]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/nfs/nfs4proc.c
NFSv4: Fix state reference counting in _nfs4_opendata_reclaim_to_nfs4_state
[mirror_ubuntu-bionic-kernel.git] / fs / nfs / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfs/nfs4proc.c
3 *
4 * Client-side procedure declarations for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#include <linux/mm.h>
1da177e4
LT
39#include <linux/delay.h>
40#include <linux/errno.h>
41#include <linux/string.h>
652f89f6
TM
42#include <linux/ratelimit.h>
43#include <linux/printk.h>
5a0e3ad6 44#include <linux/slab.h>
1da177e4
LT
45#include <linux/sunrpc/clnt.h>
46#include <linux/nfs.h>
47#include <linux/nfs4.h>
48#include <linux/nfs_fs.h>
49#include <linux/nfs_page.h>
9b7160c5 50#include <linux/nfs_mount.h>
1da177e4 51#include <linux/namei.h>
02a913a7 52#include <linux/mount.h>
99fe60d0 53#include <linux/module.h>
6926afd1 54#include <linux/nfs_idmap.h>
64c2ce8b 55#include <linux/xattr.h>
c7a360b0 56#include <linux/utsname.h>
d310310c 57#include <linux/freezer.h>
1da177e4 58
4ce79717 59#include "nfs4_fs.h"
1da177e4 60#include "delegation.h"
101070ca 61#include "internal.h"
006ea73e 62#include "iostat.h"
fc931582 63#include "callback.h"
b1f69b75 64#include "pnfs.h"
f092075d 65#include "netns.h"
73e39aaa 66#include "nfs4session.h"
de242c0b 67#include "fscache.h"
1da177e4 68
c6d01c6f
TM
69#include "nfs4trace.h"
70
1da177e4
LT
71#define NFSDBG_FACILITY NFSDBG_PROC
72
2066fe89 73#define NFS4_POLL_RETRY_MIN (HZ/10)
1da177e4
LT
74#define NFS4_POLL_RETRY_MAX (15*HZ)
75
cdd4e68b 76struct nfs4_opendata;
864472e9 77static int _nfs4_proc_open(struct nfs4_opendata *data);
b257957e 78static int _nfs4_recover_proc_open(struct nfs4_opendata *data);
1da177e4 79static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
9e33bed5 80static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *, struct nfs4_state *);
81934ddb 81static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr);
1775fd3e
DQ
82static int nfs4_proc_getattr(struct nfs_server *, struct nfs_fh *, struct nfs_fattr *, struct nfs4_label *label);
83static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr, struct nfs4_label *label);
0ab64e0e
TM
84static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
85 struct nfs_fattr *fattr, struct iattr *sattr,
1775fd3e
DQ
86 struct nfs4_state *state, struct nfs4_label *ilabel,
87 struct nfs4_label *olabel);
f062eb6c 88#ifdef CONFIG_NFS_V4_1
ab7cb0df
TM
89static int nfs41_test_stateid(struct nfs_server *, nfs4_stateid *,
90 struct rpc_cred *);
91static int nfs41_free_stateid(struct nfs_server *, nfs4_stateid *,
92 struct rpc_cred *);
f062eb6c 93#endif
aa9c2669
DQ
94
95#ifdef CONFIG_NFS_V4_SECURITY_LABEL
96static inline struct nfs4_label *
97nfs4_label_init_security(struct inode *dir, struct dentry *dentry,
98 struct iattr *sattr, struct nfs4_label *label)
99{
100 int err;
101
102 if (label == NULL)
103 return NULL;
104
105 if (nfs_server_capable(dir, NFS_CAP_SECURITY_LABEL) == 0)
106 return NULL;
107
108 if (NFS_SERVER(dir)->nfs_client->cl_minorversion < 2)
109 return NULL;
110
111 err = security_dentry_init_security(dentry, sattr->ia_mode,
112 &dentry->d_name, (void **)&label->label, &label->len);
113 if (err == 0)
114 return label;
115
116 return NULL;
117}
118static inline void
119nfs4_label_release_security(struct nfs4_label *label)
120{
121 if (label)
122 security_release_secctx(label->label, label->len);
123}
124static inline u32 *nfs4_bitmask(struct nfs_server *server, struct nfs4_label *label)
125{
126 if (label)
127 return server->attr_bitmask;
128
129 return server->attr_bitmask_nl;
130}
131#else
132static inline struct nfs4_label *
133nfs4_label_init_security(struct inode *dir, struct dentry *dentry,
134 struct iattr *sattr, struct nfs4_label *l)
135{ return NULL; }
136static inline void
137nfs4_label_release_security(struct nfs4_label *label)
138{ return; }
139static inline u32 *
140nfs4_bitmask(struct nfs_server *server, struct nfs4_label *label)
141{ return server->attr_bitmask; }
142#endif
143
1da177e4 144/* Prevent leaks of NFSv4 errors into userland */
46f72f57 145static int nfs4_map_errors(int err)
1da177e4 146{
52567b03
TM
147 if (err >= -1000)
148 return err;
149 switch (err) {
150 case -NFS4ERR_RESOURCE:
30005121
WAA
151 case -NFS4ERR_LAYOUTTRYLATER:
152 case -NFS4ERR_RECALLCONFLICT:
52567b03 153 return -EREMOTEIO;
7ebb9315 154 case -NFS4ERR_WRONGSEC:
8897538e 155 case -NFS4ERR_WRONG_CRED:
7ebb9315 156 return -EPERM;
3ddeb7c5
TM
157 case -NFS4ERR_BADOWNER:
158 case -NFS4ERR_BADNAME:
159 return -EINVAL;
fb13bfa7
TM
160 case -NFS4ERR_SHARE_DENIED:
161 return -EACCES;
f25efd85
SD
162 case -NFS4ERR_MINOR_VERS_MISMATCH:
163 return -EPROTONOSUPPORT;
6168f62c
WAA
164 case -NFS4ERR_ACCESS:
165 return -EACCES;
6e3cf241
TM
166 case -NFS4ERR_FILE_OPEN:
167 return -EBUSY;
52567b03 168 default:
1da177e4 169 dprintk("%s could not handle NFSv4 error %d\n",
3110ff80 170 __func__, -err);
52567b03 171 break;
1da177e4 172 }
52567b03 173 return -EIO;
1da177e4
LT
174}
175
176/*
177 * This is our standard bitmap for GETATTR requests.
178 */
1549210f 179const u32 nfs4_fattr_bitmap[3] = {
1da177e4
LT
180 FATTR4_WORD0_TYPE
181 | FATTR4_WORD0_CHANGE
182 | FATTR4_WORD0_SIZE
183 | FATTR4_WORD0_FSID
184 | FATTR4_WORD0_FILEID,
185 FATTR4_WORD1_MODE
186 | FATTR4_WORD1_NUMLINKS
187 | FATTR4_WORD1_OWNER
188 | FATTR4_WORD1_OWNER_GROUP
189 | FATTR4_WORD1_RAWDEV
190 | FATTR4_WORD1_SPACE_USED
191 | FATTR4_WORD1_TIME_ACCESS
192 | FATTR4_WORD1_TIME_METADATA
aa9c2669
DQ
193 | FATTR4_WORD1_TIME_MODIFY,
194#ifdef CONFIG_NFS_V4_SECURITY_LABEL
195 FATTR4_WORD2_SECURITY_LABEL
196#endif
1da177e4
LT
197};
198
1549210f
TM
199static const u32 nfs4_pnfs_open_bitmap[3] = {
200 FATTR4_WORD0_TYPE
201 | FATTR4_WORD0_CHANGE
202 | FATTR4_WORD0_SIZE
203 | FATTR4_WORD0_FSID
204 | FATTR4_WORD0_FILEID,
205 FATTR4_WORD1_MODE
206 | FATTR4_WORD1_NUMLINKS
207 | FATTR4_WORD1_OWNER
208 | FATTR4_WORD1_OWNER_GROUP
209 | FATTR4_WORD1_RAWDEV
210 | FATTR4_WORD1_SPACE_USED
211 | FATTR4_WORD1_TIME_ACCESS
212 | FATTR4_WORD1_TIME_METADATA
213 | FATTR4_WORD1_TIME_MODIFY,
214 FATTR4_WORD2_MDSTHRESHOLD
215};
216
e23008ec
AA
217static const u32 nfs4_open_noattr_bitmap[3] = {
218 FATTR4_WORD0_TYPE
219 | FATTR4_WORD0_CHANGE
220 | FATTR4_WORD0_FILEID,
221};
222
a09df2ca 223const u32 nfs4_statfs_bitmap[3] = {
1da177e4
LT
224 FATTR4_WORD0_FILES_AVAIL
225 | FATTR4_WORD0_FILES_FREE
226 | FATTR4_WORD0_FILES_TOTAL,
227 FATTR4_WORD1_SPACE_AVAIL
228 | FATTR4_WORD1_SPACE_FREE
229 | FATTR4_WORD1_SPACE_TOTAL
230};
231
a09df2ca 232const u32 nfs4_pathconf_bitmap[3] = {
1da177e4
LT
233 FATTR4_WORD0_MAXLINK
234 | FATTR4_WORD0_MAXNAME,
235 0
236};
237
dae100c2 238const u32 nfs4_fsinfo_bitmap[3] = { FATTR4_WORD0_MAXFILESIZE
1da177e4
LT
239 | FATTR4_WORD0_MAXREAD
240 | FATTR4_WORD0_MAXWRITE
241 | FATTR4_WORD0_LEASE_TIME,
55b6e774 242 FATTR4_WORD1_TIME_DELTA
dae100c2
FI
243 | FATTR4_WORD1_FS_LAYOUT_TYPES,
244 FATTR4_WORD2_LAYOUT_BLKSIZE
1da177e4
LT
245};
246
a09df2ca 247const u32 nfs4_fs_locations_bitmap[3] = {
830b8e33
MN
248 FATTR4_WORD0_TYPE
249 | FATTR4_WORD0_CHANGE
250 | FATTR4_WORD0_SIZE
251 | FATTR4_WORD0_FSID
252 | FATTR4_WORD0_FILEID
253 | FATTR4_WORD0_FS_LOCATIONS,
254 FATTR4_WORD1_MODE
255 | FATTR4_WORD1_NUMLINKS
256 | FATTR4_WORD1_OWNER
257 | FATTR4_WORD1_OWNER_GROUP
258 | FATTR4_WORD1_RAWDEV
259 | FATTR4_WORD1_SPACE_USED
260 | FATTR4_WORD1_TIME_ACCESS
261 | FATTR4_WORD1_TIME_METADATA
262 | FATTR4_WORD1_TIME_MODIFY
a09df2ca 263 | FATTR4_WORD1_MOUNTED_ON_FILEID,
830b8e33
MN
264};
265
bc4785cd 266static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
1da177e4
LT
267 struct nfs4_readdir_arg *readdir)
268{
0dbb4c67 269 __be32 *start, *p;
1da177e4 270
1da177e4 271 if (cookie > 2) {
b7ef1956 272 readdir->cookie = cookie;
1da177e4
LT
273 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
274 return;
275 }
276
277 readdir->cookie = 0;
278 memset(&readdir->verifier, 0, sizeof(readdir->verifier));
279 if (cookie == 2)
280 return;
281
282 /*
283 * NFSv4 servers do not return entries for '.' and '..'
284 * Therefore, we fake these entries here. We let '.'
285 * have cookie 0 and '..' have cookie 1. Note that
286 * when talking to the server, we always send cookie 0
287 * instead of 1 or 2.
288 */
2b86ce2d 289 start = p = kmap_atomic(*readdir->pages);
1da177e4
LT
290
291 if (cookie == 0) {
292 *p++ = xdr_one; /* next */
293 *p++ = xdr_zero; /* cookie, first word */
294 *p++ = xdr_one; /* cookie, second word */
295 *p++ = xdr_one; /* entry len */
296 memcpy(p, ".\0\0\0", 4); /* entry */
297 p++;
298 *p++ = xdr_one; /* bitmap length */
299 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
300 *p++ = htonl(8); /* attribute buffer length */
4e769b93 301 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_inode));
1da177e4
LT
302 }
303
304 *p++ = xdr_one; /* next */
305 *p++ = xdr_zero; /* cookie, first word */
306 *p++ = xdr_two; /* cookie, second word */
307 *p++ = xdr_two; /* entry len */
308 memcpy(p, "..\0\0", 4); /* entry */
309 p++;
310 *p++ = xdr_one; /* bitmap length */
311 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
312 *p++ = htonl(8); /* attribute buffer length */
4e769b93 313 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_parent->d_inode));
1da177e4
LT
314
315 readdir->pgbase = (char *)p - (char *)start;
316 readdir->count -= readdir->pgbase;
2b86ce2d 317 kunmap_atomic(start);
1da177e4
LT
318}
319
65de872e
TM
320static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
321{
322 int res = 0;
323
324 might_sleep();
325
326 if (*timeout <= 0)
327 *timeout = NFS4_POLL_RETRY_MIN;
328 if (*timeout > NFS4_POLL_RETRY_MAX)
329 *timeout = NFS4_POLL_RETRY_MAX;
416ad3c9 330 freezable_schedule_timeout_killable_unsafe(*timeout);
65de872e
TM
331 if (fatal_signal_pending(current))
332 res = -ERESTARTSYS;
333 *timeout <<= 1;
334 return res;
335}
336
337/* This is the error handling routine for processes that are allowed
338 * to sleep.
339 */
b064eca2 340static int nfs4_handle_exception(struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
65de872e
TM
341{
342 struct nfs_client *clp = server->nfs_client;
9e33bed5 343 struct nfs4_state *state = exception->state;
3114ea7a 344 struct inode *inode = exception->inode;
65de872e
TM
345 int ret = errorcode;
346
347 exception->retry = 0;
348 switch(errorcode) {
349 case 0:
350 return 0;
3114ea7a 351 case -NFS4ERR_OPENMODE:
011e2a7f 352 if (inode && nfs4_have_delegation(inode, FMODE_READ)) {
57ec14c5 353 nfs4_inode_return_delegation(inode);
3114ea7a
TM
354 exception->retry = 1;
355 return 0;
356 }
357 if (state == NULL)
358 break;
5d422301
TM
359 ret = nfs4_schedule_stateid_recovery(server, state);
360 if (ret < 0)
361 break;
3114ea7a 362 goto wait_on_recovery;
a1d0b5ee 363 case -NFS4ERR_DELEG_REVOKED:
9e33bed5
TM
364 case -NFS4ERR_ADMIN_REVOKED:
365 case -NFS4ERR_BAD_STATEID:
b570a975
TM
366 if (inode != NULL && nfs4_have_delegation(inode, FMODE_READ)) {
367 nfs_remove_bad_delegation(inode);
368 exception->retry = 1;
369 break;
370 }
9e33bed5
TM
371 if (state == NULL)
372 break;
5d422301
TM
373 ret = nfs4_schedule_stateid_recovery(server, state);
374 if (ret < 0)
375 break;
0400a6b0 376 goto wait_on_recovery;
0ced63d1 377 case -NFS4ERR_EXPIRED:
5d422301
TM
378 if (state != NULL) {
379 ret = nfs4_schedule_stateid_recovery(server, state);
380 if (ret < 0)
381 break;
382 }
65de872e 383 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 384 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
385 nfs4_schedule_lease_recovery(clp);
386 goto wait_on_recovery;
03391693 387#if defined(CONFIG_NFS_V4_1)
4745e315
AA
388 case -NFS4ERR_BADSESSION:
389 case -NFS4ERR_BADSLOT:
390 case -NFS4ERR_BAD_HIGH_SLOT:
391 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
392 case -NFS4ERR_DEADSESSION:
393 case -NFS4ERR_SEQ_FALSE_RETRY:
394 case -NFS4ERR_SEQ_MISORDERED:
395 dprintk("%s ERROR: %d Reset session\n", __func__,
396 errorcode);
9f594791 397 nfs4_schedule_session_recovery(clp->cl_session, errorcode);
399f11c3 398 goto wait_on_recovery;
03391693 399#endif /* defined(CONFIG_NFS_V4_1) */
65de872e 400 case -NFS4ERR_FILE_OPEN:
44ed3556
N
401 if (exception->timeout > HZ) {
402 /* We have retried a decent amount, time to
403 * fail
404 */
405 ret = -EBUSY;
406 break;
407 }
65de872e
TM
408 case -NFS4ERR_GRACE:
409 case -NFS4ERR_DELAY:
410 ret = nfs4_delay(server->client, &exception->timeout);
411 if (ret != 0)
412 break;
a8a4ae3a 413 case -NFS4ERR_RETRY_UNCACHED_REP:
65de872e
TM
414 case -NFS4ERR_OLD_STATEID:
415 exception->retry = 1;
b064eca2
TM
416 break;
417 case -NFS4ERR_BADOWNER:
418 /* The following works around a Linux server bug! */
419 case -NFS4ERR_BADNAME:
420 if (server->caps & NFS_CAP_UIDGID_NOMAP) {
421 server->caps &= ~NFS_CAP_UIDGID_NOMAP;
422 exception->retry = 1;
423 printk(KERN_WARNING "NFS: v4 server %s "
424 "does not accept raw "
425 "uid/gids. "
426 "Reenabling the idmapper.\n",
427 server->nfs_client->cl_hostname);
428 }
65de872e
TM
429 }
430 /* We failed to handle the error */
431 return nfs4_map_errors(ret);
0400a6b0 432wait_on_recovery:
a2c0b9e2
TM
433 ret = nfs4_wait_clnt_recover(clp);
434 if (ret == 0)
435 exception->retry = 1;
436 return ret;
65de872e
TM
437}
438
a5250def
WAA
439/*
440 * Return 'true' if 'clp' is using an rpc_client that is integrity protected
441 * or 'false' otherwise.
442 */
443static bool _nfs4_is_integrity_protected(struct nfs_client *clp)
444{
445 rpc_authflavor_t flavor = clp->cl_rpcclient->cl_auth->au_flavor;
446
447 if (flavor == RPC_AUTH_GSS_KRB5I ||
448 flavor == RPC_AUTH_GSS_KRB5P)
449 return true;
450
451 return false;
452}
65de872e 453
452e9352 454static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp)
1da177e4 455{
1da177e4
LT
456 spin_lock(&clp->cl_lock);
457 if (time_before(clp->cl_last_renewal,timestamp))
458 clp->cl_last_renewal = timestamp;
459 spin_unlock(&clp->cl_lock);
460}
461
452e9352
TM
462static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
463{
464 do_renew_lease(server->nfs_client, timestamp);
465}
466
2a3eb2b9
CL
467struct nfs4_call_sync_data {
468 const struct nfs_server *seq_server;
469 struct nfs4_sequence_args *seq_args;
470 struct nfs4_sequence_res *seq_res;
471};
472
a9c92d6b
CL
473static void nfs4_init_sequence(struct nfs4_sequence_args *args,
474 struct nfs4_sequence_res *res, int cache_reply)
475{
476 args->sa_slot = NULL;
477 args->sa_cache_this = cache_reply;
478 args->sa_privileged = 0;
479
480 res->sr_slot = NULL;
481}
482
483static void nfs4_set_sequence_privileged(struct nfs4_sequence_args *args)
484{
485 args->sa_privileged = 1;
486}
487
3bd2384a
CL
488static int nfs40_setup_sequence(const struct nfs_server *server,
489 struct nfs4_sequence_args *args,
490 struct nfs4_sequence_res *res,
491 struct rpc_task *task)
492{
493 struct nfs4_slot_table *tbl = server->nfs_client->cl_slot_tbl;
494 struct nfs4_slot *slot;
495
496 /* slot already allocated? */
497 if (res->sr_slot != NULL)
498 goto out_start;
499
500 spin_lock(&tbl->slot_tbl_lock);
501 if (nfs4_slot_tbl_draining(tbl) && !args->sa_privileged)
502 goto out_sleep;
503
504 slot = nfs4_alloc_slot(tbl);
505 if (IS_ERR(slot)) {
506 if (slot == ERR_PTR(-ENOMEM))
507 task->tk_timeout = HZ >> 2;
508 goto out_sleep;
509 }
510 spin_unlock(&tbl->slot_tbl_lock);
511
512 args->sa_slot = slot;
513 res->sr_slot = slot;
514
515out_start:
516 rpc_call_start(task);
517 return 0;
518
519out_sleep:
520 if (args->sa_privileged)
521 rpc_sleep_on_priority(&tbl->slot_tbl_waitq, task,
522 NULL, RPC_PRIORITY_PRIVILEGED);
523 else
524 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
525 spin_unlock(&tbl->slot_tbl_lock);
526 return -EAGAIN;
527}
528
529static int nfs40_sequence_done(struct rpc_task *task,
530 struct nfs4_sequence_res *res)
531{
532 struct nfs4_slot *slot = res->sr_slot;
533 struct nfs4_slot_table *tbl;
534
535 if (!RPC_WAS_SENT(task))
536 goto out;
537
538 tbl = slot->table;
539 spin_lock(&tbl->slot_tbl_lock);
540 if (!nfs41_wake_and_assign_slot(tbl, slot))
541 nfs4_free_slot(tbl, slot);
542 spin_unlock(&tbl->slot_tbl_lock);
543
544 res->sr_slot = NULL;
545out:
546 return 1;
547}
548
cccef3b9
AA
549#if defined(CONFIG_NFS_V4_1)
550
d185a334 551static void nfs41_sequence_free_slot(struct nfs4_sequence_res *res)
13615871 552{
e3725ec0 553 struct nfs4_session *session;
13615871 554 struct nfs4_slot_table *tbl;
c10e4498 555 bool send_new_highest_used_slotid = false;
13615871 556
dfb4f309 557 if (!res->sr_slot) {
13615871
AA
558 /* just wake up the next guy waiting since
559 * we may have not consumed a slot after all */
691daf3b 560 dprintk("%s: No slot\n", __func__);
35dc1d74 561 return;
13615871 562 }
e3725ec0
TM
563 tbl = res->sr_slot->table;
564 session = tbl->session;
ea028ac9 565
35dc1d74 566 spin_lock(&tbl->slot_tbl_lock);
c10e4498
TM
567 /* Be nice to the server: try to ensure that the last transmitted
568 * value for highest_user_slotid <= target_highest_slotid
569 */
570 if (tbl->highest_used_slotid > tbl->target_highest_slotid)
571 send_new_highest_used_slotid = true;
572
b75ad4cd
TM
573 if (nfs41_wake_and_assign_slot(tbl, res->sr_slot)) {
574 send_new_highest_used_slotid = false;
575 goto out_unlock;
576 }
f4af6e2a 577 nfs4_free_slot(tbl, res->sr_slot);
c10e4498
TM
578
579 if (tbl->highest_used_slotid != NFS4_NO_SLOT)
580 send_new_highest_used_slotid = false;
b75ad4cd 581out_unlock:
35dc1d74 582 spin_unlock(&tbl->slot_tbl_lock);
dfb4f309 583 res->sr_slot = NULL;
c10e4498
TM
584 if (send_new_highest_used_slotid)
585 nfs41_server_notify_highest_slotid_update(session->clp);
13615871
AA
586}
587
14516c3a 588static int nfs41_sequence_done(struct rpc_task *task, struct nfs4_sequence_res *res)
b0df806c 589{
e3725ec0 590 struct nfs4_session *session;
933602e3 591 struct nfs4_slot *slot;
14516c3a 592 struct nfs_client *clp;
ac20d163 593 bool interrupted = false;
85563073 594 int ret = 1;
b0df806c 595
468f8613
BS
596 /* don't increment the sequence number if the task wasn't sent */
597 if (!RPC_WAS_SENT(task))
b0df806c
AA
598 goto out;
599
933602e3 600 slot = res->sr_slot;
e3725ec0 601 session = slot->table->session;
933602e3 602
ac20d163
TM
603 if (slot->interrupted) {
604 slot->interrupted = 0;
605 interrupted = true;
606 }
607
2f92ae34 608 trace_nfs4_sequence_done(session, res);
691daf3b 609 /* Check the SEQUENCE operation status */
14516c3a
TM
610 switch (res->sr_status) {
611 case 0:
b0df806c 612 /* Update the slot's sequence and clientid lease timer */
933602e3 613 ++slot->seq_nr;
e3725ec0 614 clp = session->clp;
8e63b6a8 615 do_renew_lease(clp, res->sr_timestamp);
0629e370 616 /* Check sequence flags */
b4410c2f
TM
617 if (res->sr_status_flags != 0)
618 nfs4_schedule_lease_recovery(clp);
464ee9f9 619 nfs41_update_target_slotid(slot->table, slot, res);
14516c3a 620 break;
ac20d163
TM
621 case 1:
622 /*
623 * sr_status remains 1 if an RPC level error occurred.
624 * The server may or may not have processed the sequence
625 * operation..
626 * Mark the slot as having hosted an interrupted RPC call.
627 */
628 slot->interrupted = 1;
629 goto out;
14516c3a
TM
630 case -NFS4ERR_DELAY:
631 /* The server detected a resend of the RPC call and
632 * returned NFS4ERR_DELAY as per Section 2.10.6.2
633 * of RFC5661.
634 */
df2fabff 635 dprintk("%s: slot=%u seq=%u: Operation in progress\n",
dfb4f309 636 __func__,
df2fabff 637 slot->slot_nr,
933602e3 638 slot->seq_nr);
14516c3a 639 goto out_retry;
85563073
TM
640 case -NFS4ERR_BADSLOT:
641 /*
642 * The slot id we used was probably retired. Try again
643 * using a different slot id.
644 */
e8794440
TM
645 goto retry_nowait;
646 case -NFS4ERR_SEQ_MISORDERED:
ac20d163
TM
647 /*
648 * Was the last operation on this sequence interrupted?
649 * If so, retry after bumping the sequence number.
650 */
651 if (interrupted) {
652 ++slot->seq_nr;
653 goto retry_nowait;
654 }
e8794440
TM
655 /*
656 * Could this slot have been previously retired?
657 * If so, then the server may be expecting seq_nr = 1!
658 */
8e63b6a8
TM
659 if (slot->seq_nr != 1) {
660 slot->seq_nr = 1;
661 goto retry_nowait;
662 }
663 break;
e8794440
TM
664 case -NFS4ERR_SEQ_FALSE_RETRY:
665 ++slot->seq_nr;
666 goto retry_nowait;
14516c3a
TM
667 default:
668 /* Just update the slot sequence no. */
933602e3 669 ++slot->seq_nr;
b0df806c
AA
670 }
671out:
672 /* The session may be reset by one of the error handlers. */
673 dprintk("%s: Error %d free the slot \n", __func__, res->sr_status);
d185a334 674 nfs41_sequence_free_slot(res);
85563073 675 return ret;
e8794440
TM
676retry_nowait:
677 if (rpc_restart_call_prepare(task)) {
678 task->tk_status = 0;
679 ret = 0;
680 }
681 goto out;
14516c3a 682out_retry:
d05dd4e9 683 if (!rpc_restart_call(task))
14516c3a
TM
684 goto out;
685 rpc_delay(task, NFS4_POLL_RETRY_MAX);
686 return 0;
b0df806c
AA
687}
688
14516c3a
TM
689static int nfs4_sequence_done(struct rpc_task *task,
690 struct nfs4_sequence_res *res)
df896455 691{
e3725ec0 692 if (res->sr_slot == NULL)
14516c3a 693 return 1;
3bd2384a
CL
694 if (!res->sr_slot->table->session)
695 return nfs40_sequence_done(task, res);
14516c3a 696 return nfs41_sequence_done(task, res);
df896455
TM
697}
698
dc70d7b3 699int nfs41_setup_sequence(struct nfs4_session *session,
ce5039c1
AA
700 struct nfs4_sequence_args *args,
701 struct nfs4_sequence_res *res,
ce5039c1
AA
702 struct rpc_task *task)
703{
fbcd4abc
AA
704 struct nfs4_slot *slot;
705 struct nfs4_slot_table *tbl;
fbcd4abc
AA
706
707 dprintk("--> %s\n", __func__);
ce5039c1 708 /* slot already allocated? */
dfb4f309 709 if (res->sr_slot != NULL)
d9afbd1b 710 goto out_success;
ce5039c1 711
fbcd4abc
AA
712 tbl = &session->fc_slot_table;
713
69d206b5
TM
714 task->tk_timeout = 0;
715
fbcd4abc 716 spin_lock(&tbl->slot_tbl_lock);
774d5f14 717 if (test_bit(NFS4_SLOT_TBL_DRAINING, &tbl->slot_tbl_state) &&
8fe72bac 718 !args->sa_privileged) {
0b1c8fc4 719 /* The state manager will wait until the slot table is empty */
0b1c8fc4 720 dprintk("%s session is draining\n", __func__);
7b939a3f 721 goto out_sleep;
689cf5c1
AB
722 }
723
2dc03b7f 724 slot = nfs4_alloc_slot(tbl);
69d206b5
TM
725 if (IS_ERR(slot)) {
726 /* If out of memory, try again in 1/4 second */
727 if (slot == ERR_PTR(-ENOMEM))
728 task->tk_timeout = HZ >> 2;
fbcd4abc 729 dprintk("<-- %s: no free slots\n", __func__);
7b939a3f 730 goto out_sleep;
fbcd4abc
AA
731 }
732 spin_unlock(&tbl->slot_tbl_lock);
733
2b2fa717 734 args->sa_slot = slot;
fbcd4abc 735
e8d92382 736 dprintk("<-- %s slotid=%u seqid=%u\n", __func__,
2dc03b7f 737 slot->slot_nr, slot->seq_nr);
fbcd4abc 738
dfb4f309 739 res->sr_slot = slot;
8e63b6a8 740 res->sr_timestamp = jiffies;
2a6e26cd 741 res->sr_status_flags = 0;
fbcd4abc
AA
742 /*
743 * sr_status is only set in decode_sequence, and so will remain
744 * set to 1 if an rpc level failure occurs.
745 */
746 res->sr_status = 1;
2f92ae34 747 trace_nfs4_setup_sequence(session, args);
d9afbd1b
TM
748out_success:
749 rpc_call_start(task);
ce5039c1 750 return 0;
7b939a3f 751out_sleep:
8fe72bac
TM
752 /* Privileged tasks are queued with top priority */
753 if (args->sa_privileged)
1e1093c7
TM
754 rpc_sleep_on_priority(&tbl->slot_tbl_waitq, task,
755 NULL, RPC_PRIORITY_PRIVILEGED);
756 else
757 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
7b939a3f
TM
758 spin_unlock(&tbl->slot_tbl_lock);
759 return -EAGAIN;
ce5039c1 760}
dc70d7b3 761EXPORT_SYMBOL_GPL(nfs41_setup_sequence);
ce5039c1 762
5a580e0a
CL
763static int nfs4_setup_sequence(const struct nfs_server *server,
764 struct nfs4_sequence_args *args,
765 struct nfs4_sequence_res *res,
766 struct rpc_task *task)
ce5039c1 767{
035168ab 768 struct nfs4_session *session = nfs4_get_session(server);
ce5039c1
AA
769 int ret = 0;
770
3bd2384a
CL
771 if (!session)
772 return nfs40_setup_sequence(server, args, res, task);
035168ab 773
e8d92382 774 dprintk("--> %s clp %p session %p sr_slot %u\n",
dfb4f309 775 __func__, session->clp, session, res->sr_slot ?
e8d92382 776 res->sr_slot->slot_nr : NFS4_NO_SLOT);
ce5039c1 777
9d12b216 778 ret = nfs41_setup_sequence(session, args, res, task);
3bd2384a 779
ce5039c1
AA
780 dprintk("<-- %s status=%d\n", __func__, ret);
781 return ret;
782}
783
ce5039c1
AA
784static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata)
785{
2a3eb2b9 786 struct nfs4_call_sync_data *data = calldata;
6ba7db34 787 struct nfs4_session *session = nfs4_get_session(data->seq_server);
ce5039c1 788
035168ab
TM
789 dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server);
790
d9afbd1b 791 nfs41_setup_sequence(session, data->seq_args, data->seq_res, task);
ce5039c1
AA
792}
793
69ab40c4
AA
794static void nfs41_call_sync_done(struct rpc_task *task, void *calldata)
795{
2a3eb2b9 796 struct nfs4_call_sync_data *data = calldata;
69ab40c4 797
14516c3a 798 nfs41_sequence_done(task, data->seq_res);
69ab40c4
AA
799}
800
17280175 801static const struct rpc_call_ops nfs41_call_sync_ops = {
ce5039c1 802 .rpc_call_prepare = nfs41_call_sync_prepare,
69ab40c4 803 .rpc_call_done = nfs41_call_sync_done,
ce5039c1
AA
804};
805
3bd2384a
CL
806#else /* !CONFIG_NFS_V4_1 */
807
9915ea7e
CL
808static int nfs4_setup_sequence(const struct nfs_server *server,
809 struct nfs4_sequence_args *args,
810 struct nfs4_sequence_res *res,
811 struct rpc_task *task)
812{
3bd2384a 813 return nfs40_setup_sequence(server, args, res, task);
9915ea7e
CL
814}
815
816static int nfs4_sequence_done(struct rpc_task *task,
817 struct nfs4_sequence_res *res)
818{
3bd2384a 819 return nfs40_sequence_done(task, res);
9915ea7e 820}
3bd2384a
CL
821
822#endif /* !CONFIG_NFS_V4_1 */
9915ea7e
CL
823
824static void nfs40_call_sync_prepare(struct rpc_task *task, void *calldata)
825{
826 struct nfs4_call_sync_data *data = calldata;
827 nfs4_setup_sequence(data->seq_server,
828 data->seq_args, data->seq_res, task);
829}
830
831static void nfs40_call_sync_done(struct rpc_task *task, void *calldata)
832{
833 struct nfs4_call_sync_data *data = calldata;
834 nfs4_sequence_done(task, data->seq_res);
835}
836
837static const struct rpc_call_ops nfs40_call_sync_ops = {
838 .rpc_call_prepare = nfs40_call_sync_prepare,
839 .rpc_call_done = nfs40_call_sync_done,
840};
841
7c513058
BS
842static int nfs4_call_sync_sequence(struct rpc_clnt *clnt,
843 struct nfs_server *server,
ce5039c1
AA
844 struct rpc_message *msg,
845 struct nfs4_sequence_args *args,
8fe72bac 846 struct nfs4_sequence_res *res)
ce5039c1
AA
847{
848 int ret;
849 struct rpc_task *task;
9915ea7e 850 struct nfs_client *clp = server->nfs_client;
2a3eb2b9 851 struct nfs4_call_sync_data data = {
035168ab 852 .seq_server = server,
ce5039c1
AA
853 .seq_args = args,
854 .seq_res = res,
ce5039c1
AA
855 };
856 struct rpc_task_setup task_setup = {
7c513058 857 .rpc_client = clnt,
ce5039c1 858 .rpc_message = msg,
9915ea7e 859 .callback_ops = clp->cl_mvops->call_sync_ops,
ce5039c1
AA
860 .callback_data = &data
861 };
862
ce5039c1
AA
863 task = rpc_run_task(&task_setup);
864 if (IS_ERR(task))
865 ret = PTR_ERR(task);
866 else {
867 ret = task->tk_status;
868 rpc_put_task(task);
869 }
870 return ret;
871}
872
fd0c0953 873static
7c513058
BS
874int nfs4_call_sync(struct rpc_clnt *clnt,
875 struct nfs_server *server,
e73b83f2
BS
876 struct rpc_message *msg,
877 struct nfs4_sequence_args *args,
878 struct nfs4_sequence_res *res,
879 int cache_reply)
880{
a9c92d6b 881 nfs4_init_sequence(args, res, cache_reply);
9915ea7e 882 return nfs4_call_sync_sequence(clnt, server, msg, args, res);
e73b83f2 883}
cccef3b9 884
38478b24 885static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
1da177e4 886{
38478b24 887 struct nfs_inode *nfsi = NFS_I(dir);
1da177e4 888
38478b24 889 spin_lock(&dir->i_lock);
359d7d1c 890 nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_INVALID_DATA;
a9a4a87a 891 if (!cinfo->atomic || cinfo->before != dir->i_version)
bfc69a45 892 nfs_force_lookup_revalidate(dir);
a9a4a87a 893 dir->i_version = cinfo->after;
de242c0b 894 nfs_fscache_invalidate(dir);
38478b24 895 spin_unlock(&dir->i_lock);
1da177e4
LT
896}
897
e56e0b78 898struct nfs4_opendata {
c6d00e63 899 struct kref kref;
e56e0b78
TM
900 struct nfs_openargs o_arg;
901 struct nfs_openres o_res;
cdd4e68b
TM
902 struct nfs_open_confirmargs c_arg;
903 struct nfs_open_confirmres c_res;
6926afd1
TM
904 struct nfs4_string owner_name;
905 struct nfs4_string group_name;
e56e0b78 906 struct nfs_fattr f_attr;
1775fd3e 907 struct nfs4_label *f_label;
e56e0b78 908 struct dentry *dir;
82a2c1b7 909 struct dentry *dentry;
e56e0b78 910 struct nfs4_state_owner *owner;
aac00a8d 911 struct nfs4_state *state;
e56e0b78 912 struct iattr attrs;
26e976a8 913 unsigned long timestamp;
3e309914 914 unsigned int rpc_done : 1;
5bc2afc2 915 unsigned int file_created : 1;
bdeca1b7 916 unsigned int is_recover : 1;
24ac23ab
TM
917 int rpc_status;
918 int cancelled;
e56e0b78
TM
919};
920
49f9a0fa
TM
921static bool nfs4_clear_cap_atomic_open_v1(struct nfs_server *server,
922 int err, struct nfs4_exception *exception)
923{
924 if (err != -EINVAL)
925 return false;
926 if (!(server->caps & NFS_CAP_ATOMIC_OPEN_V1))
927 return false;
928 server->caps &= ~NFS_CAP_ATOMIC_OPEN_V1;
929 exception->retry = 1;
930 return true;
931}
932
933static enum open_claim_type4
934nfs4_map_atomic_open_claim(struct nfs_server *server,
935 enum open_claim_type4 claim)
936{
937 if (server->caps & NFS_CAP_ATOMIC_OPEN_V1)
938 return claim;
939 switch (claim) {
940 default:
941 return claim;
942 case NFS4_OPEN_CLAIM_FH:
943 return NFS4_OPEN_CLAIM_NULL;
944 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
945 return NFS4_OPEN_CLAIM_DELEGATE_CUR;
946 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
947 return NFS4_OPEN_CLAIM_DELEGATE_PREV;
948 }
949}
2ced46c2
TM
950
951static void nfs4_init_opendata_res(struct nfs4_opendata *p)
952{
953 p->o_res.f_attr = &p->f_attr;
1775fd3e 954 p->o_res.f_label = p->f_label;
c1d51931
TM
955 p->o_res.seqid = p->o_arg.seqid;
956 p->c_res.seqid = p->c_arg.seqid;
2ced46c2 957 p->o_res.server = p->o_arg.server;
5f657530 958 p->o_res.access_request = p->o_arg.access;
2ced46c2 959 nfs_fattr_init(&p->f_attr);
6926afd1 960 nfs_fattr_init_names(&p->f_attr, &p->owner_name, &p->group_name);
2ced46c2
TM
961}
962
82a2c1b7 963static struct nfs4_opendata *nfs4_opendata_alloc(struct dentry *dentry,
dc0b027d 964 struct nfs4_state_owner *sp, fmode_t fmode, int flags,
8535b2be 965 const struct iattr *attrs,
1775fd3e 966 struct nfs4_label *label,
4a1c0893 967 enum open_claim_type4 claim,
8535b2be 968 gfp_t gfp_mask)
e56e0b78 969{
82a2c1b7 970 struct dentry *parent = dget_parent(dentry);
e56e0b78
TM
971 struct inode *dir = parent->d_inode;
972 struct nfs_server *server = NFS_SERVER(dir);
973 struct nfs4_opendata *p;
974
8535b2be 975 p = kzalloc(sizeof(*p), gfp_mask);
e56e0b78
TM
976 if (p == NULL)
977 goto err;
14c43f76
DQ
978
979 p->f_label = nfs4_label_alloc(server, gfp_mask);
980 if (IS_ERR(p->f_label))
981 goto err_free_p;
982
8535b2be 983 p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid, gfp_mask);
e56e0b78 984 if (p->o_arg.seqid == NULL)
14c43f76 985 goto err_free_label;
82a2c1b7
AV
986 nfs_sb_active(dentry->d_sb);
987 p->dentry = dget(dentry);
e56e0b78
TM
988 p->dir = parent;
989 p->owner = sp;
990 atomic_inc(&sp->so_count);
dc0b027d
TM
991 p->o_arg.open_flags = flags;
992 p->o_arg.fmode = fmode & (FMODE_READ|FMODE_WRITE);
ae2bb032
WAA
993 /* don't put an ACCESS op in OPEN compound if O_EXCL, because ACCESS
994 * will return permission denied for all bits until close */
995 if (!(flags & O_EXCL)) {
996 /* ask server to check for all possible rights as results
997 * are cached */
998 p->o_arg.access = NFS4_ACCESS_READ | NFS4_ACCESS_MODIFY |
999 NFS4_ACCESS_EXTEND | NFS4_ACCESS_EXECUTE;
ae2bb032 1000 }
7539bbab 1001 p->o_arg.clientid = server->nfs_client->cl_clientid;
95b72eb0
TM
1002 p->o_arg.id.create_time = ktime_to_ns(sp->so_seqid.create_time);
1003 p->o_arg.id.uniquifier = sp->so_seqid.owner_id;
82a2c1b7 1004 p->o_arg.name = &dentry->d_name;
e56e0b78 1005 p->o_arg.server = server;
aa9c2669 1006 p->o_arg.bitmask = nfs4_bitmask(server, label);
1549210f 1007 p->o_arg.open_bitmap = &nfs4_fattr_bitmap[0];
1775fd3e 1008 p->o_arg.label = label;
49f9a0fa
TM
1009 p->o_arg.claim = nfs4_map_atomic_open_claim(server, claim);
1010 switch (p->o_arg.claim) {
4a1c0893
TM
1011 case NFS4_OPEN_CLAIM_NULL:
1012 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1013 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1014 p->o_arg.fh = NFS_FH(dir);
1015 break;
1016 case NFS4_OPEN_CLAIM_PREVIOUS:
1017 case NFS4_OPEN_CLAIM_FH:
1018 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1019 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1020 p->o_arg.fh = NFS_FH(dentry->d_inode);
1021 }
536e43d1 1022 if (attrs != NULL && attrs->ia_valid != 0) {
c281fa9c 1023 __u32 verf[2];
d77d76ff 1024
e56e0b78
TM
1025 p->o_arg.u.attrs = &p->attrs;
1026 memcpy(&p->attrs, attrs, sizeof(p->attrs));
cd93710e
CL
1027
1028 verf[0] = jiffies;
1029 verf[1] = current->pid;
1030 memcpy(p->o_arg.u.verifier.data, verf,
1031 sizeof(p->o_arg.u.verifier.data));
e56e0b78 1032 }
cdd4e68b
TM
1033 p->c_arg.fh = &p->o_res.fh;
1034 p->c_arg.stateid = &p->o_res.stateid;
1035 p->c_arg.seqid = p->o_arg.seqid;
2ced46c2 1036 nfs4_init_opendata_res(p);
c6d00e63 1037 kref_init(&p->kref);
e56e0b78 1038 return p;
14c43f76
DQ
1039
1040err_free_label:
1041 nfs4_label_free(p->f_label);
1042err_free_p:
e56e0b78
TM
1043 kfree(p);
1044err:
1045 dput(parent);
1046 return NULL;
1047}
1048
c6d00e63 1049static void nfs4_opendata_free(struct kref *kref)
e56e0b78 1050{
c6d00e63
TM
1051 struct nfs4_opendata *p = container_of(kref,
1052 struct nfs4_opendata, kref);
82a2c1b7 1053 struct super_block *sb = p->dentry->d_sb;
c6d00e63
TM
1054
1055 nfs_free_seqid(p->o_arg.seqid);
aac00a8d
TM
1056 if (p->state != NULL)
1057 nfs4_put_open_state(p->state);
c6d00e63 1058 nfs4_put_state_owner(p->owner);
14c43f76
DQ
1059
1060 nfs4_label_free(p->f_label);
1061
c6d00e63 1062 dput(p->dir);
82a2c1b7
AV
1063 dput(p->dentry);
1064 nfs_sb_deactive(sb);
6926afd1 1065 nfs_fattr_free_names(&p->f_attr);
c6d00e63
TM
1066 kfree(p);
1067}
1068
1069static void nfs4_opendata_put(struct nfs4_opendata *p)
1070{
1071 if (p != NULL)
1072 kref_put(&p->kref, nfs4_opendata_free);
e56e0b78
TM
1073}
1074
06f814a3
TM
1075static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
1076{
06f814a3
TM
1077 int ret;
1078
06f814a3 1079 ret = rpc_wait_for_completion_task(task);
06f814a3
TM
1080 return ret;
1081}
1082
dc0b027d 1083static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode)
6ee41268
TM
1084{
1085 int ret = 0;
dc0b027d 1086
536e43d1 1087 if (open_mode & (O_EXCL|O_TRUNC))
dc0b027d
TM
1088 goto out;
1089 switch (mode & (FMODE_READ|FMODE_WRITE)) {
6ee41268 1090 case FMODE_READ:
88069f77
TM
1091 ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0
1092 && state->n_rdonly != 0;
6ee41268
TM
1093 break;
1094 case FMODE_WRITE:
88069f77
TM
1095 ret |= test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0
1096 && state->n_wronly != 0;
6ee41268
TM
1097 break;
1098 case FMODE_READ|FMODE_WRITE:
88069f77
TM
1099 ret |= test_bit(NFS_O_RDWR_STATE, &state->flags) != 0
1100 && state->n_rdwr != 0;
6ee41268 1101 }
dc0b027d 1102out:
6ee41268
TM
1103 return ret;
1104}
1105
dc0b027d 1106static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode)
aac00a8d 1107{
652f89f6
TM
1108 if (delegation == NULL)
1109 return 0;
dc0b027d 1110 if ((delegation->type & fmode) != fmode)
aac00a8d 1111 return 0;
15c831bf 1112 if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags))
aac00a8d 1113 return 0;
d25be546
TM
1114 if (test_bit(NFS_DELEGATION_RETURNING, &delegation->flags))
1115 return 0;
b7391f44 1116 nfs_mark_delegation_referenced(delegation);
aac00a8d
TM
1117 return 1;
1118}
1119
dc0b027d 1120static void update_open_stateflags(struct nfs4_state *state, fmode_t fmode)
e7616923 1121{
dc0b027d 1122 switch (fmode) {
e7616923
TM
1123 case FMODE_WRITE:
1124 state->n_wronly++;
1125 break;
1126 case FMODE_READ:
1127 state->n_rdonly++;
1128 break;
1129 case FMODE_READ|FMODE_WRITE:
1130 state->n_rdwr++;
1131 }
dc0b027d 1132 nfs4_state_set_mode_locked(state, state->state | fmode);
003707c7
TM
1133}
1134
dc0b027d 1135static void nfs_set_open_stateid_locked(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7
TM
1136{
1137 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
f597c537
TM
1138 nfs4_stateid_copy(&state->stateid, stateid);
1139 nfs4_stateid_copy(&state->open_stateid, stateid);
92b40e93 1140 set_bit(NFS_OPEN_STATE, &state->flags);
dc0b027d 1141 switch (fmode) {
003707c7
TM
1142 case FMODE_READ:
1143 set_bit(NFS_O_RDONLY_STATE, &state->flags);
1144 break;
1145 case FMODE_WRITE:
1146 set_bit(NFS_O_WRONLY_STATE, &state->flags);
1147 break;
1148 case FMODE_READ|FMODE_WRITE:
1149 set_bit(NFS_O_RDWR_STATE, &state->flags);
1150 }
e7616923
TM
1151}
1152
dc0b027d 1153static void nfs_set_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7 1154{
8bda4e4c 1155 write_seqlock(&state->seqlock);
dc0b027d 1156 nfs_set_open_stateid_locked(state, stateid, fmode);
8bda4e4c 1157 write_sequnlock(&state->seqlock);
003707c7
TM
1158}
1159
dc0b027d 1160static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode)
1da177e4 1161{
8bda4e4c
TM
1162 /*
1163 * Protect the call to nfs4_state_set_mode_locked and
1164 * serialise the stateid update
1165 */
1166 write_seqlock(&state->seqlock);
003707c7 1167 if (deleg_stateid != NULL) {
f597c537 1168 nfs4_stateid_copy(&state->stateid, deleg_stateid);
003707c7
TM
1169 set_bit(NFS_DELEGATED_STATE, &state->flags);
1170 }
1171 if (open_stateid != NULL)
dc0b027d 1172 nfs_set_open_stateid_locked(state, open_stateid, fmode);
8bda4e4c
TM
1173 write_sequnlock(&state->seqlock);
1174 spin_lock(&state->owner->so_lock);
dc0b027d 1175 update_open_stateflags(state, fmode);
ec073428 1176 spin_unlock(&state->owner->so_lock);
1da177e4
LT
1177}
1178
dc0b027d 1179static int update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, nfs4_stateid *delegation, fmode_t fmode)
34310430
TM
1180{
1181 struct nfs_inode *nfsi = NFS_I(state->inode);
1182 struct nfs_delegation *deleg_cur;
1183 int ret = 0;
1184
dc0b027d 1185 fmode &= (FMODE_READ|FMODE_WRITE);
34310430
TM
1186
1187 rcu_read_lock();
1188 deleg_cur = rcu_dereference(nfsi->delegation);
1189 if (deleg_cur == NULL)
1190 goto no_delegation;
1191
1192 spin_lock(&deleg_cur->lock);
17f26b12 1193 if (rcu_dereference(nfsi->delegation) != deleg_cur ||
d25be546 1194 test_bit(NFS_DELEGATION_RETURNING, &deleg_cur->flags) ||
dc0b027d 1195 (deleg_cur->type & fmode) != fmode)
34310430
TM
1196 goto no_delegation_unlock;
1197
1198 if (delegation == NULL)
1199 delegation = &deleg_cur->stateid;
f597c537 1200 else if (!nfs4_stateid_match(&deleg_cur->stateid, delegation))
34310430
TM
1201 goto no_delegation_unlock;
1202
b7391f44 1203 nfs_mark_delegation_referenced(deleg_cur);
dc0b027d 1204 __update_open_stateid(state, open_stateid, &deleg_cur->stateid, fmode);
34310430
TM
1205 ret = 1;
1206no_delegation_unlock:
1207 spin_unlock(&deleg_cur->lock);
1208no_delegation:
1209 rcu_read_unlock();
1210
1211 if (!ret && open_stateid != NULL) {
dc0b027d 1212 __update_open_stateid(state, open_stateid, NULL, fmode);
34310430
TM
1213 ret = 1;
1214 }
1215
1216 return ret;
1217}
1218
1219
dc0b027d 1220static void nfs4_return_incompatible_delegation(struct inode *inode, fmode_t fmode)
aac00a8d
TM
1221{
1222 struct nfs_delegation *delegation;
1223
1224 rcu_read_lock();
1225 delegation = rcu_dereference(NFS_I(inode)->delegation);
dc0b027d 1226 if (delegation == NULL || (delegation->type & fmode) == fmode) {
aac00a8d
TM
1227 rcu_read_unlock();
1228 return;
1229 }
1230 rcu_read_unlock();
57ec14c5 1231 nfs4_inode_return_delegation(inode);
aac00a8d
TM
1232}
1233
6ee41268 1234static struct nfs4_state *nfs4_try_open_cached(struct nfs4_opendata *opendata)
aac00a8d
TM
1235{
1236 struct nfs4_state *state = opendata->state;
1237 struct nfs_inode *nfsi = NFS_I(state->inode);
1238 struct nfs_delegation *delegation;
f448badd 1239 int open_mode = opendata->o_arg.open_flags;
dc0b027d 1240 fmode_t fmode = opendata->o_arg.fmode;
aac00a8d
TM
1241 nfs4_stateid stateid;
1242 int ret = -EAGAIN;
1243
aac00a8d 1244 for (;;) {
dc0b027d 1245 if (can_open_cached(state, fmode, open_mode)) {
6ee41268 1246 spin_lock(&state->owner->so_lock);
dc0b027d
TM
1247 if (can_open_cached(state, fmode, open_mode)) {
1248 update_open_stateflags(state, fmode);
6ee41268 1249 spin_unlock(&state->owner->so_lock);
6ee41268
TM
1250 goto out_return_state;
1251 }
1252 spin_unlock(&state->owner->so_lock);
1253 }
34310430
TM
1254 rcu_read_lock();
1255 delegation = rcu_dereference(nfsi->delegation);
652f89f6 1256 if (!can_open_delegated(delegation, fmode)) {
34310430 1257 rcu_read_unlock();
aac00a8d 1258 break;
34310430 1259 }
aac00a8d 1260 /* Save the delegation */
f597c537 1261 nfs4_stateid_copy(&stateid, &delegation->stateid);
aac00a8d 1262 rcu_read_unlock();
fa332941 1263 nfs_release_seqid(opendata->o_arg.seqid);
bdeca1b7
TM
1264 if (!opendata->is_recover) {
1265 ret = nfs_may_open(state->inode, state->owner->so_cred, open_mode);
1266 if (ret != 0)
1267 goto out;
1268 }
aac00a8d 1269 ret = -EAGAIN;
34310430
TM
1270
1271 /* Try to update the stateid using the delegation */
dc0b027d 1272 if (update_open_stateid(state, NULL, &stateid, fmode))
34310430 1273 goto out_return_state;
aac00a8d 1274 }
aac00a8d
TM
1275out:
1276 return ERR_PTR(ret);
1277out_return_state:
1278 atomic_inc(&state->count);
1279 return state;
1280}
1281
e23008ec
AA
1282static void
1283nfs4_opendata_check_deleg(struct nfs4_opendata *data, struct nfs4_state *state)
1284{
1285 struct nfs_client *clp = NFS_SERVER(state->inode)->nfs_client;
1286 struct nfs_delegation *delegation;
1287 int delegation_flags = 0;
1288
1289 rcu_read_lock();
1290 delegation = rcu_dereference(NFS_I(state->inode)->delegation);
1291 if (delegation)
1292 delegation_flags = delegation->flags;
1293 rcu_read_unlock();
1294 if (data->o_arg.claim == NFS4_OPEN_CLAIM_DELEGATE_CUR) {
1295 pr_err_ratelimited("NFS: Broken NFSv4 server %s is "
1296 "returning a delegation for "
1297 "OPEN(CLAIM_DELEGATE_CUR)\n",
1298 clp->cl_hostname);
1299 } else if ((delegation_flags & 1UL<<NFS_DELEGATION_NEED_RECLAIM) == 0)
1300 nfs_inode_set_delegation(state->inode,
1301 data->owner->so_cred,
1302 &data->o_res);
1303 else
1304 nfs_inode_reclaim_delegation(state->inode,
1305 data->owner->so_cred,
1306 &data->o_res);
1307}
1308
1309/*
1310 * Check the inode attributes against the CLAIM_PREVIOUS returned attributes
1311 * and update the nfs4_state.
