NFSv4: Add helpers for basic copying of stateids
[linux-2.6-block.git] / fs / nfs / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfs/nfs4proc.c
3 *
4 * Client-side procedure declarations for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#include <linux/mm.h>
1da177e4
LT
39#include <linux/delay.h>
40#include <linux/errno.h>
41#include <linux/string.h>
652f89f6
TM
42#include <linux/ratelimit.h>
43#include <linux/printk.h>
5a0e3ad6 44#include <linux/slab.h>
1da177e4 45#include <linux/sunrpc/clnt.h>
8f70e95f 46#include <linux/sunrpc/gss_api.h>
1da177e4
LT
47#include <linux/nfs.h>
48#include <linux/nfs4.h>
49#include <linux/nfs_fs.h>
50#include <linux/nfs_page.h>
9b7160c5 51#include <linux/nfs_mount.h>
1da177e4 52#include <linux/namei.h>
02a913a7 53#include <linux/mount.h>
99fe60d0 54#include <linux/module.h>
6926afd1 55#include <linux/nfs_idmap.h>
5a0ffe54 56#include <linux/sunrpc/bc_xprt.h>
64c2ce8b 57#include <linux/xattr.h>
c7a360b0 58#include <linux/utsname.h>
d310310c 59#include <linux/freezer.h>
1da177e4 60
4ce79717 61#include "nfs4_fs.h"
1da177e4 62#include "delegation.h"
101070ca 63#include "internal.h"
006ea73e 64#include "iostat.h"
fc931582 65#include "callback.h"
b1f69b75 66#include "pnfs.h"
1da177e4
LT
67
68#define NFSDBG_FACILITY NFSDBG_PROC
69
2066fe89 70#define NFS4_POLL_RETRY_MIN (HZ/10)
1da177e4
LT
71#define NFS4_POLL_RETRY_MAX (15*HZ)
72
a78cb57a
TM
73#define NFS4_MAX_LOOP_ON_RECOVER (10)
74
ef159e91
TM
75static unsigned short max_session_slots = NFS4_DEF_SLOT_TABLE_SIZE;
76
cdd4e68b 77struct nfs4_opendata;
864472e9 78static int _nfs4_proc_open(struct nfs4_opendata *data);
b257957e 79static int _nfs4_recover_proc_open(struct nfs4_opendata *data);
1da177e4 80static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
9e33bed5 81static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *, struct nfs4_state *);
81934ddb 82static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr);
9936781d 83static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr);
0ab64e0e
TM
84static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
85 struct nfs_fattr *fattr, struct iattr *sattr,
86 struct nfs4_state *state);
f062eb6c 87#ifdef CONFIG_NFS_V4_1
1cab0652
BS
88static int nfs41_test_stateid(struct nfs_server *, nfs4_stateid *);
89static int nfs41_free_stateid(struct nfs_server *, nfs4_stateid *);
f062eb6c 90#endif
1da177e4 91/* Prevent leaks of NFSv4 errors into userland */
46f72f57 92static int nfs4_map_errors(int err)
1da177e4 93{
52567b03
TM
94 if (err >= -1000)
95 return err;
96 switch (err) {
97 case -NFS4ERR_RESOURCE:
98 return -EREMOTEIO;
7ebb9315
BS
99 case -NFS4ERR_WRONGSEC:
100 return -EPERM;
3ddeb7c5
TM
101 case -NFS4ERR_BADOWNER:
102 case -NFS4ERR_BADNAME:
103 return -EINVAL;
52567b03 104 default:
1da177e4 105 dprintk("%s could not handle NFSv4 error %d\n",
3110ff80 106 __func__, -err);
52567b03 107 break;
1da177e4 108 }
52567b03 109 return -EIO;
1da177e4
LT
110}
111
112/*
113 * This is our standard bitmap for GETATTR requests.
114 */
115const u32 nfs4_fattr_bitmap[2] = {
116 FATTR4_WORD0_TYPE
117 | FATTR4_WORD0_CHANGE
118 | FATTR4_WORD0_SIZE
119 | FATTR4_WORD0_FSID
120 | FATTR4_WORD0_FILEID,
121 FATTR4_WORD1_MODE
122 | FATTR4_WORD1_NUMLINKS
123 | FATTR4_WORD1_OWNER
124 | FATTR4_WORD1_OWNER_GROUP
125 | FATTR4_WORD1_RAWDEV
126 | FATTR4_WORD1_SPACE_USED
127 | FATTR4_WORD1_TIME_ACCESS
128 | FATTR4_WORD1_TIME_METADATA
129 | FATTR4_WORD1_TIME_MODIFY
130};
131
132const u32 nfs4_statfs_bitmap[2] = {
133 FATTR4_WORD0_FILES_AVAIL
134 | FATTR4_WORD0_FILES_FREE
135 | FATTR4_WORD0_FILES_TOTAL,
136 FATTR4_WORD1_SPACE_AVAIL
137 | FATTR4_WORD1_SPACE_FREE
138 | FATTR4_WORD1_SPACE_TOTAL
139};
140
4ce79717 141const u32 nfs4_pathconf_bitmap[2] = {
1da177e4
LT
142 FATTR4_WORD0_MAXLINK
143 | FATTR4_WORD0_MAXNAME,
144 0
145};
146
dae100c2 147const u32 nfs4_fsinfo_bitmap[3] = { FATTR4_WORD0_MAXFILESIZE
1da177e4
LT
148 | FATTR4_WORD0_MAXREAD
149 | FATTR4_WORD0_MAXWRITE
150 | FATTR4_WORD0_LEASE_TIME,
55b6e774 151 FATTR4_WORD1_TIME_DELTA
dae100c2
FI
152 | FATTR4_WORD1_FS_LAYOUT_TYPES,
153 FATTR4_WORD2_LAYOUT_BLKSIZE
1da177e4
LT
154};
155
830b8e33
MN
156const u32 nfs4_fs_locations_bitmap[2] = {
157 FATTR4_WORD0_TYPE
158 | FATTR4_WORD0_CHANGE
159 | FATTR4_WORD0_SIZE
160 | FATTR4_WORD0_FSID
161 | FATTR4_WORD0_FILEID
162 | FATTR4_WORD0_FS_LOCATIONS,
163 FATTR4_WORD1_MODE
164 | FATTR4_WORD1_NUMLINKS
165 | FATTR4_WORD1_OWNER
166 | FATTR4_WORD1_OWNER_GROUP
167 | FATTR4_WORD1_RAWDEV
168 | FATTR4_WORD1_SPACE_USED
169 | FATTR4_WORD1_TIME_ACCESS
170 | FATTR4_WORD1_TIME_METADATA
171 | FATTR4_WORD1_TIME_MODIFY
172 | FATTR4_WORD1_MOUNTED_ON_FILEID
173};
174
bc4785cd 175static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
1da177e4
LT
176 struct nfs4_readdir_arg *readdir)
177{
0dbb4c67 178 __be32 *start, *p;
1da177e4
LT
179
180 BUG_ON(readdir->count < 80);
181 if (cookie > 2) {
b7ef1956 182 readdir->cookie = cookie;
1da177e4
LT
183 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
184 return;
185 }
186
187 readdir->cookie = 0;
188 memset(&readdir->verifier, 0, sizeof(readdir->verifier));
189 if (cookie == 2)
190 return;
191
192 /*
193 * NFSv4 servers do not return entries for '.' and '..'
194 * Therefore, we fake these entries here. We let '.'
195 * have cookie 0 and '..' have cookie 1. Note that
196 * when talking to the server, we always send cookie 0
197 * instead of 1 or 2.
198 */
0dbb4c67 199 start = p = kmap_atomic(*readdir->pages, KM_USER0);
1da177e4
LT
200
201 if (cookie == 0) {
202 *p++ = xdr_one; /* next */
203 *p++ = xdr_zero; /* cookie, first word */
204 *p++ = xdr_one; /* cookie, second word */
205 *p++ = xdr_one; /* entry len */
206 memcpy(p, ".\0\0\0", 4); /* entry */
207 p++;
208 *p++ = xdr_one; /* bitmap length */
209 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
210 *p++ = htonl(8); /* attribute buffer length */
4e769b93 211 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_inode));
1da177e4
LT
212 }
213
214 *p++ = xdr_one; /* next */
215 *p++ = xdr_zero; /* cookie, first word */
216 *p++ = xdr_two; /* cookie, second word */
217 *p++ = xdr_two; /* entry len */
218 memcpy(p, "..\0\0", 4); /* entry */
219 p++;
220 *p++ = xdr_one; /* bitmap length */
221 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
222 *p++ = htonl(8); /* attribute buffer length */
4e769b93 223 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_parent->d_inode));
1da177e4
LT
224
225 readdir->pgbase = (char *)p - (char *)start;
226 readdir->count -= readdir->pgbase;
227 kunmap_atomic(start, KM_USER0);
228}
229
65de872e
TM
230static int nfs4_wait_clnt_recover(struct nfs_client *clp)
231{
232 int res;
233
234 might_sleep();
235
e005e804 236 res = wait_on_bit(&clp->cl_state, NFS4CLNT_MANAGER_RUNNING,
72cb77f4 237 nfs_wait_bit_killable, TASK_KILLABLE);
65de872e
TM
238 return res;
239}
240
241static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
242{
243 int res = 0;
244
245 might_sleep();
246
247 if (*timeout <= 0)
248 *timeout = NFS4_POLL_RETRY_MIN;
249 if (*timeout > NFS4_POLL_RETRY_MAX)
250 *timeout = NFS4_POLL_RETRY_MAX;
d310310c 251 freezable_schedule_timeout_killable(*timeout);
65de872e
TM
252 if (fatal_signal_pending(current))
253 res = -ERESTARTSYS;
254 *timeout <<= 1;
255 return res;
256}
257
258/* This is the error handling routine for processes that are allowed
259 * to sleep.
260 */
b064eca2 261static int nfs4_handle_exception(struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
65de872e
TM
262{
263 struct nfs_client *clp = server->nfs_client;
9e33bed5 264 struct nfs4_state *state = exception->state;
65de872e
TM
265 int ret = errorcode;
266
267 exception->retry = 0;
268 switch(errorcode) {
269 case 0:
270 return 0;
a1d0b5ee 271 case -NFS4ERR_DELEG_REVOKED:
9e33bed5
TM
272 case -NFS4ERR_ADMIN_REVOKED:
273 case -NFS4ERR_BAD_STATEID:
a1d0b5ee
TM
274 if (state != NULL)
275 nfs_remove_bad_delegation(state->inode);
9e33bed5
TM
276 case -NFS4ERR_OPENMODE:
277 if (state == NULL)
278 break;
0400a6b0
TM
279 nfs4_schedule_stateid_recovery(server, state);
280 goto wait_on_recovery;
0ced63d1
TM
281 case -NFS4ERR_EXPIRED:
282 if (state != NULL)
283 nfs4_schedule_stateid_recovery(server, state);
65de872e 284 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 285 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
286 nfs4_schedule_lease_recovery(clp);
287 goto wait_on_recovery;
03391693 288#if defined(CONFIG_NFS_V4_1)
4745e315
AA
289 case -NFS4ERR_BADSESSION:
290 case -NFS4ERR_BADSLOT:
291 case -NFS4ERR_BAD_HIGH_SLOT:
292 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
293 case -NFS4ERR_DEADSESSION:
294 case -NFS4ERR_SEQ_FALSE_RETRY:
295 case -NFS4ERR_SEQ_MISORDERED:
296 dprintk("%s ERROR: %d Reset session\n", __func__,
297 errorcode);
0400a6b0 298 nfs4_schedule_session_recovery(clp->cl_session);
4745e315 299 exception->retry = 1;
b9179237 300 break;
03391693 301#endif /* defined(CONFIG_NFS_V4_1) */
65de872e 302 case -NFS4ERR_FILE_OPEN:
44ed3556
N
303 if (exception->timeout > HZ) {
304 /* We have retried a decent amount, time to
305 * fail
306 */
307 ret = -EBUSY;
308 break;
309 }
65de872e
TM
310 case -NFS4ERR_GRACE:
311 case -NFS4ERR_DELAY:
2c643488 312 case -EKEYEXPIRED:
65de872e
TM
313 ret = nfs4_delay(server->client, &exception->timeout);
314 if (ret != 0)
315 break;
a8a4ae3a 316 case -NFS4ERR_RETRY_UNCACHED_REP:
65de872e
TM
317 case -NFS4ERR_OLD_STATEID:
318 exception->retry = 1;
b064eca2
TM
319 break;
320 case -NFS4ERR_BADOWNER:
321 /* The following works around a Linux server bug! */
322 case -NFS4ERR_BADNAME:
323 if (server->caps & NFS_CAP_UIDGID_NOMAP) {
324 server->caps &= ~NFS_CAP_UIDGID_NOMAP;
325 exception->retry = 1;
326 printk(KERN_WARNING "NFS: v4 server %s "
327 "does not accept raw "
328 "uid/gids. "
329 "Reenabling the idmapper.\n",
330 server->nfs_client->cl_hostname);
331 }
65de872e
TM
332 }
333 /* We failed to handle the error */
334 return nfs4_map_errors(ret);
0400a6b0 335wait_on_recovery:
a2c0b9e2
TM
336 ret = nfs4_wait_clnt_recover(clp);
337 if (ret == 0)
338 exception->retry = 1;
339 return ret;
65de872e
TM
340}
341
342
452e9352 343static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp)
1da177e4 344{
1da177e4
LT
345 spin_lock(&clp->cl_lock);
346 if (time_before(clp->cl_last_renewal,timestamp))
347 clp->cl_last_renewal = timestamp;
348 spin_unlock(&clp->cl_lock);
349}
350
452e9352
TM
351static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
352{
353 do_renew_lease(server->nfs_client, timestamp);
354}
355
cccef3b9
AA
356#if defined(CONFIG_NFS_V4_1)
357
e2c4ab3c
AA
358/*
359 * nfs4_free_slot - free a slot and efficiently update slot table.
360 *
361 * freeing a slot is trivially done by clearing its respective bit
362 * in the bitmap.
363 * If the freed slotid equals highest_used_slotid we want to update it
364 * so that the server would be able to size down the slot table if needed,
365 * otherwise we know that the highest_used_slotid is still in use.
366 * When updating highest_used_slotid there may be "holes" in the bitmap
367 * so we need to scan down from highest_used_slotid to 0 looking for the now
368 * highest slotid in use.
45d43c29 369 * If none found, highest_used_slotid is set to NFS4_NO_SLOT.
35dc1d74
TM
370 *
371 * Must be called while holding tbl->slot_tbl_lock
e2c4ab3c
AA
372 */
373static void
45d43c29 374nfs4_free_slot(struct nfs4_slot_table *tbl, u32 slotid)
e2c4ab3c 375{
45d43c29 376 BUG_ON(slotid >= NFS4_MAX_SLOT_TABLE);
e2c4ab3c
AA
377 /* clear used bit in bitmap */
378 __clear_bit(slotid, tbl->used_slots);
379
380 /* update highest_used_slotid when it is freed */
381 if (slotid == tbl->highest_used_slotid) {
382 slotid = find_last_bit(tbl->used_slots, tbl->max_slots);
bcb56164 383 if (slotid < tbl->max_slots)
e2c4ab3c
AA
384 tbl->highest_used_slotid = slotid;
385 else
45d43c29 386 tbl->highest_used_slotid = NFS4_NO_SLOT;
e2c4ab3c 387 }
45d43c29
TM
388 dprintk("%s: slotid %u highest_used_slotid %d\n", __func__,
389 slotid, tbl->highest_used_slotid);
e2c4ab3c
AA
390}
391
961a828d
TM
392bool nfs4_set_task_privileged(struct rpc_task *task, void *dummy)
393{
394 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
395 return true;
396}
397
3bfb0fc5 398/*
42acd021 399 * Signal state manager thread if session fore channel is drained
3bfb0fc5 400 */
42acd021 401static void nfs4_check_drain_fc_complete(struct nfs4_session *ses)
3bfb0fc5 402{
a2118c33 403 if (!test_bit(NFS4_SESSION_DRAINING, &ses->session_state)) {
961a828d
TM
404 rpc_wake_up_first(&ses->fc_slot_table.slot_tbl_waitq,
405 nfs4_set_task_privileged, NULL);
3bfb0fc5
AB
406 return;
407 }
408
45d43c29 409 if (ses->fc_slot_table.highest_used_slotid != NFS4_NO_SLOT)
3bfb0fc5
AB
410 return;
411
42acd021
AA
412 dprintk("%s COMPLETE: Session Fore Channel Drained\n", __func__);
413 complete(&ses->fc_slot_table.complete);
414}
415
416/*
417 * Signal state manager thread if session back channel is drained
418 */
419void nfs4_check_drain_bc_complete(struct nfs4_session *ses)
420{
421 if (!test_bit(NFS4_SESSION_DRAINING, &ses->session_state) ||
45d43c29 422 ses->bc_slot_table.highest_used_slotid != NFS4_NO_SLOT)
42acd021
AA
423 return;
424 dprintk("%s COMPLETE: Session Back Channel Drained\n", __func__);
425 complete(&ses->bc_slot_table.complete);
3bfb0fc5
AB
426}
427
d185a334 428static void nfs41_sequence_free_slot(struct nfs4_sequence_res *res)
13615871
AA
429{
430 struct nfs4_slot_table *tbl;
431
d185a334 432 tbl = &res->sr_session->fc_slot_table;
dfb4f309 433 if (!res->sr_slot) {
13615871
AA
434 /* just wake up the next guy waiting since
435 * we may have not consumed a slot after all */
691daf3b 436 dprintk("%s: No slot\n", __func__);
35dc1d74 437 return;
13615871 438 }
ea028ac9 439
35dc1d74 440 spin_lock(&tbl->slot_tbl_lock);
aabd0b40 441 nfs4_free_slot(tbl, res->sr_slot - tbl->slots);
42acd021 442 nfs4_check_drain_fc_complete(res->sr_session);
35dc1d74 443 spin_unlock(&tbl->slot_tbl_lock);
dfb4f309 444 res->sr_slot = NULL;
13615871
AA
445}
446
14516c3a 447static int nfs41_sequence_done(struct rpc_task *task, struct nfs4_sequence_res *res)
b0df806c
AA
448{
449 unsigned long timestamp;
14516c3a 450 struct nfs_client *clp;
b0df806c
AA
451
452 /*
453 * sr_status remains 1 if an RPC level error occurred. The server
454 * may or may not have processed the sequence operation..
455 * Proceed as if the server received and processed the sequence
456 * operation.
457 */
458 if (res->sr_status == 1)
459 res->sr_status = NFS_OK;
460
468f8613
BS
461 /* don't increment the sequence number if the task wasn't sent */
462 if (!RPC_WAS_SENT(task))
b0df806c
AA
463 goto out;
464
691daf3b 465 /* Check the SEQUENCE operation status */
14516c3a
TM
466 switch (res->sr_status) {
467 case 0:
b0df806c 468 /* Update the slot's sequence and clientid lease timer */
dfb4f309 469 ++res->sr_slot->seq_nr;
b0df806c 470 timestamp = res->sr_renewal_time;
14516c3a 471 clp = res->sr_session->clp;
452e9352 472 do_renew_lease(clp, timestamp);
0629e370 473 /* Check sequence flags */
b4410c2f
TM
474 if (res->sr_status_flags != 0)
475 nfs4_schedule_lease_recovery(clp);
14516c3a
TM
476 break;
477 case -NFS4ERR_DELAY:
478 /* The server detected a resend of the RPC call and
479 * returned NFS4ERR_DELAY as per Section 2.10.6.2
480 * of RFC5661.
481 */
12364a4f 482 dprintk("%s: slot=%td seq=%d: Operation in progress\n",
dfb4f309
BH
483 __func__,
484 res->sr_slot - res->sr_session->fc_slot_table.slots,
485 res->sr_slot->seq_nr);
14516c3a
TM
486 goto out_retry;
487 default:
488 /* Just update the slot sequence no. */
dfb4f309 489 ++res->sr_slot->seq_nr;
b0df806c
AA
490 }
491out:
492 /* The session may be reset by one of the error handlers. */
493 dprintk("%s: Error %d free the slot \n", __func__, res->sr_status);
d185a334 494 nfs41_sequence_free_slot(res);
14516c3a
TM
495 return 1;
496out_retry:
d05dd4e9 497 if (!rpc_restart_call(task))
14516c3a
TM
498 goto out;
499 rpc_delay(task, NFS4_POLL_RETRY_MAX);
500 return 0;
b0df806c
AA
501}
502
14516c3a
TM
503static int nfs4_sequence_done(struct rpc_task *task,
504 struct nfs4_sequence_res *res)
df896455 505{
14516c3a
TM
506 if (res->sr_session == NULL)
507 return 1;
508 return nfs41_sequence_done(task, res);
df896455
TM
509}
510
510b8175
BH
511/*
512 * nfs4_find_slot - efficiently look for a free slot
513 *
514 * nfs4_find_slot looks for an unset bit in the used_slots bitmap.
515 * If found, we mark the slot as used, update the highest_used_slotid,
516 * and respectively set up the sequence operation args.
45d43c29 517 * The slot number is returned if found, or NFS4_NO_SLOT otherwise.
fbcd4abc
AA
518 *
519 * Note: must be called with under the slot_tbl_lock.
510b8175 520 */
45d43c29 521static u32
40ead580 522nfs4_find_slot(struct nfs4_slot_table *tbl)
510b8175 523{
45d43c29
TM
524 u32 slotid;
525 u32 ret_id = NFS4_NO_SLOT;
510b8175 526
45d43c29 527 dprintk("--> %s used_slots=%04lx highest_used=%u max_slots=%u\n",
510b8175
BH
528 __func__, tbl->used_slots[0], tbl->highest_used_slotid,
529 tbl->max_slots);
530 slotid = find_first_zero_bit(tbl->used_slots, tbl->max_slots);
531 if (slotid >= tbl->max_slots)
532 goto out;
533 __set_bit(slotid, tbl->used_slots);
45d43c29
TM
534 if (slotid > tbl->highest_used_slotid ||
535 tbl->highest_used_slotid == NFS4_NO_SLOT)
510b8175
BH
536 tbl->highest_used_slotid = slotid;
537 ret_id = slotid;
538out:
539 dprintk("<-- %s used_slots=%04lx highest_used=%d slotid=%d \n",
540 __func__, tbl->used_slots[0], tbl->highest_used_slotid, ret_id);
510b8175
BH
541 return ret_id;
542}
543
9d12b216
TM
544static void nfs41_init_sequence(struct nfs4_sequence_args *args,
545 struct nfs4_sequence_res *res, int cache_reply)
546{
547 args->sa_session = NULL;
548 args->sa_cache_this = 0;
549 if (cache_reply)
550 args->sa_cache_this = 1;
551 res->sr_session = NULL;
552 res->sr_slot = NULL;
553}
554
dc70d7b3 555int nfs41_setup_sequence(struct nfs4_session *session,
ce5039c1
AA
556 struct nfs4_sequence_args *args,
557 struct nfs4_sequence_res *res,
ce5039c1
AA
558 struct rpc_task *task)
559{
fbcd4abc
AA
560 struct nfs4_slot *slot;
561 struct nfs4_slot_table *tbl;
45d43c29 562 u32 slotid;
fbcd4abc
AA
563
564 dprintk("--> %s\n", __func__);
ce5039c1 565 /* slot already allocated? */
dfb4f309 566 if (res->sr_slot != NULL)
ce5039c1
AA
567 return 0;
568
fbcd4abc
AA
569 tbl = &session->fc_slot_table;
570
571 spin_lock(&tbl->slot_tbl_lock);
a2118c33 572 if (test_bit(NFS4_SESSION_DRAINING, &session->session_state) &&
5601a00d 573 !rpc_task_has_priority(task, RPC_PRIORITY_PRIVILEGED)) {
0b1c8fc4 574 /* The state manager will wait until the slot table is empty */
05f0d236 575 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
b069d94a 576 spin_unlock(&tbl->slot_tbl_lock);
0b1c8fc4 577 dprintk("%s session is draining\n", __func__);
05f0d236 578 return -EAGAIN;
b069d94a
AA
579 }
580
689cf5c1
AB
581 if (!rpc_queue_empty(&tbl->slot_tbl_waitq) &&
582 !rpc_task_has_priority(task, RPC_PRIORITY_PRIVILEGED)) {
583 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
584 spin_unlock(&tbl->slot_tbl_lock);
585 dprintk("%s enforce FIFO order\n", __func__);
586 return -EAGAIN;
587 }
588
40ead580 589 slotid = nfs4_find_slot(tbl);
45d43c29 590 if (slotid == NFS4_NO_SLOT) {
fbcd4abc
AA
591 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
592 spin_unlock(&tbl->slot_tbl_lock);
593 dprintk("<-- %s: no free slots\n", __func__);
594 return -EAGAIN;
595 }
596 spin_unlock(&tbl->slot_tbl_lock);
597
689cf5c1 598 rpc_task_set_priority(task, RPC_PRIORITY_NORMAL);
fbcd4abc 599 slot = tbl->slots + slotid;
99fe60d0 600 args->sa_session = session;
fbcd4abc 601 args->sa_slotid = slotid;
fbcd4abc
AA
602
603 dprintk("<-- %s slotid=%d seqid=%d\n", __func__, slotid, slot->seq_nr);
604
99fe60d0 605 res->sr_session = session;
dfb4f309 606 res->sr_slot = slot;
fbcd4abc 607 res->sr_renewal_time = jiffies;
2a6e26cd 608 res->sr_status_flags = 0;
fbcd4abc
AA
609 /*
610 * sr_status is only set in decode_sequence, and so will remain
611 * set to 1 if an rpc level failure occurs.
612 */
613 res->sr_status = 1;
ce5039c1
AA
614 return 0;
615}
dc70d7b3 616EXPORT_SYMBOL_GPL(nfs41_setup_sequence);
ce5039c1 617
035168ab 618int nfs4_setup_sequence(const struct nfs_server *server,
ce5039c1
AA
619 struct nfs4_sequence_args *args,
620 struct nfs4_sequence_res *res,
ce5039c1
AA
621 struct rpc_task *task)
622{
035168ab 623 struct nfs4_session *session = nfs4_get_session(server);
ce5039c1
AA
624 int ret = 0;
625
9d12b216 626 if (session == NULL)
035168ab 627 goto out;
035168ab 628
12364a4f 629 dprintk("--> %s clp %p session %p sr_slot %td\n",
dfb4f309
BH
630 __func__, session->clp, session, res->sr_slot ?
