NFS: Re-enable forced umounts
[linux-2.6-block.git] / fs / nfs / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfs/nfs4proc.c
3 *
4 * Client-side procedure declarations for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 */
37
38#include <linux/mm.h>
39#include <linux/utsname.h>
40#include <linux/delay.h>
41#include <linux/errno.h>
42#include <linux/string.h>
43#include <linux/sunrpc/clnt.h>
44#include <linux/nfs.h>
45#include <linux/nfs4.h>
46#include <linux/nfs_fs.h>
47#include <linux/nfs_page.h>
48#include <linux/smp_lock.h>
49#include <linux/namei.h>
02a913a7 50#include <linux/mount.h>
1da177e4 51
4ce79717 52#include "nfs4_fs.h"
1da177e4 53#include "delegation.h"
006ea73e 54#include "iostat.h"
1da177e4
LT
55
56#define NFSDBG_FACILITY NFSDBG_PROC
57
2066fe89 58#define NFS4_POLL_RETRY_MIN (HZ/10)
1da177e4
LT
59#define NFS4_POLL_RETRY_MAX (15*HZ)
60
cdd4e68b 61struct nfs4_opendata;
864472e9 62static int _nfs4_proc_open(struct nfs4_opendata *data);
1da177e4 63static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
faf5f49c 64static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *);
1da177e4 65static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry);
faf5f49c 66static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception);
adfa6f98 67static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp);
1da177e4 68
1da177e4
LT
69/* Prevent leaks of NFSv4 errors into userland */
70int nfs4_map_errors(int err)
71{
72 if (err < -1000) {
73 dprintk("%s could not handle NFSv4 error %d\n",
74 __FUNCTION__, -err);
75 return -EIO;
76 }
77 return err;
78}
79
80/*
81 * This is our standard bitmap for GETATTR requests.
82 */
83const u32 nfs4_fattr_bitmap[2] = {
84 FATTR4_WORD0_TYPE
85 | FATTR4_WORD0_CHANGE
86 | FATTR4_WORD0_SIZE
87 | FATTR4_WORD0_FSID
88 | FATTR4_WORD0_FILEID,
89 FATTR4_WORD1_MODE
90 | FATTR4_WORD1_NUMLINKS
91 | FATTR4_WORD1_OWNER
92 | FATTR4_WORD1_OWNER_GROUP
93 | FATTR4_WORD1_RAWDEV
94 | FATTR4_WORD1_SPACE_USED
95 | FATTR4_WORD1_TIME_ACCESS
96 | FATTR4_WORD1_TIME_METADATA
97 | FATTR4_WORD1_TIME_MODIFY
98};
99
100const u32 nfs4_statfs_bitmap[2] = {
101 FATTR4_WORD0_FILES_AVAIL
102 | FATTR4_WORD0_FILES_FREE
103 | FATTR4_WORD0_FILES_TOTAL,
104 FATTR4_WORD1_SPACE_AVAIL
105 | FATTR4_WORD1_SPACE_FREE
106 | FATTR4_WORD1_SPACE_TOTAL
107};
108
4ce79717 109const u32 nfs4_pathconf_bitmap[2] = {
1da177e4
LT
110 FATTR4_WORD0_MAXLINK
111 | FATTR4_WORD0_MAXNAME,
112 0
113};
114
115const u32 nfs4_fsinfo_bitmap[2] = { FATTR4_WORD0_MAXFILESIZE
116 | FATTR4_WORD0_MAXREAD
117 | FATTR4_WORD0_MAXWRITE
118 | FATTR4_WORD0_LEASE_TIME,
119 0
120};
121
830b8e33
MN
122const u32 nfs4_fs_locations_bitmap[2] = {
123 FATTR4_WORD0_TYPE
124 | FATTR4_WORD0_CHANGE
125 | FATTR4_WORD0_SIZE
126 | FATTR4_WORD0_FSID
127 | FATTR4_WORD0_FILEID
128 | FATTR4_WORD0_FS_LOCATIONS,
129 FATTR4_WORD1_MODE
130 | FATTR4_WORD1_NUMLINKS
131 | FATTR4_WORD1_OWNER
132 | FATTR4_WORD1_OWNER_GROUP
133 | FATTR4_WORD1_RAWDEV
134 | FATTR4_WORD1_SPACE_USED
135 | FATTR4_WORD1_TIME_ACCESS
136 | FATTR4_WORD1_TIME_METADATA
137 | FATTR4_WORD1_TIME_MODIFY
138 | FATTR4_WORD1_MOUNTED_ON_FILEID
139};
140
bc4785cd 141static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
1da177e4
LT
142 struct nfs4_readdir_arg *readdir)
143{
0dbb4c67 144 __be32 *start, *p;
1da177e4
LT
145
146 BUG_ON(readdir->count < 80);
147 if (cookie > 2) {
b7ef1956 148 readdir->cookie = cookie;
1da177e4
LT
149 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
150 return;
151 }
152
153 readdir->cookie = 0;
154 memset(&readdir->verifier, 0, sizeof(readdir->verifier));
155 if (cookie == 2)
156 return;
157
158 /*
159 * NFSv4 servers do not return entries for '.' and '..'
160 * Therefore, we fake these entries here. We let '.'
161 * have cookie 0 and '..' have cookie 1. Note that
162 * when talking to the server, we always send cookie 0
163 * instead of 1 or 2.
164 */
0dbb4c67 165 start = p = kmap_atomic(*readdir->pages, KM_USER0);
1da177e4
LT
166
167 if (cookie == 0) {
168 *p++ = xdr_one; /* next */
169 *p++ = xdr_zero; /* cookie, first word */
170 *p++ = xdr_one; /* cookie, second word */
171 *p++ = xdr_one; /* entry len */
172 memcpy(p, ".\0\0\0", 4); /* entry */
173 p++;
174 *p++ = xdr_one; /* bitmap length */
175 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
176 *p++ = htonl(8); /* attribute buffer length */
177 p = xdr_encode_hyper(p, dentry->d_inode->i_ino);
178 }
179
180 *p++ = xdr_one; /* next */
181 *p++ = xdr_zero; /* cookie, first word */
182 *p++ = xdr_two; /* cookie, second word */
183 *p++ = xdr_two; /* entry len */
184 memcpy(p, "..\0\0", 4); /* entry */
185 p++;
186 *p++ = xdr_one; /* bitmap length */
187 *p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
188 *p++ = htonl(8); /* attribute buffer length */
189 p = xdr_encode_hyper(p, dentry->d_parent->d_inode->i_ino);
190
191 readdir->pgbase = (char *)p - (char *)start;
192 readdir->count -= readdir->pgbase;
193 kunmap_atomic(start, KM_USER0);
194}
195
26e976a8 196static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
1da177e4 197{
7539bbab 198 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
199 spin_lock(&clp->cl_lock);
200 if (time_before(clp->cl_last_renewal,timestamp))
201 clp->cl_last_renewal = timestamp;
202 spin_unlock(&clp->cl_lock);
203}
204
38478b24 205static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
1da177e4 206{
38478b24 207 struct nfs_inode *nfsi = NFS_I(dir);
1da177e4 208
38478b24
TM
209 spin_lock(&dir->i_lock);
210 nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_REVAL_PAGECACHE|NFS_INO_INVALID_DATA;
1da177e4
LT
211 if (cinfo->before == nfsi->change_attr && cinfo->atomic)
212 nfsi->change_attr = cinfo->after;
38478b24 213 spin_unlock(&dir->i_lock);
1da177e4
LT
214}
215
e56e0b78 216struct nfs4_opendata {
24ac23ab 217 atomic_t count;
e56e0b78
TM
218 struct nfs_openargs o_arg;
219 struct nfs_openres o_res;
cdd4e68b
TM
220 struct nfs_open_confirmargs c_arg;
221 struct nfs_open_confirmres c_res;
e56e0b78
TM
222 struct nfs_fattr f_attr;
223 struct nfs_fattr dir_attr;
ad389da7 224 struct path path;
e56e0b78
TM
225 struct dentry *dir;
226 struct nfs4_state_owner *owner;
227 struct iattr attrs;
26e976a8 228 unsigned long timestamp;
24ac23ab
TM
229 int rpc_status;
230 int cancelled;
e56e0b78
TM
231};
232
ad389da7 233static struct nfs4_opendata *nfs4_opendata_alloc(struct path *path,
e56e0b78
TM
234 struct nfs4_state_owner *sp, int flags,
235 const struct iattr *attrs)
236{
ad389da7 237 struct dentry *parent = dget_parent(path->dentry);
e56e0b78
TM