1312 */
1313static struct nfs4_state *
1314_nfs4_opendata_reclaim_to_nfs4_state(struct nfs4_opendata *data)
1315{
1316 struct inode *inode = data->state->inode;
1317 struct nfs4_state *state = data->state;
1318 int ret;
1319
f494a607
WAA
1320 /* allow cached opens (!rpc_done && !rpc_status) */
1321 if (!data->rpc_done && data->rpc_status) {
e23008ec
AA
1322 ret = data->rpc_status;
1323 goto err;
1324 }
1325
e23008ec
AA
1326 ret = nfs_refresh_inode(inode, &data->f_attr);
1327 if (ret)
1328 goto err;
1329
1330 if (data->o_res.delegation_type != 0)
1331 nfs4_opendata_check_deleg(data, state);
1332 update_open_stateid(state, &data->o_res.stateid, NULL,
1333 data->o_arg.fmode);
d49f042a 1334 atomic_inc(&state->count);
e23008ec
AA
1335
1336 return state;
1337err:
1338 return ERR_PTR(ret);
1339
1340}
1341
1342static struct nfs4_state *
1343_nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
24ac23ab
TM
1344{
1345 struct inode *inode;
1346 struct nfs4_state *state = NULL;
1b370bc2 1347 int ret;
24ac23ab 1348
aac00a8d 1349 if (!data->rpc_done) {
6ee41268 1350 state = nfs4_try_open_cached(data);
aac00a8d
TM
1351 goto out;
1352 }
1353
1b370bc2 1354 ret = -EAGAIN;
24ac23ab 1355 if (!(data->f_attr.valid & NFS_ATTR_FATTR))
1b370bc2 1356 goto err;
1775fd3e 1357 inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr, data->f_label);
1b370bc2 1358 ret = PTR_ERR(inode);
03f28e3a 1359 if (IS_ERR(inode))
1b370bc2
TM
1360 goto err;
1361 ret = -ENOMEM;
24ac23ab
TM
1362 state = nfs4_get_open_state(inode, data->owner);
1363 if (state == NULL)
1b370bc2 1364 goto err_put_inode;
e23008ec
AA
1365 if (data->o_res.delegation_type != 0)
1366 nfs4_opendata_check_deleg(data, state);
34310430 1367 update_open_stateid(state, &data->o_res.stateid, NULL,
dc0b027d 1368 data->o_arg.fmode);
24ac23ab 1369 iput(inode);
aac00a8d 1370out:
7aa262b5 1371 nfs_release_seqid(data->o_arg.seqid);
24ac23ab 1372 return state;
1b370bc2
TM
1373err_put_inode:
1374 iput(inode);
1375err:
1376 return ERR_PTR(ret);
24ac23ab
TM
1377}
1378
e23008ec
AA
1379static struct nfs4_state *
1380nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
1381{
1382 if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS)
1383 return _nfs4_opendata_reclaim_to_nfs4_state(data);
1384 return _nfs4_opendata_to_nfs4_state(data);
1385}
1386
864472e9
TM
1387static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
1388{
1389 struct nfs_inode *nfsi = NFS_I(state->inode);
1390 struct nfs_open_context *ctx;
1391
1392 spin_lock(&state->inode->i_lock);
1393 list_for_each_entry(ctx, &nfsi->open_files, list) {
1394 if (ctx->state != state)
1395 continue;
1396 get_nfs_open_context(ctx);
1397 spin_unlock(&state->inode->i_lock);
1398 return ctx;
1399 }
1400 spin_unlock(&state->inode->i_lock);
1401 return ERR_PTR(-ENOENT);
1402}
1403
4a1c0893
TM
1404static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx,
1405 struct nfs4_state *state, enum open_claim_type4 claim)
6f220ed5
TM
1406{
1407 struct nfs4_opendata *opendata;
1408
4a1c0893 1409 opendata = nfs4_opendata_alloc(ctx->dentry, state->owner, 0, 0,
1775fd3e 1410 NULL, NULL, claim, GFP_NOFS);
6f220ed5
TM
1411 if (opendata == NULL)
1412 return ERR_PTR(-ENOMEM);
1413 opendata->state = state;
1414 atomic_inc(&state->count);
1415 return opendata;
1416}
1417
dc0b027d 1418static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, fmode_t fmode, struct nfs4_state **res)
864472e9 1419{
2ced46c2 1420 struct nfs4_state *newstate;
864472e9
TM
1421 int ret;
1422
dc0b027d
TM
1423 opendata->o_arg.open_flags = 0;
1424 opendata->o_arg.fmode = fmode;
2ced46c2
TM
1425 memset(&opendata->o_res, 0, sizeof(opendata->o_res));
1426 memset(&opendata->c_res, 0, sizeof(opendata->c_res));
1427 nfs4_init_opendata_res(opendata);
b257957e 1428 ret = _nfs4_recover_proc_open(opendata);
864472e9
TM
1429 if (ret != 0)
1430 return ret;
2ced46c2 1431 newstate = nfs4_opendata_to_nfs4_state(opendata);
1b370bc2
TM
1432 if (IS_ERR(newstate))
1433 return PTR_ERR(newstate);
643168c2 1434 nfs4_close_state(newstate, fmode);
2ced46c2 1435 *res = newstate;
864472e9
TM
1436 return 0;
1437}
1438
1439static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
1440{
864472e9 1441 struct nfs4_state *newstate;
864472e9
TM
1442 int ret;
1443
1444 /* memory barrier prior to reading state->n_* */
2ced46c2 1445 clear_bit(NFS_DELEGATED_STATE, &state->flags);
fd068b20 1446 clear_bit(NFS_OPEN_STATE, &state->flags);
864472e9
TM
1447 smp_rmb();
1448 if (state->n_rdwr != 0) {
b0ed9dbc 1449 clear_bit(NFS_O_RDWR_STATE, &state->flags);
2ced46c2 1450 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &newstate);
864472e9
TM
1451 if (ret != 0)
1452 return ret;
2ced46c2
TM
1453 if (newstate != state)
1454 return -ESTALE;
864472e9
TM
1455 }
1456 if (state->n_wronly != 0) {
b0ed9dbc 1457 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2ced46c2 1458 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &newstate);
864472e9
TM
1459 if (ret != 0)
1460 return ret;
2ced46c2
TM
1461 if (newstate != state)
1462 return -ESTALE;
864472e9
TM
1463 }
1464 if (state->n_rdonly != 0) {
b0ed9dbc 1465 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2ced46c2 1466 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &newstate);
864472e9
TM
1467 if (ret != 0)
1468 return ret;
2ced46c2
TM
1469 if (newstate != state)
1470 return -ESTALE;
864472e9 1471 }
1ac7e2fd
TM
1472 /*
1473 * We may have performed cached opens for all three recoveries.
1474 * Check if we need to update the current stateid.
1475 */
1476 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0 &&
f597c537 1477 !nfs4_stateid_match(&state->stateid, &state->open_stateid)) {
8bda4e4c 1478 write_seqlock(&state->seqlock);
1ac7e2fd 1479 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
f597c537 1480 nfs4_stateid_copy(&state->stateid, &state->open_stateid);
8bda4e4c 1481 write_sequnlock(&state->seqlock);
1ac7e2fd 1482 }
864472e9
TM
1483 return 0;
1484}
1485
1da177e4
LT
1486/*
1487 * OPEN_RECLAIM:
1488 * reclaim state on the server after a reboot.
1da177e4 1489 */
539cd03a 1490static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1491{
1ac7e2fd 1492 struct nfs_delegation *delegation;
864472e9 1493 struct nfs4_opendata *opendata;
dc0b027d 1494 fmode_t delegation_type = 0;
1da177e4
LT
1495 int status;
1496
4a1c0893
TM
1497 opendata = nfs4_open_recoverdata_alloc(ctx, state,
1498 NFS4_OPEN_CLAIM_PREVIOUS);
6f220ed5
TM
1499 if (IS_ERR(opendata))
1500 return PTR_ERR(opendata);
1ac7e2fd
TM
1501 rcu_read_lock();
1502 delegation = rcu_dereference(NFS_I(state->inode)->delegation);
15c831bf 1503 if (delegation != NULL && test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags) != 0)
65bbf6bd 1504 delegation_type = delegation->type;
1ac7e2fd 1505 rcu_read_unlock();
864472e9
TM
1506 opendata->o_arg.u.delegation_type = delegation_type;
1507 status = nfs4_open_recover(opendata, state);
c6d00e63 1508 nfs4_opendata_put(opendata);
1da177e4
LT
1509 return status;
1510}
1511
539cd03a 1512static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
1513{
1514 struct nfs_server *server = NFS_SERVER(state->inode);
1515 struct nfs4_exception exception = { };
1516 int err;
1517 do {
539cd03a 1518 err = _nfs4_do_open_reclaim(ctx, state);
42113a75 1519 trace_nfs4_open_reclaim(ctx, 0, err);
49f9a0fa
TM
1520 if (nfs4_clear_cap_atomic_open_v1(server, err, &exception))
1521 continue;
168667c4 1522 if (err != -NFS4ERR_DELAY)
202b50dc
TM
1523 break;
1524 nfs4_handle_exception(server, err, &exception);
1da177e4
LT
1525 } while (exception.retry);
1526 return err;
1527}
1528
864472e9
TM
1529static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
1530{
1531 struct nfs_open_context *ctx;
1532 int ret;
1533
1534 ctx = nfs4_state_find_open_context(state);
1535 if (IS_ERR(ctx))
91876b13 1536 return -EAGAIN;
539cd03a 1537 ret = nfs4_do_open_reclaim(ctx, state);
864472e9
TM
1538 put_nfs_open_context(ctx);
1539 return ret;
1540}
1541
db4f2e63 1542static int nfs4_handle_delegation_recall_error(struct nfs_server *server, struct nfs4_state *state, const nfs4_stateid *stateid, int err)
1da177e4 1543{
be76b5b6
TM
1544 switch (err) {
1545 default:
1546 printk(KERN_ERR "NFS: %s: unhandled error "
1547 "%d.\n", __func__, err);
1548 case 0:
1549 case -ENOENT:
1550 case -ESTALE:
1551 break;
1552 case -NFS4ERR_BADSESSION:
1553 case -NFS4ERR_BADSLOT:
1554 case -NFS4ERR_BAD_HIGH_SLOT:
1555 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1556 case -NFS4ERR_DEADSESSION:
1557 set_bit(NFS_DELEGATED_STATE, &state->flags);
1558 nfs4_schedule_session_recovery(server->nfs_client->cl_session, err);
1559 return -EAGAIN;
1560 case -NFS4ERR_STALE_CLIENTID:
1561 case -NFS4ERR_STALE_STATEID:
1562 set_bit(NFS_DELEGATED_STATE, &state->flags);
1563 case -NFS4ERR_EXPIRED:
1564 /* Don't recall a delegation if it was lost */
1565 nfs4_schedule_lease_recovery(server->nfs_client);
1566 return -EAGAIN;
1567 case -NFS4ERR_DELEG_REVOKED:
1568 case -NFS4ERR_ADMIN_REVOKED:
1569 case -NFS4ERR_BAD_STATEID:
db4f2e63 1570 case -NFS4ERR_OPENMODE:
be76b5b6
TM
1571 nfs_inode_find_state_and_recover(state->inode,
1572 stateid);
1573 nfs4_schedule_stateid_recovery(server, state);
be76b5b6
TM
1574 return 0;
1575 case -NFS4ERR_DELAY:
1576 case -NFS4ERR_GRACE:
1577 set_bit(NFS_DELEGATED_STATE, &state->flags);
1578 ssleep(1);
1579 return -EAGAIN;
db4f2e63
TM
1580 case -ENOMEM:
1581 case -NFS4ERR_DENIED:
1582 /* kill_proc(fl->fl_pid, SIGLOST, 1); */
1583 return 0;
be76b5b6 1584 }
1da177e4
LT
1585 return err;
1586}
1587
db4f2e63
TM
1588int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1589{
1590 struct nfs_server *server = NFS_SERVER(state->inode);
1591 struct nfs4_opendata *opendata;
1592 int err;
1593
1594 opendata = nfs4_open_recoverdata_alloc(ctx, state,
1595 NFS4_OPEN_CLAIM_DELEG_CUR_FH);
1596 if (IS_ERR(opendata))
1597 return PTR_ERR(opendata);
1598 nfs4_stateid_copy(&opendata->o_arg.u.delegation, stateid);
1599 err = nfs4_open_recover(opendata, state);
1600 nfs4_opendata_put(opendata);
1601 return nfs4_handle_delegation_recall_error(server, state, stateid, err);
1602}
1603
be05c860
CL
1604static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata)
1605{
1606 struct nfs4_opendata *data = calldata;
1607
1608 nfs40_setup_sequence(data->o_arg.server, &data->o_arg.seq_args,
1609 &data->o_res.seq_res, task);
1610}
1611
cdd4e68b
TM
1612static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
1613{
1614 struct nfs4_opendata *data = calldata;
1615
be05c860
CL
1616 nfs40_sequence_done(task, &data->o_res.seq_res);
1617
cdd4e68b 1618 data->rpc_status = task->tk_status;
26e976a8 1619 if (data->rpc_status == 0) {
f597c537 1620 nfs4_stateid_copy(&data->o_res.stateid, &data->c_res.stateid);
bb22629e 1621 nfs_confirm_seqid(&data->owner->so_seqid, 0);
26e976a8 1622 renew_lease(data->o_res.server, data->timestamp);
3e309914 1623 data->rpc_done = 1;
26e976a8 1624 }
cdd4e68b
TM
1625}
1626
1627static void nfs4_open_confirm_release(void *calldata)
1628{
1629 struct nfs4_opendata *data = calldata;
1630 struct nfs4_state *state = NULL;
1631
1632 /* If this request hasn't been cancelled, do nothing */
1633 if (data->cancelled == 0)
1634 goto out_free;
1635 /* In case of error, no cleanup! */
3e309914 1636 if (!data->rpc_done)
cdd4e68b 1637 goto out_free;
cdd4e68b 1638 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1639 if (!IS_ERR(state))
643168c2 1640 nfs4_close_state(state, data->o_arg.fmode);
cdd4e68b 1641out_free:
c6d00e63 1642 nfs4_opendata_put(data);
cdd4e68b
TM
1643}
1644
1645static const struct rpc_call_ops nfs4_open_confirm_ops = {
be05c860 1646 .rpc_call_prepare = nfs4_open_confirm_prepare,
cdd4e68b
TM
1647 .rpc_call_done = nfs4_open_confirm_done,
1648 .rpc_release = nfs4_open_confirm_release,
1649};
1650
1651/*
1652 * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
1653 */
1654static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
1655{
1656 struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
1657 struct rpc_task *task;
5138fde0
TM
1658 struct rpc_message msg = {
1659 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
1660 .rpc_argp = &data->c_arg,
1661 .rpc_resp = &data->c_res,
1662 .rpc_cred = data->owner->so_cred,
1663 };
c970aa85
TM
1664 struct rpc_task_setup task_setup_data = {
1665 .rpc_client = server->client,
5138fde0 1666 .rpc_message = &msg,
c970aa85
TM
1667 .callback_ops = &nfs4_open_confirm_ops,
1668 .callback_data = data,
101070ca 1669 .workqueue = nfsiod_workqueue,
c970aa85
TM
1670 .flags = RPC_TASK_ASYNC,
1671 };
1da177e4
LT
1672 int status;
1673
be05c860 1674 nfs4_init_sequence(&data->o_arg.seq_args, &data->o_res.seq_res, 1);
c6d00e63 1675 kref_get(&data->kref);
3e309914
TM
1676 data->rpc_done = 0;
1677 data->rpc_status = 0;
5138fde0 1678 data->timestamp = jiffies;
c970aa85 1679 task = rpc_run_task(&task_setup_data);
7a1218a2 1680 if (IS_ERR(task))
cdd4e68b 1681 return PTR_ERR(task);
cdd4e68b
TM
1682 status = nfs4_wait_for_completion_rpc_task(task);
1683 if (status != 0) {
1684 data->cancelled = 1;
1685 smp_wmb();
1686 } else
1687 status = data->rpc_status;
e6b3c4db 1688 rpc_put_task(task);
1da177e4
LT
1689 return status;
1690}
1691
24ac23ab 1692static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1da177e4 1693{
24ac23ab
TM
1694 struct nfs4_opendata *data = calldata;
1695 struct nfs4_state_owner *sp = data->owner;
549b19cc 1696 struct nfs_client *clp = sp->so_server->nfs_client;
5138fde0 1697
24ac23ab 1698 if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
c8da19b9 1699 goto out_wait;
aac00a8d
TM
1700 /*
1701 * Check if we still need to send an OPEN call, or if we can use
1702 * a delegation instead.
1703 */
1704 if (data->state != NULL) {
1705 struct nfs_delegation *delegation;
1706
dc0b027d 1707 if (can_open_cached(data->state, data->o_arg.fmode, data->o_arg.open_flags))
6ee41268 1708 goto out_no_action;
aac00a8d
TM
1709 rcu_read_lock();
1710 delegation = rcu_dereference(NFS_I(data->state->inode)->delegation);
652f89f6 1711 if (data->o_arg.claim != NFS4_OPEN_CLAIM_DELEGATE_CUR &&
cd4c9be2 1712 data->o_arg.claim != NFS4_OPEN_CLAIM_DELEG_CUR_FH &&
652f89f6
TM
1713 can_open_delegated(delegation, data->o_arg.fmode))
1714 goto unlock_no_action;
aac00a8d
TM
1715 rcu_read_unlock();
1716 }
95b72eb0 1717 /* Update client id. */
549b19cc 1718 data->o_arg.clientid = clp->cl_clientid;
8188df17
TM
1719 switch (data->o_arg.claim) {
1720 case NFS4_OPEN_CLAIM_PREVIOUS:
1721 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1722 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
e23008ec 1723 data->o_arg.open_bitmap = &nfs4_open_noattr_bitmap[0];
8188df17
TM
1724 case NFS4_OPEN_CLAIM_FH:
1725 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
6f220ed5
TM
1726 nfs_copy_fh(&data->o_res.fh, data->o_arg.fh);
1727 }
26e976a8 1728 data->timestamp = jiffies;
035168ab 1729 if (nfs4_setup_sequence(data->o_arg.server,
d898528c 1730 &data->o_arg.seq_args,
2240a9e2
TM
1731 &data->o_res.seq_res,
1732 task) != 0)
1733 nfs_release_seqid(data->o_arg.seqid);
549b19cc
TM
1734
1735 /* Set the create mode (note dependency on the session type) */
1736 data->o_arg.createmode = NFS4_CREATE_UNCHECKED;
1737 if (data->o_arg.open_flags & O_EXCL) {
1738 data->o_arg.createmode = NFS4_CREATE_EXCLUSIVE;
1739 if (nfs4_has_persistent_session(clp))
1740 data->o_arg.createmode = NFS4_CREATE_GUARDED;
1741 else if (clp->cl_mvops->minor_version > 0)
1742 data->o_arg.createmode = NFS4_CREATE_EXCLUSIVE4_1;
1743 }
6ee41268 1744 return;
652f89f6
TM
1745unlock_no_action:
1746 rcu_read_unlock();
6ee41268
TM
1747out_no_action:
1748 task->tk_action = NULL;
c8da19b9 1749out_wait:
b75ad4cd 1750 nfs4_sequence_done(task, &data->o_res.seq_res);
b257957e
AB
1751}
1752
24ac23ab
TM
1753static void nfs4_open_done(struct rpc_task *task, void *calldata)
1754{
1755 struct nfs4_opendata *data = calldata;
1da177e4 1756
24ac23ab 1757 data->rpc_status = task->tk_status;
d898528c 1758
14516c3a
TM
1759 if (!nfs4_sequence_done(task, &data->o_res.seq_res))
1760 return;
d898528c 1761
24ac23ab 1762 if (task->tk_status == 0) {
807d66d8
TM
1763 if (data->o_res.f_attr->valid & NFS_ATTR_FATTR_TYPE) {
1764 switch (data->o_res.f_attr->mode & S_IFMT) {
6f926b5b
TM
1765 case S_IFREG:
1766 break;
1767 case S_IFLNK:
24ac23ab 1768 data->rpc_status = -ELOOP;
6f926b5b
TM
1769 break;
1770 case S_IFDIR:
24ac23ab 1771 data->rpc_status = -EISDIR;
6f926b5b
TM
1772 break;
1773 default:
24ac23ab 1774 data->rpc_status = -ENOTDIR;
807d66d8 1775 }
6f926b5b 1776 }
26e976a8 1777 renew_lease(data->o_res.server, data->timestamp);
0f9f95e0
TM
1778 if (!(data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM))
1779 nfs_confirm_seqid(&data->owner->so_seqid, 0);
6f926b5b 1780 }
3e309914 1781 data->rpc_done = 1;
24ac23ab 1782}
6f926b5b 1783
24ac23ab
TM
1784static void nfs4_open_release(void *calldata)
1785{
1786 struct nfs4_opendata *data = calldata;
1787 struct nfs4_state *state = NULL;
1788
1789 /* If this request hasn't been cancelled, do nothing */
1790 if (data->cancelled == 0)
1791 goto out_free;
1792 /* In case of error, no cleanup! */
3e309914 1793 if (data->rpc_status != 0 || !data->rpc_done)
24ac23ab
TM
1794 goto out_free;
1795 /* In case we need an open_confirm, no cleanup! */
1796 if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
1797 goto out_free;
24ac23ab 1798 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1799 if (!IS_ERR(state))
643168c2 1800 nfs4_close_state(state, data->o_arg.fmode);
24ac23ab 1801out_free:
c6d00e63 1802 nfs4_opendata_put(data);
24ac23ab
TM
1803}
1804
1805static const struct rpc_call_ops nfs4_open_ops = {
1806 .rpc_call_prepare = nfs4_open_prepare,
1807 .rpc_call_done = nfs4_open_done,
1808 .rpc_release = nfs4_open_release,
1809};
1810
b257957e 1811static int nfs4_run_open_task(struct nfs4_opendata *data, int isrecover)
24ac23ab
TM
1812{
1813 struct inode *dir = data->dir->d_inode;
1814 struct nfs_server *server = NFS_SERVER(dir);
1815 struct nfs_openargs *o_arg = &data->o_arg;
1816 struct nfs_openres *o_res = &data->o_res;
1817 struct rpc_task *task;
5138fde0
TM
1818 struct rpc_message msg = {
1819 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
1820 .rpc_argp = o_arg,
1821 .rpc_resp = o_res,
1822 .rpc_cred = data->owner->so_cred,
1823 };
c970aa85
TM
1824 struct rpc_task_setup task_setup_data = {
1825 .rpc_client = server->client,
5138fde0 1826 .rpc_message = &msg,
c970aa85
TM
1827 .callback_ops = &nfs4_open_ops,
1828 .callback_data = data,
101070ca 1829 .workqueue = nfsiod_workqueue,
c970aa85
TM
1830 .flags = RPC_TASK_ASYNC,
1831 };
24ac23ab
TM
1832 int status;
1833
a9c92d6b 1834 nfs4_init_sequence(&o_arg->seq_args, &o_res->seq_res, 1);
c6d00e63 1835 kref_get(&data->kref);
3e309914
TM
1836 data->rpc_done = 0;
1837 data->rpc_status = 0;
2ced46c2 1838 data->cancelled = 0;
bdeca1b7
TM
1839 data->is_recover = 0;
1840 if (isrecover) {
8fe72bac 1841 nfs4_set_sequence_privileged(&o_arg->seq_args);
bdeca1b7
TM
1842 data->is_recover = 1;
1843 }
c970aa85 1844 task = rpc_run_task(&task_setup_data);
b257957e
AB
1845 if (IS_ERR(task))
1846 return PTR_ERR(task);
1847 status = nfs4_wait_for_completion_rpc_task(task);
1848 if (status != 0) {
1849 data->cancelled = 1;
1850 smp_wmb();
1851 } else
1852 status = data->rpc_status;
1853 rpc_put_task(task);
1854
1855 return status;
1856}
1857
1858static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
1859{
1860 struct inode *dir = data->dir->d_inode;
1861 struct nfs_openres *o_res = &data->o_res;
1862 int status;
1863
1864 status = nfs4_run_open_task(data, 1);
1865 if (status != 0 || !data->rpc_done)
1866 return status;
1867
6926afd1
TM
1868 nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_attr);
1869
b257957e
AB
1870 if (o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
1871 status = _nfs4_proc_open_confirm(data);
1872 if (status != 0)
1873 return status;
1874 }
1875
1876 return status;
1877}
1878
6168f62c
WAA
1879static int nfs4_opendata_access(struct rpc_cred *cred,
1880 struct nfs4_opendata *opendata,
f8d9a897
WAA
1881 struct nfs4_state *state, fmode_t fmode,
1882 int openflags)
6168f62c
WAA
1883{
1884 struct nfs_access_entry cache;
1885 u32 mask;
1886
1887 /* access call failed or for some reason the server doesn't
1888 * support any access modes -- defer access call until later */
1889 if (opendata->o_res.access_supported == 0)
1890 return 0;
1891
1892 mask = 0;
bbd3a8ee 1893 /* don't check MAY_WRITE - a newly created file may not have
f8d9a897
WAA
1894 * write mode bits, but POSIX allows the creating process to write.
1895 * use openflags to check for exec, because fmode won't
1896 * always have FMODE_EXEC set when file open for exec. */
1897 if (openflags & __FMODE_EXEC) {
1898 /* ONLY check for exec rights */
1899 mask = MAY_EXEC;
1900 } else if (fmode & FMODE_READ)
1901 mask = MAY_READ;
6168f62c
WAA
1902
1903 cache.cred = cred;
1904 cache.jiffies = jiffies;
1905 nfs_access_set_mask(&cache, opendata->o_res.access_result);
1906 nfs_access_add_cache(state->inode, &cache);
1907
bbd3a8ee 1908 if ((mask & ~cache.mask & (MAY_READ | MAY_EXEC)) == 0)
6168f62c
WAA
1909 return 0;
1910
1911 /* even though OPEN succeeded, access is denied. Close the file */
1912 nfs4_close_state(state, fmode);
998f40b5 1913 return -EACCES;
6168f62c
WAA
1914}
1915
b257957e
AB
1916/*
1917 * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
1918 */
1919static int _nfs4_proc_open(struct nfs4_opendata *data)
1920{
1921 struct inode *dir = data->dir->d_inode;
1922 struct nfs_server *server = NFS_SERVER(dir);
1923 struct nfs_openargs *o_arg = &data->o_arg;
1924 struct nfs_openres *o_res = &data->o_res;
1925 int status;
1926
1927 status = nfs4_run_open_task(data, 0);
08ef7bd3
TM
1928 if (!data->rpc_done)
1929 return status;
1930 if (status != 0) {
1931 if (status == -NFS4ERR_BADNAME &&
1932 !(o_arg->open_flags & O_CREAT))
1933 return -ENOENT;
24ac23ab 1934 return status;
08ef7bd3 1935 }
24ac23ab 1936
6926afd1
TM
1937 nfs_fattr_map_and_free_names(server, &data->f_attr);
1938
5bc2afc2 1939 if (o_arg->open_flags & O_CREAT) {
56ae19f3 1940 update_changeattr(dir, &o_res->cinfo);
5bc2afc2
TM
1941 if (o_arg->open_flags & O_EXCL)
1942 data->file_created = 1;
1943 else if (o_res->cinfo.before != o_res->cinfo.after)
1944 data->file_created = 1;
1945 }
0df5dd4a
TM
1946 if ((o_res->rflags & NFS4_OPEN_RESULT_LOCKTYPE_POSIX) == 0)
1947 server->caps &= ~NFS_CAP_POSIX_LOCK;
1da177e4 1948 if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
cdd4e68b 1949 status = _nfs4_proc_open_confirm(data);
1da177e4 1950 if (status != 0)
24ac23ab 1951 return status;
1da177e4
LT
1952 }
1953 if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
1775fd3e 1954 _nfs4_proc_getattr(server, &o_res->fh, o_res->f_attr, o_res->f_label);
24ac23ab 1955 return 0;
1da177e4
LT
1956}
1957
d83217c1
AA
1958static int nfs4_recover_expired_lease(struct nfs_server *server)
1959{
1960 return nfs4_client_recover_expired_lease(server->nfs_client);
1961}
1962
1da177e4
LT
1963/*
1964 * OPEN_EXPIRED:
1965 * reclaim state on the server after a network partition.
1966 * Assumes caller holds the appropriate lock
1967 */
539cd03a 1968static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1969{
e56e0b78 1970 struct nfs4_opendata *opendata;
864472e9 1971 int ret;
1da177e4 1972
4a1c0893 1973 opendata = nfs4_open_recoverdata_alloc(ctx, state,
49f9a0fa 1974 NFS4_OPEN_CLAIM_FH);
6f220ed5
TM
1975 if (IS_ERR(opendata))
1976 return PTR_ERR(opendata);
864472e9 1977 ret = nfs4_open_recover(opendata, state);
35d05778 1978 if (ret == -ESTALE)
3d4ff43d 1979 d_drop(ctx->dentry);
c6d00e63 1980 nfs4_opendata_put(opendata);
864472e9 1981 return ret;
1da177e4
LT
1982}
1983
a9ed2e25 1984static int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
202b50dc 1985{
539cd03a 1986 struct nfs_server *server = NFS_SERVER(state->inode);
202b50dc
TM
1987 struct nfs4_exception exception = { };
1988 int err;
1989
1990 do {
539cd03a 1991 err = _nfs4_open_expired(ctx, state);
42113a75 1992 trace_nfs4_open_expired(ctx, 0, err);
49f9a0fa
TM
1993 if (nfs4_clear_cap_atomic_open_v1(server, err, &exception))
1994 continue;
a9ed2e25
TM
1995 switch (err) {
1996 default:
1997 goto out;
1998 case -NFS4ERR_GRACE:
1999 case -NFS4ERR_DELAY:
2000 nfs4_handle_exception(server, err, &exception);
2001 err = 0;
2002 }
202b50dc 2003 } while (exception.retry);
a9ed2e25 2004out:
202b50dc
TM
2005 return err;
2006}
2007
1da177e4
LT
2008static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
2009{
1da177e4 2010 struct nfs_open_context *ctx;
864472e9 2011 int ret;
1da177e4 2012
864472e9
TM
2013 ctx = nfs4_state_find_open_context(state);
2014 if (IS_ERR(ctx))
91876b13 2015 return -EAGAIN;
539cd03a 2016 ret = nfs4_do_open_expired(ctx, state);
864472e9
TM
2017 put_nfs_open_context(ctx);
2018 return ret;
1da177e4
LT
2019}
2020
f062eb6c 2021#if defined(CONFIG_NFS_V4_1)
3e60ffdd 2022static void nfs41_clear_delegation_stateid(struct nfs4_state *state)
f062eb6c 2023{
f062eb6c 2024 struct nfs_server *server = NFS_SERVER(state->inode);
3e60ffdd 2025 nfs4_stateid *stateid = &state->stateid;
ab7cb0df
TM
2026 struct nfs_delegation *delegation;
2027 struct rpc_cred *cred = NULL;
2028 int status = -NFS4ERR_BAD_STATEID;
3e60ffdd
CL
2029
2030 /* If a state reset has been done, test_stateid is unneeded */
2031 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
2032 return;
2033
ab7cb0df
TM
2034 /* Get the delegation credential for use by test/free_stateid */
2035 rcu_read_lock();
2036 delegation = rcu_dereference(NFS_I(state->inode)->delegation);
2037 if (delegation != NULL &&
2038 nfs4_stateid_match(&delegation->stateid, stateid)) {
2039 cred = get_rpccred(delegation->cred);
2040 rcu_read_unlock();
2041 status = nfs41_test_stateid(server, stateid, cred);
08cb47fa 2042 trace_nfs4_test_delegation_stateid(state, NULL, status);
ab7cb0df
TM
2043 } else
2044 rcu_read_unlock();
2045
3e60ffdd
CL
2046 if (status != NFS_OK) {
2047 /* Free the stateid unless the server explicitly
2048 * informs us the stateid is unrecognized. */
2049 if (status != -NFS4ERR_BAD_STATEID)
ab7cb0df 2050 nfs41_free_stateid(server, stateid, cred);
6938867e 2051 nfs_remove_bad_delegation(state->inode);
3e60ffdd 2052
6938867e
BS
2053 write_seqlock(&state->seqlock);
2054 nfs4_stateid_copy(&state->stateid, &state->open_stateid);
2055 write_sequnlock(&state->seqlock);
3e60ffdd
CL
2056 clear_bit(NFS_DELEGATED_STATE, &state->flags);
2057 }
ab7cb0df
TM
2058
2059 if (cred != NULL)
2060 put_rpccred(cred);
3e60ffdd
CL
2061}
2062
2063/**
2064 * nfs41_check_open_stateid - possibly free an open stateid
2065 *
2066 * @state: NFSv4 state for an inode
2067 *
2068 * Returns NFS_OK if recovery for this stateid is now finished.
