NFS: Added TEST_STATEID call
[linux-2.6-block.git] / fs / nfs / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfs/nfs4proc.c
3 *
4 * Client-side procedure declarations for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#include <linux/mm.h>
1da177e4
LT
39#include <linux/delay.h>
40#include <linux/errno.h>
41#include <linux/string.h>
5a0e3ad6 42#include <linux/slab.h>
1da177e4 43#include <linux/sunrpc/clnt.h>
8f70e95f 44#include <linux/sunrpc/gss_api.h>
1da177e4
LT
45#include <linux/nfs.h>
46#include <linux/nfs4.h>
47#include <linux/nfs_fs.h>
48#include <linux/nfs_page.h>
9b7160c5 49#include <linux/nfs_mount.h>
1da177e4 50#include <linux/namei.h>
02a913a7 51#include <linux/mount.h>
99fe60d0 52#include <linux/module.h>
5a0ffe54 53#include <linux/sunrpc/bc_xprt.h>
64c2ce8b 54#include <linux/xattr.h>
c7a360b0 55#include <linux/utsname.h>
1da177e4 56
4ce79717 57#include "nfs4_fs.h"
1da177e4 58#include "delegation.h"
101070ca 59#include "internal.h"
006ea73e 60#include "iostat.h"
fc931582 61#include "callback.h"
b1f69b75 62#include "pnfs.h"
1da177e4
LT
63
64#define NFSDBG_FACILITY NFSDBG_PROC
65
2066fe89 66#define NFS4_POLL_RETRY_MIN (HZ/10)
1da177e4
LT
67#define NFS4_POLL_RETRY_MAX (15*HZ)
68
a78cb57a
TM
69#define NFS4_MAX_LOOP_ON_RECOVER (10)
70
cdd4e68b 71struct nfs4_opendata;
864472e9 72static int _nfs4_proc_open(struct nfs4_opendata *data);
b257957e 73static int _nfs4_recover_proc_open(struct nfs4_opendata *data);
1da177e4 74static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
9e33bed5 75static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *, struct nfs4_state *);
7c513058
BS
76static int _nfs4_proc_lookup(struct rpc_clnt *client, struct inode *dir,
77 const struct qstr *name, struct nfs_fh *fhandle,
78 struct nfs_fattr *fattr);
9936781d 79static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr);
0ab64e0e
TM
80static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
81 struct nfs_fattr *fattr, struct iattr *sattr,
82 struct nfs4_state *state);
1da177e4 83
1da177e4 84/* Prevent leaks of NFSv4 errors into userland */
46f72f57 85static int nfs4_map_errors(int err)
1da177e4 86{
52567b03
TM
87 if (err >= -1000)
88 return err;
89 switch (err) {
90 case -NFS4ERR_RESOURCE:
91 return -EREMOTEIO;
7ebb9315
BS
92 case -NFS4ERR_WRONGSEC:
93 return -EPERM;
3ddeb7c5
TM
94 case -NFS4ERR_BADOWNER:
95 case -NFS4ERR_BADNAME:
96 return -EINVAL;
52567b03 97 default:
1da177e4 98 dprintk("%s could not handle NFSv4 error %d\n",
3110ff80 99 __func__, -err);
52567b03 100 break;
1da177e4 101 }
52567b03 102 return -EIO;
1da177e4
LT
103}
104
105/*
106 * This is our standard bitmap for GETATTR requests.
107 */
108const u32 nfs4_fattr_bitmap[2] = {
109 FATTR4_WORD0_TYPE
110 | FATTR4_WORD0_CHANGE
111 | FATTR4_WORD0_SIZE
112 | FATTR4_WORD0_FSID
113 | FATTR4_WORD0_FILEID,
114 FATTR4_WORD1_MODE
115 | FATTR4_WORD1_NUMLINKS
116 | FATTR4_WORD1_OWNER
117 | FATTR4_WORD1_OWNER_GROUP
118 | FATTR4_WORD1_RAWDEV
119 | FATTR4_WORD1_SPACE_USED
120 | FATTR4_WORD1_TIME_ACCESS
121 | FATTR4_WORD1_TIME_METADATA
122 | FATTR4_WORD1_TIME_MODIFY
123};
124
125const u32 nfs4_statfs_bitmap[2] = {
126 FATTR4_WORD0_FILES_AVAIL
127 | FATTR4_WORD0_FILES_FREE
128 | FATTR4_WORD0_FILES_TOTAL,
129 FATTR4_WORD1_SPACE_AVAIL
130 | FATTR4_WORD1_SPACE_FREE
131 | FATTR4_WORD1_SPACE_TOTAL
132};
133
4ce79717 134const u32 nfs4_pathconf_bitmap[2] = {
1da177e4
LT
135 FATTR4_WORD0_MAXLINK
136 | FATTR4_WORD0_MAXNAME,
137 0
138};
139
140const u32 nfs4_fsinfo_bitmap[2] = { FATTR4_WORD0_MAXFILESIZE
141 | FATTR4_WORD0_MAXREAD
142 | FATTR4_WORD0_MAXWRITE
143 | FATTR4_WORD0_LEASE_TIME,
55b6e774 144 FATTR4_WORD1_TIME_DELTA
504913fb 145 | FATTR4_WORD1_FS_LAYOUT_TYPES
1da177e4
LT
146};
147
830b8e33
MN
148const u32 nfs4_fs_locations_bitmap[2] = {
149 FATTR4_WORD0_TYPE
150 | FATTR4_WORD0_CHANGE
151 | FATTR4_WORD0_SIZE
152 | FATTR4_WORD0_FSID
153 | FATTR4_WORD0_FILEID
154 | FATTR4_WORD0_FS_LOCATIONS,
155 FATTR4_WORD1_MODE
156 | FATTR4_WORD1_NUMLINKS
157 | FATTR4_WORD1_OWNER
158 | FATTR4_WORD1_OWNER_GROUP
159 | FATTR4_WORD1_RAWDEV
160 | FATTR4_WORD1_SPACE_USED
161 | FATTR4_WORD1_TIME_ACCESS
162 | FATTR4_WORD1_TIME_METADATA
163 | FATTR4_WORD1_TIME_MODIFY
164 | FATTR4_WORD1_MOUNTED_ON_FILEID
165};
166
bc4785cd 167static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
1da177e4
LT
168 struct nfs4_readdir_arg *readdir)
169{
0dbb4c67 170 __be32 *start, *p;
1da177e4
LT
171
172 BUG_ON(readdir->count < 80);
173 if (cookie > 2) {
b7ef1956 174 readdir->cookie = cookie;
1da177e4
LT
175 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
176 return;
177 }
178
179 readdir->cookie = 0;
180 memset(&readdir->verifier, 0, sizeof(readdir->verifier));
181 if (cookie == 2)
182 return;
183
184 /*
185 * NFSv4 servers do not return entries for '.' and '..'
186 * Therefore, we fake these entries here. We let '.'
187 * have cookie 0 and '..' have cookie 1. Note that
188 * when talking to the server, we always send cookie 0
189 * instead of 1 or 2.
190 */
0dbb4c67 191 start = p = kmap_atomic(*readdir->pages, KM_USER0);
1da177e4
LT
192
193 if (cookie == 0) {
194 *p++ = xdr_one; /* next */
195 *p++ = xdr_zero; /* cookie, first word */
196 *p++ = xdr_one; /* cookie, second word */
197 *p++ = xdr_one; /* entry len */
198 memcpy(p, ".\0\0\0", 4); /* entry */
199 p++;
200 *p++ = xdr_one; /* bitmap length */
201 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
202 *p++ = htonl(8); /* attribute buffer length */
4e769b93 203 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_inode));
1da177e4
LT
204 }
205
206 *p++ = xdr_one; /* next */
207 *p++ = xdr_zero; /* cookie, first word */
208 *p++ = xdr_two; /* cookie, second word */
209 *p++ = xdr_two; /* entry len */
210 memcpy(p, "..\0\0", 4); /* entry */
211 p++;
212 *p++ = xdr_one; /* bitmap length */
213 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
214 *p++ = htonl(8); /* attribute buffer length */
4e769b93 215 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_parent->d_inode));
1da177e4
LT
216
217 readdir->pgbase = (char *)p - (char *)start;
218 readdir->count -= readdir->pgbase;
219 kunmap_atomic(start, KM_USER0);
220}
221
65de872e
TM
222static int nfs4_wait_clnt_recover(struct nfs_client *clp)
223{
224 int res;
225
226 might_sleep();
227
e005e804 228 res = wait_on_bit(&clp->cl_state, NFS4CLNT_MANAGER_RUNNING,
72cb77f4 229 nfs_wait_bit_killable, TASK_KILLABLE);
65de872e
TM
230 return res;
231}
232
233static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
234{
235 int res = 0;
236
237 might_sleep();
238
239 if (*timeout <= 0)
240 *timeout = NFS4_POLL_RETRY_MIN;
241 if (*timeout > NFS4_POLL_RETRY_MAX)
242 *timeout = NFS4_POLL_RETRY_MAX;
243 schedule_timeout_killable(*timeout);
244 if (fatal_signal_pending(current))
245 res = -ERESTARTSYS;
246 *timeout <<= 1;
247 return res;
248}
249
250/* This is the error handling routine for processes that are allowed
251 * to sleep.
252 */
b064eca2 253static int nfs4_handle_exception(struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
65de872e
TM
254{
255 struct nfs_client *clp = server->nfs_client;
9e33bed5 256 struct nfs4_state *state = exception->state;
65de872e
TM
257 int ret = errorcode;
258
259 exception->retry = 0;
260 switch(errorcode) {
261 case 0:
262 return 0;
9e33bed5
TM
263 case -NFS4ERR_ADMIN_REVOKED:
264 case -NFS4ERR_BAD_STATEID:
265 case -NFS4ERR_OPENMODE:
266 if (state == NULL)
267 break;
0400a6b0
TM
268 nfs4_schedule_stateid_recovery(server, state);
269 goto wait_on_recovery;
0ced63d1
TM
270 case -NFS4ERR_EXPIRED:
271 if (state != NULL)
272 nfs4_schedule_stateid_recovery(server, state);
65de872e 273 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 274 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
275 nfs4_schedule_lease_recovery(clp);
276 goto wait_on_recovery;
03391693 277#if defined(CONFIG_NFS_V4_1)
4745e315
AA
278 case -NFS4ERR_BADSESSION:
279 case -NFS4ERR_BADSLOT:
280 case -NFS4ERR_BAD_HIGH_SLOT:
281 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
282 case -NFS4ERR_DEADSESSION:
283 case -NFS4ERR_SEQ_FALSE_RETRY:
284 case -NFS4ERR_SEQ_MISORDERED:
285 dprintk("%s ERROR: %d Reset session\n", __func__,
286 errorcode);
0400a6b0 287 nfs4_schedule_session_recovery(clp->cl_session);
4745e315 288 exception->retry = 1;
b9179237 289 break;
03391693 290#endif /* defined(CONFIG_NFS_V4_1) */
65de872e 291 case -NFS4ERR_FILE_OPEN:
44ed3556
N
292 if (exception->timeout > HZ) {
293 /* We have retried a decent amount, time to
294 * fail
295 */
296 ret = -EBUSY;
297 break;
298 }
65de872e
TM
299 case -NFS4ERR_GRACE:
300 case -NFS4ERR_DELAY:
2c643488 301 case -EKEYEXPIRED:
65de872e
TM
302 ret = nfs4_delay(server->client, &exception->timeout);
303 if (ret != 0)
304 break;
a8a4ae3a 305 case -NFS4ERR_RETRY_UNCACHED_REP:
65de872e
TM
306 case -NFS4ERR_OLD_STATEID:
307 exception->retry = 1;
b064eca2
TM
308 break;
309 case -NFS4ERR_BADOWNER:
310 /* The following works around a Linux server bug! */
311 case -NFS4ERR_BADNAME:
312 if (server->caps & NFS_CAP_UIDGID_NOMAP) {
313 server->caps &= ~NFS_CAP_UIDGID_NOMAP;
314 exception->retry = 1;
315 printk(KERN_WARNING "NFS: v4 server %s "
316 "does not accept raw "
317 "uid/gids. "
318 "Reenabling the idmapper.\n",
319 server->nfs_client->cl_hostname);
320 }
65de872e
TM
321 }
322 /* We failed to handle the error */
323 return nfs4_map_errors(ret);
0400a6b0 324wait_on_recovery:
a2c0b9e2
TM
325 ret = nfs4_wait_clnt_recover(clp);
326 if (ret == 0)
327 exception->retry = 1;
328 return ret;
65de872e
TM
329}
330
331
452e9352 332static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp)
1da177e4 333{
1da177e4
LT
334 spin_lock(&clp->cl_lock);
335 if (time_before(clp->cl_last_renewal,timestamp))
336 clp->cl_last_renewal = timestamp;
337 spin_unlock(&clp->cl_lock);
338}
339
452e9352
TM
340static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
341{
342 do_renew_lease(server->nfs_client, timestamp);
343}
344
cccef3b9
AA
345#if defined(CONFIG_NFS_V4_1)
346
e2c4ab3c
AA
347/*
348 * nfs4_free_slot - free a slot and efficiently update slot table.
349 *
350 * freeing a slot is trivially done by clearing its respective bit
351 * in the bitmap.
352 * If the freed slotid equals highest_used_slotid we want to update it
353 * so that the server would be able to size down the slot table if needed,
354 * otherwise we know that the highest_used_slotid is still in use.
355 * When updating highest_used_slotid there may be "holes" in the bitmap
356 * so we need to scan down from highest_used_slotid to 0 looking for the now
357 * highest slotid in use.
358 * If none found, highest_used_slotid is set to -1.
35dc1d74
TM
359 *
360 * Must be called while holding tbl->slot_tbl_lock
e2c4ab3c
AA
361 */
362static void
dfb4f309 363nfs4_free_slot(struct nfs4_slot_table *tbl, struct nfs4_slot *free_slot)
e2c4ab3c 364{
dfb4f309 365 int free_slotid = free_slot - tbl->slots;
e2c4ab3c
AA
366 int slotid = free_slotid;
367
dfb4f309 368 BUG_ON(slotid < 0 || slotid >= NFS4_MAX_SLOT_TABLE);
e2c4ab3c
AA
369 /* clear used bit in bitmap */
370 __clear_bit(slotid, tbl->used_slots);
371
372 /* update highest_used_slotid when it is freed */
373 if (slotid == tbl->highest_used_slotid) {
374 slotid = find_last_bit(tbl->used_slots, tbl->max_slots);
bcb56164 375 if (slotid < tbl->max_slots)
e2c4ab3c
AA
376 tbl->highest_used_slotid = slotid;
377 else
378 tbl->highest_used_slotid = -1;
379 }
e2c4ab3c
AA
380 dprintk("%s: free_slotid %u highest_used_slotid %d\n", __func__,
381 free_slotid, tbl->highest_used_slotid);
382}
383
3bfb0fc5 384/*
42acd021 385 * Signal state manager thread if session fore channel is drained
3bfb0fc5 386 */
42acd021 387static void nfs4_check_drain_fc_complete(struct nfs4_session *ses)
3bfb0fc5 388{
689cf5c1
AB
389 struct rpc_task *task;
390
a2118c33 391 if (!test_bit(NFS4_SESSION_DRAINING, &ses->session_state)) {
689cf5c1
AB
392 task = rpc_wake_up_next(&ses->fc_slot_table.slot_tbl_waitq);
393 if (task)
394 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
3bfb0fc5
AB
395 return;
396 }
397
398 if (ses->fc_slot_table.highest_used_slotid != -1)
399 return;
400
42acd021
AA
401 dprintk("%s COMPLETE: Session Fore Channel Drained\n", __func__);
402 complete(&ses->fc_slot_table.complete);
403}
404
405/*
406 * Signal state manager thread if session back channel is drained
407 */
408void nfs4_check_drain_bc_complete(struct nfs4_session *ses)
409{
410 if (!test_bit(NFS4_SESSION_DRAINING, &ses->session_state) ||
411 ses->bc_slot_table.highest_used_slotid != -1)
412 return;
413 dprintk("%s COMPLETE: Session Back Channel Drained\n", __func__);
414 complete(&ses->bc_slot_table.complete);
3bfb0fc5
AB
415}
416
d185a334 417static void nfs41_sequence_free_slot(struct nfs4_sequence_res *res)
13615871
AA
418{
419 struct nfs4_slot_table *tbl;
420
d185a334 421 tbl = &res->sr_session->fc_slot_table;
dfb4f309 422 if (!res->sr_slot) {
13615871
AA
423 /* just wake up the next guy waiting since
424 * we may have not consumed a slot after all */
691daf3b 425 dprintk("%s: No slot\n", __func__);
35dc1d74 426 return;
13615871 427 }
ea028ac9 428
35dc1d74 429 spin_lock(&tbl->slot_tbl_lock);
dfb4f309 430 nfs4_free_slot(tbl, res->sr_slot);
42acd021 431 nfs4_check_drain_fc_complete(res->sr_session);
35dc1d74 432 spin_unlock(&tbl->slot_tbl_lock);
dfb4f309 433 res->sr_slot = NULL;
13615871
AA
434}
435
14516c3a 436static int nfs41_sequence_done(struct rpc_task *task, struct nfs4_sequence_res *res)
b0df806c
AA
437{
438 unsigned long timestamp;
14516c3a 439 struct nfs_client *clp;
b0df806c
AA
440
441 /*
442 * sr_status remains 1 if an RPC level error occurred. The server
443 * may or may not have processed the sequence operation..
444 * Proceed as if the server received and processed the sequence
445 * operation.
446 */
447 if (res->sr_status == 1)
448 res->sr_status = NFS_OK;
449
468f8613
BS
450 /* don't increment the sequence number if the task wasn't sent */
451 if (!RPC_WAS_SENT(task))
b0df806c
AA
452 goto out;
453
691daf3b 454 /* Check the SEQUENCE operation status */
14516c3a
TM
455 switch (res->sr_status) {
456 case 0:
b0df806c 457 /* Update the slot's sequence and clientid lease timer */
dfb4f309 458 ++res->sr_slot->seq_nr;
b0df806c 459 timestamp = res->sr_renewal_time;
14516c3a 460 clp = res->sr_session->clp;
452e9352 461 do_renew_lease(clp, timestamp);
0629e370 462 /* Check sequence flags */
b4410c2f
TM
463 if (res->sr_status_flags != 0)
464 nfs4_schedule_lease_recovery(clp);
14516c3a
TM
465 break;
466 case -NFS4ERR_DELAY:
467 /* The server detected a resend of the RPC call and
468 * returned NFS4ERR_DELAY as per Section 2.10.6.2
469 * of RFC5661.
470 */
12364a4f 471 dprintk("%s: slot=%td seq=%d: Operation in progress\n",
dfb4f309
BH
472 __func__,
473 res->sr_slot - res->sr_session->fc_slot_table.slots,
474 res->sr_slot->seq_nr);
14516c3a
TM
475 goto out_retry;
476 default:
477 /* Just update the slot sequence no. */
dfb4f309 478 ++res->sr_slot->seq_nr;
b0df806c
AA
479 }
480out:
481 /* The session may be reset by one of the error handlers. */
482 dprintk("%s: Error %d free the slot \n", __func__, res->sr_status);
d185a334 483 nfs41_sequence_free_slot(res);
14516c3a
TM
484 return 1;
485out_retry:
d05dd4e9 486 if (!rpc_restart_call(task))
14516c3a
TM
487 goto out;
488 rpc_delay(task, NFS4_POLL_RETRY_MAX);
489 return 0;
b0df806c
AA
490}
491
14516c3a
TM
492static int nfs4_sequence_done(struct rpc_task *task,
493 struct nfs4_sequence_res *res)
df896455 494{
14516c3a
TM
495 if (res->sr_session == NULL)
496 return 1;
497 return nfs41_sequence_done(task, res);
df896455
TM
498}
499
510b8175
BH
500/*
501 * nfs4_find_slot - efficiently look for a free slot
502 *
503 * nfs4_find_slot looks for an unset bit in the used_slots bitmap.
504 * If found, we mark the slot as used, update the highest_used_slotid,
505 * and respectively set up the sequence operation args.
506 * The slot number is returned if found, or NFS4_MAX_SLOT_TABLE otherwise.
fbcd4abc
AA
507 *
508 * Note: must be called with under the slot_tbl_lock.
510b8175
BH
509 */
510static u8
40ead580 511nfs4_find_slot(struct nfs4_slot_table *tbl)
510b8175
BH
512{
513 int slotid;
514 u8 ret_id = NFS4_MAX_SLOT_TABLE;
515 BUILD_BUG_ON((u8)NFS4_MAX_SLOT_TABLE != (int)NFS4_MAX_SLOT_TABLE);
516
510b8175
BH
517 dprintk("--> %s used_slots=%04lx highest_used=%d max_slots=%d\n",
518 __func__, tbl->used_slots[0], tbl->highest_used_slotid,
519 tbl->max_slots);
520 slotid = find_first_zero_bit(tbl->used_slots, tbl->max_slots);
521 if (slotid >= tbl->max_slots)
522 goto out;
523 __set_bit(slotid, tbl->used_slots);
524 if (slotid > tbl->highest_used_slotid)
525 tbl->highest_used_slotid = slotid;
526 ret_id = slotid;
527out:
528 dprintk("<-- %s used_slots=%04lx highest_used=%d slotid=%d \n",
529 __func__, tbl->used_slots[0], tbl->highest_used_slotid, ret_id);
510b8175
BH
530 return ret_id;
531}
532
dc70d7b3 533int nfs41_setup_sequence(struct nfs4_session *session,
ce5039c1
AA
534 struct nfs4_sequence_args *args,
535 struct nfs4_sequence_res *res,
536 int cache_reply,
537 struct rpc_task *task)
538{
fbcd4abc
AA
539 struct nfs4_slot *slot;
540 struct nfs4_slot_table *tbl;
541 u8 slotid;
542
543 dprintk("--> %s\n", __func__);
ce5039c1 544 /* slot already allocated? */
dfb4f309 545 if (res->sr_slot != NULL)
ce5039c1
AA
546 return 0;
547
fbcd4abc
AA
548 tbl = &session->fc_slot_table;
549
550 spin_lock(&tbl->slot_tbl_lock);
a2118c33 551 if (test_bit(NFS4_SESSION_DRAINING, &session->session_state) &&
5601a00d 552 !rpc_task_has_priority(task, RPC_PRIORITY_PRIVILEGED)) {
ea028ac9
AA
553 /*
554 * The state manager will wait until the slot table is empty.
555 * Schedule the reset thread
556 */
05f0d236 557 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
b069d94a 558 spin_unlock(&tbl->slot_tbl_lock);
bcb56164 559 dprintk("%s Schedule Session Reset\n", __func__);
05f0d236 560 return -EAGAIN;
b069d94a
AA
561 }
562
689cf5c1
AB
563 if (!rpc_queue_empty(&tbl->slot_tbl_waitq) &&
564 !rpc_task_has_priority(task, RPC_PRIORITY_PRIVILEGED)) {
565 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
566 spin_unlock(&tbl->slot_tbl_lock);
567 dprintk("%s enforce FIFO order\n", __func__);
568 return -EAGAIN;
569 }
570
40ead580 571 slotid = nfs4_find_slot(tbl);
fbcd4abc
AA
572 if (slotid == NFS4_MAX_SLOT_TABLE) {
573 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
574 spin_unlock(&tbl->slot_tbl_lock);
575 dprintk("<-- %s: no free slots\n", __func__);
576 return -EAGAIN;
577 }
578 spin_unlock(&tbl->slot_tbl_lock);
579
689cf5c1 580 rpc_task_set_priority(task, RPC_PRIORITY_NORMAL);
fbcd4abc 581 slot = tbl->slots + slotid;
99fe60d0 582 args->sa_session = session;
fbcd4abc
AA
583 args->sa_slotid = slotid;
584 args->sa_cache_this = cache_reply;
585
586 dprintk("<-- %s slotid=%d seqid=%d\n", __func__, slotid, slot->seq_nr);
587
99fe60d0 588 res->sr_session = session;
dfb4f309 589 res->sr_slot = slot;
fbcd4abc 590 res->sr_renewal_time = jiffies;
2a6e26cd 591 res->sr_status_flags = 0;
fbcd4abc
AA
592 /*
593 * sr_status is only set in decode_sequence, and so will remain
594 * set to 1 if an rpc level failure occurs.
595 */
596 res->sr_status = 1;
ce5039c1
AA
597 return 0;
598}
dc70d7b3 599EXPORT_SYMBOL_GPL(nfs41_setup_sequence);
ce5039c1 600
035168ab 601int nfs4_setup_sequence(const struct nfs_server *server,
ce5039c1
AA
602 struct nfs4_sequence_args *args,
603 struct nfs4_sequence_res *res,
604 int cache_reply,
605 struct rpc_task *task)
606{
035168ab 607 struct nfs4_session *session = nfs4_get_session(server);
ce5039c1
AA
608 int ret = 0;
609
035168ab
TM
610 if (session == NULL) {
611 args->sa_session = NULL;
612 res->sr_session = NULL;
613 goto out;
614 }
615
12364a4f 616 dprintk("--> %s clp %p session %p sr_slot %td\n",
dfb4f309
BH
617 __func__, session->clp, session, res->sr_slot ?