238 struct inode *dir = parent->d_inode;
239 struct nfs_server *server = NFS_SERVER(dir);
240 struct nfs4_opendata *p;
241
242 p = kzalloc(sizeof(*p), GFP_KERNEL);
243 if (p == NULL)
244 goto err;
245 p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid);
246 if (p->o_arg.seqid == NULL)
247 goto err_free;
24ac23ab 248 atomic_set(&p->count, 1);
ad389da7
TM
249 p->path.mnt = mntget(path->mnt);
250 p->path.dentry = dget(path->dentry);
e56e0b78
TM
251 p->dir = parent;
252 p->owner = sp;
253 atomic_inc(&sp->so_count);
254 p->o_arg.fh = NFS_FH(dir);
255 p->o_arg.open_flags = flags,
7539bbab 256 p->o_arg.clientid = server->nfs_client->cl_clientid;
e56e0b78 257 p->o_arg.id = sp->so_id;
ad389da7 258 p->o_arg.name = &p->path.dentry->d_name;
e56e0b78
TM
259 p->o_arg.server = server;
260 p->o_arg.bitmask = server->attr_bitmask;
261 p->o_arg.claim = NFS4_OPEN_CLAIM_NULL;
262 p->o_res.f_attr = &p->f_attr;
263 p->o_res.dir_attr = &p->dir_attr;
264 p->o_res.server = server;
265 nfs_fattr_init(&p->f_attr);
266 nfs_fattr_init(&p->dir_attr);
267 if (flags & O_EXCL) {
268 u32 *s = (u32 *) p->o_arg.u.verifier.data;
269 s[0] = jiffies;
270 s[1] = current->pid;
271 } else if (flags & O_CREAT) {
272 p->o_arg.u.attrs = &p->attrs;
273 memcpy(&p->attrs, attrs, sizeof(p->attrs));
274 }
cdd4e68b
TM
275 p->c_arg.fh = &p->o_res.fh;
276 p->c_arg.stateid = &p->o_res.stateid;
277 p->c_arg.seqid = p->o_arg.seqid;
e56e0b78
TM
278 return p;
279err_free:
280 kfree(p);
281err:
282 dput(parent);
283 return NULL;
284}
285
286static void nfs4_opendata_free(struct nfs4_opendata *p)
287{
24ac23ab 288 if (p != NULL && atomic_dec_and_test(&p->count)) {
e56e0b78
TM
289 nfs_free_seqid(p->o_arg.seqid);
290 nfs4_put_state_owner(p->owner);
291 dput(p->dir);
ad389da7
TM
292 dput(p->path.dentry);
293 mntput(p->path.mnt);
e56e0b78
TM
294 kfree(p);
295 }
296}
297
06f814a3
TM
298static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
299{
300 sigset_t oldset;
301 int ret;
302
303 rpc_clnt_sigmask(task->tk_client, &oldset);
304 ret = rpc_wait_for_completion_task(task);
305 rpc_clnt_sigunmask(task->tk_client, &oldset);
306 return ret;
307}
308
e7616923
TM
309static inline void update_open_stateflags(struct nfs4_state *state, mode_t open_flags)
310{
311 switch (open_flags) {
312 case FMODE_WRITE:
313 state->n_wronly++;
314 break;
315 case FMODE_READ:
316 state->n_rdonly++;
317 break;
318 case FMODE_READ|FMODE_WRITE:
319 state->n_rdwr++;
320 }
321}
322
1da177e4
LT
323static void update_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, int open_flags)
324{
325 struct inode *inode = state->inode;
326
327 open_flags &= (FMODE_READ|FMODE_WRITE);
d530838b 328 /* Protect against nfs4_find_state_byowner() */
ec073428 329 spin_lock(&state->owner->so_lock);
1da177e4 330 spin_lock(&inode->i_lock);
4cecb76f 331 memcpy(&state->stateid, stateid, sizeof(state->stateid));
e7616923 332 update_open_stateflags(state, open_flags);
4cecb76f 333 nfs4_state_set_mode_locked(state, state->state | open_flags);
1da177e4 334 spin_unlock(&inode->i_lock);
ec073428 335 spin_unlock(&state->owner->so_lock);
1da177e4
LT
336}
337
24ac23ab
TM
338static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
339{
340 struct inode *inode;
341 struct nfs4_state *state = NULL;
342
343 if (!(data->f_attr.valid & NFS_ATTR_FATTR))
344 goto out;
345 inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr);
03f28e3a 346 if (IS_ERR(inode))
24ac23ab
TM
347 goto out;
348 state = nfs4_get_open_state(inode, data->owner);
349 if (state == NULL)
350 goto put_inode;
351 update_open_stateid(state, &data->o_res.stateid, data->o_arg.open_flags);
352put_inode:
353 iput(inode);
354out:
355 return state;
356}
357
864472e9
TM
358static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
359{
360 struct nfs_inode *nfsi = NFS_I(state->inode);
361 struct nfs_open_context *ctx;
362
363 spin_lock(&state->inode->i_lock);
364 list_for_each_entry(ctx, &nfsi->open_files, list) {
365 if (ctx->state != state)
366 continue;
367 get_nfs_open_context(ctx);
368 spin_unlock(&state->inode->i_lock);
369 return ctx;
370 }
371 spin_unlock(&state->inode->i_lock);
372 return ERR_PTR(-ENOENT);
373}
374
375static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, mode_t openflags, nfs4_stateid *stateid)
376{
377 int ret;
378
379 opendata->o_arg.open_flags = openflags;
380 ret = _nfs4_proc_open(opendata);
381 if (ret != 0)
382 return ret;
383 memcpy(stateid->data, opendata->o_res.stateid.data,
384 sizeof(stateid->data));
385 return 0;
386}
387
388static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
389{
390 nfs4_stateid stateid;
391 struct nfs4_state *newstate;
392 int mode = 0;
393 int delegation = 0;
394 int ret;
395
396 /* memory barrier prior to reading state->n_* */
397 smp_rmb();
398 if (state->n_rdwr != 0) {
399 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &stateid);
400 if (ret != 0)
401 return ret;
402 mode |= FMODE_READ|FMODE_WRITE;
403 if (opendata->o_res.delegation_type != 0)
404 delegation = opendata->o_res.delegation_type;
405 smp_rmb();
406 }
407 if (state->n_wronly != 0) {
408 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &stateid);
409 if (ret != 0)
410 return ret;
411 mode |= FMODE_WRITE;
412 if (opendata->o_res.delegation_type != 0)
413 delegation = opendata->o_res.delegation_type;
414 smp_rmb();
415 }
416 if (state->n_rdonly != 0) {
417 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &stateid);
418 if (ret != 0)
419 return ret;
420 mode |= FMODE_READ;
421 }
422 clear_bit(NFS_DELEGATED_STATE, &state->flags);
423 if (mode == 0)
424 return 0;
425 if (opendata->o_res.delegation_type == 0)
426 opendata->o_res.delegation_type = delegation;
427 opendata->o_arg.open_flags |= mode;
428 newstate = nfs4_opendata_to_nfs4_state(opendata);
429 if (newstate != NULL) {
430 if (opendata->o_res.delegation_type != 0) {
431 struct nfs_inode *nfsi = NFS_I(newstate->inode);
432 int delegation_flags = 0;
433 if (nfsi->delegation)
434 delegation_flags = nfsi->delegation->flags;
435 if (!(delegation_flags & NFS_DELEGATION_NEED_RECLAIM))
436 nfs_inode_set_delegation(newstate->inode,
437 opendata->owner->so_cred,
438 &opendata->o_res);
439 else
440 nfs_inode_reclaim_delegation(newstate->inode,
441 opendata->owner->so_cred,
442 &opendata->o_res);
443 }
4a35bd41 444 nfs4_close_state(&opendata->path, newstate, opendata->o_arg.open_flags);
864472e9
TM
445 }
446 if (newstate != state)
447 return -ESTALE;
448 return 0;
449}
450
1da177e4
LT
451/*
452 * OPEN_RECLAIM:
453 * reclaim state on the server after a reboot.