2069 * Otherwise a negative NFS4ERR value is returned.
2070 */
2071static int nfs41_check_open_stateid(struct nfs4_state *state)
2072{
2073 struct nfs_server *server = NFS_SERVER(state->inode);
fcb6d9c6 2074 nfs4_stateid *stateid = &state->open_stateid;
ab7cb0df 2075 struct rpc_cred *cred = state->owner->so_cred;
3e60ffdd
CL
2076 int status;
2077
2078 /* If a state reset has been done, test_stateid is unneeded */
2079 if ((test_bit(NFS_O_RDONLY_STATE, &state->flags) == 0) &&
2080 (test_bit(NFS_O_WRONLY_STATE, &state->flags) == 0) &&
2081 (test_bit(NFS_O_RDWR_STATE, &state->flags) == 0))
2082 return -NFS4ERR_BAD_STATEID;
2083
ab7cb0df 2084 status = nfs41_test_stateid(server, stateid, cred);
08cb47fa 2085 trace_nfs4_test_open_stateid(state, NULL, status);
3e60ffdd
CL
2086 if (status != NFS_OK) {
2087 /* Free the stateid unless the server explicitly
2088 * informs us the stateid is unrecognized. */
2089 if (status != -NFS4ERR_BAD_STATEID)
ab7cb0df 2090 nfs41_free_stateid(server, stateid, cred);
3e60ffdd
CL
2091
2092 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2093 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2094 clear_bit(NFS_O_RDWR_STATE, &state->flags);
fd068b20 2095 clear_bit(NFS_OPEN_STATE, &state->flags);
b01dd1d8
BS
2096 }
2097 return status;
2098}
2099
2100static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
2101{
eb64cf96 2102 int status;
b01dd1d8 2103
3e60ffdd
CL
2104 nfs41_clear_delegation_stateid(state);
2105 status = nfs41_check_open_stateid(state);
eb64cf96
CL
2106 if (status != NFS_OK)
2107 status = nfs4_open_expired(sp, state);
2108 return status;
f062eb6c
BS
2109}
2110#endif
2111
aa53ed54
JL
2112/*
2113 * on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
2114 * fields corresponding to attributes that were used to store the verifier.
2115 * Make sure we clobber those fields in the later setattr call
2116 */
2117static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
2118{
2119 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
2120 !(sattr->ia_valid & ATTR_ATIME_SET))
2121 sattr->ia_valid |= ATTR_ATIME;
2122
2123 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
2124 !(sattr->ia_valid & ATTR_MTIME_SET))
2125 sattr->ia_valid |= ATTR_MTIME;
2126}
2127
c21443c2
TM
2128static int _nfs4_open_and_get_state(struct nfs4_opendata *opendata,
2129 fmode_t fmode,
2130 int flags,
3efb9722 2131 struct nfs_open_context *ctx)
c21443c2
TM
2132{
2133 struct nfs4_state_owner *sp = opendata->owner;
2134 struct nfs_server *server = sp->so_server;
275bb307 2135 struct dentry *dentry;
c21443c2
TM
2136 struct nfs4_state *state;
2137 unsigned int seq;
2138 int ret;
2139
2140 seq = raw_seqcount_begin(&sp->so_reclaim_seqcount);
2141
2142 ret = _nfs4_proc_open(opendata);
2143 if (ret != 0)
2144 goto out;
2145
2146 state = nfs4_opendata_to_nfs4_state(opendata);
2147 ret = PTR_ERR(state);
2148 if (IS_ERR(state))
2149 goto out;
2150 if (server->caps & NFS_CAP_POSIX_LOCK)
2151 set_bit(NFS_STATE_POSIX_LOCKS, &state->flags);
2152
275bb307
TM
2153 dentry = opendata->dentry;
2154 if (dentry->d_inode == NULL) {
2155 /* FIXME: Is this d_drop() ever needed? */
2156 d_drop(dentry);
2157 dentry = d_add_unique(dentry, igrab(state->inode));
2158 if (dentry == NULL) {
2159 dentry = opendata->dentry;
2160 } else if (dentry != ctx->dentry) {
2161 dput(ctx->dentry);
2162 ctx->dentry = dget(dentry);
2163 }
2164 nfs_set_verifier(dentry,
2165 nfs_save_change_attribute(opendata->dir->d_inode));
2166 }
2167
c21443c2
TM
2168 ret = nfs4_opendata_access(sp->so_cred, opendata, state, fmode, flags);
2169 if (ret != 0)
2170 goto out;
2171
3efb9722 2172 ctx->state = state;
c45ffdd2
TM
2173 if (dentry->d_inode == state->inode) {
2174 nfs_inode_attach_open_context(ctx);
2175 if (read_seqcount_retry(&sp->so_reclaim_seqcount, seq))
2176 nfs4_schedule_stateid_recovery(server, state);
2177 }
c21443c2
TM
2178out:
2179 return ret;
2180}
2181
1da177e4 2182/*
24ac23ab 2183 * Returns a referenced nfs4_state
1da177e4 2184 */
82be417a 2185static int _nfs4_do_open(struct inode *dir,
4197a055 2186 struct nfs_open_context *ctx,
82be417a
AA
2187 int flags,
2188 struct iattr *sattr,
5bc2afc2
TM
2189 struct nfs4_label *label,
2190 int *opened)
1da177e4
LT
2191{
2192 struct nfs4_state_owner *sp;
2193 struct nfs4_state *state = NULL;
2194 struct nfs_server *server = NFS_SERVER(dir);
e56e0b78 2195 struct nfs4_opendata *opendata;
4197a055
TM
2196 struct dentry *dentry = ctx->dentry;
2197 struct rpc_cred *cred = ctx->cred;
2198 struct nfs4_threshold **ctx_th = &ctx->mdsthreshold;
2199 fmode_t fmode = ctx->mode & (FMODE_READ|FMODE_WRITE|FMODE_EXEC);
49f9a0fa 2200 enum open_claim_type4 claim = NFS4_OPEN_CLAIM_NULL;
1775fd3e 2201 struct nfs4_label *olabel = NULL;
aac00a8d 2202 int status;
1da177e4
LT
2203
2204 /* Protect against reboot recovery conflicts */
1da177e4 2205 status = -ENOMEM;
d1e284d5
TM
2206 sp = nfs4_get_state_owner(server, cred, GFP_KERNEL);
2207 if (sp == NULL) {
1da177e4
LT
2208 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
2209 goto out_err;
2210 }
58d9714a
TM
2211 status = nfs4_recover_expired_lease(server);
2212 if (status != 0)
b4454fe1 2213 goto err_put_state_owner;
82a2c1b7
AV
2214 if (dentry->d_inode != NULL)
2215 nfs4_return_incompatible_delegation(dentry->d_inode, fmode);
58d9714a 2216 status = -ENOMEM;
49f9a0fa
TM
2217 if (dentry->d_inode)
2218 claim = NFS4_OPEN_CLAIM_FH;
4a1c0893 2219 opendata = nfs4_opendata_alloc(dentry, sp, fmode, flags, sattr,
1775fd3e 2220 label, claim, GFP_KERNEL);
e56e0b78 2221 if (opendata == NULL)
95d35cb4 2222 goto err_put_state_owner;
1da177e4 2223
14c43f76
DQ
2224 if (label) {
2225 olabel = nfs4_label_alloc(server, GFP_KERNEL);
2226 if (IS_ERR(olabel)) {
2227 status = PTR_ERR(olabel);
2228 goto err_opendata_put;
2229 }
2230 }
2231
82be417a
AA
2232 if (ctx_th && server->attr_bitmask[2] & FATTR4_WORD2_MDSTHRESHOLD) {
2233 opendata->f_attr.mdsthreshold = pnfs_mdsthreshold_alloc();
2234 if (!opendata->f_attr.mdsthreshold)
14c43f76 2235 goto err_free_label;
1549210f 2236 opendata->o_arg.open_bitmap = &nfs4_pnfs_open_bitmap[0];
82be417a 2237 }
82a2c1b7
AV
2238 if (dentry->d_inode != NULL)
2239 opendata->state = nfs4_get_open_state(dentry->d_inode, sp);
aac00a8d 2240
3efb9722 2241 status = _nfs4_open_and_get_state(opendata, fmode, flags, ctx);
6168f62c 2242 if (status != 0)
14c43f76 2243 goto err_free_label;
3efb9722 2244 state = ctx->state;
6168f62c 2245
549b19cc
TM
2246 if ((opendata->o_arg.open_flags & O_EXCL) &&
2247 (opendata->o_arg.createmode != NFS4_CREATE_GUARDED)) {
0ab64e0e
TM
2248 nfs4_exclusive_attrset(opendata, sattr);
2249
2250 nfs_fattr_init(opendata->o_res.f_attr);
2251 status = nfs4_do_setattr(state->inode, cred,
2252 opendata->o_res.f_attr, sattr,
1775fd3e
DQ
2253 state, label, olabel);
2254 if (status == 0) {
0ab64e0e 2255 nfs_setattr_update_inode(state->inode, sattr);
1775fd3e 2256 nfs_post_op_update_inode(state->inode, opendata->o_res.f_attr);
aa9c2669 2257 nfs_setsecurity(state->inode, opendata->o_res.f_attr, olabel);
1775fd3e 2258 }
0ab64e0e 2259 }
5bc2afc2
TM
2260 if (opendata->file_created)
2261 *opened |= FILE_CREATED;
82be417a
AA
2262
2263 if (pnfs_use_threshold(ctx_th, opendata->f_attr.mdsthreshold, server))
2264 *ctx_th = opendata->f_attr.mdsthreshold;
2265 else
2266 kfree(opendata->f_attr.mdsthreshold);
2267 opendata->f_attr.mdsthreshold = NULL;
2268
14c43f76
DQ
2269 nfs4_label_free(olabel);
2270
c6d00e63 2271 nfs4_opendata_put(opendata);
1da177e4 2272 nfs4_put_state_owner(sp);
1da177e4 2273 return 0;
14c43f76
DQ
2274err_free_label:
2275 nfs4_label_free(olabel);
c6d00e63 2276err_opendata_put:
82be417a 2277 kfree(opendata->f_attr.mdsthreshold);
c6d00e63 2278 nfs4_opendata_put(opendata);
e56e0b78
TM
2279err_put_state_owner:
2280 nfs4_put_state_owner(sp);
1da177e4 2281out_err:
1da177e4
LT
2282 return status;
2283}
2284
2285
82be417a 2286static struct nfs4_state *nfs4_do_open(struct inode *dir,
4197a055 2287 struct nfs_open_context *ctx,
82be417a
AA
2288 int flags,
2289 struct iattr *sattr,
5bc2afc2
TM
2290 struct nfs4_label *label,
2291 int *opened)
1da177e4 2292{
49f9a0fa 2293 struct nfs_server *server = NFS_SERVER(dir);
1da177e4
LT
2294 struct nfs4_exception exception = { };
2295 struct nfs4_state *res;
2296 int status;
2297
2298 do {
5bc2afc2 2299 status = _nfs4_do_open(dir, ctx, flags, sattr, label, opened);
3efb9722 2300 res = ctx->state;
42113a75 2301 trace_nfs4_open_file(ctx, flags, status);
1da177e4
LT
2302 if (status == 0)
2303 break;
2304 /* NOTE: BAD_SEQID means the server and client disagree about the
2305 * book-keeping w.r.t. state-changing operations
2306 * (OPEN/CLOSE/LOCK/LOCKU...)
2307 * It is actually a sign of a bug on the client or on the server.
2308 *
2309 * If we receive a BAD_SEQID error in the particular case of
cee54fc9 2310 * doing an OPEN, we assume that nfs_increment_open_seqid() will
1da177e4
LT
2311 * have unhashed the old state_owner for us, and that we can
2312 * therefore safely retry using a new one. We should still warn
2313 * the user though...
2314 */
2315 if (status == -NFS4ERR_BAD_SEQID) {
9a3ba432 2316 pr_warn_ratelimited("NFS: v4 server %s "
6f43ddcc
TM
2317 " returned a bad sequence-id error!\n",
2318 NFS_SERVER(dir)->nfs_client->cl_hostname);
1da177e4
LT
2319 exception.retry = 1;
2320 continue;
2321 }
550f5747
TM
2322 /*
2323 * BAD_STATEID on OPEN means that the server cancelled our
2324 * state before it received the OPEN_CONFIRM.
2325 * Recover by retrying the request as per the discussion
2326 * on Page 181 of RFC3530.
2327 */
2328 if (status == -NFS4ERR_BAD_STATEID) {
2329 exception.retry = 1;
2330 continue;
2331 }
aac00a8d
TM
2332 if (status == -EAGAIN) {
2333 /* We must have found a delegation */
2334 exception.retry = 1;
2335 continue;
2336 }
49f9a0fa
TM
2337 if (nfs4_clear_cap_atomic_open_v1(server, status, &exception))
2338 continue;
2339 res = ERR_PTR(nfs4_handle_exception(server,
1da177e4
LT
2340 status, &exception));
2341 } while (exception.retry);
2342 return res;
2343}
2344
659bfcd6
TM
2345static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
2346 struct nfs_fattr *fattr, struct iattr *sattr,
1775fd3e
DQ
2347 struct nfs4_state *state, struct nfs4_label *ilabel,
2348 struct nfs4_label *olabel)
1da177e4 2349{
3e4f6290 2350 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 2351 struct nfs_setattrargs arg = {
3e4f6290 2352 .fh = NFS_FH(inode),
1da177e4
LT
2353 .iap = sattr,
2354 .server = server,
2355 .bitmask = server->attr_bitmask,
1775fd3e 2356 .label = ilabel,
1da177e4
LT
2357 };
2358 struct nfs_setattrres res = {
2359 .fattr = fattr,
1775fd3e 2360 .label = olabel,
1da177e4
LT
2361 .server = server,
2362 };
2363 struct rpc_message msg = {
659bfcd6
TM
2364 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
2365 .rpc_argp = &arg,
2366 .rpc_resp = &res,
2367 .rpc_cred = cred,
1da177e4 2368 };
26e976a8 2369 unsigned long timestamp = jiffies;
ee3ae84e
TM
2370 fmode_t fmode;
2371 bool truncate;
65e4308d 2372 int status;
1da177e4 2373
aa9c2669
DQ
2374 arg.bitmask = nfs4_bitmask(server, ilabel);
2375 if (ilabel)
2376 arg.bitmask = nfs4_bitmask(server, olabel);
2377
0e574af1 2378 nfs_fattr_init(fattr);
1da177e4 2379
ee3ae84e
TM
2380 /* Servers should only apply open mode checks for file size changes */
2381 truncate = (sattr->ia_valid & ATTR_SIZE) ? true : false;
2382 fmode = truncate ? FMODE_WRITE : FMODE_READ;
2383
2384 if (nfs4_copy_delegation_stateid(&arg.stateid, inode, fmode)) {
2385 /* Use that stateid */
2386 } else if (truncate && state != NULL && nfs4_valid_open_stateid(state)) {
2a369153
TM
2387 struct nfs_lockowner lockowner = {
2388 .l_owner = current->files,
2389 .l_pid = current->tgid,
2390 };
4fc8796d 2391 nfs4_select_rw_stateid(&arg.stateid, state, FMODE_WRITE,
2a369153 2392 &lockowner);
08e9eac4 2393 } else
f597c537 2394 nfs4_stateid_copy(&arg.stateid, &zero_stateid);
1da177e4 2395
7c513058 2396 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
26e976a8
TM
2397 if (status == 0 && state != NULL)
2398 renew_lease(server, timestamp);
65e4308d 2399 return status;
1da177e4
LT
2400}
2401
659bfcd6
TM
2402static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
2403 struct nfs_fattr *fattr, struct iattr *sattr,
1775fd3e
DQ
2404 struct nfs4_state *state, struct nfs4_label *ilabel,
2405 struct nfs4_label *olabel)
1da177e4 2406{
3e4f6290 2407 struct nfs_server *server = NFS_SERVER(inode);
a1d0b5ee
TM
2408 struct nfs4_exception exception = {
2409 .state = state,
3114ea7a 2410 .inode = inode,
a1d0b5ee 2411 };
1da177e4
LT
2412 int err;
2413 do {
1775fd3e 2414 err = _nfs4_do_setattr(inode, cred, fattr, sattr, state, ilabel, olabel);
c1578b76 2415 trace_nfs4_setattr(inode, err);
451146be
TM
2416 switch (err) {
2417 case -NFS4ERR_OPENMODE:
721ccfb7
TM
2418 if (!(sattr->ia_valid & ATTR_SIZE)) {
2419 pr_warn_once("NFSv4: server %s is incorrectly "
2420 "applying open mode checks to "
2421 "a SETATTR that is not "
2422 "changing file size.\n",
2423 server->nfs_client->cl_hostname);
2424 }
451146be
TM
2425 if (state && !(state->state & FMODE_WRITE)) {
2426 err = -EBADF;
2427 if (sattr->ia_valid & ATTR_OPEN)
2428 err = -EACCES;
2429 goto out;
2430 }
2431 }
2432 err = nfs4_handle_exception(server, err, &exception);
1da177e4 2433 } while (exception.retry);
451146be 2434out:
1da177e4
LT
2435 return err;
2436}
2437
2438struct nfs4_closedata {
2439 struct inode *inode;
2440 struct nfs4_state *state;
2441 struct nfs_closeargs arg;
2442 struct nfs_closeres res;
516a6af6 2443 struct nfs_fattr fattr;
26e976a8 2444 unsigned long timestamp;
f7e8917a
FI
2445 bool roc;
2446 u32 roc_barrier;
1da177e4
LT
2447};
2448
963d8fe5 2449static void nfs4_free_closedata(void *data)
9512135d 2450{
963d8fe5
TM
2451 struct nfs4_closedata *calldata = data;
2452 struct nfs4_state_owner *sp = calldata->state->owner;
643168c2 2453 struct super_block *sb = calldata->state->inode->i_sb;
9512135d 2454
f7e8917a
FI
2455 if (calldata->roc)
2456 pnfs_roc_release(calldata->state->inode);
9512135d
TM
2457 nfs4_put_open_state(calldata->state);
2458 nfs_free_seqid(calldata->arg.seqid);
9512135d 2459 nfs4_put_state_owner(sp);
322b2b90 2460 nfs_sb_deactive(sb);
9512135d
TM
2461 kfree(calldata);
2462}
2463
88069f77
TM
2464static void nfs4_close_clear_stateid_flags(struct nfs4_state *state,
2465 fmode_t fmode)
2466{
2467 spin_lock(&state->owner->so_lock);
fd068b20
TM
2468 clear_bit(NFS_O_RDWR_STATE, &state->flags);
2469 switch (fmode & (FMODE_READ|FMODE_WRITE)) {
2470 case FMODE_WRITE:
88069f77 2471 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
fd068b20
TM
2472 break;
2473 case FMODE_READ:
88069f77 2474 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
fd068b20
TM
2475 break;
2476 case 0:
2477 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2478 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2479 clear_bit(NFS_OPEN_STATE, &state->flags);
2480 }
88069f77
TM
2481 spin_unlock(&state->owner->so_lock);
2482}
2483
963d8fe5 2484static void nfs4_close_done(struct rpc_task *task, void *data)
1da177e4 2485{
963d8fe5 2486 struct nfs4_closedata *calldata = data;
1da177e4 2487 struct nfs4_state *state = calldata->state;
1da177e4
LT
2488 struct nfs_server *server = NFS_SERVER(calldata->inode);
2489
a3ca5651 2490 dprintk("%s: begin!\n", __func__);
14516c3a
TM
2491 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
2492 return;
42113a75 2493 trace_nfs4_close(state, &calldata->arg, &calldata->res, task->tk_status);
1da177e4
LT
2494 /* hmm. we are done with the inode, and in the process of freeing
2495 * the state_owner. we keep this around to process errors
2496 */
1da177e4
LT
2497 switch (task->tk_status) {
2498 case 0:
f7e8917a
FI
2499 if (calldata->roc)
2500 pnfs_roc_set_barrier(state->inode,
2501 calldata->roc_barrier);
45328c35 2502 nfs_set_open_stateid(state, &calldata->res.stateid, 0);
26e976a8 2503 renew_lease(server, calldata->timestamp);
88069f77
TM
2504 nfs4_close_clear_stateid_flags(state,
2505 calldata->arg.fmode);
1da177e4
LT
2506 break;
2507 case -NFS4ERR_STALE_STATEID:
9e33bed5
TM
2508 case -NFS4ERR_OLD_STATEID:
2509 case -NFS4ERR_BAD_STATEID:
1da177e4 2510 case -NFS4ERR_EXPIRED:
dc0b027d 2511 if (calldata->arg.fmode == 0)
9e33bed5 2512 break;
1da177e4 2513 default:
72211dbe
TM
2514 if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
2515 rpc_restart_call_prepare(task);
1da177e4 2516 }
72211dbe 2517 nfs_release_seqid(calldata->arg.seqid);
516a6af6 2518 nfs_refresh_inode(calldata->inode, calldata->res.fattr);
a3ca5651 2519 dprintk("%s: done, ret = %d!\n", __func__, task->tk_status);
1da177e4
LT
2520}
2521
4ce70ada 2522static void nfs4_close_prepare(struct rpc_task *task, void *data)
1da177e4 2523{
4ce70ada 2524 struct nfs4_closedata *calldata = data;
9512135d 2525 struct nfs4_state *state = calldata->state;
7fdab069 2526 struct inode *inode = calldata->inode;
88069f77 2527 int call_close = 0;
9512135d 2528
a3ca5651 2529 dprintk("%s: begin!\n", __func__);
963d8fe5 2530 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
c8da19b9 2531 goto out_wait;
003707c7 2532
88069f77
TM
2533 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
2534 calldata->arg.fmode = FMODE_READ|FMODE_WRITE;
4cecb76f 2535 spin_lock(&state->owner->so_lock);
003707c7 2536 /* Calculate the change in open mode */
e7616923 2537 if (state->n_rdwr == 0) {
003707c7 2538 if (state->n_rdonly == 0) {
88069f77
TM
2539 call_close |= test_bit(NFS_O_RDONLY_STATE, &state->flags);
2540 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2541 calldata->arg.fmode &= ~FMODE_READ;
003707c7
TM
2542 }
2543 if (state->n_wronly == 0) {
88069f77
TM
2544 call_close |= test_bit(NFS_O_WRONLY_STATE, &state->flags);
2545 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2546 calldata->arg.fmode &= ~FMODE_WRITE;
003707c7 2547 }
e7616923 2548 }
5d422301
TM
2549 if (!nfs4_valid_open_stateid(state))
2550 call_close = 0;
4cecb76f 2551 spin_unlock(&state->owner->so_lock);
88069f77
TM
2552
2553 if (!call_close) {
963d8fe5 2554 /* Note: exit _without_ calling nfs4_close_done */
c8da19b9 2555 goto out_no_action;
9512135d 2556 }
88069f77 2557
f7e8917a 2558 if (calldata->arg.fmode == 0) {
88069f77 2559 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE];
f7e8917a 2560 if (calldata->roc &&
b9536ad5
AA
2561 pnfs_roc_drain(inode, &calldata->roc_barrier, task)) {
2562 nfs_release_seqid(calldata->arg.seqid);
c8da19b9 2563 goto out_wait;
b9536ad5 2564 }
f7e8917a 2565 }
88069f77 2566
516a6af6 2567 nfs_fattr_init(calldata->res.fattr);
26e976a8 2568 calldata->timestamp = jiffies;
7fdab069 2569 if (nfs4_setup_sequence(NFS_SERVER(inode),
9d12b216
TM
2570 &calldata->arg.seq_args,
2571 &calldata->res.seq_res,
2240a9e2
TM
2572 task) != 0)
2573 nfs_release_seqid(calldata->arg.seqid);
a3ca5651 2574 dprintk("%s: done!\n", __func__);
c8da19b9
TM
2575 return;
2576out_no_action:
2577 task->tk_action = NULL;
2578out_wait:
2579 nfs4_sequence_done(task, &calldata->res.seq_res);
1da177e4
LT
2580}
2581
963d8fe5 2582static const struct rpc_call_ops nfs4_close_ops = {
4ce70ada 2583 .rpc_call_prepare = nfs4_close_prepare,
963d8fe5
TM
2584 .rpc_call_done = nfs4_close_done,
2585 .rpc_release = nfs4_free_closedata,
2586};
2587
1da177e4
LT
2588/*
2589 * It is possible for data to be read/written from a mem-mapped file
2590 * after the sys_close call (which hits the vfs layer as a flush).
2591 * This means that we can't safely call nfsv4 close on a file until
2592 * the inode is cleared. This in turn means that we are not good
2593 * NFSv4 citizens - we do not indicate to the server to update the file's
2594 * share state even when we are done with one of the three share
2595 * stateid's in the inode.
2596 *
2597 * NOTE: Caller must be holding the sp->so_owner semaphore!
2598 */
1f7977c1 2599int nfs4_do_close(struct nfs4_state *state, gfp_t gfp_mask, int wait)
1da177e4 2600{
4a35bd41 2601 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4 2602 struct nfs4_closedata *calldata;
b39e625b
TM
2603 struct nfs4_state_owner *sp = state->owner;
2604 struct rpc_task *task;
5138fde0
TM
2605 struct rpc_message msg = {
2606 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
2607 .rpc_cred = state->owner->so_cred,
2608 };
c970aa85
TM
2609 struct rpc_task_setup task_setup_data = {
2610 .rpc_client = server->client,
5138fde0 2611 .rpc_message = &msg,
c970aa85 2612 .callback_ops = &nfs4_close_ops,
101070ca 2613 .workqueue = nfsiod_workqueue,
c970aa85
TM
2614 .flags = RPC_TASK_ASYNC,
2615 };
9512135d 2616 int status = -ENOMEM;
1da177e4 2617
fa940720
WAA
2618 nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_CLEANUP,
2619 &task_setup_data.rpc_client, &msg);
2620
8535b2be 2621 calldata = kzalloc(sizeof(*calldata), gfp_mask);
1da177e4 2622 if (calldata == NULL)
9512135d 2623 goto out;
a9c92d6b 2624 nfs4_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 1);
4a35bd41 2625 calldata->inode = state->inode;
1da177e4 2626 calldata->state = state;
4a35bd41 2627 calldata->arg.fh = NFS_FH(state->inode);
003707c7 2628 calldata->arg.stateid = &state->open_stateid;
1da177e4 2629 /* Serialization for the sequence id */
8535b2be 2630 calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid, gfp_mask);
9512135d
TM
2631 if (calldata->arg.seqid == NULL)
2632 goto out_free_calldata;
dc0b027d 2633 calldata->arg.fmode = 0;
a65318bf 2634 calldata->arg.bitmask = server->cache_consistency_bitmask;
516a6af6 2635 calldata->res.fattr = &calldata->fattr;
c1d51931 2636 calldata->res.seqid = calldata->arg.seqid;
516a6af6 2637 calldata->res.server = server;
1f7977c1 2638 calldata->roc = pnfs_roc(state->inode);
643168c2 2639 nfs_sb_active(calldata->inode->i_sb);
9512135d 2640
1174dd1f
TM
2641 msg.rpc_argp = &calldata->arg;
2642 msg.rpc_resp = &calldata->res;
c970aa85
TM
2643 task_setup_data.callback_data = calldata;
2644 task = rpc_run_task(&task_setup_data);
b39e625b
TM
2645 if (IS_ERR(task))
2646 return PTR_ERR(task);
a49c3c77
TM
2647 status = 0;
2648 if (wait)
2649 status = rpc_wait_for_completion_task(task);
b39e625b 2650 rpc_put_task(task);
a49c3c77 2651 return status;
9512135d
TM
2652out_free_calldata:
2653 kfree(calldata);
2654out:
b39e625b
TM
2655 nfs4_put_open_state(state);
2656 nfs4_put_state_owner(sp);
9512135d 2657 return status;
1da177e4
LT
2658}
2659
2b484297 2660static struct inode *
5bc2afc2
TM
2661nfs4_atomic_open(struct inode *dir, struct nfs_open_context *ctx,
2662 int open_flags, struct iattr *attr, int *opened)
1da177e4 2663{
1da177e4 2664 struct nfs4_state *state;
aa9c2669
DQ
2665 struct nfs4_label l = {0, 0, 0, NULL}, *label = NULL;
2666
2667 label = nfs4_label_init_security(dir, ctx->dentry, attr, &l);
1da177e4 2668
565277f6 2669 /* Protect against concurrent sillydeletes */
5bc2afc2 2670 state = nfs4_do_open(dir, ctx, open_flags, attr, label, opened);
aa9c2669
DQ
2671
2672 nfs4_label_release_security(label);
2673
f46e0bd3
TM
2674 if (IS_ERR(state))
2675 return ERR_CAST(state);
275bb307 2676 return state->inode;
1da177e4
LT
2677}
2678
1185a552 2679static void nfs4_close_context(struct nfs_open_context *ctx, int is_sync)
7fe5c398
TM
2680{
2681 if (ctx->state == NULL)
2682 return;
2683 if (is_sync)
643168c2 2684 nfs4_close_sync(ctx->state, ctx->mode);
7fe5c398 2685 else
643168c2 2686 nfs4_close_state(ctx->state, ctx->mode);
7fe5c398 2687}
1da177e4
LT
2688
2689static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
2690{
43652ad5
BH
2691 struct nfs4_server_caps_arg args = {
2692 .fhandle = fhandle,
2693 };
1da177e4
LT
2694 struct nfs4_server_caps_res res = {};
2695 struct rpc_message msg = {
2696 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
43652ad5 2697 .rpc_argp = &args,
1da177e4
LT
2698 .rpc_resp = &res,
2699 };
2700 int status;
2701
7c513058 2702 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2703 if (status == 0) {
2704 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
62ab460c
TM
2705 server->caps &= ~(NFS_CAP_ACLS|NFS_CAP_HARDLINKS|
2706 NFS_CAP_SYMLINKS|NFS_CAP_FILEID|
2707 NFS_CAP_MODE|NFS_CAP_NLINK|NFS_CAP_OWNER|
2708 NFS_CAP_OWNER_GROUP|NFS_CAP_ATIME|
2709 NFS_CAP_CTIME|NFS_CAP_MTIME);
1da177e4
LT
2710 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
2711 server->caps |= NFS_CAP_ACLS;
2712 if (res.has_links != 0)
2713 server->caps |= NFS_CAP_HARDLINKS;
2714 if (res.has_symlinks != 0)
2715 server->caps |= NFS_CAP_SYMLINKS;
62ab460c
TM
2716 if (res.attr_bitmask[0] & FATTR4_WORD0_FILEID)
2717 server->caps |= NFS_CAP_FILEID;
2718 if (res.attr_bitmask[1] & FATTR4_WORD1_MODE)
2719 server->caps |= NFS_CAP_MODE;
2720 if (res.attr_bitmask[1] & FATTR4_WORD1_NUMLINKS)
2721 server->caps |= NFS_CAP_NLINK;
2722 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER)
2723 server->caps |= NFS_CAP_OWNER;
2724 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER_GROUP)
2725 server->caps |= NFS_CAP_OWNER_GROUP;
2726 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_ACCESS)
2727 server->caps |= NFS_CAP_ATIME;
2728 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_METADATA)
2729 server->caps |= NFS_CAP_CTIME;
2730 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_MODIFY)
2731 server->caps |= NFS_CAP_MTIME;
aa9c2669
DQ
2732#ifdef CONFIG_NFS_V4_SECURITY_LABEL
2733 if (res.attr_bitmask[2] & FATTR4_WORD2_SECURITY_LABEL)
2734 server->caps |= NFS_CAP_SECURITY_LABEL;
2735#endif
2736 memcpy(server->attr_bitmask_nl, res.attr_bitmask,
2737 sizeof(server->attr_bitmask));
62ab460c 2738
aa9c2669
DQ
2739 if (server->caps & NFS_CAP_SECURITY_LABEL) {
2740 server->attr_bitmask_nl[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2741 res.attr_bitmask[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2742 }
a65318bf
TM
2743 memcpy(server->cache_consistency_bitmask, res.attr_bitmask, sizeof(server->cache_consistency_bitmask));
2744 server->cache_consistency_bitmask[0] &= FATTR4_WORD0_CHANGE|FATTR4_WORD0_SIZE;
2745 server->cache_consistency_bitmask[1] &= FATTR4_WORD1_TIME_METADATA|FATTR4_WORD1_TIME_MODIFY;
1da177e4 2746 server->acl_bitmask = res.acl_bitmask;
264e6351 2747 server->fh_expire_type = res.fh_expire_type;
1da177e4 2748 }
cccef3b9 2749
1da177e4
LT
2750 return status;
2751}
2752
55a97593 2753int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1da177e4
LT
2754{
2755 struct nfs4_exception exception = { };
2756 int err;
2757 do {
2758 err = nfs4_handle_exception(server,
2759 _nfs4_server_capabilities(server, fhandle),
2760 &exception);
2761 } while (exception.retry);
2762 return err;
2763}
2764
2765static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2766 struct nfs_fsinfo *info)
2767{
aa9c2669 2768 u32 bitmask[3];
1da177e4 2769 struct nfs4_lookup_root_arg args = {
aa9c2669 2770 .bitmask = bitmask,
1da177e4
LT
2771 };
2772 struct nfs4_lookup_res res = {
2773 .server = server,
0e574af1 2774 .fattr = info->fattr,
1da177e4
LT
2775 .fh = fhandle,
2776 };
2777 struct rpc_message msg = {
2778 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
2779 .rpc_argp = &args,
2780 .rpc_resp = &res,
2781 };
008f55d0 2782
aa9c2669
DQ
2783 bitmask[0] = nfs4_fattr_bitmap[0];
2784 bitmask[1] = nfs4_fattr_bitmap[1];
2785 /*
2786 * Process the label in the upcoming getfattr
2787 */
2788 bitmask[2] = nfs4_fattr_bitmap[2] & ~FATTR4_WORD2_SECURITY_LABEL;
2789
0e574af1 2790 nfs_fattr_init(info->fattr);
7c513058 2791 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2792}
2793
2794static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2795 struct nfs_fsinfo *info)
2796{
2797 struct nfs4_exception exception = { };
2798 int err;
2799 do {
fb8a5ba8 2800 err = _nfs4_lookup_root(server, fhandle, info);
b5f875a9 2801 trace_nfs4_lookup_root(server, fhandle, info->fattr, err);
fb8a5ba8
BS
2802 switch (err) {
2803 case 0:
2804 case -NFS4ERR_WRONGSEC:
05e9cfb4 2805 goto out;
fb8a5ba8
BS
2806 default:
2807 err = nfs4_handle_exception(server, err, &exception);
2808 }
1da177e4 2809 } while (exception.retry);
05e9cfb4 2810out:
1da177e4
LT
2811 return err;
2812}
2813
8f70e95f
BS
2814static int nfs4_lookup_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
2815 struct nfs_fsinfo *info, rpc_authflavor_t flavor)
2816{
c2190661
TM
2817 struct rpc_auth_create_args auth_args = {
2818 .pseudoflavor = flavor,
2819 };
8f70e95f
BS
2820 struct rpc_auth *auth;
2821 int ret;
2822
c2190661 2823 auth = rpcauth_create(&auth_args, server->client);
e8d920c5 2824 if (IS_ERR(auth)) {
75bc8821 2825 ret = -EACCES;
8f70e95f
BS
2826 goto out;
2827 }
2828 ret = nfs4_lookup_root(server, fhandle, info);
8f70e95f
BS
2829out:
2830 return ret;
2831}
2832
9a744ba3
CL
2833/*
2834 * Retry pseudoroot lookup with various security flavors. We do this when:
2835 *
2836 * NFSv4.0: the PUTROOTFH operation returns NFS4ERR_WRONGSEC
2837 * NFSv4.1: the server does not support the SECINFO_NO_NAME operation
2838 *
2839 * Returns zero on success, or a negative NFS4ERR value, or a
2840 * negative errno value.
2841 */
801a16dc 2842static int nfs4_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
54ceac45 2843 struct nfs_fsinfo *info)
1da177e4 2844{
9a744ba3
CL
2845 /* Per 3530bis 15.33.5 */
2846 static const rpc_authflavor_t flav_array[] = {
2847 RPC_AUTH_GSS_KRB5P,
2848 RPC_AUTH_GSS_KRB5I,
2849 RPC_AUTH_GSS_KRB5,
c4eafe11 2850 RPC_AUTH_UNIX, /* courtesy */
9a744ba3
CL
2851 RPC_AUTH_NULL,
2852 };
2853 int status = -EPERM;
2854 size_t i;
6a1a1e34 2855
9a744ba3 2856 for (i = 0; i < ARRAY_SIZE(flav_array); i++) {
8f70e95f 2857 status = nfs4_lookup_root_sec(server, fhandle, info, flav_array[i]);
fb8a5ba8 2858 if (status == -NFS4ERR_WRONGSEC || status == -EACCES)
d1a8016a
BS
2859 continue;
2860 break;
8f70e95f 2861 }
9a744ba3 2862
fb8a5ba8
BS
2863 /*
2864 * -EACCESS could mean that the user doesn't have correct permissions
2865 * to access the mount. It could also mean that we tried to mount
2866 * with a gss auth flavor, but rpc.gssd isn't running. Either way,
2867 * existing mount programs don't handle -EACCES very well so it should
2868 * be mapped to -EPERM instead.
2869 */
2870 if (status == -EACCES)
2871 status = -EPERM;
801a16dc
BS
2872 return status;
2873}
2874
2ed4b95b
CL
2875static int nfs4_do_find_root_sec(struct nfs_server *server,
2876 struct nfs_fh *fhandle, struct nfs_fsinfo *info)
2877{
2878 int mv = server->nfs_client->cl_minorversion;
2879 return nfs_v4_minor_ops[mv]->find_root_sec(server, fhandle, info);
2880}
2881
2882/**
2883 * nfs4_proc_get_rootfh - get file handle for server's pseudoroot
2884 * @server: initialized nfs_server handle
2885 * @fhandle: we fill in the pseudo-fs root file handle
2886 * @info: we fill in an FSINFO struct
5e6b1990 2887 * @auth_probe: probe the auth flavours
2ed4b95b
CL
2888 *
2889 * Returns zero on success, or a negative errno.
801a16dc 2890 */
3028eb2b 2891int nfs4_proc_get_rootfh(struct nfs_server *server, struct nfs_fh *fhandle,
5e6b1990
TM
2892 struct nfs_fsinfo *info,
2893 bool auth_probe)
801a16dc 2894{
2ed4b95b
CL
2895 int status;
2896
5e6b1990
TM
2897 switch (auth_probe) {
2898 case false:
2899 status = nfs4_lookup_root(server, fhandle, info);
2900 if (status != -NFS4ERR_WRONGSEC)
2901 break;
2902 /* Did user force a 'sec=' mount option? */
2903 if (server->flags & NFS_MOUNT_SECFLAVOUR)
2904 break;
2905 default:
2ed4b95b 2906 status = nfs4_do_find_root_sec(server, fhandle, info);
5e6b1990 2907 }
2ed4b95b 2908
1da177e4
LT
2909 if (status == 0)
2910 status = nfs4_server_capabilities(server, fhandle);
2911 if (status == 0)
2912 status = nfs4_do_fsinfo(server, fhandle, info);
2ed4b95b 2913
c12e87f4 2914 return nfs4_map_errors(status);
1da177e4
LT
2915}
2916
bae36241
BS
2917static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *mntfh,
2918 struct nfs_fsinfo *info)
2919{
2920 int error;
2921 struct nfs_fattr *fattr = info->fattr;
1775fd3e 2922 struct nfs4_label *label = NULL;
bae36241
BS
2923
2924 error = nfs4_server_capabilities(server, mntfh);
2925 if (error < 0) {
2926 dprintk("nfs4_get_root: getcaps error = %d\n", -error);
2927 return error;
2928 }
2929
14c43f76
DQ
2930 label = nfs4_label_alloc(server, GFP_KERNEL);
2931 if (IS_ERR(label))
2932 return PTR_ERR(label);
2933
1775fd3e 2934 error = nfs4_proc_getattr(server, mntfh, fattr, label);
bae36241
BS
2935 if (error < 0) {
2936 dprintk("nfs4_get_root: getattr error = %d\n", -error);
14c43f76 2937 goto err_free_label;
bae36241
BS
2938 }
2939
2940 if (fattr->valid & NFS_ATTR_FATTR_FSID &&
2941 !nfs_fsid_equal(&server->fsid, &fattr->fsid))
2942 memcpy(&server->fsid, &fattr->fsid, sizeof(server->fsid));
2943
14c43f76
DQ
2944err_free_label:
2945 nfs4_label_free(label);
2946
bae36241
BS
2947 return error;
2948}
2949
6b97fd3d
MN
2950/*
2951 * Get locations and (maybe) other attributes of a referral.
