_lock_type)
08547b03
SF
1501 posix_lock_type = CIFS_RDLCK;
1502 else
1503 posix_lock_type = CIFS_WRLCK;
50c2f753 1504
03776f45 1505 if (unlock == 1)
beb84dc8 1506 posix_lock_type = CIFS_UNLCK;
7ee1af76 1507
f45d3416
PS
1508 rc = CIFSSMBPosixLock(xid, tcon, cfile->fid.netfid,
1509 current->tgid, flock->fl_start, length,
1510 NULL, posix_lock_type, wait_flag);
03776f45
PS
1511 goto out;
1512 }
7ee1af76 1513
03776f45 1514 if (lock) {
161ebf9f
PS
1515 struct cifsLockInfo *lock;
1516
fbd35aca 1517 lock = cifs_lock_init(flock->fl_start, length, type);
161ebf9f
PS
1518 if (!lock)
1519 return -ENOMEM;
1520
fbd35aca 1521 rc = cifs_lock_add_if(cfile, lock, wait_flag);
21cb2d90 1522 if (rc < 0) {
161ebf9f 1523 kfree(lock);
21cb2d90
PS
1524 return rc;
1525 }
1526 if (!rc)
85160e03
PS
1527 goto out;
1528
63b7d3a4
PS
1529 /*
1530 * Windows 7 server can delay breaking lease from read to None
1531 * if we set a byte-range lock on a file - break it explicitly
1532 * before sending the lock to the server to be sure the next
1533 * read won't conflict with non-overlapted locks due to
1534 * pagereading.
1535 */
18cceb6a
PS
1536 if (!CIFS_CACHE_WRITE(CIFS_I(inode)) &&
1537 CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 1538 cifs_zap_mapping(inode);
f96637be
JP
1539 cifs_dbg(FYI, "Set no oplock for inode=%p due to mand locks\n",
1540 inode);
18cceb6a 1541 CIFS_I(inode)->oplock = 0;
63b7d3a4
PS
1542 }
1543
d39a4f71
PS
1544 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1545 type, 1, 0, wait_flag);
161ebf9f
PS
1546 if (rc) {
1547 kfree(lock);
21cb2d90 1548 return rc;
03776f45 1549 }
161ebf9f 1550
fbd35aca 1551 cifs_lock_add(cfile, lock);
9ee305b7 1552 } else if (unlock)
d39a4f71 1553 rc = server->ops->mand_unlock_range(cfile, flock, xid);
03776f45 1554
03776f45
PS
1555out:
1556 if (flock->fl_flags & FL_POSIX)
9ebb389d 1557 posix_lock_file_wait(file, flock);
03776f45
PS
1558 return rc;
1559}
1560
1561int cifs_lock(struct file *file, int cmd, struct file_lock *flock)
1562{
1563 int rc, xid;
1564 int lock = 0, unlock = 0;
1565 bool wait_flag = false;
1566 bool posix_lck = false;
1567 struct cifs_sb_info *cifs_sb;
1568 struct cifs_tcon *tcon;
1569 struct cifsInodeInfo *cinode;
1570 struct cifsFileInfo *cfile;
1571 __u16 netfid;
04a6aa8a 1572 __u32 type;
03776f45
PS
1573
1574 rc = -EACCES;
6d5786a3 1575 xid = get_xid();
03776f45 1576
f96637be
JP
1577 cifs_dbg(FYI, "Lock parm: 0x%x flockflags: 0x%x flocktype: 0x%x start: %lld end: %lld\n",
1578 cmd, flock->fl_flags, flock->fl_type,
1579 flock->fl_start, flock->fl_end);
03776f45 1580
03776f45
PS
1581 cfile = (struct cifsFileInfo *)file->private_data;
1582 tcon = tlink_tcon(cfile->tlink);
106dc538
PS
1583
1584 cifs_read_flock(flock, &type, &lock, &unlock, &wait_flag,
1585 tcon->ses->server);
1586
7119e220 1587 cifs_sb = CIFS_FILE_SB(file);
4b4de76e 1588 netfid = cfile->fid.netfid;
496ad9aa 1589 cinode = CIFS_I(file_inode(file));
03776f45 1590
29e20f9c 1591 if (cap_unix(tcon->ses) &&
03776f45
PS
1592 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1593 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
1594 posix_lck = true;
1595 /*
1596 * BB add code here to normalize offset and length to account for
1597 * negative length which we can not accept over the wire.
1598 */
1599 if (IS_GETLK(cmd)) {
4f6bcec9 1600 rc = cifs_getlk(file, flock, type, wait_flag, posix_lck, xid);
6d5786a3 1601 free_xid(xid);
03776f45
PS
1602 return rc;
1603 }
1604
1605 if (!lock && !unlock) {
1606 /*
1607 * if no lock or unlock then nothing to do since we do not
1608 * know what it is
1609 */
6d5786a3 1610 free_xid(xid);
03776f45 1611 return -EOPNOTSUPP;
7ee1af76
JA
1612 }
1613
03776f45
PS
1614 rc = cifs_setlk(file, flock, type, wait_flag, posix_lck, lock, unlock,
1615 xid);
6d5786a3 1616 free_xid(xid);
1da177e4
LT
1617 return rc;
1618}
1619
597b027f
JL
1620/*
1621 * update the file size (if needed) after a write. Should be called with
1622 * the inode->i_lock held
1623 */
72432ffc 1624void
fbec9ab9
JL
1625cifs_update_eof(struct cifsInodeInfo *cifsi, loff_t offset,
1626 unsigned int bytes_written)
1627{
1628 loff_t end_of_write = offset + bytes_written;
1629
1630 if (end_of_write > cifsi->server_eof)
1631 cifsi->server_eof = end_of_write;
1632}
1633
ba9ad725
PS
1634static ssize_t
1635cifs_write(struct cifsFileInfo *open_file, __u32 pid, const char *write_data,
1636 size_t write_size, loff_t *offset)
1da177e4
LT
1637{
1638 int rc = 0;
1639 unsigned int bytes_written = 0;
1640 unsigned int total_written;
1641 struct cifs_sb_info *cifs_sb;
ba9ad725
PS
1642 struct cifs_tcon *tcon;
1643 struct TCP_Server_Info *server;
6d5786a3 1644 unsigned int xid;
7da4b49a
JL
1645 struct dentry *dentry = open_file->dentry;
1646 struct cifsInodeInfo *cifsi = CIFS_I(dentry->d_inode);
fa2989f4 1647 struct cifs_io_parms io_parms;
1da177e4 1648
7da4b49a 1649 cifs_sb = CIFS_SB(dentry->d_sb);
1da177e4 1650
35c265e0
AV
1651 cifs_dbg(FYI, "write %zd bytes to offset %lld of %pd\n",
1652 write_size, *offset, dentry);
1da177e4 1653
ba9ad725
PS
1654 tcon = tlink_tcon(open_file->tlink);
1655 server = tcon->ses->server;
1656
1657 if (!server->ops->sync_write)
1658 return -ENOSYS;
50c2f753 1659
6d5786a3 1660 xid = get_xid();
1da177e4 1661
1da177e4
LT
1662 for (total_written = 0; write_size > total_written;
1663 total_written += bytes_written) {
1664 rc = -EAGAIN;
1665 while (rc == -EAGAIN) {
ca83ce3d
JL
1666 struct kvec iov[2];
1667 unsigned int len;
1668
1da177e4 1669 if (open_file->invalidHandle) {
1da177e4
LT
1670 /* we could deadlock if we called
1671 filemap_fdatawait from here so tell
fb8c4b14 1672 reopen_file not to flush data to
1da177e4 1673 server now */
15886177 1674 rc = cifs_reopen_file(open_file, false);
1da177e4
LT
1675 if (rc != 0)
1676 break;
1677 }
ca83ce3d 1678
cb7e9eab
PS
1679 len = min(server->ops->wp_retry_size(dentry->d_inode),
1680 (unsigned int)write_size - total_written);
ca83ce3d
JL
1681 /* iov[0] is reserved for smb header */
1682 iov[1].iov_base = (char *)write_data + total_written;
1683 iov[1].iov_len = len;
fa2989f4 1684 io_parms.pid = pid;
ba9ad725
PS
1685 io_parms.tcon = tcon;
1686 io_parms.offset = *offset;
fa2989f4 1687 io_parms.length = len;
db8b631d
SF
1688 rc = server->ops->sync_write(xid, &open_file->fid,
1689 &io_parms, &bytes_written, iov, 1);
1da177e4
LT
1690 }
1691 if (rc || (bytes_written == 0)) {
1692 if (total_written)
1693 break;
1694 else {
6d5786a3 1695 free_xid(xid);
1da177e4
LT
1696 return rc;
1697 }
fbec9ab9 1698 } else {
597b027f 1699 spin_lock(&dentry->d_inode->i_lock);
ba9ad725 1700 cifs_update_eof(cifsi, *offset, bytes_written);
597b027f 1701 spin_unlock(&dentry->d_inode->i_lock);
ba9ad725 1702 *offset += bytes_written;
fbec9ab9 1703 }
1da177e4
LT
1704 }
1705
ba9ad725 1706 cifs_stats_bytes_written(tcon, total_written);
1da177e4 1707
7da4b49a
JL
1708 if (total_written > 0) {
1709 spin_lock(&dentry->d_inode->i_lock);
ba9ad725
PS
1710 if (*offset > dentry->d_inode->i_size)
1711 i_size_write(dentry->d_inode, *offset);
7da4b49a 1712 spin_unlock(&dentry->d_inode->i_lock);
1da177e4 1713 }
7da4b49a 1714 mark_inode_dirty_sync(dentry->d_inode);
6d5786a3 1715 free_xid(xid);
1da177e4
LT
1716 return total_written;
1717}
1718
6508d904
JL
1719struct cifsFileInfo *find_readable_file(struct cifsInodeInfo *cifs_inode,
1720 bool fsuid_only)
630f3f0c
SF
1721{
1722 struct cifsFileInfo *open_file = NULL;
6508d904
JL
1723 struct cifs_sb_info *cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1724
1725 /* only filter by fsuid on multiuser mounts */
1726 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1727 fsuid_only = false;
630f3f0c 1728
4477288a 1729 spin_lock(&cifs_file_list_lock);
630f3f0c
SF
1730 /* we could simply get the first_list_entry since write-only entries
1731 are always at the end of the list but since the first entry might
1732 have a close pending, we go through the whole list */
1733 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
fef59fd7 1734 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6508d904 1735 continue;
2e396b83 1736 if (OPEN_FMODE(open_file->f_flags) & FMODE_READ) {
630f3f0c
SF
1737 if (!open_file->invalidHandle) {
1738 /* found a good file */
1739 /* lock it so it will not be closed on us */
764a1b1a 1740 cifsFileInfo_get_locked(open_file);
4477288a 1741 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1742 return open_file;
1743 } /* else might as well continue, and look for
1744 another, or simply have the caller reopen it
1745 again rather than trying to fix this handle */
1746 } else /* write only file */
1747 break; /* write only files are last so must be done */
1748 }
4477288a 1749 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1750 return NULL;
1751}
630f3f0c 1752
6508d904
JL
1753struct cifsFileInfo *find_writable_file(struct cifsInodeInfo *cifs_inode,
1754 bool fsuid_only)
6148a742 1755{
2c0c2a08 1756 struct cifsFileInfo *open_file, *inv_file = NULL;
d3892294 1757 struct cifs_sb_info *cifs_sb;
2846d386 1758 bool any_available = false;
dd99cd80 1759 int rc;
2c0c2a08 1760 unsigned int refind = 0;
6148a742 1761
60808233
SF
1762 /* Having a null inode here (because mapping->host was set to zero by
1763 the VFS or MM) should not happen but we had reports of on oops (due to
1764 it being zero) during stress testcases so we need to check for it */
1765
fb8c4b14 1766 if (cifs_inode == NULL) {
f96637be 1767 cifs_dbg(VFS, "Null inode passed to cifs_writeable_file\n");
60808233
SF
1768 dump_stack();
1769 return NULL;
1770 }
1771
d3892294
JL
1772 cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1773
6508d904
JL
1774 /* only filter by fsuid on multiuser mounts */
1775 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1776 fsuid_only = false;
1777
4477288a 1778 spin_lock(&cifs_file_list_lock);
9b22b0b7 1779refind_writable:
2c0c2a08
SP
1780 if (refind > MAX_REOPEN_ATT) {
1781 spin_unlock(&cifs_file_list_lock);
1782 return NULL;
1783 }
6148a742 1784 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
6508d904
JL
1785 if (!any_available && open_file->pid != current->tgid)
1786 continue;
fef59fd7 1787 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6148a742 1788 continue;
2e396b83 1789 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
9b22b0b7
SF
1790 if (!open_file->invalidHandle) {
1791 /* found a good writable file */
764a1b1a 1792 cifsFileInfo_get_locked(open_file);
4477288a 1793 spin_unlock(&cifs_file_list_lock);
9b22b0b7 1794 return open_file;
2c0c2a08
SP
1795 } else {
1796 if (!inv_file)
1797 inv_file = open_file;
9b22b0b7 1798 }
6148a742
SF
1799 }
1800 }
2846d386
JL
1801 /* couldn't find useable FH with same pid, try any available */
1802 if (!any_available) {
1803 any_available = true;
1804 goto refind_writable;
1805 }
2c0c2a08
SP
1806
1807 if (inv_file) {
1808 any_available = false;
764a1b1a 1809 cifsFileInfo_get_locked(inv_file);
