cifs: rename cifs_readdir_lookup to cifs_prime_dcache and make it void return
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / file.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/file.c
3 *
4 * vfs operations that deal with files
fb8c4b14 5 *
f19159dc 6 * Copyright (C) International Business Machines Corp., 2002,2010
1da177e4 7 * Author(s): Steve French (sfrench@us.ibm.com)
7ee1af76 8 * Jeremy Allison (jra@samba.org)
1da177e4
LT
9 *
10 * This library is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU Lesser General Public License as published
12 * by the Free Software Foundation; either version 2.1 of the License, or
13 * (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
18 * the GNU Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public License
21 * along with this library; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 */
24#include <linux/fs.h>
37c0eb46 25#include <linux/backing-dev.h>
1da177e4
LT
26#include <linux/stat.h>
27#include <linux/fcntl.h>
28#include <linux/pagemap.h>
29#include <linux/pagevec.h>
37c0eb46 30#include <linux/writeback.h>
6f88cc2e 31#include <linux/task_io_accounting_ops.h>
23e7dd7d 32#include <linux/delay.h>
3bc303c2 33#include <linux/mount.h>
5a0e3ad6 34#include <linux/slab.h>
690c5e31 35#include <linux/swap.h>
1da177e4
LT
36#include <asm/div64.h>
37#include "cifsfs.h"
38#include "cifspdu.h"
39#include "cifsglob.h"
40#include "cifsproto.h"
41#include "cifs_unicode.h"
42#include "cifs_debug.h"
43#include "cifs_fs_sb.h"
9451a9a5 44#include "fscache.h"
1da177e4 45
1da177e4
LT
46static inline int cifs_convert_flags(unsigned int flags)
47{
48 if ((flags & O_ACCMODE) == O_RDONLY)
49 return GENERIC_READ;
50 else if ((flags & O_ACCMODE) == O_WRONLY)
51 return GENERIC_WRITE;
52 else if ((flags & O_ACCMODE) == O_RDWR) {
53 /* GENERIC_ALL is too much permission to request
54 can cause unnecessary access denied on create */
55 /* return GENERIC_ALL; */
56 return (GENERIC_READ | GENERIC_WRITE);
57 }
58
e10f7b55
JL
59 return (READ_CONTROL | FILE_WRITE_ATTRIBUTES | FILE_READ_ATTRIBUTES |
60 FILE_WRITE_EA | FILE_APPEND_DATA | FILE_WRITE_DATA |
61 FILE_READ_DATA);
7fc8f4e9 62}
e10f7b55 63
608712fe 64static u32 cifs_posix_convert_flags(unsigned int flags)
7fc8f4e9 65{
608712fe 66 u32 posix_flags = 0;
e10f7b55 67
7fc8f4e9 68 if ((flags & O_ACCMODE) == O_RDONLY)
608712fe 69 posix_flags = SMB_O_RDONLY;
7fc8f4e9 70 else if ((flags & O_ACCMODE) == O_WRONLY)
608712fe
JL
71 posix_flags = SMB_O_WRONLY;
72 else if ((flags & O_ACCMODE) == O_RDWR)
73 posix_flags = SMB_O_RDWR;
74
75 if (flags & O_CREAT)
76 posix_flags |= SMB_O_CREAT;
77 if (flags & O_EXCL)
78 posix_flags |= SMB_O_EXCL;
79 if (flags & O_TRUNC)
80 posix_flags |= SMB_O_TRUNC;
81 /* be safe and imply O_SYNC for O_DSYNC */
6b2f3d1f 82 if (flags & O_DSYNC)
608712fe 83 posix_flags |= SMB_O_SYNC;
7fc8f4e9 84 if (flags & O_DIRECTORY)
608712fe 85 posix_flags |= SMB_O_DIRECTORY;
7fc8f4e9 86 if (flags & O_NOFOLLOW)
608712fe 87 posix_flags |= SMB_O_NOFOLLOW;
7fc8f4e9 88 if (flags & O_DIRECT)
608712fe 89 posix_flags |= SMB_O_DIRECT;
7fc8f4e9
SF
90
91 return posix_flags;
1da177e4
LT
92}
93
94static inline int cifs_get_disposition(unsigned int flags)
95{
96 if ((flags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
97 return FILE_CREATE;
98 else if ((flags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
99 return FILE_OVERWRITE_IF;
100 else if ((flags & O_CREAT) == O_CREAT)
101 return FILE_OPEN_IF;
55aa2e09
SF
102 else if ((flags & O_TRUNC) == O_TRUNC)
103 return FILE_OVERWRITE;
1da177e4
LT
104 else
105 return FILE_OPEN;
106}
107
608712fe
JL
108int cifs_posix_open(char *full_path, struct inode **pinode,
109 struct super_block *sb, int mode, unsigned int f_flags,
6d5786a3 110 __u32 *poplock, __u16 *pnetfid, unsigned int xid)
608712fe
JL
111{
112 int rc;
113 FILE_UNIX_BASIC_INFO *presp_data;
114 __u32 posix_flags = 0;
115 struct cifs_sb_info *cifs_sb = CIFS_SB(sb);
116 struct cifs_fattr fattr;
117 struct tcon_link *tlink;
96daf2b0 118 struct cifs_tcon *tcon;
608712fe
JL
119
120 cFYI(1, "posix open %s", full_path);
121
122 presp_data = kzalloc(sizeof(FILE_UNIX_BASIC_INFO), GFP_KERNEL);
123 if (presp_data == NULL)
124 return -ENOMEM;
125
126 tlink = cifs_sb_tlink(cifs_sb);
127 if (IS_ERR(tlink)) {
128 rc = PTR_ERR(tlink);
129 goto posix_open_ret;
130 }
131
132 tcon = tlink_tcon(tlink);
133 mode &= ~current_umask();
134
135 posix_flags = cifs_posix_convert_flags(f_flags);
136 rc = CIFSPOSIXCreate(xid, tcon, posix_flags, mode, pnetfid, presp_data,
137 poplock, full_path, cifs_sb->local_nls,
138 cifs_sb->mnt_cifs_flags &
139 CIFS_MOUNT_MAP_SPECIAL_CHR);
140 cifs_put_tlink(tlink);
141
142 if (rc)
143 goto posix_open_ret;
144
145 if (presp_data->Type == cpu_to_le32(-1))
146 goto posix_open_ret; /* open ok, caller does qpathinfo */
147
148 if (!pinode)
149 goto posix_open_ret; /* caller does not need info */
150
151 cifs_unix_basic_to_fattr(&fattr, presp_data, cifs_sb);
152
153 /* get new inode and set it up */
154 if (*pinode == NULL) {
155 cifs_fill_uniqueid(sb, &fattr);
156 *pinode = cifs_iget(sb, &fattr);
157 if (!*pinode) {
158 rc = -ENOMEM;
159 goto posix_open_ret;
160 }
161 } else {
162 cifs_fattr_to_inode(*pinode, &fattr);
163 }
164
165posix_open_ret:
166 kfree(presp_data);
167 return rc;
168}
169
eeb910a6
PS
170static int
171cifs_nt_open(char *full_path, struct inode *inode, struct cifs_sb_info *cifs_sb,
fb1214e4
PS
172 struct cifs_tcon *tcon, unsigned int f_flags, __u32 *oplock,
173 struct cifs_fid *fid, unsigned int xid)
eeb910a6
PS
174{
175 int rc;
fb1214e4 176 int desired_access;
eeb910a6 177 int disposition;
3d3ea8e6 178 int create_options = CREATE_NOT_DIR;
eeb910a6 179 FILE_ALL_INFO *buf;
b8c32dbb 180 struct TCP_Server_Info *server = tcon->ses->server;
eeb910a6 181
b8c32dbb 182 if (!server->ops->open)
fb1214e4
PS
183 return -ENOSYS;
184
185 desired_access = cifs_convert_flags(f_flags);
eeb910a6
PS
186
187/*********************************************************************
188 * open flag mapping table:
189 *
190 * POSIX Flag CIFS Disposition
191 * ---------- ----------------
192 * O_CREAT FILE_OPEN_IF
193 * O_CREAT | O_EXCL FILE_CREATE
194 * O_CREAT | O_TRUNC FILE_OVERWRITE_IF
195 * O_TRUNC FILE_OVERWRITE
196 * none of the above FILE_OPEN
197 *
198 * Note that there is not a direct match between disposition
199 * FILE_SUPERSEDE (ie create whether or not file exists although
200 * O_CREAT | O_TRUNC is similar but truncates the existing
201 * file rather than creating a new file as FILE_SUPERSEDE does
202 * (which uses the attributes / metadata passed in on open call)
203 *?
204 *? O_SYNC is a reasonable match to CIFS writethrough flag
205 *? and the read write flags match reasonably. O_LARGEFILE
206 *? is irrelevant because largefile support is always used
207 *? by this client. Flags O_APPEND, O_DIRECT, O_DIRECTORY,
208 * O_FASYNC, O_NOFOLLOW, O_NONBLOCK need further investigation
209 *********************************************************************/
210
211 disposition = cifs_get_disposition(f_flags);
212
213 /* BB pass O_SYNC flag through on file attributes .. BB */
214
215 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
216 if (!buf)
217 return -ENOMEM;
218
3d3ea8e6
SP
219 if (backup_cred(cifs_sb))
220 create_options |= CREATE_OPEN_BACKUP_INTENT;
221
b8c32dbb
PS
222 rc = server->ops->open(xid, tcon, full_path, disposition,
223 desired_access, create_options, fid, oplock, buf,
224 cifs_sb);
eeb910a6
PS
225
226 if (rc)
227 goto out;
228
229 if (tcon->unix_ext)
230 rc = cifs_get_inode_info_unix(&inode, full_path, inode->i_sb,
231 xid);
232 else
233 rc = cifs_get_inode_info(&inode, full_path, buf, inode->i_sb,
fb1214e4 234 xid, &fid->netfid);
eeb910a6
PS
235
236out:
237 kfree(buf);
238 return rc;
239}
240
15ecb436 241struct cifsFileInfo *
fb1214e4 242cifs_new_fileinfo(struct cifs_fid *fid, struct file *file,
15ecb436
JL
243 struct tcon_link *tlink, __u32 oplock)
244{
245 struct dentry *dentry = file->f_path.dentry;
246 struct inode *inode = dentry->d_inode;
4b4de76e
PS
247 struct cifsInodeInfo *cinode = CIFS_I(inode);
248 struct cifsFileInfo *cfile;
f45d3416 249 struct cifs_fid_locks *fdlocks;
233839b1 250 struct cifs_tcon *tcon = tlink_tcon(tlink);
4b4de76e
PS
251
252 cfile = kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
253 if (cfile == NULL)
254 return cfile;
255
f45d3416
PS
256 fdlocks = kzalloc(sizeof(struct cifs_fid_locks), GFP_KERNEL);
257 if (!fdlocks) {
258 kfree(cfile);
259 return NULL;
260 }
261
262 INIT_LIST_HEAD(&fdlocks->locks);
263 fdlocks->cfile = cfile;
264 cfile->llist = fdlocks;
1b4b55a1 265 down_write(&cinode->lock_sem);
f45d3416 266 list_add(&fdlocks->llist, &cinode->llist);
1b4b55a1 267 up_write(&cinode->lock_sem);
f45d3416 268
4b4de76e 269 cfile->count = 1;
4b4de76e
PS
270 cfile->pid = current->tgid;
271 cfile->uid = current_fsuid();
272 cfile->dentry = dget(dentry);
273 cfile->f_flags = file->f_flags;
274 cfile->invalidHandle = false;
275 cfile->tlink = cifs_get_tlink(tlink);
4b4de76e 276 INIT_WORK(&cfile->oplock_break, cifs_oplock_break);
f45d3416 277 mutex_init(&cfile->fh_mutex);
15ecb436 278
4477288a 279 spin_lock(&cifs_file_list_lock);
233839b1
PS
280 if (fid->pending_open->oplock != CIFS_OPLOCK_NO_CHANGE)
281 oplock = fid->pending_open->oplock;
282 list_del(&fid->pending_open->olist);
283
284 tlink_tcon(tlink)->ses->server->ops->set_fid(cfile, fid, oplock);
285
286 list_add(&cfile->tlist, &tcon->openFileList);
15ecb436
JL
287 /* if readable file instance put first in list*/
288 if (file->f_mode & FMODE_READ)
4b4de76e 289 list_add(&cfile->flist, &cinode->openFileList);
15ecb436 290 else
4b4de76e 291 list_add_tail(&cfile->flist, &cinode->openFileList);
4477288a 292 spin_unlock(&cifs_file_list_lock);
15ecb436 293
4b4de76e
PS
294 file->private_data = cfile;
295 return cfile;
15ecb436
JL
296}
297
764a1b1a
JL
298struct cifsFileInfo *
299cifsFileInfo_get(struct cifsFileInfo *cifs_file)
300{
301 spin_lock(&cifs_file_list_lock);
302 cifsFileInfo_get_locked(cifs_file);
303 spin_unlock(&cifs_file_list_lock);
304 return cifs_file;
305}
306
cdff08e7
SF
307/*
308 * Release a reference on the file private data. This may involve closing
5f6dbc9e
JL
309 * the filehandle out on the server. Must be called without holding
310 * cifs_file_list_lock.
cdff08e7 311 */
b33879aa
JL
312void cifsFileInfo_put(struct cifsFileInfo *cifs_file)
313{
e66673e3 314 struct inode *inode = cifs_file->dentry->d_inode;
96daf2b0 315 struct cifs_tcon *tcon = tlink_tcon(cifs_file->tlink);
233839b1 316 struct TCP_Server_Info *server = tcon->ses->server;
e66673e3 317 struct cifsInodeInfo *cifsi = CIFS_I(inode);
4f8ba8a0 318 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
cdff08e7 319 struct cifsLockInfo *li, *tmp;
233839b1
PS
320 struct cifs_fid fid;
321 struct cifs_pending_open open;
cdff08e7
SF
322
323 spin_lock(&cifs_file_list_lock);
5f6dbc9e 324 if (--cifs_file->count > 0) {
cdff08e7
SF
325 spin_unlock(&cifs_file_list_lock);
326 return;
327 }
328
233839b1
PS
329 if (server->ops->get_lease_key)
330 server->ops->get_lease_key(inode, &fid);
331
332 /* store open in pending opens to make sure we don't miss lease break */
333 cifs_add_pending_open_locked(&fid, cifs_file->tlink, &open);
334
cdff08e7
SF
335 /* remove it from the lists */
336 list_del(&cifs_file->flist);
337 list_del(&cifs_file->tlist);
338
339 if (list_empty(&cifsi->openFileList)) {
340 cFYI(1, "closing last open instance for inode %p",
341 cifs_file->dentry->d_inode);
25364138
PS
342 /*
343 * In strict cache mode we need invalidate mapping on the last
344 * close because it may cause a error when we open this file
345 * again and get at least level II oplock.
346 */
4f8ba8a0
PS
347 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_STRICT_IO)
348 CIFS_I(inode)->invalid_mapping = true;
c6723628 349 cifs_set_oplock_level(cifsi, 0);
cdff08e7
SF
350 }
351 spin_unlock(&cifs_file_list_lock);
352
ad635942
JL
353 cancel_work_sync(&cifs_file->oplock_break);
354
cdff08e7 355 if (!tcon->need_reconnect && !cifs_file->invalidHandle) {
0ff78a22 356 struct TCP_Server_Info *server = tcon->ses->server;
6d5786a3 357 unsigned int xid;
0ff78a22 358
6d5786a3 359 xid = get_xid();
0ff78a22 360 if (server->ops->close)
760ad0ca
PS
361 server->ops->close(xid, tcon, &cifs_file->fid);
362 _free_xid(xid);
cdff08e7
SF
363 }
364
233839b1
PS
365 cifs_del_pending_open(&open);
366
f45d3416
PS
367 /*
368 * Delete any outstanding lock records. We'll lose them when the file
cdff08e7
SF
369 * is closed anyway.
370 */
1b4b55a1 371 down_write(&cifsi->lock_sem);
f45d3416 372 list_for_each_entry_safe(li, tmp, &cifs_file->llist->locks, llist) {
cdff08e7 373 list_del(&li->llist);
85160e03 374 cifs_del_lock_waiters(li);
cdff08e7 375 kfree(li);
b33879aa 376 }
f45d3416
PS
377 list_del(&cifs_file->llist->llist);
378 kfree(cifs_file->llist);
1b4b55a1 379 up_write(&cifsi->lock_sem);
cdff08e7
SF
380
381 cifs_put_tlink(cifs_file->tlink);
382 dput(cifs_file->dentry);
383 kfree(cifs_file);
b33879aa
JL
384}
385
1da177e4 386int cifs_open(struct inode *inode, struct file *file)
233839b1 387
1da177e4
LT
388{
389 int rc = -EACCES;
6d5786a3 390 unsigned int xid;
590a3fe0 391 __u32 oplock;
1da177e4 392 struct cifs_sb_info *cifs_sb;
b8c32dbb 393 struct TCP_Server_Info *server;
96daf2b0 394 struct cifs_tcon *tcon;
7ffec372 395 struct tcon_link *tlink;
fb1214e4 396 struct cifsFileInfo *cfile = NULL;
1da177e4 397 char *full_path = NULL;
7e12eddb 398 bool posix_open_ok = false;
fb1214e4 399 struct cifs_fid fid;
233839b1 400 struct cifs_pending_open open;
1da177e4 401
6d5786a3 402 xid = get_xid();
1da177e4
LT
403
404 cifs_sb = CIFS_SB(inode->i_sb);
7ffec372
JL
405 tlink = cifs_sb_tlink(cifs_sb);
406 if (IS_ERR(tlink)) {
6d5786a3 407 free_xid(xid);
7ffec372
JL
408 return PTR_ERR(tlink);
409 }
410 tcon = tlink_tcon(tlink);
b8c32dbb 411 server = tcon->ses->server;
1da177e4 412
e6a00296 413 full_path = build_path_from_dentry(file->f_path.dentry);
1da177e4 414 if (full_path == NULL) {
0f3bc09e 415 rc = -ENOMEM;
232341ba 416 goto out;
1da177e4
LT
417 }
418
b6b38f70
JP
419 cFYI(1, "inode = 0x%p file flags are 0x%x for %s",
420 inode, file->f_flags, full_path);
276a74a4 421
233839b1 422 if (server->oplocks)
276a74a4
SF
423 oplock = REQ_OPLOCK;
424 else
425 oplock = 0;
426
64cc2c63 427 if (!tcon->broken_posix_open && tcon->unix_ext &&
29e20f9c
PS
428 cap_unix(tcon->ses) && (CIFS_UNIX_POSIX_PATH_OPS_CAP &
429 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
276a74a4 430 /* can not refresh inode info since size could be stale */
2422f676 431 rc = cifs_posix_open(full_path, &inode, inode->i_sb,
fa588e0c 432 cifs_sb->mnt_file_mode /* ignored */,
fb1214e4 433 file->f_flags, &oplock, &fid.netfid, xid);
276a74a4 434 if (rc == 0) {
b6b38f70 435 cFYI(1, "posix open succeeded");
7e12eddb 436 posix_open_ok = true;
64cc2c63
SF
437 } else if ((rc == -EINVAL) || (rc == -EOPNOTSUPP)) {
438 if (tcon->ses->serverNOS)
b6b38f70 439 cERROR(1, "server %s of type %s returned"
64cc2c63
SF
440 " unexpected error on SMB posix open"
441 ", disabling posix open support."