631 res->sr_slot - session->fc_slot_table.slots : -1);
ce5039c1 632
9d12b216 633 ret = nfs41_setup_sequence(session, args, res, task);
ce5039c1
AA
634out:
635 dprintk("<-- %s status=%d\n", __func__, ret);
636 return ret;
637}
638
639struct nfs41_call_sync_data {
035168ab 640 const struct nfs_server *seq_server;
ce5039c1
AA
641 struct nfs4_sequence_args *seq_args;
642 struct nfs4_sequence_res *seq_res;
ce5039c1
AA
643};
644
645static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata)
646{
647 struct nfs41_call_sync_data *data = calldata;
648
035168ab
TM
649 dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server);
650
651 if (nfs4_setup_sequence(data->seq_server, data->seq_args,
9d12b216 652 data->seq_res, task))
ce5039c1
AA
653 return;
654 rpc_call_start(task);
655}
656
b257957e
AB
657static void nfs41_call_priv_sync_prepare(struct rpc_task *task, void *calldata)
658{
659 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
660 nfs41_call_sync_prepare(task, calldata);
661}
662
69ab40c4
AA
663static void nfs41_call_sync_done(struct rpc_task *task, void *calldata)
664{
665 struct nfs41_call_sync_data *data = calldata;
666
14516c3a 667 nfs41_sequence_done(task, data->seq_res);
69ab40c4
AA
668}
669
ce5039c1
AA
670struct rpc_call_ops nfs41_call_sync_ops = {
671 .rpc_call_prepare = nfs41_call_sync_prepare,
69ab40c4 672 .rpc_call_done = nfs41_call_sync_done,
ce5039c1
AA
673};
674
b257957e
AB
675struct rpc_call_ops nfs41_call_priv_sync_ops = {
676 .rpc_call_prepare = nfs41_call_priv_sync_prepare,
677 .rpc_call_done = nfs41_call_sync_done,
678};
679
7c513058
BS
680static int nfs4_call_sync_sequence(struct rpc_clnt *clnt,
681 struct nfs_server *server,
ce5039c1
AA
682 struct rpc_message *msg,
683 struct nfs4_sequence_args *args,
684 struct nfs4_sequence_res *res,
b257957e 685 int privileged)
ce5039c1
AA
686{
687 int ret;
688 struct rpc_task *task;
689 struct nfs41_call_sync_data data = {
035168ab 690 .seq_server = server,
ce5039c1
AA
691 .seq_args = args,
692 .seq_res = res,
ce5039c1
AA
693 };
694 struct rpc_task_setup task_setup = {
7c513058 695 .rpc_client = clnt,
ce5039c1
AA
696 .rpc_message = msg,
697 .callback_ops = &nfs41_call_sync_ops,
698 .callback_data = &data
699 };
700
b257957e
AB
701 if (privileged)
702 task_setup.callback_ops = &nfs41_call_priv_sync_ops;
ce5039c1
AA
703 task = rpc_run_task(&task_setup);
704 if (IS_ERR(task))
705 ret = PTR_ERR(task);
706 else {
707 ret = task->tk_status;
708 rpc_put_task(task);
709 }
710 return ret;
711}
712
7c513058
BS
713int _nfs4_call_sync_session(struct rpc_clnt *clnt,
714 struct nfs_server *server,
cccef3b9
AA
715 struct rpc_message *msg,
716 struct nfs4_sequence_args *args,
717 struct nfs4_sequence_res *res,
718 int cache_reply)
719{
9d12b216
TM
720 nfs41_init_sequence(args, res, cache_reply);
721 return nfs4_call_sync_sequence(clnt, server, msg, args, res, 0);
cccef3b9
AA
722}
723
df896455 724#else
9d12b216
TM
725static inline
726void nfs41_init_sequence(struct nfs4_sequence_args *args,
727 struct nfs4_sequence_res *res, int cache_reply)
728{
729}
730
14516c3a
TM
731static int nfs4_sequence_done(struct rpc_task *task,
732 struct nfs4_sequence_res *res)
df896455 733{
14516c3a 734 return 1;
df896455 735}
cccef3b9
AA
736#endif /* CONFIG_NFS_V4_1 */
737
7c513058
BS
738int _nfs4_call_sync(struct rpc_clnt *clnt,
739 struct nfs_server *server,
cccef3b9
AA
740 struct rpc_message *msg,
741 struct nfs4_sequence_args *args,
742 struct nfs4_sequence_res *res,
743 int cache_reply)
744{
9d12b216 745 nfs41_init_sequence(args, res, cache_reply);
7c513058 746 return rpc_call_sync(clnt, msg, 0);
cccef3b9
AA
747}
748
e73b83f2 749static inline
7c513058
BS
750int nfs4_call_sync(struct rpc_clnt *clnt,
751 struct nfs_server *server,
e73b83f2
BS
752 struct rpc_message *msg,
753 struct nfs4_sequence_args *args,
754 struct nfs4_sequence_res *res,
755 int cache_reply)
756{
7c513058
BS
757 return server->nfs_client->cl_mvops->call_sync(clnt, server, msg,
758 args, res, cache_reply);
e73b83f2 759}
cccef3b9 760
38478b24 761static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
1da177e4 762{
38478b24 763 struct nfs_inode *nfsi = NFS_I(dir);
1da177e4 764
38478b24 765 spin_lock(&dir->i_lock);
40d24704 766 nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_REVAL_PAGECACHE|NFS_INO_INVALID_DATA;
a9a4a87a 767 if (!cinfo->atomic || cinfo->before != dir->i_version)
bfc69a45 768 nfs_force_lookup_revalidate(dir);
a9a4a87a 769 dir->i_version = cinfo->after;
38478b24 770 spin_unlock(&dir->i_lock);
1da177e4
LT
771}
772
e56e0b78 773struct nfs4_opendata {
c6d00e63 774 struct kref kref;
e56e0b78
TM
775 struct nfs_openargs o_arg;
776 struct nfs_openres o_res;
cdd4e68b
TM
777 struct nfs_open_confirmargs c_arg;
778 struct nfs_open_confirmres c_res;
6926afd1
TM
779 struct nfs4_string owner_name;
780 struct nfs4_string group_name;
e56e0b78
TM
781 struct nfs_fattr f_attr;
782 struct nfs_fattr dir_attr;
e56e0b78 783 struct dentry *dir;
82a2c1b7 784 struct dentry *dentry;
e56e0b78 785 struct nfs4_state_owner *owner;
aac00a8d 786 struct nfs4_state *state;
e56e0b78 787 struct iattr attrs;
26e976a8 788 unsigned long timestamp;
3e309914 789 unsigned int rpc_done : 1;
24ac23ab
TM
790 int rpc_status;
791 int cancelled;
e56e0b78
TM
792};
793
2ced46c2
TM
794
795static void nfs4_init_opendata_res(struct nfs4_opendata *p)
796{
797 p->o_res.f_attr = &p->f_attr;
798 p->o_res.dir_attr = &p->dir_attr;
c1d51931
TM
799 p->o_res.seqid = p->o_arg.seqid;
800 p->c_res.seqid = p->c_arg.seqid;
2ced46c2
TM
801 p->o_res.server = p->o_arg.server;
802 nfs_fattr_init(&p->f_attr);
803 nfs_fattr_init(&p->dir_attr);
6926afd1 804 nfs_fattr_init_names(&p->f_attr, &p->owner_name, &p->group_name);
2ced46c2
TM
805}
806
82a2c1b7 807static struct nfs4_opendata *nfs4_opendata_alloc(struct dentry *dentry,
dc0b027d 808 struct nfs4_state_owner *sp, fmode_t fmode, int flags,
8535b2be
TM
809 const struct iattr *attrs,
810 gfp_t gfp_mask)
e56e0b78 811{
82a2c1b7 812 struct dentry *parent = dget_parent(dentry);
e56e0b78
TM
813 struct inode *dir = parent->d_inode;
814 struct nfs_server *server = NFS_SERVER(dir);
815 struct nfs4_opendata *p;
816
8535b2be 817 p = kzalloc(sizeof(*p), gfp_mask);
e56e0b78
TM
818 if (p == NULL)
819 goto err;
8535b2be 820 p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid, gfp_mask);
e56e0b78
TM
821 if (p->o_arg.seqid == NULL)
822 goto err_free;
82a2c1b7
AV
823 nfs_sb_active(dentry->d_sb);
824 p->dentry = dget(dentry);
e56e0b78
TM
825 p->dir = parent;
826 p->owner = sp;
827 atomic_inc(&sp->so_count);
828 p->o_arg.fh = NFS_FH(dir);
dc0b027d
TM
829 p->o_arg.open_flags = flags;
830 p->o_arg.fmode = fmode & (FMODE_READ|FMODE_WRITE);
7539bbab 831 p->o_arg.clientid = server->nfs_client->cl_clientid;
48c22eb2 832 p->o_arg.id = sp->so_seqid.owner_id;
82a2c1b7 833 p->o_arg.name = &dentry->d_name;
e56e0b78
TM
834 p->o_arg.server = server;
835 p->o_arg.bitmask = server->attr_bitmask;
6926afd1 836 p->o_arg.dir_bitmask = server->cache_consistency_bitmask;
e56e0b78 837 p->o_arg.claim = NFS4_OPEN_CLAIM_NULL;
536e43d1 838 if (attrs != NULL && attrs->ia_valid != 0) {
d77d76ff
TM
839 u32 *s;
840
e56e0b78
TM
841 p->o_arg.u.attrs = &p->attrs;
842 memcpy(&p->attrs, attrs, sizeof(p->attrs));
d77d76ff
TM
843 s = (u32 *) p->o_arg.u.verifier.data;
844 s[0] = jiffies;
845 s[1] = current->pid;
e56e0b78 846 }
cdd4e68b
TM
847 p->c_arg.fh = &p->o_res.fh;
848 p->c_arg.stateid = &p->o_res.stateid;
849 p->c_arg.seqid = p->o_arg.seqid;
2ced46c2 850 nfs4_init_opendata_res(p);
c6d00e63 851 kref_init(&p->kref);
e56e0b78
TM
852 return p;
853err_free:
854 kfree(p);
855err:
856 dput(parent);
857 return NULL;
858}
859
c6d00e63 860static void nfs4_opendata_free(struct kref *kref)
e56e0b78 861{
c6d00e63
TM
862 struct nfs4_opendata *p = container_of(kref,
863 struct nfs4_opendata, kref);
82a2c1b7 864 struct super_block *sb = p->dentry->d_sb;
c6d00e63
TM
865
866 nfs_free_seqid(p->o_arg.seqid);
aac00a8d
TM
867 if (p->state != NULL)
868 nfs4_put_open_state(p->state);
c6d00e63
TM
869 nfs4_put_state_owner(p->owner);
870 dput(p->dir);
82a2c1b7
AV
871 dput(p->dentry);
872 nfs_sb_deactive(sb);
6926afd1 873 nfs_fattr_free_names(&p->f_attr);
c6d00e63
TM
874 kfree(p);
875}
876
877static void nfs4_opendata_put(struct nfs4_opendata *p)
878{
879 if (p != NULL)
880 kref_put(&p->kref, nfs4_opendata_free);
e56e0b78
TM
881}
882
06f814a3
TM
883static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
884{
06f814a3
TM
885 int ret;
886
06f814a3 887 ret = rpc_wait_for_completion_task(task);
06f814a3
TM
888 return ret;
889}
890
dc0b027d 891static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode)
6ee41268
TM
892{
893 int ret = 0;
dc0b027d 894
536e43d1 895 if (open_mode & (O_EXCL|O_TRUNC))
dc0b027d
TM
896 goto out;
897 switch (mode & (FMODE_READ|FMODE_WRITE)) {
6ee41268 898 case FMODE_READ:
88069f77
TM
899 ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0
900 && state->n_rdonly != 0;
6ee41268
TM
901 break;
902 case FMODE_WRITE:
88069f77
TM
903 ret |= test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0
904 && state->n_wronly != 0;
6ee41268
TM
905 break;
906 case FMODE_READ|FMODE_WRITE:
88069f77
TM
907 ret |= test_bit(NFS_O_RDWR_STATE, &state->flags) != 0
908 && state->n_rdwr != 0;
6ee41268 909 }
dc0b027d 910out:
6ee41268
TM
911 return ret;
912}
913
dc0b027d 914static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode)
aac00a8d 915{
652f89f6
TM
916 if (delegation == NULL)
917 return 0;
dc0b027d 918 if ((delegation->type & fmode) != fmode)
aac00a8d 919 return 0;
15c831bf 920 if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags))
aac00a8d 921 return 0;
b7391f44 922 nfs_mark_delegation_referenced(delegation);
aac00a8d
TM
923 return 1;
924}
925
dc0b027d 926static void update_open_stateflags(struct nfs4_state *state, fmode_t fmode)
e7616923 927{
dc0b027d 928 switch (fmode) {
e7616923
TM
929 case FMODE_WRITE:
930 state->n_wronly++;
931 break;
932 case FMODE_READ:
933 state->n_rdonly++;
934 break;
935 case FMODE_READ|FMODE_WRITE:
936 state->n_rdwr++;
937 }
dc0b027d 938 nfs4_state_set_mode_locked(state, state->state | fmode);
003707c7
TM
939}
940
dc0b027d 941static void nfs_set_open_stateid_locked(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7
TM
942{
943 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
f597c537
TM
944 nfs4_stateid_copy(&state->stateid, stateid);
945 nfs4_stateid_copy(&state->open_stateid, stateid);
dc0b027d 946 switch (fmode) {
003707c7
TM
947 case FMODE_READ:
948 set_bit(NFS_O_RDONLY_STATE, &state->flags);
949 break;
950 case FMODE_WRITE:
951 set_bit(NFS_O_WRONLY_STATE, &state->flags);
952 break;
953 case FMODE_READ|FMODE_WRITE:
954 set_bit(NFS_O_RDWR_STATE, &state->flags);
955 }
e7616923
TM
956}
957
dc0b027d 958static void nfs_set_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
003707c7 959{
8bda4e4c 960 write_seqlock(&state->seqlock);
dc0b027d 961 nfs_set_open_stateid_locked(state, stateid, fmode);
8bda4e4c 962 write_sequnlock(&state->seqlock);
003707c7
TM
963}
964
dc0b027d 965static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode)
1da177e4 966{
8bda4e4c
TM
967 /*
968 * Protect the call to nfs4_state_set_mode_locked and
969 * serialise the stateid update
970 */
971 write_seqlock(&state->seqlock);
003707c7 972 if (deleg_stateid != NULL) {
f597c537 973 nfs4_stateid_copy(&state->stateid, deleg_stateid);
003707c7
TM
974 set_bit(NFS_DELEGATED_STATE, &state->flags);
975 }
976 if (open_stateid != NULL)
dc0b027d 977 nfs_set_open_stateid_locked(state, open_stateid, fmode);
8bda4e4c
TM
978 write_sequnlock(&state->seqlock);
979 spin_lock(&state->owner->so_lock);
dc0b027d 980 update_open_stateflags(state, fmode);
ec073428 981 spin_unlock(&state->owner->so_lock);
1da177e4
LT
982}
983
dc0b027d 984static int update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, nfs4_stateid *delegation, fmode_t fmode)
34310430
TM
985{
986 struct nfs_inode *nfsi = NFS_I(state->inode);
987 struct nfs_delegation *deleg_cur;
988 int ret = 0;
989
dc0b027d 990 fmode &= (FMODE_READ|FMODE_WRITE);
34310430
TM
991
992 rcu_read_lock();
993 deleg_cur = rcu_dereference(nfsi->delegation);
994 if (deleg_cur == NULL)
995 goto no_delegation;
996
997 spin_lock(&deleg_cur->lock);
998 if (nfsi->delegation != deleg_cur ||
dc0b027d 999 (deleg_cur->type & fmode) != fmode)
34310430
TM
1000 goto no_delegation_unlock;
1001
1002 if (delegation == NULL)
1003 delegation = &deleg_cur->stateid;
f597c537 1004 else if (!nfs4_stateid_match(&deleg_cur->stateid, delegation))
34310430
TM
1005 goto no_delegation_unlock;
1006
b7391f44 1007 nfs_mark_delegation_referenced(deleg_cur);
dc0b027d 1008 __update_open_stateid(state, open_stateid, &deleg_cur->stateid, fmode);
34310430
TM
1009 ret = 1;
1010no_delegation_unlock:
1011 spin_unlock(&deleg_cur->lock);
1012no_delegation:
1013 rcu_read_unlock();
1014
1015 if (!ret && open_stateid != NULL) {
dc0b027d 1016 __update_open_stateid(state, open_stateid, NULL, fmode);
34310430
TM
1017 ret = 1;
1018 }
1019
1020 return ret;
1021}
1022
1023
dc0b027d 1024static void nfs4_return_incompatible_delegation(struct inode *inode, fmode_t fmode)
aac00a8d
TM
1025{
1026 struct nfs_delegation *delegation;
1027
1028 rcu_read_lock();
1029 delegation = rcu_dereference(NFS_I(inode)->delegation);
dc0b027d 1030 if (delegation == NULL || (delegation->type & fmode) == fmode) {
aac00a8d
TM
1031 rcu_read_unlock();
1032 return;
1033 }
1034 rcu_read_unlock();
1035 nfs_inode_return_delegation(inode);
1036}
1037
6ee41268 1038static struct nfs4_state *nfs4_try_open_cached(struct nfs4_opendata *opendata)
aac00a8d
TM
1039{
1040 struct nfs4_state *state = opendata->state;
1041 struct nfs_inode *nfsi = NFS_I(state->inode);
1042 struct nfs_delegation *delegation;
536e43d1 1043 int open_mode = opendata->o_arg.open_flags & (O_EXCL|O_TRUNC);
dc0b027d 1044 fmode_t fmode = opendata->o_arg.fmode;
aac00a8d
TM
1045 nfs4_stateid stateid;
1046 int ret = -EAGAIN;
1047
aac00a8d 1048 for (;;) {
dc0b027d 1049 if (can_open_cached(state, fmode, open_mode)) {
6ee41268 1050 spin_lock(&state->owner->so_lock);
dc0b027d
TM
1051 if (can_open_cached(state, fmode, open_mode)) {
1052 update_open_stateflags(state, fmode);
6ee41268 1053 spin_unlock(&state->owner->so_lock);
6ee41268
TM
1054 goto out_return_state;
1055 }
1056 spin_unlock(&state->owner->so_lock);
1057 }
34310430
TM
1058 rcu_read_lock();
1059 delegation = rcu_dereference(nfsi->delegation);
652f89f6 1060 if (!can_open_delegated(delegation, fmode)) {
34310430 1061 rcu_read_unlock();
aac00a8d 1062 break;
34310430 1063 }
aac00a8d 1064 /* Save the delegation */
f597c537 1065 nfs4_stateid_copy(&stateid, &delegation->stateid);
aac00a8d 1066 rcu_read_unlock();
af22f94a 1067 ret = nfs_may_open(state->inode, state->owner->so_cred, open_mode);
aac00a8d
TM
1068 if (ret != 0)
1069 goto out;
1070 ret = -EAGAIN;
34310430
TM
1071
1072 /* Try to update the stateid using the delegation */
dc0b027d 1073 if (update_open_stateid(state, NULL, &stateid, fmode))
34310430 1074 goto out_return_state;
aac00a8d 1075 }
aac00a8d
TM
1076out:
1077 return ERR_PTR(ret);
1078out_return_state:
1079 atomic_inc(&state->count);
1080 return state;
1081}
1082
24ac23ab
TM
1083static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
1084{
1085 struct inode *inode;
1086 struct nfs4_state *state = NULL;
003707c7 1087 struct nfs_delegation *delegation;
1b370bc2 1088 int ret;
24ac23ab 1089
aac00a8d 1090 if (!data->rpc_done) {
6ee41268 1091 state = nfs4_try_open_cached(data);
aac00a8d
TM
1092 goto out;
1093 }
1094
1b370bc2 1095 ret = -EAGAIN;
24ac23ab 1096 if (!(data->f_attr.valid & NFS_ATTR_FATTR))
1b370bc2 1097 goto err;
24ac23ab 1098 inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr);
1b370bc2 1099 ret = PTR_ERR(inode);
03f28e3a 1100 if (IS_ERR(inode))
1b370bc2
TM
1101 goto err;
1102 ret = -ENOMEM;
24ac23ab
TM
1103 state = nfs4_get_open_state(inode, data->owner);
1104 if (state == NULL)
1b370bc2 1105 goto err_put_inode;
549d6ed5 1106 if (data->o_res.delegation_type != 0) {
4e0038b6 1107 struct nfs_client *clp = NFS_SERVER(inode)->nfs_client;
549d6ed5
TM
1108 int delegation_flags = 0;
1109
003707c7
TM
1110 rcu_read_lock();
1111 delegation = rcu_dereference(NFS_I(inode)->delegation);
1112 if (delegation)
1113 delegation_flags = delegation->flags;
1114 rcu_read_unlock();
652f89f6
TM
1115 if (data->o_arg.claim == NFS4_OPEN_CLAIM_DELEGATE_CUR) {
1116 pr_err_ratelimited("NFS: Broken NFSv4 server %s is "
1117 "returning a delegation for "
1118 "OPEN(CLAIM_DELEGATE_CUR)\n",
4e0038b6 1119 clp->cl_hostname);
652f89f6 1120 } else if ((delegation_flags & 1UL<<NFS_DELEGATION_NEED_RECLAIM) == 0)
549d6ed5
TM
1121 nfs_inode_set_delegation(state->inode,
1122 data->owner->so_cred,
1123 &data->o_res);
1124 else
1125 nfs_inode_reclaim_delegation(state->inode,
1126 data->owner->so_cred,
1127 &data->o_res);
1128 }
34310430
TM
1129
1130 update_open_stateid(state, &data->o_res.stateid, NULL,
dc0b027d 1131 data->o_arg.fmode);
24ac23ab 1132 iput(inode);
aac00a8d 1133out:
24ac23ab 1134 return state;
1b370bc2
TM
1135err_put_inode:
1136 iput(inode);
1137err:
1138 return ERR_PTR(ret);
24ac23ab
TM
1139}
1140
864472e9
TM
1141static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
1142{
1143 struct nfs_inode *nfsi = NFS_I(state->inode);
1144 struct nfs_open_context *ctx;
1145
1146 spin_lock(&state->inode->i_lock);
1147 list_for_each_entry(ctx, &nfsi->open_files, list) {
1148 if (ctx->state != state)
1149 continue;
1150 get_nfs_open_context(ctx);
1151 spin_unlock(&state->inode->i_lock);
1152 return ctx;
1153 }
1154 spin_unlock(&state->inode->i_lock);
1155 return ERR_PTR(-ENOENT);
1156}
1157
6f220ed5
TM
1158static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx, struct nfs4_state *state)
1159{
1160 struct nfs4_opendata *opendata;
1161
3d4ff43d 1162 opendata = nfs4_opendata_alloc(ctx->dentry, state->owner, 0, 0, NULL, GFP_NOFS);
6f220ed5
TM
1163 if (opendata == NULL)
1164 return ERR_PTR(-ENOMEM);
1165 opendata->state = state;
1166 atomic_inc(&state->count);
1167 return opendata;
1168}
1169
dc0b027d 1170static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, fmode_t fmode, struct nfs4_state **res)
864472e9 1171{
2ced46c2 1172 struct nfs4_state *newstate;
864472e9
TM
1173 int ret;
1174
dc0b027d
TM
1175 opendata->o_arg.open_flags = 0;
1176 opendata->o_arg.fmode = fmode;
2ced46c2
TM
1177 memset(&opendata->o_res, 0, sizeof(opendata->o_res));
1178 memset(&opendata->c_res, 0, sizeof(opendata->c_res));
1179 nfs4_init_opendata_res(opendata);
b257957e 1180 ret = _nfs4_recover_proc_open(opendata);
864472e9
TM
1181 if (ret != 0)
1182 return ret;
2ced46c2 1183 newstate = nfs4_opendata_to_nfs4_state(opendata);
1b370bc2
TM
1184 if (IS_ERR(newstate))
1185 return PTR_ERR(newstate);
643168c2 1186 nfs4_close_state(newstate, fmode);
2ced46c2 1187 *res = newstate;
864472e9
TM
1188 return 0;
1189}
1190
1191static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
1192{
864472e9 1193 struct nfs4_state *newstate;
864472e9
TM
1194 int ret;
1195
1196 /* memory barrier prior to reading state->n_* */
2ced46c2 1197 clear_bit(NFS_DELEGATED_STATE, &state->flags);
864472e9
TM
1198 smp_rmb();
1199 if (state->n_rdwr != 0) {
b0ed9dbc 1200 clear_bit(NFS_O_RDWR_STATE, &state->flags);
2ced46c2 1201 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &newstate);
864472e9
TM
1202 if (ret != 0)
1203 return ret;
2ced46c2
TM
1204 if (newstate != state)
1205 return -ESTALE;
864472e9
TM
1206 }
1207 if (state->n_wronly != 0) {
b0ed9dbc 1208 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2ced46c2 1209 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &newstate);
864472e9
TM
1210 if (ret != 0)
1211 return ret;
2ced46c2
TM
1212 if (newstate != state)
1213 return -ESTALE;
864472e9
TM
1214 }
1215 if (state->n_rdonly != 0) {
b0ed9dbc 1216 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2ced46c2 1217 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &newstate);
864472e9
TM
1218 if (ret != 0)
1219 return ret;
2ced46c2
TM
1220 if (newstate != state)
1221 return -ESTALE;
864472e9 1222 }
1ac7e2fd
TM
1223 /*
1224 * We may have performed cached opens for all three recoveries.
1225 * Check if we need to update the current stateid.
1226 */
1227 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0 &&
f597c537 1228 !nfs4_stateid_match(&state->stateid, &state->open_stateid)) {
8bda4e4c 1229 write_seqlock(&state->seqlock);
1ac7e2fd 1230 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
f597c537 1231 nfs4_stateid_copy(&state->stateid, &state->open_stateid);
8bda4e4c 1232 write_sequnlock(&state->seqlock);
1ac7e2fd 1233 }
864472e9
TM
1234 return 0;
1235}
1236
1da177e4
LT
1237/*
1238 * OPEN_RECLAIM:
1239 * reclaim state on the server after a reboot.
1da177e4 1240 */
539cd03a 1241static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1242{
1ac7e2fd 1243 struct nfs_delegation *delegation;
864472e9 1244 struct nfs4_opendata *opendata;
dc0b027d 1245 fmode_t delegation_type = 0;
1da177e4
LT
1246 int status;
1247
6f220ed5
TM
1248 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1249 if (IS_ERR(opendata))
1250 return PTR_ERR(opendata);
864472e9
TM
1251 opendata->o_arg.claim = NFS4_OPEN_CLAIM_PREVIOUS;
1252 opendata->o_arg.fh = NFS_FH(state->inode);
1ac7e2fd
TM
1253 rcu_read_lock();
1254 delegation = rcu_dereference(NFS_I(state->inode)->delegation);
15c831bf 1255 if (delegation != NULL && test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags) != 0)
65bbf6bd 1256 delegation_type = delegation->type;
1ac7e2fd 1257 rcu_read_unlock();
864472e9
TM
1258 opendata->o_arg.u.delegation_type = delegation_type;
1259 status = nfs4_open_recover(opendata, state);
c6d00e63 1260 nfs4_opendata_put(opendata);
1da177e4
LT
1261 return status;
1262}
1263
539cd03a 1264static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
1265{
1266 struct nfs_server *server = NFS_SERVER(state->inode);
1267 struct nfs4_exception exception = { };
1268 int err;
1269 do {
539cd03a 1270 err = _nfs4_do_open_reclaim(ctx, state);
168667c4 1271 if (err != -NFS4ERR_DELAY)
202b50dc
TM
1272 break;
1273 nfs4_handle_exception(server, err, &exception);
1da177e4
LT
1274 } while (exception.retry);
1275 return err;
1276}
1277
864472e9
TM
1278static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
1279{
1280 struct nfs_open_context *ctx;
1281 int ret;
1282
1283 ctx = nfs4_state_find_open_context(state);
1284 if (IS_ERR(ctx))
1285 return PTR_ERR(ctx);
539cd03a 1286 ret = nfs4_do_open_reclaim(ctx, state);
864472e9
TM
1287 put_nfs_open_context(ctx);
1288 return ret;
1289}
1290
13437e12 1291static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1da177e4 1292{
e56e0b78 1293 struct nfs4_opendata *opendata;
864472e9 1294 int ret;
1da177e4 1295
6f220ed5
TM
1296 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1297 if (IS_ERR(opendata))
1298 return PTR_ERR(opendata);
e56e0b78 1299 opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELEGATE_CUR;
f597c537 1300 nfs4_stateid_copy(&opendata->o_arg.u.delegation, stateid);
864472e9 1301 ret = nfs4_open_recover(opendata, state);
c6d00e63 1302 nfs4_opendata_put(opendata);
864472e9 1303 return ret;
1da177e4
LT
1304}
1305
13437e12 1306int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1da177e4
LT
1307{
1308 struct nfs4_exception exception = { };
539cd03a 1309 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4
LT
1310 int err;
1311 do {
13437e12 1312 err = _nfs4_open_delegation_recall(ctx, state, stateid);
1da177e4
LT
1313 switch (err) {
1314 case 0:
965b5d67
TM
1315 case -ENOENT:
1316 case -ESTALE:
1317 goto out;
bcfa49f6
RL
1318 case -NFS4ERR_BADSESSION:
1319 case -NFS4ERR_BADSLOT:
1320 case -NFS4ERR_BAD_HIGH_SLOT:
1321 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1322 case -NFS4ERR_DEADSESSION:
0400a6b0 1323 nfs4_schedule_session_recovery(server->nfs_client->cl_session);
bcfa49f6 1324 goto out;
1da177e4
LT
1325 case -NFS4ERR_STALE_CLIENTID:
1326 case -NFS4ERR_STALE_STATEID:
1327 case -NFS4ERR_EXPIRED:
1328 /* Don't recall a delegation if it was lost */
0400a6b0 1329 nfs4_schedule_lease_recovery(server->nfs_client);
965b5d67
TM
1330 goto out;
1331 case -ERESTARTSYS:
1332 /*
1333 * The show must go on: exit, but mark the
1334 * stateid as needing recovery.
1335 */
a1d0b5ee 1336 case -NFS4ERR_DELEG_REVOKED:
965b5d67
TM
1337 case -NFS4ERR_ADMIN_REVOKED:
1338 case -NFS4ERR_BAD_STATEID:
a1d0b5ee
TM
1339 nfs_inode_find_state_and_recover(state->inode,
1340 stateid);
0400a6b0 1341 nfs4_schedule_stateid_recovery(server, state);
168667c4
TM
1342 case -EKEYEXPIRED:
1343 /*
1344 * User RPCSEC_GSS context has expired.
1345 * We cannot recover this stateid now, so
1346 * skip it and allow recovery thread to
1347 * proceed.
1348 */
965b5d67
TM
1349 case -ENOMEM:
1350 err = 0;
1351 goto out;
1da177e4
LT
1352 }
1353 err = nfs4_handle_exception(server, err, &exception);
1354 } while (exception.retry);
965b5d67 1355out:
1da177e4
LT
1356 return err;
1357}
1358
cdd4e68b
TM
1359static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
1360{
1361 struct nfs4_opendata *data = calldata;
1362
1363 data->rpc_status = task->tk_status;
26e976a8 1364 if (data->rpc_status == 0) {
f597c537 1365 nfs4_stateid_copy(&data->o_res.stateid, &data->c_res.stateid);
bb22629e 1366 nfs_confirm_seqid(&data->owner->so_seqid, 0);
26e976a8 1367 renew_lease(data->o_res.server, data->timestamp);
3e309914 1368 data->rpc_done = 1;
26e976a8 1369 }
cdd4e68b
TM
1370}
1371
1372static void nfs4_open_confirm_release(void *calldata)
1373{
1374 struct nfs4_opendata *data = calldata;
1375 struct nfs4_state *state = NULL;
1376
1377 /* If this request hasn't been cancelled, do nothing */
1378 if (data->cancelled == 0)
1379 goto out_free;
1380 /* In case of error, no cleanup! */
3e309914 1381 if (!data->rpc_done)
cdd4e68b 1382 goto out_free;
cdd4e68b 1383 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1384 if (!IS_ERR(state))
643168c2 1385 nfs4_close_state(state, data->o_arg.fmode);
cdd4e68b 1386out_free:
c6d00e63 1387 nfs4_opendata_put(data);
cdd4e68b
TM
1388}
1389
1390static const struct rpc_call_ops nfs4_open_confirm_ops = {
cdd4e68b
TM
1391 .rpc_call_done = nfs4_open_confirm_done,
1392 .rpc_release = nfs4_open_confirm_release,
1393};
1394
1395/*
1396 * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
1397 */
1398static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
1399{
1400 struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
1401 struct rpc_task *task;
5138fde0
TM
1402 struct rpc_message msg = {
1403 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
1404 .rpc_argp = &data->c_arg,
1405 .rpc_resp = &data->c_res,
1406 .rpc_cred = data->owner->so_cred,
1407 };
c970aa85
TM
1408 struct rpc_task_setup task_setup_data = {
1409 .rpc_client = server->client,
5138fde0 1410 .rpc_message = &msg,
c970aa85
TM
1411 .callback_ops = &nfs4_open_confirm_ops,
1412 .callback_data = data,
101070ca 1413 .workqueue = nfsiod_workqueue,
c970aa85
TM
1414 .flags = RPC_TASK_ASYNC,
1415 };
1da177e4
LT
1416 int status;
1417
c6d00e63 1418 kref_get(&data->kref);
3e309914
TM
1419 data->rpc_done = 0;
1420 data->rpc_status = 0;
5138fde0 1421 data->timestamp = jiffies;
c970aa85 1422 task = rpc_run_task(&task_setup_data);
7a1218a2 1423 if (IS_ERR(task))
cdd4e68b 1424 return PTR_ERR(task);
cdd4e68b
TM
1425 status = nfs4_wait_for_completion_rpc_task(task);
1426 if (status != 0) {
1427 data->cancelled = 1;
1428 smp_wmb();
1429 } else
1430 status = data->rpc_status;
e6b3c4db 1431 rpc_put_task(task);
1da177e4
LT
1432 return status;
1433}
1434
24ac23ab 1435static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1da177e4 1436{
24ac23ab
TM
1437 struct nfs4_opendata *data = calldata;
1438 struct nfs4_state_owner *sp = data->owner;
5138fde0 1439
24ac23ab
TM
1440 if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
1441 return;
aac00a8d
TM
1442 /*
1443 * Check if we still need to send an OPEN call, or if we can use
1444 * a delegation instead.
1445 */
1446 if (data->state != NULL) {
1447 struct nfs_delegation *delegation;
1448
dc0b027d 1449 if (can_open_cached(data->state, data->o_arg.fmode, data->o_arg.open_flags))
6ee41268 1450 goto out_no_action;
aac00a8d
TM
1451 rcu_read_lock();
1452 delegation = rcu_dereference(NFS_I(data->state->inode)->delegation);
652f89f6
TM
1453 if (data->o_arg.claim != NFS4_OPEN_CLAIM_DELEGATE_CUR &&
1454 can_open_delegated(delegation, data->o_arg.fmode))
1455 goto unlock_no_action;
aac00a8d
TM
1456 rcu_read_unlock();
1457 }
24ac23ab 1458 /* Update sequence id. */
48c22eb2 1459 data->o_arg.id = sp->so_seqid.owner_id;
1f0e890d 1460 data->o_arg.clientid = sp->so_server->nfs_client->cl_clientid;
6f220ed5 1461 if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS) {
5138fde0 1462 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
6f220ed5
TM
1463 nfs_copy_fh(&data->o_res.fh, data->o_arg.fh);
1464 }
26e976a8 1465 data->timestamp = jiffies;
035168ab 1466 if (nfs4_setup_sequence(data->o_arg.server,
d898528c 1467 &data->o_arg.seq_args,
9d12b216 1468 &data->o_res.seq_res, task))
d898528c 1469 return;
5138fde0 1470 rpc_call_start(task);
6ee41268 1471 return;
652f89f6
TM
1472unlock_no_action:
1473 rcu_read_unlock();
6ee41268
TM
1474out_no_action:
1475 task->tk_action = NULL;
1476
24ac23ab 1477}
1da177e4 1478
b257957e
AB
1479static void nfs4_recover_open_prepare(struct rpc_task *task, void *calldata)
1480{
1481 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
1482 nfs4_open_prepare(task, calldata);
1483}
1484
24ac23ab
TM
1485static void nfs4_open_done(struct rpc_task *task, void *calldata)
1486{
1487 struct nfs4_opendata *data = calldata;
1da177e4 1488
24ac23ab 1489 data->rpc_status = task->tk_status;
d898528c 1490
14516c3a
TM
1491 if (!nfs4_sequence_done(task, &data->o_res.seq_res))
1492 return;
d898528c 1493
24ac23ab
TM
1494 if (task->tk_status == 0) {
1495 switch (data->o_res.f_attr->mode & S_IFMT) {
6f926b5b
TM
1496 case S_IFREG:
1497 break;
1498 case S_IFLNK:
24ac23ab 1499 data->rpc_status = -ELOOP;
6f926b5b
TM
1500 break;
1501 case S_IFDIR:
24ac23ab 1502 data->rpc_status = -EISDIR;
6f926b5b
TM
1503 break;
1504 default:
24ac23ab 1505 data->rpc_status = -ENOTDIR;
6f926b5b 1506 }
26e976a8 1507 renew_lease(data->o_res.server, data->timestamp);
0f9f95e0
TM
1508 if (!(data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM))
1509 nfs_confirm_seqid(&data->owner->so_seqid, 0);
6f926b5b 1510 }
3e309914 1511 data->rpc_done = 1;
24ac23ab 1512}
6f926b5b 1513
24ac23ab
TM
1514static void nfs4_open_release(void *calldata)
1515{
1516 struct nfs4_opendata *data = calldata;
1517 struct nfs4_state *state = NULL;
1518
1519 /* If this request hasn't been cancelled, do nothing */
1520 if (data->cancelled == 0)
1521 goto out_free;
1522 /* In case of error, no cleanup! */
3e309914 1523 if (data->rpc_status != 0 || !data->rpc_done)
24ac23ab
TM
1524 goto out_free;
1525 /* In case we need an open_confirm, no cleanup! */
1526 if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
1527 goto out_free;
24ac23ab 1528 state = nfs4_opendata_to_nfs4_state(data);
1b370bc2 1529 if (!IS_ERR(state))
643168c2 1530 nfs4_close_state(state, data->o_arg.fmode);
24ac23ab 1531out_free:
c6d00e63 1532 nfs4_opendata_put(data);
24ac23ab
TM
1533}
1534
1535static const struct rpc_call_ops nfs4_open_ops = {
1536 .rpc_call_prepare = nfs4_open_prepare,
1537 .rpc_call_done = nfs4_open_done,
1538 .rpc_release = nfs4_open_release,
1539};
1540
b257957e
AB
1541static const struct rpc_call_ops nfs4_recover_open_ops = {
1542 .rpc_call_prepare = nfs4_recover_open_prepare,
1543 .rpc_call_done = nfs4_open_done,
1544 .rpc_release = nfs4_open_release,
1545};
1546
1547static int nfs4_run_open_task(struct nfs4_opendata *data, int isrecover)
24ac23ab
TM
1548{
1549 struct inode *dir = data->dir->d_inode;
1550 struct nfs_server *server = NFS_SERVER(dir);
1551 struct nfs_openargs *o_arg = &data->o_arg;
1552 struct nfs_openres *o_res = &data->o_res;
1553 struct rpc_task *task;
5138fde0
TM
1554 struct rpc_message msg = {
1555 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
1556 .rpc_argp = o_arg,
1557 .rpc_resp = o_res,
1558 .rpc_cred = data->owner->so_cred,
1559 };
c970aa85
TM
1560 struct rpc_task_setup task_setup_data = {
1561 .rpc_client = server->client,
5138fde0 1562 .rpc_message = &msg,
c970aa85
TM
1563 .callback_ops = &nfs4_open_ops,
1564 .callback_data = data,
101070ca 1565 .workqueue = nfsiod_workqueue,
c970aa85
TM
1566 .flags = RPC_TASK_ASYNC,
1567 };
24ac23ab
TM
1568 int status;
1569
9d12b216 1570 nfs41_init_sequence(&o_arg->seq_args, &o_res->seq_res, 1);
c6d00e63 1571 kref_get(&data->kref);
3e309914
TM
1572 data->rpc_done = 0;
1573 data->rpc_status = 0;
2ced46c2 1574 data->cancelled = 0;
b257957e
AB
1575 if (isrecover)
1576 task_setup_data.callback_ops = &nfs4_recover_open_ops;
c970aa85 1577 task = rpc_run_task(&task_setup_data);
b257957e
AB
1578 if (IS_ERR(task))
1579 return PTR_ERR(task);
1580 status = nfs4_wait_for_completion_rpc_task(task);
1581 if (status != 0) {
1582 data->cancelled = 1;
1583 smp_wmb();
1584 } else
1585 status = data->rpc_status;
1586 rpc_put_task(task);
1587
1588 return status;
1589}
1590
1591static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
1592{
1593 struct inode *dir = data->dir->d_inode;
1594 struct nfs_openres *o_res = &data->o_res;
1595 int status;
1596
1597 status = nfs4_run_open_task(data, 1);
1598 if (status != 0 || !data->rpc_done)
1599 return status;
1600
6926afd1
TM
1601 nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_attr);
1602
b257957e
AB
1603 nfs_refresh_inode(dir, o_res->dir_attr);
1604
1605 if (o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
1606 status = _nfs4_proc_open_confirm(data);
1607 if (status != 0)
1608 return status;
1609 }
1610
1611 return status;
1612}
1613
1614/*
1615 * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
1616 */
1617static int _nfs4_proc_open(struct nfs4_opendata *data)
1618{
1619 struct inode *dir = data->dir->d_inode;
1620 struct nfs_server *server = NFS_SERVER(dir);
1621 struct nfs_openargs *o_arg = &data->o_arg;
1622 struct nfs_openres *o_res = &data->o_res;
1623 int status;
1624
1625 status = nfs4_run_open_task(data, 0);
08ef7bd3
TM
1626 if (!data->rpc_done)
1627 return status;
1628 if (status != 0) {
1629 if (status == -NFS4ERR_BADNAME &&
1630 !(o_arg->open_flags & O_CREAT))
1631 return -ENOENT;
24ac23ab 1632 return status;
08ef7bd3 1633 }
24ac23ab 1634
6926afd1
TM
1635 nfs_fattr_map_and_free_names(server, &data->f_attr);
1636
56ae19f3
TM
1637 if (o_arg->open_flags & O_CREAT) {
1638 update_changeattr(dir, &o_res->cinfo);
1639 nfs_post_op_update_inode(dir, o_res->dir_attr);
1640 } else
1641 nfs_refresh_inode(dir, o_res->dir_attr);
0df5dd4a
TM
1642 if ((o_res->rflags & NFS4_OPEN_RESULT_LOCKTYPE_POSIX) == 0)
1643 server->caps &= ~NFS_CAP_POSIX_LOCK;
1da177e4 1644 if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
cdd4e68b 1645 status = _nfs4_proc_open_confirm(data);
1da177e4 1646 if (status != 0)
24ac23ab 1647 return status;
1da177e4
LT
1648 }
1649 if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
9936781d 1650 _nfs4_proc_getattr(server, &o_res->fh, o_res->f_attr);
24ac23ab 1651 return 0;
1da177e4
LT
1652}
1653
d83217c1 1654static int nfs4_client_recover_expired_lease(struct nfs_client *clp)
58d9714a 1655{
a78cb57a 1656 unsigned int loop;
6b30954e 1657 int ret;
58d9714a 1658
a78cb57a 1659 for (loop = NFS4_MAX_LOOP_ON_RECOVER; loop != 0; loop--) {
65de872e 1660 ret = nfs4_wait_clnt_recover(clp);
6b30954e 1661 if (ret != 0)
a78cb57a 1662 break;
e598d843
TM
1663 if (!test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state) &&
1664 !test_bit(NFS4CLNT_CHECK_LEASE,&clp->cl_state))
6b30954e 1665 break;
0400a6b0 1666 nfs4_schedule_state_manager(clp);
a78cb57a 1667 ret = -EIO;
6b30954e 1668 }
a78cb57a 1669 return ret;
58d9714a
TM
1670}
1671
d83217c1
AA
1672static int nfs4_recover_expired_lease(struct nfs_server *server)
1673{
1674 return nfs4_client_recover_expired_lease(server->nfs_client);
1675}
1676
1da177e4
LT
1677/*
1678 * OPEN_EXPIRED:
1679 * reclaim state on the server after a network partition.