1da177e4 454 */
539cd03a 455static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 456{
864472e9
TM
457 struct nfs_delegation *delegation = NFS_I(state->inode)->delegation;
458 struct nfs4_opendata *opendata;
459 int delegation_type = 0;
1da177e4
LT
460 int status;
461
462 if (delegation != NULL) {
463 if (!(delegation->flags & NFS_DELEGATION_NEED_RECLAIM)) {
464 memcpy(&state->stateid, &delegation->stateid,
465 sizeof(state->stateid));
466 set_bit(NFS_DELEGATED_STATE, &state->flags);
467 return 0;
468 }
864472e9 469 delegation_type = delegation->type;
1da177e4 470 }
ad389da7 471 opendata = nfs4_opendata_alloc(&ctx->path, state->owner, 0, NULL);
864472e9 472 if (opendata == NULL)
cee54fc9 473 return -ENOMEM;
864472e9
TM
474 opendata->o_arg.claim = NFS4_OPEN_CLAIM_PREVIOUS;
475 opendata->o_arg.fh = NFS_FH(state->inode);
476 nfs_copy_fh(&opendata->o_res.fh, opendata->o_arg.fh);
477 opendata->o_arg.u.delegation_type = delegation_type;
478 status = nfs4_open_recover(opendata, state);
479 nfs4_opendata_free(opendata);
1da177e4
LT
480 return status;
481}
482
539cd03a 483static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
484{
485 struct nfs_server *server = NFS_SERVER(state->inode);
486 struct nfs4_exception exception = { };
487 int err;
488 do {
539cd03a 489 err = _nfs4_do_open_reclaim(ctx, state);
202b50dc
TM
490 if (err != -NFS4ERR_DELAY)
491 break;
492 nfs4_handle_exception(server, err, &exception);
1da177e4
LT
493 } while (exception.retry);
494 return err;
495}
496
864472e9
TM
497static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
498{
499 struct nfs_open_context *ctx;
500 int ret;
501
502 ctx = nfs4_state_find_open_context(state);
503 if (IS_ERR(ctx))
504 return PTR_ERR(ctx);
539cd03a 505 ret = nfs4_do_open_reclaim(ctx, state);
864472e9
TM
506 put_nfs_open_context(ctx);
507 return ret;
508}
509
539cd03a 510static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
511{
512 struct nfs4_state_owner *sp = state->owner;
e56e0b78 513 struct nfs4_opendata *opendata;
864472e9 514 int ret;
1da177e4 515
1da177e4 516 if (!test_bit(NFS_DELEGATED_STATE, &state->flags))
864472e9 517 return 0;
ad389da7 518 opendata = nfs4_opendata_alloc(&ctx->path, sp, 0, NULL);
e56e0b78 519 if (opendata == NULL)
864472e9 520 return -ENOMEM;
e56e0b78 521 opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELEGATE_CUR;
e56e0b78
TM
522 memcpy(opendata->o_arg.u.delegation.data, state->stateid.data,
523 sizeof(opendata->o_arg.u.delegation.data));
864472e9 524 ret = nfs4_open_recover(opendata, state);
e56e0b78 525 nfs4_opendata_free(opendata);
864472e9 526 return ret;
1da177e4
LT
527}
528
539cd03a 529int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4
LT
530{
531 struct nfs4_exception exception = { };
539cd03a 532 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4
LT
533 int err;
534 do {
539cd03a 535 err = _nfs4_open_delegation_recall(ctx, state);
1da177e4
LT
536 switch (err) {
537 case 0:
538 return err;
539 case -NFS4ERR_STALE_CLIENTID:
540 case -NFS4ERR_STALE_STATEID:
541 case -NFS4ERR_EXPIRED:
542 /* Don't recall a delegation if it was lost */
7539bbab 543 nfs4_schedule_state_recovery(server->nfs_client);
1da177e4
LT
544 return err;
545 }
546 err = nfs4_handle_exception(server, err, &exception);
547 } while (exception.retry);
548 return err;
549}
550
cdd4e68b 551static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata)
1da177e4 552{
cdd4e68b
TM
553 struct nfs4_opendata *data = calldata;
554 struct rpc_message msg = {
555 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
556 .rpc_argp = &data->c_arg,
557 .rpc_resp = &data->c_res,
558 .rpc_cred = data->owner->so_cred,
1da177e4 559 };
26e976a8 560 data->timestamp = jiffies;
cdd4e68b
TM
561 rpc_call_setup(task, &msg, 0);
562}
563
564static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
565{
566 struct nfs4_opendata *data = calldata;
567
568 data->rpc_status = task->tk_status;
569 if (RPC_ASSASSINATED(task))
570 return;
26e976a8 571 if (data->rpc_status == 0) {
cdd4e68b
TM
572 memcpy(data->o_res.stateid.data, data->c_res.stateid.data,
573 sizeof(data->o_res.stateid.data));
26e976a8
TM
574 renew_lease(data->o_res.server, data->timestamp);
575 }
cdd4e68b
TM
576 nfs_increment_open_seqid(data->rpc_status, data->c_arg.seqid);
577 nfs_confirm_seqid(&data->owner->so_seqid, data->rpc_status);
578}
579
580static void nfs4_open_confirm_release(void *calldata)
581{
582 struct nfs4_opendata *data = calldata;
583 struct nfs4_state *state = NULL;
584
585 /* If this request hasn't been cancelled, do nothing */
586 if (data->cancelled == 0)
587 goto out_free;
588 /* In case of error, no cleanup! */
589 if (data->rpc_status != 0)
590 goto out_free;
591 nfs_confirm_seqid(&data->owner->so_seqid, 0);
592 state = nfs4_opendata_to_nfs4_state(data);
593 if (state != NULL)
4a35bd41 594 nfs4_close_state(&data->path, state, data->o_arg.open_flags);
cdd4e68b
TM
595out_free:
596 nfs4_opendata_free(data);
597}
598
599static const struct rpc_call_ops nfs4_open_confirm_ops = {
600 .rpc_call_prepare = nfs4_open_confirm_prepare,
601 .rpc_call_done = nfs4_open_confirm_done,
602 .rpc_release = nfs4_open_confirm_release,
603};
604
605/*
606 * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
607 */
608static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
609{
610 struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
611 struct rpc_task *task;
1da177e4
LT
612 int status;
613
cdd4e68b 614 atomic_inc(&data->count);
7a1218a2
TM
615 /*
616 * If rpc_run_task() ends up calling ->rpc_release(), we
617 * want to ensure that it takes the 'error' code path.
618 */
619 data->rpc_status = -ENOMEM;
cdd4e68b 620 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_confirm_ops, data);
7a1218a2 621 if (IS_ERR(task))
cdd4e68b 622 return PTR_ERR(task);
cdd4e68b
TM
623 status = nfs4_wait_for_completion_rpc_task(task);
624 if (status != 0) {
625 data->cancelled = 1;
626 smp_wmb();
627 } else
628 status = data->rpc_status;
e6b3c4db 629 rpc_put_task(task);
1da177e4
LT
630 return status;
631}
632
24ac23ab 633static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1da177e4 634{
24ac23ab
TM
635 struct nfs4_opendata *data = calldata;
636 struct nfs4_state_owner *sp = data->owner;
1da177e4
LT
637 struct rpc_message msg = {
638 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
24ac23ab
TM
639 .rpc_argp = &data->o_arg,
640 .rpc_resp = &data->o_res,
1da177e4
LT
641 .rpc_cred = sp->so_cred,
642 };
24ac23ab
TM
643
644 if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
645 return;
646 /* Update sequence id. */
647 data->o_arg.id = sp->so_id;
648 data->o_arg.clientid = sp->so_client->cl_clientid;
864472e9
TM
649 if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS)
650 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
26e976a8 651 data->timestamp = jiffies;
24ac23ab
TM
652 rpc_call_setup(task, &msg, 0);
653}
1da177e4 654
24ac23ab
TM
655static void nfs4_open_done(struct rpc_task *task, void *calldata)
656{
657 struct nfs4_opendata *data = calldata;
1da177e4 658
24ac23ab
TM
659 data->rpc_status = task->tk_status;
660 if (RPC_ASSASSINATED(task))
661 return;
662 if (task->tk_status == 0) {
663 switch (data->o_res.f_attr->mode & S_IFMT) {
6f926b5b
TM
664 case S_IFREG:
665 break;
666 case S_IFLNK:
24ac23ab 667 data->rpc_status = -ELOOP;
6f926b5b
TM
668 break;
669 case S_IFDIR:
24ac23ab 670 data->rpc_status = -EISDIR;
6f926b5b
TM
671 break;
672 default:
24ac23ab 673 data->rpc_status = -ENOTDIR;
6f926b5b 674 }
26e976a8 675 renew_lease(data->o_res.server, data->timestamp);
6f926b5b 676 }
24ac23ab
TM
677 nfs_increment_open_seqid(data->rpc_status, data->o_arg.seqid);
678}
6f926b5b 679
24ac23ab
TM
680static void nfs4_open_release(void *calldata)
681{
682 struct nfs4_opendata *data = calldata;
683 struct nfs4_state *state = NULL;
684
685 /* If this request hasn't been cancelled, do nothing */
686 if (data->cancelled == 0)
687 goto out_free;
688 /* In case of error, no cleanup! */
689 if (data->rpc_status != 0)
690 goto out_free;
691 /* In case we need an open_confirm, no cleanup! */
692 if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
693 goto out_free;
694 nfs_confirm_seqid(&data->owner->so_seqid, 0);
695 state = nfs4_opendata_to_nfs4_state(data);
696 if (state != NULL)
4a35bd41 697 nfs4_close_state(&data->path, state, data->o_arg.open_flags);
24ac23ab
TM
698out_free:
699 nfs4_opendata_free(data);
700}
701
702static const struct rpc_call_ops nfs4_open_ops = {
703 .rpc_call_prepare = nfs4_open_prepare,
704 .rpc_call_done = nfs4_open_done,
705 .rpc_release = nfs4_open_release,
706};
707
708/*
709 * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
710 */
711static int _nfs4_proc_open(struct nfs4_opendata *data)
712{
713 struct inode *dir = data->dir->d_inode;
714 struct nfs_server *server = NFS_SERVER(dir);
715 struct nfs_openargs *o_arg = &data->o_arg;
716 struct nfs_openres *o_res = &data->o_res;
717 struct rpc_task *task;
718 int status;
719
720 atomic_inc(&data->count);
7a1218a2
TM
721 /*
722 * If rpc_run_task() ends up calling ->rpc_release(), we
723 * want to ensure that it takes the 'error' code path.