2c0c2a08
SP
1810 }
1811
4477288a 1812 spin_unlock(&cifs_file_list_lock);
2c0c2a08
SP
1813
1814 if (inv_file) {
1815 rc = cifs_reopen_file(inv_file, false);
1816 if (!rc)
1817 return inv_file;
1818 else {
1819 spin_lock(&cifs_file_list_lock);
1820 list_move_tail(&inv_file->flist,
1821 &cifs_inode->openFileList);
1822 spin_unlock(&cifs_file_list_lock);
1823 cifsFileInfo_put(inv_file);
1824 spin_lock(&cifs_file_list_lock);
1825 ++refind;
e1e9bda2 1826 inv_file = NULL;
2c0c2a08
SP
1827 goto refind_writable;
1828 }
1829 }
1830
6148a742
SF
1831 return NULL;
1832}
1833
1da177e4
LT
1834static int cifs_partialpagewrite(struct page *page, unsigned from, unsigned to)
1835{
1836 struct address_space *mapping = page->mapping;
1837 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
1838 char *write_data;
1839 int rc = -EFAULT;
1840 int bytes_written = 0;
1da177e4 1841 struct inode *inode;
6148a742 1842 struct cifsFileInfo *open_file;
1da177e4
LT
1843
1844 if (!mapping || !mapping->host)
1845 return -EFAULT;
1846
1847 inode = page->mapping->host;
1da177e4
LT
1848
1849 offset += (loff_t)from;
1850 write_data = kmap(page);
1851 write_data += from;
1852
1853 if ((to > PAGE_CACHE_SIZE) || (from > to)) {
1854 kunmap(page);
1855 return -EIO;
1856 }
1857
1858 /* racing with truncate? */
1859 if (offset > mapping->host->i_size) {
1860 kunmap(page);
1861 return 0; /* don't care */
1862 }
1863
1864 /* check to make sure that we are not extending the file */
1865 if (mapping->host->i_size - offset < (loff_t)to)
fb8c4b14 1866 to = (unsigned)(mapping->host->i_size - offset);
1da177e4 1867
6508d904 1868 open_file = find_writable_file(CIFS_I(mapping->host), false);
6148a742 1869 if (open_file) {
fa2989f4
PS
1870 bytes_written = cifs_write(open_file, open_file->pid,
1871 write_data, to - from, &offset);
6ab409b5 1872 cifsFileInfo_put(open_file);
1da177e4 1873 /* Does mm or vfs already set times? */
6148a742 1874 inode->i_atime = inode->i_mtime = current_fs_time(inode->i_sb);
bb5a9a04 1875 if ((bytes_written > 0) && (offset))
6148a742 1876 rc = 0;
bb5a9a04
SF
1877 else if (bytes_written < 0)
1878 rc = bytes_written;
6148a742 1879 } else {
f96637be 1880 cifs_dbg(FYI, "No writeable filehandles for inode\n");
1da177e4
LT
1881 rc = -EIO;
1882 }
1883
1884 kunmap(page);
1885 return rc;
1886}
1887
90ac1387
PS
1888static struct cifs_writedata *
1889wdata_alloc_and_fillpages(pgoff_t tofind, struct address_space *mapping,
1890 pgoff_t end, pgoff_t *index,
1891 unsigned int *found_pages)
1892{
1893 unsigned int nr_pages;
1894 struct page **pages;
1895 struct cifs_writedata *wdata;
1896
1897 wdata = cifs_writedata_alloc((unsigned int)tofind,
1898 cifs_writev_complete);
1899 if (!wdata)
1900 return NULL;
1901
1902 /*
1903 * find_get_pages_tag seems to return a max of 256 on each
1904 * iteration, so we must call it several times in order to
1905 * fill the array or the wsize is effectively limited to
1906 * 256 * PAGE_CACHE_SIZE.
1907 */
1908 *found_pages = 0;
1909 pages = wdata->pages;
1910 do {
1911 nr_pages = find_get_pages_tag(mapping, index,
1912 PAGECACHE_TAG_DIRTY, tofind,
1913 pages);
1914 *found_pages += nr_pages;
1915 tofind -= nr_pages;
1916 pages += nr_pages;
1917 } while (nr_pages && tofind && *index <= end);
1918
1919 return wdata;
1920}
1921
7e48ff82
PS
1922static unsigned int
1923wdata_prepare_pages(struct cifs_writedata *wdata, unsigned int found_pages,
1924 struct address_space *mapping,
1925 struct writeback_control *wbc,
1926 pgoff_t end, pgoff_t *index, pgoff_t *next, bool *done)
1927{
1928 unsigned int nr_pages = 0, i;
1929 struct page *page;
1930
1931 for (i = 0; i < found_pages; i++) {
1932 page = wdata->pages[i];
1933 /*
1934 * At this point we hold neither mapping->tree_lock nor
1935 * lock on the page itself: the page may be truncated or
1936 * invalidated (changing page->mapping to NULL), or even
1937 * swizzled back from swapper_space to tmpfs file
1938 * mapping
1939 */
1940
1941 if (nr_pages == 0)
1942 lock_page(page);
1943 else if (!trylock_page(page))
1944 break;
1945
1946 if (unlikely(page->mapping != mapping)) {
1947 unlock_page(page);
1948 break;
1949 }
1950
1951 if (!wbc->range_cyclic && page->index > end) {
1952 *done = true;
1953 unlock_page(page);
1954 break;
1955 }
1956
1957 if (*next && (page->index != *next)) {
1958 /* Not next consecutive page */
1959 unlock_page(page);
1960 break;
1961 }
1962
1963 if (wbc->sync_mode != WB_SYNC_NONE)
1964 wait_on_page_writeback(page);
1965
1966 if (PageWriteback(page) ||
1967 !clear_page_dirty_for_io(page)) {
1968 unlock_page(page);
1969 break;
1970 }
1971
1972 /*
1973 * This actually clears the dirty bit in the radix tree.
1974 * See cifs_writepage() for more commentary.
1975 */
1976 set_page_writeback(page);
1977 if (page_offset(page) >= i_size_read(mapping->host)) {
1978 *done = true;
1979 unlock_page(page);
1980 end_page_writeback(page);
1981 break;
1982 }
1983
1984 wdata->pages[i] = page;
1985 *next = page->index + 1;
1986 ++nr_pages;
1987 }
1988
1989 /* reset index to refind any pages skipped */
1990 if (nr_pages == 0)
1991 *index = wdata->pages[0]->index + 1;
1992
1993 /* put any pages we aren't going to use */
1994 for (i = nr_pages; i < found_pages; i++) {
1995 page_cache_release(wdata->pages[i]);
1996 wdata->pages[i] = NULL;
1997 }
1998
1999 return nr_pages;
2000}
2001
619aa48e
PS
2002static int
2003wdata_send_pages(struct cifs_writedata *wdata, unsigned int nr_pages,
2004 struct address_space *mapping, struct writeback_control *wbc)
2005{
2006 int rc = 0;
2007 struct TCP_Server_Info *server;
2008 unsigned int i;
2009
2010 wdata->sync_mode = wbc->sync_mode;
2011 wdata->nr_pages = nr_pages;
2012 wdata->offset = page_offset(wdata->pages[0]);
2013 wdata->pagesz = PAGE_CACHE_SIZE;
2014 wdata->tailsz = min(i_size_read(mapping->host) -
2015 page_offset(wdata->pages[nr_pages - 1]),
2016 (loff_t)PAGE_CACHE_SIZE);
2017 wdata->bytes = ((nr_pages - 1) * PAGE_CACHE_SIZE) + wdata->tailsz;
2018
66231a47
PS
2019 if (wdata->cfile != NULL)
2020 cifsFileInfo_put(wdata->cfile);
2021 wdata->cfile = find_writable_file(CIFS_I(mapping->host), false);
2022 if (!wdata->cfile) {
2023 cifs_dbg(VFS, "No writable handles for inode\n");
2024 rc = -EBADF;
2025 } else {
619aa48e
PS
2026 wdata->pid = wdata->cfile->pid;
2027 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
2028 rc = server->ops->async_writev(wdata, cifs_writedata_release);
66231a47 2029 }
619aa48e
PS
2030
2031 for (i = 0; i < nr_pages; ++i)
2032 unlock_page(wdata->pages[i]);
2033
2034 return rc;
2035}
2036
1da177e4 2037static int cifs_writepages(struct address_space *mapping,
37c0eb46 2038 struct writeback_control *wbc)
1da177e4 2039{
c3d17b63 2040 struct cifs_sb_info *cifs_sb = CIFS_SB(mapping->host->i_sb);
cb7e9eab 2041 struct TCP_Server_Info *server;
c3d17b63
JL
2042 bool done = false, scanned = false, range_whole = false;
2043 pgoff_t end, index;
2044 struct cifs_writedata *wdata;
37c0eb46 2045 int rc = 0;
50c2f753 2046
37c0eb46 2047 /*
c3d17b63 2048 * If wsize is smaller than the page cache size, default to writing
37c0eb46
SF
2049 * one page at a time via cifs_writepage
2050 */
2051 if (cifs_sb->wsize < PAGE_CACHE_SIZE)
2052 return generic_writepages(mapping, wbc);
2053
111ebb6e 2054 if (wbc->range_cyclic) {
37c0eb46 2055 index = mapping->writeback_index; /* Start from prev offset */
111ebb6e
OH
2056 end = -1;
2057 } else {
2058 index = wbc->range_start >> PAGE_CACHE_SHIFT;
2059 end = wbc->range_end >> PAGE_CACHE_SHIFT;
2060 if (wbc->range_start == 0 && wbc->range_end == LLONG_MAX)
c3d17b63
JL
2061 range_whole = true;
2062 scanned = true;
37c0eb46 2063 }
cb7e9eab 2064 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
37c0eb46 2065retry:
c3d17b63 2066 while (!done && index <= end) {
cb7e9eab 2067 unsigned int i, nr_pages, found_pages, wsize, credits;
66231a47 2068 pgoff_t next = 0, tofind, saved_index = index;
c3d17b63 2069
cb7e9eab
PS
2070 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2071 &wsize, &credits);
2072 if (rc)
2073 break;
c3d17b63 2074
cb7e9eab 2075 tofind = min((wsize / PAGE_CACHE_SIZE) - 1, end - index) + 1;
c3d17b63 2076
90ac1387
PS
2077 wdata = wdata_alloc_and_fillpages(tofind, mapping, end, &index,
2078 &found_pages);
c3d17b63
JL
2079 if (!wdata) {
2080 rc = -ENOMEM;
cb7e9eab 2081 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2082 break;
2083 }
2084
c3d17b63
JL
2085 if (found_pages == 0) {
2086 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2087 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2088 break;
2089 }
2090
7e48ff82
PS
2091 nr_pages = wdata_prepare_pages(wdata, found_pages, mapping, wbc,
2092 end, &index, &next, &done);
37c0eb46 2093
c3d17b63
JL
2094 /* nothing to write? */
2095 if (nr_pages == 0) {
2096 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2097 add_credits_and_wake_if(server, credits, 0);
c3d17b63 2098 continue;
37c0eb46 2099 }
fbec9ab9 2100
cb7e9eab 2101 wdata->credits = credits;
941b853d 2102
619aa48e 2103 rc = wdata_send_pages(wdata, nr_pages, mapping, wbc);
f3983c21 2104
c3d17b63
JL
2105 /* send failure -- clean up the mess */
2106 if (rc != 0) {
cb7e9eab 2107 add_credits_and_wake_if(server, wdata->credits, 0);
c3d17b63 2108 for (i = 0; i < nr_pages; ++i) {
941b853d 2109 if (rc == -EAGAIN)
c3d17b63
JL
2110 redirty_page_for_writepage(wbc,
2111 wdata->pages[i]);
2112 else
2113 SetPageError(wdata->pages[i]);
2114 end_page_writeback(wdata->pages[i]);
2115 page_cache_release(wdata->pages[i]);
37c0eb46 2116 }
941b853d
JL
2117 if (rc != -EAGAIN)
2118 mapping_set_error(mapping, rc);
c3d17b63
JL
2119 }
2120 kref_put(&wdata->refcount, cifs_writedata_release);
941b853d 2121
66231a47
PS
2122 if (wbc->sync_mode == WB_SYNC_ALL && rc == -EAGAIN) {
2123 index = saved_index;
2124 continue;
2125 }
2126
c3d17b63
JL
2127 wbc->nr_to_write -= nr_pages;
2128 if (wbc->nr_to_write <= 0)
2129 done = true;
b066a48c 2130
c3d17b63 2131 index = next;
37c0eb46 2132 }
c3d17b63 2133
37c0eb46
SF
2134 if (!scanned && !done) {
2135 /*
2136 * We hit the last page and there is more work to be done: wrap
2137 * back to the start of the file
2138 */
c3d17b63 2139 scanned = true;
37c0eb46
SF
2140 index = 0;
2141 goto retry;
2142 }
c3d17b63 2143
111ebb6e 2144 if (wbc->range_cyclic || (range_whole && wbc->nr_to_write > 0))
37c0eb46
SF
2145 mapping->writeback_index = index;
2146
1da177e4
LT
2147 return rc;
2148}
1da177e4 2149
9ad1506b
PS
2150static int
2151cifs_writepage_locked(struct page *page, struct writeback_control *wbc)
1da177e4 2152{
9ad1506b 2153 int rc;
6d5786a3 2154 unsigned int xid;
1da177e4 2155
6d5786a3 2156 xid = get_xid();
1da177e4
LT
2157/* BB add check for wbc flags */
2158 page_cache_get(page);
ad7a2926 2159 if (!PageUptodate(page))
f96637be 2160 cifs_dbg(FYI, "ppw - page not up to date\n");
cb876f45
LT
2161
2162 /*
2163 * Set the "writeback" flag, and clear "dirty" in the radix tree.