442 " Check if server update available.",
443 tcon->ses->serverName,
b6b38f70 444 tcon->ses->serverNOS);
64cc2c63 445 tcon->broken_posix_open = true;
276a74a4
SF
446 } else if ((rc != -EIO) && (rc != -EREMOTE) &&
447 (rc != -EOPNOTSUPP)) /* path not found or net err */
448 goto out;
fb1214e4
PS
449 /*
450 * Else fallthrough to retry open the old way on network i/o
451 * or DFS errors.
452 */
276a74a4
SF
453 }
454
233839b1
PS
455 if (server->ops->get_lease_key)
456 server->ops->get_lease_key(inode, &fid);
457
458 cifs_add_pending_open(&fid, tlink, &open);
459
7e12eddb 460 if (!posix_open_ok) {
b8c32dbb
PS
461 if (server->ops->get_lease_key)
462 server->ops->get_lease_key(inode, &fid);
463
7e12eddb 464 rc = cifs_nt_open(full_path, inode, cifs_sb, tcon,
fb1214e4 465 file->f_flags, &oplock, &fid, xid);
233839b1
PS
466 if (rc) {
467 cifs_del_pending_open(&open);
7e12eddb 468 goto out;
233839b1 469 }
7e12eddb 470 }
47c78b7f 471
fb1214e4
PS
472 cfile = cifs_new_fileinfo(&fid, file, tlink, oplock);
473 if (cfile == NULL) {
b8c32dbb
PS
474 if (server->ops->close)
475 server->ops->close(xid, tcon, &fid);
233839b1 476 cifs_del_pending_open(&open);
1da177e4
LT
477 rc = -ENOMEM;
478 goto out;
479 }
1da177e4 480
9451a9a5
SJ
481 cifs_fscache_set_inode_cookie(inode, file);
482
7e12eddb 483 if ((oplock & CIFS_CREATE_ACTION) && !posix_open_ok && tcon->unix_ext) {
fb1214e4
PS
484 /*
485 * Time to set mode which we can not set earlier due to
486 * problems creating new read-only files.
487 */
7e12eddb
PS
488 struct cifs_unix_set_info_args args = {
489 .mode = inode->i_mode,
490 .uid = NO_CHANGE_64,
491 .gid = NO_CHANGE_64,
492 .ctime = NO_CHANGE_64,
493 .atime = NO_CHANGE_64,
494 .mtime = NO_CHANGE_64,
495 .device = 0,
496 };
fb1214e4
PS
497 CIFSSMBUnixSetFileInfo(xid, tcon, &args, fid.netfid,
498 cfile->pid);
1da177e4
LT
499 }
500
501out:
1da177e4 502 kfree(full_path);
6d5786a3 503 free_xid(xid);
7ffec372 504 cifs_put_tlink(tlink);
1da177e4
LT
505 return rc;
506}
507
f152fd5f
PS
508static int cifs_push_posix_locks(struct cifsFileInfo *cfile);
509
2ae78ba8
PS
510/*
511 * Try to reacquire byte range locks that were released when session
f152fd5f 512 * to server was lost.
2ae78ba8 513 */
f152fd5f
PS
514static int
515cifs_relock_file(struct cifsFileInfo *cfile)
1da177e4 516{
f152fd5f
PS
517 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
518 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
519 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1da177e4
LT
520 int rc = 0;
521
f152fd5f
PS
522 /* we are going to update can_cache_brlcks here - need a write access */
523 down_write(&cinode->lock_sem);
524 if (cinode->can_cache_brlcks) {
525 /* can cache locks - no need to push them */
526 up_write(&cinode->lock_sem);
527 return rc;
528 }
529
530 if (cap_unix(tcon->ses) &&
531 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
532 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
533 rc = cifs_push_posix_locks(cfile);
534 else
535 rc = tcon->ses->server->ops->push_mand_locks(cfile);
1da177e4 536
f152fd5f 537 up_write(&cinode->lock_sem);
1da177e4
LT
538 return rc;
539}
540
2ae78ba8
PS
541static int
542cifs_reopen_file(struct cifsFileInfo *cfile, bool can_flush)
1da177e4
LT
543{
544 int rc = -EACCES;
6d5786a3 545 unsigned int xid;
590a3fe0 546 __u32 oplock;
1da177e4 547 struct cifs_sb_info *cifs_sb;
96daf2b0 548 struct cifs_tcon *tcon;
2ae78ba8
PS
549 struct TCP_Server_Info *server;
550 struct cifsInodeInfo *cinode;
fb8c4b14 551 struct inode *inode;
1da177e4 552 char *full_path = NULL;
2ae78ba8 553 int desired_access;
1da177e4 554 int disposition = FILE_OPEN;
3d3ea8e6 555 int create_options = CREATE_NOT_DIR;
2ae78ba8 556 struct cifs_fid fid;
1da177e4 557
6d5786a3 558 xid = get_xid();
2ae78ba8
PS
559 mutex_lock(&cfile->fh_mutex);
560 if (!cfile->invalidHandle) {
561 mutex_unlock(&cfile->fh_mutex);
0f3bc09e 562 rc = 0;
6d5786a3 563 free_xid(xid);
0f3bc09e 564 return rc;
1da177e4
LT
565 }
566
2ae78ba8 567 inode = cfile->dentry->d_inode;
1da177e4 568 cifs_sb = CIFS_SB(inode->i_sb);
2ae78ba8
PS
569 tcon = tlink_tcon(cfile->tlink);
570 server = tcon->ses->server;
571
572 /*
573 * Can not grab rename sem here because various ops, including those
574 * that already have the rename sem can end up causing writepage to get
575 * called and if the server was down that means we end up here, and we
576 * can never tell if the caller already has the rename_sem.
577 */
578 full_path = build_path_from_dentry(cfile->dentry);
1da177e4 579 if (full_path == NULL) {
3a9f462f 580 rc = -ENOMEM;
2ae78ba8 581 mutex_unlock(&cfile->fh_mutex);
6d5786a3 582 free_xid(xid);
3a9f462f 583 return rc;
1da177e4
LT
584 }
585
2ae78ba8
PS
586 cFYI(1, "inode = 0x%p file flags 0x%x for %s", inode, cfile->f_flags,
587 full_path);
1da177e4 588
10b9b98e 589 if (tcon->ses->server->oplocks)
1da177e4
LT
590 oplock = REQ_OPLOCK;
591 else
4b18f2a9 592 oplock = 0;
1da177e4 593
29e20f9c 594 if (tcon->unix_ext && cap_unix(tcon->ses) &&
7fc8f4e9 595 (CIFS_UNIX_POSIX_PATH_OPS_CAP &
29e20f9c 596 le64_to_cpu(tcon->fsUnixInfo.Capability))) {
608712fe
JL
597 /*
598 * O_CREAT, O_EXCL and O_TRUNC already had their effect on the
599 * original open. Must mask them off for a reopen.
600 */
2ae78ba8 601 unsigned int oflags = cfile->f_flags &
15886177 602 ~(O_CREAT | O_EXCL | O_TRUNC);
608712fe 603
2422f676 604 rc = cifs_posix_open(full_path, NULL, inode->i_sb,
2ae78ba8
PS
605 cifs_sb->mnt_file_mode /* ignored */,
606 oflags, &oplock, &fid.netfid, xid);
7fc8f4e9 607 if (rc == 0) {
b6b38f70 608 cFYI(1, "posix reopen succeeded");
7fc8f4e9
SF
609 goto reopen_success;
610 }
2ae78ba8
PS
611 /*
612 * fallthrough to retry open the old way on errors, especially
613 * in the reconnect path it is important to retry hard
614 */
7fc8f4e9
SF
615 }
616
2ae78ba8 617 desired_access = cifs_convert_flags(cfile->f_flags);
7fc8f4e9 618
3d3ea8e6
SP
619 if (backup_cred(cifs_sb))
620 create_options |= CREATE_OPEN_BACKUP_INTENT;
621
b8c32dbb
PS
622 if (server->ops->get_lease_key)
623 server->ops->get_lease_key(inode, &fid);
624
2ae78ba8
PS
625 /*
626 * Can not refresh inode by passing in file_info buf to be returned by
627 * CIFSSMBOpen and then calling get_inode_info with returned buf since
628 * file might have write behind data that needs to be flushed and server
629 * version of file size can be stale. If we knew for sure that inode was
630 * not dirty locally we could do this.
631 */
632 rc = server->ops->open(xid, tcon, full_path, disposition,
633 desired_access, create_options, &fid, &oplock,
634 NULL, cifs_sb);
1da177e4 635 if (rc) {
2ae78ba8
PS
636 mutex_unlock(&cfile->fh_mutex);
637 cFYI(1, "cifs_reopen returned 0x%x", rc);
b6b38f70 638 cFYI(1, "oplock: %d", oplock);
15886177
JL
639 goto reopen_error_exit;
640 }
641
7fc8f4e9 642reopen_success:
2ae78ba8
PS
643 cfile->invalidHandle = false;
644 mutex_unlock(&cfile->fh_mutex);
645 cinode = CIFS_I(inode);
15886177
JL
646
647 if (can_flush) {
648 rc = filemap_write_and_wait(inode->i_mapping);
eb4b756b 649 mapping_set_error(inode->i_mapping, rc);
15886177 650
15886177 651 if (tcon->unix_ext)
2ae78ba8
PS
652 rc = cifs_get_inode_info_unix(&inode, full_path,
653 inode->i_sb, xid);
15886177 654 else
2ae78ba8
PS
655 rc = cifs_get_inode_info(&inode, full_path, NULL,
656 inode->i_sb, xid, NULL);
657 }
658 /*
659 * Else we are writing out data to server already and could deadlock if
660 * we tried to flush data, and since we do not know if we have data that
661 * would invalidate the current end of file on the server we can not go
662 * to the server to get the new inode info.
663 */
664
665 server->ops->set_fid(cfile, &fid, oplock);
666 cifs_relock_file(cfile);
15886177
JL
667
668reopen_error_exit:
1da177e4 669 kfree(full_path);
6d5786a3 670 free_xid(xid);
1da177e4
LT
671 return rc;
672}
673
674int cifs_close(struct inode *inode, struct file *file)
675{
77970693
JL
676 if (file->private_data != NULL) {
677 cifsFileInfo_put(file->private_data);
678 file->private_data = NULL;
679 }
7ee1af76 680
cdff08e7
SF
681 /* return code from the ->release op is always ignored */
682 return 0;
1da177e4
LT
683}
684
685int cifs_closedir(struct inode *inode, struct file *file)
686{
687 int rc = 0;
6d5786a3 688 unsigned int xid;
4b4de76e 689 struct cifsFileInfo *cfile = file->private_data;
92fc65a7
PS
690 struct cifs_tcon *tcon;
691 struct TCP_Server_Info *server;
692 char *buf;
1da177e4 693
b6b38f70 694 cFYI(1, "Closedir inode = 0x%p", inode);
1da177e4 695
92fc65a7
PS
696 if (cfile == NULL)
697 return rc;
698
6d5786a3 699 xid = get_xid();
92fc65a7
PS
700 tcon = tlink_tcon(cfile->tlink);
701 server = tcon->ses->server;
1da177e4 702
92fc65a7
PS
703 cFYI(1, "Freeing private data in close dir");
704 spin_lock(&cifs_file_list_lock);
705 if (!cfile->srch_inf.endOfSearch && !cfile->invalidHandle) {
706 cfile->invalidHandle = true;
707 spin_unlock(&cifs_file_list_lock);
708 if (server->ops->close_dir)
709 rc = server->ops->close_dir(xid, tcon, &cfile->fid);
710 else
711 rc = -ENOSYS;
712 cFYI(1, "Closing uncompleted readdir with rc %d", rc);
713 /* not much we can do if it fails anyway, ignore rc */
714 rc = 0;
715 } else
716 spin_unlock(&cifs_file_list_lock);
717
718 buf = cfile->srch_inf.ntwrk_buf_start;
719 if (buf) {
720 cFYI(1, "closedir free smb buf in srch struct");
721 cfile->srch_inf.ntwrk_buf_start = NULL;
722 if (cfile->srch_inf.smallBuf)
723 cifs_small_buf_release(buf);
724 else
725 cifs_buf_release(buf);
1da177e4 726 }
92fc65a7
PS
727
728 cifs_put_tlink(cfile->tlink);
729 kfree(file->private_data);
730 file->private_data = NULL;
1da177e4 731 /* BB can we lock the filestruct while this is going on? */
6d5786a3 732 free_xid(xid);
1da177e4
LT
733 return rc;
734}
735
85160e03 736static struct cifsLockInfo *
fbd35aca 737cifs_lock_init(__u64 offset, __u64 length, __u8 type)
7ee1af76 738{
a88b4707 739 struct cifsLockInfo *lock =
fb8c4b14 740 kmalloc(sizeof(struct cifsLockInfo), GFP_KERNEL);
a88b4707
PS
741 if (!lock)
742 return lock;
743 lock->offset = offset;
744 lock->length = length;
745 lock->type = type;
a88b4707
PS
746 lock->pid = current->tgid;
747 INIT_LIST_HEAD(&lock->blist);
748 init_waitqueue_head(&lock->block_q);
749 return lock;
85160e03
PS
750}
751
f7ba7fe6 752void
85160e03
PS
753cifs_del_lock_waiters(struct cifsLockInfo *lock)
754{
755 struct cifsLockInfo *li, *tmp;
756 list_for_each_entry_safe(li, tmp, &lock->blist, blist) {
757 list_del_init(&li->blist);
758 wake_up(&li->block_q);
759 }
760}
761
762static bool
f45d3416
PS
763cifs_find_fid_lock_conflict(struct cifs_fid_locks *fdlocks, __u64 offset,
764 __u64 length, __u8 type, struct cifsFileInfo *cfile,
579f9053 765 struct cifsLockInfo **conf_lock, bool rw_check)
85160e03 766{
fbd35aca 767 struct cifsLockInfo *li;
f45d3416 768 struct cifsFileInfo *cur_cfile = fdlocks->cfile;
106dc538 769 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03 770
f45d3416 771 list_for_each_entry(li, &fdlocks->locks, llist) {
85160e03
PS
772 if (offset + length <= li->offset ||
773 offset >= li->offset + li->length)
774 continue;
579f9053
PS
775 if (rw_check && server->ops->compare_fids(cfile, cur_cfile) &&
776 current->tgid == li->pid)
777 continue;
f45d3416
PS
778 if ((type & server->vals->shared_lock_type) &&
779 ((server->ops->compare_fids(cfile, cur_cfile) &&
780 current->tgid == li->pid) || type == li->type))
85160e03 781 continue;
579f9053
PS
782 if (conf_lock)
783 *conf_lock = li;
f45d3416 784 return true;
85160e03
PS
785 }
786 return false;
787}
788
579f9053 789bool
55157dfb 790cifs_find_lock_conflict(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
579f9053
PS
791 __u8 type, struct cifsLockInfo **conf_lock,
792 bool rw_check)
161ebf9f 793{
fbd35aca 794 bool rc = false;
f45d3416 795 struct cifs_fid_locks *cur;
55157dfb 796 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
fbd35aca 797
f45d3416
PS
798 list_for_each_entry(cur, &cinode->llist, llist) {
799 rc = cifs_find_fid_lock_conflict(cur, offset, length, type,
579f9053 800 cfile, conf_lock, rw_check);
fbd35aca
PS
801 if (rc)
802 break;
803 }
fbd35aca
PS
804
805 return rc;
161ebf9f
PS
806}
807
9a5101c8
PS
808/*
809 * Check if there is another lock that prevents us to set the lock (mandatory
810 * style). If such a lock exists, update the flock structure with its
811 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
812 * or leave it the same if we can't. Returns 0 if we don't need to request to
813 * the server or 1 otherwise.
814 */
85160e03 815static int
fbd35aca
PS
816cifs_lock_test(struct cifsFileInfo *cfile, __u64 offset, __u64 length,
817 __u8 type, struct file_lock *flock)
85160e03
PS
818{
819 int rc = 0;
820 struct cifsLockInfo *conf_lock;
fbd35aca 821 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
106dc538 822 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
85160e03
PS
823 bool exist;
824
1b4b55a1 825 down_read(&cinode->lock_sem);
85160e03 826
55157dfb 827 exist = cifs_find_lock_conflict(cfile, offset, length, type,
579f9053 828 &conf_lock, false);
85160e03
PS
829 if (exist) {
830 flock->fl_start = conf_lock->offset;
831 flock->fl_end = conf_lock->offset + conf_lock->length - 1;
832 flock->fl_pid = conf_lock->pid;
106dc538 833 if (conf_lock->type & server->vals->shared_lock_type)
85160e03
PS
834 flock->fl_type = F_RDLCK;
835 else
836 flock->fl_type = F_WRLCK;
837 } else if (!cinode->can_cache_brlcks)
838 rc = 1;
839 else
840 flock->fl_type = F_UNLCK;
841
1b4b55a1 842 up_read(&cinode->lock_sem);
85160e03
PS
843 return rc;
844}
845
161ebf9f 846static void
fbd35aca 847cifs_lock_add(struct cifsFileInfo *cfile, struct cifsLockInfo *lock)
85160e03 848{
fbd35aca 849 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1b4b55a1 850 down_write(&cinode->lock_sem);
f45d3416 851 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 852 up_write(&cinode->lock_sem);
7ee1af76
JA
853}
854
9a5101c8
PS
855/*
856 * Set the byte-range lock (mandatory style). Returns:
857 * 1) 0, if we set the lock and don't need to request to the server;
858 * 2) 1, if no locks prevent us but we need to request to the server;
859 * 3) -EACCESS, if there is a lock that prevents us and wait is false.