724 */
725 data->rpc_status = -ENOMEM;
24ac23ab 726 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_ops, data);
7a1218a2 727 if (IS_ERR(task))
24ac23ab 728 return PTR_ERR(task);
24ac23ab
TM
729 status = nfs4_wait_for_completion_rpc_task(task);
730 if (status != 0) {
731 data->cancelled = 1;
732 smp_wmb();
733 } else
734 status = data->rpc_status;
e6b3c4db 735 rpc_put_task(task);
1da177e4 736 if (status != 0)
24ac23ab
TM
737 return status;
738
56ae19f3
TM
739 if (o_arg->open_flags & O_CREAT) {
740 update_changeattr(dir, &o_res->cinfo);
741 nfs_post_op_update_inode(dir, o_res->dir_attr);
742 } else
743 nfs_refresh_inode(dir, o_res->dir_attr);
1da177e4 744 if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
cdd4e68b 745 status = _nfs4_proc_open_confirm(data);
1da177e4 746 if (status != 0)
24ac23ab 747 return status;
1da177e4 748 }
24ac23ab 749 nfs_confirm_seqid(&data->owner->so_seqid, 0);
1da177e4 750 if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
8fa5c000 751 return server->nfs_client->rpc_ops->getattr(server, &o_res->fh, o_res->f_attr);
24ac23ab 752 return 0;
1da177e4
LT
753}
754
755static int _nfs4_do_access(struct inode *inode, struct rpc_cred *cred, int openflags)
756{
757 struct nfs_access_entry cache;
758 int mask = 0;
759 int status;
760
761 if (openflags & FMODE_READ)
762 mask |= MAY_READ;
763 if (openflags & FMODE_WRITE)
764 mask |= MAY_WRITE;
765 status = nfs_access_get_cached(inode, cred, &cache);
766 if (status == 0)
767 goto out;
768
769 /* Be clever: ask server to check for all possible rights */
770 cache.mask = MAY_EXEC | MAY_WRITE | MAY_READ;
771 cache.cred = cred;
772 cache.jiffies = jiffies;
773 status = _nfs4_proc_access(inode, &cache);
774 if (status != 0)
775 return status;
776 nfs_access_add_cache(inode, &cache);
777out:
778 if ((cache.mask & mask) == mask)
779 return 0;
780 return -EACCES;
781}
782
10afec90 783static int nfs4_recover_expired_lease(struct nfs_server *server)
58d9714a 784{
7539bbab 785 struct nfs_client *clp = server->nfs_client;
6b30954e 786 int ret;
58d9714a 787
6b30954e
TM
788 for (;;) {
789 ret = nfs4_wait_clnt_recover(server->client, clp);
790 if (ret != 0)
791 return ret;
792 if (!test_and_clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
793 break;
58d9714a 794 nfs4_schedule_state_recovery(clp);
6b30954e
TM
795 }
796 return 0;
58d9714a
TM
797}
798
1da177e4
LT
799/*
800 * OPEN_EXPIRED:
801 * reclaim state on the server after a network partition.
802 * Assumes caller holds the appropriate lock
803 */
539cd03a 804static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1da177e4 805{
1da177e4 806 struct inode *inode = state->inode;
1da177e4 807 struct nfs_delegation *delegation = NFS_I(inode)->delegation;
e56e0b78 808 struct nfs4_opendata *opendata;
24ac23ab 809 int openflags = state->state & (FMODE_READ|FMODE_WRITE);
864472e9 810 int ret;
1da177e4
LT
811
812 if (delegation != NULL && !(delegation->flags & NFS_DELEGATION_NEED_RECLAIM)) {
539cd03a 813 ret = _nfs4_do_access(inode, ctx->cred, openflags);
864472e9
TM
814 if (ret < 0)
815 return ret;
1da177e4
LT
816 memcpy(&state->stateid, &delegation->stateid, sizeof(state->stateid));
817 set_bit(NFS_DELEGATED_STATE, &state->flags);
864472e9 818 return 0;
1da177e4 819 }
ad389da7 820 opendata = nfs4_opendata_alloc(&ctx->path, state->owner, openflags, NULL);
e56e0b78 821 if (opendata == NULL)
864472e9
TM
822 return -ENOMEM;
823 ret = nfs4_open_recover(opendata, state);
824 if (ret == -ESTALE) {
825 /* Invalidate the state owner so we don't ever use it again */
539cd03a
TM
826 nfs4_drop_state_owner(state->owner);
827 d_drop(ctx->path.dentry);
1da177e4 828 }
e56e0b78 829 nfs4_opendata_free(opendata);
864472e9 830 return ret;
1da177e4
LT
831}
832
539cd03a 833static inline int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
202b50dc 834{
539cd03a 835 struct nfs_server *server = NFS_SERVER(state->inode);
202b50dc
TM
836 struct nfs4_exception exception = { };
837 int err;
838
839 do {
539cd03a 840 err = _nfs4_open_expired(ctx, state);
202b50dc
TM
841 if (err == -NFS4ERR_DELAY)
842 nfs4_handle_exception(server, err, &exception);
843 } while (exception.retry);
844 return err;
845}
846
1da177e4
LT
847static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
848{
1da177e4 849 struct nfs_open_context *ctx;
864472e9 850 int ret;
1da177e4 851
864472e9
TM
852 ctx = nfs4_state_find_open_context(state);
853 if (IS_ERR(ctx))
854 return PTR_ERR(ctx);
539cd03a 855 ret = nfs4_do_open_expired(ctx, state);
864472e9
TM
856 put_nfs_open_context(ctx);
857 return ret;
1da177e4
LT
858}
859
860/*
24ac23ab 861 * Returns a referenced nfs4_state if there is an open delegation on the file
1da177e4
LT
862 */
863static int _nfs4_open_delegated(struct inode *inode, int flags, struct rpc_cred *cred, struct nfs4_state **res)
864{
865 struct nfs_delegation *delegation;
866 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 867 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
868 struct nfs_inode *nfsi = NFS_I(inode);
869 struct nfs4_state_owner *sp = NULL;
870 struct nfs4_state *state = NULL;
871 int open_flags = flags & (FMODE_READ|FMODE_WRITE);
872 int err;
873
b4454fe1
TM
874 err = -ENOMEM;
875 if (!(sp = nfs4_get_state_owner(server, cred))) {
876 dprintk("%s: nfs4_get_state_owner failed!\n", __FUNCTION__);
