NFSv4: set the delegation in nfs4_opendata_to_nfs4_state
[linux-2.6-block.git] / fs / nfs / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfs/nfs4proc.c
3 *
4 * Client-side procedure declarations for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#include <linux/mm.h>
39#include <linux/utsname.h>
40#include <linux/delay.h>
41#include <linux/errno.h>
42#include <linux/string.h>
43#include <linux/sunrpc/clnt.h>
44#include <linux/nfs.h>
45#include <linux/nfs4.h>
46#include <linux/nfs_fs.h>
47#include <linux/nfs_page.h>
48#include <linux/smp_lock.h>
49#include <linux/namei.h>
02a913a7 50#include <linux/mount.h>
1da177e4 51
4ce79717 52#include "nfs4_fs.h"
1da177e4 53#include "delegation.h"
006ea73e 54#include "iostat.h"
1da177e4
LT
55
56#define NFSDBG_FACILITY NFSDBG_PROC
57
2066fe89 58#define NFS4_POLL_RETRY_MIN (HZ/10)
1da177e4
LT
59#define NFS4_POLL_RETRY_MAX (15*HZ)
60
cdd4e68b 61struct nfs4_opendata;
864472e9 62static int _nfs4_proc_open(struct nfs4_opendata *data);
1da177e4 63static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
faf5f49c 64static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *);
1da177e4 65static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry);
faf5f49c 66static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception);
adfa6f98 67static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp);
1da177e4 68
1da177e4
LT
69/* Prevent leaks of NFSv4 errors into userland */
70int nfs4_map_errors(int err)
71{
72 if (err < -1000) {
73 dprintk("%s could not handle NFSv4 error %d\n",
74 __FUNCTION__, -err);
75 return -EIO;
76 }
77 return err;
78}
79
80/*
81 * This is our standard bitmap for GETATTR requests.
82 */
83const u32 nfs4_fattr_bitmap[2] = {
84 FATTR4_WORD0_TYPE
85 | FATTR4_WORD0_CHANGE
86 | FATTR4_WORD0_SIZE
87 | FATTR4_WORD0_FSID
88 | FATTR4_WORD0_FILEID,
89 FATTR4_WORD1_MODE
90 | FATTR4_WORD1_NUMLINKS
91 | FATTR4_WORD1_OWNER
92 | FATTR4_WORD1_OWNER_GROUP
93 | FATTR4_WORD1_RAWDEV
94 | FATTR4_WORD1_SPACE_USED
95 | FATTR4_WORD1_TIME_ACCESS
96 | FATTR4_WORD1_TIME_METADATA
97 | FATTR4_WORD1_TIME_MODIFY
98};
99
100const u32 nfs4_statfs_bitmap[2] = {
101 FATTR4_WORD0_FILES_AVAIL
102 | FATTR4_WORD0_FILES_FREE
103 | FATTR4_WORD0_FILES_TOTAL,
104 FATTR4_WORD1_SPACE_AVAIL
105 | FATTR4_WORD1_SPACE_FREE
106 | FATTR4_WORD1_SPACE_TOTAL
107};
108
4ce79717 109const u32 nfs4_pathconf_bitmap[2] = {
1da177e4
LT
110 FATTR4_WORD0_MAXLINK
111 | FATTR4_WORD0_MAXNAME,
112 0
113};
114
115const u32 nfs4_fsinfo_bitmap[2] = { FATTR4_WORD0_MAXFILESIZE
116 | FATTR4_WORD0_MAXREAD
117 | FATTR4_WORD0_MAXWRITE
118 | FATTR4_WORD0_LEASE_TIME,
119 0
120};
121
830b8e33
MN
122const u32 nfs4_fs_locations_bitmap[2] = {
123 FATTR4_WORD0_TYPE
124 | FATTR4_WORD0_CHANGE
125 | FATTR4_WORD0_SIZE
126 | FATTR4_WORD0_FSID
127 | FATTR4_WORD0_FILEID
128 | FATTR4_WORD0_FS_LOCATIONS,
129 FATTR4_WORD1_MODE
130 | FATTR4_WORD1_NUMLINKS
131 | FATTR4_WORD1_OWNER
132 | FATTR4_WORD1_OWNER_GROUP
133 | FATTR4_WORD1_RAWDEV
134 | FATTR4_WORD1_SPACE_USED
135 | FATTR4_WORD1_TIME_ACCESS
136 | FATTR4_WORD1_TIME_METADATA
137 | FATTR4_WORD1_TIME_MODIFY
138 | FATTR4_WORD1_MOUNTED_ON_FILEID
139};
140
bc4785cd 141static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
1da177e4
LT
142 struct nfs4_readdir_arg *readdir)
143{
0dbb4c67 144 __be32 *start, *p;
1da177e4
LT
145
146 BUG_ON(readdir->count < 80);
147 if (cookie > 2) {
b7ef1956 148 readdir->cookie = cookie;
1da177e4
LT
149 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
150 return;
151 }
152
153 readdir->cookie = 0;
154 memset(&readdir->verifier, 0, sizeof(readdir->verifier));
155 if (cookie == 2)
156 return;
157
158 /*
159 * NFSv4 servers do not return entries for '.' and '..'
160 * Therefore, we fake these entries here. We let '.'
161 * have cookie 0 and '..' have cookie 1. Note that
162 * when talking to the server, we always send cookie 0
163 * instead of 1 or 2.
164 */
0dbb4c67 165 start = p = kmap_atomic(*readdir->pages, KM_USER0);
1da177e4
LT
166
167 if (cookie == 0) {
168 *p++ = xdr_one; /* next */
169 *p++ = xdr_zero; /* cookie, first word */
170 *p++ = xdr_one; /* cookie, second word */
171 *p++ = xdr_one; /* entry len */
172 memcpy(p, ".\0\0\0", 4); /* entry */
173 p++;
174 *p++ = xdr_one; /* bitmap length */
175 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
176 *p++ = htonl(8); /* attribute buffer length */
177 p = xdr_encode_hyper(p, dentry->d_inode->i_ino);
178 }
179
180 *p++ = xdr_one; /* next */
181 *p++ = xdr_zero; /* cookie, first word */
182 *p++ = xdr_two; /* cookie, second word */
183 *p++ = xdr_two; /* entry len */
184 memcpy(p, "..\0\0", 4); /* entry */
185 p++;
186 *p++ = xdr_one; /* bitmap length */
187 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
188 *p++ = htonl(8); /* attribute buffer length */
189 p = xdr_encode_hyper(p, dentry->d_parent->d_inode->i_ino);
190
191 readdir->pgbase = (char *)p - (char *)start;
192 readdir->count -= readdir->pgbase;
193 kunmap_atomic(start, KM_USER0);
194}
195
26e976a8 196static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
1da177e4 197{
7539bbab 198 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
199 spin_lock(&clp->cl_lock);
200 if (time_before(clp->cl_last_renewal,timestamp))
201 clp->cl_last_renewal = timestamp;
202 spin_unlock(&clp->cl_lock);
203}
204
38478b24 205static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
1da177e4 206{
38478b24 207 struct nfs_inode *nfsi = NFS_I(dir);
1da177e4 208
38478b24
TM
209 spin_lock(&dir->i_lock);
210 nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_REVAL_PAGECACHE|NFS_INO_INVALID_DATA;
1da177e4
LT
211 if (cinfo->before == nfsi->change_attr && cinfo->atomic)
212 nfsi->change_attr = cinfo->after;
38478b24 213 spin_unlock(&dir->i_lock);
1da177e4
LT
214}
215
e56e0b78 216struct nfs4_opendata {
c6d00e63 217 struct kref kref;
e56e0b78
TM
218 struct nfs_openargs o_arg;
219 struct nfs_openres o_res;
cdd4e68b
TM
220 struct nfs_open_confirmargs c_arg;
221 struct nfs_open_confirmres c_res;
e56e0b78
TM
222 struct nfs_fattr f_attr;
223 struct nfs_fattr dir_attr;
ad389da7 224 struct path path;
e56e0b78
TM
225 struct dentry *dir;
226 struct nfs4_state_owner *owner;
227 struct iattr attrs;
26e976a8 228 unsigned long timestamp;
24ac23ab
TM
229 int rpc_status;
230 int cancelled;
e56e0b78
TM
231};
232
ad389da7 233static struct nfs4_opendata *nfs4_opendata_alloc(struct path *path,
e56e0b78
TM
234 struct nfs4_state_owner *sp, int flags,
235 const struct iattr *attrs)
236{
ad389da7 237 struct dentry *parent = dget_parent(path->dentry);
e56e0b78
TM
238 struct inode *dir = parent->d_inode;
239 struct nfs_server *server = NFS_SERVER(dir);
240 struct nfs4_opendata *p;
241
242 p = kzalloc(sizeof(*p), GFP_KERNEL);
243 if (p == NULL)
244 goto err;
245 p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid);
246 if (p->o_arg.seqid == NULL)
247 goto err_free;
ad389da7
TM
248 p->path.mnt = mntget(path->mnt);
249 p->path.dentry = dget(path->dentry);
e56e0b78
TM
250 p->dir = parent;
251 p->owner = sp;
252 atomic_inc(&sp->so_count);
253 p->o_arg.fh = NFS_FH(dir);
254 p->o_arg.open_flags = flags,
7539bbab 255 p->o_arg.clientid = server->nfs_client->cl_clientid;
9f958ab8 256 p->o_arg.id = sp->so_owner_id.id;
ad389da7 257 p->o_arg.name = &p->path.dentry->d_name;
e56e0b78
TM
258 p->o_arg.server = server;
259 p->o_arg.bitmask = server->attr_bitmask;
260 p->o_arg.claim = NFS4_OPEN_CLAIM_NULL;
261 p->o_res.f_attr = &p->f_attr;
262 p->o_res.dir_attr = &p->dir_attr;
263 p->o_res.server = server;
264 nfs_fattr_init(&p->f_attr);
265 nfs_fattr_init(&p->dir_attr);
266 if (flags & O_EXCL) {
267 u32 *s = (u32 *) p->o_arg.u.verifier.data;
268 s[0] = jiffies;
269 s[1] = current->pid;
270 } else if (flags & O_CREAT) {
271 p->o_arg.u.attrs = &p->attrs;
272 memcpy(&p->attrs, attrs, sizeof(p->attrs));
273 }
cdd4e68b
TM
274 p->c_arg.fh = &p->o_res.fh;
275 p->c_arg.stateid = &p->o_res.stateid;
276 p->c_arg.seqid = p->o_arg.seqid;
c6d00e63 277 kref_init(&p->kref);
e56e0b78
TM
278 return p;
279err_free:
280 kfree(p);
281err:
282 dput(parent);
283 return NULL;
284}
285
c6d00e63 286static void nfs4_opendata_free(struct kref *kref)
e56e0b78 287{
c6d00e63
TM
288 struct nfs4_opendata *p = container_of(kref,
289 struct nfs4_opendata, kref);
290
291 nfs_free_seqid(p->o_arg.seqid);
292 nfs4_put_state_owner(p->owner);
293 dput(p->dir);
294 dput(p->path.dentry);
295 mntput(p->path.mnt);
296 kfree(p);
297}
298
299static void nfs4_opendata_put(struct nfs4_opendata *p)
300{
301 if (p != NULL)
302 kref_put(&p->kref, nfs4_opendata_free);
e56e0b78
TM
303}
304
06f814a3
TM
305static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
306{
307 sigset_t oldset;
308 int ret;
309
310 rpc_clnt_sigmask(task->tk_client, &oldset);
311 ret = rpc_wait_for_completion_task(task);
312 rpc_clnt_sigunmask(task->tk_client, &oldset);
313 return ret;
314}
315
e7616923
TM
316static inline void update_open_stateflags(struct nfs4_state *state, mode_t open_flags)
317{
318 switch (open_flags) {
319 case FMODE_WRITE:
320 state->n_wronly++;
321 break;
322 case FMODE_READ:
323 state->n_rdonly++;
324 break;
325 case FMODE_READ|FMODE_WRITE:
326 state->n_rdwr++;
327 }
328}
329
1da177e4
LT
330static void update_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, int open_flags)
331{
332 struct inode *inode = state->inode;
333
334 open_flags &= (FMODE_READ|FMODE_WRITE);
d530838b 335 /* Protect against nfs4_find_state_byowner() */
ec073428 336 spin_lock(&state->owner->so_lock);
1da177e4 337 spin_lock(&inode->i_lock);
4cecb76f 338 memcpy(&state->stateid, stateid, sizeof(state->stateid));
e7616923 339 update_open_stateflags(state, open_flags);
4cecb76f 340 nfs4_state_set_mode_locked(state, state->state | open_flags);
1da177e4 341 spin_unlock(&inode->i_lock);
ec073428 342 spin_unlock(&state->owner->so_lock);
1da177e4
LT
343}
344
24ac23ab
TM
345static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
346{
347 struct inode *inode;
348 struct nfs4_state *state = NULL;
349
350 if (!(data->f_attr.valid & NFS_ATTR_FATTR))
351 goto out;
352 inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr);
03f28e3a 353 if (IS_ERR(inode))
24ac23ab
TM
354 goto out;
355 state = nfs4_get_open_state(inode, data->owner);
356 if (state == NULL)
357 goto put_inode;
358 update_open_stateid(state, &data->o_res.stateid, data->o_arg.open_flags);
549d6ed5
TM
359 if (data->o_res.delegation_type != 0) {
360 struct nfs_inode *nfsi = NFS_I(inode);
361 int delegation_flags = 0;
362
363 if (nfsi->delegation)
364 delegation_flags = nfsi->delegation->flags;
365 if (!(delegation_flags & NFS_DELEGATION_NEED_RECLAIM))
366 nfs_inode_set_delegation(state->inode,
367 data->owner->so_cred,
368 &data->o_res);
369 else
370 nfs_inode_reclaim_delegation(state->inode,
371 data->owner->so_cred,
372 &data->o_res);
373 }
24ac23ab
TM
374put_inode:
375 iput(inode);
376out:
377 return state;
378}
379
864472e9
TM
380static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
381{
382 struct nfs_inode *nfsi = NFS_I(state->inode);
383 struct nfs_open_context *ctx;
384
385 spin_lock(&state->inode->i_lock);
386 list_for_each_entry(ctx, &nfsi->open_files, list) {
387 if (ctx->state != state)
388 continue;
389 get_nfs_open_context(ctx);
390 spin_unlock(&state->inode->i_lock);
391 return ctx;
392 }
393 spin_unlock(&state->inode->i_lock);
394 return ERR_PTR(-ENOENT);
395}
396
397static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, mode_t openflags, nfs4_stateid *stateid)
398{
399 int ret;
400
401 opendata->o_arg.open_flags = openflags;
402 ret = _nfs4_proc_open(opendata);
403 if (ret != 0)
404 return ret;
405 memcpy(stateid->data, opendata->o_res.stateid.data,
406 sizeof(stateid->data));
407 return 0;
408}
409
410static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
411{
412 nfs4_stateid stateid;
413 struct nfs4_state *newstate;
414 int mode = 0;
415 int delegation = 0;
416 int ret;
417
418 /* memory barrier prior to reading state->n_* */
419 smp_rmb();
420 if (state->n_rdwr != 0) {
421 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &stateid);
422 if (ret != 0)
423 return ret;
424 mode |= FMODE_READ|FMODE_WRITE;
425 if (opendata->o_res.delegation_type != 0)
426 delegation = opendata->o_res.delegation_type;
427 smp_rmb();
428 }
429 if (state->n_wronly != 0) {
430 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &stateid);
431 if (ret != 0)
432 return ret;
433 mode |= FMODE_WRITE;
434 if (opendata->o_res.delegation_type != 0)
435 delegation = opendata->o_res.delegation_type;
436 smp_rmb();
437 }
438 if (state->n_rdonly != 0) {
439 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &stateid);
440 if (ret != 0)
441 return ret;
442 mode |= FMODE_READ;
443 }
444 clear_bit(NFS_DELEGATED_STATE, &state->flags);
445 if (mode == 0)
446 return 0;
447 if (opendata->o_res.delegation_type == 0)
448 opendata->o_res.delegation_type = delegation;
449 opendata->o_arg.open_flags |= mode;
450 newstate = nfs4_opendata_to_nfs4_state(opendata);
549d6ed5 451 if (newstate != NULL)
4a35bd41 452 nfs4_close_state(&opendata->path, newstate, opendata->o_arg.open_flags);
864472e9
TM
453 if (newstate != state)
454 return -ESTALE;
455 return 0;
456}
457
1da177e4
LT
458/*
459 * OPEN_RECLAIM:
460 * reclaim state on the server after a reboot.