860 */
85160e03 861static int
fbd35aca 862cifs_lock_add_if(struct cifsFileInfo *cfile, struct cifsLockInfo *lock,
161ebf9f 863 bool wait)
85160e03 864{
161ebf9f 865 struct cifsLockInfo *conf_lock;
fbd35aca 866 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
85160e03
PS
867 bool exist;
868 int rc = 0;
869
85160e03
PS
870try_again:
871 exist = false;
1b4b55a1 872 down_write(&cinode->lock_sem);
85160e03 873
55157dfb 874 exist = cifs_find_lock_conflict(cfile, lock->offset, lock->length,
579f9053 875 lock->type, &conf_lock, false);
85160e03 876 if (!exist && cinode->can_cache_brlcks) {
f45d3416 877 list_add_tail(&lock->llist, &cfile->llist->locks);
1b4b55a1 878 up_write(&cinode->lock_sem);
85160e03
PS
879 return rc;
880 }
881
882 if (!exist)
883 rc = 1;
884 else if (!wait)
885 rc = -EACCES;
886 else {
887 list_add_tail(&lock->blist, &conf_lock->blist);
1b4b55a1 888 up_write(&cinode->lock_sem);
85160e03
PS
889 rc = wait_event_interruptible(lock->block_q,
890 (lock->blist.prev == &lock->blist) &&
891 (lock->blist.next == &lock->blist));
892 if (!rc)
893 goto try_again;
1b4b55a1 894 down_write(&cinode->lock_sem);
a88b4707 895 list_del_init(&lock->blist);
85160e03
PS
896 }
897
1b4b55a1 898 up_write(&cinode->lock_sem);
85160e03
PS
899 return rc;
900}
901
9a5101c8
PS
902/*
903 * Check if there is another lock that prevents us to set the lock (posix
904 * style). If such a lock exists, update the flock structure with its
905 * properties. Otherwise, set the flock type to F_UNLCK if we can cache brlocks
906 * or leave it the same if we can't. Returns 0 if we don't need to request to
907 * the server or 1 otherwise.
908 */
85160e03 909static int
4f6bcec9
PS
910cifs_posix_lock_test(struct file *file, struct file_lock *flock)
911{
912 int rc = 0;
913 struct cifsInodeInfo *cinode = CIFS_I(file->f_path.dentry->d_inode);
914 unsigned char saved_type = flock->fl_type;
915
50792760
PS
916 if ((flock->fl_flags & FL_POSIX) == 0)
917 return 1;
918
1b4b55a1 919 down_read(&cinode->lock_sem);
4f6bcec9
PS
920 posix_test_lock(file, flock);
921
922 if (flock->fl_type == F_UNLCK && !cinode->can_cache_brlcks) {
923 flock->fl_type = saved_type;
924 rc = 1;
925 }
926
1b4b55a1 927 up_read(&cinode->lock_sem);
4f6bcec9
PS
928 return rc;
929}
930
9a5101c8
PS
931/*
932 * Set the byte-range lock (posix style). Returns:
933 * 1) 0, if we set the lock and don't need to request to the server;
934 * 2) 1, if we need to request to the server;
935 * 3) <0, if the error occurs while setting the lock.
936 */
4f6bcec9
PS
937static int
938cifs_posix_lock_set(struct file *file, struct file_lock *flock)
939{
940 struct cifsInodeInfo *cinode = CIFS_I(file->f_path.dentry->d_inode);
50792760
PS
941 int rc = 1;
942
943 if ((flock->fl_flags & FL_POSIX) == 0)
944 return rc;
4f6bcec9 945
66189be7 946try_again:
1b4b55a1 947 down_write(&cinode->lock_sem);
4f6bcec9 948 if (!cinode->can_cache_brlcks) {
1b4b55a1 949 up_write(&cinode->lock_sem);
50792760 950 return rc;
4f6bcec9 951 }
66189be7
PS
952
953 rc = posix_lock_file(file, flock, NULL);
1b4b55a1 954 up_write(&cinode->lock_sem);
66189be7
PS
955 if (rc == FILE_LOCK_DEFERRED) {
956 rc = wait_event_interruptible(flock->fl_wait, !flock->fl_next);
957 if (!rc)
958 goto try_again;
959 locks_delete_block(flock);
960 }
9ebb389d 961 return rc;
4f6bcec9
PS
962}
963
d39a4f71 964int
4f6bcec9 965cifs_push_mandatory_locks(struct cifsFileInfo *cfile)
85160e03 966{
6d5786a3
PS
967 unsigned int xid;
968 int rc = 0, stored_rc;
85160e03
PS
969 struct cifsLockInfo *li, *tmp;
970 struct cifs_tcon *tcon;
0013fb4c 971 unsigned int num, max_num, max_buf;
32b9aaf1
PS
972 LOCKING_ANDX_RANGE *buf, *cur;
973 int types[] = {LOCKING_ANDX_LARGE_FILES,
974 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
975 int i;
85160e03 976
6d5786a3 977 xid = get_xid();
85160e03
PS
978 tcon = tlink_tcon(cfile->tlink);
979
0013fb4c
PS
980 /*
981 * Accessing maxBuf is racy with cifs_reconnect - need to store value
982 * and check it for zero before using.
983 */
984 max_buf = tcon->ses->server->maxBuf;
985 if (!max_buf) {
6d5786a3 986 free_xid(xid);
0013fb4c
PS
987 return -EINVAL;
988 }
989
990 max_num = (max_buf - sizeof(struct smb_hdr)) /
991 sizeof(LOCKING_ANDX_RANGE);
32b9aaf1
PS
992 buf = kzalloc(max_num * sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
993 if (!buf) {
6d5786a3 994 free_xid(xid);
e2f2886a 995 return -ENOMEM;
32b9aaf1
PS
996 }
997
998 for (i = 0; i < 2; i++) {
999 cur = buf;
1000 num = 0;
f45d3416 1001 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
32b9aaf1
PS
1002 if (li->type != types[i])
1003 continue;
1004 cur->Pid = cpu_to_le16(li->pid);
1005 cur->LengthLow = cpu_to_le32((u32)li->length);
1006 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1007 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1008 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1009 if (++num == max_num) {
4b4de76e
PS
1010 stored_rc = cifs_lockv(xid, tcon,
1011 cfile->fid.netfid,
04a6aa8a
PS
1012 (__u8)li->type, 0, num,
1013 buf);
32b9aaf1
PS
1014 if (stored_rc)
1015 rc = stored_rc;
1016 cur = buf;
1017 num = 0;
1018 } else
1019 cur++;
1020 }
1021
1022 if (num) {
4b4de76e 1023 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
04a6aa8a 1024 (__u8)types[i], 0, num, buf);
32b9aaf1
PS
1025 if (stored_rc)
1026 rc = stored_rc;
1027 }
85160e03
PS
1028 }
1029
32b9aaf1 1030 kfree(buf);
6d5786a3 1031 free_xid(xid);
85160e03
PS
1032 return rc;
1033}
1034
4f6bcec9
PS
1035/* copied from fs/locks.c with a name change */
1036#define cifs_for_each_lock(inode, lockp) \
1037 for (lockp = &inode->i_flock; *lockp != NULL; \
1038 lockp = &(*lockp)->fl_next)
1039
d5751469
PS
1040struct lock_to_push {
1041 struct list_head llist;
1042 __u64 offset;
1043 __u64 length;
1044 __u32 pid;
1045 __u16 netfid;
1046 __u8 type;
1047};
1048
4f6bcec9 1049static int
b8db928b 1050cifs_push_posix_locks(struct cifsFileInfo *cfile)
4f6bcec9 1051{
4f6bcec9
PS
1052 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1053 struct file_lock *flock, **before;
d5751469 1054 unsigned int count = 0, i = 0;
4f6bcec9 1055 int rc = 0, xid, type;
d5751469
PS
1056 struct list_head locks_to_send, *el;
1057 struct lock_to_push *lck, *tmp;
4f6bcec9 1058 __u64 length;
4f6bcec9 1059
6d5786a3 1060 xid = get_xid();
4f6bcec9 1061
d5751469
PS
1062 lock_flocks();
1063 cifs_for_each_lock(cfile->dentry->d_inode, before) {
1064 if ((*before)->fl_flags & FL_POSIX)
1065 count++;
1066 }
1067 unlock_flocks();
1068
4f6bcec9
PS
1069 INIT_LIST_HEAD(&locks_to_send);
1070
d5751469 1071 /*
ce85852b 1072 * Allocating count locks is enough because no FL_POSIX locks can be
1b4b55a1 1073 * added to the list while we are holding cinode->lock_sem that
ce85852b 1074 * protects locking operations of this inode.
d5751469
PS
1075 */
1076 for (; i < count; i++) {
1077 lck = kmalloc(sizeof(struct lock_to_push), GFP_KERNEL);
1078 if (!lck) {
1079 rc = -ENOMEM;
1080 goto err_out;
1081 }
1082 list_add_tail(&lck->llist, &locks_to_send);
1083 }
1084
d5751469 1085 el = locks_to_send.next;
4f6bcec9
PS
1086 lock_flocks();
1087 cifs_for_each_lock(cfile->dentry->d_inode, before) {
ce85852b
PS
1088 flock = *before;
1089 if ((flock->fl_flags & FL_POSIX) == 0)
1090 continue;
d5751469 1091 if (el == &locks_to_send) {
ce85852b
PS
1092 /*
1093 * The list ended. We don't have enough allocated
1094 * structures - something is really wrong.
1095 */
d5751469
PS
1096 cERROR(1, "Can't push all brlocks!");
1097 break;
1098 }
4f6bcec9
PS
1099 length = 1 + flock->fl_end - flock->fl_start;
1100 if (flock->fl_type == F_RDLCK || flock->fl_type == F_SHLCK)
1101 type = CIFS_RDLCK;
1102 else
1103 type = CIFS_WRLCK;
d5751469 1104 lck = list_entry(el, struct lock_to_push, llist);
4f6bcec9 1105 lck->pid = flock->fl_pid;
4b4de76e 1106 lck->netfid = cfile->fid.netfid;
d5751469
PS
1107 lck->length = length;
1108 lck->type = type;
1109 lck->offset = flock->fl_start;
d5751469 1110 el = el->next;
4f6bcec9 1111 }
4f6bcec9
PS
1112 unlock_flocks();
1113
1114 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
4f6bcec9
PS
1115 int stored_rc;
1116
4f6bcec9 1117 stored_rc = CIFSSMBPosixLock(xid, tcon, lck->netfid, lck->pid,
c5fd363d 1118 lck->offset, lck->length, NULL,
4f6bcec9
PS
1119 lck->type, 0);
1120 if (stored_rc)
1121 rc = stored_rc;
1122 list_del(&lck->llist);
1123 kfree(lck);
1124 }
1125
d5751469 1126out:
6d5786a3 1127 free_xid(xid);
4f6bcec9 1128 return rc;
d5751469
PS
1129err_out:
1130 list_for_each_entry_safe(lck, tmp, &locks_to_send, llist) {
1131 list_del(&lck->llist);
1132 kfree(lck);
1133 }
1134 goto out;
4f6bcec9
PS
1135}
1136
9ec3c882 1137static int
b8db928b 1138cifs_push_locks(struct cifsFileInfo *cfile)
9ec3c882 1139{
b8db928b 1140 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
9ec3c882 1141 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
b8db928b 1142 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
9ec3c882
PS
1143 int rc = 0;
1144
1145 /* we are going to update can_cache_brlcks here - need a write access */
1146 down_write(&cinode->lock_sem);
1147 if (!cinode->can_cache_brlcks) {
1148 up_write(&cinode->lock_sem);
1149 return rc;
1150 }
4f6bcec9 1151
29e20f9c 1152 if (cap_unix(tcon->ses) &&
4f6bcec9
PS
1153 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1154 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
b8db928b
PS
1155 rc = cifs_push_posix_locks(cfile);
1156 else
1157 rc = tcon->ses->server->ops->push_mand_locks(cfile);
4f6bcec9 1158
b8db928b
PS
1159 cinode->can_cache_brlcks = false;
1160 up_write(&cinode->lock_sem);
1161 return rc;
4f6bcec9
PS
1162}
1163
03776f45 1164static void
04a6aa8a 1165cifs_read_flock(struct file_lock *flock, __u32 *type, int *lock, int *unlock,
106dc538 1166 bool *wait_flag, struct TCP_Server_Info *server)
1da177e4 1167{
03776f45 1168 if (flock->fl_flags & FL_POSIX)
b6b38f70 1169 cFYI(1, "Posix");
03776f45 1170 if (flock->fl_flags & FL_FLOCK)
b6b38f70 1171 cFYI(1, "Flock");
03776f45 1172 if (flock->fl_flags & FL_SLEEP) {
b6b38f70 1173 cFYI(1, "Blocking lock");
03776f45 1174 *wait_flag = true;
1da177e4 1175 }
03776f45 1176 if (flock->fl_flags & FL_ACCESS)
b6b38f70 1177 cFYI(1, "Process suspended by mandatory locking - "
03776f45
PS
1178 "not implemented yet");
1179 if (flock->fl_flags & FL_LEASE)
b6b38f70 1180 cFYI(1, "Lease on file - not implemented yet");
03776f45 1181 if (flock->fl_flags &
3d6d854a
JL
1182 (~(FL_POSIX | FL_FLOCK | FL_SLEEP |
1183 FL_ACCESS | FL_LEASE | FL_CLOSE)))
03776f45 1184 cFYI(1, "Unknown lock flags 0x%x", flock->fl_flags);
1da177e4 1185
106dc538 1186 *type = server->vals->large_lock_type;
03776f45 1187 if (flock->fl_type == F_WRLCK) {
b6b38f70 1188 cFYI(1, "F_WRLCK ");
106dc538 1189 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1190 *lock = 1;
1191 } else if (flock->fl_type == F_UNLCK) {
b6b38f70 1192 cFYI(1, "F_UNLCK");
106dc538 1193 *type |= server->vals->unlock_lock_type;
03776f45
PS
1194 *unlock = 1;
1195 /* Check if unlock includes more than one lock range */
1196 } else if (flock->fl_type == F_RDLCK) {
b6b38f70 1197 cFYI(1, "F_RDLCK");
106dc538 1198 *type |= server->vals->shared_lock_type;
03776f45
PS
1199 *lock = 1;
1200 } else if (flock->fl_type == F_EXLCK) {
b6b38f70 1201 cFYI(1, "F_EXLCK");
106dc538 1202 *type |= server->vals->exclusive_lock_type;
03776f45
PS
1203 *lock = 1;
1204 } else if (flock->fl_type == F_SHLCK) {
b6b38f70 1205 cFYI(1, "F_SHLCK");
106dc538 1206 *type |= server->vals->shared_lock_type;
03776f45 1207 *lock = 1;
1da177e4 1208 } else
b6b38f70 1209 cFYI(1, "Unknown type of lock");
03776f45 1210}
1da177e4 1211
03776f45 1212static int
04a6aa8a 1213cifs_getlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3 1214 bool wait_flag, bool posix_lck, unsigned int xid)
03776f45
PS
1215{
1216 int rc = 0;
1217 __u64 length = 1 + flock->fl_end - flock->fl_start;
4f6bcec9
PS
1218 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1219 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1220 struct TCP_Server_Info *server = tcon->ses->server;
4b4de76e 1221 __u16 netfid = cfile->fid.netfid;
f05337c6 1222
03776f45
PS
1223 if (posix_lck) {
1224 int posix_lock_type;
4f6bcec9
PS
1225
1226 rc = cifs_posix_lock_test(file, flock);
1227 if (!rc)
1228 return rc;
1229
106dc538 1230 if (type & server->vals->shared_lock_type)
03776f45
PS
1231 posix_lock_type = CIFS_RDLCK;
1232 else
1233 posix_lock_type = CIFS_WRLCK;
4f6bcec9 1234 rc = CIFSSMBPosixLock(xid, tcon, netfid, current->tgid,
c5fd363d 1235 flock->fl_start, length, flock,
4f6bcec9 1236 posix_lock_type, wait_flag);
03776f45
PS
1237 return rc;
1238 }
1da177e4 1239
fbd35aca 1240 rc = cifs_lock_test(cfile, flock->fl_start, length, type, flock);
85160e03
PS
1241 if (!rc)
1242 return rc;
1243
03776f45 1244 /* BB we could chain these into one lock request BB */
d39a4f71
PS
1245 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length, type,
1246 1, 0, false);
03776f45 1247 if (rc == 0) {
d39a4f71
PS
1248 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1249 type, 0, 1, false);
03776f45
PS
1250 flock->fl_type = F_UNLCK;
1251 if (rc != 0)
1252 cERROR(1, "Error unlocking previously locked "
106dc538 1253 "range %d during test of lock", rc);
a88b4707 1254 return 0;
1da177e4 1255 }
7ee1af76 1256
106dc538 1257 if (type & server->vals->shared_lock_type) {
03776f45 1258 flock->fl_type = F_WRLCK;
a88b4707 1259 return 0;
7ee1af76
JA
1260 }
1261
d39a4f71
PS
1262 type &= ~server->vals->exclusive_lock_type;
1263
1264 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1265 type | server->vals->shared_lock_type,
1266 1, 0, false);
03776f45 1267 if (rc == 0) {
d39a4f71
PS
1268 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1269 type | server->vals->shared_lock_type, 0, 1, false);
03776f45
PS
1270 flock->fl_type = F_RDLCK;
1271 if (rc != 0)
1272 cERROR(1, "Error unlocking previously locked "
1273 "range %d during test of lock", rc);
1274 } else
1275 flock->fl_type = F_WRLCK;
1276
a88b4707 1277 return 0;
03776f45
PS
1278}
1279
f7ba7fe6 1280void
9ee305b7
PS
1281cifs_move_llist(struct list_head *source, struct list_head *dest)
1282{
1283 struct list_head *li, *tmp;
1284 list_for_each_safe(li, tmp, source)
1285 list_move(li, dest);
1286}
1287
f7ba7fe6 1288void
9ee305b7
PS
1289cifs_free_llist(struct list_head *llist)
1290{
1291 struct cifsLockInfo *li, *tmp;
1292 list_for_each_entry_safe(li, tmp, llist, llist) {
1293 cifs_del_lock_waiters(li);
1294 list_del(&li->llist);
1295 kfree(li);
1296 }
1297}
1298
d39a4f71 1299int
6d5786a3
PS
1300cifs_unlock_range(struct cifsFileInfo *cfile, struct file_lock *flock,
1301 unsigned int xid)
9ee305b7
PS
1302{
1303 int rc = 0, stored_rc;
1304 int types[] = {LOCKING_ANDX_LARGE_FILES,
1305 LOCKING_ANDX_SHARED_LOCK | LOCKING_ANDX_LARGE_FILES};
1306 unsigned int i;
0013fb4c 1307 unsigned int max_num, num, max_buf;
9ee305b7
PS
1308 LOCKING_ANDX_RANGE *buf, *cur;
1309 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
1310 struct cifsInodeInfo *cinode = CIFS_I(cfile->dentry->d_inode);
1311 struct cifsLockInfo *li, *tmp;
1312 __u64 length = 1 + flock->fl_end - flock->fl_start;
1313 struct list_head tmp_llist;
1314
1315 INIT_LIST_HEAD(&tmp_llist);
1316
0013fb4c
PS
1317 /*
1318 * Accessing maxBuf is racy with cifs_reconnect - need to store value
1319 * and check it for zero before using.