877 return err;
878 }
58d9714a
TM
879 err = nfs4_recover_expired_lease(server);
880 if (err != 0)
b4454fe1 881 goto out_put_state_owner;
1da177e4
LT
882 /* Protect against reboot recovery - NOTE ORDER! */
883 down_read(&clp->cl_sem);
884 /* Protect against delegation recall */
885 down_read(&nfsi->rwsem);
886 delegation = NFS_I(inode)->delegation;
887 err = -ENOENT;
888 if (delegation == NULL || (delegation->type & open_flags) != open_flags)
889 goto out_err;
890 err = -ENOMEM;
1da177e4
LT
891 state = nfs4_get_open_state(inode, sp);
892 if (state == NULL)
893 goto out_err;
894
895 err = -ENOENT;
896 if ((state->state & open_flags) == open_flags) {
897 spin_lock(&inode->i_lock);
e7616923 898 update_open_stateflags(state, open_flags);
1da177e4
LT
899 spin_unlock(&inode->i_lock);
900 goto out_ok;
901 } else if (state->state != 0)
b4454fe1 902 goto out_put_open_state;
1da177e4
LT
903
904 lock_kernel();
905 err = _nfs4_do_access(inode, cred, open_flags);
906 unlock_kernel();
907 if (err != 0)
b4454fe1 908 goto out_put_open_state;
1da177e4
LT
909 set_bit(NFS_DELEGATED_STATE, &state->flags);
910 update_open_stateid(state, &delegation->stateid, open_flags);
911out_ok:
1da177e4
LT
912 nfs4_put_state_owner(sp);
913 up_read(&nfsi->rwsem);
914 up_read(&clp->cl_sem);
1da177e4 915 *res = state;
b4454fe1
TM
916 return 0;
917out_put_open_state:
918 nfs4_put_open_state(state);
1da177e4 919out_err:
1da177e4
LT
920 up_read(&nfsi->rwsem);
921 up_read(&clp->cl_sem);
b8e5c4c2
TM
922 if (err != -EACCES)
923 nfs_inode_return_delegation(inode);
b4454fe1
TM
924out_put_state_owner:
925 nfs4_put_state_owner(sp);
1da177e4
LT
926 return err;
927}
928
929static struct nfs4_state *nfs4_open_delegated(struct inode *inode, int flags, struct rpc_cred *cred)
930{
931 struct nfs4_exception exception = { };
a162a6b8 932 struct nfs4_state *res = ERR_PTR(-EIO);
1da177e4
LT
933 int err;
934
935 do {
936 err = _nfs4_open_delegated(inode, flags, cred, &res);
937 if (err == 0)
938 break;
939 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(inode),
940 err, &exception));
941 } while (exception.retry);
942 return res;
943}
944
945/*
24ac23ab 946 * Returns a referenced nfs4_state
1da177e4 947 */
ad389da7 948static int _nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
1da177e4
LT
949{
950 struct nfs4_state_owner *sp;
951 struct nfs4_state *state = NULL;
952 struct nfs_server *server = NFS_SERVER(dir);
7539bbab 953 struct nfs_client *clp = server->nfs_client;
e56e0b78 954 struct nfs4_opendata *opendata;
1da177e4 955 int status;
1da177e4
LT
956
957 /* Protect against reboot recovery conflicts */
1da177e4
LT
958 status = -ENOMEM;
959 if (!(sp = nfs4_get_state_owner(server, cred))) {
960 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
961 goto out_err;
962 }
58d9714a
TM
963 status = nfs4_recover_expired_lease(server);
964 if (status != 0)
b4454fe1 965 goto err_put_state_owner;
58d9714a
TM
966 down_read(&clp->cl_sem);
967 status = -ENOMEM;
ad389da7 968 opendata = nfs4_opendata_alloc(path, sp, flags, sattr);
e56e0b78 969 if (opendata == NULL)
76723de0 970 goto err_release_rwsem;
1da177e4 971
24ac23ab 972 status = _nfs4_proc_open(opendata);
1da177e4 973 if (status != 0)
e56e0b78 974 goto err_opendata_free;
1da177e4
LT
975
976 status = -ENOMEM;
24ac23ab
TM
977 state = nfs4_opendata_to_nfs4_state(opendata);
978 if (state == NULL)
e56e0b78 979 goto err_opendata_free;
e56e0b78 980 if (opendata->o_res.delegation_type != 0)
24ac23ab 981 nfs_inode_set_delegation(state->inode, cred, &opendata->o_res);
e56e0b78 982 nfs4_opendata_free(opendata);
1da177e4
LT
983 nfs4_put_state_owner(sp);
984 up_read(&clp->cl_sem);
985 *res = state;
986 return 0;
e56e0b78
TM
987err_opendata_free:
988 nfs4_opendata_free(opendata);
76723de0
TM
989err_release_rwsem:
990 up_read(&clp->cl_sem);
e56e0b78
TM
991err_put_state_owner:
992 nfs4_put_state_owner(sp);
1da177e4 993out_err:
1da177e4
LT
994 *res = NULL;
995 return status;
996}
997
998
ad389da7 999static struct nfs4_state *nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred)
1da177e4
LT
1000{
1001 struct nfs4_exception exception = { };
1002 struct nfs4_state *res;
1003 int status;
1004
1005 do {
ad389da7 1006 status = _nfs4_do_open(dir, path, flags, sattr, cred, &res);
1da177e4
LT
1007 if (status == 0)
1008 break;
1009 /* NOTE: BAD_SEQID means the server and client disagree about the
1010 * book-keeping w.r.t. state-changing operations
1011 * (OPEN/CLOSE/LOCK/LOCKU...)
1012 * It is actually a sign of a bug on the client or on the server.
1013 *
1014 * If we receive a BAD_SEQID error in the particular case of
cee54fc9 1015 * doing an OPEN, we assume that nfs_increment_open_seqid() will
1da177e4
LT
1016 * have unhashed the old state_owner for us, and that we can
1017 * therefore safely retry using a new one. We should still warn
1018 * the user though...
1019 */
1020 if (status == -NFS4ERR_BAD_SEQID) {
1021 printk(KERN_WARNING "NFS: v4 server returned a bad sequence-id error!\n");
1022 exception.retry = 1;
1023 continue;
1024 }
550f5747
TM
1025 /*
1026 * BAD_STATEID on OPEN means that the server cancelled our
1027 * state before it received the OPEN_CONFIRM.
1028 * Recover by retrying the request as per the discussion
1029 * on Page 181 of RFC3530.