1da177e4 461 */
539cd03a 462static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 463{
864472e9
TM
464 struct nfs_delegation *delegation = NFS_I(state->inode)->delegation;
465 struct nfs4_opendata *opendata;
466 int delegation_type = 0;
1da177e4
LT
467 int status;
468
469 if (delegation != NULL) {
470 if (!(delegation->flags & NFS_DELEGATION_NEED_RECLAIM)) {
471 memcpy(&state->stateid, &delegation->stateid,
472 sizeof(state->stateid));
473 set_bit(NFS_DELEGATED_STATE, &state->flags);
474 return 0;
475 }
864472e9 476 delegation_type = delegation->type;
1da177e4 477 }
ad389da7 478 opendata = nfs4_opendata_alloc(&ctx->path, state->owner, 0, NULL);
864472e9 479 if (opendata == NULL)
cee54fc9 480 return -ENOMEM;
864472e9
TM
481 opendata->o_arg.claim = NFS4_OPEN_CLAIM_PREVIOUS;
482 opendata->o_arg.fh = NFS_FH(state->inode);
483 nfs_copy_fh(&opendata->o_res.fh, opendata->o_arg.fh);
484 opendata->o_arg.u.delegation_type = delegation_type;
485 status = nfs4_open_recover(opendata, state);
c6d00e63 486 nfs4_opendata_put(opendata);
1da177e4
LT
487 return status;
488}
489
539cd03a 490static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
491{
492 struct nfs_server *server = NFS_SERVER(state->inode);
493 struct nfs4_exception exception = { };
494 int err;
495 do {
539cd03a 496 err = _nfs4_do_open_reclaim(ctx, state);
202b50dc
TM
497 if (err != -NFS4ERR_DELAY)
498 break;
499 nfs4_handle_exception(server, err, &exception);
1da177e4
LT
500 } while (exception.retry);
501 return err;
502}
503
864472e9
TM
504static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
505{
506 struct nfs_open_context *ctx;
507 int ret;
508
509 ctx = nfs4_state_find_open_context(state);
510 if (IS_ERR(ctx))
511 return PTR_ERR(ctx);
539cd03a 512 ret = nfs4_do_open_reclaim(ctx, state);
864472e9
TM
513 put_nfs_open_context(ctx);
514 return ret;
515}
516
539cd03a 517static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
518{
519 struct nfs4_state_owner *sp = state->owner;
e56e0b78 520 struct nfs4_opendata *opendata;
864472e9 521 int ret;
1da177e4 522
1da177e4 523 if (!test_bit(NFS_DELEGATED_STATE, &state->flags))
864472e9 524 return 0;
ad389da7 525 opendata = nfs4_opendata_alloc(&ctx->path, sp, 0, NULL);
e56e0b78 526 if (opendata == NULL)
864472e9 527 return -ENOMEM;
e56e0b78 528 opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELEGATE_CUR;
e56e0b78
TM
529 memcpy(opendata->o_arg.u.delegation.data, state->stateid.data,
530 sizeof(opendata->o_arg.u.delegation.data));
864472e9 531 ret = nfs4_open_recover(opendata, state);
c6d00e63 532 nfs4_opendata_put(opendata);
864472e9 533 return ret;
1da177e4
LT
534}
535
539cd03a 536int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
537{
538 struct nfs4_exception exception = { };
539cd03a 539 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4
LT
540 int err;
541 do {
539cd03a 542 err = _nfs4_open_delegation_recall(ctx, state);
1da177e4
LT
543 switch (err) {
544 case 0:
545 return err;
546 case -NFS4ERR_STALE_CLIENTID:
547 case -NFS4ERR_STALE_STATEID:
548 case -NFS4ERR_EXPIRED:
549 /* Don't recall a delegation if it was lost */
7539bbab 550 nfs4_schedule_state_recovery(server->nfs_client);
1da177e4
LT
551 return err;
552 }
553 err = nfs4_handle_exception(server, err, &exception);
554 } while (exception.retry);
555 return err;
556}
557
cdd4e68b 558static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata)
1da177e4 559{
cdd4e68b
TM
560 struct nfs4_opendata *data = calldata;
561 struct rpc_message msg = {
562 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
563 .rpc_argp = &data->c_arg,
564 .rpc_resp = &data->c_res,
565 .rpc_cred = data->owner->so_cred,
1da177e4 566 };
26e976a8 567 data->timestamp = jiffies;
cdd4e68b
TM
568 rpc_call_setup(task, &msg, 0);
569}
570
571static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
572{
573 struct nfs4_opendata *data = calldata;
574
575 data->rpc_status = task->tk_status;
576 if (RPC_ASSASSINATED(task))
577 return;
26e976a8 578 if (data->rpc_status == 0) {
cdd4e68b
TM
579 memcpy(data->o_res.stateid.data, data->c_res.stateid.data,
580 sizeof(data->o_res.stateid.data));
26e976a8
TM
581 renew_lease(data->o_res.server, data->timestamp);
582 }
cdd4e68b
TM
583 nfs_increment_open_seqid(data->rpc_status, data->c_arg.seqid);
584 nfs_confirm_seqid(&data->owner->so_seqid, data->rpc_status);
585}
586
587static void nfs4_open_confirm_release(void *calldata)
588{
589 struct nfs4_opendata *data = calldata;
590 struct nfs4_state *state = NULL;
591
592 /* If this request hasn't been cancelled, do nothing */
593 if (data->cancelled == 0)
594 goto out_free;
595 /* In case of error, no cleanup! */
596 if (data->rpc_status != 0)
597 goto out_free;
598 nfs_confirm_seqid(&data->owner->so_seqid, 0);
599 state = nfs4_opendata_to_nfs4_state(data);
600 if (state != NULL)
4a35bd41 601 nfs4_close_state(&data->path, state, data->o_arg.open_flags);
cdd4e68b 602out_free:
c6d00e63 603 nfs4_opendata_put(data);
cdd4e68b
TM
604}
605
606static const struct rpc_call_ops nfs4_open_confirm_ops = {
607 .rpc_call_prepare = nfs4_open_confirm_prepare,
608 .rpc_call_done = nfs4_open_confirm_done,
609 .rpc_release = nfs4_open_confirm_release,
610};
611
612/*
613 * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
614 */
615static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
616{
617 struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
618 struct rpc_task *task;
1da177e4
LT
619 int status;
620
c6d00e63 621 kref_get(&data->kref);
7a1218a2
TM
622 /*
623 * If rpc_run_task() ends up calling ->rpc_release(), we
624 * want to ensure that it takes the 'error' code path.
625 */
626 data->rpc_status = -ENOMEM;
cdd4e68b 627 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_confirm_ops, data);
7a1218a2 628 if (IS_ERR(task))
cdd4e68b 629 return PTR_ERR(task);
cdd4e68b
TM
630 status = nfs4_wait_for_completion_rpc_task(task);
631 if (status != 0) {
632 data->cancelled = 1;
633 smp_wmb();
634 } else
635 status = data->rpc_status;
e6b3c4db 636 rpc_put_task(task);
1da177e4
LT
637 return status;
638}
639
24ac23ab 640static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1da177e4 641{
24ac23ab
TM
642 struct nfs4_opendata *data = calldata;
643 struct nfs4_state_owner *sp = data->owner;
1da177e4
LT
644 struct rpc_message msg = {
645 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
24ac23ab
TM
646 .rpc_argp = &data->o_arg,
647 .rpc_resp = &data->o_res,
1da177e4
LT
648 .rpc_cred = sp->so_cred,
649 };
24ac23ab
TM
650
651 if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
652 return;
653 /* Update sequence id. */
9f958ab8 654 data->o_arg.id = sp->so_owner_id.id;
24ac23ab 655 data->o_arg.clientid = sp->so_client->cl_clientid;
864472e9
TM
656 if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS)
657 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
26e976a8 658 data->timestamp = jiffies;
24ac23ab
TM
659 rpc_call_setup(task, &msg, 0);
660}
1da177e4 661
24ac23ab
TM
662static void nfs4_open_done(struct rpc_task *task, void *calldata)
663{
664 struct nfs4_opendata *data = calldata;
1da177e4 665
24ac23ab
TM
666 data->rpc_status = task->tk_status;
667 if (RPC_ASSASSINATED(task))
668 return;
669 if (task->tk_status == 0) {
670 switch (data->o_res.f_attr->mode & S_IFMT) {
6f926b5b
TM
671 case S_IFREG:
672 break;
673 case S_IFLNK:
24ac23ab 674 data->rpc_status = -ELOOP;
6f926b5b
TM
675 break;
676 case S_IFDIR:
24ac23ab 677 data->rpc_status = -EISDIR;
6f926b5b
TM
678 break;
679 default:
24ac23ab 680 data->rpc_status = -ENOTDIR;
6f926b5b 681 }
26e976a8 682 renew_lease(data->o_res.server, data->timestamp);
6f926b5b 683 }
24ac23ab
TM
684 nfs_increment_open_seqid(data->rpc_status, data->o_arg.seqid);
685}
6f926b5b 686
24ac23ab
TM
687static void nfs4_open_release(void *calldata)
688{
689 struct nfs4_opendata *data = calldata;
690 struct nfs4_state *state = NULL;
691
692 /* If this request hasn't been cancelled, do nothing */
693 if (data->cancelled == 0)
694 goto out_free;
695 /* In case of error, no cleanup! */
696 if (data->rpc_status != 0)
697 goto out_free;
698 /* In case we need an open_confirm, no cleanup! */
699 if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
700 goto out_free;
701 nfs_confirm_seqid(&data->owner->so_seqid, 0);
702 state = nfs4_opendata_to_nfs4_state(data);
703 if (state != NULL)
4a35bd41 704 nfs4_close_state(&data->path, state, data->o_arg.open_flags);
24ac23ab 705out_free:
c6d00e63 706 nfs4_opendata_put(data);
24ac23ab
TM
707}
708
709static const struct rpc_call_ops nfs4_open_ops = {
710 .rpc_call_prepare = nfs4_open_prepare,
711 .rpc_call_done = nfs4_open_done,
712 .rpc_release = nfs4_open_release,
713};
714
715/*
716 * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
717 */
718static int _nfs4_proc_open(struct nfs4_opendata *data)
719{
720 struct inode *dir = data->dir->d_inode;
721 struct nfs_server *server = NFS_SERVER(dir);
722 struct nfs_openargs *o_arg = &data->o_arg;
723 struct nfs_openres *o_res = &data->o_res;
724 struct rpc_task *task;
725 int status;
726
c6d00e63 727 kref_get(&data->kref);
7a1218a2
TM
728 /*
729 * If rpc_run_task() ends up calling ->rpc_release(), we
730 * want to ensure that it takes the 'error' code path.
731 */
732 data->rpc_status = -ENOMEM;
24ac23ab 733 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_ops, data);
7a1218a2 734 if (IS_ERR(task))
24ac23ab 735 return PTR_ERR(task);
24ac23ab
TM
736 status = nfs4_wait_for_completion_rpc_task(task);
737 if (status != 0) {
738 data->cancelled = 1;
739 smp_wmb();
740 } else
741 status = data->rpc_status;
e6b3c4db 742 rpc_put_task(task);
1da177e4 743 if (status != 0)
24ac23ab
TM
744 return status;
745
56ae19f3
TM
746 if (o_arg->open_flags & O_CREAT) {
747 update_changeattr(dir, &o_res->cinfo);
748 nfs_post_op_update_inode(dir, o_res->dir_attr);
749 } else
750 nfs_refresh_inode(dir, o_res->dir_attr);
1da177e4 751 if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
cdd4e68b 752 status = _nfs4_proc_open_confirm(data);
1da177e4 753 if (status != 0)
24ac23ab 754 return status;
1da177e4 755 }
24ac23ab 756 nfs_confirm_seqid(&data->owner->so_seqid, 0);
1da177e4 757 if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
8fa5c000 758 return server->nfs_client->rpc_ops->getattr(server, &o_res->fh, o_res->f_attr);
24ac23ab 759 return 0;
1da177e4
LT
760}
761
762static int _nfs4_do_access(struct inode *inode, struct rpc_cred *cred, int openflags)
763{
764 struct nfs_access_entry cache;
765 int mask = 0;
766 int status;
767
768 if (openflags & FMODE_READ)
769 mask |= MAY_READ;
770 if (openflags & FMODE_WRITE)
771 mask |= MAY_WRITE;
1b45c46c
TM
772 if (openflags & FMODE_EXEC)
773 mask |= MAY_EXEC;
1da177e4
LT
774 status = nfs_access_get_cached(inode, cred, &cache);
775 if (status == 0)
776 goto out;
777
778 /* Be clever: ask server to check for all possible rights */
779 cache.mask = MAY_EXEC | MAY_WRITE | MAY_READ;
780 cache.cred = cred;
781 cache.jiffies = jiffies;
782 status = _nfs4_proc_access(inode, &cache);
783 if (status != 0)
784 return status;
785 nfs_access_add_cache(inode, &cache);
786out:
787 if ((cache.mask & mask) == mask)
788 return 0;
789 return -EACCES;
790}
791
10afec90 792static int nfs4_recover_expired_lease(struct nfs_server *server)
58d9714a 793{
7539bbab 794 struct nfs_client *clp = server->nfs_client;
6b30954e 795 int ret;
58d9714a 796
6b30954e
TM
797 for (;;) {
798 ret = nfs4_wait_clnt_recover(server->client, clp);
799 if (ret != 0)
800 return ret;
801 if (!test_and_clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
802 break;
58d9714a 803 nfs4_schedule_state_recovery(clp);
6b30954e
TM
804 }
805 return 0;
58d9714a
TM
806}
807
1da177e4
LT
808/*
809 * OPEN_EXPIRED:
810 * reclaim state on the server after a network partition.
811 * Assumes caller holds the appropriate lock
812 */
539cd03a 813static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 814{
1da177e4 815 struct inode *inode = state->inode;
1da177e4 816 struct nfs_delegation *delegation = NFS_I(inode)->delegation;
e56e0b78 817 struct nfs4_opendata *opendata;
24ac23ab 818 int openflags = state->state & (FMODE_READ|FMODE_WRITE);
864472e9 819 int ret;
1da177e4
LT
820
821 if (delegation != NULL && !(delegation->flags & NFS_DELEGATION_NEED_RECLAIM)) {
539cd03a 822 ret = _nfs4_do_access(inode, ctx->cred, openflags);
864472e9
TM
823 if (ret < 0)
824 return ret;
1da177e4
LT
825 memcpy(&state->stateid, &delegation->stateid, sizeof(state->stateid));
826 set_bit(NFS_DELEGATED_STATE, &state->flags);
864472e9 827 return 0;
1da177e4 828 }
ad389da7 829 opendata = nfs4_opendata_alloc(&ctx->path, state->owner, openflags, NULL);
e56e0b78 830 if (opendata == NULL)
864472e9
TM
831 return -ENOMEM;
832 ret = nfs4_open_recover(opendata, state);
833 if (ret == -ESTALE) {
834 /* Invalidate the state owner so we don't ever use it again */
539cd03a
TM
835 nfs4_drop_state_owner(state->owner);
836 d_drop(ctx->path.dentry);
1da177e4 837 }
c6d00e63 838 nfs4_opendata_put(opendata);
864472e9 839 return ret;
1da177e4
LT
840}
841
539cd03a 842static inline int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
202b50dc 843{
539cd03a 844 struct nfs_server *server = NFS_SERVER(state->inode);
202b50dc
TM
845 struct nfs4_exception exception = { };
846 int err;
847
848 do {
539cd03a 849 err = _nfs4_open_expired(ctx, state);
202b50dc
TM
850 if (err == -NFS4ERR_DELAY)
851 nfs4_handle_exception(server, err, &exception);
852 } while (exception.retry);
853 return err;
854}
855
1da177e4
LT
856static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
857{
1da177e4 858 struct nfs_open_context *ctx;
864472e9 859 int ret;
1da177e4 860
864472e9
TM
861 ctx = nfs4_state_find_open_context(state);
862 if (IS_ERR(ctx))
863 return PTR_ERR(ctx);
539cd03a 864 ret = nfs4_do_open_expired(ctx, state);
864472e9
TM
865 put_nfs_open_context(ctx);
866 return ret;
1da177e4
LT
867}
868
869/*
24ac23ab 870 * Returns a referenced nfs4_state if there is an open delegation on the file
1da177e4
LT
871 */
872static int _nfs4_open_delegated(struct inode *inode, int flags, struct rpc_cred *cred, struct nfs4_state **res)
873{
874 struct nfs_delegation *delegation;
875 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 876 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
877 struct nfs_inode *nfsi = NFS_I(inode);
878 struct nfs4_state_owner *sp = NULL;
879 struct nfs4_state *state = NULL;
880 int open_flags = flags & (FMODE_READ|FMODE_WRITE);
881 int err;
882
b4454fe1
TM
883 err = -ENOMEM;
884 if (!(sp = nfs4_get_state_owner(server, cred))) {
885 dprintk("%s: nfs4_get_state_owner failed!\n", __FUNCTION__);
886 return err;
887 }
58d9714a
TM
888 err = nfs4_recover_expired_lease(server);
889 if (err != 0)
b4454fe1 890 goto out_put_state_owner;
1da177e4
LT
891 /* Protect against reboot recovery - NOTE ORDER! */
892 down_read(&clp->cl_sem);
893 /* Protect against delegation recall */
894 down_read(&nfsi->rwsem);
895 delegation = NFS_I(inode)->delegation;
896 err = -ENOENT;
897 if (delegation == NULL || (delegation->type & open_flags) != open_flags)
898 goto out_err;
899 err = -ENOMEM;
1da177e4
LT
900 state = nfs4_get_open_state(inode, sp);
901 if (state == NULL)
902 goto out_err;
903
904 err = -ENOENT;
905 if ((state->state & open_flags) == open_flags) {
906 spin_lock(&inode->i_lock);
e7616923 907 update_open_stateflags(state, open_flags);
1da177e4
LT
908 spin_unlock(&inode->i_lock);
909 goto out_ok;
910 } else if (state->state != 0)
b4454fe1 911 goto out_put_open_state;
1da177e4
LT
912
913 lock_kernel();
914 err = _nfs4_do_access(inode, cred, open_flags);
915 unlock_kernel();
916 if (err != 0)
b4454fe1 917 goto out_put_open_state;
1da177e4
LT
918 set_bit(NFS_DELEGATED_STATE, &state->flags);
919 update_open_stateid(state, &delegation->stateid, open_flags);
920out_ok:
1da177e4
LT
921 nfs4_put_state_owner(sp);
922 up_read(&nfsi->rwsem);
923 up_read(&clp->cl_sem);
1da177e4 924 *res = state;
b4454fe1
TM
925 return 0;
926out_put_open_state:
927 nfs4_put_open_state(state);
1da177e4 928out_err:
1da177e4
LT
929 up_read(&nfsi->rwsem);
930 up_read(&clp->cl_sem);
b8e5c4c2
TM
931 if (err != -EACCES)
932 nfs_inode_return_delegation(inode);
b4454fe1
TM
933out_put_state_owner:
934 nfs4_put_state_owner(sp);
1da177e4
LT
935 return err;
936}
937
938static struct nfs4_state *nfs4_open_delegated(struct inode *inode, int flags, struct rpc_cred *cred)
939{
940 struct nfs4_exception exception = { };
a162a6b8 941 struct nfs4_state *res = ERR_PTR(-EIO);
1da177e4
LT
942 int err;
943
944 do {
945 err = _nfs4_open_delegated(inode, flags, cred, &res);
946 if (err == 0)
947 break;
948 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(inode),
949 err, &exception));
950 } while (exception.retry);
951 return res;
952}
953
aa53ed54
JL
954/*
955 * on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
956 * fields corresponding to attributes that were used to store the verifier.