1320 */
1321 max_buf = tcon->ses->server->maxBuf;
1322 if (!max_buf)
1323 return -EINVAL;
1324
1325 max_num = (max_buf - sizeof(struct smb_hdr)) /
1326 sizeof(LOCKING_ANDX_RANGE);
9ee305b7
PS
1327 buf = kzalloc(max_num * sizeof(LOCKING_ANDX_RANGE), GFP_KERNEL);
1328 if (!buf)
1329 return -ENOMEM;
1330
1b4b55a1 1331 down_write(&cinode->lock_sem);
9ee305b7
PS
1332 for (i = 0; i < 2; i++) {
1333 cur = buf;
1334 num = 0;
f45d3416 1335 list_for_each_entry_safe(li, tmp, &cfile->llist->locks, llist) {
9ee305b7
PS
1336 if (flock->fl_start > li->offset ||
1337 (flock->fl_start + length) <
1338 (li->offset + li->length))
1339 continue;
1340 if (current->tgid != li->pid)
1341 continue;
9ee305b7
PS
1342 if (types[i] != li->type)
1343 continue;
ea319d57 1344 if (cinode->can_cache_brlcks) {
9ee305b7
PS
1345 /*
1346 * We can cache brlock requests - simply remove
fbd35aca 1347 * a lock from the file's list.
9ee305b7
PS
1348 */
1349 list_del(&li->llist);
1350 cifs_del_lock_waiters(li);
1351 kfree(li);
ea319d57 1352 continue;
9ee305b7 1353 }
ea319d57
PS
1354 cur->Pid = cpu_to_le16(li->pid);
1355 cur->LengthLow = cpu_to_le32((u32)li->length);
1356 cur->LengthHigh = cpu_to_le32((u32)(li->length>>32));
1357 cur->OffsetLow = cpu_to_le32((u32)li->offset);
1358 cur->OffsetHigh = cpu_to_le32((u32)(li->offset>>32));
1359 /*
1360 * We need to save a lock here to let us add it again to
1361 * the file's list if the unlock range request fails on
1362 * the server.
1363 */
1364 list_move(&li->llist, &tmp_llist);
1365 if (++num == max_num) {
4b4de76e
PS
1366 stored_rc = cifs_lockv(xid, tcon,
1367 cfile->fid.netfid,
ea319d57
PS
1368 li->type, num, 0, buf);
1369 if (stored_rc) {
1370 /*
1371 * We failed on the unlock range
1372 * request - add all locks from the tmp
1373 * list to the head of the file's list.
1374 */
1375 cifs_move_llist(&tmp_llist,
f45d3416 1376 &cfile->llist->locks);
ea319d57
PS
1377 rc = stored_rc;
1378 } else
1379 /*
1380 * The unlock range request succeed -
1381 * free the tmp list.
1382 */
1383 cifs_free_llist(&tmp_llist);
1384 cur = buf;
1385 num = 0;
1386 } else
1387 cur++;
9ee305b7
PS
1388 }
1389 if (num) {
4b4de76e 1390 stored_rc = cifs_lockv(xid, tcon, cfile->fid.netfid,
9ee305b7
PS
1391 types[i], num, 0, buf);
1392 if (stored_rc) {
f45d3416
PS
1393 cifs_move_llist(&tmp_llist,
1394 &cfile->llist->locks);
9ee305b7
PS
1395 rc = stored_rc;
1396 } else
1397 cifs_free_llist(&tmp_llist);
1398 }
1399 }
1400
1b4b55a1 1401 up_write(&cinode->lock_sem);
9ee305b7
PS
1402 kfree(buf);
1403 return rc;
1404}
1405
03776f45 1406static int
f45d3416 1407cifs_setlk(struct file *file, struct file_lock *flock, __u32 type,
6d5786a3
PS
1408 bool wait_flag, bool posix_lck, int lock, int unlock,
1409 unsigned int xid)
03776f45
PS
1410{
1411 int rc = 0;
1412 __u64 length = 1 + flock->fl_end - flock->fl_start;
1413 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
1414 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
106dc538 1415 struct TCP_Server_Info *server = tcon->ses->server;
03776f45
PS
1416
1417 if (posix_lck) {
08547b03 1418 int posix_lock_type;
4f6bcec9
PS
1419
1420 rc = cifs_posix_lock_set(file, flock);
1421 if (!rc || rc < 0)
1422 return rc;
1423
106dc538 1424 if (type & server->vals->shared_lock_type)
08547b03
SF
1425 posix_lock_type = CIFS_RDLCK;
1426 else
1427 posix_lock_type = CIFS_WRLCK;
50c2f753 1428
03776f45 1429 if (unlock == 1)
beb84dc8 1430 posix_lock_type = CIFS_UNLCK;
7ee1af76 1431
f45d3416
PS
1432 rc = CIFSSMBPosixLock(xid, tcon, cfile->fid.netfid,
1433 current->tgid, flock->fl_start, length,
1434 NULL, posix_lock_type, wait_flag);
03776f45
PS
1435 goto out;
1436 }
7ee1af76 1437
03776f45 1438 if (lock) {
161ebf9f
PS
1439 struct cifsLockInfo *lock;
1440
fbd35aca 1441 lock = cifs_lock_init(flock->fl_start, length, type);
161ebf9f
PS
1442 if (!lock)
1443 return -ENOMEM;
1444
fbd35aca 1445 rc = cifs_lock_add_if(cfile, lock, wait_flag);
21cb2d90 1446 if (rc < 0) {
161ebf9f 1447 kfree(lock);
21cb2d90
PS
1448 return rc;
1449 }
1450 if (!rc)
85160e03
PS
1451 goto out;
1452
d39a4f71
PS
1453 rc = server->ops->mand_lock(xid, cfile, flock->fl_start, length,
1454 type, 1, 0, wait_flag);
161ebf9f
PS
1455 if (rc) {
1456 kfree(lock);
21cb2d90 1457 return rc;
03776f45 1458 }
161ebf9f 1459
fbd35aca 1460 cifs_lock_add(cfile, lock);
9ee305b7 1461 } else if (unlock)
d39a4f71 1462 rc = server->ops->mand_unlock_range(cfile, flock, xid);
03776f45 1463
03776f45
PS
1464out:
1465 if (flock->fl_flags & FL_POSIX)
9ebb389d 1466 posix_lock_file_wait(file, flock);
03776f45
PS
1467 return rc;
1468}
1469
1470int cifs_lock(struct file *file, int cmd, struct file_lock *flock)
1471{
1472 int rc, xid;
1473 int lock = 0, unlock = 0;
1474 bool wait_flag = false;
1475 bool posix_lck = false;
1476 struct cifs_sb_info *cifs_sb;
1477 struct cifs_tcon *tcon;
1478 struct cifsInodeInfo *cinode;
1479 struct cifsFileInfo *cfile;
1480 __u16 netfid;
04a6aa8a 1481 __u32 type;
03776f45
PS
1482
1483 rc = -EACCES;
6d5786a3 1484 xid = get_xid();
03776f45
PS
1485
1486 cFYI(1, "Lock parm: 0x%x flockflags: 0x%x flocktype: 0x%x start: %lld "
1487 "end: %lld", cmd, flock->fl_flags, flock->fl_type,
1488 flock->fl_start, flock->fl_end);
1489
03776f45
PS
1490 cfile = (struct cifsFileInfo *)file->private_data;
1491 tcon = tlink_tcon(cfile->tlink);
106dc538
PS
1492
1493 cifs_read_flock(flock, &type, &lock, &unlock, &wait_flag,
1494 tcon->ses->server);
1495
1496 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
4b4de76e 1497 netfid = cfile->fid.netfid;
03776f45
PS
1498 cinode = CIFS_I(file->f_path.dentry->d_inode);
1499
29e20f9c 1500 if (cap_unix(tcon->ses) &&
03776f45
PS
1501 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
1502 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
1503 posix_lck = true;
1504 /*
1505 * BB add code here to normalize offset and length to account for
1506 * negative length which we can not accept over the wire.
1507 */
1508 if (IS_GETLK(cmd)) {
4f6bcec9 1509 rc = cifs_getlk(file, flock, type, wait_flag, posix_lck, xid);
6d5786a3 1510 free_xid(xid);
03776f45
PS
1511 return rc;
1512 }
1513
1514 if (!lock && !unlock) {
1515 /*
1516 * if no lock or unlock then nothing to do since we do not
1517 * know what it is
1518 */
6d5786a3 1519 free_xid(xid);
03776f45 1520 return -EOPNOTSUPP;
7ee1af76
JA
1521 }
1522
03776f45
PS
1523 rc = cifs_setlk(file, flock, type, wait_flag, posix_lck, lock, unlock,
1524 xid);
6d5786a3 1525 free_xid(xid);
1da177e4
LT
1526 return rc;
1527}
1528
597b027f
JL
1529/*
1530 * update the file size (if needed) after a write. Should be called with
1531 * the inode->i_lock held
1532 */
72432ffc 1533void
fbec9ab9
JL
1534cifs_update_eof(struct cifsInodeInfo *cifsi, loff_t offset,
1535 unsigned int bytes_written)
1536{
1537 loff_t end_of_write = offset + bytes_written;
1538
1539 if (end_of_write > cifsi->server_eof)
1540 cifsi->server_eof = end_of_write;
1541}
1542
ba9ad725
PS
1543static ssize_t
1544cifs_write(struct cifsFileInfo *open_file, __u32 pid, const char *write_data,
1545 size_t write_size, loff_t *offset)
1da177e4
LT
1546{
1547 int rc = 0;
1548 unsigned int bytes_written = 0;
1549 unsigned int total_written;
1550 struct cifs_sb_info *cifs_sb;
ba9ad725
PS
1551 struct cifs_tcon *tcon;
1552 struct TCP_Server_Info *server;
6d5786a3 1553 unsigned int xid;
7da4b49a
JL
1554 struct dentry *dentry = open_file->dentry;
1555 struct cifsInodeInfo *cifsi = CIFS_I(dentry->d_inode);
fa2989f4 1556 struct cifs_io_parms io_parms;
1da177e4 1557
7da4b49a 1558 cifs_sb = CIFS_SB(dentry->d_sb);
1da177e4 1559
b6b38f70 1560 cFYI(1, "write %zd bytes to offset %lld of %s", write_size,
ba9ad725 1561 *offset, dentry->d_name.name);
1da177e4 1562
ba9ad725
PS
1563 tcon = tlink_tcon(open_file->tlink);
1564 server = tcon->ses->server;
1565
1566 if (!server->ops->sync_write)
1567 return -ENOSYS;
50c2f753 1568
6d5786a3 1569 xid = get_xid();
1da177e4 1570
1da177e4
LT
1571 for (total_written = 0; write_size > total_written;
1572 total_written += bytes_written) {
1573 rc = -EAGAIN;
1574 while (rc == -EAGAIN) {
ca83ce3d
JL
1575 struct kvec iov[2];
1576 unsigned int len;
1577
1da177e4 1578 if (open_file->invalidHandle) {
1da177e4
LT
1579 /* we could deadlock if we called
1580 filemap_fdatawait from here so tell
fb8c4b14 1581 reopen_file not to flush data to
1da177e4 1582 server now */
15886177 1583 rc = cifs_reopen_file(open_file, false);
1da177e4
LT
1584 if (rc != 0)
1585 break;
1586 }
ca83ce3d
JL
1587
1588 len = min((size_t)cifs_sb->wsize,
1589 write_size - total_written);
1590 /* iov[0] is reserved for smb header */
1591 iov[1].iov_base = (char *)write_data + total_written;
1592 iov[1].iov_len = len;
fa2989f4 1593 io_parms.pid = pid;
ba9ad725
PS
1594 io_parms.tcon = tcon;
1595 io_parms.offset = *offset;
fa2989f4 1596 io_parms.length = len;
ba9ad725
PS
1597 rc = server->ops->sync_write(xid, open_file, &io_parms,
1598 &bytes_written, iov, 1);
1da177e4
LT
1599 }
1600 if (rc || (bytes_written == 0)) {
1601 if (total_written)
1602 break;
1603 else {
6d5786a3 1604 free_xid(xid);
1da177e4
LT
1605 return rc;
1606 }
fbec9ab9 1607 } else {
597b027f 1608 spin_lock(&dentry->d_inode->i_lock);
ba9ad725 1609 cifs_update_eof(cifsi, *offset, bytes_written);
597b027f 1610 spin_unlock(&dentry->d_inode->i_lock);
ba9ad725 1611 *offset += bytes_written;
fbec9ab9 1612 }
1da177e4
LT
1613 }
1614
ba9ad725 1615 cifs_stats_bytes_written(tcon, total_written);
1da177e4 1616
7da4b49a
JL
1617 if (total_written > 0) {
1618 spin_lock(&dentry->d_inode->i_lock);
ba9ad725
PS
1619 if (*offset > dentry->d_inode->i_size)
1620 i_size_write(dentry->d_inode, *offset);
7da4b49a 1621 spin_unlock(&dentry->d_inode->i_lock);
1da177e4 1622 }
7da4b49a 1623 mark_inode_dirty_sync(dentry->d_inode);
6d5786a3 1624 free_xid(xid);
1da177e4
LT
1625 return total_written;
1626}
1627
6508d904
JL
1628struct cifsFileInfo *find_readable_file(struct cifsInodeInfo *cifs_inode,
1629 bool fsuid_only)
630f3f0c
SF
1630{
1631 struct cifsFileInfo *open_file = NULL;
6508d904
JL
1632 struct cifs_sb_info *cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1633
1634 /* only filter by fsuid on multiuser mounts */
1635 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1636 fsuid_only = false;
630f3f0c 1637
4477288a 1638 spin_lock(&cifs_file_list_lock);
630f3f0c
SF
1639 /* we could simply get the first_list_entry since write-only entries
1640 are always at the end of the list but since the first entry might
1641 have a close pending, we go through the whole list */
1642 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
6508d904
JL
1643 if (fsuid_only && open_file->uid != current_fsuid())
1644 continue;
2e396b83 1645 if (OPEN_FMODE(open_file->f_flags) & FMODE_READ) {
630f3f0c
SF
1646 if (!open_file->invalidHandle) {
1647 /* found a good file */
1648 /* lock it so it will not be closed on us */
764a1b1a 1649 cifsFileInfo_get_locked(open_file);
4477288a 1650 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1651 return open_file;
1652 } /* else might as well continue, and look for
1653 another, or simply have the caller reopen it
1654 again rather than trying to fix this handle */
1655 } else /* write only file */
1656 break; /* write only files are last so must be done */
1657 }
4477288a 1658 spin_unlock(&cifs_file_list_lock);
630f3f0c
SF
1659 return NULL;
1660}
630f3f0c 1661
6508d904
JL
1662struct cifsFileInfo *find_writable_file(struct cifsInodeInfo *cifs_inode,
1663 bool fsuid_only)
6148a742 1664{
2c0c2a08 1665 struct cifsFileInfo *open_file, *inv_file = NULL;
d3892294 1666 struct cifs_sb_info *cifs_sb;
2846d386 1667 bool any_available = false;
dd99cd80 1668 int rc;
2c0c2a08 1669 unsigned int refind = 0;
6148a742 1670
60808233
SF
1671 /* Having a null inode here (because mapping->host was set to zero by
1672 the VFS or MM) should not happen but we had reports of on oops (due to
1673 it being zero) during stress testcases so we need to check for it */
1674
fb8c4b14 1675 if (cifs_inode == NULL) {
b6b38f70 1676 cERROR(1, "Null inode passed to cifs_writeable_file");
60808233
SF
1677 dump_stack();
1678 return NULL;
1679 }
1680
d3892294
JL
1681 cifs_sb = CIFS_SB(cifs_inode->vfs_inode.i_sb);
1682
6508d904
JL
1683 /* only filter by fsuid on multiuser mounts */
1684 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MULTIUSER))
1685 fsuid_only = false;
1686
4477288a 1687 spin_lock(&cifs_file_list_lock);
9b22b0b7 1688refind_writable:
2c0c2a08
SP
1689 if (refind > MAX_REOPEN_ATT) {
1690 spin_unlock(&cifs_file_list_lock);
1691 return NULL;
1692 }
6148a742 1693 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
6508d904
JL
1694 if (!any_available && open_file->pid != current->tgid)
1695 continue;
1696 if (fsuid_only && open_file->uid != current_fsuid())
6148a742 1697 continue;
2e396b83 1698 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
9b22b0b7
SF
1699 if (!open_file->invalidHandle) {
1700 /* found a good writable file */
764a1b1a 1701 cifsFileInfo_get_locked(open_file);
4477288a 1702 spin_unlock(&cifs_file_list_lock);
9b22b0b7 1703 return open_file;
2c0c2a08
SP
1704 } else {
1705 if (!inv_file)
1706 inv_file = open_file;
9b22b0b7 1707 }
6148a742
SF
1708 }
1709 }
2846d386
JL
1710 /* couldn't find useable FH with same pid, try any available */
1711 if (!any_available) {
1712 any_available = true;
1713 goto refind_writable;
1714 }
2c0c2a08
SP
1715
1716 if (inv_file) {
1717 any_available = false;
764a1b1a 1718 cifsFileInfo_get_locked(inv_file);
2c0c2a08
SP
1719 }
1720
4477288a 1721 spin_unlock(&cifs_file_list_lock);
2c0c2a08
SP
1722
1723 if (inv_file) {
1724 rc = cifs_reopen_file(inv_file, false);
1725 if (!rc)
1726 return inv_file;
1727 else {
1728 spin_lock(&cifs_file_list_lock);
1729 list_move_tail(&inv_file->flist,
1730 &cifs_inode->openFileList);
1731 spin_unlock(&cifs_file_list_lock);
1732 cifsFileInfo_put(inv_file);
1733 spin_lock(&cifs_file_list_lock);
1734 ++refind;
1735 goto refind_writable;
1736 }
1737 }
1738
6148a742
SF
1739 return NULL;
1740}
1741
1da177e4
LT
1742static int cifs_partialpagewrite(struct page *page, unsigned from, unsigned to)
1743{
1744 struct address_space *mapping = page->mapping;
1745 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
1746 char *write_data;
1747 int rc = -EFAULT;
1748 int bytes_written = 0;
1da177e4 1749 struct inode *inode;
6148a742 1750 struct cifsFileInfo *open_file;
1da177e4
LT
1751
1752 if (!mapping || !mapping->host)
1753 return -EFAULT;
1754
1755 inode = page->mapping->host;
1da177e4
LT
1756
1757 offset += (loff_t)from;
1758 write_data = kmap(page);
1759 write_data += from;
1760
1761 if ((to > PAGE_CACHE_SIZE) || (from > to)) {
1762 kunmap(page);
1763 return -EIO;
1764 }
1765
1766 /* racing with truncate? */
1767 if (offset > mapping->host->i_size) {
1768 kunmap(page);
1769 return 0; /* don't care */
1770 }
1771
1772 /* check to make sure that we are not extending the file */
1773 if (mapping->host->i_size - offset < (loff_t)to)
fb8c4b14 1774 to = (unsigned)(mapping->host->i_size - offset);
1da177e4 1775
6508d904 1776 open_file = find_writable_file(CIFS_I(mapping->host), false);
6148a742 1777 if (open_file) {
fa2989f4
PS
1778 bytes_written = cifs_write(open_file, open_file->pid,
1779 write_data, to - from, &offset);
6ab409b5 1780 cifsFileInfo_put(open_file);
1da177e4 1781 /* Does mm or vfs already set times? */
6148a742 1782 inode->i_atime = inode->i_mtime = current_fs_time(inode->i_sb);
bb5a9a04 1783 if ((bytes_written > 0) && (offset))
6148a742 1784 rc = 0;
bb5a9a04
SF
1785 else if (bytes_written < 0)
1786 rc = bytes_written;
6148a742 1787 } else {
b6b38f70 1788 cFYI(1, "No writeable filehandles for inode");
1da177e4
LT
1789 rc = -EIO;
1790 }
1791
1792 kunmap(page);
1793 return rc;
1794}
1795
1da177e4 1796static int cifs_writepages(struct address_space *mapping,
37c0eb46 1797 struct writeback_control *wbc)
1da177e4 1798{
c3d17b63
JL
1799 struct cifs_sb_info *cifs_sb = CIFS_SB(mapping->host->i_sb);
1800 bool done = false, scanned = false, range_whole = false;
1801 pgoff_t end, index;
1802 struct cifs_writedata *wdata;
c9de5c80 1803 struct TCP_Server_Info *server;
37c0eb46 1804 struct page *page;
37c0eb46 1805 int rc = 0;
50c2f753 1806
37c0eb46 1807 /*
c3d17b63 1808 * If wsize is smaller than the page cache size, default to writing
37c0eb46
SF
1809 * one page at a time via cifs_writepage
1810 */
1811 if (cifs_sb->wsize < PAGE_CACHE_SIZE)
1812 return generic_writepages(mapping, wbc);
1813
111ebb6e 1814 if (wbc->range_cyclic) {
37c0eb46 1815 index = mapping->writeback_index; /* Start from prev offset */
111ebb6e
OH
1816 end = -1;
1817 } else {
1818 index = wbc->range_start >> PAGE_CACHE_SHIFT;
1819 end = wbc->range_end >> PAGE_CACHE_SHIFT;
1820 if (wbc->range_start == 0 && wbc->range_end == LLONG_MAX)
c3d17b63
JL
1821 range_whole = true;
1822 scanned = true;
37c0eb46
SF
1823 }
1824retry:
c3d17b63
JL
1825 while (!done && index <= end) {
1826 unsigned int i, nr_pages, found_pages;
1827 pgoff_t next = 0, tofind;
1828 struct page **pages;
1829
1830 tofind = min((cifs_sb->wsize / PAGE_CACHE_SIZE) - 1,
1831 end - index) + 1;
1832
c2e87640
JL
1833 wdata = cifs_writedata_alloc((unsigned int)tofind,
1834 cifs_writev_complete);
c3d17b63
JL
1835 if (!wdata) {
1836 rc = -ENOMEM;
1837 break;
1838 }
1839
1840 /*
1841 * find_get_pages_tag seems to return a max of 256 on each
1842 * iteration, so we must call it several times in order to
1843 * fill the array or the wsize is effectively limited to
1844 * 256 * PAGE_CACHE_SIZE.