2164 *
2165 * A writepage() implementation always needs to do either this,
2166 * or re-dirty the page with "redirty_page_for_writepage()" in
2167 * the case of a failure.
2168 *
2169 * Just unlocking the page will cause the radix tree tag-bits
2170 * to fail to update with the state of the page correctly.
2171 */
fb8c4b14 2172 set_page_writeback(page);
9ad1506b 2173retry_write:
1da177e4 2174 rc = cifs_partialpagewrite(page, 0, PAGE_CACHE_SIZE);
9ad1506b
PS
2175 if (rc == -EAGAIN && wbc->sync_mode == WB_SYNC_ALL)
2176 goto retry_write;
2177 else if (rc == -EAGAIN)
2178 redirty_page_for_writepage(wbc, page);
2179 else if (rc != 0)
2180 SetPageError(page);
2181 else
2182 SetPageUptodate(page);
cb876f45
LT
2183 end_page_writeback(page);
2184 page_cache_release(page);
6d5786a3 2185 free_xid(xid);
1da177e4
LT
2186 return rc;
2187}
2188
9ad1506b
PS
2189static int cifs_writepage(struct page *page, struct writeback_control *wbc)
2190{
2191 int rc = cifs_writepage_locked(page, wbc);
2192 unlock_page(page);
2193 return rc;
2194}
2195
d9414774
NP
2196static int cifs_write_end(struct file *file, struct address_space *mapping,
2197 loff_t pos, unsigned len, unsigned copied,
2198 struct page *page, void *fsdata)
1da177e4 2199{
d9414774
NP
2200 int rc;
2201 struct inode *inode = mapping->host;
d4ffff1f
PS
2202 struct cifsFileInfo *cfile = file->private_data;
2203 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2204 __u32 pid;
2205
2206 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2207 pid = cfile->pid;
2208 else
2209 pid = current->tgid;
1da177e4 2210
f96637be 2211 cifs_dbg(FYI, "write_end for page %p from pos %lld with %d bytes\n",
b6b38f70 2212 page, pos, copied);
d9414774 2213
a98ee8c1
JL
2214 if (PageChecked(page)) {
2215 if (copied == len)
2216 SetPageUptodate(page);
2217 ClearPageChecked(page);
2218 } else if (!PageUptodate(page) && copied == PAGE_CACHE_SIZE)
d9414774 2219 SetPageUptodate(page);
ad7a2926 2220
1da177e4 2221 if (!PageUptodate(page)) {
d9414774
NP
2222 char *page_data;
2223 unsigned offset = pos & (PAGE_CACHE_SIZE - 1);
6d5786a3 2224 unsigned int xid;
d9414774 2225
6d5786a3 2226 xid = get_xid();
1da177e4
LT
2227 /* this is probably better than directly calling
2228 partialpage_write since in this function the file handle is
2229 known which we might as well leverage */
2230 /* BB check if anything else missing out of ppw
2231 such as updating last write time */
2232 page_data = kmap(page);
d4ffff1f 2233 rc = cifs_write(cfile, pid, page_data + offset, copied, &pos);
d9414774 2234 /* if (rc < 0) should we set writebehind rc? */
1da177e4 2235 kunmap(page);
d9414774 2236
6d5786a3 2237 free_xid(xid);
fb8c4b14 2238 } else {
d9414774
NP
2239 rc = copied;
2240 pos += copied;
ca8aa29c 2241 set_page_dirty(page);
1da177e4
LT
2242 }
2243
d9414774
NP
2244 if (rc > 0) {
2245 spin_lock(&inode->i_lock);
2246 if (pos > inode->i_size)
2247 i_size_write(inode, pos);
2248 spin_unlock(&inode->i_lock);
2249 }
2250
2251 unlock_page(page);
2252 page_cache_release(page);
2253
1da177e4
LT
2254 return rc;
2255}
2256
02c24a82
JB
2257int cifs_strict_fsync(struct file *file, loff_t start, loff_t end,
2258 int datasync)
1da177e4 2259{
6d5786a3 2260 unsigned int xid;
1da177e4 2261 int rc = 0;
96daf2b0 2262 struct cifs_tcon *tcon;
1d8c4c00 2263 struct TCP_Server_Info *server;
c21dfb69 2264 struct cifsFileInfo *smbfile = file->private_data;
496ad9aa 2265 struct inode *inode = file_inode(file);
8be7e6ba 2266 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 2267
02c24a82
JB
2268 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2269 if (rc)
2270 return rc;
2271 mutex_lock(&inode->i_mutex);
2272
6d5786a3 2273 xid = get_xid();
1da177e4 2274
35c265e0
AV
2275 cifs_dbg(FYI, "Sync file - name: %pD datasync: 0x%x\n",
2276 file, datasync);
50c2f753 2277
18cceb6a 2278 if (!CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 2279 rc = cifs_zap_mapping(inode);
6feb9891 2280 if (rc) {
f96637be 2281 cifs_dbg(FYI, "rc: %d during invalidate phase\n", rc);
6feb9891
PS
2282 rc = 0; /* don't care about it in fsync */
2283 }
2284 }
eb4b756b 2285
8be7e6ba 2286 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2287 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2288 server = tcon->ses->server;
2289 if (server->ops->flush)
2290 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2291 else
2292 rc = -ENOSYS;
2293 }
8be7e6ba 2294
6d5786a3 2295 free_xid(xid);
02c24a82 2296 mutex_unlock(&inode->i_mutex);
8be7e6ba
PS
2297 return rc;
2298}
2299
02c24a82 2300int cifs_fsync(struct file *file, loff_t start, loff_t end, int datasync)
8be7e6ba 2301{
6d5786a3 2302 unsigned int xid;
8be7e6ba 2303 int rc = 0;
96daf2b0 2304 struct cifs_tcon *tcon;
1d8c4c00 2305 struct TCP_Server_Info *server;
8be7e6ba 2306 struct cifsFileInfo *smbfile = file->private_data;
7119e220 2307 struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file);
02c24a82
JB
2308 struct inode *inode = file->f_mapping->host;
2309
2310 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2311 if (rc)
2312 return rc;
2313 mutex_lock(&inode->i_mutex);
8be7e6ba 2314
6d5786a3 2315 xid = get_xid();
8be7e6ba 2316
35c265e0
AV
2317 cifs_dbg(FYI, "Sync file - name: %pD datasync: 0x%x\n",
2318 file, datasync);
8be7e6ba
PS
2319
2320 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2321 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2322 server = tcon->ses->server;
2323 if (server->ops->flush)
2324 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2325 else
2326 rc = -ENOSYS;
2327 }
b298f223 2328
6d5786a3 2329 free_xid(xid);
02c24a82 2330 mutex_unlock(&inode->i_mutex);
1da177e4
LT
2331 return rc;
2332}
2333
1da177e4
LT
2334/*
2335 * As file closes, flush all cached write data for this inode checking
2336 * for write behind errors.
2337 */
75e1fcc0 2338int cifs_flush(struct file *file, fl_owner_t id)
1da177e4 2339{
496ad9aa 2340 struct inode *inode = file_inode(file);
1da177e4
LT
2341 int rc = 0;
2342
eb4b756b 2343 if (file->f_mode & FMODE_WRITE)
d3f1322a 2344 rc = filemap_write_and_wait(inode->i_mapping);
50c2f753 2345
f96637be 2346 cifs_dbg(FYI, "Flush inode %p file %p rc %d\n", inode, file, rc);
1da177e4
LT
2347
2348 return rc;
2349}
2350
72432ffc
PS
2351static int
2352cifs_write_allocate_pages(struct page **pages, unsigned long num_pages)
2353{
2354 int rc = 0;
2355 unsigned long i;
2356
2357 for (i = 0; i < num_pages; i++) {
e94f7ba1 2358 pages[i] = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
72432ffc
PS
2359 if (!pages[i]) {
2360 /*
2361 * save number of pages we have already allocated and
2362 * return with ENOMEM error
2363 */
2364 num_pages = i;
2365 rc = -ENOMEM;
e94f7ba1 2366 break;
72432ffc
PS
2367 }
2368 }
2369
e94f7ba1
JL
2370 if (rc) {
2371 for (i = 0; i < num_pages; i++)
2372 put_page(pages[i]);
2373 }
72432ffc
PS
2374 return rc;
2375}
2376
2377static inline
2378size_t get_numpages(const size_t wsize, const size_t len, size_t *cur_len)
2379{
2380 size_t num_pages;
2381 size_t clen;
2382
2383 clen = min_t(const size_t, len, wsize);
a7103b99 2384 num_pages = DIV_ROUND_UP(clen, PAGE_SIZE);
72432ffc
PS
2385
2386 if (cur_len)
2387 *cur_len = clen;
2388
2389 return num_pages;
2390}
2391
da82f7e7 2392static void
4a5c80d7 2393cifs_uncached_writedata_release(struct kref *refcount)
da82f7e7
JL
2394{
2395 int i;
4a5c80d7
SF
2396 struct cifs_writedata *wdata = container_of(refcount,
2397 struct cifs_writedata, refcount);
2398
2399 for (i = 0; i < wdata->nr_pages; i++)
2400 put_page(wdata->pages[i]);
2401 cifs_writedata_release(refcount);
2402}
2403
2404static void
2405cifs_uncached_writev_complete(struct work_struct *work)
2406{
da82f7e7
JL
2407 struct cifs_writedata *wdata = container_of(work,
2408 struct cifs_writedata, work);
2409 struct inode *inode = wdata->cfile->dentry->d_inode;
2410 struct cifsInodeInfo *cifsi = CIFS_I(inode);
2411
2412 spin_lock(&inode->i_lock);
2413 cifs_update_eof(cifsi, wdata->offset, wdata->bytes);
2414 if (cifsi->server_eof > inode->i_size)
2415 i_size_write(inode, cifsi->server_eof);
2416 spin_unlock(&inode->i_lock);
2417
2418 complete(&wdata->done);
2419
4a5c80d7 2420 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
da82f7e7
JL
2421}
2422
da82f7e7 2423static int
66386c08
PS
2424wdata_fill_from_iovec(struct cifs_writedata *wdata, struct iov_iter *from,
2425 size_t *len, unsigned long *num_pages)
da82f7e7 2426{
66386c08
PS
2427 size_t save_len, copied, bytes, cur_len = *len;
2428 unsigned long i, nr_pages = *num_pages;
c9de5c80 2429
66386c08
PS
2430 save_len = cur_len;
2431 for (i = 0; i < nr_pages; i++) {
2432 bytes = min_t(const size_t, cur_len, PAGE_SIZE);
2433 copied = copy_page_from_iter(wdata->pages[i], 0, bytes, from);
2434 cur_len -= copied;
2435 /*
2436 * If we didn't copy as much as we expected, then that
2437 * may mean we trod into an unmapped area. Stop copying
2438 * at that point. On the next pass through the big
2439 * loop, we'll likely end up getting a zero-length
2440 * write and bailing out of it.