618 res->sr_slot - session->fc_slot_table.slots : -1);
ce5039c1 619
035168ab 620 ret = nfs41_setup_sequence(session, args, res, cache_reply,
ce5039c1 621 task);
ce5039c1
AA
622out:
623 dprintk("<-- %s status=%d\n", __func__, ret);
624 return ret;
625}
626
627struct nfs41_call_sync_data {
035168ab 628 const struct nfs_server *seq_server;
ce5039c1
AA
629 struct nfs4_sequence_args *seq_args;
630 struct nfs4_sequence_res *seq_res;
631 int cache_reply;
632};
633
634static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata)
635{
636 struct nfs41_call_sync_data *data = calldata;
637
035168ab
TM
638 dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server);
639
640 if (nfs4_setup_sequence(data->seq_server, data->seq_args,
ce5039c1
AA
641 data->seq_res, data->cache_reply, task))
642 return;
643 rpc_call_start(task);
644}
645
b257957e
AB
646static void nfs41_call_priv_sync_prepare(struct rpc_task *task, void *calldata)
647{
648 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
649 nfs41_call_sync_prepare(task, calldata);
650}
651
69ab40c4
AA
652static void nfs41_call_sync_done(struct rpc_task *task, void *calldata)
653{
654 struct nfs41_call_sync_data *data = calldata;
655
14516c3a 656 nfs41_sequence_done(task, data->seq_res);
69ab40c4
AA
657}
658
ce5039c1
AA
659struct rpc_call_ops nfs41_call_sync_ops = {
660 .rpc_call_prepare = nfs41_call_sync_prepare,
69ab40c4 661 .rpc_call_done = nfs41_call_sync_done,
ce5039c1
AA
662};
663
b257957e
AB
664struct rpc_call_ops nfs41_call_priv_sync_ops = {
665 .rpc_call_prepare = nfs41_call_priv_sync_prepare,
666 .rpc_call_done = nfs41_call_sync_done,
667};
668
7c513058
BS
669static int nfs4_call_sync_sequence(struct rpc_clnt *clnt,
670 struct nfs_server *server,
ce5039c1
AA
671 struct rpc_message *msg,
672 struct nfs4_sequence_args *args,
673 struct nfs4_sequence_res *res,
b257957e
AB
674 int cache_reply,
675 int privileged)
ce5039c1
AA
676{
677 int ret;
678 struct rpc_task *task;
679 struct nfs41_call_sync_data data = {
035168ab 680 .seq_server = server,
ce5039c1
AA
681 .seq_args = args,
682 .seq_res = res,
683 .cache_reply = cache_reply,
684 };
685 struct rpc_task_setup task_setup = {
7c513058 686 .rpc_client = clnt,
ce5039c1
AA
687 .rpc_message = msg,
688 .callback_ops = &nfs41_call_sync_ops,
689 .callback_data = &data
690 };
691
dfb4f309 692 res->sr_slot = NULL;
b257957e
AB
693 if (privileged)
694 task_setup.callback_ops = &nfs41_call_priv_sync_ops;
ce5039c1
AA
695 task = rpc_run_task(&task_setup);
696 if (IS_ERR(task))
697 ret = PTR_ERR(task);
698 else {
699 ret = task->tk_status;
700 rpc_put_task(task);
701 }
702 return ret;
703}
704
7c513058
BS
705int _nfs4_call_sync_session(struct rpc_clnt *clnt,
706 struct nfs_server *server,
cccef3b9
AA
707 struct rpc_message *msg,
708 struct nfs4_sequence_args *args,
709 struct nfs4_sequence_res *res,
710 int cache_reply)
711{
7c513058 712 return nfs4_call_sync_sequence(clnt, server, msg, args, res, cache_reply, 0);
cccef3b9
AA
713}
714
df896455 715#else
14516c3a
TM
716static int nfs4_sequence_done(struct rpc_task *task,
717 struct nfs4_sequence_res *res)
df896455 718{
14516c3a 719 return 1;
df896455 720}
cccef3b9
AA
721#endif /* CONFIG_NFS_V4_1 */
722
7c513058
BS
723int _nfs4_call_sync(struct rpc_clnt *clnt,
724 struct nfs_server *server,
cccef3b9
AA
725 struct rpc_message *msg,
726 struct nfs4_sequence_args *args,
727 struct nfs4_sequence_res *res,
728 int cache_reply)
729{
f3752975 730 args->sa_session = res->sr_session = NULL;
7c513058 731 return rpc_call_sync(clnt, msg, 0);
cccef3b9
AA
732}
733
e73b83f2 734static inline
7c513058
BS
735int nfs4_call_sync(struct rpc_clnt *clnt,
736 struct nfs_server *server,
e73b83f2
BS
737 struct rpc_message *msg,
738 struct nfs4_sequence_args *args,
739 struct nfs4_sequence_res *res,
740 int cache_reply)
741{
7c513058
BS
742 return server->nfs_client->cl_mvops->call_sync(clnt, server, msg,
743 args, res, cache_reply);
e73b83f2 744}
cccef3b9 745
38478b24 746static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
1da177e4 747{
38478b24 748 struct nfs_inode *nfsi = NFS_I(dir);
1da177e4 749
38478b24 750 spin_lock(&dir->i_lock);
40d24704
TM
751 nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_REVAL_PAGECACHE|NFS_INO_INVALID_DATA;
752 if (!cinfo->atomic || cinfo->before != nfsi->change_attr)
bfc69a45 753 nfs_force_lookup_revalidate(dir);
40d24704 754 nfsi->change_attr = cinfo->after;
38478b24 755 spin_unlock(&dir->i_lock);
1da177e4
LT
756}
757
e56e0b78 758struct nfs4_opendata {
c6d00e63 759 struct kref kref;
e56e0b78
TM
760 struct nfs_openargs o_arg;
761 struct nfs_openres o_res;
cdd4e68b
TM
762 struct nfs_open_confirmargs c_arg;
763 struct nfs_open_confirmres c_res;
e56e0b78
TM
764 struct nfs_fattr f_attr;
765 struct nfs_fattr dir_attr;
ad389da7 766 struct path path;
e56e0b78
TM
767 struct dentry *dir;
768 struct nfs4_state_owner *owner;
aac00a8d 769 struct nfs4_state *state;
e56e0b78 770 struct iattr attrs;
26e976a8 771 unsigned long timestamp;
3e309914 772 unsigned int rpc_done : 1;
24ac23ab
TM
773 int rpc_status;
774 int cancelled;
e56e0b78
TM
775};
776
2ced46c2
TM
777
778static void nfs4_init_opendata_res(struct nfs4_opendata *p)
779{
780 p->o_res.f_attr = &p->f_attr;
781 p->o_res.dir_attr = &p->dir_attr;
c1d51931
TM
782 p->o_res.seqid = p->o_arg.seqid;
783 p->c_res.seqid = p->c_arg.seqid;
2ced46c2
TM
784 p->o_res.server = p->o_arg.server;
785 nfs_fattr_init(&p->f_attr);
786 nfs_fattr_init(&p->dir_attr);
787}
788
ad389da7 789static struct nfs4_opendata *nfs4_opendata_alloc(struct path *path,
dc0b027d 790 struct nfs4_state_owner *sp, fmode_t fmode, int flags,
8535b2be
TM
791 const struct iattr *attrs,
792 gfp_t gfp_mask)
e56e0b78 793{
ad389da7 794 struct dentry *parent = dget_parent(path->dentry);
e56e0b78
TM
795 struct inode *dir = parent->d_inode;
796 struct nfs_server *server = NFS_SERVER(dir);
797 struct nfs4_opendata *p;
798
8535b2be 799 p = kzalloc(sizeof(*p), gfp_mask);
e56e0b78
TM
800 if (p == NULL)
801 goto err;
8535b2be 802 p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid, gfp_mask);
e56e0b78
TM
803 if (p->o_arg.seqid == NULL)
804 goto err_free;
f6948697
AV
805 path_get(path);
806 p->path = *path;
e56e0b78
TM
807 p->dir = parent;
808 p->owner = sp;
809 atomic_inc(&sp->so_count);
810 p->o_arg.fh = NFS_FH(dir);
dc0b027d
TM
811 p->o_arg.open_flags = flags;
812 p->o_arg.fmode = fmode & (FMODE_READ|FMODE_WRITE);
7539bbab 813 p->o_arg.clientid = server->nfs_client->cl_clientid;
9f958ab8 814 p->o_arg.id = sp->so_owner_id.id;
ad389da7 815 p->o_arg.name = &p->path.dentry->d_name;
e56e0b78
TM
816 p->o_arg.server = server;
817 p->o_arg.bitmask = server->attr_bitmask;
818 p->o_arg.claim = NFS4_OPEN_CLAIM_NULL;
d77d76ff
TM
819 if (flags & O_CREAT) {
820 u32 *s;
821
e56e0b78
TM
822 p->o_arg.u.attrs = &p->attrs;
823 memcpy(&p->attrs, attrs, sizeof(p->attrs));
d77d76ff
TM
824 s = (u32 *) p->o_arg.u.verifier.data;
825 s[0] = jiffies;
826 s[1] = current->pid;
e56e0b78 827 }
cdd4e68b
TM
828 p->c_arg.fh = &p->o_res.fh;
829 p->c_arg.stateid = &p->o_res.stateid;
830 p->c_arg.seqid = p->o_arg.seqid;
2ced46c2 831 nfs4_init_opendata_res(p);
c6d00e63 832 kref_init(&p->kref);
e56e0b78
TM
833 return p;
834err_free:
835 kfree(p);
836err:
837 dput(parent);
838 return NULL;
839}
840
c6d00e63 841static void nfs4_opendata_free(struct kref *kref)
e56e0b78 842{
c6d00e63
TM
843 struct nfs4_opendata *p = container_of(kref,
844 struct nfs4_opendata, kref);
845
846 nfs_free_seqid(p->o_arg.seqid);
aac00a8d
TM
847 if (p->state != NULL)
848 nfs4_put_open_state(p->state);
c6d00e63
TM
849 nfs4_put_state_owner(p->owner);
850 dput(p->dir);
31f31db1 851 path_put(&p->path);
c6d00e63
TM
852 kfree(p);
853}
854
855static void nfs4_opendata_put(struct nfs4_opendata *p)
856{
857 if (p != NULL)
858 kref_put(&p->kref, nfs4_opendata_free);
e56e0b78
TM
859}
860
06f814a3
TM
861static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
862{
06f814a3
TM
863 int ret;
864
06f814a3 865 ret = rpc_wait_for_completion_task(task);
06f814a3
TM
866 return ret;
867}
868
dc0b027d 869static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode)
6ee41268
TM
870{
871 int ret = 0;
dc0b027d
TM
872
873 if (open_mode & O_EXCL)
874 goto out;
875 switch (mode & (FMODE_READ|FMODE_WRITE)) {
6ee41268 876 case FMODE_READ:
88069f77
TM
877 ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0
878 && state->n_rdonly != 0;
6ee41268
TM
879 break;
880 case FMODE_WRITE:
88069f77
TM
881 ret |= test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0
882 && state->n_wronly != 0;
6ee41268
TM
883 break;
884 case FMODE_READ|FMODE_WRITE:
88069f77
TM
885 ret |= test_bit(NFS_O_RDWR_STATE, &state->flags) != 0
886 && state->n_rdwr != 0;
6ee41268 887 }
dc0b027d 888out:
6ee41268
TM
889 return ret;
890}
891
dc0b027d 892static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode)
aac00a8d 893{
dc0b027d 894 if ((delegation->type & fmode) != fmode)
aac00a8d 895 return 0;
15c831bf 896 if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags))
aac00a8d 897 return 0;
b7391f44 898 nfs_mark_delegation_referenced(delegation);
aac00a8d
TM
899 return 1;
900}
901
dc0b027d 902static void update_open_stateflags(struct nfs4_state *state, fmode_t fmode)
e7616923 903{
dc0b027d 904 switch (fmode) {
e7616923
TM
905 case FMODE_WRITE:
906 state->n_wronly++;
907 break;
908 case FMODE_READ:
909 state->n_rdonly++;
910 break;
911 case FMODE_READ|FMODE_WRITE:
912 state->n_rdwr++;
913 }
dc0b027d 914 nfs4_state_set_mode_locked(state, state->state | fmode);
003707c7
TM
915}
916
dc0b027d 917static void nfs_set_open_stateid_locked(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7
TM
918{
919 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
920 memcpy(state->stateid.data, stateid->data, sizeof(state->stateid.data));
921 memcpy(state->open_stateid.data, stateid->data, sizeof(state->open_stateid.data));
dc0b027d 922 switch (fmode) {
003707c7
TM
923 case FMODE_READ:
924 set_bit(NFS_O_RDONLY_STATE, &state->flags);
925 break;
926 case FMODE_WRITE:
927 set_bit(NFS_O_WRONLY_STATE, &state->flags);
928 break;
929 case FMODE_READ|FMODE_WRITE:
930 set_bit(NFS_O_RDWR_STATE, &state->flags);
931 }
e7616923
TM
932}
933
dc0b027d 934static void nfs_set_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7 935{
8bda4e4c 936 write_seqlock(&state->seqlock);
dc0b027d 937 nfs_set_open_stateid_locked(state, stateid, fmode);
8bda4e4c 938 write_sequnlock(&state->seqlock);
003707c7
TM
939}
940
dc0b027d 941static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode)
1da177e4 942{
8bda4e4c
TM
943 /*
944 * Protect the call to nfs4_state_set_mode_locked and
945 * serialise the stateid update
946 */
947 write_seqlock(&state->seqlock);
003707c7
TM
948 if (deleg_stateid != NULL) {
949 memcpy(state->stateid.data, deleg_stateid->data, sizeof(state->stateid.data));
950 set_bit(NFS_DELEGATED_STATE, &state->flags);
951 }
952 if (open_stateid != NULL)
dc0b027d 953 nfs_set_open_stateid_locked(state, open_stateid, fmode);
8bda4e4c
TM
954 write_sequnlock(&state->seqlock);
955 spin_lock(&state->owner->so_lock);
dc0b027d 956 update_open_stateflags(state, fmode);
ec073428 957 spin_unlock(&state->owner->so_lock);
1da177e4
LT
958}
959
dc0b027d 960static int update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, nfs4_stateid *delegation, fmode_t fmode)
34310430
TM
961{
962 struct nfs_inode *nfsi = NFS_I(state->inode);
963 struct nfs_delegation *deleg_cur;
964 int ret = 0;
965
dc0b027d 966 fmode &= (FMODE_READ|FMODE_WRITE);
34310430
TM
967
968 rcu_read_lock();
969 deleg_cur = rcu_dereference(nfsi->delegation);
970 if (deleg_cur == NULL)
971 goto no_delegation;
972
973 spin_lock(&deleg_cur->lock);
974 if (nfsi->delegation != deleg_cur ||
dc0b027d 975 (deleg_cur->type & fmode) != fmode)
34310430
TM
976 goto no_delegation_unlock;
977
978 if (delegation == NULL)
979 delegation = &deleg_cur->stateid;
980 else if (memcmp(deleg_cur->stateid.data, delegation->data, NFS4_STATEID_SIZE) != 0)
981 goto no_delegation_unlock;
982
b7391f44 983 nfs_mark_delegation_referenced(deleg_cur);
dc0b027d 984 __update_open_stateid(state, open_stateid, &deleg_cur->stateid, fmode);
34310430
TM
985 ret = 1;
986no_delegation_unlock:
987 spin_unlock(&deleg_cur->lock);
988no_delegation:
989 rcu_read_unlock();
990
991 if (!ret && open_stateid != NULL) {
dc0b027d 992 __update_open_stateid(state, open_stateid, NULL, fmode);
34310430
TM
993 ret = 1;
994 }
995
996 return ret;
997}
998
999
dc0b027d 1000static void nfs4_return_incompatible_delegation(struct inode *inode, fmode_t fmode)
aac00a8d
TM
1001{
1002 struct nfs_delegation *delegation;
1003
1004 rcu_read_lock();
1005 delegation = rcu_dereference(NFS_I(inode)->delegation);
dc0b027d 1006 if (delegation == NULL || (delegation->type & fmode) == fmode) {
aac00a8d
TM
1007 rcu_read_unlock();
1008 return;
1009 }
1010 rcu_read_unlock();
1011 nfs_inode_return_delegation(inode);
1012}
1013
6ee41268 1014static struct nfs4_state *nfs4_try_open_cached(struct nfs4_opendata *opendata)
aac00a8d
TM
1015{
1016 struct nfs4_state *state = opendata->state;
1017 struct nfs_inode *nfsi = NFS_I(state->inode);
1018 struct nfs_delegation *delegation;
dc0b027d
TM
1019 int open_mode = opendata->o_arg.open_flags & O_EXCL;
1020 fmode_t fmode = opendata->o_arg.fmode;
aac00a8d
TM
1021 nfs4_stateid stateid;
1022 int ret = -EAGAIN;
1023
aac00a8d 1024 for (;;) {
dc0b027d 1025 if (can_open_cached(state, fmode, open_mode)) {
6ee41268 1026 spin_lock(&state->owner->so_lock);
dc0b027d
TM
1027 if (can_open_cached(state, fmode, open_mode)) {
1028 update_open_stateflags(state, fmode);
6ee41268 1029 spin_unlock(&state->owner->so_lock);
6ee41268
TM
1030 goto out_return_state;
1031 }
1032 spin_unlock(&state->owner->so_lock);
1033 }
34310430
TM
1034 rcu_read_lock();
1035 delegation = rcu_dereference(nfsi->delegation);
1036 if (delegation == NULL ||
dc0b027d 1037 !can_open_delegated(delegation, fmode)) {
34310430 1038 rcu_read_unlock();
aac00a8d 1039 break;
34310430 1040 }
aac00a8d
TM
1041 /* Save the delegation */
1042 memcpy(stateid.data, delegation->stateid.data, sizeof(stateid.data));
1043 rcu_read_unlock();
af22f94a 1044 ret = nfs_may_open(state->inode, state->owner->so_cred, open_mode);
aac00a8d
TM
1045 if (ret != 0)
1046 goto out;
1047 ret = -EAGAIN;
34310430
TM
1048
1049 /* Try to update the stateid using the delegation */
dc0b027d 1050 if (update_open_stateid(state, NULL, &stateid, fmode))
34310430 1051 goto out_return_state;
aac00a8d 1052 }
aac00a8d
TM
1053out:
1054 return ERR_PTR(ret);
1055out_return_state:
1056 atomic_inc(&state->count);
1057 return state;
1058}
1059
24ac23ab
TM
1060static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
1061{
1062 struct inode *inode;
1063 struct nfs4_state *state = NULL;
003707c7 1064 struct nfs_delegation *delegation;
1b370bc2 1065 int ret;
24ac23ab 1066
aac00a8d 1067 if (!data->rpc_done) {
6ee41268 1068 state = nfs4_try_open_cached(data);
aac00a8d
TM
1069 goto out;
1070 }
1071
1b370bc2 1072 ret = -EAGAIN;
24ac23ab 1073 if (!(data->f_attr.valid & NFS_ATTR_FATTR))
1b370bc2 1074 goto err;
24ac23ab 1075 inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr);
1b370bc2 1076 ret = PTR_ERR(inode);
03f28e3a 1077 if (IS_ERR(inode))
1b370bc2
TM
1078 goto err;
1079 ret = -ENOMEM;
24ac23ab
TM
1080 state = nfs4_get_open_state(inode, data->owner);
1081 if (state == NULL)
1b370bc2 1082 goto err_put_inode;
549d6ed5 1083 if (data->o_res.delegation_type != 0) {
549d6ed5
TM
1084 int delegation_flags = 0;
1085
003707c7
TM
1086 rcu_read_lock();
1087 delegation = rcu_dereference(NFS_I(inode)->delegation);
1088 if (delegation)
1089 delegation_flags = delegation->flags;
1090 rcu_read_unlock();
15c831bf 1091 if ((delegation_flags & 1UL<<NFS_DELEGATION_NEED_RECLAIM) == 0)
549d6ed5
TM
1092 nfs_inode_set_delegation(state->inode,
1093 data->owner->so_cred,
1094 &data->o_res);
1095 else
1096 nfs_inode_reclaim_delegation(state->inode,
1097 data->owner->so_cred,
1098 &data->o_res);
1099 }
34310430
TM
1100
1101 update_open_stateid(state, &data->o_res.stateid, NULL,
dc0b027d 1102 data->o_arg.fmode);
24ac23ab 1103 iput(inode);
aac00a8d 1104out:
24ac23ab 1105 return state;
1b370bc2
TM
1106err_put_inode:
1107 iput(inode);
1108err:
1109 return ERR_PTR(ret);
24ac23ab
TM
1110}
1111
864472e9
TM
1112static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
1113{
1114 struct nfs_inode *nfsi = NFS_I(state->inode);
1115 struct nfs_open_context *ctx;
1116
1117 spin_lock(&state->inode->i_lock);
1118 list_for_each_entry(ctx, &nfsi->open_files, list) {
1119 if (ctx->state != state)
1120 continue;
1121 get_nfs_open_context(ctx);
1122 spin_unlock(&state->inode->i_lock);
1123 return ctx;
1124 }
1125 spin_unlock(&state->inode->i_lock);
1126 return ERR_PTR(-ENOENT);
1127}
1128
6f220ed5
TM
1129static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx, struct nfs4_state *state)
1130{
1131 struct nfs4_opendata *opendata;
1132
8535b2be 1133 opendata = nfs4_opendata_alloc(&ctx->path, state->owner, 0, 0, NULL, GFP_NOFS);
6f220ed5
TM
1134 if (opendata == NULL)
1135 return ERR_PTR(-ENOMEM);
1136 opendata->state = state;
1137 atomic_inc(&state->count);
1138 return opendata;
1139}
1140
dc0b027d 1141static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, fmode_t fmode, struct nfs4_state **res)
864472e9 1142{
2ced46c2 1143 struct nfs4_state *newstate;
864472e9
TM
1144 int ret;
1145
dc0b027d
TM
1146 opendata->o_arg.open_flags = 0;
1147 opendata->o_arg.fmode = fmode;
2ced46c2
TM
1148 memset(&opendata->o_res, 0, sizeof(opendata->o_res));
1149 memset(&opendata->c_res, 0, sizeof(opendata->c_res));
1150 nfs4_init_opendata_res(opendata);
b257957e 1151 ret = _nfs4_recover_proc_open(opendata);
864472e9
TM
1152 if (ret != 0)
1153 return ret;
2ced46c2 1154 newstate = nfs4_opendata_to_nfs4_state(opendata);
1b370bc2
TM
1155 if (IS_ERR(newstate))
1156 return PTR_ERR(newstate);
dc0b027d 1157 nfs4_close_state(&opendata->path, newstate, fmode);
2ced46c2 1158 *res = newstate;
864472e9
TM
1159 return 0;
1160}
1161
1162static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
1163{
864472e9 1164 struct nfs4_state *newstate;
864472e9
TM
1165 int ret;
1166
1167 /* memory barrier prior to reading state->n_* */
2ced46c2 1168 clear_bit(NFS_DELEGATED_STATE, &state->flags);
864472e9
TM
1169 smp_rmb();
1170 if (state->n_rdwr != 0) {
b0ed9dbc 1171 clear_bit(NFS_O_RDWR_STATE, &state->flags);
2ced46c2 1172 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &newstate);
864472e9
TM
1173 if (ret != 0)
1174 return ret;
2ced46c2
TM
1175 if (newstate != state)
1176 return -ESTALE;
864472e9
TM
1177 }
1178 if (state->n_wronly != 0) {
b0ed9dbc 1179 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2ced46c2 1180 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &newstate);
864472e9
TM
1181 if (ret != 0)
1182 return ret;
2ced46c2
TM
1183 if (newstate != state)
1184 return -ESTALE;
864472e9
TM
1185 }
1186 if (state->n_rdonly != 0) {
b0ed9dbc 1187 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2ced46c2 1188 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &newstate);
864472e9
TM
1189 if (ret != 0)
1190 return ret;
2ced46c2
TM
1191 if (newstate != state)
1192 return -ESTALE;
864472e9 1193 }
1ac7e2fd
TM
1194 /*
1195 * We may have performed cached opens for all three recoveries.
1196 * Check if we need to update the current stateid.
1197 */
1198 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0 &&
1199 memcmp(state->stateid.data, state->open_stateid.data, sizeof(state->stateid.data)) != 0) {
8bda4e4c 1200 write_seqlock(&state->seqlock);
1ac7e2fd
TM
1201 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
1202 memcpy(state->stateid.data, state->open_stateid.data, sizeof(state->stateid.data));
8bda4e4c 1203 write_sequnlock(&state->seqlock);
1ac7e2fd 1204 }
864472e9
TM
1205 return 0;
1206}
1207
1da177e4
LT
1208/*
1209 * OPEN_RECLAIM:
1210 * reclaim state on the server after a reboot.
1da177e4 1211 */
539cd03a 1212static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1213{
1ac7e2fd 1214 struct nfs_delegation *delegation;
864472e9 1215 struct nfs4_opendata *opendata;
dc0b027d 1216 fmode_t delegation_type = 0;
1da177e4
LT
1217 int status;
1218
6f220ed5
TM
1219 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1220 if (IS_ERR(opendata))
1221 return PTR_ERR(opendata);
864472e9
TM
1222 opendata->o_arg.claim = NFS4_OPEN_CLAIM_PREVIOUS;
1223 opendata->o_arg.fh = NFS_FH(state->inode);
1ac7e2fd
TM
1224 rcu_read_lock();
1225 delegation = rcu_dereference(NFS_I(state->inode)->delegation);
15c831bf 1226 if (delegation != NULL && test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags) != 0)
65bbf6bd 1227 delegation_type = delegation->type;
1ac7e2fd 1228 rcu_read_unlock();
864472e9
TM
1229 opendata->o_arg.u.delegation_type = delegation_type;
1230 status = nfs4_open_recover(opendata, state);
c6d00e63 1231 nfs4_opendata_put(opendata);
1da177e4
LT
1232 return status;
1233}
1234
539cd03a 1235static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
1236{
1237 struct nfs_server *server = NFS_SERVER(state->inode);
1238 struct nfs4_exception exception = { };
1239 int err;
1240 do {
539cd03a 1241 err = _nfs4_do_open_reclaim(ctx, state);
168667c4 1242 if (err != -NFS4ERR_DELAY)
202b50dc
TM
1243 break;
1244 nfs4_handle_exception(server, err, &exception);
1da177e4
LT
1245 } while (exception.retry);
1246 return err;
1247}
1248
864472e9
TM
1249static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
1250{
1251 struct nfs_open_context *ctx;
1252 int ret;
1253
1254 ctx = nfs4_state_find_open_context(state);
1255 if (IS_ERR(ctx))
1256 return PTR_ERR(ctx);
539cd03a 1257 ret = nfs4_do_open_reclaim(ctx, state);
864472e9
TM
1258 put_nfs_open_context(ctx);
1259 return ret;
1260}
1261
13437e12 1262static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1da177e4 1263{
e56e0b78 1264 struct nfs4_opendata *opendata;
864472e9 1265 int ret;
1da177e4 1266
6f220ed5
TM
1267 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1268 if (IS_ERR(opendata))
1269 return PTR_ERR(opendata);
e56e0b78 1270 opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELEGATE_CUR;
13437e12 1271 memcpy(opendata->o_arg.u.delegation.data, stateid->data,
e56e0b78 1272 sizeof(opendata->o_arg.u.delegation.data));
864472e9 1273 ret = nfs4_open_recover(opendata, state);
c6d00e63 1274 nfs4_opendata_put(opendata);
864472e9 1275 return ret;
1da177e4
LT
1276}
1277
13437e12 1278int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1da177e4
LT
1279{
1280 struct nfs4_exception exception = { };
539cd03a 1281 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4
LT
1282 int err;
1283 do {
13437e12 1284 err = _nfs4_open_delegation_recall(ctx, state, stateid);
1da177e4
LT
1285 switch (err) {
1286 case 0:
965b5d67
TM
1287 case -ENOENT:
1288 case -ESTALE:
1289 goto out;
bcfa49f6
RL
1290 case -NFS4ERR_BADSESSION:
1291 case -NFS4ERR_BADSLOT:
1292 case -NFS4ERR_BAD_HIGH_SLOT:
1293 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1294 case -NFS4ERR_DEADSESSION:
0400a6b0 1295 nfs4_schedule_session_recovery(server->nfs_client->cl_session);
bcfa49f6 1296 goto out;
1da177e4
LT
1297 case -NFS4ERR_STALE_CLIENTID:
1298 case -NFS4ERR_STALE_STATEID:
1299 case -NFS4ERR_EXPIRED:
1300 /* Don't recall a delegation if it was lost */
0400a6b0 1301 nfs4_schedule_lease_recovery(server->nfs_client);
965b5d67
TM
1302 goto out;
1303 case -ERESTARTSYS:
1304 /*
1305 * The show must go on: exit, but mark the
1306 * stateid as needing recovery.
1307 */
1308 case -NFS4ERR_ADMIN_REVOKED:
1309 case -NFS4ERR_BAD_STATEID:
0400a6b0 1310 nfs4_schedule_stateid_recovery(server, state);
168667c4
TM
1311 case -EKEYEXPIRED:
1312 /*
1313 * User RPCSEC_GSS context has expired.
1314 * We cannot recover this stateid now, so
1315 * skip it and allow recovery thread to
1316 * proceed.
1317 */
965b5d67
TM
1318 case -ENOMEM:
1319 err = 0;
1320 goto out;
1da177e4
LT
1321 }
1322 err = nfs4_handle_exception(server, err, &exception);
1323 } while (exception.retry);
965b5d67 1324out:
1da177e4
LT
1325 return err;
1326}
1327
cdd4e68b
TM
1328static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
1329{
1330 struct nfs4_opendata *data = calldata;
1331
1332 data->rpc_status = task->tk_status;
26e976a8 1333 if (data->rpc_status == 0) {
cdd4e68b
TM
1334 memcpy(data->o_res.stateid.data, data->c_res.stateid.data,
1335 sizeof(data->o_res.stateid.data));
bb22629e 1336 nfs_confirm_seqid(&data->owner->so_seqid, 0);
26e976a8 1337 renew_lease(data->o_res.server, data->timestamp);
3e309914 1338 data->rpc_done = 1;
26e976a8 1339 }
cdd4e68b
TM
1340}
1341
1342static void nfs4_open_confirm_release(void *calldata)
1343{
1344 struct nfs4_opendata *data = calldata;
1345 struct nfs4_state *state = NULL;
1346
1347 /* If this request hasn't been cancelled, do nothing */
1348 if (data->cancelled == 0)
1349 goto out_free;
1350 /* In case of error, no cleanup! */
3e309914 1351 if (!data->rpc_done)
cdd4e68b 1352 goto out_free;
cdd4e68b 1353 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1354 if (!IS_ERR(state))
dc0b027d 1355 nfs4_close_state(&data->path, state, data->o_arg.fmode);
cdd4e68b 1356out_free:
c6d00e63 1357 nfs4_opendata_put(data);
cdd4e68b
TM
1358}
1359
1360static const struct rpc_call_ops nfs4_open_confirm_ops = {
cdd4e68b
TM
1361 .rpc_call_done = nfs4_open_confirm_done,
1362 .rpc_release = nfs4_open_confirm_release,
1363};
1364
1365/*
1366 * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
1367 */
1368static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
1369{
1370 struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
1371 struct rpc_task *task;
5138fde0
TM
1372 struct rpc_message msg = {
1373 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
1374 .rpc_argp = &data->c_arg,
1375 .rpc_resp = &data->c_res,
1376 .rpc_cred = data->owner->so_cred,
1377 };
c970aa85
TM
1378 struct rpc_task_setup task_setup_data = {
1379 .rpc_client = server->client,
5138fde0 1380 .rpc_message = &msg,
c970aa85
TM
1381 .callback_ops = &nfs4_open_confirm_ops,
1382 .callback_data = data,
101070ca 1383 .workqueue = nfsiod_workqueue,
c970aa85
TM
1384 .flags = RPC_TASK_ASYNC,
1385 };
1da177e4
LT
1386 int status;
1387
c6d00e63 1388 kref_get(&data->kref);
3e309914
TM
1389 data->rpc_done = 0;
1390 data->rpc_status = 0;
5138fde0 1391 data->timestamp = jiffies;
c970aa85 1392 task = rpc_run_task(&task_setup_data);
7a1218a2 1393 if (IS_ERR(task))
cdd4e68b 1394 return PTR_ERR(task);
cdd4e68b
TM
1395 status = nfs4_wait_for_completion_rpc_task(task);
1396 if (status != 0) {
1397 data->cancelled = 1;
1398 smp_wmb();
1399 } else
1400 status = data->rpc_status;
e6b3c4db 1401 rpc_put_task(task);
1da177e4
LT
1402 return status;
1403}
1404
24ac23ab 1405static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1da177e4 1406{
24ac23ab
TM
1407 struct nfs4_opendata *data = calldata;
1408 struct nfs4_state_owner *sp = data->owner;
5138fde0 1409
24ac23ab
TM
1410 if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
1411 return;
aac00a8d
TM
1412 /*
1413 * Check if we still need to send an OPEN call, or if we can use
1414 * a delegation instead.
1415 */
1416 if (data->state != NULL) {
1417 struct nfs_delegation *delegation;
1418
dc0b027d 1419 if (can_open_cached(data->state, data->o_arg.fmode, data->o_arg.open_flags))
6ee41268 1420 goto out_no_action;
aac00a8d
TM
1421 rcu_read_lock();
1422 delegation = rcu_dereference(NFS_I(data->state->inode)->delegation);
1423 if (delegation != NULL &&
15c831bf 1424 test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags) == 0) {
aac00a8d 1425 rcu_read_unlock();
6ee41268 1426 goto out_no_action;
aac00a8d
TM
1427 }
1428 rcu_read_unlock();
1429 }
24ac23ab 1430 /* Update sequence id. */
9f958ab8 1431 data->o_arg.id = sp->so_owner_id.id;
1f0e890d 1432 data->o_arg.clientid = sp->so_server->nfs_client->cl_clientid;
6f220ed5 1433 if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS) {
5138fde0 1434 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
6f220ed5
TM
1435 nfs_copy_fh(&data->o_res.fh, data->o_arg.fh);
1436 }
26e976a8 1437 data->timestamp = jiffies;
035168ab 1438 if (nfs4_setup_sequence(data->o_arg.server,
d898528c
AA
1439 &data->o_arg.seq_args,
1440 &data->o_res.seq_res, 1, task))
1441 return;
5138fde0 1442 rpc_call_start(task);
6ee41268
TM
1443 return;
1444out_no_action:
1445 task->tk_action = NULL;
1446
24ac23ab 1447}
1da177e4 1448
b257957e
AB
1449static void nfs4_recover_open_prepare(struct rpc_task *task, void *calldata)
1450{
1451 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
1452 nfs4_open_prepare(task, calldata);
1453}
1454
24ac23ab
TM
1455static void nfs4_open_done(struct rpc_task *task, void *calldata)
1456{
1457 struct nfs4_opendata *data = calldata;
1da177e4 1458
24ac23ab 1459 data->rpc_status = task->tk_status;
d898528c 1460
14516c3a
TM
1461 if (!nfs4_sequence_done(task, &data->o_res.seq_res))
1462 return;
d898528c 1463
24ac23ab
TM
1464 if (task->tk_status == 0) {
1465 switch (data->o_res.f_attr->mode & S_IFMT) {
6f926b5b
TM
1466 case S_IFREG:
1467 break;
1468 case S_IFLNK:
24ac23ab 1469 data->rpc_status = -ELOOP;
6f926b5b
TM
1470 break;
1471 case S_IFDIR:
24ac23ab 1472 data->rpc_status = -EISDIR;
6f926b5b
TM
1473 break;
1474 default:
24ac23ab 1475 data->rpc_status = -ENOTDIR;
6f926b5b 1476 }
26e976a8 1477 renew_lease(data->o_res.server, data->timestamp);
0f9f95e0
TM
1478 if (!(data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM))
1479 nfs_confirm_seqid(&data->owner->so_seqid, 0);
6f926b5b 1480 }
3e309914 1481 data->rpc_done = 1;
24ac23ab 1482}
6f926b5b 1483
24ac23ab
TM
1484static void nfs4_open_release(void *calldata)
1485{
1486 struct nfs4_opendata *data = calldata;
1487 struct nfs4_state *state = NULL;
1488
1489 /* If this request hasn't been cancelled, do nothing */
1490 if (data->cancelled == 0)
1491 goto out_free;
1492 /* In case of error, no cleanup! */
3e309914 1493 if (data->rpc_status != 0 || !data->rpc_done)
24ac23ab
TM
1494 goto out_free;
1495 /* In case we need an open_confirm, no cleanup! */
1496 if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
1497 goto out_free;
24ac23ab 1498 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1499 if (!IS_ERR(state))
dc0b027d 1500 nfs4_close_state(&data->path, state, data->o_arg.fmode);
24ac23ab 1501out_free:
c6d00e63 1502 nfs4_opendata_put(data);
24ac23ab
TM
1503}
1504
1505static const struct rpc_call_ops nfs4_open_ops = {
1506 .rpc_call_prepare = nfs4_open_prepare,
1507 .rpc_call_done = nfs4_open_done,
1508 .rpc_release = nfs4_open_release,
1509};
1510
b257957e
AB
1511static const struct rpc_call_ops nfs4_recover_open_ops = {
1512 .rpc_call_prepare = nfs4_recover_open_prepare,
1513 .rpc_call_done = nfs4_open_done,
1514 .rpc_release = nfs4_open_release,
1515};
1516
1517static int nfs4_run_open_task(struct nfs4_opendata *data, int isrecover)
24ac23ab
TM
1518{
1519 struct inode *dir = data->dir->d_inode;
1520 struct nfs_server *server = NFS_SERVER(dir);
1521 struct nfs_openargs *o_arg = &data->o_arg;
1522 struct nfs_openres *o_res = &data->o_res;
1523 struct rpc_task *task;
5138fde0
TM
1524 struct rpc_message msg = {
1525 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
1526 .rpc_argp = o_arg,
1527 .rpc_resp = o_res,
1528 .rpc_cred = data->owner->so_cred,
1529 };
c970aa85
TM
1530 struct rpc_task_setup task_setup_data = {
1531 .rpc_client = server->client,
5138fde0 1532 .rpc_message = &msg,
c970aa85
TM
1533 .callback_ops = &nfs4_open_ops,
1534 .callback_data = data,
101070ca 1535 .workqueue = nfsiod_workqueue,
c970aa85
TM
1536 .flags = RPC_TASK_ASYNC,
1537 };
24ac23ab
TM
1538 int status;
1539
c6d00e63 1540 kref_get(&data->kref);
3e309914
TM
1541 data->rpc_done = 0;
1542 data->rpc_status = 0;
2ced46c2 1543 data->cancelled = 0;
b257957e
AB
1544 if (isrecover)
1545 task_setup_data.callback_ops = &nfs4_recover_open_ops;
c970aa85 1546 task = rpc_run_task(&task_setup_data);
b257957e
AB
1547 if (IS_ERR(task))
1548 return PTR_ERR(task);
1549 status = nfs4_wait_for_completion_rpc_task(task);
1550 if (status != 0) {
1551 data->cancelled = 1;
1552 smp_wmb();
1553 } else
1554 status = data->rpc_status;
1555 rpc_put_task(task);
1556
1557 return status;
1558}
1559
1560static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
1561{
1562 struct inode *dir = data->dir->d_inode;
1563 struct nfs_openres *o_res = &data->o_res;
1564 int status;
1565
1566 status = nfs4_run_open_task(data, 1);
1567 if (status != 0 || !data->rpc_done)
1568 return status;
1569
1570 nfs_refresh_inode(dir, o_res->dir_attr);
1571
1572 if (o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
1573 status = _nfs4_proc_open_confirm(data);
1574 if (status != 0)
1575 return status;
1576 }
1577
1578 return status;
1579}
1580
1581/*
1582 * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
1583 */
1584static int _nfs4_proc_open(struct nfs4_opendata *data)
1585{
1586 struct inode *dir = data->dir->d_inode;
1587 struct nfs_server *server = NFS_SERVER(dir);
1588 struct nfs_openargs *o_arg = &data->o_arg;
1589 struct nfs_openres *o_res = &data->o_res;
1590 int status;
1591
1592 status = nfs4_run_open_task(data, 0);
3e309914 1593 if (status != 0 || !data->rpc_done)
24ac23ab
TM
1594 return status;
1595
56ae19f3
TM
1596 if (o_arg->open_flags & O_CREAT) {
1597 update_changeattr(dir, &o_res->cinfo);
1598 nfs_post_op_update_inode(dir, o_res->dir_attr);
1599 } else
1600 nfs_refresh_inode(dir, o_res->dir_attr);
0df5dd4a
TM
1601 if ((o_res->rflags & NFS4_OPEN_RESULT_LOCKTYPE_POSIX) == 0)
1602 server->caps &= ~NFS_CAP_POSIX_LOCK;
1da177e4 1603 if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
cdd4e68b 1604 status = _nfs4_proc_open_confirm(data);
1da177e4 1605 if (status != 0)
24ac23ab 1606 return status;
1da177e4
LT
1607 }
1608 if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
9936781d 1609 _nfs4_proc_getattr(server, &o_res->fh, o_res->f_attr);
24ac23ab 1610 return 0;
1da177e4
LT
1611}
1612
d83217c1 1613static int nfs4_client_recover_expired_lease(struct nfs_client *clp)
58d9714a 1614{
a78cb57a 1615 unsigned int loop;
6b30954e 1616 int ret;
58d9714a 1617
a78cb57a 1618 for (loop = NFS4_MAX_LOOP_ON_RECOVER; loop != 0; loop--) {
65de872e 1619 ret = nfs4_wait_clnt_recover(clp);
6b30954e 1620 if (ret != 0)
a78cb57a 1621 break;
e598d843
TM
1622 if (!test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state) &&
1623 !test_bit(NFS4CLNT_CHECK_LEASE,&clp->cl_state))
6b30954e 1624 break;
0400a6b0 1625 nfs4_schedule_state_manager(clp);
a78cb57a 1626 ret = -EIO;
6b30954e 1627 }
a78cb57a 1628 return ret;
58d9714a
TM
1629}
1630
d83217c1
AA
1631static int nfs4_recover_expired_lease(struct nfs_server *server)
1632{
1633 return nfs4_client_recover_expired_lease(server->nfs_client);
1634}
1635
1da177e4
LT
1636/*
1637 * OPEN_EXPIRED:
1638 * reclaim state on the server after a network partition.