1845 */
1846 found_pages = 0;
1847 pages = wdata->pages;
1848 do {
1849 nr_pages = find_get_pages_tag(mapping, &index,
1850 PAGECACHE_TAG_DIRTY,
1851 tofind, pages);
1852 found_pages += nr_pages;
1853 tofind -= nr_pages;
1854 pages += nr_pages;
1855 } while (nr_pages && tofind && index <= end);
1856
1857 if (found_pages == 0) {
1858 kref_put(&wdata->refcount, cifs_writedata_release);
1859 break;
1860 }
1861
1862 nr_pages = 0;
1863 for (i = 0; i < found_pages; i++) {
1864 page = wdata->pages[i];
37c0eb46
SF
1865 /*
1866 * At this point we hold neither mapping->tree_lock nor
1867 * lock on the page itself: the page may be truncated or
1868 * invalidated (changing page->mapping to NULL), or even
1869 * swizzled back from swapper_space to tmpfs file
1870 * mapping
1871 */
1872
c3d17b63 1873 if (nr_pages == 0)
37c0eb46 1874 lock_page(page);
529ae9aa 1875 else if (!trylock_page(page))
37c0eb46
SF
1876 break;
1877
1878 if (unlikely(page->mapping != mapping)) {
1879 unlock_page(page);
1880 break;
1881 }
1882
111ebb6e 1883 if (!wbc->range_cyclic && page->index > end) {
c3d17b63 1884 done = true;
37c0eb46
SF
1885 unlock_page(page);
1886 break;
1887 }
1888
1889 if (next && (page->index != next)) {
1890 /* Not next consecutive page */
1891 unlock_page(page);
1892 break;
1893 }
1894
1895 if (wbc->sync_mode != WB_SYNC_NONE)
1896 wait_on_page_writeback(page);
1897
1898 if (PageWriteback(page) ||
cb876f45 1899 !clear_page_dirty_for_io(page)) {
37c0eb46
SF
1900 unlock_page(page);
1901 break;
1902 }
84d2f07e 1903
cb876f45
LT
1904 /*
1905 * This actually clears the dirty bit in the radix tree.
1906 * See cifs_writepage() for more commentary.
1907 */
1908 set_page_writeback(page);
1909
3a98b861 1910 if (page_offset(page) >= i_size_read(mapping->host)) {
c3d17b63 1911 done = true;
84d2f07e 1912 unlock_page(page);
cb876f45 1913 end_page_writeback(page);
84d2f07e
SF
1914 break;
1915 }
1916
c3d17b63
JL
1917 wdata->pages[i] = page;
1918 next = page->index + 1;
1919 ++nr_pages;
1920 }
37c0eb46 1921
c3d17b63
JL
1922 /* reset index to refind any pages skipped */
1923 if (nr_pages == 0)
1924 index = wdata->pages[0]->index + 1;
84d2f07e 1925
c3d17b63
JL
1926 /* put any pages we aren't going to use */
1927 for (i = nr_pages; i < found_pages; i++) {
1928 page_cache_release(wdata->pages[i]);
1929 wdata->pages[i] = NULL;
1930 }
37c0eb46 1931
c3d17b63
JL
1932 /* nothing to write? */
1933 if (nr_pages == 0) {
1934 kref_put(&wdata->refcount, cifs_writedata_release);
1935 continue;
37c0eb46 1936 }
fbec9ab9 1937
c3d17b63
JL
1938 wdata->sync_mode = wbc->sync_mode;
1939 wdata->nr_pages = nr_pages;
1940 wdata->offset = page_offset(wdata->pages[0]);
eddb079d
JL
1941 wdata->pagesz = PAGE_CACHE_SIZE;
1942 wdata->tailsz =
3a98b861
JL
1943 min(i_size_read(mapping->host) -
1944 page_offset(wdata->pages[nr_pages - 1]),
eddb079d
JL
1945 (loff_t)PAGE_CACHE_SIZE);
1946 wdata->bytes = ((nr_pages - 1) * PAGE_CACHE_SIZE) +
1947 wdata->tailsz;
941b853d 1948
c3d17b63
JL
1949 do {
1950 if (wdata->cfile != NULL)
1951 cifsFileInfo_put(wdata->cfile);
1952 wdata->cfile = find_writable_file(CIFS_I(mapping->host),
1953 false);
1954 if (!wdata->cfile) {
1955 cERROR(1, "No writable handles for inode");
1956 rc = -EBADF;
1957 break;
941b853d 1958 }
fe5f5d2e 1959 wdata->pid = wdata->cfile->pid;
c9de5c80
PS
1960 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
1961 rc = server->ops->async_writev(wdata);
c3d17b63 1962 } while (wbc->sync_mode == WB_SYNC_ALL && rc == -EAGAIN);
941b853d 1963
c3d17b63
JL
1964 for (i = 0; i < nr_pages; ++i)
1965 unlock_page(wdata->pages[i]);
f3983c21 1966
c3d17b63
JL
1967 /* send failure -- clean up the mess */
1968 if (rc != 0) {
1969 for (i = 0; i < nr_pages; ++i) {
941b853d 1970 if (rc == -EAGAIN)
c3d17b63
JL
1971 redirty_page_for_writepage(wbc,
1972 wdata->pages[i]);
1973 else
1974 SetPageError(wdata->pages[i]);
1975 end_page_writeback(wdata->pages[i]);
1976 page_cache_release(wdata->pages[i]);
37c0eb46 1977 }
941b853d
JL
1978 if (rc != -EAGAIN)
1979 mapping_set_error(mapping, rc);
c3d17b63
JL
1980 }
1981 kref_put(&wdata->refcount, cifs_writedata_release);
941b853d 1982
c3d17b63
JL
1983 wbc->nr_to_write -= nr_pages;
1984 if (wbc->nr_to_write <= 0)
1985 done = true;
b066a48c 1986
c3d17b63 1987 index = next;
37c0eb46 1988 }
c3d17b63 1989
37c0eb46
SF
1990 if (!scanned && !done) {
1991 /*
1992 * We hit the last page and there is more work to be done: wrap
1993 * back to the start of the file
1994 */
c3d17b63 1995 scanned = true;
37c0eb46
SF
1996 index = 0;
1997 goto retry;
1998 }
c3d17b63 1999
111ebb6e 2000 if (wbc->range_cyclic || (range_whole && wbc->nr_to_write > 0))
37c0eb46
SF
2001 mapping->writeback_index = index;
2002
1da177e4
LT
2003 return rc;
2004}
1da177e4 2005
9ad1506b
PS
2006static int
2007cifs_writepage_locked(struct page *page, struct writeback_control *wbc)
1da177e4 2008{
9ad1506b 2009 int rc;
6d5786a3 2010 unsigned int xid;
1da177e4 2011
6d5786a3 2012 xid = get_xid();
1da177e4
LT
2013/* BB add check for wbc flags */
2014 page_cache_get(page);
ad7a2926 2015 if (!PageUptodate(page))
b6b38f70 2016 cFYI(1, "ppw - page not up to date");
cb876f45
LT
2017
2018 /*
2019 * Set the "writeback" flag, and clear "dirty" in the radix tree.
2020 *
2021 * A writepage() implementation always needs to do either this,
2022 * or re-dirty the page with "redirty_page_for_writepage()" in
2023 * the case of a failure.
2024 *
2025 * Just unlocking the page will cause the radix tree tag-bits
2026 * to fail to update with the state of the page correctly.
2027 */
fb8c4b14 2028 set_page_writeback(page);
9ad1506b 2029retry_write:
1da177e4 2030 rc = cifs_partialpagewrite(page, 0, PAGE_CACHE_SIZE);
9ad1506b
PS
2031 if (rc == -EAGAIN && wbc->sync_mode == WB_SYNC_ALL)
2032 goto retry_write;
2033 else if (rc == -EAGAIN)
2034 redirty_page_for_writepage(wbc, page);
2035 else if (rc != 0)
2036 SetPageError(page);
2037 else
2038 SetPageUptodate(page);
cb876f45
LT
2039 end_page_writeback(page);
2040 page_cache_release(page);
6d5786a3 2041 free_xid(xid);
1da177e4
LT
2042 return rc;
2043}
2044
9ad1506b
PS
2045static int cifs_writepage(struct page *page, struct writeback_control *wbc)
2046{
2047 int rc = cifs_writepage_locked(page, wbc);
2048 unlock_page(page);
2049 return rc;
2050}
2051
d9414774
NP
2052static int cifs_write_end(struct file *file, struct address_space *mapping,
2053 loff_t pos, unsigned len, unsigned copied,
2054 struct page *page, void *fsdata)
1da177e4 2055{
d9414774
NP
2056 int rc;
2057 struct inode *inode = mapping->host;
d4ffff1f
PS
2058 struct cifsFileInfo *cfile = file->private_data;
2059 struct cifs_sb_info *cifs_sb = CIFS_SB(cfile->dentry->d_sb);
2060 __u32 pid;
2061
2062 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2063 pid = cfile->pid;
2064 else
2065 pid = current->tgid;
1da177e4 2066
b6b38f70
JP
2067 cFYI(1, "write_end for page %p from pos %lld with %d bytes",
2068 page, pos, copied);
d9414774 2069
a98ee8c1
JL
2070 if (PageChecked(page)) {
2071 if (copied == len)
2072 SetPageUptodate(page);
2073 ClearPageChecked(page);
2074 } else if (!PageUptodate(page) && copied == PAGE_CACHE_SIZE)
d9414774 2075 SetPageUptodate(page);
ad7a2926 2076
1da177e4 2077 if (!PageUptodate(page)) {
d9414774
NP
2078 char *page_data;
2079 unsigned offset = pos & (PAGE_CACHE_SIZE - 1);
6d5786a3 2080 unsigned int xid;
d9414774 2081
6d5786a3 2082 xid = get_xid();
1da177e4
LT
2083 /* this is probably better than directly calling
2084 partialpage_write since in this function the file handle is
2085 known which we might as well leverage */
2086 /* BB check if anything else missing out of ppw
2087 such as updating last write time */
2088 page_data = kmap(page);
d4ffff1f 2089 rc = cifs_write(cfile, pid, page_data + offset, copied, &pos);
d9414774 2090 /* if (rc < 0) should we set writebehind rc? */
1da177e4 2091 kunmap(page);
d9414774 2092
6d5786a3 2093 free_xid(xid);
fb8c4b14 2094 } else {
d9414774
NP
2095 rc = copied;
2096 pos += copied;
1da177e4
LT
2097 set_page_dirty(page);
2098 }
2099
d9414774
NP
2100 if (rc > 0) {
2101 spin_lock(&inode->i_lock);
2102 if (pos > inode->i_size)
2103 i_size_write(inode, pos);
2104 spin_unlock(&inode->i_lock);
2105 }
2106
2107 unlock_page(page);
2108 page_cache_release(page);
2109
1da177e4
LT
2110 return rc;
2111}
2112
02c24a82
JB
2113int cifs_strict_fsync(struct file *file, loff_t start, loff_t end,
2114 int datasync)
1da177e4 2115{
6d5786a3 2116 unsigned int xid;
1da177e4 2117 int rc = 0;
96daf2b0 2118 struct cifs_tcon *tcon;
1d8c4c00 2119 struct TCP_Server_Info *server;
c21dfb69 2120 struct cifsFileInfo *smbfile = file->private_data;
e6a00296 2121 struct inode *inode = file->f_path.dentry->d_inode;
8be7e6ba 2122 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
1da177e4 2123
02c24a82
JB
2124 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2125 if (rc)
2126 return rc;
2127 mutex_lock(&inode->i_mutex);
2128
6d5786a3 2129 xid = get_xid();
1da177e4 2130
b6b38f70 2131 cFYI(1, "Sync file - name: %s datasync: 0x%x",
7ea80859 2132 file->f_path.dentry->d_name.name, datasync);
50c2f753 2133
6feb9891
PS
2134 if (!CIFS_I(inode)->clientCanCacheRead) {
2135 rc = cifs_invalidate_mapping(inode);
2136 if (rc) {
2137 cFYI(1, "rc: %d during invalidate phase", rc);
2138 rc = 0; /* don't care about it in fsync */
2139 }
2140 }
eb4b756b 2141
8be7e6ba 2142 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2143 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2144 server = tcon->ses->server;
2145 if (server->ops->flush)
2146 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2147 else
2148 rc = -ENOSYS;
2149 }
8be7e6ba 2150
6d5786a3 2151 free_xid(xid);
02c24a82 2152 mutex_unlock(&inode->i_mutex);
8be7e6ba
PS
2153 return rc;
2154}
2155
02c24a82 2156int cifs_fsync(struct file *file, loff_t start, loff_t end, int datasync)
8be7e6ba 2157{
6d5786a3 2158 unsigned int xid;
8be7e6ba 2159 int rc = 0;
96daf2b0 2160 struct cifs_tcon *tcon;
1d8c4c00 2161 struct TCP_Server_Info *server;
8be7e6ba
PS
2162 struct cifsFileInfo *smbfile = file->private_data;
2163 struct cifs_sb_info *cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
02c24a82
JB
2164 struct inode *inode = file->f_mapping->host;
2165
2166 rc = filemap_write_and_wait_range(inode->i_mapping, start, end);
2167 if (rc)
2168 return rc;
2169 mutex_lock(&inode->i_mutex);
8be7e6ba 2170
6d5786a3 2171 xid = get_xid();
8be7e6ba
PS
2172
2173 cFYI(1, "Sync file - name: %s datasync: 0x%x",
2174 file->f_path.dentry->d_name.name, datasync);
2175
2176 tcon = tlink_tcon(smbfile->tlink);
1d8c4c00
PS
2177 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOSSYNC)) {
2178 server = tcon->ses->server;
2179 if (server->ops->flush)
2180 rc = server->ops->flush(xid, tcon, &smbfile->fid);
2181 else
2182 rc = -ENOSYS;
2183 }
b298f223 2184
6d5786a3 2185 free_xid(xid);
02c24a82 2186 mutex_unlock(&inode->i_mutex);
1da177e4
LT
2187 return rc;
2188}
2189
1da177e4
LT
2190/*
2191 * As file closes, flush all cached write data for this inode checking
2192 * for write behind errors.
