]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - fs/cifs/file.c
CIFS: Fix possible buffer corruption in cifs_user_read()
[mirror_ubuntu-zesty-kernel.git] / fs / cifs / file.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/file.c
3 *
4 * vfs operations that deal with files
fb8c4b14 5 *
f19159dc 6 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4 7 * Author(s): Steve French (sfrench@us.ibm.com)
7ee1af76 8 * Jeremy Allison (jra@samba.org)
1da177e4
LT
9 *
10 * This library is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU Lesser General Public License as published
12 * by the Free Software Foundation; either version 2.1 of the License, or
13 * (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
18 * the GNU Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public License
21 * along with this library; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 */
24#include <linux/fs.h>
37c0eb46 25#include <linux/backing-dev.h>
1da177e4
LT
26#include <linux/stat.h>
27#include <linux/fcntl.h>
28#include <linux/pagemap.h>
29#include <linux/pagevec.h>
37c0eb46 30#include <linux/writeback.h>
6f88cc2e 31#include <linux/task_io_accounting_ops.h>
23e7dd7d 32#include <linux/delay.h>
3bc303c2 33#include <linux/mount.h>
5a0e3ad6 34#include <linux/slab.h>
690c5e31 35#include <linux/swap.h>
1da177e4
LT
36#include <asm/div64.h>
37#include "cifsfs.h"
38#include "cifspdu.h"
39#include "cifsglob.h"
40#include "cifsproto.h"
41#include "cifs_unicode.h"
42#include "cifs_debug.h"
43#include "cifs_fs_sb.h"
9451a9a5 44#include "fscache.h"
1da177e4 45
07b92d0d 46
1da177e4
LT
47static inline int cifs_convert_flags(unsigned int flags)
48{
49 if ((flags & O_ACCMODE) == O_RDONLY)
50 return GENERIC_READ;
51 else if ((flags & O_ACCMODE) == O_WRONLY)
52 return GENERIC_WRITE;
53 else if ((flags & O_ACCMODE) == O_RDWR) {
54 /* GENERIC_ALL is too much permission to request
55 can cause unnecessary access denied on create */
56 /* return GENERIC_ALL; */
57 return (GENERIC_READ | GENERIC_WRITE);
58 }
59
e10f7b55
JL
60 return (READ_CONTROL | FILE_WRITE_ATTRIBUTES | FILE_READ_ATTRIBUTES |
61 FILE_WRITE_EA | FILE_APPEND_DATA | FILE_WRITE_DATA |
62 FILE_READ_DATA);
7fc8f4e9 63}
e10f7b55 64
608712fe 65static u32 cifs_posix_convert_flags(unsigned int flags)
7fc8f4e9 66{
608712fe 67 u32 posix_flags = 0;
e10f7b55 68
7fc8f4e9 69 if ((flags & O_ACCMODE) == O_RDONLY)
608712fe 70 posix_flags = SMB_O_RDONLY;
7fc8f4e9 71 else if ((flags & O_ACCMODE) == O_WRONLY)
608712fe
JL
72 posix_flags = SMB_O_WRONLY;
73 else if ((flags & O_ACCMODE) == O_RDWR)
74 posix_flags = SMB_O_RDWR;
75
07b92d0d 76 if (flags & O_CREAT) {
608712fe 77 posix_flags |= SMB_O_CREAT;
07b92d0d
SF
78 if (flags & O_EXCL)
79 posix_flags |= SMB_O_EXCL;
80 } else if (flags & O_EXCL)
f96637be
JP
81 cifs_dbg(FYI, "Application %s pid %d has incorrectly set O_EXCL flag but not O_CREAT on file open. Ignoring O_EXCL\n",
82 current->comm, current->tgid);
07b92d0d 83
608712fe
JL
84 if (flags & O_TRUNC)
85 posix_flags |= SMB_O_TRUNC;
86 /* be safe and imply O_SYNC for O_DSYNC */
6b2f3d1f 87 if (flags & O_DSYNC)
608712fe 88 posix_flags |= SMB_O_SYNC;
7fc8f4e9 89 if (flags & O_DIRECTORY)
608712fe 90 posix_flags |= SMB_O_DIRECTORY;
7fc8f4e9 91 if (flags & O_NOFOLLOW)
608712fe 92 posix_flags |= SMB_O_NOFOLLOW;
7fc8f4e9 93 if (flags & O_DIRECT)
608712fe 94 posix_flags |= SMB_O_DIRECT;
7fc8f4e9
SF
95
96 return posix_flags;
1da177e4
LT
97}
98
99static inline int cifs_get_disposition(unsigned int flags)
100{
101 if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
102 return FILE_CREATE;
103 else if ((flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
104 return FILE_OVERWRITE_IF;
105 else if ((flags & O_CREAT) == O_CREAT)
106 return FILE_OPEN_IF;
55aa2e09
SF
107 else if ((flags & O_TRUNC) == O_TRUNC)
108 return FILE_OVERWRITE;
1da177e4
LT
109 else
110 return FILE_OPEN;
111}
112
608712fe
JL
113int cifs_posix_open(char *full_path, struct inode **pinode,
114 struct super_block *sb, int mode, unsigned int f_flags,
6d5786a3 115 __u32 *poplock, __u16 *pnetfid, unsigned int xid)
608712fe
JL
116{
117 int rc;
118 FILE_UNIX_BASIC_INFO *presp_data;
119 __u32 posix_flags = 0;
120 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
121 struct cifs_fattr fattr;
122 struct tcon_link *tlink;
96daf2b0 123 struct cifs_tcon *tcon;
608712fe 124
f96637be 125 cifs_dbg(FYI, "posix open %s\n", full_path);
608712fe
JL
126
127 presp_data = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
128 if (presp_data == NULL)
129 return -ENOMEM;
130
131 tlink = cifs_sb_tlink(cifs_sb);
132 if (IS_ERR(tlink)) {
133 rc = PTR_ERR(tlink);
134 goto posix_open_ret;
135 }
136
137 tcon = tlink_tcon(tlink);
138 mode &= ~current_umask();
139
140 posix_flags = cifs_posix_convert_flags(f_flags);
141 rc = CIFSPOSIXCreate(xid, tcon, posix_flags, mode, pnetfid, presp_data,
142 poplock, full_path, cifs_sb->local_nls,
143 cifs_sb->mnt_cifs_flags &
144 CIFS_MOUNT_MAP_SPECIAL_CHR);
145 cifs_put_tlink(tlink);
146
147 if (rc)
148 goto posix_open_ret;
149
150 if (presp_data->Type == cpu_to_le32(-1))
151 goto posix_open_ret; /* open ok, caller does qpathinfo */
152
153 if (!pinode)
154 goto posix_open_ret; /* caller does not need info */
155
156 cifs_unix_basic_to_fattr(&fattr, presp_data, cifs_sb);
157
158 /* get new inode and set it up */
159 if (*pinode == NULL) {
160 cifs_fill_uniqueid(sb, &fattr);
161 *pinode = cifs_iget(sb, &fattr);
162 if (!*pinode) {
163 rc = -ENOMEM;
164 goto posix_open_ret;
165 }
166 } else {
167 cifs_fattr_to_inode(*pinode, &fattr);
168 }
169
170posix_open_ret:
171 kfree(presp_data);
172 return rc;
173}
174
eeb910a6
PS
175static int
176cifs_nt_open(char *full_path, struct inode *inode, struct cifs_sb_info *cifs_sb,
fb1214e4
PS
177 struct cifs_tcon *tcon, unsigned int f_flags, __u32 *oplock,
178 struct cifs_fid *fid, unsigned int xid)
eeb910a6
PS
179{
180 int rc;
fb1214e4 181 int desired_access;
eeb910a6 182 int disposition;
3d3ea8e6 183 int create_options = CREATE_NOT_DIR;
eeb910a6 184 FILE_ALL_INFO *buf;
b8c32dbb 185 struct TCP_Server_Info *server = tcon->ses->server;
226730b4 186 struct cifs_open_parms oparms;
eeb910a6 187
b8c32dbb 188 if (!server->ops->open)
fb1214e4
PS
189 return -ENOSYS;
190
191 desired_access = cifs_convert_flags(f_flags);
eeb910a6
PS
192
193/*********************************************************************
194 * open flag mapping table:
195 *
196 * POSIX Flag CIFS Disposition
197 * ---------- ----------------
198 * O_CREAT FILE_OPEN_IF
199 * O_CREAT | O_EXCL FILE_CREATE
200 * O_CREAT | O_TRUNC FILE_OVERWRITE_IF
201 * O_TRUNC FILE_OVERWRITE
202 * none of the above FILE_OPEN
203 *
204 * Note that there is not a direct match between disposition
205 * FILE_SUPERSEDE (ie create whether or not file exists although
206 * O_CREAT | O_TRUNC is similar but truncates the existing
207 * file rather than creating a new file as FILE_SUPERSEDE does
208 * (which uses the attributes / metadata passed in on open call)
209 *?
210 *? O_SYNC is a reasonable match to CIFS writethrough flag
211 *? and the read write flags match reasonably. O_LARGEFILE
212 *? is irrelevant because largefile support is always used
213 *? by this client. Flags O_APPEND, O_DIRECT, O_DIRECTORY,
214 * O_FASYNC, O_NOFOLLOW, O_NONBLOCK need further investigation
215 *********************************************************************/
216
217 disposition = cifs_get_disposition(f_flags);
218
219 /* BB pass O_SYNC flag through on file attributes .. BB */
220
221 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
222 if (!buf)
223 return -ENOMEM;
224
3d3ea8e6
SP
225 if (backup_cred(cifs_sb))
226 create_options |= CREATE_OPEN_BACKUP_INTENT;
227
226730b4
PS
228 oparms.tcon = tcon;
229 oparms.cifs_sb = cifs_sb;
230 oparms.desired_access = desired_access;
231 oparms.create_options = create_options;
232 oparms.disposition = disposition;
233 oparms.path = full_path;
234 oparms.fid = fid;
9cbc0b73 235 oparms.reconnect = false;
226730b4
PS
236
237 rc = server->ops->open(xid, &oparms, oplock, buf);
eeb910a6
PS
238
239 if (rc)
240 goto out;
241
242 if (tcon->unix_ext)
243 rc = cifs_get_inode_info_unix(&inode, full_path, inode->i_sb,
244 xid);
245 else
246 rc = cifs_get_inode_info(&inode, full_path, buf, inode->i_sb,
42eacf9e 247 xid, fid);
eeb910a6
PS
248
249out:
250 kfree(buf);
251 return rc;
252}
253
63b7d3a4
PS
254static bool
255cifs_has_mand_locks(struct cifsInodeInfo *cinode)
256{
257 struct cifs_fid_locks *cur;
258 bool has_locks = false;
259
260 down_read(&cinode->lock_sem);
261 list_for_each_entry(cur, &cinode->llist, llist) {
262 if (!list_empty(&cur->locks)) {
263 has_locks = true;
264 break;
265 }
266 }
267 up_read(&cinode->lock_sem);
268 return has_locks;
269}
270
15ecb436 271struct cifsFileInfo *
fb1214e4 272cifs_new_fileinfo(struct cifs_fid *fid, struct file *file,
15ecb436
JL
273 struct tcon_link *tlink, __u32 oplock)
274{
275 struct dentry *dentry = file->f_path.dentry;
276 struct inode *inode = dentry->d_inode;
4b4de76e
PS
277 struct cifsInodeInfo *cinode = CIFS_I(inode);
278 struct cifsFileInfo *cfile;
f45d3416 279 struct cifs_fid_locks *fdlocks;
233839b1 280 struct cifs_tcon *tcon = tlink_tcon(tlink);
63b7d3a4 281 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e
PS
282
283 cfile = kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
284 if (cfile == NULL)
285 return cfile;
286
f45d3416
PS
287 fdlocks = kzalloc(sizeof(struct cifs_fid_locks), GFP_KERNEL);
288 if (!fdlocks) {
289 kfree(cfile);
290 return NULL;
291 }
292
293 INIT_LIST_HEAD(&fdlocks->locks);
294 fdlocks->cfile = cfile;
295 cfile->llist = fdlocks;
1b4b55a1 296 down_write(&cinode->lock_sem);
f45d3416 297 list_add(&fdlocks->llist, &cinode->llist);
1b4b55a1 298 up_write(&cinode->lock_sem);
f45d3416 299
4b4de76e 300 cfile->count = 1;
4b4de76e
PS
301 cfile->pid = current->tgid;
302 cfile->uid = current_fsuid();
303 cfile->dentry = dget(dentry);
304 cfile->f_flags = file->f_flags;
305 cfile->invalidHandle = false;
306 cfile->tlink = cifs_get_tlink(tlink);
4b4de76e 307 INIT_WORK(&cfile->oplock_break, cifs_oplock_break);
f45d3416 308 mutex_init(&cfile->fh_mutex);
15ecb436 309
24261fc2
MG
310 cifs_sb_active(inode->i_sb);
311
63b7d3a4
PS
312 /*
313 * If the server returned a read oplock and we have mandatory brlocks,
314 * set oplock level to None.
315 */
53ef1016 316 if (server->ops->is_read_op(oplock) && cifs_has_mand_locks(cinode)) {
f96637be 317 cifs_dbg(FYI, "Reset oplock val from read to None due to mand locks\n");
63b7d3a4
PS
318 oplock = 0;
319 }
320
4477288a 321 spin_lock(&cifs_file_list_lock);
63b7d3a4 322 if (fid->pending_open->oplock != CIFS_OPLOCK_NO_CHANGE && oplock)
233839b1
PS
323 oplock = fid->pending_open->oplock;
324 list_del(&fid->pending_open->olist);
325
42873b0a 326 fid->purge_cache = false;
63b7d3a4 327 server->ops->set_fid(cfile, fid, oplock);
233839b1
PS
328
329 list_add(&cfile->tlist, &tcon->openFileList);
15ecb436
JL
330 /* if readable file instance put first in list*/
331 if (file->f_mode & FMODE_READ)
4b4de76e 332 list_add(&cfile->flist, &cinode->openFileList);
15ecb436 333 else
4b4de76e 334 list_add_tail(&cfile->flist, &cinode->openFileList);
4477288a 335 spin_unlock(&cifs_file_list_lock);
15ecb436 336
42873b0a 337 if (fid->purge_cache)
4f73c7d3 338 cifs_zap_mapping(inode);
42873b0a 339
4b4de76e
PS
340 file->private_data = cfile;
341 return cfile;
15ecb436
JL
342}
343
764a1b1a
JL
344struct cifsFileInfo *
345cifsFileInfo_get(struct cifsFileInfo *cifs_file)
346{
347 spin_lock(&cifs_file_list_lock);
348 cifsFileInfo_get_locked(cifs_file);
349 spin_unlock(&cifs_file_list_lock);
350 return cifs_file;
351}
352
cdff08e7
SF
353/*
354 * Release a reference on the file private data. This may involve closing
5f6dbc9e
JL
355 * the filehandle out on the server. Must be called without holding
356 * cifs_file_list_lock.
cdff08e7 357 */
b33879aa
JL
358void cifsFileInfo_put(struct cifsFileInfo *cifs_file)
359{
e66673e3 360 struct inode *inode = cifs_file->dentry->d_inode;
96daf2b0 361 struct cifs_tcon *tcon = tlink_tcon(cifs_file->tlink);
233839b1 362 struct TCP_Server_Info *server = tcon->ses->server;
e66673e3 363 struct cifsInodeInfo *cifsi = CIFS_I(inode);
24261fc2
MG
364 struct super_block *sb = inode->i_sb;
365 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
cdff08e7 366 struct cifsLockInfo *li, *tmp;
233839b1
PS
367 struct cifs_fid fid;
368 struct cifs_pending_open open;
cdff08e7
SF
369
370 spin_lock(&cifs_file_list_lock);
5f6dbc9e 371 if (--cifs_file->count > 0) {
cdff08e7
SF
372 spin_unlock(&cifs_file_list_lock);
373 return;
374 }
375
233839b1
PS
376 if (server->ops->get_lease_key)
377 server->ops->get_lease_key(inode, &fid);
378
379 /* store open in pending opens to make sure we don't miss lease break */
380 cifs_add_pending_open_locked(&fid, cifs_file->tlink, &open);
381
cdff08e7
SF
382 /* remove it from the lists */
383 list_del(&cifs_file->flist);
384 list_del(&cifs_file->tlist);
385
386 if (list_empty(&cifsi->openFileList)) {
f96637be
JP
387 cifs_dbg(FYI, "closing last open instance for inode %p\n",
388 cifs_file->dentry->d_inode);
25364138
PS
389 /*
390 * In strict cache mode we need invalidate mapping on the last
391 * close because it may cause a error when we open this file
392 * again and get at least level II oplock.
393 */
4f8ba8a0 394 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO)
aff8d5ca 395 set_bit(CIFS_INO_INVALID_MAPPING, &cifsi->flags);
c6723628 396 cifs_set_oplock_level(cifsi, 0);
cdff08e7
SF
397 }
398 spin_unlock(&cifs_file_list_lock);
399
ad635942
JL
400 cancel_work_sync(&cifs_file->oplock_break);
401
cdff08e7 402 if (!tcon->need_reconnect && !cifs_file->invalidHandle) {
0ff78a22 403 struct TCP_Server_Info *server = tcon->ses->server;
6d5786a3 404 unsigned int xid;
0ff78a22 405
6d5786a3 406 xid = get_xid();
0ff78a22 407 if (server->ops->close)
760ad0ca
PS
408 server->ops->close(xid, tcon, &cifs_file->fid);
409 _free_xid(xid);
cdff08e7
SF
410 }
411
233839b1
PS
412 cifs_del_pending_open(&open);
413
f45d3416
PS
414 /*
415 * Delete any outstanding lock records. We'll lose them when the file
cdff08e7
SF
416 * is closed anyway.
417 */
1b4b55a1 418 down_write(&cifsi->lock_sem);
f45d3416 419 list_for_each_entry_safe(li, tmp, &cifs_file->llist->locks, llist) {
cdff08e7 420 list_del(&li->llist);
85160e03 421 cifs_del_lock_waiters(li);
cdff08e7 422 kfree(li);
b33879aa 423 }
f45d3416
PS
424 list_del(&cifs_file->llist->llist);
425 kfree(cifs_file->llist);
1b4b55a1 426 up_write(&cifsi->lock_sem);
cdff08e7
SF
427
428 cifs_put_tlink(cifs_file->tlink);
429 dput(cifs_file->dentry);
24261fc2 430 cifs_sb_deactive(sb);
cdff08e7 431 kfree(cifs_file);
b33879aa
JL
432}
433
1da177e4 434int cifs_open(struct inode *inode, struct file *file)
233839b1 435
1da177e4
LT
436{
437 int rc = -EACCES;
6d5786a3 438 unsigned int xid;
590a3fe0 439 __u32 oplock;
1da177e4 440 struct cifs_sb_info *cifs_sb;
b8c32dbb 441 struct TCP_Server_Info *server;
96daf2b0 442 struct cifs_tcon *tcon;
7ffec372 443 struct tcon_link *tlink;
fb1214e4 444 struct cifsFileInfo *cfile = NULL;
1da177e4 445 char *full_path = NULL;
7e12eddb 446 bool posix_open_ok = false;
fb1214e4 447 struct cifs_fid fid;
233839b1 448 struct cifs_pending_open open;
1da177e4 449
6d5786a3 450 xid = get_xid();
1da177e4
LT
451
452 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
453 tlink = cifs_sb_tlink(cifs_sb);
454 if (IS_ERR(tlink)) {
6d5786a3 455 free_xid(xid);
7ffec372
JL
456 return PTR_ERR(tlink);
457 }
458 tcon = tlink_tcon(tlink);
b8c32dbb 459 server = tcon->ses->server;
1da177e4 460
e6a00296 461 full_path = build_path_from_dentry(file->f_path.dentry);
1da177e4 462 if (full_path == NULL) {
0f3bc09e 463 rc = -ENOMEM;
232341ba 464 goto out;
1da177e4
LT
465 }
466
f96637be 467 cifs_dbg(FYI, "inode = 0x%p file flags are 0x%x for %s\n",
b6b38f70 468 inode, file->f_flags, full_path);
276a74a4 469
233839b1 470 if (server->oplocks)
276a74a4
SF
471 oplock = REQ_OPLOCK;
472 else
473 oplock = 0;
474
64cc2c63 475 if (!tcon->broken_posix_open && tcon->unix_ext &&
29e20f9c
PS
476 cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
477 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
276a74a4 478 /* can not refresh inode info since size could be stale */
2422f676 479 rc = cifs_posix_open(full_path, &inode, inode->i_sb,
fa588e0c 480 cifs_sb->mnt_file_mode /* ignored */,
fb1214e4 481 file->f_flags, &oplock, &fid.netfid, xid);
276a74a4 482 if (rc == 0) {
f96637be 483 cifs_dbg(FYI, "posix open succeeded\n");
7e12eddb 484 posix_open_ok = true;
64cc2c63
SF
485 } else if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
486 if (tcon->ses->serverNOS)
f96637be
JP
487 cifs_dbg(VFS, "server %s of type %s returned unexpected error on SMB posix open, disabling posix open support. Check if server update available.\n",
488 tcon->ses->serverName,
489 tcon->ses->serverNOS);
64cc2c63 490 tcon->broken_posix_open = true;
276a74a4
SF
491 } else if ((rc != -EIO) && (rc != -EREMOTE) &&
492 (rc != -EOPNOTSUPP)) /* path not found or net err */
493 goto out;
fb1214e4
PS
494 /*
495 * Else fallthrough to retry open the old way on network i/o
496 * or DFS errors.