2952 * Note that we'll actually follow the referral later when
2953 * we detect fsid mismatch in inode revalidation
2954 */
f05d147f
BS
2955static int nfs4_get_referral(struct rpc_clnt *client, struct inode *dir,
2956 const struct qstr *name, struct nfs_fattr *fattr,
2957 struct nfs_fh *fhandle)
6b97fd3d
MN
2958{
2959 int status = -ENOMEM;
2960 struct page *page = NULL;
2961 struct nfs4_fs_locations *locations = NULL;
6b97fd3d
MN
2962
2963 page = alloc_page(GFP_KERNEL);
2964 if (page == NULL)
2965 goto out;
2966 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
2967 if (locations == NULL)
2968 goto out;
2969
f05d147f 2970 status = nfs4_proc_fs_locations(client, dir, name, locations, page);
6b97fd3d
MN
2971 if (status != 0)
2972 goto out;
2973 /* Make sure server returned a different fsid for the referral */
2974 if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
533eb461
AA
2975 dprintk("%s: server did not return a different fsid for"
2976 " a referral at %s\n", __func__, name->name);
6b97fd3d
MN
2977 status = -EIO;
2978 goto out;
2979 }
533eb461
AA
2980 /* Fixup attributes for the nfs_lookup() call to nfs_fhget() */
2981 nfs_fixup_referral_attributes(&locations->fattr);
6b97fd3d 2982
533eb461 2983 /* replace the lookup nfs_fattr with the locations nfs_fattr */
6b97fd3d 2984 memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
6b97fd3d
MN
2985 memset(fhandle, 0, sizeof(struct nfs_fh));
2986out:
2987 if (page)
2988 __free_page(page);
5d7ca35a 2989 kfree(locations);
6b97fd3d
MN
2990 return status;
2991}
2992
1775fd3e
DQ
2993static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle,
2994 struct nfs_fattr *fattr, struct nfs4_label *label)
1da177e4
LT
2995{
2996 struct nfs4_getattr_arg args = {
2997 .fh = fhandle,
2998 .bitmask = server->attr_bitmask,
2999 };
3000 struct nfs4_getattr_res res = {
3001 .fattr = fattr,
1775fd3e 3002 .label = label,
1da177e4
LT
3003 .server = server,
3004 };
3005 struct rpc_message msg = {
3006 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
3007 .rpc_argp = &args,
3008 .rpc_resp = &res,
3009 };
aa9c2669
DQ
3010
3011 args.bitmask = nfs4_bitmask(server, label);
3012
0e574af1 3013 nfs_fattr_init(fattr);
7c513058 3014 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3015}
3016
1775fd3e
DQ
3017static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle,
3018 struct nfs_fattr *fattr, struct nfs4_label *label)
1da177e4
LT
3019{
3020 struct nfs4_exception exception = { };
3021 int err;
3022 do {
b5f875a9
TM
3023 err = _nfs4_proc_getattr(server, fhandle, fattr, label);
3024 trace_nfs4_getattr(server, fhandle, fattr, err);
3025 err = nfs4_handle_exception(server, err,
1da177e4
LT
3026 &exception);
3027 } while (exception.retry);
3028 return err;
3029}
3030
3031/*
3032 * The file is not closed if it is opened due to the a request to change
3033 * the size of the file. The open call will not be needed once the
3034 * VFS layer lookup-intents are implemented.
3035 *
3036 * Close is called when the inode is destroyed.
3037 * If we haven't opened the file for O_WRONLY, we
3038 * need to in the size_change case to obtain a stateid.
3039 *
3040 * Got race?
3041 * Because OPEN is always done by name in nfsv4, it is
3042 * possible that we opened a different file by the same
3043 * name. We can recognize this race condition, but we
3044 * can't do anything about it besides returning an error.
3045 *
3046 * This will be fixed with VFS changes (lookup-intent).
3047 */
3048static int
3049nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
3050 struct iattr *sattr)
3051{
08e9eac4 3052 struct inode *inode = dentry->d_inode;
659bfcd6 3053 struct rpc_cred *cred = NULL;
d530838b 3054 struct nfs4_state *state = NULL;
14c43f76 3055 struct nfs4_label *label = NULL;
1da177e4
LT
3056 int status;
3057
8a1636c4 3058 if (pnfs_ld_layoutret_on_setattr(inode))
24028672 3059 pnfs_commit_and_return_layout(inode);
8a1636c4 3060
0e574af1 3061 nfs_fattr_init(fattr);
1da177e4 3062
2669940d
AA
3063 /* Deal with open(O_TRUNC) */
3064 if (sattr->ia_valid & ATTR_OPEN)
cc7936f9 3065 sattr->ia_valid &= ~(ATTR_MTIME|ATTR_CTIME);
2669940d
AA
3066
3067 /* Optimization: if the end result is no change, don't RPC */
cc7936f9 3068 if ((sattr->ia_valid & ~(ATTR_FILE|ATTR_OPEN)) == 0)
2669940d
AA
3069 return 0;
3070
d530838b 3071 /* Search for an existing open(O_WRITE) file */
659bfcd6
TM
3072 if (sattr->ia_valid & ATTR_FILE) {
3073 struct nfs_open_context *ctx;
3074
3075 ctx = nfs_file_open_context(sattr->ia_file);
504e5189
NB
3076 if (ctx) {
3077 cred = ctx->cred;
3078 state = ctx->state;
3079 }
659bfcd6 3080 }
08e9eac4 3081
14c43f76
DQ
3082 label = nfs4_label_alloc(NFS_SERVER(inode), GFP_KERNEL);
3083 if (IS_ERR(label))
3084 return PTR_ERR(label);
3085
3086 status = nfs4_do_setattr(inode, cred, fattr, sattr, state, NULL, label);
aa9c2669 3087 if (status == 0) {
65e4308d 3088 nfs_setattr_update_inode(inode, sattr);
aa9c2669
DQ
3089 nfs_setsecurity(inode, fattr, label);
3090 }
14c43f76 3091 nfs4_label_free(label);
1da177e4
LT
3092 return status;
3093}
3094
0c2e53f1
TM
3095static int _nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir,
3096 const struct qstr *name, struct nfs_fh *fhandle,
1775fd3e 3097 struct nfs_fattr *fattr, struct nfs4_label *label)
2b3de441 3098{
0c2e53f1 3099 struct nfs_server *server = NFS_SERVER(dir);
2b3de441
DH
3100 int status;
3101 struct nfs4_lookup_arg args = {
3102 .bitmask = server->attr_bitmask,
0c2e53f1 3103 .dir_fh = NFS_FH(dir),
2b3de441
DH
3104 .name = name,
3105 };
3106 struct nfs4_lookup_res res = {
3107 .server = server,
3108 .fattr = fattr,
aa9c2669 3109 .label = label,
2b3de441
DH
3110 .fh = fhandle,
3111 };
3112 struct rpc_message msg = {
3113 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
3114 .rpc_argp = &args,
3115 .rpc_resp = &res,
3116 };
3117
aa9c2669
DQ
3118 args.bitmask = nfs4_bitmask(server, label);
3119
2b3de441
DH
3120 nfs_fattr_init(fattr);
3121
1da177e4 3122 dprintk("NFS call lookup %s\n", name->name);
0c2e53f1 3123 status = nfs4_call_sync(clnt, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3124 dprintk("NFS reply lookup: %d\n", status);
3125 return status;
3126}
3127
72de53ec 3128static void nfs_fixup_secinfo_attributes(struct nfs_fattr *fattr)
7ebb9315 3129{
7ebb9315 3130 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
72de53ec 3131 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_MOUNTPOINT;
7ebb9315
BS
3132 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
3133 fattr->nlink = 2;
3134}
3135
72de53ec
BS
3136static int nfs4_proc_lookup_common(struct rpc_clnt **clnt, struct inode *dir,
3137 struct qstr *name, struct nfs_fh *fhandle,
1775fd3e 3138 struct nfs_fattr *fattr, struct nfs4_label *label)
1da177e4
LT
3139{
3140 struct nfs4_exception exception = { };
72de53ec 3141 struct rpc_clnt *client = *clnt;
1da177e4
LT
3142 int err;
3143 do {
1775fd3e 3144 err = _nfs4_proc_lookup(client, dir, name, fhandle, fattr, label);
078ea3df 3145 trace_nfs4_lookup(dir, name, err);
72de53ec 3146 switch (err) {
08ef7bd3 3147 case -NFS4ERR_BADNAME:
72de53ec
BS
3148 err = -ENOENT;
3149 goto out;
0c2e53f1 3150 case -NFS4ERR_MOVED:
f05d147f 3151 err = nfs4_get_referral(client, dir, name, fattr, fhandle);
72de53ec 3152 goto out;
0c2e53f1 3153 case -NFS4ERR_WRONGSEC:
72de53ec
BS
3154 err = -EPERM;
3155 if (client != *clnt)
3156 goto out;
41d058c3
TM
3157 /* No security negotiation if the user specified 'sec=' */
3158 if (NFS_SERVER(dir)->flags & NFS_MOUNT_SECFLAVOUR)
3159 goto out;
72de53ec
BS
3160 client = nfs4_create_sec_client(client, dir, name);
3161 if (IS_ERR(client))
3162 return PTR_ERR(client);
3163
3164 exception.retry = 1;
3165 break;
3166 default:
3167 err = nfs4_handle_exception(NFS_SERVER(dir), err, &exception);
0c2e53f1 3168 }
1da177e4 3169 } while (exception.retry);
72de53ec
BS
3170
3171out:
3172 if (err == 0)
3173 *clnt = client;
3174 else if (client != *clnt)
3175 rpc_shutdown_client(client);
3176
1da177e4
LT
3177 return err;
3178}
3179
80a16b21 3180static int nfs4_proc_lookup(struct inode *dir, struct qstr *name,
1775fd3e
DQ
3181 struct nfs_fh *fhandle, struct nfs_fattr *fattr,
3182 struct nfs4_label *label)
72de53ec
BS
3183{
3184 int status;
3185 struct rpc_clnt *client = NFS_CLIENT(dir);
3186
1775fd3e 3187 status = nfs4_proc_lookup_common(&client, dir, name, fhandle, fattr, label);
72de53ec
BS
3188 if (client != NFS_CLIENT(dir)) {
3189 rpc_shutdown_client(client);
3190 nfs_fixup_secinfo_attributes(fattr);
3191 }
3192 return status;
3193}
3194
f05d147f
BS
3195struct rpc_clnt *
3196nfs4_proc_lookup_mountpoint(struct inode *dir, struct qstr *name,
3197 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
3198{
b72888cb 3199 struct rpc_clnt *client = NFS_CLIENT(dir);
f05d147f 3200 int status;
f05d147f 3201
1775fd3e 3202 status = nfs4_proc_lookup_common(&client, dir, name, fhandle, fattr, NULL);
b72888cb 3203 if (status < 0)
f05d147f 3204 return ERR_PTR(status);
b72888cb 3205 return (client == NFS_CLIENT(dir)) ? rpc_clone_client(client) : client;
f05d147f
BS
3206}
3207
1da177e4
LT
3208static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
3209{
76b32999 3210 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
3211 struct nfs4_accessargs args = {
3212 .fh = NFS_FH(inode),
a4980e78 3213 .bitmask = server->cache_consistency_bitmask,
76b32999
TM
3214 };
3215 struct nfs4_accessres res = {
3216 .server = server,
1da177e4 3217 };
1da177e4
LT
3218 struct rpc_message msg = {
3219 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
3220 .rpc_argp = &args,
3221 .rpc_resp = &res,
3222 .rpc_cred = entry->cred,
3223 };
3224 int mode = entry->mask;
aa9c2669 3225 int status = 0;
1da177e4
LT
3226
3227 /*
3228 * Determine which access bits we want to ask for...
3229 */
3230 if (mode & MAY_READ)
3231 args.access |= NFS4_ACCESS_READ;
3232 if (S_ISDIR(inode->i_mode)) {
3233 if (mode & MAY_WRITE)
3234 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
3235 if (mode & MAY_EXEC)
3236 args.access |= NFS4_ACCESS_LOOKUP;
3237 } else {
3238 if (mode & MAY_WRITE)
3239 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
3240 if (mode & MAY_EXEC)
3241 args.access |= NFS4_ACCESS_EXECUTE;
3242 }
c407d41a
TM
3243
3244 res.fattr = nfs_alloc_fattr();
3245 if (res.fattr == NULL)
3246 return -ENOMEM;
3247
7c513058 3248 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4 3249 if (!status) {
6168f62c 3250 nfs_access_set_mask(entry, res.access);
c407d41a 3251 nfs_refresh_inode(inode, res.fattr);
1da177e4 3252 }
c407d41a 3253 nfs_free_fattr(res.fattr);
1da177e4
LT
3254 return status;
3255}
3256
3257static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
3258{
3259 struct nfs4_exception exception = { };
3260 int err;
3261 do {
c1578b76
TM
3262 err = _nfs4_proc_access(inode, entry);
3263 trace_nfs4_access(inode, err);
3264 err = nfs4_handle_exception(NFS_SERVER(inode), err,
1da177e4
LT
3265 &exception);
3266 } while (exception.retry);
3267 return err;
3268}
3269
3270/*
3271 * TODO: For the time being, we don't try to get any attributes
3272 * along with any of the zero-copy operations READ, READDIR,
3273 * READLINK, WRITE.
3274 *
3275 * In the case of the first three, we want to put the GETATTR
3276 * after the read-type operation -- this is because it is hard
3277 * to predict the length of a GETATTR response in v4, and thus
3278 * align the READ data correctly. This means that the GETATTR
3279 * may end up partially falling into the page cache, and we should
3280 * shift it into the 'tail' of the xdr_buf before processing.
3281 * To do this efficiently, we need to know the total length
3282 * of data received, which doesn't seem to be available outside
3283 * of the RPC layer.
3284 *
3285 * In the case of WRITE, we also want to put the GETATTR after
3286 * the operation -- in this case because we want to make sure
140150db 3287 * we get the post-operation mtime and size.
1da177e4
LT
3288 *
3289 * Both of these changes to the XDR layer would in fact be quite
3290 * minor, but I decided to leave them for a subsequent patch.
3291 */
3292static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
3293 unsigned int pgbase, unsigned int pglen)
3294{
3295 struct nfs4_readlink args = {
3296 .fh = NFS_FH(inode),
3297 .pgbase = pgbase,
3298 .pglen = pglen,
3299 .pages = &page,
3300 };
f50c7000 3301 struct nfs4_readlink_res res;
1da177e4
LT
3302 struct rpc_message msg = {
3303 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
3304 .rpc_argp = &args,
f50c7000 3305 .rpc_resp = &res,
1da177e4
LT
3306 };
3307
7c513058 3308 return nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode), &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3309}
3310
3311static int nfs4_proc_readlink(struct inode *inode, struct page *page,
3312 unsigned int pgbase, unsigned int pglen)
3313{
3314 struct nfs4_exception exception = { };
3315 int err;
3316 do {
c1578b76
TM
3317 err = _nfs4_proc_readlink(inode, page, pgbase, pglen);
3318 trace_nfs4_readlink(inode, err);
3319 err = nfs4_handle_exception(NFS_SERVER(inode), err,
1da177e4
LT
3320 &exception);
3321 } while (exception.retry);
3322 return err;
3323}
3324
1da177e4 3325/*
8867fe58 3326 * This is just for mknod. open(O_CREAT) will always do ->open_context().
1da177e4 3327 */
1da177e4
LT
3328static int
3329nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
8867fe58 3330 int flags)
1da177e4 3331{
aa9c2669 3332 struct nfs4_label l, *ilabel = NULL;
8867fe58 3333 struct nfs_open_context *ctx;
1da177e4 3334 struct nfs4_state *state;
5bc2afc2 3335 int opened = 0;
1da177e4
LT
3336 int status = 0;
3337
8867fe58
MS
3338 ctx = alloc_nfs_open_context(dentry, FMODE_READ);
3339 if (IS_ERR(ctx))
3340 return PTR_ERR(ctx);
3341
aa9c2669
DQ
3342 ilabel = nfs4_label_init_security(dir, dentry, sattr, &l);
3343
a8a5da99 3344 sattr->ia_mode &= ~current_umask();
5bc2afc2 3345 state = nfs4_do_open(dir, ctx, flags, sattr, ilabel, &opened);
1da177e4
LT
3346 if (IS_ERR(state)) {
3347 status = PTR_ERR(state);
c0204fd2 3348 goto out;
1da177e4 3349 }
1da177e4 3350out:
aa9c2669 3351 nfs4_label_release_security(ilabel);
8867fe58 3352 put_nfs_open_context(ctx);
1da177e4
LT
3353 return status;
3354}
3355
3356static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
3357{
16e42959 3358 struct nfs_server *server = NFS_SERVER(dir);
4fdc17b2 3359 struct nfs_removeargs args = {
1da177e4 3360 .fh = NFS_FH(dir),
26fe5750 3361 .name = *name,
16e42959 3362 };
4fdc17b2 3363 struct nfs_removeres res = {
16e42959 3364 .server = server,
1da177e4 3365 };
1da177e4 3366 struct rpc_message msg = {
4fdc17b2
TM
3367 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
3368 .rpc_argp = &args,
3369 .rpc_resp = &res,
1da177e4 3370 };
778d2817 3371 int status;
1da177e4 3372
7c513058 3373 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
778d2817 3374 if (status == 0)
16e42959 3375 update_changeattr(dir, &res.cinfo);
1da177e4
LT
3376 return status;
3377}
3378
3379static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
3380{
3381 struct nfs4_exception exception = { };
3382 int err;
3383 do {
078ea3df
TM
3384 err = _nfs4_proc_remove(dir, name);
3385 trace_nfs4_remove(dir, name, err);
3386 err = nfs4_handle_exception(NFS_SERVER(dir), err,
1da177e4
LT
3387 &exception);
3388 } while (exception.retry);
3389 return err;
3390}
3391
e4eff1a6 3392static void nfs4_proc_unlink_setup(struct rpc_message *msg, struct inode *dir)
1da177e4 3393{
e4eff1a6
TM
3394 struct nfs_server *server = NFS_SERVER(dir);
3395 struct nfs_removeargs *args = msg->rpc_argp;
3396 struct nfs_removeres *res = msg->rpc_resp;
1da177e4 3397
e4eff1a6 3398 res->server = server;
1da177e4 3399 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
a9c92d6b 3400 nfs4_init_sequence(&args->seq_args, &res->seq_res, 1);
aa9c2669
DQ
3401
3402 nfs_fattr_init(res->dir_attr);
1da177e4
LT
3403}
3404
34e137cc
BS
3405static void nfs4_proc_unlink_rpc_prepare(struct rpc_task *task, struct nfs_unlinkdata *data)
3406{
d9afbd1b
TM
3407 nfs4_setup_sequence(NFS_SERVER(data->dir),
3408 &data->args.seq_args,
3409 &data->res.seq_res,
3410 task);
1da177e4
LT
3411}
3412
e4eff1a6 3413static int nfs4_proc_unlink_done(struct rpc_task *task, struct inode *dir)
1da177e4 3414{
078ea3df
TM
3415 struct nfs_unlinkdata *data = task->tk_calldata;
3416 struct nfs_removeres *res = &data->res;
e4eff1a6 3417
14516c3a
TM
3418 if (!nfs4_sequence_done(task, &res->seq_res))
3419 return 0;
9e33bed5 3420 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
e4eff1a6
TM
3421 return 0;
3422 update_changeattr(dir, &res->cinfo);
e4eff1a6 3423 return 1;
1da177e4
LT
3424}
3425
d3d4152a
JL
3426static void nfs4_proc_rename_setup(struct rpc_message *msg, struct inode *dir)
3427{
3428 struct nfs_server *server = NFS_SERVER(dir);
3429 struct nfs_renameargs *arg = msg->rpc_argp;
3430 struct nfs_renameres *res = msg->rpc_resp;
3431
3432 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME];
d3d4152a 3433 res->server = server;
a9c92d6b 3434 nfs4_init_sequence(&arg->seq_args, &res->seq_res, 1);
d3d4152a
JL
3435}
3436
c6bfa1a1
BS
3437static void nfs4_proc_rename_rpc_prepare(struct rpc_task *task, struct nfs_renamedata *data)
3438{
d9afbd1b
TM
3439 nfs4_setup_sequence(NFS_SERVER(data->old_dir),
3440 &data->args.seq_args,
3441 &data->res.seq_res,
3442 task);
d3d4152a
JL
3443}
3444
3445static int nfs4_proc_rename_done(struct rpc_task *task, struct inode *old_dir,
3446 struct inode *new_dir)
3447{
fbc6f7c2
TM
3448 struct nfs_renamedata *data = task->tk_calldata;
3449 struct nfs_renameres *res = &data->res;
d3d4152a
JL
3450
3451 if (!nfs4_sequence_done(task, &res->seq_res))
3452 return 0;
3453 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
3454 return 0;
3455
3456 update_changeattr(old_dir, &res->old_cinfo);
d3d4152a 3457 update_changeattr(new_dir, &res->new_cinfo);
d3d4152a
JL
3458 return 1;
3459}
3460
1da177e4
LT
3461static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
3462 struct inode *new_dir, struct qstr *new_name)
3463{
6caf2c82 3464 struct nfs_server *server = NFS_SERVER(old_dir);
920769f0 3465 struct nfs_renameargs arg = {
1da177e4
LT
3466 .old_dir = NFS_FH(old_dir),
3467 .new_dir = NFS_FH(new_dir),
3468 .old_name = old_name,
3469 .new_name = new_name,
6caf2c82 3470 };
e8582a8b 3471 struct nfs_renameres res = {
6caf2c82 3472 .server = server,
1da177e4 3473 };
1da177e4
LT
3474 struct rpc_message msg = {
3475 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
3476 .rpc_argp = &arg,
3477 .rpc_resp = &res,
3478 };
011fff72 3479 int status = -ENOMEM;
14c43f76 3480
7c513058 3481 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
1da177e4
LT
3482 if (!status) {
3483 update_changeattr(old_dir, &res.old_cinfo);
3484 update_changeattr(new_dir, &res.new_cinfo);
3485 }
3486 return status;
3487}
3488
3489static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
3490 struct inode *new_dir, struct qstr *new_name)
3491{
3492 struct nfs4_exception exception = { };
3493 int err;
3494 do {
fbc6f7c2
TM
3495 err = _nfs4_proc_rename(old_dir, old_name,
3496 new_dir, new_name);
3497 trace_nfs4_rename(old_dir, old_name, new_dir, new_name, err);
3498 err = nfs4_handle_exception(NFS_SERVER(old_dir), err,
1da177e4
LT
3499 &exception);
3500 } while (exception.retry);
3501 return err;
3502}
3503
3504static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
3505{
91ba2eee 3506 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
3507 struct nfs4_link_arg arg = {
3508 .fh = NFS_FH(inode),
3509 .dir_fh = NFS_FH(dir),
3510 .name = name,
91ba2eee
TM
3511 .bitmask = server->attr_bitmask,
3512 };
91ba2eee
TM
3513 struct nfs4_link_res res = {
3514 .server = server,
1775fd3e 3515 .label = NULL,
1da177e4 3516 };
1da177e4
LT
3517 struct rpc_message msg = {
3518 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
3519 .rpc_argp = &arg,
91ba2eee 3520 .rpc_resp = &res,
1da177e4 3521 };
136f2627
TM
3522 int status = -ENOMEM;
3523
3524 res.fattr = nfs_alloc_fattr();
778d2817 3525 if (res.fattr == NULL)
136f2627 3526 goto out;
1da177e4 3527
14c43f76
DQ
3528 res.label = nfs4_label_alloc(server, GFP_KERNEL);
3529 if (IS_ERR(res.label)) {
3530 status = PTR_ERR(res.label);
3531 goto out;
3532 }
aa9c2669 3533 arg.bitmask = nfs4_bitmask(server, res.label);
14c43f76 3534
7c513058 3535 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
91ba2eee
TM
3536 if (!status) {
3537 update_changeattr(dir, &res.cinfo);
aa9c2669
DQ
3538 status = nfs_post_op_update_inode(inode, res.fattr);
3539 if (!status)
3540 nfs_setsecurity(inode, res.fattr, res.label);
91ba2eee 3541 }
14c43f76
DQ
3542
3543
3544 nfs4_label_free(res.label);
3545
136f2627 3546out:
136f2627 3547 nfs_free_fattr(res.fattr);
1da177e4
LT
3548 return status;
3549}
3550
3551static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
3552{
3553 struct nfs4_exception exception = { };
3554 int err;
3555 do {
3556 err = nfs4_handle_exception(NFS_SERVER(inode),
3557 _nfs4_proc_link(inode, dir, name),
3558 &exception);
3559 } while (exception.retry);
3560 return err;
3561}
3562
57dc9a57
TM
3563struct nfs4_createdata {
3564 struct rpc_message msg;
3565 struct nfs4_create_arg arg;
3566 struct nfs4_create_res res;
3567 struct nfs_fh fh;
3568 struct nfs_fattr fattr;
1775fd3e 3569 struct nfs4_label *label;
57dc9a57
TM
3570};
3571
3572static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir,
3573 struct qstr *name, struct iattr *sattr, u32 ftype)
3574{
3575 struct nfs4_createdata *data;
3576
3577 data = kzalloc(sizeof(*data), GFP_KERNEL);
3578 if (data != NULL) {
3579 struct nfs_server *server = NFS_SERVER(dir);
3580
14c43f76
DQ
3581 data->label = nfs4_label_alloc(server, GFP_KERNEL);
3582 if (IS_ERR(data->label))
3583 goto out_free;
3584
57dc9a57
TM
3585 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE];
3586 data->msg.rpc_argp = &data->arg;
3587 data->msg.rpc_resp = &data->res;
3588 data->arg.dir_fh = NFS_FH(dir);
3589 data->arg.server = server;
3590 data->arg.name = name;
3591 data->arg.attrs = sattr;
3592 data->arg.ftype = ftype;
aa9c2669 3593 data->arg.bitmask = nfs4_bitmask(server, data->label);
57dc9a57
TM
3594 data->res.server = server;
3595 data->res.fh = &data->fh;
3596 data->res.fattr = &data->fattr;
1775fd3e 3597 data->res.label = data->label;
57dc9a57 3598 nfs_fattr_init(data->res.fattr);
57dc9a57
TM
3599 }
3600 return data;
14c43f76
DQ
3601out_free:
3602 kfree(data);
3603 return NULL;
57dc9a57
TM
3604}
3605
3606static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data)
3607{
7c513058 3608 int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg,
e73b83f2 3609 &data->arg.seq_args, &data->res.seq_res, 1);
57dc9a57
TM
3610 if (status == 0) {
3611 update_changeattr(dir, &data->res.dir_cinfo);
1775fd3e 3612 status = nfs_instantiate(dentry, data->res.fh, data->res.fattr, data->res.label);
57dc9a57
TM
3613 }
3614 return status;
3615}
3616
3617static void nfs4_free_createdata(struct nfs4_createdata *data)
3618{
14c43f76 3619 nfs4_label_free(data->label);
57dc9a57
TM
3620 kfree(data);
3621}
3622
4f390c15 3623static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
1775fd3e
DQ
3624 struct page *page, unsigned int len, struct iattr *sattr,
3625 struct nfs4_label *label)
1da177e4 3626{
57dc9a57
TM
3627 struct nfs4_createdata *data;
3628 int status = -ENAMETOOLONG;
1da177e4 3629
94a6d753 3630 if (len > NFS4_MAXPATHLEN)
57dc9a57 3631 goto out;
4f390c15 3632
57dc9a57
TM
3633 status = -ENOMEM;
3634 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK);
3635 if (data == NULL)
3636 goto out;
3637
3638 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK];
3639 data->arg.u.symlink.pages = &page;
3640 data->arg.u.symlink.len = len;
1775fd3e 3641 data->arg.label = label;
1da177e4 3642
57dc9a57
TM
3643 status = nfs4_do_create(dir, dentry, data);
3644
3645 nfs4_free_createdata(data);
3646out:
1da177e4
LT
3647 return status;
3648}
3649
4f390c15 3650static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 3651 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
3652{
3653 struct nfs4_exception exception = { };
aa9c2669 3654 struct nfs4_label l, *label = NULL;
1da177e4 3655 int err;
aa9c2669
DQ
3656
3657 label = nfs4_label_init_security(dir, dentry, sattr, &l);
3658
1da177e4 3659 do {
078ea3df
TM
3660 err = _nfs4_proc_symlink(dir, dentry, page, len, sattr, label);
3661 trace_nfs4_symlink(dir, &dentry->d_name, err);
3662 err = nfs4_handle_exception(NFS_SERVER(dir), err,
1da177e4
LT
3663 &exception);
3664 } while (exception.retry);
aa9c2669
DQ
3665
3666 nfs4_label_release_security(label);
1da177e4
LT
3667 return err;
3668}
3669
3670static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
1775fd3e 3671 struct iattr *sattr, struct nfs4_label *label)
1da177e4 3672{
57dc9a57
TM
3673 struct nfs4_createdata *data;
3674 int status = -ENOMEM;
1da177e4 3675
57dc9a57
TM
3676 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR);
3677 if (data == NULL)
3678 goto out;
3679
1775fd3e 3680 data->arg.label = label;
57dc9a57
TM
3681 status = nfs4_do_create(dir, dentry, data);
3682
3683 nfs4_free_createdata(data);
3684out:
1da177e4
LT
3685 return status;
3686}
3687
3688static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
3689 struct iattr *sattr)
3690{
3691 struct nfs4_exception exception = { };
aa9c2669 3692 struct nfs4_label l, *label = NULL;
1da177e4 3693 int err;
a8a5da99 3694
aa9c2669
DQ
3695 label = nfs4_label_init_security(dir, dentry, sattr, &l);
3696
a8a5da99 3697 sattr->ia_mode &= ~current_umask();
1da177e4 3698 do {
078ea3df
TM
3699 err = _nfs4_proc_mkdir(dir, dentry, sattr, label);
3700 trace_nfs4_mkdir(dir, &dentry->d_name, err);
3701 err = nfs4_handle_exception(NFS_SERVER(dir), err,
1da177e4
LT
3702 &exception);
3703 } while (exception.retry);
aa9c2669
DQ
3704 nfs4_label_release_security(label);
3705
1da177e4
LT
3706 return err;
3707}
3708
3709static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 3710 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
3711{
3712 struct inode *dir = dentry->d_inode;
3713 struct nfs4_readdir_arg args = {
3714 .fh = NFS_FH(dir),
56e4ebf8 3715 .pages = pages,
1da177e4
LT
3716 .pgbase = 0,
3717 .count = count,
96d25e53 3718 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
82f2e547 3719 .plus = plus,
1da177e4
LT
3720 };
3721 struct nfs4_readdir_res res;
3722 struct rpc_message msg = {
3723 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
3724 .rpc_argp = &args,
3725 .rpc_resp = &res,
3726 .rpc_cred = cred,
3727 };
3728 int status;
3729
3110ff80 3730 dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __func__,
eadf4598
TM
3731 dentry->d_parent->d_name.name,
3732 dentry->d_name.name,
3733 (unsigned long long)cookie);
c3f52af3 3734 nfs4_setup_readdir(cookie, NFS_I(dir)->cookieverf, dentry, &args);
1da177e4 3735 res.pgbase = args.pgbase;
7c513058 3736 status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
ac396128 3737 if (status >= 0) {
c3f52af3 3738 memcpy(NFS_I(dir)->cookieverf, res.verifier.data, NFS4_VERIFIER_SIZE);
ac396128
TM
3739 status += args.pgbase;
3740 }
c4812998
TM
3741
3742 nfs_invalidate_atime(dir);
3743
3110ff80 3744 dprintk("%s: returns %d\n", __func__, status);
1da177e4
LT
3745 return status;
3746}
3747
3748static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 3749 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
3750{
3751 struct nfs4_exception exception = { };
3752 int err;
3753 do {
c1578b76
TM
3754 err = _nfs4_proc_readdir(dentry, cred, cookie,
3755 pages, count, plus);
3756 trace_nfs4_readdir(dentry->d_inode, err);
3757 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode), err,
1da177e4
LT
3758 &exception);
3759 } while (exception.retry);
3760 return err;
3761}
3762
3763static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
aa9c2669 3764 struct iattr *sattr, struct nfs4_label *label, dev_t rdev)
1da177e4 3765{
57dc9a57
TM
3766 struct nfs4_createdata *data;
3767 int mode = sattr->ia_mode;
3768 int status = -ENOMEM;
1da177e4 3769
57dc9a57
TM
3770 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4SOCK);
3771 if (data == NULL)
3772 goto out;
3773
1da177e4 3774 if (S_ISFIFO(mode))
57dc9a57 3775 data->arg.ftype = NF4FIFO;
1da177e4 3776 else if (S_ISBLK(mode)) {
57dc9a57
TM
3777 data->arg.ftype = NF4BLK;
3778 data->arg.u.device.specdata1 = MAJOR(rdev);
3779 data->arg.u.device.specdata2 = MINOR(rdev);
1da177e4
LT
3780 }
3781 else if (S_ISCHR(mode)) {
57dc9a57
TM
3782 data->arg.ftype = NF4CHR;
3783 data->arg.u.device.specdata1 = MAJOR(rdev);
3784 data->arg.u.device.specdata2 = MINOR(rdev);
4ea8fed5
TM
3785 } else if (!S_ISSOCK(mode)) {
3786 status = -EINVAL;
3787 goto out_free;
1da177e4 3788 }
1775fd3e 3789
aa9c2669 3790 data->arg.label = label;
57dc9a57 3791 status = nfs4_do_create(dir, dentry, data);
4ea8fed5 3792out_free:
57dc9a57
TM
3793 nfs4_free_createdata(data);
3794out:
1da177e4
LT
3795 return status;
3796}
3797
3798static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3799 struct iattr *sattr, dev_t rdev)
3800{
3801 struct nfs4_exception exception = { };
aa9c2669 3802 struct nfs4_label l, *label = NULL;
1da177e4 3803 int err;
a8a5da99 3804
aa9c2669
DQ
3805 label = nfs4_label_init_security(dir, dentry, sattr, &l);
3806
a8a5da99 3807 sattr->ia_mode &= ~current_umask();
1da177e4 3808 do {
078ea3df
TM
3809 err = _nfs4_proc_mknod(dir, dentry, sattr, label, rdev);
3810 trace_nfs4_mknod(dir, &dentry->d_name, err);
3811 err = nfs4_handle_exception(NFS_SERVER(dir), err,
1da177e4
LT
3812 &exception);
3813 } while (exception.retry);
aa9c2669
DQ
3814
3815 nfs4_label_release_security(label);
3816
1da177e4
LT
3817 return err;
3818}
3819
3820static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
3821 struct nfs_fsstat *fsstat)
3822{
3823 struct nfs4_statfs_arg args = {
3824 .fh = fhandle,
3825 .bitmask = server->attr_bitmask,
3826 };
24ad148a
BH
3827 struct nfs4_statfs_res res = {
3828 .fsstat = fsstat,
3829 };
1da177e4
LT
3830 struct rpc_message msg = {
3831 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
3832 .rpc_argp = &args,
24ad148a 3833 .rpc_resp = &res,
1da177e4
LT
3834 };
3835
0e574af1 3836 nfs_fattr_init(fsstat->fattr);
7c513058 3837 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3838}
3839
3840static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
3841{
3842 struct nfs4_exception exception = { };
3843 int err;
3844 do {
3845 err = nfs4_handle_exception(server,
3846 _nfs4_proc_statfs(server, fhandle, fsstat),
3847 &exception);
3848 } while (exception.retry);
3849 return err;
3850}
3851
3852static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
3853 struct nfs_fsinfo *fsinfo)
3854{
3855 struct nfs4_fsinfo_arg args = {
3856 .fh = fhandle,
3857 .bitmask = server->attr_bitmask,
3858 };
3dda5e43
BH
3859 struct nfs4_fsinfo_res res = {
3860 .fsinfo = fsinfo,
3861 };
1da177e4
LT
3862 struct rpc_message msg = {
3863 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
3864 .rpc_argp = &args,
3dda5e43 3865 .rpc_resp = &res,
1da177e4
LT
3866 };
3867
7c513058 3868 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3869}
3870
3871static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3872{
3873 struct nfs4_exception exception = { };
83ca7f5a 3874 unsigned long now = jiffies;
1da177e4
LT
3875 int err;
3876
3877 do {
83ca7f5a 3878 err = _nfs4_do_fsinfo(server, fhandle, fsinfo);
b5f875a9 3879 trace_nfs4_fsinfo(server, fhandle, fsinfo->fattr, err);
83ca7f5a
CL
3880 if (err == 0) {
3881 struct nfs_client *clp = server->nfs_client;
3882
3883 spin_lock(&clp->cl_lock);
3884 clp->cl_lease_time = fsinfo->lease_time * HZ;
3885 clp->cl_last_renewal = now;
3886 spin_unlock(&clp->cl_lock);
3887 break;
3888 }
3889 err = nfs4_handle_exception(server, err, &exception);
1da177e4
LT
3890 } while (exception.retry);
3891 return err;
3892}
3893
3894static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3895{
e38eb650
BS
3896 int error;
3897
0e574af1 3898 nfs_fattr_init(fsinfo->fattr);
e38eb650 3899 error = nfs4_do_fsinfo(server, fhandle, fsinfo);
dc182549
PT
3900 if (error == 0) {
3901 /* block layout checks this! */
3902 server->pnfs_blksize = fsinfo->blksize;
e38eb650 3903 set_pnfs_layoutdriver(server, fhandle, fsinfo->layouttype);
dc182549 3904 }
e38eb650
BS
3905
3906 return error;
1da177e4
LT
3907}
3908
3909static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3910 struct nfs_pathconf *pathconf)
3911{
3912 struct nfs4_pathconf_arg args = {
3913 .fh = fhandle,
3914 .bitmask = server->attr_bitmask,
3915 };
d45b2989
BH
3916 struct nfs4_pathconf_res res = {
3917 .pathconf = pathconf,
3918 };
1da177e4
LT
3919 struct rpc_message msg = {
3920 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
3921 .rpc_argp = &args,
d45b2989 3922 .rpc_resp = &res,
1da177e4
LT
3923 };
3924
3925 /* None of the pathconf attributes are mandatory to implement */
3926 if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
3927 memset(pathconf, 0, sizeof(*pathconf));
3928 return 0;
3929 }
3930
0e574af1 3931 nfs_fattr_init(pathconf->fattr);
7c513058 3932 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3933}
3934
3935static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3936 struct nfs_pathconf *pathconf)
3937{
3938 struct nfs4_exception exception = { };
3939 int err;
3940
3941 do {
3942 err = nfs4_handle_exception(server,
3943 _nfs4_proc_pathconf(server, fhandle, pathconf),
3944 &exception);
3945 } while (exception.retry);
3946 return err;
3947}
3948
5521abfd 3949int nfs4_set_rw_stateid(nfs4_stateid *stateid,
9b206149
TM
3950 const struct nfs_open_context *ctx,
3951 const struct nfs_lock_context *l_ctx,
3952 fmode_t fmode)
3953{
3954 const struct nfs_lockowner *lockowner = NULL;
3955
3956 if (l_ctx != NULL)
3957 lockowner = &l_ctx->lockowner;
5521abfd 3958 return nfs4_select_rw_stateid(stateid, ctx->state, fmode, lockowner);
9b206149
TM
3959}
3960EXPORT_SYMBOL_GPL(nfs4_set_rw_stateid);
3961
5521abfd
TM
3962static bool nfs4_stateid_is_current(nfs4_stateid *stateid,
3963 const struct nfs_open_context *ctx,
3964 const struct nfs_lock_context *l_ctx,
3965 fmode_t fmode)
3966{
3967 nfs4_stateid current_stateid;
3968
3969 if (nfs4_set_rw_stateid(&current_stateid, ctx, l_ctx, fmode))
3970 return false;
3971 return nfs4_stateid_match(stateid, &current_stateid);
3972}
3973
3974static bool nfs4_error_stateid_expired(int err)
3975{
3976 switch (err) {
3977 case -NFS4ERR_DELEG_REVOKED:
3978 case -NFS4ERR_ADMIN_REVOKED:
3979 case -NFS4ERR_BAD_STATEID:
3980 case -NFS4ERR_STALE_STATEID:
3981 case -NFS4ERR_OLD_STATEID:
3982 case -NFS4ERR_OPENMODE:
3983 case -NFS4ERR_EXPIRED:
3984 return true;
3985 }
3986 return false;
3987}
3988
d20581aa
BH
3989void __nfs4_read_done_cb(struct nfs_read_data *data)
3990{
cd841605 3991 nfs_invalidate_atime(data->header->inode);
d20581aa
BH
3992}
3993
cbdabc7f 3994static int nfs4_read_done_cb(struct rpc_task *task, struct nfs_read_data *data)
1da177e4 3995{
cd841605 3996 struct nfs_server *server = NFS_SERVER(data->header->inode);
1da177e4 3997
cc668ab3 3998 trace_nfs4_read(data, task->tk_status);
9e33bed5 3999 if (nfs4_async_handle_error(task, server, data->args.context->state) == -EAGAIN) {
d00c5d43 4000 rpc_restart_call_prepare(task);
ec06c096 4001 return -EAGAIN;
1da177e4 4002 }
8850df99 4003
d20581aa 4004 __nfs4_read_done_cb(data);
1da177e4 4005 if (task->tk_status > 0)
ec06c096
TM
4006 renew_lease(server, data->timestamp);
4007 return 0;
1da177e4
LT
4008}
4009
5521abfd
TM
4010static bool nfs4_read_stateid_changed(struct rpc_task *task,
4011 struct nfs_readargs *args)
4012{
4013
4014 if (!nfs4_error_stateid_expired(task->tk_status) ||
4015 nfs4_stateid_is_current(&args->stateid,
4016 args->context,
4017 args->lock_context,
4018 FMODE_READ))
4019 return false;
4020 rpc_restart_call_prepare(task);
4021 return true;
4022}
4023
cbdabc7f
AA
4024static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
4025{
4026
4027 dprintk("--> %s\n", __func__);
4028
4029 if (!nfs4_sequence_done(task, &data->res.seq_res))
4030 return -EAGAIN;
5521abfd
TM
4031 if (nfs4_read_stateid_changed(task, &data->args))
4032 return -EAGAIN;
d20581aa
BH
4033 return data->read_done_cb ? data->read_done_cb(task, data) :
4034 nfs4_read_done_cb(task, data);
cbdabc7f
AA
4035}
4036
bdc7f021 4037static void nfs4_proc_read_setup(struct nfs_read_data *data, struct rpc_message *msg)
1da177e4 4038{
1da177e4 4039 data->timestamp = jiffies;
cbdabc7f 4040 data->read_done_cb = nfs4_read_done_cb;
bdc7f021 4041 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ];
a9c92d6b 4042 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 0);
1da177e4
LT
4043}
4044
ef1820f9 4045static int nfs4_proc_read_rpc_prepare(struct rpc_task *task, struct nfs_read_data *data)
ea7c3303 4046{
9b206149 4047 if (nfs4_setup_sequence(NFS_SERVER(data->header->inode),
d9afbd1b
TM
4048 &data->args.seq_args,
4049 &data->res.seq_res,
9b206149 4050 task))
ef1820f9
N
4051 return 0;
4052 if (nfs4_set_rw_stateid(&data->args.stateid, data->args.context,
4053 data->args.lock_context, FMODE_READ) == -EIO)
4054 return -EIO;
4055 if (unlikely(test_bit(NFS_CONTEXT_BAD, &data->args.context->flags)))
4056 return -EIO;
4057 return 0;
1da177e4
LT
4058}
4059
b029bc9b 4060static int nfs4_write_done_cb(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 4061{
cd841605 4062 struct inode *inode = data->header->inode;
1da177e4 4063
cc668ab3 4064 trace_nfs4_write(data, task->tk_status);
9e33bed5 4065 if (nfs4_async_handle_error(task, NFS_SERVER(inode), data->args.context->state) == -EAGAIN) {
d00c5d43 4066 rpc_restart_call_prepare(task);
788e7a89 4067 return -EAGAIN;
1da177e4 4068 }
4f9838c7 4069 if (task->tk_status >= 0) {
1da177e4 4070 renew_lease(NFS_SERVER(inode), data->timestamp);
5a37f851 4071 nfs_post_op_update_inode_force_wcc(inode, &data->fattr);
4f9838c7 4072 }
788e7a89 4073 return 0;
1da177e4
LT
4074}
4075
5521abfd
TM
4076static bool nfs4_write_stateid_changed(struct rpc_task *task,
4077 struct nfs_writeargs *args)
4078{
4079
4080 if (!nfs4_error_stateid_expired(task->tk_status) ||
4081 nfs4_stateid_is_current(&args->stateid,
4082 args->context,
4083 args->lock_context,
4084 FMODE_WRITE))
4085 return false;
4086 rpc_restart_call_prepare(task);
4087 return true;
4088}
4089
b029bc9b
FI
4090static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
4091{
4092 if (!nfs4_sequence_done(task, &data->res.seq_res))
4093 return -EAGAIN;
5521abfd
TM
4094 if (nfs4_write_stateid_changed(task, &data->args))
4095 return -EAGAIN;
d20581aa
BH
4096 return data->write_done_cb ? data->write_done_cb(task, data) :
4097 nfs4_write_done_cb(task, data);
b029bc9b
FI
4098}
4099
5a37f851
TM
4100static
4101bool nfs4_write_need_cache_consistency_data(const struct nfs_write_data *data)
a69aef14 4102{
5a37f851
TM
4103 const struct nfs_pgio_header *hdr = data->header;
4104
4105 /* Don't request attributes for pNFS or O_DIRECT writes */
4106 if (data->ds_clp != NULL || hdr->dreq != NULL)
4107 return false;
4108 /* Otherwise, request attributes if and only if we don't hold
4109 * a delegation
4110 */
011e2a7f 4111 return nfs4_have_delegation(hdr->inode, FMODE_READ) == 0;
a69aef14 4112}
a69aef14 4113
bdc7f021 4114static void nfs4_proc_write_setup(struct nfs_write_data *data, struct rpc_message *msg)
1da177e4 4115{
cd841605 4116 struct nfs_server *server = NFS_SERVER(data->header->inode);
bdc7f021 4117
5a37f851 4118 if (!nfs4_write_need_cache_consistency_data(data)) {
7ffd1064
FI
4119 data->args.bitmask = NULL;
4120 data->res.fattr = NULL;
4121 } else
4122 data->args.bitmask = server->cache_consistency_bitmask;
5a37f851 4123
b029bc9b
FI
4124 if (!data->write_done_cb)
4125 data->write_done_cb = nfs4_write_done_cb;
4f9838c7 4126 data->res.server = server;
1da177e4
LT
4127 data->timestamp = jiffies;
4128
bdc7f021 4129 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE];
a9c92d6b 4130 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
1da177e4
LT
4131}
4132
ef1820f9 4133static int nfs4_proc_write_rpc_prepare(struct rpc_task *task, struct nfs_write_data *data)
c6cb80d0 4134{
9b206149 4135 if (nfs4_setup_sequence(NFS_SERVER(data->header->inode),
d9afbd1b
TM
4136 &data->args.seq_args,
4137 &data->res.seq_res,
9b206149 4138 task))
ef1820f9
N
4139 return 0;
4140 if (nfs4_set_rw_stateid(&data->args.stateid, data->args.context,
4141 data->args.lock_context, FMODE_WRITE) == -EIO)
4142 return -EIO;
4143 if (unlikely(test_bit(NFS_CONTEXT_BAD, &data->args.context->flags)))
4144 return -EIO;
4145 return 0;
1da177e4
LT
4146}
4147
0b7c0153 4148static void nfs4_proc_commit_rpc_prepare(struct rpc_task *task, struct nfs_commit_data *data)
c6cb80d0 4149{
d9afbd1b
TM
4150 nfs4_setup_sequence(NFS_SERVER(data->inode),
4151 &data->args.seq_args,
4152 &data->res.seq_res,
4153 task);
1da177e4
LT
4154}
4155
0b7c0153 4156static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_commit_data *data)
1da177e4 4157{
1da177e4 4158 struct inode *inode = data->inode;
14516c3a 4159
cc668ab3 4160 trace_nfs4_commit(data, task->tk_status);
9e33bed5 4161 if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) {
d00c5d43 4162 rpc_restart_call_prepare(task);
788e7a89 4163 return -EAGAIN;
1da177e4 4164 }
788e7a89 4165 return 0;
1da177e4
LT
4166}
4167
0b7c0153 4168static int nfs4_commit_done(struct rpc_task *task, struct nfs_commit_data *data)
5f452431
FI
4169{
4170 if (!nfs4_sequence_done(task, &data->res.seq_res))
4171 return -EAGAIN;
0b7c0153 4172 return data->commit_done_cb(task, data);
5f452431
FI
4173}
4174
0b7c0153 4175static void nfs4_proc_commit_setup(struct nfs_commit_data *data, struct rpc_message *msg)
1da177e4 4176{
788e7a89 4177 struct nfs_server *server = NFS_SERVER(data->inode);
988b6dce 4178
0b7c0153
FI
4179 if (data->commit_done_cb == NULL)
4180 data->commit_done_cb = nfs4_commit_done_cb;
4f9838c7 4181 data->res.server = server;
bdc7f021 4182 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT];
a9c92d6b 4183 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
1da177e4
LT
4184}
4185
9bc4e3ca
CL
4186struct nfs4_renewdata {
4187 struct nfs_client *client;
4188 unsigned long timestamp;
4189};
4190
1da177e4
LT
4191/*
4192 * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
4193 * standalone procedure for queueing an asynchronous RENEW.