1680 * Assumes caller holds the appropriate lock
1681 */
539cd03a 1682static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 1683{
e56e0b78 1684 struct nfs4_opendata *opendata;
864472e9 1685 int ret;
1da177e4 1686
6f220ed5
TM
1687 opendata = nfs4_open_recoverdata_alloc(ctx, state);
1688 if (IS_ERR(opendata))
1689 return PTR_ERR(opendata);
864472e9 1690 ret = nfs4_open_recover(opendata, state);
35d05778 1691 if (ret == -ESTALE)
3d4ff43d 1692 d_drop(ctx->dentry);
c6d00e63 1693 nfs4_opendata_put(opendata);
864472e9 1694 return ret;
1da177e4
LT
1695}
1696
a9ed2e25 1697static int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
202b50dc 1698{
539cd03a 1699 struct nfs_server *server = NFS_SERVER(state->inode);
202b50dc
TM
1700 struct nfs4_exception exception = { };
1701 int err;
1702
1703 do {
539cd03a 1704 err = _nfs4_open_expired(ctx, state);
a9ed2e25
TM
1705 switch (err) {
1706 default:
1707 goto out;
1708 case -NFS4ERR_GRACE:
1709 case -NFS4ERR_DELAY:
1710 nfs4_handle_exception(server, err, &exception);
1711 err = 0;
1712 }
202b50dc 1713 } while (exception.retry);
a9ed2e25 1714out:
202b50dc
TM
1715 return err;
1716}
1717
1da177e4
LT
1718static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
1719{
1da177e4 1720 struct nfs_open_context *ctx;
864472e9 1721 int ret;
1da177e4 1722
864472e9
TM
1723 ctx = nfs4_state_find_open_context(state);
1724 if (IS_ERR(ctx))
1725 return PTR_ERR(ctx);
539cd03a 1726 ret = nfs4_do_open_expired(ctx, state);
864472e9
TM
1727 put_nfs_open_context(ctx);
1728 return ret;
1da177e4
LT
1729}
1730
f062eb6c 1731#if defined(CONFIG_NFS_V4_1)
b01dd1d8 1732static int nfs41_check_expired_stateid(struct nfs4_state *state, nfs4_stateid *stateid, unsigned int flags)
f062eb6c 1733{
b01dd1d8 1734 int status = NFS_OK;
f062eb6c
BS
1735 struct nfs_server *server = NFS_SERVER(state->inode);
1736
b01dd1d8
BS
1737 if (state->flags & flags) {
1738 status = nfs41_test_stateid(server, stateid);
1739 if (status != NFS_OK) {
1740 nfs41_free_stateid(server, stateid);
1741 state->flags &= ~flags;
1742 }
1743 }
1744 return status;
1745}
1746
1747static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
1748{
1749 int deleg_status, open_status;
1750 int deleg_flags = 1 << NFS_DELEGATED_STATE;
1751 int open_flags = (1 << NFS_O_RDONLY_STATE) | (1 << NFS_O_WRONLY_STATE) | (1 << NFS_O_RDWR_STATE);
1752
1753 deleg_status = nfs41_check_expired_stateid(state, &state->stateid, deleg_flags);
1754 open_status = nfs41_check_expired_stateid(state, &state->open_stateid, open_flags);
1755
1756 if ((deleg_status == NFS_OK) && (open_status == NFS_OK))
1757 return NFS_OK;
f062eb6c
BS
1758 return nfs4_open_expired(sp, state);
1759}
1760#endif
1761
aa53ed54
JL
1762/*
1763 * on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
1764 * fields corresponding to attributes that were used to store the verifier.
1765 * Make sure we clobber those fields in the later setattr call
1766 */
1767static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
1768{
1769 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
1770 !(sattr->ia_valid & ATTR_ATIME_SET))
1771 sattr->ia_valid |= ATTR_ATIME;
1772
1773 if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
1774 !(sattr->ia_valid & ATTR_MTIME_SET))
1775 sattr->ia_valid |= ATTR_MTIME;
1776}
1777
1da177e4 1778/*
24ac23ab 1779 * Returns a referenced nfs4_state
1da177e4 1780 */
82a2c1b7 1781static int _nfs4_do_open(struct inode *dir, struct dentry *dentry, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
1da177e4
LT
1782{
1783 struct nfs4_state_owner *sp;
1784 struct nfs4_state *state = NULL;
1785 struct nfs_server *server = NFS_SERVER(dir);
e56e0b78 1786 struct nfs4_opendata *opendata;
aac00a8d 1787 int status;
1da177e4
LT
1788
1789 /* Protect against reboot recovery conflicts */
1da177e4 1790 status = -ENOMEM;
d1e284d5
TM
1791 sp = nfs4_get_state_owner(server, cred, GFP_KERNEL);
1792 if (sp == NULL) {
1da177e4
LT
1793 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
1794 goto out_err;
1795 }
58d9714a
TM
1796 status = nfs4_recover_expired_lease(server);
1797 if (status != 0)
b4454fe1 1798 goto err_put_state_owner;
82a2c1b7
AV
1799 if (dentry->d_inode != NULL)
1800 nfs4_return_incompatible_delegation(dentry->d_inode, fmode);
58d9714a 1801 status = -ENOMEM;
82a2c1b7 1802 opendata = nfs4_opendata_alloc(dentry, sp, fmode, flags, sattr, GFP_KERNEL);
e56e0b78 1803 if (opendata == NULL)
95d35cb4 1804 goto err_put_state_owner;
1da177e4 1805
82a2c1b7
AV
1806 if (dentry->d_inode != NULL)
1807 opendata->state = nfs4_get_open_state(dentry->d_inode, sp);
aac00a8d 1808
24ac23ab 1809 status = _nfs4_proc_open(opendata);
1da177e4 1810 if (status != 0)
c6d00e63 1811 goto err_opendata_put;
1da177e4 1812
24ac23ab 1813 state = nfs4_opendata_to_nfs4_state(opendata);
1b370bc2
TM
1814 status = PTR_ERR(state);
1815 if (IS_ERR(state))
c6d00e63 1816 goto err_opendata_put;
0df5dd4a 1817 if (server->caps & NFS_CAP_POSIX_LOCK)
8e469ebd 1818 set_bit(NFS_STATE_POSIX_LOCKS, &state->flags);
0ab64e0e
TM
1819
1820 if (opendata->o_arg.open_flags & O_EXCL) {
1821 nfs4_exclusive_attrset(opendata, sattr);
1822
1823 nfs_fattr_init(opendata->o_res.f_attr);
1824 status = nfs4_do_setattr(state->inode, cred,
1825 opendata->o_res.f_attr, sattr,
1826 state);
1827 if (status == 0)
1828 nfs_setattr_update_inode(state->inode, sattr);
1829 nfs_post_op_update_inode(state->inode, opendata->o_res.f_attr);
1830 }
c6d00e63 1831 nfs4_opendata_put(opendata);
1da177e4 1832 nfs4_put_state_owner(sp);
1da177e4
LT
1833 *res = state;
1834 return 0;
c6d00e63
TM
1835err_opendata_put:
1836 nfs4_opendata_put(opendata);
e56e0b78
TM
1837err_put_state_owner:
1838 nfs4_put_state_owner(sp);
1da177e4 1839out_err:
1da177e4
LT
1840 *res = NULL;
1841 return status;
1842}
1843
1844
82a2c1b7 1845static struct nfs4_state *nfs4_do_open(struct inode *dir, struct dentry *dentry, fmode_t fmode, int flags, struct iattr *sattr, struct rpc_cred *cred)
1da177e4
LT
1846{
1847 struct nfs4_exception exception = { };
1848 struct nfs4_state *res;
1849 int status;
1850
1851 do {
82a2c1b7 1852 status = _nfs4_do_open(dir, dentry, fmode, flags, sattr, cred, &res);
1da177e4
LT
1853 if (status == 0)
1854 break;
1855 /* NOTE: BAD_SEQID means the server and client disagree about the
1856 * book-keeping w.r.t. state-changing operations
1857 * (OPEN/CLOSE/LOCK/LOCKU...)
1858 * It is actually a sign of a bug on the client or on the server.
1859 *
1860 * If we receive a BAD_SEQID error in the particular case of
cee54fc9 1861 * doing an OPEN, we assume that nfs_increment_open_seqid() will
1da177e4
LT
1862 * have unhashed the old state_owner for us, and that we can
1863 * therefore safely retry using a new one. We should still warn
1864 * the user though...
1865 */
1866 if (status == -NFS4ERR_BAD_SEQID) {
6f43ddcc
TM
1867 printk(KERN_WARNING "NFS: v4 server %s "
1868 " returned a bad sequence-id error!\n",
1869 NFS_SERVER(dir)->nfs_client->cl_hostname);
1da177e4
LT
1870 exception.retry = 1;
1871 continue;
1872 }
550f5747
TM
1873 /*
1874 * BAD_STATEID on OPEN means that the server cancelled our
1875 * state before it received the OPEN_CONFIRM.
1876 * Recover by retrying the request as per the discussion
1877 * on Page 181 of RFC3530.
1878 */
1879 if (status == -NFS4ERR_BAD_STATEID) {
1880 exception.retry = 1;
1881 continue;
1882 }
aac00a8d
TM
1883 if (status == -EAGAIN) {
1884 /* We must have found a delegation */
1885 exception.retry = 1;
1886 continue;
1887 }
1da177e4
LT
1888 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(dir),
1889 status, &exception));
1890 } while (exception.retry);
1891 return res;
1892}
1893
659bfcd6
TM
1894static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
1895 struct nfs_fattr *fattr, struct iattr *sattr,
1896 struct nfs4_state *state)
1da177e4 1897{
3e4f6290 1898 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 1899 struct nfs_setattrargs arg = {
3e4f6290 1900 .fh = NFS_FH(inode),
1da177e4
LT
1901 .iap = sattr,
1902 .server = server,
1903 .bitmask = server->attr_bitmask,
1904 };
1905 struct nfs_setattrres res = {
1906 .fattr = fattr,
1907 .server = server,
1908 };
1909 struct rpc_message msg = {
659bfcd6
TM
1910 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
1911 .rpc_argp = &arg,
1912 .rpc_resp = &res,
1913 .rpc_cred = cred,
1da177e4 1914 };
26e976a8 1915 unsigned long timestamp = jiffies;
65e4308d 1916 int status;
1da177e4 1917
0e574af1 1918 nfs_fattr_init(fattr);
1da177e4 1919
3e4f6290
TM
1920 if (nfs4_copy_delegation_stateid(&arg.stateid, inode)) {
1921 /* Use that stateid */
1922 } else if (state != NULL) {
1e3987c3 1923 nfs4_select_rw_stateid(&arg.stateid, state, current->files, current->tgid);
08e9eac4 1924 } else
f597c537 1925 nfs4_stateid_copy(&arg.stateid, &zero_stateid);
1da177e4 1926
7c513058 1927 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
26e976a8
TM
1928 if (status == 0 && state != NULL)
1929 renew_lease(server, timestamp);
65e4308d 1930 return status;
1da177e4
LT
1931}
1932
659bfcd6
TM
1933static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
1934 struct nfs_fattr *fattr, struct iattr *sattr,
1935 struct nfs4_state *state)
1da177e4 1936{
3e4f6290 1937 struct nfs_server *server = NFS_SERVER(inode);
a1d0b5ee
TM
1938 struct nfs4_exception exception = {
1939 .state = state,
1940 };
1da177e4
LT
1941 int err;
1942 do {
1943 err = nfs4_handle_exception(server,
659bfcd6 1944 _nfs4_do_setattr(inode, cred, fattr, sattr, state),
1da177e4
LT
1945 &exception);
1946 } while (exception.retry);
1947 return err;
1948}
1949
1950struct nfs4_closedata {
1951 struct inode *inode;
1952 struct nfs4_state *state;
1953 struct nfs_closeargs arg;
1954 struct nfs_closeres res;
516a6af6 1955 struct nfs_fattr fattr;
26e976a8 1956 unsigned long timestamp;
f7e8917a
FI
1957 bool roc;
1958 u32 roc_barrier;
1da177e4
LT
1959};
1960
963d8fe5 1961static void nfs4_free_closedata(void *data)
9512135d 1962{
963d8fe5
TM
1963 struct nfs4_closedata *calldata = data;
1964 struct nfs4_state_owner *sp = calldata->state->owner;
643168c2 1965 struct super_block *sb = calldata->state->inode->i_sb;
9512135d 1966
f7e8917a
FI
1967 if (calldata->roc)
1968 pnfs_roc_release(calldata->state->inode);
9512135d
TM
1969 nfs4_put_open_state(calldata->state);
1970 nfs_free_seqid(calldata->arg.seqid);
9512135d 1971 nfs4_put_state_owner(sp);
643168c2 1972 nfs_sb_deactive(sb);
9512135d
TM
1973 kfree(calldata);
1974}
1975
88069f77
TM
1976static void nfs4_close_clear_stateid_flags(struct nfs4_state *state,
1977 fmode_t fmode)
1978{
1979 spin_lock(&state->owner->so_lock);
1980 if (!(fmode & FMODE_READ))
1981 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
1982 if (!(fmode & FMODE_WRITE))
1983 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
1984 clear_bit(NFS_O_RDWR_STATE, &state->flags);
1985 spin_unlock(&state->owner->so_lock);
1986}
1987
963d8fe5 1988static void nfs4_close_done(struct rpc_task *task, void *data)
1da177e4 1989{
963d8fe5 1990 struct nfs4_closedata *calldata = data;
1da177e4 1991 struct nfs4_state *state = calldata->state;
1da177e4
LT
1992 struct nfs_server *server = NFS_SERVER(calldata->inode);
1993
a3ca5651 1994 dprintk("%s: begin!\n", __func__);
14516c3a
TM
1995 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
1996 return;
1da177e4
LT
1997 /* hmm. we are done with the inode, and in the process of freeing
1998 * the state_owner. we keep this around to process errors
1999 */
1da177e4
LT
2000 switch (task->tk_status) {
2001 case 0:
f7e8917a
FI
2002 if (calldata->roc)
2003 pnfs_roc_set_barrier(state->inode,
2004 calldata->roc_barrier);
45328c35 2005 nfs_set_open_stateid(state, &calldata->res.stateid, 0);
26e976a8 2006 renew_lease(server, calldata->timestamp);
88069f77
TM
2007 nfs4_close_clear_stateid_flags(state,
2008 calldata->arg.fmode);
1da177e4
LT
2009 break;
2010 case -NFS4ERR_STALE_STATEID:
9e33bed5
TM
2011 case -NFS4ERR_OLD_STATEID:
2012 case -NFS4ERR_BAD_STATEID:
1da177e4 2013 case -NFS4ERR_EXPIRED:
dc0b027d 2014 if (calldata->arg.fmode == 0)
9e33bed5 2015 break;
1da177e4 2016 default:
72211dbe
TM
2017 if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
2018 rpc_restart_call_prepare(task);
1da177e4 2019 }
72211dbe 2020 nfs_release_seqid(calldata->arg.seqid);
516a6af6 2021 nfs_refresh_inode(calldata->inode, calldata->res.fattr);
a3ca5651 2022 dprintk("%s: done, ret = %d!\n", __func__, task->tk_status);
1da177e4
LT
2023}
2024
4ce70ada 2025static void nfs4_close_prepare(struct rpc_task *task, void *data)
1da177e4 2026{
4ce70ada 2027 struct nfs4_closedata *calldata = data;
9512135d 2028 struct nfs4_state *state = calldata->state;
88069f77 2029 int call_close = 0;
9512135d 2030
a3ca5651 2031 dprintk("%s: begin!\n", __func__);
963d8fe5 2032 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
9512135d 2033 return;
003707c7 2034
88069f77
TM
2035 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
2036 calldata->arg.fmode = FMODE_READ|FMODE_WRITE;
4cecb76f 2037 spin_lock(&state->owner->so_lock);
003707c7 2038 /* Calculate the change in open mode */
e7616923 2039 if (state->n_rdwr == 0) {
003707c7 2040 if (state->n_rdonly == 0) {
88069f77
TM
2041 call_close |= test_bit(NFS_O_RDONLY_STATE, &state->flags);
2042 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2043 calldata->arg.fmode &= ~FMODE_READ;
003707c7
TM
2044 }
2045 if (state->n_wronly == 0) {
88069f77
TM
2046 call_close |= test_bit(NFS_O_WRONLY_STATE, &state->flags);
2047 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2048 calldata->arg.fmode &= ~FMODE_WRITE;
003707c7 2049 }
e7616923 2050 }
4cecb76f 2051 spin_unlock(&state->owner->so_lock);
88069f77
TM
2052
2053 if (!call_close) {
963d8fe5
TM
2054 /* Note: exit _without_ calling nfs4_close_done */
2055 task->tk_action = NULL;
a3ca5651 2056 goto out;
9512135d 2057 }
88069f77 2058
f7e8917a 2059 if (calldata->arg.fmode == 0) {
88069f77 2060 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE];
f7e8917a
FI
2061 if (calldata->roc &&
2062 pnfs_roc_drain(calldata->inode, &calldata->roc_barrier)) {
2063 rpc_sleep_on(&NFS_SERVER(calldata->inode)->roc_rpcwaitq,
2064 task, NULL);
a3ca5651 2065 goto out;
f7e8917a
FI
2066 }
2067 }
88069f77 2068
516a6af6 2069 nfs_fattr_init(calldata->res.fattr);
26e976a8 2070 calldata->timestamp = jiffies;
035168ab 2071 if (nfs4_setup_sequence(NFS_SERVER(calldata->inode),
9d12b216
TM
2072 &calldata->arg.seq_args,
2073 &calldata->res.seq_res,
2074 task))
a3ca5651 2075 goto out;
5138fde0 2076 rpc_call_start(task);
a3ca5651
CL
2077out:
2078 dprintk("%s: done!\n", __func__);
1da177e4
LT
2079}
2080
963d8fe5 2081static const struct rpc_call_ops nfs4_close_ops = {
4ce70ada 2082 .rpc_call_prepare = nfs4_close_prepare,
963d8fe5
TM
2083 .rpc_call_done = nfs4_close_done,
2084 .rpc_release = nfs4_free_closedata,
2085};
2086
1da177e4
LT
2087/*
2088 * It is possible for data to be read/written from a mem-mapped file
2089 * after the sys_close call (which hits the vfs layer as a flush).
2090 * This means that we can't safely call nfsv4 close on a file until
2091 * the inode is cleared. This in turn means that we are not good
2092 * NFSv4 citizens - we do not indicate to the server to update the file's
2093 * share state even when we are done with one of the three share
2094 * stateid's in the inode.
2095 *
2096 * NOTE: Caller must be holding the sp->so_owner semaphore!
2097 */
643168c2 2098int nfs4_do_close(struct nfs4_state *state, gfp_t gfp_mask, int wait, bool roc)
1da177e4 2099{
4a35bd41 2100 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4 2101 struct nfs4_closedata *calldata;
b39e625b
TM
2102 struct nfs4_state_owner *sp = state->owner;
2103 struct rpc_task *task;
5138fde0
TM
2104 struct rpc_message msg = {
2105 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
2106 .rpc_cred = state->owner->so_cred,
2107 };
c970aa85
TM
2108 struct rpc_task_setup task_setup_data = {
2109 .rpc_client = server->client,
5138fde0 2110 .rpc_message = &msg,
c970aa85 2111 .callback_ops = &nfs4_close_ops,
101070ca 2112 .workqueue = nfsiod_workqueue,
c970aa85
TM
2113 .flags = RPC_TASK_ASYNC,
2114 };
9512135d 2115 int status = -ENOMEM;
1da177e4 2116
8535b2be 2117 calldata = kzalloc(sizeof(*calldata), gfp_mask);
1da177e4 2118 if (calldata == NULL)
9512135d 2119 goto out;
9d12b216 2120 nfs41_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 1);
4a35bd41 2121 calldata->inode = state->inode;
1da177e4 2122 calldata->state = state;
4a35bd41 2123 calldata->arg.fh = NFS_FH(state->inode);
003707c7 2124 calldata->arg.stateid = &state->open_stateid;
1da177e4 2125 /* Serialization for the sequence id */
8535b2be 2126 calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid, gfp_mask);
9512135d
TM
2127 if (calldata->arg.seqid == NULL)
2128 goto out_free_calldata;
dc0b027d 2129 calldata->arg.fmode = 0;
a65318bf 2130 calldata->arg.bitmask = server->cache_consistency_bitmask;
516a6af6 2131 calldata->res.fattr = &calldata->fattr;
c1d51931 2132 calldata->res.seqid = calldata->arg.seqid;
516a6af6 2133 calldata->res.server = server;
f7e8917a 2134 calldata->roc = roc;
643168c2 2135 nfs_sb_active(calldata->inode->i_sb);
9512135d 2136
1174dd1f
TM
2137 msg.rpc_argp = &calldata->arg;
2138 msg.rpc_resp = &calldata->res;
c970aa85
TM
2139 task_setup_data.callback_data = calldata;
2140 task = rpc_run_task(&task_setup_data);
b39e625b
TM
2141 if (IS_ERR(task))
2142 return PTR_ERR(task);
a49c3c77
TM
2143 status = 0;
2144 if (wait)
2145 status = rpc_wait_for_completion_task(task);
b39e625b 2146 rpc_put_task(task);
a49c3c77 2147 return status;
9512135d
TM
2148out_free_calldata:
2149 kfree(calldata);
2150out:
f7e8917a
FI
2151 if (roc)
2152 pnfs_roc_release(state->inode);
b39e625b
TM
2153 nfs4_put_open_state(state);
2154 nfs4_put_state_owner(sp);
9512135d 2155 return status;
1da177e4
LT
2156}
2157
2b484297 2158static struct inode *
cd9a1c0e 2159nfs4_atomic_open(struct inode *dir, struct nfs_open_context *ctx, int open_flags, struct iattr *attr)
1da177e4 2160{
1da177e4 2161 struct nfs4_state *state;
1da177e4 2162
565277f6 2163 /* Protect against concurrent sillydeletes */
3d4ff43d 2164 state = nfs4_do_open(dir, ctx->dentry, ctx->mode, open_flags, attr, ctx->cred);
f46e0bd3
TM
2165 if (IS_ERR(state))
2166 return ERR_CAST(state);
cd9a1c0e 2167 ctx->state = state;
f46e0bd3 2168 return igrab(state->inode);
1da177e4
LT
2169}
2170
1185a552 2171static void nfs4_close_context(struct nfs_open_context *ctx, int is_sync)
7fe5c398
TM
2172{
2173 if (ctx->state == NULL)
2174 return;
2175 if (is_sync)
643168c2 2176 nfs4_close_sync(ctx->state, ctx->mode);
7fe5c398 2177 else
643168c2 2178 nfs4_close_state(ctx->state, ctx->mode);
7fe5c398 2179}
1da177e4
LT
2180
2181static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
2182{
43652ad5
BH
2183 struct nfs4_server_caps_arg args = {
2184 .fhandle = fhandle,
2185 };
1da177e4
LT
2186 struct nfs4_server_caps_res res = {};
2187 struct rpc_message msg = {
2188 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
43652ad5 2189 .rpc_argp = &args,
1da177e4
LT
2190 .rpc_resp = &res,
2191 };
2192 int status;
2193
7c513058 2194 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2195 if (status == 0) {
2196 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
62ab460c
TM
2197 server->caps &= ~(NFS_CAP_ACLS|NFS_CAP_HARDLINKS|
2198 NFS_CAP_SYMLINKS|NFS_CAP_FILEID|
2199 NFS_CAP_MODE|NFS_CAP_NLINK|NFS_CAP_OWNER|
2200 NFS_CAP_OWNER_GROUP|NFS_CAP_ATIME|
2201 NFS_CAP_CTIME|NFS_CAP_MTIME);
1da177e4
LT
2202 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
2203 server->caps |= NFS_CAP_ACLS;
2204 if (res.has_links != 0)
2205 server->caps |= NFS_CAP_HARDLINKS;
2206 if (res.has_symlinks != 0)
2207 server->caps |= NFS_CAP_SYMLINKS;
62ab460c
TM
2208 if (res.attr_bitmask[0] & FATTR4_WORD0_FILEID)
2209 server->caps |= NFS_CAP_FILEID;
2210 if (res.attr_bitmask[1] & FATTR4_WORD1_MODE)
2211 server->caps |= NFS_CAP_MODE;
2212 if (res.attr_bitmask[1] & FATTR4_WORD1_NUMLINKS)
2213 server->caps |= NFS_CAP_NLINK;
2214 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER)
2215 server->caps |= NFS_CAP_OWNER;
2216 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER_GROUP)
2217 server->caps |= NFS_CAP_OWNER_GROUP;
2218 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_ACCESS)
2219 server->caps |= NFS_CAP_ATIME;
2220 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_METADATA)
2221 server->caps |= NFS_CAP_CTIME;
2222 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_MODIFY)
2223 server->caps |= NFS_CAP_MTIME;
2224
a65318bf
TM
2225 memcpy(server->cache_consistency_bitmask, res.attr_bitmask, sizeof(server->cache_consistency_bitmask));
2226 server->cache_consistency_bitmask[0] &= FATTR4_WORD0_CHANGE|FATTR4_WORD0_SIZE;
2227 server->cache_consistency_bitmask[1] &= FATTR4_WORD1_TIME_METADATA|FATTR4_WORD1_TIME_MODIFY;
1da177e4 2228 server->acl_bitmask = res.acl_bitmask;
264e6351 2229 server->fh_expire_type = res.fh_expire_type;
1da177e4 2230 }
cccef3b9 2231
1da177e4
LT
2232 return status;
2233}
2234
55a97593 2235int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1da177e4
LT
2236{
2237 struct nfs4_exception exception = { };
2238 int err;
2239 do {
2240 err = nfs4_handle_exception(server,
2241 _nfs4_server_capabilities(server, fhandle),
2242 &exception);
2243 } while (exception.retry);
2244 return err;
2245}
2246
2247static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2248 struct nfs_fsinfo *info)
2249{
1da177e4
LT
2250 struct nfs4_lookup_root_arg args = {
2251 .bitmask = nfs4_fattr_bitmap,
2252 };
2253 struct nfs4_lookup_res res = {
2254 .server = server,
0e574af1 2255 .fattr = info->fattr,
1da177e4
LT
2256 .fh = fhandle,
2257 };
2258 struct rpc_message msg = {
2259 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
2260 .rpc_argp = &args,
2261 .rpc_resp = &res,
2262 };
008f55d0 2263
0e574af1 2264 nfs_fattr_init(info->fattr);
7c513058 2265 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2266}
2267
2268static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2269 struct nfs_fsinfo *info)
2270{
2271 struct nfs4_exception exception = { };
2272 int err;
2273 do {
fb8a5ba8
BS
2274 err = _nfs4_lookup_root(server, fhandle, info);
2275 switch (err) {
2276 case 0:
2277 case -NFS4ERR_WRONGSEC:
2278 break;
2279 default:
2280 err = nfs4_handle_exception(server, err, &exception);
2281 }
1da177e4
LT
2282 } while (exception.retry);
2283 return err;
2284}
2285
8f70e95f
BS
2286static int nfs4_lookup_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
2287 struct nfs_fsinfo *info, rpc_authflavor_t flavor)
2288{
2289 struct rpc_auth *auth;
2290 int ret;
2291
2292 auth = rpcauth_create(flavor, server->client);
2293 if (!auth) {
2294 ret = -EIO;
2295 goto out;
2296 }
2297 ret = nfs4_lookup_root(server, fhandle, info);
8f70e95f
BS
2298out:
2299 return ret;
2300}
2301
801a16dc 2302static int nfs4_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
54ceac45 2303 struct nfs_fsinfo *info)
1da177e4 2304{
8f70e95f 2305 int i, len, status = 0;
0fabee24 2306 rpc_authflavor_t flav_array[NFS_MAX_SECFLAVORS];
1da177e4 2307
801a16dc
BS
2308 len = gss_mech_list_pseudoflavors(&flav_array[0]);
2309 flav_array[len] = RPC_AUTH_NULL;
2310 len += 1;
8f70e95f
BS
2311
2312 for (i = 0; i < len; i++) {
2313 status = nfs4_lookup_root_sec(server, fhandle, info, flav_array[i]);
fb8a5ba8 2314 if (status == -NFS4ERR_WRONGSEC || status == -EACCES)
d1a8016a
BS
2315 continue;
2316 break;
8f70e95f 2317 }
fb8a5ba8
BS
2318 /*
2319 * -EACCESS could mean that the user doesn't have correct permissions
2320 * to access the mount. It could also mean that we tried to mount
2321 * with a gss auth flavor, but rpc.gssd isn't running. Either way,
2322 * existing mount programs don't handle -EACCES very well so it should
2323 * be mapped to -EPERM instead.
2324 */
2325 if (status == -EACCES)
2326 status = -EPERM;
801a16dc
BS
2327 return status;
2328}
2329
2330/*
2331 * get the file handle for the "/" directory on the server
2332 */
2333static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle,
2334 struct nfs_fsinfo *info)
2335{
fca78d6d 2336 int minor_version = server->nfs_client->cl_minorversion;
801a16dc 2337 int status = nfs4_lookup_root(server, fhandle, info);
fb8a5ba8
BS
2338 if ((status == -NFS4ERR_WRONGSEC) && !(server->flags & NFS_MOUNT_SECFLAVOUR))
2339 /*
2340 * A status of -NFS4ERR_WRONGSEC will be mapped to -EPERM
2341 * by nfs4_map_errors() as this function exits.