497 */
276a74a4
SF
498 }
499
233839b1
PS
500 if (server->ops->get_lease_key)
501 server->ops->get_lease_key(inode, &fid);
502
503 cifs_add_pending_open(&fid, tlink, &open);
504
7e12eddb 505 if (!posix_open_ok) {
b8c32dbb
PS
506 if (server->ops->get_lease_key)
507 server->ops->get_lease_key(inode, &fid);
508
7e12eddb 509 rc = cifs_nt_open(full_path, inode, cifs_sb, tcon,
fb1214e4 510 file->f_flags, &oplock, &fid, xid);
233839b1
PS
511 if (rc) {
512 cifs_del_pending_open(&open);
7e12eddb 513 goto out;
233839b1 514 }
7e12eddb 515 }
47c78b7f 516
fb1214e4
PS
517 cfile = cifs_new_fileinfo(&fid, file, tlink, oplock);
518 if (cfile == NULL) {
b8c32dbb
PS
519 if (server->ops->close)
520 server->ops->close(xid, tcon, &fid);
233839b1 521 cifs_del_pending_open(&open);
1da177e4
LT
522 rc = -ENOMEM;
523 goto out;
524 }
1da177e4 525
9451a9a5
SJ
526 cifs_fscache_set_inode_cookie(inode, file);
527
7e12eddb 528 if ((oplock & CIFS_CREATE_ACTION) && !posix_open_ok && tcon->unix_ext) {
fb1214e4
PS
529 /*
530 * Time to set mode which we can not set earlier due to
531 * problems creating new read-only files.
532 */
7e12eddb
PS
533 struct cifs_unix_set_info_args args = {
534 .mode = inode->i_mode,
49418b2c
EB
535 .uid = INVALID_UID, /* no change */
536 .gid = INVALID_GID, /* no change */
7e12eddb
PS
537 .ctime = NO_CHANGE_64,
538 .atime = NO_CHANGE_64,
539 .mtime = NO_CHANGE_64,
540 .device = 0,
541 };
fb1214e4
PS
542 CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid.netfid,
543 cfile->pid);
1da177e4
LT
544 }
545
546out:
1da177e4 547 kfree(full_path);
6d5786a3 548 free_xid(xid);
7ffec372 549 cifs_put_tlink(tlink);
1da177e4
LT
550 return rc;
551}
552
f152fd5f
PS
553static int cifs_push_posix_locks(struct cifsFileInfo *cfile);
554
2ae78ba8
PS
555/*
556 * Try to reacquire byte range locks that were released when session
f152fd5f 557 * to server was lost.
2ae78ba8 558 */
f152fd5f
PS
559static int
560cifs_relock_file(struct cifsFileInfo *cfile)
1da177e4 561{
f152fd5f
PS
562 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
563 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
564 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1da177e4
LT
565 int rc = 0;
566
689c3db4 567 down_read(&cinode->lock_sem);
f152fd5f 568 if (cinode->can_cache_brlcks) {
689c3db4
PS
569 /* can cache locks - no need to relock */
570 up_read(&cinode->lock_sem);
f152fd5f
PS
571 return rc;
572 }
573
574 if (cap_unix(tcon->ses) &&
575 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
576 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
577 rc = cifs_push_posix_locks(cfile);
578 else
579 rc = tcon->ses->server->ops->push_mand_locks(cfile);
1da177e4 580
689c3db4 581 up_read(&cinode->lock_sem);
1da177e4
LT
582 return rc;
583}
584
2ae78ba8
PS
585static int
586cifs_reopen_file(struct cifsFileInfo *cfile, bool can_flush)
1da177e4
LT
587{
588 int rc = -EACCES;
6d5786a3 589 unsigned int xid;
590a3fe0 590 __u32 oplock;
1da177e4 591 struct cifs_sb_info *cifs_sb;
96daf2b0 592 struct cifs_tcon *tcon;
2ae78ba8
PS
593 struct TCP_Server_Info *server;
594 struct cifsInodeInfo *cinode;
fb8c4b14 595 struct inode *inode;
1da177e4 596 char *full_path = NULL;
2ae78ba8 597 int desired_access;
1da177e4 598 int disposition = FILE_OPEN;
3d3ea8e6 599 int create_options = CREATE_NOT_DIR;
226730b4 600 struct cifs_open_parms oparms;
1da177e4 601
6d5786a3 602 xid = get_xid();
2ae78ba8
PS
603 mutex_lock(&cfile->fh_mutex);
604 if (!cfile->invalidHandle) {
605 mutex_unlock(&cfile->fh_mutex);
0f3bc09e 606 rc = 0;
6d5786a3 607 free_xid(xid);
0f3bc09e 608 return rc;
1da177e4
LT
609 }
610
2ae78ba8 611 inode = cfile->dentry->d_inode;
1da177e4 612 cifs_sb = CIFS_SB(inode->i_sb);
2ae78ba8
PS
613 tcon = tlink_tcon(cfile->tlink);
614 server = tcon->ses->server;
615
616 /*
617 * Can not grab rename sem here because various ops, including those
618 * that already have the rename sem can end up causing writepage to get
619 * called and if the server was down that means we end up here, and we
620 * can never tell if the caller already has the rename_sem.
621 */
622 full_path = build_path_from_dentry(cfile->dentry);
1da177e4 623 if (full_path == NULL) {
3a9f462f 624 rc = -ENOMEM;
2ae78ba8 625 mutex_unlock(&cfile->fh_mutex);
6d5786a3 626 free_xid(xid);
3a9f462f 627 return rc;
1da177e4
LT
628 }
629
f96637be
JP
630 cifs_dbg(FYI, "inode = 0x%p file flags 0x%x for %s\n",
631 inode, cfile->f_flags, full_path);
1da177e4 632
10b9b98e 633 if (tcon->ses->server->oplocks)
1da177e4
LT
634 oplock = REQ_OPLOCK;
635 else
4b18f2a9 636 oplock = 0;
1da177e4 637
29e20f9c 638 if (tcon->unix_ext && cap_unix(tcon->ses) &&
7fc8f4e9 639 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
29e20f9c 640 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
608712fe
JL
641 /*
642 * O_CREAT, O_EXCL and O_TRUNC already had their effect on the
643 * original open. Must mask them off for a reopen.
644 */
2ae78ba8 645 unsigned int oflags = cfile->f_flags &
15886177 646 ~(O_CREAT | O_EXCL | O_TRUNC);
608712fe 647
2422f676 648 rc = cifs_posix_open(full_path, NULL, inode->i_sb,
2ae78ba8 649 cifs_sb->mnt_file_mode /* ignored */,
9cbc0b73 650 oflags, &oplock, &cfile->fid.netfid, xid);
7fc8f4e9 651 if (rc == 0) {
f96637be 652 cifs_dbg(FYI, "posix reopen succeeded\n");
fe090e4e 653 oparms.reconnect = true;
7fc8f4e9
SF
654 goto reopen_success;
655 }
2ae78ba8
PS
656 /*
657 * fallthrough to retry open the old way on errors, especially
658 * in the reconnect path it is important to retry hard
659 */
7fc8f4e9
SF
660 }
661
2ae78ba8 662 desired_access = cifs_convert_flags(cfile->f_flags);
7fc8f4e9 663
3d3ea8e6
SP
664 if (backup_cred(cifs_sb))
665 create_options |= CREATE_OPEN_BACKUP_INTENT;
666
b8c32dbb 667 if (server->ops->get_lease_key)
9cbc0b73 668 server->ops->get_lease_key(inode, &cfile->fid);
b8c32dbb 669
226730b4
PS
670 oparms.tcon = tcon;
671 oparms.cifs_sb = cifs_sb;
672 oparms.desired_access = desired_access;
673 oparms.create_options = create_options;
674 oparms.disposition = disposition;
675 oparms.path = full_path;
9cbc0b73
PS
676 oparms.fid = &cfile->fid;
677 oparms.reconnect = true;
226730b4 678
2ae78ba8
PS
679 /*
680 * Can not refresh inode by passing in file_info buf to be returned by
d81b8a40 681 * ops->open and then calling get_inode_info with returned buf since
2ae78ba8
PS
682 * file might have write behind data that needs to be flushed and server
683 * version of file size can be stale. If we knew for sure that inode was
684 * not dirty locally we could do this.
685 */
226730b4 686 rc = server->ops->open(xid, &oparms, &oplock, NULL);
b33fcf1c
PS
687 if (rc == -ENOENT && oparms.reconnect == false) {
688 /* durable handle timeout is expired - open the file again */
689 rc = server->ops->open(xid, &oparms, &oplock, NULL);
690 /* indicate that we need to relock the file */
691 oparms.reconnect = true;
692 }
693
1da177e4 694 if (rc) {
2ae78ba8 695 mutex_unlock(&cfile->fh_mutex);
f96637be
JP
696 cifs_dbg(FYI, "cifs_reopen returned 0x%x\n", rc);
697 cifs_dbg(FYI, "oplock: %d\n", oplock);
15886177
JL
698 goto reopen_error_exit;
699 }
700
7fc8f4e9 701reopen_success:
2ae78ba8
PS
702 cfile->invalidHandle = false;
703 mutex_unlock(&cfile->fh_mutex);
704 cinode = CIFS_I(inode);
15886177
JL
705
706 if (can_flush) {
707 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b 708 mapping_set_error(inode->i_mapping, rc);
15886177 709
15886177 710 if (tcon->unix_ext)
2ae78ba8
PS
711 rc = cifs_get_inode_info_unix(&inode, full_path,
712 inode->i_sb, xid);
15886177 713 else
2ae78ba8
PS
714 rc = cifs_get_inode_info(&inode, full_path, NULL,
715 inode->i_sb, xid, NULL);
716 }
717 /*
718 * Else we are writing out data to server already and could deadlock if
719 * we tried to flush data, and since we do not know if we have data that
720 * would invalidate the current end of file on the server we can not go
721 * to the server to get the new inode info.
722 */
723
9cbc0b73
PS
724 server->ops->set_fid(cfile, &cfile->fid, oplock);
725 if (oparms.reconnect)
726 cifs_relock_file(cfile);
15886177
JL
727
728reopen_error_exit:
1da177e4 729 kfree(full_path);
6d5786a3 730 free_xid(xid);
1da177e4
LT
731 return rc;
732}
733
734int cifs_close(struct inode *inode, struct file *file)
735{
77970693
JL
736 if (file->private_data != NULL) {
737 cifsFileInfo_put(file->private_data);
738 file->private_data = NULL;
739 }
7ee1af76 740
cdff08e7
SF
741 /* return code from the ->release op is always ignored */
742 return 0;
1da177e4
LT
743}
744
745int cifs_closedir(struct inode *inode, struct file *file)
746{
747 int rc = 0;
6d5786a3 748 unsigned int xid;
4b4de76e 749 struct cifsFileInfo *cfile = file->private_data;
92fc65a7
PS
750 struct cifs_tcon *tcon;
751 struct TCP_Server_Info *server;
752 char *buf;
1da177e4 753
f96637be 754 cifs_dbg(FYI, "Closedir inode = 0x%p\n", inode);
1da177e4 755
92fc65a7
PS
756 if (cfile == NULL)
757 return rc;
758
6d5786a3 759 xid = get_xid();
92fc65a7
PS
760 tcon = tlink_tcon(cfile->tlink);
761 server = tcon->ses->server;
1da177e4 762
f96637be 763 cifs_dbg(FYI, "Freeing private data in close dir\n");
92fc65a7
PS
764 spin_lock(&cifs_file_list_lock);
765 if (!cfile->srch_inf.endOfSearch && !cfile->invalidHandle) {
766 cfile->invalidHandle = true;
767 spin_unlock(&cifs_file_list_lock);
768 if (server->ops->close_dir)
769 rc = server->ops->close_dir(xid, tcon, &cfile->fid);
770 else
771 rc = -ENOSYS;
f96637be 772 cifs_dbg(FYI, "Closing uncompleted readdir with rc %d\n", rc);
92fc65a7
PS
773 /* not much we can do if it fails anyway, ignore rc */
774 rc = 0;
775 } else
776 spin_unlock(&cifs_file_list_lock);
777
778 buf = cfile->srch_inf.ntwrk_buf_start;
779 if (buf) {
f96637be 780 cifs_dbg(FYI, "closedir free smb buf in srch struct\n");
92fc65a7
PS
781 cfile->srch_inf.ntwrk_buf_start = NULL;
782 if (cfile->srch_inf.smallBuf)
783 cifs_small_buf_release(buf);
784 else
785 cifs_buf_release(buf);
1da177e4 786 }
92fc65a7
PS
787
788 cifs_put_tlink(cfile->tlink);
789 kfree(file->private_data);
790 file->private_data = NULL;
1da177e4 791 /* BB can we lock the filestruct while this is going on? */
6d5786a3 792 free_xid(xid);
1da177e4
LT
793 return rc;
794}
795
85160e03 796static struct cifsLockInfo *
fbd35aca 797cifs_lock_init(__u64 offset, __u64 length, __u8 type)
7ee1af76 798{
a88b4707 799 struct cifsLockInfo *lock =
fb8c4b14 800 kmalloc(sizeof(struct cifsLockInfo), GFP_KERNEL);
a88b4707
PS
801 if (!lock)
802 return lock;
803 lock->offset = offset;
804 lock->length = length;
805 lock->type = type;
a88b4707
PS
806 lock->pid = current->tgid;
807 INIT_LIST_HEAD(&lock->blist);
808 init_waitqueue_head(&lock->block_q);
809 return lock;
85160e03
PS
810}
811
f7ba7fe6 812void
85160e03
PS
813cifs_del_lock_waiters(struct cifsLockInfo *lock)
814{
815 struct cifsLockInfo *li, *tmp;
816 list_for_each_entry_safe(li, tmp, &lock->blist, blist) {
817 list_del_init(&li->blist);
818 wake_up(&li->block_q);
819 }
820}
821
081c0414
PS
822#define CIFS_LOCK_OP 0
823#define CIFS_READ_OP 1
824#define CIFS_WRITE_OP 2
825
826/* @rw_check : 0 - no op, 1 - read, 2 - write */
85160e03 827static bool
f45d3416
PS
828cifs_find_fid_lock_conflict(struct cifs_fid_locks *fdlocks, __u64 offset,
829 __u64 length, __u8 type, struct cifsFileInfo *cfile,
081c0414 830 struct cifsLockInfo **conf_lock, int rw_check)
85160e03 831{
fbd35aca 832 struct cifsLockInfo *li;
f45d3416 833 struct cifsFileInfo *cur_cfile = fdlocks->cfile;
106dc538 834 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03 835
f45d3416 836 list_for_each_entry(li, &fdlocks->locks, llist) {
85160e03
PS
837 if (offset + length <= li->offset ||
838 offset >= li->offset + li->length)
839 continue;
081c0414
PS
840 if (rw_check != CIFS_LOCK_OP && current->tgid == li->pid &&
841 server->ops->compare_fids(cfile, cur_cfile)) {
842 /* shared lock prevents write op through the same fid */
843 if (!(li->type & server->vals->shared_lock_type) ||
844 rw_check != CIFS_WRITE_OP)
845 continue;
846 }
f45d3416
PS
847 if ((type & server->vals->shared_lock_type) &&
848 ((server->ops->compare_fids(cfile, cur_cfile) &&
849 current->tgid == li->pid) || type == li->type))
85160e03 850 continue;
579f9053
PS
851 if (conf_lock)
852 *conf_lock = li;
f45d3416 853 return true;
85160e03
PS
854 }
855 return false;
856}
857
579f9053 858bool
55157dfb 859cifs_find_lock_conflict(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
579f9053 860 __u8 type, struct cifsLockInfo **conf_lock,
081c0414 861 int rw_check)
161ebf9f 862{
fbd35aca 863 bool rc = false;
f45d3416 864 struct cifs_fid_locks *cur;
55157dfb 865 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
fbd35aca 866
f45d3416
PS
867 list_for_each_entry(cur, &cinode->llist, llist) {
868 rc = cifs_find_fid_lock_conflict(cur, offset, length, type,
579f9053 869 cfile, conf_lock, rw_check);
fbd35aca
PS
870 if (rc)
871 break;
872 }
fbd35aca
PS
873
874 return rc;
161ebf9f
PS
875}
876
9a5101c8
PS
877/*
878 * Check if there is another lock that prevents us to set the lock (mandatory
879 * style). If such a lock exists, update the flock structure with its
880 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
881 * or leave it the same if we can't. Returns 0 if we don't need to request to
882 * the server or 1 otherwise.
883 */
85160e03 884static int
fbd35aca
PS
885cifs_lock_test(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
886 __u8 type, struct file_lock *flock)
85160e03
PS
887{
888 int rc = 0;
889 struct cifsLockInfo *conf_lock;
fbd35aca 890 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
106dc538 891 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03
PS
892 bool exist;
893
1b4b55a1 894 down_read(&cinode->lock_sem);
85160e03 895
55157dfb 896 exist = cifs_find_lock_conflict(cfile, offset, length, type,
081c0414 897 &conf_lock, CIFS_LOCK_OP);
85160e03
PS
898 if (exist) {
899 flock->fl_start = conf_lock->offset;
900 flock->fl_end = conf_lock->offset + conf_lock->length - 1;
901 flock->fl_pid = conf_lock->pid;
106dc538 902 if (conf_lock->type & server->vals->shared_lock_type)
85160e03
PS
903 flock->fl_type = F_RDLCK;
904 else
905 flock->fl_type = F_WRLCK;
906 } else if (!cinode->can_cache_brlcks)
907 rc = 1;
908 else
909 flock->fl_type = F_UNLCK;
910
1b4b55a1 911 up_read(&cinode->lock_sem);
85160e03
PS
912 return rc;
913}
914
161ebf9f 915static void
fbd35aca 916cifs_lock_add(struct cifsFileInfo *cfile, struct cifsLockInfo *lock)
85160e03 917{
fbd35aca 918 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1b4b55a1 919 down_write(&cinode->lock_sem);
f45d3416 920 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 921 up_write(&cinode->lock_sem);
7ee1af76
JA
922}
923
9a5101c8
PS
924/*
925 * Set the byte-range lock (mandatory style). Returns:
926 * 1) 0, if we set the lock and don't need to request to the server;
927 * 2) 1, if no locks prevent us but we need to request to the server;
928 * 3) -EACCESS, if there is a lock that prevents us and wait is false.