1639 * Assumes caller holds the appropriate lock
1640 */
539cd03a 1641static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1642{
e56e0b78 1643 struct nfs4_opendata *opendata;
864472e9 1644 int ret;
1da177e4 1645
6f220ed5
TM
1646 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1647 if (IS_ERR(opendata))
1648 return PTR_ERR(opendata);
864472e9 1649 ret = nfs4_open_recover(opendata, state);
35d05778 1650 if (ret == -ESTALE)
539cd03a 1651 d_drop(ctx->path.dentry);
c6d00e63 1652 nfs4_opendata_put(opendata);
864472e9 1653 return ret;
1da177e4
LT
1654}
1655
a9ed2e25 1656static int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
202b50dc 1657{
539cd03a 1658 struct nfs_server *server = NFS_SERVER(state->inode);
202b50dc
TM
1659 struct nfs4_exception exception = { };
1660 int err;
1661
1662 do {
539cd03a 1663 err = _nfs4_open_expired(ctx, state);
a9ed2e25
TM
1664 switch (err) {
1665 default:
1666 goto out;
1667 case -NFS4ERR_GRACE:
1668 case -NFS4ERR_DELAY:
1669 nfs4_handle_exception(server, err, &exception);
1670 err = 0;
1671 }
202b50dc 1672 } while (exception.retry);
a9ed2e25 1673out:
202b50dc
TM
1674 return err;
1675}
1676
1da177e4
LT
1677static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
1678{
1da177e4 1679 struct nfs_open_context *ctx;
864472e9 1680 int ret;
1da177e4 1681
864472e9
TM
1682 ctx = nfs4_state_find_open_context(state);
1683 if (IS_ERR(ctx))
1684 return PTR_ERR(ctx);
539cd03a 1685 ret = nfs4_do_open_expired(ctx, state);
864472e9
TM
1686 put_nfs_open_context(ctx);
1687 return ret;
1da177e4
LT
1688}
1689
aa53ed54
JL
1690/*
1691 * on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
1692 * fields corresponding to attributes that were used to store the verifier.
1693 * Make sure we clobber those fields in the later setattr call
1694 */
1695static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
1696{
1697 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
1698 !(sattr->ia_valid & ATTR_ATIME_SET))
1699 sattr->ia_valid |= ATTR_ATIME;
1700
1701 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
1702 !(sattr->ia_valid & ATTR_MTIME_SET))
1703 sattr->ia_valid |= ATTR_MTIME;
1704}
1705
1da177e4 1706/*
24ac23ab 1707 * Returns a referenced nfs4_state
1da177e4 1708 */
dc0b027d 1709static int _nfs4_do_open(struct inode *dir, struct path *path, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
1da177e4
LT
1710{
1711 struct nfs4_state_owner *sp;
1712 struct nfs4_state *state = NULL;
1713 struct nfs_server *server = NFS_SERVER(dir);
e56e0b78 1714 struct nfs4_opendata *opendata;
aac00a8d 1715 int status;
1da177e4
LT
1716
1717 /* Protect against reboot recovery conflicts */
1da177e4
LT
1718 status = -ENOMEM;
1719 if (!(sp = nfs4_get_state_owner(server, cred))) {
1720 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
1721 goto out_err;
1722 }
58d9714a
TM
1723 status = nfs4_recover_expired_lease(server);
1724 if (status != 0)
b4454fe1 1725 goto err_put_state_owner;
aac00a8d 1726 if (path->dentry->d_inode != NULL)
dc0b027d 1727 nfs4_return_incompatible_delegation(path->dentry->d_inode, fmode);
58d9714a 1728 status = -ENOMEM;
8535b2be 1729 opendata = nfs4_opendata_alloc(path, sp, fmode, flags, sattr, GFP_KERNEL);
e56e0b78 1730 if (opendata == NULL)
95d35cb4 1731 goto err_put_state_owner;
1da177e4 1732
aac00a8d
TM
1733 if (path->dentry->d_inode != NULL)
1734 opendata->state = nfs4_get_open_state(path->dentry->d_inode, sp);
1735
24ac23ab 1736 status = _nfs4_proc_open(opendata);
1da177e4 1737 if (status != 0)
c6d00e63 1738 goto err_opendata_put;
1da177e4 1739
24ac23ab 1740 state = nfs4_opendata_to_nfs4_state(opendata);
1b370bc2
TM
1741 status = PTR_ERR(state);
1742 if (IS_ERR(state))
c6d00e63 1743 goto err_opendata_put;
0df5dd4a 1744 if (server->caps & NFS_CAP_POSIX_LOCK)
8e469ebd 1745 set_bit(NFS_STATE_POSIX_LOCKS, &state->flags);
0ab64e0e
TM
1746
1747 if (opendata->o_arg.open_flags & O_EXCL) {
1748 nfs4_exclusive_attrset(opendata, sattr);
1749
1750 nfs_fattr_init(opendata->o_res.f_attr);
1751 status = nfs4_do_setattr(state->inode, cred,
1752 opendata->o_res.f_attr, sattr,
1753 state);
1754 if (status == 0)
1755 nfs_setattr_update_inode(state->inode, sattr);
1756 nfs_post_op_update_inode(state->inode, opendata->o_res.f_attr);
1757 }
c6d00e63 1758 nfs4_opendata_put(opendata);
1da177e4 1759 nfs4_put_state_owner(sp);
1da177e4
LT
1760 *res = state;
1761 return 0;
c6d00e63
TM
1762err_opendata_put:
1763 nfs4_opendata_put(opendata);
e56e0b78
TM
1764err_put_state_owner:
1765 nfs4_put_state_owner(sp);
1da177e4 1766out_err:
1da177e4
LT
1767 *res = NULL;
1768 return status;
1769}
1770
1771
dc0b027d 1772static struct nfs4_state *nfs4_do_open(struct inode *dir, struct path *path, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred)
1da177e4
LT
1773{
1774 struct nfs4_exception exception = { };
1775 struct nfs4_state *res;
1776 int status;
1777
1778 do {
dc0b027d 1779 status = _nfs4_do_open(dir, path, fmode, flags, sattr, cred, &res);
1da177e4
LT
1780 if (status == 0)
1781 break;
1782 /* NOTE: BAD_SEQID means the server and client disagree about the
1783 * book-keeping w.r.t. state-changing operations
1784 * (OPEN/CLOSE/LOCK/LOCKU...)
1785 * It is actually a sign of a bug on the client or on the server.
1786 *
1787 * If we receive a BAD_SEQID error in the particular case of
cee54fc9 1788 * doing an OPEN, we assume that nfs_increment_open_seqid() will
1da177e4
LT
1789 * have unhashed the old state_owner for us, and that we can
1790 * therefore safely retry using a new one. We should still warn
1791 * the user though...
1792 */
1793 if (status == -NFS4ERR_BAD_SEQID) {
6f43ddcc
TM
1794 printk(KERN_WARNING "NFS: v4 server %s "
1795 " returned a bad sequence-id error!\n",
1796 NFS_SERVER(dir)->nfs_client->cl_hostname);
1da177e4
LT
1797 exception.retry = 1;
1798 continue;
1799 }
550f5747
TM
1800 /*
1801 * BAD_STATEID on OPEN means that the server cancelled our
1802 * state before it received the OPEN_CONFIRM.
1803 * Recover by retrying the request as per the discussion
1804 * on Page 181 of RFC3530.
1805 */
1806 if (status == -NFS4ERR_BAD_STATEID) {
1807 exception.retry = 1;
1808 continue;
1809 }
aac00a8d
TM
1810 if (status == -EAGAIN) {
1811 /* We must have found a delegation */
1812 exception.retry = 1;
1813 continue;
1814 }
1da177e4
LT
1815 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(dir),
1816 status, &exception));
1817 } while (exception.retry);
1818 return res;
1819}
1820
659bfcd6
TM
1821static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
1822 struct nfs_fattr *fattr, struct iattr *sattr,
1823 struct nfs4_state *state)
1da177e4 1824{
3e4f6290 1825 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 1826 struct nfs_setattrargs arg = {
3e4f6290 1827 .fh = NFS_FH(inode),
1da177e4
LT
1828 .iap = sattr,
1829 .server = server,
1830 .bitmask = server->attr_bitmask,
1831 };
1832 struct nfs_setattrres res = {
1833 .fattr = fattr,
1834 .server = server,
1835 };
1836 struct rpc_message msg = {
659bfcd6
TM
1837 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
1838 .rpc_argp = &arg,
1839 .rpc_resp = &res,
1840 .rpc_cred = cred,
1da177e4 1841 };
26e976a8 1842 unsigned long timestamp = jiffies;
65e4308d 1843 int status;
1da177e4 1844
0e574af1 1845 nfs_fattr_init(fattr);
1da177e4 1846
3e4f6290
TM
1847 if (nfs4_copy_delegation_stateid(&arg.stateid, inode)) {
1848 /* Use that stateid */
1849 } else if (state != NULL) {
77041ed9 1850 nfs4_copy_stateid(&arg.stateid, state, current->files, current->tgid);
08e9eac4 1851 } else
1da177e4
LT
1852 memcpy(&arg.stateid, &zero_stateid, sizeof(arg.stateid));
1853
7c513058 1854 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
26e976a8
TM
1855 if (status == 0 && state != NULL)
1856 renew_lease(server, timestamp);
65e4308d 1857 return status;
1da177e4
LT
1858}
1859
659bfcd6
TM
1860static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
1861 struct nfs_fattr *fattr, struct iattr *sattr,
1862 struct nfs4_state *state)
1da177e4 1863{
3e4f6290 1864 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
1865 struct nfs4_exception exception = { };
1866 int err;
1867 do {
1868 err = nfs4_handle_exception(server,
659bfcd6 1869 _nfs4_do_setattr(inode, cred, fattr, sattr, state),
1da177e4
LT
1870 &exception);
1871 } while (exception.retry);
1872 return err;
1873}
1874
1875struct nfs4_closedata {
4a35bd41 1876 struct path path;
1da177e4
LT
1877 struct inode *inode;
1878 struct nfs4_state *state;
1879 struct nfs_closeargs arg;
1880 struct nfs_closeres res;
516a6af6 1881 struct nfs_fattr fattr;
26e976a8 1882 unsigned long timestamp;
f7e8917a
FI
1883 bool roc;
1884 u32 roc_barrier;
1da177e4
LT
1885};
1886
963d8fe5 1887static void nfs4_free_closedata(void *data)
9512135d 1888{
963d8fe5
TM
1889 struct nfs4_closedata *calldata = data;
1890 struct nfs4_state_owner *sp = calldata->state->owner;
9512135d 1891
f7e8917a
FI
1892 if (calldata->roc)
1893 pnfs_roc_release(calldata->state->inode);
9512135d
TM
1894 nfs4_put_open_state(calldata->state);
1895 nfs_free_seqid(calldata->arg.seqid);
9512135d 1896 nfs4_put_state_owner(sp);
31f31db1 1897 path_put(&calldata->path);
9512135d
TM
1898 kfree(calldata);
1899}
1900
88069f77
TM
1901static void nfs4_close_clear_stateid_flags(struct nfs4_state *state,
1902 fmode_t fmode)
1903{
1904 spin_lock(&state->owner->so_lock);
1905 if (!(fmode & FMODE_READ))
1906 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
1907 if (!(fmode & FMODE_WRITE))
1908 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
1909 clear_bit(NFS_O_RDWR_STATE, &state->flags);
1910 spin_unlock(&state->owner->so_lock);
1911}
1912
963d8fe5 1913static void nfs4_close_done(struct rpc_task *task, void *data)
1da177e4 1914{
963d8fe5 1915 struct nfs4_closedata *calldata = data;
1da177e4 1916 struct nfs4_state *state = calldata->state;
1da177e4
LT
1917 struct nfs_server *server = NFS_SERVER(calldata->inode);
1918
14516c3a
TM
1919 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
1920 return;
1da177e4
LT
1921 /* hmm. we are done with the inode, and in the process of freeing
1922 * the state_owner. we keep this around to process errors
1923 */
1da177e4
LT
1924 switch (task->tk_status) {
1925 case 0:
f7e8917a
FI
1926 if (calldata->roc)
1927 pnfs_roc_set_barrier(state->inode,
1928 calldata->roc_barrier);
45328c35 1929 nfs_set_open_stateid(state, &calldata->res.stateid, 0);
26e976a8 1930 renew_lease(server, calldata->timestamp);
88069f77
TM
1931 nfs4_close_clear_stateid_flags(state,
1932 calldata->arg.fmode);
1da177e4
LT
1933 break;
1934 case -NFS4ERR_STALE_STATEID:
9e33bed5
TM
1935 case -NFS4ERR_OLD_STATEID:
1936 case -NFS4ERR_BAD_STATEID:
1da177e4 1937 case -NFS4ERR_EXPIRED:
dc0b027d 1938 if (calldata->arg.fmode == 0)
9e33bed5 1939 break;
1da177e4 1940 default:
72211dbe
TM
1941 if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
1942 rpc_restart_call_prepare(task);
1da177e4 1943 }
72211dbe 1944 nfs_release_seqid(calldata->arg.seqid);
516a6af6 1945 nfs_refresh_inode(calldata->inode, calldata->res.fattr);
1da177e4
LT
1946}
1947
4ce70ada 1948static void nfs4_close_prepare(struct rpc_task *task, void *data)
1da177e4 1949{
4ce70ada 1950 struct nfs4_closedata *calldata = data;
9512135d 1951 struct nfs4_state *state = calldata->state;
88069f77 1952 int call_close = 0;
9512135d 1953
963d8fe5 1954 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
9512135d 1955 return;
003707c7 1956
88069f77
TM
1957 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
1958 calldata->arg.fmode = FMODE_READ|FMODE_WRITE;
4cecb76f 1959 spin_lock(&state->owner->so_lock);
003707c7 1960 /* Calculate the change in open mode */
e7616923 1961 if (state->n_rdwr == 0) {
003707c7 1962 if (state->n_rdonly == 0) {
88069f77
TM
1963 call_close |= test_bit(NFS_O_RDONLY_STATE, &state->flags);
1964 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
1965 calldata->arg.fmode &= ~FMODE_READ;
003707c7
TM
1966 }
1967 if (state->n_wronly == 0) {
88069f77
TM
1968 call_close |= test_bit(NFS_O_WRONLY_STATE, &state->flags);
1969 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
1970 calldata->arg.fmode &= ~FMODE_WRITE;
003707c7 1971 }
e7616923 1972 }
4cecb76f 1973 spin_unlock(&state->owner->so_lock);
88069f77
TM
1974
1975 if (!call_close) {
963d8fe5
TM
1976 /* Note: exit _without_ calling nfs4_close_done */
1977 task->tk_action = NULL;
9512135d
TM
1978 return;
1979 }
88069f77 1980
f7e8917a 1981 if (calldata->arg.fmode == 0) {
88069f77 1982 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE];
f7e8917a
FI
1983 if (calldata->roc &&
1984 pnfs_roc_drain(calldata->inode, &calldata->roc_barrier)) {
1985 rpc_sleep_on(&NFS_SERVER(calldata->inode)->roc_rpcwaitq,
1986 task, NULL);
1987 return;
1988 }
1989 }
88069f77 1990
516a6af6 1991 nfs_fattr_init(calldata->res.fattr);
26e976a8 1992 calldata->timestamp = jiffies;
035168ab 1993 if (nfs4_setup_sequence(NFS_SERVER(calldata->inode),
19ddab06
AA
1994 &calldata->arg.seq_args, &calldata->res.seq_res,
1995 1, task))
1996 return;
5138fde0 1997 rpc_call_start(task);
1da177e4
LT
1998}
1999
963d8fe5 2000static const struct rpc_call_ops nfs4_close_ops = {
4ce70ada 2001 .rpc_call_prepare = nfs4_close_prepare,
963d8fe5
TM
2002 .rpc_call_done = nfs4_close_done,
2003 .rpc_release = nfs4_free_closedata,
2004};
2005
1da177e4
LT
2006/*
2007 * It is possible for data to be read/written from a mem-mapped file
2008 * after the sys_close call (which hits the vfs layer as a flush).
2009 * This means that we can't safely call nfsv4 close on a file until
2010 * the inode is cleared. This in turn means that we are not good
2011 * NFSv4 citizens - we do not indicate to the server to update the file's
2012 * share state even when we are done with one of the three share
2013 * stateid's in the inode.
2014 *
2015 * NOTE: Caller must be holding the sp->so_owner semaphore!
2016 */
f7e8917a 2017int nfs4_do_close(struct path *path, struct nfs4_state *state, gfp_t gfp_mask, int wait, bool roc)
1da177e4 2018{
4a35bd41 2019 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4 2020 struct nfs4_closedata *calldata;
b39e625b
TM
2021 struct nfs4_state_owner *sp = state->owner;
2022 struct rpc_task *task;
5138fde0
TM
2023 struct rpc_message msg = {
2024 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
2025 .rpc_cred = state->owner->so_cred,
2026 };
c970aa85
TM
2027 struct rpc_task_setup task_setup_data = {
2028 .rpc_client = server->client,
5138fde0 2029 .rpc_message = &msg,
c970aa85 2030 .callback_ops = &nfs4_close_ops,
101070ca 2031 .workqueue = nfsiod_workqueue,
c970aa85
TM
2032 .flags = RPC_TASK_ASYNC,
2033 };
9512135d 2034 int status = -ENOMEM;
1da177e4 2035
8535b2be 2036 calldata = kzalloc(sizeof(*calldata), gfp_mask);
1da177e4 2037 if (calldata == NULL)
9512135d 2038 goto out;
4a35bd41 2039 calldata->inode = state->inode;
1da177e4 2040 calldata->state = state;
4a35bd41 2041 calldata->arg.fh = NFS_FH(state->inode);
003707c7 2042 calldata->arg.stateid = &state->open_stateid;
1da177e4 2043 /* Serialization for the sequence id */
8535b2be 2044 calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid, gfp_mask);
9512135d
TM
2045 if (calldata->arg.seqid == NULL)
2046 goto out_free_calldata;
dc0b027d 2047 calldata->arg.fmode = 0;
a65318bf 2048 calldata->arg.bitmask = server->cache_consistency_bitmask;
516a6af6 2049 calldata->res.fattr = &calldata->fattr;
c1d51931 2050 calldata->res.seqid = calldata->arg.seqid;
516a6af6 2051 calldata->res.server = server;
f7e8917a 2052 calldata->roc = roc;
f6948697
AV
2053 path_get(path);
2054 calldata->path = *path;
9512135d 2055
1174dd1f
TM
2056 msg.rpc_argp = &calldata->arg;
2057 msg.rpc_resp = &calldata->res;
c970aa85
TM
2058 task_setup_data.callback_data = calldata;
2059 task = rpc_run_task(&task_setup_data);
b39e625b
TM
2060 if (IS_ERR(task))
2061 return PTR_ERR(task);
a49c3c77
TM
2062 status = 0;
2063 if (wait)
2064 status = rpc_wait_for_completion_task(task);
b39e625b 2065 rpc_put_task(task);
a49c3c77 2066 return status;
9512135d
TM
2067out_free_calldata:
2068 kfree(calldata);
2069out:
f7e8917a
FI
2070 if (roc)
2071 pnfs_roc_release(state->inode);
b39e625b
TM
2072 nfs4_put_open_state(state);
2073 nfs4_put_state_owner(sp);
9512135d 2074 return status;
1da177e4
LT
2075}
2076
2b484297 2077static struct inode *
cd9a1c0e 2078nfs4_atomic_open(struct inode *dir, struct nfs_open_context *ctx, int open_flags, struct iattr *attr)
1da177e4 2079{
1da177e4 2080 struct nfs4_state *state;
1da177e4 2081
565277f6 2082 /* Protect against concurrent sillydeletes */
cd9a1c0e 2083 state = nfs4_do_open(dir, &ctx->path, ctx->mode, open_flags, attr, ctx->cred);
f46e0bd3
TM
2084 if (IS_ERR(state))
2085 return ERR_CAST(state);
cd9a1c0e 2086 ctx->state = state;
f46e0bd3 2087 return igrab(state->inode);
1da177e4
LT
2088}
2089
1185a552 2090static void nfs4_close_context(struct nfs_open_context *ctx, int is_sync)
7fe5c398
TM
2091{
2092 if (ctx->state == NULL)
2093 return;
2094 if (is_sync)
2095 nfs4_close_sync(&ctx->path, ctx->state, ctx->mode);
2096 else
2097 nfs4_close_state(&ctx->path, ctx->state, ctx->mode);
2098}
1da177e4
LT
2099
2100static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
2101{
43652ad5
BH
2102 struct nfs4_server_caps_arg args = {
2103 .fhandle = fhandle,
2104 };
1da177e4
LT
2105 struct nfs4_server_caps_res res = {};
2106 struct rpc_message msg = {
2107 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
43652ad5 2108 .rpc_argp = &args,
1da177e4
LT
2109 .rpc_resp = &res,
2110 };
2111 int status;
2112
7c513058 2113 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2114 if (status == 0) {
2115 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
62ab460c
TM
2116 server->caps &= ~(NFS_CAP_ACLS|NFS_CAP_HARDLINKS|
2117 NFS_CAP_SYMLINKS|NFS_CAP_FILEID|
2118 NFS_CAP_MODE|NFS_CAP_NLINK|NFS_CAP_OWNER|
2119 NFS_CAP_OWNER_GROUP|NFS_CAP_ATIME|
2120 NFS_CAP_CTIME|NFS_CAP_MTIME);
1da177e4
LT
2121 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
2122 server->caps |= NFS_CAP_ACLS;
2123 if (res.has_links != 0)
2124 server->caps |= NFS_CAP_HARDLINKS;
2125 if (res.has_symlinks != 0)
2126 server->caps |= NFS_CAP_SYMLINKS;
62ab460c
TM
2127 if (res.attr_bitmask[0] & FATTR4_WORD0_FILEID)
2128 server->caps |= NFS_CAP_FILEID;
2129 if (res.attr_bitmask[1] & FATTR4_WORD1_MODE)
2130 server->caps |= NFS_CAP_MODE;
2131 if (res.attr_bitmask[1] & FATTR4_WORD1_NUMLINKS)
2132 server->caps |= NFS_CAP_NLINK;
2133 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER)
2134 server->caps |= NFS_CAP_OWNER;
2135 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER_GROUP)
2136 server->caps |= NFS_CAP_OWNER_GROUP;
2137 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_ACCESS)
2138 server->caps |= NFS_CAP_ATIME;
2139 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_METADATA)
2140 server->caps |= NFS_CAP_CTIME;
2141 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_MODIFY)
2142 server->caps |= NFS_CAP_MTIME;
2143
a65318bf
TM
2144 memcpy(server->cache_consistency_bitmask, res.attr_bitmask, sizeof(server->cache_consistency_bitmask));
2145 server->cache_consistency_bitmask[0] &= FATTR4_WORD0_CHANGE|FATTR4_WORD0_SIZE;
2146 server->cache_consistency_bitmask[1] &= FATTR4_WORD1_TIME_METADATA|FATTR4_WORD1_TIME_MODIFY;
1da177e4
LT
2147 server->acl_bitmask = res.acl_bitmask;
2148 }
cccef3b9 2149
1da177e4
LT
2150 return status;
2151}
2152
55a97593 2153int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1da177e4
LT
2154{
2155 struct nfs4_exception exception = { };
2156 int err;
2157 do {
2158 err = nfs4_handle_exception(server,
2159 _nfs4_server_capabilities(server, fhandle),
2160 &exception);
2161 } while (exception.retry);
2162 return err;
2163}
2164
2165static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2166 struct nfs_fsinfo *info)
2167{
1da177e4
LT
2168 struct nfs4_lookup_root_arg args = {
2169 .bitmask = nfs4_fattr_bitmap,
2170 };
2171 struct nfs4_lookup_res res = {
2172 .server = server,
0e574af1 2173 .fattr = info->fattr,
1da177e4
LT
2174 .fh = fhandle,
2175 };
2176 struct rpc_message msg = {
2177 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
2178 .rpc_argp = &args,
2179 .rpc_resp = &res,
2180 };
008f55d0 2181
0e574af1 2182 nfs_fattr_init(info->fattr);
7c513058 2183 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2184}
2185
2186static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2187 struct nfs_fsinfo *info)
2188{
2189 struct nfs4_exception exception = { };
2190 int err;
2191 do {
fb8a5ba8
BS
2192 err = _nfs4_lookup_root(server, fhandle, info);
2193 switch (err) {
2194 case 0:
2195 case -NFS4ERR_WRONGSEC:
2196 break;
2197 default:
2198 err = nfs4_handle_exception(server, err, &exception);
2199 }
1da177e4
LT
2200 } while (exception.retry);
2201 return err;
2202}
2203
8f70e95f
BS
2204static int nfs4_lookup_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
2205 struct nfs_fsinfo *info, rpc_authflavor_t flavor)
2206{
2207 struct rpc_auth *auth;
2208 int ret;
2209
2210 auth = rpcauth_create(flavor, server->client);
2211 if (!auth) {
2212 ret = -EIO;
2213 goto out;
2214 }
2215 ret = nfs4_lookup_root(server, fhandle, info);
8f70e95f
BS
2216out:
2217 return ret;
2218}
2219
801a16dc 2220static int nfs4_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
54ceac45 2221 struct nfs_fsinfo *info)
1da177e4 2222{
8f70e95f 2223 int i, len, status = 0;
0fabee24 2224 rpc_authflavor_t flav_array[NFS_MAX_SECFLAVORS];
1da177e4 2225
801a16dc
BS
2226 len = gss_mech_list_pseudoflavors(&flav_array[0]);
2227 flav_array[len] = RPC_AUTH_NULL;
2228 len += 1;
8f70e95f
BS
2229
2230 for (i = 0; i < len; i++) {
2231 status = nfs4_lookup_root_sec(server, fhandle, info, flav_array[i]);
fb8a5ba8 2232 if (status == -NFS4ERR_WRONGSEC || status == -EACCES)
d1a8016a
BS
2233 continue;
2234 break;
8f70e95f 2235 }
fb8a5ba8
BS
2236 /*
2237 * -EACCESS could mean that the user doesn't have correct permissions
2238 * to access the mount. It could also mean that we tried to mount
2239 * with a gss auth flavor, but rpc.gssd isn't running. Either way,
2240 * existing mount programs don't handle -EACCES very well so it should
2241 * be mapped to -EPERM instead.
2242 */
2243 if (status == -EACCES)
2244 status = -EPERM;
801a16dc
BS
2245 return status;
2246}
2247
2248/*
2249 * get the file handle for the "/" directory on the server
2250 */
2251static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle,
2252 struct nfs_fsinfo *info)
2253{
fca78d6d 2254 int minor_version = server->nfs_client->cl_minorversion;
801a16dc 2255 int status = nfs4_lookup_root(server, fhandle, info);
fb8a5ba8
BS
2256 if ((status == -NFS4ERR_WRONGSEC) && !(server->flags & NFS_MOUNT_SECFLAVOUR))
2257 /*
2258 * A status of -NFS4ERR_WRONGSEC will be mapped to -EPERM
2259 * by nfs4_map_errors() as this function exits.