2342 */
fca78d6d 2343 status = nfs_v4_minor_ops[minor_version]->find_root_sec(server, fhandle, info);
1da177e4
LT
2344 if (status == 0)
2345 status = nfs4_server_capabilities(server, fhandle);
2346 if (status == 0)
2347 status = nfs4_do_fsinfo(server, fhandle, info);
c12e87f4 2348 return nfs4_map_errors(status);
1da177e4
LT
2349}
2350
6b97fd3d
MN
2351/*
2352 * Get locations and (maybe) other attributes of a referral.
2353 * Note that we'll actually follow the referral later when
2354 * we detect fsid mismatch in inode revalidation
2355 */
533eb461
AA
2356static int nfs4_get_referral(struct inode *dir, const struct qstr *name,
2357 struct nfs_fattr *fattr, struct nfs_fh *fhandle)
6b97fd3d
MN
2358{
2359 int status = -ENOMEM;
2360 struct page *page = NULL;
2361 struct nfs4_fs_locations *locations = NULL;
6b97fd3d
MN
2362
2363 page = alloc_page(GFP_KERNEL);
2364 if (page == NULL)
2365 goto out;
2366 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
2367 if (locations == NULL)
2368 goto out;
2369
c228fd3a 2370 status = nfs4_proc_fs_locations(dir, name, locations, page);
6b97fd3d
MN
2371 if (status != 0)
2372 goto out;
2373 /* Make sure server returned a different fsid for the referral */
2374 if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
533eb461
AA
2375 dprintk("%s: server did not return a different fsid for"
2376 " a referral at %s\n", __func__, name->name);
6b97fd3d
MN
2377 status = -EIO;
2378 goto out;
2379 }
533eb461
AA
2380 /* Fixup attributes for the nfs_lookup() call to nfs_fhget() */
2381 nfs_fixup_referral_attributes(&locations->fattr);
6b97fd3d 2382
533eb461 2383 /* replace the lookup nfs_fattr with the locations nfs_fattr */
6b97fd3d 2384 memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
6b97fd3d
MN
2385 memset(fhandle, 0, sizeof(struct nfs_fh));
2386out:
2387 if (page)
2388 __free_page(page);
5d7ca35a 2389 kfree(locations);
6b97fd3d
MN
2390 return status;
2391}
2392
1da177e4
LT
2393static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
2394{
2395 struct nfs4_getattr_arg args = {
2396 .fh = fhandle,
2397 .bitmask = server->attr_bitmask,
2398 };
2399 struct nfs4_getattr_res res = {
2400 .fattr = fattr,
2401 .server = server,
2402 };
2403 struct rpc_message msg = {
2404 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
2405 .rpc_argp = &args,
2406 .rpc_resp = &res,
2407 };
2408
0e574af1 2409 nfs_fattr_init(fattr);
7c513058 2410 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2411}
2412
2413static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
2414{
2415 struct nfs4_exception exception = { };
2416 int err;
2417 do {
2418 err = nfs4_handle_exception(server,
2419 _nfs4_proc_getattr(server, fhandle, fattr),
2420 &exception);
2421 } while (exception.retry);
2422 return err;
2423}
2424
2425/*
2426 * The file is not closed if it is opened due to the a request to change
2427 * the size of the file. The open call will not be needed once the
2428 * VFS layer lookup-intents are implemented.
2429 *
2430 * Close is called when the inode is destroyed.
2431 * If we haven't opened the file for O_WRONLY, we
2432 * need to in the size_change case to obtain a stateid.
2433 *
2434 * Got race?
2435 * Because OPEN is always done by name in nfsv4, it is
2436 * possible that we opened a different file by the same
2437 * name. We can recognize this race condition, but we
2438 * can't do anything about it besides returning an error.
2439 *
2440 * This will be fixed with VFS changes (lookup-intent).
2441 */
2442static int
2443nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
2444 struct iattr *sattr)
2445{
08e9eac4 2446 struct inode *inode = dentry->d_inode;
659bfcd6 2447 struct rpc_cred *cred = NULL;
d530838b 2448 struct nfs4_state *state = NULL;
1da177e4
LT
2449 int status;
2450
8a1636c4
BH
2451 if (pnfs_ld_layoutret_on_setattr(inode))
2452 pnfs_return_layout(inode);
2453
0e574af1 2454 nfs_fattr_init(fattr);
1da177e4 2455
d530838b 2456 /* Search for an existing open(O_WRITE) file */
659bfcd6
TM
2457 if (sattr->ia_valid & ATTR_FILE) {
2458 struct nfs_open_context *ctx;
2459
2460 ctx = nfs_file_open_context(sattr->ia_file);
504e5189
NB
2461 if (ctx) {
2462 cred = ctx->cred;
2463 state = ctx->state;
2464 }
659bfcd6 2465 }
08e9eac4 2466
536e43d1
TM
2467 /* Deal with open(O_TRUNC) */
2468 if (sattr->ia_valid & ATTR_OPEN)
2469 sattr->ia_valid &= ~(ATTR_MTIME|ATTR_CTIME|ATTR_OPEN);
2470
659bfcd6 2471 status = nfs4_do_setattr(inode, cred, fattr, sattr, state);
65e4308d
TM
2472 if (status == 0)
2473 nfs_setattr_update_inode(inode, sattr);
1da177e4
LT
2474 return status;
2475}
2476
0c2e53f1
TM
2477static int _nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir,
2478 const struct qstr *name, struct nfs_fh *fhandle,
2479 struct nfs_fattr *fattr)
2b3de441 2480{
0c2e53f1 2481 struct nfs_server *server = NFS_SERVER(dir);
2b3de441
DH
2482 int status;
2483 struct nfs4_lookup_arg args = {
2484 .bitmask = server->attr_bitmask,
0c2e53f1 2485 .dir_fh = NFS_FH(dir),
2b3de441
DH
2486 .name = name,
2487 };
2488 struct nfs4_lookup_res res = {
2489 .server = server,
2490 .fattr = fattr,
2491 .fh = fhandle,
2492 };
2493 struct rpc_message msg = {
2494 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
2495 .rpc_argp = &args,
2496 .rpc_resp = &res,
2497 };
2498
2499 nfs_fattr_init(fattr);
2500
1da177e4 2501 dprintk("NFS call lookup %s\n", name->name);
0c2e53f1 2502 status = nfs4_call_sync(clnt, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2503 dprintk("NFS reply lookup: %d\n", status);
2504 return status;
2505}
2506
7ebb9315
BS
2507void nfs_fixup_secinfo_attributes(struct nfs_fattr *fattr, struct nfs_fh *fh)
2508{
2509 memset(fh, 0, sizeof(struct nfs_fh));
2510 fattr->fsid.major = 1;
2511 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
2512 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_FSID | NFS_ATTR_FATTR_MOUNTPOINT;
2513 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
2514 fattr->nlink = 2;
2515}
2516
7c513058
BS
2517static int nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir, struct qstr *name,
2518 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1da177e4
LT
2519{
2520 struct nfs4_exception exception = { };
2521 int err;
2522 do {
0c2e53f1
TM
2523 int status;
2524
2525 status = _nfs4_proc_lookup(clnt, dir, name, fhandle, fattr);
2526 switch (status) {
08ef7bd3
TM
2527 case -NFS4ERR_BADNAME:
2528 return -ENOENT;
0c2e53f1 2529 case -NFS4ERR_MOVED:
a6f498a8 2530 return nfs4_get_referral(dir, name, fattr, fhandle);
0c2e53f1 2531 case -NFS4ERR_WRONGSEC:
7ebb9315 2532 nfs_fixup_secinfo_attributes(fattr, fhandle);
0c2e53f1
TM
2533 }
2534 err = nfs4_handle_exception(NFS_SERVER(dir),
2535 status, &exception);
1da177e4
LT
2536 } while (exception.retry);
2537 return err;
2538}
2539
2540static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
2541{
76b32999 2542 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
2543 struct nfs4_accessargs args = {
2544 .fh = NFS_FH(inode),
a4980e78 2545 .bitmask = server->cache_consistency_bitmask,
76b32999
TM
2546 };
2547 struct nfs4_accessres res = {
2548 .server = server,
1da177e4 2549 };
1da177e4
LT
2550 struct rpc_message msg = {
2551 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
2552 .rpc_argp = &args,
2553 .rpc_resp = &res,
2554 .rpc_cred = entry->cred,
2555 };
2556 int mode = entry->mask;
2557 int status;
2558
2559 /*
2560 * Determine which access bits we want to ask for...
2561 */
2562 if (mode & MAY_READ)
2563 args.access |= NFS4_ACCESS_READ;
2564 if (S_ISDIR(inode->i_mode)) {
2565 if (mode & MAY_WRITE)
2566 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
2567 if (mode & MAY_EXEC)
2568 args.access |= NFS4_ACCESS_LOOKUP;
2569 } else {
2570 if (mode & MAY_WRITE)
2571 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
2572 if (mode & MAY_EXEC)
2573 args.access |= NFS4_ACCESS_EXECUTE;
2574 }
c407d41a
TM
2575
2576 res.fattr = nfs_alloc_fattr();
2577 if (res.fattr == NULL)
2578 return -ENOMEM;
2579
7c513058 2580 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2581 if (!status) {
2582 entry->mask = 0;
2583 if (res.access & NFS4_ACCESS_READ)
2584 entry->mask |= MAY_READ;
2585 if (res.access & (NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE))
2586 entry->mask |= MAY_WRITE;
2587 if (res.access & (NFS4_ACCESS_LOOKUP|NFS4_ACCESS_EXECUTE))
2588 entry->mask |= MAY_EXEC;
c407d41a 2589 nfs_refresh_inode(inode, res.fattr);
1da177e4 2590 }
c407d41a 2591 nfs_free_fattr(res.fattr);
1da177e4
LT
2592 return status;
2593}
2594
2595static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
2596{
2597 struct nfs4_exception exception = { };
2598 int err;
2599 do {
2600 err = nfs4_handle_exception(NFS_SERVER(inode),
2601 _nfs4_proc_access(inode, entry),
2602 &exception);
2603 } while (exception.retry);
2604 return err;
2605}
2606
2607/*
2608 * TODO: For the time being, we don't try to get any attributes
2609 * along with any of the zero-copy operations READ, READDIR,
2610 * READLINK, WRITE.
2611 *
2612 * In the case of the first three, we want to put the GETATTR
2613 * after the read-type operation -- this is because it is hard
2614 * to predict the length of a GETATTR response in v4, and thus
2615 * align the READ data correctly. This means that the GETATTR
2616 * may end up partially falling into the page cache, and we should
2617 * shift it into the 'tail' of the xdr_buf before processing.
2618 * To do this efficiently, we need to know the total length
2619 * of data received, which doesn't seem to be available outside
2620 * of the RPC layer.
2621 *
2622 * In the case of WRITE, we also want to put the GETATTR after
2623 * the operation -- in this case because we want to make sure
2624 * we get the post-operation mtime and size. This means that
2625 * we can't use xdr_encode_pages() as written: we need a variant
2626 * of it which would leave room in the 'tail' iovec.
2627 *
2628 * Both of these changes to the XDR layer would in fact be quite
2629 * minor, but I decided to leave them for a subsequent patch.
2630 */
2631static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
2632 unsigned int pgbase, unsigned int pglen)
2633{
2634 struct nfs4_readlink args = {
2635 .fh = NFS_FH(inode),
2636 .pgbase = pgbase,
2637 .pglen = pglen,
2638 .pages = &page,
2639 };
f50c7000 2640 struct nfs4_readlink_res res;
1da177e4
LT
2641 struct rpc_message msg = {
2642 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
2643 .rpc_argp = &args,
f50c7000 2644 .rpc_resp = &res,
1da177e4
LT
2645 };
2646
7c513058 2647 return nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode), &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
2648}
2649
2650static int nfs4_proc_readlink(struct inode *inode, struct page *page,
2651 unsigned int pgbase, unsigned int pglen)
2652{
2653 struct nfs4_exception exception = { };
2654 int err;
2655 do {
2656 err = nfs4_handle_exception(NFS_SERVER(inode),
2657 _nfs4_proc_readlink(inode, page, pgbase, pglen),
2658 &exception);
2659 } while (exception.retry);
2660 return err;
2661}
2662
1da177e4
LT
2663/*
2664 * Got race?
2665 * We will need to arrange for the VFS layer to provide an atomic open.
2666 * Until then, this create/open method is prone to inefficiency and race
2667 * conditions due to the lookup, create, and open VFS calls from sys_open()
2668 * placed on the wire.
2669 *
2670 * Given the above sorry state of affairs, I'm simply sending an OPEN.
2671 * The file will be opened again in the subsequent VFS open call
2672 * (nfs4_proc_file_open).
2673 *
2674 * The open for read will just hang around to be used by any process that
2675 * opens the file O_RDONLY. This will all be resolved with the VFS changes.
2676 */
2677
2678static int
2679nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
c0204fd2 2680 int flags, struct nfs_open_context *ctx)
1da177e4 2681{
82a2c1b7 2682 struct dentry *de = dentry;
1da177e4 2683 struct nfs4_state *state;
c0204fd2
TM
2684 struct rpc_cred *cred = NULL;
2685 fmode_t fmode = 0;
1da177e4
LT
2686 int status = 0;
2687
c0204fd2
TM
2688 if (ctx != NULL) {
2689 cred = ctx->cred;
3d4ff43d 2690 de = ctx->dentry;
c0204fd2 2691 fmode = ctx->mode;
1da177e4 2692 }
a8a5da99 2693 sattr->ia_mode &= ~current_umask();
82a2c1b7 2694 state = nfs4_do_open(dir, de, fmode, flags, sattr, cred);
d4d9cdcb 2695 d_drop(dentry);
1da177e4
LT
2696 if (IS_ERR(state)) {
2697 status = PTR_ERR(state);
c0204fd2 2698 goto out;
1da177e4 2699 }
d4d9cdcb 2700 d_add(dentry, igrab(state->inode));
d75340cc 2701 nfs_set_verifier(dentry, nfs_save_change_attribute(dir));
c0204fd2
TM
2702 if (ctx != NULL)
2703 ctx->state = state;
02a913a7 2704 else
643168c2 2705 nfs4_close_sync(state, fmode);
1da177e4
LT
2706out:
2707 return status;
2708}
2709
2710static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
2711{
16e42959 2712 struct nfs_server *server = NFS_SERVER(dir);
4fdc17b2 2713 struct nfs_removeargs args = {
1da177e4 2714 .fh = NFS_FH(dir),
4fdc17b2
TM
2715 .name.len = name->len,
2716 .name.name = name->name,
16e42959
TM
2717 .bitmask = server->attr_bitmask,
2718 };
4fdc17b2 2719 struct nfs_removeres res = {
16e42959 2720 .server = server,
1da177e4 2721 };
1da177e4 2722 struct rpc_message msg = {
4fdc17b2
TM
2723 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
2724 .rpc_argp = &args,
2725 .rpc_resp = &res,
1da177e4 2726 };
d346890b
TM
2727 int status = -ENOMEM;
2728
2729 res.dir_attr = nfs_alloc_fattr();
2730 if (res.dir_attr == NULL)
2731 goto out;
1da177e4 2732
7c513058 2733 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
16e42959
TM
2734 if (status == 0) {
2735 update_changeattr(dir, &res.cinfo);
d346890b 2736 nfs_post_op_update_inode(dir, res.dir_attr);
16e42959 2737 }
d346890b
TM
2738 nfs_free_fattr(res.dir_attr);
2739out:
1da177e4
LT
2740 return status;
2741}
2742
2743static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
2744{
2745 struct nfs4_exception exception = { };
2746 int err;
2747 do {
2748 err = nfs4_handle_exception(NFS_SERVER(dir),
2749 _nfs4_proc_remove(dir, name),
2750 &exception);
2751 } while (exception.retry);
2752 return err;
2753}
2754
e4eff1a6 2755static void nfs4_proc_unlink_setup(struct rpc_message *msg, struct inode *dir)
1da177e4 2756{
e4eff1a6
TM
2757 struct nfs_server *server = NFS_SERVER(dir);
2758 struct nfs_removeargs *args = msg->rpc_argp;
2759 struct nfs_removeres *res = msg->rpc_resp;
1da177e4 2760
a65318bf 2761 args->bitmask = server->cache_consistency_bitmask;
e4eff1a6 2762 res->server = server;
1da177e4 2763 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
9d12b216 2764 nfs41_init_sequence(&args->seq_args, &res->seq_res, 1);
1da177e4
LT
2765}
2766
e4eff1a6 2767static int nfs4_proc_unlink_done(struct rpc_task *task, struct inode *dir)
1da177e4 2768{
e4eff1a6
TM
2769 struct nfs_removeres *res = task->tk_msg.rpc_resp;
2770
14516c3a
TM
2771 if (!nfs4_sequence_done(task, &res->seq_res))
2772 return 0;
9e33bed5 2773 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
e4eff1a6
TM
2774 return 0;
2775 update_changeattr(dir, &res->cinfo);
d346890b 2776 nfs_post_op_update_inode(dir, res->dir_attr);
e4eff1a6 2777 return 1;
1da177e4
LT
2778}
2779
d3d4152a
JL
2780static void nfs4_proc_rename_setup(struct rpc_message *msg, struct inode *dir)
2781{
2782 struct nfs_server *server = NFS_SERVER(dir);
2783 struct nfs_renameargs *arg = msg->rpc_argp;
2784 struct nfs_renameres *res = msg->rpc_resp;
2785
2786 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME];
2787 arg->bitmask = server->attr_bitmask;
2788 res->server = server;
9d12b216 2789 nfs41_init_sequence(&arg->seq_args, &res->seq_res, 1);
d3d4152a
JL
2790}
2791
2792static int nfs4_proc_rename_done(struct rpc_task *task, struct inode *old_dir,
2793 struct inode *new_dir)
2794{
2795 struct nfs_renameres *res = task->tk_msg.rpc_resp;
2796
2797 if (!nfs4_sequence_done(task, &res->seq_res))
2798 return 0;
2799 if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
2800 return 0;
2801
2802 update_changeattr(old_dir, &res->old_cinfo);
2803 nfs_post_op_update_inode(old_dir, res->old_fattr);
2804 update_changeattr(new_dir, &res->new_cinfo);
2805 nfs_post_op_update_inode(new_dir, res->new_fattr);
2806 return 1;
2807}
2808
1da177e4
LT
2809static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
2810 struct inode *new_dir, struct qstr *new_name)
2811{
6caf2c82 2812 struct nfs_server *server = NFS_SERVER(old_dir);
920769f0 2813 struct nfs_renameargs arg = {
1da177e4
LT
2814 .old_dir = NFS_FH(old_dir),
2815 .new_dir = NFS_FH(new_dir),
2816 .old_name = old_name,
2817 .new_name = new_name,
6caf2c82
TM
2818 .bitmask = server->attr_bitmask,
2819 };
e8582a8b 2820 struct nfs_renameres res = {
6caf2c82 2821 .server = server,
1da177e4 2822 };
1da177e4
LT
2823 struct rpc_message msg = {
2824 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
2825 .rpc_argp = &arg,
2826 .rpc_resp = &res,
2827 };
011fff72 2828 int status = -ENOMEM;
1da177e4 2829
011fff72
TM
2830 res.old_fattr = nfs_alloc_fattr();
2831 res.new_fattr = nfs_alloc_fattr();
2832 if (res.old_fattr == NULL || res.new_fattr == NULL)
2833 goto out;
1da177e4 2834
7c513058 2835 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
1da177e4
LT
2836 if (!status) {
2837 update_changeattr(old_dir, &res.old_cinfo);
6caf2c82 2838 nfs_post_op_update_inode(old_dir, res.old_fattr);
1da177e4 2839 update_changeattr(new_dir, &res.new_cinfo);
6caf2c82 2840 nfs_post_op_update_inode(new_dir, res.new_fattr);
1da177e4 2841 }
011fff72
TM
2842out:
2843 nfs_free_fattr(res.new_fattr);
2844 nfs_free_fattr(res.old_fattr);
1da177e4
LT
2845 return status;
2846}
2847
2848static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
2849 struct inode *new_dir, struct qstr *new_name)
2850{
2851 struct nfs4_exception exception = { };
2852 int err;
2853 do {
2854 err = nfs4_handle_exception(NFS_SERVER(old_dir),
2855 _nfs4_proc_rename(old_dir, old_name,
2856 new_dir, new_name),
2857 &exception);
2858 } while (exception.retry);
2859 return err;
2860}
2861
2862static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
2863{
91ba2eee 2864 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
2865 struct nfs4_link_arg arg = {
2866 .fh = NFS_FH(inode),
2867 .dir_fh = NFS_FH(dir),
2868 .name = name,
91ba2eee
TM
2869 .bitmask = server->attr_bitmask,
2870 };
91ba2eee
TM
2871 struct nfs4_link_res res = {
2872 .server = server,
1da177e4 2873 };
1da177e4
LT
2874 struct rpc_message msg = {
2875 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
2876 .rpc_argp = &arg,
91ba2eee 2877 .rpc_resp = &res,
1da177e4 2878 };
136f2627
TM
2879 int status = -ENOMEM;
2880
2881 res.fattr = nfs_alloc_fattr();
2882 res.dir_attr = nfs_alloc_fattr();
2883 if (res.fattr == NULL || res.dir_attr == NULL)
2884 goto out;
1da177e4 2885
7c513058 2886 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
91ba2eee
TM
2887 if (!status) {
2888 update_changeattr(dir, &res.cinfo);
2889 nfs_post_op_update_inode(dir, res.dir_attr);
73a3d07c 2890 nfs_post_op_update_inode(inode, res.fattr);
91ba2eee 2891 }
136f2627
TM
2892out:
2893 nfs_free_fattr(res.dir_attr);
2894 nfs_free_fattr(res.fattr);
1da177e4
LT
2895 return status;
2896}
2897
2898static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
2899{
2900 struct nfs4_exception exception = { };
2901 int err;
2902 do {
2903 err = nfs4_handle_exception(NFS_SERVER(inode),
2904 _nfs4_proc_link(inode, dir, name),
2905 &exception);
2906 } while (exception.retry);
2907 return err;
2908}
2909
57dc9a57
TM
2910struct nfs4_createdata {
2911 struct rpc_message msg;
2912 struct nfs4_create_arg arg;
2913 struct nfs4_create_res res;
2914 struct nfs_fh fh;
2915 struct nfs_fattr fattr;
2916 struct nfs_fattr dir_fattr;
2917};
2918
2919static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir,
2920 struct qstr *name, struct iattr *sattr, u32 ftype)
2921{
2922 struct nfs4_createdata *data;
2923
2924 data = kzalloc(sizeof(*data), GFP_KERNEL);
2925 if (data != NULL) {
2926 struct nfs_server *server = NFS_SERVER(dir);
2927
2928 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE];
2929 data->msg.rpc_argp = &data->arg;
2930 data->msg.rpc_resp = &data->res;
2931 data->arg.dir_fh = NFS_FH(dir);
2932 data->arg.server = server;
2933 data->arg.name = name;
2934 data->arg.attrs = sattr;
2935 data->arg.ftype = ftype;
2936 data->arg.bitmask = server->attr_bitmask;
2937 data->res.server = server;
2938 data->res.fh = &data->fh;
2939 data->res.fattr = &data->fattr;
2940 data->res.dir_fattr = &data->dir_fattr;
2941 nfs_fattr_init(data->res.fattr);
2942 nfs_fattr_init(data->res.dir_fattr);
2943 }
2944 return data;
2945}
2946
2947static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data)
2948{
7c513058 2949 int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg,
e73b83f2 2950 &data->arg.seq_args, &data->res.seq_res, 1);
57dc9a57
TM
2951 if (status == 0) {
2952 update_changeattr(dir, &data->res.dir_cinfo);
2953 nfs_post_op_update_inode(dir, data->res.dir_fattr);
2954 status = nfs_instantiate(dentry, data->res.fh, data->res.fattr);
2955 }
2956 return status;
2957}
2958
2959static void nfs4_free_createdata(struct nfs4_createdata *data)
2960{
2961 kfree(data);
2962}
2963
4f390c15 2964static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2965 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4 2966{
57dc9a57
TM
2967 struct nfs4_createdata *data;
2968 int status = -ENAMETOOLONG;
1da177e4 2969
94a6d753 2970 if (len > NFS4_MAXPATHLEN)
57dc9a57 2971 goto out;
4f390c15 2972
57dc9a57
TM
2973 status = -ENOMEM;
2974 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK);
2975 if (data == NULL)
2976 goto out;
2977
2978 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK];
2979 data->arg.u.symlink.pages = &page;
2980 data->arg.u.symlink.len = len;
1da177e4 2981
57dc9a57
TM
2982 status = nfs4_do_create(dir, dentry, data);
2983
2984 nfs4_free_createdata(data);
2985out:
1da177e4
LT
2986 return status;
2987}
2988
4f390c15 2989static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2990 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
2991{
2992 struct nfs4_exception exception = { };
2993 int err;
2994 do {
2995 err = nfs4_handle_exception(NFS_SERVER(dir),
94a6d753
CL
2996 _nfs4_proc_symlink(dir, dentry, page,
2997 len, sattr),
1da177e4
LT
2998 &exception);
2999 } while (exception.retry);
3000 return err;
3001}
3002
3003static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
3004 struct iattr *sattr)
3005{
57dc9a57
TM
3006 struct nfs4_createdata *data;
3007 int status = -ENOMEM;
1da177e4 3008
57dc9a57
TM
3009 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR);
3010 if (data == NULL)
3011 goto out;
3012
3013 status = nfs4_do_create(dir, dentry, data);
3014
3015 nfs4_free_createdata(data);
3016out:
1da177e4
LT
3017 return status;
3018}
3019
3020static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
3021 struct iattr *sattr)
3022{
3023 struct nfs4_exception exception = { };
3024 int err;
a8a5da99
AK
3025
3026 sattr->ia_mode &= ~current_umask();
1da177e4
LT
3027 do {
3028 err = nfs4_handle_exception(NFS_SERVER(dir),
3029 _nfs4_proc_mkdir(dir, dentry, sattr),
3030 &exception);
3031 } while (exception.retry);
3032 return err;
3033}
3034
3035static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 3036 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
3037{
3038 struct inode *dir = dentry->d_inode;
3039 struct nfs4_readdir_arg args = {
3040 .fh = NFS_FH(dir),
56e4ebf8 3041 .pages = pages,
1da177e4
LT
3042 .pgbase = 0,
3043 .count = count,
96d25e53 3044 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
82f2e547 3045 .plus = plus,
1da177e4
LT
3046 };
3047 struct nfs4_readdir_res res;
3048 struct rpc_message msg = {
3049 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
3050 .rpc_argp = &args,
3051 .rpc_resp = &res,
3052 .rpc_cred = cred,
3053 };
3054 int status;
3055
3110ff80 3056 dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __func__,
eadf4598
TM
3057 dentry->d_parent->d_name.name,
3058 dentry->d_name.name,
3059 (unsigned long long)cookie);
1da177e4
LT
3060 nfs4_setup_readdir(cookie, NFS_COOKIEVERF(dir), dentry, &args);
3061 res.pgbase = args.pgbase;
7c513058 3062 status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
ac396128 3063 if (status >= 0) {
1da177e4 3064 memcpy(NFS_COOKIEVERF(dir), res.verifier.data, NFS4_VERIFIER_SIZE);
ac396128
TM
3065 status += args.pgbase;
3066 }
c4812998
TM
3067
3068 nfs_invalidate_atime(dir);
3069
3110ff80 3070 dprintk("%s: returns %d\n", __func__, status);
1da177e4
LT
3071 return status;
3072}
3073
3074static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
56e4ebf8 3075 u64 cookie, struct page **pages, unsigned int count, int plus)
1da177e4
LT
3076{
3077 struct nfs4_exception exception = { };
3078 int err;
3079 do {
3080 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode),
3081 _nfs4_proc_readdir(dentry, cred, cookie,
56e4ebf8 3082 pages, count, plus),
1da177e4
LT
3083 &exception);
3084 } while (exception.retry);
3085 return err;
3086}
3087
3088static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3089 struct iattr *sattr, dev_t rdev)
3090{
57dc9a57
TM
3091 struct nfs4_createdata *data;
3092 int mode = sattr->ia_mode;
3093 int status = -ENOMEM;
1da177e4
LT
3094
3095 BUG_ON(!(sattr->ia_valid & ATTR_MODE));
3096 BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
57dc9a57
TM
3097
3098 data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4SOCK);
3099 if (data == NULL)
3100 goto out;
3101
1da177e4 3102 if (S_ISFIFO(mode))
57dc9a57 3103 data->arg.ftype = NF4FIFO;
1da177e4 3104 else if (S_ISBLK(mode)) {
57dc9a57
TM
3105 data->arg.ftype = NF4BLK;
3106 data->arg.u.device.specdata1 = MAJOR(rdev);
3107 data->arg.u.device.specdata2 = MINOR(rdev);
1da177e4
LT
3108 }
3109 else if (S_ISCHR(mode)) {
57dc9a57
TM
3110 data->arg.ftype = NF4CHR;
3111 data->arg.u.device.specdata1 = MAJOR(rdev);
3112 data->arg.u.device.specdata2 = MINOR(rdev);
1da177e4 3113 }
1da177e4 3114
57dc9a57
TM
3115 status = nfs4_do_create(dir, dentry, data);
3116
3117 nfs4_free_createdata(data);
3118out:
1da177e4
LT
3119 return status;
3120}
3121
3122static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3123 struct iattr *sattr, dev_t rdev)
3124{
3125 struct nfs4_exception exception = { };
3126 int err;
a8a5da99
AK
3127
3128 sattr->ia_mode &= ~current_umask();
1da177e4
LT
3129 do {
3130 err = nfs4_handle_exception(NFS_SERVER(dir),
3131 _nfs4_proc_mknod(dir, dentry, sattr, rdev),
3132 &exception);
3133 } while (exception.retry);
3134 return err;
3135}
3136
3137static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
3138 struct nfs_fsstat *fsstat)
3139{
3140 struct nfs4_statfs_arg args = {
3141 .fh = fhandle,
3142 .bitmask = server->attr_bitmask,
3143 };
24ad148a
BH
3144 struct nfs4_statfs_res res = {
3145 .fsstat = fsstat,
3146 };
1da177e4
LT
3147 struct rpc_message msg = {
3148 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
3149 .rpc_argp = &args,
24ad148a 3150 .rpc_resp = &res,
1da177e4
LT
3151 };
3152
0e574af1 3153 nfs_fattr_init(fsstat->fattr);
7c513058 3154 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3155}
3156
3157static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
3158{
3159 struct nfs4_exception exception = { };
3160 int err;
3161 do {
3162 err = nfs4_handle_exception(server,
3163 _nfs4_proc_statfs(server, fhandle, fsstat),
3164 &exception);
3165 } while (exception.retry);
3166 return err;
3167}
3168
3169static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
3170 struct nfs_fsinfo *fsinfo)
3171{
3172 struct nfs4_fsinfo_arg args = {
3173 .fh = fhandle,
3174 .bitmask = server->attr_bitmask,
3175 };
3dda5e43
BH
3176 struct nfs4_fsinfo_res res = {
3177 .fsinfo = fsinfo,
3178 };
1da177e4
LT
3179 struct rpc_message msg = {
3180 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
3181 .rpc_argp = &args,
3dda5e43 3182 .rpc_resp = &res,
1da177e4
LT
3183 };
3184
7c513058 3185 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3186}
3187
3188static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3189{
3190 struct nfs4_exception exception = { };
3191 int err;
3192
3193 do {
3194 err = nfs4_handle_exception(server,
3195 _nfs4_do_fsinfo(server, fhandle, fsinfo),
3196 &exception);
3197 } while (exception.retry);
3198 return err;
3199}
3200
3201static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3202{
0e574af1 3203 nfs_fattr_init(fsinfo->fattr);
1da177e4
LT
3204 return nfs4_do_fsinfo(server, fhandle, fsinfo);
3205}
3206
3207static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3208 struct nfs_pathconf *pathconf)
3209{
3210 struct nfs4_pathconf_arg args = {
3211 .fh = fhandle,
3212 .bitmask = server->attr_bitmask,
3213 };
d45b2989
BH
3214 struct nfs4_pathconf_res res = {
3215 .pathconf = pathconf,
3216 };
1da177e4
LT
3217 struct rpc_message msg = {
3218 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
3219 .rpc_argp = &args,
d45b2989 3220 .rpc_resp = &res,
1da177e4
LT
3221 };
3222
3223 /* None of the pathconf attributes are mandatory to implement */
3224 if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
3225 memset(pathconf, 0, sizeof(*pathconf));
3226 return 0;
3227 }
3228
0e574af1 3229 nfs_fattr_init(pathconf->fattr);
7c513058 3230 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
1da177e4
LT
3231}
3232
3233static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3234 struct nfs_pathconf *pathconf)
3235{
3236 struct nfs4_exception exception = { };
3237 int err;
3238
3239 do {
3240 err = nfs4_handle_exception(server,
3241 _nfs4_proc_pathconf(server, fhandle, pathconf),
3242 &exception);
3243 } while (exception.retry);
3244 return err;
3245}
3246
d20581aa
BH
3247void __nfs4_read_done_cb(struct nfs_read_data *data)
3248{
3249 nfs_invalidate_atime(data->inode);
3250}
3251
cbdabc7f 3252static int nfs4_read_done_cb(struct rpc_task *task, struct nfs_read_data *data)
1da177e4 3253{
ec06c096 3254 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 3255
9e33bed5 3256 if (nfs4_async_handle_error(task, server, data->args.context->state) == -EAGAIN) {
d00c5d43 3257 rpc_restart_call_prepare(task);
ec06c096 3258 return -EAGAIN;
1da177e4 3259 }
8850df99 3260
d20581aa 3261 __nfs4_read_done_cb(data);
1da177e4 3262 if (task->tk_status > 0)
ec06c096
TM
3263 renew_lease(server, data->timestamp);
3264 return 0;
1da177e4
LT
3265}
3266
cbdabc7f
AA
3267static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
3268{
3269
3270 dprintk("--> %s\n", __func__);
3271
3272 if (!nfs4_sequence_done(task, &data->res.seq_res))
3273 return -EAGAIN;
3274
d20581aa
BH
3275 return data->read_done_cb ? data->read_done_cb(task, data) :
3276 nfs4_read_done_cb(task, data);
cbdabc7f
AA
3277}
3278
bdc7f021 3279static void nfs4_proc_read_setup(struct nfs_read_data *data, struct rpc_message *msg)
1da177e4 3280{
1da177e4 3281 data->timestamp = jiffies;
cbdabc7f 3282 data->read_done_cb = nfs4_read_done_cb;
bdc7f021 3283 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ];
9d12b216 3284 nfs41_init_sequence(&data->args.seq_args, &data->res.seq_res, 0);
1da177e4
LT
3285}
3286
cbdabc7f
AA
3287/* Reset the the nfs_read_data to send the read to the MDS. */
3288void nfs4_reset_read(struct rpc_task *task, struct nfs_read_data *data)
3289{
3290 dprintk("%s Reset task for i/o through\n", __func__);
3291 put_lseg(data->lseg);
3292 data->lseg = NULL;
3293 /* offsets will differ in the dense stripe case */
3294 data->args.offset = data->mds_offset;
3295 data->ds_clp = NULL;
3296 data->args.fh = NFS_FH(data->inode);
3297 data->read_done_cb = nfs4_read_done_cb;
3298 task->tk_ops = data->mds_ops;
3299 rpc_task_reset_client(task, NFS_CLIENT(data->inode));
3300}
3301EXPORT_SYMBOL_GPL(nfs4_reset_read);
3302
b029bc9b 3303static int nfs4_write_done_cb(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 3304{
1da177e4
LT
3305 struct inode *inode = data->inode;
3306
9e33bed5 3307 if (nfs4_async_handle_error(task, NFS_SERVER(inode), data->args.context->state) == -EAGAIN) {
d00c5d43 3308 rpc_restart_call_prepare(task);
788e7a89 3309 return -EAGAIN;
1da177e4 3310 }
4f9838c7 3311 if (task->tk_status >= 0) {
1da177e4 3312 renew_lease(NFS_SERVER(inode), data->timestamp);
70ca8852 3313 nfs_post_op_update_inode_force_wcc(inode, data->res.fattr);
4f9838c7 3314 }
788e7a89 3315 return 0;
1da177e4
LT
3316}
3317
b029bc9b
FI
3318static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
3319{
3320 if (!nfs4_sequence_done(task, &data->res.seq_res))
3321 return -EAGAIN;
d20581aa
BH
3322 return data->write_done_cb ? data->write_done_cb(task, data) :
3323 nfs4_write_done_cb(task, data);
b029bc9b
FI
3324}
3325
a69aef14
FI
3326/* Reset the the nfs_write_data to send the write to the MDS. */
3327void nfs4_reset_write(struct rpc_task *task, struct nfs_write_data *data)
3328{
3329 dprintk("%s Reset task for i/o through\n", __func__);
3330 put_lseg(data->lseg);
3331 data->lseg = NULL;
3332 data->ds_clp = NULL;
3333 data->write_done_cb = nfs4_write_done_cb;
3334 data->args.fh = NFS_FH(data->inode);
3335 data->args.bitmask = data->res.server->cache_consistency_bitmask;
3336 data->args.offset = data->mds_offset;
3337 data->res.fattr = &data->fattr;
3338 task->tk_ops = data->mds_ops;
3339 rpc_task_reset_client(task, NFS_CLIENT(data->inode));
3340}
3341EXPORT_SYMBOL_GPL(nfs4_reset_write);
3342
bdc7f021 3343static void nfs4_proc_write_setup(struct nfs_write_data *data, struct rpc_message *msg)
1da177e4 3344{
bdc7f021
TM
3345 struct nfs_server *server = NFS_SERVER(data->inode);
3346
7ffd1064
FI
3347 if (data->lseg) {
3348 data->args.bitmask = NULL;
3349 data->res.fattr = NULL;
3350 } else
3351 data->args.bitmask = server->cache_consistency_bitmask;
b029bc9b
FI
3352 if (!data->write_done_cb)
3353 data->write_done_cb = nfs4_write_done_cb;
4f9838c7 3354 data->res.server = server;
1da177e4
LT
3355 data->timestamp = jiffies;
3356
bdc7f021 3357 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE];
9d12b216 3358 nfs41_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
1da177e4
LT
3359}
3360
5f452431 3361static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 3362{
1da177e4 3363 struct inode *inode = data->inode;
14516c3a 3364
9e33bed5 3365 if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) {
d00c5d43 3366 rpc_restart_call_prepare(task);
788e7a89 3367 return -EAGAIN;
1da177e4 3368 }
9e08a3c5 3369 nfs_refresh_inode(inode, data->res.fattr);
788e7a89 3370 return 0;
1da177e4
LT
3371}
3372
5f452431
FI
3373static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data)
3374{
3375 if (!nfs4_sequence_done(task, &data->res.seq_res))
3376 return -EAGAIN;
3377 return data->write_done_cb(task, data);
3378}
3379
bdc7f021 3380static void nfs4_proc_commit_setup(struct nfs_write_data *data, struct rpc_message *msg)
1da177e4 3381{
788e7a89 3382 struct nfs_server *server = NFS_SERVER(data->inode);
988b6dce
FI
3383
3384 if (data->lseg) {
3385 data->args.bitmask = NULL;
3386 data->res.fattr = NULL;
3387 } else
3388 data->args.bitmask = server->cache_consistency_bitmask;
5f452431
FI
3389 if (!data->write_done_cb)
3390 data->write_done_cb = nfs4_commit_done_cb;
4f9838c7 3391 data->res.server = server;
bdc7f021 3392 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT];
9d12b216 3393 nfs41_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
1da177e4
LT
3394}
3395
9bc4e3ca
CL
3396struct nfs4_renewdata {
3397 struct nfs_client *client;
3398 unsigned long timestamp;
3399};
3400
1da177e4
LT
3401/*
3402 * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
3403 * standalone procedure for queueing an asynchronous RENEW.