929 */
85160e03 930static int
fbd35aca 931cifs_lock_add_if(struct cifsFileInfo *cfile, struct cifsLockInfo *lock,
161ebf9f 932 bool wait)
85160e03 933{
161ebf9f 934 struct cifsLockInfo *conf_lock;
fbd35aca 935 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
85160e03
PS
936 bool exist;
937 int rc = 0;
938
85160e03
PS
939try_again:
940 exist = false;
1b4b55a1 941 down_write(&cinode->lock_sem);
85160e03 942
55157dfb 943 exist = cifs_find_lock_conflict(cfile, lock->offset, lock->length,
081c0414 944 lock->type, &conf_lock, CIFS_LOCK_OP);
85160e03 945 if (!exist && cinode->can_cache_brlcks) {
f45d3416 946 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 947 up_write(&cinode->lock_sem);
85160e03
PS
948 return rc;
949 }
950
951 if (!exist)
952 rc = 1;
953 else if (!wait)
954 rc = -EACCES;
955 else {
956 list_add_tail(&lock->blist, &conf_lock->blist);
1b4b55a1 957 up_write(&cinode->lock_sem);
85160e03
PS
958 rc = wait_event_interruptible(lock->block_q,
959 (lock->blist.prev == &lock->blist) &&
960 (lock->blist.next == &lock->blist));
961 if (!rc)
962 goto try_again;
1b4b55a1 963 down_write(&cinode->lock_sem);
a88b4707 964 list_del_init(&lock->blist);
85160e03
PS
965 }
966
1b4b55a1 967 up_write(&cinode->lock_sem);
85160e03
PS
968 return rc;
969}
970
9a5101c8
PS
971/*
972 * Check if there is another lock that prevents us to set the lock (posix
973 * style). If such a lock exists, update the flock structure with its
974 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
975 * or leave it the same if we can't. Returns 0 if we don't need to request to
976 * the server or 1 otherwise.
977 */
85160e03 978static int
4f6bcec9
PS
979cifs_posix_lock_test(struct file *file, struct file_lock *flock)
980{
981 int rc = 0;
496ad9aa 982 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
4f6bcec9
PS
983 unsigned char saved_type = flock->fl_type;
984
50792760
PS
985 if ((flock->fl_flags & FL_POSIX) == 0)
986 return 1;
987
1b4b55a1 988 down_read(&cinode->lock_sem);
4f6bcec9
PS
989 posix_test_lock(file, flock);
990
991 if (flock->fl_type == F_UNLCK && !cinode->can_cache_brlcks) {
992 flock->fl_type = saved_type;
993 rc = 1;
994 }
995
1b4b55a1 996 up_read(&cinode->lock_sem);
4f6bcec9
PS
997 return rc;
998}
999
9a5101c8
PS
1000/*
1001 * Set the byte-range lock (posix style). Returns:
1002 * 1) 0, if we set the lock and don't need to request to the server;
1003 * 2) 1, if we need to request to the server;
1004 * 3) <0, if the error occurs while setting the lock.
1005 */
4f6bcec9
PS
1006static int
1007cifs_posix_lock_set(struct file *file, struct file_lock *flock)
1008{
496ad9aa 1009 struct cifsInodeInfo *cinode = CIFS_I(file_inode(file));
50792760
PS
1010 int rc = 1;
1011
1012 if ((flock->fl_flags & FL_POSIX) == 0)
1013 return rc;
4f6bcec9 1014
66189be7 1015try_again:
1b4b55a1 1016 down_write(&cinode->lock_sem);
4f6bcec9 1017 if (!cinode->can_cache_brlcks) {
1b4b55a1 1018 up_write(&cinode->lock_sem);
50792760 1019 return rc;
4f6bcec9 1020 }
66189be7
PS
1021
1022 rc = posix_lock_file(file, flock, NULL);
1b4b55a1 1023 up_write(&cinode->lock_sem);
66189be7
PS
1024 if (rc == FILE_LOCK_DEFERRED) {
1025 rc = wait_event_interruptible(flock->fl_wait, !flock->fl_next);
1026 if (!rc)
1027 goto try_again;
1a9e64a7 1028 posix_unblock_lock(flock);
66189be7 1029 }
9ebb389d 1030 return rc;
4f6bcec9
PS
1031}
1032
d39a4f71 1033int
4f6bcec9 1034cifs_push_mandatory_locks(struct cifsFileInfo *cfile)
85160e03 1035{
6d5786a3
PS
1036 unsigned int xid;
1037 int rc = 0, stored_rc;
85160e03
PS
1038 struct cifsLockInfo *li, *tmp;
1039 struct cifs_tcon *tcon;
0013fb4c 1040 unsigned int num, max_num, max_buf;
32b9aaf1
PS
1041 LOCKING_ANDX_RANGE *buf, *cur;
1042 int types[] = {LOCKING_ANDX_LARGE_FILES,
1043 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
1044 int i;
85160e03 1045
6d5786a3 1046 xid = get_xid();
85160e03
PS
1047 tcon = tlink_tcon(cfile->tlink);
1048
0013fb4c
PS
1049 /*
1050 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1051 * and check it for zero before using.
1052 */
1053 max_buf = tcon->ses->server->maxBuf;
1054 if (!max_buf) {
6d5786a3 1055 free_xid(xid);
0013fb4c
PS
1056 return -EINVAL;
1057 }
1058
1059 max_num = (max_buf - sizeof(struct smb_hdr)) /
1060 sizeof(LOCKING_ANDX_RANGE);
32b9aaf1
PS
1061 buf = kzalloc(max_num * sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
1062 if (!buf) {
6d5786a3 1063 free_xid(xid);
e2f2886a 1064 return -ENOMEM;
32b9aaf1
PS
1065 }
1066
1067 for (i = 0; i < 2; i++) {
1068 cur = buf;
1069 num = 0;
f45d3416 1070 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
32b9aaf1
PS
1071 if (li->type != types[i])
1072 continue;
1073 cur->Pid = cpu_to_le16(li->pid);
1074 cur->LengthLow = cpu_to_le32((u32)li->length);
1075 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1076 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1077 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1078 if (++num == max_num) {
4b4de76e
PS
1079 stored_rc = cifs_lockv(xid, tcon,
1080 cfile->fid.netfid,
04a6aa8a
PS
1081 (__u8)li->type, 0, num,
1082 buf);
32b9aaf1
PS
1083 if (stored_rc)
1084 rc = stored_rc;
1085 cur = buf;
1086 num = 0;
1087 } else
1088 cur++;
1089 }
1090
1091 if (num) {
4b4de76e 1092 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
04a6aa8a 1093 (__u8)types[i], 0, num, buf);
32b9aaf1
PS
1094 if (stored_rc)
1095 rc = stored_rc;
1096 }
85160e03
PS
1097 }
1098
32b9aaf1 1099 kfree(buf);
6d5786a3 1100 free_xid(xid);
85160e03
PS
1101 return rc;
1102}
1103
4f6bcec9
PS
1104/* copied from fs/locks.c with a name change */
1105#define cifs_for_each_lock(inode, lockp) \
1106 for (lockp = &inode->i_flock; *lockp != NULL; \
1107 lockp = &(*lockp)->fl_next)
1108
d5751469
PS
1109struct lock_to_push {
1110 struct list_head llist;
1111 __u64 offset;
1112 __u64 length;
1113 __u32 pid;
1114 __u16 netfid;
1115 __u8 type;
1116};
1117
4f6bcec9 1118static int
b8db928b 1119cifs_push_posix_locks(struct cifsFileInfo *cfile)
4f6bcec9 1120{
1c8c601a 1121 struct inode *inode = cfile->dentry->d_inode;
4f6bcec9
PS
1122 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1123 struct file_lock *flock, **before;
d5751469 1124 unsigned int count = 0, i = 0;
4f6bcec9 1125 int rc = 0, xid, type;
d5751469
PS
1126 struct list_head locks_to_send, *el;
1127 struct lock_to_push *lck, *tmp;
4f6bcec9 1128 __u64 length;
4f6bcec9 1129
6d5786a3 1130 xid = get_xid();
4f6bcec9 1131
1c8c601a
JL
1132 spin_lock(&inode->i_lock);
1133 cifs_for_each_lock(inode, before) {
d5751469
PS
1134 if ((*before)->fl_flags & FL_POSIX)
1135 count++;
1136 }
1c8c601a 1137 spin_unlock(&inode->i_lock);
d5751469 1138
4f6bcec9
PS
1139 INIT_LIST_HEAD(&locks_to_send);
1140
d5751469 1141 /*
ce85852b 1142 * Allocating count locks is enough because no FL_POSIX locks can be
1b4b55a1 1143 * added to the list while we are holding cinode->lock_sem that
ce85852b 1144 * protects locking operations of this inode.
d5751469
PS
1145 */
1146 for (; i < count; i++) {
1147 lck = kmalloc(sizeof(struct lock_to_push), GFP_KERNEL);
1148 if (!lck) {
1149 rc = -ENOMEM;
1150 goto err_out;
1151 }
1152 list_add_tail(&lck->llist, &locks_to_send);
1153 }
1154
d5751469 1155 el = locks_to_send.next;
1c8c601a
JL
1156 spin_lock(&inode->i_lock);
1157 cifs_for_each_lock(inode, before) {
ce85852b
PS
1158 flock = *before;
1159 if ((flock->fl_flags & FL_POSIX) == 0)
1160 continue;
d5751469 1161 if (el == &locks_to_send) {
ce85852b
PS
1162 /*
1163 * The list ended. We don't have enough allocated
1164 * structures - something is really wrong.
1165 */
f96637be 1166 cifs_dbg(VFS, "Can't push all brlocks!\n");
d5751469
PS
1167 break;
1168 }
4f6bcec9
PS
1169 length = 1 + flock->fl_end - flock->fl_start;
1170 if (flock->fl_type == F_RDLCK || flock->fl_type == F_SHLCK)
1171 type = CIFS_RDLCK;
1172 else
1173 type = CIFS_WRLCK;
d5751469 1174 lck = list_entry(el, struct lock_to_push, llist);
4f6bcec9 1175 lck->pid = flock->fl_pid;
4b4de76e 1176 lck->netfid = cfile->fid.netfid;
d5751469
PS
1177 lck->length = length;
1178 lck->type = type;
1179 lck->offset = flock->fl_start;
d5751469 1180 el = el->next;
4f6bcec9 1181 }
1c8c601a 1182 spin_unlock(&inode->i_lock);
4f6bcec9
PS
1183
1184 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
4f6bcec9
PS
1185 int stored_rc;
1186
4f6bcec9 1187 stored_rc = CIFSSMBPosixLock(xid, tcon, lck->netfid, lck->pid,
c5fd363d 1188 lck->offset, lck->length, NULL,
4f6bcec9
PS
1189 lck->type, 0);
1190 if (stored_rc)
1191 rc = stored_rc;
1192 list_del(&lck->llist);
1193 kfree(lck);
1194 }
1195
d5751469 1196out:
6d5786a3 1197 free_xid(xid);
4f6bcec9 1198 return rc;
d5751469
PS
1199err_out:
1200 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
1201 list_del(&lck->llist);
1202 kfree(lck);
1203 }
1204 goto out;
4f6bcec9
PS
1205}
1206
9ec3c882 1207static int
b8db928b 1208cifs_push_locks(struct cifsFileInfo *cfile)
9ec3c882 1209{
b8db928b 1210 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
9ec3c882 1211 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
b8db928b 1212 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
9ec3c882
PS
1213 int rc = 0;
1214
1215 /* we are going to update can_cache_brlcks here - need a write access */
1216 down_write(&cinode->lock_sem);
1217 if (!cinode->can_cache_brlcks) {
1218 up_write(&cinode->lock_sem);
1219 return rc;
1220 }
4f6bcec9 1221
29e20f9c 1222 if (cap_unix(tcon->ses) &&
4f6bcec9
PS
1223 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1224 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
b8db928b
PS
1225 rc = cifs_push_posix_locks(cfile);
1226 else
1227 rc = tcon->ses->server->ops->push_mand_locks(cfile);
4f6bcec9 1228
b8db928b
PS
1229 cinode->can_cache_brlcks = false;
1230 up_write(&cinode->lock_sem);
1231 return rc;
4f6bcec9
PS
1232}
1233
03776f45 1234static void
04a6aa8a 1235cifs_read_flock(struct file_lock *flock, __u32 *type, int *lock, int *unlock,
106dc538 1236 bool *wait_flag, struct TCP_Server_Info *server)
1da177e4 1237{
03776f45 1238 if (flock->fl_flags & FL_POSIX)
f96637be 1239 cifs_dbg(FYI, "Posix\n");
03776f45 1240 if (flock->fl_flags & FL_FLOCK)
f96637be 1241 cifs_dbg(FYI, "Flock\n");
03776f45 1242 if (flock->fl_flags & FL_SLEEP) {
f96637be 1243 cifs_dbg(FYI, "Blocking lock\n");
03776f45 1244 *wait_flag = true;
1da177e4 1245 }
03776f45 1246 if (flock->fl_flags & FL_ACCESS)
f96637be 1247 cifs_dbg(FYI, "Process suspended by mandatory locking - not implemented yet\n");
03776f45 1248 if (flock->fl_flags & FL_LEASE)
f96637be 1249 cifs_dbg(FYI, "Lease on file - not implemented yet\n");
03776f45 1250 if (flock->fl_flags &
3d6d854a
JL
1251 (~(FL_POSIX | FL_FLOCK | FL_SLEEP |
1252 FL_ACCESS | FL_LEASE | FL_CLOSE)))
f96637be 1253 cifs_dbg(FYI, "Unknown lock flags 0x%x\n", flock->fl_flags);
1da177e4 1254
106dc538 1255 *type = server->vals->large_lock_type;
03776f45 1256 if (flock->fl_type == F_WRLCK) {
f96637be 1257 cifs_dbg(FYI, "F_WRLCK\n");
106dc538 1258 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1259 *lock = 1;
1260 } else if (flock->fl_type == F_UNLCK) {
f96637be 1261 cifs_dbg(FYI, "F_UNLCK\n");
106dc538 1262 *type |= server->vals->unlock_lock_type;
03776f45
PS
1263 *unlock = 1;
1264 /* Check if unlock includes more than one lock range */
1265 } else if (flock->fl_type == F_RDLCK) {
f96637be 1266 cifs_dbg(FYI, "F_RDLCK\n");
106dc538 1267 *type |= server->vals->shared_lock_type;
03776f45
PS
1268 *lock = 1;
1269 } else if (flock->fl_type == F_EXLCK) {
f96637be 1270 cifs_dbg(FYI, "F_EXLCK\n");
106dc538 1271 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1272 *lock = 1;
1273 } else if (flock->fl_type == F_SHLCK) {
f96637be 1274 cifs_dbg(FYI, "F_SHLCK\n");
106dc538 1275 *type |= server->vals->shared_lock_type;
03776f45 1276 *lock = 1;
1da177e4 1277 } else
f96637be 1278 cifs_dbg(FYI, "Unknown type of lock\n");
03776f45 1279}
1da177e4 1280
03776f45 1281static int
04a6aa8a 1282cifs_getlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3 1283 bool wait_flag, bool posix_lck, unsigned int xid)
03776f45
PS
1284{
1285 int rc = 0;
1286 __u64 length = 1 + flock->fl_end - flock->fl_start;
4f6bcec9
PS
1287 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1288 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1289 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e 1290 __u16 netfid = cfile->fid.netfid;
f05337c6 1291
03776f45
PS
1292 if (posix_lck) {
1293 int posix_lock_type;
4f6bcec9
PS
1294
1295 rc = cifs_posix_lock_test(file, flock);
1296 if (!rc)
1297 return rc;
1298
106dc538 1299 if (type & server->vals->shared_lock_type)
03776f45
PS
1300 posix_lock_type = CIFS_RDLCK;
1301 else
1302 posix_lock_type = CIFS_WRLCK;
4f6bcec9 1303 rc = CIFSSMBPosixLock(xid, tcon, netfid, current->tgid,
c5fd363d 1304 flock->fl_start, length, flock,
4f6bcec9 1305 posix_lock_type, wait_flag);
03776f45
PS
1306 return rc;
1307 }
1da177e4 1308
fbd35aca 1309 rc = cifs_lock_test(cfile, flock->fl_start, length, type, flock);
85160e03
PS
1310 if (!rc)
1311 return rc;
1312
03776f45 1313 /* BB we could chain these into one lock request BB */
d39a4f71
PS
1314 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length, type,
1315 1, 0, false);
03776f45 1316 if (rc == 0) {
d39a4f71
PS
1317 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1318 type, 0, 1, false);
03776f45
PS
1319 flock->fl_type = F_UNLCK;
1320 if (rc != 0)
f96637be
JP
1321 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1322 rc);
a88b4707 1323 return 0;
1da177e4 1324 }
7ee1af76 1325
106dc538 1326 if (type & server->vals->shared_lock_type) {
03776f45 1327 flock->fl_type = F_WRLCK;
a88b4707 1328 return 0;
7ee1af76
JA
1329 }
1330
d39a4f71
PS
1331 type &= ~server->vals->exclusive_lock_type;
1332
1333 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1334 type | server->vals->shared_lock_type,
1335 1, 0, false);
03776f45 1336 if (rc == 0) {
d39a4f71
PS
1337 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1338 type | server->vals->shared_lock_type, 0, 1, false);
03776f45
PS
1339 flock->fl_type = F_RDLCK;
1340 if (rc != 0)
f96637be
JP
1341 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n",
1342 rc);
03776f45
PS
1343 } else
1344 flock->fl_type = F_WRLCK;
1345
a88b4707 1346 return 0;
03776f45
PS
1347}
1348
f7ba7fe6 1349void
9ee305b7
PS
1350cifs_move_llist(struct list_head *source, struct list_head *dest)
1351{
1352 struct list_head *li, *tmp;
1353 list_for_each_safe(li, tmp, source)
1354 list_move(li, dest);
1355}
1356
f7ba7fe6 1357void
9ee305b7
PS
1358cifs_free_llist(struct list_head *llist)
1359{
1360 struct cifsLockInfo *li, *tmp;
1361 list_for_each_entry_safe(li, tmp, llist, llist) {
1362 cifs_del_lock_waiters(li);
1363 list_del(&li->llist);
1364 kfree(li);
1365 }
1366}
1367
d39a4f71 1368int
6d5786a3
PS
1369cifs_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
1370 unsigned int xid)
9ee305b7
PS
1371{
1372 int rc = 0, stored_rc;
1373 int types[] = {LOCKING_ANDX_LARGE_FILES,
1374 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
1375 unsigned int i;
0013fb4c 1376 unsigned int max_num, num, max_buf;
9ee305b7
PS
1377 LOCKING_ANDX_RANGE *buf, *cur;
1378 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1379 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1380 struct cifsLockInfo *li, *tmp;
1381 __u64 length = 1 + flock->fl_end - flock->fl_start;
1382 struct list_head tmp_llist;
1383
1384 INIT_LIST_HEAD(&tmp_llist);
1385
0013fb4c
PS
1386 /*
1387 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1388 * and check it for zero before using.
1389 */
1390 max_buf = tcon->ses->server->maxBuf;
1391 if (!max_buf)
1392 return -EINVAL;
1393
1394 max_num = (max_buf - sizeof(struct smb_hdr)) /
1395 sizeof(LOCKING_ANDX_RANGE);
9ee305b7
PS
1396 buf = kzalloc(max_num * sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
1397 if (!buf)
1398 return -ENOMEM;
1399
1b4b55a1 1400 down_write(&cinode->lock_sem);
9ee305b7
PS
1401 for (i = 0; i < 2; i++) {
1402 cur = buf;
1403 num = 0;
f45d3416 1404 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
9ee305b7
PS
1405 if (flock->fl_start > li->offset ||
1406 (flock->fl_start + length) <
1407 (li->offset + li->length))
1408 continue;
1409 if (current->tgid != li->pid)
1410 continue;
9ee305b7
PS
1411 if (types[i] != li->type)
1412 continue;
ea319d57 1413 if (cinode->can_cache_brlcks) {
9ee305b7
PS
1414 /*
1415 * We can cache brlock requests - simply remove
fbd35aca 1416 * a lock from the file's list.
9ee305b7
PS
1417 */
1418 list_del(&li->llist);
1419 cifs_del_lock_waiters(li);
1420 kfree(li);
ea319d57 1421 continue;
9ee305b7 1422 }
ea319d57
PS
1423 cur->Pid = cpu_to_le16(li->pid);
1424 cur->LengthLow = cpu_to_le32((u32)li->length);
1425 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1426 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1427 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1428 /*
1429 * We need to save a lock here to let us add it again to
1430 * the file's list if the unlock range request fails on
1431 * the server.