2260 */
fca78d6d 2261 status = nfs_v4_minor_ops[minor_version]->find_root_sec(server, fhandle, info);
1da177e4
LT
2262 if (status == 0)
2263 status = nfs4_server_capabilities(server, fhandle);
2264 if (status == 0)
2265 status = nfs4_do_fsinfo(server, fhandle, info);
c12e87f4 2266 return nfs4_map_errors(status);
1da177e4
LT
2267}
2268
533eb461 2269static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr);
6b97fd3d
MN
2270/*
2271 * Get locations and (maybe) other attributes of a referral.
2272 * Note that we'll actually follow the referral later when
2273 * we detect fsid mismatch in inode revalidation
2274 */
533eb461
AA
2275static int nfs4_get_referral(struct inode *dir, const struct qstr *name,
2276 struct nfs_fattr *fattr, struct nfs_fh *fhandle)
6b97fd3d
MN
2277{
2278 int status = -ENOMEM;
2279 struct page *page = NULL;
2280 struct nfs4_fs_locations *locations = NULL;
6b97fd3d
MN
2281
2282 page = alloc_page(GFP_KERNEL);
2283 if (page == NULL)
2284 goto out;
2285 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
2286 if (locations == NULL)
2287 goto out;
2288
c228fd3a 2289 status = nfs4_proc_fs_locations(dir, name, locations, page);
6b97fd3d
MN
2290 if (status != 0)
2291 goto out;
2292 /* Make sure server returned a different fsid for the referral */
2293 if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
533eb461
AA
2294 dprintk("%s: server did not return a different fsid for"
2295 " a referral at %s\n", __func__, name->name);
6b97fd3d
MN
2296 status = -EIO;
2297 goto out;
2298 }
533eb461
AA
2299 /* Fixup attributes for the nfs_lookup() call to nfs_fhget() */
2300 nfs_fixup_referral_attributes(&locations->fattr);
6b97fd3d 2301
533eb461 2302 /* replace the lookup nfs_fattr with the locations nfs_fattr */
6b97fd3d 2303 memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
6b97fd3d
MN
2304 memset(fhandle, 0, sizeof(struct nfs_fh));
2305out:
2306 if (page)
2307 __free_page(page);
5d7ca35a 2308 kfree(locations);
6b97fd3d
MN
2309 return status;
2310}
2311
1da177e4
LT
2312static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
2313{
2314 struct nfs4_getattr_arg args = {
2315 .fh = fhandle,
2316 .bitmask = server->attr_bitmask,
2317 };
2318 struct nfs4_getattr_res res = {
2319 .fattr = fattr,
2320 .server = server,
2321 };
2322 struct rpc_message msg = {
2323 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
2324 .rpc_argp = &args,
2325 .rpc_resp = &res,
2326 };
2327
0e574af1 2328 nfs_fattr_init(fattr);
7c513058 2329 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2330}
2331
2332static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
2333{
2334 struct nfs4_exception exception = { };
2335 int err;
2336 do {
2337 err = nfs4_handle_exception(server,
2338 _nfs4_proc_getattr(server, fhandle, fattr),
2339 &exception);
2340 } while (exception.retry);
2341 return err;
2342}
2343
2344/*
2345 * The file is not closed if it is opened due to the a request to change
2346 * the size of the file. The open call will not be needed once the
2347 * VFS layer lookup-intents are implemented.
2348 *
2349 * Close is called when the inode is destroyed.
2350 * If we haven't opened the file for O_WRONLY, we
2351 * need to in the size_change case to obtain a stateid.
2352 *
2353 * Got race?
2354 * Because OPEN is always done by name in nfsv4, it is
2355 * possible that we opened a different file by the same
2356 * name. We can recognize this race condition, but we
2357 * can't do anything about it besides returning an error.
2358 *
2359 * This will be fixed with VFS changes (lookup-intent).
2360 */
2361static int
2362nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
2363 struct iattr *sattr)
2364{
08e9eac4 2365 struct inode *inode = dentry->d_inode;
659bfcd6 2366 struct rpc_cred *cred = NULL;
d530838b 2367 struct nfs4_state *state = NULL;
1da177e4
LT
2368 int status;
2369
8a1636c4
BH
2370 if (pnfs_ld_layoutret_on_setattr(inode))
2371 pnfs_return_layout(inode);
2372
0e574af1 2373 nfs_fattr_init(fattr);
1da177e4 2374
d530838b 2375 /* Search for an existing open(O_WRITE) file */
659bfcd6
TM
2376 if (sattr->ia_valid & ATTR_FILE) {
2377 struct nfs_open_context *ctx;
2378
2379 ctx = nfs_file_open_context(sattr->ia_file);
504e5189
NB
2380 if (ctx) {
2381 cred = ctx->cred;
2382 state = ctx->state;
2383 }
659bfcd6 2384 }
08e9eac4 2385
659bfcd6 2386 status = nfs4_do_setattr(inode, cred, fattr, sattr, state);
65e4308d
TM
2387 if (status == 0)
2388 nfs_setattr_update_inode(inode, sattr);
1da177e4
LT
2389 return status;
2390}
2391
7c513058
BS
2392static int _nfs4_proc_lookupfh(struct rpc_clnt *clnt, struct nfs_server *server,
2393 const struct nfs_fh *dirfh, const struct qstr *name,
2394 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
2b3de441
DH
2395{
2396 int status;
2397 struct nfs4_lookup_arg args = {
2398 .bitmask = server->attr_bitmask,
2399 .dir_fh = dirfh,
2400 .name = name,
2401 };
2402 struct nfs4_lookup_res res = {
2403 .server = server,
2404 .fattr = fattr,
2405 .fh = fhandle,
2406 };
2407 struct rpc_message msg = {
2408 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
2409 .rpc_argp = &args,
2410 .rpc_resp = &res,
2411 };
2412
2413 nfs_fattr_init(fattr);
2414
2415 dprintk("NFS call lookupfh %s\n", name->name);
7c513058 2416 status = nfs4_call_sync(clnt, server, &msg, &args.seq_args, &res.seq_res, 0);
2b3de441 2417 dprintk("NFS reply lookupfh: %d\n", status);
2b3de441
DH
2418 return status;
2419}
2420
2421static int nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
2422 struct qstr *name, struct nfs_fh *fhandle,
2423 struct nfs_fattr *fattr)
2424{
2425 struct nfs4_exception exception = { };
2426 int err;
2427 do {
7c513058 2428 err = _nfs4_proc_lookupfh(server->client, server, dirfh, name, fhandle, fattr);
4e56e082
TM
2429 /* FIXME: !!!! */
2430 if (err == -NFS4ERR_MOVED) {
2431 err = -EREMOTE;
2432 break;
2433 }
2434 err = nfs4_handle_exception(server, err, &exception);
2b3de441
DH
2435 } while (exception.retry);
2436 return err;
2437}
2438
7c513058
BS
2439static int _nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir,
2440 const struct qstr *name, struct nfs_fh *fhandle,
2441 struct nfs_fattr *fattr)
1da177e4 2442{
4e56e082 2443 int status;
1da177e4
LT
2444
2445 dprintk("NFS call lookup %s\n", name->name);
7c513058 2446 status = _nfs4_proc_lookupfh(clnt, NFS_SERVER(dir), NFS_FH(dir), name, fhandle, fattr);
6b97fd3d
MN
2447 if (status == -NFS4ERR_MOVED)
2448 status = nfs4_get_referral(dir, name, fattr, fhandle);
1da177e4
LT
2449 dprintk("NFS reply lookup: %d\n", status);
2450 return status;
2451}
2452
7ebb9315
BS
2453void nfs_fixup_secinfo_attributes(struct nfs_fattr *fattr, struct nfs_fh *fh)
2454{
2455 memset(fh, 0, sizeof(struct nfs_fh));
2456 fattr->fsid.major = 1;
2457 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
2458 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_FSID | NFS_ATTR_FATTR_MOUNTPOINT;
2459 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
2460 fattr->nlink = 2;
2461}
2462
7c513058
BS
2463static int nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir, struct qstr *name,
2464 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1da177e4
LT
2465{
2466 struct nfs4_exception exception = { };
2467 int err;
2468 do {
2469 err = nfs4_handle_exception(NFS_SERVER(dir),
7c513058 2470 _nfs4_proc_lookup(clnt, dir, name, fhandle, fattr),
1da177e4 2471 &exception);
7ebb9315
BS
2472 if (err == -EPERM)
2473 nfs_fixup_secinfo_attributes(fattr, fhandle);
1da177e4
LT
2474 } while (exception.retry);
2475 return err;
2476}
2477
2478static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
2479{
76b32999 2480 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
2481 struct nfs4_accessargs args = {
2482 .fh = NFS_FH(inode),
76b32999
TM
2483 .bitmask = server->attr_bitmask,
2484 };
2485 struct nfs4_accessres res = {
2486 .server = server,
1da177e4 2487 };
1da177e4
LT
2488 struct rpc_message msg = {
2489 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
2490 .rpc_argp = &args,
2491 .rpc_resp = &res,
2492 .rpc_cred = entry->cred,
2493 };
2494 int mode = entry->mask;
2495 int status;
2496
2497 /*
2498 * Determine which access bits we want to ask for...
2499 */
2500 if (mode & MAY_READ)
2501 args.access |= NFS4_ACCESS_READ;
2502 if (S_ISDIR(inode->i_mode)) {
2503 if (mode & MAY_WRITE)
2504 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
2505 if (mode & MAY_EXEC)
2506 args.access |= NFS4_ACCESS_LOOKUP;
2507 } else {
2508 if (mode & MAY_WRITE)
2509 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
2510 if (mode & MAY_EXEC)
2511 args.access |= NFS4_ACCESS_EXECUTE;
2512 }
c407d41a
TM
2513
2514 res.fattr = nfs_alloc_fattr();
2515 if (res.fattr == NULL)
2516 return -ENOMEM;
2517
7c513058 2518 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2519 if (!status) {
2520 entry->mask = 0;
2521 if (res.access & NFS4_ACCESS_READ)
2522 entry->mask |= MAY_READ;
2523 if (res.access & (NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE))
2524 entry->mask |= MAY_WRITE;
2525 if (res.access & (NFS4_ACCESS_LOOKUP|NFS4_ACCESS_EXECUTE))
2526 entry->mask |= MAY_EXEC;
c407d41a 2527 nfs_refresh_inode(inode, res.fattr);
1da177e4 2528 }
c407d41a 2529 nfs_free_fattr(res.fattr);
1da177e4
LT
2530 return status;
2531}
2532
2533static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
2534{
2535 struct nfs4_exception exception = { };
2536 int err;
2537 do {
2538 err = nfs4_handle_exception(NFS_SERVER(inode),
2539 _nfs4_proc_access(inode, entry),
2540 &exception);
2541 } while (exception.retry);
2542 return err;
2543}
2544
2545/*
2546 * TODO: For the time being, we don't try to get any attributes
2547 * along with any of the zero-copy operations READ, READDIR,
2548 * READLINK, WRITE.
2549 *
2550 * In the case of the first three, we want to put the GETATTR
2551 * after the read-type operation -- this is because it is hard
2552 * to predict the length of a GETATTR response in v4, and thus
2553 * align the READ data correctly. This means that the GETATTR
2554 * may end up partially falling into the page cache, and we should
2555 * shift it into the 'tail' of the xdr_buf before processing.
2556 * To do this efficiently, we need to know the total length
2557 * of data received, which doesn't seem to be available outside
2558 * of the RPC layer.
2559 *
2560 * In the case of WRITE, we also want to put the GETATTR after
2561 * the operation -- in this case because we want to make sure
2562 * we get the post-operation mtime and size. This means that
2563 * we can't use xdr_encode_pages() as written: we need a variant
2564 * of it which would leave room in the 'tail' iovec.
2565 *
2566 * Both of these changes to the XDR layer would in fact be quite
2567 * minor, but I decided to leave them for a subsequent patch.
2568 */
2569static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
2570 unsigned int pgbase, unsigned int pglen)
2571{
2572 struct nfs4_readlink args = {
2573 .fh = NFS_FH(inode),
2574 .pgbase = pgbase,
2575 .pglen = pglen,
2576 .pages = &page,
2577 };
f50c7000 2578 struct nfs4_readlink_res res;
1da177e4
LT
2579 struct rpc_message msg = {
2580 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
2581 .rpc_argp = &args,
f50c7000 2582 .rpc_resp = &res,
1da177e4
LT
2583 };
2584
7c513058 2585 return nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode), &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2586}
2587
2588static int nfs4_proc_readlink(struct inode *inode, struct page *page,
2589 unsigned int pgbase, unsigned int pglen)
2590{
2591 struct nfs4_exception exception = { };
2592 int err;
2593 do {
2594 err = nfs4_handle_exception(NFS_SERVER(inode),
2595 _nfs4_proc_readlink(inode, page, pgbase, pglen),
2596 &exception);
2597 } while (exception.retry);
2598 return err;
2599}
2600
1da177e4
LT
2601/*
2602 * Got race?
2603 * We will need to arrange for the VFS layer to provide an atomic open.
2604 * Until then, this create/open method is prone to inefficiency and race
2605 * conditions due to the lookup, create, and open VFS calls from sys_open()
2606 * placed on the wire.
2607 *
2608 * Given the above sorry state of affairs, I'm simply sending an OPEN.
2609 * The file will be opened again in the subsequent VFS open call
2610 * (nfs4_proc_file_open).
2611 *
2612 * The open for read will just hang around to be used by any process that
2613 * opens the file O_RDONLY. This will all be resolved with the VFS changes.
2614 */
2615
2616static int
2617nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
c0204fd2 2618 int flags, struct nfs_open_context *ctx)
1da177e4 2619{
c0204fd2 2620 struct path my_path = {
ad389da7
TM
2621 .dentry = dentry,
2622 };
c0204fd2 2623 struct path *path = &my_path;
1da177e4 2624 struct nfs4_state *state;
c0204fd2
TM
2625 struct rpc_cred *cred = NULL;
2626 fmode_t fmode = 0;
1da177e4
LT
2627 int status = 0;
2628
c0204fd2
TM
2629 if (ctx != NULL) {
2630 cred = ctx->cred;
2631 path = &ctx->path;
2632 fmode = ctx->mode;
1da177e4 2633 }
a8a5da99 2634 sattr->ia_mode &= ~current_umask();
c0204fd2 2635 state = nfs4_do_open(dir, path, fmode, flags, sattr, cred);
d4d9cdcb 2636 d_drop(dentry);
1da177e4
LT
2637 if (IS_ERR(state)) {
2638 status = PTR_ERR(state);
c0204fd2 2639 goto out;
1da177e4 2640 }
d4d9cdcb 2641 d_add(dentry, igrab(state->inode));
d75340cc 2642 nfs_set_verifier(dentry, nfs_save_change_attribute(dir));
c0204fd2
TM
2643 if (ctx != NULL)
2644 ctx->state = state;
02a913a7 2645 else
c0204fd2 2646 nfs4_close_sync(path, state, fmode);
1da177e4
LT
2647out:
2648 return status;
2649}
2650
2651static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
2652{
16e42959 2653 struct nfs_server *server = NFS_SERVER(dir);
4fdc17b2 2654 struct nfs_removeargs args = {
1da177e4 2655 .fh = NFS_FH(dir),
4fdc17b2
TM
2656 .name.len = name->len,
2657 .name.name = name->name,
16e42959
TM
2658 .bitmask = server->attr_bitmask,
2659 };
4fdc17b2 2660 struct nfs_removeres res = {
16e42959 2661 .server = server,
1da177e4 2662 };
1da177e4 2663 struct rpc_message msg = {
4fdc17b2
TM
2664 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
2665 .rpc_argp = &args,
2666 .rpc_resp = &res,
1da177e4 2667 };
d346890b
TM
2668 int status = -ENOMEM;
2669
2670 res.dir_attr = nfs_alloc_fattr();
2671 if (res.dir_attr == NULL)
2672 goto out;
1da177e4 2673
7c513058 2674 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
16e42959
TM
2675 if (status == 0) {
2676 update_changeattr(dir, &res.cinfo);
d346890b 2677 nfs_post_op_update_inode(dir, res.dir_attr);
16e42959 2678 }
d346890b
TM
2679 nfs_free_fattr(res.dir_attr);
2680out:
1da177e4
LT
2681 return status;
2682}
2683
2684static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
2685{
2686 struct nfs4_exception exception = { };
2687 int err;
2688 do {
2689 err = nfs4_handle_exception(NFS_SERVER(dir),
2690 _nfs4_proc_remove(dir, name),
2691 &exception);
2692 } while (exception.retry);
2693 return err;
2694}
2695
e4eff1a6 2696static void nfs4_proc_unlink_setup(struct rpc_message *msg, struct inode *dir)
1da177e4 2697{
e4eff1a6
TM
2698 struct nfs_server *server = NFS_SERVER(dir);
2699 struct nfs_removeargs *args = msg->rpc_argp;
2700 struct nfs_removeres *res = msg->rpc_resp;
1da177e4 2701
a65318bf 2702 args->bitmask = server->cache_consistency_bitmask;
e4eff1a6 2703 res->server = server;
dfb4f309 2704 res->seq_res.sr_slot = NULL;
1da177e4 2705 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
1da177e4
LT
2706}
2707
e4eff1a6 2708static int nfs4_proc_unlink_done(struct rpc_task *task, struct inode *dir)
1da177e4 2709{
e4eff1a6
TM
2710 struct nfs_removeres *res = task->tk_msg.rpc_resp;
2711
14516c3a
TM
2712 if (!nfs4_sequence_done(task, &res->seq_res))
2713 return 0;
9e33bed5 2714 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
e4eff1a6
TM
2715 return 0;
2716 update_changeattr(dir, &res->cinfo);
d346890b 2717 nfs_post_op_update_inode(dir, res->dir_attr);
e4eff1a6 2718 return 1;
1da177e4
LT
2719}
2720
d3d4152a
JL
2721static void nfs4_proc_rename_setup(struct rpc_message *msg, struct inode *dir)
2722{
2723 struct nfs_server *server = NFS_SERVER(dir);
2724 struct nfs_renameargs *arg = msg->rpc_argp;
2725 struct nfs_renameres *res = msg->rpc_resp;
2726
2727 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME];
2728 arg->bitmask = server->attr_bitmask;
2729 res->server = server;
2730}
2731
2732static int nfs4_proc_rename_done(struct rpc_task *task, struct inode *old_dir,
2733 struct inode *new_dir)
2734{
2735 struct nfs_renameres *res = task->tk_msg.rpc_resp;
2736
2737 if (!nfs4_sequence_done(task, &res->seq_res))
2738 return 0;
2739 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
2740 return 0;
2741
2742 update_changeattr(old_dir, &res->old_cinfo);
2743 nfs_post_op_update_inode(old_dir, res->old_fattr);
2744 update_changeattr(new_dir, &res->new_cinfo);
2745 nfs_post_op_update_inode(new_dir, res->new_fattr);
2746 return 1;
2747}
2748
1da177e4
LT
2749static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
2750 struct inode *new_dir, struct qstr *new_name)
2751{
6caf2c82 2752 struct nfs_server *server = NFS_SERVER(old_dir);
920769f0 2753 struct nfs_renameargs arg = {
1da177e4
LT
2754 .old_dir = NFS_FH(old_dir),
2755 .new_dir = NFS_FH(new_dir),
2756 .old_name = old_name,
2757 .new_name = new_name,
6caf2c82
TM
2758 .bitmask = server->attr_bitmask,
2759 };
e8582a8b 2760 struct nfs_renameres res = {
6caf2c82 2761 .server = server,
1da177e4 2762 };
1da177e4
LT
2763 struct rpc_message msg = {
2764 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
2765 .rpc_argp = &arg,
2766 .rpc_resp = &res,
2767 };
011fff72 2768 int status = -ENOMEM;
1da177e4 2769
011fff72
TM
2770 res.old_fattr = nfs_alloc_fattr();
2771 res.new_fattr = nfs_alloc_fattr();
2772 if (res.old_fattr == NULL || res.new_fattr == NULL)
2773 goto out;
1da177e4 2774
7c513058 2775 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
1da177e4
LT
2776 if (!status) {
2777 update_changeattr(old_dir, &res.old_cinfo);
6caf2c82 2778 nfs_post_op_update_inode(old_dir, res.old_fattr);
1da177e4 2779 update_changeattr(new_dir, &res.new_cinfo);
6caf2c82 2780 nfs_post_op_update_inode(new_dir, res.new_fattr);
1da177e4 2781 }
011fff72
TM
2782out:
2783 nfs_free_fattr(res.new_fattr);
2784 nfs_free_fattr(res.old_fattr);
1da177e4
LT
2785 return status;
2786}
2787
2788static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
2789 struct inode *new_dir, struct qstr *new_name)
2790{
2791 struct nfs4_exception exception = { };
2792 int err;
2793 do {
2794 err = nfs4_handle_exception(NFS_SERVER(old_dir),
2795 _nfs4_proc_rename(old_dir, old_name,
2796 new_dir, new_name),
2797 &exception);
2798 } while (exception.retry);
2799 return err;
2800}
2801
2802static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
2803{
91ba2eee 2804 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
2805 struct nfs4_link_arg arg = {
2806 .fh = NFS_FH(inode),
2807 .dir_fh = NFS_FH(dir),
2808 .name = name,
91ba2eee
TM
2809 .bitmask = server->attr_bitmask,
2810 };
91ba2eee
TM
2811 struct nfs4_link_res res = {
2812 .server = server,
1da177e4 2813 };
1da177e4
LT
2814 struct rpc_message msg = {
2815 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
2816 .rpc_argp = &arg,
91ba2eee 2817 .rpc_resp = &res,
1da177e4 2818 };
136f2627
TM
2819 int status = -ENOMEM;
2820
2821 res.fattr = nfs_alloc_fattr();
2822 res.dir_attr = nfs_alloc_fattr();
2823 if (res.fattr == NULL || res.dir_attr == NULL)
2824 goto out;
1da177e4 2825
7c513058 2826 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
91ba2eee
TM
2827 if (!status) {
2828 update_changeattr(dir, &res.cinfo);
2829 nfs_post_op_update_inode(dir, res.dir_attr);
73a3d07c 2830 nfs_post_op_update_inode(inode, res.fattr);
91ba2eee 2831 }
136f2627
TM
2832out:
2833 nfs_free_fattr(res.dir_attr);
2834 nfs_free_fattr(res.fattr);
1da177e4
LT
2835 return status;
2836}
2837
2838static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
2839{
2840 struct nfs4_exception exception = { };
2841 int err;
2842 do {
2843 err = nfs4_handle_exception(NFS_SERVER(inode),
2844 _nfs4_proc_link(inode, dir, name),
2845 &exception);
2846 } while (exception.retry);
2847 return err;
2848}
2849
57dc9a57
TM
2850struct nfs4_createdata {
2851 struct rpc_message msg;
2852 struct nfs4_create_arg arg;
2853 struct nfs4_create_res res;
2854 struct nfs_fh fh;
2855 struct nfs_fattr fattr;
2856 struct nfs_fattr dir_fattr;
2857};
2858
2859static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir,
2860 struct qstr *name, struct iattr *sattr, u32 ftype)
2861{
2862 struct nfs4_createdata *data;
2863
2864 data = kzalloc(sizeof(*data), GFP_KERNEL);
2865 if (data != NULL) {
2866 struct nfs_server *server = NFS_SERVER(dir);
2867
2868 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE];
2869 data->msg.rpc_argp = &data->arg;
2870 data->msg.rpc_resp = &data->res;
2871 data->arg.dir_fh = NFS_FH(dir);
2872 data->arg.server = server;
2873 data->arg.name = name;
2874 data->arg.attrs = sattr;
2875 data->arg.ftype = ftype;
2876 data->arg.bitmask = server->attr_bitmask;
2877 data->res.server = server;
2878 data->res.fh = &data->fh;
2879 data->res.fattr = &data->fattr;
2880 data->res.dir_fattr = &data->dir_fattr;
2881 nfs_fattr_init(data->res.fattr);
2882 nfs_fattr_init(data->res.dir_fattr);
2883 }
2884 return data;
2885}
2886
2887static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data)
2888{
7c513058 2889 int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg,
e73b83f2 2890 &data->arg.seq_args, &data->res.seq_res, 1);
57dc9a57
TM
2891 if (status == 0) {
2892 update_changeattr(dir, &data->res.dir_cinfo);
2893 nfs_post_op_update_inode(dir, data->res.dir_fattr);
2894 status = nfs_instantiate(dentry, data->res.fh, data->res.fattr);
2895 }
2896 return status;
2897}
2898
2899static void nfs4_free_createdata(struct nfs4_createdata *data)
2900{
2901 kfree(data);
2902}
2903
4f390c15 2904static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2905 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4 2906{
57dc9a57
TM
2907 struct nfs4_createdata *data;
2908 int status = -ENAMETOOLONG;
1da177e4 2909
94a6d753 2910 if (len > NFS4_MAXPATHLEN)
57dc9a57 2911 goto out;
4f390c15 2912
57dc9a57
TM
2913 status = -ENOMEM;
2914 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK);
2915 if (data == NULL)
2916 goto out;
2917
2918 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK];
2919 data->arg.u.symlink.pages = &page;
2920 data->arg.u.symlink.len = len;
1da177e4 2921
57dc9a57
TM
2922 status = nfs4_do_create(dir, dentry, data);
2923
2924 nfs4_free_createdata(data);
2925out:
1da177e4
LT
2926 return status;
2927}
2928
4f390c15 2929static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2930 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
2931{
2932 struct nfs4_exception exception = { };
2933 int err;
2934 do {
2935 err = nfs4_handle_exception(NFS_SERVER(dir),
94a6d753
CL
2936 _nfs4_proc_symlink(dir, dentry, page,
2937 len, sattr),
1da177e4
LT
2938 &exception);
2939 } while (exception.retry);
2940 return err;
2941}
2942
2943static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2944 struct iattr *sattr)
2945{
57dc9a57
TM
2946 struct nfs4_createdata *data;
2947 int status = -ENOMEM;
1da177e4 2948
57dc9a57
TM
2949 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR);
2950 if (data == NULL)
2951 goto out;
2952
2953 status = nfs4_do_create(dir, dentry, data);
2954
2955 nfs4_free_createdata(data);
2956out:
1da177e4
LT
2957 return status;
2958}
2959
2960static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2961 struct iattr *sattr)
2962{
2963 struct nfs4_exception exception = { };
2964 int err;
a8a5da99
AK
2965
2966 sattr->ia_mode &= ~current_umask();
1da177e4
LT
2967 do {
2968 err = nfs4_handle_exception(NFS_SERVER(dir),
2969 _nfs4_proc_mkdir(dir, dentry, sattr),
2970 &exception);
2971 } while (exception.retry);
2972 return err;
2973}
2974
2975static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 2976 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
2977{
2978 struct inode *dir = dentry->d_inode;
2979 struct nfs4_readdir_arg args = {
2980 .fh = NFS_FH(dir),
56e4ebf8 2981 .pages = pages,
1da177e4
LT
2982 .pgbase = 0,
2983 .count = count,
96d25e53 2984 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
82f2e547 2985 .plus = plus,
1da177e4
LT
2986 };
2987 struct nfs4_readdir_res res;
2988 struct rpc_message msg = {
2989 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
2990 .rpc_argp = &args,
2991 .rpc_resp = &res,
2992 .rpc_cred = cred,
2993 };
2994 int status;
2995
3110ff80 2996 dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __func__,
eadf4598
TM
2997 dentry->d_parent->d_name.name,
2998 dentry->d_name.name,
2999 (unsigned long long)cookie);
1da177e4
LT
3000 nfs4_setup_readdir(cookie, NFS_COOKIEVERF(dir), dentry, &args);
3001 res.pgbase = args.pgbase;
7c513058 3002 status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
ac396128 3003 if (status >= 0) {
1da177e4 3004 memcpy(NFS_COOKIEVERF(dir), res.verifier.data, NFS4_VERIFIER_SIZE);
ac396128
TM
3005 status += args.pgbase;
3006 }
c4812998
TM
3007
3008 nfs_invalidate_atime(dir);
3009
3110ff80 3010 dprintk("%s: returns %d\n", __func__, status);
1da177e4
LT
3011 return status;
3012}
3013
3014static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 3015 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
3016{
3017 struct nfs4_exception exception = { };
3018 int err;
3019 do {
3020 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode),
3021 _nfs4_proc_readdir(dentry, cred, cookie,
56e4ebf8 3022 pages, count, plus),
1da177e4
LT
3023 &exception);
3024 } while (exception.retry);
3025 return err;
3026}
3027
3028static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3029 struct iattr *sattr, dev_t rdev)
3030{
57dc9a57
TM
3031 struct nfs4_createdata *data;
3032 int mode = sattr->ia_mode;
3033 int status = -ENOMEM;
1da177e4
LT
3034
3035 BUG_ON(!(sattr->ia_valid & ATTR_MODE));
3036 BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
57dc9a57
TM
3037
3038 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4SOCK);
3039 if (data == NULL)
3040 goto out;
3041
1da177e4 3042 if (S_ISFIFO(mode))
57dc9a57 3043 data->arg.ftype = NF4FIFO;
1da177e4 3044 else if (S_ISBLK(mode)) {
57dc9a57
TM
3045 data->arg.ftype = NF4BLK;
3046 data->arg.u.device.specdata1 = MAJOR(rdev);
3047 data->arg.u.device.specdata2 = MINOR(rdev);
1da177e4
LT
3048 }
3049 else if (S_ISCHR(mode)) {
57dc9a57
TM
3050 data->arg.ftype = NF4CHR;
3051 data->arg.u.device.specdata1 = MAJOR(rdev);
3052 data->arg.u.device.specdata2 = MINOR(rdev);
1da177e4 3053 }
1da177e4 3054
57dc9a57
TM
3055 status = nfs4_do_create(dir, dentry, data);
3056
3057 nfs4_free_createdata(data);
3058out:
1da177e4
LT
3059 return status;
3060}
3061
3062static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3063 struct iattr *sattr, dev_t rdev)
3064{
3065 struct nfs4_exception exception = { };
3066 int err;
a8a5da99
AK
3067
3068 sattr->ia_mode &= ~current_umask();
1da177e4
LT
3069 do {
3070 err = nfs4_handle_exception(NFS_SERVER(dir),
3071 _nfs4_proc_mknod(dir, dentry, sattr, rdev),
3072 &exception);
3073 } while (exception.retry);
3074 return err;
3075}
3076
3077static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
3078 struct nfs_fsstat *fsstat)
3079{
3080 struct nfs4_statfs_arg args = {
3081 .fh = fhandle,
3082 .bitmask = server->attr_bitmask,
3083 };
24ad148a
BH
3084 struct nfs4_statfs_res res = {
3085 .fsstat = fsstat,
3086 };
1da177e4
LT
3087 struct rpc_message msg = {
3088 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
3089 .rpc_argp = &args,
24ad148a 3090 .rpc_resp = &res,
1da177e4
LT
3091 };
3092
0e574af1 3093 nfs_fattr_init(fsstat->fattr);
7c513058 3094 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3095}
3096
3097static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
3098{
3099 struct nfs4_exception exception = { };
3100 int err;
3101 do {
3102 err = nfs4_handle_exception(server,
3103 _nfs4_proc_statfs(server, fhandle, fsstat),
3104 &exception);
3105 } while (exception.retry);
3106 return err;
3107}
3108
3109static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
3110 struct nfs_fsinfo *fsinfo)
3111{
3112 struct nfs4_fsinfo_arg args = {
3113 .fh = fhandle,
3114 .bitmask = server->attr_bitmask,
3115 };
3dda5e43
BH
3116 struct nfs4_fsinfo_res res = {
3117 .fsinfo = fsinfo,
3118 };
1da177e4
LT
3119 struct rpc_message msg = {
3120 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
3121 .rpc_argp = &args,
3dda5e43 3122 .rpc_resp = &res,
1da177e4
LT
3123 };
3124
7c513058 3125 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3126}
3127
3128static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3129{
3130 struct nfs4_exception exception = { };
3131 int err;
3132
3133 do {
3134 err = nfs4_handle_exception(server,
3135 _nfs4_do_fsinfo(server, fhandle, fsinfo),
3136 &exception);
3137 } while (exception.retry);
3138 return err;
3139}
3140
3141static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3142{
0e574af1 3143 nfs_fattr_init(fsinfo->fattr);
1da177e4
LT
3144 return nfs4_do_fsinfo(server, fhandle, fsinfo);
3145}
3146
3147static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3148 struct nfs_pathconf *pathconf)
3149{
3150 struct nfs4_pathconf_arg args = {
3151 .fh = fhandle,
3152 .bitmask = server->attr_bitmask,
3153 };
d45b2989
BH
3154 struct nfs4_pathconf_res res = {
3155 .pathconf = pathconf,
3156 };
1da177e4
LT
3157 struct rpc_message msg = {
3158 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
3159 .rpc_argp = &args,
d45b2989 3160 .rpc_resp = &res,
1da177e4
LT
3161 };
3162
3163 /* None of the pathconf attributes are mandatory to implement */
3164 if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
3165 memset(pathconf, 0, sizeof(*pathconf));
3166 return 0;
3167 }
3168
0e574af1 3169 nfs_fattr_init(pathconf->fattr);
7c513058 3170 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3171}
3172
3173static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3174 struct nfs_pathconf *pathconf)
3175{
3176 struct nfs4_exception exception = { };
3177 int err;
3178
3179 do {
3180 err = nfs4_handle_exception(server,
3181 _nfs4_proc_pathconf(server, fhandle, pathconf),
3182 &exception);
3183 } while (exception.retry);
3184 return err;
3185}
3186
d20581aa
BH
3187void __nfs4_read_done_cb(struct nfs_read_data *data)
3188{
3189 nfs_invalidate_atime(data->inode);
3190}
3191
cbdabc7f 3192static int nfs4_read_done_cb(struct rpc_task *task, struct nfs_read_data *data)
1da177e4 3193{
ec06c096 3194 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 3195
9e33bed5 3196 if (nfs4_async_handle_error(task, server, data->args.context->state) == -EAGAIN) {
0110ee15 3197 nfs_restart_rpc(task, server->nfs_client);
ec06c096 3198 return -EAGAIN;
1da177e4 3199 }
8850df99 3200
d20581aa 3201 __nfs4_read_done_cb(data);
1da177e4 3202 if (task->tk_status > 0)
ec06c096
TM
3203 renew_lease(server, data->timestamp);
3204 return 0;
1da177e4
LT
3205}
3206
cbdabc7f
AA
3207static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
3208{
3209
3210 dprintk("--> %s\n", __func__);
3211
3212 if (!nfs4_sequence_done(task, &data->res.seq_res))
3213 return -EAGAIN;
3214
d20581aa
BH
3215 return data->read_done_cb ? data->read_done_cb(task, data) :
3216 nfs4_read_done_cb(task, data);
cbdabc7f
AA
3217}
3218
bdc7f021 3219static void nfs4_proc_read_setup(struct nfs_read_data *data, struct rpc_message *msg)
1da177e4 3220{
1da177e4 3221 data->timestamp = jiffies;
cbdabc7f 3222 data->read_done_cb = nfs4_read_done_cb;
bdc7f021 3223 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ];
1da177e4
LT
3224}
3225
cbdabc7f
AA
3226/* Reset the the nfs_read_data to send the read to the MDS. */
3227void nfs4_reset_read(struct rpc_task *task, struct nfs_read_data *data)
3228{
3229 dprintk("%s Reset task for i/o through\n", __func__);
3230 put_lseg(data->lseg);
3231 data->lseg = NULL;
3232 /* offsets will differ in the dense stripe case */
3233 data->args.offset = data->mds_offset;
3234 data->ds_clp = NULL;
3235 data->args.fh = NFS_FH(data->inode);
3236 data->read_done_cb = nfs4_read_done_cb;
3237 task->tk_ops = data->mds_ops;
3238 rpc_task_reset_client(task, NFS_CLIENT(data->inode));
3239}
3240EXPORT_SYMBOL_GPL(nfs4_reset_read);
3241
b029bc9b 3242static int nfs4_write_done_cb(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 3243{
1da177e4
LT
3244 struct inode *inode = data->inode;
3245
9e33bed5 3246 if (nfs4_async_handle_error(task, NFS_SERVER(inode), data->args.context->state) == -EAGAIN) {
0110ee15 3247 nfs_restart_rpc(task, NFS_SERVER(inode)->nfs_client);
788e7a89 3248 return -EAGAIN;
1da177e4 3249 }
4f9838c7 3250 if (task->tk_status >= 0) {
1da177e4 3251 renew_lease(NFS_SERVER(inode), data->timestamp);
70ca8852 3252 nfs_post_op_update_inode_force_wcc(inode, data->res.fattr);
4f9838c7 3253 }
788e7a89 3254 return 0;
1da177e4
LT
3255}
3256
b029bc9b
FI
3257static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
3258{
3259 if (!nfs4_sequence_done(task, &data->res.seq_res))
3260 return -EAGAIN;
d20581aa
BH
3261 return data->write_done_cb ? data->write_done_cb(task, data) :
3262 nfs4_write_done_cb(task, data);
b029bc9b
FI
3263}
3264
a69aef14
FI
3265/* Reset the the nfs_write_data to send the write to the MDS. */
3266void nfs4_reset_write(struct rpc_task *task, struct nfs_write_data *data)
3267{
3268 dprintk("%s Reset task for i/o through\n", __func__);
3269 put_lseg(data->lseg);
3270 data->lseg = NULL;
3271 data->ds_clp = NULL;
3272 data->write_done_cb = nfs4_write_done_cb;
3273 data->args.fh = NFS_FH(data->inode);
3274 data->args.bitmask = data->res.server->cache_consistency_bitmask;
3275 data->args.offset = data->mds_offset;
3276 data->res.fattr = &data->fattr;
3277 task->tk_ops = data->mds_ops;
3278 rpc_task_reset_client(task, NFS_CLIENT(data->inode));
3279}
3280EXPORT_SYMBOL_GPL(nfs4_reset_write);
3281
bdc7f021 3282static void nfs4_proc_write_setup(struct nfs_write_data *data, struct rpc_message *msg)
1da177e4 3283{
bdc7f021
TM
3284 struct nfs_server *server = NFS_SERVER(data->inode);
3285
7ffd1064
FI
3286 if (data->lseg) {
3287 data->args.bitmask = NULL;
3288 data->res.fattr = NULL;
3289 } else
3290 data->args.bitmask = server->cache_consistency_bitmask;
b029bc9b
FI
3291 if (!data->write_done_cb)
3292 data->write_done_cb = nfs4_write_done_cb;
4f9838c7 3293 data->res.server = server;
1da177e4
LT
3294 data->timestamp = jiffies;
3295
bdc7f021 3296 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE];
1da177e4
LT
3297}
3298
5f452431 3299static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 3300{
1da177e4 3301 struct inode *inode = data->inode;
14516c3a 3302
9e33bed5 3303 if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) {
0110ee15 3304 nfs_restart_rpc(task, NFS_SERVER(inode)->nfs_client);
788e7a89 3305 return -EAGAIN;
1da177e4 3306 }
9e08a3c5 3307 nfs_refresh_inode(inode, data->res.fattr);
788e7a89 3308 return 0;
1da177e4
LT
3309}
3310
5f452431
FI
3311static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data)
3312{
3313 if (!nfs4_sequence_done(task, &data->res.seq_res))
3314 return -EAGAIN;
3315 return data->write_done_cb(task, data);
3316}
3317
bdc7f021 3318static void nfs4_proc_commit_setup(struct nfs_write_data *data, struct rpc_message *msg)
1da177e4 3319{
788e7a89 3320 struct nfs_server *server = NFS_SERVER(data->inode);
988b6dce
FI
3321
3322 if (data->lseg) {
3323 data->args.bitmask = NULL;
3324 data->res.fattr = NULL;
3325 } else
3326 data->args.bitmask = server->cache_consistency_bitmask;
5f452431
FI
3327 if (!data->write_done_cb)
3328 data->write_done_cb = nfs4_commit_done_cb;
4f9838c7 3329 data->res.server = server;
bdc7f021 3330 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT];
1da177e4
LT
3331}
3332
9bc4e3ca
CL
3333struct nfs4_renewdata {
3334 struct nfs_client *client;
3335 unsigned long timestamp;
3336};
3337
1da177e4
LT
3338/*
3339 * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
3340 * standalone procedure for queueing an asynchronous RENEW.