1030 */
1031 if (status == -NFS4ERR_BAD_STATEID) {
1032 exception.retry = 1;
1033 continue;
1034 }
1da177e4
LT
1035 res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(dir),
1036 status, &exception));
1037 } while (exception.retry);
1038 return res;
1039}
1040
3e4f6290
TM
1041static int _nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
1042 struct iattr *sattr, struct nfs4_state *state)
1da177e4 1043{
3e4f6290 1044 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 1045 struct nfs_setattrargs arg = {
3e4f6290 1046 .fh = NFS_FH(inode),
1da177e4
LT
1047 .iap = sattr,
1048 .server = server,
1049 .bitmask = server->attr_bitmask,
1050 };
1051 struct nfs_setattrres res = {
1052 .fattr = fattr,
1053 .server = server,
1054 };
1055 struct rpc_message msg = {
1056 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
1057 .rpc_argp = &arg,
1058 .rpc_resp = &res,
1059 };
26e976a8 1060 unsigned long timestamp = jiffies;
65e4308d 1061 int status;
1da177e4 1062
0e574af1 1063 nfs_fattr_init(fattr);
1da177e4 1064
3e4f6290
TM
1065 if (nfs4_copy_delegation_stateid(&arg.stateid, inode)) {
1066 /* Use that stateid */
1067 } else if (state != NULL) {
1da177e4 1068 msg.rpc_cred = state->owner->so_cred;
08e9eac4
TM
1069 nfs4_copy_stateid(&arg.stateid, state, current->files);
1070 } else
1da177e4
LT
1071 memcpy(&arg.stateid, &zero_stateid, sizeof(arg.stateid));
1072
65e4308d 1073 status = rpc_call_sync(server->client, &msg, 0);
26e976a8
TM
1074 if (status == 0 && state != NULL)
1075 renew_lease(server, timestamp);
65e4308d 1076 return status;
1da177e4
LT
1077}
1078
3e4f6290
TM
1079static int nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
1080 struct iattr *sattr, struct nfs4_state *state)
1da177e4 1081{
3e4f6290 1082 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
1083 struct nfs4_exception exception = { };
1084 int err;
1085 do {
1086 err = nfs4_handle_exception(server,
3e4f6290 1087 _nfs4_do_setattr(inode, fattr, sattr, state),
1da177e4
LT
1088 &exception);
1089 } while (exception.retry);
1090 return err;
1091}
1092
1093struct nfs4_closedata {
4a35bd41 1094 struct path path;
1da177e4
LT
1095 struct inode *inode;
1096 struct nfs4_state *state;
1097 struct nfs_closeargs arg;
1098 struct nfs_closeres res;
516a6af6 1099 struct nfs_fattr fattr;
26e976a8 1100 unsigned long timestamp;
1da177e4
LT
1101};
1102
963d8fe5 1103static void nfs4_free_closedata(void *data)
9512135d 1104{
963d8fe5
TM
1105 struct nfs4_closedata *calldata = data;
1106 struct nfs4_state_owner *sp = calldata->state->owner;
9512135d
TM
1107
1108 nfs4_put_open_state(calldata->state);
1109 nfs_free_seqid(calldata->arg.seqid);
9512135d 1110 nfs4_put_state_owner(sp);
4a35bd41
TM
1111 dput(calldata->path.dentry);
1112 mntput(calldata->path.mnt);
9512135d
TM
1113 kfree(calldata);
1114}
1115
963d8fe5 1116static void nfs4_close_done(struct rpc_task *task, void *data)
1da177e4 1117{
963d8fe5 1118 struct nfs4_closedata *calldata = data;
1da177e4 1119 struct nfs4_state *state = calldata->state;
1da177e4
LT
1120 struct nfs_server *server = NFS_SERVER(calldata->inode);
1121
4ce70ada
TM
1122 if (RPC_ASSASSINATED(task))
1123 return;
1da177e4
LT
1124 /* hmm. we are done with the inode, and in the process of freeing
1125 * the state_owner. we keep this around to process errors
1126 */
cee54fc9 1127 nfs_increment_open_seqid(task->tk_status, calldata->arg.seqid);
1da177e4
LT
1128 switch (task->tk_status) {
1129 case 0:
1130 memcpy(&state->stateid, &calldata->res.stateid,
1131 sizeof(state->stateid));
26e976a8 1132 renew_lease(server, calldata->timestamp);
1da177e4
LT
1133 break;
1134 case -NFS4ERR_STALE_STATEID:
1135 case -NFS4ERR_EXPIRED:
1da177e4
LT
1136 break;
1137 default:
1138 if (nfs4_async_handle_error(task, server) == -EAGAIN) {
1139 rpc_restart_call(task);
1140 return;
1141 }
1142 }
516a6af6 1143 nfs_refresh_inode(calldata->inode, calldata->res.fattr);
1da177e4
LT
1144}
1145
4ce70ada 1146static void nfs4_close_prepare(struct rpc_task *task, void *data)
1da177e4 1147{
4ce70ada 1148 struct nfs4_closedata *calldata = data;
9512135d 1149 struct nfs4_state *state = calldata->state;
1da177e4
LT
1150 struct rpc_message msg = {
1151 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
1152 .rpc_argp = &calldata->arg,
1153 .rpc_resp = &calldata->res,
9512135d 1154 .rpc_cred = state->owner->so_cred,
1da177e4 1155 };
4cecb76f 1156 int mode = 0, old_mode;
9512135d 1157
963d8fe5 1158 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
9512135d 1159 return;
9512135d
TM
1160 /* Recalculate the new open mode in case someone reopened the file
1161 * while we were waiting in line to be scheduled.
1162 */
4cecb76f
TM
1163 spin_lock(&state->owner->so_lock);
1164 spin_lock(&calldata->inode->i_lock);
1165 mode = old_mode = state->state;
e7616923
TM
1166 if (state->n_rdwr == 0) {
1167 if (state->n_rdonly == 0)
1168 mode &= ~FMODE_READ;
1169 if (state->n_wronly == 0)
1170 mode &= ~FMODE_WRITE;
1171 }
4cecb76f
TM
1172 nfs4_state_set_mode_locked(state, mode);
1173 spin_unlock(&calldata->inode->i_lock);
1174 spin_unlock(&state->owner->so_lock);
1175 if (mode == old_mode || test_bit(NFS_DELEGATED_STATE, &state->flags)) {
963d8fe5
TM
1176 /* Note: exit _without_ calling nfs4_close_done */
1177 task->tk_action = NULL;
9512135d
TM
1178 return;
1179 }
516a6af6 1180 nfs_fattr_init(calldata->res.fattr);
9512135d 1181 if (mode != 0)
1da177e4 1182 msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
9512135d 1183 calldata->arg.open_flags = mode;
26e976a8 1184 calldata->timestamp = jiffies;
9512135d 1185 rpc_call_setup(task, &msg, 0);
1da177e4
LT
1186}
1187
963d8fe5 1188static const struct rpc_call_ops nfs4_close_ops = {
4ce70ada 1189 .rpc_call_prepare = nfs4_close_prepare,
963d8fe5
TM
1190 .rpc_call_done = nfs4_close_done,
1191 .rpc_release = nfs4_free_closedata,
1192};
1193
1da177e4
LT
1194/*
1195 * It is possible for data to be read/written from a mem-mapped file
1196 * after the sys_close call (which hits the vfs layer as a flush).
1197 * This means that we can't safely call nfsv4 close on a file until
1198 * the inode is cleared. This in turn means that we are not good
1199 * NFSv4 citizens - we do not indicate to the server to update the file's
1200 * share state even when we are done with one of the three share
1201 * stateid's in the inode.
1202 *
1203 * NOTE: Caller must be holding the sp->so_owner semaphore!
1204 */
4a35bd41 1205int nfs4_do_close(struct path *path, struct nfs4_state *state)
1da177e4 1206{
4a35bd41 1207 struct nfs_server *server = NFS_SERVER(state->inode);
1da177e4 1208 struct nfs4_closedata *calldata;
b39e625b
TM
1209 struct nfs4_state_owner *sp = state->owner;
1210 struct rpc_task *task;
9512135d 1211 int status = -ENOMEM;
1da177e4 1212
9512135d 1213 calldata = kmalloc(sizeof(*calldata), GFP_KERNEL);
1da177e4 1214 if (calldata == NULL)
9512135d 1215 goto out;
4a35bd41 1216 calldata->inode = state->inode;
1da177e4 1217 calldata->state = state;
4a35bd41 1218 calldata->arg.fh = NFS_FH(state->inode);
9512135d 1219 calldata->arg.stateid = &state->stateid;
1da177e4 1220 /* Serialization for the sequence id */
cee54fc9 1221 calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid);
9512135d
TM
1222 if (calldata->arg.seqid == NULL)
1223 goto out_free_calldata;
516a6af6
TM
1224 calldata->arg.bitmask = server->attr_bitmask;
1225 calldata->res.fattr = &calldata->fattr;
1226 calldata->res.server = server;
4a35bd41
TM
1227 calldata->path.mnt = mntget(path->mnt);
1228 calldata->path.dentry = dget(path->dentry);
9512135d 1229
b39e625b
TM
1230 task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_close_ops, calldata);
1231 if (IS_ERR(task))
1232 return PTR_ERR(task);
1233 rpc_put_task(task);
1234 return 0;
9512135d
TM
1235out_free_calldata:
1236 kfree(calldata);
1237out:
b39e625b
TM
1238 nfs4_put_open_state(state);
1239 nfs4_put_state_owner(sp);
9512135d 1240 return status;
1da177e4
LT
1241}
1242
4a35bd41 1243static int nfs4_intent_set_file(struct nameidata *nd, struct path *path, struct nfs4_state *state)
02a913a7
TM
1244{
1245 struct file *filp;
1246
4a35bd41 1247 filp = lookup_instantiate_filp(nd, path->dentry, NULL);
02a913a7
TM
1248 if (!IS_ERR(filp)) {
1249 struct nfs_open_context *ctx;