1432 */
1433 list_move(&li->llist, &tmp_llist);
1434 if (++num == max_num) {
4b4de76e
PS
1435 stored_rc = cifs_lockv(xid, tcon,
1436 cfile->fid.netfid,
ea319d57
PS
1437 li->type, num, 0, buf);
1438 if (stored_rc) {
1439 /*
1440 * We failed on the unlock range
1441 * request - add all locks from the tmp
1442 * list to the head of the file's list.
1443 */
1444 cifs_move_llist(&tmp_llist,
f45d3416 1445 &cfile->llist->locks);
ea319d57
PS
1446 rc = stored_rc;
1447 } else
1448 /*
1449 * The unlock range request succeed -
1450 * free the tmp list.
1451 */
1452 cifs_free_llist(&tmp_llist);
1453 cur = buf;
1454 num = 0;
1455 } else
1456 cur++;
9ee305b7
PS
1457 }
1458 if (num) {
4b4de76e 1459 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
9ee305b7
PS
1460 types[i], num, 0, buf);
1461 if (stored_rc) {
f45d3416
PS
1462 cifs_move_llist(&tmp_llist,
1463 &cfile->llist->locks);
9ee305b7
PS
1464 rc = stored_rc;
1465 } else
1466 cifs_free_llist(&tmp_llist);
1467 }
1468 }
1469
1b4b55a1 1470 up_write(&cinode->lock_sem);
9ee305b7
PS
1471 kfree(buf);
1472 return rc;
1473}
1474
03776f45 1475static int
f45d3416 1476cifs_setlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3
PS
1477 bool wait_flag, bool posix_lck, int lock, int unlock,
1478 unsigned int xid)
03776f45
PS
1479{
1480 int rc = 0;
1481 __u64 length = 1 + flock->fl_end - flock->fl_start;
1482 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1483 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1484 struct TCP_Server_Info *server = tcon->ses->server;
63b7d3a4 1485 struct inode *inode = cfile->dentry->d_inode;
03776f45
PS
1486
1487 if (posix_lck) {
08547b03 1488 int posix_lock_type;
4f6bcec9
PS
1489
1490 rc = cifs_posix_lock_set(file, flock);
1491 if (!rc || rc < 0)
1492 return rc;
1493
106dc538 1494 if (type & server->vals->shared_lock_type)
08547b03
SF
1495 posix_lock_type = CIFS_RDLCK;
1496 else
1497 posix_lock_type = CIFS_WRLCK;
50c2f753 1498
03776f45 1499 if (unlock == 1)
beb84dc8 1500 posix_lock_type = CIFS_UNLCK;
7ee1af76 1501
f45d3416
PS
1502 rc = CIFSSMBPosixLock(xid, tcon, cfile->fid.netfid,
1503 current->tgid, flock->fl_start, length,
1504 NULL, posix_lock_type, wait_flag);
03776f45
PS
1505 goto out;
1506 }
7ee1af76 1507
03776f45 1508 if (lock) {
161ebf9f
PS
1509 struct cifsLockInfo *lock;
1510
fbd35aca 1511 lock = cifs_lock_init(flock->fl_start, length, type);
161ebf9f
PS
1512 if (!lock)
1513 return -ENOMEM;
1514
fbd35aca 1515 rc = cifs_lock_add_if(cfile, lock, wait_flag);
21cb2d90 1516 if (rc < 0) {
161ebf9f 1517 kfree(lock);
21cb2d90
PS
1518 return rc;
1519 }
1520 if (!rc)
85160e03
PS
1521 goto out;
1522
63b7d3a4
PS
1523 /*
1524 * Windows 7 server can delay breaking lease from read to None
1525 * if we set a byte-range lock on a file - break it explicitly
1526 * before sending the lock to the server to be sure the next
1527 * read won't conflict with non-overlapted locks due to
1528 * pagereading.
1529 */
18cceb6a
PS
1530 if (!CIFS_CACHE_WRITE(CIFS_I(inode)) &&
1531 CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 1532 cifs_zap_mapping(inode);
f96637be
JP
1533 cifs_dbg(FYI, "Set no oplock for inode=%p due to mand locks\n",
1534 inode);
18cceb6a 1535 CIFS_I(inode)->oplock = 0;
63b7d3a4
PS
1536 }
1537
d39a4f71
PS
1538 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1539 type, 1, 0, wait_flag);
161ebf9f
PS
1540 if (rc) {
1541 kfree(lock);
21cb2d90 1542 return rc;
03776f45 1543 }
161ebf9f 1544
fbd35aca 1545 cifs_lock_add(cfile, lock);
9ee305b7 1546 } else if (unlock)
d39a4f71 1547 rc = server->ops->mand_unlock_range(cfile, flock, xid);
03776f45 1548
03776f45
PS
1549out:
1550 if (flock->fl_flags & FL_POSIX)
9ebb389d 1551 posix_lock_file_wait(file, flock);
03776f45
PS
1552 return rc;
1553}
1554
1555int cifs_lock(struct file *file, int cmd, struct file_lock *flock)
1556{
1557 int rc, xid;
1558 int lock = 0, unlock = 0;
1559 bool wait_flag = false;
1560 bool posix_lck = false;
1561 struct cifs_sb_info *cifs_sb;
1562 struct cifs_tcon *tcon;
1563 struct cifsInodeInfo *cinode;
1564 struct cifsFileInfo *cfile;
1565 __u16 netfid;
04a6aa8a 1566 __u32 type;
03776f45
PS
1567
1568 rc = -EACCES;
6d5786a3 1569 xid = get_xid();
03776f45 1570
f96637be
JP
1571 cifs_dbg(FYI, "Lock parm: 0x%x flockflags: 0x%x flocktype: 0x%x start: %lld end: %lld\n",
1572 cmd, flock->fl_flags, flock->fl_type,
1573 flock->fl_start, flock->fl_end);
03776f45 1574
03776f45
PS
1575 cfile = (struct cifsFileInfo *)file->private_data;
1576 tcon = tlink_tcon(cfile->tlink);
106dc538
PS
1577
1578 cifs_read_flock(flock, &type, &lock, &unlock, &wait_flag,
1579 tcon->ses->server);
1580
1581 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
4b4de76e 1582 netfid = cfile->fid.netfid;
496ad9aa 1583 cinode = CIFS_I(file_inode(file));
03776f45 1584
29e20f9c 1585 if (cap_unix(tcon->ses) &&
03776f45
PS
1586 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1587 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
1588 posix_lck = true;
1589 /*
1590 * BB add code here to normalize offset and length to account for
1591 * negative length which we can not accept over the wire.
1592 */
1593 if (IS_GETLK(cmd)) {
4f6bcec9 1594 rc = cifs_getlk(file, flock, type, wait_flag, posix_lck, xid);
6d5786a3 1595 free_xid(xid);
03776f45
PS
1596 return rc;
1597 }
1598
1599 if (!lock && !unlock) {
1600 /*
1601 * if no lock or unlock then nothing to do since we do not
1602 * know what it is
1603 */
6d5786a3 1604 free_xid(xid);
03776f45 1605 return -EOPNOTSUPP;
7ee1af76
JA
1606 }
1607
03776f45
PS
1608 rc = cifs_setlk(file, flock, type, wait_flag, posix_lck, lock, unlock,
1609 xid);
6d5786a3 1610 free_xid(xid);
1da177e4
LT
1611 return rc;
1612}
1613
597b027f
JL
1614/*
1615 * update the file size (if needed) after a write. Should be called with
1616 * the inode->i_lock held
1617 */
72432ffc 1618void
fbec9ab9
JL
1619cifs_update_eof(struct cifsInodeInfo *cifsi, loff_t offset,
1620 unsigned int bytes_written)
1621{
1622 loff_t end_of_write = offset + bytes_written;
1623
1624 if (end_of_write > cifsi->server_eof)
1625 cifsi->server_eof = end_of_write;
1626}
1627
ba9ad725
PS
1628static ssize_t
1629cifs_write(struct cifsFileInfo *open_file, __u32 pid, const char *write_data,
1630 size_t write_size, loff_t *offset)
1da177e4
LT
1631{
1632 int rc = 0;
1633 unsigned int bytes_written = 0;
1634 unsigned int total_written;
1635 struct cifs_sb_info *cifs_sb;
ba9ad725
PS
1636 struct cifs_tcon *tcon;
1637 struct TCP_Server_Info *server;
6d5786a3 1638 unsigned int xid;
7da4b49a
JL
1639 struct dentry *dentry = open_file->dentry;
1640 struct cifsInodeInfo *cifsi = CIFS_I(dentry->d_inode);
fa2989f4 1641 struct cifs_io_parms io_parms;
1da177e4 1642
7da4b49a 1643 cifs_sb = CIFS_SB(dentry->d_sb);
1da177e4 1644
f96637be
JP
1645 cifs_dbg(FYI, "write %zd bytes to offset %lld of %s\n",
1646 write_size, *offset, dentry->d_name.name);
1da177e4 1647
ba9ad725
PS
1648 tcon = tlink_tcon(open_file->tlink);
1649 server = tcon->ses->server;
1650
1651 if (!server->ops->sync_write)
1652 return -ENOSYS;
50c2f753 1653
6d5786a3 1654 xid = get_xid();
1da177e4 1655
1da177e4
LT
1656 for (total_written = 0; write_size > total_written;
1657 total_written += bytes_written) {
1658 rc = -EAGAIN;
1659 while (rc == -EAGAIN) {
ca83ce3d
JL
1660 struct kvec iov[2];
1661 unsigned int len;
1662
1da177e4 1663 if (open_file->invalidHandle) {
1da177e4
LT
1664 /* we could deadlock if we called
1665 filemap_fdatawait from here so tell
fb8c4b14 1666 reopen_file not to flush data to
1da177e4 1667 server now */
15886177 1668 rc = cifs_reopen_file(open_file, false);
1da177e4
LT
1669 if (rc != 0)
1670 break;
1671 }
ca83ce3d 1672
cb7e9eab
PS
1673 len = min(server->ops->wp_retry_size(dentry->d_inode),
1674 (unsigned int)write_size - total_written);
ca83ce3d
JL
1675 /* iov[0] is reserved for smb header */
1676 iov[1].iov_base = (char *)write_data + total_written;
1677 iov[1].iov_len = len;
fa2989f4 1678 io_parms.pid = pid;
ba9ad725
PS
1679 io_parms.tcon = tcon;
1680 io_parms.offset = *offset;
fa2989f4 1681 io_parms.length = len;
ba9ad725
PS
1682 rc = server->ops->sync_write(xid, open_file, &io_parms,
1683 &bytes_written, iov, 1);
1da177e4
LT
1684 }
1685 if (rc || (bytes_written == 0)) {
1686 if (total_written)
1687 break;
1688 else {
6d5786a3 1689 free_xid(xid);
1da177e4
LT
1690 return rc;
1691 }
fbec9ab9 1692 } else {
597b027f 1693 spin_lock(&dentry->d_inode->i_lock);
ba9ad725 1694 cifs_update_eof(cifsi, *offset, bytes_written);
597b027f 1695 spin_unlock(&dentry->d_inode->i_lock);
ba9ad725 1696 *offset += bytes_written;
fbec9ab9 1697 }
1da177e4
LT
1698 }
1699
ba9ad725 1700 cifs_stats_bytes_written(tcon, total_written);
1da177e4 1701
7da4b49a
JL
1702 if (total_written > 0) {
1703 spin_lock(&dentry->d_inode->i_lock);
ba9ad725
PS
1704 if (*offset > dentry->d_inode->i_size)
1705 i_size_write(dentry->d_inode, *offset);
7da4b49a 1706 spin_unlock(&dentry->d_inode->i_lock);
1da177e4 1707 }
7da4b49a 1708 mark_inode_dirty_sync(dentry->d_inode);
6d5786a3 1709 free_xid(xid);
1da177e4
LT
1710 return total_written;
1711}
1712
6508d904
JL
1713struct cifsFileInfo *find_readable_file(struct cifsInodeInfo *cifs_inode,
1714 bool fsuid_only)
630f3f0c
SF
1715{
1716 struct cifsFileInfo *open_file = NULL;
6508d904
JL
1717 struct cifs_sb_info *cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1718
1719 /* only filter by fsuid on multiuser mounts */
1720 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1721 fsuid_only = false;
630f3f0c 1722
4477288a 1723 spin_lock(&cifs_file_list_lock);
630f3f0c
SF
1724 /* we could simply get the first_list_entry since write-only entries
1725 are always at the end of the list but since the first entry might
1726 have a close pending, we go through the whole list */
1727 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
fef59fd7 1728 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6508d904 1729 continue;
2e396b83 1730 if (OPEN_FMODE(open_file->f_flags) & FMODE_READ) {
630f3f0c
SF
1731 if (!open_file->invalidHandle) {
1732 /* found a good file */
1733 /* lock it so it will not be closed on us */
764a1b1a 1734 cifsFileInfo_get_locked(open_file);
4477288a 1735 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1736 return open_file;
1737 } /* else might as well continue, and look for
1738 another, or simply have the caller reopen it
1739 again rather than trying to fix this handle */
1740 } else /* write only file */
1741 break; /* write only files are last so must be done */
1742 }
4477288a 1743 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1744 return NULL;
1745}
630f3f0c 1746
6508d904
JL
1747struct cifsFileInfo *find_writable_file(struct cifsInodeInfo *cifs_inode,
1748 bool fsuid_only)
6148a742 1749{
2c0c2a08 1750 struct cifsFileInfo *open_file, *inv_file = NULL;
d3892294 1751 struct cifs_sb_info *cifs_sb;
2846d386 1752 bool any_available = false;
dd99cd80 1753 int rc;
2c0c2a08 1754 unsigned int refind = 0;
6148a742 1755
60808233
SF
1756 /* Having a null inode here (because mapping->host was set to zero by
1757 the VFS or MM) should not happen but we had reports of on oops (due to
1758 it being zero) during stress testcases so we need to check for it */
1759
fb8c4b14 1760 if (cifs_inode == NULL) {
f96637be 1761 cifs_dbg(VFS, "Null inode passed to cifs_writeable_file\n");
60808233
SF
1762 dump_stack();
1763 return NULL;
1764 }
1765
d3892294
JL
1766 cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1767
6508d904
JL
1768 /* only filter by fsuid on multiuser mounts */
1769 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1770 fsuid_only = false;
1771
4477288a 1772 spin_lock(&cifs_file_list_lock);
9b22b0b7 1773refind_writable:
2c0c2a08
SP
1774 if (refind > MAX_REOPEN_ATT) {
1775 spin_unlock(&cifs_file_list_lock);
1776 return NULL;
1777 }
6148a742 1778 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
6508d904
JL
1779 if (!any_available && open_file->pid != current->tgid)
1780 continue;
fef59fd7 1781 if (fsuid_only && !uid_eq(open_file->uid, current_fsuid()))
6148a742 1782 continue;
2e396b83 1783 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
9b22b0b7
SF
1784 if (!open_file->invalidHandle) {
1785 /* found a good writable file */
764a1b1a 1786 cifsFileInfo_get_locked(open_file);
4477288a 1787 spin_unlock(&cifs_file_list_lock);
9b22b0b7 1788 return open_file;
2c0c2a08
SP
1789 } else {
1790 if (!inv_file)
1791 inv_file = open_file;
9b22b0b7 1792 }
6148a742
SF
1793 }
1794 }
2846d386
JL
1795 /* couldn't find useable FH with same pid, try any available */
1796 if (!any_available) {
1797 any_available = true;
1798 goto refind_writable;
1799 }
2c0c2a08
SP
1800
1801 if (inv_file) {
1802 any_available = false;
764a1b1a 1803 cifsFileInfo_get_locked(inv_file);
2c0c2a08
SP
1804 }
1805
4477288a 1806 spin_unlock(&cifs_file_list_lock);
2c0c2a08
SP
1807
1808 if (inv_file) {
1809 rc = cifs_reopen_file(inv_file, false);
1810 if (!rc)
1811 return inv_file;
1812 else {
1813 spin_lock(&cifs_file_list_lock);
1814 list_move_tail(&inv_file->flist,
1815 &cifs_inode->openFileList);
1816 spin_unlock(&cifs_file_list_lock);
1817 cifsFileInfo_put(inv_file);
1818 spin_lock(&cifs_file_list_lock);
1819 ++refind;
1820 goto refind_writable;
1821 }
1822 }
1823
6148a742
SF
1824 return NULL;
1825}
1826
1da177e4
LT
1827static int cifs_partialpagewrite(struct page *page, unsigned from, unsigned to)
1828{
1829 struct address_space *mapping = page->mapping;
1830 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
1831 char *write_data;
1832 int rc = -EFAULT;
1833 int bytes_written = 0;
1da177e4 1834 struct inode *inode;
6148a742 1835 struct cifsFileInfo *open_file;
1da177e4
LT
1836
1837 if (!mapping || !mapping->host)
1838 return -EFAULT;
1839
1840 inode = page->mapping->host;
1da177e4
LT
1841
1842 offset += (loff_t)from;
1843 write_data = kmap(page);
1844 write_data += from;
1845
1846 if ((to > PAGE_CACHE_SIZE) || (from > to)) {
1847 kunmap(page);
1848 return -EIO;
1849 }
1850
1851 /* racing with truncate? */
1852 if (offset > mapping->host->i_size) {
1853 kunmap(page);
1854 return 0; /* don't care */
1855 }
1856
1857 /* check to make sure that we are not extending the file */
1858 if (mapping->host->i_size - offset < (loff_t)to)
fb8c4b14 1859 to = (unsigned)(mapping->host->i_size - offset);
1da177e4 1860
6508d904 1861 open_file = find_writable_file(CIFS_I(mapping->host), false);
6148a742 1862 if (open_file) {
fa2989f4
PS
1863 bytes_written = cifs_write(open_file, open_file->pid,
1864 write_data, to - from, &offset);
6ab409b5 1865 cifsFileInfo_put(open_file);
1da177e4 1866 /* Does mm or vfs already set times? */
6148a742 1867 inode->i_atime = inode->i_mtime = current_fs_time(inode->i_sb);
bb5a9a04 1868 if ((bytes_written > 0) && (offset))
6148a742 1869 rc = 0;
bb5a9a04
SF
1870 else if (bytes_written < 0)
1871 rc = bytes_written;
6148a742 1872 } else {
f96637be 1873 cifs_dbg(FYI, "No writeable filehandles for inode\n");
1da177e4
LT
1874 rc = -EIO;
1875 }
1876
1877 kunmap(page);
1878 return rc;
1879}
1880
90ac1387
PS
1881static struct cifs_writedata *
1882wdata_alloc_and_fillpages(pgoff_t tofind, struct address_space *mapping,
1883 pgoff_t end, pgoff_t *index,
1884 unsigned int *found_pages)
1885{
1886 unsigned int nr_pages;
1887 struct page **pages;
1888 struct cifs_writedata *wdata;
1889
1890 wdata = cifs_writedata_alloc((unsigned int)tofind,
1891 cifs_writev_complete);
1892 if (!wdata)
1893 return NULL;
1894
1895 /*
1896 * find_get_pages_tag seems to return a max of 256 on each
1897 * iteration, so we must call it several times in order to
1898 * fill the array or the wsize is effectively limited to
1899 * 256 * PAGE_CACHE_SIZE.
1900 */
1901 *found_pages = 0;
1902 pages = wdata->pages;
1903 do {
1904 nr_pages = find_get_pages_tag(mapping, index,
1905 PAGECACHE_TAG_DIRTY, tofind,
1906 pages);
1907 *found_pages += nr_pages;
1908 tofind -= nr_pages;
1909 pages += nr_pages;
1910 } while (nr_pages && tofind && *index <= end);
1911
1912 return wdata;
1913}
1914
7e48ff82
PS
1915static unsigned int
1916wdata_prepare_pages(struct cifs_writedata *wdata, unsigned int found_pages,
1917 struct address_space *mapping,
1918 struct writeback_control *wbc,
1919 pgoff_t end, pgoff_t *index, pgoff_t *next, bool *done)
1920{
1921 unsigned int nr_pages = 0, i;
1922 struct page *page;
1923
1924 for (i = 0; i < found_pages; i++) {
1925 page = wdata->pages[i];
1926 /*
1927 * At this point we hold neither mapping->tree_lock nor
1928 * lock on the page itself: the page may be truncated or
1929 * invalidated (changing page->mapping to NULL), or even
1930 * swizzled back from swapper_space to tmpfs file
1931 * mapping
1932 */
1933
1934 if (nr_pages == 0)
1935 lock_page(page);
1936 else if (!trylock_page(page))
1937 break;
1938
1939 if (unlikely(page->mapping != mapping)) {
1940 unlock_page(page);
1941 break;
1942 }
1943
1944 if (!wbc->range_cyclic && page->index > end) {
1945 *done = true;
1946 unlock_page(page);
1947 break;
1948 }
1949
1950 if (*next && (page->index != *next)) {
1951 /* Not next consecutive page */
1952 unlock_page(page);
1953 break;
1954 }
1955
1956 if (wbc->sync_mode != WB_SYNC_NONE)
1957 wait_on_page_writeback(page);
1958
1959 if (PageWriteback(page) ||
1960 !clear_page_dirty_for_io(page)) {
1961 unlock_page(page);
1962 break;
1963 }
1964
1965 /*
1966 * This actually clears the dirty bit in the radix tree.