3341 */
9bc4e3ca 3342static void nfs4_renew_release(void *calldata)
dc96aef9 3343{
9bc4e3ca
CL
3344 struct nfs4_renewdata *data = calldata;
3345 struct nfs_client *clp = data->client;
dc96aef9 3346
0851de06
AB
3347 if (atomic_read(&clp->cl_count) > 1)
3348 nfs4_schedule_state_renewal(clp);
3349 nfs_put_client(clp);
9bc4e3ca 3350 kfree(data);
dc96aef9
AB
3351}
3352
9bc4e3ca 3353static void nfs4_renew_done(struct rpc_task *task, void *calldata)
1da177e4 3354{
9bc4e3ca
CL
3355 struct nfs4_renewdata *data = calldata;
3356 struct nfs_client *clp = data->client;
3357 unsigned long timestamp = data->timestamp;
1da177e4
LT
3358
3359 if (task->tk_status < 0) {
95baa25c
TM
3360 /* Unless we're shutting down, schedule state recovery! */
3361 if (test_bit(NFS_CS_RENEWD, &clp->cl_res_state) != 0)
0400a6b0 3362 nfs4_schedule_lease_recovery(clp);
1da177e4
LT
3363 return;
3364 }
452e9352 3365 do_renew_lease(clp, timestamp);
1da177e4
LT
3366}
3367
963d8fe5
TM
3368static const struct rpc_call_ops nfs4_renew_ops = {
3369 .rpc_call_done = nfs4_renew_done,
dc96aef9 3370 .rpc_release = nfs4_renew_release,
963d8fe5
TM
3371};
3372
adfa6f98 3373int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
3374{
3375 struct rpc_message msg = {
3376 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
3377 .rpc_argp = clp,
b4454fe1 3378 .rpc_cred = cred,
1da177e4 3379 };
9bc4e3ca 3380 struct nfs4_renewdata *data;
1da177e4 3381
0851de06
AB
3382 if (!atomic_inc_not_zero(&clp->cl_count))
3383 return -EIO;
9bc4e3ca
CL
3384 data = kmalloc(sizeof(*data), GFP_KERNEL);
3385 if (data == NULL)
3386 return -ENOMEM;
3387 data->client = clp;
3388 data->timestamp = jiffies;
1da177e4 3389 return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_SOFT,
9bc4e3ca 3390 &nfs4_renew_ops, data);
1da177e4
LT
3391}
3392
adfa6f98 3393int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
3394{
3395 struct rpc_message msg = {
3396 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
3397 .rpc_argp = clp,
b4454fe1 3398 .rpc_cred = cred,
1da177e4
LT
3399 };
3400 unsigned long now = jiffies;
3401 int status;
3402
3403 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
3404 if (status < 0)
3405 return status;
452e9352 3406 do_renew_lease(clp, now);
1da177e4
LT
3407 return 0;
3408}
3409
aa1870af
BF
3410static inline int nfs4_server_supports_acls(struct nfs_server *server)
3411{
3412 return (server->caps & NFS_CAP_ACLS)
3413 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
3414 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
3415}
3416
3417/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_CACHE_SIZE, and that
3418 * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_CACHE_SIZE) bytes on
3419 * the stack.
3420 */
3421#define NFS4ACL_MAXPAGES (XATTR_SIZE_MAX >> PAGE_CACHE_SHIFT)
3422
3423static void buf_to_pages(const void *buf, size_t buflen,
3424 struct page **pages, unsigned int *pgbase)
3425{
3426 const void *p = buf;
3427
3428 *pgbase = offset_in_page(buf);
3429 p -= *pgbase;
3430 while (p < buf + buflen) {
3431 *(pages++) = virt_to_page(p);
3432 p += PAGE_CACHE_SIZE;
3433 }
3434}
3435
e9e3d724
NH
3436static int buf_to_pages_noslab(const void *buf, size_t buflen,
3437 struct page **pages, unsigned int *pgbase)
3438{
3439 struct page *newpage, **spages;
3440 int rc = 0;
3441 size_t len;
3442 spages = pages;
3443
3444 do {
43b7c3f0 3445 len = min_t(size_t, PAGE_CACHE_SIZE, buflen);
e9e3d724
NH
3446 newpage = alloc_page(GFP_KERNEL);
3447
3448 if (newpage == NULL)
3449 goto unwind;
3450 memcpy(page_address(newpage), buf, len);
3451 buf += len;
3452 buflen -= len;
3453 *pages++ = newpage;
3454 rc++;
3455 } while (buflen != 0);
3456
3457 return rc;
3458
3459unwind:
3460 for(; rc > 0; rc--)
3461 __free_page(spages[rc-1]);
3462 return -ENOMEM;
3463}
3464
e50a1c2e
BF
3465struct nfs4_cached_acl {
3466 int cached;
3467 size_t len;
3e9d4154 3468 char data[0];
e50a1c2e
BF
3469};
3470
3471static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
3472{
3473 struct nfs_inode *nfsi = NFS_I(inode);
3474
3475 spin_lock(&inode->i_lock);
3476 kfree(nfsi->nfs4_acl);
3477 nfsi->nfs4_acl = acl;
3478 spin_unlock(&inode->i_lock);
3479}
3480
3481static void nfs4_zap_acl_attr(struct inode *inode)
3482{
3483 nfs4_set_cached_acl(inode, NULL);
3484}
3485
3486static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
3487{
3488 struct nfs_inode *nfsi = NFS_I(inode);
3489 struct nfs4_cached_acl *acl;
3490 int ret = -ENOENT;
3491
3492 spin_lock(&inode->i_lock);
3493 acl = nfsi->nfs4_acl;
3494 if (acl == NULL)
3495 goto out;
3496 if (buf == NULL) /* user is just asking for length */
3497 goto out_len;
3498 if (acl->cached == 0)
3499 goto out;
3500 ret = -ERANGE; /* see getxattr(2) man page */
3501 if (acl->len > buflen)
3502 goto out;
3503 memcpy(buf, acl->data, acl->len);
3504out_len:
3505 ret = acl->len;
3506out:
3507 spin_unlock(&inode->i_lock);
3508 return ret;
3509}
3510
3511static void nfs4_write_cached_acl(struct inode *inode, const char *buf, size_t acl_len)
3512{
3513 struct nfs4_cached_acl *acl;
3514
3515 if (buf && acl_len <= PAGE_SIZE) {
3516 acl = kmalloc(sizeof(*acl) + acl_len, GFP_KERNEL);
3517 if (acl == NULL)
3518 goto out;
3519 acl->cached = 1;
3520 memcpy(acl->data, buf, acl_len);
3521 } else {
3522 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
3523 if (acl == NULL)
3524 goto out;
3525 acl->cached = 0;
3526 }
3527 acl->len = acl_len;
3528out:
3529 nfs4_set_cached_acl(inode, acl);
3530}
3531
16b4289c 3532static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
aa1870af 3533{
aa1870af
BF
3534 struct page *pages[NFS4ACL_MAXPAGES];
3535 struct nfs_getaclargs args = {
3536 .fh = NFS_FH(inode),
3537 .acl_pages = pages,
3538 .acl_len = buflen,
3539 };
663c79b3
BH
3540 struct nfs_getaclres res = {
3541 .acl_len = buflen,
3542 };
e50a1c2e 3543 void *resp_buf;
aa1870af
BF
3544 struct rpc_message msg = {
3545 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
3546 .rpc_argp = &args,
663c79b3 3547 .rpc_resp = &res,
aa1870af 3548 };
e50a1c2e 3549 struct page *localpage = NULL;
aa1870af
BF
3550 int ret;
3551
e50a1c2e
BF
3552 if (buflen < PAGE_SIZE) {
3553 /* As long as we're doing a round trip to the server anyway,
3554 * let's be prepared for a page of acl data. */
3555 localpage = alloc_page(GFP_KERNEL);
3556 resp_buf = page_address(localpage);
3557 if (localpage == NULL)
3558 return -ENOMEM;
3559 args.acl_pages[0] = localpage;
3560 args.acl_pgbase = 0;
663c79b3 3561 args.acl_len = PAGE_SIZE;
e50a1c2e
BF
3562 } else {
3563 resp_buf = buf;
3564 buf_to_pages(buf, buflen, args.acl_pages, &args.acl_pgbase);
3565 }
7c513058 3566 ret = nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode), &msg, &args.seq_args, &res.seq_res, 0);
e50a1c2e
BF
3567 if (ret)
3568 goto out_free;
663c79b3
BH
3569 if (res.acl_len > args.acl_len)
3570 nfs4_write_cached_acl(inode, NULL, res.acl_len);
e50a1c2e 3571 else
663c79b3 3572 nfs4_write_cached_acl(inode, resp_buf, res.acl_len);
e50a1c2e
BF
3573 if (buf) {
3574 ret = -ERANGE;
663c79b3 3575 if (res.acl_len > buflen)
e50a1c2e
BF
3576 goto out_free;
3577 if (localpage)
663c79b3 3578 memcpy(buf, resp_buf, res.acl_len);
e50a1c2e 3579 }
663c79b3 3580 ret = res.acl_len;
e50a1c2e
BF
3581out_free:
3582 if (localpage)
3583 __free_page(localpage);
aa1870af
BF
3584 return ret;
3585}
3586
16b4289c
TM
3587static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
3588{
3589 struct nfs4_exception exception = { };
3590 ssize_t ret;
3591 do {
3592 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
3593 if (ret >= 0)
3594 break;
3595 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
3596 } while (exception.retry);
3597 return ret;
3598}
3599
e50a1c2e
BF
3600static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
3601{
3602 struct nfs_server *server = NFS_SERVER(inode);
3603 int ret;
3604
3605 if (!nfs4_server_supports_acls(server))
3606 return -EOPNOTSUPP;
3607 ret = nfs_revalidate_inode(server, inode);
3608 if (ret < 0)
3609 return ret;
08a22b39
AK
3610 if (NFS_I(inode)->cache_validity & NFS_INO_INVALID_ACL)
3611 nfs_zap_acl_cache(inode);
e50a1c2e
BF
3612 ret = nfs4_read_cached_acl(inode, buf, buflen);
3613 if (ret != -ENOENT)
3614 return ret;
3615 return nfs4_get_acl_uncached(inode, buf, buflen);
3616}
3617
16b4289c 3618static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4b580ee3
BF
3619{
3620 struct nfs_server *server = NFS_SERVER(inode);
3621 struct page *pages[NFS4ACL_MAXPAGES];
3622 struct nfs_setaclargs arg = {
3623 .fh = NFS_FH(inode),
3624 .acl_pages = pages,
3625 .acl_len = buflen,
3626 };
73c403a9 3627 struct nfs_setaclres res;
4b580ee3
BF
3628 struct rpc_message msg = {
3629 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
3630 .rpc_argp = &arg,
73c403a9 3631 .rpc_resp = &res,
4b580ee3 3632 };
e9e3d724 3633 int ret, i;
4b580ee3
BF
3634
3635 if (!nfs4_server_supports_acls(server))
3636 return -EOPNOTSUPP;
e9e3d724
NH
3637 i = buf_to_pages_noslab(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
3638 if (i < 0)
3639 return i;
642ac549 3640 nfs_inode_return_delegation(inode);
7c513058 3641 ret = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
e9e3d724
NH
3642
3643 /*
3644 * Free each page after tx, so the only ref left is
3645 * held by the network stack
3646 */
3647 for (; i > 0; i--)
3648 put_page(pages[i-1]);
3649
08a22b39
AK
3650 /*
3651 * Acl update can result in inode attribute update.
3652 * so mark the attribute cache invalid.
3653 */
3654 spin_lock(&inode->i_lock);
3655 NFS_I(inode)->cache_validity |= NFS_INO_INVALID_ATTR;
3656 spin_unlock(&inode->i_lock);
f41f7418
TM
3657 nfs_access_zap_cache(inode);
3658 nfs_zap_acl_cache(inode);
4b580ee3
BF
3659 return ret;
3660}
3661
16b4289c
TM
3662static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
3663{
3664 struct nfs4_exception exception = { };
3665 int err;
3666 do {
3667 err = nfs4_handle_exception(NFS_SERVER(inode),
3668 __nfs4_proc_set_acl(inode, buf, buflen),
3669 &exception);
3670 } while (exception.retry);
3671 return err;
3672}
3673
1da177e4 3674static int
aa5190d0 3675nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state)
1da177e4 3676{
aa5190d0
TM
3677 struct nfs_client *clp = server->nfs_client;
3678
3679 if (task->tk_status >= 0)
1da177e4
LT
3680 return 0;
3681 switch(task->tk_status) {
9e33bed5
TM
3682 case -NFS4ERR_ADMIN_REVOKED:
3683 case -NFS4ERR_BAD_STATEID:
3684 case -NFS4ERR_OPENMODE:
3685 if (state == NULL)
3686 break;
0400a6b0
TM
3687 nfs4_schedule_stateid_recovery(server, state);
3688 goto wait_on_recovery;
0ced63d1
TM
3689 case -NFS4ERR_EXPIRED:
3690 if (state != NULL)
3691 nfs4_schedule_stateid_recovery(server, state);
1da177e4 3692 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 3693 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
3694 nfs4_schedule_lease_recovery(clp);
3695 goto wait_on_recovery;
4745e315
AA
3696#if defined(CONFIG_NFS_V4_1)
3697 case -NFS4ERR_BADSESSION:
3698 case -NFS4ERR_BADSLOT:
3699 case -NFS4ERR_BAD_HIGH_SLOT:
3700 case -NFS4ERR_DEADSESSION:
3701 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
3702 case -NFS4ERR_SEQ_FALSE_RETRY:
3703 case -NFS4ERR_SEQ_MISORDERED:
3704 dprintk("%s ERROR %d, Reset session\n", __func__,
3705 task->tk_status);
0400a6b0 3706 nfs4_schedule_session_recovery(clp->cl_session);
4745e315
AA
3707 task->tk_status = 0;
3708 return -EAGAIN;
3709#endif /* CONFIG_NFS_V4_1 */
1da177e4 3710 case -NFS4ERR_DELAY:
aa5190d0 3711 nfs_inc_server_stats(server, NFSIOS_DELAY);
006ea73e 3712 case -NFS4ERR_GRACE:
2c643488 3713 case -EKEYEXPIRED:
1da177e4
LT
3714 rpc_delay(task, NFS4_POLL_RETRY_MAX);
3715 task->tk_status = 0;
3716 return -EAGAIN;
a8a4ae3a 3717 case -NFS4ERR_RETRY_UNCACHED_REP:
1da177e4
LT
3718 case -NFS4ERR_OLD_STATEID:
3719 task->tk_status = 0;
3720 return -EAGAIN;
3721 }
3722 task->tk_status = nfs4_map_errors(task->tk_status);
3723 return 0;
0400a6b0 3724wait_on_recovery:
a2c0b9e2 3725 rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL);
a2c0b9e2
TM
3726 if (test_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) == 0)
3727 rpc_wake_up_queued_task(&clp->cl_rpcwaitq, task);
3728 task->tk_status = 0;
3729 return -EAGAIN;
1da177e4
LT
3730}
3731
bb8b27e5
TM
3732int nfs4_proc_setclientid(struct nfs_client *clp, u32 program,
3733 unsigned short port, struct rpc_cred *cred,
3734 struct nfs4_setclientid_res *res)
1da177e4
LT
3735{
3736 nfs4_verifier sc_verifier;
3737 struct nfs4_setclientid setclientid = {
3738 .sc_verifier = &sc_verifier,
3739 .sc_prog = program,
f4eecd5d 3740 .sc_cb_ident = clp->cl_cb_ident,
1da177e4
LT
3741 };
3742 struct rpc_message msg = {
3743 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
3744 .rpc_argp = &setclientid,
bb8b27e5 3745 .rpc_resp = res,
286d7d6a 3746 .rpc_cred = cred,
1da177e4 3747 };
bc4785cd 3748 __be32 *p;
1da177e4
LT
3749 int loop = 0;
3750 int status;
3751
bc4785cd 3752 p = (__be32*)sc_verifier.data;
1da177e4
LT
3753 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
3754 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
3755
3756 for(;;) {
3757 setclientid.sc_name_len = scnprintf(setclientid.sc_name,
69dd716c 3758 sizeof(setclientid.sc_name), "%s/%s %s %s %u",
d4d3c507
CL
3759 clp->cl_ipaddr,
3760 rpc_peeraddr2str(clp->cl_rpcclient,
3761 RPC_DISPLAY_ADDR),
69dd716c
TM
3762 rpc_peeraddr2str(clp->cl_rpcclient,
3763 RPC_DISPLAY_PROTO),
78ea323b 3764 clp->cl_rpcclient->cl_auth->au_ops->au_name,
1da177e4
LT
3765 clp->cl_id_uniquifier);
3766 setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
d4d3c507
CL
3767 sizeof(setclientid.sc_netid),
3768 rpc_peeraddr2str(clp->cl_rpcclient,
3769 RPC_DISPLAY_NETID));
1da177e4 3770 setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
d4d3c507 3771 sizeof(setclientid.sc_uaddr), "%s.%u.%u",
1da177e4
LT
3772 clp->cl_ipaddr, port >> 8, port & 255);
3773
1bd714f2 3774 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
1da177e4
LT
3775 if (status != -NFS4ERR_CLID_INUSE)
3776 break;
fd954ae1
TM
3777 if (loop != 0) {
3778 ++clp->cl_id_uniquifier;
1da177e4 3779 break;
fd954ae1
TM
3780 }
3781 ++loop;
3782 ssleep(clp->cl_lease_time / HZ + 1);
1da177e4
LT
3783 }
3784 return status;
3785}
3786
fd954ae1 3787int nfs4_proc_setclientid_confirm(struct nfs_client *clp,
bb8b27e5
TM
3788 struct nfs4_setclientid_res *arg,
3789 struct rpc_cred *cred)
1da177e4
LT
3790{
3791 struct nfs_fsinfo fsinfo;
3792 struct rpc_message msg = {
3793 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
bb8b27e5 3794 .rpc_argp = arg,
1da177e4 3795 .rpc_resp = &fsinfo,
286d7d6a 3796 .rpc_cred = cred,
1da177e4
LT
3797 };
3798 unsigned long now;
3799 int status;
3800
3801 now = jiffies;
1bd714f2 3802 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
1da177e4
LT
3803 if (status == 0) {
3804 spin_lock(&clp->cl_lock);
3805 clp->cl_lease_time = fsinfo.lease_time * HZ;
3806 clp->cl_last_renewal = now;
3807 spin_unlock(&clp->cl_lock);
3808 }
3809 return status;
3810}
3811
fe650407
TM
3812struct nfs4_delegreturndata {
3813 struct nfs4_delegreturnargs args;
fa178f29 3814 struct nfs4_delegreturnres res;
fe650407
TM
3815 struct nfs_fh fh;
3816 nfs4_stateid stateid;
26e976a8 3817 unsigned long timestamp;
fa178f29 3818 struct nfs_fattr fattr;
fe650407
TM
3819 int rpc_status;
3820};
3821
fe650407
TM
3822static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
3823{
3824 struct nfs4_delegreturndata *data = calldata;
938e1010 3825
14516c3a
TM
3826 if (!nfs4_sequence_done(task, &data->res.seq_res))
3827 return;
938e1010 3828
79708861
RL
3829 switch (task->tk_status) {
3830 case -NFS4ERR_STALE_STATEID:
3831 case -NFS4ERR_EXPIRED:
3832 case 0:
fa178f29 3833 renew_lease(data->res.server, data->timestamp);
79708861
RL
3834 break;
3835 default:
3836 if (nfs4_async_handle_error(task, data->res.server, NULL) ==
3837 -EAGAIN) {
3838 nfs_restart_rpc(task, data->res.server->nfs_client);
3839 return;
3840 }
3841 }
3842 data->rpc_status = task->tk_status;
fe650407
TM
3843}
3844
3845static void nfs4_delegreturn_release(void *calldata)
3846{
fe650407
TM
3847 kfree(calldata);
3848}
3849
938e1010
AA
3850#if defined(CONFIG_NFS_V4_1)
3851static void nfs4_delegreturn_prepare(struct rpc_task *task, void *data)
3852{
3853 struct nfs4_delegreturndata *d_data;
3854
3855 d_data = (struct nfs4_delegreturndata *)data;
3856
035168ab 3857 if (nfs4_setup_sequence(d_data->res.server,
938e1010
AA
3858 &d_data->args.seq_args,
3859 &d_data->res.seq_res, 1, task))
3860 return;
3861 rpc_call_start(task);
3862}
3863#endif /* CONFIG_NFS_V4_1 */
3864
c8d149f3 3865static const struct rpc_call_ops nfs4_delegreturn_ops = {
938e1010
AA
3866#if defined(CONFIG_NFS_V4_1)
3867 .rpc_call_prepare = nfs4_delegreturn_prepare,
3868#endif /* CONFIG_NFS_V4_1 */
fe650407
TM
3869 .rpc_call_done = nfs4_delegreturn_done,
3870 .rpc_release = nfs4_delegreturn_release,
3871};
3872
e6f81075 3873static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
fe650407
TM
3874{
3875 struct nfs4_delegreturndata *data;
fa178f29 3876 struct nfs_server *server = NFS_SERVER(inode);
fe650407 3877 struct rpc_task *task;
5138fde0
TM
3878 struct rpc_message msg = {
3879 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
3880 .rpc_cred = cred,
3881 };
c970aa85
TM
3882 struct rpc_task_setup task_setup_data = {
3883 .rpc_client = server->client,
5138fde0 3884 .rpc_message = &msg,
c970aa85
TM
3885 .callback_ops = &nfs4_delegreturn_ops,
3886 .flags = RPC_TASK_ASYNC,
3887 };
e6f81075 3888 int status = 0;
fe650407 3889
8535b2be 3890 data = kzalloc(sizeof(*data), GFP_NOFS);
fe650407
TM
3891 if (data == NULL)
3892 return -ENOMEM;
3893 data->args.fhandle = &data->fh;
3894 data->args.stateid = &data->stateid;
fa178f29 3895 data->args.bitmask = server->attr_bitmask;
fe650407
TM
3896 nfs_copy_fh(&data->fh, NFS_FH(inode));
3897 memcpy(&data->stateid, stateid, sizeof(data->stateid));
fa178f29
TM
3898 data->res.fattr = &data->fattr;
3899 data->res.server = server;
5138fde0 3900 nfs_fattr_init(data->res.fattr);
26e976a8 3901 data->timestamp = jiffies;
fe650407
TM
3902 data->rpc_status = 0;
3903
c970aa85 3904 task_setup_data.callback_data = data;
1174dd1f
TM
3905 msg.rpc_argp = &data->args;
3906 msg.rpc_resp = &data->res;
c970aa85 3907 task = rpc_run_task(&task_setup_data);
7a1218a2 3908 if (IS_ERR(task))
fe650407 3909 return PTR_ERR(task);
e6f81075
TM
3910 if (!issync)
3911 goto out;
fe650407 3912 status = nfs4_wait_for_completion_rpc_task(task);
e6f81075
TM
3913 if (status != 0)
3914 goto out;
3915 status = data->rpc_status;
3916 if (status != 0)
3917 goto out;
3918 nfs_refresh_inode(inode, &data->fattr);
3919out:
e6b3c4db 3920 rpc_put_task(task);
fe650407 3921 return status;
1da177e4
LT
3922}
3923
e6f81075 3924int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
1da177e4
LT
3925{
3926 struct nfs_server *server = NFS_SERVER(inode);
3927 struct nfs4_exception exception = { };
3928 int err;
3929 do {
e6f81075 3930 err = _nfs4_proc_delegreturn(inode, cred, stateid, issync);
1da177e4
LT
3931 switch (err) {
3932 case -NFS4ERR_STALE_STATEID:
3933 case -NFS4ERR_EXPIRED:
1da177e4
LT
3934 case 0:
3935 return 0;
3936 }
3937 err = nfs4_handle_exception(server, err, &exception);
3938 } while (exception.retry);
3939 return err;
3940}
3941
3942#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
3943#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
3944
3945/*
3946 * sleep, with exponential backoff, and retry the LOCK operation.