957 * Make sure we clobber those fields in the later setattr call
958 */
959static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
960{
961 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
962 !(sattr->ia_valid & ATTR_ATIME_SET))
963 sattr->ia_valid |= ATTR_ATIME;
964
965 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
966 !(sattr->ia_valid & ATTR_MTIME_SET))
967 sattr->ia_valid |= ATTR_MTIME;
968}
969
1da177e4 970/*
24ac23ab 971 * Returns a referenced nfs4_state
1da177e4 972 */
ad389da7 973static int _nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
1da177e4
LT
974{
975 struct nfs4_state_owner *sp;
976 struct nfs4_state *state = NULL;
977 struct nfs_server *server = NFS_SERVER(dir);
7539bbab 978 struct nfs_client *clp = server->nfs_client;
e56e0b78 979 struct nfs4_opendata *opendata;
1da177e4 980 int status;
1da177e4
LT
981
982 /* Protect against reboot recovery conflicts */
1da177e4
LT
983 status = -ENOMEM;
984 if (!(sp = nfs4_get_state_owner(server, cred))) {
985 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
986 goto out_err;
987 }
58d9714a
TM
988 status = nfs4_recover_expired_lease(server);
989 if (status != 0)
b4454fe1 990 goto err_put_state_owner;
58d9714a
TM
991 down_read(&clp->cl_sem);
992 status = -ENOMEM;
ad389da7 993 opendata = nfs4_opendata_alloc(path, sp, flags, sattr);
e56e0b78 994 if (opendata == NULL)
76723de0 995 goto err_release_rwsem;
1da177e4 996
24ac23ab 997 status = _nfs4_proc_open(opendata);
1da177e4 998 if (status != 0)
c6d00e63 999 goto err_opendata_put;
1da177e4 1000
aa53ed54
JL
1001 if (opendata->o_arg.open_flags & O_EXCL)
1002 nfs4_exclusive_attrset(opendata, sattr);
1003
1da177e4 1004 status = -ENOMEM;
24ac23ab
TM
1005 state = nfs4_opendata_to_nfs4_state(opendata);
1006 if (state == NULL)
c6d00e63 1007 goto err_opendata_put;
c6d00e63 1008 nfs4_opendata_put(opendata);
1da177e4
LT
1009 nfs4_put_state_owner(sp);
1010 up_read(&clp->cl_sem);
1011 *res = state;
1012 return 0;
c6d00e63
TM
1013err_opendata_put:
1014 nfs4_opendata_put(opendata);
76723de0
TM
1015err_release_rwsem:
1016 up_read(&clp->cl_sem);
e56e0b78
TM
1017err_put_state_owner:
1018 nfs4_put_state_owner(sp);
1da177e4 1019out_err:
1da177e4
LT
1020 *res = NULL;
1021 return status;
1022}
1023
1024
ad389da7 1025static struct nfs4_state *nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred)
1da177e4
LT
1026{
1027 struct nfs4_exception exception = { };
1028 struct nfs4_state *res;
1029 int status;
1030
1031 do {
ad389da7 1032 status = _nfs4_do_open(dir, path, flags, sattr, cred, &res);
1da177e4
LT
1033 if (status == 0)
1034 break;
1035 /* NOTE: BAD_SEQID means the server and client disagree about the
1036 * book-keeping w.r.t. state-changing operations
1037 * (OPEN/CLOSE/LOCK/LOCKU...)
1038 * It is actually a sign of a bug on the client or on the server.
1039 *
1040 * If we receive a BAD_SEQID error in the particular case of
cee54fc9 1041 * doing an OPEN, we assume that nfs_increment_open_seqid() will
1da177e4
LT
1042 * have unhashed the old state_owner for us, and that we can
1043 * therefore safely retry using a new one. We should still warn
1044 * the user though...
1045 */
1046 if (status == -NFS4ERR_BAD_SEQID) {
1047 printk(KERN_WARNING "NFS: v4 server returned a bad sequence-id error!\n");
1048 exception.retry = 1;
1049 continue;
1050 }
550f5747
TM
1051 /*
1052 * BAD_STATEID on OPEN means that the server cancelled our
1053 * state before it received the OPEN_CONFIRM.
1054 * Recover by retrying the request as per the discussion
1055 * on Page 181 of RFC3530.
1056 */
1057 if (status == -NFS4ERR_BAD_STATEID) {
1058 exception.retry = 1;
1059 continue;
1060 }
1da177e4
LT
1061 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(dir),
1062 status, &exception));
1063 } while (exception.retry);
1064 return res;
1065}
1066
3e4f6290
TM
1067static int _nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
1068 struct iattr *sattr, struct nfs4_state *state)
1da177e4 1069{
3e4f6290 1070 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 1071 struct nfs_setattrargs arg = {
3e4f6290 1072 .fh = NFS_FH(inode),
1da177e4
LT
1073 .iap = sattr,
1074 .server = server,
1075 .bitmask = server->attr_bitmask,
1076 };
1077 struct nfs_setattrres res = {
1078 .fattr = fattr,
1079 .server = server,
1080 };
1081 struct rpc_message msg = {
1082 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
1083 .rpc_argp = &arg,
1084 .rpc_resp = &res,
1085 };
26e976a8 1086 unsigned long timestamp = jiffies;
65e4308d 1087 int status;
1da177e4 1088
0e574af1 1089 nfs_fattr_init(fattr);
1da177e4 1090
3e4f6290
TM
1091 if (nfs4_copy_delegation_stateid(&arg.stateid, inode)) {
1092 /* Use that stateid */
1093 } else if (state != NULL) {
1da177e4 1094 msg.rpc_cred = state->owner->so_cred;
08e9eac4
TM
1095 nfs4_copy_stateid(&arg.stateid, state, current->files);
1096 } else
1da177e4
LT
1097 memcpy(&arg.stateid, &zero_stateid, sizeof(arg.stateid));
1098
65e4308d 1099 status = rpc_call_sync(server->client, &msg, 0);
26e976a8
TM
1100 if (status == 0 && state != NULL)
1101 renew_lease(server, timestamp);
65e4308d 1102 return status;
1da177e4
LT
1103}
1104
3e4f6290
TM
1105static int nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
1106 struct iattr *sattr, struct nfs4_state *state)
1da177e4 1107{
3e4f6290 1108 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
1109 struct nfs4_exception exception = { };
1110 int err;
1111 do {
1112 err = nfs4_handle_exception(server,
3e4f6290 1113 _nfs4_do_setattr(inode, fattr, sattr, state),
1da177e4
LT
1114 &exception);
1115 } while (exception.retry);
1116 return err;
1117}
1118
1119struct nfs4_closedata {
4a35bd41 1120 struct path path;
1da177e4
LT
1121 struct inode *inode;
1122 struct nfs4_state *state;
1123 struct nfs_closeargs arg;
1124 struct nfs_closeres res;
516a6af6 1125 struct nfs_fattr fattr;
26e976a8 1126 unsigned long timestamp;
1da177e4
LT
1127};
1128
963d8fe5 1129static void nfs4_free_closedata(void *data)
9512135d 1130{
963d8fe5
TM
1131 struct nfs4_closedata *calldata = data;
1132 struct nfs4_state_owner *sp = calldata->state->owner;
9512135d
TM
1133
1134 nfs4_put_open_state(calldata->state);
1135 nfs_free_seqid(calldata->arg.seqid);
9512135d 1136 nfs4_put_state_owner(sp);
4a35bd41
TM
1137 dput(calldata->path.dentry);
1138 mntput(calldata->path.mnt);
9512135d
TM
1139 kfree(calldata);
1140}
1141
963d8fe5 1142static void nfs4_close_done(struct rpc_task *task, void *data)
1da177e4 1143{
963d8fe5 1144 struct nfs4_closedata *calldata = data;
1da177e4 1145 struct nfs4_state *state = calldata->state;
1da177e4
LT
1146 struct nfs_server *server = NFS_SERVER(calldata->inode);
1147
4ce70ada
TM
1148 if (RPC_ASSASSINATED(task))
1149 return;
1da177e4
LT
1150 /* hmm. we are done with the inode, and in the process of freeing
1151 * the state_owner. we keep this around to process errors
1152 */
cee54fc9 1153 nfs_increment_open_seqid(task->tk_status, calldata->arg.seqid);
1da177e4
LT
1154 switch (task->tk_status) {
1155 case 0:
1156 memcpy(&state->stateid, &calldata->res.stateid,
1157 sizeof(state->stateid));
26e976a8 1158 renew_lease(server, calldata->timestamp);
1da177e4
LT
1159 break;
1160 case -NFS4ERR_STALE_STATEID:
1161 case -NFS4ERR_EXPIRED:
1da177e4
LT
1162 break;
1163 default:
1164 if (nfs4_async_handle_error(task, server) == -EAGAIN) {
1165 rpc_restart_call(task);
1166 return;
1167 }
1168 }
516a6af6 1169 nfs_refresh_inode(calldata->inode, calldata->res.fattr);
1da177e4
LT
1170}
1171
4ce70ada 1172static void nfs4_close_prepare(struct rpc_task *task, void *data)
1da177e4 1173{
4ce70ada 1174 struct nfs4_closedata *calldata = data;
9512135d 1175 struct nfs4_state *state = calldata->state;
1da177e4
LT
1176 struct rpc_message msg = {
1177 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
1178 .rpc_argp = &calldata->arg,
1179 .rpc_resp = &calldata->res,
9512135d 1180 .rpc_cred = state->owner->so_cred,
1da177e4 1181 };
4cecb76f 1182 int mode = 0, old_mode;
9512135d 1183
963d8fe5 1184 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
9512135d 1185 return;
9512135d
TM
1186 /* Recalculate the new open mode in case someone reopened the file
1187 * while we were waiting in line to be scheduled.
1188 */
4cecb76f
TM
1189 spin_lock(&state->owner->so_lock);
1190 spin_lock(&calldata->inode->i_lock);
1191 mode = old_mode = state->state;
e7616923
TM
1192 if (state->n_rdwr == 0) {
1193 if (state->n_rdonly == 0)
1194 mode &= ~FMODE_READ;
1195 if (state->n_wronly == 0)
1196 mode &= ~FMODE_WRITE;
1197 }
4cecb76f
TM
1198 nfs4_state_set_mode_locked(state, mode);
1199 spin_unlock(&calldata->inode->i_lock);
1200 spin_unlock(&state->owner->so_lock);
1201 if (mode == old_mode || test_bit(NFS_DELEGATED_STATE, &state->flags)) {
963d8fe5
TM
1202 /* Note: exit _without_ calling nfs4_close_done */
1203 task->tk_action = NULL;
9512135d
TM
1204 return;
1205 }
516a6af6 1206 nfs_fattr_init(calldata->res.fattr);
9512135d 1207 if (mode != 0)
1da177e4 1208 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
9512135d 1209 calldata->arg.open_flags = mode;
26e976a8 1210 calldata->timestamp = jiffies;
9512135d 1211 rpc_call_setup(task, &msg, 0);
1da177e4
LT
1212}
1213
963d8fe5 1214static const struct rpc_call_ops nfs4_close_ops = {
4ce70ada 1215 .rpc_call_prepare = nfs4_close_prepare,
963d8fe5
TM
1216 .rpc_call_done = nfs4_close_done,
1217 .rpc_release = nfs4_free_closedata,
1218};
1219
1da177e4
LT
1220/*
1221 * It is possible for data to be read/written from a mem-mapped file
1222 * after the sys_close call (which hits the vfs layer as a flush).
1223 * This means that we can't safely call nfsv4 close on a file until
1224 * the inode is cleared. This in turn means that we are not good
1225 * NFSv4 citizens - we do not indicate to the server to update the file's
1226 * share state even when we are done with one of the three share
1227 * stateid's in the inode.
1228 *
1229 * NOTE: Caller must be holding the sp->so_owner semaphore!