1967 * See cifs_writepage() for more commentary.
1968 */
1969 set_page_writeback(page);
1970 if (page_offset(page) >= i_size_read(mapping->host)) {
1971 *done = true;
1972 unlock_page(page);
1973 end_page_writeback(page);
1974 break;
1975 }
1976
1977 wdata->pages[i] = page;
1978 *next = page->index + 1;
1979 ++nr_pages;
1980 }
1981
1982 /* reset index to refind any pages skipped */
1983 if (nr_pages == 0)
1984 *index = wdata->pages[0]->index + 1;
1985
1986 /* put any pages we aren't going to use */
1987 for (i = nr_pages; i < found_pages; i++) {
1988 page_cache_release(wdata->pages[i]);
1989 wdata->pages[i] = NULL;
1990 }
1991
1992 return nr_pages;
1993}
1994
619aa48e
PS
1995static int
1996wdata_send_pages(struct cifs_writedata *wdata, unsigned int nr_pages,
1997 struct address_space *mapping, struct writeback_control *wbc)
1998{
1999 int rc = 0;
2000 struct TCP_Server_Info *server;
2001 unsigned int i;
2002
2003 wdata->sync_mode = wbc->sync_mode;
2004 wdata->nr_pages = nr_pages;
2005 wdata->offset = page_offset(wdata->pages[0]);
2006 wdata->pagesz = PAGE_CACHE_SIZE;
2007 wdata->tailsz = min(i_size_read(mapping->host) -
2008 page_offset(wdata->pages[nr_pages - 1]),
2009 (loff_t)PAGE_CACHE_SIZE);
2010 wdata->bytes = ((nr_pages - 1) * PAGE_CACHE_SIZE) + wdata->tailsz;
2011
66231a47
PS
2012 if (wdata->cfile != NULL)
2013 cifsFileInfo_put(wdata->cfile);
2014 wdata->cfile = find_writable_file(CIFS_I(mapping->host), false);
2015 if (!wdata->cfile) {
2016 cifs_dbg(VFS, "No writable handles for inode\n");
2017 rc = -EBADF;
2018 } else {
619aa48e
PS
2019 wdata->pid = wdata->cfile->pid;
2020 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
2021 rc = server->ops->async_writev(wdata, cifs_writedata_release);
66231a47 2022 }
619aa48e
PS
2023
2024 for (i = 0; i < nr_pages; ++i)
2025 unlock_page(wdata->pages[i]);
2026
2027 return rc;
2028}
2029
1da177e4 2030static int cifs_writepages(struct address_space *mapping,
37c0eb46 2031 struct writeback_control *wbc)
1da177e4 2032{
c3d17b63 2033 struct cifs_sb_info *cifs_sb = CIFS_SB(mapping->host->i_sb);
cb7e9eab 2034 struct TCP_Server_Info *server;
c3d17b63
JL
2035 bool done = false, scanned = false, range_whole = false;
2036 pgoff_t end, index;
2037 struct cifs_writedata *wdata;
37c0eb46 2038 int rc = 0;
50c2f753 2039
37c0eb46 2040 /*
c3d17b63 2041 * If wsize is smaller than the page cache size, default to writing
37c0eb46
SF
2042 * one page at a time via cifs_writepage
2043 */
2044 if (cifs_sb->wsize < PAGE_CACHE_SIZE)
2045 return generic_writepages(mapping, wbc);
2046
111ebb6e 2047 if (wbc->range_cyclic) {
37c0eb46 2048 index = mapping->writeback_index; /* Start from prev offset */
111ebb6e
OH
2049 end = -1;
2050 } else {
2051 index = wbc->range_start >> PAGE_CACHE_SHIFT;
2052 end = wbc->range_end >> PAGE_CACHE_SHIFT;
2053 if (wbc->range_start == 0 && wbc->range_end == LLONG_MAX)
c3d17b63
JL
2054 range_whole = true;
2055 scanned = true;
37c0eb46 2056 }
cb7e9eab 2057 server = cifs_sb_master_tcon(cifs_sb)->ses->server;
37c0eb46 2058retry:
c3d17b63 2059 while (!done && index <= end) {
cb7e9eab 2060 unsigned int i, nr_pages, found_pages, wsize, credits;
66231a47 2061 pgoff_t next = 0, tofind, saved_index = index;
c3d17b63 2062
cb7e9eab
PS
2063 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2064 &wsize, &credits);
2065 if (rc)
2066 break;
2067
2068 tofind = min((wsize / PAGE_CACHE_SIZE) - 1, end - index) + 1;
c3d17b63 2069
90ac1387
PS
2070 wdata = wdata_alloc_and_fillpages(tofind, mapping, end, &index,
2071 &found_pages);
c3d17b63
JL
2072 if (!wdata) {
2073 rc = -ENOMEM;
cb7e9eab 2074 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2075 break;
2076 }
2077
c3d17b63
JL
2078 if (found_pages == 0) {
2079 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2080 add_credits_and_wake_if(server, credits, 0);
c3d17b63
JL
2081 break;
2082 }
2083
7e48ff82
PS
2084 nr_pages = wdata_prepare_pages(wdata, found_pages, mapping, wbc,
2085 end, &index, &next, &done);
37c0eb46 2086
c3d17b63
JL
2087 /* nothing to write? */
2088 if (nr_pages == 0) {
2089 kref_put(&wdata->refcount, cifs_writedata_release);
cb7e9eab 2090 add_credits_and_wake_if(server, credits, 0);
c3d17b63 2091 continue;
37c0eb46 2092 }
fbec9ab9 2093
cb7e9eab
PS
2094 wdata->credits = credits;
2095
619aa48e 2096 rc = wdata_send_pages(wdata, nr_pages, mapping, wbc);
f3983c21 2097
c3d17b63
JL
2098 /* send failure -- clean up the mess */
2099 if (rc != 0) {
cb7e9eab 2100 add_credits_and_wake_if(server, wdata->credits, 0);
c3d17b63 2101 for (i = 0; i < nr_pages; ++i) {
941b853d 2102 if (rc == -EAGAIN)
c3d17b63
JL
2103 redirty_page_for_writepage(wbc,
2104 wdata->pages[i]);
2105 else
2106 SetPageError(wdata->pages[i]);
2107 end_page_writeback(wdata->pages[i]);
2108 page_cache_release(wdata->pages[i]);
37c0eb46 2109 }
941b853d
JL
2110 if (rc != -EAGAIN)
2111 mapping_set_error(mapping, rc);
c3d17b63
JL
2112 }
2113 kref_put(&wdata->refcount, cifs_writedata_release);
941b853d 2114
66231a47
PS
2115 if (wbc->sync_mode == WB_SYNC_ALL && rc == -EAGAIN) {
2116 index = saved_index;
2117 continue;
2118 }
2119
c3d17b63
JL
2120 wbc->nr_to_write -= nr_pages;
2121 if (wbc->nr_to_write <= 0)
2122 done = true;
b066a48c 2123
c3d17b63 2124 index = next;
37c0eb46 2125 }
c3d17b63 2126
37c0eb46
SF
2127 if (!scanned && !done) {
2128 /*
2129 * We hit the last page and there is more work to be done: wrap
2130 * back to the start of the file
2131 */
c3d17b63 2132 scanned = true;
37c0eb46
SF
2133 index = 0;
2134 goto retry;
2135 }
c3d17b63 2136
111ebb6e 2137 if (wbc->range_cyclic || (range_whole && wbc->nr_to_write > 0))
37c0eb46
SF
2138 mapping->writeback_index = index;
2139
1da177e4
LT
2140 return rc;
2141}
1da177e4 2142
9ad1506b
PS
2143static int
2144cifs_writepage_locked(struct page *page, struct writeback_control *wbc)
1da177e4 2145{
9ad1506b 2146 int rc;
6d5786a3 2147 unsigned int xid;
1da177e4 2148
6d5786a3 2149 xid = get_xid();
1da177e4
LT
2150/* BB add check for wbc flags */
2151 page_cache_get(page);
ad7a2926 2152 if (!PageUptodate(page))
f96637be 2153 cifs_dbg(FYI, "ppw - page not up to date\n");
cb876f45
LT
2154
2155 /*
2156 * Set the "writeback" flag, and clear "dirty" in the radix tree.
2157 *
2158 * A writepage() implementation always needs to do either this,
2159 * or re-dirty the page with "redirty_page_for_writepage()" in
2160 * the case of a failure.
2161 *
2162 * Just unlocking the page will cause the radix tree tag-bits
2163 * to fail to update with the state of the page correctly.
2164 */
fb8c4b14 2165 set_page_writeback(page);
9ad1506b 2166retry_write:
1da177e4 2167 rc = cifs_partialpagewrite(page, 0, PAGE_CACHE_SIZE);
9ad1506b
PS
2168 if (rc == -EAGAIN && wbc->sync_mode == WB_SYNC_ALL)
2169 goto retry_write;
2170 else if (rc == -EAGAIN)
2171 redirty_page_for_writepage(wbc, page);
2172 else if (rc != 0)
2173 SetPageError(page);
2174 else
2175 SetPageUptodate(page);
cb876f45
LT
2176 end_page_writeback(page);
2177 page_cache_release(page);
6d5786a3 2178 free_xid(xid);
1da177e4
LT
2179 return rc;
2180}
2181
9ad1506b
PS
2182static int cifs_writepage(struct page *page, struct writeback_control *wbc)
2183{
2184 int rc = cifs_writepage_locked(page, wbc);
2185 unlock_page(page);
2186 return rc;
2187}
2188
d9414774
NP
2189static int cifs_write_end(struct file *file, struct address_space *mapping,
2190 loff_t pos, unsigned len, unsigned copied,
2191 struct page *page, void *fsdata)
1da177e4 2192{
d9414774
NP
2193 int rc;
2194 struct inode *inode = mapping->host;
d4ffff1f
PS
2195 struct cifsFileInfo *cfile = file->private_data;
2196 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2197 __u32 pid;
2198
2199 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2200 pid = cfile->pid;
2201 else
2202 pid = current->tgid;
1da177e4 2203
f96637be 2204 cifs_dbg(FYI, "write_end for page %p from pos %lld with %d bytes\n",
b6b38f70 2205 page, pos, copied);
d9414774 2206
a98ee8c1
JL
2207 if (PageChecked(page)) {
2208 if (copied == len)
2209 SetPageUptodate(page);
2210 ClearPageChecked(page);
2211 } else if (!PageUptodate(page) && copied == PAGE_CACHE_SIZE)
d9414774 2212 SetPageUptodate(page);
ad7a2926 2213
1da177e4 2214 if (!PageUptodate(page)) {
d9414774
NP
2215 char *page_data;
2216 unsigned offset = pos & (PAGE_CACHE_SIZE - 1);
6d5786a3 2217 unsigned int xid;
d9414774 2218
6d5786a3 2219 xid = get_xid();
1da177e4
LT
2220 /* this is probably better than directly calling
2221 partialpage_write since in this function the file handle is
2222 known which we might as well leverage */
2223 /* BB check if anything else missing out of ppw
2224 such as updating last write time */
2225 page_data = kmap(page);
d4ffff1f 2226 rc = cifs_write(cfile, pid, page_data + offset, copied, &pos);
d9414774 2227 /* if (rc < 0) should we set writebehind rc? */
1da177e4 2228 kunmap(page);
d9414774 2229
6d5786a3 2230 free_xid(xid);
fb8c4b14 2231 } else {
d9414774
NP
2232 rc = copied;
2233 pos += copied;
ca8aa29c 2234 set_page_dirty(page);
1da177e4
LT
2235 }
2236
d9414774
NP
2237 if (rc > 0) {
2238 spin_lock(&inode->i_lock);
2239 if (pos > inode->i_size)
2240 i_size_write(inode, pos);
2241 spin_unlock(&inode->i_lock);
2242 }
2243
2244 unlock_page(page);
2245 page_cache_release(page);
2246
1da177e4
LT
2247 return rc;
2248}
2249
02c24a82
JB
2250int cifs_strict_fsync(struct file *file, loff_t start, loff_t end,
2251 int datasync)
1da177e4 2252{
6d5786a3 2253 unsigned int xid;
1da177e4 2254 int rc = 0;
96daf2b0 2255 struct cifs_tcon *tcon;
1d8c4c00 2256 struct TCP_Server_Info *server;
c21dfb69 2257 struct cifsFileInfo *smbfile = file->private_data;
496ad9aa 2258 struct inode *inode = file_inode(file);
8be7e6ba 2259 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 2260
02c24a82
JB
2261 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2262 if (rc)
2263 return rc;
2264 mutex_lock(&inode->i_mutex);
2265
6d5786a3 2266 xid = get_xid();
1da177e4 2267
f96637be
JP
2268 cifs_dbg(FYI, "Sync file - name: %s datasync: 0x%x\n",
2269 file->f_path.dentry->d_name.name, datasync);
50c2f753 2270
18cceb6a 2271 if (!CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 2272 rc = cifs_zap_mapping(inode);
6feb9891 2273 if (rc) {
f96637be 2274 cifs_dbg(FYI, "rc: %d during invalidate phase\n", rc);
6feb9891
PS
2275 rc = 0; /* don't care about it in fsync */
2276 }
2277 }
eb4b756b 2278
8be7e6ba 2279 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2280 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2281 server = tcon->ses->server;
2282 if (server->ops->flush)
2283 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2284 else
2285 rc = -ENOSYS;
2286 }
8be7e6ba 2287
6d5786a3 2288 free_xid(xid);
02c24a82 2289 mutex_unlock(&inode->i_mutex);
8be7e6ba
PS
2290 return rc;
2291}
2292
02c24a82 2293int cifs_fsync(struct file *file, loff_t start, loff_t end, int datasync)
8be7e6ba 2294{
6d5786a3 2295 unsigned int xid;
8be7e6ba 2296 int rc = 0;
96daf2b0 2297 struct cifs_tcon *tcon;
1d8c4c00 2298 struct TCP_Server_Info *server;
8be7e6ba
PS
2299 struct cifsFileInfo *smbfile = file->private_data;
2300 struct cifs_sb_info *cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
02c24a82
JB
2301 struct inode *inode = file->f_mapping->host;
2302
2303 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2304 if (rc)
2305 return rc;
2306 mutex_lock(&inode->i_mutex);
8be7e6ba 2307
6d5786a3 2308 xid = get_xid();
8be7e6ba 2309
f96637be
JP
2310 cifs_dbg(FYI, "Sync file - name: %s datasync: 0x%x\n",
2311 file->f_path.dentry->d_name.name, datasync);
8be7e6ba
PS
2312
2313 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2314 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2315 server = tcon->ses->server;
2316 if (server->ops->flush)
2317 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2318 else
2319 rc = -ENOSYS;
2320 }
b298f223 2321
6d5786a3 2322 free_xid(xid);
02c24a82 2323 mutex_unlock(&inode->i_mutex);
1da177e4
LT
2324 return rc;
2325}
2326
1da177e4
LT
2327/*
2328 * As file closes, flush all cached write data for this inode checking
2329 * for write behind errors.
2330 */
75e1fcc0 2331int cifs_flush(struct file *file, fl_owner_t id)
1da177e4 2332{
496ad9aa 2333 struct inode *inode = file_inode(file);
1da177e4
LT
2334 int rc = 0;
2335
eb4b756b 2336 if (file->f_mode & FMODE_WRITE)
d3f1322a 2337 rc = filemap_write_and_wait(inode->i_mapping);
50c2f753 2338
f96637be 2339 cifs_dbg(FYI, "Flush inode %p file %p rc %d\n", inode, file, rc);
1da177e4
LT
2340
2341 return rc;
2342}
2343
72432ffc
PS
2344static int
2345cifs_write_allocate_pages(struct page **pages, unsigned long num_pages)
2346{
2347 int rc = 0;
2348 unsigned long i;
2349
2350 for (i = 0; i < num_pages; i++) {
e94f7ba1 2351 pages[i] = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
72432ffc
PS
2352 if (!pages[i]) {
2353 /*
2354 * save number of pages we have already allocated and
2355 * return with ENOMEM error
2356 */
2357 num_pages = i;
2358 rc = -ENOMEM;
e94f7ba1 2359 break;
72432ffc
PS
2360 }
2361 }
2362
e94f7ba1
JL
2363 if (rc) {
2364 for (i = 0; i < num_pages; i++)
2365 put_page(pages[i]);
2366 }
72432ffc
PS
2367 return rc;
2368}
2369
2370static inline
2371size_t get_numpages(const size_t wsize, const size_t len, size_t *cur_len)
2372{
2373 size_t num_pages;
2374 size_t clen;
2375
2376 clen = min_t(const size_t, len, wsize);
a7103b99 2377 num_pages = DIV_ROUND_UP(clen, PAGE_SIZE);
72432ffc
PS
2378
2379 if (cur_len)
2380 *cur_len = clen;
2381
2382 return num_pages;
2383}
2384
da82f7e7 2385static void
4a5c80d7 2386cifs_uncached_writedata_release(struct kref *refcount)
da82f7e7
JL
2387{
2388 int i;
4a5c80d7
SF
2389 struct cifs_writedata *wdata = container_of(refcount,
2390 struct cifs_writedata, refcount);
2391
2392 for (i = 0; i < wdata->nr_pages; i++)
2393 put_page(wdata->pages[i]);
2394 cifs_writedata_release(refcount);
2395}
2396
2397static void
2398cifs_uncached_writev_complete(struct work_struct *work)
2399{
da82f7e7
JL
2400 struct cifs_writedata *wdata = container_of(work,
2401 struct cifs_writedata, work);
2402 struct inode *inode = wdata->cfile->dentry->d_inode;
2403 struct cifsInodeInfo *cifsi = CIFS_I(inode);
2404
2405 spin_lock(&inode->i_lock);
2406 cifs_update_eof(cifsi, wdata->offset, wdata->bytes);
2407 if (cifsi->server_eof > inode->i_size)
2408 i_size_write(inode, cifsi->server_eof);
2409 spin_unlock(&inode->i_lock);
2410
2411 complete(&wdata->done);
2412
4a5c80d7 2413 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
da82f7e7
JL
2414}
2415
66386c08
PS
2416static int
2417wdata_fill_from_iovec(struct cifs_writedata *wdata, struct iov_iter *from,
2418 size_t *len, unsigned long *num_pages)
2419{
2420 size_t save_len, copied, bytes, cur_len = *len;
2421 unsigned long i, nr_pages = *num_pages;
2422
2423 save_len = cur_len;
2424 for (i = 0; i < nr_pages; i++) {
2425 bytes = min_t(const size_t, cur_len, PAGE_SIZE);
2426 copied = copy_page_from_iter(wdata->pages[i], 0, bytes, from);
2427 cur_len -= copied;
2428 /*
2429 * If we didn't copy as much as we expected, then that
2430 * may mean we trod into an unmapped area. Stop copying
2431 * at that point. On the next pass through the big
2432 * loop, we'll likely end up getting a zero-length
2433 * write and bailing out of it.
2434 */
2435 if (copied < bytes)
2436 break;
2437 }
2438 cur_len = save_len - cur_len;
2439 *len = cur_len;
2440
2441 /*
2442 * If we have no data to send, then that probably means that
2443 * the copy above failed altogether. That's most likely because
2444 * the address in the iovec was bogus. Return -EFAULT and let
2445 * the caller free anything we allocated and bail out.