3404 */
9bc4e3ca 3405static void nfs4_renew_release(void *calldata)
dc96aef9 3406{
9bc4e3ca
CL
3407 struct nfs4_renewdata *data = calldata;
3408 struct nfs_client *clp = data->client;
dc96aef9 3409
0851de06
AB
3410 if (atomic_read(&clp->cl_count) > 1)
3411 nfs4_schedule_state_renewal(clp);
3412 nfs_put_client(clp);
9bc4e3ca 3413 kfree(data);
dc96aef9
AB
3414}
3415
9bc4e3ca 3416static void nfs4_renew_done(struct rpc_task *task, void *calldata)
1da177e4 3417{
9bc4e3ca
CL
3418 struct nfs4_renewdata *data = calldata;
3419 struct nfs_client *clp = data->client;
3420 unsigned long timestamp = data->timestamp;
1da177e4
LT
3421
3422 if (task->tk_status < 0) {
95baa25c 3423 /* Unless we're shutting down, schedule state recovery! */
042b60be
TM
3424 if (test_bit(NFS_CS_RENEWD, &clp->cl_res_state) == 0)
3425 return;
3426 if (task->tk_status != NFS4ERR_CB_PATH_DOWN) {
0400a6b0 3427 nfs4_schedule_lease_recovery(clp);
042b60be
TM
3428 return;
3429 }
3430 nfs4_schedule_path_down_recovery(clp);
1da177e4 3431 }
452e9352 3432 do_renew_lease(clp, timestamp);
1da177e4
LT
3433}
3434
963d8fe5
TM
3435static const struct rpc_call_ops nfs4_renew_ops = {
3436 .rpc_call_done = nfs4_renew_done,
dc96aef9 3437 .rpc_release = nfs4_renew_release,
963d8fe5
TM
3438};
3439
2f60ea6b 3440static int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
1da177e4
LT
3441{
3442 struct rpc_message msg = {
3443 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
3444 .rpc_argp = clp,
b4454fe1 3445 .rpc_cred = cred,
1da177e4 3446 };
9bc4e3ca 3447 struct nfs4_renewdata *data;
1da177e4 3448
2f60ea6b
TM
3449 if (renew_flags == 0)
3450 return 0;
0851de06
AB
3451 if (!atomic_inc_not_zero(&clp->cl_count))
3452 return -EIO;
b569ad34 3453 data = kmalloc(sizeof(*data), GFP_NOFS);
9bc4e3ca
CL
3454 if (data == NULL)
3455 return -ENOMEM;
3456 data->client = clp;
3457 data->timestamp = jiffies;
1da177e4 3458 return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_SOFT,
9bc4e3ca 3459 &nfs4_renew_ops, data);
1da177e4
LT
3460}
3461
8534d4ec 3462static int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
3463{
3464 struct rpc_message msg = {
3465 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
3466 .rpc_argp = clp,
b4454fe1 3467 .rpc_cred = cred,
1da177e4
LT
3468 };
3469 unsigned long now = jiffies;
3470 int status;
3471
3472 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
3473 if (status < 0)
3474 return status;
452e9352 3475 do_renew_lease(clp, now);
1da177e4
LT
3476 return 0;
3477}
3478
aa1870af
BF
3479static inline int nfs4_server_supports_acls(struct nfs_server *server)
3480{
3481 return (server->caps & NFS_CAP_ACLS)
3482 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
3483 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
3484}
3485
3486/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_CACHE_SIZE, and that
3487 * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_CACHE_SIZE) bytes on
3488 * the stack.
3489 */
3490#define NFS4ACL_MAXPAGES (XATTR_SIZE_MAX >> PAGE_CACHE_SHIFT)
3491
e9e3d724
NH
3492static int buf_to_pages_noslab(const void *buf, size_t buflen,
3493 struct page **pages, unsigned int *pgbase)
3494{
3495 struct page *newpage, **spages;
3496 int rc = 0;
3497 size_t len;
3498 spages = pages;
3499
3500 do {
43b7c3f0 3501 len = min_t(size_t, PAGE_CACHE_SIZE, buflen);
e9e3d724
NH
3502 newpage = alloc_page(GFP_KERNEL);
3503
3504 if (newpage == NULL)
3505 goto unwind;
3506 memcpy(page_address(newpage), buf, len);
3507 buf += len;
3508 buflen -= len;
3509 *pages++ = newpage;
3510 rc++;
3511 } while (buflen != 0);
3512
3513 return rc;
3514
3515unwind:
3516 for(; rc > 0; rc--)
3517 __free_page(spages[rc-1]);
3518 return -ENOMEM;
3519}
3520
e50a1c2e
BF
3521struct nfs4_cached_acl {
3522 int cached;
3523 size_t len;
3e9d4154 3524 char data[0];
e50a1c2e
BF
3525};
3526
3527static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
3528{
3529 struct nfs_inode *nfsi = NFS_I(inode);
3530
3531 spin_lock(&inode->i_lock);
3532 kfree(nfsi->nfs4_acl);
3533 nfsi->nfs4_acl = acl;
3534 spin_unlock(&inode->i_lock);
3535}
3536
3537static void nfs4_zap_acl_attr(struct inode *inode)
3538{
3539 nfs4_set_cached_acl(inode, NULL);
3540}
3541
3542static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
3543{
3544 struct nfs_inode *nfsi = NFS_I(inode);
3545 struct nfs4_cached_acl *acl;
3546 int ret = -ENOENT;
3547
3548 spin_lock(&inode->i_lock);
3549 acl = nfsi->nfs4_acl;
3550 if (acl == NULL)
3551 goto out;
3552 if (buf == NULL) /* user is just asking for length */
3553 goto out_len;
3554 if (acl->cached == 0)
3555 goto out;
3556 ret = -ERANGE; /* see getxattr(2) man page */
3557 if (acl->len > buflen)
3558 goto out;
3559 memcpy(buf, acl->data, acl->len);
3560out_len:
3561 ret = acl->len;
3562out:
3563 spin_unlock(&inode->i_lock);
3564 return ret;
3565}
3566
3567static void nfs4_write_cached_acl(struct inode *inode, const char *buf, size_t acl_len)
3568{
3569 struct nfs4_cached_acl *acl;
3570
3571 if (buf && acl_len <= PAGE_SIZE) {
3572 acl = kmalloc(sizeof(*acl) + acl_len, GFP_KERNEL);
3573 if (acl == NULL)
3574 goto out;
3575 acl->cached = 1;
3576 memcpy(acl->data, buf, acl_len);
3577 } else {
3578 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
3579 if (acl == NULL)
3580 goto out;
3581 acl->cached = 0;
3582 }
3583 acl->len = acl_len;
3584out:
3585 nfs4_set_cached_acl(inode, acl);
3586}
3587
bf118a34
AA
3588/*
3589 * The getxattr API returns the required buffer length when called with a
3590 * NULL buf. The NFSv4 acl tool then calls getxattr again after allocating
3591 * the required buf. On a NULL buf, we send a page of data to the server
3592 * guessing that the ACL request can be serviced by a page. If so, we cache
3593 * up to the page of ACL data, and the 2nd call to getxattr is serviced by
3594 * the cache. If not so, we throw away the page, and cache the required
3595 * length. The next getxattr call will then produce another round trip to
3596 * the server, this time with the input buf of the required size.
3597 */
16b4289c 3598static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
aa1870af 3599{
bf118a34 3600 struct page *pages[NFS4ACL_MAXPAGES] = {NULL, };
aa1870af
BF
3601 struct nfs_getaclargs args = {
3602 .fh = NFS_FH(inode),
3603 .acl_pages = pages,
3604 .acl_len = buflen,
3605 };
663c79b3
BH
3606 struct nfs_getaclres res = {
3607 .acl_len = buflen,
3608 };
e50a1c2e 3609 void *resp_buf;
aa1870af
BF
3610 struct rpc_message msg = {
3611 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
3612 .rpc_argp = &args,
663c79b3 3613 .rpc_resp = &res,
aa1870af 3614 };
bf118a34 3615 int ret = -ENOMEM, npages, i, acl_len = 0;
aa1870af 3616
bf118a34
AA
3617 npages = (buflen + PAGE_SIZE - 1) >> PAGE_SHIFT;
3618 /* As long as we're doing a round trip to the server anyway,
3619 * let's be prepared for a page of acl data. */
3620 if (npages == 0)
3621 npages = 1;
3622
3623 for (i = 0; i < npages; i++) {
3624 pages[i] = alloc_page(GFP_KERNEL);
3625 if (!pages[i])
3626 goto out_free;
e50a1c2e 3627 }
bf118a34
AA
3628 if (npages > 1) {
3629 /* for decoding across pages */
331818f1
TM
3630 res.acl_scratch = alloc_page(GFP_KERNEL);
3631 if (!res.acl_scratch)
bf118a34 3632 goto out_free;
e50a1c2e 3633 }
bf118a34
AA
3634 args.acl_len = npages * PAGE_SIZE;
3635 args.acl_pgbase = 0;
3636 /* Let decode_getfacl know not to fail if the ACL data is larger than
3637 * the page we send as a guess */
3638 if (buf == NULL)
3639 res.acl_flags |= NFS4_ACL_LEN_REQUEST;
3640 resp_buf = page_address(pages[0]);
3641
de040bec 3642 dprintk("%s buf %p buflen %zu npages %d args.acl_len %zu\n",
bf118a34
AA
3643 __func__, buf, buflen, npages, args.acl_len);
3644 ret = nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode),
3645 &msg, &args.seq_args, &res.seq_res, 0);
e50a1c2e
BF
3646 if (ret)
3647 goto out_free;
bf118a34
AA
3648
3649 acl_len = res.acl_len - res.acl_data_offset;
3650 if (acl_len > args.acl_len)
3651 nfs4_write_cached_acl(inode, NULL, acl_len);
e50a1c2e 3652 else
bf118a34
AA
3653 nfs4_write_cached_acl(inode, resp_buf + res.acl_data_offset,
3654 acl_len);
e50a1c2e
BF
3655 if (buf) {
3656 ret = -ERANGE;
bf118a34 3657 if (acl_len > buflen)
e50a1c2e 3658 goto out_free;
bf118a34
AA
3659 _copy_from_pages(buf, pages, res.acl_data_offset,
3660 res.acl_len);
e50a1c2e 3661 }
bf118a34 3662 ret = acl_len;
e50a1c2e 3663out_free:
bf118a34
AA
3664 for (i = 0; i < npages; i++)
3665 if (pages[i])
3666 __free_page(pages[i]);
331818f1
TM
3667 if (res.acl_scratch)
3668 __free_page(res.acl_scratch);
aa1870af
BF
3669 return ret;
3670}
3671
16b4289c
TM
3672static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
3673{
3674 struct nfs4_exception exception = { };
3675 ssize_t ret;
3676 do {
3677 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
3678 if (ret >= 0)
3679 break;
3680 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
3681 } while (exception.retry);
3682 return ret;
3683}
3684
e50a1c2e
BF
3685static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
3686{
3687 struct nfs_server *server = NFS_SERVER(inode);
3688 int ret;
3689
3690 if (!nfs4_server_supports_acls(server))
3691 return -EOPNOTSUPP;
3692 ret = nfs_revalidate_inode(server, inode);
3693 if (ret < 0)
3694 return ret;
08a22b39
AK
3695 if (NFS_I(inode)->cache_validity & NFS_INO_INVALID_ACL)
3696 nfs_zap_acl_cache(inode);
e50a1c2e
BF
3697 ret = nfs4_read_cached_acl(inode, buf, buflen);
3698 if (ret != -ENOENT)
bf118a34
AA
3699 /* -ENOENT is returned if there is no ACL or if there is an ACL
3700 * but no cached acl data, just the acl length */
e50a1c2e
BF
3701 return ret;
3702 return nfs4_get_acl_uncached(inode, buf, buflen);
3703}
3704
16b4289c 3705static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4b580ee3
BF
3706{
3707 struct nfs_server *server = NFS_SERVER(inode);
3708 struct page *pages[NFS4ACL_MAXPAGES];
3709 struct nfs_setaclargs arg = {
3710 .fh = NFS_FH(inode),
3711 .acl_pages = pages,
3712 .acl_len = buflen,
3713 };
73c403a9 3714 struct nfs_setaclres res;
4b580ee3
BF
3715 struct rpc_message msg = {
3716 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
3717 .rpc_argp = &arg,
73c403a9 3718 .rpc_resp = &res,
4b580ee3 3719 };
e9e3d724 3720 int ret, i;
4b580ee3
BF
3721
3722 if (!nfs4_server_supports_acls(server))
3723 return -EOPNOTSUPP;
e9e3d724
NH
3724 i = buf_to_pages_noslab(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
3725 if (i < 0)
3726 return i;
642ac549 3727 nfs_inode_return_delegation(inode);
7c513058 3728 ret = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
e9e3d724
NH
3729
3730 /*
3731 * Free each page after tx, so the only ref left is
3732 * held by the network stack
3733 */
3734 for (; i > 0; i--)
3735 put_page(pages[i-1]);
3736
08a22b39
AK
3737 /*
3738 * Acl update can result in inode attribute update.
3739 * so mark the attribute cache invalid.
3740 */
3741 spin_lock(&inode->i_lock);
3742 NFS_I(inode)->cache_validity |= NFS_INO_INVALID_ATTR;
3743 spin_unlock(&inode->i_lock);
f41f7418
TM
3744 nfs_access_zap_cache(inode);
3745 nfs_zap_acl_cache(inode);
4b580ee3
BF
3746 return ret;
3747}
3748
16b4289c
TM
3749static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
3750{
3751 struct nfs4_exception exception = { };
3752 int err;
3753 do {
3754 err = nfs4_handle_exception(NFS_SERVER(inode),
3755 __nfs4_proc_set_acl(inode, buf, buflen),
3756 &exception);
3757 } while (exception.retry);
3758 return err;
3759}
3760
1da177e4 3761static int
aa5190d0 3762nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state)
1da177e4 3763{
aa5190d0
TM
3764 struct nfs_client *clp = server->nfs_client;
3765
3766 if (task->tk_status >= 0)
1da177e4
LT
3767 return 0;
3768 switch(task->tk_status) {
a1d0b5ee 3769 case -NFS4ERR_DELEG_REVOKED:
9e33bed5
TM
3770 case -NFS4ERR_ADMIN_REVOKED:
3771 case -NFS4ERR_BAD_STATEID:
a1d0b5ee
TM
3772 if (state != NULL)
3773 nfs_remove_bad_delegation(state->inode);
9e33bed5
TM
3774 case -NFS4ERR_OPENMODE:
3775 if (state == NULL)
3776 break;
0400a6b0
TM
3777 nfs4_schedule_stateid_recovery(server, state);
3778 goto wait_on_recovery;
0ced63d1
TM
3779 case -NFS4ERR_EXPIRED:
3780 if (state != NULL)
3781 nfs4_schedule_stateid_recovery(server, state);
1da177e4 3782 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 3783 case -NFS4ERR_STALE_CLIENTID:
0400a6b0
TM
3784 nfs4_schedule_lease_recovery(clp);
3785 goto wait_on_recovery;
4745e315
AA
3786#if defined(CONFIG_NFS_V4_1)
3787 case -NFS4ERR_BADSESSION:
3788 case -NFS4ERR_BADSLOT:
3789 case -NFS4ERR_BAD_HIGH_SLOT:
3790 case -NFS4ERR_DEADSESSION:
3791 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
3792 case -NFS4ERR_SEQ_FALSE_RETRY:
3793 case -NFS4ERR_SEQ_MISORDERED:
3794 dprintk("%s ERROR %d, Reset session\n", __func__,
3795 task->tk_status);
0400a6b0 3796 nfs4_schedule_session_recovery(clp->cl_session);
4745e315
AA
3797 task->tk_status = 0;
3798 return -EAGAIN;
3799#endif /* CONFIG_NFS_V4_1 */
1da177e4 3800 case -NFS4ERR_DELAY:
aa5190d0 3801 nfs_inc_server_stats(server, NFSIOS_DELAY);
006ea73e 3802 case -NFS4ERR_GRACE:
2c643488 3803 case -EKEYEXPIRED:
1da177e4
LT
3804 rpc_delay(task, NFS4_POLL_RETRY_MAX);
3805 task->tk_status = 0;
3806 return -EAGAIN;
a8a4ae3a 3807 case -NFS4ERR_RETRY_UNCACHED_REP:
1da177e4
LT
3808 case -NFS4ERR_OLD_STATEID:
3809 task->tk_status = 0;
3810 return -EAGAIN;
3811 }
3812 task->tk_status = nfs4_map_errors(task->tk_status);
3813 return 0;
0400a6b0 3814wait_on_recovery:
a2c0b9e2 3815 rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL);
a2c0b9e2
TM
3816 if (test_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) == 0)
3817 rpc_wake_up_queued_task(&clp->cl_rpcwaitq, task);
3818 task->tk_status = 0;
3819 return -EAGAIN;
1da177e4
LT
3820}
3821
bb8b27e5
TM
3822int nfs4_proc_setclientid(struct nfs_client *clp, u32 program,
3823 unsigned short port, struct rpc_cred *cred,
3824 struct nfs4_setclientid_res *res)
1da177e4
LT
3825{
3826 nfs4_verifier sc_verifier;
3827 struct nfs4_setclientid setclientid = {
3828 .sc_verifier = &sc_verifier,
3829 .sc_prog = program,
f4eecd5d 3830 .sc_cb_ident = clp->cl_cb_ident,
1da177e4
LT
3831 };
3832 struct rpc_message msg = {
3833 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
3834 .rpc_argp = &setclientid,
bb8b27e5 3835 .rpc_resp = res,
286d7d6a 3836 .rpc_cred = cred,
1da177e4 3837 };
bc4785cd 3838 __be32 *p;
1da177e4
LT
3839 int loop = 0;
3840 int status;
3841
bc4785cd 3842 p = (__be32*)sc_verifier.data;
1da177e4
LT
3843 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
3844 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
3845
3846 for(;;) {
2446ab60 3847 rcu_read_lock();
1da177e4 3848 setclientid.sc_name_len = scnprintf(setclientid.sc_name,
69dd716c 3849 sizeof(setclientid.sc_name), "%s/%s %s %s %u",
d4d3c507
CL
3850 clp->cl_ipaddr,
3851 rpc_peeraddr2str(clp->cl_rpcclient,
3852 RPC_DISPLAY_ADDR),
69dd716c
TM
3853 rpc_peeraddr2str(clp->cl_rpcclient,
3854 RPC_DISPLAY_PROTO),
78ea323b 3855 clp->cl_rpcclient->cl_auth->au_ops->au_name,
1da177e4
LT
3856 clp->cl_id_uniquifier);
3857 setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
d4d3c507
CL
3858 sizeof(setclientid.sc_netid),
3859 rpc_peeraddr2str(clp->cl_rpcclient,
3860 RPC_DISPLAY_NETID));
1da177e4 3861 setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
d4d3c507 3862 sizeof(setclientid.sc_uaddr), "%s.%u.%u",
1da177e4 3863 clp->cl_ipaddr, port >> 8, port & 255);
2446ab60 3864 rcu_read_unlock();
1da177e4 3865
1bd714f2 3866 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
1da177e4
LT
3867 if (status != -NFS4ERR_CLID_INUSE)
3868 break;
fd954ae1
TM
3869 if (loop != 0) {
3870 ++clp->cl_id_uniquifier;
1da177e4 3871 break;
fd954ae1
TM
3872 }
3873 ++loop;
3874 ssleep(clp->cl_lease_time / HZ + 1);
1da177e4
LT
3875 }
3876 return status;
3877}
3878
fd954ae1 3879int nfs4_proc_setclientid_confirm(struct nfs_client *clp,
bb8b27e5
TM
3880 struct nfs4_setclientid_res *arg,
3881 struct rpc_cred *cred)
1da177e4
LT
3882{
3883 struct nfs_fsinfo fsinfo;
3884 struct rpc_message msg = {
3885 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
bb8b27e5 3886 .rpc_argp = arg,
1da177e4 3887 .rpc_resp = &fsinfo,
286d7d6a 3888 .rpc_cred = cred,
1da177e4
LT
3889 };
3890 unsigned long now;
3891 int status;
3892
3893 now = jiffies;
1bd714f2 3894 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
1da177e4
LT
3895 if (status == 0) {
3896 spin_lock(&clp->cl_lock);
3897 clp->cl_lease_time = fsinfo.lease_time * HZ;
3898 clp->cl_last_renewal = now;
3899 spin_unlock(&clp->cl_lock);
3900 }
3901 return status;
3902}
3903
fe650407
TM
3904struct nfs4_delegreturndata {
3905 struct nfs4_delegreturnargs args;
fa178f29 3906 struct nfs4_delegreturnres res;
fe650407
TM
3907 struct nfs_fh fh;
3908 nfs4_stateid stateid;
26e976a8 3909 unsigned long timestamp;
fa178f29 3910 struct nfs_fattr fattr;
fe650407
TM
3911 int rpc_status;
3912};
3913
fe650407
TM
3914static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
3915{
3916 struct nfs4_delegreturndata *data = calldata;
938e1010 3917
14516c3a
TM
3918 if (!nfs4_sequence_done(task, &data->res.seq_res))
3919 return;
938e1010 3920
79708861
RL
3921 switch (task->tk_status) {
3922 case -NFS4ERR_STALE_STATEID:
3923 case -NFS4ERR_EXPIRED:
3924 case 0:
fa178f29 3925 renew_lease(data->res.server, data->timestamp);
79708861
RL
3926 break;
3927 default:
3928 if (nfs4_async_handle_error(task, data->res.server, NULL) ==
3929 -EAGAIN) {
d00c5d43 3930 rpc_restart_call_prepare(task);
79708861
RL
3931 return;
3932 }
3933 }
3934 data->rpc_status = task->tk_status;
fe650407
TM
3935}
3936
3937static void nfs4_delegreturn_release(void *calldata)
3938{
fe650407
TM
3939 kfree(calldata);
3940}
3941
938e1010
AA
3942#if defined(CONFIG_NFS_V4_1)
3943static void nfs4_delegreturn_prepare(struct rpc_task *task, void *data)
3944{
3945 struct nfs4_delegreturndata *d_data;
3946
3947 d_data = (struct nfs4_delegreturndata *)data;
3948
035168ab 3949 if (nfs4_setup_sequence(d_data->res.server,
938e1010 3950 &d_data->args.seq_args,
9d12b216 3951 &d_data->res.seq_res, task))
938e1010
AA
3952 return;
3953 rpc_call_start(task);
3954}
3955#endif /* CONFIG_NFS_V4_1 */
3956
c8d149f3 3957static const struct rpc_call_ops nfs4_delegreturn_ops = {
938e1010
AA
3958#if defined(CONFIG_NFS_V4_1)
3959 .rpc_call_prepare = nfs4_delegreturn_prepare,
3960#endif /* CONFIG_NFS_V4_1 */
fe650407
TM
3961 .rpc_call_done = nfs4_delegreturn_done,
3962 .rpc_release = nfs4_delegreturn_release,
3963};
3964
e6f81075 3965static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
fe650407
TM
3966{
3967 struct nfs4_delegreturndata *data;
fa178f29 3968 struct nfs_server *server = NFS_SERVER(inode);
fe650407 3969 struct rpc_task *task;
5138fde0
TM
3970 struct rpc_message msg = {
3971 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
3972 .rpc_cred = cred,
3973 };
c970aa85
TM
3974 struct rpc_task_setup task_setup_data = {
3975 .rpc_client = server->client,
5138fde0 3976 .rpc_message = &msg,
c970aa85
TM
3977 .callback_ops = &nfs4_delegreturn_ops,
3978 .flags = RPC_TASK_ASYNC,
3979 };
e6f81075 3980 int status = 0;
fe650407 3981
8535b2be 3982 data = kzalloc(sizeof(*data), GFP_NOFS);
fe650407
TM
3983 if (data == NULL)
3984 return -ENOMEM;
9d12b216 3985 nfs41_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
fe650407
TM
3986 data->args.fhandle = &data->fh;
3987 data->args.stateid = &data->stateid;
fa178f29 3988 data->args.bitmask = server->attr_bitmask;
fe650407 3989 nfs_copy_fh(&data->fh, NFS_FH(inode));
f597c537 3990 nfs4_stateid_copy(&data->stateid, stateid);
fa178f29
TM
3991 data->res.fattr = &data->fattr;
3992 data->res.server = server;
5138fde0 3993 nfs_fattr_init(data->res.fattr);
26e976a8 3994 data->timestamp = jiffies;
fe650407
TM
3995 data->rpc_status = 0;
3996
c970aa85 3997 task_setup_data.callback_data = data;
1174dd1f
TM
3998 msg.rpc_argp = &data->args;
3999 msg.rpc_resp = &data->res;
c970aa85 4000 task = rpc_run_task(&task_setup_data);
7a1218a2 4001 if (IS_ERR(task))
fe650407 4002 return PTR_ERR(task);
e6f81075
TM
4003 if (!issync)
4004 goto out;
fe650407 4005 status = nfs4_wait_for_completion_rpc_task(task);
e6f81075
TM
4006 if (status != 0)
4007 goto out;
4008 status = data->rpc_status;
4009 if (status != 0)
4010 goto out;
4011 nfs_refresh_inode(inode, &data->fattr);
4012out:
e6b3c4db 4013 rpc_put_task(task);
fe650407 4014 return status;
1da177e4
LT
4015}
4016
e6f81075 4017int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
1da177e4
LT
4018{
4019 struct nfs_server *server = NFS_SERVER(inode);
4020 struct nfs4_exception exception = { };
4021 int err;
4022 do {
e6f81075 4023 err = _nfs4_proc_delegreturn(inode, cred, stateid, issync);
1da177e4
LT
4024 switch (err) {
4025 case -NFS4ERR_STALE_STATEID:
4026 case -NFS4ERR_EXPIRED:
1da177e4
LT
4027 case 0:
4028 return 0;
4029 }
4030 err = nfs4_handle_exception(server, err, &exception);
4031 } while (exception.retry);
4032 return err;
4033}
4034
4035#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
4036#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
4037
4038/*
4039 * sleep, with exponential backoff, and retry the LOCK operation.