2441 */
2442 if (copied < bytes)
2443 break;
2444 }
2445 cur_len = save_len - cur_len;
2446 *len = cur_len;
da82f7e7 2447
66386c08
PS
2448 /*
2449 * If we have no data to send, then that probably means that
2450 * the copy above failed altogether. That's most likely because
2451 * the address in the iovec was bogus. Return -EFAULT and let
2452 * the caller free anything we allocated and bail out.
2453 */
2454 if (!cur_len)
2455 return -EFAULT;
da82f7e7 2456
66386c08
PS
2457 /*
2458 * i + 1 now represents the number of pages we actually used in
2459 * the copy phase above.
2460 */
2461 *num_pages = i + 1;
2462 return 0;
da82f7e7
JL
2463}
2464
43de94ea
PS
2465static int
2466cifs_write_from_iter(loff_t offset, size_t len, struct iov_iter *from,
2467 struct cifsFileInfo *open_file,
2468 struct cifs_sb_info *cifs_sb, struct list_head *wdata_list)
72432ffc 2469{
43de94ea
PS
2470 int rc = 0;
2471 size_t cur_len;
66386c08 2472 unsigned long nr_pages, num_pages, i;
43de94ea 2473 struct cifs_writedata *wdata;
6ec0b01b
PS
2474 struct iov_iter saved_from;
2475 loff_t saved_offset = offset;
da82f7e7 2476 pid_t pid;
6ec0b01b 2477 struct TCP_Server_Info *server;
d4ffff1f
PS
2478
2479 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2480 pid = open_file->pid;
2481 else
2482 pid = current->tgid;
2483
6ec0b01b
PS
2484 server = tlink_tcon(open_file->tlink)->ses->server;
2485 memcpy(&saved_from, from, sizeof(struct iov_iter));
2486
72432ffc 2487 do {
cb7e9eab
PS
2488 unsigned int wsize, credits;
2489
2490 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2491 &wsize, &credits);
2492 if (rc)
2493 break;
da82f7e7 2494
cb7e9eab 2495 nr_pages = get_numpages(wsize, len, &cur_len);
da82f7e7
JL
2496 wdata = cifs_writedata_alloc(nr_pages,
2497 cifs_uncached_writev_complete);
2498 if (!wdata) {
2499 rc = -ENOMEM;
cb7e9eab 2500 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2501 break;
2502 }
2503
2504 rc = cifs_write_allocate_pages(wdata->pages, nr_pages);
2505 if (rc) {
2506 kfree(wdata);
cb7e9eab 2507 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2508 break;
2509 }
2510
66386c08
PS
2511 num_pages = nr_pages;
2512 rc = wdata_fill_from_iovec(wdata, from, &cur_len, &num_pages);
2513 if (rc) {
5d81de8e
JL
2514 for (i = 0; i < nr_pages; i++)
2515 put_page(wdata->pages[i]);
2516 kfree(wdata);
cb7e9eab 2517 add_credits_and_wake_if(server, credits, 0);
5d81de8e
JL
2518 break;
2519 }
2520
2521 /*
66386c08
PS
2522 * Bring nr_pages down to the number of pages we actually used,
2523 * and free any pages that we didn't use.
5d81de8e 2524 */
66386c08 2525 for ( ; nr_pages > num_pages; nr_pages--)
5d81de8e
JL
2526 put_page(wdata->pages[nr_pages - 1]);
2527
da82f7e7
JL
2528 wdata->sync_mode = WB_SYNC_ALL;
2529 wdata->nr_pages = nr_pages;
2530 wdata->offset = (__u64)offset;
2531 wdata->cfile = cifsFileInfo_get(open_file);
2532 wdata->pid = pid;
2533 wdata->bytes = cur_len;
eddb079d
JL
2534 wdata->pagesz = PAGE_SIZE;
2535 wdata->tailsz = cur_len - ((nr_pages - 1) * PAGE_SIZE);
cb7e9eab 2536 wdata->credits = credits;
6ec0b01b
PS
2537
2538 if (!wdata->cfile->invalidHandle ||
2539 !cifs_reopen_file(wdata->cfile, false))
2540 rc = server->ops->async_writev(wdata,
2541 cifs_uncached_writedata_release);
da82f7e7 2542 if (rc) {
cb7e9eab 2543 add_credits_and_wake_if(server, wdata->credits, 0);
4a5c80d7
SF
2544 kref_put(&wdata->refcount,
2545 cifs_uncached_writedata_release);
6ec0b01b
PS
2546 if (rc == -EAGAIN) {
2547 memcpy(from, &saved_from,
2548 sizeof(struct iov_iter));
2549 iov_iter_advance(from, offset - saved_offset);
2550 continue;
2551 }
72432ffc
PS
2552 break;
2553 }
2554
43de94ea 2555 list_add_tail(&wdata->list, wdata_list);
da82f7e7
JL
2556 offset += cur_len;
2557 len -= cur_len;
72432ffc
PS
2558 } while (len > 0);
2559
43de94ea
PS
2560 return rc;
2561}
2562
2563static ssize_t
2564cifs_iovec_write(struct file *file, struct iov_iter *from, loff_t *poffset)
2565{
2566 size_t len;
2567 ssize_t total_written = 0;
2568 struct cifsFileInfo *open_file;
2569 struct cifs_tcon *tcon;
2570 struct cifs_sb_info *cifs_sb;
2571 struct cifs_writedata *wdata, *tmp;
2572 struct list_head wdata_list;
6ec0b01b 2573 struct iov_iter saved_from;
43de94ea
PS
2574 int rc;
2575
2576 len = iov_iter_count(from);
2577 rc = generic_write_checks(file, poffset, &len, 0);
2578 if (rc)
2579 return rc;
2580
2581 if (!len)
2582 return 0;
2583
2584 iov_iter_truncate(from, len);
2585
2586 INIT_LIST_HEAD(&wdata_list);
7119e220 2587 cifs_sb = CIFS_FILE_SB(file);
43de94ea
PS
2588 open_file = file->private_data;
2589 tcon = tlink_tcon(open_file->tlink);
2590
2591 if (!tcon->ses->server->ops->async_writev)
2592 return -ENOSYS;
2593
6ec0b01b
PS
2594 memcpy(&saved_from, from, sizeof(struct iov_iter));
2595
43de94ea
PS
2596 rc = cifs_write_from_iter(*poffset, len, from, open_file, cifs_sb,
2597 &wdata_list);
2598
da82f7e7
JL
2599 /*
2600 * If at least one write was successfully sent, then discard any rc
2601 * value from the later writes. If the other write succeeds, then
2602 * we'll end up returning whatever was written. If it fails, then
2603 * we'll get a new rc value from that.
2604 */
2605 if (!list_empty(&wdata_list))
2606 rc = 0;
2607
2608 /*
2609 * Wait for and collect replies for any successful sends in order of
2610 * increasing offset. Once an error is hit or we get a fatal signal
2611 * while waiting, then return without waiting for any more replies.
2612 */
2613restart_loop:
2614 list_for_each_entry_safe(wdata, tmp, &wdata_list, list) {
2615 if (!rc) {
2616 /* FIXME: freezable too? */
2617 rc = wait_for_completion_killable(&wdata->done);
2618 if (rc)
2619 rc = -EINTR;
2620 else if (wdata->result)
2621 rc = wdata->result;
2622 else
2623 total_written += wdata->bytes;
2624
2625 /* resend call if it's a retryable error */
2626 if (rc == -EAGAIN) {
6ec0b01b
PS
2627 struct list_head tmp_list;
2628 struct iov_iter tmp_from;
2629
2630 INIT_LIST_HEAD(&tmp_list);
2631 list_del_init(&wdata->list);
2632
2633 memcpy(&tmp_from, &saved_from,
2634 sizeof(struct iov_iter));
2635 iov_iter_advance(&tmp_from,
2636 wdata->offset - *poffset);
2637
2638 rc = cifs_write_from_iter(wdata->offset,
2639 wdata->bytes, &tmp_from,
2640 open_file, cifs_sb, &tmp_list);
2641
2642 list_splice(&tmp_list, &wdata_list);
2643
2644 kref_put(&wdata->refcount,
2645 cifs_uncached_writedata_release);
da82f7e7
JL
2646 goto restart_loop;
2647 }
2648 }
2649 list_del_init(&wdata->list);
4a5c80d7 2650 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
72432ffc
PS
2651 }
2652
da82f7e7
JL
2653 if (total_written > 0)
2654 *poffset += total_written;
72432ffc 2655
da82f7e7
JL
2656 cifs_stats_bytes_written(tcon, total_written);
2657 return total_written ? total_written : (ssize_t)rc;
72432ffc
PS
2658}
2659
3dae8750 2660ssize_t cifs_user_writev(struct kiocb *iocb, struct iov_iter *from)
72432ffc
PS
2661{
2662 ssize_t written;
2663 struct inode *inode;
3dae8750 2664 loff_t pos = iocb->ki_pos;
72432ffc 2665
496ad9aa 2666 inode = file_inode(iocb->ki_filp);
72432ffc
PS
2667
2668 /*
2669 * BB - optimize the way when signing is disabled. We can drop this
2670 * extra memory-to-memory copying and use iovec buffers for constructing
2671 * write request.
2672 */
2673
3dae8750 2674 written = cifs_iovec_write(iocb->ki_filp, from, &pos);
72432ffc 2675 if (written > 0) {
aff8d5ca 2676 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
72432ffc
PS
2677 iocb->ki_pos = pos;
2678 }
2679
2680 return written;
2681}
2682
579f9053 2683static ssize_t
3dae8750 2684cifs_writev(struct kiocb *iocb, struct iov_iter *from)
72432ffc 2685{
579f9053
PS
2686 struct file *file = iocb->ki_filp;
2687 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
2688 struct inode *inode = file->f_mapping->host;
2689 struct cifsInodeInfo *cinode = CIFS_I(inode);
2690 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
2691 ssize_t rc = -EACCES;
19dfc1f5 2692 loff_t lock_pos = iocb->ki_pos;
72432ffc 2693
579f9053
PS
2694 /*
2695 * We need to hold the sem to be sure nobody modifies lock list
2696 * with a brlock that prevents writing.
2697 */
2698 down_read(&cinode->lock_sem);
19dfc1f5
AV
2699 mutex_lock(&inode->i_mutex);
2700 if (file->f_flags & O_APPEND)
2701 lock_pos = i_size_read(inode);
3dae8750 2702 if (!cifs_find_lock_conflict(cfile, lock_pos, iov_iter_count(from),
579f9053 2703 server->vals->exclusive_lock_type, NULL,
19dfc1f5 2704 CIFS_WRITE_OP)) {
3dae8750 2705 rc = __generic_file_write_iter(iocb, from);
19dfc1f5
AV
2706 mutex_unlock(&inode->i_mutex);
2707
2708 if (rc > 0) {
2709 ssize_t err;
2710
2711 err = generic_write_sync(file, iocb->ki_pos - rc, rc);
1f80c0cc 2712 if (err < 0)
19dfc1f5
AV
2713 rc = err;
2714 }
2715 } else {
2716 mutex_unlock(&inode->i_mutex);
2717 }
579f9053 2718 up_read(&cinode->lock_sem);
579f9053
PS
2719 return rc;
2720}
2721
2722ssize_t
3dae8750 2723cifs_strict_writev(struct kiocb *iocb, struct iov_iter *from)
579f9053 2724{
496ad9aa 2725 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
2726 struct cifsInodeInfo *cinode = CIFS_I(inode);
2727 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
2728 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
2729 iocb->ki_filp->private_data;
2730 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
88cf75aa 2731 ssize_t written;
ca8aa29c 2732
c11f1df5
SP
2733 written = cifs_get_writer(cinode);
2734 if (written)
2735 return written;
2736
18cceb6a 2737 if (CIFS_CACHE_WRITE(cinode)) {
88cf75aa
PS
2738 if (cap_unix(tcon->ses) &&
2739 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability))
c11f1df5 2740 && ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0)) {
3dae8750 2741 written = generic_file_write_iter(iocb, from);
c11f1df5
SP
2742 goto out;
2743 }
3dae8750 2744 written = cifs_writev(iocb, from);
c11f1df5 2745 goto out;
25078105 2746 }
25078105 2747 /*
ca8aa29c
PS
2748 * For non-oplocked files in strict cache mode we need to write the data
2749 * to the server exactly from the pos to pos+len-1 rather than flush all
2750 * affected pages because it may cause a error with mandatory locks on
2751 * these pages but not on the region from pos to ppos+len-1.