2446 */
2447 if (!cur_len)
2448 return -EFAULT;
2449
2450 /*
2451 * i + 1 now represents the number of pages we actually used in
2452 * the copy phase above.
2453 */
2454 *num_pages = i + 1;
2455 return 0;
2456}
2457
43de94ea
PS
2458static int
2459cifs_write_from_iter(loff_t offset, size_t len, struct iov_iter *from,
2460 struct cifsFileInfo *open_file,
2461 struct cifs_sb_info *cifs_sb, struct list_head *wdata_list)
72432ffc 2462{
43de94ea
PS
2463 int rc = 0;
2464 size_t cur_len;
66386c08 2465 unsigned long nr_pages, num_pages, i;
43de94ea 2466 struct cifs_writedata *wdata;
6ec0b01b
PS
2467 struct iov_iter saved_from;
2468 loff_t saved_offset = offset;
da82f7e7 2469 pid_t pid;
6ec0b01b 2470 struct TCP_Server_Info *server;
72432ffc 2471
d4ffff1f
PS
2472 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2473 pid = open_file->pid;
2474 else
2475 pid = current->tgid;
2476
6ec0b01b
PS
2477 server = tlink_tcon(open_file->tlink)->ses->server;
2478 memcpy(&saved_from, from, sizeof(struct iov_iter));
2479
72432ffc 2480 do {
cb7e9eab
PS
2481 unsigned int wsize, credits;
2482
2483 rc = server->ops->wait_mtu_credits(server, cifs_sb->wsize,
2484 &wsize, &credits);
2485 if (rc)
2486 break;
2487
2488 nr_pages = get_numpages(wsize, len, &cur_len);
da82f7e7
JL
2489 wdata = cifs_writedata_alloc(nr_pages,
2490 cifs_uncached_writev_complete);
2491 if (!wdata) {
2492 rc = -ENOMEM;
cb7e9eab 2493 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2494 break;
2495 }
2496
2497 rc = cifs_write_allocate_pages(wdata->pages, nr_pages);
2498 if (rc) {
2499 kfree(wdata);
cb7e9eab 2500 add_credits_and_wake_if(server, credits, 0);
da82f7e7
JL
2501 break;
2502 }
2503
66386c08
PS
2504 num_pages = nr_pages;
2505 rc = wdata_fill_from_iovec(wdata, from, &cur_len, &num_pages);
2506 if (rc) {
5d81de8e
JL
2507 for (i = 0; i < nr_pages; i++)
2508 put_page(wdata->pages[i]);
2509 kfree(wdata);
cb7e9eab 2510 add_credits_and_wake_if(server, credits, 0);
5d81de8e
JL
2511 break;
2512 }
2513
2514 /*
66386c08
PS
2515 * Bring nr_pages down to the number of pages we actually used,
2516 * and free any pages that we didn't use.
5d81de8e 2517 */
66386c08 2518 for ( ; nr_pages > num_pages; nr_pages--)
5d81de8e
JL
2519 put_page(wdata->pages[nr_pages - 1]);
2520
da82f7e7
JL
2521 wdata->sync_mode = WB_SYNC_ALL;
2522 wdata->nr_pages = nr_pages;
2523 wdata->offset = (__u64)offset;
2524 wdata->cfile = cifsFileInfo_get(open_file);
2525 wdata->pid = pid;
2526 wdata->bytes = cur_len;
eddb079d
JL
2527 wdata->pagesz = PAGE_SIZE;
2528 wdata->tailsz = cur_len - ((nr_pages - 1) * PAGE_SIZE);
cb7e9eab 2529 wdata->credits = credits;
6ec0b01b
PS
2530
2531 if (!wdata->cfile->invalidHandle ||
2532 !cifs_reopen_file(wdata->cfile, false))
2533 rc = server->ops->async_writev(wdata,
2534 cifs_uncached_writedata_release);
da82f7e7 2535 if (rc) {
cb7e9eab 2536 add_credits_and_wake_if(server, wdata->credits, 0);
4a5c80d7
SF
2537 kref_put(&wdata->refcount,
2538 cifs_uncached_writedata_release);
6ec0b01b
PS
2539 if (rc == -EAGAIN) {
2540 memcpy(from, &saved_from,
2541 sizeof(struct iov_iter));
2542 iov_iter_advance(from, offset - saved_offset);
2543 continue;
2544 }
72432ffc
PS
2545 break;
2546 }
2547
43de94ea 2548 list_add_tail(&wdata->list, wdata_list);
da82f7e7
JL
2549 offset += cur_len;
2550 len -= cur_len;
72432ffc
PS
2551 } while (len > 0);
2552
43de94ea
PS
2553 return rc;
2554}
2555
2556static ssize_t
2557cifs_iovec_write(struct file *file, struct iov_iter *from, loff_t *poffset)
2558{
2559 size_t len;
2560 ssize_t total_written = 0;
2561 struct cifsFileInfo *open_file;
2562 struct cifs_tcon *tcon;
2563 struct cifs_sb_info *cifs_sb;
2564 struct cifs_writedata *wdata, *tmp;
2565 struct list_head wdata_list;
6ec0b01b 2566 struct iov_iter saved_from;
43de94ea
PS
2567 int rc;
2568
2569 len = iov_iter_count(from);
2570 rc = generic_write_checks(file, poffset, &len, 0);
2571 if (rc)
2572 return rc;
2573
2574 if (!len)
2575 return 0;
2576
2577 iov_iter_truncate(from, len);
2578
2579 INIT_LIST_HEAD(&wdata_list);
2580 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
2581 open_file = file->private_data;
2582 tcon = tlink_tcon(open_file->tlink);
2583
2584 if (!tcon->ses->server->ops->async_writev)
2585 return -ENOSYS;
2586
6ec0b01b
PS
2587 memcpy(&saved_from, from, sizeof(struct iov_iter));
2588
43de94ea
PS
2589 rc = cifs_write_from_iter(*poffset, len, from, open_file, cifs_sb,
2590 &wdata_list);
2591
da82f7e7
JL
2592 /*
2593 * If at least one write was successfully sent, then discard any rc
2594 * value from the later writes. If the other write succeeds, then
2595 * we'll end up returning whatever was written. If it fails, then
2596 * we'll get a new rc value from that.
2597 */
2598 if (!list_empty(&wdata_list))
2599 rc = 0;
2600
2601 /*
2602 * Wait for and collect replies for any successful sends in order of
2603 * increasing offset. Once an error is hit or we get a fatal signal
2604 * while waiting, then return without waiting for any more replies.
2605 */
2606restart_loop:
2607 list_for_each_entry_safe(wdata, tmp, &wdata_list, list) {
2608 if (!rc) {
2609 /* FIXME: freezable too? */
2610 rc = wait_for_completion_killable(&wdata->done);
2611 if (rc)
2612 rc = -EINTR;
2613 else if (wdata->result)
2614 rc = wdata->result;
2615 else
2616 total_written += wdata->bytes;
2617
2618 /* resend call if it's a retryable error */
2619 if (rc == -EAGAIN) {
6ec0b01b
PS
2620 struct list_head tmp_list;
2621 struct iov_iter tmp_from;
2622
2623 INIT_LIST_HEAD(&tmp_list);
2624 list_del_init(&wdata->list);
2625
2626 memcpy(&tmp_from, &saved_from,
2627 sizeof(struct iov_iter));
2628 iov_iter_advance(&tmp_from,
2629 wdata->offset - *poffset);
2630
2631 rc = cifs_write_from_iter(wdata->offset,
2632 wdata->bytes, &tmp_from,
2633 open_file, cifs_sb, &tmp_list);
2634
2635 list_splice(&tmp_list, &wdata_list);
2636
2637 kref_put(&wdata->refcount,
2638 cifs_uncached_writedata_release);
da82f7e7
JL
2639 goto restart_loop;
2640 }
2641 }
2642 list_del_init(&wdata->list);
4a5c80d7 2643 kref_put(&wdata->refcount, cifs_uncached_writedata_release);
72432ffc
PS
2644 }
2645
da82f7e7
JL
2646 if (total_written > 0)
2647 *poffset += total_written;
72432ffc 2648
da82f7e7
JL
2649 cifs_stats_bytes_written(tcon, total_written);
2650 return total_written ? total_written : (ssize_t)rc;
72432ffc
PS
2651}
2652
3dae8750 2653ssize_t cifs_user_writev(struct kiocb *iocb, struct iov_iter *from)
72432ffc
PS
2654{
2655 ssize_t written;
2656 struct inode *inode;
3dae8750 2657 loff_t pos = iocb->ki_pos;
72432ffc 2658
496ad9aa 2659 inode = file_inode(iocb->ki_filp);
72432ffc
PS
2660
2661 /*
2662 * BB - optimize the way when signing is disabled. We can drop this
2663 * extra memory-to-memory copying and use iovec buffers for constructing
2664 * write request.
2665 */
2666
3dae8750 2667 written = cifs_iovec_write(iocb->ki_filp, from, &pos);
72432ffc 2668 if (written > 0) {
aff8d5ca 2669 set_bit(CIFS_INO_INVALID_MAPPING, &CIFS_I(inode)->flags);
72432ffc
PS
2670 iocb->ki_pos = pos;
2671 }
2672
2673 return written;
2674}
2675
579f9053 2676static ssize_t
3dae8750 2677cifs_writev(struct kiocb *iocb, struct iov_iter *from)
72432ffc 2678{
579f9053
PS
2679 struct file *file = iocb->ki_filp;
2680 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
2681 struct inode *inode = file->f_mapping->host;
2682 struct cifsInodeInfo *cinode = CIFS_I(inode);
2683 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
2684 ssize_t rc = -EACCES;
19dfc1f5 2685 loff_t lock_pos = iocb->ki_pos;
72432ffc 2686
579f9053
PS
2687 /*
2688 * We need to hold the sem to be sure nobody modifies lock list
2689 * with a brlock that prevents writing.
2690 */
2691 down_read(&cinode->lock_sem);
19dfc1f5
AV
2692 mutex_lock(&inode->i_mutex);
2693 if (file->f_flags & O_APPEND)
2694 lock_pos = i_size_read(inode);
3dae8750 2695 if (!cifs_find_lock_conflict(cfile, lock_pos, iov_iter_count(from),
579f9053 2696 server->vals->exclusive_lock_type, NULL,
19dfc1f5 2697 CIFS_WRITE_OP)) {
3dae8750 2698 rc = __generic_file_write_iter(iocb, from);
19dfc1f5
AV
2699 mutex_unlock(&inode->i_mutex);
2700
2701 if (rc > 0) {
2702 ssize_t err;
2703
2704 err = generic_write_sync(file, iocb->ki_pos - rc, rc);
1f80c0cc 2705 if (err < 0)
19dfc1f5
AV
2706 rc = err;
2707 }
2708 } else {
2709 mutex_unlock(&inode->i_mutex);
2710 }
579f9053 2711 up_read(&cinode->lock_sem);
579f9053
PS
2712 return rc;
2713}
2714
2715ssize_t
3dae8750 2716cifs_strict_writev(struct kiocb *iocb, struct iov_iter *from)
579f9053 2717{
496ad9aa 2718 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
2719 struct cifsInodeInfo *cinode = CIFS_I(inode);
2720 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
2721 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
2722 iocb->ki_filp->private_data;
2723 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
88cf75aa 2724 ssize_t written;
ca8aa29c 2725
c11f1df5
SP
2726 written = cifs_get_writer(cinode);
2727 if (written)
2728 return written;
2729
18cceb6a 2730 if (CIFS_CACHE_WRITE(cinode)) {
88cf75aa
PS
2731 if (cap_unix(tcon->ses) &&
2732 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability))
c11f1df5 2733 && ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0)) {
3dae8750 2734 written = generic_file_write_iter(iocb, from);
c11f1df5
SP
2735 goto out;
2736 }
3dae8750 2737 written = cifs_writev(iocb, from);
c11f1df5 2738 goto out;
25078105 2739 }
25078105 2740 /*
ca8aa29c
PS
2741 * For non-oplocked files in strict cache mode we need to write the data
2742 * to the server exactly from the pos to pos+len-1 rather than flush all
2743 * affected pages because it may cause a error with mandatory locks on
2744 * these pages but not on the region from pos to ppos+len-1.
72432ffc 2745 */
3dae8750 2746 written = cifs_user_writev(iocb, from);
18cceb6a 2747 if (written > 0 && CIFS_CACHE_READ(cinode)) {
88cf75aa
PS
2748 /*
2749 * Windows 7 server can delay breaking level2 oplock if a write
2750 * request comes - break it on the client to prevent reading
2751 * an old data.
2752 */
4f73c7d3 2753 cifs_zap_mapping(inode);
f96637be
JP
2754 cifs_dbg(FYI, "Set no oplock for inode=%p after a write operation\n",
2755 inode);
18cceb6a 2756 cinode->oplock = 0;
88cf75aa 2757 }
c11f1df5
SP
2758out:
2759 cifs_put_writer(cinode);
88cf75aa 2760 return written;
72432ffc
PS
2761}
2762
0471ca3f 2763static struct cifs_readdata *
f4e49cd2 2764cifs_readdata_alloc(unsigned int nr_pages, work_func_t complete)
0471ca3f
JL
2765{
2766 struct cifs_readdata *rdata;
f4e49cd2 2767
c5fab6f4
JL
2768 rdata = kzalloc(sizeof(*rdata) + (sizeof(struct page *) * nr_pages),
2769 GFP_KERNEL);
0471ca3f 2770 if (rdata != NULL) {
6993f74a 2771 kref_init(&rdata->refcount);
1c892549
JL
2772 INIT_LIST_HEAD(&rdata->list);
2773 init_completion(&rdata->done);
0471ca3f 2774 INIT_WORK(&rdata->work, complete);
0471ca3f 2775 }
f4e49cd2 2776
0471ca3f
JL
2777 return rdata;
2778}
2779
6993f74a
JL
2780void
2781cifs_readdata_release(struct kref *refcount)
0471ca3f 2782{
6993f74a
JL
2783 struct cifs_readdata *rdata = container_of(refcount,
2784 struct cifs_readdata, refcount);
2785
2786 if (rdata->cfile)
2787 cifsFileInfo_put(rdata->cfile);
2788
0471ca3f
JL
2789 kfree(rdata);
2790}
2791
1c892549 2792static int
c5fab6f4 2793cifs_read_allocate_pages(struct cifs_readdata *rdata, unsigned int nr_pages)
1c892549
JL
2794{
2795 int rc = 0;
c5fab6f4 2796 struct page *page;
1c892549
JL
2797 unsigned int i;
2798
c5fab6f4 2799 for (i = 0; i < nr_pages; i++) {
1c892549
JL
2800 page = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
2801 if (!page) {
2802 rc = -ENOMEM;
2803 break;
2804 }
c5fab6f4 2805 rdata->pages[i] = page;
1c892549
JL
2806 }
2807
2808 if (rc) {
c5fab6f4
JL
2809 for (i = 0; i < nr_pages; i++) {
2810 put_page(rdata->pages[i]);
2811 rdata->pages[i] = NULL;
1c892549
JL
2812 }
2813 }
2814 return rc;
2815}
2816
2817static void
2818cifs_uncached_readdata_release(struct kref *refcount)
2819{
1c892549
JL
2820 struct cifs_readdata *rdata = container_of(refcount,
2821 struct cifs_readdata, refcount);
c5fab6f4 2822 unsigned int i;
1c892549 2823
c5fab6f4
JL
2824 for (i = 0; i < rdata->nr_pages; i++) {
2825 put_page(rdata->pages[i]);
2826 rdata->pages[i] = NULL;
1c892549
JL
2827 }
2828 cifs_readdata_release(refcount);
2829}
2830
1c892549
JL
2831/**
2832 * cifs_readdata_to_iov - copy data from pages in response to an iovec
2833 * @rdata: the readdata response with list of pages holding data
7f25bba8 2834 * @iter: destination for our data
1c892549
JL
2835 *
2836 * This function copies data from a list of pages in a readdata response into
2837 * an array of iovecs. It will first calculate where the data should go
2838 * based on the info in the readdata and then copy the data into that spot.