1230 */
4a35bd41 1231int nfs4_do_close(struct path *path, struct nfs4_state *state)
1da177e4 1232{
4a35bd41 1233 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4 1234 struct nfs4_closedata *calldata;
b39e625b
TM
1235 struct nfs4_state_owner *sp = state->owner;
1236 struct rpc_task *task;
9512135d 1237 int status = -ENOMEM;
1da177e4 1238
9512135d 1239 calldata = kmalloc(sizeof(*calldata), GFP_KERNEL);
1da177e4 1240 if (calldata == NULL)
9512135d 1241 goto out;
4a35bd41 1242 calldata->inode = state->inode;
1da177e4 1243 calldata->state = state;
4a35bd41 1244 calldata->arg.fh = NFS_FH(state->inode);
9512135d 1245 calldata->arg.stateid = &state->stateid;
1da177e4 1246 /* Serialization for the sequence id */
cee54fc9 1247 calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid);
9512135d
TM
1248 if (calldata->arg.seqid == NULL)
1249 goto out_free_calldata;
516a6af6
TM
1250 calldata->arg.bitmask = server->attr_bitmask;
1251 calldata->res.fattr = &calldata->fattr;
1252 calldata->res.server = server;
4a35bd41
TM
1253 calldata->path.mnt = mntget(path->mnt);
1254 calldata->path.dentry = dget(path->dentry);
9512135d 1255
b39e625b
TM
1256 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_close_ops, calldata);
1257 if (IS_ERR(task))
1258 return PTR_ERR(task);
1259 rpc_put_task(task);
1260 return 0;
9512135d
TM
1261out_free_calldata:
1262 kfree(calldata);
1263out:
b39e625b
TM
1264 nfs4_put_open_state(state);
1265 nfs4_put_state_owner(sp);
9512135d 1266 return status;
1da177e4
LT
1267}
1268
4a35bd41 1269static int nfs4_intent_set_file(struct nameidata *nd, struct path *path, struct nfs4_state *state)
02a913a7
TM
1270{
1271 struct file *filp;
1b45c46c 1272 int ret;
02a913a7 1273
1b45c46c
TM
1274 /* If the open_intent is for execute, we have an extra check to make */
1275 if (nd->intent.open.flags & FMODE_EXEC) {
1276 ret = _nfs4_do_access(state->inode,
1277 state->owner->so_cred,
1278 nd->intent.open.flags);
1279 if (ret < 0)
1280 goto out_close;
1281 }
4a35bd41 1282 filp = lookup_instantiate_filp(nd, path->dentry, NULL);
02a913a7
TM
1283 if (!IS_ERR(filp)) {
1284 struct nfs_open_context *ctx;
1285 ctx = (struct nfs_open_context *)filp->private_data;
1286 ctx->state = state;
95cf959b
TM
1287 return 0;
1288 }
1b45c46c
TM
1289 ret = PTR_ERR(filp);
1290out_close:
4a35bd41 1291 nfs4_close_state(path, state, nd->intent.open.flags);
1b45c46c 1292 return ret;
02a913a7
TM
1293}
1294
1295struct dentry *
1da177e4
LT
1296nfs4_atomic_open(struct inode *dir, struct dentry *dentry, struct nameidata *nd)
1297{
ad389da7
TM
1298 struct path path = {
1299 .mnt = nd->mnt,
1300 .dentry = dentry,
1301 };
1da177e4
LT
1302 struct iattr attr;
1303 struct rpc_cred *cred;
1304 struct nfs4_state *state;
02a913a7 1305 struct dentry *res;
1da177e4
LT
1306
1307 if (nd->flags & LOOKUP_CREATE) {
1308 attr.ia_mode = nd->intent.open.create_mode;
1309 attr.ia_valid = ATTR_MODE;
1310 if (!IS_POSIXACL(dir))
1311 attr.ia_mode &= ~current->fs->umask;
1312 } else {
1313 attr.ia_valid = 0;
1314 BUG_ON(nd->intent.open.flags & O_CREAT);
1315 }
1316
1f163415 1317 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4 1318 if (IS_ERR(cred))
02a913a7 1319 return (struct dentry *)cred;
ad389da7 1320 state = nfs4_do_open(dir, &path, nd->intent.open.flags, &attr, cred);
1da177e4 1321 put_rpccred(cred);
02a913a7
TM
1322 if (IS_ERR(state)) {
1323 if (PTR_ERR(state) == -ENOENT)
1324 d_add(dentry, NULL);
1325 return (struct dentry *)state;
1326 }
24ac23ab 1327 res = d_add_unique(dentry, igrab(state->inode));
02a913a7
TM
1328 if (res != NULL)
1329 dentry = res;
4a35bd41 1330 nfs4_intent_set_file(nd, &path, state);
02a913a7 1331 return res;
1da177e4
LT
1332}
1333
1334int
02a913a7 1335nfs4_open_revalidate(struct inode *dir, struct dentry *dentry, int openflags, struct nameidata *nd)
1da177e4 1336{
ad389da7
TM
1337 struct path path = {
1338 .mnt = nd->mnt,
1339 .dentry = dentry,
1340 };
1da177e4
LT
1341 struct rpc_cred *cred;
1342 struct nfs4_state *state;
1da177e4 1343
1f163415 1344 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4
LT
1345 if (IS_ERR(cred))
1346 return PTR_ERR(cred);
1347 state = nfs4_open_delegated(dentry->d_inode, openflags, cred);
1348 if (IS_ERR(state))
ad389da7 1349 state = nfs4_do_open(dir, &path, openflags, NULL, cred);
1da177e4 1350 put_rpccred(cred);
02a913a7
TM
1351 if (IS_ERR(state)) {
1352 switch (PTR_ERR(state)) {
1353 case -EPERM:
1354 case -EACCES:
1355 case -EDQUOT:
1356 case -ENOSPC:
1357 case -EROFS:
1358 lookup_instantiate_filp(nd, (struct dentry *)state, NULL);
1359 return 1;
b87c0adf
CL
1360 default:
1361 goto out_drop;
02a913a7 1362 }
02a913a7 1363 }
24ac23ab 1364 if (state->inode == dentry->d_inode) {
4a35bd41 1365 nfs4_intent_set_file(nd, &path, state);
1da177e4
LT
1366 return 1;
1367 }
4a35bd41 1368 nfs4_close_state(&path, state, openflags);
02a913a7
TM
1369out_drop:
1370 d_drop(dentry);
1da177e4
LT
1371 return 0;
1372}
1373
1374
1375static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1376{
1377 struct nfs4_server_caps_res res = {};
1378 struct rpc_message msg = {
1379 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
1380 .rpc_argp = fhandle,
1381 .rpc_resp = &res,
1382 };
1383 int status;
1384
1385 status = rpc_call_sync(server->client, &msg, 0);
1386 if (status == 0) {
1387 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
1388 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
1389 server->caps |= NFS_CAP_ACLS;
1390 if (res.has_links != 0)
1391 server->caps |= NFS_CAP_HARDLINKS;
1392 if (res.has_symlinks != 0)
1393 server->caps |= NFS_CAP_SYMLINKS;
1394 server->acl_bitmask = res.acl_bitmask;
1395 }
1396 return status;
1397}
1398
55a97593 1399int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1da177e4
LT
1400{
1401 struct nfs4_exception exception = { };
1402 int err;
1403 do {
1404 err = nfs4_handle_exception(server,
1405 _nfs4_server_capabilities(server, fhandle),
1406 &exception);
1407 } while (exception.retry);
1408 return err;
1409}
1410
1411static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
1412 struct nfs_fsinfo *info)
1413{
1da177e4
LT
1414 struct nfs4_lookup_root_arg args = {
1415 .bitmask = nfs4_fattr_bitmap,
1416 };
1417 struct nfs4_lookup_res res = {
1418 .server = server,
0e574af1 1419 .fattr = info->fattr,
1da177e4
LT
1420 .fh = fhandle,
1421 };
1422 struct rpc_message msg = {
1423 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
1424 .rpc_argp = &args,
1425 .rpc_resp = &res,
1426 };
0e574af1 1427 nfs_fattr_init(info->fattr);
1da177e4
LT
1428 return rpc_call_sync(server->client, &msg, 0);
1429}
1430
1431static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
1432 struct nfs_fsinfo *info)
1433{
1434 struct nfs4_exception exception = { };
1435 int err;
1436 do {
1437 err = nfs4_handle_exception(server,
1438 _nfs4_lookup_root(server, fhandle, info),
1439 &exception);
1440 } while (exception.retry);
1441 return err;
1442}
1443
54ceac45
DH
1444/*
1445 * get the file handle for the "/" directory on the server
1446 */
1da177e4 1447static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle,
54ceac45 1448 struct nfs_fsinfo *info)
1da177e4 1449{
1da177e4
LT
1450 int status;
1451
1da177e4 1452 status = nfs4_lookup_root(server, fhandle, info);
1da177e4
LT
1453 if (status == 0)
1454 status = nfs4_server_capabilities(server, fhandle);
1455 if (status == 0)
1456 status = nfs4_do_fsinfo(server, fhandle, info);
c12e87f4 1457 return nfs4_map_errors(status);
1da177e4
LT
1458}
1459
6b97fd3d
MN
1460/*
1461 * Get locations and (maybe) other attributes of a referral.
1462 * Note that we'll actually follow the referral later when
1463 * we detect fsid mismatch in inode revalidation
1464 */
1465static int nfs4_get_referral(struct inode *dir, struct qstr *name, struct nfs_fattr *fattr, struct nfs_fh *fhandle)
1466{
1467 int status = -ENOMEM;
1468 struct page *page = NULL;
1469 struct nfs4_fs_locations *locations = NULL;
6b97fd3d
MN
1470
1471 page = alloc_page(GFP_KERNEL);
1472 if (page == NULL)
1473 goto out;
1474 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
1475 if (locations == NULL)
1476 goto out;
1477
c228fd3a 1478 status = nfs4_proc_fs_locations(dir, name, locations, page);
6b97fd3d
MN
1479 if (status != 0)
1480 goto out;
1481 /* Make sure server returned a different fsid for the referral */
1482 if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
1483 dprintk("%s: server did not return a different fsid for a referral at %s\n", __FUNCTION__, name->name);
1484 status = -EIO;
1485 goto out;
1486 }
1487
1488 memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
1489 fattr->valid |= NFS_ATTR_FATTR_V4_REFERRAL;
1490 if (!fattr->mode)
1491 fattr->mode = S_IFDIR;
1492 memset(fhandle, 0, sizeof(struct nfs_fh));
1493out:
1494 if (page)
1495 __free_page(page);
1496 if (locations)
1497 kfree(locations);
1498 return status;
1499}
1500
1da177e4
LT
1501static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1502{
1503 struct nfs4_getattr_arg args = {
1504 .fh = fhandle,
1505 .bitmask = server->attr_bitmask,
1506 };
1507 struct nfs4_getattr_res res = {
1508 .fattr = fattr,
1509 .server = server,
1510 };
1511 struct rpc_message msg = {
1512 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
1513 .rpc_argp = &args,
1514 .rpc_resp = &res,
1515 };
1516
0e574af1 1517 nfs_fattr_init(fattr);
1da177e4
LT
1518 return rpc_call_sync(server->client, &msg, 0);
1519}
1520
1521static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1522{
1523 struct nfs4_exception exception = { };
1524 int err;
1525 do {
1526 err = nfs4_handle_exception(server,
1527 _nfs4_proc_getattr(server, fhandle, fattr),
1528 &exception);
1529 } while (exception.retry);
1530 return err;
1531}
1532
1533/*
1534 * The file is not closed if it is opened due to the a request to change
1535 * the size of the file. The open call will not be needed once the
1536 * VFS layer lookup-intents are implemented.
1537 *
1538 * Close is called when the inode is destroyed.
1539 * If we haven't opened the file for O_WRONLY, we
1540 * need to in the size_change case to obtain a stateid.
1541 *
1542 * Got race?
1543 * Because OPEN is always done by name in nfsv4, it is
1544 * possible that we opened a different file by the same
1545 * name. We can recognize this race condition, but we
1546 * can't do anything about it besides returning an error.
1547 *
1548 * This will be fixed with VFS changes (lookup-intent).
1549 */
1550static int
1551nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
1552 struct iattr *sattr)
1553{
08e9eac4
TM
1554 struct rpc_cred *cred;
1555 struct inode *inode = dentry->d_inode;
d530838b
TM
1556 struct nfs_open_context *ctx;
1557 struct nfs4_state *state = NULL;
1da177e4
LT
1558 int status;
1559
0e574af1 1560 nfs_fattr_init(fattr);
1da177e4 1561
1f163415 1562 cred = rpcauth_lookupcred(NFS_CLIENT(inode)->cl_auth, 0);
08e9eac4
TM
1563 if (IS_ERR(cred))
1564 return PTR_ERR(cred);
d530838b
TM
1565
1566 /* Search for an existing open(O_WRITE) file */
1567 ctx = nfs_find_open_context(inode, cred, FMODE_WRITE);
1568 if (ctx != NULL)
1569 state = ctx->state;
08e9eac4 1570
3e4f6290 1571 status = nfs4_do_setattr(inode, fattr, sattr, state);
65e4308d
TM
1572 if (status == 0)
1573 nfs_setattr_update_inode(inode, sattr);
d530838b
TM
1574 if (ctx != NULL)
1575 put_nfs_open_context(ctx);
08e9eac4 1576 put_rpccred(cred);
1da177e4
LT
1577 return status;
1578}
1579
2b3de441
DH
1580static int _nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
1581 struct qstr *name, struct nfs_fh *fhandle,
1582 struct nfs_fattr *fattr)
1583{
1584 int status;
1585 struct nfs4_lookup_arg args = {
1586 .bitmask = server->attr_bitmask,
1587 .dir_fh = dirfh,
1588 .name = name,
1589 };
1590 struct nfs4_lookup_res res = {
1591 .server = server,
1592 .fattr = fattr,
1593 .fh = fhandle,
1594 };
1595 struct rpc_message msg = {
1596 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
1597 .rpc_argp = &args,
1598 .rpc_resp = &res,
1599 };
1600
1601 nfs_fattr_init(fattr);
1602
1603 dprintk("NFS call lookupfh %s\n", name->name);
1604 status = rpc_call_sync(server->client, &msg, 0);
1605 dprintk("NFS reply lookupfh: %d\n", status);
2b3de441
DH
1606 return status;
1607}
1608
1609static int nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
1610 struct qstr *name, struct nfs_fh *fhandle,
1611 struct nfs_fattr *fattr)
1612{
1613 struct nfs4_exception exception = { };
1614 int err;
1615 do {
4e56e082
TM
1616 err = _nfs4_proc_lookupfh(server, dirfh, name, fhandle, fattr);
1617 /* FIXME: !!!! */
1618 if (err == -NFS4ERR_MOVED) {
1619 err = -EREMOTE;
1620 break;
1621 }
1622 err = nfs4_handle_exception(server, err, &exception);
2b3de441
DH
1623 } while (exception.retry);
1624 return err;
1625}
1626
1da177e4
LT
1627static int _nfs4_proc_lookup(struct inode *dir, struct qstr *name,
1628 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1629{
4e56e082 1630 int status;
1da177e4
LT
1631
1632 dprintk("NFS call lookup %s\n", name->name);
4e56e082 1633 status = _nfs4_proc_lookupfh(NFS_SERVER(dir), NFS_FH(dir), name, fhandle, fattr);
6b97fd3d
MN
1634 if (status == -NFS4ERR_MOVED)
1635 status = nfs4_get_referral(dir, name, fattr, fhandle);
1da177e4
LT
1636 dprintk("NFS reply lookup: %d\n", status);
1637 return status;
1638}
1639
1640static int nfs4_proc_lookup(struct inode *dir, struct qstr *name, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1641{
1642 struct nfs4_exception exception = { };
1643 int err;
1644 do {
1645 err = nfs4_handle_exception(NFS_SERVER(dir),
1646 _nfs4_proc_lookup(dir, name, fhandle, fattr),
1647 &exception);
1648 } while (exception.retry);
1649 return err;
1650}
1651
1652static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
1653{
1654 struct nfs4_accessargs args = {
1655 .fh = NFS_FH(inode),
1656 };
1657 struct nfs4_accessres res = { 0 };
1658 struct rpc_message msg = {
1659 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
1660 .rpc_argp = &args,
1661 .rpc_resp = &res,
1662 .rpc_cred = entry->cred,
1663 };
1664 int mode = entry->mask;
1665 int status;
1666
1667 /*
1668 * Determine which access bits we want to ask for...
1669 */
1670 if (mode & MAY_READ)
1671 args.access |= NFS4_ACCESS_READ;
1672 if (S_ISDIR(inode->i_mode)) {
1673 if (mode & MAY_WRITE)
1674 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
1675 if (mode & MAY_EXEC)
1676 args.access |= NFS4_ACCESS_LOOKUP;
1677 } else {
1678 if (mode & MAY_WRITE)
1679 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
1680 if (mode & MAY_EXEC)
1681 args.access |= NFS4_ACCESS_EXECUTE;
1682 }
1683 status = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
1684 if (!status) {
1685 entry->mask = 0;
1686 if (res.access & NFS4_ACCESS_READ)
1687 entry->mask |= MAY_READ;
1688 if (res.access & (NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE))
1689 entry->mask |= MAY_WRITE;
1690 if (res.access & (NFS4_ACCESS_LOOKUP|NFS4_ACCESS_EXECUTE))
1691 entry->mask |= MAY_EXEC;
1692 }
1693 return status;
1694}
1695
1696static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
1697{
1698 struct nfs4_exception exception = { };
1699 int err;
1700 do {
1701 err = nfs4_handle_exception(NFS_SERVER(inode),
1702 _nfs4_proc_access(inode, entry),
1703 &exception);
1704 } while (exception.retry);
1705 return err;
1706}
1707
1708/*
1709 * TODO: For the time being, we don't try to get any attributes
1710 * along with any of the zero-copy operations READ, READDIR,
1711 * READLINK, WRITE.
1712 *
1713 * In the case of the first three, we want to put the GETATTR
1714 * after the read-type operation -- this is because it is hard
1715 * to predict the length of a GETATTR response in v4, and thus
1716 * align the READ data correctly. This means that the GETATTR
1717 * may end up partially falling into the page cache, and we should
1718 * shift it into the 'tail' of the xdr_buf before processing.
1719 * To do this efficiently, we need to know the total length
1720 * of data received, which doesn't seem to be available outside
1721 * of the RPC layer.
1722 *
1723 * In the case of WRITE, we also want to put the GETATTR after
1724 * the operation -- in this case because we want to make sure
1725 * we get the post-operation mtime and size. This means that
1726 * we can't use xdr_encode_pages() as written: we need a variant
1727 * of it which would leave room in the 'tail' iovec.
1728 *
1729 * Both of these changes to the XDR layer would in fact be quite
1730 * minor, but I decided to leave them for a subsequent patch.
1731 */
1732static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
1733 unsigned int pgbase, unsigned int pglen)
1734{
1735 struct nfs4_readlink args = {
1736 .fh = NFS_FH(inode),
1737 .pgbase = pgbase,
1738 .pglen = pglen,
1739 .pages = &page,
1740 };
1741 struct rpc_message msg = {
1742 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
1743 .rpc_argp = &args,
1744 .rpc_resp = NULL,
1745 };
1746
1747 return rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
1748}
1749
1750static int nfs4_proc_readlink(struct inode *inode, struct page *page,
1751 unsigned int pgbase, unsigned int pglen)
1752{
1753 struct nfs4_exception exception = { };
1754 int err;
1755 do {
1756 err = nfs4_handle_exception(NFS_SERVER(inode),
1757 _nfs4_proc_readlink(inode, page, pgbase, pglen),
1758 &exception);
1759 } while (exception.retry);
1760 return err;
1761}
1762
1da177e4
LT
1763/*
1764 * Got race?
1765 * We will need to arrange for the VFS layer to provide an atomic open.
1766 * Until then, this create/open method is prone to inefficiency and race
1767 * conditions due to the lookup, create, and open VFS calls from sys_open()
1768 * placed on the wire.
1769 *
1770 * Given the above sorry state of affairs, I'm simply sending an OPEN.
1771 * The file will be opened again in the subsequent VFS open call
1772 * (nfs4_proc_file_open).
1773 *
1774 * The open for read will just hang around to be used by any process that
1775 * opens the file O_RDONLY. This will all be resolved with the VFS changes.