4194 */
9bc4e3ca 4195static void nfs4_renew_release(void *calldata)
dc96aef9 4196{
9bc4e3ca
CL
4197 struct nfs4_renewdata *data = calldata;
4198 struct nfs_client *clp = data->client;
dc96aef9 4199
0851de06
AB
4200 if (atomic_read(&clp->cl_count) > 1)
4201 nfs4_schedule_state_renewal(clp);
4202 nfs_put_client(clp);
9bc4e3ca 4203 kfree(data);
dc96aef9
AB
4204}
4205
9bc4e3ca 4206static void nfs4_renew_done(struct rpc_task *task, void *calldata)
1da177e4 4207{
9bc4e3ca
CL
4208 struct nfs4_renewdata *data = calldata;
4209 struct nfs_client *clp = data->client;
4210 unsigned long timestamp = data->timestamp;
1da177e4 4211
c6d01c6f 4212 trace_nfs4_renew_async(clp, task->tk_status);
1da177e4 4213 if (task->tk_status < 0) {
95baa25c 4214 /* Unless we're shutting down, schedule state recovery! */
042b60be
TM
4215 if (test_bit(NFS_CS_RENEWD, &clp->cl_res_state) == 0)
4216 return;
4217 if (task->tk_status != NFS4ERR_CB_PATH_DOWN) {
0400a6b0 4218 nfs4_schedule_lease_recovery(clp);
042b60be
TM
4219 return;
4220 }
4221 nfs4_schedule_path_down_recovery(clp);
1da177e4 4222 }
452e9352 4223 do_renew_lease(clp, timestamp);
1da177e4
LT
4224}
4225
963d8fe5
TM
4226static const struct rpc_call_ops nfs4_renew_ops = {
4227 .rpc_call_done = nfs4_renew_done,
dc96aef9 4228 .rpc_release = nfs4_renew_release,
963d8fe5
TM
4229};
4230
2f60ea6b 4231static int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
1da177e4
LT
4232{
4233 struct rpc_message msg = {
4234 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
4235 .rpc_argp = clp,
b4454fe1 4236 .rpc_cred = cred,
1da177e4 4237 };
9bc4e3ca 4238 struct nfs4_renewdata *data;
1da177e4 4239
2f60ea6b
TM
4240 if (renew_flags == 0)
4241 return 0;
0851de06
AB
4242 if (!atomic_inc_not_zero(&clp->cl_count))
4243 return -EIO;
b569ad34 4244 data = kmalloc(sizeof(*data), GFP_NOFS);
9bc4e3ca
CL
4245 if (data == NULL)
4246 return -ENOMEM;
4247 data->client = clp;
4248 data->timestamp = jiffies;
bc7a05ca 4249 return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT,
9bc4e3ca 4250 &nfs4_renew_ops, data);
1da177e4
LT
4251}
4252
8534d4ec 4253static int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
4254{
4255 struct rpc_message msg = {
4256 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
4257 .rpc_argp = clp,
b4454fe1 4258 .rpc_cred = cred,
1da177e4
LT
4259 };
4260 unsigned long now = jiffies;
4261 int status;
4262
bc7a05ca 4263 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
1da177e4
LT
4264 if (status < 0)
4265 return status;
452e9352 4266 do_renew_lease(clp, now);
1da177e4
LT
4267 return 0;
4268}
4269
aa1870af
BF
4270static inline int nfs4_server_supports_acls(struct nfs_server *server)
4271{
4272 return (server->caps & NFS_CAP_ACLS)
4273 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
4274 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
4275}
4276
21f498c2
TM
4277/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_SIZE, and that
4278 * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_SIZE) bytes on
aa1870af
BF
4279 * the stack.
4280 */
21f498c2 4281#define NFS4ACL_MAXPAGES DIV_ROUND_UP(XATTR_SIZE_MAX, PAGE_SIZE)
aa1870af 4282
e9e3d724
NH
4283static int buf_to_pages_noslab(const void *buf, size_t buflen,
4284 struct page **pages, unsigned int *pgbase)
4285{
4286 struct page *newpage, **spages;
4287 int rc = 0;
4288 size_t len;
4289 spages = pages;
4290
4291 do {
21f498c2 4292 len = min_t(size_t, PAGE_SIZE, buflen);
e9e3d724
NH
4293 newpage = alloc_page(GFP_KERNEL);
4294
4295 if (newpage == NULL)
4296 goto unwind;
4297 memcpy(page_address(newpage), buf, len);
4298 buf += len;
4299 buflen -= len;
4300 *pages++ = newpage;
4301 rc++;
4302 } while (buflen != 0);
4303
4304 return rc;
4305
4306unwind:
4307 for(; rc > 0; rc--)
4308 __free_page(spages[rc-1]);
4309 return -ENOMEM;
4310}
4311
e50a1c2e
BF
4312struct nfs4_cached_acl {
4313 int cached;
4314 size_t len;
3e9d4154 4315 char data[0];
e50a1c2e
BF
4316};
4317
4318static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
4319{
4320 struct nfs_inode *nfsi = NFS_I(inode);
4321
4322 spin_lock(&inode->i_lock);
4323 kfree(nfsi->nfs4_acl);
4324 nfsi->nfs4_acl = acl;
4325 spin_unlock(&inode->i_lock);
4326}
4327
4328static void nfs4_zap_acl_attr(struct inode *inode)
4329{
4330 nfs4_set_cached_acl(inode, NULL);
4331}
4332
4333static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
4334{
4335 struct nfs_inode *nfsi = NFS_I(inode);
4336 struct nfs4_cached_acl *acl;
4337 int ret = -ENOENT;
4338
4339 spin_lock(&inode->i_lock);
4340 acl = nfsi->nfs4_acl;
4341 if (acl == NULL)
4342 goto out;
4343 if (buf == NULL) /* user is just asking for length */
4344 goto out_len;
4345 if (acl->cached == 0)
4346 goto out;
4347 ret = -ERANGE; /* see getxattr(2) man page */
4348 if (acl->len > buflen)
4349 goto out;
4350 memcpy(buf, acl->data, acl->len);
4351out_len:
4352 ret = acl->len;
4353out:
4354 spin_unlock(&inode->i_lock);
4355 return ret;
4356}
4357
5794d21e 4358static void nfs4_write_cached_acl(struct inode *inode, struct page **pages, size_t pgbase, size_t acl_len)
e50a1c2e
BF
4359{
4360 struct nfs4_cached_acl *acl;
b291f1b1 4361 size_t buflen = sizeof(*acl) + acl_len;
e50a1c2e 4362
1f1ea6c2 4363 if (buflen <= PAGE_SIZE) {
b291f1b1 4364 acl = kmalloc(buflen, GFP_KERNEL);
e50a1c2e
BF
4365 if (acl == NULL)
4366 goto out;
4367 acl->cached = 1;
5794d21e 4368 _copy_from_pages(acl->data, pages, pgbase, acl_len);
e50a1c2e
BF
4369 } else {
4370 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
4371 if (acl == NULL)
4372 goto out;
4373 acl->cached = 0;
4374 }
4375 acl->len = acl_len;
4376out:
4377 nfs4_set_cached_acl(inode, acl);
4378}
4379
bf118a34
AA
4380/*
4381 * The getxattr API returns the required buffer length when called with a
4382 * NULL buf. The NFSv4 acl tool then calls getxattr again after allocating
4383 * the required buf. On a NULL buf, we send a page of data to the server
4384 * guessing that the ACL request can be serviced by a page. If so, we cache
4385 * up to the page of ACL data, and the 2nd call to getxattr is serviced by
4386 * the cache. If not so, we throw away the page, and cache the required
4387 * length. The next getxattr call will then produce another round trip to
4388 * the server, this time with the input buf of the required size.
4389 */
16b4289c 4390static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
aa1870af 4391{
bf118a34 4392 struct page *pages[NFS4ACL_MAXPAGES] = {NULL, };
aa1870af
BF
4393 struct nfs_getaclargs args = {
4394 .fh = NFS_FH(inode),
4395 .acl_pages = pages,
4396 .acl_len = buflen,
4397 };
663c79b3
BH
4398 struct nfs_getaclres res = {
4399 .acl_len = buflen,
4400 };
aa1870af
BF
4401 struct rpc_message msg = {
4402 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
4403 .rpc_argp = &args,
663c79b3 4404 .rpc_resp = &res,
aa1870af 4405 };
21f498c2
TM
4406 unsigned int npages = DIV_ROUND_UP(buflen, PAGE_SIZE);
4407 int ret = -ENOMEM, i;
aa1870af 4408
bf118a34
AA
4409 /* As long as we're doing a round trip to the server anyway,
4410 * let's be prepared for a page of acl data. */
4411 if (npages == 0)
4412 npages = 1;
21f498c2
TM
4413 if (npages > ARRAY_SIZE(pages))
4414 return -ERANGE;
5a006899 4415
bf118a34
AA
4416 for (i = 0; i < npages; i++) {
4417 pages[i] = alloc_page(GFP_KERNEL);
4418 if (!pages[i])
4419 goto out_free;
e50a1c2e 4420 }
5a006899
SP
4421
4422 /* for decoding across pages */
4423 res.acl_scratch = alloc_page(GFP_KERNEL);
4424 if (!res.acl_scratch)
4425 goto out_free;
4426
bf118a34
AA
4427 args.acl_len = npages * PAGE_SIZE;
4428 args.acl_pgbase = 0;
5a006899 4429
de040bec 4430 dprintk("%s buf %p buflen %zu npages %d args.acl_len %zu\n",
bf118a34
AA
4431 __func__, buf, buflen, npages, args.acl_len);
4432 ret = nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode),
4433 &msg, &args.seq_args, &res.seq_res, 0);
e50a1c2e
BF
4434 if (ret)
4435 goto out_free;
bf118a34 4436
1f1ea6c2
TM
4437 /* Handle the case where the passed-in buffer is too short */
4438 if (res.acl_flags & NFS4_ACL_TRUNC) {
4439 /* Did the user only issue a request for the acl length? */
4440 if (buf == NULL)
4441 goto out_ok;
e50a1c2e 4442 ret = -ERANGE;
1f1ea6c2 4443 goto out_free;
e50a1c2e 4444 }
1f1ea6c2 4445 nfs4_write_cached_acl(inode, pages, res.acl_data_offset, res.acl_len);
7d3e91a8
SW
4446 if (buf) {
4447 if (res.acl_len > buflen) {
4448 ret = -ERANGE;
4449 goto out_free;
4450 }
1f1ea6c2 4451 _copy_from_pages(buf, pages, res.acl_data_offset, res.acl_len);
7d3e91a8 4452 }
1f1ea6c2
TM
4453out_ok:
4454 ret = res.acl_len;
e50a1c2e 4455out_free:
bf118a34
AA
4456 for (i = 0; i < npages; i++)
4457 if (pages[i])
4458 __free_page(pages[i]);
331818f1
TM
4459 if (res.acl_scratch)
4460 __free_page(res.acl_scratch);
aa1870af
BF
4461 return ret;
4462}
4463
16b4289c
TM
4464static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
4465{
4466 struct nfs4_exception exception = { };
4467 ssize_t ret;
4468 do {
4469 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
c1578b76 4470 trace_nfs4_get_acl(inode, ret);
16b4289c
TM
4471 if (ret >= 0)
4472 break;
4473 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
4474 } while (exception.retry);
4475 return ret;
4476}
4477
e50a1c2e
BF
4478static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
4479{
4480 struct nfs_server *server = NFS_SERVER(inode);
4481 int ret;
4482
4483 if (!nfs4_server_supports_acls(server))
4484 return -EOPNOTSUPP;
4485 ret = nfs_revalidate_inode(server, inode);
4486 if (ret < 0)
4487 return ret;
08a22b39
AK
4488 if (NFS_I(inode)->cache_validity & NFS_INO_INVALID_ACL)
4489 nfs_zap_acl_cache(inode);
e50a1c2e
BF
4490 ret = nfs4_read_cached_acl(inode, buf, buflen);
4491 if (ret != -ENOENT)
bf118a34
AA
4492 /* -ENOENT is returned if there is no ACL or if there is an ACL
4493 * but no cached acl data, just the acl length */
e50a1c2e
BF
4494 return ret;
4495 return nfs4_get_acl_uncached(inode, buf, buflen);
4496}
4497
16b4289c 4498static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4b580ee3
BF
4499{
4500 struct nfs_server *server = NFS_SERVER(inode);
4501 struct page *pages[NFS4ACL_MAXPAGES];
4502 struct nfs_setaclargs arg = {
4503 .fh = NFS_FH(inode),
4504 .acl_pages = pages,
4505 .acl_len = buflen,
4506 };
73c403a9 4507 struct nfs_setaclres res;
4b580ee3
BF
4508 struct rpc_message msg = {
4509 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
4510 .rpc_argp = &arg,
73c403a9 4511 .rpc_resp = &res,
4b580ee3 4512 };
21f498c2 4513 unsigned int npages = DIV_ROUND_UP(buflen, PAGE_SIZE);
e9e3d724 4514 int ret, i;
4b580ee3
BF
4515
4516 if (!nfs4_server_supports_acls(server))
4517 return -EOPNOTSUPP;
21f498c2
TM
4518 if (npages > ARRAY_SIZE(pages))
4519 return -ERANGE;
e9e3d724
NH
4520 i = buf_to_pages_noslab(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
4521 if (i < 0)
4522 return i;
57ec14c5 4523 nfs4_inode_return_delegation(inode);
7c513058 4524 ret = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
e9e3d724
NH
4525
4526 /*
4527 * Free each page after tx, so the only ref left is
4528 * held by the network stack
4529 */
4530 for (; i > 0; i--)
4531 put_page(pages[i-1]);
4532
08a22b39
AK
4533 /*
4534 * Acl update can result in inode attribute update.
4535 * so mark the attribute cache invalid.
4536 */
4537 spin_lock(&inode->i_lock);
4538 NFS_I(inode)->cache_validity |= NFS_INO_INVALID_ATTR;
4539 spin_unlock(&inode->i_lock);
f41f7418
TM
4540 nfs_access_zap_cache(inode);
4541 nfs_zap_acl_cache(inode);
4b580ee3
BF
4542 return ret;
4543}
4544
16b4289c
TM
4545static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4546{
4547 struct nfs4_exception exception = { };
4548 int err;
4549 do {
c1578b76
TM
4550 err = __nfs4_proc_set_acl(inode, buf, buflen);
4551 trace_nfs4_set_acl(inode, err);
4552 err = nfs4_handle_exception(NFS_SERVER(inode), err,
16b4289c
TM
4553 &exception);
4554 } while (exception.retry);
4555 return err;
4556}
4557
aa9c2669
DQ
4558#ifdef CONFIG_NFS_V4_SECURITY_LABEL
4559static int _nfs4_get_security_label(struct inode *inode, void *buf,
4560 size_t buflen)
4561{
4562 struct nfs_server *server = NFS_SERVER(inode);
4563 struct nfs_fattr fattr;
4564 struct nfs4_label label = {0, 0, buflen, buf};
4565
4566 u32 bitmask[3] = { 0, 0, FATTR4_WORD2_SECURITY_LABEL };
4567 struct nfs4_getattr_arg args = {
4568 .fh = NFS_FH(inode),
4569 .bitmask = bitmask,
4570 };
4571 struct nfs4_getattr_res res = {
4572 .fattr = &fattr,
4573 .label = &label,
4574 .server = server,
4575 };
4576 struct rpc_message msg = {
4577 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
4578 .rpc_argp = &args,
4579 .rpc_resp = &res,
4580 };
4581 int ret;
4582
4583 nfs_fattr_init(&fattr);
4584
4585 ret = rpc_call_sync(server->client, &msg, 0);
4586 if (ret)
4587 return ret;
4588 if (!(fattr.valid & NFS_ATTR_FATTR_V4_SECURITY_LABEL))
4589 return -ENOENT;
4590 if (buflen < label.len)
4591 return -ERANGE;
4592 return 0;
4593}
4594
4595static int nfs4_get_security_label(struct inode *inode, void *buf,
4596 size_t buflen)
4597{
4598 struct nfs4_exception exception = { };
4599 int err;
4600
4601 if (!nfs_server_capable(inode, NFS_CAP_SECURITY_LABEL))
4602 return -EOPNOTSUPP;
4603
4604 do {
c1578b76
TM
4605 err = _nfs4_get_security_label(inode, buf, buflen);
4606 trace_nfs4_get_security_label(inode, err);
4607 err = nfs4_handle_exception(NFS_SERVER(inode), err,
aa9c2669
DQ
4608 &exception);
4609 } while (exception.retry);
4610 return err;
4611}
4612
4613static int _nfs4_do_set_security_label(struct inode *inode,
4614 struct nfs4_label *ilabel,
4615 struct nfs_fattr *fattr,
4616 struct nfs4_label *olabel)
4617{
4618
4619 struct iattr sattr = {0};
4620 struct nfs_server *server = NFS_SERVER(inode);
4621 const u32 bitmask[3] = { 0, 0, FATTR4_WORD2_SECURITY_LABEL };
4622 struct nfs_setattrargs args = {
4623 .fh = NFS_FH(inode),
4624 .iap = &sattr,
4625 .server = server,
4626 .bitmask = bitmask,
4627 .label = ilabel,
4628 };
4629 struct nfs_setattrres res = {
4630 .fattr = fattr,
4631 .label = olabel,
4632 .server = server,
4633 };
4634 struct rpc_message msg = {
4635 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
4636 .rpc_argp = &args,
4637 .rpc_resp = &res,
4638 };
4639 int status;
4640
4641 nfs4_stateid_copy(&args.stateid, &zero_stateid);
4642
4643 status = rpc_call_sync(server->client, &msg, 0);
4644 if (status)
4645 dprintk("%s failed: %d\n", __func__, status);
4646
4647 return status;
4648}
4649
4650static int nfs4_do_set_security_label(struct inode *inode,
4651 struct nfs4_label *ilabel,
4652 struct nfs_fattr *fattr,
4653 struct nfs4_label *olabel)
4654{
4655 struct nfs4_exception exception = { };
4656 int err;
4657
4658 do {
c1578b76
TM
4659 err = _nfs4_do_set_security_label(inode, ilabel,
4660 fattr, olabel);
4661 trace_nfs4_set_security_label(inode, err);
4662 err = nfs4_handle_exception(NFS_SERVER(inode), err,
aa9c2669
DQ
4663 &exception);
4664 } while (exception.retry);
4665 return err;
4666}
4667
4668static int
4669nfs4_set_security_label(struct dentry *dentry, const void *buf, size_t buflen)
4670{
4671 struct nfs4_label ilabel, *olabel = NULL;
4672 struct nfs_fattr fattr;
4673 struct rpc_cred *cred;
4674 struct inode *inode = dentry->d_inode;
4675 int status;
4676
4677 if (!nfs_server_capable(inode, NFS_CAP_SECURITY_LABEL))
4678 return -EOPNOTSUPP;
4679
4680 nfs_fattr_init(&fattr);
4681
4682 ilabel.pi = 0;
4683 ilabel.lfs = 0;
4684 ilabel.label = (char *)buf;
4685 ilabel.len = buflen;
4686
4687 cred = rpc_lookup_cred();
4688 if (IS_ERR(cred))
4689 return PTR_ERR(cred);
4690
4691 olabel = nfs4_label_alloc(NFS_SERVER(inode), GFP_KERNEL);
4692 if (IS_ERR(olabel)) {
4693 status = -PTR_ERR(olabel);
4694 goto out;
4695 }
4696
4697 status = nfs4_do_set_security_label(inode, &ilabel, &fattr, olabel);
4698 if (status == 0)
4699 nfs_setsecurity(inode, &fattr, olabel);
4700
4701 nfs4_label_free(olabel);
4702out:
4703 put_rpccred(cred);
4704 return status;
4705}
4706#endif /* CONFIG_NFS_V4_SECURITY_LABEL */
4707
4708
1da177e4 4709static int
aa5190d0 4710nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state)
1da177e4 4711{
aa5190d0
TM
4712 struct nfs_client *clp = server->nfs_client;
4713
4714 if (task->tk_status >= 0)
1da177e4
LT
4715 return 0;
4716 switch(task->tk_status) {
a1d0b5ee 4717 case -NFS4ERR_DELEG_REVOKED:
9e33bed5
TM
4718 case -NFS4ERR_ADMIN_REVOKED:
4719 case -NFS4ERR_BAD_STATEID:
14977489
TM
4720 if (state == NULL)
4721 break;
4722 nfs_remove_bad_delegation(state->inode);
9e33bed5
TM
4723 case -NFS4ERR_OPENMODE:
4724 if (state == NULL)
4725 break;
5d422301
TM
4726 if (nfs4_schedule_stateid_recovery(server, state) < 0)
4727 goto stateid_invalid;
0400a6b0 4728 goto wait_on_recovery;
0ced63d1 4729 case -NFS4ERR_EXPIRED:
5d422301
TM
4730 if (state != NULL) {
4731 if (nfs4_schedule_stateid_recovery(server, state) < 0)
4732 goto stateid_invalid;
4733 }
1da177e4 4734 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 4735 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
4736 nfs4_schedule_lease_recovery(clp);
4737 goto wait_on_recovery;
4745e315
AA
4738#if defined(CONFIG_NFS_V4_1)
4739 case -NFS4ERR_BADSESSION:
4740 case -NFS4ERR_BADSLOT:
4741 case -NFS4ERR_BAD_HIGH_SLOT:
4742 case -NFS4ERR_DEADSESSION:
4743 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
4744 case -NFS4ERR_SEQ_FALSE_RETRY:
4745 case -NFS4ERR_SEQ_MISORDERED:
4746 dprintk("%s ERROR %d, Reset session\n", __func__,
4747 task->tk_status);
9f594791 4748 nfs4_schedule_session_recovery(clp->cl_session, task->tk_status);
4745e315
AA
4749 task->tk_status = 0;
4750 return -EAGAIN;
4751#endif /* CONFIG_NFS_V4_1 */
1da177e4 4752 case -NFS4ERR_DELAY:
aa5190d0 4753 nfs_inc_server_stats(server, NFSIOS_DELAY);
006ea73e 4754 case -NFS4ERR_GRACE:
1da177e4
LT
4755 rpc_delay(task, NFS4_POLL_RETRY_MAX);
4756 task->tk_status = 0;
4757 return -EAGAIN;
a8a4ae3a 4758 case -NFS4ERR_RETRY_UNCACHED_REP:
1da177e4
LT
4759 case -NFS4ERR_OLD_STATEID:
4760 task->tk_status = 0;
4761 return -EAGAIN;
4762 }
4763 task->tk_status = nfs4_map_errors(task->tk_status);
4764 return 0;
5d422301
TM
4765stateid_invalid:
4766 task->tk_status = -EIO;
4767 return 0;
0400a6b0 4768wait_on_recovery:
a2c0b9e2 4769 rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL);
a2c0b9e2
TM
4770 if (test_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) == 0)
4771 rpc_wake_up_queued_task(&clp->cl_rpcwaitq, task);
4772 task->tk_status = 0;
4773 return -EAGAIN;
1da177e4
LT
4774}
4775
f092075d
CL
4776static void nfs4_init_boot_verifier(const struct nfs_client *clp,
4777 nfs4_verifier *bootverf)
cd93710e
CL
4778{
4779 __be32 verf[2];
4780
2c820d9a
CL
4781 if (test_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state)) {
4782 /* An impossible timestamp guarantees this value
4783 * will never match a generated boot time. */
4784 verf[0] = 0;
17f26b12 4785 verf[1] = cpu_to_be32(NSEC_PER_SEC + 1);
2c820d9a 4786 } else {
f092075d 4787 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
17f26b12
TM
4788 verf[0] = cpu_to_be32(nn->boot_time.tv_sec);
4789 verf[1] = cpu_to_be32(nn->boot_time.tv_nsec);
2c820d9a 4790 }
cd93710e
CL
4791 memcpy(bootverf->data, verf, sizeof(bootverf->data));
4792}
4793
e984a55a
CL
4794static unsigned int
4795nfs4_init_nonuniform_client_string(const struct nfs_client *clp,
4796 char *buf, size_t len)
4797{
4798 unsigned int result;
4799
4800 rcu_read_lock();
4801 result = scnprintf(buf, len, "Linux NFSv4.0 %s/%s %s",
4802 clp->cl_ipaddr,
4803 rpc_peeraddr2str(clp->cl_rpcclient,
4804 RPC_DISPLAY_ADDR),
4805 rpc_peeraddr2str(clp->cl_rpcclient,
4806 RPC_DISPLAY_PROTO));
4807 rcu_read_unlock();
4808 return result;
4809}
4810
4811static unsigned int
4812nfs4_init_uniform_client_string(const struct nfs_client *clp,
4813 char *buf, size_t len)
4814{
55b59293 4815 const char *nodename = clp->cl_rpcclient->cl_nodename;
6f2ea7f2
CL
4816
4817 if (nfs4_client_id_uniquifier[0] != '\0')
55b59293
TM
4818 return scnprintf(buf, len, "Linux NFSv%u.%u %s/%s",
4819 clp->rpc_ops->version,
4820 clp->cl_minorversion,
4821 nfs4_client_id_uniquifier,
4822 nodename);
e984a55a
CL
4823 return scnprintf(buf, len, "Linux NFSv%u.%u %s",
4824 clp->rpc_ops->version, clp->cl_minorversion,
6f2ea7f2 4825 nodename);
e984a55a
CL
4826}
4827
6bbb4ae8
CL
4828/**
4829 * nfs4_proc_setclientid - Negotiate client ID
4830 * @clp: state data structure
4831 * @program: RPC program for NFSv4 callback service
4832 * @port: IP port number for NFS4 callback service
4833 * @cred: RPC credential to use for this call
4834 * @res: where to place the result
4835 *
4836 * Returns zero, a negative errno, or a negative NFS4ERR status code.
4837 */
bb8b27e5
TM
4838int nfs4_proc_setclientid(struct nfs_client *clp, u32 program,
4839 unsigned short port, struct rpc_cred *cred,
4840 struct nfs4_setclientid_res *res)
1da177e4
LT
4841{
4842 nfs4_verifier sc_verifier;
4843 struct nfs4_setclientid setclientid = {
4844 .sc_verifier = &sc_verifier,
4845 .sc_prog = program,
f4eecd5d 4846 .sc_cb_ident = clp->cl_cb_ident,
1da177e4
LT
4847 };
4848 struct rpc_message msg = {
4849 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
4850 .rpc_argp = &setclientid,
bb8b27e5 4851 .rpc_resp = res,
286d7d6a 4852 .rpc_cred = cred,
1da177e4 4853 };
6bbb4ae8 4854 int status;
1da177e4 4855
de734831 4856 /* nfs_client_id4 */
f092075d 4857 nfs4_init_boot_verifier(clp, &sc_verifier);
e984a55a
CL
4858 if (test_bit(NFS_CS_MIGRATION, &clp->cl_flags))
4859 setclientid.sc_name_len =
4860 nfs4_init_uniform_client_string(clp,
4861 setclientid.sc_name,
4862 sizeof(setclientid.sc_name));
4863 else
4864 setclientid.sc_name_len =
4865 nfs4_init_nonuniform_client_string(clp,
4866 setclientid.sc_name,
4867 sizeof(setclientid.sc_name));
de734831 4868 /* cb_client4 */
e984a55a 4869 rcu_read_lock();
de734831 4870 setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
fe2d5395 4871 sizeof(setclientid.sc_netid), "%s",
d4d3c507
CL
4872 rpc_peeraddr2str(clp->cl_rpcclient,
4873 RPC_DISPLAY_NETID));
de734831
CL
4874 rcu_read_unlock();
4875 setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
d4d3c507 4876 sizeof(setclientid.sc_uaddr), "%s.%u.%u",
1da177e4
LT
4877 clp->cl_ipaddr, port >> 8, port & 255);
4878
6bbb4ae8
CL
4879 dprintk("NFS call setclientid auth=%s, '%.*s'\n",
4880 clp->cl_rpcclient->cl_auth->au_ops->au_name,
4881 setclientid.sc_name_len, setclientid.sc_name);
4882 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 4883 trace_nfs4_setclientid(clp, status);
6bbb4ae8
CL
4884 dprintk("NFS reply setclientid: %d\n", status);
4885 return status;
1da177e4
LT
4886}
4887
6bbb4ae8
CL
4888/**
4889 * nfs4_proc_setclientid_confirm - Confirm client ID
4890 * @clp: state data structure
4891 * @res: result of a previous SETCLIENTID
4892 * @cred: RPC credential to use for this call
4893 *
4894 * Returns zero, a negative errno, or a negative NFS4ERR status code.
4895 */
fd954ae1 4896int nfs4_proc_setclientid_confirm(struct nfs_client *clp,
bb8b27e5
TM
4897 struct nfs4_setclientid_res *arg,
4898 struct rpc_cred *cred)
1da177e4 4899{
1da177e4
LT
4900 struct rpc_message msg = {
4901 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
bb8b27e5 4902 .rpc_argp = arg,
286d7d6a 4903 .rpc_cred = cred,
1da177e4 4904 };
1da177e4
LT
4905 int status;
4906
6bbb4ae8
CL
4907 dprintk("NFS call setclientid_confirm auth=%s, (client ID %llx)\n",
4908 clp->cl_rpcclient->cl_auth->au_ops->au_name,
4909 clp->cl_clientid);
1bd714f2 4910 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 4911 trace_nfs4_setclientid_confirm(clp, status);
6bbb4ae8 4912 dprintk("NFS reply setclientid_confirm: %d\n", status);
1da177e4
LT
4913 return status;
4914}
4915
fe650407
TM
4916struct nfs4_delegreturndata {
4917 struct nfs4_delegreturnargs args;
fa178f29 4918 struct nfs4_delegreturnres res;
fe650407
TM
4919 struct nfs_fh fh;
4920 nfs4_stateid stateid;
26e976a8 4921 unsigned long timestamp;
fa178f29 4922 struct nfs_fattr fattr;
fe650407
TM
4923 int rpc_status;
4924};
4925
fe650407
TM
4926static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
4927{
4928 struct nfs4_delegreturndata *data = calldata;
938e1010 4929
14516c3a
TM
4930 if (!nfs4_sequence_done(task, &data->res.seq_res))
4931 return;
938e1010 4932
ca8acf8d 4933 trace_nfs4_delegreturn_exit(&data->args, &data->res, task->tk_status);
79708861
RL
4934 switch (task->tk_status) {
4935 case -NFS4ERR_STALE_STATEID:
4936 case -NFS4ERR_EXPIRED:
4937 case 0:
fa178f29 4938 renew_lease(data->res.server, data->timestamp);
79708861
RL
4939 break;
4940 default:
4941 if (nfs4_async_handle_error(task, data->res.server, NULL) ==
4942 -EAGAIN) {
d00c5d43 4943 rpc_restart_call_prepare(task);
79708861
RL
4944 return;
4945 }
4946 }
4947 data->rpc_status = task->tk_status;
fe650407
TM
4948}
4949
4950static void nfs4_delegreturn_release(void *calldata)
4951{
fe650407
TM
4952 kfree(calldata);
4953}
4954
938e1010
AA
4955static void nfs4_delegreturn_prepare(struct rpc_task *task, void *data)
4956{
4957 struct nfs4_delegreturndata *d_data;
4958
4959 d_data = (struct nfs4_delegreturndata *)data;
4960
d9afbd1b
TM
4961 nfs4_setup_sequence(d_data->res.server,
4962 &d_data->args.seq_args,
4963 &d_data->res.seq_res,
4964 task);
938e1010 4965}
938e1010 4966
c8d149f3 4967static const struct rpc_call_ops nfs4_delegreturn_ops = {
938e1010 4968 .rpc_call_prepare = nfs4_delegreturn_prepare,
fe650407
TM
4969 .rpc_call_done = nfs4_delegreturn_done,
4970 .rpc_release = nfs4_delegreturn_release,
4971};
4972
e6f81075 4973static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
fe650407
TM
4974{
4975 struct nfs4_delegreturndata *data;
fa178f29 4976 struct nfs_server *server = NFS_SERVER(inode);
fe650407 4977 struct rpc_task *task;
5138fde0
TM
4978 struct rpc_message msg = {
4979 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
4980 .rpc_cred = cred,
4981 };
c970aa85
TM
4982 struct rpc_task_setup task_setup_data = {
4983 .rpc_client = server->client,
5138fde0 4984 .rpc_message = &msg,
c970aa85
TM
4985 .callback_ops = &nfs4_delegreturn_ops,
4986 .flags = RPC_TASK_ASYNC,
4987 };
e6f81075 4988 int status = 0;
fe650407 4989
8535b2be 4990 data = kzalloc(sizeof(*data), GFP_NOFS);
fe650407
TM
4991 if (data == NULL)
4992 return -ENOMEM;
a9c92d6b 4993 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
fe650407
TM
4994 data->args.fhandle = &data->fh;
4995 data->args.stateid = &data->stateid;
9e907fec 4996 data->args.bitmask = server->cache_consistency_bitmask;
fe650407 4997 nfs_copy_fh(&data->fh, NFS_FH(inode));
f597c537 4998 nfs4_stateid_copy(&data->stateid, stateid);
fa178f29
TM
4999 data->res.fattr = &data->fattr;
5000 data->res.server = server;
5138fde0 5001 nfs_fattr_init(data->res.fattr);
26e976a8 5002 data->timestamp = jiffies;
fe650407
TM
5003 data->rpc_status = 0;
5004
c970aa85 5005 task_setup_data.callback_data = data;
1174dd1f
TM
5006 msg.rpc_argp = &data->args;
5007 msg.rpc_resp = &data->res;
c970aa85 5008 task = rpc_run_task(&task_setup_data);
7a1218a2 5009 if (IS_ERR(task))
fe650407 5010 return PTR_ERR(task);
e6f81075
TM
5011 if (!issync)
5012 goto out;
fe650407 5013 status = nfs4_wait_for_completion_rpc_task(task);
e6f81075
TM
5014 if (status != 0)
5015 goto out;
5016 status = data->rpc_status;
e144cbcc
TM
5017 if (status == 0)
5018 nfs_post_op_update_inode_force_wcc(inode, &data->fattr);
5019 else
5020 nfs_refresh_inode(inode, &data->fattr);
e6f81075 5021out:
e6b3c4db 5022 rpc_put_task(task);
fe650407 5023 return status;
1da177e4
LT
5024}
5025
e6f81075 5026int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
1da177e4
LT
5027{
5028 struct nfs_server *server = NFS_SERVER(inode);
5029 struct nfs4_exception exception = { };
5030 int err;
5031 do {
e6f81075 5032 err = _nfs4_proc_delegreturn(inode, cred, stateid, issync);
ca8acf8d 5033 trace_nfs4_delegreturn(inode, err);
1da177e4
LT
5034 switch (err) {
5035 case -NFS4ERR_STALE_STATEID:
5036 case -NFS4ERR_EXPIRED:
1da177e4
LT
5037 case 0:
5038 return 0;
5039 }
5040 err = nfs4_handle_exception(server, err, &exception);
5041 } while (exception.retry);
5042 return err;
5043}
5044
5045#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
5046#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
5047
5048/*
5049 * sleep, with exponential backoff, and retry the LOCK operation.