3947 */
3948static unsigned long
3949nfs4_set_lock_task_retry(unsigned long timeout)
3950{
150030b7 3951 schedule_timeout_killable(timeout);
1da177e4
LT
3952 timeout <<= 1;
3953 if (timeout > NFS4_LOCK_MAXTIMEOUT)
3954 return NFS4_LOCK_MAXTIMEOUT;
3955 return timeout;
3956}
3957
1da177e4
LT
3958static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3959{
3960 struct inode *inode = state->inode;
3961 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 3962 struct nfs_client *clp = server->nfs_client;
911d1aaf 3963 struct nfs_lockt_args arg = {
1da177e4 3964 .fh = NFS_FH(inode),
911d1aaf 3965 .fl = request,
1da177e4 3966 };
911d1aaf
TM
3967 struct nfs_lockt_res res = {
3968 .denied = request,
1da177e4
LT
3969 };
3970 struct rpc_message msg = {
3971 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
3972 .rpc_argp = &arg,
3973 .rpc_resp = &res,
3974 .rpc_cred = state->owner->so_cred,
3975 };
1da177e4
LT
3976 struct nfs4_lock_state *lsp;
3977 int status;
3978
911d1aaf 3979 arg.lock_owner.clientid = clp->cl_clientid;
8d0a8a9d
TM
3980 status = nfs4_set_lock_state(state, request);
3981 if (status != 0)
3982 goto out;
3983 lsp = request->fl_u.nfs4_fl.owner;
9f958ab8 3984 arg.lock_owner.id = lsp->ls_id.id;
d035c36c 3985 arg.lock_owner.s_dev = server->s_dev;
7c513058 3986 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
911d1aaf
TM
3987 switch (status) {
3988 case 0:
3989 request->fl_type = F_UNLCK;
3990 break;
3991 case -NFS4ERR_DENIED:
3992 status = 0;
1da177e4 3993 }
70cc6487 3994 request->fl_ops->fl_release_private(request);
8d0a8a9d 3995out:
1da177e4
LT
3996 return status;
3997}
3998
3999static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4000{
4001 struct nfs4_exception exception = { };
4002 int err;
4003
4004 do {
4005 err = nfs4_handle_exception(NFS_SERVER(state->inode),
4006 _nfs4_proc_getlk(state, cmd, request),
4007 &exception);
4008 } while (exception.retry);
4009 return err;
4010}
4011
4012static int do_vfs_lock(struct file *file, struct file_lock *fl)
4013{
4014 int res = 0;
4015 switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
4016 case FL_POSIX:
4017 res = posix_lock_file_wait(file, fl);
4018 break;
4019 case FL_FLOCK:
4020 res = flock_lock_file_wait(file, fl);
4021 break;
4022 default:
4023 BUG();
4024 }
1da177e4
LT
4025 return res;
4026}
4027
faf5f49c 4028struct nfs4_unlockdata {
911d1aaf
TM
4029 struct nfs_locku_args arg;
4030 struct nfs_locku_res res;
faf5f49c
TM
4031 struct nfs4_lock_state *lsp;
4032 struct nfs_open_context *ctx;
911d1aaf
TM
4033 struct file_lock fl;
4034 const struct nfs_server *server;
26e976a8 4035 unsigned long timestamp;
faf5f49c
TM
4036};
4037
911d1aaf
TM
4038static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
4039 struct nfs_open_context *ctx,
4040 struct nfs4_lock_state *lsp,
4041 struct nfs_seqid *seqid)
4042{
4043 struct nfs4_unlockdata *p;
4044 struct inode *inode = lsp->ls_state->inode;
4045
8535b2be 4046 p = kzalloc(sizeof(*p), GFP_NOFS);
911d1aaf
TM
4047 if (p == NULL)
4048 return NULL;
4049 p->arg.fh = NFS_FH(inode);
4050 p->arg.fl = &p->fl;
4051 p->arg.seqid = seqid;
c1d51931 4052 p->res.seqid = seqid;
911d1aaf
TM
4053 p->arg.stateid = &lsp->ls_stateid;
4054 p->lsp = lsp;
4055 atomic_inc(&lsp->ls_count);
4056 /* Ensure we don't close file until we're done freeing locks! */
4057 p->ctx = get_nfs_open_context(ctx);
4058 memcpy(&p->fl, fl, sizeof(p->fl));
4059 p->server = NFS_SERVER(inode);
4060 return p;
4061}
4062
06f814a3 4063static void nfs4_locku_release_calldata(void *data)
faf5f49c 4064{
963d8fe5 4065 struct nfs4_unlockdata *calldata = data;
911d1aaf 4066 nfs_free_seqid(calldata->arg.seqid);
06f814a3
TM
4067 nfs4_put_lock_state(calldata->lsp);
4068 put_nfs_open_context(calldata->ctx);
4069 kfree(calldata);
faf5f49c
TM
4070}
4071
963d8fe5 4072static void nfs4_locku_done(struct rpc_task *task, void *data)
faf5f49c 4073{
963d8fe5 4074 struct nfs4_unlockdata *calldata = data;
faf5f49c 4075
14516c3a
TM
4076 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
4077 return;
faf5f49c
TM
4078 switch (task->tk_status) {
4079 case 0:
4080 memcpy(calldata->lsp->ls_stateid.data,
911d1aaf 4081 calldata->res.stateid.data,
faf5f49c 4082 sizeof(calldata->lsp->ls_stateid.data));
26e976a8 4083 renew_lease(calldata->server, calldata->timestamp);
faf5f49c 4084 break;
9e33bed5
TM
4085 case -NFS4ERR_BAD_STATEID:
4086 case -NFS4ERR_OLD_STATEID:
faf5f49c
TM
4087 case -NFS4ERR_STALE_STATEID:
4088 case -NFS4ERR_EXPIRED:
faf5f49c
TM
4089 break;
4090 default:
9e33bed5 4091 if (nfs4_async_handle_error(task, calldata->server, NULL) == -EAGAIN)
0110ee15 4092 nfs_restart_rpc(task,
d61e612a 4093 calldata->server->nfs_client);
faf5f49c 4094 }
faf5f49c
TM
4095}
4096
4ce70ada 4097static void nfs4_locku_prepare(struct rpc_task *task, void *data)
faf5f49c 4098{
4ce70ada 4099 struct nfs4_unlockdata *calldata = data;
faf5f49c 4100
911d1aaf 4101 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
faf5f49c
TM
4102 return;
4103 if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) {
963d8fe5
TM
4104 /* Note: exit _without_ running nfs4_locku_done */
4105 task->tk_action = NULL;
faf5f49c
TM
4106 return;
4107 }
26e976a8 4108 calldata->timestamp = jiffies;
035168ab 4109 if (nfs4_setup_sequence(calldata->server,
a893693c
AA
4110 &calldata->arg.seq_args,
4111 &calldata->res.seq_res, 1, task))
4112 return;
5138fde0 4113 rpc_call_start(task);
faf5f49c
TM
4114}
4115
963d8fe5 4116static const struct rpc_call_ops nfs4_locku_ops = {
4ce70ada 4117 .rpc_call_prepare = nfs4_locku_prepare,
963d8fe5 4118 .rpc_call_done = nfs4_locku_done,
06f814a3 4119 .rpc_release = nfs4_locku_release_calldata,
963d8fe5
TM
4120};
4121
a5d16a4d
TM
4122static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
4123 struct nfs_open_context *ctx,
4124 struct nfs4_lock_state *lsp,
4125 struct nfs_seqid *seqid)
4126{
4127 struct nfs4_unlockdata *data;
5138fde0
TM
4128 struct rpc_message msg = {
4129 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
4130 .rpc_cred = ctx->cred,
4131 };
c970aa85
TM
4132 struct rpc_task_setup task_setup_data = {
4133 .rpc_client = NFS_CLIENT(lsp->ls_state->inode),
5138fde0 4134 .rpc_message = &msg,
c970aa85 4135 .callback_ops = &nfs4_locku_ops,
101070ca 4136 .workqueue = nfsiod_workqueue,
c970aa85
TM
4137 .flags = RPC_TASK_ASYNC,
4138 };
a5d16a4d 4139
137d6aca
FF
4140 /* Ensure this is an unlock - when canceling a lock, the
4141 * canceled lock is passed in, and it won't be an unlock.
4142 */
4143 fl->fl_type = F_UNLCK;
4144
a5d16a4d
TM
4145 data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
4146 if (data == NULL) {
4147 nfs_free_seqid(seqid);
4148 return ERR_PTR(-ENOMEM);
4149 }
4150
1174dd1f
TM
4151 msg.rpc_argp = &data->arg;
4152 msg.rpc_resp = &data->res;
c970aa85
TM
4153 task_setup_data.callback_data = data;
4154 return rpc_run_task(&task_setup_data);
a5d16a4d
TM
4155}
4156
faf5f49c
TM
4157static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
4158{
19e03c57 4159 struct nfs_inode *nfsi = NFS_I(state->inode);
911d1aaf 4160 struct nfs_seqid *seqid;
1da177e4 4161 struct nfs4_lock_state *lsp;
06f814a3
TM
4162 struct rpc_task *task;
4163 int status = 0;
536ff0f8 4164 unsigned char fl_flags = request->fl_flags;
faf5f49c 4165
8d0a8a9d 4166 status = nfs4_set_lock_state(state, request);
9b073574
TM
4167 /* Unlock _before_ we do the RPC call */
4168 request->fl_flags |= FL_EXISTS;
19e03c57
TM
4169 down_read(&nfsi->rwsem);
4170 if (do_vfs_lock(request->fl_file, request) == -ENOENT) {
4171 up_read(&nfsi->rwsem);
9b073574 4172 goto out;
19e03c57
TM
4173 }
4174 up_read(&nfsi->rwsem);
8d0a8a9d 4175 if (status != 0)
9b073574
TM
4176 goto out;
4177 /* Is this a delegated lock? */
4178 if (test_bit(NFS_DELEGATED_STATE, &state->flags))
4179 goto out;
8d0a8a9d 4180 lsp = request->fl_u.nfs4_fl.owner;
8535b2be 4181 seqid = nfs_alloc_seqid(&lsp->ls_seqid, GFP_KERNEL);
9b073574 4182 status = -ENOMEM;
911d1aaf 4183 if (seqid == NULL)
9b073574 4184 goto out;
cd3758e3 4185 task = nfs4_do_unlck(request, nfs_file_open_context(request->fl_file), lsp, seqid);
a5d16a4d
TM
4186 status = PTR_ERR(task);
4187 if (IS_ERR(task))
9b073574 4188 goto out;
a5d16a4d 4189 status = nfs4_wait_for_completion_rpc_task(task);
e6b3c4db 4190 rpc_put_task(task);
9b073574 4191out:
536ff0f8 4192 request->fl_flags = fl_flags;
1da177e4
LT
4193 return status;
4194}
4195
a5d16a4d
TM
4196struct nfs4_lockdata {
4197 struct nfs_lock_args arg;
4198 struct nfs_lock_res res;
4199 struct nfs4_lock_state *lsp;
4200 struct nfs_open_context *ctx;
4201 struct file_lock fl;
26e976a8 4202 unsigned long timestamp;
a5d16a4d
TM
4203 int rpc_status;
4204 int cancelled;
66179efe 4205 struct nfs_server *server;
a5d16a4d
TM
4206};
4207
4208static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
8535b2be
TM
4209 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp,
4210 gfp_t gfp_mask)
1da177e4 4211{
a5d16a4d
TM
4212 struct nfs4_lockdata *p;
4213 struct inode *inode = lsp->ls_state->inode;
1da177e4 4214 struct nfs_server *server = NFS_SERVER(inode);
a5d16a4d 4215
8535b2be 4216 p = kzalloc(sizeof(*p), gfp_mask);
a5d16a4d
TM
4217 if (p == NULL)
4218 return NULL;
4219
4220 p->arg.fh = NFS_FH(inode);
4221 p->arg.fl = &p->fl;
8535b2be 4222 p->arg.open_seqid = nfs_alloc_seqid(&lsp->ls_state->owner->so_seqid, gfp_mask);
2f74c0a0
TM
4223 if (p->arg.open_seqid == NULL)
4224 goto out_free;
8535b2be 4225 p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid, gfp_mask);
a5d16a4d 4226 if (p->arg.lock_seqid == NULL)
2f74c0a0 4227 goto out_free_seqid;
a5d16a4d 4228 p->arg.lock_stateid = &lsp->ls_stateid;
7539bbab 4229 p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
9f958ab8 4230 p->arg.lock_owner.id = lsp->ls_id.id;
d035c36c 4231 p->arg.lock_owner.s_dev = server->s_dev;
c1d51931 4232 p->res.lock_seqid = p->arg.lock_seqid;
a5d16a4d 4233 p->lsp = lsp;
66179efe 4234 p->server = server;
a5d16a4d
TM
4235 atomic_inc(&lsp->ls_count);
4236 p->ctx = get_nfs_open_context(ctx);
4237 memcpy(&p->fl, fl, sizeof(p->fl));
4238 return p;
2f74c0a0
TM
4239out_free_seqid:
4240 nfs_free_seqid(p->arg.open_seqid);
a5d16a4d
TM
4241out_free:
4242 kfree(p);
4243 return NULL;
4244}
4245
4246static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
4247{
4248 struct nfs4_lockdata *data = calldata;
4249 struct nfs4_state *state = data->lsp->ls_state;
06735b34 4250
3110ff80 4251 dprintk("%s: begin!\n", __func__);
2f74c0a0
TM
4252 if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
4253 return;
a5d16a4d
TM
4254 /* Do we need to do an open_to_lock_owner? */
4255 if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
e6e21970
TM
4256 if (nfs_wait_on_sequence(data->arg.open_seqid, task) != 0)
4257 return;
a5d16a4d
TM
4258 data->arg.open_stateid = &state->stateid;
4259 data->arg.new_lock_owner = 1;
c1d51931 4260 data->res.open_seqid = data->arg.open_seqid;
2f74c0a0
TM
4261 } else
4262 data->arg.new_lock_owner = 0;
26e976a8 4263 data->timestamp = jiffies;
035168ab
TM
4264 if (nfs4_setup_sequence(data->server,
4265 &data->arg.seq_args,
66179efe
AA
4266 &data->res.seq_res, 1, task))
4267 return;
5138fde0 4268 rpc_call_start(task);
3110ff80 4269 dprintk("%s: done!, ret = %d\n", __func__, data->rpc_status);
a5d16a4d
TM
4270}
4271
b257957e
AB
4272static void nfs4_recover_lock_prepare(struct rpc_task *task, void *calldata)
4273{
4274 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
4275 nfs4_lock_prepare(task, calldata);
4276}
4277
a5d16a4d
TM
4278static void nfs4_lock_done(struct rpc_task *task, void *calldata)
4279{
4280 struct nfs4_lockdata *data = calldata;
4281
3110ff80 4282 dprintk("%s: begin!\n", __func__);
a5d16a4d 4283
14516c3a
TM
4284 if (!nfs4_sequence_done(task, &data->res.seq_res))
4285 return;
66179efe 4286
a5d16a4d 4287 data->rpc_status = task->tk_status;
a5d16a4d 4288 if (data->arg.new_lock_owner != 0) {
a5d16a4d
TM
4289 if (data->rpc_status == 0)
4290 nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
4291 else
4292 goto out;
4293 }
4294 if (data->rpc_status == 0) {
4295 memcpy(data->lsp->ls_stateid.data, data->res.stateid.data,
4296 sizeof(data->lsp->ls_stateid.data));
4297 data->lsp->ls_flags |= NFS_LOCK_INITIALIZED;
88be9f99 4298 renew_lease(NFS_SERVER(data->ctx->path.dentry->d_inode), data->timestamp);
a5d16a4d 4299 }
a5d16a4d 4300out:
3110ff80 4301 dprintk("%s: done, ret = %d!\n", __func__, data->rpc_status);
a5d16a4d
TM
4302}
4303
4304static void nfs4_lock_release(void *calldata)
4305{
4306 struct nfs4_lockdata *data = calldata;
4307
3110ff80 4308 dprintk("%s: begin!\n", __func__);
2f74c0a0 4309 nfs_free_seqid(data->arg.open_seqid);
a5d16a4d
TM
4310 if (data->cancelled != 0) {
4311 struct rpc_task *task;
4312 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
4313 data->arg.lock_seqid);
4314 if (!IS_ERR(task))
bf294b41 4315 rpc_put_task_async(task);
3110ff80 4316 dprintk("%s: cancelling lock!\n", __func__);
a5d16a4d
TM
4317 } else
4318 nfs_free_seqid(data->arg.lock_seqid);
4319 nfs4_put_lock_state(data->lsp);
4320 put_nfs_open_context(data->ctx);
4321 kfree(data);
3110ff80 4322 dprintk("%s: done!\n", __func__);
a5d16a4d
TM
4323}
4324
4325static const struct rpc_call_ops nfs4_lock_ops = {
4326 .rpc_call_prepare = nfs4_lock_prepare,
4327 .rpc_call_done = nfs4_lock_done,
4328 .rpc_release = nfs4_lock_release,
4329};
4330
b257957e
AB
4331static const struct rpc_call_ops nfs4_recover_lock_ops = {
4332 .rpc_call_prepare = nfs4_recover_lock_prepare,
4333 .rpc_call_done = nfs4_lock_done,
4334 .rpc_release = nfs4_lock_release,
4335};
4336
2bee72a6
TM
4337static void nfs4_handle_setlk_error(struct nfs_server *server, struct nfs4_lock_state *lsp, int new_lock_owner, int error)
4338{
2bee72a6
TM
4339 switch (error) {
4340 case -NFS4ERR_ADMIN_REVOKED:
4341 case -NFS4ERR_BAD_STATEID:
ecac799a 4342 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
2bee72a6
TM
4343 if (new_lock_owner != 0 ||
4344 (lsp->ls_flags & NFS_LOCK_INITIALIZED) != 0)
ecac799a 4345 nfs4_schedule_stateid_recovery(server, lsp->ls_state);
a2c0b9e2
TM
4346 break;
4347 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 4348 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
ecac799a
TM
4349 case -NFS4ERR_EXPIRED:
4350 nfs4_schedule_lease_recovery(server->nfs_client);
2bee72a6
TM
4351 };
4352}
4353
afe6c27c 4354static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type)
a5d16a4d
TM
4355{
4356 struct nfs4_lockdata *data;
4357 struct rpc_task *task;
5138fde0
TM
4358 struct rpc_message msg = {
4359 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
4360 .rpc_cred = state->owner->so_cred,
4361 };
c970aa85
TM
4362 struct rpc_task_setup task_setup_data = {
4363 .rpc_client = NFS_CLIENT(state->inode),
5138fde0 4364 .rpc_message = &msg,
c970aa85 4365 .callback_ops = &nfs4_lock_ops,
101070ca 4366 .workqueue = nfsiod_workqueue,
c970aa85
TM
4367 .flags = RPC_TASK_ASYNC,
4368 };
a5d16a4d
TM
4369 int ret;
4370
3110ff80 4371 dprintk("%s: begin!\n", __func__);
cd3758e3 4372 data = nfs4_alloc_lockdata(fl, nfs_file_open_context(fl->fl_file),
8535b2be
TM
4373 fl->fl_u.nfs4_fl.owner,
4374 recovery_type == NFS_LOCK_NEW ? GFP_KERNEL : GFP_NOFS);
a5d16a4d
TM
4375 if (data == NULL)
4376 return -ENOMEM;
4377 if (IS_SETLKW(cmd))
4378 data->arg.block = 1;
b257957e
AB
4379 if (recovery_type > NFS_LOCK_NEW) {
4380 if (recovery_type == NFS_LOCK_RECLAIM)
afe6c27c 4381 data->arg.reclaim = NFS_LOCK_RECLAIM;
b257957e
AB
4382 task_setup_data.callback_ops = &nfs4_recover_lock_ops;
4383 }
1174dd1f
TM
4384 msg.rpc_argp = &data->arg;
4385 msg.rpc_resp = &data->res;
c970aa85
TM
4386 task_setup_data.callback_data = data;
4387 task = rpc_run_task(&task_setup_data);
7a1218a2 4388 if (IS_ERR(task))
a5d16a4d 4389 return PTR_ERR(task);
a5d16a4d
TM
4390 ret = nfs4_wait_for_completion_rpc_task(task);
4391 if (ret == 0) {
4392 ret = data->rpc_status;
2bee72a6
TM
4393 if (ret)
4394 nfs4_handle_setlk_error(data->server, data->lsp,
4395 data->arg.new_lock_owner, ret);
a5d16a4d
TM
4396 } else
4397 data->cancelled = 1;
e6b3c4db 4398 rpc_put_task(task);
3110ff80 4399 dprintk("%s: done, ret = %d!\n", __func__, ret);
a5d16a4d 4400 return ret;
1da177e4
LT
4401}
4402
4403static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
4404{
202b50dc
TM
4405 struct nfs_server *server = NFS_SERVER(state->inode);
4406 struct nfs4_exception exception = { };
4407 int err;
4408
4409 do {
42a2d13e
TM
4410 /* Cache the lock if possible... */
4411 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
4412 return 0;
afe6c27c 4413 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_RECLAIM);
168667c4 4414 if (err != -NFS4ERR_DELAY)
202b50dc
TM
4415 break;
4416 nfs4_handle_exception(server, err, &exception);
4417 } while (exception.retry);
4418 return err;
1da177e4
LT
4419}
4420
4421static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
4422{
202b50dc
TM
4423 struct nfs_server *server = NFS_SERVER(state->inode);
4424 struct nfs4_exception exception = { };
4425 int err;
4426
6bfc93ef
TM
4427 err = nfs4_set_lock_state(state, request);
4428 if (err != 0)
4429 return err;
202b50dc 4430 do {
42a2d13e
TM
4431 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
4432 return 0;
afe6c27c 4433 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_EXPIRED);
a9ed2e25
TM
4434 switch (err) {
4435 default:
4436 goto out;
4437 case -NFS4ERR_GRACE:
4438 case -NFS4ERR_DELAY:
4439 nfs4_handle_exception(server, err, &exception);
4440 err = 0;
4441 }
202b50dc 4442 } while (exception.retry);
a9ed2e25 4443out:
202b50dc 4444 return err;
1da177e4
LT
4445}
4446
4447static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4448{
19e03c57 4449 struct nfs_inode *nfsi = NFS_I(state->inode);
01c3b861 4450 unsigned char fl_flags = request->fl_flags;
8e469ebd 4451 int status = -ENOLCK;
1da177e4 4452
8e469ebd
TM
4453 if ((fl_flags & FL_POSIX) &&
4454 !test_bit(NFS_STATE_POSIX_LOCKS, &state->flags))
4455 goto out;
6bfc93ef 4456 /* Is this a delegated open? */
6bfc93ef
TM
4457 status = nfs4_set_lock_state(state, request);
4458 if (status != 0)
4459 goto out;
01c3b861
TM
4460 request->fl_flags |= FL_ACCESS;
4461 status = do_vfs_lock(request->fl_file, request);
4462 if (status < 0)
4463 goto out;
19e03c57 4464 down_read(&nfsi->rwsem);
01c3b861 4465 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
01c3b861 4466 /* Yes: cache locks! */
01c3b861 4467 /* ...but avoid races with delegation recall... */
19e03c57
TM
4468 request->fl_flags = fl_flags & ~FL_SLEEP;
4469 status = do_vfs_lock(request->fl_file, request);
4470 goto out_unlock;
01c3b861 4471 }
afe6c27c 4472 status = _nfs4_do_setlk(state, cmd, request, NFS_LOCK_NEW);
6bfc93ef 4473 if (status != 0)
01c3b861 4474 goto out_unlock;
6bfc93ef 4475 /* Note: we always want to sleep here! */
01c3b861 4476 request->fl_flags = fl_flags | FL_SLEEP;
6bfc93ef 4477 if (do_vfs_lock(request->fl_file, request) < 0)
3110ff80 4478 printk(KERN_WARNING "%s: VFS is out of sync with lock manager!\n", __func__);
01c3b861 4479out_unlock:
19e03c57 4480 up_read(&nfsi->rwsem);
01c3b861
TM
4481out:
4482 request->fl_flags = fl_flags;
1da177e4
LT
4483 return status;
4484}
4485
4486static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4487{
4488 struct nfs4_exception exception = { };
4489 int err;
4490
4491 do {
965b5d67
TM
4492 err = _nfs4_proc_setlk(state, cmd, request);
4493 if (err == -NFS4ERR_DENIED)
4494 err = -EAGAIN;
1da177e4 4495 err = nfs4_handle_exception(NFS_SERVER(state->inode),
965b5d67 4496 err, &exception);
1da177e4
LT
4497 } while (exception.retry);
4498 return err;
4499}
4500
4501static int
4502nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
4503{
4504 struct nfs_open_context *ctx;
4505 struct nfs4_state *state;
4506 unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
4507 int status;
4508
4509 /* verify open state */
cd3758e3 4510 ctx = nfs_file_open_context(filp);
1da177e4
LT
4511 state = ctx->state;
4512
4513 if (request->fl_start < 0 || request->fl_end < 0)
4514 return -EINVAL;
4515
d953126a
TM
4516 if (IS_GETLK(cmd)) {
4517 if (state != NULL)
4518 return nfs4_proc_getlk(state, F_GETLK, request);
4519 return 0;
4520 }
1da177e4
LT
4521
4522 if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
4523 return -EINVAL;
4524
d953126a
TM
4525 if (request->fl_type == F_UNLCK) {
4526 if (state != NULL)
4527 return nfs4_proc_unlck(state, cmd, request);
4528 return 0;
4529 }
1da177e4 4530
d953126a
TM
4531 if (state == NULL)
4532 return -ENOLCK;
1da177e4
LT
4533 do {
4534 status = nfs4_proc_setlk(state, cmd, request);
4535 if ((status != -EAGAIN) || IS_SETLK(cmd))
4536 break;
4537 timeout = nfs4_set_lock_task_retry(timeout);
4538 status = -ERESTARTSYS;
4539 if (signalled())
4540 break;
4541 } while(status < 0);
1da177e4
LT
4542 return status;
4543}
4544
888e694c
TM
4545int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
4546{
4547 struct nfs_server *server = NFS_SERVER(state->inode);
4548 struct nfs4_exception exception = { };
4549 int err;
4550
4551 err = nfs4_set_lock_state(state, fl);
4552 if (err != 0)
4553 goto out;
4554 do {
afe6c27c 4555 err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW);
d5122201
TM
4556 switch (err) {
4557 default:
4558 printk(KERN_ERR "%s: unhandled error %d.\n",
4559 __func__, err);
4560 case 0:
965b5d67 4561 case -ESTALE:
d5122201
TM
4562 goto out;
4563 case -NFS4ERR_EXPIRED:
0ced63d1 4564 nfs4_schedule_stateid_recovery(server, state);
d5122201 4565 case -NFS4ERR_STALE_CLIENTID:
965b5d67 4566 case -NFS4ERR_STALE_STATEID:
0400a6b0
TM
4567 nfs4_schedule_lease_recovery(server->nfs_client);
4568 goto out;
74e7bb73
RL
4569 case -NFS4ERR_BADSESSION:
4570 case -NFS4ERR_BADSLOT:
4571 case -NFS4ERR_BAD_HIGH_SLOT:
4572 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
4573 case -NFS4ERR_DEADSESSION:
0400a6b0 4574 nfs4_schedule_session_recovery(server->nfs_client->cl_session);
d5122201 4575 goto out;
965b5d67
TM
4576 case -ERESTARTSYS:
4577 /*
4578 * The show must go on: exit, but mark the
4579 * stateid as needing recovery.
4580 */
4581 case -NFS4ERR_ADMIN_REVOKED:
4582 case -NFS4ERR_BAD_STATEID:
4583 case -NFS4ERR_OPENMODE:
0400a6b0 4584 nfs4_schedule_stateid_recovery(server, state);
965b5d67
TM
4585 err = 0;
4586 goto out;
168667c4
TM
4587 case -EKEYEXPIRED:
4588 /*
4589 * User RPCSEC_GSS context has expired.
4590 * We cannot recover this stateid now, so
4591 * skip it and allow recovery thread to
4592 * proceed.