2839 */
7f25bba8
AV
2840static int
2841cifs_readdata_to_iov(struct cifs_readdata *rdata, struct iov_iter *iter)
1c892549 2842{
34a54d61 2843 size_t remaining = rdata->got_bytes;
c5fab6f4 2844 unsigned int i;
1c892549 2845
c5fab6f4 2846 for (i = 0; i < rdata->nr_pages; i++) {
c5fab6f4 2847 struct page *page = rdata->pages[i];
e686bd8d 2848 size_t copy = min_t(size_t, remaining, PAGE_SIZE);
7f25bba8
AV
2849 size_t written = copy_page_to_iter(page, 0, copy, iter);
2850 remaining -= written;
2851 if (written < copy && iov_iter_count(iter) > 0)
2852 break;
1c892549 2853 }
7f25bba8 2854 return remaining ? -EFAULT : 0;
1c892549
JL
2855}
2856
2857static void
2858cifs_uncached_readv_complete(struct work_struct *work)
2859{
2860 struct cifs_readdata *rdata = container_of(work,
2861 struct cifs_readdata, work);
1c892549
JL
2862
2863 complete(&rdata->done);
2864 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
2865}
2866
2867static int
8321fec4
JL
2868cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
2869 struct cifs_readdata *rdata, unsigned int len)
1c892549 2870{
b3160aeb 2871 int result = 0;
c5fab6f4
JL
2872 unsigned int i;
2873 unsigned int nr_pages = rdata->nr_pages;
8321fec4 2874 struct kvec iov;
1c892549 2875
b3160aeb 2876 rdata->got_bytes = 0;
8321fec4 2877 rdata->tailsz = PAGE_SIZE;
c5fab6f4
JL
2878 for (i = 0; i < nr_pages; i++) {
2879 struct page *page = rdata->pages[i];
2880
8321fec4 2881 if (len >= PAGE_SIZE) {
1c892549 2882 /* enough data to fill the page */
8321fec4
JL
2883 iov.iov_base = kmap(page);
2884 iov.iov_len = PAGE_SIZE;
f96637be
JP
2885 cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
2886 i, iov.iov_base, iov.iov_len);
8321fec4
JL
2887 len -= PAGE_SIZE;
2888 } else if (len > 0) {
1c892549 2889 /* enough for partial page, fill and zero the rest */
8321fec4
JL
2890 iov.iov_base = kmap(page);
2891 iov.iov_len = len;
f96637be
JP
2892 cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
2893 i, iov.iov_base, iov.iov_len);
8321fec4
JL
2894 memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
2895 rdata->tailsz = len;
2896 len = 0;
1c892549
JL
2897 } else {
2898 /* no need to hold page hostage */
c5fab6f4
JL
2899 rdata->pages[i] = NULL;
2900 rdata->nr_pages--;
1c892549 2901 put_page(page);
8321fec4 2902 continue;
1c892549 2903 }
8321fec4
JL
2904
2905 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
2906 kunmap(page);
2907 if (result < 0)
2908 break;
2909
b3160aeb 2910 rdata->got_bytes += result;
1c892549
JL
2911 }
2912
b3160aeb
PS
2913 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
2914 rdata->got_bytes : result;
1c892549
JL
2915}
2916
0ada36b2
PS
2917static int
2918cifs_send_async_read(loff_t offset, size_t len, struct cifsFileInfo *open_file,
2919 struct cifs_sb_info *cifs_sb, struct list_head *rdata_list)
1da177e4 2920{
0ada36b2 2921 struct cifs_readdata *rdata;
bed9da02 2922 unsigned int npages, rsize, credits;
0ada36b2
PS
2923 size_t cur_len;
2924 int rc;
1c892549 2925 pid_t pid;
25f40259
PS
2926 struct TCP_Server_Info *server;
2927
2928 server = tlink_tcon(open_file->tlink)->ses->server;
a70307ee 2929
d4ffff1f
PS
2930 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2931 pid = open_file->pid;
2932 else
2933 pid = current->tgid;
2934
1c892549 2935 do {
bed9da02
PS
2936 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
2937 &rsize, &credits);
2938 if (rc)
2939 break;
2940
2941 cur_len = min_t(const size_t, len, rsize);
1c892549 2942 npages = DIV_ROUND_UP(cur_len, PAGE_SIZE);
a70307ee 2943
1c892549
JL
2944 /* allocate a readdata struct */
2945 rdata = cifs_readdata_alloc(npages,
2946 cifs_uncached_readv_complete);
2947 if (!rdata) {
bed9da02 2948 add_credits_and_wake_if(server, credits, 0);
1c892549 2949 rc = -ENOMEM;
bae9f746 2950 break;
1da177e4 2951 }
a70307ee 2952
c5fab6f4 2953 rc = cifs_read_allocate_pages(rdata, npages);
1c892549
JL
2954 if (rc)
2955 goto error;
2956
2957 rdata->cfile = cifsFileInfo_get(open_file);
c5fab6f4 2958 rdata->nr_pages = npages;
1c892549
JL
2959 rdata->offset = offset;
2960 rdata->bytes = cur_len;
2961 rdata->pid = pid;
8321fec4
JL
2962 rdata->pagesz = PAGE_SIZE;
2963 rdata->read_into_pages = cifs_uncached_read_into_pages;
bed9da02 2964 rdata->credits = credits;
1c892549 2965
25f40259
PS
2966 if (!rdata->cfile->invalidHandle ||
2967 !cifs_reopen_file(rdata->cfile, true))
2968 rc = server->ops->async_readv(rdata);
1c892549
JL
2969error:
2970 if (rc) {
bed9da02 2971 add_credits_and_wake_if(server, rdata->credits, 0);
1c892549
JL
2972 kref_put(&rdata->refcount,
2973 cifs_uncached_readdata_release);
25f40259
PS
2974 if (rc == -EAGAIN)
2975 continue;
1c892549
JL
2976 break;
2977 }
2978
0ada36b2 2979 list_add_tail(&rdata->list, rdata_list);
1c892549
JL
2980 offset += cur_len;
2981 len -= cur_len;
2982 } while (len > 0);
2983
0ada36b2
PS
2984 return rc;
2985}
2986
2987ssize_t cifs_user_readv(struct kiocb *iocb, struct iov_iter *to)
2988{
2989 struct file *file = iocb->ki_filp;
2990 ssize_t rc;
2991 size_t len;
2992 ssize_t total_read = 0;
2993 loff_t offset = iocb->ki_pos;
2994 struct cifs_sb_info *cifs_sb;
2995 struct cifs_tcon *tcon;
2996 struct cifsFileInfo *open_file;
2997 struct cifs_readdata *rdata, *tmp;
2998 struct list_head rdata_list;
2999
3000 len = iov_iter_count(to);
3001 if (!len)
3002 return 0;
3003
3004 INIT_LIST_HEAD(&rdata_list);
3005 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
3006 open_file = file->private_data;
3007 tcon = tlink_tcon(open_file->tlink);
3008
3009 if (!tcon->ses->server->ops->async_readv)
3010 return -ENOSYS;
3011
3012 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
3013 cifs_dbg(FYI, "attempting read on write only file instance\n");
3014
3015 rc = cifs_send_async_read(offset, len, open_file, cifs_sb, &rdata_list);
3016
1c892549
JL
3017 /* if at least one read request send succeeded, then reset rc */
3018 if (!list_empty(&rdata_list))
3019 rc = 0;
3020
e6a7bcb4 3021 len = iov_iter_count(to);
1c892549 3022 /* the loop below should proceed in the order of increasing offsets */
25f40259 3023again:
1c892549
JL
3024 list_for_each_entry_safe(rdata, tmp, &rdata_list, list) {
3025 if (!rc) {
1c892549
JL
3026 /* FIXME: freezable sleep too? */
3027 rc = wait_for_completion_killable(&rdata->done);
3028 if (rc)
3029 rc = -EINTR;
74027f4a 3030 else if (rdata->result) {
1c892549 3031 rc = rdata->result;
74027f4a
AV
3032 /* resend call if it's a retryable error */
3033 if (rc == -EAGAIN) {
25f40259
PS
3034 struct list_head tmp_list;
3035
3036 list_del_init(&rdata->list);
3037 INIT_LIST_HEAD(&tmp_list);
3038
3039 rc = cifs_send_async_read(rdata->offset,
3040 rdata->bytes, rdata->cfile,
3041 cifs_sb, &tmp_list);
3042
3043 list_splice(&tmp_list, &rdata_list);
3044
3045 kref_put(&rdata->refcount,
3046 cifs_uncached_readdata_release);
74027f4a
AV
3047 goto again;
3048 }
3049 } else {
e6a7bcb4 3050 rc = cifs_readdata_to_iov(rdata, to);
1c892549 3051 }
2e8a05d8
PS
3052 /* if there was a short read -- discard anything left */
3053 if (rdata->got_bytes && rdata->got_bytes < rdata->bytes)
3054 rc = -ENODATA;
1da177e4 3055 }
1c892549
JL
3056 list_del_init(&rdata->list);
3057 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
1da177e4 3058 }
a70307ee 3059
e6a7bcb4 3060 total_read = len - iov_iter_count(to);
7f25bba8 3061
1c892549 3062 cifs_stats_bytes_read(tcon, total_read);
1c892549 3063
09a4707e
PS
3064 /* mask nodata case */
3065 if (rc == -ENODATA)
3066 rc = 0;
3067
0165e810 3068 if (total_read) {
e6a7bcb4 3069 iocb->ki_pos += total_read;
0165e810
AV
3070 return total_read;
3071 }
3072 return rc;
a70307ee
PS
3073}
3074
579f9053 3075ssize_t
e6a7bcb4 3076cifs_strict_readv(struct kiocb *iocb, struct iov_iter *to)
a70307ee 3077{
496ad9aa 3078 struct inode *inode = file_inode(iocb->ki_filp);
579f9053
PS
3079 struct cifsInodeInfo *cinode = CIFS_I(inode);
3080 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
3081 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
3082 iocb->ki_filp->private_data;
3083 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
3084 int rc = -EACCES;
a70307ee
PS
3085
3086 /*
3087 * In strict cache mode we need to read from the server all the time
3088 * if we don't have level II oplock because the server can delay mtime
3089 * change - so we can't make a decision about inode invalidating.
3090 * And we can also fail with pagereading if there are mandatory locks
3091 * on pages affected by this read but not on the region from pos to
3092 * pos+len-1.
3093 */
18cceb6a 3094 if (!CIFS_CACHE_READ(cinode))
e6a7bcb4 3095 return cifs_user_readv(iocb, to);
a70307ee 3096
579f9053
PS
3097 if (cap_unix(tcon->ses) &&
3098 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
3099 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
e6a7bcb4 3100 return generic_file_read_iter(iocb, to);
579f9053
PS
3101
3102 /*
3103 * We need to hold the sem to be sure nobody modifies lock list
3104 * with a brlock that prevents reading.
3105 */
3106 down_read(&cinode->lock_sem);
e6a7bcb4 3107 if (!cifs_find_lock_conflict(cfile, iocb->ki_pos, iov_iter_count(to),
579f9053 3108 tcon->ses->server->vals->shared_lock_type,
081c0414 3109 NULL, CIFS_READ_OP))
e6a7bcb4 3110 rc = generic_file_read_iter(iocb, to);
579f9053
PS
3111 up_read(&cinode->lock_sem);
3112 return rc;
a70307ee 3113}
1da177e4 3114
f9c6e234
PS
3115static ssize_t
3116cifs_read(struct file *file, char *read_data, size_t read_size, loff_t *offset)
1da177e4
LT
3117{
3118 int rc = -EACCES;
3119 unsigned int bytes_read = 0;
3120 unsigned int total_read;
3121 unsigned int current_read_size;
5eba8ab3 3122 unsigned int rsize;
1da177e4 3123 struct cifs_sb_info *cifs_sb;
29e20f9c 3124 struct cifs_tcon *tcon;
f9c6e234 3125 struct TCP_Server_Info *server;
6d5786a3 3126 unsigned int xid;
f9c6e234 3127 char *cur_offset;
1da177e4 3128 struct cifsFileInfo *open_file;
d4ffff1f 3129 struct cifs_io_parms io_parms;
ec637e3f 3130 int buf_type = CIFS_NO_BUFFER;
d4ffff1f 3131 __u32 pid;
1da177e4 3132
6d5786a3 3133 xid = get_xid();
e6a00296 3134 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
1da177e4 3135
5eba8ab3
JL
3136 /* FIXME: set up handlers for larger reads and/or convert to async */
3137 rsize = min_t(unsigned int, cifs_sb->rsize, CIFSMaxBufSize);
3138
1da177e4 3139 if (file->private_data == NULL) {
0f3bc09e 3140 rc = -EBADF;
6d5786a3 3141 free_xid(xid);
0f3bc09e 3142 return rc;
1da177e4 3143 }
c21dfb69 3144 open_file = file->private_data;
29e20f9c 3145 tcon = tlink_tcon(open_file->tlink);
f9c6e234
PS
3146 server = tcon->ses->server;
3147
3148 if (!server->ops->sync_read) {
3149 free_xid(xid);
3150 return -ENOSYS;
3151 }
1da177e4 3152
d4ffff1f
PS
3153 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3154 pid = open_file->pid;
3155 else
3156 pid = current->tgid;
3157
1da177e4 3158 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
f96637be 3159 cifs_dbg(FYI, "attempting read on write only file instance\n");
1da177e4 3160
f9c6e234
PS
3161 for (total_read = 0, cur_offset = read_data; read_size > total_read;
3162 total_read += bytes_read, cur_offset += bytes_read) {
e374d90f
PS
3163 do {
3164 current_read_size = min_t(uint, read_size - total_read,
3165 rsize);
3166 /*
3167 * For windows me and 9x we do not want to request more
3168 * than it negotiated since it will refuse the read
3169 * then.
3170 */
3171 if ((tcon->ses) && !(tcon->ses->capabilities &
29e20f9c 3172 tcon->ses->server->vals->cap_large_files)) {
e374d90f
PS
3173 current_read_size = min_t(uint,
3174 current_read_size, CIFSMaxBufSize);
3175 }
cdff08e7 3176 if (open_file->invalidHandle) {
15886177 3177 rc = cifs_reopen_file(open_file, true);
1da177e4
LT
3178 if (rc != 0)
3179 break;
3180 }
d4ffff1f 3181 io_parms.pid = pid;
29e20f9c 3182 io_parms.tcon = tcon;
f9c6e234 3183 io_parms.offset = *offset;
d4ffff1f 3184 io_parms.length = current_read_size;
f9c6e234
PS
3185 rc = server->ops->sync_read(xid, open_file, &io_parms,
3186 &bytes_read, &cur_offset,
3187 &buf_type);
e374d90f
PS
3188 } while (rc == -EAGAIN);
3189
1da177e4
LT
3190 if (rc || (bytes_read == 0)) {
3191 if (total_read) {
3192 break;
3193 } else {
6d5786a3 3194 free_xid(xid);
1da177e4
LT
3195 return rc;
3196 }
3197 } else {
29e20f9c 3198 cifs_stats_bytes_read(tcon, total_read);
f9c6e234 3199 *offset += bytes_read;
1da177e4
LT
3200 }
3201 }
6d5786a3 3202 free_xid(xid);
1da177e4
LT
3203 return total_read;
3204}
3205
ca83ce3d
JL
3206/*
3207 * If the page is mmap'ed into a process' page tables, then we need to make
3208 * sure that it doesn't change while being written back.
3209 */
3210static int
3211cifs_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf)
3212{
3213 struct page *page = vmf->page;
3214
3215 lock_page(page);
3216 return VM_FAULT_LOCKED;
3217}
3218
3219static struct vm_operations_struct cifs_file_vm_ops = {
3220 .fault = filemap_fault,
f1820361 3221 .map_pages = filemap_map_pages,
ca83ce3d 3222 .page_mkwrite = cifs_page_mkwrite,
0b173bc4 3223 .remap_pages = generic_file_remap_pages,
ca83ce3d
JL
3224};
3225
7a6a19b1
PS
3226int cifs_file_strict_mmap(struct file *file, struct vm_area_struct *vma)
3227{
3228 int rc, xid;
496ad9aa 3229 struct inode *inode = file_inode(file);
7a6a19b1 3230
6d5786a3 3231 xid = get_xid();
7a6a19b1 3232
18cceb6a 3233 if (!CIFS_CACHE_READ(CIFS_I(inode))) {
4f73c7d3 3234 rc = cifs_zap_mapping(inode);
6feb9891
PS
3235 if (rc)
3236 return rc;
3237 }
7a6a19b1
PS
3238
3239 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3240 if (rc == 0)
3241 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3242 free_xid(xid);
7a6a19b1
PS
3243 return rc;
3244}
3245
1da177e4
LT
3246int cifs_file_mmap(struct file *file, struct vm_area_struct *vma)
3247{
1da177e4
LT
3248 int rc, xid;
3249
6d5786a3 3250 xid = get_xid();
abab095d 3251 rc = cifs_revalidate_file(file);
1da177e4 3252 if (rc) {
f96637be
JP
3253 cifs_dbg(FYI, "Validation prior to mmap failed, error=%d\n",
3254 rc);
6d5786a3 3255 free_xid(xid);
1da177e4
LT
3256 return rc;
3257 }
3258 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3259 if (rc == 0)
3260 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3261 free_xid(xid);
1da177e4
LT
3262 return rc;
3263}
3264
0471ca3f
JL
3265static void
3266cifs_readv_complete(struct work_struct *work)
3267{
c5fab6f4 3268 unsigned int i;
0471ca3f
JL
3269 struct cifs_readdata *rdata = container_of(work,
3270 struct cifs_readdata, work);
0471ca3f 3271
c5fab6f4
JL
3272 for (i = 0; i < rdata->nr_pages; i++) {
3273 struct page *page = rdata->pages[i];
3274
0471ca3f
JL
3275 lru_cache_add_file(page);
3276
3277 if (rdata->result == 0) {
0471ca3f
JL
3278 flush_dcache_page(page);
3279 SetPageUptodate(page);
3280 }
3281
3282 unlock_page(page);
3283
3284 if (rdata->result == 0)
3285 cifs_readpage_to_fscache(rdata->mapping->host, page);
3286
3287 page_cache_release(page);
c5fab6f4 3288 rdata->pages[i] = NULL;
0471ca3f 3289 }
6993f74a 3290 kref_put(&rdata->refcount, cifs_readdata_release);
0471ca3f
JL
3291}
3292
8d5ce4d2 3293static int
8321fec4
JL
3294cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
3295 struct cifs_readdata *rdata, unsigned int len)
8d5ce4d2 3296{
b3160aeb 3297 int result = 0;
c5fab6f4 3298 unsigned int i;
8d5ce4d2
JL
3299 u64 eof;
3300 pgoff_t eof_index;
c5fab6f4 3301 unsigned int nr_pages = rdata->nr_pages;
8321fec4 3302 struct kvec iov;
8d5ce4d2
JL
3303
3304 /* determine the eof that the server (probably) has */
3305 eof = CIFS_I(rdata->mapping->host)->server_eof;
3306 eof_index = eof ? (eof - 1) >> PAGE_CACHE_SHIFT : 0;
f96637be 3307 cifs_dbg(FYI, "eof=%llu eof_index=%lu\n", eof, eof_index);
8d5ce4d2 3308
b3160aeb 3309 rdata->got_bytes = 0;
8321fec4 3310 rdata->tailsz = PAGE_CACHE_SIZE;
c5fab6f4
JL
3311 for (i = 0; i < nr_pages; i++) {
3312 struct page *page = rdata->pages[i];
3313
8321fec4 3314 if (len >= PAGE_CACHE_SIZE) {
8d5ce4d2 3315 /* enough data to fill the page */
8321fec4
JL
3316 iov.iov_base = kmap(page);
3317 iov.iov_len = PAGE_CACHE_SIZE;
f96637be
JP
3318 cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
3319 i, page->index, iov.iov_base, iov.iov_len);
8321fec4
JL
3320 len -= PAGE_CACHE_SIZE;
3321 } else if (len > 0) {
8d5ce4d2 3322 /* enough for partial page, fill and zero the rest */
8321fec4
JL
3323 iov.iov_base = kmap(page);
3324 iov.iov_len = len;
f96637be
JP
3325 cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
3326 i, page->index, iov.iov_base, iov.iov_len);
8321fec4
JL
3327 memset(iov.iov_base + len,
3328 '\0', PAGE_CACHE_SIZE - len);
3329 rdata->tailsz = len;
3330 len = 0;
8d5ce4d2
JL
3331 } else if (page->index > eof_index) {
3332 /*
3333 * The VFS will not try to do readahead past the
3334 * i_size, but it's possible that we have outstanding
3335 * writes with gaps in the middle and the i_size hasn't
3336 * caught up yet. Populate those with zeroed out pages
3337 * to prevent the VFS from repeatedly attempting to
3338 * fill them until the writes are flushed.
3339 */
3340 zero_user(page, 0, PAGE_CACHE_SIZE);
8d5ce4d2
JL
3341 lru_cache_add_file(page);
3342 flush_dcache_page(page);
3343 SetPageUptodate(page);
3344 unlock_page(page);
3345 page_cache_release(page);
c5fab6f4
JL
3346 rdata->pages[i] = NULL;
3347 rdata->nr_pages--;
8321fec4 3348 continue;
8d5ce4d2
JL
3349 } else {
3350 /* no need to hold page hostage */
8d5ce4d2
JL
3351 lru_cache_add_file(page);
3352 unlock_page(page);
3353 page_cache_release(page);
c5fab6f4
JL
3354 rdata->pages[i] = NULL;
3355 rdata->nr_pages--;
8321fec4 3356 continue;
8d5ce4d2 3357 }
8321fec4
JL
3358
3359 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
3360 kunmap(page);
3361 if (result < 0)
3362 break;
3363
b3160aeb 3364 rdata->got_bytes += result;
8d5ce4d2
JL
3365 }
3366
b3160aeb
PS
3367 return rdata->got_bytes > 0 && result != -ECONNABORTED ?
3368 rdata->got_bytes : result;
8d5ce4d2
JL
3369}
3370
387eb92a
PS
3371static int
3372readpages_get_pages(struct address_space *mapping, struct list_head *page_list,
3373 unsigned int rsize, struct list_head *tmplist,
3374 unsigned int *nr_pages, loff_t *offset, unsigned int *bytes)
3375{
3376 struct page *page, *tpage;
3377 unsigned int expected_index;
3378 int rc;
3379
69cebd75
PS
3380 INIT_LIST_HEAD(tmplist);
3381
387eb92a
PS
3382 page = list_entry(page_list->prev, struct page, lru);
3383
3384 /*
3385 * Lock the page and put it in the cache. Since no one else
3386 * should have access to this page, we're safe to simply set
3387 * PG_locked without checking it first.
3388 */
3389 __set_page_locked(page);
3390 rc = add_to_page_cache_locked(page, mapping,
3391 page->index, GFP_KERNEL);
3392
3393 /* give up if we can't stick it in the cache */
3394 if (rc) {
3395 __clear_page_locked(page);
3396 return rc;
3397 }
3398
3399 /* move first page to the tmplist */
3400 *offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
3401 *bytes = PAGE_CACHE_SIZE;
3402 *nr_pages = 1;
3403 list_move_tail(&page->lru, tmplist);
3404
3405 /* now try and add more pages onto the request */
3406 expected_index = page->index + 1;
3407 list_for_each_entry_safe_reverse(page, tpage, page_list, lru) {
3408 /* discontinuity ? */
3409 if (page->index != expected_index)
3410 break;
3411
3412 /* would this page push the read over the rsize? */
3413 if (*bytes + PAGE_CACHE_SIZE > rsize)
3414 break;
3415
3416 __set_page_locked(page);
3417 if (add_to_page_cache_locked(page, mapping, page->index,
3418 GFP_KERNEL)) {
3419 __clear_page_locked(page);
3420 break;
3421 }
3422 list_move_tail(&page->lru, tmplist);
3423 (*bytes) += PAGE_CACHE_SIZE;
3424 expected_index++;
3425 (*nr_pages)++;
3426 }
3427 return rc;
3428}
3429
1da177e4
LT
3430static int cifs_readpages(struct file *file, struct address_space *mapping,
3431 struct list_head *page_list, unsigned num_pages)
3432{
690c5e31
JL
3433 int rc;
3434 struct list_head tmplist;
3435 struct cifsFileInfo *open_file = file->private_data;
3436 struct cifs_sb_info *cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
69cebd75 3437 struct TCP_Server_Info *server;
690c5e31 3438 pid_t pid;
1da177e4 3439
56698236
SJ
3440 /*
3441 * Reads as many pages as possible from fscache. Returns -ENOBUFS
3442 * immediately if the cookie is negative
54afa990
DH
3443 *
3444 * After this point, every page in the list might have PG_fscache set,
3445 * so we will need to clean that up off of every page we don't use.