4040 */
4041static unsigned long
4042nfs4_set_lock_task_retry(unsigned long timeout)
4043{
d310310c 4044 freezable_schedule_timeout_killable(timeout);
1da177e4
LT
4045 timeout <<= 1;
4046 if (timeout > NFS4_LOCK_MAXTIMEOUT)
4047 return NFS4_LOCK_MAXTIMEOUT;
4048 return timeout;
4049}
4050
1da177e4
LT
4051static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4052{
4053 struct inode *inode = state->inode;
4054 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 4055 struct nfs_client *clp = server->nfs_client;
911d1aaf 4056 struct nfs_lockt_args arg = {
1da177e4 4057 .fh = NFS_FH(inode),
911d1aaf 4058 .fl = request,
1da177e4 4059 };
911d1aaf
TM
4060 struct nfs_lockt_res res = {
4061 .denied = request,
1da177e4
LT
4062 };
4063 struct rpc_message msg = {
4064 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
4065 .rpc_argp = &arg,
4066 .rpc_resp = &res,
4067 .rpc_cred = state->owner->so_cred,
4068 };
1da177e4
LT
4069 struct nfs4_lock_state *lsp;
4070 int status;
4071
911d1aaf 4072 arg.lock_owner.clientid = clp->cl_clientid;
8d0a8a9d
TM
4073 status = nfs4_set_lock_state(state, request);
4074 if (status != 0)
4075 goto out;
4076 lsp = request->fl_u.nfs4_fl.owner;
48c22eb2 4077 arg.lock_owner.id = lsp->ls_seqid.owner_id;
d035c36c 4078 arg.lock_owner.s_dev = server->s_dev;
7c513058 4079 status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
911d1aaf
TM
4080 switch (status) {
4081 case 0:
4082 request->fl_type = F_UNLCK;
4083 break;
4084 case -NFS4ERR_DENIED:
4085 status = 0;
1da177e4 4086 }
70cc6487 4087 request->fl_ops->fl_release_private(request);
8d0a8a9d 4088out:
1da177e4
LT
4089 return status;
4090}
4091
4092static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4093{
4094 struct nfs4_exception exception = { };
4095 int err;
4096
4097 do {
4098 err = nfs4_handle_exception(NFS_SERVER(state->inode),
4099 _nfs4_proc_getlk(state, cmd, request),
4100 &exception);
4101 } while (exception.retry);
4102 return err;
4103}
4104
4105static int do_vfs_lock(struct file *file, struct file_lock *fl)
4106{
4107 int res = 0;
4108 switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
4109 case FL_POSIX:
4110 res = posix_lock_file_wait(file, fl);
4111 break;
4112 case FL_FLOCK:
4113 res = flock_lock_file_wait(file, fl);
4114 break;
4115 default:
4116 BUG();
4117 }
1da177e4
LT
4118 return res;
4119}
4120
faf5f49c 4121struct nfs4_unlockdata {
911d1aaf
TM
4122 struct nfs_locku_args arg;
4123 struct nfs_locku_res res;
faf5f49c
TM
4124 struct nfs4_lock_state *lsp;
4125 struct nfs_open_context *ctx;
911d1aaf
TM
4126 struct file_lock fl;
4127 const struct nfs_server *server;
26e976a8 4128 unsigned long timestamp;
faf5f49c
TM
4129};
4130
911d1aaf
TM
4131static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
4132 struct nfs_open_context *ctx,
4133 struct nfs4_lock_state *lsp,
4134 struct nfs_seqid *seqid)
4135{
4136 struct nfs4_unlockdata *p;
4137 struct inode *inode = lsp->ls_state->inode;
4138
8535b2be 4139 p = kzalloc(sizeof(*p), GFP_NOFS);
911d1aaf
TM
4140 if (p == NULL)
4141 return NULL;
4142 p->arg.fh = NFS_FH(inode);
4143 p->arg.fl = &p->fl;
4144 p->arg.seqid = seqid;
c1d51931 4145 p->res.seqid = seqid;
911d1aaf
TM
4146 p->arg.stateid = &lsp->ls_stateid;
4147 p->lsp = lsp;
4148 atomic_inc(&lsp->ls_count);
4149 /* Ensure we don't close file until we're done freeing locks! */
4150 p->ctx = get_nfs_open_context(ctx);
4151 memcpy(&p->fl, fl, sizeof(p->fl));
4152 p->server = NFS_SERVER(inode);
4153 return p;
4154}
4155
06f814a3 4156static void nfs4_locku_release_calldata(void *data)
faf5f49c 4157{
963d8fe5 4158 struct nfs4_unlockdata *calldata = data;
911d1aaf 4159 nfs_free_seqid(calldata->arg.seqid);
06f814a3
TM
4160 nfs4_put_lock_state(calldata->lsp);
4161 put_nfs_open_context(calldata->ctx);
4162 kfree(calldata);
faf5f49c
TM
4163}
4164
963d8fe5 4165static void nfs4_locku_done(struct rpc_task *task, void *data)
faf5f49c 4166{
963d8fe5 4167 struct nfs4_unlockdata *calldata = data;
faf5f49c 4168
14516c3a
TM
4169 if (!nfs4_sequence_done(task, &calldata->res.seq_res))
4170 return;
faf5f49c
TM
4171 switch (task->tk_status) {
4172 case 0:
f597c537
TM
4173 nfs4_stateid_copy(&calldata->lsp->ls_stateid,
4174 &calldata->res.stateid);
26e976a8 4175 renew_lease(calldata->server, calldata->timestamp);
faf5f49c 4176 break;
9e33bed5
TM
4177 case -NFS4ERR_BAD_STATEID:
4178 case -NFS4ERR_OLD_STATEID:
faf5f49c
TM
4179 case -NFS4ERR_STALE_STATEID:
4180 case -NFS4ERR_EXPIRED:
faf5f49c
TM
4181 break;
4182 default:
9e33bed5 4183 if (nfs4_async_handle_error(task, calldata->server, NULL) == -EAGAIN)
d00c5d43 4184 rpc_restart_call_prepare(task);
faf5f49c 4185 }
faf5f49c
TM
4186}
4187
4ce70ada 4188static void nfs4_locku_prepare(struct rpc_task *task, void *data)
faf5f49c 4189{
4ce70ada 4190 struct nfs4_unlockdata *calldata = data;
faf5f49c 4191
911d1aaf 4192 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
faf5f49c
TM
4193 return;
4194 if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) {
963d8fe5
TM
4195 /* Note: exit _without_ running nfs4_locku_done */
4196 task->tk_action = NULL;
faf5f49c
TM
4197 return;
4198 }
26e976a8 4199 calldata->timestamp = jiffies;
035168ab 4200 if (nfs4_setup_sequence(calldata->server,
a893693c 4201 &calldata->arg.seq_args,
9d12b216 4202 &calldata->res.seq_res, task))
a893693c 4203 return;
5138fde0 4204 rpc_call_start(task);
faf5f49c
TM
4205}
4206
963d8fe5 4207static const struct rpc_call_ops nfs4_locku_ops = {
4ce70ada 4208 .rpc_call_prepare = nfs4_locku_prepare,
963d8fe5 4209 .rpc_call_done = nfs4_locku_done,
06f814a3 4210 .rpc_release = nfs4_locku_release_calldata,
963d8fe5
TM
4211};
4212
a5d16a4d
TM
4213static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
4214 struct nfs_open_context *ctx,
4215 struct nfs4_lock_state *lsp,
4216 struct nfs_seqid *seqid)
4217{
4218 struct nfs4_unlockdata *data;
5138fde0
TM
4219 struct rpc_message msg = {
4220 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
4221 .rpc_cred = ctx->cred,
4222 };
c970aa85
TM
4223 struct rpc_task_setup task_setup_data = {
4224 .rpc_client = NFS_CLIENT(lsp->ls_state->inode),
5138fde0 4225 .rpc_message = &msg,
c970aa85 4226 .callback_ops = &nfs4_locku_ops,
101070ca 4227 .workqueue = nfsiod_workqueue,
c970aa85
TM
4228 .flags = RPC_TASK_ASYNC,
4229 };
a5d16a4d 4230
137d6aca
FF
4231 /* Ensure this is an unlock - when canceling a lock, the
4232 * canceled lock is passed in, and it won't be an unlock.
4233 */
4234 fl->fl_type = F_UNLCK;
4235
a5d16a4d
TM
4236 data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
4237 if (data == NULL) {
4238 nfs_free_seqid(seqid);
4239 return ERR_PTR(-ENOMEM);
4240 }
4241
9d12b216 4242 nfs41_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
1174dd1f
TM
4243 msg.rpc_argp = &data->arg;
4244 msg.rpc_resp = &data->res;
c970aa85
TM
4245 task_setup_data.callback_data = data;
4246 return rpc_run_task(&task_setup_data);
a5d16a4d
TM
4247}
4248
faf5f49c
TM
4249static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
4250{
19e03c57 4251 struct nfs_inode *nfsi = NFS_I(state->inode);
911d1aaf 4252 struct nfs_seqid *seqid;
1da177e4 4253 struct nfs4_lock_state *lsp;
06f814a3
TM
4254 struct rpc_task *task;
4255 int status = 0;
536ff0f8 4256 unsigned char fl_flags = request->fl_flags;
faf5f49c 4257
8d0a8a9d 4258 status = nfs4_set_lock_state(state, request);
9b073574
TM
4259 /* Unlock _before_ we do the RPC call */
4260 request->fl_flags |= FL_EXISTS;
19e03c57
TM
4261 down_read(&nfsi->rwsem);
4262 if (do_vfs_lock(request->fl_file, request) == -ENOENT) {
4263 up_read(&nfsi->rwsem);
9b073574 4264 goto out;
19e03c57
TM
4265 }
4266 up_read(&nfsi->rwsem);
8d0a8a9d 4267 if (status != 0)
9b073574
TM
4268 goto out;
4269 /* Is this a delegated lock? */
4270 if (test_bit(NFS_DELEGATED_STATE, &state->flags))
4271 goto out;
8d0a8a9d 4272 lsp = request->fl_u.nfs4_fl.owner;
8535b2be 4273 seqid = nfs_alloc_seqid(&lsp->ls_seqid, GFP_KERNEL);
9b073574 4274 status = -ENOMEM;
911d1aaf 4275 if (seqid == NULL)
9b073574 4276 goto out;
cd3758e3 4277 task = nfs4_do_unlck(request, nfs_file_open_context(request->fl_file), lsp, seqid);
a5d16a4d
TM
4278 status = PTR_ERR(task);
4279 if (IS_ERR(task))
9b073574 4280 goto out;
a5d16a4d 4281 status = nfs4_wait_for_completion_rpc_task(task);
e6b3c4db 4282 rpc_put_task(task);
9b073574 4283out:
536ff0f8 4284 request->fl_flags = fl_flags;
1da177e4
LT
4285 return status;
4286}
4287
a5d16a4d
TM
4288struct nfs4_lockdata {
4289 struct nfs_lock_args arg;
4290 struct nfs_lock_res res;
4291 struct nfs4_lock_state *lsp;
4292 struct nfs_open_context *ctx;
4293 struct file_lock fl;
26e976a8 4294 unsigned long timestamp;
a5d16a4d
TM
4295 int rpc_status;
4296 int cancelled;
66179efe 4297 struct nfs_server *server;
a5d16a4d
TM
4298};
4299
4300static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
8535b2be
TM
4301 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp,
4302 gfp_t gfp_mask)
1da177e4 4303{
a5d16a4d
TM
4304 struct nfs4_lockdata *p;
4305 struct inode *inode = lsp->ls_state->inode;
1da177e4 4306 struct nfs_server *server = NFS_SERVER(inode);
a5d16a4d 4307
8535b2be 4308 p = kzalloc(sizeof(*p), gfp_mask);
a5d16a4d
TM
4309 if (p == NULL)
4310 return NULL;
4311
4312 p->arg.fh = NFS_FH(inode);
4313 p->arg.fl = &p->fl;
8535b2be 4314 p->arg.open_seqid = nfs_alloc_seqid(&lsp->ls_state->owner->so_seqid, gfp_mask);
2f74c0a0
TM
4315 if (p->arg.open_seqid == NULL)
4316 goto out_free;
8535b2be 4317 p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid, gfp_mask);
a5d16a4d 4318 if (p->arg.lock_seqid == NULL)
2f74c0a0 4319 goto out_free_seqid;
a5d16a4d 4320 p->arg.lock_stateid = &lsp->ls_stateid;
7539bbab 4321 p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
48c22eb2 4322 p->arg.lock_owner.id = lsp->ls_seqid.owner_id;
d035c36c 4323 p->arg.lock_owner.s_dev = server->s_dev;
c1d51931 4324 p->res.lock_seqid = p->arg.lock_seqid;
a5d16a4d 4325 p->lsp = lsp;
66179efe 4326 p->server = server;
a5d16a4d
TM
4327 atomic_inc(&lsp->ls_count);
4328 p->ctx = get_nfs_open_context(ctx);
4329 memcpy(&p->fl, fl, sizeof(p->fl));
4330 return p;
2f74c0a0
TM
4331out_free_seqid:
4332 nfs_free_seqid(p->arg.open_seqid);
a5d16a4d
TM
4333out_free:
4334 kfree(p);
4335 return NULL;
4336}
4337
4338static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
4339{
4340 struct nfs4_lockdata *data = calldata;
4341 struct nfs4_state *state = data->lsp->ls_state;
06735b34 4342
3110ff80 4343 dprintk("%s: begin!\n", __func__);
2f74c0a0
TM
4344 if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
4345 return;
a5d16a4d
TM
4346 /* Do we need to do an open_to_lock_owner? */
4347 if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
e6e21970
TM
4348 if (nfs_wait_on_sequence(data->arg.open_seqid, task) != 0)
4349 return;
a5d16a4d
TM
4350 data->arg.open_stateid = &state->stateid;
4351 data->arg.new_lock_owner = 1;
c1d51931 4352 data->res.open_seqid = data->arg.open_seqid;
2f74c0a0
TM
4353 } else
4354 data->arg.new_lock_owner = 0;
26e976a8 4355 data->timestamp = jiffies;
035168ab
TM
4356 if (nfs4_setup_sequence(data->server,
4357 &data->arg.seq_args,
9d12b216 4358 &data->res.seq_res, task))
66179efe 4359 return;
5138fde0 4360 rpc_call_start(task);
3110ff80 4361 dprintk("%s: done!, ret = %d\n", __func__, data->rpc_status);
a5d16a4d
TM
4362}
4363
b257957e
AB
4364static void nfs4_recover_lock_prepare(struct rpc_task *task, void *calldata)
4365{
4366 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
4367 nfs4_lock_prepare(task, calldata);
4368}
4369
a5d16a4d
TM
4370static void nfs4_lock_done(struct rpc_task *task, void *calldata)
4371{
4372 struct nfs4_lockdata *data = calldata;
4373
3110ff80 4374 dprintk("%s: begin!\n", __func__);
a5d16a4d 4375
14516c3a
TM
4376 if (!nfs4_sequence_done(task, &data->res.seq_res))
4377 return;
66179efe 4378
a5d16a4d 4379 data->rpc_status = task->tk_status;
a5d16a4d 4380 if (data->arg.new_lock_owner != 0) {
a5d16a4d
TM
4381 if (data->rpc_status == 0)
4382 nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
4383 else
4384 goto out;
4385 }
4386 if (data->rpc_status == 0) {
f597c537 4387 nfs4_stateid_copy(&data->lsp->ls_stateid, &data->res.stateid);
a5d16a4d 4388 data->lsp->ls_flags |= NFS_LOCK_INITIALIZED;
3d4ff43d 4389 renew_lease(NFS_SERVER(data->ctx->dentry->d_inode), data->timestamp);
a5d16a4d 4390 }
a5d16a4d 4391out:
3110ff80 4392 dprintk("%s: done, ret = %d!\n", __func__, data->rpc_status);
a5d16a4d
TM
4393}
4394
4395static void nfs4_lock_release(void *calldata)
4396{
4397 struct nfs4_lockdata *data = calldata;
4398
3110ff80 4399 dprintk("%s: begin!\n", __func__);
2f74c0a0 4400 nfs_free_seqid(data->arg.open_seqid);
a5d16a4d
TM
4401 if (data->cancelled != 0) {
4402 struct rpc_task *task;
4403 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
4404 data->arg.lock_seqid);
4405 if (!IS_ERR(task))
bf294b41 4406 rpc_put_task_async(task);
3110ff80 4407 dprintk("%s: cancelling lock!\n", __func__);
a5d16a4d
TM
4408 } else
4409 nfs_free_seqid(data->arg.lock_seqid);
4410 nfs4_put_lock_state(data->lsp);
4411 put_nfs_open_context(data->ctx);
4412 kfree(data);
3110ff80 4413 dprintk("%s: done!\n", __func__);
a5d16a4d
TM
4414}
4415
4416static const struct rpc_call_ops nfs4_lock_ops = {
4417 .rpc_call_prepare = nfs4_lock_prepare,
4418 .rpc_call_done = nfs4_lock_done,
4419 .rpc_release = nfs4_lock_release,
4420};
4421
b257957e
AB
4422static const struct rpc_call_ops nfs4_recover_lock_ops = {
4423 .rpc_call_prepare = nfs4_recover_lock_prepare,
4424 .rpc_call_done = nfs4_lock_done,
4425 .rpc_release = nfs4_lock_release,
4426};
4427
2bee72a6
TM
4428static void nfs4_handle_setlk_error(struct nfs_server *server, struct nfs4_lock_state *lsp, int new_lock_owner, int error)
4429{
2bee72a6
TM
4430 switch (error) {
4431 case -NFS4ERR_ADMIN_REVOKED:
4432 case -NFS4ERR_BAD_STATEID:
ecac799a 4433 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
2bee72a6
TM
4434 if (new_lock_owner != 0 ||
4435 (lsp->ls_flags & NFS_LOCK_INITIALIZED) != 0)
ecac799a 4436 nfs4_schedule_stateid_recovery(server, lsp->ls_state);
a2c0b9e2
TM
4437 break;
4438 case -NFS4ERR_STALE_STATEID:
a2c0b9e2 4439 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
ecac799a
TM
4440 case -NFS4ERR_EXPIRED:
4441 nfs4_schedule_lease_recovery(server->nfs_client);
2bee72a6
TM
4442 };
4443}
4444
afe6c27c 4445static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type)
a5d16a4d
TM
4446{
4447 struct nfs4_lockdata *data;
4448 struct rpc_task *task;
5138fde0
TM
4449 struct rpc_message msg = {
4450 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
4451 .rpc_cred = state->owner->so_cred,
4452 };
c970aa85
TM
4453 struct rpc_task_setup task_setup_data = {
4454 .rpc_client = NFS_CLIENT(state->inode),
5138fde0 4455 .rpc_message = &msg,
c970aa85 4456 .callback_ops = &nfs4_lock_ops,
101070ca 4457 .workqueue = nfsiod_workqueue,
c970aa85
TM
4458 .flags = RPC_TASK_ASYNC,
4459 };
a5d16a4d
TM
4460 int ret;
4461
3110ff80 4462 dprintk("%s: begin!\n", __func__);
cd3758e3 4463 data = nfs4_alloc_lockdata(fl, nfs_file_open_context(fl->fl_file),
8535b2be
TM
4464 fl->fl_u.nfs4_fl.owner,
4465 recovery_type == NFS_LOCK_NEW ? GFP_KERNEL : GFP_NOFS);
a5d16a4d
TM
4466 if (data == NULL)
4467 return -ENOMEM;
4468 if (IS_SETLKW(cmd))
4469 data->arg.block = 1;
b257957e
AB
4470 if (recovery_type > NFS_LOCK_NEW) {
4471 if (recovery_type == NFS_LOCK_RECLAIM)
afe6c27c 4472 data->arg.reclaim = NFS_LOCK_RECLAIM;
b257957e
AB
4473 task_setup_data.callback_ops = &nfs4_recover_lock_ops;
4474 }
9d12b216 4475 nfs41_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
1174dd1f
TM
4476 msg.rpc_argp = &data->arg;
4477 msg.rpc_resp = &data->res;
c970aa85
TM
4478 task_setup_data.callback_data = data;
4479 task = rpc_run_task(&task_setup_data);
7a1218a2 4480 if (IS_ERR(task))
a5d16a4d 4481 return PTR_ERR(task);
a5d16a4d
TM
4482 ret = nfs4_wait_for_completion_rpc_task(task);
4483 if (ret == 0) {
4484 ret = data->rpc_status;
2bee72a6
TM
4485 if (ret)
4486 nfs4_handle_setlk_error(data->server, data->lsp,
4487 data->arg.new_lock_owner, ret);
a5d16a4d
TM
4488 } else
4489 data->cancelled = 1;
e6b3c4db 4490 rpc_put_task(task);
3110ff80 4491 dprintk("%s: done, ret = %d!\n", __func__, ret);
a5d16a4d 4492 return ret;
1da177e4
LT
4493}
4494
4495static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
4496{
202b50dc
TM
4497 struct nfs_server *server = NFS_SERVER(state->inode);
4498 struct nfs4_exception exception = { };
4499 int err;
4500
4501 do {
42a2d13e
TM
4502 /* Cache the lock if possible... */
4503 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
4504 return 0;
afe6c27c 4505 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_RECLAIM);
168667c4 4506 if (err != -NFS4ERR_DELAY)
202b50dc
TM
4507 break;
4508 nfs4_handle_exception(server, err, &exception);
4509 } while (exception.retry);
4510 return err;
1da177e4
LT
4511}
4512
4513static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
4514{
202b50dc
TM
4515 struct nfs_server *server = NFS_SERVER(state->inode);
4516 struct nfs4_exception exception = { };
4517 int err;
4518
6bfc93ef
TM
4519 err = nfs4_set_lock_state(state, request);
4520 if (err != 0)
4521 return err;
202b50dc 4522 do {
42a2d13e
TM
4523 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
4524 return 0;
afe6c27c 4525 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_EXPIRED);
a9ed2e25
TM
4526 switch (err) {
4527 default:
4528 goto out;
4529 case -NFS4ERR_GRACE:
4530 case -NFS4ERR_DELAY:
4531 nfs4_handle_exception(server, err, &exception);
4532 err = 0;
4533 }
202b50dc 4534 } while (exception.retry);
a9ed2e25 4535out:
202b50dc 4536 return err;
1da177e4
LT
4537}
4538
f062eb6c 4539#if defined(CONFIG_NFS_V4_1)
b01dd1d8 4540static int nfs41_check_expired_locks(struct nfs4_state *state)
f062eb6c 4541{
b01dd1d8
BS
4542 int status, ret = NFS_OK;
4543 struct nfs4_lock_state *lsp;
f062eb6c
BS
4544 struct nfs_server *server = NFS_SERVER(state->inode);
4545
b01dd1d8
BS
4546 list_for_each_entry(lsp, &state->lock_states, ls_locks) {
4547 if (lsp->ls_flags & NFS_LOCK_INITIALIZED) {
4548 status = nfs41_test_stateid(server, &lsp->ls_stateid);
4549 if (status != NFS_OK) {
4550 nfs41_free_stateid(server, &lsp->ls_stateid);
4551 lsp->ls_flags &= ~NFS_LOCK_INITIALIZED;
4552 ret = status;
4553 }
4554 }
4555 };
4556
4557 return ret;
4558}
4559
4560static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request)
4561{
4562 int status = NFS_OK;
4563
4564 if (test_bit(LK_STATE_IN_USE, &state->flags))
4565 status = nfs41_check_expired_locks(state);
f062eb6c 4566 if (status == NFS_OK)
b01dd1d8 4567 return status;
f062eb6c
BS
4568 return nfs4_lock_expired(state, request);
4569}
4570#endif
4571
1da177e4
LT
4572static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4573{
19e03c57 4574 struct nfs_inode *nfsi = NFS_I(state->inode);
01c3b861 4575 unsigned char fl_flags = request->fl_flags;
8e469ebd 4576 int status = -ENOLCK;
1da177e4 4577
8e469ebd
TM
4578 if ((fl_flags & FL_POSIX) &&
4579 !test_bit(NFS_STATE_POSIX_LOCKS, &state->flags))
4580 goto out;
6bfc93ef 4581 /* Is this a delegated open? */
6bfc93ef
TM
4582 status = nfs4_set_lock_state(state, request);
4583 if (status != 0)
4584 goto out;
01c3b861
TM
4585 request->fl_flags |= FL_ACCESS;
4586 status = do_vfs_lock(request->fl_file, request);
4587 if (status < 0)
4588 goto out;
19e03c57 4589 down_read(&nfsi->rwsem);
01c3b861 4590 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
01c3b861 4591 /* Yes: cache locks! */
01c3b861 4592 /* ...but avoid races with delegation recall... */
19e03c57
TM
4593 request->fl_flags = fl_flags & ~FL_SLEEP;
4594 status = do_vfs_lock(request->fl_file, request);
4595 goto out_unlock;
01c3b861 4596 }
afe6c27c 4597 status = _nfs4_do_setlk(state, cmd, request, NFS_LOCK_NEW);
6bfc93ef 4598 if (status != 0)
01c3b861 4599 goto out_unlock;
6bfc93ef 4600 /* Note: we always want to sleep here! */
01c3b861 4601 request->fl_flags = fl_flags | FL_SLEEP;
6bfc93ef 4602 if (do_vfs_lock(request->fl_file, request) < 0)
a030889a
WAA
4603 printk(KERN_WARNING "NFS: %s: VFS is out of sync with lock "
4604 "manager!\n", __func__);
01c3b861 4605out_unlock:
19e03c57 4606 up_read(&nfsi->rwsem);
01c3b861
TM
4607out:
4608 request->fl_flags = fl_flags;
1da177e4
LT
4609 return status;
4610}
4611
4612static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
4613{
a1d0b5ee
TM
4614 struct nfs4_exception exception = {
4615 .state = state,
4616 };
1da177e4
LT
4617 int err;
4618
4619 do {
965b5d67
TM
4620 err = _nfs4_proc_setlk(state, cmd, request);
4621 if (err == -NFS4ERR_DENIED)
4622 err = -EAGAIN;
1da177e4 4623 err = nfs4_handle_exception(NFS_SERVER(state->inode),
965b5d67 4624 err, &exception);
1da177e4
LT
4625 } while (exception.retry);
4626 return err;
4627}
4628
4629static int
4630nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
4631{
4632 struct nfs_open_context *ctx;
4633 struct nfs4_state *state;
4634 unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
4635 int status;
4636
4637 /* verify open state */
cd3758e3 4638 ctx = nfs_file_open_context(filp);
1da177e4
LT
4639 state = ctx->state;
4640
4641 if (request->fl_start < 0 || request->fl_end < 0)
4642 return -EINVAL;
4643
d953126a
TM
4644 if (IS_GETLK(cmd)) {
4645 if (state != NULL)
4646 return nfs4_proc_getlk(state, F_GETLK, request);
4647 return 0;
4648 }
1da177e4
LT
4649
4650 if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
4651 return -EINVAL;
4652
d953126a
TM
4653 if (request->fl_type == F_UNLCK) {
4654 if (state != NULL)
4655 return nfs4_proc_unlck(state, cmd, request);
4656 return 0;
4657 }
1da177e4 4658
d953126a
TM
4659 if (state == NULL)
4660 return -ENOLCK;
1da177e4
LT
4661 do {
4662 status = nfs4_proc_setlk(state, cmd, request);
4663 if ((status != -EAGAIN) || IS_SETLK(cmd))
4664 break;
4665 timeout = nfs4_set_lock_task_retry(timeout);
4666 status = -ERESTARTSYS;
4667 if (signalled())
4668 break;
4669 } while(status < 0);
1da177e4
LT
4670 return status;
4671}
4672
888e694c
TM
4673int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
4674{
4675 struct nfs_server *server = NFS_SERVER(state->inode);
4676 struct nfs4_exception exception = { };
4677 int err;
4678
4679 err = nfs4_set_lock_state(state, fl);
4680 if (err != 0)
4681 goto out;
4682 do {
afe6c27c 4683 err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW);
d5122201
TM
4684 switch (err) {
4685 default:
a030889a
WAA
4686 printk(KERN_ERR "NFS: %s: unhandled error "
4687 "%d.\n", __func__, err);
d5122201 4688 case 0:
965b5d67 4689 case -ESTALE:
d5122201
TM
4690 goto out;
4691 case -NFS4ERR_EXPIRED:
0ced63d1 4692 nfs4_schedule_stateid_recovery(server, state);
d5122201 4693 case -NFS4ERR_STALE_CLIENTID:
965b5d67 4694 case -NFS4ERR_STALE_STATEID:
0400a6b0
TM
4695 nfs4_schedule_lease_recovery(server->nfs_client);
4696 goto out;
74e7bb73
RL
4697 case -NFS4ERR_BADSESSION:
4698 case -NFS4ERR_BADSLOT:
4699 case -NFS4ERR_BAD_HIGH_SLOT:
4700 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
4701 case -NFS4ERR_DEADSESSION:
0400a6b0 4702 nfs4_schedule_session_recovery(server->nfs_client->cl_session);
d5122201 4703 goto out;
965b5d67
TM
4704 case -ERESTARTSYS:
4705 /*
4706 * The show must go on: exit, but mark the
4707 * stateid as needing recovery.
4708 */
a1d0b5ee 4709 case -NFS4ERR_DELEG_REVOKED:
965b5d67
TM
4710 case -NFS4ERR_ADMIN_REVOKED:
4711 case -NFS4ERR_BAD_STATEID:
4712 case -NFS4ERR_OPENMODE:
0400a6b0 4713 nfs4_schedule_stateid_recovery(server, state);
965b5d67
TM
4714 err = 0;
4715 goto out;
168667c4
TM
4716 case -EKEYEXPIRED:
4717 /*
4718 * User RPCSEC_GSS context has expired.
4719 * We cannot recover this stateid now, so
4720 * skip it and allow recovery thread to
4721 * proceed.
4722 */
4723 err = 0;
4724 goto out;
965b5d67
TM
4725 case -ENOMEM:
4726 case -NFS4ERR_DENIED:
4727 /* kill_proc(fl->fl_pid, SIGLOST, 1); */
4728 err = 0;
4729 goto out;
d5122201
TM
4730 case -NFS4ERR_DELAY:
4731 break;
4732 }
888e694c
TM
4733 err = nfs4_handle_exception(server, err, &exception);
4734 } while (exception.retry);
4735out:
4736 return err;
4737}
6b3b5496 4738
d3c7b7cc
TM
4739static void nfs4_release_lockowner_release(void *calldata)
4740{
4741 kfree(calldata);
4742}
4743
4744const struct rpc_call_ops nfs4_release_lockowner_ops = {
4745 .rpc_release = nfs4_release_lockowner_release,
4746};
4747
4748void nfs4_release_lockowner(const struct nfs4_lock_state *lsp)
4749{
4750 struct nfs_server *server = lsp->ls_state->owner->so_server;
4751 struct nfs_release_lockowner_args *args;
4752 struct rpc_message msg = {
4753 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RELEASE_LOCKOWNER],
4754 };
4755
4756 if (server->nfs_client->cl_mvops->minor_version != 0)
4757 return;
4758 args = kmalloc(sizeof(*args), GFP_NOFS);
4759 if (!args)
4760 return;
4761 args->lock_owner.clientid = server->nfs_client->cl_clientid;
48c22eb2 4762 args->lock_owner.id = lsp->ls_seqid.owner_id;
d035c36c 4763 args->lock_owner.s_dev = server->s_dev;
d3c7b7cc
TM
4764 msg.rpc_argp = args;
4765 rpc_call_async(server->client, &msg, 0, &nfs4_release_lockowner_ops, args);
4766}
4767
aa1870af
BF
4768#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
4769
64c2ce8b
AK
4770static int nfs4_xattr_set_nfs4_acl(struct dentry *dentry, const char *key,
4771 const void *buf, size_t buflen,
4772 int flags, int type)
6b3b5496 4773{
64c2ce8b
AK
4774 if (strcmp(key, "") != 0)
4775 return -EINVAL;
4b580ee3 4776
64c2ce8b 4777 return nfs4_proc_set_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
4778}
4779
64c2ce8b
AK
4780static int nfs4_xattr_get_nfs4_acl(struct dentry *dentry, const char *key,
4781 void *buf, size_t buflen, int type)
6b3b5496 4782{
64c2ce8b
AK
4783 if (strcmp(key, "") != 0)
4784 return -EINVAL;
aa1870af 4785
64c2ce8b 4786 return nfs4_proc_get_acl(dentry->d_inode, buf, buflen);
6b3b5496
BF
4787}
4788
64c2ce8b
AK
4789static size_t nfs4_xattr_list_nfs4_acl(struct dentry *dentry, char *list,
4790 size_t list_len, const char *name,
4791 size_t name_len, int type)
6b3b5496 4792{
64c2ce8b 4793 size_t len = sizeof(XATTR_NAME_NFSV4_ACL);
6b3b5496 4794
096455a2
BF
4795 if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
4796 return 0;
64c2ce8b
AK
4797
4798 if (list && len <= list_len)
4799 memcpy(list, XATTR_NAME_NFSV4_ACL, len);
aa1870af 4800 return len;
6b3b5496
BF
4801}
4802
533eb461
AA
4803/*
4804 * nfs_fhget will use either the mounted_on_fileid or the fileid
4805 */
69aaaae1
TM
4806static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr)
4807{
533eb461
AA
4808 if (!(((fattr->valid & NFS_ATTR_FATTR_MOUNTED_ON_FILEID) ||
4809 (fattr->valid & NFS_ATTR_FATTR_FILEID)) &&
4810 (fattr->valid & NFS_ATTR_FATTR_FSID) &&
81934ddb 4811 (fattr->valid & NFS_ATTR_FATTR_V4_LOCATIONS)))
69aaaae1
TM
4812 return;
4813
4814 fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
81934ddb 4815 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_V4_REFERRAL;
69aaaae1
TM
4816 fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
4817 fattr->nlink = 2;
4818}
4819
56659e99 4820int nfs4_proc_fs_locations(struct inode *dir, const struct qstr *name,
7aaa0b3b 4821 struct nfs4_fs_locations *fs_locations, struct page *page)
683b57b4
TM
4822{
4823 struct nfs_server *server = NFS_SERVER(dir);
4824 u32 bitmask[2] = {
361e624f 4825 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
683b57b4
TM
4826 };
4827 struct nfs4_fs_locations_arg args = {
4828 .dir_fh = NFS_FH(dir),
c228fd3a 4829 .name = name,
683b57b4
TM
4830 .page = page,
4831 .bitmask = bitmask,
4832 };
22958463
BH
4833 struct nfs4_fs_locations_res res = {
4834 .fs_locations = fs_locations,
4835 };
683b57b4
TM
4836 struct rpc_message msg = {
4837 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
4838 .rpc_argp = &args,
22958463 4839 .rpc_resp = &res,
683b57b4
TM
4840 };
4841 int status;
4842
3110ff80 4843 dprintk("%s: start\n", __func__);
533eb461
AA
4844
4845 /* Ask for the fileid of the absent filesystem if mounted_on_fileid
4846 * is not supported */
4847 if (NFS_SERVER(dir)->attr_bitmask[1] & FATTR4_WORD1_MOUNTED_ON_FILEID)
4848 bitmask[1] |= FATTR4_WORD1_MOUNTED_ON_FILEID;
4849 else
4850 bitmask[0] |= FATTR4_WORD0_FILEID;
4851
c228fd3a 4852 nfs_fattr_init(&fs_locations->fattr);
683b57b4 4853 fs_locations->server = server;
830b8e33 4854 fs_locations->nlocations = 0;
7c513058 4855 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3110ff80 4856 dprintk("%s: returned status = %d\n", __func__, status);
683b57b4
TM
4857 return status;
4858}
4859
5a5ea0d4
BS
4860static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors)
4861{
4862 int status;
4863 struct nfs4_secinfo_arg args = {
4864 .dir_fh = NFS_FH(dir),
4865 .name = name,
4866 };
4867 struct nfs4_secinfo_res res = {
4868 .flavors = flavors,
4869 };
4870 struct rpc_message msg = {
4871 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO],
4872 .rpc_argp = &args,
4873 .rpc_resp = &res,
4874 };
4875
4876 dprintk("NFS call secinfo %s\n", name->name);
4877 status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
4878 dprintk("NFS reply secinfo: %d\n", status);
4879 return status;
4880}
4881
4882int nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors)
4883{
4884 struct nfs4_exception exception = { };
4885 int err;
4886 do {
4887 err = nfs4_handle_exception(NFS_SERVER(dir),
4888 _nfs4_proc_secinfo(dir, name, flavors),
4889 &exception);
4890 } while (exception.retry);
4891 return err;
4892}
4893
557134a3 4894#ifdef CONFIG_NFS_V4_1
357f54d6
AA
4895/*
4896 * Check the exchange flags returned by the server for invalid flags, having
4897 * both PNFS and NON_PNFS flags set, and not having one of NON_PNFS, PNFS, or
4898 * DS flags set.