4593 */
4594 err = 0;
4595 goto out;
965b5d67
TM
4596 case -ENOMEM:
4597 case -NFS4ERR_DENIED:
4598 /* kill_proc(fl->fl_pid, SIGLOST, 1); */
4599 err = 0;
4600 goto out;
d5122201
TM
4601 case -NFS4ERR_DELAY:
4602 break;
4603 }
888e694c
TM
4604 err = nfs4_handle_exception(server, err, &exception);
4605 } while (exception.retry);
4606out:
4607 return err;
4608}
6b3b5496 4609
d3c7b7cc
TM
4610static void nfs4_release_lockowner_release(void *calldata)
4611{
4612 kfree(calldata);
4613}
4614
4615const struct rpc_call_ops nfs4_release_lockowner_ops = {
4616 .rpc_release = nfs4_release_lockowner_release,
4617};
4618
4619void nfs4_release_lockowner(const struct nfs4_lock_state *lsp)
4620{
4621 struct nfs_server *server = lsp->ls_state->owner->so_server;
4622 struct nfs_release_lockowner_args *args;
4623 struct rpc_message msg = {
4624 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RELEASE_LOCKOWNER],
4625 };
4626
4627 if (server->nfs_client->cl_mvops->minor_version != 0)
4628 return;
4629 args = kmalloc(sizeof(*args), GFP_NOFS);
4630 if (!args)
4631 return;
4632 args->lock_owner.clientid = server->nfs_client->cl_clientid;
4633 args->lock_owner.id = lsp->ls_id.id;
d035c36c 4634 args->lock_owner.s_dev = server->s_dev;
d3c7b7cc
TM
4635 msg.rpc_argp = args;
4636 rpc_call_async(server->client, &msg, 0, &nfs4_release_lockowner_ops, args);
4637}
4638
aa1870af
BF
4639#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
4640
64c2ce8b
AK
4641static int nfs4_xattr_set_nfs4_acl(struct dentry *dentry, const char *key,
4642 const void *buf, size_t buflen,
4643 int flags, int type)
6b3b5496 4644{
64c2ce8b
AK
4645 if (strcmp(key, "") != 0)
4646 return -EINVAL;
4b580ee3 4647
64c2ce8b 4648 return nfs4_proc_set_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
4649}
4650
64c2ce8b
AK
4651static int nfs4_xattr_get_nfs4_acl(struct dentry *dentry, const char *key,
4652 void *buf, size_t buflen, int type)
6b3b5496 4653{
64c2ce8b
AK
4654 if (strcmp(key, "") != 0)
4655 return -EINVAL;
aa1870af 4656
64c2ce8b 4657 return nfs4_proc_get_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
4658}
4659
64c2ce8b
AK
4660static size_t nfs4_xattr_list_nfs4_acl(struct dentry *dentry, char *list,
4661 size_t list_len, const char *name,
4662 size_t name_len, int type)
6b3b5496 4663{
64c2ce8b 4664 size_t len = sizeof(XATTR_NAME_NFSV4_ACL);
6b3b5496 4665
096455a2
BF
4666 if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
4667 return 0;
64c2ce8b
AK
4668
4669 if (list && len <= list_len)
4670 memcpy(list, XATTR_NAME_NFSV4_ACL, len);
aa1870af 4671 return len;
6b3b5496
BF
4672}
4673
533eb461
AA
4674/*
4675 * nfs_fhget will use either the mounted_on_fileid or the fileid
4676 */
69aaaae1
TM
4677static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr)
4678{
533eb461
AA
4679 if (!(((fattr->valid & NFS_ATTR_FATTR_MOUNTED_ON_FILEID) ||
4680 (fattr->valid & NFS_ATTR_FATTR_FILEID)) &&
4681 (fattr->valid & NFS_ATTR_FATTR_FSID) &&
4682 (fattr->valid & NFS_ATTR_FATTR_V4_REFERRAL)))
69aaaae1
TM
4683 return;
4684
4685 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
4686 NFS_ATTR_FATTR_NLINK;
4687 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
4688 fattr->nlink = 2;
4689}
4690
56659e99 4691int nfs4_proc_fs_locations(struct inode *dir, const struct qstr *name,
7aaa0b3b 4692 struct nfs4_fs_locations *fs_locations, struct page *page)
683b57b4
TM
4693{
4694 struct nfs_server *server = NFS_SERVER(dir);
4695 u32 bitmask[2] = {
361e624f 4696 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
683b57b4
TM
4697 };
4698 struct nfs4_fs_locations_arg args = {
4699 .dir_fh = NFS_FH(dir),
c228fd3a 4700 .name = name,
683b57b4
TM
4701 .page = page,
4702 .bitmask = bitmask,
4703 };
22958463
BH
4704 struct nfs4_fs_locations_res res = {
4705 .fs_locations = fs_locations,
4706 };
683b57b4
TM
4707 struct rpc_message msg = {
4708 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
4709 .rpc_argp = &args,
22958463 4710 .rpc_resp = &res,
683b57b4
TM
4711 };
4712 int status;
4713
3110ff80 4714 dprintk("%s: start\n", __func__);
533eb461
AA
4715
4716 /* Ask for the fileid of the absent filesystem if mounted_on_fileid
4717 * is not supported */
4718 if (NFS_SERVER(dir)->attr_bitmask[1] & FATTR4_WORD1_MOUNTED_ON_FILEID)
4719 bitmask[1] |= FATTR4_WORD1_MOUNTED_ON_FILEID;
4720 else
4721 bitmask[0] |= FATTR4_WORD0_FILEID;
4722
c228fd3a 4723 nfs_fattr_init(&fs_locations->fattr);
683b57b4 4724 fs_locations->server = server;
830b8e33 4725 fs_locations->nlocations = 0;
7c513058 4726 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3110ff80 4727 dprintk("%s: returned status = %d\n", __func__, status);
683b57b4
TM
4728 return status;
4729}
4730
5a5ea0d4
BS
4731static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors)
4732{
4733 int status;
4734 struct nfs4_secinfo_arg args = {
4735 .dir_fh = NFS_FH(dir),
4736 .name = name,
4737 };
4738 struct nfs4_secinfo_res res = {
4739 .flavors = flavors,
4740 };
4741 struct rpc_message msg = {
4742 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO],
4743 .rpc_argp = &args,
4744 .rpc_resp = &res,
4745 };
4746
4747 dprintk("NFS call secinfo %s\n", name->name);
4748 status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
4749 dprintk("NFS reply secinfo: %d\n", status);
4750 return status;
4751}
4752
4753int nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors)
4754{
4755 struct nfs4_exception exception = { };
4756 int err;
4757 do {
4758 err = nfs4_handle_exception(NFS_SERVER(dir),
4759 _nfs4_proc_secinfo(dir, name, flavors),
4760 &exception);
4761 } while (exception.retry);
4762 return err;
4763}
4764
557134a3 4765#ifdef CONFIG_NFS_V4_1
357f54d6
AA
4766/*
4767 * Check the exchange flags returned by the server for invalid flags, having
4768 * both PNFS and NON_PNFS flags set, and not having one of NON_PNFS, PNFS, or
4769 * DS flags set.
4770 */
4771static int nfs4_check_cl_exchange_flags(u32 flags)
4772{
4773 if (flags & ~EXCHGID4_FLAG_MASK_R)
4774 goto out_inval;
4775 if ((flags & EXCHGID4_FLAG_USE_PNFS_MDS) &&
4776 (flags & EXCHGID4_FLAG_USE_NON_PNFS))
4777 goto out_inval;
4778 if (!(flags & (EXCHGID4_FLAG_MASK_PNFS)))
4779 goto out_inval;
4780 return NFS_OK;
4781out_inval:
4782 return -NFS4ERR_INVAL;
4783}
4784
78fe0f41
WAA
4785static bool
4786nfs41_same_server_scope(struct server_scope *a, struct server_scope *b)
4787{
4788 if (a->server_scope_sz == b->server_scope_sz &&
4789 memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
4790 return true;
4791
4792 return false;
4793}
4794
99fe60d0
BH
4795/*
4796 * nfs4_proc_exchange_id()
4797 *
4798 * Since the clientid has expired, all compounds using sessions
4799 * associated with the stale clientid will be returning
4800 * NFS4ERR_BADSESSION in the sequence operation, and will therefore
4801 * be in some phase of session reset.
4802 */
4d643d1d 4803int nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred)
99fe60d0
BH
4804{
4805 nfs4_verifier verifier;
4806 struct nfs41_exchange_id_args args = {
4807 .client = clp,
357f54d6 4808 .flags = EXCHGID4_FLAG_SUPP_MOVED_REFER,
99fe60d0
BH
4809 };
4810 struct nfs41_exchange_id_res res = {
4811 .client = clp,
4812 };
4813 int status;
4814 struct rpc_message msg = {
4815 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_EXCHANGE_ID],
4816 .rpc_argp = &args,
4817 .rpc_resp = &res,
4818 .rpc_cred = cred,
4819 };
4820 __be32 *p;
4821
4822 dprintk("--> %s\n", __func__);
4823 BUG_ON(clp == NULL);
a7b72103 4824
99fe60d0
BH
4825 p = (u32 *)verifier.data;
4826 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
4827 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
4828 args.verifier = &verifier;
4829
c7a360b0
AA
4830 args.id_len = scnprintf(args.id, sizeof(args.id),
4831 "%s/%s.%s/%u",
4832 clp->cl_ipaddr,
4833 init_utsname()->nodename,
4834 init_utsname()->domainname,
4835 clp->cl_rpcclient->cl_auth->au_flavor);
99fe60d0 4836
78fe0f41
WAA
4837 res.server_scope = kzalloc(sizeof(struct server_scope), GFP_KERNEL);
4838 if (unlikely(!res.server_scope))
4839 return -ENOMEM;
4840
1bd714f2 4841 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c7a360b0
AA
4842 if (!status)
4843 status = nfs4_check_cl_exchange_flags(clp->cl_exchange_flags);
78fe0f41
WAA
4844
4845 if (!status) {
4846 if (clp->server_scope &&
4847 !nfs41_same_server_scope(clp->server_scope,
4848 res.server_scope)) {
4849 dprintk("%s: server_scope mismatch detected\n",
4850 __func__);
4851 set_bit(NFS4CLNT_SERVER_SCOPE_MISMATCH, &clp->cl_state);
4852 kfree(clp->server_scope);
4853 clp->server_scope = NULL;
4854 }
4855
4856 if (!clp->server_scope)
4857 clp->server_scope = res.server_scope;
4858 else
4859 kfree(res.server_scope);
4860 }
4861
99fe60d0
BH
4862 dprintk("<-- %s status= %d\n", __func__, status);
4863 return status;
4864}
4865
2050f0cc
AA
4866struct nfs4_get_lease_time_data {
4867 struct nfs4_get_lease_time_args *args;
4868 struct nfs4_get_lease_time_res *res;
4869 struct nfs_client *clp;
4870};
4871
4872static void nfs4_get_lease_time_prepare(struct rpc_task *task,
4873 void *calldata)
4874{
4875 int ret;
4876 struct nfs4_get_lease_time_data *data =
4877 (struct nfs4_get_lease_time_data *)calldata;
4878
4879 dprintk("--> %s\n", __func__);
689cf5c1 4880 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
2050f0cc
AA
4881 /* just setup sequence, do not trigger session recovery
4882 since we're invoked within one */
4883 ret = nfs41_setup_sequence(data->clp->cl_session,
689cf5c1
AB
4884 &data->args->la_seq_args,
4885 &data->res->lr_seq_res, 0, task);
2050f0cc
AA
4886
4887 BUG_ON(ret == -EAGAIN);
4888 rpc_call_start(task);
4889 dprintk("<-- %s\n", __func__);
4890}
4891
4892/*
4893 * Called from nfs4_state_manager thread for session setup, so don't recover
4894 * from sequence operation or clientid errors.
4895 */
4896static void nfs4_get_lease_time_done(struct rpc_task *task, void *calldata)
4897{
4898 struct nfs4_get_lease_time_data *data =
4899 (struct nfs4_get_lease_time_data *)calldata;
4900
4901 dprintk("--> %s\n", __func__);
14516c3a
TM
4902 if (!nfs41_sequence_done(task, &data->res->lr_seq_res))
4903 return;
2050f0cc
AA
4904 switch (task->tk_status) {
4905 case -NFS4ERR_DELAY:
4906 case -NFS4ERR_GRACE:
4907 dprintk("%s Retry: tk_status %d\n", __func__, task->tk_status);
4908 rpc_delay(task, NFS4_POLL_RETRY_MIN);
4909 task->tk_status = 0;
a8a4ae3a
AA
4910 /* fall through */
4911 case -NFS4ERR_RETRY_UNCACHED_REP:
0110ee15 4912 nfs_restart_rpc(task, data->clp);
2050f0cc
AA
4913 return;
4914 }
2050f0cc
AA
4915 dprintk("<-- %s\n", __func__);
4916}
4917
4918struct rpc_call_ops nfs4_get_lease_time_ops = {
4919 .rpc_call_prepare = nfs4_get_lease_time_prepare,
4920 .rpc_call_done = nfs4_get_lease_time_done,
4921};
4922
4923int nfs4_proc_get_lease_time(struct nfs_client *clp, struct nfs_fsinfo *fsinfo)
4924{
4925 struct rpc_task *task;
4926 struct nfs4_get_lease_time_args args;
4927 struct nfs4_get_lease_time_res res = {
4928 .lr_fsinfo = fsinfo,
4929 };
4930 struct nfs4_get_lease_time_data data = {
4931 .args = &args,
4932 .res = &res,
4933 .clp = clp,
4934 };
4935 struct rpc_message msg = {
4936 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GET_LEASE_TIME],
4937 .rpc_argp = &args,
4938 .rpc_resp = &res,
4939 };
4940 struct rpc_task_setup task_setup = {
4941 .rpc_client = clp->cl_rpcclient,
4942 .rpc_message = &msg,
4943 .callback_ops = &nfs4_get_lease_time_ops,
1bd714f2
TM
4944 .callback_data = &data,
4945 .flags = RPC_TASK_TIMEOUT,
2050f0cc
AA
4946 };
4947 int status;
4948
2050f0cc
AA
4949 dprintk("--> %s\n", __func__);
4950 task = rpc_run_task(&task_setup);
4951
4952 if (IS_ERR(task))
4953 status = PTR_ERR(task);
4954 else {
4955 status = task->tk_status;
4956 rpc_put_task(task);
4957 }
4958 dprintk("<-- %s return %d\n", __func__, status);
4959
4960 return status;
4961}
4962
b73dafa7
RL
4963/*
4964 * Reset a slot table
4965 */
104aeba4
AA
4966static int nfs4_reset_slot_table(struct nfs4_slot_table *tbl, u32 max_reqs,
4967 int ivalue)
ac72b7b3 4968{
104aeba4 4969 struct nfs4_slot *new = NULL;
b73dafa7 4970 int i;
ac72b7b3
AA
4971 int ret = 0;
4972
104aeba4
AA
4973 dprintk("--> %s: max_reqs=%u, tbl->max_slots %d\n", __func__,
4974 max_reqs, tbl->max_slots);
ac72b7b3 4975
104aeba4
AA
4976 /* Does the newly negotiated max_reqs match the existing slot table? */
4977 if (max_reqs != tbl->max_slots) {
4978 ret = -ENOMEM;
4979 new = kmalloc(max_reqs * sizeof(struct nfs4_slot),
8535b2be 4980 GFP_NOFS);
104aeba4
AA
4981 if (!new)
4982 goto out;
4983 ret = 0;
4984 kfree(tbl->slots);
ac72b7b3
AA
4985 }
4986 spin_lock(&tbl->slot_tbl_lock);
104aeba4
AA
4987 if (new) {
4988 tbl->slots = new;
4989 tbl->max_slots = max_reqs;
4990 }
4991 for (i = 0; i < tbl->max_slots; ++i)
b73dafa7 4992 tbl->slots[i].seq_nr = ivalue;
ac72b7b3
AA
4993 spin_unlock(&tbl->slot_tbl_lock);
4994 dprintk("%s: tbl=%p slots=%p max_slots=%d\n", __func__,
4995 tbl, tbl->slots, tbl->max_slots);
4996out:
4997 dprintk("<-- %s: return %d\n", __func__, ret);
4998 return ret;
4999}
5000
b73dafa7
RL
5001/*
5002 * Reset the forechannel and backchannel slot tables
5003 */
5004static int nfs4_reset_slot_tables(struct nfs4_session *session)
5005{
5006 int status;
5007
5008 status = nfs4_reset_slot_table(&session->fc_slot_table,
104aeba4 5009 session->fc_attrs.max_reqs, 1);
f8625a6a
RL
5010 if (status)
5011 return status;
5012
5013 status = nfs4_reset_slot_table(&session->bc_slot_table,
104aeba4 5014 session->bc_attrs.max_reqs, 0);
b73dafa7
RL
5015 return status;
5016}
5017
f8625a6a
RL
5018/* Destroy the slot table */
5019static void nfs4_destroy_slot_tables(struct nfs4_session *session)
5020{
5021 if (session->fc_slot_table.slots != NULL) {
5022 kfree(session->fc_slot_table.slots);
5023 session->fc_slot_table.slots = NULL;
5024 }
5025 if (session->bc_slot_table.slots != NULL) {
5026 kfree(session->bc_slot_table.slots);
5027 session->bc_slot_table.slots = NULL;
5028 }
5029 return;
5030}
5031
fc931582
AA
5032/*
5033 * Initialize slot table
5034 */
050047ce
RL
5035static int nfs4_init_slot_table(struct nfs4_slot_table *tbl,
5036 int max_slots, int ivalue)
fc931582 5037{
fc931582
AA
5038 struct nfs4_slot *slot;
5039 int ret = -ENOMEM;
5040
5041 BUG_ON(max_slots > NFS4_MAX_SLOT_TABLE);
5042
050047ce 5043 dprintk("--> %s: max_reqs=%u\n", __func__, max_slots);
fc931582 5044
8535b2be 5045 slot = kcalloc(max_slots, sizeof(struct nfs4_slot), GFP_NOFS);
fc931582
AA
5046 if (!slot)
5047 goto out;
fc931582
AA
5048 ret = 0;
5049
5050 spin_lock(&tbl->slot_tbl_lock);
fc931582
AA
5051 tbl->max_slots = max_slots;
5052 tbl->slots = slot;
5053 tbl->highest_used_slotid = -1; /* no slot is currently used */
5054 spin_unlock(&tbl->slot_tbl_lock);
5055 dprintk("%s: tbl=%p slots=%p max_slots=%d\n", __func__,
5056 tbl, tbl->slots, tbl->max_slots);
5057out:
5058 dprintk("<-- %s: return %d\n", __func__, ret);
5059 return ret;
fc931582
AA
5060}
5061
050047ce
RL
5062/*
5063 * Initialize the forechannel and backchannel tables
5064 */
5065static int nfs4_init_slot_tables(struct nfs4_session *session)
5066{
f26468fb
TM
5067 struct nfs4_slot_table *tbl;
5068 int status = 0;
050047ce 5069
f26468fb
TM
5070 tbl = &session->fc_slot_table;
5071 if (tbl->slots == NULL) {
5072 status = nfs4_init_slot_table(tbl,
5073 session->fc_attrs.max_reqs, 1);
5074 if (status)
5075 return status;
5076 }
050047ce 5077
f26468fb
TM
5078 tbl = &session->bc_slot_table;
5079 if (tbl->slots == NULL) {
5080 status = nfs4_init_slot_table(tbl,
5081 session->bc_attrs.max_reqs, 0);
5082 if (status)
5083 nfs4_destroy_slot_tables(session);
5084 }
f8625a6a
RL
5085
5086 return status;
557134a3
AA
5087}
5088
5089struct nfs4_session *nfs4_alloc_session(struct nfs_client *clp)
5090{
5091 struct nfs4_session *session;
5092 struct nfs4_slot_table *tbl;
5093
8535b2be 5094 session = kzalloc(sizeof(struct nfs4_session), GFP_NOFS);
557134a3
AA
5095 if (!session)
5096 return NULL;
76db6d95 5097
557134a3 5098 tbl = &session->fc_slot_table;
9dfdf404 5099 tbl->highest_used_slotid = -1;
557134a3 5100 spin_lock_init(&tbl->slot_tbl_lock);
689cf5c1 5101 rpc_init_priority_wait_queue(&tbl->slot_tbl_waitq, "ForeChannel Slot table");
42acd021 5102 init_completion(&tbl->complete);
f8625a6a
RL
5103
5104 tbl = &session->bc_slot_table;
9dfdf404 5105 tbl->highest_used_slotid = -1;
f8625a6a
RL
5106 spin_lock_init(&tbl->slot_tbl_lock);
5107 rpc_init_wait_queue(&tbl->slot_tbl_waitq, "BackChannel Slot table");
42acd021 5108 init_completion(&tbl->complete);
f8625a6a 5109
1055d76d
TM
5110 session->session_state = 1<<NFS4_SESSION_INITING;
5111
557134a3
AA
5112 session->clp = clp;
5113 return session;
5114}
5115
5116void nfs4_destroy_session(struct nfs4_session *session)
5117{
5a0ffe54
AA
5118 nfs4_proc_destroy_session(session);
5119 dprintk("%s Destroy backchannel for xprt %p\n",
5120 __func__, session->clp->cl_rpcclient->cl_xprt);
5121 xprt_destroy_backchannel(session->clp->cl_rpcclient->cl_xprt,
5122 NFS41_BC_MIN_CALLBACKS);
f8625a6a 5123 nfs4_destroy_slot_tables(session);
557134a3
AA
5124 kfree(session);
5125}
5126
fc931582
AA
5127/*
5128 * Initialize the values to be used by the client in CREATE_SESSION
5129 * If nfs4_init_session set the fore channel request and response sizes,
5130 * use them.
5131 *
5132 * Set the back channel max_resp_sz_cached to zero to force the client to
5133 * always set csa_cachethis to FALSE because the current implementation
5134 * of the back channel DRC only supports caching the CB_SEQUENCE operation.
5135 */
5136static void nfs4_init_channel_attrs(struct nfs41_create_session_args *args)
5137{
5138 struct nfs4_session *session = args->client->cl_session;
5139 unsigned int mxrqst_sz = session->fc_attrs.max_rqst_sz,
5140 mxresp_sz = session->fc_attrs.max_resp_sz;
5141
5142 if (mxrqst_sz == 0)
5143 mxrqst_sz = NFS_MAX_FILE_IO_SIZE;
5144 if (mxresp_sz == 0)
5145 mxresp_sz = NFS_MAX_FILE_IO_SIZE;
5146 /* Fore channel attributes */
fc931582
AA
5147 args->fc_attrs.max_rqst_sz = mxrqst_sz;
5148 args->fc_attrs.max_resp_sz = mxresp_sz;
fc931582
AA
5149 args->fc_attrs.max_ops = NFS4_MAX_OPS;
5150 args->fc_attrs.max_reqs = session->clp->cl_rpcclient->cl_xprt->max_reqs;
5151
5152 dprintk("%s: Fore Channel : max_rqst_sz=%u max_resp_sz=%u "
8e0d46e1 5153 "max_ops=%u max_reqs=%u\n",
fc931582
AA
5154 __func__,
5155 args->fc_attrs.max_rqst_sz, args->fc_attrs.max_resp_sz,
8e0d46e1 5156 args->fc_attrs.max_ops, args->fc_attrs.max_reqs);
fc931582
AA
5157
5158 /* Back channel attributes */
fc931582
AA
5159 args->bc_attrs.max_rqst_sz = PAGE_SIZE;
5160 args->bc_attrs.max_resp_sz = PAGE_SIZE;
5161 args->bc_attrs.max_resp_sz_cached = 0;
5162 args->bc_attrs.max_ops = NFS4_MAX_BACK_CHANNEL_OPS;
5163 args->bc_attrs.max_reqs = 1;
5164
5165 dprintk("%s: Back Channel : max_rqst_sz=%u max_resp_sz=%u "
5166 "max_resp_sz_cached=%u max_ops=%u max_reqs=%u\n",
5167 __func__,
5168 args->bc_attrs.max_rqst_sz, args->bc_attrs.max_resp_sz,
5169 args->bc_attrs.max_resp_sz_cached, args->bc_attrs.max_ops,
5170 args->bc_attrs.max_reqs);
5171}
5172
43c2e885 5173static int nfs4_verify_fore_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
8d35301d 5174{
43c2e885
BF
5175 struct nfs4_channel_attrs *sent = &args->fc_attrs;
5176 struct nfs4_channel_attrs *rcvd = &session->fc_attrs;
5177
43c2e885
BF
5178 if (rcvd->max_resp_sz > sent->max_resp_sz)
5179 return -EINVAL;
5180 /*
5181 * Our requested max_ops is the minimum we need; we're not
5182 * prepared to break up compounds into smaller pieces than that.
5183 * So, no point even trying to continue if the server won't
5184 * cooperate:
5185 */
5186 if (rcvd->max_ops < sent->max_ops)
5187 return -EINVAL;
5188 if (rcvd->max_reqs == 0)
5189 return -EINVAL;
5190 return 0;
8d35301d
AA
5191}
5192
43c2e885
BF
5193static int nfs4_verify_back_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
5194{
5195 struct nfs4_channel_attrs *sent = &args->bc_attrs;
5196 struct nfs4_channel_attrs *rcvd = &session->bc_attrs;
8d35301d 5197
43c2e885
BF
5198 if (rcvd->max_rqst_sz > sent->max_rqst_sz)
5199 return -EINVAL;
5200 if (rcvd->max_resp_sz < sent->max_resp_sz)
5201 return -EINVAL;
5202 if (rcvd->max_resp_sz_cached > sent->max_resp_sz_cached)
5203 return -EINVAL;
5204 /* These would render the backchannel useless: */
5205 if (rcvd->max_ops == 0)
5206 return -EINVAL;
5207 if (rcvd->max_reqs == 0)
5208 return -EINVAL;
5209 return 0;
5210}
8d35301d 5211
8d35301d
AA
5212static int nfs4_verify_channel_attrs(struct nfs41_create_session_args *args,
5213 struct nfs4_session *session)
5214{
43c2e885 5215 int ret;
8d35301d 5216
43c2e885
BF
5217 ret = nfs4_verify_fore_channel_attrs(args, session);
5218 if (ret)
5219 return ret;
5220 return nfs4_verify_back_channel_attrs(args, session);
8d35301d
AA
5221}
5222
fc931582
AA
5223static int _nfs4_proc_create_session(struct nfs_client *clp)
5224{
5225 struct nfs4_session *session = clp->cl_session;
5226 struct nfs41_create_session_args args = {
5227 .client = clp,
5228 .cb_program = NFS4_CALLBACK,
5229 };
5230 struct nfs41_create_session_res res = {
5231 .client = clp,
5232 };
5233 struct rpc_message msg = {
5234 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE_SESSION],
5235 .rpc_argp = &args,
5236 .rpc_resp = &res,
5237 };
5238 int status;
5239
5240 nfs4_init_channel_attrs(&args);
0f91421e 5241 args.flags = (SESSION4_PERSIST | SESSION4_BACK_CHAN);
fc931582 5242
1bd714f2 5243 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
fc931582 5244
8d35301d
AA
5245 if (!status)
5246 /* Verify the session's negotiated channel_attrs values */
5247 status = nfs4_verify_channel_attrs(&args, session);
fc931582
AA
5248 if (!status) {
5249 /* Increment the clientid slot sequence id */
5250 clp->cl_seqid++;
5251 }
5252
5253 return status;
5254}
5255
5256/*
5257 * Issues a CREATE_SESSION operation to the server.
5258 * It is the responsibility of the caller to verify the session is
5259 * expired before calling this routine.
5260 */
f26468fb 5261int nfs4_proc_create_session(struct nfs_client *clp)
fc931582
AA
5262{
5263 int status;
5264 unsigned *ptr;
fc931582
AA
5265 struct nfs4_session *session = clp->cl_session;
5266
5267 dprintk("--> %s clp=%p session=%p\n", __func__, clp, session);
5268
fd954ae1 5269 status = _nfs4_proc_create_session(clp);
fc931582
AA
5270 if (status)
5271 goto out;
5272
f26468fb
TM
5273 /* Init and reset the fore channel */
5274 status = nfs4_init_slot_tables(session);
5275 dprintk("slot table initialization returned %d\n", status);
5276 if (status)
5277 goto out;
5278 status = nfs4_reset_slot_tables(session);
5279 dprintk("slot table reset returned %d\n", status);
fc931582
AA
5280 if (status)
5281 goto out;
5282
5283 ptr = (unsigned *)&session->sess_id.data[0];
5284 dprintk("%s client>seqid %d sessionid %u:%u:%u:%u\n", __func__,
5285 clp->cl_seqid, ptr[0], ptr[1], ptr[2], ptr[3]);
fc931582
AA
5286out:
5287 dprintk("<-- %s\n", __func__);
5288 return status;
5289}
5290
0f3e66c6
AA
5291/*
5292 * Issue the over-the-wire RPC DESTROY_SESSION.
5293 * The caller must serialize access to this routine.
5294 */
5295int nfs4_proc_destroy_session(struct nfs4_session *session)
5296{
5297 int status = 0;
5298 struct rpc_message msg;
5299
5300 dprintk("--> nfs4_proc_destroy_session\n");
5301
5302 /* session is still being setup */
5303 if (session->clp->cl_cons_state != NFS_CS_READY)
5304 return status;
5305
5306 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_SESSION];
5307 msg.rpc_argp = session;
5308 msg.rpc_resp = NULL;
5309 msg.rpc_cred = NULL;
1bd714f2 5310 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
0f3e66c6
AA
5311
5312 if (status)
5313 printk(KERN_WARNING
5314 "Got error %d from the server on DESTROY_SESSION. "
5315 "Session has been destroyed regardless...\n", status);
5316
5317 dprintk("<-- nfs4_proc_destroy_session\n");
5318 return status;
5319}
5320
fccba804
TM
5321int nfs4_init_session(struct nfs_server *server)
5322{
5323 struct nfs_client *clp = server->nfs_client;
2449ea2e 5324 struct nfs4_session *session;
68bf05ef 5325 unsigned int rsize, wsize;
fccba804
TM
5326 int ret;
5327
5328 if (!nfs4_has_session(clp))
5329 return 0;
5330
1055d76d
TM
5331 session = clp->cl_session;
5332 if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state))
5333 return 0;
5334
68bf05ef
AA
5335 rsize = server->rsize;
5336 if (rsize == 0)
5337 rsize = NFS_MAX_FILE_IO_SIZE;
5338 wsize = server->wsize;
5339 if (wsize == 0)
5340 wsize = NFS_MAX_FILE_IO_SIZE;
5341
68bf05ef
AA
5342 session->fc_attrs.max_rqst_sz = wsize + nfs41_maxwrite_overhead;
5343 session->fc_attrs.max_resp_sz = rsize + nfs41_maxread_overhead;
2449ea2e 5344
fccba804
TM
5345 ret = nfs4_recover_expired_lease(server);
5346 if (!ret)
5347 ret = nfs4_check_client_ready(clp);
5348 return ret;
5349}
5350
d83217c1
AA
5351int nfs4_init_ds_session(struct nfs_client *clp)
5352{
5353 struct nfs4_session *session = clp->cl_session;
5354 int ret;
5355
5356 if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state))
5357 return 0;
5358
5359 ret = nfs4_client_recover_expired_lease(clp);
5360 if (!ret)
5361 /* Test for the DS role */
5362 if (!is_ds_client(clp))
5363 ret = -ENODEV;
5364 if (!ret)
5365 ret = nfs4_check_client_ready(clp);
5366 return ret;
5367
5368}
5369EXPORT_SYMBOL_GPL(nfs4_init_ds_session);
5370
5371
fc01cea9
AA
5372/*
5373 * Renew the cl_session lease.