5050 */
5051static unsigned long
5052nfs4_set_lock_task_retry(unsigned long timeout)
5053{
416ad3c9 5054 freezable_schedule_timeout_killable_unsafe(timeout);
1da177e4
LT
5055 timeout <<= 1;
5056 if (timeout > NFS4_LOCK_MAXTIMEOUT)
5057 return NFS4_LOCK_MAXTIMEOUT;
5058 return timeout;
5059}
5060
1da177e4
LT
5061static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5062{
5063 struct inode *inode = state->inode;
5064 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 5065 struct nfs_client *clp = server->nfs_client;
911d1aaf 5066 struct nfs_lockt_args arg = {
1da177e4 5067 .fh = NFS_FH(inode),
911d1aaf 5068 .fl = request,
1da177e4 5069 };
911d1aaf
TM
5070 struct nfs_lockt_res res = {
5071 .denied = request,
1da177e4
LT
5072 };
5073 struct rpc_message msg = {
5074 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
5075 .rpc_argp = &arg,
5076 .rpc_resp = &res,
5077 .rpc_cred = state->owner->so_cred,
5078 };
1da177e4
LT
5079 struct nfs4_lock_state *lsp;
5080 int status;
5081
911d1aaf 5082 arg.lock_owner.clientid = clp->cl_clientid;
8d0a8a9d
TM
5083 status = nfs4_set_lock_state(state, request);
5084 if (status != 0)
5085 goto out;
5086 lsp = request->fl_u.nfs4_fl.owner;
48c22eb2 5087 arg.lock_owner.id = lsp->ls_seqid.owner_id;
d035c36c 5088 arg.lock_owner.s_dev = server->s_dev;
7c513058 5089 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
911d1aaf
TM
5090 switch (status) {
5091 case 0:
5092 request->fl_type = F_UNLCK;
5093 break;
5094 case -NFS4ERR_DENIED:
5095 status = 0;
1da177e4 5096 }
70cc6487 5097 request->fl_ops->fl_release_private(request);
a6f951dd 5098 request->fl_ops = NULL;
8d0a8a9d 5099out:
1da177e4
LT
5100 return status;
5101}
5102
5103static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5104{
5105 struct nfs4_exception exception = { };
5106 int err;
5107
5108 do {
d1b748a5
TM
5109 err = _nfs4_proc_getlk(state, cmd, request);
5110 trace_nfs4_get_lock(request, state, cmd, err);
5111 err = nfs4_handle_exception(NFS_SERVER(state->inode), err,
1da177e4
LT
5112 &exception);
5113 } while (exception.retry);
5114 return err;
5115}
5116
5117static int do_vfs_lock(struct file *file, struct file_lock *fl)
5118{
5119 int res = 0;
5120 switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
5121 case FL_POSIX:
5122 res = posix_lock_file_wait(file, fl);
5123 break;
5124 case FL_FLOCK:
5125 res = flock_lock_file_wait(file, fl);
5126 break;
5127 default:
5128 BUG();
5129 }
1da177e4
LT
5130 return res;
5131}
5132
faf5f49c 5133struct nfs4_unlockdata {
911d1aaf
TM
5134 struct nfs_locku_args arg;
5135 struct nfs_locku_res res;
faf5f49c
TM
5136 struct nfs4_lock_state *lsp;
5137 struct nfs_open_context *ctx;
911d1aaf
TM
5138 struct file_lock fl;
5139 const struct nfs_server *server;
26e976a8 5140 unsigned long timestamp;
faf5f49c
TM
5141};
5142
911d1aaf
TM
5143static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
5144 struct nfs_open_context *ctx,
5145 struct nfs4_lock_state *lsp,
5146 struct nfs_seqid *seqid)
5147{
5148 struct nfs4_unlockdata *p;
5149 struct inode *inode = lsp->ls_state->inode;
5150
8535b2be 5151 p = kzalloc(sizeof(*p), GFP_NOFS);
911d1aaf
TM
5152 if (p == NULL)
5153 return NULL;
5154 p->arg.fh = NFS_FH(inode);
5155 p->arg.fl = &p->fl;
5156 p->arg.seqid = seqid;
c1d51931 5157 p->res.seqid = seqid;
911d1aaf
TM
5158 p->arg.stateid = &lsp->ls_stateid;
5159 p->lsp = lsp;
5160 atomic_inc(&lsp->ls_count);
5161 /* Ensure we don't close file until we're done freeing locks! */
5162 p->ctx = get_nfs_open_context(ctx);
5163 memcpy(&p->fl, fl, sizeof(p->fl));
5164 p->server = NFS_SERVER(inode);
5165 return p;
5166}
5167
06f814a3 5168static void nfs4_locku_release_calldata(void *data)
faf5f49c 5169{
963d8fe5 5170 struct nfs4_unlockdata *calldata = data;
911d1aaf 5171 nfs_free_seqid(calldata->arg.seqid);
06f814a3
TM
5172 nfs4_put_lock_state(calldata->lsp);
5173 put_nfs_open_context(calldata->ctx);
5174 kfree(calldata);
faf5f49c
TM
5175}
5176
963d8fe5 5177static void nfs4_locku_done(struct rpc_task *task, void *data)
faf5f49c 5178{
963d8fe5 5179 struct nfs4_unlockdata *calldata = data;
faf5f49c 5180
14516c3a
TM
5181 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
5182 return;
faf5f49c
TM
5183 switch (task->tk_status) {
5184 case 0:
f597c537
TM
5185 nfs4_stateid_copy(&calldata->lsp->ls_stateid,
5186 &calldata->res.stateid);
26e976a8 5187 renew_lease(calldata->server, calldata->timestamp);
faf5f49c 5188 break;
9e33bed5
TM
5189 case -NFS4ERR_BAD_STATEID:
5190 case -NFS4ERR_OLD_STATEID:
faf5f49c
TM
5191 case -NFS4ERR_STALE_STATEID:
5192 case -NFS4ERR_EXPIRED:
faf5f49c
TM
5193 break;
5194 default:
9e33bed5 5195 if (nfs4_async_handle_error(task, calldata->server, NULL) == -EAGAIN)
d00c5d43 5196 rpc_restart_call_prepare(task);
faf5f49c 5197 }
2b1bc308 5198 nfs_release_seqid(calldata->arg.seqid);
faf5f49c
TM
5199}
5200
4ce70ada 5201static void nfs4_locku_prepare(struct rpc_task *task, void *data)
faf5f49c 5202{
4ce70ada 5203 struct nfs4_unlockdata *calldata = data;
faf5f49c 5204
911d1aaf 5205 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
c8da19b9 5206 goto out_wait;
795a88c9 5207 if (test_bit(NFS_LOCK_INITIALIZED, &calldata->lsp->ls_flags) == 0) {
963d8fe5 5208 /* Note: exit _without_ running nfs4_locku_done */
c8da19b9 5209 goto out_no_action;
faf5f49c 5210 }
26e976a8 5211 calldata->timestamp = jiffies;
035168ab 5212 if (nfs4_setup_sequence(calldata->server,
a893693c 5213 &calldata->arg.seq_args,
2240a9e2
TM
5214 &calldata->res.seq_res,
5215 task) != 0)
5216 nfs_release_seqid(calldata->arg.seqid);
c8da19b9
TM
5217 return;
5218out_no_action:
5219 task->tk_action = NULL;
5220out_wait:
5221 nfs4_sequence_done(task, &calldata->res.seq_res);
faf5f49c
TM
5222}
5223
963d8fe5 5224static const struct rpc_call_ops nfs4_locku_ops = {
4ce70ada 5225 .rpc_call_prepare = nfs4_locku_prepare,
963d8fe5 5226 .rpc_call_done = nfs4_locku_done,
06f814a3 5227 .rpc_release = nfs4_locku_release_calldata,
963d8fe5
TM
5228};
5229
a5d16a4d
TM
5230static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
5231 struct nfs_open_context *ctx,
5232 struct nfs4_lock_state *lsp,
5233 struct nfs_seqid *seqid)
5234{
5235 struct nfs4_unlockdata *data;
5138fde0
TM
5236 struct rpc_message msg = {
5237 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
5238 .rpc_cred = ctx->cred,
5239 };
c970aa85
TM
5240 struct rpc_task_setup task_setup_data = {
5241 .rpc_client = NFS_CLIENT(lsp->ls_state->inode),
5138fde0 5242 .rpc_message = &msg,
c970aa85 5243 .callback_ops = &nfs4_locku_ops,
101070ca 5244 .workqueue = nfsiod_workqueue,
c970aa85
TM
5245 .flags = RPC_TASK_ASYNC,
5246 };
a5d16a4d 5247
fa940720
WAA
5248 nfs4_state_protect(NFS_SERVER(lsp->ls_state->inode)->nfs_client,
5249 NFS_SP4_MACH_CRED_CLEANUP, &task_setup_data.rpc_client, &msg);
5250
137d6aca
FF
5251 /* Ensure this is an unlock - when canceling a lock, the
5252 * canceled lock is passed in, and it won't be an unlock.
5253 */
5254 fl->fl_type = F_UNLCK;
5255
a5d16a4d
TM
5256 data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
5257 if (data == NULL) {
5258 nfs_free_seqid(seqid);
5259 return ERR_PTR(-ENOMEM);
5260 }
5261
a9c92d6b 5262 nfs4_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
1174dd1f
TM
5263 msg.rpc_argp = &data->arg;
5264 msg.rpc_resp = &data->res;
c970aa85
TM
5265 task_setup_data.callback_data = data;
5266 return rpc_run_task(&task_setup_data);
a5d16a4d
TM
5267}
5268
faf5f49c
TM
5269static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
5270{
65b62a29
TM
5271 struct inode *inode = state->inode;
5272 struct nfs4_state_owner *sp = state->owner;
5273 struct nfs_inode *nfsi = NFS_I(inode);
911d1aaf 5274 struct nfs_seqid *seqid;
1da177e4 5275 struct nfs4_lock_state *lsp;
06f814a3
TM
5276 struct rpc_task *task;
5277 int status = 0;
536ff0f8 5278 unsigned char fl_flags = request->fl_flags;
faf5f49c 5279
8d0a8a9d 5280 status = nfs4_set_lock_state(state, request);
9b073574
TM
5281 /* Unlock _before_ we do the RPC call */
5282 request->fl_flags |= FL_EXISTS;
65b62a29
TM
5283 /* Exclude nfs_delegation_claim_locks() */
5284 mutex_lock(&sp->so_delegreturn_mutex);
5285 /* Exclude nfs4_reclaim_open_stateid() - note nesting! */
19e03c57
TM
5286 down_read(&nfsi->rwsem);
5287 if (do_vfs_lock(request->fl_file, request) == -ENOENT) {
5288 up_read(&nfsi->rwsem);
65b62a29 5289 mutex_unlock(&sp->so_delegreturn_mutex);
9b073574 5290 goto out;
19e03c57
TM
5291 }
5292 up_read(&nfsi->rwsem);
65b62a29 5293 mutex_unlock(&sp->so_delegreturn_mutex);
8d0a8a9d 5294 if (status != 0)
9b073574
TM
5295 goto out;
5296 /* Is this a delegated lock? */
8d0a8a9d 5297 lsp = request->fl_u.nfs4_fl.owner;
c5a2a15f
TM
5298 if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags) == 0)
5299 goto out;
8535b2be 5300 seqid = nfs_alloc_seqid(&lsp->ls_seqid, GFP_KERNEL);
9b073574 5301 status = -ENOMEM;
911d1aaf 5302 if (seqid == NULL)
9b073574 5303 goto out;
cd3758e3 5304 task = nfs4_do_unlck(request, nfs_file_open_context(request->fl_file), lsp, seqid);
a5d16a4d
TM
5305 status = PTR_ERR(task);
5306 if (IS_ERR(task))
9b073574 5307 goto out;
a5d16a4d 5308 status = nfs4_wait_for_completion_rpc_task(task);
e6b3c4db 5309 rpc_put_task(task);
9b073574 5310out:
536ff0f8 5311 request->fl_flags = fl_flags;
d1b748a5 5312 trace_nfs4_unlock(request, state, F_SETLK, status);
1da177e4
LT
5313 return status;
5314}
5315
a5d16a4d
TM
5316struct nfs4_lockdata {
5317 struct nfs_lock_args arg;
5318 struct nfs_lock_res res;
5319 struct nfs4_lock_state *lsp;
5320 struct nfs_open_context *ctx;
5321 struct file_lock fl;
26e976a8 5322 unsigned long timestamp;
a5d16a4d
TM
5323 int rpc_status;
5324 int cancelled;
66179efe 5325 struct nfs_server *server;
a5d16a4d
TM
5326};
5327
5328static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
8535b2be
TM
5329 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp,
5330 gfp_t gfp_mask)
1da177e4 5331{
a5d16a4d
TM
5332 struct nfs4_lockdata *p;
5333 struct inode *inode = lsp->ls_state->inode;
1da177e4 5334 struct nfs_server *server = NFS_SERVER(inode);
a5d16a4d 5335
8535b2be 5336 p = kzalloc(sizeof(*p), gfp_mask);
a5d16a4d
TM
5337 if (p == NULL)
5338 return NULL;
5339
5340 p->arg.fh = NFS_FH(inode);
5341 p->arg.fl = &p->fl;
8535b2be 5342 p->arg.open_seqid = nfs_alloc_seqid(&lsp->ls_state->owner->so_seqid, gfp_mask);
2f74c0a0
TM
5343 if (p->arg.open_seqid == NULL)
5344 goto out_free;
8535b2be 5345 p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid, gfp_mask);
a5d16a4d 5346 if (p->arg.lock_seqid == NULL)
2f74c0a0 5347 goto out_free_seqid;
a5d16a4d 5348 p->arg.lock_stateid = &lsp->ls_stateid;
7539bbab 5349 p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
48c22eb2 5350 p->arg.lock_owner.id = lsp->ls_seqid.owner_id;
d035c36c 5351 p->arg.lock_owner.s_dev = server->s_dev;
c1d51931 5352 p->res.lock_seqid = p->arg.lock_seqid;
a5d16a4d 5353 p->lsp = lsp;
66179efe 5354 p->server = server;
a5d16a4d
TM
5355 atomic_inc(&lsp->ls_count);
5356 p->ctx = get_nfs_open_context(ctx);
5357 memcpy(&p->fl, fl, sizeof(p->fl));
5358 return p;
2f74c0a0
TM
5359out_free_seqid:
5360 nfs_free_seqid(p->arg.open_seqid);
a5d16a4d
TM
5361out_free:
5362 kfree(p);
5363 return NULL;
5364}
5365
5366static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
5367{
5368 struct nfs4_lockdata *data = calldata;
5369 struct nfs4_state *state = data->lsp->ls_state;
06735b34 5370
3110ff80 5371 dprintk("%s: begin!\n", __func__);
2f74c0a0 5372 if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
c8da19b9 5373 goto out_wait;
a5d16a4d
TM
5374 /* Do we need to do an open_to_lock_owner? */
5375 if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
8fe72bac 5376 if (nfs_wait_on_sequence(data->arg.open_seqid, task) != 0) {
2240a9e2 5377 goto out_release_lock_seqid;
8fe72bac 5378 }
8e472f33 5379 data->arg.open_stateid = &state->open_stateid;
a5d16a4d 5380 data->arg.new_lock_owner = 1;
c1d51931 5381 data->res.open_seqid = data->arg.open_seqid;
2f74c0a0
TM
5382 } else
5383 data->arg.new_lock_owner = 0;
5d422301
TM
5384 if (!nfs4_valid_open_stateid(state)) {
5385 data->rpc_status = -EBADF;
5386 task->tk_action = NULL;
5387 goto out_release_open_seqid;
5388 }
26e976a8 5389 data->timestamp = jiffies;
035168ab
TM
5390 if (nfs4_setup_sequence(data->server,
5391 &data->arg.seq_args,
2240a9e2 5392 &data->res.seq_res,
d9afbd1b 5393 task) == 0)
66179efe 5394 return;
5d422301 5395out_release_open_seqid:
2240a9e2
TM
5396 nfs_release_seqid(data->arg.open_seqid);
5397out_release_lock_seqid:
5398 nfs_release_seqid(data->arg.lock_seqid);
c8da19b9
TM
5399out_wait:
5400 nfs4_sequence_done(task, &data->res.seq_res);
8fe72bac 5401 dprintk("%s: done!, ret = %d\n", __func__, data->rpc_status);
b257957e
AB
5402}
5403
a5d16a4d
TM
5404static void nfs4_lock_done(struct rpc_task *task, void *calldata)
5405{
5406 struct nfs4_lockdata *data = calldata;
5407
3110ff80 5408 dprintk("%s: begin!\n", __func__);
a5d16a4d 5409
14516c3a
TM
5410 if (!nfs4_sequence_done(task, &data->res.seq_res))
5411 return;
66179efe 5412
a5d16a4d 5413 data->rpc_status = task->tk_status;
a5d16a4d 5414 if (data->arg.new_lock_owner != 0) {
a5d16a4d
TM
5415 if (data->rpc_status == 0)
5416 nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
5417 else
5418 goto out;
5419 }
5420 if (data->rpc_status == 0) {
f597c537 5421 nfs4_stateid_copy(&data->lsp->ls_stateid, &data->res.stateid);
795a88c9 5422 set_bit(NFS_LOCK_INITIALIZED, &data->lsp->ls_flags);
3d4ff43d 5423 renew_lease(NFS_SERVER(data->ctx->dentry->d_inode), data->timestamp);
a5d16a4d 5424 }
a5d16a4d 5425out:
3110ff80 5426 dprintk("%s: done, ret = %d!\n", __func__, data->rpc_status);
a5d16a4d
TM
5427}
5428
5429static void nfs4_lock_release(void *calldata)
5430{
5431 struct nfs4_lockdata *data = calldata;
5432
3110ff80 5433 dprintk("%s: begin!\n", __func__);
2f74c0a0 5434 nfs_free_seqid(data->arg.open_seqid);
a5d16a4d
TM
5435 if (data->cancelled != 0) {
5436 struct rpc_task *task;
5437 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
5438 data->arg.lock_seqid);
5439 if (!IS_ERR(task))
bf294b41 5440 rpc_put_task_async(task);
3110ff80 5441 dprintk("%s: cancelling lock!\n", __func__);
a5d16a4d
TM
5442 } else
5443 nfs_free_seqid(data->arg.lock_seqid);
5444 nfs4_put_lock_state(data->lsp);
5445 put_nfs_open_context(data->ctx);
5446 kfree(data);
3110ff80 5447 dprintk("%s: done!\n", __func__);
a5d16a4d
TM
5448}
5449
5450static const struct rpc_call_ops nfs4_lock_ops = {
5451 .rpc_call_prepare = nfs4_lock_prepare,
5452 .rpc_call_done = nfs4_lock_done,
5453 .rpc_release = nfs4_lock_release,
5454};
5455
2bee72a6
TM
5456static void nfs4_handle_setlk_error(struct nfs_server *server, struct nfs4_lock_state *lsp, int new_lock_owner, int error)
5457{
2bee72a6
TM
5458 switch (error) {
5459 case -NFS4ERR_ADMIN_REVOKED:
5460 case -NFS4ERR_BAD_STATEID:
ecac799a 5461 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
2bee72a6 5462 if (new_lock_owner != 0 ||
795a88c9 5463 test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags) != 0)
ecac799a 5464 nfs4_schedule_stateid_recovery(server, lsp->ls_state);
a2c0b9e2
TM
5465 break;
5466 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 5467 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
ecac799a
TM
5468 case -NFS4ERR_EXPIRED:
5469 nfs4_schedule_lease_recovery(server->nfs_client);
2bee72a6
TM
5470 };
5471}
5472
afe6c27c 5473static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type)
a5d16a4d
TM
5474{
5475 struct nfs4_lockdata *data;
5476 struct rpc_task *task;
5138fde0
TM
5477 struct rpc_message msg = {
5478 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
5479 .rpc_cred = state->owner->so_cred,
5480 };
c970aa85
TM
5481 struct rpc_task_setup task_setup_data = {
5482 .rpc_client = NFS_CLIENT(state->inode),
5138fde0 5483 .rpc_message = &msg,
c970aa85 5484 .callback_ops = &nfs4_lock_ops,
101070ca 5485 .workqueue = nfsiod_workqueue,
c970aa85
TM
5486 .flags = RPC_TASK_ASYNC,
5487 };
a5d16a4d
TM
5488 int ret;
5489
3110ff80 5490 dprintk("%s: begin!\n", __func__);
cd3758e3 5491 data = nfs4_alloc_lockdata(fl, nfs_file_open_context(fl->fl_file),
8535b2be
TM
5492 fl->fl_u.nfs4_fl.owner,
5493 recovery_type == NFS_LOCK_NEW ? GFP_KERNEL : GFP_NOFS);
a5d16a4d
TM
5494 if (data == NULL)
5495 return -ENOMEM;
5496 if (IS_SETLKW(cmd))
5497 data->arg.block = 1;
a9c92d6b 5498 nfs4_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
1174dd1f
TM
5499 msg.rpc_argp = &data->arg;
5500 msg.rpc_resp = &data->res;
c970aa85 5501 task_setup_data.callback_data = data;
8fe72bac
TM
5502 if (recovery_type > NFS_LOCK_NEW) {
5503 if (recovery_type == NFS_LOCK_RECLAIM)
5504 data->arg.reclaim = NFS_LOCK_RECLAIM;
5505 nfs4_set_sequence_privileged(&data->arg.seq_args);
5506 }
c970aa85 5507 task = rpc_run_task(&task_setup_data);
7a1218a2 5508 if (IS_ERR(task))
a5d16a4d 5509 return PTR_ERR(task);
a5d16a4d
TM
5510 ret = nfs4_wait_for_completion_rpc_task(task);
5511 if (ret == 0) {
5512 ret = data->rpc_status;
2bee72a6
TM
5513 if (ret)
5514 nfs4_handle_setlk_error(data->server, data->lsp,
5515 data->arg.new_lock_owner, ret);
a5d16a4d
TM
5516 } else
5517 data->cancelled = 1;
e6b3c4db 5518 rpc_put_task(task);
3110ff80 5519 dprintk("%s: done, ret = %d!\n", __func__, ret);
a5d16a4d 5520 return ret;
1da177e4
LT
5521}
5522
5523static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
5524{
202b50dc 5525 struct nfs_server *server = NFS_SERVER(state->inode);
05ffe24f
TM
5526 struct nfs4_exception exception = {
5527 .inode = state->inode,
5528 };
202b50dc
TM
5529 int err;
5530
5531 do {
42a2d13e
TM
5532 /* Cache the lock if possible... */
5533 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
5534 return 0;
afe6c27c 5535 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_RECLAIM);
d1b748a5 5536 trace_nfs4_lock_reclaim(request, state, F_SETLK, err);
168667c4 5537 if (err != -NFS4ERR_DELAY)
202b50dc
TM
5538 break;
5539 nfs4_handle_exception(server, err, &exception);
5540 } while (exception.retry);
5541 return err;
1da177e4
LT
5542}
5543
5544static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
5545{
202b50dc 5546 struct nfs_server *server = NFS_SERVER(state->inode);
05ffe24f
TM
5547 struct nfs4_exception exception = {
5548 .inode = state->inode,
5549 };
202b50dc
TM
5550 int err;
5551
6bfc93ef
TM
5552 err = nfs4_set_lock_state(state, request);
5553 if (err != 0)
5554 return err;
f6de7a39 5555 if (!recover_lost_locks) {
ef1820f9
N
5556 set_bit(NFS_LOCK_LOST, &request->fl_u.nfs4_fl.owner->ls_flags);
5557 return 0;
5558 }
202b50dc 5559 do {
42a2d13e
TM
5560 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
5561 return 0;
afe6c27c 5562 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_EXPIRED);
d1b748a5 5563 trace_nfs4_lock_expired(request, state, F_SETLK, err);
a9ed2e25
TM
5564 switch (err) {
5565 default:
5566 goto out;
5567 case -NFS4ERR_GRACE:
5568 case -NFS4ERR_DELAY:
5569 nfs4_handle_exception(server, err, &exception);
5570 err = 0;
5571 }
202b50dc 5572 } while (exception.retry);
a9ed2e25 5573out:
202b50dc 5574 return err;
1da177e4
LT
5575}
5576
f062eb6c 5577#if defined(CONFIG_NFS_V4_1)
3e60ffdd
CL
5578/**
5579 * nfs41_check_expired_locks - possibly free a lock stateid
5580 *
5581 * @state: NFSv4 state for an inode
5582 *
5583 * Returns NFS_OK if recovery for this stateid is now finished.
5584 * Otherwise a negative NFS4ERR value is returned.
5585 */
b01dd1d8 5586static int nfs41_check_expired_locks(struct nfs4_state *state)
f062eb6c 5587{
eb64cf96 5588 int status, ret = -NFS4ERR_BAD_STATEID;
b01dd1d8 5589 struct nfs4_lock_state *lsp;
f062eb6c
BS
5590 struct nfs_server *server = NFS_SERVER(state->inode);
5591
b01dd1d8 5592 list_for_each_entry(lsp, &state->lock_states, ls_locks) {
795a88c9 5593 if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags)) {
ab7cb0df
TM
5594 struct rpc_cred *cred = lsp->ls_state->owner->so_cred;
5595
5596 status = nfs41_test_stateid(server,
5597 &lsp->ls_stateid,
5598 cred);
08cb47fa 5599 trace_nfs4_test_lock_stateid(state, lsp, status);
b01dd1d8 5600 if (status != NFS_OK) {
3e60ffdd
CL
5601 /* Free the stateid unless the server
5602 * informs us the stateid is unrecognized. */
89af2739
CL
5603 if (status != -NFS4ERR_BAD_STATEID)
5604 nfs41_free_stateid(server,
ab7cb0df
TM
5605 &lsp->ls_stateid,
5606 cred);
795a88c9 5607 clear_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags);
b01dd1d8
BS
5608 ret = status;
5609 }
5610 }
5611 };
5612
5613 return ret;
5614}
5615
5616static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request)
5617{
5618 int status = NFS_OK;
5619
5620 if (test_bit(LK_STATE_IN_USE, &state->flags))
5621 status = nfs41_check_expired_locks(state);
eb64cf96
CL
5622 if (status != NFS_OK)
5623 status = nfs4_lock_expired(state, request);
5624 return status;
f062eb6c
BS
5625}
5626#endif
5627
1da177e4
LT
5628static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5629{
9a99af49 5630 struct nfs4_state_owner *sp = state->owner;
19e03c57 5631 struct nfs_inode *nfsi = NFS_I(state->inode);
01c3b861 5632 unsigned char fl_flags = request->fl_flags;
9a99af49 5633 unsigned int seq;
8e469ebd 5634 int status = -ENOLCK;
1da177e4 5635
8e469ebd
TM
5636 if ((fl_flags & FL_POSIX) &&
5637 !test_bit(NFS_STATE_POSIX_LOCKS, &state->flags))
5638 goto out;
6bfc93ef 5639 /* Is this a delegated open? */
6bfc93ef
TM
5640 status = nfs4_set_lock_state(state, request);
5641 if (status != 0)
5642 goto out;
01c3b861
TM
5643 request->fl_flags |= FL_ACCESS;
5644 status = do_vfs_lock(request->fl_file, request);
5645 if (status < 0)
5646 goto out;
19e03c57 5647 down_read(&nfsi->rwsem);
01c3b861 5648 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
01c3b861 5649 /* Yes: cache locks! */
01c3b861 5650 /* ...but avoid races with delegation recall... */
19e03c57
TM
5651 request->fl_flags = fl_flags & ~FL_SLEEP;
5652 status = do_vfs_lock(request->fl_file, request);
5653 goto out_unlock;
01c3b861 5654 }
9a99af49
TM
5655 seq = raw_seqcount_begin(&sp->so_reclaim_seqcount);
5656 up_read(&nfsi->rwsem);
afe6c27c 5657 status = _nfs4_do_setlk(state, cmd, request, NFS_LOCK_NEW);
6bfc93ef 5658 if (status != 0)
9a99af49
TM
5659 goto out;
5660 down_read(&nfsi->rwsem);
5661 if (read_seqcount_retry(&sp->so_reclaim_seqcount, seq)) {
5662 status = -NFS4ERR_DELAY;
01c3b861 5663 goto out_unlock;
9a99af49 5664 }
6bfc93ef 5665 /* Note: we always want to sleep here! */
01c3b861 5666 request->fl_flags = fl_flags | FL_SLEEP;
6bfc93ef 5667 if (do_vfs_lock(request->fl_file, request) < 0)
a030889a
WAA
5668 printk(KERN_WARNING "NFS: %s: VFS is out of sync with lock "
5669 "manager!\n", __func__);
01c3b861 5670out_unlock:
19e03c57 5671 up_read(&nfsi->rwsem);
01c3b861
TM
5672out:
5673 request->fl_flags = fl_flags;
1da177e4
LT
5674 return status;
5675}
5676
5677static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5678{
a1d0b5ee
TM
5679 struct nfs4_exception exception = {
5680 .state = state,
05ffe24f 5681 .inode = state->inode,
a1d0b5ee 5682 };
1da177e4
LT
5683 int err;
5684
5685 do {
965b5d67 5686 err = _nfs4_proc_setlk(state, cmd, request);
d1b748a5 5687 trace_nfs4_set_lock(request, state, cmd, err);
965b5d67
TM
5688 if (err == -NFS4ERR_DENIED)
5689 err = -EAGAIN;
1da177e4 5690 err = nfs4_handle_exception(NFS_SERVER(state->inode),
965b5d67 5691 err, &exception);
1da177e4
LT
5692 } while (exception.retry);
5693 return err;
5694}
5695
5696static int
5697nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
5698{
5699 struct nfs_open_context *ctx;
5700 struct nfs4_state *state;
5701 unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
5702 int status;
5703
5704 /* verify open state */
cd3758e3 5705 ctx = nfs_file_open_context(filp);
1da177e4
LT
5706 state = ctx->state;
5707
5708 if (request->fl_start < 0 || request->fl_end < 0)
5709 return -EINVAL;
5710
d953126a
TM
5711 if (IS_GETLK(cmd)) {
5712 if (state != NULL)
5713 return nfs4_proc_getlk(state, F_GETLK, request);
5714 return 0;
5715 }
1da177e4
LT
5716
5717 if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
5718 return -EINVAL;
5719
d953126a
TM
5720 if (request->fl_type == F_UNLCK) {
5721 if (state != NULL)
5722 return nfs4_proc_unlck(state, cmd, request);
5723 return 0;
5724 }
1da177e4 5725
d953126a
TM
5726 if (state == NULL)
5727 return -ENOLCK;
55725513
TM
5728 /*
5729 * Don't rely on the VFS having checked the file open mode,
5730 * since it won't do this for flock() locks.
5731 */
f44106e2 5732 switch (request->fl_type) {
55725513
TM
5733 case F_RDLCK:
5734 if (!(filp->f_mode & FMODE_READ))
5735 return -EBADF;
5736 break;
5737 case F_WRLCK:
5738 if (!(filp->f_mode & FMODE_WRITE))
5739 return -EBADF;
5740 }
5741
1da177e4
LT
5742 do {
5743 status = nfs4_proc_setlk(state, cmd, request);
5744 if ((status != -EAGAIN) || IS_SETLK(cmd))
5745 break;
5746 timeout = nfs4_set_lock_task_retry(timeout);
5747 status = -ERESTARTSYS;
5748 if (signalled())
5749 break;
5750 } while(status < 0);
1da177e4
LT
5751 return status;
5752}
5753
db4f2e63 5754int nfs4_lock_delegation_recall(struct file_lock *fl, struct nfs4_state *state, const nfs4_stateid *stateid)
888e694c
TM
5755{
5756 struct nfs_server *server = NFS_SERVER(state->inode);
888e694c
TM
5757 int err;
5758
5759 err = nfs4_set_lock_state(state, fl);
5760 if (err != 0)
db4f2e63 5761 return err;
4a706fa0 5762 err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW);
db4f2e63 5763 return nfs4_handle_delegation_recall_error(server, state, stateid, err);
888e694c 5764}
6b3b5496 5765
cf470c3e
TM
5766struct nfs_release_lockowner_data {
5767 struct nfs4_lock_state *lsp;
5ae67c4f 5768 struct nfs_server *server;
cf470c3e 5769 struct nfs_release_lockowner_args args;
fbd4bfd1
CL
5770 struct nfs4_sequence_args seq_args;
5771 struct nfs4_sequence_res seq_res;
cf470c3e
TM
5772};
5773
fbd4bfd1
CL
5774static void nfs4_release_lockowner_prepare(struct rpc_task *task, void *calldata)
5775{
5776 struct nfs_release_lockowner_data *data = calldata;
5777 nfs40_setup_sequence(data->server,
5778 &data->seq_args, &data->seq_res, task);
5779}
5780
5781static void nfs4_release_lockowner_done(struct rpc_task *task, void *calldata)
5782{
5783 struct nfs_release_lockowner_data *data = calldata;
5784 nfs40_sequence_done(task, &data->seq_res);
5785}
5786
d3c7b7cc
TM
5787static void nfs4_release_lockowner_release(void *calldata)
5788{
cf470c3e 5789 struct nfs_release_lockowner_data *data = calldata;
5ae67c4f 5790 nfs4_free_lock_state(data->server, data->lsp);
d3c7b7cc
TM
5791 kfree(calldata);
5792}
5793
17280175 5794static const struct rpc_call_ops nfs4_release_lockowner_ops = {
fbd4bfd1
CL
5795 .rpc_call_prepare = nfs4_release_lockowner_prepare,
5796 .rpc_call_done = nfs4_release_lockowner_done,
d3c7b7cc
TM
5797 .rpc_release = nfs4_release_lockowner_release,
5798};
5799
c8b2d0bf 5800static int nfs4_release_lockowner(struct nfs_server *server, struct nfs4_lock_state *lsp)
d3c7b7cc 5801{
cf470c3e 5802 struct nfs_release_lockowner_data *data;
d3c7b7cc
TM
5803 struct rpc_message msg = {
5804 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RELEASE_LOCKOWNER],
5805 };
5806
5807 if (server->nfs_client->cl_mvops->minor_version != 0)
cf470c3e 5808 return -EINVAL;
fbd4bfd1 5809
cf470c3e
TM
5810 data = kmalloc(sizeof(*data), GFP_NOFS);
5811 if (!data)
5812 return -ENOMEM;
fbd4bfd1 5813 nfs4_init_sequence(&data->seq_args, &data->seq_res, 0);
cf470c3e 5814 data->lsp = lsp;
5ae67c4f 5815 data->server = server;
cf470c3e
TM
5816 data->args.lock_owner.clientid = server->nfs_client->cl_clientid;
5817 data->args.lock_owner.id = lsp->ls_seqid.owner_id;
5818 data->args.lock_owner.s_dev = server->s_dev;
fbd4bfd1 5819
cf470c3e
TM
5820 msg.rpc_argp = &data->args;
5821 rpc_call_async(server->client, &msg, 0, &nfs4_release_lockowner_ops, data);
5822 return 0;
d3c7b7cc
TM
5823}
5824
aa1870af
BF
5825#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
5826
64c2ce8b
AK
5827static int nfs4_xattr_set_nfs4_acl(struct dentry *dentry, const char *key,
5828 const void *buf, size_t buflen,
5829 int flags, int type)
6b3b5496 5830{
64c2ce8b
AK
5831 if (strcmp(key, "") != 0)
5832 return -EINVAL;
4b580ee3 5833
64c2ce8b 5834 return nfs4_proc_set_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
5835}
5836
64c2ce8b
AK
5837static int nfs4_xattr_get_nfs4_acl(struct dentry *dentry, const char *key,
5838 void *buf, size_t buflen, int type)
6b3b5496 5839{
64c2ce8b
AK
5840 if (strcmp(key, "") != 0)
5841 return -EINVAL;
aa1870af 5842
64c2ce8b 5843 return nfs4_proc_get_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
5844}
5845
64c2ce8b
AK
5846static size_t nfs4_xattr_list_nfs4_acl(struct dentry *dentry, char *list,
5847 size_t list_len, const char *name,
5848 size_t name_len, int type)
6b3b5496 5849{
64c2ce8b 5850 size_t len = sizeof(XATTR_NAME_NFSV4_ACL);
6b3b5496 5851
096455a2
BF
5852 if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
5853 return 0;
64c2ce8b
AK
5854
5855 if (list && len <= list_len)
5856 memcpy(list, XATTR_NAME_NFSV4_ACL, len);
aa1870af 5857 return len;
6b3b5496
BF
5858}
5859
c9bccef6
DQ
5860#ifdef CONFIG_NFS_V4_SECURITY_LABEL
5861static inline int nfs4_server_supports_labels(struct nfs_server *server)
5862{
5863 return server->caps & NFS_CAP_SECURITY_LABEL;
5864}
5865
5866static int nfs4_xattr_set_nfs4_label(struct dentry *dentry, const char *key,
5867 const void *buf, size_t buflen,
5868 int flags, int type)
5869{
5870 if (security_ismaclabel(key))
5871 return nfs4_set_security_label(dentry, buf, buflen);
5872
5873 return -EOPNOTSUPP;
5874}
5875
5876static int nfs4_xattr_get_nfs4_label(struct dentry *dentry, const char *key,
5877 void *buf, size_t buflen, int type)
5878{
5879 if (security_ismaclabel(key))
5880 return nfs4_get_security_label(dentry->d_inode, buf, buflen);
5881 return -EOPNOTSUPP;
5882}
5883
5884static size_t nfs4_xattr_list_nfs4_label(struct dentry *dentry, char *list,
5885 size_t list_len, const char *name,
5886 size_t name_len, int type)
5887{
5888 size_t len = 0;
5889
5890 if (nfs_server_capable(dentry->d_inode, NFS_CAP_SECURITY_LABEL)) {
5891 len = security_inode_listsecurity(dentry->d_inode, NULL, 0);
5892 if (list && len <= list_len)
5893 security_inode_listsecurity(dentry->d_inode, list, len);
5894 }
5895 return len;
5896}
5897
5898static const struct xattr_handler nfs4_xattr_nfs4_label_handler = {
5899 .prefix = XATTR_SECURITY_PREFIX,
5900 .list = nfs4_xattr_list_nfs4_label,
5901 .get = nfs4_xattr_get_nfs4_label,
5902 .set = nfs4_xattr_set_nfs4_label,
5903};
5904#endif
5905
5906
533eb461
AA
5907/*
5908 * nfs_fhget will use either the mounted_on_fileid or the fileid
5909 */
69aaaae1
TM
5910static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr)
5911{
533eb461
AA
5912 if (!(((fattr->valid & NFS_ATTR_FATTR_MOUNTED_ON_FILEID) ||
5913 (fattr->valid & NFS_ATTR_FATTR_FILEID)) &&
5914 (fattr->valid & NFS_ATTR_FATTR_FSID) &&
81934ddb 5915 (fattr->valid & NFS_ATTR_FATTR_V4_LOCATIONS)))
69aaaae1
TM
5916 return;
5917
5918 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
81934ddb 5919 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_V4_REFERRAL;
69aaaae1
TM
5920 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
5921 fattr->nlink = 2;
5922}
5923
f05d147f
BS
5924static int _nfs4_proc_fs_locations(struct rpc_clnt *client, struct inode *dir,
5925 const struct qstr *name,
5926 struct nfs4_fs_locations *fs_locations,
5927 struct page *page)
683b57b4
TM
5928{
5929 struct nfs_server *server = NFS_SERVER(dir);
a09df2ca 5930 u32 bitmask[3] = {
361e624f 5931 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
683b57b4
TM
5932 };
5933 struct nfs4_fs_locations_arg args = {
5934 .dir_fh = NFS_FH(dir),
c228fd3a 5935 .name = name,
683b57b4
TM
5936 .page = page,
5937 .bitmask = bitmask,
5938 };
22958463
BH
5939 struct nfs4_fs_locations_res res = {
5940 .fs_locations = fs_locations,
5941 };
683b57b4
TM
5942 struct rpc_message msg = {
5943 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
5944 .rpc_argp = &args,
22958463 5945 .rpc_resp = &res,
683b57b4
TM
5946 };
5947 int status;
5948
3110ff80 5949 dprintk("%s: start\n", __func__);
533eb461
AA
5950
5951 /* Ask for the fileid of the absent filesystem if mounted_on_fileid
5952 * is not supported */
5953 if (NFS_SERVER(dir)->attr_bitmask[1] & FATTR4_WORD1_MOUNTED_ON_FILEID)
5954 bitmask[1] |= FATTR4_WORD1_MOUNTED_ON_FILEID;
5955 else
5956 bitmask[0] |= FATTR4_WORD0_FILEID;
5957
c228fd3a 5958 nfs_fattr_init(&fs_locations->fattr);
683b57b4 5959 fs_locations->server = server;
830b8e33 5960 fs_locations->nlocations = 0;
f05d147f 5961 status = nfs4_call_sync(client, server, &msg, &args.seq_args, &res.seq_res, 0);
3110ff80 5962 dprintk("%s: returned status = %d\n", __func__, status);
683b57b4
TM
5963 return status;
5964}
5965
f05d147f
BS
5966int nfs4_proc_fs_locations(struct rpc_clnt *client, struct inode *dir,
5967 const struct qstr *name,
5968 struct nfs4_fs_locations *fs_locations,
5969 struct page *page)
db0a9593
BS
5970{
5971 struct nfs4_exception exception = { };
5972 int err;
5973 do {
078ea3df
TM
5974 err = _nfs4_proc_fs_locations(client, dir, name,
5975 fs_locations, page);
5976 trace_nfs4_get_fs_locations(dir, name, err);
5977 err = nfs4_handle_exception(NFS_SERVER(dir), err,
db0a9593
BS
5978 &exception);
5979 } while (exception.retry);
5980 return err;
5981}
5982
5ec16a85 5983/**
a5250def
WAA
5984 * If 'use_integrity' is true and the state managment nfs_client
5985 * cl_rpcclient is using krb5i/p, use the integrity protected cl_rpcclient
5986 * and the machine credential as per RFC3530bis and RFC5661 Security
5987 * Considerations sections. Otherwise, just use the user cred with the
5988 * filesystem's rpc_client.
5ec16a85 5989 */
a5250def 5990static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity)
5a5ea0d4
BS
5991{
5992 int status;
5993 struct nfs4_secinfo_arg args = {
5994 .dir_fh = NFS_FH(dir),
5995 .name = name,
5996 };
5997 struct nfs4_secinfo_res res = {
5998 .flavors = flavors,
5999 };
6000 struct rpc_message msg = {
6001 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO],
6002 .rpc_argp = &args,
6003 .rpc_resp = &res,
6004 };
a5250def 6005 struct rpc_clnt *clnt = NFS_SERVER(dir)->client;
7cb852df 6006 struct rpc_cred *cred = NULL;
a5250def
WAA
6007
6008 if (use_integrity) {
6009 clnt = NFS_SERVER(dir)->nfs_client->cl_rpcclient;
7cb852df
WAA
6010 cred = nfs4_get_clid_cred(NFS_SERVER(dir)->nfs_client);
6011 msg.rpc_cred = cred;
a5250def 6012 }
5a5ea0d4
BS
6013
6014 dprintk("NFS call secinfo %s\n", name->name);
8b5bee2e
WAA
6015
6016 nfs4_state_protect(NFS_SERVER(dir)->nfs_client,
6017 NFS_SP4_MACH_CRED_SECINFO, &clnt, &msg);
6018
a5250def
WAA
6019 status = nfs4_call_sync(clnt, NFS_SERVER(dir), &msg, &args.seq_args,
6020 &res.seq_res, 0);
5a5ea0d4 6021 dprintk("NFS reply secinfo: %d\n", status);
a5250def 6022
7cb852df
WAA
6023 if (cred)
6024 put_rpccred(cred);
a5250def 6025
5a5ea0d4
BS
6026 return status;
6027}
6028
72de53ec
BS
6029int nfs4_proc_secinfo(struct inode *dir, const struct qstr *name,
6030 struct nfs4_secinfo_flavors *flavors)
5a5ea0d4
BS
6031{
6032 struct nfs4_exception exception = { };
6033 int err;
6034 do {
a5250def
WAA
6035 err = -NFS4ERR_WRONGSEC;
6036
6037 /* try to use integrity protection with machine cred */
6038 if (_nfs4_is_integrity_protected(NFS_SERVER(dir)->nfs_client))
6039 err = _nfs4_proc_secinfo(dir, name, flavors, true);
6040
6041 /*
6042 * if unable to use integrity protection, or SECINFO with
6043 * integrity protection returns NFS4ERR_WRONGSEC (which is
6044 * disallowed by spec, but exists in deployed servers) use
6045 * the current filesystem's rpc_client and the user cred.
6046 */
6047 if (err == -NFS4ERR_WRONGSEC)
6048 err = _nfs4_proc_secinfo(dir, name, flavors, false);
6049
078ea3df
TM
6050 trace_nfs4_secinfo(dir, name, err);
6051 err = nfs4_handle_exception(NFS_SERVER(dir), err,
5a5ea0d4
BS
6052 &exception);
6053 } while (exception.retry);
6054 return err;
6055}
6056
557134a3 6057#ifdef CONFIG_NFS_V4_1
357f54d6
AA
6058/*
6059 * Check the exchange flags returned by the server for invalid flags, having
6060 * both PNFS and NON_PNFS flags set, and not having one of NON_PNFS, PNFS, or
6061 * DS flags set.
6062 */
6063static int nfs4_check_cl_exchange_flags(u32 flags)
6064{
6065 if (flags & ~EXCHGID4_FLAG_MASK_R)
6066 goto out_inval;
6067 if ((flags & EXCHGID4_FLAG_USE_PNFS_MDS) &&
6068 (flags & EXCHGID4_FLAG_USE_NON_PNFS))
6069 goto out_inval;
6070 if (!(flags & (EXCHGID4_FLAG_MASK_PNFS)))
6071 goto out_inval;
6072 return NFS_OK;
6073out_inval:
6074 return -NFS4ERR_INVAL;
6075}
6076
78fe0f41 6077static bool
79d4e1f0
CL
6078nfs41_same_server_scope(struct nfs41_server_scope *a,
6079 struct nfs41_server_scope *b)
78fe0f41
WAA
6080{
6081 if (a->server_scope_sz == b->server_scope_sz &&
6082 memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
6083 return true;
6084
6085 return false;
6086}
6087
7c44f1ae
WAA
6088/*
6089 * nfs4_proc_bind_conn_to_session()
6090 *
6091 * The 4.1 client currently uses the same TCP connection for the
6092 * fore and backchannel.