4899 */
4900static int nfs4_check_cl_exchange_flags(u32 flags)
4901{
4902 if (flags & ~EXCHGID4_FLAG_MASK_R)
4903 goto out_inval;
4904 if ((flags & EXCHGID4_FLAG_USE_PNFS_MDS) &&
4905 (flags & EXCHGID4_FLAG_USE_NON_PNFS))
4906 goto out_inval;
4907 if (!(flags & (EXCHGID4_FLAG_MASK_PNFS)))
4908 goto out_inval;
4909 return NFS_OK;
4910out_inval:
4911 return -NFS4ERR_INVAL;
4912}
4913
78fe0f41
WAA
4914static bool
4915nfs41_same_server_scope(struct server_scope *a, struct server_scope *b)
4916{
4917 if (a->server_scope_sz == b->server_scope_sz &&
4918 memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
4919 return true;
4920
4921 return false;
4922}
4923
99fe60d0
BH
4924/*
4925 * nfs4_proc_exchange_id()
4926 *
4927 * Since the clientid has expired, all compounds using sessions
4928 * associated with the stale clientid will be returning
4929 * NFS4ERR_BADSESSION in the sequence operation, and will therefore
4930 * be in some phase of session reset.
4931 */
4d643d1d 4932int nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred)
99fe60d0
BH
4933{
4934 nfs4_verifier verifier;
4935 struct nfs41_exchange_id_args args = {
4936 .client = clp,
357f54d6 4937 .flags = EXCHGID4_FLAG_SUPP_MOVED_REFER,
99fe60d0
BH
4938 };
4939 struct nfs41_exchange_id_res res = {
4940 .client = clp,
4941 };
4942 int status;
4943 struct rpc_message msg = {
4944 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_EXCHANGE_ID],
4945 .rpc_argp = &args,
4946 .rpc_resp = &res,
4947 .rpc_cred = cred,
4948 };
4949 __be32 *p;
4950
4951 dprintk("--> %s\n", __func__);
4952 BUG_ON(clp == NULL);
a7b72103 4953
99fe60d0
BH
4954 p = (u32 *)verifier.data;
4955 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
4956 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
4957 args.verifier = &verifier;
4958
c7a360b0
AA
4959 args.id_len = scnprintf(args.id, sizeof(args.id),
4960 "%s/%s.%s/%u",
4961 clp->cl_ipaddr,
4962 init_utsname()->nodename,
4963 init_utsname()->domainname,
4964 clp->cl_rpcclient->cl_auth->au_flavor);
99fe60d0 4965
78fe0f41 4966 res.server_scope = kzalloc(sizeof(struct server_scope), GFP_KERNEL);
9edbd953
WAA
4967 if (unlikely(!res.server_scope)) {
4968 status = -ENOMEM;
4969 goto out;
4970 }
78fe0f41 4971
7d2ed9ac
WAA
4972 res.impl_id = kzalloc(sizeof(struct nfs41_impl_id), GFP_KERNEL);
4973 if (unlikely(!res.impl_id)) {
4974 status = -ENOMEM;
4975 goto out_server_scope;
4976 }
4977
1bd714f2 4978 status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
c7a360b0
AA
4979 if (!status)
4980 status = nfs4_check_cl_exchange_flags(clp->cl_exchange_flags);
78fe0f41 4981
7d2ed9ac
WAA
4982 if (!status) {
4983 /* use the most recent implementation id */
4984 kfree(clp->impl_id);
4985 clp->impl_id = res.impl_id;
4986 } else
4987 kfree(res.impl_id);
4988
78fe0f41
WAA
4989 if (!status) {
4990 if (clp->server_scope &&
4991 !nfs41_same_server_scope(clp->server_scope,
4992 res.server_scope)) {
4993 dprintk("%s: server_scope mismatch detected\n",
4994 __func__);
4995 set_bit(NFS4CLNT_SERVER_SCOPE_MISMATCH, &clp->cl_state);
4996 kfree(clp->server_scope);
4997 clp->server_scope = NULL;
4998 }
4999
9edbd953 5000 if (!clp->server_scope) {
78fe0f41 5001 clp->server_scope = res.server_scope;
9edbd953
WAA
5002 goto out;
5003 }
78fe0f41 5004 }
7d2ed9ac
WAA
5005
5006out_server_scope:
9edbd953
WAA
5007 kfree(res.server_scope);
5008out:
7d2ed9ac
WAA
5009 if (clp->impl_id)
5010 dprintk("%s: Server Implementation ID: "
5011 "domain: %s, name: %s, date: %llu,%u\n",
5012 __func__, clp->impl_id->domain, clp->impl_id->name,
5013 clp->impl_id->date.seconds,
5014 clp->impl_id->date.nseconds);
99fe60d0
BH
5015 dprintk("<-- %s status= %d\n", __func__, status);
5016 return status;
5017}
5018
2050f0cc
AA
5019struct nfs4_get_lease_time_data {
5020 struct nfs4_get_lease_time_args *args;
5021 struct nfs4_get_lease_time_res *res;
5022 struct nfs_client *clp;
5023};
5024
5025static void nfs4_get_lease_time_prepare(struct rpc_task *task,
5026 void *calldata)
5027{
5028 int ret;
5029 struct nfs4_get_lease_time_data *data =
5030 (struct nfs4_get_lease_time_data *)calldata;
5031
5032 dprintk("--> %s\n", __func__);
689cf5c1 5033 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
2050f0cc
AA
5034 /* just setup sequence, do not trigger session recovery
5035 since we're invoked within one */
5036 ret = nfs41_setup_sequence(data->clp->cl_session,
689cf5c1 5037 &data->args->la_seq_args,
9d12b216 5038 &data->res->lr_seq_res, task);
2050f0cc
AA
5039
5040 BUG_ON(ret == -EAGAIN);
5041 rpc_call_start(task);
5042 dprintk("<-- %s\n", __func__);
5043}
5044
5045/*
5046 * Called from nfs4_state_manager thread for session setup, so don't recover
5047 * from sequence operation or clientid errors.
5048 */
5049static void nfs4_get_lease_time_done(struct rpc_task *task, void *calldata)
5050{
5051 struct nfs4_get_lease_time_data *data =
5052 (struct nfs4_get_lease_time_data *)calldata;
5053
5054 dprintk("--> %s\n", __func__);
14516c3a
TM
5055 if (!nfs41_sequence_done(task, &data->res->lr_seq_res))
5056 return;
2050f0cc
AA
5057 switch (task->tk_status) {
5058 case -NFS4ERR_DELAY:
5059 case -NFS4ERR_GRACE:
5060 dprintk("%s Retry: tk_status %d\n", __func__, task->tk_status);
5061 rpc_delay(task, NFS4_POLL_RETRY_MIN);
5062 task->tk_status = 0;
a8a4ae3a
AA
5063 /* fall through */
5064 case -NFS4ERR_RETRY_UNCACHED_REP:
d00c5d43 5065 rpc_restart_call_prepare(task);
2050f0cc
AA
5066 return;
5067 }
2050f0cc
AA
5068 dprintk("<-- %s\n", __func__);
5069}
5070
5071struct rpc_call_ops nfs4_get_lease_time_ops = {
5072 .rpc_call_prepare = nfs4_get_lease_time_prepare,
5073 .rpc_call_done = nfs4_get_lease_time_done,
5074};
5075
5076int nfs4_proc_get_lease_time(struct nfs_client *clp, struct nfs_fsinfo *fsinfo)
5077{
5078 struct rpc_task *task;
5079 struct nfs4_get_lease_time_args args;
5080 struct nfs4_get_lease_time_res res = {
5081 .lr_fsinfo = fsinfo,
5082 };
5083 struct nfs4_get_lease_time_data data = {
5084 .args = &args,
5085 .res = &res,
5086 .clp = clp,
5087 };
5088 struct rpc_message msg = {
5089 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GET_LEASE_TIME],
5090 .rpc_argp = &args,
5091 .rpc_resp = &res,
5092 };
5093 struct rpc_task_setup task_setup = {
5094 .rpc_client = clp->cl_rpcclient,
5095 .rpc_message = &msg,
5096 .callback_ops = &nfs4_get_lease_time_ops,
1bd714f2
TM
5097 .callback_data = &data,
5098 .flags = RPC_TASK_TIMEOUT,
2050f0cc
AA
5099 };
5100 int status;
5101
9d12b216 5102 nfs41_init_sequence(&args.la_seq_args, &res.lr_seq_res, 0);
2050f0cc
AA
5103 dprintk("--> %s\n", __func__);
5104 task = rpc_run_task(&task_setup);
5105
5106 if (IS_ERR(task))
5107 status = PTR_ERR(task);
5108 else {
5109 status = task->tk_status;
5110 rpc_put_task(task);
5111 }
5112 dprintk("<-- %s return %d\n", __func__, status);
5113
5114 return status;
5115}
5116
f86f36a6
TM
5117static struct nfs4_slot *nfs4_alloc_slots(u32 max_slots, gfp_t gfp_flags)
5118{
5119 return kcalloc(max_slots, sizeof(struct nfs4_slot), gfp_flags);
5120}
5121
5122static void nfs4_add_and_init_slots(struct nfs4_slot_table *tbl,
5123 struct nfs4_slot *new,
5124 u32 max_slots,
5125 u32 ivalue)
5126{
5127 struct nfs4_slot *old = NULL;
5128 u32 i;
5129
5130 spin_lock(&tbl->slot_tbl_lock);
5131 if (new) {
5132 old = tbl->slots;
5133 tbl->slots = new;
5134 tbl->max_slots = max_slots;
5135 }
5136 tbl->highest_used_slotid = -1; /* no slot is currently used */
5137 for (i = 0; i < tbl->max_slots; i++)
5138 tbl->slots[i].seq_nr = ivalue;
5139 spin_unlock(&tbl->slot_tbl_lock);
5140 kfree(old);
5141}
5142
b73dafa7 5143/*
f86f36a6 5144 * (re)Initialise a slot table
b73dafa7 5145 */
f86f36a6
TM
5146static int nfs4_realloc_slot_table(struct nfs4_slot_table *tbl, u32 max_reqs,
5147 u32 ivalue)
ac72b7b3 5148{
104aeba4 5149 struct nfs4_slot *new = NULL;
f86f36a6 5150 int ret = -ENOMEM;
ac72b7b3 5151
104aeba4
AA
5152 dprintk("--> %s: max_reqs=%u, tbl->max_slots %d\n", __func__,
5153 max_reqs, tbl->max_slots);
ac72b7b3 5154
104aeba4
AA
5155 /* Does the newly negotiated max_reqs match the existing slot table? */
5156 if (max_reqs != tbl->max_slots) {
f86f36a6 5157 new = nfs4_alloc_slots(max_reqs, GFP_NOFS);
104aeba4
AA
5158 if (!new)
5159 goto out;
104aeba4 5160 }
f86f36a6
TM
5161 ret = 0;
5162
5163 nfs4_add_and_init_slots(tbl, new, max_reqs, ivalue);
ac72b7b3
AA
5164 dprintk("%s: tbl=%p slots=%p max_slots=%d\n", __func__,
5165 tbl, tbl->slots, tbl->max_slots);
5166out:
5167 dprintk("<-- %s: return %d\n", __func__, ret);
5168 return ret;
5169}
5170
f8625a6a
RL
5171/* Destroy the slot table */
5172static void nfs4_destroy_slot_tables(struct nfs4_session *session)
5173{
5174 if (session->fc_slot_table.slots != NULL) {
5175 kfree(session->fc_slot_table.slots);
5176 session->fc_slot_table.slots = NULL;
5177 }
5178 if (session->bc_slot_table.slots != NULL) {
5179 kfree(session->bc_slot_table.slots);
5180 session->bc_slot_table.slots = NULL;
5181 }
5182 return;
5183}
5184
050047ce 5185/*
aacd5537 5186 * Initialize or reset the forechannel and backchannel tables
050047ce 5187 */
aacd5537 5188static int nfs4_setup_session_slot_tables(struct nfs4_session *ses)
050047ce 5189{
f26468fb 5190 struct nfs4_slot_table *tbl;
aacd5537 5191 int status;
050047ce 5192
aacd5537
AA
5193 dprintk("--> %s\n", __func__);
5194 /* Fore channel */
5195 tbl = &ses->fc_slot_table;
f86f36a6
TM
5196 status = nfs4_realloc_slot_table(tbl, ses->fc_attrs.max_reqs, 1);
5197 if (status) /* -ENOMEM */
5198 return status;
aacd5537
AA
5199 /* Back channel */
5200 tbl = &ses->bc_slot_table;
f86f36a6
TM
5201 status = nfs4_realloc_slot_table(tbl, ses->bc_attrs.max_reqs, 0);
5202 if (status && tbl->slots == NULL)
5203 /* Fore and back channel share a connection so get
5204 * both slot tables or neither */
5205 nfs4_destroy_slot_tables(ses);
f8625a6a 5206 return status;
557134a3
AA
5207}
5208
5209struct nfs4_session *nfs4_alloc_session(struct nfs_client *clp)
5210{
5211 struct nfs4_session *session;
5212 struct nfs4_slot_table *tbl;
5213
8535b2be 5214 session = kzalloc(sizeof(struct nfs4_session), GFP_NOFS);
557134a3
AA
5215 if (!session)
5216 return NULL;
76db6d95 5217
557134a3 5218 tbl = &session->fc_slot_table;
45d43c29 5219 tbl->highest_used_slotid = NFS4_NO_SLOT;
557134a3 5220 spin_lock_init(&tbl->slot_tbl_lock);
689cf5c1 5221 rpc_init_priority_wait_queue(&tbl->slot_tbl_waitq, "ForeChannel Slot table");
42acd021 5222 init_completion(&tbl->complete);
f8625a6a
RL
5223
5224 tbl = &session->bc_slot_table;
45d43c29 5225 tbl->highest_used_slotid = NFS4_NO_SLOT;
f8625a6a
RL
5226 spin_lock_init(&tbl->slot_tbl_lock);
5227 rpc_init_wait_queue(&tbl->slot_tbl_waitq, "BackChannel Slot table");
42acd021 5228 init_completion(&tbl->complete);
f8625a6a 5229
1055d76d
TM
5230 session->session_state = 1<<NFS4_SESSION_INITING;
5231
557134a3
AA
5232 session->clp = clp;
5233 return session;
5234}
5235
5236void nfs4_destroy_session(struct nfs4_session *session)
5237{
2446ab60
TM
5238 struct rpc_xprt *xprt;
5239
5a0ffe54 5240 nfs4_proc_destroy_session(session);
2446ab60
TM
5241
5242 rcu_read_lock();
5243 xprt = rcu_dereference(session->clp->cl_rpcclient->cl_xprt);
5244 rcu_read_unlock();
5a0ffe54 5245 dprintk("%s Destroy backchannel for xprt %p\n",
2446ab60
TM
5246 __func__, xprt);
5247 xprt_destroy_backchannel(xprt, NFS41_BC_MIN_CALLBACKS);
f8625a6a 5248 nfs4_destroy_slot_tables(session);
557134a3
AA
5249 kfree(session);
5250}
5251
fc931582
AA
5252/*
5253 * Initialize the values to be used by the client in CREATE_SESSION
5254 * If nfs4_init_session set the fore channel request and response sizes,
5255 * use them.
5256 *
5257 * Set the back channel max_resp_sz_cached to zero to force the client to
5258 * always set csa_cachethis to FALSE because the current implementation
5259 * of the back channel DRC only supports caching the CB_SEQUENCE operation.
5260 */
5261static void nfs4_init_channel_attrs(struct nfs41_create_session_args *args)
5262{
5263 struct nfs4_session *session = args->client->cl_session;
5264 unsigned int mxrqst_sz = session->fc_attrs.max_rqst_sz,
5265 mxresp_sz = session->fc_attrs.max_resp_sz;
5266
5267 if (mxrqst_sz == 0)
5268 mxrqst_sz = NFS_MAX_FILE_IO_SIZE;
5269 if (mxresp_sz == 0)
5270 mxresp_sz = NFS_MAX_FILE_IO_SIZE;
5271 /* Fore channel attributes */
fc931582
AA
5272 args->fc_attrs.max_rqst_sz = mxrqst_sz;
5273 args->fc_attrs.max_resp_sz = mxresp_sz;
fc931582 5274 args->fc_attrs.max_ops = NFS4_MAX_OPS;
ef159e91 5275 args->fc_attrs.max_reqs = max_session_slots;
fc931582
AA
5276
5277 dprintk("%s: Fore Channel : max_rqst_sz=%u max_resp_sz=%u "
8e0d46e1 5278 "max_ops=%u max_reqs=%u\n",
fc931582
AA
5279 __func__,
5280 args->fc_attrs.max_rqst_sz, args->fc_attrs.max_resp_sz,
8e0d46e1 5281 args->fc_attrs.max_ops, args->fc_attrs.max_reqs);
fc931582
AA
5282
5283 /* Back channel attributes */
fc931582
AA
5284 args->bc_attrs.max_rqst_sz = PAGE_SIZE;
5285 args->bc_attrs.max_resp_sz = PAGE_SIZE;
5286 args->bc_attrs.max_resp_sz_cached = 0;
5287 args->bc_attrs.max_ops = NFS4_MAX_BACK_CHANNEL_OPS;
5288 args->bc_attrs.max_reqs = 1;
5289
5290 dprintk("%s: Back Channel : max_rqst_sz=%u max_resp_sz=%u "
5291 "max_resp_sz_cached=%u max_ops=%u max_reqs=%u\n",
5292 __func__,
5293 args->bc_attrs.max_rqst_sz, args->bc_attrs.max_resp_sz,
5294 args->bc_attrs.max_resp_sz_cached, args->bc_attrs.max_ops,
5295 args->bc_attrs.max_reqs);
5296}
5297
43c2e885 5298static int nfs4_verify_fore_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
8d35301d 5299{
43c2e885
BF
5300 struct nfs4_channel_attrs *sent = &args->fc_attrs;
5301 struct nfs4_channel_attrs *rcvd = &session->fc_attrs;
5302
43c2e885
BF
5303 if (rcvd->max_resp_sz > sent->max_resp_sz)
5304 return -EINVAL;
5305 /*
5306 * Our requested max_ops is the minimum we need; we're not
5307 * prepared to break up compounds into smaller pieces than that.
5308 * So, no point even trying to continue if the server won't
5309 * cooperate:
5310 */
5311 if (rcvd->max_ops < sent->max_ops)
5312 return -EINVAL;
5313 if (rcvd->max_reqs == 0)
5314 return -EINVAL;
b4b9a0c1
VG
5315 if (rcvd->max_reqs > NFS4_MAX_SLOT_TABLE)
5316 rcvd->max_reqs = NFS4_MAX_SLOT_TABLE;
43c2e885 5317 return 0;
8d35301d
AA
5318}
5319
43c2e885
BF
5320static int nfs4_verify_back_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
5321{
5322 struct nfs4_channel_attrs *sent = &args->bc_attrs;
5323 struct nfs4_channel_attrs *rcvd = &session->bc_attrs;
8d35301d 5324
43c2e885
BF
5325 if (rcvd->max_rqst_sz > sent->max_rqst_sz)
5326 return -EINVAL;
5327 if (rcvd->max_resp_sz < sent->max_resp_sz)
5328 return -EINVAL;
5329 if (rcvd->max_resp_sz_cached > sent->max_resp_sz_cached)
5330 return -EINVAL;
5331 /* These would render the backchannel useless: */
b4b9a0c1 5332 if (rcvd->max_ops != sent->max_ops)
43c2e885 5333 return -EINVAL;
b4b9a0c1 5334 if (rcvd->max_reqs != sent->max_reqs)
43c2e885
BF
5335 return -EINVAL;
5336 return 0;
5337}
8d35301d 5338
8d35301d
AA
5339static int nfs4_verify_channel_attrs(struct nfs41_create_session_args *args,
5340 struct nfs4_session *session)
5341{
43c2e885 5342 int ret;
8d35301d 5343
43c2e885
BF
5344 ret = nfs4_verify_fore_channel_attrs(args, session);
5345 if (ret)
5346 return ret;
5347 return nfs4_verify_back_channel_attrs(args, session);
8d35301d
AA
5348}
5349
fc931582
AA
5350static int _nfs4_proc_create_session(struct nfs_client *clp)
5351{
5352 struct nfs4_session *session = clp->cl_session;
5353 struct nfs41_create_session_args args = {
5354 .client = clp,
5355 .cb_program = NFS4_CALLBACK,
5356 };
5357 struct nfs41_create_session_res res = {
5358 .client = clp,
5359 };
5360 struct rpc_message msg = {
5361 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE_SESSION],
5362 .rpc_argp = &args,
5363 .rpc_resp = &res,
5364 };
5365 int status;
5366
5367 nfs4_init_channel_attrs(&args);
0f91421e 5368 args.flags = (SESSION4_PERSIST | SESSION4_BACK_CHAN);
fc931582 5369
1bd714f2 5370 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
fc931582 5371
8d35301d
AA
5372 if (!status)
5373 /* Verify the session's negotiated channel_attrs values */
5374 status = nfs4_verify_channel_attrs(&args, session);
fc931582
AA
5375 if (!status) {
5376 /* Increment the clientid slot sequence id */
5377 clp->cl_seqid++;
5378 }
5379
5380 return status;
5381}
5382
5383/*
5384 * Issues a CREATE_SESSION operation to the server.
5385 * It is the responsibility of the caller to verify the session is
5386 * expired before calling this routine.
5387 */
f26468fb 5388int nfs4_proc_create_session(struct nfs_client *clp)
fc931582
AA
5389{
5390 int status;
5391 unsigned *ptr;
fc931582
AA
5392 struct nfs4_session *session = clp->cl_session;
5393
5394 dprintk("--> %s clp=%p session=%p\n", __func__, clp, session);
5395
fd954ae1 5396 status = _nfs4_proc_create_session(clp);
fc931582
AA
5397 if (status)
5398 goto out;
5399
aacd5537
AA
5400 /* Init or reset the session slot tables */
5401 status = nfs4_setup_session_slot_tables(session);
5402 dprintk("slot table setup returned %d\n", status);
fc931582
AA
5403 if (status)
5404 goto out;
5405
5406 ptr = (unsigned *)&session->sess_id.data[0];
5407 dprintk("%s client>seqid %d sessionid %u:%u:%u:%u\n", __func__,
5408 clp->cl_seqid, ptr[0], ptr[1], ptr[2], ptr[3]);
fc931582
AA
5409out:
5410 dprintk("<-- %s\n", __func__);
5411 return status;
5412}
5413
0f3e66c6
AA
5414/*
5415 * Issue the over-the-wire RPC DESTROY_SESSION.
5416 * The caller must serialize access to this routine.
5417 */
5418int nfs4_proc_destroy_session(struct nfs4_session *session)
5419{
5420 int status = 0;
5421 struct rpc_message msg;
5422
5423 dprintk("--> nfs4_proc_destroy_session\n");
5424
5425 /* session is still being setup */
5426 if (session->clp->cl_cons_state != NFS_CS_READY)
5427 return status;
5428
5429 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_SESSION];
5430 msg.rpc_argp = session;
5431 msg.rpc_resp = NULL;
5432 msg.rpc_cred = NULL;
1bd714f2 5433 status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
0f3e66c6
AA
5434
5435 if (status)
5436 printk(KERN_WARNING
f9fd2d9c 5437 "NFS: Got error %d from the server on DESTROY_SESSION. "
0f3e66c6
AA
5438 "Session has been destroyed regardless...\n", status);
5439
5440 dprintk("<-- nfs4_proc_destroy_session\n");
5441 return status;
5442}
5443
fccba804
TM
5444int nfs4_init_session(struct nfs_server *server)
5445{
5446 struct nfs_client *clp = server->nfs_client;
2449ea2e 5447 struct nfs4_session *session;
68bf05ef 5448 unsigned int rsize, wsize;
fccba804
TM
5449 int ret;
5450
5451 if (!nfs4_has_session(clp))
5452 return 0;
5453
1055d76d
TM
5454 session = clp->cl_session;
5455 if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state))
5456 return 0;
5457
68bf05ef
AA
5458 rsize = server->rsize;
5459 if (rsize == 0)
5460 rsize = NFS_MAX_FILE_IO_SIZE;
5461 wsize = server->wsize;
5462 if (wsize == 0)
5463 wsize = NFS_MAX_FILE_IO_SIZE;
5464
68bf05ef
AA
5465 session->fc_attrs.max_rqst_sz = wsize + nfs41_maxwrite_overhead;
5466 session->fc_attrs.max_resp_sz = rsize + nfs41_maxread_overhead;
2449ea2e 5467
fccba804
TM
5468 ret = nfs4_recover_expired_lease(server);
5469 if (!ret)
5470 ret = nfs4_check_client_ready(clp);
5471 return ret;
5472}
5473
d83217c1
AA
5474int nfs4_init_ds_session(struct nfs_client *clp)
5475{
5476 struct nfs4_session *session = clp->cl_session;
5477 int ret;
5478
5479 if (!test_and_clear_bit(NFS4_SESSION_INITING, &session->session_state))
5480 return 0;
5481
5482 ret = nfs4_client_recover_expired_lease(clp);
5483 if (!ret)
5484 /* Test for the DS role */
5485 if (!is_ds_client(clp))
5486 ret = -ENODEV;
5487 if (!ret)
5488 ret = nfs4_check_client_ready(clp);
5489 return ret;
5490
5491}
5492EXPORT_SYMBOL_GPL(nfs4_init_ds_session);
5493
5494
fc01cea9
AA
5495/*
5496 * Renew the cl_session lease.
5497 */
d5f8d3fe
TM
5498struct nfs4_sequence_data {
5499 struct nfs_client *clp;
5500 struct nfs4_sequence_args args;
5501 struct nfs4_sequence_res res;
5502};
5503
dc96aef9
AB
5504static void nfs41_sequence_release(void *data)
5505{
d5f8d3fe
TM
5506 struct nfs4_sequence_data *calldata = data;
5507 struct nfs_client *clp = calldata->clp;
dc96aef9 5508
7135840f
AB
5509 if (atomic_read(&clp->cl_count) > 1)
5510 nfs4_schedule_state_renewal(clp);
5511 nfs_put_client(clp);
d5f8d3fe 5512 kfree(calldata);
dc96aef9
AB
5513}
5514
aa5190d0
TM
5515static int nfs41_sequence_handle_errors(struct rpc_task *task, struct nfs_client *clp)
5516{
5517 switch(task->tk_status) {
5518 case -NFS4ERR_DELAY:
aa5190d0
TM
5519 rpc_delay(task, NFS4_POLL_RETRY_MAX);
5520 return -EAGAIN;
5521 default:
0400a6b0 5522 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
5523 }
5524 return 0;
5525}
5526
dc96aef9 5527static void nfs41_sequence_call_done(struct rpc_task *task, void *data)
fc01cea9 5528{
d5f8d3fe
TM
5529 struct nfs4_sequence_data *calldata = data;
5530 struct nfs_client *clp = calldata->clp;
fc01cea9 5531
14516c3a
TM
5532 if (!nfs41_sequence_done(task, task->tk_msg.rpc_resp))
5533 return;
fc01cea9
AA
5534
5535 if (task->tk_status < 0) {
5536 dprintk("%s ERROR %d\n", __func__, task->tk_status);
7135840f
AB
5537 if (atomic_read(&clp->cl_count) == 1)
5538 goto out;
fc01cea9 5539
aa5190d0
TM
5540 if (nfs41_sequence_handle_errors(task, clp) == -EAGAIN) {
5541 rpc_restart_call_prepare(task);
fc01cea9
AA
5542 return;
5543 }
5544 }
fc01cea9 5545 dprintk("%s rpc_cred %p\n", __func__, task->tk_msg.rpc_cred);
7135840f 5546out:
fc01cea9
AA
5547 dprintk("<-- %s\n", __func__);
5548}
5549
5550static void nfs41_sequence_prepare(struct rpc_task *task, void *data)
5551{
d5f8d3fe
TM
5552 struct nfs4_sequence_data *calldata = data;
5553 struct nfs_client *clp = calldata->clp;
fc01cea9
AA
5554 struct nfs4_sequence_args *args;
5555 struct nfs4_sequence_res *res;
5556
fc01cea9
AA
5557 args = task->tk_msg.rpc_argp;
5558 res = task->tk_msg.rpc_resp;
5559
9d12b216 5560 if (nfs41_setup_sequence(clp->cl_session, args, res, task))
fc01cea9
AA
5561 return;
5562 rpc_call_start(task);
5563}
5564
5565static const struct rpc_call_ops nfs41_sequence_ops = {
5566 .rpc_call_done = nfs41_sequence_call_done,
5567 .rpc_call_prepare = nfs41_sequence_prepare,
dc96aef9 5568 .rpc_release = nfs41_sequence_release,
fc01cea9
AA
5569};
5570
71ac6da9 5571static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
fc01cea9 5572{
d5f8d3fe 5573 struct nfs4_sequence_data *calldata;
fc01cea9
AA
5574 struct rpc_message msg = {
5575 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE],
5576 .rpc_cred = cred,
5577 };
71ac6da9
TM
5578 struct rpc_task_setup task_setup_data = {
5579 .rpc_client = clp->cl_rpcclient,
5580 .rpc_message = &msg,
5581 .callback_ops = &nfs41_sequence_ops,
5582 .flags = RPC_TASK_ASYNC | RPC_TASK_SOFT,
5583 };
fc01cea9 5584
7135840f 5585 if (!atomic_inc_not_zero(&clp->cl_count))
71ac6da9 5586 return ERR_PTR(-EIO);
dfb4f309 5587 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
d5f8d3fe 5588 if (calldata == NULL) {
7135840f 5589 nfs_put_client(clp);
71ac6da9 5590 return ERR_PTR(-ENOMEM);
fc01cea9 5591 }
9d12b216 5592 nfs41_init_sequence(&calldata->args, &calldata->res, 0);
d5f8d3fe
TM
5593 msg.rpc_argp = &calldata->args;
5594 msg.rpc_resp = &calldata->res;
5595 calldata->clp = clp;
71ac6da9 5596 task_setup_data.callback_data = calldata;
fc01cea9 5597
71ac6da9
TM
5598 return rpc_run_task(&task_setup_data);
5599}
5600
2f60ea6b 5601static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
71ac6da9
TM
5602{
5603 struct rpc_task *task;
5604 int ret = 0;
5605
2f60ea6b
TM
5606 if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
5607 return 0;
71ac6da9
TM
5608 task = _nfs41_proc_sequence(clp, cred);
5609 if (IS_ERR(task))
5610 ret = PTR_ERR(task);
5611 else
bf294b41 5612 rpc_put_task_async(task);
71ac6da9
TM
5613 dprintk("<-- %s status=%d\n", __func__, ret);
5614 return ret;
5615}
5616
5617static int nfs4_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
5618{
5619 struct rpc_task *task;
5620 int ret;
5621
5622 task = _nfs41_proc_sequence(clp, cred);
5623 if (IS_ERR(task)) {
5624 ret = PTR_ERR(task);
5625 goto out;
5626 }
5627 ret = rpc_wait_for_completion_task(task);
b4410c2f
TM
5628 if (!ret) {
5629 struct nfs4_sequence_res *res = task->tk_msg.rpc_resp;
5630
5631 if (task->tk_status == 0)
5632 nfs41_handle_sequence_flag_errors(clp, res->sr_status_flags);
71ac6da9 5633 ret = task->tk_status;
b4410c2f 5634 }
71ac6da9
TM
5635 rpc_put_task(task);
5636out:
5637 dprintk("<-- %s status=%d\n", __func__, ret);
5638 return ret;
fc01cea9
AA
5639}
5640
fce5c838
RL
5641struct nfs4_reclaim_complete_data {
5642 struct nfs_client *clp;
5643 struct nfs41_reclaim_complete_args arg;
5644 struct nfs41_reclaim_complete_res res;
5645};
5646
5647static void nfs4_reclaim_complete_prepare(struct rpc_task *task, void *data)
5648{
5649 struct nfs4_reclaim_complete_data *calldata = data;
5650
b257957e 5651 rpc_task_set_priority(task, RPC_PRIORITY_PRIVILEGED);
035168ab
TM
5652 if (nfs41_setup_sequence(calldata->clp->cl_session,
5653 &calldata->arg.seq_args,
9d12b216 5654 &calldata->res.seq_res, task))
fce5c838
RL
5655 return;
5656
5657 rpc_call_start(task);
5658}
5659
aa5190d0
TM
5660static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp)
5661{
5662 switch(task->tk_status) {
5663 case 0:
5664 case -NFS4ERR_COMPLETE_ALREADY:
5665 case -NFS4ERR_WRONG_CRED: /* What to do here? */
5666 break;
5667 case -NFS4ERR_DELAY:
aa5190d0 5668 rpc_delay(task, NFS4_POLL_RETRY_MAX);
a8a4ae3a
AA
5669 /* fall through */
5670 case -NFS4ERR_RETRY_UNCACHED_REP:
aa5190d0
TM
5671 return -EAGAIN;
5672 default:
0400a6b0 5673 nfs4_schedule_lease_recovery(clp);
aa5190d0
TM
5674 }
5675 return 0;
5676}
5677
fce5c838
RL
5678static void nfs4_reclaim_complete_done(struct rpc_task *task, void *data)
5679{
5680 struct nfs4_reclaim_complete_data *calldata = data;
5681 struct nfs_client *clp = calldata->clp;
5682 struct nfs4_sequence_res *res = &calldata->res.seq_res;
5683
5684 dprintk("--> %s\n", __func__);
14516c3a
TM
5685 if (!nfs41_sequence_done(task, res))
5686 return;
fce5c838 5687
aa5190d0
TM
5688 if (nfs41_reclaim_complete_handle_errors(task, clp) == -EAGAIN) {
5689 rpc_restart_call_prepare(task);
5690 return;
5691 }
fce5c838
RL
5692 dprintk("<-- %s\n", __func__);
5693}
5694
5695static void nfs4_free_reclaim_complete_data(void *data)
5696{
5697 struct nfs4_reclaim_complete_data *calldata = data;
5698
5699 kfree(calldata);
5700}
5701
5702static const struct rpc_call_ops nfs4_reclaim_complete_call_ops = {
5703 .rpc_call_prepare = nfs4_reclaim_complete_prepare,
5704 .rpc_call_done = nfs4_reclaim_complete_done,
5705 .rpc_release = nfs4_free_reclaim_complete_data,
5706};
5707
5708/*
5709 * Issue a global reclaim complete.