72432ffc 2752 */
3dae8750 2753 written = cifs_user_writev(iocb, from);
18cceb6a 2754 if (written > 0 && CIFS_CACHE_READ(cinode)) {
88cf75aa
PS
2755 /*
2756 * Windows 7 server can delay breaking level2 oplock if a write
2757 * request comes - break it on the client to prevent reading
2758 * an old data.
2759 */
4f73c7d3 2760 cifs_zap_mapping(inode);
f96637be
JP
2761 cifs_dbg(FYI, "Set no oplock for inode=%p after a write operation\n",
2762 inode);
18cceb6a 2763 cinode->oplock = 0;
88cf75aa 2764 }
c11f1df5
SP
2765out:
2766 cifs_put_writer(cinode);
88cf75aa 2767 return written;
72432ffc
PS
2768}
2769
0471ca3f 2770static struct cifs_readdata *
f4e49cd2 2771cifs_readdata_alloc(unsigned int nr_pages, work_func_t complete)
0471ca3f
JL
2772{
2773 struct cifs_readdata *rdata;
f4e49cd2 2774
c5fab6f4
JL
2775 rdata = kzalloc(sizeof(*rdata) + (sizeof(struct page *) * nr_pages),
2776 GFP_KERNEL);
0471ca3f 2777 if (rdata != NULL) {
6993f74a 2778 kref_init(&rdata->refcount);
1c892549
JL
2779 INIT_LIST_HEAD(&rdata->list);
2780 init_completion(&rdata->done);
0471ca3f 2781 INIT_WORK(&rdata->work, complete);
0471ca3f 2782 }
f4e49cd2 2783
0471ca3f
JL
2784 return rdata;
2785}
2786
6993f74a
JL
2787void
2788cifs_readdata_release(struct kref *refcount)
0471ca3f 2789{
6993f74a
JL
2790 struct cifs_readdata *rdata = container_of(refcount,
2791 struct cifs_readdata, refcount);
2792
2793 if (rdata->cfile)
2794 cifsFileInfo_put(rdata->cfile);
2795
0471ca3f
JL
2796 kfree(rdata);
2797}
2798
1c892549 2799static int
c5fab6f4 2800cifs_read_allocate_pages(struct cifs_readdata *rdata, unsigned int nr_pages)
1c892549
JL
2801{
2802 int rc = 0;
c5fab6f4 2803 struct page *page;
1c892549
JL
2804 unsigned int i;
2805
c5fab6f4 2806 for (i = 0; i < nr_pages; i++) {
1c892549
JL
2807 page = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
2808 if (!page) {
2809 rc = -ENOMEM;
2810 break;
2811 }
c5fab6f4 2812 rdata->pages[i] = page;
1c892549
JL
2813 }
2814
2815 if (rc) {
c5fab6f4
JL
2816 for (i = 0; i < nr_pages; i++) {
2817 put_page(rdata->pages[i]);
2818 rdata->pages[i] = NULL;
1c892549
JL
2819 }
2820 }
2821 return rc;
2822}
2823
2824static void
2825cifs_uncached_readdata_release(struct kref *refcount)
2826{
1c892549
JL
2827 struct cifs_readdata *rdata = container_of(refcount,
2828 struct cifs_readdata, refcount);
c5fab6f4 2829 unsigned int i;
1c892549 2830
c5fab6f4
JL
2831 for (i = 0; i < rdata->nr_pages; i++) {
2832 put_page(rdata->pages[i]);
2833 rdata->pages[i] = NULL;
1c892549
JL
2834 }
2835 cifs_readdata_release(refcount);
2836}
2837
1c892549
JL
2838/**
2839 * cifs_readdata_to_iov - copy data from pages in response to an iovec
2840 * @rdata: the readdata response with list of pages holding data
7f25bba8 2841 * @iter: destination for our data
1c892549
JL
2842 *
2843 * This function copies data from a list of pages in a readdata response into
2844 * an array of iovecs. It will first calculate where the data should go
2845 * based on the info in the readdata and then copy the data into that spot.
2846 */
7f25bba8
AV
2847static int
2848cifs_readdata_to_iov(struct cifs_readdata *rdata, struct iov_iter *iter)
1c892549 2849{
34a54d61 2850 size_t remaining = rdata->got_bytes;
c5fab6f4 2851 unsigned int i;
1c892549 2852
c5fab6f4 2853 for (i = 0; i < rdata->nr_pages; i++) {
c5fab6f4 2854 struct page *page = rdata->pages[i];
e686bd8d 2855 size_t copy = min_t(size_t, remaining, PAGE_SIZE);
7f25bba8
AV
2856 size_t written = copy_page_to_iter(page, 0, copy, iter);
2857 remaining -= written;
2858 if (written < copy && iov_iter_count(iter) > 0)
2859 break;
1c892549 2860 }
7f25bba8 2861 return remaining ? -EFAULT : 0;
1c892549
JL
2862}
2863
2864static void
2865cifs_uncached_readv_complete(struct work_struct *work)
2866{
2867 struct cifs_readdata *rdata = container_of(work,
2868 struct cifs_readdata, work);
1c892549
JL
2869
2870 complete(&rdata->done);
2871 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
2872}
2873
2874static int
8321fec4
JL
2875cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
2876 struct cifs_readdata *rdata, unsigned int len)
1c892549 2877{
b3160aeb 2878 int result = 0;
c5fab6f4
JL
2879 unsigned int i;
2880 unsigned int nr_pages = rdata->nr_pages;
8321fec4 2881 struct kvec iov;
1c892549 2882
b3160aeb 2883 rdata->got_bytes = 0;
8321fec4 2884 rdata->tailsz = PAGE_SIZE;
c5fab6f4
JL
2885 for (i = 0; i < nr_pages; i++) {
2886 struct page *page = rdata->pages[i];
2887
8321fec4 2888 if (len >= PAGE_SIZE) {
1c892549 2889 /* enough data to fill the page */
8321fec4
JL
2890 iov.iov_base = kmap(page);
2891 iov.iov_len = PAGE_SIZE;
f96637be
JP
2892 cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
2893 i, iov.iov_base, iov.iov_len);
8321fec4
JL
2894 len -= PAGE_SIZE;
2895 } else if (len > 0) {
1c892549 2896 /* enough for partial page, fill and zero the rest */
8321fec4
JL
2897 iov.iov_base = kmap(page);
2898 iov.iov_len = len;
f96637be
JP
2899 cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
2900 i, iov.iov_base, iov.iov_len);
8321fec4
JL
2901 memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
2902 rdata->tailsz = len;
2903 len = 0;
1c892549
JL
2904 } else {
2905 /* no need to hold page hostage */
c5fab6f4
JL
2906 rdata->pages[i] = NULL;
2907 rdata->nr_pages--;
1c892549 2908 put_page(page);
8321fec4 2909 continue;
1c892549 2910 }
8321fec4
JL
2911
2912 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
2913 kunmap(page);
2914 if (result < 0)
2915 break;
2916
b3160aeb 2917 rdata->got_bytes += result;
1c892549
JL
2918 }
2919
b3160aeb
PS
2920 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
2921 rdata->got_bytes : result;
1c892549
JL
2922}
2923
0ada36b2
PS
2924static int
2925cifs_send_async_read(loff_t offset, size_t len, struct cifsFileInfo *open_file,
2926 struct cifs_sb_info *cifs_sb, struct list_head *rdata_list)
1da177e4 2927{
0ada36b2 2928 struct cifs_readdata *rdata;
bed9da02 2929 unsigned int npages, rsize, credits;
0ada36b2
PS
2930 size_t cur_len;
2931 int rc;
1c892549 2932 pid_t pid;
25f40259 2933 struct TCP_Server_Info *server;
a70307ee 2934
25f40259 2935 server = tlink_tcon(open_file->tlink)->ses->server;
fc9c5966 2936
d4ffff1f
PS
2937 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2938 pid = open_file->pid;
2939 else
2940 pid = current->tgid;
2941
1c892549 2942 do {
bed9da02
PS
2943 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
2944 &rsize, &credits);
2945 if (rc)
2946 break;
2947
2948 cur_len = min_t(const size_t, len, rsize);
1c892549 2949 npages = DIV_ROUND_UP(cur_len, PAGE_SIZE);
a70307ee 2950
1c892549
JL
2951 /* allocate a readdata struct */
2952 rdata = cifs_readdata_alloc(npages,
2953 cifs_uncached_readv_complete);
2954 if (!rdata) {
bed9da02 2955 add_credits_and_wake_if(server, credits, 0);
1c892549 2956 rc = -ENOMEM;
bae9f746 2957 break;
1da177e4 2958 }
a70307ee 2959
c5fab6f4 2960 rc = cifs_read_allocate_pages(rdata, npages);
1c892549
JL
2961 if (rc)
2962 goto error;
2963
2964 rdata->cfile = cifsFileInfo_get(open_file);
c5fab6f4 2965 rdata->nr_pages = npages;
1c892549
JL
2966 rdata->offset = offset;
2967 rdata->bytes = cur_len;
2968 rdata->pid = pid;
8321fec4
JL
2969 rdata->pagesz = PAGE_SIZE;
2970 rdata->read_into_pages = cifs_uncached_read_into_pages;
bed9da02 2971 rdata->credits = credits;
1c892549 2972
25f40259
PS
2973 if (!rdata->cfile->invalidHandle ||
2974 !cifs_reopen_file(rdata->cfile, true))
2975 rc = server->ops->async_readv(rdata);
1c892549
JL
2976error:
2977 if (rc) {
bed9da02 2978 add_credits_and_wake_if(server, rdata->credits, 0);
1c892549
JL
2979 kref_put(&rdata->refcount,
2980 cifs_uncached_readdata_release);
25f40259
PS
2981 if (rc == -EAGAIN)
2982 continue;
1c892549
JL
2983 break;
2984 }
2985
0ada36b2 2986 list_add_tail(&rdata->list, rdata_list);
1c892549
JL
2987 offset += cur_len;
2988 len -= cur_len;
2989 } while (len > 0);
2990
0ada36b2
PS
2991 return rc;
2992}
2993
2994ssize_t cifs_user_readv(struct kiocb *iocb, struct iov_iter *to)
2995{
2996 struct file *file = iocb->ki_filp;
2997 ssize_t rc;
2998 size_t len;
2999 ssize_t total_read = 0;
3000 loff_t offset = iocb->ki_pos;
3001 struct cifs_sb_info *cifs_sb;
3002 struct cifs_tcon *tcon;
3003 struct cifsFileInfo *open_file;
3004 struct cifs_readdata *rdata, *tmp;
3005 struct list_head rdata_list;
3006
3007 len = iov_iter_count(to);
3008 if (!len)
3009 return 0;
3010
3011 INIT_LIST_HEAD(&rdata_list);
7119e220 3012 cifs_sb = CIFS_FILE_SB(file);
0ada36b2
PS
3013 open_file = file->private_data;
3014 tcon = tlink_tcon(open_file->tlink);
3015
3016 if (!tcon->ses->server->ops->async_readv)
3017 return -ENOSYS;
3018
3019 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
3020 cifs_dbg(FYI, "attempting read on write only file instance\n");
3021
3022 rc = cifs_send_async_read(offset, len, open_file, cifs_sb, &rdata_list);
3023
1c892549
JL
3024 /* if at least one read request send succeeded, then reset rc */
3025 if (!list_empty(&rdata_list))
3026 rc = 0;
3027
e6a7bcb4 3028 len = iov_iter_count(to);
1c892549 3029 /* the loop below should proceed in the order of increasing offsets */
25f40259 3030again:
1c892549
JL
3031 list_for_each_entry_safe(rdata, tmp, &rdata_list, list) {
3032 if (!rc) {
1c892549
JL
3033 /* FIXME: freezable sleep too? */
3034 rc = wait_for_completion_killable(&rdata->done);
3035 if (rc)
3036 rc = -EINTR;
fb8a3e52 3037 else if (rdata->result == -EAGAIN) {
74027f4a 3038 /* resend call if it's a retryable error */
fb8a3e52 3039 struct list_head tmp_list;
d913ed17 3040 unsigned int got_bytes = rdata->got_bytes;
25f40259 3041
fb8a3e52
PS
3042 list_del_init(&rdata->list);
3043 INIT_LIST_HEAD(&tmp_list);
25f40259 3044
d913ed17
PS
3045 /*
3046 * Got a part of data and then reconnect has
3047 * happened -- fill the buffer and continue
3048 * reading.