2193 */
75e1fcc0 2194int cifs_flush(struct file *file, fl_owner_t id)
1da177e4 2195{
fb8c4b14 2196 struct inode *inode = file->f_path.dentry->d_inode;
1da177e4
LT
2197 int rc = 0;
2198
eb4b756b 2199 if (file->f_mode & FMODE_WRITE)
d3f1322a 2200 rc = filemap_write_and_wait(inode->i_mapping);
50c2f753 2201
b6b38f70 2202 cFYI(1, "Flush inode %p file %p rc %d", inode, file, rc);
1da177e4
LT
2203
2204 return rc;
2205}
2206
72432ffc
PS
2207static int
2208cifs_write_allocate_pages(struct page **pages, unsigned long num_pages)
2209{
2210 int rc = 0;
2211 unsigned long i;
2212
2213 for (i = 0; i < num_pages; i++) {
e94f7ba1 2214 pages[i] = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
72432ffc
PS
2215 if (!pages[i]) {
2216 /*
2217 * save number of pages we have already allocated and
2218 * return with ENOMEM error
2219 */
2220 num_pages = i;
2221 rc = -ENOMEM;
e94f7ba1 2222 break;
72432ffc
PS
2223 }
2224 }
2225
e94f7ba1
JL
2226 if (rc) {
2227 for (i = 0; i < num_pages; i++)
2228 put_page(pages[i]);
2229 }
72432ffc
PS
2230 return rc;
2231}
2232
2233static inline
2234size_t get_numpages(const size_t wsize, const size_t len, size_t *cur_len)
2235{
2236 size_t num_pages;
2237 size_t clen;
2238
2239 clen = min_t(const size_t, len, wsize);
a7103b99 2240 num_pages = DIV_ROUND_UP(clen, PAGE_SIZE);
72432ffc
PS
2241
2242 if (cur_len)
2243 *cur_len = clen;
2244
2245 return num_pages;
2246}
2247
da82f7e7
JL
2248static void
2249cifs_uncached_writev_complete(struct work_struct *work)
2250{
2251 int i;
2252 struct cifs_writedata *wdata = container_of(work,
2253 struct cifs_writedata, work);
2254 struct inode *inode = wdata->cfile->dentry->d_inode;
2255 struct cifsInodeInfo *cifsi = CIFS_I(inode);
2256
2257 spin_lock(&inode->i_lock);
2258 cifs_update_eof(cifsi, wdata->offset, wdata->bytes);
2259 if (cifsi->server_eof > inode->i_size)
2260 i_size_write(inode, cifsi->server_eof);
2261 spin_unlock(&inode->i_lock);
2262
2263 complete(&wdata->done);
2264
2265 if (wdata->result != -EAGAIN) {
2266 for (i = 0; i < wdata->nr_pages; i++)
2267 put_page(wdata->pages[i]);
2268 }
2269
2270 kref_put(&wdata->refcount, cifs_writedata_release);
2271}
2272
2273/* attempt to send write to server, retry on any -EAGAIN errors */
2274static int
2275cifs_uncached_retry_writev(struct cifs_writedata *wdata)
2276{
2277 int rc;
c9de5c80
PS
2278 struct TCP_Server_Info *server;
2279
2280 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
da82f7e7
JL
2281
2282 do {
2283 if (wdata->cfile->invalidHandle) {
2284 rc = cifs_reopen_file(wdata->cfile, false);
2285 if (rc != 0)
2286 continue;
2287 }
c9de5c80 2288 rc = server->ops->async_writev(wdata);
da82f7e7
JL
2289 } while (rc == -EAGAIN);
2290
2291 return rc;
2292}
2293
72432ffc
PS
2294static ssize_t
2295cifs_iovec_write(struct file *file, const struct iovec *iov,
2296 unsigned long nr_segs, loff_t *poffset)
2297{
da82f7e7 2298 unsigned long nr_pages, i;
76429c14
PS
2299 size_t copied, len, cur_len;
2300 ssize_t total_written = 0;
3af9d8f2 2301 loff_t offset;
72432ffc 2302 struct iov_iter it;
72432ffc 2303 struct cifsFileInfo *open_file;
da82f7e7 2304 struct cifs_tcon *tcon;
72432ffc 2305 struct cifs_sb_info *cifs_sb;
da82f7e7
JL
2306 struct cifs_writedata *wdata, *tmp;
2307 struct list_head wdata_list;
2308 int rc;
2309 pid_t pid;
72432ffc
PS
2310
2311 len = iov_length(iov, nr_segs);
2312 if (!len)
2313 return 0;
2314
2315 rc = generic_write_checks(file, poffset, &len, 0);
2316 if (rc)
2317 return rc;
2318
da82f7e7 2319 INIT_LIST_HEAD(&wdata_list);
72432ffc 2320 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
72432ffc 2321 open_file = file->private_data;
da82f7e7 2322 tcon = tlink_tcon(open_file->tlink);
c9de5c80
PS
2323
2324 if (!tcon->ses->server->ops->async_writev)
2325 return -ENOSYS;
2326
3af9d8f2 2327 offset = *poffset;
d4ffff1f
PS
2328
2329 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2330 pid = open_file->pid;
2331 else
2332 pid = current->tgid;
2333
72432ffc 2334 iov_iter_init(&it, iov, nr_segs, len, 0);
72432ffc 2335 do {
da82f7e7
JL
2336 size_t save_len;
2337
2338 nr_pages = get_numpages(cifs_sb->wsize, len, &cur_len);
2339 wdata = cifs_writedata_alloc(nr_pages,
2340 cifs_uncached_writev_complete);
2341 if (!wdata) {
2342 rc = -ENOMEM;
2343 break;
2344 }
2345
2346 rc = cifs_write_allocate_pages(wdata->pages, nr_pages);
2347 if (rc) {
2348 kfree(wdata);
2349 break;
2350 }
2351
2352 save_len = cur_len;
2353 for (i = 0; i < nr_pages; i++) {
2354 copied = min_t(const size_t, cur_len, PAGE_SIZE);
2355 copied = iov_iter_copy_from_user(wdata->pages[i], &it,
2356 0, copied);
72432ffc
PS
2357 cur_len -= copied;
2358 iov_iter_advance(&it, copied);
72432ffc 2359 }
72432ffc
PS
2360 cur_len = save_len - cur_len;
2361
da82f7e7
JL
2362 wdata->sync_mode = WB_SYNC_ALL;
2363 wdata->nr_pages = nr_pages;
2364 wdata->offset = (__u64)offset;
2365 wdata->cfile = cifsFileInfo_get(open_file);
2366 wdata->pid = pid;
2367 wdata->bytes = cur_len;
eddb079d
JL
2368 wdata->pagesz = PAGE_SIZE;
2369 wdata->tailsz = cur_len - ((nr_pages - 1) * PAGE_SIZE);
da82f7e7
JL
2370 rc = cifs_uncached_retry_writev(wdata);
2371 if (rc) {
2372 kref_put(&wdata->refcount, cifs_writedata_release);
72432ffc
PS
2373 break;
2374 }
2375
da82f7e7
JL
2376 list_add_tail(&wdata->list, &wdata_list);
2377 offset += cur_len;
2378 len -= cur_len;
72432ffc
PS
2379 } while (len > 0);
2380
da82f7e7
JL
2381 /*
2382 * If at least one write was successfully sent, then discard any rc
2383 * value from the later writes. If the other write succeeds, then
2384 * we'll end up returning whatever was written. If it fails, then
2385 * we'll get a new rc value from that.
2386 */
2387 if (!list_empty(&wdata_list))
2388 rc = 0;
2389
2390 /*
2391 * Wait for and collect replies for any successful sends in order of
2392 * increasing offset. Once an error is hit or we get a fatal signal
2393 * while waiting, then return without waiting for any more replies.
2394 */
2395restart_loop:
2396 list_for_each_entry_safe(wdata, tmp, &wdata_list, list) {
2397 if (!rc) {
2398 /* FIXME: freezable too? */
2399 rc = wait_for_completion_killable(&wdata->done);
2400 if (rc)
2401 rc = -EINTR;
2402 else if (wdata->result)
2403 rc = wdata->result;
2404 else
2405 total_written += wdata->bytes;
2406
2407 /* resend call if it's a retryable error */
2408 if (rc == -EAGAIN) {
2409 rc = cifs_uncached_retry_writev(wdata);
2410 goto restart_loop;
2411 }
2412 }
2413 list_del_init(&wdata->list);
2414 kref_put(&wdata->refcount, cifs_writedata_release);
72432ffc
PS
2415 }
2416
da82f7e7
JL
2417 if (total_written > 0)
2418 *poffset += total_written;
72432ffc 2419
da82f7e7
JL
2420 cifs_stats_bytes_written(tcon, total_written);
2421 return total_written ? total_written : (ssize_t)rc;
72432ffc
PS
2422}
2423
0b81c1c4 2424ssize_t cifs_user_writev(struct kiocb *iocb, const struct iovec *iov,
72432ffc
PS
2425 unsigned long nr_segs, loff_t pos)
2426{
2427 ssize_t written;
2428 struct inode *inode;
2429
2430 inode = iocb->ki_filp->f_path.dentry->d_inode;
2431
2432 /*
2433 * BB - optimize the way when signing is disabled. We can drop this
2434 * extra memory-to-memory copying and use iovec buffers for constructing
2435 * write request.
2436 */
2437
2438 written = cifs_iovec_write(iocb->ki_filp, iov, nr_segs, &pos);
2439 if (written > 0) {
2440 CIFS_I(inode)->invalid_mapping = true;
2441 iocb->ki_pos = pos;
2442 }
2443
2444 return written;
2445}
2446
579f9053
PS
2447static ssize_t
2448cifs_writev(struct kiocb *iocb, const struct iovec *iov,
2449 unsigned long nr_segs, loff_t pos)
72432ffc 2450{
579f9053
PS
2451 struct file *file = iocb->ki_filp;
2452 struct cifsFileInfo *cfile = (struct cifsFileInfo *)file->private_data;
2453 struct inode *inode = file->f_mapping->host;
2454 struct cifsInodeInfo *cinode = CIFS_I(inode);
2455 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server;
2456 ssize_t rc = -EACCES;
72432ffc 2457
579f9053 2458 BUG_ON(iocb->ki_pos != pos);
72432ffc 2459
579f9053
PS
2460 sb_start_write(inode->i_sb);
2461
2462 /*
2463 * We need to hold the sem to be sure nobody modifies lock list
2464 * with a brlock that prevents writing.
2465 */
2466 down_read(&cinode->lock_sem);
2467 if (!cifs_find_lock_conflict(cfile, pos, iov_length(iov, nr_segs),
2468 server->vals->exclusive_lock_type, NULL,
2469 true)) {
2470 mutex_lock(&inode->i_mutex);
2471 rc = __generic_file_aio_write(iocb, iov, nr_segs,
2472 &iocb->ki_pos);
2473 mutex_unlock(&inode->i_mutex);
2474 }
2475
2476 if (rc > 0 || rc == -EIOCBQUEUED) {
2477 ssize_t err;
2478
2479 err = generic_write_sync(file, pos, rc);
2480 if (err < 0 && rc > 0)
2481 rc = err;
2482 }
2483
2484 up_read(&cinode->lock_sem);
2485 sb_end_write(inode->i_sb);
2486 return rc;
2487}
2488
2489ssize_t
2490cifs_strict_writev(struct kiocb *iocb, const struct iovec *iov,
2491 unsigned long nr_segs, loff_t pos)
2492{
2493 struct inode *inode = iocb->ki_filp->f_path.dentry->d_inode;
2494 struct cifsInodeInfo *cinode = CIFS_I(inode);
2495 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
2496 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
2497 iocb->ki_filp->private_data;
2498 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
72432ffc 2499
25078105 2500#ifdef CONFIG_CIFS_SMB2
72432ffc 2501 /*
25078105
PS
2502 * If we have an oplock for read and want to write a data to the file
2503 * we need to store it in the page cache and then push it to the server
2504 * to be sure the next read will get a valid data.
2505 */
2506 if (!cinode->clientCanCacheAll && cinode->clientCanCacheRead) {
2507 ssize_t written;
2508 int rc;
2509
2510 written = generic_file_aio_write(iocb, iov, nr_segs, pos);
2511 rc = filemap_fdatawrite(inode->i_mapping);
2512 if (rc)
2513 return (ssize_t)rc;
2514
2515 return written;
2516 }
2517#endif
2518
2519 /*
2520 * For non-oplocked files in strict cache mode we need to write the data
2521 * to the server exactly from the pos to pos+len-1 rather than flush all
2522 * affected pages because it may cause a error with mandatory locks on
2523 * these pages but not on the region from pos to ppos+len-1.
72432ffc
PS
2524 */
2525
579f9053
PS
2526 if (!cinode->clientCanCacheAll)
2527 return cifs_user_writev(iocb, iov, nr_segs, pos);
2528
2529 if (cap_unix(tcon->ses) &&
2530 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
2531 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
2532 return generic_file_aio_write(iocb, iov, nr_segs, pos);
2533
2534 return cifs_writev(iocb, iov, nr_segs, pos);
72432ffc
PS
2535}
2536
0471ca3f 2537static struct cifs_readdata *
f4e49cd2 2538cifs_readdata_alloc(unsigned int nr_pages, work_func_t complete)
0471ca3f
JL
2539{
2540 struct cifs_readdata *rdata;
f4e49cd2 2541
c5fab6f4
JL
2542 rdata = kzalloc(sizeof(*rdata) + (sizeof(struct page *) * nr_pages),
2543 GFP_KERNEL);
0471ca3f 2544 if (rdata != NULL) {
6993f74a 2545 kref_init(&rdata->refcount);
1c892549
JL
2546 INIT_LIST_HEAD(&rdata->list);
2547 init_completion(&rdata->done);
0471ca3f 2548 INIT_WORK(&rdata->work, complete);
0471ca3f 2549 }
f4e49cd2 2550
0471ca3f
JL
2551 return rdata;
2552}
2553
6993f74a
JL
2554void
2555cifs_readdata_release(struct kref *refcount)
0471ca3f 2556{
6993f74a
JL
2557 struct cifs_readdata *rdata = container_of(refcount,
2558 struct cifs_readdata, refcount);
2559
2560 if (rdata->cfile)
2561 cifsFileInfo_put(rdata->cfile);
2562
0471ca3f
JL
2563 kfree(rdata);
2564}
2565
1c892549 2566static int
c5fab6f4 2567cifs_read_allocate_pages(struct cifs_readdata *rdata, unsigned int nr_pages)
1c892549
JL
2568{
2569 int rc = 0;
c5fab6f4 2570 struct page *page;
1c892549
JL
2571 unsigned int i;
2572
c5fab6f4 2573 for (i = 0; i < nr_pages; i++) {
1c892549
JL
2574 page = alloc_page(GFP_KERNEL|__GFP_HIGHMEM);
2575 if (!page) {
2576 rc = -ENOMEM;
2577 break;
2578 }
c5fab6f4 2579 rdata->pages[i] = page;
1c892549
JL
2580 }
2581
2582 if (rc) {
c5fab6f4
JL
2583 for (i = 0; i < nr_pages; i++) {
2584 put_page(rdata->pages[i]);
2585 rdata->pages[i] = NULL;
1c892549
JL
2586 }
2587 }
2588 return rc;
2589}
2590
2591static void
2592cifs_uncached_readdata_release(struct kref *refcount)
2593{
1c892549
JL
2594 struct cifs_readdata *rdata = container_of(refcount,
2595 struct cifs_readdata, refcount);
c5fab6f4 2596 unsigned int i;
1c892549 2597
c5fab6f4
JL
2598 for (i = 0; i < rdata->nr_pages; i++) {
2599 put_page(rdata->pages[i]);
2600 rdata->pages[i] = NULL;
1c892549
JL
2601 }
2602 cifs_readdata_release(refcount);
2603}
2604
2a1bb138
JL
2605static int
2606cifs_retry_async_readv(struct cifs_readdata *rdata)
2607{
2608 int rc;
fc9c5966
PS
2609 struct TCP_Server_Info *server;
2610
2611 server = tlink_tcon(rdata->cfile->tlink)->ses->server;
2a1bb138
JL
2612
2613 do {
2614 if (rdata->cfile->invalidHandle) {
2615 rc = cifs_reopen_file(rdata->cfile, true);
2616 if (rc != 0)
2617 continue;
2618 }
fc9c5966 2619 rc = server->ops->async_readv(rdata);
2a1bb138
JL
2620 } while (rc == -EAGAIN);
2621
2622 return rc;
2623}
2624
1c892549
JL
2625/**
2626 * cifs_readdata_to_iov - copy data from pages in response to an iovec
2627 * @rdata: the readdata response with list of pages holding data
2628 * @iov: vector in which we should copy the data
2629 * @nr_segs: number of segments in vector
2630 * @offset: offset into file of the first iovec
2631 * @copied: used to return the amount of data copied to the iov
2632 *
2633 * This function copies data from a list of pages in a readdata response into
2634 * an array of iovecs. It will first calculate where the data should go
2635 * based on the info in the readdata and then copy the data into that spot.