5710 */
5711static int nfs41_proc_reclaim_complete(struct nfs_client *clp)
5712{
5713 struct nfs4_reclaim_complete_data *calldata;
5714 struct rpc_task *task;
5715 struct rpc_message msg = {
5716 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE],
5717 };
5718 struct rpc_task_setup task_setup_data = {
5719 .rpc_client = clp->cl_rpcclient,
5720 .rpc_message = &msg,
5721 .callback_ops = &nfs4_reclaim_complete_call_ops,
5722 .flags = RPC_TASK_ASYNC,
5723 };
5724 int status = -ENOMEM;
5725
5726 dprintk("--> %s\n", __func__);
8535b2be 5727 calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
fce5c838
RL
5728 if (calldata == NULL)
5729 goto out;
5730 calldata->clp = clp;
5731 calldata->arg.one_fs = 0;
fce5c838 5732
9d12b216 5733 nfs41_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 0);
fce5c838
RL
5734 msg.rpc_argp = &calldata->arg;
5735 msg.rpc_resp = &calldata->res;
5736 task_setup_data.callback_data = calldata;
5737 task = rpc_run_task(&task_setup_data);
acf82b85 5738 if (IS_ERR(task)) {
fce5c838 5739 status = PTR_ERR(task);
acf82b85
DC
5740 goto out;
5741 }
c34c32ea
AA
5742 status = nfs4_wait_for_completion_rpc_task(task);
5743 if (status == 0)
5744 status = task->tk_status;
fce5c838 5745 rpc_put_task(task);
acf82b85 5746 return 0;
fce5c838
RL
5747out:
5748 dprintk("<-- %s status=%d\n", __func__, status);
5749 return status;
5750}
b1f69b75
AA
5751
5752static void
5753nfs4_layoutget_prepare(struct rpc_task *task, void *calldata)
5754{
5755 struct nfs4_layoutget *lgp = calldata;
c31663d4 5756 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
b1f69b75
AA
5757
5758 dprintk("--> %s\n", __func__);
c31663d4
FI
5759 /* Note the is a race here, where a CB_LAYOUTRECALL can come in
5760 * right now covering the LAYOUTGET we are about to send.
5761 * However, that is not so catastrophic, and there seems
5762 * to be no way to prevent it completely.
5763 */
b1f69b75 5764 if (nfs4_setup_sequence(server, &lgp->args.seq_args,
9d12b216 5765 &lgp->res.seq_res, task))
b1f69b75 5766 return;
cf7d63f1
FI
5767 if (pnfs_choose_layoutget_stateid(&lgp->args.stateid,
5768 NFS_I(lgp->args.inode)->layout,
5769 lgp->args.ctx->state)) {
5770 rpc_exit(task, NFS4_OK);
5771 return;
5772 }
b1f69b75
AA
5773 rpc_call_start(task);
5774}
5775
5776static void nfs4_layoutget_done(struct rpc_task *task, void *calldata)
5777{
5778 struct nfs4_layoutget *lgp = calldata;
5779 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
5780
5781 dprintk("--> %s\n", __func__);
5782
5783 if (!nfs4_sequence_done(task, &lgp->res.seq_res))
5784 return;
5785
5786 switch (task->tk_status) {
5787 case 0:
5788 break;
5789 case -NFS4ERR_LAYOUTTRYLATER:
5790 case -NFS4ERR_RECALLCONFLICT:
5791 task->tk_status = -NFS4ERR_DELAY;
5792 /* Fall through */
5793 default:
5794 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
5795 rpc_restart_call_prepare(task);
5796 return;
5797 }
5798 }
b1f69b75
AA
5799 dprintk("<-- %s\n", __func__);
5800}
5801
5802static void nfs4_layoutget_release(void *calldata)
5803{
5804 struct nfs4_layoutget *lgp = calldata;
5805
5806 dprintk("--> %s\n", __func__);
b1f69b75
AA
5807 put_nfs_open_context(lgp->args.ctx);
5808 kfree(calldata);
5809 dprintk("<-- %s\n", __func__);
5810}
5811
5812static const struct rpc_call_ops nfs4_layoutget_call_ops = {
5813 .rpc_call_prepare = nfs4_layoutget_prepare,
5814 .rpc_call_done = nfs4_layoutget_done,
5815 .rpc_release = nfs4_layoutget_release,
5816};
5817
5818int nfs4_proc_layoutget(struct nfs4_layoutget *lgp)
5819{
5820 struct nfs_server *server = NFS_SERVER(lgp->args.inode);
5821 struct rpc_task *task;
5822 struct rpc_message msg = {
5823 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTGET],
5824 .rpc_argp = &lgp->args,
5825 .rpc_resp = &lgp->res,
5826 };
5827 struct rpc_task_setup task_setup_data = {
5828 .rpc_client = server->client,
5829 .rpc_message = &msg,
5830 .callback_ops = &nfs4_layoutget_call_ops,
5831 .callback_data = lgp,
5832 .flags = RPC_TASK_ASYNC,
5833 };
5834 int status = 0;
5835
5836 dprintk("--> %s\n", __func__);
5837
35124a09 5838 lgp->res.layoutp = &lgp->args.layout;
b1f69b75 5839 lgp->res.seq_res.sr_slot = NULL;
9d12b216 5840 nfs41_init_sequence(&lgp->args.seq_args, &lgp->res.seq_res, 0);
b1f69b75
AA
5841 task = rpc_run_task(&task_setup_data);
5842 if (IS_ERR(task))
5843 return PTR_ERR(task);
5844 status = nfs4_wait_for_completion_rpc_task(task);
c31663d4
FI
5845 if (status == 0)
5846 status = task->tk_status;
5847 if (status == 0)
5848 status = pnfs_layout_process(lgp);
b1f69b75
AA
5849 rpc_put_task(task);
5850 dprintk("<-- %s status=%d\n", __func__, status);
5851 return status;
5852}
5853
cbe82603
BH
5854static void
5855nfs4_layoutreturn_prepare(struct rpc_task *task, void *calldata)
5856{
5857 struct nfs4_layoutreturn *lrp = calldata;
5858
5859 dprintk("--> %s\n", __func__);
5860 if (nfs41_setup_sequence(lrp->clp->cl_session, &lrp->args.seq_args,
9d12b216 5861 &lrp->res.seq_res, task))
cbe82603
BH
5862 return;
5863 rpc_call_start(task);
5864}
5865
5866static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata)
5867{
5868 struct nfs4_layoutreturn *lrp = calldata;
5869 struct nfs_server *server;
a56aaa02 5870 struct pnfs_layout_hdr *lo = lrp->args.layout;
cbe82603
BH
5871
5872 dprintk("--> %s\n", __func__);
5873
5874 if (!nfs4_sequence_done(task, &lrp->res.seq_res))
5875 return;
5876
5877 server = NFS_SERVER(lrp->args.inode);
5878 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
d00c5d43 5879 rpc_restart_call_prepare(task);
cbe82603
BH
5880 return;
5881 }
a2e1d4f2 5882 spin_lock(&lo->plh_inode->i_lock);
cbe82603 5883 if (task->tk_status == 0) {
cbe82603 5884 if (lrp->res.lrs_present) {
cbe82603 5885 pnfs_set_layout_stateid(lo, &lrp->res.stateid, true);
cbe82603
BH
5886 } else
5887 BUG_ON(!list_empty(&lo->plh_segs));
5888 }
a2e1d4f2
FI
5889 lo->plh_block_lgets--;
5890 spin_unlock(&lo->plh_inode->i_lock);
cbe82603
BH
5891 dprintk("<-- %s\n", __func__);
5892}
5893
5894static void nfs4_layoutreturn_release(void *calldata)
5895{
5896 struct nfs4_layoutreturn *lrp = calldata;
5897
5898 dprintk("--> %s\n", __func__);
a56aaa02 5899 put_layout_hdr(lrp->args.layout);
cbe82603
BH
5900 kfree(calldata);
5901 dprintk("<-- %s\n", __func__);
5902}
5903
5904static const struct rpc_call_ops nfs4_layoutreturn_call_ops = {
5905 .rpc_call_prepare = nfs4_layoutreturn_prepare,
5906 .rpc_call_done = nfs4_layoutreturn_done,
5907 .rpc_release = nfs4_layoutreturn_release,
5908};
5909
5910int nfs4_proc_layoutreturn(struct nfs4_layoutreturn *lrp)
5911{
5912 struct rpc_task *task;
5913 struct rpc_message msg = {
5914 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTRETURN],
5915 .rpc_argp = &lrp->args,
5916 .rpc_resp = &lrp->res,
5917 };
5918 struct rpc_task_setup task_setup_data = {
5919 .rpc_client = lrp->clp->cl_rpcclient,
5920 .rpc_message = &msg,
5921 .callback_ops = &nfs4_layoutreturn_call_ops,
5922 .callback_data = lrp,
5923 };
5924 int status;
5925
5926 dprintk("--> %s\n", __func__);
9d12b216 5927 nfs41_init_sequence(&lrp->args.seq_args, &lrp->res.seq_res, 1);
cbe82603
BH
5928 task = rpc_run_task(&task_setup_data);
5929 if (IS_ERR(task))
5930 return PTR_ERR(task);
5931 status = task->tk_status;
5932 dprintk("<-- %s status=%d\n", __func__, status);
5933 rpc_put_task(task);
5934 return status;
5935}
5936
7f11d8d3
AA
5937/*
5938 * Retrieve the list of Data Server devices from the MDS.
5939 */
5940static int _nfs4_getdevicelist(struct nfs_server *server,
5941 const struct nfs_fh *fh,
5942 struct pnfs_devicelist *devlist)
5943{
5944 struct nfs4_getdevicelist_args args = {
5945 .fh = fh,
5946 .layoutclass = server->pnfs_curr_ld->id,
5947 };
5948 struct nfs4_getdevicelist_res res = {
5949 .devlist = devlist,
5950 };
5951 struct rpc_message msg = {
5952 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICELIST],
5953 .rpc_argp = &args,
5954 .rpc_resp = &res,
5955 };
5956 int status;
5957
5958 dprintk("--> %s\n", __func__);
5959 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args,
5960 &res.seq_res, 0);
5961 dprintk("<-- %s status=%d\n", __func__, status);
5962 return status;
5963}
5964
5965int nfs4_proc_getdevicelist(struct nfs_server *server,
5966 const struct nfs_fh *fh,
5967 struct pnfs_devicelist *devlist)
5968{
5969 struct nfs4_exception exception = { };
5970 int err;
5971
5972 do {
5973 err = nfs4_handle_exception(server,
5974 _nfs4_getdevicelist(server, fh, devlist),
5975 &exception);
5976 } while (exception.retry);
5977
5978 dprintk("%s: err=%d, num_devs=%u\n", __func__,
5979 err, devlist->num_devs);
5980
5981 return err;
5982}
5983EXPORT_SYMBOL_GPL(nfs4_proc_getdevicelist);
5984
b1f69b75
AA
5985static int
5986_nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev)
5987{
5988 struct nfs4_getdeviceinfo_args args = {
5989 .pdev = pdev,
5990 };
5991 struct nfs4_getdeviceinfo_res res = {
5992 .pdev = pdev,
5993 };
5994 struct rpc_message msg = {
5995 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO],
5996 .rpc_argp = &args,
5997 .rpc_resp = &res,
5998 };
5999 int status;
6000
6001 dprintk("--> %s\n", __func__);
7c513058 6002 status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
b1f69b75
AA
6003 dprintk("<-- %s status=%d\n", __func__, status);
6004
6005 return status;
6006}
6007
6008int nfs4_proc_getdeviceinfo(struct nfs_server *server, struct pnfs_device *pdev)
6009{
6010 struct nfs4_exception exception = { };
6011 int err;
6012
6013 do {
6014 err = nfs4_handle_exception(server,
6015 _nfs4_proc_getdeviceinfo(server, pdev),
6016 &exception);
6017 } while (exception.retry);
6018 return err;
6019}
6020EXPORT_SYMBOL_GPL(nfs4_proc_getdeviceinfo);
6021
863a3c6c
AA
6022static void nfs4_layoutcommit_prepare(struct rpc_task *task, void *calldata)
6023{
6024 struct nfs4_layoutcommit_data *data = calldata;
6025 struct nfs_server *server = NFS_SERVER(data->args.inode);
6026
6027 if (nfs4_setup_sequence(server, &data->args.seq_args,
9d12b216 6028 &data->res.seq_res, task))
863a3c6c
AA
6029 return;
6030 rpc_call_start(task);
6031}
6032
6033static void
6034nfs4_layoutcommit_done(struct rpc_task *task, void *calldata)
6035{
6036 struct nfs4_layoutcommit_data *data = calldata;
6037 struct nfs_server *server = NFS_SERVER(data->args.inode);
6038
6039 if (!nfs4_sequence_done(task, &data->res.seq_res))
6040 return;
6041
6042 switch (task->tk_status) { /* Just ignore these failures */
6043 case NFS4ERR_DELEG_REVOKED: /* layout was recalled */
6044 case NFS4ERR_BADIOMODE: /* no IOMODE_RW layout for range */
6045 case NFS4ERR_BADLAYOUT: /* no layout */
6046 case NFS4ERR_GRACE: /* loca_recalim always false */
6047 task->tk_status = 0;
6048 }
6049
6050 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
d00c5d43 6051 rpc_restart_call_prepare(task);
863a3c6c
AA
6052 return;
6053 }
6054
6055 if (task->tk_status == 0)
6056 nfs_post_op_update_inode_force_wcc(data->args.inode,
6057 data->res.fattr);
6058}
6059
6060static void nfs4_layoutcommit_release(void *calldata)
6061{
6062 struct nfs4_layoutcommit_data *data = calldata;
a9bae566 6063 struct pnfs_layout_segment *lseg, *tmp;
92407e75 6064 unsigned long *bitlock = &NFS_I(data->args.inode)->flags;
863a3c6c 6065
db29c089 6066 pnfs_cleanup_layoutcommit(data);
863a3c6c 6067 /* Matched by references in pnfs_set_layoutcommit */
a9bae566
PT
6068 list_for_each_entry_safe(lseg, tmp, &data->lseg_list, pls_lc_list) {
6069 list_del_init(&lseg->pls_lc_list);
6070 if (test_and_clear_bit(NFS_LSEG_LAYOUTCOMMIT,
6071 &lseg->pls_flags))
6072 put_lseg(lseg);
6073 }
92407e75
PT
6074
6075 clear_bit_unlock(NFS_INO_LAYOUTCOMMITTING, bitlock);
6076 smp_mb__after_clear_bit();
6077 wake_up_bit(bitlock, NFS_INO_LAYOUTCOMMITTING);
6078
863a3c6c
AA
6079 put_rpccred(data->cred);
6080 kfree(data);
6081}
6082
6083static const struct rpc_call_ops nfs4_layoutcommit_ops = {
6084 .rpc_call_prepare = nfs4_layoutcommit_prepare,
6085 .rpc_call_done = nfs4_layoutcommit_done,
6086 .rpc_release = nfs4_layoutcommit_release,
6087};
6088
6089int
ef311537 6090nfs4_proc_layoutcommit(struct nfs4_layoutcommit_data *data, bool sync)
863a3c6c
AA
6091{
6092 struct rpc_message msg = {
6093 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTCOMMIT],
6094 .rpc_argp = &data->args,
6095 .rpc_resp = &data->res,
6096 .rpc_cred = data->cred,
6097 };
6098 struct rpc_task_setup task_setup_data = {
6099 .task = &data->task,
6100 .rpc_client = NFS_CLIENT(data->args.inode),
6101 .rpc_message = &msg,
6102 .callback_ops = &nfs4_layoutcommit_ops,
6103 .callback_data = data,
6104 .flags = RPC_TASK_ASYNC,
6105 };
6106 struct rpc_task *task;
6107 int status = 0;
6108
6109 dprintk("NFS: %4d initiating layoutcommit call. sync %d "
6110 "lbw: %llu inode %lu\n",
6111 data->task.tk_pid, sync,
6112 data->args.lastbytewritten,
6113 data->args.inode->i_ino);
6114
9d12b216 6115 nfs41_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
863a3c6c
AA
6116 task = rpc_run_task(&task_setup_data);
6117 if (IS_ERR(task))
6118 return PTR_ERR(task);
ef311537 6119 if (sync == false)
863a3c6c
AA
6120 goto out;
6121 status = nfs4_wait_for_completion_rpc_task(task);
6122 if (status != 0)
6123 goto out;
6124 status = task->tk_status;
6125out:
6126 dprintk("%s: status %d\n", __func__, status);
6127 rpc_put_task(task);
6128 return status;
6129}
fca78d6d
BS
6130
6131static int
6132_nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
6133 struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
6134{
6135 struct nfs41_secinfo_no_name_args args = {
6136 .style = SECINFO_STYLE_CURRENT_FH,
6137 };
6138 struct nfs4_secinfo_res res = {
6139 .flavors = flavors,
6140 };
6141 struct rpc_message msg = {
6142 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO_NO_NAME],
6143 .rpc_argp = &args,
6144 .rpc_resp = &res,
6145 };
6146 return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
6147}
6148
6149static int
6150nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
6151 struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
6152{
6153 struct nfs4_exception exception = { };
6154 int err;
6155 do {
6156 err = _nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
6157 switch (err) {
6158 case 0:
6159 case -NFS4ERR_WRONGSEC:
6160 case -NFS4ERR_NOTSUPP:
6161 break;
6162 default:
6163 err = nfs4_handle_exception(server, err, &exception);
6164 }
6165 } while (exception.retry);
6166 return err;
6167}
6168
6169static int
6170nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
6171 struct nfs_fsinfo *info)
6172{
6173 int err;
6174 struct page *page;
6175 rpc_authflavor_t flavor;
6176 struct nfs4_secinfo_flavors *flavors;
6177
6178 page = alloc_page(GFP_KERNEL);
6179 if (!page) {
6180 err = -ENOMEM;
6181 goto out;
6182 }
6183
6184 flavors = page_address(page);
6185 err = nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
6186
6187 /*
6188 * Fall back on "guess and check" method if
6189 * the server doesn't support SECINFO_NO_NAME
6190 */
6191 if (err == -NFS4ERR_WRONGSEC || err == -NFS4ERR_NOTSUPP) {
6192 err = nfs4_find_root_sec(server, fhandle, info);
6193 goto out_freepage;
6194 }
6195 if (err)
6196 goto out_freepage;
6197
6198 flavor = nfs_find_best_sec(flavors);
6199 if (err == 0)
6200 err = nfs4_lookup_root_sec(server, fhandle, info, flavor);
6201
6202out_freepage:
6203 put_page(page);
6204 if (err == -EACCES)
6205 return -EPERM;
6206out:
6207 return err;
6208}
1cab0652
BS
6209
6210static int _nfs41_test_stateid(struct nfs_server *server, nfs4_stateid *stateid)
7d974794 6211{
1cab0652 6212 int status;
7d974794 6213 struct nfs41_test_stateid_args args = {
1cab0652 6214 .stateid = stateid,
7d974794
BS
6215 };
6216 struct nfs41_test_stateid_res res;
6217 struct rpc_message msg = {
6218 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_TEST_STATEID],
6219 .rpc_argp = &args,
6220 .rpc_resp = &res,
6221 };
1cab0652 6222
9d12b216 6223 nfs41_init_sequence(&args.seq_args, &res.seq_res, 0);
1cab0652
BS
6224 status = nfs4_call_sync_sequence(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
6225
6226 if (status == NFS_OK)
6227 return res.status;
6228 return status;
7d974794
BS
6229}
6230
1cab0652 6231static int nfs41_test_stateid(struct nfs_server *server, nfs4_stateid *stateid)
7d974794
BS
6232{
6233 struct nfs4_exception exception = { };
6234 int err;
6235 do {
6236 err = nfs4_handle_exception(server,
1cab0652 6237 _nfs41_test_stateid(server, stateid),
7d974794
BS
6238 &exception);
6239 } while (exception.retry);
6240 return err;
6241}
9aeda35f 6242
1cab0652 6243static int _nfs4_free_stateid(struct nfs_server *server, nfs4_stateid *stateid)
9aeda35f 6244{
9aeda35f 6245 struct nfs41_free_stateid_args args = {
1cab0652 6246 .stateid = stateid,
9aeda35f
BS
6247 };
6248 struct nfs41_free_stateid_res res;
6249 struct rpc_message msg = {
6250 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID],
6251 .rpc_argp = &args,
6252 .rpc_resp = &res,
6253 };
6254
9d12b216
TM
6255 nfs41_init_sequence(&args.seq_args, &res.seq_res, 0);
6256 return nfs4_call_sync_sequence(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
9aeda35f
BS
6257}
6258
1cab0652 6259static int nfs41_free_stateid(struct nfs_server *server, nfs4_stateid *stateid)
9aeda35f
BS
6260{
6261 struct nfs4_exception exception = { };
6262 int err;
6263 do {
6264 err = nfs4_handle_exception(server,
1cab0652 6265 _nfs4_free_stateid(server, stateid),
9aeda35f
BS
6266 &exception);
6267 } while (exception.retry);
6268 return err;
6269}
36281caa
TM
6270
6271static bool nfs41_match_stateid(const nfs4_stateid *s1,
6272 const nfs4_stateid *s2)
6273{
6274 if (memcmp(s1->stateid.other, s2->stateid.other,
6275 sizeof(s1->stateid.other)) != 0)
6276 return false;
6277
6278 if (s1->stateid.seqid == s2->stateid.seqid)
6279 return true;
6280 if (s1->stateid.seqid == 0 || s2->stateid.seqid == 0)
6281 return true;
6282
6283 return false;
6284}
6285
557134a3
AA
6286#endif /* CONFIG_NFS_V4_1 */
6287
36281caa
TM
6288static bool nfs4_match_stateid(const nfs4_stateid *s1,
6289 const nfs4_stateid *s2)
6290{
f597c537 6291 return nfs4_stateid_match(s1, s2);
36281caa
TM
6292}
6293
6294
591d71cb 6295struct nfs4_state_recovery_ops nfs40_reboot_recovery_ops = {
7eff03ae 6296 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
b79a4a1b 6297 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
1da177e4
LT
6298 .recover_open = nfs4_open_reclaim,
6299 .recover_lock = nfs4_lock_reclaim,
591d71cb 6300 .establish_clid = nfs4_init_clientid,
90a16617 6301 .get_clid_cred = nfs4_get_setclientid_cred,
1da177e4
LT
6302};
6303
591d71cb
AA
6304#if defined(CONFIG_NFS_V4_1)
6305struct nfs4_state_recovery_ops nfs41_reboot_recovery_ops = {
6306 .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
6307 .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
6308 .recover_open = nfs4_open_reclaim,
6309 .recover_lock = nfs4_lock_reclaim,
4d643d1d 6310 .establish_clid = nfs41_init_clientid,
b4b82607 6311 .get_clid_cred = nfs4_get_exchange_id_cred,
fce5c838 6312 .reclaim_complete = nfs41_proc_reclaim_complete,
591d71cb
AA
6313};
6314#endif /* CONFIG_NFS_V4_1 */
6315
6316struct nfs4_state_recovery_ops nfs40_nograce_recovery_ops = {
6317 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
6318 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
6319 .recover_open = nfs4_open_expired,
6320 .recover_lock = nfs4_lock_expired,
6321 .establish_clid = nfs4_init_clientid,
90a16617 6322 .get_clid_cred = nfs4_get_setclientid_cred,
591d71cb
AA
6323};
6324
6325#if defined(CONFIG_NFS_V4_1)
6326struct nfs4_state_recovery_ops nfs41_nograce_recovery_ops = {
7eff03ae 6327 .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
b79a4a1b 6328 .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
f062eb6c
BS
6329 .recover_open = nfs41_open_expired,
6330 .recover_lock = nfs41_lock_expired,
4d643d1d 6331 .establish_clid = nfs41_init_clientid,
b4b82607 6332 .get_clid_cred = nfs4_get_exchange_id_cred,
1da177e4 6333};
591d71cb 6334#endif /* CONFIG_NFS_V4_1 */
1da177e4 6335
29fba38b
BH
6336struct nfs4_state_maintenance_ops nfs40_state_renewal_ops = {
6337 .sched_state_renewal = nfs4_proc_async_renew,
a7b72103 6338 .get_state_renewal_cred_locked = nfs4_get_renew_cred_locked,
8e69514f 6339 .renew_lease = nfs4_proc_renew,
29fba38b
BH
6340};
6341
6342#if defined(CONFIG_NFS_V4_1)
6343struct nfs4_state_maintenance_ops nfs41_state_renewal_ops = {
6344 .sched_state_renewal = nfs41_proc_async_sequence,
a7b72103 6345 .get_state_renewal_cred_locked = nfs4_get_machine_cred_locked,
8e69514f 6346 .renew_lease = nfs4_proc_sequence,
29fba38b
BH
6347};
6348#endif
6349
97dc1359
TM
6350static const struct nfs4_minor_version_ops nfs_v4_0_minor_ops = {
6351 .minor_version = 0,
6352 .call_sync = _nfs4_call_sync,
36281caa 6353 .match_stateid = nfs4_match_stateid,
fca78d6d 6354 .find_root_sec = nfs4_find_root_sec,
c48f4f35
TM
6355 .reboot_recovery_ops = &nfs40_reboot_recovery_ops,
6356 .nograce_recovery_ops = &nfs40_nograce_recovery_ops,
6357 .state_renewal_ops = &nfs40_state_renewal_ops,
97dc1359
TM
6358};
6359
6360#if defined(CONFIG_NFS_V4_1)
6361static const struct nfs4_minor_version_ops nfs_v4_1_minor_ops = {
6362 .minor_version = 1,
6363 .call_sync = _nfs4_call_sync_session,
36281caa 6364 .match_stateid = nfs41_match_stateid,
fca78d6d 6365 .find_root_sec = nfs41_find_root_sec,
c48f4f35
TM
6366 .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
6367 .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
6368 .state_renewal_ops = &nfs41_state_renewal_ops,
97dc1359
TM
6369};
6370#endif
6371
97dc1359
TM
6372const struct nfs4_minor_version_ops *nfs_v4_minor_ops[] = {
6373 [0] = &nfs_v4_0_minor_ops,
6374#if defined(CONFIG_NFS_V4_1)
6375 [1] = &nfs_v4_1_minor_ops,
6376#endif
6377};
6378
92e1d5be 6379static const struct inode_operations nfs4_file_inode_operations = {
6b3b5496
BF
6380 .permission = nfs_permission,
6381 .getattr = nfs_getattr,
6382 .setattr = nfs_setattr,
64c2ce8b
AK
6383 .getxattr = generic_getxattr,
6384 .setxattr = generic_setxattr,
6385 .listxattr = generic_listxattr,
6386 .removexattr = generic_removexattr,
6b3b5496
BF
6387};
6388
509de811 6389const struct nfs_rpc_ops nfs_v4_clientops = {
1da177e4
LT
6390 .version = 4, /* protocol version */
6391 .dentry_ops = &nfs4_dentry_operations,
6392 .dir_inode_ops = &nfs4_dir_inode_operations,
6b3b5496 6393 .file_inode_ops = &nfs4_file_inode_operations,
1788ea6e 6394 .file_ops = &nfs4_file_operations,
1da177e4
LT
6395 .getroot = nfs4_proc_get_root,
6396 .getattr = nfs4_proc_getattr,
6397 .setattr = nfs4_proc_setattr,
6398 .lookup = nfs4_proc_lookup,
6399 .access = nfs4_proc_access,
6400 .readlink = nfs4_proc_readlink,
1da177e4
LT
6401 .create = nfs4_proc_create,
6402 .remove = nfs4_proc_remove,
6403 .unlink_setup = nfs4_proc_unlink_setup,
6404 .unlink_done = nfs4_proc_unlink_done,
6405 .rename = nfs4_proc_rename,
d3d4152a
JL
6406 .rename_setup = nfs4_proc_rename_setup,
6407 .rename_done = nfs4_proc_rename_done,
1da177e4
LT
6408 .link = nfs4_proc_link,
6409 .symlink = nfs4_proc_symlink,
6410 .mkdir = nfs4_proc_mkdir,
6411 .rmdir = nfs4_proc_remove,
6412 .readdir = nfs4_proc_readdir,
6413 .mknod = nfs4_proc_mknod,
6414 .statfs = nfs4_proc_statfs,
6415 .fsinfo = nfs4_proc_fsinfo,
6416 .pathconf = nfs4_proc_pathconf,
e9326dca 6417 .set_capabilities = nfs4_server_capabilities,
1da177e4
LT
6418 .decode_dirent = nfs4_decode_dirent,
6419 .read_setup = nfs4_proc_read_setup,
ec06c096 6420 .read_done = nfs4_read_done,
1da177e4 6421 .write_setup = nfs4_proc_write_setup,
788e7a89 6422 .write_done = nfs4_write_done,
1da177e4 6423 .commit_setup = nfs4_proc_commit_setup,
788e7a89 6424 .commit_done = nfs4_commit_done,
1da177e4 6425 .lock = nfs4_proc_lock,
e50a1c2e 6426 .clear_acl_cache = nfs4_zap_acl_attr,
7fe5c398 6427 .close_context = nfs4_close_context,
2b484297 6428 .open_context = nfs4_atomic_open,
45a52a02 6429 .init_client = nfs4_init_client,
5a5ea0d4 6430 .secinfo = nfs4_proc_secinfo,
1da177e4
LT
6431};
6432
64c2ce8b
AK
6433static const struct xattr_handler nfs4_xattr_nfs4_acl_handler = {
6434 .prefix = XATTR_NAME_NFSV4_ACL,
6435 .list = nfs4_xattr_list_nfs4_acl,
6436 .get = nfs4_xattr_get_nfs4_acl,
6437 .set = nfs4_xattr_set_nfs4_acl,
6438};
6439
6440const struct xattr_handler *nfs4_xattr_handlers[] = {
6441 &nfs4_xattr_nfs4_acl_handler,
6442 NULL
6443};
6444
ef159e91
TM
6445module_param(max_session_slots, ushort, 0644);
6446MODULE_PARM_DESC(max_session_slots, "Maximum number of outstanding NFSv4.1 "
6447 "requests the client will negotiate");
6448
1da177e4
LT
6449/*
6450 * Local variables:
6451 * c-basic-offset: 8
6452 * End:
6453 */