3049 */
3050 if (got_bytes && got_bytes < rdata->bytes) {
3051 rc = cifs_readdata_to_iov(rdata, to);
3052 if (rc) {
3053 kref_put(&rdata->refcount,
3054 cifs_uncached_readdata_release);
3055 continue;
3056 }
74027f4a 3057 }
d913ed17
PS
3058
3059 rc = cifs_send_async_read(
3060 rdata->offset + got_bytes,
3061 rdata->bytes - got_bytes,
3062 rdata->cfile, cifs_sb,
3063 &tmp_list);
25f40259 3064
fb8a3e52 3065 list_splice(&tmp_list, &rdata_list);
25f40259 3066
fb8a3e52
PS
3067 kref_put(&rdata->refcount,
3068 cifs_uncached_readdata_release);
3069 goto again;
3070 } else if (rdata->result)
3071 rc = rdata->result;
3072 else
e6a7bcb4 3073 rc = cifs_readdata_to_iov(rdata, to);
1c892549 3074
2e8a05d8
PS
3075 /* if there was a short read -- discard anything left */
3076 if (rdata->got_bytes && rdata->got_bytes < rdata->bytes)
3077 rc = -ENODATA;
1da177e4 3078 }
1c892549
JL
3079 list_del_init(&rdata->list);
3080 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
1da177e4 3081 }
a70307ee 3082
e6a7bcb4 3083 total_read = len - iov_iter_count(to);
7f25bba8 3084
1c892549 3085 cifs_stats_bytes_read(tcon, total_read);
1c892549 3086
09a4707e
PS
3087 /* mask nodata case */
3088 if (rc == -ENODATA)
3089 rc = 0;
3090
0165e810 3091 if (total_read) {
e6a7bcb4 3092 iocb->ki_pos += total_read;
0165e810
AV
3093 return total_read;
3094 }
3095 return rc;
a70307ee
PS
3096}
3097
579f9053 3098ssize_t
e6a7bcb4 3099cifs_strict_readv(struct kiocb *iocb, struct iov_iter *to)
a70307ee 3100{
496ad9aa 3101 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
3102 struct cifsInodeInfo *cinode = CIFS_I(inode);
3103 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3104 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
3105 iocb->ki_filp->private_data;
3106 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
3107 int rc = -EACCES;
a70307ee
PS
3108
3109 /*
3110 * In strict cache mode we need to read from the server all the time
3111 * if we don't have level II oplock because the server can delay mtime
3112 * change - so we can't make a decision about inode invalidating.
3113 * And we can also fail with pagereading if there are mandatory locks
3114 * on pages affected by this read but not on the region from pos to
3115 * pos+len-1.
3116 */
18cceb6a 3117 if (!CIFS_CACHE_READ(cinode))
e6a7bcb4 3118 return cifs_user_readv(iocb, to);
a70307ee 3119
579f9053
PS
3120 if (cap_unix(tcon->ses) &&
3121 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
3122 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
e6a7bcb4 3123 return generic_file_read_iter(iocb, to);
579f9053
PS
3124
3125 /*
3126 * We need to hold the sem to be sure nobody modifies lock list
3127 * with a brlock that prevents reading.
3128 */
3129 down_read(&cinode->lock_sem);
e6a7bcb4 3130 if (!cifs_find_lock_conflict(cfile, iocb->ki_pos, iov_iter_count(to),
579f9053 3131 tcon->ses->server->vals->shared_lock_type,
081c0414 3132 NULL, CIFS_READ_OP))
e6a7bcb4 3133 rc = generic_file_read_iter(iocb, to);
579f9053
PS
3134 up_read(&cinode->lock_sem);
3135 return rc;
a70307ee 3136}
1da177e4 3137
f9c6e234
PS
3138static ssize_t
3139cifs_read(struct file *file, char *read_data, size_t read_size, loff_t *offset)
1da177e4
LT
3140{
3141 int rc = -EACCES;
3142 unsigned int bytes_read = 0;
3143 unsigned int total_read;
3144 unsigned int current_read_size;
5eba8ab3 3145 unsigned int rsize;
1da177e4 3146 struct cifs_sb_info *cifs_sb;
29e20f9c 3147 struct cifs_tcon *tcon;
f9c6e234 3148 struct TCP_Server_Info *server;
6d5786a3 3149 unsigned int xid;
f9c6e234 3150 char *cur_offset;
1da177e4 3151 struct cifsFileInfo *open_file;
d4ffff1f 3152 struct cifs_io_parms io_parms;
ec637e3f 3153 int buf_type = CIFS_NO_BUFFER;
d4ffff1f 3154 __u32 pid;
1da177e4 3155
6d5786a3 3156 xid = get_xid();
7119e220 3157 cifs_sb = CIFS_FILE_SB(file);
1da177e4 3158
5eba8ab3
JL
3159 /* FIXME: set up handlers for larger reads and/or convert to async */
3160 rsize = min_t(unsigned int, cifs_sb->rsize, CIFSMaxBufSize);
3161
1da177e4 3162 if (file->private_data == NULL) {
0f3bc09e 3163 rc = -EBADF;
6d5786a3 3164 free_xid(xid);
0f3bc09e 3165 return rc;
1da177e4 3166 }
c21dfb69 3167 open_file = file->private_data;
29e20f9c 3168 tcon = tlink_tcon(open_file->tlink);
f9c6e234
PS
3169 server = tcon->ses->server;
3170
3171 if (!server->ops->sync_read) {
3172 free_xid(xid);
3173 return -ENOSYS;
3174 }
1da177e4 3175
d4ffff1f
PS
3176 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3177 pid = open_file->pid;
3178 else
3179 pid = current->tgid;
3180
1da177e4 3181 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
f96637be 3182 cifs_dbg(FYI, "attempting read on write only file instance\n");
1da177e4 3183
f9c6e234
PS
3184 for (total_read = 0, cur_offset = read_data; read_size > total_read;
3185 total_read += bytes_read, cur_offset += bytes_read) {
e374d90f
PS
3186 do {
3187 current_read_size = min_t(uint, read_size - total_read,
3188 rsize);
3189 /*
3190 * For windows me and 9x we do not want to request more
3191 * than it negotiated since it will refuse the read
3192 * then.
3193 */
3194 if ((tcon->ses) && !(tcon->ses->capabilities &
29e20f9c 3195 tcon->ses->server->vals->cap_large_files)) {
e374d90f
PS
3196 current_read_size = min_t(uint,
3197 current_read_size, CIFSMaxBufSize);
3198 }
cdff08e7 3199 if (open_file->invalidHandle) {
15886177 3200 rc = cifs_reopen_file(open_file, true);
1da177e4
LT
3201 if (rc != 0)
3202 break;
3203 }
d4ffff1f 3204 io_parms.pid = pid;
29e20f9c 3205 io_parms.tcon = tcon;
f9c6e234 3206 io_parms.offset = *offset;
d4ffff1f 3207 io_parms.length = current_read_size;
db8b631d 3208 rc = server->ops->sync_read(xid, &open_file->fid, &io_parms,
f9c6e234
PS
3209 &bytes_read, &cur_offset,
3210 &buf_type);
e374d90f
PS
3211 } while (rc == -EAGAIN);
3212
1da177e4
LT
3213 if (rc || (bytes_read == 0)) {
3214 if (total_read) {
3215 break;
3216 } else {
6d5786a3 3217 free_xid(xid);
1da177e4
LT
3218 return rc;
3219 }
3220 } else {
29e20f9c 3221 cifs_stats_bytes_read(tcon, total_read);
f9c6e234 3222 *offset += bytes_read;
1da177e4
LT
3223 }
3224 }
6d5786a3 3225 free_xid(xid);
1da177e4
LT
3226 return total_read;
3227}
3228
ca83ce3d
JL
3229/*
3230 * If the page is mmap'ed into a process' page tables, then we need to make
3231 * sure that it doesn't change while being written back.
3232 */
3233static int
3234cifs_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf)
3235{
3236 struct page *page = vmf->page;
3237
3238 lock_page(page);
3239 return VM_FAULT_LOCKED;
3240}
3241
3242static struct vm_operations_struct cifs_file_vm_ops = {
3243 .fault = filemap_fault,
f1820361 3244 .map_pages = filemap_map_pages,
ca83ce3d
JL
3245 .page_mkwrite = cifs_page_mkwrite,
3246};
3247
7a6a19b1
PS
3248int cifs_file_strict_mmap(struct file *file, struct vm_area_struct *vma)
3249{
3250 int rc, xid;
496ad9aa 3251 struct inode *inode = file_inode(file);
7a6a19b1 3252
6d5786a3 3253 xid = get_xid();
7a6a19b1 3254
18cceb6a 3255 if (!CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 3256 rc = cifs_zap_mapping(inode);
6feb9891
PS
3257 if (rc)
3258 return rc;
3259 }
7a6a19b1
PS
3260
3261 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3262 if (rc == 0)
3263 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3264 free_xid(xid);
7a6a19b1
PS
3265 return rc;
3266}
3267
1da177e4
LT
3268int cifs_file_mmap(struct file *file, struct vm_area_struct *vma)
3269{
1da177e4
LT
3270 int rc, xid;
3271
6d5786a3 3272 xid = get_xid();
abab095d 3273 rc = cifs_revalidate_file(file);
1da177e4 3274 if (rc) {
f96637be
JP
3275 cifs_dbg(FYI, "Validation prior to mmap failed, error=%d\n",
3276 rc);
6d5786a3 3277 free_xid(xid);
1da177e4
LT
3278 return rc;
3279 }
3280 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3281 if (rc == 0)
3282 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3283 free_xid(xid);
1da177e4
LT
3284 return rc;
3285}
3286
0471ca3f
JL
3287static void
3288cifs_readv_complete(struct work_struct *work)
3289{
b770ddfa 3290 unsigned int i, got_bytes;
0471ca3f
JL
3291 struct cifs_readdata *rdata = container_of(work,
3292 struct cifs_readdata, work);
0471ca3f 3293
b770ddfa 3294 got_bytes = rdata->got_bytes;
c5fab6f4
JL
3295 for (i = 0; i < rdata->nr_pages; i++) {
3296 struct page *page = rdata->pages[i];
3297
0471ca3f
JL
3298 lru_cache_add_file(page);
3299
b770ddfa
PS
3300 if (rdata->result == 0 ||
3301 (rdata->result == -EAGAIN && got_bytes)) {
0471ca3f
JL
3302 flush_dcache_page(page);
3303 SetPageUptodate(page);
3304 }
3305
3306 unlock_page(page);
3307
b770ddfa
PS
3308 if (rdata->result == 0 ||
3309 (rdata->result == -EAGAIN && got_bytes))
0471ca3f
JL
3310 cifs_readpage_to_fscache(rdata->mapping->host, page);
3311
b770ddfa
PS
3312 got_bytes -= min_t(unsigned int, PAGE_CACHE_SIZE, got_bytes);
3313
0471ca3f 3314 page_cache_release(page);
c5fab6f4 3315 rdata->pages[i] = NULL;
0471ca3f 3316 }
6993f74a 3317 kref_put(&rdata->refcount, cifs_readdata_release);
0471ca3f
JL
3318}
3319
8d5ce4d2 3320static int
8321fec4
JL
3321cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
3322 struct cifs_readdata *rdata, unsigned int len)
8d5ce4d2 3323{
b3160aeb 3324 int result = 0;
c5fab6f4 3325 unsigned int i;
8d5ce4d2
JL
3326 u64 eof;
3327 pgoff_t eof_index;
c5fab6f4 3328 unsigned int nr_pages = rdata->nr_pages;
8321fec4 3329 struct kvec iov;
8d5ce4d2
JL
3330
3331 /* determine the eof that the server (probably) has */
3332 eof = CIFS_I(rdata->mapping->host)->server_eof;
3333 eof_index = eof ? (eof - 1) >> PAGE_CACHE_SHIFT : 0;
f96637be 3334 cifs_dbg(FYI, "eof=%llu eof_index=%lu\n", eof, eof_index);
8d5ce4d2 3335
b3160aeb 3336 rdata->got_bytes = 0;
8321fec4 3337 rdata->tailsz = PAGE_CACHE_SIZE;
c5fab6f4
JL
3338 for (i = 0; i < nr_pages; i++) {
3339 struct page *page = rdata->pages[i];
3340
8321fec4 3341 if (len >= PAGE_CACHE_SIZE) {
8d5ce4d2 3342 /* enough data to fill the page */
8321fec4
JL
3343 iov.iov_base = kmap(page);
3344 iov.iov_len = PAGE_CACHE_SIZE;
f96637be
JP
3345 cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
3346 i, page->index, iov.iov_base, iov.iov_len);
8321fec4
JL
3347 len -= PAGE_CACHE_SIZE;
3348 } else if (len > 0) {
8d5ce4d2 3349 /* enough for partial page, fill and zero the rest */
8321fec4
JL
3350 iov.iov_base = kmap(page);
3351 iov.iov_len = len;
f96637be
JP
3352 cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
3353 i, page->index, iov.iov_base, iov.iov_len);
8321fec4
JL
3354 memset(iov.iov_base + len,
3355 '\0', PAGE_CACHE_SIZE - len);
3356 rdata->tailsz = len;
3357 len = 0;
8d5ce4d2
JL
3358 } else if (page->index > eof_index) {
3359 /*
3360 * The VFS will not try to do readahead past the
3361 * i_size, but it's possible that we have outstanding
3362 * writes with gaps in the middle and the i_size hasn't
3363 * caught up yet. Populate those with zeroed out pages
3364 * to prevent the VFS from repeatedly attempting to
3365 * fill them until the writes are flushed.