56698236
SJ
3446 */
3447 rc = cifs_readpages_from_fscache(mapping->host, mapping, page_list,
3448 &num_pages);
3449 if (rc == 0)
690c5e31 3450 return rc;
56698236 3451
d4ffff1f
PS
3452 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3453 pid = open_file->pid;
3454 else
3455 pid = current->tgid;
3456
690c5e31 3457 rc = 0;
69cebd75 3458 server = tlink_tcon(open_file->tlink)->ses->server;
1da177e4 3459
f96637be
JP
3460 cifs_dbg(FYI, "%s: file=%p mapping=%p num_pages=%u\n",
3461 __func__, file, mapping, num_pages);
690c5e31
JL
3462
3463 /*
3464 * Start with the page at end of list and move it to private
3465 * list. Do the same with any following pages until we hit
3466 * the rsize limit, hit an index discontinuity, or run out of
3467 * pages. Issue the async read and then start the loop again
3468 * until the list is empty.
3469 *
3470 * Note that list order is important. The page_list is in
3471 * the order of declining indexes. When we put the pages in
3472 * the rdata->pages, then we want them in increasing order.
3473 */
3474 while (!list_empty(page_list)) {
bed9da02 3475 unsigned int i, nr_pages, bytes, rsize;
690c5e31
JL
3476 loff_t offset;
3477 struct page *page, *tpage;
3478 struct cifs_readdata *rdata;
bed9da02
PS
3479 unsigned credits;
3480
3481 rc = server->ops->wait_mtu_credits(server, cifs_sb->rsize,
3482 &rsize, &credits);
3483 if (rc)
3484 break;
1da177e4 3485
69cebd75
PS
3486 /*
3487 * Give up immediately if rsize is too small to read an entire
3488 * page. The VFS will fall back to readpage. We should never
3489 * reach this point however since we set ra_pages to 0 when the
3490 * rsize is smaller than a cache page.
3491 */
bed9da02
PS
3492 if (unlikely(rsize < PAGE_CACHE_SIZE)) {
3493 add_credits_and_wake_if(server, credits, 0);
69cebd75 3494 return 0;
bed9da02 3495 }
69cebd75 3496
bed9da02
PS
3497 rc = readpages_get_pages(mapping, page_list, rsize, &tmplist,
3498 &nr_pages, &offset, &bytes);
3499 if (rc) {
3500 add_credits_and_wake_if(server, credits, 0);
690c5e31 3501 break;
bed9da02 3502 }
690c5e31 3503
0471ca3f 3504 rdata = cifs_readdata_alloc(nr_pages, cifs_readv_complete);
690c5e31
JL
3505 if (!rdata) {
3506 /* best to give up if we're out of mem */
3507 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3508 list_del(&page->lru);
3509 lru_cache_add_file(page);
3510 unlock_page(page);
3511 page_cache_release(page);
3512 }
3513 rc = -ENOMEM;
bed9da02 3514 add_credits_and_wake_if(server, credits, 0);
690c5e31
JL
3515 break;
3516 }
3517
6993f74a 3518 rdata->cfile = cifsFileInfo_get(open_file);
690c5e31
JL
3519 rdata->mapping = mapping;
3520 rdata->offset = offset;
3521 rdata->bytes = bytes;
3522 rdata->pid = pid;
8321fec4
JL
3523 rdata->pagesz = PAGE_CACHE_SIZE;
3524 rdata->read_into_pages = cifs_readpages_read_into_pages;
bed9da02 3525 rdata->credits = credits;
c5fab6f4
JL
3526
3527 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3528 list_del(&page->lru);
3529 rdata->pages[rdata->nr_pages++] = page;
3530 }
690c5e31 3531
69cebd75
PS
3532 if (!rdata->cfile->invalidHandle ||
3533 !cifs_reopen_file(rdata->cfile, true))
3534 rc = server->ops->async_readv(rdata);
3535 if (rc) {
bed9da02 3536 add_credits_and_wake_if(server, rdata->credits, 0);
c5fab6f4
JL
3537 for (i = 0; i < rdata->nr_pages; i++) {
3538 page = rdata->pages[i];
690c5e31
JL
3539 lru_cache_add_file(page);
3540 unlock_page(page);
3541 page_cache_release(page);
69cebd75
PS
3542 if (rc == -EAGAIN)
3543 list_add_tail(&page->lru, &tmplist);
1da177e4 3544 }
6993f74a 3545 kref_put(&rdata->refcount, cifs_readdata_release);
69cebd75
PS
3546 if (rc == -EAGAIN) {
3547 /* Re-add pages to the page_list and retry */
3548 list_splice(&tmplist, page_list);
3549 continue;
3550 }
1da177e4
LT
3551 break;
3552 }
6993f74a
JL
3553
3554 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3555 }
3556
54afa990
DH
3557 /* Any pages that have been shown to fscache but didn't get added to
3558 * the pagecache must be uncached before they get returned to the
3559 * allocator.
3560 */
3561 cifs_fscache_readpages_cancel(mapping->host, page_list);
1da177e4
LT
3562 return rc;
3563}
3564
a9e9b7bc
SP
3565/*
3566 * cifs_readpage_worker must be called with the page pinned
3567 */
1da177e4
LT
3568static int cifs_readpage_worker(struct file *file, struct page *page,
3569 loff_t *poffset)
3570{
3571 char *read_data;
3572 int rc;
3573
56698236 3574 /* Is the page cached? */
496ad9aa 3575 rc = cifs_readpage_from_fscache(file_inode(file), page);
56698236
SJ
3576 if (rc == 0)
3577 goto read_complete;
3578
1da177e4
LT
3579 read_data = kmap(page);
3580 /* for reads over a certain size could initiate async read ahead */
fb8c4b14 3581
1da177e4 3582 rc = cifs_read(file, read_data, PAGE_CACHE_SIZE, poffset);
fb8c4b14 3583
1da177e4
LT
3584 if (rc < 0)
3585 goto io_error;
3586 else
f96637be 3587 cifs_dbg(FYI, "Bytes read %d\n", rc);
fb8c4b14 3588
496ad9aa
AV
3589 file_inode(file)->i_atime =
3590 current_fs_time(file_inode(file)->i_sb);
fb8c4b14 3591
1da177e4
LT
3592 if (PAGE_CACHE_SIZE > rc)
3593 memset(read_data + rc, 0, PAGE_CACHE_SIZE - rc);
3594
3595 flush_dcache_page(page);
3596 SetPageUptodate(page);
9dc06558
SJ
3597
3598 /* send this page to the cache */
496ad9aa 3599 cifs_readpage_to_fscache(file_inode(file), page);
9dc06558 3600
1da177e4 3601 rc = 0;
fb8c4b14 3602
1da177e4 3603io_error:
fb8c4b14 3604 kunmap(page);
466bd31b 3605 unlock_page(page);
56698236
SJ
3606
3607read_complete:
1da177e4
LT
3608 return rc;
3609}
3610
3611static int cifs_readpage(struct file *file, struct page *page)
3612{
3613 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
3614 int rc = -EACCES;
6d5786a3 3615 unsigned int xid;
1da177e4 3616
6d5786a3 3617 xid = get_xid();
1da177e4
LT
3618
3619 if (file->private_data == NULL) {
0f3bc09e 3620 rc = -EBADF;
6d5786a3 3621 free_xid(xid);
0f3bc09e 3622 return rc;
1da177e4
LT
3623 }
3624
f96637be 3625 cifs_dbg(FYI, "readpage %p at offset %d 0x%x\n",
b6b38f70 3626 page, (int)offset, (int)offset);
1da177e4
LT
3627
3628 rc = cifs_readpage_worker(file, page, &offset);
3629
6d5786a3 3630 free_xid(xid);
1da177e4
LT
3631 return rc;
3632}
3633
a403a0a3
SF
3634static int is_inode_writable(struct cifsInodeInfo *cifs_inode)
3635{
3636 struct cifsFileInfo *open_file;
3637
4477288a 3638 spin_lock(&cifs_file_list_lock);
a403a0a3 3639 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
2e396b83 3640 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
4477288a 3641 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3642 return 1;
3643 }
3644 }
4477288a 3645 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3646 return 0;
3647}
3648
1da177e4
LT
3649/* We do not want to update the file size from server for inodes
3650 open for write - to avoid races with writepage extending
3651 the file - in the future we could consider allowing
fb8c4b14 3652 refreshing the inode only on increases in the file size
1da177e4
LT
3653 but this is tricky to do without racing with writebehind
3654 page caching in the current Linux kernel design */
4b18f2a9 3655bool is_size_safe_to_change(struct cifsInodeInfo *cifsInode, __u64 end_of_file)
1da177e4 3656{
a403a0a3 3657 if (!cifsInode)
4b18f2a9 3658 return true;
50c2f753 3659
a403a0a3
SF
3660 if (is_inode_writable(cifsInode)) {
3661 /* This inode is open for write at least once */
c32a0b68
SF
3662 struct cifs_sb_info *cifs_sb;
3663
c32a0b68 3664 cifs_sb = CIFS_SB(cifsInode->vfs_inode.i_sb);
ad7a2926 3665 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
fb8c4b14 3666 /* since no page cache to corrupt on directio
c32a0b68 3667 we can change size safely */
4b18f2a9 3668 return true;
c32a0b68
SF
3669 }
3670
fb8c4b14 3671 if (i_size_read(&cifsInode->vfs_inode) < end_of_file)
4b18f2a9 3672 return true;
7ba52631 3673
4b18f2a9 3674 return false;
23e7dd7d 3675 } else
4b18f2a9 3676 return true;
1da177e4
LT
3677}
3678
d9414774
NP
3679static int cifs_write_begin(struct file *file, struct address_space *mapping,
3680 loff_t pos, unsigned len, unsigned flags,
3681 struct page **pagep, void **fsdata)
1da177e4 3682{
466bd31b 3683 int oncethru = 0;
d9414774
NP
3684 pgoff_t index = pos >> PAGE_CACHE_SHIFT;
3685 loff_t offset = pos & (PAGE_CACHE_SIZE - 1);
a98ee8c1
JL
3686 loff_t page_start = pos & PAGE_MASK;
3687 loff_t i_size;
3688 struct page *page;
3689 int rc = 0;
d9414774 3690
f96637be 3691 cifs_dbg(FYI, "write_begin from %lld len %d\n", (long long)pos, len);
d9414774 3692
466bd31b 3693start:
54566b2c 3694 page = grab_cache_page_write_begin(mapping, index, flags);
a98ee8c1
JL
3695 if (!page) {
3696 rc = -ENOMEM;
3697 goto out;
3698 }
8a236264 3699
a98ee8c1
JL
3700 if (PageUptodate(page))
3701 goto out;
8a236264 3702
a98ee8c1
JL
3703 /*
3704 * If we write a full page it will be up to date, no need to read from
3705 * the server. If the write is short, we'll end up doing a sync write
3706 * instead.
3707 */
3708 if (len == PAGE_CACHE_SIZE)
3709 goto out;
8a236264 3710
a98ee8c1
JL
3711 /*
3712 * optimize away the read when we have an oplock, and we're not
3713 * expecting to use any of the data we'd be reading in. That
3714 * is, when the page lies beyond the EOF, or straddles the EOF
3715 * and the write will cover all of the existing data.
3716 */
18cceb6a 3717 if (CIFS_CACHE_READ(CIFS_I(mapping->host))) {
a98ee8c1
JL
3718 i_size = i_size_read(mapping->host);
3719 if (page_start >= i_size ||
3720 (offset == 0 && (pos + len) >= i_size)) {
3721 zero_user_segments(page, 0, offset,
3722 offset + len,
3723 PAGE_CACHE_SIZE);
3724 /*
3725 * PageChecked means that the parts of the page
3726 * to which we're not writing are considered up
3727 * to date. Once the data is copied to the
3728 * page, it can be set uptodate.
3729 */
3730 SetPageChecked(page);
3731 goto out;
3732 }
3733 }
d9414774 3734
466bd31b 3735 if ((file->f_flags & O_ACCMODE) != O_WRONLY && !oncethru) {
a98ee8c1
JL
3736 /*
3737 * might as well read a page, it is fast enough. If we get
3738 * an error, we don't need to return it. cifs_write_end will
3739 * do a sync write instead since PG_uptodate isn't set.
3740 */
3741 cifs_readpage_worker(file, page, &page_start);
466bd31b
SP
3742 page_cache_release(page);
3743 oncethru = 1;
3744 goto start;
8a236264
SF
3745 } else {
3746 /* we could try using another file handle if there is one -
3747 but how would we lock it to prevent close of that handle
3748 racing with this read? In any case
d9414774 3749 this will be written out by write_end so is fine */
1da177e4 3750 }
a98ee8c1
JL
3751out:
3752 *pagep = page;
3753 return rc;
1da177e4
LT
3754}
3755
85f2d6b4
SJ
3756static int cifs_release_page(struct page *page, gfp_t gfp)
3757{
3758 if (PagePrivate(page))
3759 return 0;
3760
3761 return cifs_fscache_release_page(page, gfp);
3762}
3763
d47992f8
LC
3764static void cifs_invalidate_page(struct page *page, unsigned int offset,
3765 unsigned int length)
85f2d6b4
SJ
3766{
3767 struct cifsInodeInfo *cifsi = CIFS_I(page->mapping->host);
3768
d47992f8 3769 if (offset == 0 && length == PAGE_CACHE_SIZE)
85f2d6b4
SJ
3770 cifs_fscache_invalidate_page(page, &cifsi->vfs_inode);
3771}
3772
9ad1506b
PS
3773static int cifs_launder_page(struct page *page)
3774{
3775 int rc = 0;
3776 loff_t range_start = page_offset(page);
3777 loff_t range_end = range_start + (loff_t)(PAGE_CACHE_SIZE - 1);
3778 struct writeback_control wbc = {
3779 .sync_mode = WB_SYNC_ALL,
3780 .nr_to_write = 0,
3781 .range_start = range_start,
3782 .range_end = range_end,
3783 };
3784
f96637be 3785 cifs_dbg(FYI, "Launder page: %p\n", page);
9ad1506b
PS
3786
3787 if (clear_page_dirty_for_io(page))
3788 rc = cifs_writepage_locked(page, &wbc);
3789
3790 cifs_fscache_invalidate_page(page, page->mapping->host);
3791 return rc;
3792}
3793
c11f1df5
SP
3794static int
3795cifs_pending_writers_wait(void *unused)
3796{
3797 schedule();
3798 return 0;
3799}
3800
9b646972 3801void cifs_oplock_break(struct work_struct *work)
3bc303c2
JL
3802{
3803 struct cifsFileInfo *cfile = container_of(work, struct cifsFileInfo,
3804 oplock_break);
a5e18bc3 3805 struct inode *inode = cfile->dentry->d_inode;
3bc303c2 3806 struct cifsInodeInfo *cinode = CIFS_I(inode);
95a3f2f3 3807 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
c11f1df5 3808 struct TCP_Server_Info *server = tcon->ses->server;
eb4b756b 3809 int rc = 0;
3bc303c2 3810
c11f1df5
SP
3811 wait_on_bit(&cinode->flags, CIFS_INODE_PENDING_WRITERS,
3812 cifs_pending_writers_wait, TASK_UNINTERRUPTIBLE);
3813
3814 server->ops->downgrade_oplock(server, cinode,
3815 test_bit(CIFS_INODE_DOWNGRADE_OPLOCK_TO_L2, &cinode->flags));
3816
18cceb6a 3817 if (!CIFS_CACHE_WRITE(cinode) && CIFS_CACHE_READ(cinode) &&
63b7d3a4 3818 cifs_has_mand_locks(cinode)) {
f96637be
JP
3819 cifs_dbg(FYI, "Reset oplock to None for inode=%p due to mand locks\n",
3820 inode);
18cceb6a 3821 cinode->oplock = 0;
63b7d3a4
PS
3822 }
3823
3bc303c2 3824 if (inode && S_ISREG(inode->i_mode)) {
18cceb6a 3825 if (CIFS_CACHE_READ(cinode))
8737c930 3826 break_lease(inode, O_RDONLY);
d54ff732 3827 else
8737c930 3828 break_lease(inode, O_WRONLY);
3bc303c2 3829 rc = filemap_fdatawrite(inode->i_mapping);
18cceb6a 3830 if (!CIFS_CACHE_READ(cinode)) {
eb4b756b
JL
3831 rc = filemap_fdatawait(inode->i_mapping);
3832 mapping_set_error(inode->i_mapping, rc);
4f73c7d3 3833 cifs_zap_mapping(inode);
3bc303c2 3834 }
f96637be 3835 cifs_dbg(FYI, "Oplock flush inode %p rc %d\n", inode, rc);
3bc303c2
JL
3836 }
3837
85160e03
PS
3838 rc = cifs_push_locks(cfile);
3839 if (rc)
f96637be 3840 cifs_dbg(VFS, "Push locks rc = %d\n", rc);
85160e03 3841
3bc303c2
JL
3842 /*
3843 * releasing stale oplock after recent reconnect of smb session using
3844 * a now incorrect file handle is not a data integrity issue but do
3845 * not bother sending an oplock release if session to server still is
3846 * disconnected since oplock already released by the server
3847 */
cdff08e7 3848 if (!cfile->oplock_break_cancelled) {
95a3f2f3
PS
3849 rc = tcon->ses->server->ops->oplock_response(tcon, &cfile->fid,
3850 cinode);
f96637be 3851 cifs_dbg(FYI, "Oplock release rc = %d\n", rc);
3bc303c2 3852 }
c11f1df5 3853 cifs_done_oplock_break(cinode);
3bc303c2
JL
3854}
3855
dca69288
SF
3856/*
3857 * The presence of cifs_direct_io() in the address space ops vector
3858 * allowes open() O_DIRECT flags which would have failed otherwise.
3859 *
3860 * In the non-cached mode (mount with cache=none), we shunt off direct read and write requests
3861 * so this method should never be called.
3862 *
3863 * Direct IO is not yet supported in the cached mode.
3864 */
3865static ssize_t
d8d3d94b
AV
3866cifs_direct_io(int rw, struct kiocb *iocb, struct iov_iter *iter,
3867 loff_t pos)
dca69288
SF
3868{
3869 /*
3870 * FIXME
3871 * Eventually need to support direct IO for non forcedirectio mounts
3872 */
3873 return -EINVAL;
3874}
3875
3876
f5e54d6e 3877const struct address_space_operations cifs_addr_ops = {
1da177e4
LT
3878 .readpage = cifs_readpage,
3879 .readpages = cifs_readpages,
3880 .writepage = cifs_writepage,
37c0eb46 3881 .writepages = cifs_writepages,
d9414774
NP
3882 .write_begin = cifs_write_begin,
3883 .write_end = cifs_write_end,
1da177e4 3884 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4 3885 .releasepage = cifs_release_page,
dca69288 3886 .direct_IO = cifs_direct_io,
85f2d6b4 3887 .invalidatepage = cifs_invalidate_page,
9ad1506b 3888 .launder_page = cifs_launder_page,
1da177e4 3889};
273d81d6
DK
3890
3891/*
3892 * cifs_readpages requires the server to support a buffer large enough to
3893 * contain the header plus one complete page of data. Otherwise, we need
3894 * to leave cifs_readpages out of the address space operations.
3895 */
f5e54d6e 3896const struct address_space_operations cifs_addr_ops_smallbuf = {
273d81d6
DK
3897 .readpage = cifs_readpage,
3898 .writepage = cifs_writepage,
3899 .writepages = cifs_writepages,
d9414774
NP
3900 .write_begin = cifs_write_begin,
3901 .write_end = cifs_write_end,
273d81d6 3902 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4
SJ
3903 .releasepage = cifs_release_page,
3904 .invalidatepage = cifs_invalidate_page,
9ad1506b 3905 .launder_page = cifs_launder_page,
273d81d6 3906};