1776 */
1777
1778static int
1779nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
02a913a7 1780 int flags, struct nameidata *nd)
1da177e4 1781{
ad389da7
TM
1782 struct path path = {
1783 .mnt = nd->mnt,
1784 .dentry = dentry,
1785 };
1da177e4
LT
1786 struct nfs4_state *state;
1787 struct rpc_cred *cred;
1788 int status = 0;
1789
1f163415 1790 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4
LT
1791 if (IS_ERR(cred)) {
1792 status = PTR_ERR(cred);
1793 goto out;
1794 }
ad389da7 1795 state = nfs4_do_open(dir, &path, flags, sattr, cred);
1da177e4
LT
1796 put_rpccred(cred);
1797 if (IS_ERR(state)) {
1798 status = PTR_ERR(state);
1799 goto out;
1800 }
24ac23ab 1801 d_instantiate(dentry, igrab(state->inode));
1da177e4
LT
1802 if (flags & O_EXCL) {
1803 struct nfs_fattr fattr;
3e4f6290 1804 status = nfs4_do_setattr(state->inode, &fattr, sattr, state);
02a913a7 1805 if (status == 0)
65e4308d 1806 nfs_setattr_update_inode(state->inode, sattr);
aa53ed54 1807 nfs_post_op_update_inode(state->inode, &fattr);
02a913a7 1808 }
ad389da7 1809 if (status == 0 && (nd->flags & LOOKUP_OPEN) != 0)
4a35bd41 1810 status = nfs4_intent_set_file(nd, &path, state);
02a913a7 1811 else
4a35bd41 1812 nfs4_close_state(&path, state, flags);
1da177e4
LT
1813out:
1814 return status;
1815}
1816
1817static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
1818{
16e42959 1819 struct nfs_server *server = NFS_SERVER(dir);
1da177e4
LT
1820 struct nfs4_remove_arg args = {
1821 .fh = NFS_FH(dir),
1822 .name = name,
16e42959
TM
1823 .bitmask = server->attr_bitmask,
1824 };
1825 struct nfs_fattr dir_attr;
1826 struct nfs4_remove_res res = {
1827 .server = server,
1828 .dir_attr = &dir_attr,
1da177e4 1829 };
1da177e4
LT
1830 struct rpc_message msg = {
1831 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
1832 .rpc_argp = &args,
1833 .rpc_resp = &res,
1834 };
1835 int status;
1836
16e42959
TM
1837 nfs_fattr_init(res.dir_attr);
1838 status = rpc_call_sync(server->client, &msg, 0);
1839 if (status == 0) {
1840 update_changeattr(dir, &res.cinfo);
1841 nfs_post_op_update_inode(dir, res.dir_attr);
1842 }
1da177e4
LT
1843 return status;
1844}
1845
1846static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
1847{
1848 struct nfs4_exception exception = { };
1849 int err;
1850 do {
1851 err = nfs4_handle_exception(NFS_SERVER(dir),
1852 _nfs4_proc_remove(dir, name),
1853 &exception);
1854 } while (exception.retry);
1855 return err;
1856}
1857
1858struct unlink_desc {
1859 struct nfs4_remove_arg args;
16e42959
TM
1860 struct nfs4_remove_res res;
1861 struct nfs_fattr dir_attr;
1da177e4
LT
1862};
1863
1864static int nfs4_proc_unlink_setup(struct rpc_message *msg, struct dentry *dir,
1865 struct qstr *name)
1866{
16e42959 1867 struct nfs_server *server = NFS_SERVER(dir->d_inode);
1da177e4
LT
1868 struct unlink_desc *up;
1869
5cbded58 1870 up = kmalloc(sizeof(*up), GFP_KERNEL);
1da177e4
LT
1871 if (!up)
1872 return -ENOMEM;
1873
1874 up->args.fh = NFS_FH(dir->d_inode);
1875 up->args.name = name;
16e42959
TM
1876 up->args.bitmask = server->attr_bitmask;
1877 up->res.server = server;
1878 up->res.dir_attr = &up->dir_attr;
1da177e4
LT
1879
1880 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
1881 msg->rpc_argp = &up->args;
1882 msg->rpc_resp = &up->res;
1883 return 0;
1884}
1885
1886static int nfs4_proc_unlink_done(struct dentry *dir, struct rpc_task *task)
1887{
1888 struct rpc_message *msg = &task->tk_msg;
1889 struct unlink_desc *up;
1890
1891 if (msg->rpc_resp != NULL) {
1892 up = container_of(msg->rpc_resp, struct unlink_desc, res);
16e42959
TM
1893 update_changeattr(dir->d_inode, &up->res.cinfo);
1894 nfs_post_op_update_inode(dir->d_inode, up->res.dir_attr);
1da177e4
LT
1895 kfree(up);
1896 msg->rpc_resp = NULL;
1897 msg->rpc_argp = NULL;
1898 }
1899 return 0;
1900}
1901
1902static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
1903 struct inode *new_dir, struct qstr *new_name)
1904{
6caf2c82 1905 struct nfs_server *server = NFS_SERVER(old_dir);
1da177e4
LT
1906 struct nfs4_rename_arg arg = {
1907 .old_dir = NFS_FH(old_dir),
1908 .new_dir = NFS_FH(new_dir),
1909 .old_name = old_name,
1910 .new_name = new_name,
6caf2c82
TM
1911 .bitmask = server->attr_bitmask,
1912 };
1913 struct nfs_fattr old_fattr, new_fattr;
1914 struct nfs4_rename_res res = {
1915 .server = server,
1916 .old_fattr = &old_fattr,
1917 .new_fattr = &new_fattr,
1da177e4 1918 };
1da177e4
LT
1919 struct rpc_message msg = {
1920 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
1921 .rpc_argp = &arg,
1922 .rpc_resp = &res,
1923 };
1924 int status;
1925
6caf2c82
TM
1926 nfs_fattr_init(res.old_fattr);
1927 nfs_fattr_init(res.new_fattr);
1928 status = rpc_call_sync(server->client, &msg, 0);
1da177e4
LT
1929
1930 if (!status) {
1931 update_changeattr(old_dir, &res.old_cinfo);
6caf2c82 1932 nfs_post_op_update_inode(old_dir, res.old_fattr);
1da177e4 1933 update_changeattr(new_dir, &res.new_cinfo);
6caf2c82 1934 nfs_post_op_update_inode(new_dir, res.new_fattr);
1da177e4
LT
1935 }
1936 return status;
1937}
1938
1939static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
1940 struct inode *new_dir, struct qstr *new_name)
1941{
1942 struct nfs4_exception exception = { };
1943 int err;
1944 do {
1945 err = nfs4_handle_exception(NFS_SERVER(old_dir),
1946 _nfs4_proc_rename(old_dir, old_name,
1947 new_dir, new_name),
1948 &exception);
1949 } while (exception.retry);
1950 return err;
1951}
1952
1953static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
1954{
91ba2eee 1955 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
1956 struct nfs4_link_arg arg = {
1957 .fh = NFS_FH(inode),
1958 .dir_fh = NFS_FH(dir),
1959 .name = name,
91ba2eee
TM
1960 .bitmask = server->attr_bitmask,
1961 };
1962 struct nfs_fattr fattr, dir_attr;
1963 struct nfs4_link_res res = {
1964 .server = server,
1965 .fattr = &fattr,
1966 .dir_attr = &dir_attr,
1da177e4 1967 };
1da177e4
LT
1968 struct rpc_message msg = {
1969 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
1970 .rpc_argp = &arg,
91ba2eee 1971 .rpc_resp = &res,
1da177e4
LT
1972 };
1973 int status;
1974
91ba2eee
TM
1975 nfs_fattr_init(res.fattr);
1976 nfs_fattr_init(res.dir_attr);
1977 status = rpc_call_sync(server->client, &msg, 0);
1978 if (!status) {
1979 update_changeattr(dir, &res.cinfo);
1980 nfs_post_op_update_inode(dir, res.dir_attr);
73a3d07c 1981 nfs_post_op_update_inode(inode, res.fattr);
91ba2eee 1982 }
1da177e4
LT
1983
1984 return status;
1985}
1986
1987static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
1988{
1989 struct nfs4_exception exception = { };
1990 int err;
1991 do {
1992 err = nfs4_handle_exception(NFS_SERVER(inode),
1993 _nfs4_proc_link(inode, dir, name),
1994 &exception);
1995 } while (exception.retry);
1996 return err;
1997}
1998
4f390c15 1999static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2000 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
2001{
2002 struct nfs_server *server = NFS_SERVER(dir);
4f390c15
CL
2003 struct nfs_fh fhandle;
2004 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
2005 struct nfs4_create_arg arg = {
2006 .dir_fh = NFS_FH(dir),
2007 .server = server,
4f390c15 2008 .name = &dentry->d_name,
1da177e4
LT
2009 .attrs = sattr,
2010 .ftype = NF4LNK,
2011 .bitmask = server->attr_bitmask,
2012 };
2013 struct nfs4_create_res res = {
2014 .server = server,
4f390c15
CL
2015 .fh = &fhandle,
2016 .fattr = &fattr,
56ae19f3 2017 .dir_fattr = &dir_fattr,
1da177e4
LT
2018 };
2019 struct rpc_message msg = {
2020 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK],
2021 .rpc_argp = &arg,
2022 .rpc_resp = &res,
2023 };
2024 int status;
2025
94a6d753 2026 if (len > NFS4_MAXPATHLEN)
1da177e4 2027 return -ENAMETOOLONG;
4f390c15 2028
94a6d753
CL
2029 arg.u.symlink.pages = &page;
2030 arg.u.symlink.len = len;
4f390c15 2031 nfs_fattr_init(&fattr);
56ae19f3 2032 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2033
2034 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
4f390c15 2035 if (!status) {
1da177e4 2036 update_changeattr(dir, &res.dir_cinfo);
4f390c15
CL
2037 nfs_post_op_update_inode(dir, res.dir_fattr);
2038 status = nfs_instantiate(dentry, &fhandle, &fattr);
2039 }
1da177e4
LT
2040 return status;
2041}
2042
4f390c15 2043static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2044 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
2045{
2046 struct nfs4_exception exception = { };
2047 int err;
2048 do {
2049 err = nfs4_handle_exception(NFS_SERVER(dir),
94a6d753
CL
2050 _nfs4_proc_symlink(dir, dentry, page,
2051 len, sattr),
1da177e4
LT
2052 &exception);
2053 } while (exception.retry);
2054 return err;
2055}
2056
2057static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2058 struct iattr *sattr)
2059{
2060 struct nfs_server *server = NFS_SERVER(dir);
2061 struct nfs_fh fhandle;
56ae19f3 2062 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
2063 struct nfs4_create_arg arg = {
2064 .dir_fh = NFS_FH(dir),
2065 .server = server,
2066 .name = &dentry->d_name,
2067 .attrs = sattr,
2068 .ftype = NF4DIR,
2069 .bitmask = server->attr_bitmask,
2070 };
2071 struct nfs4_create_res res = {
2072 .server = server,
2073 .fh = &fhandle,
2074 .fattr = &fattr,
56ae19f3 2075 .dir_fattr = &dir_fattr,
1da177e4
LT
2076 };
2077 struct rpc_message msg = {
2078 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
2079 .rpc_argp = &arg,
2080 .rpc_resp = &res,
2081 };
2082 int status;
2083
0e574af1 2084 nfs_fattr_init(&fattr);
56ae19f3 2085 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2086
2087 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2088 if (!status) {
2089 update_changeattr(dir, &res.dir_cinfo);
56ae19f3 2090 nfs_post_op_update_inode(dir, res.dir_fattr);
1da177e4
LT
2091 status = nfs_instantiate(dentry, &fhandle, &fattr);
2092 }
2093 return status;
2094}
2095
2096static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2097 struct iattr *sattr)
2098{
2099 struct nfs4_exception exception = { };
2100 int err;
2101 do {
2102 err = nfs4_handle_exception(NFS_SERVER(dir),
2103 _nfs4_proc_mkdir(dir, dentry, sattr),
2104 &exception);
2105 } while (exception.retry);
2106 return err;
2107}
2108
2109static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
2110 u64 cookie, struct page *page, unsigned int count, int plus)
2111{
2112 struct inode *dir = dentry->d_inode;
2113 struct nfs4_readdir_arg args = {
2114 .fh = NFS_FH(dir),
2115 .pages = &page,
2116 .pgbase = 0,
2117 .count = count,
2118 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
2119 };
2120 struct nfs4_readdir_res res;
2121 struct rpc_message msg = {
2122 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
2123 .rpc_argp = &args,
2124 .rpc_resp = &res,
2125 .rpc_cred = cred,
2126 };
2127 int status;
2128
eadf4598
TM
2129 dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __FUNCTION__,
2130 dentry->d_parent->d_name.name,
2131 dentry->d_name.name,
2132 (unsigned long long)cookie);
1da177e4
LT
2133 nfs4_setup_readdir(cookie, NFS_COOKIEVERF(dir), dentry, &args);
2134 res.pgbase = args.pgbase;
2135 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2136 if (status == 0)
2137 memcpy(NFS_COOKIEVERF(dir), res.verifier.data, NFS4_VERIFIER_SIZE);
eadf4598 2138 dprintk("%s: returns %d\n", __FUNCTION__, status);
1da177e4
LT
2139 return status;
2140}
2141
2142static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
2143 u64 cookie, struct page *page, unsigned int count, int plus)
2144{
2145 struct nfs4_exception exception = { };
2146 int err;
2147 do {
2148 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode),
2149 _nfs4_proc_readdir(dentry, cred, cookie,
2150 page, count, plus),
2151 &exception);
2152 } while (exception.retry);
2153 return err;
2154}
2155
2156static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
2157 struct iattr *sattr, dev_t rdev)
2158{
2159 struct nfs_server *server = NFS_SERVER(dir);
2160 struct nfs_fh fh;
56ae19f3 2161 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
2162 struct nfs4_create_arg arg = {
2163 .dir_fh = NFS_FH(dir),
2164 .server = server,
2165 .name = &dentry->d_name,
2166 .attrs = sattr,
2167 .bitmask = server->attr_bitmask,
2168 };
2169 struct nfs4_create_res res = {
2170 .server = server,
2171 .fh = &fh,
2172 .fattr = &fattr,
56ae19f3 2173 .dir_fattr = &dir_fattr,
1da177e4
LT
2174 };
2175 struct rpc_message msg = {
2176 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
2177 .rpc_argp = &arg,
2178 .rpc_resp = &res,
2179 };
2180 int status;
2181 int mode = sattr->ia_mode;
2182
0e574af1 2183 nfs_fattr_init(&fattr);
56ae19f3 2184 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2185
2186 BUG_ON(!(sattr->ia_valid & ATTR_MODE));
2187 BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
2188 if (S_ISFIFO(mode))
2189 arg.ftype = NF4FIFO;
2190 else if (S_ISBLK(mode)) {
2191 arg.ftype = NF4BLK;
2192 arg.u.device.specdata1 = MAJOR(rdev);
2193 arg.u.device.specdata2 = MINOR(rdev);
2194 }
2195 else if (S_ISCHR(mode)) {
2196 arg.ftype = NF4CHR;
2197 arg.u.device.specdata1 = MAJOR(rdev);
2198 arg.u.device.specdata2 = MINOR(rdev);
2199 }
2200 else
2201 arg.ftype = NF4SOCK;
2202
2203 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2204 if (status == 0) {
2205 update_changeattr(dir, &res.dir_cinfo);
56ae19f3 2206 nfs_post_op_update_inode(dir, res.dir_fattr);
1da177e4
LT
2207 status = nfs_instantiate(dentry, &fh, &fattr);
2208 }
2209 return status;
2210}
2211
2212static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
2213 struct iattr *sattr, dev_t rdev)
2214{
2215 struct nfs4_exception exception = { };
2216 int err;
2217 do {
2218 err = nfs4_handle_exception(NFS_SERVER(dir),
2219 _nfs4_proc_mknod(dir, dentry, sattr, rdev),
2220 &exception);
2221 } while (exception.retry);
2222 return err;
2223}
2224
2225static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
2226 struct nfs_fsstat *fsstat)
2227{
2228 struct nfs4_statfs_arg args = {
2229 .fh = fhandle,
2230 .bitmask = server->attr_bitmask,
2231 };
2232 struct rpc_message msg = {
2233 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
2234 .rpc_argp = &args,
2235 .rpc_resp = fsstat,
2236 };
2237
0e574af1 2238 nfs_fattr_init(fsstat->fattr);
1da177e4
LT
2239 return rpc_call_sync(server->client, &msg, 0);
2240}
2241
2242static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
2243{
2244 struct nfs4_exception exception = { };
2245 int err;
2246 do {
2247 err = nfs4_handle_exception(server,
2248 _nfs4_proc_statfs(server, fhandle, fsstat),
2249 &exception);
2250 } while (exception.retry);
2251 return err;
2252}
2253
2254static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
2255 struct nfs_fsinfo *fsinfo)
2256{
2257 struct nfs4_fsinfo_arg args = {
2258 .fh = fhandle,
2259 .bitmask = server->attr_bitmask,
2260 };
2261 struct rpc_message msg = {
2262 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
2263 .rpc_argp = &args,
2264 .rpc_resp = fsinfo,
2265 };
2266
2267 return rpc_call_sync(server->client, &msg, 0);
2268}
2269
2270static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
2271{
2272 struct nfs4_exception exception = { };
2273 int err;
2274
2275 do {
2276 err = nfs4_handle_exception(server,
2277 _nfs4_do_fsinfo(server, fhandle, fsinfo),
2278 &exception);
2279 } while (exception.retry);
2280 return err;
2281}
2282
2283static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
2284{
0e574af1 2285 nfs_fattr_init(fsinfo->fattr);
1da177e4
LT
2286 return nfs4_do_fsinfo(server, fhandle, fsinfo);
2287}
2288
2289static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
2290 struct nfs_pathconf *pathconf)
2291{
2292 struct nfs4_pathconf_arg args = {
2293 .fh = fhandle,
2294 .bitmask = server->attr_bitmask,
2295 };
2296 struct rpc_message msg = {
2297 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
2298 .rpc_argp = &args,
2299 .rpc_resp = pathconf,
2300 };
2301
2302 /* None of the pathconf attributes are mandatory to implement */
2303 if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
2304 memset(pathconf, 0, sizeof(*pathconf));
2305 return 0;
2306 }
2307
0e574af1 2308 nfs_fattr_init(pathconf->fattr);
1da177e4
LT
2309 return rpc_call_sync(server->client, &msg, 0);
2310}
2311
2312static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
2313 struct nfs_pathconf *pathconf)
2314{
2315 struct nfs4_exception exception = { };
2316 int err;
2317
2318 do {
2319 err = nfs4_handle_exception(server,
2320 _nfs4_proc_pathconf(server, fhandle, pathconf),
2321 &exception);
2322 } while (exception.retry);
2323 return err;
2324}
2325
ec06c096 2326static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
1da177e4 2327{
ec06c096 2328 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 2329
ec06c096 2330 if (nfs4_async_handle_error(task, server) == -EAGAIN) {
1da177e4 2331 rpc_restart_call(task);
ec06c096 2332 return -EAGAIN;
1da177e4
LT
2333 }
2334 if (task->tk_status > 0)
ec06c096
TM
2335 renew_lease(server, data->timestamp);
2336 return 0;
1da177e4
LT
2337}
2338
ec06c096 2339static void nfs4_proc_read_setup(struct nfs_read_data *data)
1da177e4 2340{
1da177e4
LT
2341 struct rpc_message msg = {
2342 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ],
2343 .rpc_argp = &data->args,
2344 .rpc_resp = &data->res,
2345 .rpc_cred = data->cred,
2346 };
1da177e4
LT
2347
2348 data->timestamp = jiffies;
2349
ec06c096 2350 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2351}
2352
788e7a89 2353static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 2354{
1da177e4
LT
2355 struct inode *inode = data->inode;
2356
2357 if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
2358 rpc_restart_call(task);
788e7a89 2359 return -EAGAIN;
1da177e4 2360 }
4f9838c7 2361 if (task->tk_status >= 0) {
1da177e4 2362 renew_lease(NFS_SERVER(inode), data->timestamp);
4f9838c7
TM
2363 nfs_post_op_update_inode(inode, data->res.fattr);
2364 }
788e7a89 2365 return 0;
1da177e4
LT
2366}
2367
788e7a89 2368static void nfs4_proc_write_setup(struct nfs_write_data *data, int how)
1da177e4 2369{
1da177e4
LT
2370 struct rpc_message msg = {
2371 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE],
2372 .rpc_argp = &data->args,
2373 .rpc_resp = &data->res,
2374 .rpc_cred = data->cred,
2375 };
2376 struct inode *inode = data->inode;
4f9838c7 2377 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 2378 int stable;
1da177e4
LT
2379
2380 if (how & FLUSH_STABLE) {
2381 if (!NFS_I(inode)->ncommit)
2382 stable = NFS_FILE_SYNC;
2383 else
2384 stable = NFS_DATA_SYNC;
2385 } else
2386 stable = NFS_UNSTABLE;
2387 data->args.stable = stable;
4f9838c7
TM
2388 data->args.bitmask = server->attr_bitmask;
2389 data->res.server = server;
1da177e4
LT
2390
2391 data->timestamp = jiffies;
2392
1da177e4 2393 /* Finalize the task. */
788e7a89 2394 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2395}
2396
788e7a89 2397static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 2398{
1da177e4
LT
2399 struct inode *inode = data->inode;
2400
2401 if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
2402 rpc_restart_call(task);
788e7a89 2403 return -EAGAIN;
1da177e4 2404 }
4f9838c7
TM
2405 if (task->tk_status >= 0)
2406 nfs_post_op_update_inode(inode, data->res.fattr);
788e7a89 2407 return 0;
1da177e4
LT
2408}
2409
788e7a89 2410static void nfs4_proc_commit_setup(struct nfs_write_data *data, int how)
1da177e4 2411{
1da177e4
LT
2412 struct rpc_message msg = {
2413 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT],
2414 .rpc_argp = &data->args,
2415 .rpc_resp = &data->res,
2416 .rpc_cred = data->cred,
2417 };
788e7a89 2418 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 2419
4f9838c7
TM
2420 data->args.bitmask = server->attr_bitmask;
2421 data->res.server = server;
2422
788e7a89 2423 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2424}
2425
2426/*
2427 * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
2428 * standalone procedure for queueing an asynchronous RENEW.