3366 */
3367 zero_user(page, 0, PAGE_CACHE_SIZE);
8d5ce4d2
JL
3368 lru_cache_add_file(page);
3369 flush_dcache_page(page);
3370 SetPageUptodate(page);
3371 unlock_page(page);
3372 page_cache_release(page);
c5fab6f4
JL
3373 rdata->pages[i] = NULL;
3374 rdata->nr_pages--;
8321fec4 3375 continue;
8d5ce4d2
JL
3376 } else {
3377 /* no need to hold page hostage */
8d5ce4d2
JL
3378 lru_cache_add_file(page);
3379 unlock_page(page);
3380 page_cache_release(page);
c5fab6f4
JL
3381 rdata->pages[i] = NULL;
3382 rdata->nr_pages--;
8321fec4 3383 continue;
8d5ce4d2 3384 }
8321fec4
JL
3385
3386 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
3387 kunmap(page);
3388 if (result < 0)
3389 break;
3390
b3160aeb 3391 rdata->got_bytes += result;
8d5ce4d2
JL
3392 }
3393
b3160aeb
PS
3394 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
3395 rdata->got_bytes : result;
8d5ce4d2
JL
3396}
3397
387eb92a
PS
3398static int
3399readpages_get_pages(struct address_space *mapping, struct list_head *page_list,
3400 unsigned int rsize, struct list_head *tmplist,
3401 unsigned int *nr_pages, loff_t *offset, unsigned int *bytes)
3402{
3403 struct page *page, *tpage;
3404 unsigned int expected_index;
3405 int rc;
3406
69cebd75
PS
3407 INIT_LIST_HEAD(tmplist);
3408
387eb92a
PS
3409 page = list_entry(page_list->prev, struct page, lru);
3410
3411 /*
3412 * Lock the page and put it in the cache. Since no one else
3413 * should have access to this page, we're safe to simply set
3414 * PG_locked without checking it first.
3415 */
3416 __set_page_locked(page);
3417 rc = add_to_page_cache_locked(page, mapping,
3418 page->index, GFP_KERNEL);
3419
3420 /* give up if we can't stick it in the cache */
3421 if (rc) {
3422 __clear_page_locked(page);
3423 return rc;
3424 }
3425
3426 /* move first page to the tmplist */
3427 *offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
3428 *bytes = PAGE_CACHE_SIZE;
3429 *nr_pages = 1;
3430 list_move_tail(&page->lru, tmplist);
3431
3432 /* now try and add more pages onto the request */
3433 expected_index = page->index + 1;
3434 list_for_each_entry_safe_reverse(page, tpage, page_list, lru) {
3435 /* discontinuity ? */
3436 if (page->index != expected_index)
3437 break;
3438
3439 /* would this page push the read over the rsize? */
3440 if (*bytes + PAGE_CACHE_SIZE > rsize)
3441 break;
3442
3443 __set_page_locked(page);
3444 if (add_to_page_cache_locked(page, mapping, page->index,
3445 GFP_KERNEL)) {
3446 __clear_page_locked(page);
3447 break;
3448 }
3449 list_move_tail(&page->lru, tmplist);
3450 (*bytes) += PAGE_CACHE_SIZE;
3451 expected_index++;
3452 (*nr_pages)++;
3453 }
3454 return rc;
8d5ce4d2
JL
3455}
3456
1da177e4
LT
3457static int cifs_readpages(struct file *file, struct address_space *mapping,
3458 struct list_head *page_list, unsigned num_pages)
3459{
690c5e31
JL
3460 int rc;
3461 struct list_head tmplist;
3462 struct cifsFileInfo *open_file = file->private_data;
7119e220 3463 struct cifs_sb_info *cifs_sb = CIFS_FILE_SB(file);
69cebd75 3464 struct TCP_Server_Info *server;
690c5e31 3465 pid_t pid;
1da177e4 3466
56698236
SJ
3467 /*
3468 * Reads as many pages as possible from fscache. Returns -ENOBUFS
3469 * immediately if the cookie is negative
54afa990
DH
3470 *
3471 * After this point, every page in the list might have PG_fscache set,
3472 * so we will need to clean that up off of every page we don't use.
56698236
SJ
3473 */
3474 rc = cifs_readpages_from_fscache(mapping->host, mapping, page_list,
3475 &num_pages);
3476 if (rc == 0)
690c5e31 3477 return rc;
56698236 3478
d4ffff1f
PS
3479 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3480 pid = open_file->pid;
3481 else
3482 pid = current->tgid;
3483
690c5e31 3484 rc = 0;
69cebd75 3485 server = tlink_tcon(open_file->tlink)->ses->server;
1da177e4 3486
f96637be
JP
3487 cifs_dbg(FYI, "%s: file=%p mapping=%p num_pages=%u\n",
3488 __func__, file, mapping, num_pages);
690c5e31
JL
3489
3490 /*
3491 * Start with the page at end of list and move it to private
3492 * list. Do the same with any following pages until we hit
3493 * the rsize limit, hit an index discontinuity, or run out of
3494 * pages. Issue the async read and then start the loop again
3495 * until the list is empty.
3496 *
3497 * Note that list order is important. The page_list is in
3498 * the order of declining indexes. When we put the pages in
3499 * the rdata->pages, then we want them in increasing order.
3500 */
3501 while (!list_empty(page_list)) {
bed9da02 3502 unsigned int i, nr_pages, bytes, rsize;
690c5e31
JL
3503 loff_t offset;
3504 struct page *page, *tpage;
3505 struct cifs_readdata *rdata;
bed9da02 3506 unsigned credits;
1da177e4 3507
bed9da02
PS
3508 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
3509 &rsize, &credits);
3510 if (rc)
3511 break;
690c5e31
JL
3512
3513 /*
69cebd75
PS
3514 * Give up immediately if rsize is too small to read an entire
3515 * page. The VFS will fall back to readpage. We should never
3516 * reach this point however since we set ra_pages to 0 when the
3517 * rsize is smaller than a cache page.
690c5e31 3518 */
bed9da02
PS
3519 if (unlikely(rsize < PAGE_CACHE_SIZE)) {
3520 add_credits_and_wake_if(server, credits, 0);
69cebd75 3521 return 0;
bed9da02 3522 }
690c5e31 3523
bed9da02
PS
3524 rc = readpages_get_pages(mapping, page_list, rsize, &tmplist,
3525 &nr_pages, &offset, &bytes);
690c5e31 3526 if (rc) {
bed9da02 3527 add_credits_and_wake_if(server, credits, 0);
690c5e31
JL
3528 break;
3529 }
3530
0471ca3f 3531 rdata = cifs_readdata_alloc(nr_pages, cifs_readv_complete);
690c5e31
JL
3532 if (!rdata) {
3533 /* best to give up if we're out of mem */
3534 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3535 list_del(&page->lru);
3536 lru_cache_add_file(page);
3537 unlock_page(page);
3538 page_cache_release(page);
3539 }
3540 rc = -ENOMEM;
bed9da02 3541 add_credits_and_wake_if(server, credits, 0);
690c5e31
JL
3542 break;
3543 }
3544
6993f74a 3545 rdata->cfile = cifsFileInfo_get(open_file);
690c5e31
JL
3546 rdata->mapping = mapping;
3547 rdata->offset = offset;
3548 rdata->bytes = bytes;
3549 rdata->pid = pid;
8321fec4
JL
3550 rdata->pagesz = PAGE_CACHE_SIZE;
3551 rdata->read_into_pages = cifs_readpages_read_into_pages;
bed9da02 3552 rdata->credits = credits;
c5fab6f4
JL
3553
3554 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3555 list_del(&page->lru);
3556 rdata->pages[rdata->nr_pages++] = page;
3557 }
690c5e31 3558
69cebd75
PS
3559 if (!rdata->cfile->invalidHandle ||
3560 !cifs_reopen_file(rdata->cfile, true))
3561 rc = server->ops->async_readv(rdata);
3562 if (rc) {
bed9da02 3563 add_credits_and_wake_if(server, rdata->credits, 0);
c5fab6f4
JL
3564 for (i = 0; i < rdata->nr_pages; i++) {
3565 page = rdata->pages[i];
690c5e31
JL
3566 lru_cache_add_file(page);
3567 unlock_page(page);
3568 page_cache_release(page);
1da177e4 3569 }
1209bbdf 3570 /* Fallback to the readpage in error/reconnect cases */
6993f74a 3571 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3572 break;
3573 }
6993f74a
JL
3574
3575 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3576 }
3577
54afa990
DH
3578 /* Any pages that have been shown to fscache but didn't get added to
3579 * the pagecache must be uncached before they get returned to the
3580 * allocator.