2636 */
2637static ssize_t
2638cifs_readdata_to_iov(struct cifs_readdata *rdata, const struct iovec *iov,
2639 unsigned long nr_segs, loff_t offset, ssize_t *copied)
2640{
2641 int rc = 0;
2642 struct iov_iter ii;
2643 size_t pos = rdata->offset - offset;
1c892549
JL
2644 ssize_t remaining = rdata->bytes;
2645 unsigned char *pdata;
c5fab6f4 2646 unsigned int i;
1c892549
JL
2647
2648 /* set up iov_iter and advance to the correct offset */
2649 iov_iter_init(&ii, iov, nr_segs, iov_length(iov, nr_segs), 0);
2650 iov_iter_advance(&ii, pos);
2651
2652 *copied = 0;
c5fab6f4 2653 for (i = 0; i < rdata->nr_pages; i++) {
1c892549 2654 ssize_t copy;
c5fab6f4 2655 struct page *page = rdata->pages[i];
1c892549
JL
2656
2657 /* copy a whole page or whatever's left */
2658 copy = min_t(ssize_t, remaining, PAGE_SIZE);
2659
2660 /* ...but limit it to whatever space is left in the iov */
2661 copy = min_t(ssize_t, copy, iov_iter_count(&ii));
2662
2663 /* go while there's data to be copied and no errors */
2664 if (copy && !rc) {
2665 pdata = kmap(page);
2666 rc = memcpy_toiovecend(ii.iov, pdata, ii.iov_offset,
2667 (int)copy);
2668 kunmap(page);
2669 if (!rc) {
2670 *copied += copy;
2671 remaining -= copy;
2672 iov_iter_advance(&ii, copy);
2673 }
2674 }
1c892549
JL
2675 }
2676
2677 return rc;
2678}
2679
2680static void
2681cifs_uncached_readv_complete(struct work_struct *work)
2682{
2683 struct cifs_readdata *rdata = container_of(work,
2684 struct cifs_readdata, work);
1c892549
JL
2685
2686 complete(&rdata->done);
2687 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
2688}
2689
2690static int
8321fec4
JL
2691cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
2692 struct cifs_readdata *rdata, unsigned int len)
1c892549 2693{
8321fec4 2694 int total_read = 0, result = 0;
c5fab6f4
JL
2695 unsigned int i;
2696 unsigned int nr_pages = rdata->nr_pages;
8321fec4 2697 struct kvec iov;
1c892549 2698
8321fec4 2699 rdata->tailsz = PAGE_SIZE;
c5fab6f4
JL
2700 for (i = 0; i < nr_pages; i++) {
2701 struct page *page = rdata->pages[i];
2702
8321fec4 2703 if (len >= PAGE_SIZE) {
1c892549 2704 /* enough data to fill the page */
8321fec4
JL
2705 iov.iov_base = kmap(page);
2706 iov.iov_len = PAGE_SIZE;
2707 cFYI(1, "%u: iov_base=%p iov_len=%zu",
2708 i, iov.iov_base, iov.iov_len);
2709 len -= PAGE_SIZE;
2710 } else if (len > 0) {
1c892549 2711 /* enough for partial page, fill and zero the rest */
8321fec4
JL
2712 iov.iov_base = kmap(page);
2713 iov.iov_len = len;
2714 cFYI(1, "%u: iov_base=%p iov_len=%zu",
2715 i, iov.iov_base, iov.iov_len);
2716 memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
2717 rdata->tailsz = len;
2718 len = 0;
1c892549
JL
2719 } else {
2720 /* no need to hold page hostage */
c5fab6f4
JL
2721 rdata->pages[i] = NULL;
2722 rdata->nr_pages--;
1c892549 2723 put_page(page);
8321fec4 2724 continue;
1c892549 2725 }
8321fec4
JL
2726
2727 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
2728 kunmap(page);
2729 if (result < 0)
2730 break;
2731
2732 total_read += result;
1c892549
JL
2733 }
2734
8321fec4 2735 return total_read > 0 ? total_read : result;
1c892549
JL
2736}
2737
a70307ee
PS
2738static ssize_t
2739cifs_iovec_read(struct file *file, const struct iovec *iov,
2740 unsigned long nr_segs, loff_t *poffset)
1da177e4 2741{
1c892549 2742 ssize_t rc;
a70307ee 2743 size_t len, cur_len;
1c892549
JL
2744 ssize_t total_read = 0;
2745 loff_t offset = *poffset;
2746 unsigned int npages;
1da177e4 2747 struct cifs_sb_info *cifs_sb;
1c892549 2748 struct cifs_tcon *tcon;
1da177e4 2749 struct cifsFileInfo *open_file;
1c892549
JL
2750 struct cifs_readdata *rdata, *tmp;
2751 struct list_head rdata_list;
2752 pid_t pid;
a70307ee
PS
2753
2754 if (!nr_segs)
2755 return 0;
2756
2757 len = iov_length(iov, nr_segs);
2758 if (!len)
2759 return 0;
1da177e4 2760
1c892549 2761 INIT_LIST_HEAD(&rdata_list);
e6a00296 2762 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
c21dfb69 2763 open_file = file->private_data;
1c892549 2764 tcon = tlink_tcon(open_file->tlink);
1da177e4 2765
fc9c5966
PS
2766 if (!tcon->ses->server->ops->async_readv)
2767 return -ENOSYS;
2768
d4ffff1f
PS
2769 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2770 pid = open_file->pid;
2771 else
2772 pid = current->tgid;
2773
ad7a2926 2774 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
b6b38f70 2775 cFYI(1, "attempting read on write only file instance");
ad7a2926 2776
1c892549
JL
2777 do {
2778 cur_len = min_t(const size_t, len - total_read, cifs_sb->rsize);
2779 npages = DIV_ROUND_UP(cur_len, PAGE_SIZE);
a70307ee 2780
1c892549
JL
2781 /* allocate a readdata struct */
2782 rdata = cifs_readdata_alloc(npages,
2783 cifs_uncached_readv_complete);
2784 if (!rdata) {
2785 rc = -ENOMEM;
2786 goto error;
1da177e4 2787 }
a70307ee 2788
c5fab6f4 2789 rc = cifs_read_allocate_pages(rdata, npages);
1c892549
JL
2790 if (rc)
2791 goto error;
2792
2793 rdata->cfile = cifsFileInfo_get(open_file);
c5fab6f4 2794 rdata->nr_pages = npages;
1c892549
JL
2795 rdata->offset = offset;
2796 rdata->bytes = cur_len;
2797 rdata->pid = pid;
8321fec4
JL
2798 rdata->pagesz = PAGE_SIZE;
2799 rdata->read_into_pages = cifs_uncached_read_into_pages;
1c892549
JL
2800
2801 rc = cifs_retry_async_readv(rdata);
2802error:
2803 if (rc) {
2804 kref_put(&rdata->refcount,
2805 cifs_uncached_readdata_release);
2806 break;
2807 }
2808
2809 list_add_tail(&rdata->list, &rdata_list);
2810 offset += cur_len;
2811 len -= cur_len;
2812 } while (len > 0);
2813
2814 /* if at least one read request send succeeded, then reset rc */
2815 if (!list_empty(&rdata_list))
2816 rc = 0;
2817
2818 /* the loop below should proceed in the order of increasing offsets */
2819restart_loop:
2820 list_for_each_entry_safe(rdata, tmp, &rdata_list, list) {
2821 if (!rc) {
2822 ssize_t copied;
2823
2824 /* FIXME: freezable sleep too? */
2825 rc = wait_for_completion_killable(&rdata->done);
2826 if (rc)
2827 rc = -EINTR;
2828 else if (rdata->result)
2829 rc = rdata->result;
2830 else {
2831 rc = cifs_readdata_to_iov(rdata, iov,
2832 nr_segs, *poffset,
2833 &copied);
2834 total_read += copied;
2835 }
2836
2837 /* resend call if it's a retryable error */
2838 if (rc == -EAGAIN) {
2839 rc = cifs_retry_async_readv(rdata);
2840 goto restart_loop;
1da177e4 2841 }
1da177e4 2842 }
1c892549
JL
2843 list_del_init(&rdata->list);
2844 kref_put(&rdata->refcount, cifs_uncached_readdata_release);
1da177e4 2845 }
a70307ee 2846
1c892549
JL
2847 cifs_stats_bytes_read(tcon, total_read);
2848 *poffset += total_read;
2849
09a4707e
PS
2850 /* mask nodata case */
2851 if (rc == -ENODATA)
2852 rc = 0;
2853
1c892549 2854 return total_read ? total_read : rc;
1da177e4
LT
2855}
2856
0b81c1c4 2857ssize_t cifs_user_readv(struct kiocb *iocb, const struct iovec *iov,
a70307ee
PS
2858 unsigned long nr_segs, loff_t pos)
2859{
2860 ssize_t read;
2861
2862 read = cifs_iovec_read(iocb->ki_filp, iov, nr_segs, &pos);
2863 if (read > 0)
2864 iocb->ki_pos = pos;
2865
2866 return read;
2867}
2868
579f9053
PS
2869ssize_t
2870cifs_strict_readv(struct kiocb *iocb, const struct iovec *iov,
2871 unsigned long nr_segs, loff_t pos)
a70307ee 2872{
579f9053
PS
2873 struct inode *inode = iocb->ki_filp->f_path.dentry->d_inode;
2874 struct cifsInodeInfo *cinode = CIFS_I(inode);
2875 struct cifs_sb_info *cifs_sb = CIFS_SB(inode->i_sb);
2876 struct cifsFileInfo *cfile = (struct cifsFileInfo *)
2877 iocb->ki_filp->private_data;
2878 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
2879 int rc = -EACCES;
a70307ee
PS
2880
2881 /*
2882 * In strict cache mode we need to read from the server all the time
2883 * if we don't have level II oplock because the server can delay mtime
2884 * change - so we can't make a decision about inode invalidating.
2885 * And we can also fail with pagereading if there are mandatory locks
2886 * on pages affected by this read but not on the region from pos to
2887 * pos+len-1.
2888 */
579f9053
PS
2889 if (!cinode->clientCanCacheRead)
2890 return cifs_user_readv(iocb, iov, nr_segs, pos);
a70307ee 2891
579f9053
PS
2892 if (cap_unix(tcon->ses) &&
2893 (CIFS_UNIX_FCNTL_CAP & le64_to_cpu(tcon->fsUnixInfo.Capability)) &&
2894 ((cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NOPOSIXBRL) == 0))
2895 return generic_file_aio_read(iocb, iov, nr_segs, pos);
2896
2897 /*
2898 * We need to hold the sem to be sure nobody modifies lock list
2899 * with a brlock that prevents reading.
2900 */
2901 down_read(&cinode->lock_sem);
2902 if (!cifs_find_lock_conflict(cfile, pos, iov_length(iov, nr_segs),
2903 tcon->ses->server->vals->shared_lock_type,
2904 NULL, true))
2905 rc = generic_file_aio_read(iocb, iov, nr_segs, pos);
2906 up_read(&cinode->lock_sem);
2907 return rc;
a70307ee 2908}
1da177e4 2909
f9c6e234
PS
2910static ssize_t
2911cifs_read(struct file *file, char *read_data, size_t read_size, loff_t *offset)
1da177e4
LT
2912{
2913 int rc = -EACCES;
2914 unsigned int bytes_read = 0;
2915 unsigned int total_read;
2916 unsigned int current_read_size;
5eba8ab3 2917 unsigned int rsize;
1da177e4 2918 struct cifs_sb_info *cifs_sb;
29e20f9c 2919 struct cifs_tcon *tcon;
f9c6e234 2920 struct TCP_Server_Info *server;
6d5786a3 2921 unsigned int xid;
f9c6e234 2922 char *cur_offset;
1da177e4 2923 struct cifsFileInfo *open_file;
d4ffff1f 2924 struct cifs_io_parms io_parms;
ec637e3f 2925 int buf_type = CIFS_NO_BUFFER;
d4ffff1f 2926 __u32 pid;
1da177e4 2927
6d5786a3 2928 xid = get_xid();
e6a00296 2929 cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
1da177e4 2930
5eba8ab3
JL
2931 /* FIXME: set up handlers for larger reads and/or convert to async */
2932 rsize = min_t(unsigned int, cifs_sb->rsize, CIFSMaxBufSize);
2933
1da177e4 2934 if (file->private_data == NULL) {
0f3bc09e 2935 rc = -EBADF;
6d5786a3 2936 free_xid(xid);
0f3bc09e 2937 return rc;
1da177e4 2938 }
c21dfb69 2939 open_file = file->private_data;
29e20f9c 2940 tcon = tlink_tcon(open_file->tlink);
f9c6e234
PS
2941 server = tcon->ses->server;
2942
2943 if (!server->ops->sync_read) {
2944 free_xid(xid);
2945 return -ENOSYS;
2946 }
1da177e4 2947
d4ffff1f
PS
2948 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
2949 pid = open_file->pid;
2950 else
2951 pid = current->tgid;
2952
1da177e4 2953 if ((file->f_flags & O_ACCMODE) == O_WRONLY)
b6b38f70 2954 cFYI(1, "attempting read on write only file instance");
1da177e4 2955
f9c6e234
PS
2956 for (total_read = 0, cur_offset = read_data; read_size > total_read;
2957 total_read += bytes_read, cur_offset += bytes_read) {
5eba8ab3 2958 current_read_size = min_t(uint, read_size - total_read, rsize);
29e20f9c
PS
2959 /*
2960 * For windows me and 9x we do not want to request more than it
2961 * negotiated since it will refuse the read then.
2962 */
2963 if ((tcon->ses) && !(tcon->ses->capabilities &
2964 tcon->ses->server->vals->cap_large_files)) {
7748dd6e 2965 current_read_size = min_t(uint, current_read_size,
c974befa 2966 CIFSMaxBufSize);
f9f5c817 2967 }
1da177e4
LT
2968 rc = -EAGAIN;
2969 while (rc == -EAGAIN) {
cdff08e7 2970 if (open_file->invalidHandle) {
15886177 2971 rc = cifs_reopen_file(open_file, true);
1da177e4
LT
2972 if (rc != 0)
2973 break;
2974 }
d4ffff1f 2975 io_parms.pid = pid;
29e20f9c 2976 io_parms.tcon = tcon;
f9c6e234 2977 io_parms.offset = *offset;
d4ffff1f 2978 io_parms.length = current_read_size;
f9c6e234
PS
2979 rc = server->ops->sync_read(xid, open_file, &io_parms,
2980 &bytes_read, &cur_offset,
2981 &buf_type);
1da177e4
LT
2982 }
2983 if (rc || (bytes_read == 0)) {
2984 if (total_read) {
2985 break;
2986 } else {
6d5786a3 2987 free_xid(xid);
1da177e4
LT
2988 return rc;
2989 }
2990 } else {
29e20f9c 2991 cifs_stats_bytes_read(tcon, total_read);
f9c6e234 2992 *offset += bytes_read;
1da177e4
LT
2993 }
2994 }
6d5786a3 2995 free_xid(xid);
1da177e4
LT
2996 return total_read;
2997}
2998
ca83ce3d
JL
2999/*
3000 * If the page is mmap'ed into a process' page tables, then we need to make
3001 * sure that it doesn't change while being written back.
3002 */
3003static int
3004cifs_page_mkwrite(struct vm_area_struct *vma, struct vm_fault *vmf)
3005{
3006 struct page *page = vmf->page;
3007
3008 lock_page(page);
3009 return VM_FAULT_LOCKED;
3010}
3011
3012static struct vm_operations_struct cifs_file_vm_ops = {
3013 .fault = filemap_fault,
3014 .page_mkwrite = cifs_page_mkwrite,
0b173bc4 3015 .remap_pages = generic_file_remap_pages,
ca83ce3d
JL
3016};
3017
7a6a19b1
PS
3018int cifs_file_strict_mmap(struct file *file, struct vm_area_struct *vma)
3019{
3020 int rc, xid;
3021 struct inode *inode = file->f_path.dentry->d_inode;
3022
6d5786a3 3023 xid = get_xid();
7a6a19b1 3024
6feb9891
PS
3025 if (!CIFS_I(inode)->clientCanCacheRead) {
3026 rc = cifs_invalidate_mapping(inode);
3027 if (rc)
3028 return rc;
3029 }
7a6a19b1
PS
3030
3031 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3032 if (rc == 0)
3033 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3034 free_xid(xid);
7a6a19b1
PS
3035 return rc;
3036}
3037
1da177e4
LT
3038int cifs_file_mmap(struct file *file, struct vm_area_struct *vma)
3039{
1da177e4
LT
3040 int rc, xid;
3041
6d5786a3 3042 xid = get_xid();
abab095d 3043 rc = cifs_revalidate_file(file);
1da177e4 3044 if (rc) {
b6b38f70 3045 cFYI(1, "Validation prior to mmap failed, error=%d", rc);
6d5786a3 3046 free_xid(xid);
1da177e4
LT
3047 return rc;
3048 }
3049 rc = generic_file_mmap(file, vma);
ca83ce3d
JL
3050 if (rc == 0)
3051 vma->vm_ops = &cifs_file_vm_ops;
6d5786a3 3052 free_xid(xid);
1da177e4
LT
3053 return rc;
3054}
3055
0471ca3f
JL
3056static void
3057cifs_readv_complete(struct work_struct *work)
3058{
c5fab6f4 3059 unsigned int i;
0471ca3f
JL
3060 struct cifs_readdata *rdata = container_of(work,
3061 struct cifs_readdata, work);
0471ca3f 3062
c5fab6f4
JL
3063 for (i = 0; i < rdata->nr_pages; i++) {
3064 struct page *page = rdata->pages[i];
3065
0471ca3f
JL
3066 lru_cache_add_file(page);
3067
3068 if (rdata->result == 0) {
0471ca3f
JL
3069 flush_dcache_page(page);
3070 SetPageUptodate(page);
3071 }
3072
3073 unlock_page(page);
3074
3075 if (rdata->result == 0)
3076 cifs_readpage_to_fscache(rdata->mapping->host, page);
3077
3078 page_cache_release(page);
c5fab6f4 3079 rdata->pages[i] = NULL;
0471ca3f 3080 }
6993f74a 3081 kref_put(&rdata->refcount, cifs_readdata_release);
0471ca3f
JL
3082}
3083
8d5ce4d2 3084static int
8321fec4
JL
3085cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
3086 struct cifs_readdata *rdata, unsigned int len)
8d5ce4d2 3087{
8321fec4 3088 int total_read = 0, result = 0;
c5fab6f4 3089 unsigned int i;
8d5ce4d2
JL
3090 u64 eof;
3091 pgoff_t eof_index;
c5fab6f4 3092 unsigned int nr_pages = rdata->nr_pages;
8321fec4 3093 struct kvec iov;
8d5ce4d2
JL
3094
3095 /* determine the eof that the server (probably) has */
3096 eof = CIFS_I(rdata->mapping->host)->server_eof;
3097 eof_index = eof ? (eof - 1) >> PAGE_CACHE_SHIFT : 0;
3098 cFYI(1, "eof=%llu eof_index=%lu", eof, eof_index);
3099
8321fec4 3100 rdata->tailsz = PAGE_CACHE_SIZE;
c5fab6f4
JL
3101 for (i = 0; i < nr_pages; i++) {
3102 struct page *page = rdata->pages[i];
3103
8321fec4 3104 if (len >= PAGE_CACHE_SIZE) {
8d5ce4d2 3105 /* enough data to fill the page */
8321fec4
JL
3106 iov.iov_base = kmap(page);
3107 iov.iov_len = PAGE_CACHE_SIZE;
8d5ce4d2 3108 cFYI(1, "%u: idx=%lu iov_base=%p iov_len=%zu",
8321fec4
JL
3109 i, page->index, iov.iov_base, iov.iov_len);
3110 len -= PAGE_CACHE_SIZE;
3111 } else if (len > 0) {
8d5ce4d2 3112 /* enough for partial page, fill and zero the rest */
8321fec4
JL
3113 iov.iov_base = kmap(page);
3114 iov.iov_len = len;
8d5ce4d2 3115 cFYI(1, "%u: idx=%lu iov_base=%p iov_len=%zu",
8321fec4
JL
3116 i, page->index, iov.iov_base, iov.iov_len);
3117 memset(iov.iov_base + len,
3118 '\0', PAGE_CACHE_SIZE - len);
3119 rdata->tailsz = len;
3120 len = 0;
8d5ce4d2
JL
3121 } else if (page->index > eof_index) {
3122 /*
3123 * The VFS will not try to do readahead past the
3124 * i_size, but it's possible that we have outstanding
3125 * writes with gaps in the middle and the i_size hasn't
3126 * caught up yet. Populate those with zeroed out pages
3127 * to prevent the VFS from repeatedly attempting to
3128 * fill them until the writes are flushed.