1250 ctx = (struct nfs_open_context *)filp->private_data;
1251 ctx->state = state;
95cf959b
TM
1252 return 0;
1253 }
4a35bd41 1254 nfs4_close_state(path, state, nd->intent.open.flags);
95cf959b 1255 return PTR_ERR(filp);
02a913a7
TM
1256}
1257
1258struct dentry *
1da177e4
LT
1259nfs4_atomic_open(struct inode *dir, struct dentry *dentry, struct nameidata *nd)
1260{
ad389da7
TM
1261 struct path path = {
1262 .mnt = nd->mnt,
1263 .dentry = dentry,
1264 };
1da177e4
LT
1265 struct iattr attr;
1266 struct rpc_cred *cred;
1267 struct nfs4_state *state;
02a913a7 1268 struct dentry *res;
1da177e4
LT
1269
1270 if (nd->flags & LOOKUP_CREATE) {
1271 attr.ia_mode = nd->intent.open.create_mode;
1272 attr.ia_valid = ATTR_MODE;
1273 if (!IS_POSIXACL(dir))
1274 attr.ia_mode &= ~current->fs->umask;
1275 } else {
1276 attr.ia_valid = 0;
1277 BUG_ON(nd->intent.open.flags & O_CREAT);
1278 }
1279
1f163415 1280 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4 1281 if (IS_ERR(cred))
02a913a7 1282 return (struct dentry *)cred;
ad389da7 1283 state = nfs4_do_open(dir, &path, nd->intent.open.flags, &attr, cred);
1da177e4 1284 put_rpccred(cred);
02a913a7
TM
1285 if (IS_ERR(state)) {
1286 if (PTR_ERR(state) == -ENOENT)
1287 d_add(dentry, NULL);
1288 return (struct dentry *)state;
1289 }
24ac23ab 1290 res = d_add_unique(dentry, igrab(state->inode));
02a913a7
TM
1291 if (res != NULL)
1292 dentry = res;
4a35bd41 1293 nfs4_intent_set_file(nd, &path, state);
02a913a7 1294 return res;
1da177e4
LT
1295}
1296
1297int
02a913a7 1298nfs4_open_revalidate(struct inode *dir, struct dentry *dentry, int openflags, struct nameidata *nd)
1da177e4 1299{
ad389da7
TM
1300 struct path path = {
1301 .mnt = nd->mnt,
1302 .dentry = dentry,
1303 };
1da177e4
LT
1304 struct rpc_cred *cred;
1305 struct nfs4_state *state;
1da177e4 1306
1f163415 1307 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4
LT
1308 if (IS_ERR(cred))
1309 return PTR_ERR(cred);
1310 state = nfs4_open_delegated(dentry->d_inode, openflags, cred);
1311 if (IS_ERR(state))
ad389da7 1312 state = nfs4_do_open(dir, &path, openflags, NULL, cred);
1da177e4 1313 put_rpccred(cred);
02a913a7
TM
1314 if (IS_ERR(state)) {
1315 switch (PTR_ERR(state)) {
1316 case -EPERM:
1317 case -EACCES:
1318 case -EDQUOT:
1319 case -ENOSPC:
1320 case -EROFS:
1321 lookup_instantiate_filp(nd, (struct dentry *)state, NULL);
1322 return 1;
b87c0adf
CL
1323 default:
1324 goto out_drop;
02a913a7 1325 }
02a913a7 1326 }
24ac23ab 1327 if (state->inode == dentry->d_inode) {
4a35bd41 1328 nfs4_intent_set_file(nd, &path, state);
1da177e4
LT
1329 return 1;
1330 }
4a35bd41 1331 nfs4_close_state(&path, state, openflags);
02a913a7
TM
1332out_drop:
1333 d_drop(dentry);
1da177e4
LT
1334 return 0;
1335}
1336
1337
1338static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1339{
1340 struct nfs4_server_caps_res res = {};
1341 struct rpc_message msg = {
1342 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
1343 .rpc_argp = fhandle,
1344 .rpc_resp = &res,
1345 };
1346 int status;
1347
1348 status = rpc_call_sync(server->client, &msg, 0);
1349 if (status == 0) {
1350 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
1351 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
1352 server->caps |= NFS_CAP_ACLS;
1353 if (res.has_links != 0)
1354 server->caps |= NFS_CAP_HARDLINKS;
1355 if (res.has_symlinks != 0)
1356 server->caps |= NFS_CAP_SYMLINKS;
1357 server->acl_bitmask = res.acl_bitmask;
1358 }
1359 return status;
1360}
1361
55a97593 1362int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
1da177e4
LT
1363{
1364 struct nfs4_exception exception = { };
1365 int err;
1366 do {
1367 err = nfs4_handle_exception(server,
1368 _nfs4_server_capabilities(server, fhandle),
1369 &exception);
1370 } while (exception.retry);
1371 return err;
1372}
1373
1374static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
1375 struct nfs_fsinfo *info)
1376{
1da177e4
LT
1377 struct nfs4_lookup_root_arg args = {
1378 .bitmask = nfs4_fattr_bitmap,
1379 };
1380 struct nfs4_lookup_res res = {
1381 .server = server,
0e574af1 1382 .fattr = info->fattr,
1da177e4
LT
1383 .fh = fhandle,
1384 };
1385 struct rpc_message msg = {
1386 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
1387 .rpc_argp = &args,
1388 .rpc_resp = &res,
1389 };
0e574af1 1390 nfs_fattr_init(info->fattr);
1da177e4
LT
1391 return rpc_call_sync(server->client, &msg, 0);
1392}
1393
1394static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
1395 struct nfs_fsinfo *info)
1396{
1397 struct nfs4_exception exception = { };
1398 int err;
1399 do {
1400 err = nfs4_handle_exception(server,
1401 _nfs4_lookup_root(server, fhandle, info),
1402 &exception);
1403 } while (exception.retry);
1404 return err;
1405}
1406
54ceac45
DH
1407/*
1408 * get the file handle for the "/" directory on the server
1409 */
1da177e4 1410static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle,
54ceac45 1411 struct nfs_fsinfo *info)
1da177e4 1412{
1da177e4
LT
1413 int status;
1414
1da177e4 1415 status = nfs4_lookup_root(server, fhandle, info);
1da177e4
LT
1416 if (status == 0)
1417 status = nfs4_server_capabilities(server, fhandle);
1418 if (status == 0)
1419 status = nfs4_do_fsinfo(server, fhandle, info);
c12e87f4 1420 return nfs4_map_errors(status);
1da177e4
LT
1421}
1422
6b97fd3d
MN
1423/*
1424 * Get locations and (maybe) other attributes of a referral.
1425 * Note that we'll actually follow the referral later when
1426 * we detect fsid mismatch in inode revalidation
1427 */
1428static int nfs4_get_referral(struct inode *dir, struct qstr *name, struct nfs_fattr *fattr, struct nfs_fh *fhandle)
1429{
1430 int status = -ENOMEM;
1431 struct page *page = NULL;
1432 struct nfs4_fs_locations *locations = NULL;
6b97fd3d
MN
1433
1434 page = alloc_page(GFP_KERNEL);
1435 if (page == NULL)
1436 goto out;
1437 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
1438 if (locations == NULL)
1439 goto out;
1440
c228fd3a 1441 status = nfs4_proc_fs_locations(dir, name, locations, page);
6b97fd3d
MN
1442 if (status != 0)
1443 goto out;
1444 /* Make sure server returned a different fsid for the referral */
1445 if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
1446 dprintk("%s: server did not return a different fsid for a referral at %s\n", __FUNCTION__, name->name);
1447 status = -EIO;
1448 goto out;
1449 }
1450
1451 memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
1452 fattr->valid |= NFS_ATTR_FATTR_V4_REFERRAL;
1453 if (!fattr->mode)
1454 fattr->mode = S_IFDIR;
1455 memset(fhandle, 0, sizeof(struct nfs_fh));
1456out:
1457 if (page)
1458 __free_page(page);
1459 if (locations)
1460 kfree(locations);
1461 return status;
1462}
1463
1da177e4
LT
1464static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1465{
1466 struct nfs4_getattr_arg args = {
1467 .fh = fhandle,
1468 .bitmask = server->attr_bitmask,
1469 };
1470 struct nfs4_getattr_res res = {
1471 .fattr = fattr,
1472 .server = server,
1473 };
1474 struct rpc_message msg = {
1475 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
1476 .rpc_argp = &args,
1477 .rpc_resp = &res,
1478 };
1479
0e574af1 1480 nfs_fattr_init(fattr);
1da177e4
LT
1481 return rpc_call_sync(server->client, &msg, 0);
1482}
1483
1484static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1485{
1486 struct nfs4_exception exception = { };
1487 int err;
1488 do {
1489 err = nfs4_handle_exception(server,
1490 _nfs4_proc_getattr(server, fhandle, fattr),
1491 &exception);
1492 } while (exception.retry);
1493 return err;
1494}
1495
1496/*
1497 * The file is not closed if it is opened due to the a request to change
1498 * the size of the file. The open call will not be needed once the
1499 * VFS layer lookup-intents are implemented.
1500 *
1501 * Close is called when the inode is destroyed.
1502 * If we haven't opened the file for O_WRONLY, we
1503 * need to in the size_change case to obtain a stateid.
1504 *
1505 * Got race?
1506 * Because OPEN is always done by name in nfsv4, it is
1507 * possible that we opened a different file by the same
1508 * name. We can recognize this race condition, but we
1509 * can't do anything about it besides returning an error.
1510 *
1511 * This will be fixed with VFS changes (lookup-intent).