5374 */
d5f8d3fe
TM
5375struct nfs4_sequence_data {
5376 struct nfs_client *clp;
5377 struct nfs4_sequence_args args;
5378 struct nfs4_sequence_res res;
5379};
5380
dc96aef9
AB
5381static void nfs41_sequence_release(void *data)
5382{
d5f8d3fe
TM
5383 struct nfs4_sequence_data *calldata = data;
5384 struct nfs_client *clp = calldata->clp;
dc96aef9 5385
7135840f
AB
5386 if (atomic_read(&clp->cl_count) > 1)
5387 nfs4_schedule_state_renewal(clp);
5388 nfs_put_client(clp);
d5f8d3fe 5389 kfree(calldata);
dc96aef9
AB
5390}
5391
aa5190d0
TM
5392static int nfs41_sequence_handle_errors(struct rpc_task *task, struct nfs_client *clp)
5393{
5394 switch(task->tk_status) {
5395 case -NFS4ERR_DELAY:
aa5190d0
TM
5396 rpc_delay(task, NFS4_POLL_RETRY_MAX);
5397 return -EAGAIN;
5398 default:
0400a6b0 5399 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
5400 }
5401 return 0;
5402}
5403
dc96aef9 5404static void nfs41_sequence_call_done(struct rpc_task *task, void *data)
fc01cea9 5405{
d5f8d3fe
TM
5406 struct nfs4_sequence_data *calldata = data;
5407 struct nfs_client *clp = calldata->clp;
fc01cea9 5408
14516c3a
TM
5409 if (!nfs41_sequence_done(task, task->tk_msg.rpc_resp))
5410 return;
fc01cea9
AA
5411
5412 if (task->tk_status < 0) {
5413 dprintk("%s ERROR %d\n", __func__, task->tk_status);
7135840f
AB
5414 if (atomic_read(&clp->cl_count) == 1)
5415 goto out;
fc01cea9 5416
aa5190d0
TM
5417 if (nfs41_sequence_handle_errors(task, clp) == -EAGAIN) {
5418 rpc_restart_call_prepare(task);
fc01cea9
AA
5419 return;
5420 }
5421 }
fc01cea9 5422 dprintk("%s rpc_cred %p\n", __func__, task->tk_msg.rpc_cred);
7135840f 5423out:
fc01cea9
AA
5424 dprintk("<-- %s\n", __func__);
5425}
5426
5427static void nfs41_sequence_prepare(struct rpc_task *task, void *data)
5428{
d5f8d3fe
TM
5429 struct nfs4_sequence_data *calldata = data;
5430 struct nfs_client *clp = calldata->clp;
fc01cea9
AA
5431 struct nfs4_sequence_args *args;
5432 struct nfs4_sequence_res *res;
5433
fc01cea9
AA
5434 args = task->tk_msg.rpc_argp;
5435 res = task->tk_msg.rpc_resp;
5436
035168ab 5437 if (nfs41_setup_sequence(clp->cl_session, args, res, 0, task))
fc01cea9
AA
5438 return;
5439 rpc_call_start(task);
5440}
5441
5442static const struct rpc_call_ops nfs41_sequence_ops = {
5443 .rpc_call_done = nfs41_sequence_call_done,
5444 .rpc_call_prepare = nfs41_sequence_prepare,
dc96aef9 5445 .rpc_release = nfs41_sequence_release,
fc01cea9
AA
5446};
5447
71ac6da9 5448static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
fc01cea9 5449{
d5f8d3fe 5450 struct nfs4_sequence_data *calldata;
fc01cea9
AA
5451 struct rpc_message msg = {
5452 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE],
5453 .rpc_cred = cred,
5454 };
71ac6da9
TM
5455 struct rpc_task_setup task_setup_data = {
5456 .rpc_client = clp->cl_rpcclient,
5457 .rpc_message = &msg,
5458 .callback_ops = &nfs41_sequence_ops,
5459 .flags = RPC_TASK_ASYNC | RPC_TASK_SOFT,
5460 };
fc01cea9 5461
7135840f 5462 if (!atomic_inc_not_zero(&clp->cl_count))
71ac6da9 5463 return ERR_PTR(-EIO);
dfb4f309 5464 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
d5f8d3fe 5465 if (calldata == NULL) {
7135840f 5466 nfs_put_client(clp);
71ac6da9 5467 return ERR_PTR(-ENOMEM);
fc01cea9 5468 }
d5f8d3fe
TM
5469 msg.rpc_argp = &calldata->args;
5470 msg.rpc_resp = &calldata->res;
5471 calldata->clp = clp;
71ac6da9 5472 task_setup_data.callback_data = calldata;
fc01cea9 5473
71ac6da9
TM
5474 return rpc_run_task(&task_setup_data);
5475}
5476
5477static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred)
5478{
5479 struct rpc_task *task;
5480 int ret = 0;
5481
5482 task = _nfs41_proc_sequence(clp, cred);
5483 if (IS_ERR(task))
5484 ret = PTR_ERR(task);
5485 else
bf294b41 5486 rpc_put_task_async(task);
71ac6da9
TM
5487 dprintk("<-- %s status=%d\n", __func__, ret);
5488 return ret;
5489}
5490
5491static int nfs4_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
5492{
5493 struct rpc_task *task;
5494 int ret;
5495
5496 task = _nfs41_proc_sequence(clp, cred);
5497 if (IS_ERR(task)) {
5498 ret = PTR_ERR(task);
5499 goto out;
5500 }
5501 ret = rpc_wait_for_completion_task(task);
b4410c2f
TM
5502 if (!ret) {
5503 struct nfs4_sequence_res *res = task->tk_msg.rpc_resp;
5504
5505 if (task->tk_status == 0)
5506 nfs41_handle_sequence_flag_errors(clp, res->sr_status_flags);
71ac6da9 5507 ret = task->tk_status;
b4410c2f 5508 }
71ac6da9
TM
5509 rpc_put_task(task);
5510out:
5511 dprintk("<-- %s status=%d\n", __func__, ret);
5512 return ret;
fc01cea9
AA
5513}
5514
fce5c838
RL
5515struct nfs4_reclaim_complete_data {
5516 struct nfs_client *clp;
5517 struct nfs41_reclaim_complete_args arg;
5518 struct nfs41_reclaim_complete_res res;
5519};
5520
5521static void nfs4_reclaim_complete_prepare(struct rpc_task *task, void *data)
5522{
5523 struct nfs4_reclaim_complete_data *calldata = data;
5524
b257957e 5525 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
035168ab
TM
5526 if (nfs41_setup_sequence(calldata->clp->cl_session,
5527 &calldata->arg.seq_args,
fce5c838
RL
5528 &calldata->res.seq_res, 0, task))
5529 return;
5530
5531 rpc_call_start(task);
5532}
5533
aa5190d0
TM
5534static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp)
5535{
5536 switch(task->tk_status) {
5537 case 0:
5538 case -NFS4ERR_COMPLETE_ALREADY:
5539 case -NFS4ERR_WRONG_CRED: /* What to do here? */
5540 break;
5541 case -NFS4ERR_DELAY:
aa5190d0 5542 rpc_delay(task, NFS4_POLL_RETRY_MAX);
a8a4ae3a
AA
5543 /* fall through */
5544 case -NFS4ERR_RETRY_UNCACHED_REP:
aa5190d0
TM
5545 return -EAGAIN;
5546 default:
0400a6b0 5547 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
5548 }
5549 return 0;
5550}
5551
fce5c838
RL
5552static void nfs4_reclaim_complete_done(struct rpc_task *task, void *data)
5553{
5554 struct nfs4_reclaim_complete_data *calldata = data;
5555 struct nfs_client *clp = calldata->clp;
5556 struct nfs4_sequence_res *res = &calldata->res.seq_res;
5557
5558 dprintk("--> %s\n", __func__);
14516c3a
TM
5559 if (!nfs41_sequence_done(task, res))
5560 return;
fce5c838 5561
aa5190d0
TM
5562 if (nfs41_reclaim_complete_handle_errors(task, clp) == -EAGAIN) {
5563 rpc_restart_call_prepare(task);
5564 return;
5565 }
fce5c838
RL
5566 dprintk("<-- %s\n", __func__);
5567}
5568
5569static void nfs4_free_reclaim_complete_data(void *data)
5570{
5571 struct nfs4_reclaim_complete_data *calldata = data;
5572
5573 kfree(calldata);
5574}
5575
5576static const struct rpc_call_ops nfs4_reclaim_complete_call_ops = {
5577 .rpc_call_prepare = nfs4_reclaim_complete_prepare,
5578 .rpc_call_done = nfs4_reclaim_complete_done,
5579 .rpc_release = nfs4_free_reclaim_complete_data,
5580};
5581
5582/*
5583 * Issue a global reclaim complete.
5584 */
5585static int nfs41_proc_reclaim_complete(struct nfs_client *clp)
5586{
5587 struct nfs4_reclaim_complete_data *calldata;
5588 struct rpc_task *task;
5589 struct rpc_message msg = {
5590 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE],
5591 };
5592 struct rpc_task_setup task_setup_data = {
5593 .rpc_client = clp->cl_rpcclient,
5594 .rpc_message = &msg,
5595 .callback_ops = &nfs4_reclaim_complete_call_ops,
5596 .flags = RPC_TASK_ASYNC,
5597 };
5598 int status = -ENOMEM;
5599
5600 dprintk("--> %s\n", __func__);
8535b2be 5601 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
fce5c838
RL
5602 if (calldata == NULL)
5603 goto out;
5604 calldata->clp = clp;
5605 calldata->arg.one_fs = 0;
fce5c838
RL
5606
5607 msg.rpc_argp = &calldata->arg;
5608 msg.rpc_resp = &calldata->res;
5609 task_setup_data.callback_data = calldata;
5610 task = rpc_run_task(&task_setup_data);
acf82b85 5611 if (IS_ERR(task)) {
fce5c838 5612 status = PTR_ERR(task);
acf82b85
DC
5613 goto out;
5614 }
c34c32ea
AA
5615 status = nfs4_wait_for_completion_rpc_task(task);
5616 if (status == 0)
5617 status = task->tk_status;
fce5c838 5618 rpc_put_task(task);
acf82b85 5619 return 0;
fce5c838
RL
5620out:
5621 dprintk("<-- %s status=%d\n", __func__, status);
5622 return status;
5623}
b1f69b75
AA
5624
5625static void
5626nfs4_layoutget_prepare(struct rpc_task *task, void *calldata)
5627{
5628 struct nfs4_layoutget *lgp = calldata;
c31663d4 5629 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
b1f69b75
AA
5630
5631 dprintk("--> %s\n", __func__);
c31663d4
FI
5632 /* Note the is a race here, where a CB_LAYOUTRECALL can come in
5633 * right now covering the LAYOUTGET we are about to send.
5634 * However, that is not so catastrophic, and there seems
5635 * to be no way to prevent it completely.
5636 */
b1f69b75
AA
5637 if (nfs4_setup_sequence(server, &lgp->args.seq_args,
5638 &lgp->res.seq_res, 0, task))
5639 return;
cf7d63f1
FI
5640 if (pnfs_choose_layoutget_stateid(&lgp->args.stateid,
5641 NFS_I(lgp->args.inode)->layout,
5642 lgp->args.ctx->state)) {
5643 rpc_exit(task, NFS4_OK);
5644 return;
5645 }
b1f69b75
AA
5646 rpc_call_start(task);
5647}
5648
5649static void nfs4_layoutget_done(struct rpc_task *task, void *calldata)
5650{
5651 struct nfs4_layoutget *lgp = calldata;
5652 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
5653
5654 dprintk("--> %s\n", __func__);
5655
5656 if (!nfs4_sequence_done(task, &lgp->res.seq_res))
5657 return;
5658
5659 switch (task->tk_status) {
5660 case 0:
5661 break;
5662 case -NFS4ERR_LAYOUTTRYLATER:
5663 case -NFS4ERR_RECALLCONFLICT:
5664 task->tk_status = -NFS4ERR_DELAY;
5665 /* Fall through */
5666 default:
5667 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
5668 rpc_restart_call_prepare(task);
5669 return;
5670 }
5671 }
b1f69b75
AA
5672 dprintk("<-- %s\n", __func__);
5673}
5674
5675static void nfs4_layoutget_release(void *calldata)
5676{
5677 struct nfs4_layoutget *lgp = calldata;
5678
5679 dprintk("--> %s\n", __func__);
b1f69b75
AA
5680 put_nfs_open_context(lgp->args.ctx);
5681 kfree(calldata);
5682 dprintk("<-- %s\n", __func__);
5683}
5684
5685static const struct rpc_call_ops nfs4_layoutget_call_ops = {
5686 .rpc_call_prepare = nfs4_layoutget_prepare,
5687 .rpc_call_done = nfs4_layoutget_done,
5688 .rpc_release = nfs4_layoutget_release,
5689};
5690
5691int nfs4_proc_layoutget(struct nfs4_layoutget *lgp)
5692{
5693 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
5694 struct rpc_task *task;
5695 struct rpc_message msg = {
5696 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTGET],
5697 .rpc_argp = &lgp->args,
5698 .rpc_resp = &lgp->res,
5699 };
5700 struct rpc_task_setup task_setup_data = {
5701 .rpc_client = server->client,
5702 .rpc_message = &msg,
5703 .callback_ops = &nfs4_layoutget_call_ops,
5704 .callback_data = lgp,
5705 .flags = RPC_TASK_ASYNC,
5706 };
5707 int status = 0;
5708
5709 dprintk("--> %s\n", __func__);
5710
35124a09 5711 lgp->res.layoutp = &lgp->args.layout;
b1f69b75
AA
5712 lgp->res.seq_res.sr_slot = NULL;
5713 task = rpc_run_task(&task_setup_data);
5714 if (IS_ERR(task))
5715 return PTR_ERR(task);
5716 status = nfs4_wait_for_completion_rpc_task(task);
c31663d4
FI
5717 if (status == 0)
5718 status = task->tk_status;
5719 if (status == 0)
5720 status = pnfs_layout_process(lgp);
b1f69b75
AA
5721 rpc_put_task(task);
5722 dprintk("<-- %s status=%d\n", __func__, status);
5723 return status;
5724}
5725
cbe82603
BH
5726static void
5727nfs4_layoutreturn_prepare(struct rpc_task *task, void *calldata)
5728{
5729 struct nfs4_layoutreturn *lrp = calldata;
5730
5731 dprintk("--> %s\n", __func__);
5732 if (nfs41_setup_sequence(lrp->clp->cl_session, &lrp->args.seq_args,
5733 &lrp->res.seq_res, 0, task))
5734 return;
5735 rpc_call_start(task);
5736}
5737
5738static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata)
5739{
5740 struct nfs4_layoutreturn *lrp = calldata;
5741 struct nfs_server *server;
a2e1d4f2 5742 struct pnfs_layout_hdr *lo = NFS_I(lrp->args.inode)->layout;
cbe82603
BH
5743
5744 dprintk("--> %s\n", __func__);
5745
5746 if (!nfs4_sequence_done(task, &lrp->res.seq_res))
5747 return;
5748
5749 server = NFS_SERVER(lrp->args.inode);
5750 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
5751 nfs_restart_rpc(task, lrp->clp);
5752 return;
5753 }
a2e1d4f2 5754 spin_lock(&lo->plh_inode->i_lock);
cbe82603 5755 if (task->tk_status == 0) {
cbe82603 5756 if (lrp->res.lrs_present) {
cbe82603 5757 pnfs_set_layout_stateid(lo, &lrp->res.stateid, true);
cbe82603
BH
5758 } else
5759 BUG_ON(!list_empty(&lo->plh_segs));
5760 }
a2e1d4f2
FI
5761 lo->plh_block_lgets--;
5762 spin_unlock(&lo->plh_inode->i_lock);
cbe82603
BH
5763 dprintk("<-- %s\n", __func__);
5764}
5765
5766static void nfs4_layoutreturn_release(void *calldata)
5767{
5768 struct nfs4_layoutreturn *lrp = calldata;
5769
5770 dprintk("--> %s\n", __func__);
5771 put_layout_hdr(NFS_I(lrp->args.inode)->layout);
5772 kfree(calldata);
5773 dprintk("<-- %s\n", __func__);
5774}
5775
5776static const struct rpc_call_ops nfs4_layoutreturn_call_ops = {
5777 .rpc_call_prepare = nfs4_layoutreturn_prepare,
5778 .rpc_call_done = nfs4_layoutreturn_done,
5779 .rpc_release = nfs4_layoutreturn_release,
5780};
5781
5782int nfs4_proc_layoutreturn(struct nfs4_layoutreturn *lrp)
5783{
5784 struct rpc_task *task;
5785 struct rpc_message msg = {
5786 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTRETURN],
5787 .rpc_argp = &lrp->args,
5788 .rpc_resp = &lrp->res,
5789 };
5790 struct rpc_task_setup task_setup_data = {
5791 .rpc_client = lrp->clp->cl_rpcclient,
5792 .rpc_message = &msg,
5793 .callback_ops = &nfs4_layoutreturn_call_ops,
5794 .callback_data = lrp,
5795 };
5796 int status;
5797
5798 dprintk("--> %s\n", __func__);
5799 task = rpc_run_task(&task_setup_data);
5800 if (IS_ERR(task))
5801 return PTR_ERR(task);
5802 status = task->tk_status;
5803 dprintk("<-- %s status=%d\n", __func__, status);
5804 rpc_put_task(task);
5805 return status;
5806}
5807
b1f69b75
AA
5808static int
5809_nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev)
5810{
5811 struct nfs4_getdeviceinfo_args args = {
5812 .pdev = pdev,
5813 };
5814 struct nfs4_getdeviceinfo_res res = {
5815 .pdev = pdev,
5816 };
5817 struct rpc_message msg = {
5818 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO],
5819 .rpc_argp = &args,
5820 .rpc_resp = &res,
5821 };
5822 int status;
5823
5824 dprintk("--> %s\n", __func__);
7c513058 5825 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
b1f69b75
AA
5826 dprintk("<-- %s status=%d\n", __func__, status);
5827
5828 return status;
5829}
5830
5831int nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev)
5832{
5833 struct nfs4_exception exception = { };
5834 int err;
5835
5836 do {
5837 err = nfs4_handle_exception(server,
5838 _nfs4_proc_getdeviceinfo(server, pdev),
5839 &exception);
5840 } while (exception.retry);
5841 return err;
5842}
5843EXPORT_SYMBOL_GPL(nfs4_proc_getdeviceinfo);
5844
863a3c6c
AA
5845static void nfs4_layoutcommit_prepare(struct rpc_task *task, void *calldata)
5846{
5847 struct nfs4_layoutcommit_data *data = calldata;
5848 struct nfs_server *server = NFS_SERVER(data->args.inode);
5849
5850 if (nfs4_setup_sequence(server, &data->args.seq_args,
5851 &data->res.seq_res, 1, task))
5852 return;
5853 rpc_call_start(task);
5854}
5855
5856static void
5857nfs4_layoutcommit_done(struct rpc_task *task, void *calldata)
5858{
5859 struct nfs4_layoutcommit_data *data = calldata;
5860 struct nfs_server *server = NFS_SERVER(data->args.inode);
5861
5862 if (!nfs4_sequence_done(task, &data->res.seq_res))
5863 return;
5864
5865 switch (task->tk_status) { /* Just ignore these failures */
5866 case NFS4ERR_DELEG_REVOKED: /* layout was recalled */
5867 case NFS4ERR_BADIOMODE: /* no IOMODE_RW layout for range */
5868 case NFS4ERR_BADLAYOUT: /* no layout */
5869 case NFS4ERR_GRACE: /* loca_recalim always false */
5870 task->tk_status = 0;
5871 }
5872
5873 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
5874 nfs_restart_rpc(task, server->nfs_client);
5875 return;
5876 }
5877
5878 if (task->tk_status == 0)
5879 nfs_post_op_update_inode_force_wcc(data->args.inode,
5880 data->res.fattr);
5881}
5882
5883static void nfs4_layoutcommit_release(void *calldata)
5884{
5885 struct nfs4_layoutcommit_data *data = calldata;
5886
5887 /* Matched by references in pnfs_set_layoutcommit */
5888 put_lseg(data->lseg);
5889 put_rpccred(data->cred);
5890 kfree(data);
5891}
5892
5893static const struct rpc_call_ops nfs4_layoutcommit_ops = {
5894 .rpc_call_prepare = nfs4_layoutcommit_prepare,
5895 .rpc_call_done = nfs4_layoutcommit_done,
5896 .rpc_release = nfs4_layoutcommit_release,
5897};
5898
5899int
ef311537 5900nfs4_proc_layoutcommit(struct nfs4_layoutcommit_data *data, bool sync)
863a3c6c
AA
5901{
5902 struct rpc_message msg = {
5903 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTCOMMIT],
5904 .rpc_argp = &data->args,
5905 .rpc_resp = &data->res,
5906 .rpc_cred = data->cred,
5907 };
5908 struct rpc_task_setup task_setup_data = {
5909 .task = &data->task,
5910 .rpc_client = NFS_CLIENT(data->args.inode),
5911 .rpc_message = &msg,
5912 .callback_ops = &nfs4_layoutcommit_ops,
5913 .callback_data = data,
5914 .flags = RPC_TASK_ASYNC,
5915 };
5916 struct rpc_task *task;
5917 int status = 0;
5918
5919 dprintk("NFS: %4d initiating layoutcommit call. sync %d "
5920 "lbw: %llu inode %lu\n",
5921 data->task.tk_pid, sync,
5922 data->args.lastbytewritten,
5923 data->args.inode->i_ino);
5924
5925 task = rpc_run_task(&task_setup_data);
5926 if (IS_ERR(task))
5927 return PTR_ERR(task);
ef311537 5928 if (sync == false)
863a3c6c
AA
5929 goto out;
5930 status = nfs4_wait_for_completion_rpc_task(task);
5931 if (status != 0)
5932 goto out;
5933 status = task->tk_status;
5934out:
5935 dprintk("%s: status %d\n", __func__, status);
5936 rpc_put_task(task);
5937 return status;
5938}
fca78d6d
BS
5939
5940static int
5941_nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
5942 struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
5943{
5944 struct nfs41_secinfo_no_name_args args = {
5945 .style = SECINFO_STYLE_CURRENT_FH,
5946 };
5947 struct nfs4_secinfo_res res = {
5948 .flavors = flavors,
5949 };
5950 struct rpc_message msg = {
5951 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO_NO_NAME],
5952 .rpc_argp = &args,
5953 .rpc_resp = &res,
5954 };
5955 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
5956}
5957
5958static int
5959nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
5960 struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
5961{
5962 struct nfs4_exception exception = { };
5963 int err;
5964 do {
5965 err = _nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
5966 switch (err) {
5967 case 0:
5968 case -NFS4ERR_WRONGSEC:
5969 case -NFS4ERR_NOTSUPP:
5970 break;
5971 default:
5972 err = nfs4_handle_exception(server, err, &exception);
5973 }
5974 } while (exception.retry);
5975 return err;
5976}
5977
5978static int
5979nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
5980 struct nfs_fsinfo *info)
5981{
5982 int err;
5983 struct page *page;
5984 rpc_authflavor_t flavor;
5985 struct nfs4_secinfo_flavors *flavors;
5986
5987 page = alloc_page(GFP_KERNEL);
5988 if (!page) {
5989 err = -ENOMEM;
5990 goto out;
5991 }
5992
5993 flavors = page_address(page);
5994 err = nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
5995
5996 /*
5997 * Fall back on "guess and check" method if
5998 * the server doesn't support SECINFO_NO_NAME
5999 */
6000 if (err == -NFS4ERR_WRONGSEC || err == -NFS4ERR_NOTSUPP) {
6001 err = nfs4_find_root_sec(server, fhandle, info);
6002 goto out_freepage;
6003 }
6004 if (err)
6005 goto out_freepage;
6006
6007 flavor = nfs_find_best_sec(flavors);
6008 if (err == 0)
6009 err = nfs4_lookup_root_sec(server, fhandle, info, flavor);
6010
6011out_freepage:
6012 put_page(page);
6013 if (err == -EACCES)
6014 return -EPERM;
6015out:
6016 return err;
6017}
7d974794
BS
6018static int _nfs41_test_stateid(struct nfs_server *server, struct nfs4_state *state)
6019{
6020 int status;
6021 struct nfs41_test_stateid_args args = {
6022 .stateid = &state->stateid,
6023 };
6024 struct nfs41_test_stateid_res res;
6025 struct rpc_message msg = {
6026 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_TEST_STATEID],
6027 .rpc_argp = &args,
6028 .rpc_resp = &res,
6029 };
6030 args.seq_args.sa_session = res.seq_res.sr_session = NULL;
6031 status = nfs4_call_sync_sequence(server->client, server, &msg, &args.seq_args, &res.seq_res, 0, 1);
6032 return status;
6033}
6034
6035static int nfs41_test_stateid(struct nfs_server *server, struct nfs4_state *state)
6036{
6037 struct nfs4_exception exception = { };
6038 int err;
6039 do {
6040 err = nfs4_handle_exception(server,
6041 _nfs41_test_stateid(server, state),
6042 &exception);
6043 } while (exception.retry);
6044 return err;
6045}
557134a3
AA
6046#endif /* CONFIG_NFS_V4_1 */
6047
591d71cb 6048struct nfs4_state_recovery_ops nfs40_reboot_recovery_ops = {
7eff03ae 6049 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
b79a4a1b 6050 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
1da177e4
LT
6051 .recover_open = nfs4_open_reclaim,
6052 .recover_lock = nfs4_lock_reclaim,
591d71cb 6053 .establish_clid = nfs4_init_clientid,
90a16617 6054 .get_clid_cred = nfs4_get_setclientid_cred,
1da177e4
LT
6055};
6056
591d71cb
AA
6057#if defined(CONFIG_NFS_V4_1)
6058struct nfs4_state_recovery_ops nfs41_reboot_recovery_ops = {
6059 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
6060 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
6061 .recover_open = nfs4_open_reclaim,
6062 .recover_lock = nfs4_lock_reclaim,
4d643d1d 6063 .establish_clid = nfs41_init_clientid,
b4b82607 6064 .get_clid_cred = nfs4_get_exchange_id_cred,
fce5c838 6065 .reclaim_complete = nfs41_proc_reclaim_complete,
591d71cb
AA
6066};
6067#endif /* CONFIG_NFS_V4_1 */
6068
6069struct nfs4_state_recovery_ops nfs40_nograce_recovery_ops = {
6070 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
6071 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
6072 .recover_open = nfs4_open_expired,
6073 .recover_lock = nfs4_lock_expired,
6074 .establish_clid = nfs4_init_clientid,
90a16617 6075 .get_clid_cred = nfs4_get_setclientid_cred,
591d71cb
AA
6076};
6077
6078#if defined(CONFIG_NFS_V4_1)
6079struct nfs4_state_recovery_ops nfs41_nograce_recovery_ops = {
7eff03ae 6080 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
b79a4a1b 6081 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
1da177e4
LT
6082 .recover_open = nfs4_open_expired,
6083 .recover_lock = nfs4_lock_expired,
4d643d1d 6084 .establish_clid = nfs41_init_clientid,
b4b82607 6085 .get_clid_cred = nfs4_get_exchange_id_cred,
1da177e4 6086};
591d71cb 6087#endif /* CONFIG_NFS_V4_1 */
1da177e4 6088
29fba38b
BH
6089struct nfs4_state_maintenance_ops nfs40_state_renewal_ops = {
6090 .sched_state_renewal = nfs4_proc_async_renew,
a7b72103 6091 .get_state_renewal_cred_locked = nfs4_get_renew_cred_locked,
8e69514f 6092 .renew_lease = nfs4_proc_renew,
29fba38b
BH
6093};
6094
6095#if defined(CONFIG_NFS_V4_1)
6096struct nfs4_state_maintenance_ops nfs41_state_renewal_ops = {
6097 .sched_state_renewal = nfs41_proc_async_sequence,
a7b72103 6098 .get_state_renewal_cred_locked = nfs4_get_machine_cred_locked,
8e69514f 6099 .renew_lease = nfs4_proc_sequence,
29fba38b
BH
6100};
6101#endif
6102
97dc1359
TM
6103static const struct nfs4_minor_version_ops nfs_v4_0_minor_ops = {
6104 .minor_version = 0,
6105 .call_sync = _nfs4_call_sync,
e047a10c 6106 .validate_stateid = nfs4_validate_delegation_stateid,
fca78d6d 6107 .find_root_sec = nfs4_find_root_sec,
c48f4f35
TM
6108 .reboot_recovery_ops = &nfs40_reboot_recovery_ops,
6109 .nograce_recovery_ops = &nfs40_nograce_recovery_ops,
6110 .state_renewal_ops = &nfs40_state_renewal_ops,
97dc1359
TM
6111};
6112
6113#if defined(CONFIG_NFS_V4_1)
6114static const struct nfs4_minor_version_ops nfs_v4_1_minor_ops = {
6115 .minor_version = 1,
6116 .call_sync = _nfs4_call_sync_session,
e047a10c 6117 .validate_stateid = nfs41_validate_delegation_stateid,
fca78d6d 6118 .find_root_sec = nfs41_find_root_sec,
c48f4f35
TM
6119 .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
6120 .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
6121 .state_renewal_ops = &nfs41_state_renewal_ops,
97dc1359
TM
6122};
6123#endif
6124
97dc1359
TM
6125const struct nfs4_minor_version_ops *nfs_v4_minor_ops[] = {
6126 [0] = &nfs_v4_0_minor_ops,
6127#if defined(CONFIG_NFS_V4_1)
6128 [1] = &nfs_v4_1_minor_ops,
6129#endif
6130};
6131
92e1d5be 6132static const struct inode_operations nfs4_file_inode_operations = {
6b3b5496
BF
6133 .permission = nfs_permission,
6134 .getattr = nfs_getattr,
6135 .setattr = nfs_setattr,
64c2ce8b
AK
6136 .getxattr = generic_getxattr,
6137 .setxattr = generic_setxattr,
6138 .listxattr = generic_listxattr,
6139 .removexattr = generic_removexattr,
6b3b5496
BF
6140};
6141
509de811 6142const struct nfs_rpc_ops nfs_v4_clientops = {
1da177e4
LT
6143 .version = 4, /* protocol version */
6144 .dentry_ops = &nfs4_dentry_operations,
6145 .dir_inode_ops = &nfs4_dir_inode_operations,
6b3b5496 6146 .file_inode_ops = &nfs4_file_inode_operations,
1da177e4
LT
6147 .getroot = nfs4_proc_get_root,
6148 .getattr = nfs4_proc_getattr,
6149 .setattr = nfs4_proc_setattr,
2b3de441 6150 .lookupfh = nfs4_proc_lookupfh,
1da177e4
LT
6151 .lookup = nfs4_proc_lookup,
6152 .access = nfs4_proc_access,
6153 .readlink = nfs4_proc_readlink,
1da177e4
LT
6154 .create = nfs4_proc_create,
6155 .remove = nfs4_proc_remove,
6156 .unlink_setup = nfs4_proc_unlink_setup,
6157 .unlink_done = nfs4_proc_unlink_done,
6158 .rename = nfs4_proc_rename,
d3d4152a
JL
6159 .rename_setup = nfs4_proc_rename_setup,
6160 .rename_done = nfs4_proc_rename_done,
1da177e4
LT
6161 .link = nfs4_proc_link,
6162 .symlink = nfs4_proc_symlink,
6163 .mkdir = nfs4_proc_mkdir,
6164 .rmdir = nfs4_proc_remove,
6165 .readdir = nfs4_proc_readdir,
6166 .mknod = nfs4_proc_mknod,
6167 .statfs = nfs4_proc_statfs,
6168 .fsinfo = nfs4_proc_fsinfo,
6169 .pathconf = nfs4_proc_pathconf,
e9326dca 6170 .set_capabilities = nfs4_server_capabilities,
1da177e4
LT
6171 .decode_dirent = nfs4_decode_dirent,
6172 .read_setup = nfs4_proc_read_setup,
ec06c096 6173 .read_done = nfs4_read_done,
1da177e4 6174 .write_setup = nfs4_proc_write_setup,
788e7a89 6175 .write_done = nfs4_write_done,
1da177e4 6176 .commit_setup = nfs4_proc_commit_setup,
788e7a89 6177 .commit_done = nfs4_commit_done,
1da177e4 6178 .lock = nfs4_proc_lock,
e50a1c2e 6179 .clear_acl_cache = nfs4_zap_acl_attr,
7fe5c398 6180 .close_context = nfs4_close_context,
2b484297 6181 .open_context = nfs4_atomic_open,
45a52a02 6182 .init_client = nfs4_init_client,
5a5ea0d4 6183 .secinfo = nfs4_proc_secinfo,
1da177e4
LT
6184};
6185
64c2ce8b
AK
6186static const struct xattr_handler nfs4_xattr_nfs4_acl_handler = {
6187 .prefix = XATTR_NAME_NFSV4_ACL,
6188 .list = nfs4_xattr_list_nfs4_acl,
6189 .get = nfs4_xattr_get_nfs4_acl,
6190 .set = nfs4_xattr_set_nfs4_acl,
6191};
6192
6193const struct xattr_handler *nfs4_xattr_handlers[] = {
6194 &nfs4_xattr_nfs4_acl_handler,
6195 NULL
6196};
6197
1da177e4
LT
6198/*
6199 * Local variables:
6200 * c-basic-offset: 8
6201 * End:
6202 */