2429 */
963d8fe5 2430static void nfs4_renew_done(struct rpc_task *task, void *data)
1da177e4 2431{
adfa6f98 2432 struct nfs_client *clp = (struct nfs_client *)task->tk_msg.rpc_argp;
963d8fe5 2433 unsigned long timestamp = (unsigned long)data;
1da177e4
LT
2434
2435 if (task->tk_status < 0) {
2436 switch (task->tk_status) {
2437 case -NFS4ERR_STALE_CLIENTID:
2438 case -NFS4ERR_EXPIRED:
2439 case -NFS4ERR_CB_PATH_DOWN:
2440 nfs4_schedule_state_recovery(clp);
2441 }
2442 return;
2443 }
2444 spin_lock(&clp->cl_lock);
2445 if (time_before(clp->cl_last_renewal,timestamp))
2446 clp->cl_last_renewal = timestamp;
2447 spin_unlock(&clp->cl_lock);
2448}
2449
963d8fe5
TM
2450static const struct rpc_call_ops nfs4_renew_ops = {
2451 .rpc_call_done = nfs4_renew_done,
2452};
2453
adfa6f98 2454int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2455{
2456 struct rpc_message msg = {
2457 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
2458 .rpc_argp = clp,
b4454fe1 2459 .rpc_cred = cred,
1da177e4
LT
2460 };
2461
2462 return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_SOFT,
963d8fe5 2463 &nfs4_renew_ops, (void *)jiffies);
1da177e4
LT
2464}
2465
adfa6f98 2466int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2467{
2468 struct rpc_message msg = {
2469 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
2470 .rpc_argp = clp,
b4454fe1 2471 .rpc_cred = cred,
1da177e4
LT
2472 };
2473 unsigned long now = jiffies;
2474 int status;
2475
2476 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2477 if (status < 0)
2478 return status;
2479 spin_lock(&clp->cl_lock);
2480 if (time_before(clp->cl_last_renewal,now))
2481 clp->cl_last_renewal = now;
2482 spin_unlock(&clp->cl_lock);
2483 return 0;
2484}
2485
aa1870af
BF
2486static inline int nfs4_server_supports_acls(struct nfs_server *server)
2487{
2488 return (server->caps & NFS_CAP_ACLS)
2489 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
2490 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
2491}
2492
2493/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_CACHE_SIZE, and that
2494 * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_CACHE_SIZE) bytes on
2495 * the stack.
2496 */
2497#define NFS4ACL_MAXPAGES (XATTR_SIZE_MAX >> PAGE_CACHE_SHIFT)
2498
2499static void buf_to_pages(const void *buf, size_t buflen,
2500 struct page **pages, unsigned int *pgbase)
2501{
2502 const void *p = buf;
2503
2504 *pgbase = offset_in_page(buf);
2505 p -= *pgbase;
2506 while (p < buf + buflen) {
2507 *(pages++) = virt_to_page(p);
2508 p += PAGE_CACHE_SIZE;
2509 }
2510}
2511
e50a1c2e
BF
2512struct nfs4_cached_acl {
2513 int cached;
2514 size_t len;
3e9d4154 2515 char data[0];
e50a1c2e
BF
2516};
2517
2518static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
2519{
2520 struct nfs_inode *nfsi = NFS_I(inode);
2521
2522 spin_lock(&inode->i_lock);
2523 kfree(nfsi->nfs4_acl);
2524 nfsi->nfs4_acl = acl;
2525 spin_unlock(&inode->i_lock);
2526}
2527
2528static void nfs4_zap_acl_attr(struct inode *inode)
2529{
2530 nfs4_set_cached_acl(inode, NULL);
2531}
2532
2533static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
2534{
2535 struct nfs_inode *nfsi = NFS_I(inode);
2536 struct nfs4_cached_acl *acl;
2537 int ret = -ENOENT;
2538
2539 spin_lock(&inode->i_lock);
2540 acl = nfsi->nfs4_acl;
2541 if (acl == NULL)
2542 goto out;
2543 if (buf == NULL) /* user is just asking for length */
2544 goto out_len;
2545 if (acl->cached == 0)
2546 goto out;
2547 ret = -ERANGE; /* see getxattr(2) man page */
2548 if (acl->len > buflen)
2549 goto out;
2550 memcpy(buf, acl->data, acl->len);
2551out_len:
2552 ret = acl->len;
2553out:
2554 spin_unlock(&inode->i_lock);
2555 return ret;
2556}
2557
2558static void nfs4_write_cached_acl(struct inode *inode, const char *buf, size_t acl_len)
2559{
2560 struct nfs4_cached_acl *acl;
2561
2562 if (buf && acl_len <= PAGE_SIZE) {
2563 acl = kmalloc(sizeof(*acl) + acl_len, GFP_KERNEL);
2564 if (acl == NULL)
2565 goto out;
2566 acl->cached = 1;
2567 memcpy(acl->data, buf, acl_len);
2568 } else {
2569 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
2570 if (acl == NULL)
2571 goto out;
2572 acl->cached = 0;
2573 }
2574 acl->len = acl_len;
2575out:
2576 nfs4_set_cached_acl(inode, acl);
2577}
2578
16b4289c 2579static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
aa1870af 2580{
aa1870af
BF
2581 struct page *pages[NFS4ACL_MAXPAGES];
2582 struct nfs_getaclargs args = {
2583 .fh = NFS_FH(inode),
2584 .acl_pages = pages,
2585 .acl_len = buflen,
2586 };
2587 size_t resp_len = buflen;
e50a1c2e 2588 void *resp_buf;
aa1870af
BF
2589 struct rpc_message msg = {
2590 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
2591 .rpc_argp = &args,
2592 .rpc_resp = &resp_len,
2593 };
e50a1c2e 2594 struct page *localpage = NULL;
aa1870af
BF
2595 int ret;
2596
e50a1c2e
BF
2597 if (buflen < PAGE_SIZE) {
2598 /* As long as we're doing a round trip to the server anyway,
2599 * let's be prepared for a page of acl data. */
2600 localpage = alloc_page(GFP_KERNEL);
2601 resp_buf = page_address(localpage);
2602 if (localpage == NULL)
2603 return -ENOMEM;
2604 args.acl_pages[0] = localpage;
2605 args.acl_pgbase = 0;
1d95db8e 2606 resp_len = args.acl_len = PAGE_SIZE;
e50a1c2e
BF
2607 } else {
2608 resp_buf = buf;
2609 buf_to_pages(buf, buflen, args.acl_pages, &args.acl_pgbase);
2610 }
aa1870af 2611 ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
e50a1c2e
BF
2612 if (ret)
2613 goto out_free;
2614 if (resp_len > args.acl_len)
2615 nfs4_write_cached_acl(inode, NULL, resp_len);
2616 else
2617 nfs4_write_cached_acl(inode, resp_buf, resp_len);
2618 if (buf) {
2619 ret = -ERANGE;
2620 if (resp_len > buflen)
2621 goto out_free;
2622 if (localpage)
2623 memcpy(buf, resp_buf, resp_len);
2624 }
2625 ret = resp_len;
2626out_free:
2627 if (localpage)
2628 __free_page(localpage);
aa1870af
BF
2629 return ret;
2630}
2631
16b4289c
TM
2632static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
2633{
2634 struct nfs4_exception exception = { };
2635 ssize_t ret;
2636 do {
2637 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
2638 if (ret >= 0)
2639 break;
2640 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
2641 } while (exception.retry);
2642 return ret;
2643}
2644
e50a1c2e
BF
2645static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
2646{
2647 struct nfs_server *server = NFS_SERVER(inode);
2648 int ret;
2649
2650 if (!nfs4_server_supports_acls(server))
2651 return -EOPNOTSUPP;
2652 ret = nfs_revalidate_inode(server, inode);
2653 if (ret < 0)
2654 return ret;
2655 ret = nfs4_read_cached_acl(inode, buf, buflen);
2656 if (ret != -ENOENT)
2657 return ret;
2658 return nfs4_get_acl_uncached(inode, buf, buflen);
2659}
2660
16b4289c 2661static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4b580ee3
BF
2662{
2663 struct nfs_server *server = NFS_SERVER(inode);
2664 struct page *pages[NFS4ACL_MAXPAGES];
2665 struct nfs_setaclargs arg = {
2666 .fh = NFS_FH(inode),
2667 .acl_pages = pages,
2668 .acl_len = buflen,
2669 };
2670 struct rpc_message msg = {
2671 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
2672 .rpc_argp = &arg,
2673 .rpc_resp = NULL,
2674 };
2675 int ret;
2676
2677 if (!nfs4_server_supports_acls(server))
2678 return -EOPNOTSUPP;
642ac549 2679 nfs_inode_return_delegation(inode);
4b580ee3 2680 buf_to_pages(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
1f163415 2681 ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
08efa202 2682 nfs_zap_caches(inode);
4b580ee3
BF
2683 return ret;
2684}
2685
16b4289c
TM
2686static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
2687{
2688 struct nfs4_exception exception = { };
2689 int err;
2690 do {
2691 err = nfs4_handle_exception(NFS_SERVER(inode),
2692 __nfs4_proc_set_acl(inode, buf, buflen),
2693 &exception);
2694 } while (exception.retry);
2695 return err;
2696}
2697
1da177e4 2698static int
faf5f49c 2699nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server)
1da177e4 2700{
7539bbab 2701 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
2702
2703 if (!clp || task->tk_status >= 0)
2704 return 0;
2705 switch(task->tk_status) {
2706 case -NFS4ERR_STALE_CLIENTID:
2707 case -NFS4ERR_STALE_STATEID:
2708 case -NFS4ERR_EXPIRED:
2709 rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL, NULL);
2710 nfs4_schedule_state_recovery(clp);
433fbe4c 2711 if (test_bit(NFS4CLNT_STATE_RECOVER, &clp->cl_state) == 0)
1da177e4
LT
2712 rpc_wake_up_task(task);
2713 task->tk_status = 0;
2714 return -EAGAIN;
1da177e4 2715 case -NFS4ERR_DELAY:
006ea73e
CL
2716 nfs_inc_server_stats((struct nfs_server *) server,
2717 NFSIOS_DELAY);
2718 case -NFS4ERR_GRACE:
1da177e4
LT
2719 rpc_delay(task, NFS4_POLL_RETRY_MAX);
2720 task->tk_status = 0;
2721 return -EAGAIN;
2722 case -NFS4ERR_OLD_STATEID:
2723 task->tk_status = 0;
2724 return -EAGAIN;
2725 }
2726 task->tk_status = nfs4_map_errors(task->tk_status);
2727 return 0;
2728}
2729
433fbe4c
TM
2730static int nfs4_wait_bit_interruptible(void *word)
2731{
2732 if (signal_pending(current))
2733 return -ERESTARTSYS;
2734 schedule();
2735 return 0;
2736}
2737
adfa6f98 2738static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp)
1da177e4 2739{
1da177e4 2740 sigset_t oldset;
433fbe4c 2741 int res;
1da177e4
LT
2742
2743 might_sleep();
2744
e148582e
TM
2745 rwsem_acquire(&clp->cl_sem.dep_map, 0, 0, _RET_IP_);
2746
1da177e4 2747 rpc_clnt_sigmask(clnt, &oldset);
433fbe4c
TM
2748 res = wait_on_bit(&clp->cl_state, NFS4CLNT_STATE_RECOVER,
2749 nfs4_wait_bit_interruptible,
2750 TASK_INTERRUPTIBLE);
1da177e4 2751 rpc_clnt_sigunmask(clnt, &oldset);
e148582e
TM
2752
2753 rwsem_release(&clp->cl_sem.dep_map, 1, _RET_IP_);
1da177e4
LT
2754 return res;
2755}
2756
2757static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
2758{
2759 sigset_t oldset;
2760 int res = 0;
2761
2762 might_sleep();
2763
2764 if (*timeout <= 0)
2765 *timeout = NFS4_POLL_RETRY_MIN;
2766 if (*timeout > NFS4_POLL_RETRY_MAX)
2767 *timeout = NFS4_POLL_RETRY_MAX;
2768 rpc_clnt_sigmask(clnt, &oldset);
2769 if (clnt->cl_intr) {
041e0e3b 2770 schedule_timeout_interruptible(*timeout);
1da177e4
LT
2771 if (signalled())
2772 res = -ERESTARTSYS;
041e0e3b
NA
2773 } else
2774 schedule_timeout_uninterruptible(*timeout);
1da177e4
LT
2775 rpc_clnt_sigunmask(clnt, &oldset);
2776 *timeout <<= 1;
2777 return res;
2778}
2779
2780/* This is the error handling routine for processes that are allowed
2781 * to sleep.