3129 */
3130 zero_user(page, 0, PAGE_CACHE_SIZE);
8d5ce4d2
JL
3131 lru_cache_add_file(page);
3132 flush_dcache_page(page);
3133 SetPageUptodate(page);
3134 unlock_page(page);
3135 page_cache_release(page);
c5fab6f4
JL
3136 rdata->pages[i] = NULL;
3137 rdata->nr_pages--;
8321fec4 3138 continue;
8d5ce4d2
JL
3139 } else {
3140 /* no need to hold page hostage */
8d5ce4d2
JL
3141 lru_cache_add_file(page);
3142 unlock_page(page);
3143 page_cache_release(page);
c5fab6f4
JL
3144 rdata->pages[i] = NULL;
3145 rdata->nr_pages--;
8321fec4 3146 continue;
8d5ce4d2 3147 }
8321fec4
JL
3148
3149 result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
3150 kunmap(page);
3151 if (result < 0)
3152 break;
3153
3154 total_read += result;
8d5ce4d2
JL
3155 }
3156
8321fec4 3157 return total_read > 0 ? total_read : result;
8d5ce4d2
JL
3158}
3159
1da177e4
LT
3160static int cifs_readpages(struct file *file, struct address_space *mapping,
3161 struct list_head *page_list, unsigned num_pages)
3162{
690c5e31
JL
3163 int rc;
3164 struct list_head tmplist;
3165 struct cifsFileInfo *open_file = file->private_data;
3166 struct cifs_sb_info *cifs_sb = CIFS_SB(file->f_path.dentry->d_sb);
3167 unsigned int rsize = cifs_sb->rsize;
3168 pid_t pid;
1da177e4 3169
690c5e31
JL
3170 /*
3171 * Give up immediately if rsize is too small to read an entire page.
3172 * The VFS will fall back to readpage. We should never reach this
3173 * point however since we set ra_pages to 0 when the rsize is smaller
3174 * than a cache page.
3175 */
3176 if (unlikely(rsize < PAGE_CACHE_SIZE))
3177 return 0;
bfa0d75a 3178
56698236
SJ
3179 /*
3180 * Reads as many pages as possible from fscache. Returns -ENOBUFS
3181 * immediately if the cookie is negative
3182 */
3183 rc = cifs_readpages_from_fscache(mapping->host, mapping, page_list,
3184 &num_pages);
3185 if (rc == 0)
690c5e31 3186 return rc;
56698236 3187
d4ffff1f
PS
3188 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_RWPIDFORWARD)
3189 pid = open_file->pid;
3190 else
3191 pid = current->tgid;
3192
690c5e31
JL
3193 rc = 0;
3194 INIT_LIST_HEAD(&tmplist);
1da177e4 3195
690c5e31
JL
3196 cFYI(1, "%s: file=%p mapping=%p num_pages=%u", __func__, file,
3197 mapping, num_pages);
3198
3199 /*
3200 * Start with the page at end of list and move it to private
3201 * list. Do the same with any following pages until we hit
3202 * the rsize limit, hit an index discontinuity, or run out of
3203 * pages. Issue the async read and then start the loop again
3204 * until the list is empty.
3205 *
3206 * Note that list order is important. The page_list is in
3207 * the order of declining indexes. When we put the pages in
3208 * the rdata->pages, then we want them in increasing order.
3209 */
3210 while (!list_empty(page_list)) {
c5fab6f4 3211 unsigned int i;
690c5e31
JL
3212 unsigned int bytes = PAGE_CACHE_SIZE;
3213 unsigned int expected_index;
3214 unsigned int nr_pages = 1;
3215 loff_t offset;
3216 struct page *page, *tpage;
3217 struct cifs_readdata *rdata;
1da177e4
LT
3218
3219 page = list_entry(page_list->prev, struct page, lru);
690c5e31
JL
3220
3221 /*
3222 * Lock the page and put it in the cache. Since no one else
3223 * should have access to this page, we're safe to simply set
3224 * PG_locked without checking it first.
3225 */
3226 __set_page_locked(page);
3227 rc = add_to_page_cache_locked(page, mapping,
3228 page->index, GFP_KERNEL);
3229
3230 /* give up if we can't stick it in the cache */
3231 if (rc) {
3232 __clear_page_locked(page);
3233 break;
3234 }
3235
3236 /* move first page to the tmplist */
1da177e4 3237 offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
690c5e31 3238 list_move_tail(&page->lru, &tmplist);
1da177e4 3239
690c5e31
JL
3240 /* now try and add more pages onto the request */
3241 expected_index = page->index + 1;
3242 list_for_each_entry_safe_reverse(page, tpage, page_list, lru) {
3243 /* discontinuity ? */
3244 if (page->index != expected_index)
fb8c4b14 3245 break;
690c5e31
JL
3246
3247 /* would this page push the read over the rsize? */
3248 if (bytes + PAGE_CACHE_SIZE > rsize)
3249 break;
3250
3251 __set_page_locked(page);
3252 if (add_to_page_cache_locked(page, mapping,
3253 page->index, GFP_KERNEL)) {
3254 __clear_page_locked(page);
3255 break;
3256 }
3257 list_move_tail(&page->lru, &tmplist);
3258 bytes += PAGE_CACHE_SIZE;
3259 expected_index++;
3260 nr_pages++;
1da177e4 3261 }
690c5e31 3262
0471ca3f 3263 rdata = cifs_readdata_alloc(nr_pages, cifs_readv_complete);
690c5e31
JL
3264 if (!rdata) {
3265 /* best to give up if we're out of mem */
3266 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3267 list_del(&page->lru);
3268 lru_cache_add_file(page);
3269 unlock_page(page);
3270 page_cache_release(page);
3271 }
3272 rc = -ENOMEM;
3273 break;
3274 }
3275
6993f74a 3276 rdata->cfile = cifsFileInfo_get(open_file);
690c5e31
JL
3277 rdata->mapping = mapping;
3278 rdata->offset = offset;
3279 rdata->bytes = bytes;
3280 rdata->pid = pid;
8321fec4
JL
3281 rdata->pagesz = PAGE_CACHE_SIZE;
3282 rdata->read_into_pages = cifs_readpages_read_into_pages;
c5fab6f4
JL
3283
3284 list_for_each_entry_safe(page, tpage, &tmplist, lru) {
3285 list_del(&page->lru);
3286 rdata->pages[rdata->nr_pages++] = page;
3287 }
690c5e31 3288
2a1bb138 3289 rc = cifs_retry_async_readv(rdata);
690c5e31 3290 if (rc != 0) {
c5fab6f4
JL
3291 for (i = 0; i < rdata->nr_pages; i++) {
3292 page = rdata->pages[i];
690c5e31
JL
3293 lru_cache_add_file(page);
3294 unlock_page(page);
3295 page_cache_release(page);
1da177e4 3296 }
6993f74a 3297 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3298 break;
3299 }
6993f74a
JL
3300
3301 kref_put(&rdata->refcount, cifs_readdata_release);
1da177e4
LT
3302 }
3303
1da177e4
LT
3304 return rc;
3305}
3306
3307static int cifs_readpage_worker(struct file *file, struct page *page,
3308 loff_t *poffset)
3309{
3310 char *read_data;
3311 int rc;
3312
56698236
SJ
3313 /* Is the page cached? */
3314 rc = cifs_readpage_from_fscache(file->f_path.dentry->d_inode, page);
3315 if (rc == 0)
3316 goto read_complete;
3317
1da177e4
LT
3318 page_cache_get(page);
3319 read_data = kmap(page);
3320 /* for reads over a certain size could initiate async read ahead */
fb8c4b14 3321
1da177e4 3322 rc = cifs_read(file, read_data, PAGE_CACHE_SIZE, poffset);
fb8c4b14 3323
1da177e4
LT
3324 if (rc < 0)
3325 goto io_error;
3326 else
b6b38f70 3327 cFYI(1, "Bytes read %d", rc);
fb8c4b14 3328
e6a00296
JJS
3329 file->f_path.dentry->d_inode->i_atime =
3330 current_fs_time(file->f_path.dentry->d_inode->i_sb);
fb8c4b14 3331
1da177e4
LT
3332 if (PAGE_CACHE_SIZE > rc)
3333 memset(read_data + rc, 0, PAGE_CACHE_SIZE - rc);
3334
3335 flush_dcache_page(page);
3336 SetPageUptodate(page);
9dc06558
SJ
3337
3338 /* send this page to the cache */
3339 cifs_readpage_to_fscache(file->f_path.dentry->d_inode, page);
3340
1da177e4 3341 rc = 0;
fb8c4b14 3342
1da177e4 3343io_error:
fb8c4b14 3344 kunmap(page);
1da177e4 3345 page_cache_release(page);
56698236
SJ
3346
3347read_complete:
1da177e4
LT
3348 return rc;
3349}
3350
3351static int cifs_readpage(struct file *file, struct page *page)
3352{
3353 loff_t offset = (loff_t)page->index << PAGE_CACHE_SHIFT;
3354 int rc = -EACCES;
6d5786a3 3355 unsigned int xid;
1da177e4 3356
6d5786a3 3357 xid = get_xid();
1da177e4
LT
3358
3359 if (file->private_data == NULL) {
0f3bc09e 3360 rc = -EBADF;
6d5786a3 3361 free_xid(xid);
0f3bc09e 3362 return rc;
1da177e4
LT
3363 }
3364
ac3aa2f8 3365 cFYI(1, "readpage %p at offset %d 0x%x",
b6b38f70 3366 page, (int)offset, (int)offset);
1da177e4
LT
3367
3368 rc = cifs_readpage_worker(file, page, &offset);
3369
3370 unlock_page(page);
3371
6d5786a3 3372 free_xid(xid);
1da177e4
LT
3373 return rc;
3374}
3375
a403a0a3
SF
3376static int is_inode_writable(struct cifsInodeInfo *cifs_inode)
3377{
3378 struct cifsFileInfo *open_file;
3379
4477288a 3380 spin_lock(&cifs_file_list_lock);
a403a0a3 3381 list_for_each_entry(open_file, &cifs_inode->openFileList, flist) {
2e396b83 3382 if (OPEN_FMODE(open_file->f_flags) & FMODE_WRITE) {
4477288a 3383 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3384 return 1;
3385 }
3386 }
4477288a 3387 spin_unlock(&cifs_file_list_lock);
a403a0a3
SF
3388 return 0;
3389}
3390
1da177e4
LT
3391/* We do not want to update the file size from server for inodes
3392 open for write - to avoid races with writepage extending
3393 the file - in the future we could consider allowing
fb8c4b14 3394 refreshing the inode only on increases in the file size
1da177e4
LT
3395 but this is tricky to do without racing with writebehind
3396 page caching in the current Linux kernel design */
4b18f2a9 3397bool is_size_safe_to_change(struct cifsInodeInfo *cifsInode, __u64 end_of_file)
1da177e4 3398{
a403a0a3 3399 if (!cifsInode)
4b18f2a9 3400 return true;
50c2f753 3401
a403a0a3
SF
3402 if (is_inode_writable(cifsInode)) {
3403 /* This inode is open for write at least once */
c32a0b68
SF
3404 struct cifs_sb_info *cifs_sb;
3405
c32a0b68 3406 cifs_sb = CIFS_SB(cifsInode->vfs_inode.i_sb);
ad7a2926 3407 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_DIRECT_IO) {
fb8c4b14 3408 /* since no page cache to corrupt on directio
c32a0b68 3409 we can change size safely */
4b18f2a9 3410 return true;
c32a0b68
SF
3411 }
3412
fb8c4b14 3413 if (i_size_read(&cifsInode->vfs_inode) < end_of_file)
4b18f2a9 3414 return true;
7ba52631 3415
4b18f2a9 3416 return false;
23e7dd7d 3417 } else
4b18f2a9 3418 return true;
1da177e4
LT
3419}
3420
d9414774
NP
3421static int cifs_write_begin(struct file *file, struct address_space *mapping,
3422 loff_t pos, unsigned len, unsigned flags,
3423 struct page **pagep, void **fsdata)
1da177e4 3424{
d9414774
NP
3425 pgoff_t index = pos >> PAGE_CACHE_SHIFT;
3426 loff_t offset = pos & (PAGE_CACHE_SIZE - 1);
a98ee8c1
JL
3427 loff_t page_start = pos & PAGE_MASK;
3428 loff_t i_size;
3429 struct page *page;
3430 int rc = 0;
d9414774 3431
b6b38f70 3432 cFYI(1, "write_begin from %lld len %d", (long long)pos, len);
d9414774 3433
54566b2c 3434 page = grab_cache_page_write_begin(mapping, index, flags);
a98ee8c1
JL
3435 if (!page) {
3436 rc = -ENOMEM;
3437 goto out;
3438 }
8a236264 3439
a98ee8c1
JL
3440 if (PageUptodate(page))
3441 goto out;
8a236264 3442
a98ee8c1
JL
3443 /*
3444 * If we write a full page it will be up to date, no need to read from
3445 * the server. If the write is short, we'll end up doing a sync write
3446 * instead.
3447 */
3448 if (len == PAGE_CACHE_SIZE)
3449 goto out;
8a236264 3450
a98ee8c1
JL
3451 /*
3452 * optimize away the read when we have an oplock, and we're not
3453 * expecting to use any of the data we'd be reading in. That
3454 * is, when the page lies beyond the EOF, or straddles the EOF
3455 * and the write will cover all of the existing data.
3456 */
3457 if (CIFS_I(mapping->host)->clientCanCacheRead) {
3458 i_size = i_size_read(mapping->host);
3459 if (page_start >= i_size ||
3460 (offset == 0 && (pos + len) >= i_size)) {
3461 zero_user_segments(page, 0, offset,
3462 offset + len,
3463 PAGE_CACHE_SIZE);
3464 /*
3465 * PageChecked means that the parts of the page
3466 * to which we're not writing are considered up
3467 * to date. Once the data is copied to the
3468 * page, it can be set uptodate.
3469 */
3470 SetPageChecked(page);
3471 goto out;
3472 }
3473 }
d9414774 3474
a98ee8c1
JL
3475 if ((file->f_flags & O_ACCMODE) != O_WRONLY) {
3476 /*
3477 * might as well read a page, it is fast enough. If we get
3478 * an error, we don't need to return it. cifs_write_end will
3479 * do a sync write instead since PG_uptodate isn't set.
3480 */
3481 cifs_readpage_worker(file, page, &page_start);
8a236264
SF
3482 } else {
3483 /* we could try using another file handle if there is one -
3484 but how would we lock it to prevent close of that handle
3485 racing with this read? In any case
d9414774 3486 this will be written out by write_end so is fine */
1da177e4 3487 }
a98ee8c1
JL
3488out:
3489 *pagep = page;
3490 return rc;
1da177e4
LT
3491}
3492
85f2d6b4
SJ
3493static int cifs_release_page(struct page *page, gfp_t gfp)
3494{
3495 if (PagePrivate(page))
3496 return 0;
3497
3498 return cifs_fscache_release_page(page, gfp);
3499}
3500
3501static void cifs_invalidate_page(struct page *page, unsigned long offset)
3502{
3503 struct cifsInodeInfo *cifsi = CIFS_I(page->mapping->host);
3504
3505 if (offset == 0)
3506 cifs_fscache_invalidate_page(page, &cifsi->vfs_inode);
3507}
3508
9ad1506b
PS
3509static int cifs_launder_page(struct page *page)
3510{
3511 int rc = 0;
3512 loff_t range_start = page_offset(page);
3513 loff_t range_end = range_start + (loff_t)(PAGE_CACHE_SIZE - 1);
3514 struct writeback_control wbc = {
3515 .sync_mode = WB_SYNC_ALL,
3516 .nr_to_write = 0,
3517 .range_start = range_start,
3518 .range_end = range_end,
3519 };
3520
3521 cFYI(1, "Launder page: %p", page);
3522
3523 if (clear_page_dirty_for_io(page))
3524 rc = cifs_writepage_locked(page, &wbc);
3525
3526 cifs_fscache_invalidate_page(page, page->mapping->host);
3527 return rc;
3528}
3529
9b646972 3530void cifs_oplock_break(struct work_struct *work)
3bc303c2
JL
3531{
3532 struct cifsFileInfo *cfile = container_of(work, struct cifsFileInfo,
3533 oplock_break);
a5e18bc3 3534 struct inode *inode = cfile->dentry->d_inode;
3bc303c2 3535 struct cifsInodeInfo *cinode = CIFS_I(inode);
95a3f2f3 3536 struct cifs_tcon *tcon = tlink_tcon(cfile->tlink);
eb4b756b 3537 int rc = 0;
3bc303c2
JL
3538
3539 if (inode && S_ISREG(inode->i_mode)) {
d54ff732 3540 if (cinode->clientCanCacheRead)
8737c930 3541 break_lease(inode, O_RDONLY);
d54ff732 3542 else
8737c930 3543 break_lease(inode, O_WRONLY);
3bc303c2
JL
3544 rc = filemap_fdatawrite(inode->i_mapping);
3545 if (cinode->clientCanCacheRead == 0) {
eb4b756b
JL
3546 rc = filemap_fdatawait(inode->i_mapping);
3547 mapping_set_error(inode->i_mapping, rc);
3bc303c2
JL
3548 invalidate_remote_inode(inode);
3549 }
b6b38f70 3550 cFYI(1, "Oplock flush inode %p rc %d", inode, rc);
3bc303c2
JL
3551 }
3552
85160e03
PS
3553 rc = cifs_push_locks(cfile);
3554 if (rc)
3555 cERROR(1, "Push locks rc = %d", rc);
3556
3bc303c2
JL
3557 /*
3558 * releasing stale oplock after recent reconnect of smb session using
3559 * a now incorrect file handle is not a data integrity issue but do
3560 * not bother sending an oplock release if session to server still is
3561 * disconnected since oplock already released by the server
3562 */
cdff08e7 3563 if (!cfile->oplock_break_cancelled) {
95a3f2f3
PS
3564 rc = tcon->ses->server->ops->oplock_response(tcon, &cfile->fid,
3565 cinode);
b6b38f70 3566 cFYI(1, "Oplock release rc = %d", rc);
3bc303c2 3567 }
3bc303c2
JL
3568}
3569
f5e54d6e 3570const struct address_space_operations cifs_addr_ops = {
1da177e4
LT
3571 .readpage = cifs_readpage,
3572 .readpages = cifs_readpages,
3573 .writepage = cifs_writepage,
37c0eb46 3574 .writepages = cifs_writepages,
d9414774
NP
3575 .write_begin = cifs_write_begin,
3576 .write_end = cifs_write_end,
1da177e4 3577 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4
SJ
3578 .releasepage = cifs_release_page,
3579 .invalidatepage = cifs_invalidate_page,
9ad1506b 3580 .launder_page = cifs_launder_page,
1da177e4 3581};
273d81d6
DK
3582
3583/*
3584 * cifs_readpages requires the server to support a buffer large enough to
3585 * contain the header plus one complete page of data. Otherwise, we need
3586 * to leave cifs_readpages out of the address space operations.
3587 */
f5e54d6e 3588const struct address_space_operations cifs_addr_ops_smallbuf = {
273d81d6
DK
3589 .readpage = cifs_readpage,
3590 .writepage = cifs_writepage,
3591 .writepages = cifs_writepages,
d9414774
NP
3592 .write_begin = cifs_write_begin,
3593 .write_end = cifs_write_end,
273d81d6 3594 .set_page_dirty = __set_page_dirty_nobuffers,
85f2d6b4
SJ
3595 .releasepage = cifs_release_page,
3596 .invalidatepage = cifs_invalidate_page,
9ad1506b 3597 .launder_page = cifs_launder_page,
273d81d6 3598};