3581 */
3582 cifs_fscache_readpages_cancel(mapping->host, page_list);
1da177e4
LT
3583 return rc;
3584}
3585
a9e9b7bc
SP
3586/*
3587 * cifs_readpage_worker must be called with the page pinned
3588 */
1da177e4
LT
3589static int cifs_readpage_worker(struct file *file, struct page *page,
3590 loff_t *poffset)
3591{
3592 char *read_data;
3593 int rc;
3594
56698236 3595 /* Is the page cached? */
496ad9aa 3596 rc = cifs_readpage_from_fscache(file_inode(file), page);
56698236
SJ
3597 if (rc == 0)
3598 goto read_complete;
3599
1da177e4
LT
3600 read_data = kmap(page);
3601 /* for reads over a certain size could initiate async read ahead */
fb8c4b14 3602
1da177e4 3603 rc = cifs_read(file, read_data, PAGE_CACHE_SIZE, poffset);
fb8c4b14 3604
1da177e4
LT
3605 if (rc < 0)
3606 goto io_error;
3607 else
f96637be 3608 cifs_dbg(FYI, "Bytes read %d\n", rc);
fb8c4b14 3609
496ad9aa
AV
3610 file_inode(file)->i_atime =
3611 current_fs_time(file_inode(file)->i_sb);
fb8c4b14 3612
1da177e4
LT
3613 if (PAGE_CACHE_SIZE > rc)
3614 memset(read_data + rc, 0, PAGE_CACHE_SIZE - rc);
3615
3616 flush_dcache_page(page);
3617 SetPageUptodate(page);
9dc06558
SJ
3618
3619 /* send this page to the cache */
496ad9aa 3620 cifs_readpage_to_fscache(file_inode(file), page);
9dc06558 3621
1da177e4 3622 rc = 0;
fb8c4b14 3623
1da177e4 3624io_error:
fb8c4b14 3625 kunmap(page);
466bd31b 3626 unlock_page(page);
56698236
SJ
3627
3628read_complete:
1da177e4
LT
3629 return rc;
3630}
3631
3632static int cifs_readpage(struct file *file, struct page *page)
3633{
3634 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
3635 int rc = -EACCES;
6d5786a3 3636 unsigned int xid;
1da177e4 3637
6d5786a3 3638 xid = get_xid();
1da177e4
LT
3639
3640 if (file->private_data == NULL) {
0f3bc09e 3641 rc = -EBADF;
6d5786a3 3642 free_xid(xid);
0f3bc09e 3643 return rc;
1da177e4
LT
3644 }
3645
f96637be 3646 cifs_dbg(FYI, "readpage %p at offset %d 0x%x\n",
b6b38f70 3647 page, (int)offset, (int)offset);
1da177e4
LT
3648
3649 rc = cifs_readpage_worker(file, page, &offset);
3650
6d5786a3 3651 free_xid(xid);
1da177e4
LT
3652 return rc;
3653}
3654
a403a0a3
SF
3655static int is_inode_writable(struct cifsInodeInfo *cifs_inode)
3656{
3657 struct cifsFileInfo *open_file;
3658
4477288a 3659 spin_lock(&cifs_file_list_lock);
a403a0a3 3660 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
2e396b83 3661 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
4477288a 3662 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3663 return 1;
3664 }
3665 }
4477288a 3666 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3667 return 0;
3668}
3669
1da177e4
LT
3670/* We do not want to update the file size from server for inodes
3671 open for write - to avoid races with writepage extending
3672 the file - in the future we could consider allowing
fb8c4b14 3673 refreshing the inode only on increases in the file size
1da177e4
LT
3674 but this is tricky to do without racing with writebehind
3675 page caching in the current Linux kernel design */
4b18f2a9 3676bool is_size_safe_to_change(struct cifsInodeInfo *cifsInode, __u64 end_of_file)
1da177e4 3677{
a403a0a3 3678 if (!cifsInode)
4b18f2a9 3679 return true;
50c2f753 3680
a403a0a3
SF
3681 if (is_inode_writable(cifsInode)) {
3682 /* This inode is open for write at least once */
c32a0b68
SF
3683 struct cifs_sb_info *cifs_sb;
3684
c32a0b68 3685 cifs_sb = CIFS_SB(cifsInode->vfs_inode.i_sb);
ad7a2926 3686 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
fb8c4b14 3687 /* since no page cache to corrupt on directio
c32a0b68 3688 we can change size safely */
4b18f2a9 3689 return true;
c32a0b68
SF
3690 }
3691
fb8c4b14 3692 if (i_size_read(&cifsInode->vfs_inode) < end_of_file)
4b18f2a9 3693 return true;
7ba52631 3694
4b18f2a9 3695 return false;
23e7dd7d 3696 } else
4b18f2a9 3697 return true;
1da177e4
LT
3698}
3699
d9414774
NP
3700static int cifs_write_begin(struct file *file, struct address_space *mapping,
3701 loff_t pos, unsigned len, unsigned flags,
3702 struct page **pagep, void **fsdata)
1da177e4 3703{
466bd31b 3704 int oncethru = 0;
d9414774
NP
3705 pgoff_t index = pos >> PAGE_CACHE_SHIFT;
3706 loff_t offset = pos & (PAGE_CACHE_SIZE - 1);
a98ee8c1
JL
3707 loff_t page_start = pos & PAGE_MASK;
3708 loff_t i_size;
3709 struct page *page;
3710 int rc = 0;
d9414774 3711
f96637be 3712 cifs_dbg(FYI, "write_begin from %lld len %d\n", (long long)pos, len);
d9414774 3713
466bd31b 3714start:
54566b2c 3715 page = grab_cache_page_write_begin(mapping, index, flags);
a98ee8c1
JL
3716 if (!page) {
3717 rc = -ENOMEM;
3718 goto out;
3719 }
8a236264 3720
a98ee8c1
JL
3721 if (PageUptodate(page))
3722 goto out;
8a236264 3723
a98ee8c1
JL
3724 /*
3725 * If we write a full page it will be up to date, no need to read from
3726 * the server. If the write is short, we'll end up doing a sync write
3727 * instead.
3728 */
3729 if (len == PAGE_CACHE_SIZE)
3730 goto out;
8a236264 3731
a98ee8c1
JL
3732 /*
3733 * optimize away the read when we have an oplock, and we're not
3734 * expecting to use any of the data we'd be reading in. That
3735 * is, when the page lies beyond the EOF, or straddles the EOF
3736 * and the write will cover all of the existing data.
3737 */
18cceb6a 3738 if (CIFS_CACHE_READ(CIFS_I(mapping->host))) {
a98ee8c1
JL
3739 i_size = i_size_read(mapping->host);
3740 if (page_start >= i_size ||
3741 (offset == 0 && (pos + len) >= i_size)) {
3742 zero_user_segments(page, 0, offset,
3743 offset + len,
3744 PAGE_CACHE_SIZE);
3745 /*
3746 * PageChecked means that the parts of the page
3747 * to which we're not writing are considered up
3748 * to date. Once the data is copied to the
3749 * page, it can be set uptodate.
3750 */
3751 SetPageChecked(page);
3752 goto out;
3753 }
3754 }
d9414774 3755
466bd31b 3756 if ((file->f_flags & O_ACCMODE) != O_WRONLY && !oncethru) {
a98ee8c1
JL
3757 /*
3758 * might as well read a page, it is fast enough. If we get
3759 * an error, we don't need to return it. cifs_write_end will
3760 * do a sync write instead since PG_uptodate isn't set.
3761 */
3762 cifs_readpage_worker(file, page, &page_start);
466bd31b
SP
3763 page_cache_release(page);
3764 oncethru = 1;
3765 goto start;
8a236264
SF
3766 } else {
3767 /* we could try using another file handle if there is one -
3768 but how would we lock it to prevent close of that handle
3769 racing with this read? In any case
d9414774 3770 this will be written out by write_end so is fine */
1da177e4 3771 }
a98ee8c1
JL
3772out:
3773 *pagep = page;
3774 return rc;
1da177e4
LT
3775}
3776
85f2d6b4
SJ
3777static int cifs_release_page(struct page *page, gfp_t gfp)
3778{
3779 if (PagePrivate(page))
3780 return 0;
3781
3782 return cifs_fscache_release_page(page, gfp);
3783}
3784
d47992f8
LC
3785static void cifs_invalidate_page(struct page *page, unsigned int offset,
3786 unsigned int length)
85f2d6b4
SJ
3787{
3788 struct cifsInodeInfo *cifsi = CIFS_I(page->mapping->host);
3789
d47992f8 3790 if (offset == 0 && length == PAGE_CACHE_SIZE)
85f2d6b4
SJ
3791 cifs_fscache_invalidate_page(page, &cifsi->vfs_inode);
3792}
3793
9ad1506b
PS
3794static int cifs_launder_page(struct page *page)
3795{
3796 int rc = 0;
3797 loff_t range_start = page_offset(page);
3798 loff_t range_end = range_start + (loff_t)(PAGE_CACHE_SIZE - 1);
3799 struct writeback_control wbc = {
3800 .sync_mode = WB_SYNC_ALL,
3801 .nr_to_write = 0,
3802 .range_start = range_start,
3803 .range_end = range_end,
3804 };
3805
f96637be 3806 cifs_dbg(FYI, "Launder page: %p\n", page);
9ad1506b
PS
3807
3808 if (clear_page_dirty_for_io(page))
3809 rc = cifs_writepage_locked(page, &wbc);
3810
3811 cifs_fscache_invalidate_page(page, page->mapping->host);
3812 return rc;
3813}
3814
9b646972 3815void cifs_oplock_break(struct work_struct *work)
3bc303c2
JL
3816{
3817 struct cifsFileInfo *cfile = container_of(work, struct cifsFileInfo,
3818 oplock_break);
a5e18bc3 3819 struct inode *inode = cfile->dentry->d_inode;
3bc303c2 3820 struct cifsInodeInfo *cinode = CIFS_I(inode);
95a3f2f3 3821 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
c11f1df5 3822 struct TCP_Server_Info *server = tcon->ses->server;
eb4b756b 3823 int rc = 0;
3bc303c2 3824
c11f1df5 3825 wait_on_bit(&cinode->flags, CIFS_INODE_PENDING_WRITERS,
74316201 3826 TASK_UNINTERRUPTIBLE);
c11f1df5
SP
3827
3828 server->ops->downgrade_oplock(server, cinode,
3829 test_bit(CIFS_INODE_DOWNGRADE_OPLOCK_TO_L2, &cinode->flags));
3830
18cceb6a 3831 if (!CIFS_CACHE_WRITE(cinode) && CIFS_CACHE_READ(cinode) &&
63b7d3a4 3832 cifs_has_mand_locks(cinode)) {
f96637be
JP
3833 cifs_dbg(FYI, "Reset oplock to None for inode=%p due to mand locks\n",
3834 inode);
18cceb6a 3835 cinode->oplock = 0;
63b7d3a4
PS
3836 }
3837
3bc303c2 3838 if (inode && S_ISREG(inode->i_mode)) {
18cceb6a 3839 if (CIFS_CACHE_READ(cinode))
8737c930 3840 break_lease(inode, O_RDONLY);
d54ff732 3841 else
8737c930 3842 break_lease(inode, O_WRONLY);
3bc303c2 3843 rc = filemap_fdatawrite(inode->i_mapping);
18cceb6a 3844 if (!CIFS_CACHE_READ(cinode)) {
eb4b756b
JL
3845 rc = filemap_fdatawait(inode->i_mapping);
3846 mapping_set_error(inode->i_mapping, rc);
4f73c7d3 3847 cifs_zap_mapping(inode);
3bc303c2 3848 }
f96637be 3849 cifs_dbg(FYI, "Oplock flush inode %p rc %d\n", inode, rc);
3bc303c2
JL
3850 }
3851
85160e03
PS
3852 rc = cifs_push_locks(cfile);
3853 if (rc)
f96637be 3854 cifs_dbg(VFS, "Push locks rc = %d\n", rc);
85160e03 3855
3bc303c2
JL
3856 /*
3857 * releasing stale oplock after recent reconnect of smb session using
3858 * a now incorrect file handle is not a data integrity issue but do
3859 * not bother sending an oplock release if session to server still is
3860 * disconnected since oplock already released by the server
3861 */
cdff08e7 3862 if (!cfile->oplock_break_cancelled) {
95a3f2f3
PS
3863 rc = tcon->ses->server->ops->oplock_response(tcon, &cfile->fid,
3864 cinode);
f96637be 3865 cifs_dbg(FYI, "Oplock release rc = %d\n", rc);
3bc303c2 3866 }
c11f1df5 3867 cifs_done_oplock_break(cinode);
3bc303c2
JL
3868}
3869
dca69288
SF
3870/*
3871 * The presence of cifs_direct_io() in the address space ops vector
3872 * allowes open() O_DIRECT flags which would have failed otherwise.
3873 *
3874 * In the non-cached mode (mount with cache=none), we shunt off direct read and write requests
3875 * so this method should never be called.
3876 *
3877 * Direct IO is not yet supported in the cached mode.
3878 */
3879static ssize_t
d8d3d94b
AV
3880cifs_direct_io(int rw, struct kiocb *iocb, struct iov_iter *iter,
3881 loff_t pos)
dca69288
SF
3882{
3883 /*
3884 * FIXME
3885 * Eventually need to support direct IO for non forcedirectio mounts
3886 */
3887 return -EINVAL;
3888}
3889
3890
f5e54d6e 3891const struct address_space_operations cifs_addr_ops = {
1da177e4
LT
3892 .readpage = cifs_readpage,
3893 .readpages = cifs_readpages,
3894 .writepage = cifs_writepage,
37c0eb46 3895 .writepages = cifs_writepages,
d9414774
NP
3896 .write_begin = cifs_write_begin,
3897 .write_end = cifs_write_end,
1da177e4 3898 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4 3899 .releasepage = cifs_release_page,
dca69288 3900 .direct_IO = cifs_direct_io,
85f2d6b4 3901 .invalidatepage = cifs_invalidate_page,
9ad1506b 3902 .launder_page = cifs_launder_page,
1da177e4 3903};
273d81d6
DK
3904
3905/*
3906 * cifs_readpages requires the server to support a buffer large enough to
3907 * contain the header plus one complete page of data. Otherwise, we need
3908 * to leave cifs_readpages out of the address space operations.
3909 */
f5e54d6e 3910const struct address_space_operations cifs_addr_ops_smallbuf = {
273d81d6
DK
3911 .readpage = cifs_readpage,
3912 .writepage = cifs_writepage,
3913 .writepages = cifs_writepages,
d9414774
NP
3914 .write_begin = cifs_write_begin,
3915 .write_end = cifs_write_end,
273d81d6 3916 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4
SJ
3917 .releasepage = cifs_release_page,
3918 .invalidatepage = cifs_invalidate_page,
9ad1506b 3919 .launder_page = cifs_launder_page,
273d81d6 3920};