2782 */
10afec90 2783static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
1da177e4 2784{
7539bbab 2785 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
2786 int ret = errorcode;
2787
2788 exception->retry = 0;
2789 switch(errorcode) {
2790 case 0:
2791 return 0;
2792 case -NFS4ERR_STALE_CLIENTID:
2793 case -NFS4ERR_STALE_STATEID:
2794 case -NFS4ERR_EXPIRED:
433fbe4c 2795 nfs4_schedule_state_recovery(clp);
1da177e4
LT
2796 ret = nfs4_wait_clnt_recover(server->client, clp);
2797 if (ret == 0)
2798 exception->retry = 1;
2799 break;
c514983d 2800 case -NFS4ERR_FILE_OPEN:
1da177e4
LT
2801 case -NFS4ERR_GRACE:
2802 case -NFS4ERR_DELAY:
2803 ret = nfs4_delay(server->client, &exception->timeout);
2c56617d
TM
2804 if (ret != 0)
2805 break;
1da177e4 2806 case -NFS4ERR_OLD_STATEID:
2c56617d 2807 exception->retry = 1;
1da177e4
LT
2808 }
2809 /* We failed to handle the error */
2810 return nfs4_map_errors(ret);
2811}
2812
adfa6f98 2813int nfs4_proc_setclientid(struct nfs_client *clp, u32 program, unsigned short port, struct rpc_cred *cred)
1da177e4
LT
2814{
2815 nfs4_verifier sc_verifier;
2816 struct nfs4_setclientid setclientid = {
2817 .sc_verifier = &sc_verifier,
2818 .sc_prog = program,
2819 };
2820 struct rpc_message msg = {
2821 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
2822 .rpc_argp = &setclientid,
2823 .rpc_resp = clp,
286d7d6a 2824 .rpc_cred = cred,
1da177e4 2825 };
bc4785cd 2826 __be32 *p;
1da177e4
LT
2827 int loop = 0;
2828 int status;
2829
bc4785cd 2830 p = (__be32*)sc_verifier.data;
1da177e4
LT
2831 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
2832 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
2833
2834 for(;;) {
2835 setclientid.sc_name_len = scnprintf(setclientid.sc_name,
2836 sizeof(setclientid.sc_name), "%s/%u.%u.%u.%u %s %u",
24c8dbbb 2837 clp->cl_ipaddr, NIPQUAD(clp->cl_addr.sin_addr),
286d7d6a 2838 cred->cr_ops->cr_name,
1da177e4
LT
2839 clp->cl_id_uniquifier);
2840 setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
2841 sizeof(setclientid.sc_netid), "tcp");
2842 setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
2843 sizeof(setclientid.sc_uaddr), "%s.%d.%d",
2844 clp->cl_ipaddr, port >> 8, port & 255);
2845
2846 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2847 if (status != -NFS4ERR_CLID_INUSE)
2848 break;
2849 if (signalled())
2850 break;
2851 if (loop++ & 1)
2852 ssleep(clp->cl_lease_time + 1);
2853 else
2854 if (++clp->cl_id_uniquifier == 0)
2855 break;
2856 }
2857 return status;
2858}
2859
adfa6f98 2860static int _nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2861{
2862 struct nfs_fsinfo fsinfo;
2863 struct rpc_message msg = {
2864 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
2865 .rpc_argp = clp,
2866 .rpc_resp = &fsinfo,
286d7d6a 2867 .rpc_cred = cred,
1da177e4
LT
2868 };
2869 unsigned long now;
2870 int status;
2871
2872 now = jiffies;
2873 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2874 if (status == 0) {
2875 spin_lock(&clp->cl_lock);
2876 clp->cl_lease_time = fsinfo.lease_time * HZ;
2877 clp->cl_last_renewal = now;
58d9714a 2878 clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
1da177e4
LT
2879 spin_unlock(&clp->cl_lock);
2880 }
2881 return status;
2882}
2883
adfa6f98 2884int nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
51581f3b
TM
2885{
2886 long timeout;
2887 int err;
2888 do {
2889 err = _nfs4_proc_setclientid_confirm(clp, cred);
2890 switch (err) {
2891 case 0:
2892 return err;
2893 case -NFS4ERR_RESOURCE:
2894 /* The IBM lawyers misread another document! */
2895 case -NFS4ERR_DELAY:
2896 err = nfs4_delay(clp->cl_rpcclient, &timeout);
2897 }
2898 } while (err == 0);
2899 return err;
2900}
2901
fe650407
TM
2902struct nfs4_delegreturndata {
2903 struct nfs4_delegreturnargs args;
fa178f29 2904 struct nfs4_delegreturnres res;
fe650407
TM
2905 struct nfs_fh fh;
2906 nfs4_stateid stateid;
2907 struct rpc_cred *cred;
26e976a8 2908 unsigned long timestamp;
fa178f29 2909 struct nfs_fattr fattr;
fe650407
TM
2910 int rpc_status;
2911};
2912
2913static void nfs4_delegreturn_prepare(struct rpc_task *task, void *calldata)
1da177e4 2914{
fe650407 2915 struct nfs4_delegreturndata *data = calldata;
1da177e4
LT
2916 struct rpc_message msg = {
2917 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
fe650407 2918 .rpc_argp = &data->args,
fa178f29 2919 .rpc_resp = &data->res,
fe650407 2920 .rpc_cred = data->cred,
1da177e4 2921 };
fa178f29 2922 nfs_fattr_init(data->res.fattr);
fe650407
TM
2923 rpc_call_setup(task, &msg, 0);
2924}
1da177e4 2925
fe650407
TM
2926static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
2927{
2928 struct nfs4_delegreturndata *data = calldata;
2929 data->rpc_status = task->tk_status;
26e976a8 2930 if (data->rpc_status == 0)
fa178f29 2931 renew_lease(data->res.server, data->timestamp);
fe650407
TM
2932}
2933
2934static void nfs4_delegreturn_release(void *calldata)
2935{
2936 struct nfs4_delegreturndata *data = calldata;
2937
2938 put_rpccred(data->cred);
2939 kfree(calldata);
2940}
2941
c8d149f3 2942static const struct rpc_call_ops nfs4_delegreturn_ops = {
fe650407
TM
2943 .rpc_call_prepare = nfs4_delegreturn_prepare,
2944 .rpc_call_done = nfs4_delegreturn_done,
2945 .rpc_release = nfs4_delegreturn_release,
2946};
2947
2948static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
2949{
2950 struct nfs4_delegreturndata *data;
fa178f29 2951 struct nfs_server *server = NFS_SERVER(inode);
fe650407
TM
2952 struct rpc_task *task;
2953 int status;
2954
2955 data = kmalloc(sizeof(*data), GFP_KERNEL);
2956 if (data == NULL)
2957 return -ENOMEM;
2958 data->args.fhandle = &data->fh;
2959 data->args.stateid = &data->stateid;
fa178f29 2960 data->args.bitmask = server->attr_bitmask;
fe650407
TM
2961 nfs_copy_fh(&data->fh, NFS_FH(inode));
2962 memcpy(&data->stateid, stateid, sizeof(data->stateid));
fa178f29
TM
2963 data->res.fattr = &data->fattr;
2964 data->res.server = server;
fe650407 2965 data->cred = get_rpccred(cred);
26e976a8 2966 data->timestamp = jiffies;
fe650407
TM
2967 data->rpc_status = 0;
2968
2969 task = rpc_run_task(NFS_CLIENT(inode), RPC_TASK_ASYNC, &nfs4_delegreturn_ops, data);
7a1218a2 2970 if (IS_ERR(task))
fe650407 2971 return PTR_ERR(task);
fe650407 2972 status = nfs4_wait_for_completion_rpc_task(task);
fa178f29 2973 if (status == 0) {
fe650407 2974 status = data->rpc_status;
fa178f29
TM
2975 if (status == 0)
2976 nfs_post_op_update_inode(inode, &data->fattr);
2977 }
e6b3c4db 2978 rpc_put_task(task);
fe650407 2979 return status;
1da177e4
LT
2980}
2981
2982int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
2983{
2984 struct nfs_server *server = NFS_SERVER(inode);
2985 struct nfs4_exception exception = { };
2986 int err;
2987 do {
2988 err = _nfs4_proc_delegreturn(inode, cred, stateid);
2989 switch (err) {
2990 case -NFS4ERR_STALE_STATEID:
2991 case -NFS4ERR_EXPIRED:
1da177e4
LT
2992 case 0:
2993 return 0;
2994 }
2995 err = nfs4_handle_exception(server, err, &exception);
2996 } while (exception.retry);
2997 return err;
2998}
2999
3000#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
3001#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
3002
3003/*
3004 * sleep, with exponential backoff, and retry the LOCK operation.
3005 */
3006static unsigned long
3007nfs4_set_lock_task_retry(unsigned long timeout)
3008{
041e0e3b 3009 schedule_timeout_interruptible(timeout);
1da177e4
LT
3010 timeout <<= 1;
3011 if (timeout > NFS4_LOCK_MAXTIMEOUT)
3012 return NFS4_LOCK_MAXTIMEOUT;
3013 return timeout;
3014}
3015
1da177e4
LT
3016static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3017{
3018 struct inode *inode = state->inode;
3019 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 3020 struct nfs_client *clp = server->nfs_client;
911d1aaf 3021 struct nfs_lockt_args arg = {
1da177e4 3022 .fh = NFS_FH(inode),
911d1aaf 3023 .fl = request,
1da177e4 3024 };
911d1aaf
TM
3025 struct nfs_lockt_res res = {
3026 .denied = request,
1da177e4
LT
3027 };
3028 struct rpc_message msg = {
3029 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
3030 .rpc_argp = &arg,
3031 .rpc_resp = &res,
3032 .rpc_cred = state->owner->so_cred,
3033 };
1da177e4
LT
3034 struct nfs4_lock_state *lsp;
3035 int status;
3036
3037 down_read(&clp->cl_sem);
911d1aaf 3038 arg.lock_owner.clientid = clp->cl_clientid;
8d0a8a9d
TM
3039 status = nfs4_set_lock_state(state, request);
3040 if (status != 0)
3041 goto out;
3042 lsp = request->fl_u.nfs4_fl.owner;
9f958ab8 3043 arg.lock_owner.id = lsp->ls_id.id;
1da177e4 3044 status = rpc_call_sync(server->client, &msg, 0);
911d1aaf
TM
3045 switch (status) {
3046 case 0:
3047 request->fl_type = F_UNLCK;
3048 break;
3049 case -NFS4ERR_DENIED:
3050 status = 0;
1da177e4 3051 }
70cc6487 3052 request->fl_ops->fl_release_private(request);
8d0a8a9d 3053out:
1da177e4
LT
3054 up_read(&clp->cl_sem);
3055 return status;
3056}
3057
3058static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3059{
3060 struct nfs4_exception exception = { };
3061 int err;
3062
3063 do {
3064 err = nfs4_handle_exception(NFS_SERVER(state->inode),
3065 _nfs4_proc_getlk(state, cmd, request),
3066 &exception);
3067 } while (exception.retry);
3068 return err;
3069}
3070
3071static int do_vfs_lock(struct file *file, struct file_lock *fl)
3072{
3073 int res = 0;
3074 switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
3075 case FL_POSIX:
3076 res = posix_lock_file_wait(file, fl);
3077 break;
3078 case FL_FLOCK:
3079 res = flock_lock_file_wait(file, fl);
3080 break;
3081 default:
3082 BUG();
3083 }
1da177e4
LT
3084 return res;
3085}
3086
faf5f49c 3087struct nfs4_unlockdata {
911d1aaf
TM
3088 struct nfs_locku_args arg;
3089 struct nfs_locku_res res;
faf5f49c
TM
3090 struct nfs4_lock_state *lsp;
3091 struct nfs_open_context *ctx;
911d1aaf
TM
3092 struct file_lock fl;
3093 const struct nfs_server *server;
26e976a8 3094 unsigned long timestamp;
faf5f49c
TM
3095};
3096
911d1aaf
TM
3097static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
3098 struct nfs_open_context *ctx,
3099 struct nfs4_lock_state *lsp,
3100 struct nfs_seqid *seqid)
3101{
3102 struct nfs4_unlockdata *p;
3103 struct inode *inode = lsp->ls_state->inode;
3104
3105 p = kmalloc(sizeof(*p), GFP_KERNEL);
3106 if (p == NULL)
3107 return NULL;
3108 p->arg.fh = NFS_FH(inode);
3109 p->arg.fl = &p->fl;
3110 p->arg.seqid = seqid;
3111 p->arg.stateid = &lsp->ls_stateid;
3112 p->lsp = lsp;
3113 atomic_inc(&lsp->ls_count);
3114 /* Ensure we don't close file until we're done freeing locks! */
3115 p->ctx = get_nfs_open_context(ctx);
3116 memcpy(&p->fl, fl, sizeof(p->fl));
3117 p->server = NFS_SERVER(inode);
3118 return p;
3119}
3120
06f814a3 3121static void nfs4_locku_release_calldata(void *data)
faf5f49c 3122{
963d8fe5 3123 struct nfs4_unlockdata *calldata = data;
911d1aaf 3124 nfs_free_seqid(calldata->arg.seqid);
06f814a3
TM
3125 nfs4_put_lock_state(calldata->lsp);
3126 put_nfs_open_context(calldata->ctx);
3127 kfree(calldata);
faf5f49c
TM
3128}
3129
963d8fe5 3130static void nfs4_locku_done(struct rpc_task *task, void *data)
faf5f49c 3131{
963d8fe5 3132 struct nfs4_unlockdata *calldata = data;
faf5f49c 3133
06f814a3
TM
3134 if (RPC_ASSASSINATED(task))
3135 return;
911d1aaf 3136 nfs_increment_lock_seqid(task->tk_status, calldata->arg.seqid);
faf5f49c
TM
3137 switch (task->tk_status) {
3138 case 0:
3139 memcpy(calldata->lsp->ls_stateid.data,
911d1aaf 3140 calldata->res.stateid.data,
faf5f49c 3141 sizeof(calldata->lsp->ls_stateid.data));
26e976a8 3142 renew_lease(calldata->server, calldata->timestamp);
faf5f49c
TM
3143 break;
3144 case -NFS4ERR_STALE_STATEID:
3145 case -NFS4ERR_EXPIRED:
faf5f49c
TM
3146 break;
3147 default:
a6a352e9 3148 if (nfs4_async_handle_error(task, calldata->server) == -EAGAIN)
faf5f49c 3149 rpc_restart_call(task);
faf5f49c 3150 }
faf5f49c
TM
3151}
3152
4ce70ada 3153static void nfs4_locku_prepare(struct rpc_task *task, void *data)
faf5f49c 3154{
4ce70ada 3155 struct nfs4_unlockdata *calldata = data;
1da177e4
LT
3156 struct rpc_message msg = {
3157 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
faf5f49c
TM
3158 .rpc_argp = &calldata->arg,
3159 .rpc_resp = &calldata->res,
3160 .rpc_cred = calldata->lsp->ls_state->owner->so_cred,
1da177e4 3161 };
faf5f49c 3162
911d1aaf 3163 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
faf5f49c
TM
3164 return;
3165 if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) {
963d8fe5
TM
3166 /* Note: exit _without_ running nfs4_locku_done */
3167 task->tk_action = NULL;
faf5f49c
TM
3168 return;
3169 }
26e976a8 3170 calldata->timestamp = jiffies;
faf5f49c
TM
3171 rpc_call_setup(task, &msg, 0);
3172}
3173
963d8fe5 3174static const struct rpc_call_ops nfs4_locku_ops = {
4ce70ada 3175 .rpc_call_prepare = nfs4_locku_prepare,
963d8fe5 3176 .rpc_call_done = nfs4_locku_done,
06f814a3 3177 .rpc_release = nfs4_locku_release_calldata,
963d8fe5
TM
3178};
3179
a5d16a4d
TM
3180static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
3181 struct nfs_open_context *ctx,
3182 struct nfs4_lock_state *lsp,
3183 struct nfs_seqid *seqid)
3184{
3185 struct nfs4_unlockdata *data;
a5d16a4d
TM
3186
3187 data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
3188 if (data == NULL) {
3189 nfs_free_seqid(seqid);
3190 return ERR_PTR(-ENOMEM);
3191 }
3192
7a1218a2 3193 return rpc_run_task(NFS_CLIENT(lsp->ls_state->inode), RPC_TASK_ASYNC, &nfs4_locku_ops, data);
a5d16a4d
TM
3194}
3195
faf5f49c
TM
3196static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
3197{
911d1aaf 3198 struct nfs_seqid *seqid;
1da177e4 3199 struct nfs4_lock_state *lsp;
06f814a3
TM
3200 struct rpc_task *task;
3201 int status = 0;
faf5f49c 3202
8d0a8a9d 3203 status = nfs4_set_lock_state(state, request);
9b073574
TM
3204 /* Unlock _before_ we do the RPC call */
3205 request->fl_flags |= FL_EXISTS;
3206 if (do_vfs_lock(request->fl_file, request) == -ENOENT)
3207 goto out;
8d0a8a9d 3208 if (status != 0)
9b073574
TM
3209 goto out;
3210 /* Is this a delegated lock? */
3211 if (test_bit(NFS_DELEGATED_STATE, &state->flags))
3212 goto out;
8d0a8a9d 3213 lsp = request->fl_u.nfs4_fl.owner;
911d1aaf 3214 seqid = nfs_alloc_seqid(&lsp->ls_seqid);
9b073574 3215 status = -ENOMEM;
911d1aaf 3216 if (seqid == NULL)
9b073574 3217 goto out;
a5d16a4d
TM
3218 task = nfs4_do_unlck(request, request->fl_file->private_data, lsp, seqid);
3219 status = PTR_ERR(task);
3220 if (IS_ERR(task))
9b073574 3221 goto out;
a5d16a4d 3222 status = nfs4_wait_for_completion_rpc_task(task);
e6b3c4db 3223 rpc_put_task(task);
9b073574 3224out:
1da177e4
LT
3225 return status;
3226}
3227
a5d16a4d
TM
3228struct nfs4_lockdata {
3229 struct nfs_lock_args arg;
3230 struct nfs_lock_res res;
3231 struct nfs4_lock_state *lsp;
3232 struct nfs_open_context *ctx;
3233 struct file_lock fl;