6093 */
2cf047c9 6094int nfs4_proc_bind_conn_to_session(struct nfs_client *clp, struct rpc_cred *cred)
7c44f1ae
WAA
6095{
6096 int status;
6097 struct nfs41_bind_conn_to_session_res res;
6098 struct rpc_message msg = {
6099 .rpc_proc =
6100 &nfs4_procedures[NFSPROC4_CLNT_BIND_CONN_TO_SESSION],
6101 .rpc_argp = clp,
6102 .rpc_resp = &res,
2cf047c9 6103 .rpc_cred = cred,
7c44f1ae
WAA
6104 };
6105
6106 dprintk("--> %s\n", __func__);
7c44f1ae
WAA
6107
6108 res.session = kzalloc(sizeof(struct nfs4_session), GFP_NOFS);
6109 if (unlikely(res.session == NULL)) {
6110 status = -ENOMEM;
6111 goto out;
6112 }
6113
6114 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 6115 trace_nfs4_bind_conn_to_session(clp, status);
7c44f1ae
WAA
6116 if (status == 0) {
6117 if (memcmp(res.session->sess_id.data,
6118 clp->cl_session->sess_id.data, NFS4_MAX_SESSIONID_LEN)) {
6119 dprintk("NFS: %s: Session ID mismatch\n", __func__);
6120 status = -EIO;
6121 goto out_session;
6122 }
6123 if (res.dir != NFS4_CDFS4_BOTH) {
6124 dprintk("NFS: %s: Unexpected direction from server\n",
6125 __func__);
6126 status = -EIO;
6127 goto out_session;
6128 }
6129 if (res.use_conn_in_rdma_mode) {
6130 dprintk("NFS: %s: Server returned RDMA mode = true\n",
6131 __func__);
6132 status = -EIO;
6133 goto out_session;
6134 }
6135 }
6136out_session:
6137 kfree(res.session);
6138out:
6139 dprintk("<-- %s status= %d\n", __func__, status);
6140 return status;
6141}
6142
99fe60d0 6143/*
fa940720
WAA
6144 * Minimum set of SP4_MACH_CRED operations from RFC 5661 in the enforce map
6145 * and operations we'd like to see to enable certain features in the allow map
2031cd1a
WAA
6146 */
6147static const struct nfs41_state_protection nfs4_sp4_mach_cred_request = {
6148 .how = SP4_MACH_CRED,
6149 .enforce.u.words = {
6150 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
6151 1 << (OP_EXCHANGE_ID - 32) |
6152 1 << (OP_CREATE_SESSION - 32) |
6153 1 << (OP_DESTROY_SESSION - 32) |
6154 1 << (OP_DESTROY_CLIENTID - 32)
fa940720
WAA
6155 },
6156 .allow.u.words = {
6157 [0] = 1 << (OP_CLOSE) |
a0279625
WAA
6158 1 << (OP_LOCKU) |
6159 1 << (OP_COMMIT),
8b5bee2e 6160 [1] = 1 << (OP_SECINFO - 32) |
3787d506
WAA
6161 1 << (OP_SECINFO_NO_NAME - 32) |
6162 1 << (OP_TEST_STATEID - 32) |
a0279625
WAA
6163 1 << (OP_FREE_STATEID - 32) |
6164 1 << (OP_WRITE - 32)
2031cd1a
WAA
6165 }
6166};
6167
6168/*
6169 * Select the state protection mode for client `clp' given the server results
6170 * from exchange_id in `sp'.
99fe60d0 6171 *
2031cd1a
WAA
6172 * Returns 0 on success, negative errno otherwise.
6173 */
6174static int nfs4_sp4_select_mode(struct nfs_client *clp,
6175 struct nfs41_state_protection *sp)
6176{
6177 static const u32 supported_enforce[NFS4_OP_MAP_NUM_WORDS] = {
6178 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
6179 1 << (OP_EXCHANGE_ID - 32) |
6180 1 << (OP_CREATE_SESSION - 32) |
6181 1 << (OP_DESTROY_SESSION - 32) |
6182 1 << (OP_DESTROY_CLIENTID - 32)
6183 };
6184 unsigned int i;
6185
6186 if (sp->how == SP4_MACH_CRED) {
6187 /* Print state protect result */
6188 dfprintk(MOUNT, "Server SP4_MACH_CRED support:\n");
6189 for (i = 0; i <= LAST_NFS4_OP; i++) {
6190 if (test_bit(i, sp->enforce.u.longs))
6191 dfprintk(MOUNT, " enforce op %d\n", i);
6192 if (test_bit(i, sp->allow.u.longs))
6193 dfprintk(MOUNT, " allow op %d\n", i);
6194 }
6195
6196 /* make sure nothing is on enforce list that isn't supported */
6197 for (i = 0; i < NFS4_OP_MAP_NUM_WORDS; i++) {
6198 if (sp->enforce.u.words[i] & ~supported_enforce[i]) {
6199 dfprintk(MOUNT, "sp4_mach_cred: disabled\n");
6200 return -EINVAL;
6201 }
6202 }
6203
6204 /*
6205 * Minimal mode - state operations are allowed to use machine
6206 * credential. Note this already happens by default, so the
6207 * client doesn't have to do anything more than the negotiation.
6208 *
6209 * NOTE: we don't care if EXCHANGE_ID is in the list -
6210 * we're already using the machine cred for exchange_id
6211 * and will never use a different cred.
6212 */
6213 if (test_bit(OP_BIND_CONN_TO_SESSION, sp->enforce.u.longs) &&
6214 test_bit(OP_CREATE_SESSION, sp->enforce.u.longs) &&
6215 test_bit(OP_DESTROY_SESSION, sp->enforce.u.longs) &&
6216 test_bit(OP_DESTROY_CLIENTID, sp->enforce.u.longs)) {
6217 dfprintk(MOUNT, "sp4_mach_cred:\n");
6218 dfprintk(MOUNT, " minimal mode enabled\n");
6219 set_bit(NFS_SP4_MACH_CRED_MINIMAL, &clp->cl_sp4_flags);
6220 } else {
6221 dfprintk(MOUNT, "sp4_mach_cred: disabled\n");
6222 return -EINVAL;
6223 }
fa940720
WAA
6224
6225 if (test_bit(OP_CLOSE, sp->allow.u.longs) &&
6226 test_bit(OP_LOCKU, sp->allow.u.longs)) {
6227 dfprintk(MOUNT, " cleanup mode enabled\n");
6228 set_bit(NFS_SP4_MACH_CRED_CLEANUP, &clp->cl_sp4_flags);
6229 }
8b5bee2e
WAA
6230
6231 if (test_bit(OP_SECINFO, sp->allow.u.longs) &&
6232 test_bit(OP_SECINFO_NO_NAME, sp->allow.u.longs)) {
6233 dfprintk(MOUNT, " secinfo mode enabled\n");
6234 set_bit(NFS_SP4_MACH_CRED_SECINFO, &clp->cl_sp4_flags);
6235 }
3787d506
WAA
6236
6237 if (test_bit(OP_TEST_STATEID, sp->allow.u.longs) &&
6238 test_bit(OP_FREE_STATEID, sp->allow.u.longs)) {
6239 dfprintk(MOUNT, " stateid mode enabled\n");
6240 set_bit(NFS_SP4_MACH_CRED_STATEID, &clp->cl_sp4_flags);
6241 }
8c21c62c
WAA
6242
6243 if (test_bit(OP_WRITE, sp->allow.u.longs)) {
6244 dfprintk(MOUNT, " write mode enabled\n");
6245 set_bit(NFS_SP4_MACH_CRED_WRITE, &clp->cl_sp4_flags);
6246 }
6247
6248 if (test_bit(OP_COMMIT, sp->allow.u.longs)) {
6249 dfprintk(MOUNT, " commit mode enabled\n");
6250 set_bit(NFS_SP4_MACH_CRED_COMMIT, &clp->cl_sp4_flags);
6251 }
2031cd1a
WAA
6252 }
6253
6254 return 0;
6255}
6256
6257/*
6258 * _nfs4_proc_exchange_id()
6bbb4ae8 6259 *
2031cd1a 6260 * Wrapper for EXCHANGE_ID operation.
99fe60d0 6261 */
2031cd1a
WAA
6262static int _nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred,
6263 u32 sp4_how)
99fe60d0
BH
6264{
6265 nfs4_verifier verifier;
6266 struct nfs41_exchange_id_args args = {
cd93710e 6267 .verifier = &verifier,
99fe60d0 6268 .client = clp,
4f0b429d
TM
6269 .flags = EXCHGID4_FLAG_SUPP_MOVED_REFER |
6270 EXCHGID4_FLAG_BIND_PRINC_STATEID,
99fe60d0
BH
6271 };
6272 struct nfs41_exchange_id_res res = {
32b01310 6273 0
99fe60d0
BH
6274 };
6275 int status;
6276 struct rpc_message msg = {
6277 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_EXCHANGE_ID],
6278 .rpc_argp = &args,
6279 .rpc_resp = &res,
6280 .rpc_cred = cred,
6281 };
99fe60d0 6282
f092075d 6283 nfs4_init_boot_verifier(clp, &verifier);
e984a55a
CL
6284 args.id_len = nfs4_init_uniform_client_string(clp, args.id,
6285 sizeof(args.id));
6bbb4ae8
CL
6286 dprintk("NFS call exchange_id auth=%s, '%.*s'\n",
6287 clp->cl_rpcclient->cl_auth->au_ops->au_name,
6288 args.id_len, args.id);
99fe60d0 6289
acdeb69d 6290 res.server_owner = kzalloc(sizeof(struct nfs41_server_owner),
bbafffd2 6291 GFP_NOFS);
acdeb69d 6292 if (unlikely(res.server_owner == NULL)) {
abe9a6d5
WAA
6293 status = -ENOMEM;
6294 goto out;
6295 }
78fe0f41 6296
79d4e1f0 6297 res.server_scope = kzalloc(sizeof(struct nfs41_server_scope),
bbafffd2 6298 GFP_NOFS);
177313f1 6299 if (unlikely(res.server_scope == NULL)) {
abe9a6d5 6300 status = -ENOMEM;
acdeb69d 6301 goto out_server_owner;
abe9a6d5 6302 }
78fe0f41 6303
bbafffd2 6304 res.impl_id = kzalloc(sizeof(struct nfs41_impl_id), GFP_NOFS);
177313f1 6305 if (unlikely(res.impl_id == NULL)) {
7d2ed9ac
WAA
6306 status = -ENOMEM;
6307 goto out_server_scope;
6308 }
6309
2031cd1a
WAA
6310 switch (sp4_how) {
6311 case SP4_NONE:
6312 args.state_protect.how = SP4_NONE;
6313 break;
6314
6315 case SP4_MACH_CRED:
6316 args.state_protect = nfs4_sp4_mach_cred_request;
6317 break;
6318
6319 default:
6320 /* unsupported! */
6321 WARN_ON_ONCE(1);
6322 status = -EINVAL;
6323 goto out_server_scope;
6324 }
6325
1bd714f2 6326 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 6327 trace_nfs4_exchange_id(clp, status);
177313f1 6328 if (status == 0)
32b01310 6329 status = nfs4_check_cl_exchange_flags(res.flags);
78fe0f41 6330
2031cd1a
WAA
6331 if (status == 0)
6332 status = nfs4_sp4_select_mode(clp, &res.state_protect);
6333
acdeb69d 6334 if (status == 0) {
32b01310
TM
6335 clp->cl_clientid = res.clientid;
6336 clp->cl_exchange_flags = (res.flags & ~EXCHGID4_FLAG_CONFIRMED_R);
6337 if (!(res.flags & EXCHGID4_FLAG_CONFIRMED_R))
6338 clp->cl_seqid = res.seqid;
6339
acdeb69d
CL
6340 kfree(clp->cl_serverowner);
6341 clp->cl_serverowner = res.server_owner;
6342 res.server_owner = NULL;
78fe0f41 6343
7d2ed9ac 6344 /* use the most recent implementation id */
59155546
CL
6345 kfree(clp->cl_implid);
6346 clp->cl_implid = res.impl_id;
7d2ed9ac 6347
177313f1 6348 if (clp->cl_serverscope != NULL &&
79d4e1f0 6349 !nfs41_same_server_scope(clp->cl_serverscope,
78fe0f41
WAA
6350 res.server_scope)) {
6351 dprintk("%s: server_scope mismatch detected\n",
6352 __func__);
6353 set_bit(NFS4CLNT_SERVER_SCOPE_MISMATCH, &clp->cl_state);
79d4e1f0
CL
6354 kfree(clp->cl_serverscope);
6355 clp->cl_serverscope = NULL;
78fe0f41
WAA
6356 }
6357
177313f1 6358 if (clp->cl_serverscope == NULL) {
79d4e1f0 6359 clp->cl_serverscope = res.server_scope;
abe9a6d5
WAA
6360 goto out;
6361 }
32b01310
TM
6362 } else
6363 kfree(res.impl_id);
7d2ed9ac 6364
acdeb69d
CL
6365out_server_owner:
6366 kfree(res.server_owner);
7d2ed9ac 6367out_server_scope:
abe9a6d5
WAA
6368 kfree(res.server_scope);
6369out:
177313f1 6370 if (clp->cl_implid != NULL)
6bbb4ae8 6371 dprintk("NFS reply exchange_id: Server Implementation ID: "
7d2ed9ac 6372 "domain: %s, name: %s, date: %llu,%u\n",
6bbb4ae8 6373 clp->cl_implid->domain, clp->cl_implid->name,
59155546
CL
6374 clp->cl_implid->date.seconds,
6375 clp->cl_implid->date.nseconds);
6bbb4ae8 6376 dprintk("NFS reply exchange_id: %d\n", status);
99fe60d0
BH
6377 return status;
6378}
6379
2031cd1a
WAA
6380/*
6381 * nfs4_proc_exchange_id()
6382 *
6383 * Returns zero, a negative errno, or a negative NFS4ERR status code.
6384 *
6385 * Since the clientid has expired, all compounds using sessions
6386 * associated with the stale clientid will be returning
6387 * NFS4ERR_BADSESSION in the sequence operation, and will therefore
6388 * be in some phase of session reset.
6389 *
6390 * Will attempt to negotiate SP4_MACH_CRED if krb5i / krb5p auth is used.
6391 */
6392int nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred)
6393{
6394 rpc_authflavor_t authflavor = clp->cl_rpcclient->cl_auth->au_flavor;
6395 int status;
6396
6397 /* try SP4_MACH_CRED if krb5i/p */
6398 if (authflavor == RPC_AUTH_GSS_KRB5I ||
6399 authflavor == RPC_AUTH_GSS_KRB5P) {
6400 status = _nfs4_proc_exchange_id(clp, cred, SP4_MACH_CRED);
6401 if (!status)
6402 return 0;
6403 }
6404
6405 /* try SP4_NONE */
6406 return _nfs4_proc_exchange_id(clp, cred, SP4_NONE);
6407}
6408
66245539
TM
6409static int _nfs4_proc_destroy_clientid(struct nfs_client *clp,
6410 struct rpc_cred *cred)
6411{
6412 struct rpc_message msg = {
6413 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_CLIENTID],
6414 .rpc_argp = clp,
6415 .rpc_cred = cred,
6416 };
6417 int status;
6418
6419 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 6420 trace_nfs4_destroy_clientid(clp, status);
66245539 6421 if (status)
02c67525 6422 dprintk("NFS: Got error %d from the server %s on "
66245539
TM
6423 "DESTROY_CLIENTID.", status, clp->cl_hostname);
6424 return status;
6425}
6426
6427static int nfs4_proc_destroy_clientid(struct nfs_client *clp,
6428 struct rpc_cred *cred)
6429{
6430 unsigned int loop;
6431 int ret;
6432
6433 for (loop = NFS4_MAX_LOOP_ON_RECOVER; loop != 0; loop--) {
6434 ret = _nfs4_proc_destroy_clientid(clp, cred);
6435 switch (ret) {
6436 case -NFS4ERR_DELAY:
6437 case -NFS4ERR_CLIENTID_BUSY:
6438 ssleep(1);
6439 break;
6440 default:
6441 return ret;
6442 }
6443 }
6444 return 0;
6445}
6446
6447int nfs4_destroy_clientid(struct nfs_client *clp)
6448{
6449 struct rpc_cred *cred;
6450 int ret = 0;
6451
6452 if (clp->cl_mvops->minor_version < 1)
6453 goto out;
6454 if (clp->cl_exchange_flags == 0)
6455 goto out;
05f4c350
CL
6456 if (clp->cl_preserve_clid)
6457 goto out;
73d8bde5 6458 cred = nfs4_get_clid_cred(clp);
66245539
TM
6459 ret = nfs4_proc_destroy_clientid(clp, cred);
6460 if (cred)
6461 put_rpccred(cred);
6462 switch (ret) {
6463 case 0:
6464 case -NFS4ERR_STALE_CLIENTID:
6465 clp->cl_exchange_flags = 0;
6466 }
6467out:
6468 return ret;
6469}
6470
2050f0cc
AA
6471struct nfs4_get_lease_time_data {
6472 struct nfs4_get_lease_time_args *args;
6473 struct nfs4_get_lease_time_res *res;
6474 struct nfs_client *clp;
6475};
6476
6477static void nfs4_get_lease_time_prepare(struct rpc_task *task,
6478 void *calldata)
6479{
2050f0cc
AA
6480 struct nfs4_get_lease_time_data *data =
6481 (struct nfs4_get_lease_time_data *)calldata;
6482
6483 dprintk("--> %s\n", __func__);
6484 /* just setup sequence, do not trigger session recovery
6485 since we're invoked within one */
d9afbd1b
TM
6486 nfs41_setup_sequence(data->clp->cl_session,
6487 &data->args->la_seq_args,
6488 &data->res->lr_seq_res,
6489 task);
2050f0cc
AA
6490 dprintk("<-- %s\n", __func__);
6491}
6492
6493/*
6494 * Called from nfs4_state_manager thread for session setup, so don't recover
6495 * from sequence operation or clientid errors.
6496 */
6497static void nfs4_get_lease_time_done(struct rpc_task *task, void *calldata)
6498{
6499 struct nfs4_get_lease_time_data *data =
6500 (struct nfs4_get_lease_time_data *)calldata;
6501
6502 dprintk("--> %s\n", __func__);
14516c3a
TM
6503 if (!nfs41_sequence_done(task, &data->res->lr_seq_res))
6504 return;
2050f0cc
AA
6505 switch (task->tk_status) {
6506 case -NFS4ERR_DELAY:
6507 case -NFS4ERR_GRACE:
6508 dprintk("%s Retry: tk_status %d\n", __func__, task->tk_status);
6509 rpc_delay(task, NFS4_POLL_RETRY_MIN);
6510 task->tk_status = 0;
a8a4ae3a
AA
6511 /* fall through */
6512 case -NFS4ERR_RETRY_UNCACHED_REP:
d00c5d43 6513 rpc_restart_call_prepare(task);
2050f0cc
AA
6514 return;
6515 }
2050f0cc
AA
6516 dprintk("<-- %s\n", __func__);
6517}
6518
17280175 6519static const struct rpc_call_ops nfs4_get_lease_time_ops = {
2050f0cc
AA
6520 .rpc_call_prepare = nfs4_get_lease_time_prepare,
6521 .rpc_call_done = nfs4_get_lease_time_done,
6522};
6523
6524int nfs4_proc_get_lease_time(struct nfs_client *clp, struct nfs_fsinfo *fsinfo)
6525{
6526 struct rpc_task *task;
6527 struct nfs4_get_lease_time_args args;
6528 struct nfs4_get_lease_time_res res = {
6529 .lr_fsinfo = fsinfo,
6530 };
6531 struct nfs4_get_lease_time_data data = {
6532 .args = &args,
6533 .res = &res,
6534 .clp = clp,
6535 };
6536 struct rpc_message msg = {
6537 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GET_LEASE_TIME],
6538 .rpc_argp = &args,
6539 .rpc_resp = &res,
6540 };
6541 struct rpc_task_setup task_setup = {
6542 .rpc_client = clp->cl_rpcclient,
6543 .rpc_message = &msg,
6544 .callback_ops = &nfs4_get_lease_time_ops,
1bd714f2
TM
6545 .callback_data = &data,
6546 .flags = RPC_TASK_TIMEOUT,
2050f0cc
AA
6547 };
6548 int status;
6549
a9c92d6b 6550 nfs4_init_sequence(&args.la_seq_args, &res.lr_seq_res, 0);
8fe72bac 6551 nfs4_set_sequence_privileged(&args.la_seq_args);
2050f0cc
AA
6552 dprintk("--> %s\n", __func__);
6553 task = rpc_run_task(&task_setup);
6554
6555 if (IS_ERR(task))
6556 status = PTR_ERR(task);
6557 else {
6558 status = task->tk_status;
6559 rpc_put_task(task);
6560 }
6561 dprintk("<-- %s return %d\n", __func__, status);
6562
6563 return status;
6564}
6565
fc931582
AA
6566/*
6567 * Initialize the values to be used by the client in CREATE_SESSION
6568 * If nfs4_init_session set the fore channel request and response sizes,
6569 * use them.
6570 *
6571 * Set the back channel max_resp_sz_cached to zero to force the client to
6572 * always set csa_cachethis to FALSE because the current implementation
6573 * of the back channel DRC only supports caching the CB_SEQUENCE operation.
6574 */
6575static void nfs4_init_channel_attrs(struct nfs41_create_session_args *args)
6576{
18aad3d5
AA
6577 unsigned int max_rqst_sz, max_resp_sz;
6578
6579 max_rqst_sz = NFS_MAX_FILE_IO_SIZE + nfs41_maxwrite_overhead;
6580 max_resp_sz = NFS_MAX_FILE_IO_SIZE + nfs41_maxread_overhead;
fc931582 6581
fc931582 6582 /* Fore channel attributes */
18aad3d5
AA
6583 args->fc_attrs.max_rqst_sz = max_rqst_sz;
6584 args->fc_attrs.max_resp_sz = max_resp_sz;
fc931582 6585 args->fc_attrs.max_ops = NFS4_MAX_OPS;
ef159e91 6586 args->fc_attrs.max_reqs = max_session_slots;
fc931582
AA
6587
6588 dprintk("%s: Fore Channel : max_rqst_sz=%u max_resp_sz=%u "
8e0d46e1 6589 "max_ops=%u max_reqs=%u\n",
fc931582
AA
6590 __func__,
6591 args->fc_attrs.max_rqst_sz, args->fc_attrs.max_resp_sz,
8e0d46e1 6592 args->fc_attrs.max_ops, args->fc_attrs.max_reqs);
fc931582
AA
6593
6594 /* Back channel attributes */
fc931582
AA
6595 args->bc_attrs.max_rqst_sz = PAGE_SIZE;
6596 args->bc_attrs.max_resp_sz = PAGE_SIZE;
6597 args->bc_attrs.max_resp_sz_cached = 0;
6598 args->bc_attrs.max_ops = NFS4_MAX_BACK_CHANNEL_OPS;
6599 args->bc_attrs.max_reqs = 1;
6600
6601 dprintk("%s: Back Channel : max_rqst_sz=%u max_resp_sz=%u "
6602 "max_resp_sz_cached=%u max_ops=%u max_reqs=%u\n",
6603 __func__,
6604 args->bc_attrs.max_rqst_sz, args->bc_attrs.max_resp_sz,
6605 args->bc_attrs.max_resp_sz_cached, args->bc_attrs.max_ops,
6606 args->bc_attrs.max_reqs);
6607}
6608
43c2e885 6609static int nfs4_verify_fore_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
8d35301d 6610{
43c2e885
BF
6611 struct nfs4_channel_attrs *sent = &args->fc_attrs;
6612 struct nfs4_channel_attrs *rcvd = &session->fc_attrs;
6613
43c2e885
BF
6614 if (rcvd->max_resp_sz > sent->max_resp_sz)
6615 return -EINVAL;
6616 /*
6617 * Our requested max_ops is the minimum we need; we're not
6618 * prepared to break up compounds into smaller pieces than that.
6619 * So, no point even trying to continue if the server won't
6620 * cooperate:
6621 */
6622 if (rcvd->max_ops < sent->max_ops)
6623 return -EINVAL;
6624 if (rcvd->max_reqs == 0)
6625 return -EINVAL;
b4b9a0c1
VG
6626 if (rcvd->max_reqs > NFS4_MAX_SLOT_TABLE)
6627 rcvd->max_reqs = NFS4_MAX_SLOT_TABLE;
43c2e885 6628 return 0;
8d35301d
AA
6629}
6630
43c2e885
BF
6631static int nfs4_verify_back_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
6632{
6633 struct nfs4_channel_attrs *sent = &args->bc_attrs;
6634 struct nfs4_channel_attrs *rcvd = &session->bc_attrs;
8d35301d 6635
43c2e885
BF
6636 if (rcvd->max_rqst_sz > sent->max_rqst_sz)
6637 return -EINVAL;
6638 if (rcvd->max_resp_sz < sent->max_resp_sz)
6639 return -EINVAL;
6640 if (rcvd->max_resp_sz_cached > sent->max_resp_sz_cached)
6641 return -EINVAL;
6642 /* These would render the backchannel useless: */
b4b9a0c1 6643 if (rcvd->max_ops != sent->max_ops)
43c2e885 6644 return -EINVAL;
b4b9a0c1 6645 if (rcvd->max_reqs != sent->max_reqs)
43c2e885
BF
6646 return -EINVAL;
6647 return 0;
6648}
8d35301d 6649
8d35301d
AA
6650static int nfs4_verify_channel_attrs(struct nfs41_create_session_args *args,
6651 struct nfs4_session *session)
6652{
43c2e885 6653 int ret;
8d35301d 6654
43c2e885
BF
6655 ret = nfs4_verify_fore_channel_attrs(args, session);
6656 if (ret)
6657 return ret;
6658 return nfs4_verify_back_channel_attrs(args, session);
8d35301d
AA
6659}
6660
848f5bda
TM
6661static int _nfs4_proc_create_session(struct nfs_client *clp,
6662 struct rpc_cred *cred)
fc931582
AA
6663{
6664 struct nfs4_session *session = clp->cl_session;
6665 struct nfs41_create_session_args args = {
6666 .client = clp,
6667 .cb_program = NFS4_CALLBACK,
6668 };
6669 struct nfs41_create_session_res res = {
6670 .client = clp,
6671 };
6672 struct rpc_message msg = {
6673 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE_SESSION],
6674 .rpc_argp = &args,
6675 .rpc_resp = &res,
848f5bda 6676 .rpc_cred = cred,
fc931582
AA
6677 };
6678 int status;
6679
6680 nfs4_init_channel_attrs(&args);
0f91421e 6681 args.flags = (SESSION4_PERSIST | SESSION4_BACK_CHAN);
fc931582 6682
1bd714f2 6683 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 6684 trace_nfs4_create_session(clp, status);
fc931582 6685
43095d39 6686 if (!status) {
8d35301d
AA
6687 /* Verify the session's negotiated channel_attrs values */
6688 status = nfs4_verify_channel_attrs(&args, session);
fc931582
AA
6689 /* Increment the clientid slot sequence id */
6690 clp->cl_seqid++;
6691 }
6692
6693 return status;
6694}
6695
6696/*
6697 * Issues a CREATE_SESSION operation to the server.
6698 * It is the responsibility of the caller to verify the session is
6699 * expired before calling this routine.
6700 */
848f5bda 6701int nfs4_proc_create_session(struct nfs_client *clp, struct rpc_cred *cred)
fc931582
AA
6702{
6703 int status;
6704 unsigned *ptr;
fc931582
AA
6705 struct nfs4_session *session = clp->cl_session;
6706
6707 dprintk("--> %s clp=%p session=%p\n", __func__, clp, session);
6708
848f5bda 6709 status = _nfs4_proc_create_session(clp, cred);
fc931582
AA
6710 if (status)
6711 goto out;
6712
aacd5537
AA
6713 /* Init or reset the session slot tables */
6714 status = nfs4_setup_session_slot_tables(session);
6715 dprintk("slot table setup returned %d\n", status);
fc931582
AA
6716 if (status)
6717 goto out;
6718
6719 ptr = (unsigned *)&session->sess_id.data[0];
6720 dprintk("%s client>seqid %d sessionid %u:%u:%u:%u\n", __func__,
6721 clp->cl_seqid, ptr[0], ptr[1], ptr[2], ptr[3]);
fc931582
AA
6722out:
6723 dprintk("<-- %s\n", __func__);
6724 return status;
6725}
6726
0f3e66c6
AA
6727/*
6728 * Issue the over-the-wire RPC DESTROY_SESSION.
6729 * The caller must serialize access to this routine.
6730 */
848f5bda
TM
6731int nfs4_proc_destroy_session(struct nfs4_session *session,
6732 struct rpc_cred *cred)
0f3e66c6 6733{
848f5bda
TM
6734 struct rpc_message msg = {
6735 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_SESSION],
6736 .rpc_argp = session,
6737 .rpc_cred = cred,
6738 };
0f3e66c6 6739 int status = 0;
0f3e66c6
AA
6740
6741 dprintk("--> nfs4_proc_destroy_session\n");
6742
6743 /* session is still being setup */
6744 if (session->clp->cl_cons_state != NFS_CS_READY)
6745 return status;
6746
1bd714f2 6747 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c6d01c6f 6748 trace_nfs4_destroy_session(session->clp, status);
0f3e66c6
AA
6749
6750 if (status)
08106ac7 6751 dprintk("NFS: Got error %d from the server on DESTROY_SESSION. "
0f3e66c6
AA
6752 "Session has been destroyed regardless...\n", status);
6753
6754 dprintk("<-- nfs4_proc_destroy_session\n");
6755 return status;
6756}
6757
fc01cea9
AA
6758/*
6759 * Renew the cl_session lease.
6760 */
d5f8d3fe
TM
6761struct nfs4_sequence_data {
6762 struct nfs_client *clp;
6763 struct nfs4_sequence_args args;
6764 struct nfs4_sequence_res res;
6765};
6766
dc96aef9
AB
6767static void nfs41_sequence_release(void *data)
6768{
d5f8d3fe
TM
6769 struct nfs4_sequence_data *calldata = data;
6770 struct nfs_client *clp = calldata->clp;
dc96aef9 6771
7135840f
AB
6772 if (atomic_read(&clp->cl_count) > 1)
6773 nfs4_schedule_state_renewal(clp);
6774 nfs_put_client(clp);
d5f8d3fe 6775 kfree(calldata);
dc96aef9
AB
6776}
6777
aa5190d0
TM
6778static int nfs41_sequence_handle_errors(struct rpc_task *task, struct nfs_client *clp)
6779{
6780 switch(task->tk_status) {
6781 case -NFS4ERR_DELAY:
aa5190d0
TM
6782 rpc_delay(task, NFS4_POLL_RETRY_MAX);
6783 return -EAGAIN;
6784 default:
0400a6b0 6785 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
6786 }
6787 return 0;
6788}
6789
dc96aef9 6790static void nfs41_sequence_call_done(struct rpc_task *task, void *data)
fc01cea9 6791{
d5f8d3fe
TM
6792 struct nfs4_sequence_data *calldata = data;
6793 struct nfs_client *clp = calldata->clp;
fc01cea9 6794
14516c3a
TM
6795 if (!nfs41_sequence_done(task, task->tk_msg.rpc_resp))
6796 return;
fc01cea9 6797
c6d01c6f 6798 trace_nfs4_sequence(clp, task->tk_status);
fc01cea9
AA
6799 if (task->tk_status < 0) {
6800 dprintk("%s ERROR %d\n", __func__, task->tk_status);
7135840f
AB
6801 if (atomic_read(&clp->cl_count) == 1)
6802 goto out;
fc01cea9 6803
aa5190d0
TM
6804 if (nfs41_sequence_handle_errors(task, clp) == -EAGAIN) {
6805 rpc_restart_call_prepare(task);
fc01cea9
AA
6806 return;
6807 }
6808 }
fc01cea9 6809 dprintk("%s rpc_cred %p\n", __func__, task->tk_msg.rpc_cred);
7135840f 6810out:
fc01cea9
AA
6811 dprintk("<-- %s\n", __func__);
6812}
6813
6814static void nfs41_sequence_prepare(struct rpc_task *task, void *data)
6815{
d5f8d3fe
TM
6816 struct nfs4_sequence_data *calldata = data;
6817 struct nfs_client *clp = calldata->clp;
fc01cea9
AA
6818 struct nfs4_sequence_args *args;
6819 struct nfs4_sequence_res *res;
6820
fc01cea9
AA
6821 args = task->tk_msg.rpc_argp;
6822 res = task->tk_msg.rpc_resp;
6823
d9afbd1b 6824 nfs41_setup_sequence(clp->cl_session, args, res, task);
fc01cea9
AA
6825}
6826
6827static const struct rpc_call_ops nfs41_sequence_ops = {
6828 .rpc_call_done = nfs41_sequence_call_done,
6829 .rpc_call_prepare = nfs41_sequence_prepare,
dc96aef9 6830 .rpc_release = nfs41_sequence_release,
fc01cea9
AA
6831};
6832
8fe72bac
TM
6833static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp,
6834 struct rpc_cred *cred,
6835 bool is_privileged)
fc01cea9 6836{
d5f8d3fe 6837 struct nfs4_sequence_data *calldata;
fc01cea9
AA
6838 struct rpc_message msg = {
6839 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE],
6840 .rpc_cred = cred,
6841 };
71ac6da9
TM
6842 struct rpc_task_setup task_setup_data = {
6843 .rpc_client = clp->cl_rpcclient,
6844 .rpc_message = &msg,
8fe72bac 6845 .callback_ops = &nfs41_sequence_ops,
bc7a05ca 6846 .flags = RPC_TASK_ASYNC | RPC_TASK_TIMEOUT,
71ac6da9 6847 };
fc01cea9 6848
7135840f 6849 if (!atomic_inc_not_zero(&clp->cl_count))
71ac6da9 6850 return ERR_PTR(-EIO);
dfb4f309 6851 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
d5f8d3fe 6852 if (calldata == NULL) {
7135840f 6853 nfs_put_client(clp);
71ac6da9 6854 return ERR_PTR(-ENOMEM);
fc01cea9 6855 }
a9c92d6b 6856 nfs4_init_sequence(&calldata->args, &calldata->res, 0);
8fe72bac
TM
6857 if (is_privileged)
6858 nfs4_set_sequence_privileged(&calldata->args);
d5f8d3fe
TM
6859 msg.rpc_argp = &calldata->args;
6860 msg.rpc_resp = &calldata->res;
6861 calldata->clp = clp;
71ac6da9 6862 task_setup_data.callback_data = calldata;
fc01cea9 6863
71ac6da9
TM
6864 return rpc_run_task(&task_setup_data);
6865}
6866
2f60ea6b 6867static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
71ac6da9
TM
6868{
6869 struct rpc_task *task;
6870 int ret = 0;
6871
2f60ea6b
TM
6872 if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
6873 return 0;
8fe72bac 6874 task = _nfs41_proc_sequence(clp, cred, false);
71ac6da9
TM
6875 if (IS_ERR(task))
6876 ret = PTR_ERR(task);
6877 else
bf294b41 6878 rpc_put_task_async(task);
71ac6da9
TM
6879 dprintk("<-- %s status=%d\n", __func__, ret);
6880 return ret;
6881}
6882
6883static int nfs4_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
6884{
6885 struct rpc_task *task;
6886 int ret;
6887
8fe72bac 6888 task = _nfs41_proc_sequence(clp, cred, true);
71ac6da9
TM
6889 if (IS_ERR(task)) {
6890 ret = PTR_ERR(task);
6891 goto out;
6892 }
6893 ret = rpc_wait_for_completion_task(task);
b4410c2f
TM
6894 if (!ret) {
6895 struct nfs4_sequence_res *res = task->tk_msg.rpc_resp;
6896
6897 if (task->tk_status == 0)
6898 nfs41_handle_sequence_flag_errors(clp, res->sr_status_flags);
71ac6da9 6899 ret = task->tk_status;
b4410c2f 6900 }
71ac6da9
TM
6901 rpc_put_task(task);
6902out:
6903 dprintk("<-- %s status=%d\n", __func__, ret);
6904 return ret;
fc01cea9
AA
6905}
6906
fce5c838
RL
6907struct nfs4_reclaim_complete_data {
6908 struct nfs_client *clp;
6909 struct nfs41_reclaim_complete_args arg;
6910 struct nfs41_reclaim_complete_res res;
6911};
6912
6913static void nfs4_reclaim_complete_prepare(struct rpc_task *task, void *data)
6914{
6915 struct nfs4_reclaim_complete_data *calldata = data;
6916
d9afbd1b
TM
6917 nfs41_setup_sequence(calldata->clp->cl_session,
6918 &calldata->arg.seq_args,
6919 &calldata->res.seq_res,
6920 task);
fce5c838
RL
6921}
6922
aa5190d0
TM
6923static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp)
6924{
6925 switch(task->tk_status) {
6926 case 0:
6927 case -NFS4ERR_COMPLETE_ALREADY:
6928 case -NFS4ERR_WRONG_CRED: /* What to do here? */
6929 break;
6930 case -NFS4ERR_DELAY:
aa5190d0 6931 rpc_delay(task, NFS4_POLL_RETRY_MAX);
a8a4ae3a
AA
6932 /* fall through */
6933 case -NFS4ERR_RETRY_UNCACHED_REP:
aa5190d0
TM
6934 return -EAGAIN;
6935 default:
0400a6b0 6936 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
6937 }
6938 return 0;
6939}
6940
fce5c838
RL
6941static void nfs4_reclaim_complete_done(struct rpc_task *task, void *data)
6942{
6943 struct nfs4_reclaim_complete_data *calldata = data;
6944 struct nfs_client *clp = calldata->clp;
6945 struct nfs4_sequence_res *res = &calldata->res.seq_res;
6946
6947 dprintk("--> %s\n", __func__);
14516c3a
TM
6948 if (!nfs41_sequence_done(task, res))
6949 return;
fce5c838 6950
c6d01c6f 6951 trace_nfs4_reclaim_complete(clp, task->tk_status);
aa5190d0
TM
6952 if (nfs41_reclaim_complete_handle_errors(task, clp) == -EAGAIN) {
6953 rpc_restart_call_prepare(task);
6954 return;
6955 }
fce5c838
RL
6956 dprintk("<-- %s\n", __func__);
6957}
6958
6959static void nfs4_free_reclaim_complete_data(void *data)
6960{
6961 struct nfs4_reclaim_complete_data *calldata = data;
6962
6963 kfree(calldata);
6964}
6965
6966static const struct rpc_call_ops nfs4_reclaim_complete_call_ops = {
6967 .rpc_call_prepare = nfs4_reclaim_complete_prepare,
6968 .rpc_call_done = nfs4_reclaim_complete_done,
6969 .rpc_release = nfs4_free_reclaim_complete_data,
6970};
6971
6972/*
6973 * Issue a global reclaim complete.
6974 */
965e9c23
TM
6975static int nfs41_proc_reclaim_complete(struct nfs_client *clp,
6976 struct rpc_cred *cred)
fce5c838
RL
6977{
6978 struct nfs4_reclaim_complete_data *calldata;
6979 struct rpc_task *task;
6980 struct rpc_message msg = {
6981 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE],
965e9c23 6982 .rpc_cred = cred,
fce5c838
RL
6983 };
6984 struct rpc_task_setup task_setup_data = {
6985 .rpc_client = clp->cl_rpcclient,
6986 .rpc_message = &msg,
6987 .callback_ops = &nfs4_reclaim_complete_call_ops,
6988 .flags = RPC_TASK_ASYNC,
6989 };
6990 int status = -ENOMEM;
6991
6992 dprintk("--> %s\n", __func__);
8535b2be 6993 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
fce5c838
RL
6994 if (calldata == NULL)
6995 goto out;
6996 calldata->clp = clp;
6997 calldata->arg.one_fs = 0;
fce5c838 6998
a9c92d6b 6999 nfs4_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 0);
8fe72bac 7000 nfs4_set_sequence_privileged(&calldata->arg.seq_args);
fce5c838
RL
7001 msg.rpc_argp = &calldata->arg;
7002 msg.rpc_resp = &calldata->res;
7003 task_setup_data.callback_data = calldata;
7004 task = rpc_run_task(&task_setup_data);
acf82b85 7005 if (IS_ERR(task)) {
fce5c838 7006 status = PTR_ERR(task);
acf82b85
DC
7007 goto out;
7008 }
c34c32ea
AA
7009 status = nfs4_wait_for_completion_rpc_task(task);
7010 if (status == 0)
7011 status = task->tk_status;
fce5c838 7012 rpc_put_task(task);
acf82b85 7013 return 0;
fce5c838
RL
7014out:
7015 dprintk("<-- %s status=%d\n", __func__, status);
7016 return status;
7017}
b1f69b75
AA
7018
7019static void
7020nfs4_layoutget_prepare(struct rpc_task *task, void *calldata)
7021{
7022 struct nfs4_layoutget *lgp = calldata;
c31663d4 7023 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
6ba7db34 7024 struct nfs4_session *session = nfs4_get_session(server);
b1f69b75
AA
7025
7026 dprintk("--> %s\n", __func__);
c31663d4
FI
7027 /* Note the is a race here, where a CB_LAYOUTRECALL can come in
7028 * right now covering the LAYOUTGET we are about to send.
7029 * However, that is not so catastrophic, and there seems
7030 * to be no way to prevent it completely.