26e976a8 3234 unsigned long timestamp;
a5d16a4d
TM
3235 int rpc_status;
3236 int cancelled;
3237};
3238
3239static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
3240 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp)
1da177e4 3241{
a5d16a4d
TM
3242 struct nfs4_lockdata *p;
3243 struct inode *inode = lsp->ls_state->inode;
1da177e4 3244 struct nfs_server *server = NFS_SERVER(inode);
a5d16a4d
TM
3245
3246 p = kzalloc(sizeof(*p), GFP_KERNEL);
3247 if (p == NULL)
3248 return NULL;
3249
3250 p->arg.fh = NFS_FH(inode);
3251 p->arg.fl = &p->fl;
3252 p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid);
3253 if (p->arg.lock_seqid == NULL)
3254 goto out_free;
3255 p->arg.lock_stateid = &lsp->ls_stateid;
7539bbab 3256 p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
9f958ab8 3257 p->arg.lock_owner.id = lsp->ls_id.id;
a5d16a4d
TM
3258 p->lsp = lsp;
3259 atomic_inc(&lsp->ls_count);
3260 p->ctx = get_nfs_open_context(ctx);
3261 memcpy(&p->fl, fl, sizeof(p->fl));
3262 return p;
3263out_free:
3264 kfree(p);
3265 return NULL;
3266}
3267
3268static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
3269{
3270 struct nfs4_lockdata *data = calldata;
3271 struct nfs4_state *state = data->lsp->ls_state;
3272 struct nfs4_state_owner *sp = state->owner;
1da177e4 3273 struct rpc_message msg = {
a5d16a4d
TM
3274 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
3275 .rpc_argp = &data->arg,
3276 .rpc_resp = &data->res,
3277 .rpc_cred = sp->so_cred,
1da177e4 3278 };
06735b34 3279
a5d16a4d
TM
3280 if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
3281 return;
3282 dprintk("%s: begin!\n", __FUNCTION__);
3283 /* Do we need to do an open_to_lock_owner? */
3284 if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
3285 data->arg.open_seqid = nfs_alloc_seqid(&sp->so_seqid);
3286 if (data->arg.open_seqid == NULL) {
3287 data->rpc_status = -ENOMEM;
3288 task->tk_action = NULL;
06735b34 3289 goto out;
8d0a8a9d 3290 }
a5d16a4d
TM
3291 data->arg.open_stateid = &state->stateid;
3292 data->arg.new_lock_owner = 1;
3293 }
26e976a8 3294 data->timestamp = jiffies;
a5d16a4d 3295 rpc_call_setup(task, &msg, 0);
06735b34 3296out:
a5d16a4d
TM
3297 dprintk("%s: done!, ret = %d\n", __FUNCTION__, data->rpc_status);
3298}
3299
3300static void nfs4_lock_done(struct rpc_task *task, void *calldata)
3301{
3302 struct nfs4_lockdata *data = calldata;
3303
3304 dprintk("%s: begin!\n", __FUNCTION__);
3305
3306 data->rpc_status = task->tk_status;
3307 if (RPC_ASSASSINATED(task))
3308 goto out;
3309 if (data->arg.new_lock_owner != 0) {
3310 nfs_increment_open_seqid(data->rpc_status, data->arg.open_seqid);
3311 if (data->rpc_status == 0)
3312 nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
3313 else
3314 goto out;
3315 }
3316 if (data->rpc_status == 0) {
3317 memcpy(data->lsp->ls_stateid.data, data->res.stateid.data,
3318 sizeof(data->lsp->ls_stateid.data));
3319 data->lsp->ls_flags |= NFS_LOCK_INITIALIZED;
88be9f99 3320 renew_lease(NFS_SERVER(data->ctx->path.dentry->d_inode), data->timestamp);
a5d16a4d
TM
3321 }
3322 nfs_increment_lock_seqid(data->rpc_status, data->arg.lock_seqid);
3323out:
3324 dprintk("%s: done, ret = %d!\n", __FUNCTION__, data->rpc_status);
3325}
3326
3327static void nfs4_lock_release(void *calldata)
3328{
3329 struct nfs4_lockdata *data = calldata;
3330
3331 dprintk("%s: begin!\n", __FUNCTION__);
3332 if (data->arg.open_seqid != NULL)
3333 nfs_free_seqid(data->arg.open_seqid);
3334 if (data->cancelled != 0) {
3335 struct rpc_task *task;
3336 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
3337 data->arg.lock_seqid);
3338 if (!IS_ERR(task))
e6b3c4db 3339 rpc_put_task(task);
a5d16a4d
TM
3340 dprintk("%s: cancelling lock!\n", __FUNCTION__);
3341 } else
3342 nfs_free_seqid(data->arg.lock_seqid);
3343 nfs4_put_lock_state(data->lsp);
3344 put_nfs_open_context(data->ctx);
3345 kfree(data);
3346 dprintk("%s: done!\n", __FUNCTION__);
3347}
3348
3349static const struct rpc_call_ops nfs4_lock_ops = {
3350 .rpc_call_prepare = nfs4_lock_prepare,
3351 .rpc_call_done = nfs4_lock_done,
3352 .rpc_release = nfs4_lock_release,
3353};
3354
3355static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int reclaim)
3356{
3357 struct nfs4_lockdata *data;
3358 struct rpc_task *task;
3359 int ret;
3360
3361 dprintk("%s: begin!\n", __FUNCTION__);
3362 data = nfs4_alloc_lockdata(fl, fl->fl_file->private_data,
3363 fl->fl_u.nfs4_fl.owner);
3364 if (data == NULL)
3365 return -ENOMEM;
3366 if (IS_SETLKW(cmd))
3367 data->arg.block = 1;
3368 if (reclaim != 0)
3369 data->arg.reclaim = 1;
3370 task = rpc_run_task(NFS_CLIENT(state->inode), RPC_TASK_ASYNC,
3371 &nfs4_lock_ops, data);
7a1218a2 3372 if (IS_ERR(task))
a5d16a4d 3373 return PTR_ERR(task);
a5d16a4d
TM
3374 ret = nfs4_wait_for_completion_rpc_task(task);
3375 if (ret == 0) {
3376 ret = data->rpc_status;
3377 if (ret == -NFS4ERR_DENIED)
3378 ret = -EAGAIN;
3379 } else
3380 data->cancelled = 1;
e6b3c4db 3381 rpc_put_task(task);
a5d16a4d
TM
3382 dprintk("%s: done, ret = %d!\n", __FUNCTION__, ret);
3383 return ret;
1da177e4
LT
3384}
3385
3386static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
3387{
202b50dc
TM
3388 struct nfs_server *server = NFS_SERVER(state->inode);
3389 struct nfs4_exception exception = { };
3390 int err;
3391
3392 do {
42a2d13e
TM
3393 /* Cache the lock if possible... */
3394 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
3395 return 0;
202b50dc
TM
3396 err = _nfs4_do_setlk(state, F_SETLK, request, 1);
3397 if (err != -NFS4ERR_DELAY)
3398 break;
3399 nfs4_handle_exception(server, err, &exception);
3400 } while (exception.retry);
3401 return err;
1da177e4
LT
3402}
3403
3404static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
3405{
202b50dc
TM
3406 struct nfs_server *server = NFS_SERVER(state->inode);
3407 struct nfs4_exception exception = { };
3408 int err;
3409
6bfc93ef
TM
3410 err = nfs4_set_lock_state(state, request);
3411 if (err != 0)
3412 return err;
202b50dc 3413 do {
42a2d13e
TM
3414 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
3415 return 0;
202b50dc
TM
3416 err = _nfs4_do_setlk(state, F_SETLK, request, 0);
3417 if (err != -NFS4ERR_DELAY)
3418 break;
3419 nfs4_handle_exception(server, err, &exception);
3420 } while (exception.retry);
3421 return err;
1da177e4
LT
3422}
3423
3424static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3425{
adfa6f98 3426 struct nfs_client *clp = state->owner->so_client;
01c3b861 3427 unsigned char fl_flags = request->fl_flags;
1da177e4
LT
3428 int status;
3429
6bfc93ef 3430 /* Is this a delegated open? */
6bfc93ef
TM
3431 status = nfs4_set_lock_state(state, request);
3432 if (status != 0)
3433 goto out;
01c3b861
TM
3434 request->fl_flags |= FL_ACCESS;
3435 status = do_vfs_lock(request->fl_file, request);
3436 if (status < 0)
3437 goto out;
3438 down_read(&clp->cl_sem);
3439 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
3440 struct nfs_inode *nfsi = NFS_I(state->inode);
3441 /* Yes: cache locks! */
3442 down_read(&nfsi->rwsem);
3443 /* ...but avoid races with delegation recall... */
3444 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
3445 request->fl_flags = fl_flags & ~FL_SLEEP;
3446 status = do_vfs_lock(request->fl_file, request);
3447 up_read(&nfsi->rwsem);
3448 goto out_unlock;
3449 }
3450 up_read(&nfsi->rwsem);
3451 }
6bfc93ef
TM
3452 status = _nfs4_do_setlk(state, cmd, request, 0);
3453 if (status != 0)
01c3b861 3454 goto out_unlock;
6bfc93ef 3455 /* Note: we always want to sleep here! */
01c3b861 3456 request->fl_flags = fl_flags | FL_SLEEP;
6bfc93ef
TM
3457 if (do_vfs_lock(request->fl_file, request) < 0)
3458 printk(KERN_WARNING "%s: VFS is out of sync with lock manager!\n", __FUNCTION__);
01c3b861 3459out_unlock:
1da177e4 3460 up_read(&clp->cl_sem);
01c3b861
TM
3461out:
3462 request->fl_flags = fl_flags;
1da177e4
LT
3463 return status;
3464}
3465
3466static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3467{
3468 struct nfs4_exception exception = { };
3469 int err;
3470
3471 do {
3472 err = nfs4_handle_exception(NFS_SERVER(state->inode),
3473 _nfs4_proc_setlk(state, cmd, request),
3474 &exception);
3475 } while (exception.retry);
3476 return err;
3477}
3478
3479static int
3480nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
3481{
3482 struct nfs_open_context *ctx;
3483 struct nfs4_state *state;
3484 unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
3485 int status;
3486
3487 /* verify open state */
3488 ctx = (struct nfs_open_context *)filp->private_data;
3489 state = ctx->state;
3490
3491 if (request->fl_start < 0 || request->fl_end < 0)
3492 return -EINVAL;
3493
3494 if (IS_GETLK(cmd))
3495 return nfs4_proc_getlk(state, F_GETLK, request);
3496
3497 if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
3498 return -EINVAL;
3499
3500 if (request->fl_type == F_UNLCK)
3501 return nfs4_proc_unlck(state, cmd, request);
3502
3503 do {
3504 status = nfs4_proc_setlk(state, cmd, request);
3505 if ((status != -EAGAIN) || IS_SETLK(cmd))
3506 break;
3507 timeout = nfs4_set_lock_task_retry(timeout);
3508 status = -ERESTARTSYS;
3509 if (signalled())
3510 break;
3511 } while(status < 0);
1da177e4
LT
3512 return status;
3513}
3514
888e694c
TM
3515int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
3516{
3517 struct nfs_server *server = NFS_SERVER(state->inode);
3518 struct nfs4_exception exception = { };
3519 int err;
3520
3521 err = nfs4_set_lock_state(state, fl);
3522 if (err != 0)
3523 goto out;
3524 do {
3525 err = _nfs4_do_setlk(state, F_SETLK, fl, 0);
3526 if (err != -NFS4ERR_DELAY)
3527 break;
3528 err = nfs4_handle_exception(server, err, &exception);
3529 } while (exception.retry);
3530out:
3531 return err;
3532}
6b3b5496 3533
aa1870af
BF
3534#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
3535
6b3b5496
BF
3536int nfs4_setxattr(struct dentry *dentry, const char *key, const void *buf,
3537 size_t buflen, int flags)
3538{
4b580ee3
BF
3539 struct inode *inode = dentry->d_inode;
3540
3541 if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
3542 return -EOPNOTSUPP;
3543
3544 if (!S_ISREG(inode->i_mode) &&
3545 (!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX))
3546 return -EPERM;
3547
3548 return nfs4_proc_set_acl(inode, buf, buflen);
6b3b5496
BF
3549}
3550
3551/* The getxattr man page suggests returning -ENODATA for unknown attributes,
3552 * and that's what we'll do for e.g. user attributes that haven't been set.
3553 * But we'll follow ext2/ext3's lead by returning -EOPNOTSUPP for unsupported
3554 * attributes in kernel-managed attribute namespaces. */
3555ssize_t nfs4_getxattr(struct dentry *dentry, const char *key, void *buf,
3556 size_t buflen)
3557{
aa1870af
BF
3558 struct inode *inode = dentry->d_inode;
3559
3560 if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
3561 return -EOPNOTSUPP;
3562
3563 return nfs4_proc_get_acl(inode, buf, buflen);
6b3b5496
BF
3564}
3565
3566ssize_t nfs4_listxattr(struct dentry *dentry, char *buf, size_t buflen)
3567{
aa1870af 3568 size_t len = strlen(XATTR_NAME_NFSV4_ACL) + 1;
6b3b5496 3569
096455a2
BF
3570 if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
3571 return 0;
6b3b5496
BF
3572 if (buf && buflen < len)
3573 return -ERANGE;
3574 if (buf)
aa1870af
BF
3575 memcpy(buf, XATTR_NAME_NFSV4_ACL, len);
3576 return len;
6b3b5496
BF
3577}
3578
c228fd3a 3579int nfs4_proc_fs_locations(struct inode *dir, struct qstr *name,
7aaa0b3b 3580 struct nfs4_fs_locations *fs_locations, struct page *page)
683b57b4
TM
3581{
3582 struct nfs_server *server = NFS_SERVER(dir);
3583 u32 bitmask[2] = {
361e624f
MN
3584 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
3585 [1] = FATTR4_WORD1_MOUNTED_ON_FILEID,
683b57b4
TM
3586 };
3587 struct nfs4_fs_locations_arg args = {
3588 .dir_fh = NFS_FH(dir),
c228fd3a 3589 .name = name,
683b57b4
TM
3590 .page = page,
3591 .bitmask = bitmask,
3592 };
3593 struct rpc_message msg = {
3594 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
3595 .rpc_argp = &args,
7aaa0b3b 3596 .rpc_resp = fs_locations,
683b57b4
TM
3597 };
3598 int status;
3599
3600 dprintk("%s: start\n", __FUNCTION__);
c228fd3a 3601 nfs_fattr_init(&fs_locations->fattr);
683b57b4 3602 fs_locations->server = server;
830b8e33 3603 fs_locations->nlocations = 0;
683b57b4
TM
3604 status = rpc_call_sync(server->client, &msg, 0);
3605 dprintk("%s: returned status = %d\n", __FUNCTION__, status);
3606 return status;
3607}
3608
1da177e4
LT
3609struct nfs4_state_recovery_ops nfs4_reboot_recovery_ops = {
3610 .recover_open = nfs4_open_reclaim,
3611 .recover_lock = nfs4_lock_reclaim,
3612};
3613
3614struct nfs4_state_recovery_ops nfs4_network_partition_recovery_ops = {
3615 .recover_open = nfs4_open_expired,
3616 .recover_lock = nfs4_lock_expired,
3617};
3618
92e1d5be 3619static const struct inode_operations nfs4_file_inode_operations = {
6b3b5496
BF
3620 .permission = nfs_permission,
3621 .getattr = nfs_getattr,
3622 .setattr = nfs_setattr,
3623 .getxattr = nfs4_getxattr,
3624 .setxattr = nfs4_setxattr,
3625 .listxattr = nfs4_listxattr,
3626};
3627
509de811 3628const struct nfs_rpc_ops nfs_v4_clientops = {
1da177e4
LT
3629 .version = 4, /* protocol version */
3630 .dentry_ops = &nfs4_dentry_operations,
3631 .dir_inode_ops = &nfs4_dir_inode_operations,
6b3b5496 3632 .file_inode_ops = &nfs4_file_inode_operations,
1da177e4
LT
3633 .getroot = nfs4_proc_get_root,
3634 .getattr = nfs4_proc_getattr,
3635 .setattr = nfs4_proc_setattr,
2b3de441 3636 .lookupfh = nfs4_proc_lookupfh,
1da177e4
LT
3637 .lookup = nfs4_proc_lookup,
3638 .access = nfs4_proc_access,
3639 .readlink = nfs4_proc_readlink,
1da177e4
LT
3640 .create = nfs4_proc_create,
3641 .remove = nfs4_proc_remove,
3642 .unlink_setup = nfs4_proc_unlink_setup,
3643 .unlink_done = nfs4_proc_unlink_done,
3644 .rename = nfs4_proc_rename,
3645 .link = nfs4_proc_link,
3646 .symlink = nfs4_proc_symlink,
3647 .mkdir = nfs4_proc_mkdir,
3648 .rmdir = nfs4_proc_remove,
3649 .readdir = nfs4_proc_readdir,
3650 .mknod = nfs4_proc_mknod,
3651 .statfs = nfs4_proc_statfs,
3652 .fsinfo = nfs4_proc_fsinfo,
3653 .pathconf = nfs4_proc_pathconf,
e9326dca 3654 .set_capabilities = nfs4_server_capabilities,
1da177e4
LT
3655 .decode_dirent = nfs4_decode_dirent,
3656 .read_setup = nfs4_proc_read_setup,
ec06c096 3657 .read_done = nfs4_read_done,
1da177e4 3658 .write_setup = nfs4_proc_write_setup,
788e7a89 3659 .write_done = nfs4_write_done,
1da177e4 3660 .commit_setup = nfs4_proc_commit_setup,
788e7a89 3661 .commit_done = nfs4_commit_done,
02a913a7
TM
3662 .file_open = nfs_open,
3663 .file_release = nfs_release,
1da177e4 3664 .lock = nfs4_proc_lock,
e50a1c2e 3665 .clear_acl_cache = nfs4_zap_acl_attr,
1da177e4
LT
3666};
3667
3668/*
3669 * Local variables:
3670 * c-basic-offset: 8
3671 * End:
3672 */