7031 */
6ba7db34 7032 if (nfs41_setup_sequence(session, &lgp->args.seq_args,
9d12b216 7033 &lgp->res.seq_res, task))
b1f69b75 7034 return;
cf7d63f1
FI
7035 if (pnfs_choose_layoutget_stateid(&lgp->args.stateid,
7036 NFS_I(lgp->args.inode)->layout,
7037 lgp->args.ctx->state)) {
7038 rpc_exit(task, NFS4_OK);
cf7d63f1 7039 }
b1f69b75
AA
7040}
7041
7042static void nfs4_layoutget_done(struct rpc_task *task, void *calldata)
7043{
7044 struct nfs4_layoutget *lgp = calldata;
ee314c2a
TM
7045 struct inode *inode = lgp->args.inode;
7046 struct nfs_server *server = NFS_SERVER(inode);
7047 struct pnfs_layout_hdr *lo;
7048 struct nfs4_state *state = NULL;
30005121 7049 unsigned long timeo, giveup;
b1f69b75
AA
7050
7051 dprintk("--> %s\n", __func__);
7052
6ba7db34 7053 if (!nfs41_sequence_done(task, &lgp->res.seq_res))
ee314c2a 7054 goto out;
b1f69b75
AA
7055
7056 switch (task->tk_status) {
7057 case 0:
ee314c2a 7058 goto out;
b1f69b75
AA
7059 case -NFS4ERR_LAYOUTTRYLATER:
7060 case -NFS4ERR_RECALLCONFLICT:
30005121
WAA
7061 timeo = rpc_get_timeout(task->tk_client);
7062 giveup = lgp->args.timestamp + timeo;
7063 if (time_after(giveup, jiffies))
7064 task->tk_status = -NFS4ERR_DELAY;
ee314c2a
TM
7065 break;
7066 case -NFS4ERR_EXPIRED:
7067 case -NFS4ERR_BAD_STATEID:
7068 spin_lock(&inode->i_lock);
7069 lo = NFS_I(inode)->layout;
7070 if (!lo || list_empty(&lo->plh_segs)) {
7071 spin_unlock(&inode->i_lock);
7072 /* If the open stateid was bad, then recover it. */
7073 state = lgp->args.ctx->state;
7074 } else {
7075 LIST_HEAD(head);
7076
7077 pnfs_mark_matching_lsegs_invalid(lo, &head, NULL);
7078 spin_unlock(&inode->i_lock);
7079 /* Mark the bad layout state as invalid, then
7080 * retry using the open stateid. */
7081 pnfs_free_lseg_list(&head);
b1f69b75
AA
7082 }
7083 }
ee314c2a
TM
7084 if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
7085 rpc_restart_call_prepare(task);
7086out:
b1f69b75
AA
7087 dprintk("<-- %s\n", __func__);
7088}
7089
8554116e
IK
7090static size_t max_response_pages(struct nfs_server *server)
7091{
7092 u32 max_resp_sz = server->nfs_client->cl_session->fc_attrs.max_resp_sz;
7093 return nfs_page_array_len(0, max_resp_sz);
7094}
7095
7096static void nfs4_free_pages(struct page **pages, size_t size)
7097{
7098 int i;
7099
7100 if (!pages)
7101 return;
7102
7103 for (i = 0; i < size; i++) {
7104 if (!pages[i])
7105 break;
7106 __free_page(pages[i]);
7107 }
7108 kfree(pages);
7109}
7110
7111static struct page **nfs4_alloc_pages(size_t size, gfp_t gfp_flags)
7112{
7113 struct page **pages;
7114 int i;
7115
7116 pages = kcalloc(size, sizeof(struct page *), gfp_flags);
7117 if (!pages) {
7118 dprintk("%s: can't alloc array of %zu pages\n", __func__, size);
7119 return NULL;
7120 }
7121
7122 for (i = 0; i < size; i++) {
7123 pages[i] = alloc_page(gfp_flags);
7124 if (!pages[i]) {
7125 dprintk("%s: failed to allocate page\n", __func__);
7126 nfs4_free_pages(pages, size);
7127 return NULL;
7128 }
7129 }
7130
7131 return pages;
7132}
7133
b1f69b75
AA
7134static void nfs4_layoutget_release(void *calldata)
7135{
7136 struct nfs4_layoutget *lgp = calldata;
a47970ff
WAA
7137 struct inode *inode = lgp->args.inode;
7138 struct nfs_server *server = NFS_SERVER(inode);
8554116e 7139 size_t max_pages = max_response_pages(server);
b1f69b75
AA
7140
7141 dprintk("--> %s\n", __func__);
8554116e 7142 nfs4_free_pages(lgp->args.layout.pages, max_pages);
a47970ff 7143 pnfs_put_layout_hdr(NFS_I(inode)->layout);
b1f69b75
AA
7144 put_nfs_open_context(lgp->args.ctx);
7145 kfree(calldata);
7146 dprintk("<-- %s\n", __func__);
7147}
7148
7149static const struct rpc_call_ops nfs4_layoutget_call_ops = {
7150 .rpc_call_prepare = nfs4_layoutget_prepare,
7151 .rpc_call_done = nfs4_layoutget_done,
7152 .rpc_release = nfs4_layoutget_release,
7153};
7154
a0b0a6e3
TM
7155struct pnfs_layout_segment *
7156nfs4_proc_layoutget(struct nfs4_layoutget *lgp, gfp_t gfp_flags)
b1f69b75 7157{
a47970ff
WAA
7158 struct inode *inode = lgp->args.inode;
7159 struct nfs_server *server = NFS_SERVER(inode);
8554116e 7160 size_t max_pages = max_response_pages(server);
b1f69b75
AA
7161 struct rpc_task *task;
7162 struct rpc_message msg = {
7163 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTGET],
7164 .rpc_argp = &lgp->args,
7165 .rpc_resp = &lgp->res,
6ab59344 7166 .rpc_cred = lgp->cred,
b1f69b75
AA
7167 };
7168 struct rpc_task_setup task_setup_data = {
7169 .rpc_client = server->client,
7170 .rpc_message = &msg,
7171 .callback_ops = &nfs4_layoutget_call_ops,
7172 .callback_data = lgp,
7173 .flags = RPC_TASK_ASYNC,
7174 };
a0b0a6e3 7175 struct pnfs_layout_segment *lseg = NULL;
b1f69b75
AA
7176 int status = 0;
7177
7178 dprintk("--> %s\n", __func__);
7179
8554116e
IK
7180 lgp->args.layout.pages = nfs4_alloc_pages(max_pages, gfp_flags);
7181 if (!lgp->args.layout.pages) {
7182 nfs4_layoutget_release(lgp);
a0b0a6e3 7183 return ERR_PTR(-ENOMEM);
8554116e
IK
7184 }
7185 lgp->args.layout.pglen = max_pages * PAGE_SIZE;
30005121 7186 lgp->args.timestamp = jiffies;
8554116e 7187
35124a09 7188 lgp->res.layoutp = &lgp->args.layout;
b1f69b75 7189 lgp->res.seq_res.sr_slot = NULL;
a9c92d6b 7190 nfs4_init_sequence(&lgp->args.seq_args, &lgp->res.seq_res, 0);
a47970ff
WAA
7191
7192 /* nfs4_layoutget_release calls pnfs_put_layout_hdr */
7193 pnfs_get_layout_hdr(NFS_I(inode)->layout);
7194
b1f69b75
AA
7195 task = rpc_run_task(&task_setup_data);
7196 if (IS_ERR(task))
a0b0a6e3 7197 return ERR_CAST(task);
b1f69b75 7198 status = nfs4_wait_for_completion_rpc_task(task);
c31663d4
FI
7199 if (status == 0)
7200 status = task->tk_status;
1037e6ea
TM
7201 trace_nfs4_layoutget(lgp->args.ctx,
7202 &lgp->args.range,
7203 &lgp->res.range,
7204 status);
085b7a45
WAA
7205 /* if layoutp->len is 0, nfs4_layoutget_prepare called rpc_exit */
7206 if (status == 0 && lgp->res.layoutp->len)
a0b0a6e3 7207 lseg = pnfs_layout_process(lgp);
b1f69b75
AA
7208 rpc_put_task(task);
7209 dprintk("<-- %s status=%d\n", __func__, status);
a0b0a6e3
TM
7210 if (status)
7211 return ERR_PTR(status);
7212 return lseg;
b1f69b75
AA
7213}
7214
cbe82603
BH
7215static void
7216nfs4_layoutreturn_prepare(struct rpc_task *task, void *calldata)
7217{
7218 struct nfs4_layoutreturn *lrp = calldata;
7219
7220 dprintk("--> %s\n", __func__);
d9afbd1b
TM
7221 nfs41_setup_sequence(lrp->clp->cl_session,
7222 &lrp->args.seq_args,
7223 &lrp->res.seq_res,
7224 task);
cbe82603
BH
7225}
7226
7227static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata)
7228{
7229 struct nfs4_layoutreturn *lrp = calldata;
7230 struct nfs_server *server;
7231
7232 dprintk("--> %s\n", __func__);
7233
6ba7db34 7234 if (!nfs41_sequence_done(task, &lrp->res.seq_res))
cbe82603
BH
7235 return;
7236
7237 server = NFS_SERVER(lrp->args.inode);
7238 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
d00c5d43 7239 rpc_restart_call_prepare(task);
cbe82603
BH
7240 return;
7241 }
cbe82603
BH
7242 dprintk("<-- %s\n", __func__);
7243}
7244
7245static void nfs4_layoutreturn_release(void *calldata)
7246{
7247 struct nfs4_layoutreturn *lrp = calldata;
849b286f 7248 struct pnfs_layout_hdr *lo = lrp->args.layout;
cbe82603
BH
7249
7250 dprintk("--> %s\n", __func__);
849b286f
TM
7251 spin_lock(&lo->plh_inode->i_lock);
7252 if (lrp->res.lrs_present)
7253 pnfs_set_layout_stateid(lo, &lrp->res.stateid, true);
7254 lo->plh_block_lgets--;
7255 spin_unlock(&lo->plh_inode->i_lock);
70c3bd2b 7256 pnfs_put_layout_hdr(lrp->args.layout);
cbe82603
BH
7257 kfree(calldata);
7258 dprintk("<-- %s\n", __func__);
7259}
7260
7261static const struct rpc_call_ops nfs4_layoutreturn_call_ops = {
7262 .rpc_call_prepare = nfs4_layoutreturn_prepare,
7263 .rpc_call_done = nfs4_layoutreturn_done,
7264 .rpc_release = nfs4_layoutreturn_release,
7265};
7266
7267int nfs4_proc_layoutreturn(struct nfs4_layoutreturn *lrp)
7268{
7269 struct rpc_task *task;
7270 struct rpc_message msg = {
7271 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTRETURN],
7272 .rpc_argp = &lrp->args,
7273 .rpc_resp = &lrp->res,
9556000d 7274 .rpc_cred = lrp->cred,
cbe82603
BH
7275 };
7276 struct rpc_task_setup task_setup_data = {
1771c577 7277 .rpc_client = NFS_SERVER(lrp->args.inode)->client,
cbe82603
BH
7278 .rpc_message = &msg,
7279 .callback_ops = &nfs4_layoutreturn_call_ops,
7280 .callback_data = lrp,
7281 };
7282 int status;
7283
7284 dprintk("--> %s\n", __func__);
a9c92d6b 7285 nfs4_init_sequence(&lrp->args.seq_args, &lrp->res.seq_res, 1);
cbe82603
BH
7286 task = rpc_run_task(&task_setup_data);
7287 if (IS_ERR(task))
7288 return PTR_ERR(task);
7289 status = task->tk_status;
1037e6ea 7290 trace_nfs4_layoutreturn(lrp->args.inode, status);
cbe82603
BH
7291 dprintk("<-- %s status=%d\n", __func__, status);
7292 rpc_put_task(task);
7293 return status;
7294}
7295
7f11d8d3
AA
7296/*
7297 * Retrieve the list of Data Server devices from the MDS.
7298 */
7299static int _nfs4_getdevicelist(struct nfs_server *server,
7300 const struct nfs_fh *fh,
7301 struct pnfs_devicelist *devlist)
7302{
7303 struct nfs4_getdevicelist_args args = {
7304 .fh = fh,
7305 .layoutclass = server->pnfs_curr_ld->id,
7306 };
7307 struct nfs4_getdevicelist_res res = {
7308 .devlist = devlist,
7309 };
7310 struct rpc_message msg = {
7311 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICELIST],
7312 .rpc_argp = &args,
7313 .rpc_resp = &res,
7314 };
7315 int status;
7316
7317 dprintk("--> %s\n", __func__);
7318 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args,
7319 &res.seq_res, 0);
7320 dprintk("<-- %s status=%d\n", __func__, status);
7321 return status;
7322}
7323
7324int nfs4_proc_getdevicelist(struct nfs_server *server,
7325 const struct nfs_fh *fh,
7326 struct pnfs_devicelist *devlist)
7327{
7328 struct nfs4_exception exception = { };
7329 int err;
7330
7331 do {
7332 err = nfs4_handle_exception(server,
7333 _nfs4_getdevicelist(server, fh, devlist),
7334 &exception);
7335 } while (exception.retry);
7336
7337 dprintk("%s: err=%d, num_devs=%u\n", __func__,
7338 err, devlist->num_devs);
7339
7340 return err;
7341}
7342EXPORT_SYMBOL_GPL(nfs4_proc_getdevicelist);
7343
b1f69b75 7344static int
cd5875fe
TM
7345_nfs4_proc_getdeviceinfo(struct nfs_server *server,
7346 struct pnfs_device *pdev,
7347 struct rpc_cred *cred)
b1f69b75
AA
7348{
7349 struct nfs4_getdeviceinfo_args args = {
7350 .pdev = pdev,
7351 };
7352 struct nfs4_getdeviceinfo_res res = {
7353 .pdev = pdev,
7354 };
7355 struct rpc_message msg = {
7356 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO],
7357 .rpc_argp = &args,
7358 .rpc_resp = &res,
cd5875fe 7359 .rpc_cred = cred,
b1f69b75
AA
7360 };
7361 int status;
7362
7363 dprintk("--> %s\n", __func__);
7c513058 7364 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
b1f69b75
AA
7365 dprintk("<-- %s status=%d\n", __func__, status);
7366
7367 return status;
7368}
7369
cd5875fe
TM
7370int nfs4_proc_getdeviceinfo(struct nfs_server *server,
7371 struct pnfs_device *pdev,
7372 struct rpc_cred *cred)
b1f69b75
AA
7373{
7374 struct nfs4_exception exception = { };
7375 int err;
7376
7377 do {
7378 err = nfs4_handle_exception(server,
cd5875fe 7379 _nfs4_proc_getdeviceinfo(server, pdev, cred),
b1f69b75
AA
7380 &exception);
7381 } while (exception.retry);
7382 return err;
7383}
7384EXPORT_SYMBOL_GPL(nfs4_proc_getdeviceinfo);
7385
863a3c6c
AA
7386static void nfs4_layoutcommit_prepare(struct rpc_task *task, void *calldata)
7387{
7388 struct nfs4_layoutcommit_data *data = calldata;
7389 struct nfs_server *server = NFS_SERVER(data->args.inode);
6ba7db34 7390 struct nfs4_session *session = nfs4_get_session(server);
863a3c6c 7391
d9afbd1b
TM
7392 nfs41_setup_sequence(session,
7393 &data->args.seq_args,
7394 &data->res.seq_res,
7395 task);
863a3c6c
AA
7396}
7397
7398static void
7399nfs4_layoutcommit_done(struct rpc_task *task, void *calldata)
7400{
7401 struct nfs4_layoutcommit_data *data = calldata;
7402 struct nfs_server *server = NFS_SERVER(data->args.inode);
7403
6ba7db34 7404 if (!nfs41_sequence_done(task, &data->res.seq_res))
863a3c6c
AA
7405 return;
7406
7407 switch (task->tk_status) { /* Just ignore these failures */
e59d27e0
TM
7408 case -NFS4ERR_DELEG_REVOKED: /* layout was recalled */
7409 case -NFS4ERR_BADIOMODE: /* no IOMODE_RW layout for range */
7410 case -NFS4ERR_BADLAYOUT: /* no layout */
7411 case -NFS4ERR_GRACE: /* loca_recalim always false */
863a3c6c 7412 task->tk_status = 0;
e59d27e0
TM
7413 break;
7414 case 0:
863a3c6c
AA
7415 nfs_post_op_update_inode_force_wcc(data->args.inode,
7416 data->res.fattr);
e59d27e0
TM
7417 break;
7418 default:
7419 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
7420 rpc_restart_call_prepare(task);
7421 return;
7422 }
7423 }
863a3c6c
AA
7424}
7425
7426static void nfs4_layoutcommit_release(void *calldata)
7427{
7428 struct nfs4_layoutcommit_data *data = calldata;
7429
db29c089 7430 pnfs_cleanup_layoutcommit(data);
863a3c6c
AA
7431 put_rpccred(data->cred);
7432 kfree(data);
7433}
7434
7435static const struct rpc_call_ops nfs4_layoutcommit_ops = {
7436 .rpc_call_prepare = nfs4_layoutcommit_prepare,
7437 .rpc_call_done = nfs4_layoutcommit_done,
7438 .rpc_release = nfs4_layoutcommit_release,
7439};
7440
7441int
ef311537 7442nfs4_proc_layoutcommit(struct nfs4_layoutcommit_data *data, bool sync)
863a3c6c
AA
7443{
7444 struct rpc_message msg = {
7445 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTCOMMIT],
7446 .rpc_argp = &data->args,
7447 .rpc_resp = &data->res,
7448 .rpc_cred = data->cred,
7449 };
7450 struct rpc_task_setup task_setup_data = {
7451 .task = &data->task,
7452 .rpc_client = NFS_CLIENT(data->args.inode),
7453 .rpc_message = &msg,
7454 .callback_ops = &nfs4_layoutcommit_ops,
7455 .callback_data = data,
7456 .flags = RPC_TASK_ASYNC,
7457 };
7458 struct rpc_task *task;
7459 int status = 0;
7460
7461 dprintk("NFS: %4d initiating layoutcommit call. sync %d "
7462 "lbw: %llu inode %lu\n",
7463 data->task.tk_pid, sync,
7464 data->args.lastbytewritten,
7465 data->args.inode->i_ino);
7466
a9c92d6b 7467 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
863a3c6c
AA
7468 task = rpc_run_task(&task_setup_data);
7469 if (IS_ERR(task))
7470 return PTR_ERR(task);
ef311537 7471 if (sync == false)
863a3c6c
AA
7472 goto out;
7473 status = nfs4_wait_for_completion_rpc_task(task);
7474 if (status != 0)
7475 goto out;
7476 status = task->tk_status;
1037e6ea 7477 trace_nfs4_layoutcommit(data->args.inode, status);
863a3c6c
AA
7478out:
7479 dprintk("%s: status %d\n", __func__, status);
7480 rpc_put_task(task);
7481 return status;
7482}
fca78d6d 7483
97431204
AA
7484/**
7485 * Use the state managment nfs_client cl_rpcclient, which uses krb5i (if
7486 * possible) as per RFC3530bis and RFC5661 Security Considerations sections
7487 */
fca78d6d
BS
7488static int
7489_nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
b1b3e136
WAA
7490 struct nfs_fsinfo *info,
7491 struct nfs4_secinfo_flavors *flavors, bool use_integrity)
fca78d6d
BS
7492{
7493 struct nfs41_secinfo_no_name_args args = {
7494 .style = SECINFO_STYLE_CURRENT_FH,
7495 };
7496 struct nfs4_secinfo_res res = {
7497 .flavors = flavors,
7498 };
7499 struct rpc_message msg = {
7500 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO_NO_NAME],
7501 .rpc_argp = &args,
7502 .rpc_resp = &res,
7503 };
b1b3e136 7504 struct rpc_clnt *clnt = server->client;
7cb852df 7505 struct rpc_cred *cred = NULL;
b1b3e136
WAA
7506 int status;
7507
7508 if (use_integrity) {
7509 clnt = server->nfs_client->cl_rpcclient;
7cb852df
WAA
7510 cred = nfs4_get_clid_cred(server->nfs_client);
7511 msg.rpc_cred = cred;
b1b3e136
WAA
7512 }
7513
7514 dprintk("--> %s\n", __func__);
7515 status = nfs4_call_sync(clnt, server, &msg, &args.seq_args,
7516 &res.seq_res, 0);
7517 dprintk("<-- %s status=%d\n", __func__, status);
7518
7cb852df
WAA
7519 if (cred)
7520 put_rpccred(cred);
b1b3e136
WAA
7521
7522 return status;
fca78d6d
BS
7523}
7524
7525static int
7526nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
7527 struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
7528{
7529 struct nfs4_exception exception = { };
7530 int err;
7531 do {
b1b3e136
WAA
7532 /* first try using integrity protection */
7533 err = -NFS4ERR_WRONGSEC;
7534
7535 /* try to use integrity protection with machine cred */
7536 if (_nfs4_is_integrity_protected(server->nfs_client))
7537 err = _nfs41_proc_secinfo_no_name(server, fhandle, info,
7538 flavors, true);
7539
7540 /*
7541 * if unable to use integrity protection, or SECINFO with
7542 * integrity protection returns NFS4ERR_WRONGSEC (which is
7543 * disallowed by spec, but exists in deployed servers) use
7544 * the current filesystem's rpc_client and the user cred.
7545 */
7546 if (err == -NFS4ERR_WRONGSEC)
7547 err = _nfs41_proc_secinfo_no_name(server, fhandle, info,
7548 flavors, false);
7549
fca78d6d
BS
7550 switch (err) {
7551 case 0:
7552 case -NFS4ERR_WRONGSEC:
7553 case -NFS4ERR_NOTSUPP:
05e9cfb4 7554 goto out;
fca78d6d
BS
7555 default:
7556 err = nfs4_handle_exception(server, err, &exception);
7557 }
7558 } while (exception.retry);
05e9cfb4 7559out:
fca78d6d
BS
7560 return err;
7561}
7562
7563static int
7564nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
7565 struct nfs_fsinfo *info)
7566{
7567 int err;
7568 struct page *page;
367156d9 7569 rpc_authflavor_t flavor = RPC_AUTH_MAXFLAVOR;
fca78d6d 7570 struct nfs4_secinfo_flavors *flavors;
58a8cf12
WAA
7571 struct nfs4_secinfo4 *secinfo;
7572 int i;
fca78d6d
BS
7573
7574 page = alloc_page(GFP_KERNEL);
7575 if (!page) {
7576 err = -ENOMEM;
7577 goto out;
7578 }
7579
7580 flavors = page_address(page);
7581 err = nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
7582
7583 /*
7584 * Fall back on "guess and check" method if
7585 * the server doesn't support SECINFO_NO_NAME
7586 */
7587 if (err == -NFS4ERR_WRONGSEC || err == -NFS4ERR_NOTSUPP) {
7588 err = nfs4_find_root_sec(server, fhandle, info);
7589 goto out_freepage;
7590 }
7591 if (err)
7592 goto out_freepage;
7593
58a8cf12
WAA
7594 for (i = 0; i < flavors->num_flavors; i++) {
7595 secinfo = &flavors->flavors[i];
7596
7597 switch (secinfo->flavor) {
7598 case RPC_AUTH_NULL:
7599 case RPC_AUTH_UNIX:
7600 case RPC_AUTH_GSS:
7601 flavor = rpcauth_get_pseudoflavor(secinfo->flavor,
7602 &secinfo->flavor_info);
7603 break;
7604 default:
7605 flavor = RPC_AUTH_MAXFLAVOR;
7606 break;
7607 }
7608
7609 if (flavor != RPC_AUTH_MAXFLAVOR) {
7610 err = nfs4_lookup_root_sec(server, fhandle,
7611 info, flavor);
7612 if (!err)
7613 break;
7614 }
7615 }
7616
7617 if (flavor == RPC_AUTH_MAXFLAVOR)
7618 err = -EPERM;
fca78d6d
BS
7619
7620out_freepage:
7621 put_page(page);
7622 if (err == -EACCES)
7623 return -EPERM;
7624out:
7625 return err;
7626}
1cab0652 7627
ab7cb0df
TM
7628static int _nfs41_test_stateid(struct nfs_server *server,
7629 nfs4_stateid *stateid,
7630 struct rpc_cred *cred)
7d974794
BS
7631{
7632 int status;
7633 struct nfs41_test_stateid_args args = {
1cab0652 7634 .stateid = stateid,
7d974794
BS
7635 };
7636 struct nfs41_test_stateid_res res;
7637 struct rpc_message msg = {
7638 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_TEST_STATEID],
7639 .rpc_argp = &args,
7640 .rpc_resp = &res,
ab7cb0df 7641 .rpc_cred = cred,
7d974794 7642 };
3787d506
WAA
7643 struct rpc_clnt *rpc_client = server->client;
7644
7645 nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_STATEID,
7646 &rpc_client, &msg);
1cab0652 7647
38527b15 7648 dprintk("NFS call test_stateid %p\n", stateid);
a9c92d6b 7649 nfs4_init_sequence(&args.seq_args, &res.seq_res, 0);
8fe72bac 7650 nfs4_set_sequence_privileged(&args.seq_args);
3787d506 7651 status = nfs4_call_sync_sequence(rpc_client, server, &msg,
8fe72bac 7652 &args.seq_args, &res.seq_res);
38527b15
CL
7653 if (status != NFS_OK) {
7654 dprintk("NFS reply test_stateid: failed, %d\n", status);
377e507d 7655 return status;
38527b15
CL
7656 }
7657 dprintk("NFS reply test_stateid: succeeded, %d\n", -res.status);
377e507d 7658 return -res.status;
7d974794
BS
7659}
7660
38527b15
CL
7661/**
7662 * nfs41_test_stateid - perform a TEST_STATEID operation
7663 *
7664 * @server: server / transport on which to perform the operation
7665 * @stateid: state ID to test
ab7cb0df 7666 * @cred: credential
38527b15
CL
7667 *
7668 * Returns NFS_OK if the server recognizes that "stateid" is valid.
7669 * Otherwise a negative NFS4ERR value is returned if the operation
7670 * failed or the state ID is not currently valid.
7671 */
ab7cb0df
TM
7672static int nfs41_test_stateid(struct nfs_server *server,
7673 nfs4_stateid *stateid,
7674 struct rpc_cred *cred)
7d974794
BS
7675{
7676 struct nfs4_exception exception = { };
7677 int err;
7678 do {
ab7cb0df 7679 err = _nfs41_test_stateid(server, stateid, cred);
377e507d
CL
7680 if (err != -NFS4ERR_DELAY)
7681 break;
7682 nfs4_handle_exception(server, err, &exception);
7d974794
BS
7683 } while (exception.retry);
7684 return err;
7685}
9aeda35f 7686
7c1d5fae
TM
7687struct nfs_free_stateid_data {
7688 struct nfs_server *server;
7689 struct nfs41_free_stateid_args args;
9aeda35f 7690 struct nfs41_free_stateid_res res;
7c1d5fae
TM
7691};
7692
7693static void nfs41_free_stateid_prepare(struct rpc_task *task, void *calldata)
7694{
7695 struct nfs_free_stateid_data *data = calldata;
7696 nfs41_setup_sequence(nfs4_get_session(data->server),
7697 &data->args.seq_args,
7698 &data->res.seq_res,
7699 task);
7700}
7701
7702static void nfs41_free_stateid_done(struct rpc_task *task, void *calldata)
7703{
7704 struct nfs_free_stateid_data *data = calldata;
7705
7706 nfs41_sequence_done(task, &data->res.seq_res);
7707
7708 switch (task->tk_status) {
7709 case -NFS4ERR_DELAY:
7710 if (nfs4_async_handle_error(task, data->server, NULL) == -EAGAIN)
7711 rpc_restart_call_prepare(task);
7712 }
7713}
7714
7715static void nfs41_free_stateid_release(void *calldata)
7716{
7717 kfree(calldata);
7718}
7719
17f26b12 7720static const struct rpc_call_ops nfs41_free_stateid_ops = {
7c1d5fae
TM
7721 .rpc_call_prepare = nfs41_free_stateid_prepare,
7722 .rpc_call_done = nfs41_free_stateid_done,
7723 .rpc_release = nfs41_free_stateid_release,
7724};
7725
7726static struct rpc_task *_nfs41_free_stateid(struct nfs_server *server,
7727 nfs4_stateid *stateid,
ab7cb0df 7728 struct rpc_cred *cred,
7c1d5fae
TM
7729 bool privileged)
7730{
9aeda35f
BS
7731 struct rpc_message msg = {
7732 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID],
ab7cb0df 7733 .rpc_cred = cred,
9aeda35f 7734 };
7c1d5fae
TM
7735 struct rpc_task_setup task_setup = {
7736 .rpc_client = server->client,
7737 .rpc_message = &msg,
7738 .callback_ops = &nfs41_free_stateid_ops,
7739 .flags = RPC_TASK_ASYNC,
7740 };
7741 struct nfs_free_stateid_data *data;
9aeda35f 7742
3787d506
WAA
7743 nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_STATEID,
7744 &task_setup.rpc_client, &msg);
7745
38527b15 7746 dprintk("NFS call free_stateid %p\n", stateid);
7c1d5fae
TM
7747 data = kmalloc(sizeof(*data), GFP_NOFS);
7748 if (!data)
7749 return ERR_PTR(-ENOMEM);
7750 data->server = server;
7751 nfs4_stateid_copy(&data->args.stateid, stateid);
7752
7753 task_setup.callback_data = data;
7754
7755 msg.rpc_argp = &data->args;
7756 msg.rpc_resp = &data->res;
a9c92d6b 7757 nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 0);
7c1d5fae
TM
7758 if (privileged)
7759 nfs4_set_sequence_privileged(&data->args.seq_args);
7760
7761 return rpc_run_task(&task_setup);
9aeda35f
BS
7762}
7763
38527b15
CL
7764/**
7765 * nfs41_free_stateid - perform a FREE_STATEID operation
7766 *
7767 * @server: server / transport on which to perform the operation
7768 * @stateid: state ID to release
ab7cb0df 7769 * @cred: credential
38527b15
CL
7770 *
7771 * Returns NFS_OK if the server freed "stateid". Otherwise a
7772 * negative NFS4ERR value is returned.
7773 */
ab7cb0df
TM
7774static int nfs41_free_stateid(struct nfs_server *server,
7775 nfs4_stateid *stateid,
7776 struct rpc_cred *cred)
9aeda35f 7777{
7c1d5fae
TM
7778 struct rpc_task *task;
7779 int ret;
7780
ab7cb0df 7781 task = _nfs41_free_stateid(server, stateid, cred, true);
7c1d5fae
TM
7782 if (IS_ERR(task))
7783 return PTR_ERR(task);
7784 ret = rpc_wait_for_completion_task(task);
7785 if (!ret)
7786 ret = task->tk_status;
7787 rpc_put_task(task);
7788 return ret;
9aeda35f 7789}
36281caa 7790
c8b2d0bf
TM
7791static int nfs41_free_lock_state(struct nfs_server *server, struct nfs4_lock_state *lsp)
7792{
7793 struct rpc_task *task;
ab7cb0df 7794 struct rpc_cred *cred = lsp->ls_state->owner->so_cred;
c8b2d0bf 7795
ab7cb0df 7796 task = _nfs41_free_stateid(server, &lsp->ls_stateid, cred, false);
c8b2d0bf
TM
7797 nfs4_free_lock_state(server, lsp);
7798 if (IS_ERR(task))
7799 return PTR_ERR(task);
7800 rpc_put_task(task);
7801 return 0;
7802}
7803
36281caa
TM
7804static bool nfs41_match_stateid(const nfs4_stateid *s1,
7805 const nfs4_stateid *s2)
7806{
2d2f24ad 7807 if (memcmp(s1->other, s2->other, sizeof(s1->other)) != 0)
36281caa
TM
7808 return false;
7809
2d2f24ad 7810 if (s1->seqid == s2->seqid)
36281caa 7811 return true;
2d2f24ad 7812 if (s1->seqid == 0 || s2->seqid == 0)
36281caa
TM
7813 return true;
7814
7815 return false;
7816}
7817
557134a3
AA
7818#endif /* CONFIG_NFS_V4_1 */
7819
36281caa
TM
7820static bool nfs4_match_stateid(const nfs4_stateid *s1,
7821 const nfs4_stateid *s2)
7822{
f597c537 7823 return nfs4_stateid_match(s1, s2);
36281caa
TM
7824}
7825
7826
17280175 7827static const struct nfs4_state_recovery_ops nfs40_reboot_recovery_ops = {
7eff03ae 7828 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
b79a4a1b 7829 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
1da177e4
LT
7830 .recover_open = nfs4_open_reclaim,
7831 .recover_lock = nfs4_lock_reclaim,
591d71cb 7832 .establish_clid = nfs4_init_clientid,
05f4c350 7833 .detect_trunking = nfs40_discover_server_trunking,
1da177e4
LT
7834};
7835
591d71cb 7836#if defined(CONFIG_NFS_V4_1)
17280175 7837static const struct nfs4_state_recovery_ops nfs41_reboot_recovery_ops = {
591d71cb
AA
7838 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
7839 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
7840 .recover_open = nfs4_open_reclaim,
7841 .recover_lock = nfs4_lock_reclaim,
4d643d1d 7842 .establish_clid = nfs41_init_clientid,
fce5c838 7843 .reclaim_complete = nfs41_proc_reclaim_complete,
05f4c350 7844 .detect_trunking = nfs41_discover_server_trunking,
591d71cb
AA
7845};
7846#endif /* CONFIG_NFS_V4_1 */
7847
17280175 7848static const struct nfs4_state_recovery_ops nfs40_nograce_recovery_ops = {
591d71cb
AA
7849 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
7850 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
7851 .recover_open = nfs4_open_expired,
7852 .recover_lock = nfs4_lock_expired,
7853 .establish_clid = nfs4_init_clientid,
7854};
7855
7856#if defined(CONFIG_NFS_V4_1)
17280175 7857static const struct nfs4_state_recovery_ops nfs41_nograce_recovery_ops = {
7eff03ae 7858 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
b79a4a1b 7859 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
f062eb6c
BS
7860 .recover_open = nfs41_open_expired,
7861 .recover_lock = nfs41_lock_expired,
4d643d1d 7862 .establish_clid = nfs41_init_clientid,
1da177e4 7863};
591d71cb 7864#endif /* CONFIG_NFS_V4_1 */
1da177e4 7865
17280175 7866static const struct nfs4_state_maintenance_ops nfs40_state_renewal_ops = {
29fba38b 7867 .sched_state_renewal = nfs4_proc_async_renew,
a7b72103 7868 .get_state_renewal_cred_locked = nfs4_get_renew_cred_locked,
8e69514f 7869 .renew_lease = nfs4_proc_renew,
29fba38b
BH
7870};
7871
7872#if defined(CONFIG_NFS_V4_1)
17280175 7873static const struct nfs4_state_maintenance_ops nfs41_state_renewal_ops = {
29fba38b 7874 .sched_state_renewal = nfs41_proc_async_sequence,
a7b72103 7875 .get_state_renewal_cred_locked = nfs4_get_machine_cred_locked,
8e69514f 7876 .renew_lease = nfs4_proc_sequence,
29fba38b
BH
7877};
7878#endif
7879
97dc1359
TM
7880static const struct nfs4_minor_version_ops nfs_v4_0_minor_ops = {
7881 .minor_version = 0,
39c6daae
TM
7882 .init_caps = NFS_CAP_READDIRPLUS
7883 | NFS_CAP_ATOMIC_OPEN
7884 | NFS_CAP_CHANGE_ATTR
7885 | NFS_CAP_POSIX_LOCK,
abf79bb3
CL
7886 .init_client = nfs40_init_client,
7887 .shutdown_client = nfs40_shutdown_client,
36281caa 7888 .match_stateid = nfs4_match_stateid,
fca78d6d 7889 .find_root_sec = nfs4_find_root_sec,
c8b2d0bf 7890 .free_lock_state = nfs4_release_lockowner,
9915ea7e 7891 .call_sync_ops = &nfs40_call_sync_ops,
c48f4f35
TM
7892 .reboot_recovery_ops = &nfs40_reboot_recovery_ops,
7893 .nograce_recovery_ops = &nfs40_nograce_recovery_ops,
7894 .state_renewal_ops = &nfs40_state_renewal_ops,
97dc1359
TM
7895};
7896
7897#if defined(CONFIG_NFS_V4_1)
7898static const struct nfs4_minor_version_ops nfs_v4_1_minor_ops = {
7899 .minor_version = 1,
39c6daae
TM
7900 .init_caps = NFS_CAP_READDIRPLUS
7901 | NFS_CAP_ATOMIC_OPEN
7902 | NFS_CAP_CHANGE_ATTR
3b66486c 7903 | NFS_CAP_POSIX_LOCK
49f9a0fa
TM
7904 | NFS_CAP_STATEID_NFSV41
7905 | NFS_CAP_ATOMIC_OPEN_V1,
abf79bb3
CL
7906 .init_client = nfs41_init_client,
7907 .shutdown_client = nfs41_shutdown_client,
36281caa 7908 .match_stateid = nfs41_match_stateid,
fca78d6d 7909 .find_root_sec = nfs41_find_root_sec,
c8b2d0bf 7910 .free_lock_state = nfs41_free_lock_state,
9915ea7e 7911 .call_sync_ops = &nfs41_call_sync_ops,
c48f4f35
TM
7912 .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
7913 .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
7914 .state_renewal_ops = &nfs41_state_renewal_ops,
97dc1359
TM
7915};
7916#endif
7917
42c2c424
SD
7918#if defined(CONFIG_NFS_V4_2)
7919static const struct nfs4_minor_version_ops nfs_v4_2_minor_ops = {
7920 .minor_version = 2,
7017310a
BS
7921 .init_caps = NFS_CAP_READDIRPLUS
7922 | NFS_CAP_ATOMIC_OPEN
7923 | NFS_CAP_CHANGE_ATTR
7924 | NFS_CAP_POSIX_LOCK
7925 | NFS_CAP_STATEID_NFSV41
7926 | NFS_CAP_ATOMIC_OPEN_V1,
abf79bb3
CL
7927 .init_client = nfs41_init_client,
7928 .shutdown_client = nfs41_shutdown_client,
42c2c424
SD
7929 .match_stateid = nfs41_match_stateid,
7930 .find_root_sec = nfs41_find_root_sec,
7017310a 7931 .free_lock_state = nfs41_free_lock_state,
9915ea7e 7932 .call_sync_ops = &nfs41_call_sync_ops,
42c2c424
SD
7933 .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
7934 .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
7935 .state_renewal_ops = &nfs41_state_renewal_ops,
7936};
7937#endif
7938
97dc1359
TM
7939const struct nfs4_minor_version_ops *nfs_v4_minor_ops[] = {
7940 [0] = &nfs_v4_0_minor_ops,
7941#if defined(CONFIG_NFS_V4_1)
7942 [1] = &nfs_v4_1_minor_ops,
7943#endif
42c2c424
SD
7944#if defined(CONFIG_NFS_V4_2)
7945 [2] = &nfs_v4_2_minor_ops,
7946#endif
97dc1359
TM
7947};
7948
17f26b12 7949static const struct inode_operations nfs4_dir_inode_operations = {
73a79706
BS
7950 .create = nfs_create,
7951 .lookup = nfs_lookup,
7952 .atomic_open = nfs_atomic_open,
7953 .link = nfs_link,
7954 .unlink = nfs_unlink,
7955 .symlink = nfs_symlink,
7956 .mkdir = nfs_mkdir,
7957 .rmdir = nfs_rmdir,
7958 .mknod = nfs_mknod,
7959 .rename = nfs_rename,
7960 .permission = nfs_permission,
7961 .getattr = nfs_getattr,
7962 .setattr = nfs_setattr,
7963 .getxattr = generic_getxattr,
7964 .setxattr = generic_setxattr,
7965 .listxattr = generic_listxattr,
7966 .removexattr = generic_removexattr,
7967};
7968
92e1d5be 7969static const struct inode_operations nfs4_file_inode_operations = {
6b3b5496
BF
7970 .permission = nfs_permission,
7971 .getattr = nfs_getattr,
7972 .setattr = nfs_setattr,
64c2ce8b
AK
7973 .getxattr = generic_getxattr,
7974 .setxattr = generic_setxattr,
7975 .listxattr = generic_listxattr,
7976 .removexattr = generic_removexattr,
6b3b5496
BF
7977};
7978
509de811 7979const struct nfs_rpc_ops nfs_v4_clientops = {
1da177e4
LT
7980 .version = 4, /* protocol version */
7981 .dentry_ops = &nfs4_dentry_operations,
7982 .dir_inode_ops = &nfs4_dir_inode_operations,
6b3b5496 7983 .file_inode_ops = &nfs4_file_inode_operations,
1788ea6e 7984 .file_ops = &nfs4_file_operations,
1da177e4 7985 .getroot = nfs4_proc_get_root,
281cad46 7986 .submount = nfs4_submount,
ff9099f2 7987 .try_mount = nfs4_try_mount,
1da177e4
LT
7988 .getattr = nfs4_proc_getattr,
7989 .setattr = nfs4_proc_setattr,
7990 .lookup = nfs4_proc_lookup,
7991 .access = nfs4_proc_access,
7992 .readlink = nfs4_proc_readlink,
1da177e4
LT
7993 .create = nfs4_proc_create,
7994 .remove = nfs4_proc_remove,
7995 .unlink_setup = nfs4_proc_unlink_setup,
34e137cc 7996 .unlink_rpc_prepare = nfs4_proc_unlink_rpc_prepare,
1da177e4
LT
7997 .unlink_done = nfs4_proc_unlink_done,
7998 .rename = nfs4_proc_rename,
d3d4152a 7999 .rename_setup = nfs4_proc_rename_setup,
c6bfa1a1 8000 .rename_rpc_prepare = nfs4_proc_rename_rpc_prepare,
d3d4152a 8001 .rename_done = nfs4_proc_rename_done,
1da177e4
LT
8002 .link = nfs4_proc_link,
8003 .symlink = nfs4_proc_symlink,
8004 .mkdir = nfs4_proc_mkdir,
8005 .rmdir = nfs4_proc_remove,
8006 .readdir = nfs4_proc_readdir,
8007 .mknod = nfs4_proc_mknod,
8008 .statfs = nfs4_proc_statfs,
8009 .fsinfo = nfs4_proc_fsinfo,
8010 .pathconf = nfs4_proc_pathconf,
e9326dca 8011 .set_capabilities = nfs4_server_capabilities,
1da177e4
LT
8012 .decode_dirent = nfs4_decode_dirent,
8013 .read_setup = nfs4_proc_read_setup,
1abb5088 8014 .read_pageio_init = pnfs_pageio_init_read,
ea7c3303 8015 .read_rpc_prepare = nfs4_proc_read_rpc_prepare,
ec06c096 8016 .read_done = nfs4_read_done,
1da177e4 8017 .write_setup = nfs4_proc_write_setup,
57208fa7 8018 .write_pageio_init = pnfs_pageio_init_write,
c6cb80d0 8019 .write_rpc_prepare = nfs4_proc_write_rpc_prepare,
788e7a89 8020 .write_done = nfs4_write_done,
1da177e4 8021 .commit_setup = nfs4_proc_commit_setup,
0b7c0153 8022 .commit_rpc_prepare = nfs4_proc_commit_rpc_prepare,
788e7a89 8023 .commit_done = nfs4_commit_done,
1da177e4 8024 .lock = nfs4_proc_lock,
e50a1c2e 8025 .clear_acl_cache = nfs4_zap_acl_attr,
7fe5c398 8026 .close_context = nfs4_close_context,
2b484297 8027 .open_context = nfs4_atomic_open,
011e2a7f 8028 .have_delegation = nfs4_have_delegation,
57ec14c5 8029 .return_delegation = nfs4_inode_return_delegation,
6663ee7f 8030 .alloc_client = nfs4_alloc_client,
45a52a02 8031 .init_client = nfs4_init_client,
cdb7eced 8032 .free_client = nfs4_free_client,
1179acc6
BS
8033 .create_server = nfs4_create_server,
8034 .clone_server = nfs_clone_server,
1da177e4
LT
8035};
8036
64c2ce8b
AK
8037static const struct xattr_handler nfs4_xattr_nfs4_acl_handler = {
8038 .prefix = XATTR_NAME_NFSV4_ACL,
8039 .list = nfs4_xattr_list_nfs4_acl,
8040 .get = nfs4_xattr_get_nfs4_acl,
8041 .set = nfs4_xattr_set_nfs4_acl,
8042};
8043
8044const struct xattr_handler *nfs4_xattr_handlers[] = {
8045 &nfs4_xattr_nfs4_acl_handler,
c9bccef6
DQ
8046#ifdef CONFIG_NFS_V4_SECURITY_LABEL
8047 &nfs4_xattr_nfs4_label_handler,
8048#endif
64c2ce8b
AK
8049 NULL
8050};
8051
1da177e4
LT
8052/*
8053 * Local variables:
8054 * c-basic-offset: 8
8055 * End:
8056 */