1512 */
1513static int
1514nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
1515 struct iattr *sattr)
1516{
08e9eac4
TM
1517 struct rpc_cred *cred;
1518 struct inode *inode = dentry->d_inode;
d530838b
TM
1519 struct nfs_open_context *ctx;
1520 struct nfs4_state *state = NULL;
1da177e4
LT
1521 int status;
1522
0e574af1 1523 nfs_fattr_init(fattr);
1da177e4 1524
1f163415 1525 cred = rpcauth_lookupcred(NFS_CLIENT(inode)->cl_auth, 0);
08e9eac4
TM
1526 if (IS_ERR(cred))
1527 return PTR_ERR(cred);
d530838b
TM
1528
1529 /* Search for an existing open(O_WRITE) file */
1530 ctx = nfs_find_open_context(inode, cred, FMODE_WRITE);
1531 if (ctx != NULL)
1532 state = ctx->state;
08e9eac4 1533
3e4f6290 1534 status = nfs4_do_setattr(inode, fattr, sattr, state);
65e4308d
TM
1535 if (status == 0)
1536 nfs_setattr_update_inode(inode, sattr);
d530838b
TM
1537 if (ctx != NULL)
1538 put_nfs_open_context(ctx);
08e9eac4 1539 put_rpccred(cred);
1da177e4
LT
1540 return status;
1541}
1542
2b3de441
DH
1543static int _nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
1544 struct qstr *name, struct nfs_fh *fhandle,
1545 struct nfs_fattr *fattr)
1546{
1547 int status;
1548 struct nfs4_lookup_arg args = {
1549 .bitmask = server->attr_bitmask,
1550 .dir_fh = dirfh,
1551 .name = name,
1552 };
1553 struct nfs4_lookup_res res = {
1554 .server = server,
1555 .fattr = fattr,
1556 .fh = fhandle,
1557 };
1558 struct rpc_message msg = {
1559 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
1560 .rpc_argp = &args,
1561 .rpc_resp = &res,
1562 };
1563
1564 nfs_fattr_init(fattr);
1565
1566 dprintk("NFS call lookupfh %s\n", name->name);
1567 status = rpc_call_sync(server->client, &msg, 0);
1568 dprintk("NFS reply lookupfh: %d\n", status);
1569 if (status == -NFS4ERR_MOVED)
1570 status = -EREMOTE;
1571 return status;
1572}
1573
1574static int nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
1575 struct qstr *name, struct nfs_fh *fhandle,
1576 struct nfs_fattr *fattr)
1577{
1578 struct nfs4_exception exception = { };
1579 int err;
1580 do {
1581 err = nfs4_handle_exception(server,
1582 _nfs4_proc_lookupfh(server, dirfh, name,
1583 fhandle, fattr),
1584 &exception);
1585 } while (exception.retry);
1586 return err;
1587}
1588
1da177e4
LT
1589static int _nfs4_proc_lookup(struct inode *dir, struct qstr *name,
1590 struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1591{
1592 int status;
1593 struct nfs_server *server = NFS_SERVER(dir);
1594 struct nfs4_lookup_arg args = {
1595 .bitmask = server->attr_bitmask,
1596 .dir_fh = NFS_FH(dir),
1597 .name = name,
1598 };
1599 struct nfs4_lookup_res res = {
1600 .server = server,
1601 .fattr = fattr,
1602 .fh = fhandle,
1603 };
1604 struct rpc_message msg = {
1605 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
1606 .rpc_argp = &args,
1607 .rpc_resp = &res,
1608 };
1609
0e574af1 1610 nfs_fattr_init(fattr);
1da177e4
LT
1611
1612 dprintk("NFS call lookup %s\n", name->name);
1613 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
6b97fd3d
MN
1614 if (status == -NFS4ERR_MOVED)
1615 status = nfs4_get_referral(dir, name, fattr, fhandle);
1da177e4
LT
1616 dprintk("NFS reply lookup: %d\n", status);
1617 return status;
1618}
1619
1620static int nfs4_proc_lookup(struct inode *dir, struct qstr *name, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
1621{
1622 struct nfs4_exception exception = { };
1623 int err;
1624 do {
1625 err = nfs4_handle_exception(NFS_SERVER(dir),
1626 _nfs4_proc_lookup(dir, name, fhandle, fattr),
1627 &exception);
1628 } while (exception.retry);
1629 return err;
1630}
1631
1632static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
1633{
1634 struct nfs4_accessargs args = {
1635 .fh = NFS_FH(inode),
1636 };
1637 struct nfs4_accessres res = { 0 };
1638 struct rpc_message msg = {
1639 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
1640 .rpc_argp = &args,
1641 .rpc_resp = &res,
1642 .rpc_cred = entry->cred,
1643 };
1644 int mode = entry->mask;
1645 int status;
1646
1647 /*
1648 * Determine which access bits we want to ask for...
1649 */
1650 if (mode & MAY_READ)
1651 args.access |= NFS4_ACCESS_READ;
1652 if (S_ISDIR(inode->i_mode)) {
1653 if (mode & MAY_WRITE)
1654 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
1655 if (mode & MAY_EXEC)
1656 args.access |= NFS4_ACCESS_LOOKUP;
1657 } else {
1658 if (mode & MAY_WRITE)
1659 args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
1660 if (mode & MAY_EXEC)
1661 args.access |= NFS4_ACCESS_EXECUTE;
1662 }
1663 status = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
1664 if (!status) {
1665 entry->mask = 0;
1666 if (res.access & NFS4_ACCESS_READ)
1667 entry->mask |= MAY_READ;
1668 if (res.access & (NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE))
1669 entry->mask |= MAY_WRITE;
1670 if (res.access & (NFS4_ACCESS_LOOKUP|NFS4_ACCESS_EXECUTE))
1671 entry->mask |= MAY_EXEC;
1672 }
1673 return status;
1674}
1675
1676static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
1677{
1678 struct nfs4_exception exception = { };
1679 int err;
1680 do {
1681 err = nfs4_handle_exception(NFS_SERVER(inode),
1682 _nfs4_proc_access(inode, entry),
1683 &exception);
1684 } while (exception.retry);
1685 return err;
1686}
1687
1688/*
1689 * TODO: For the time being, we don't try to get any attributes
1690 * along with any of the zero-copy operations READ, READDIR,
1691 * READLINK, WRITE.
1692 *
1693 * In the case of the first three, we want to put the GETATTR
1694 * after the read-type operation -- this is because it is hard
1695 * to predict the length of a GETATTR response in v4, and thus
1696 * align the READ data correctly. This means that the GETATTR
1697 * may end up partially falling into the page cache, and we should
1698 * shift it into the 'tail' of the xdr_buf before processing.
1699 * To do this efficiently, we need to know the total length
1700 * of data received, which doesn't seem to be available outside
1701 * of the RPC layer.
1702 *
1703 * In the case of WRITE, we also want to put the GETATTR after
1704 * the operation -- in this case because we want to make sure
1705 * we get the post-operation mtime and size. This means that
1706 * we can't use xdr_encode_pages() as written: we need a variant
1707 * of it which would leave room in the 'tail' iovec.
1708 *
1709 * Both of these changes to the XDR layer would in fact be quite
1710 * minor, but I decided to leave them for a subsequent patch.
1711 */
1712static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
1713 unsigned int pgbase, unsigned int pglen)
1714{
1715 struct nfs4_readlink args = {
1716 .fh = NFS_FH(inode),
1717 .pgbase = pgbase,
1718 .pglen = pglen,
1719 .pages = &page,
1720 };
1721 struct rpc_message msg = {
1722 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
1723 .rpc_argp = &args,
1724 .rpc_resp = NULL,
1725 };
1726
1727 return rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
1728}
1729
1730static int nfs4_proc_readlink(struct inode *inode, struct page *page,
1731 unsigned int pgbase, unsigned int pglen)
1732{
1733 struct nfs4_exception exception = { };
1734 int err;
1735 do {
1736 err = nfs4_handle_exception(NFS_SERVER(inode),
1737 _nfs4_proc_readlink(inode, page, pgbase, pglen),
1738 &exception);
1739 } while (exception.retry);
1740 return err;
1741}
1742
1da177e4
LT
1743/*
1744 * Got race?
1745 * We will need to arrange for the VFS layer to provide an atomic open.
1746 * Until then, this create/open method is prone to inefficiency and race
1747 * conditions due to the lookup, create, and open VFS calls from sys_open()
1748 * placed on the wire.
1749 *
1750 * Given the above sorry state of affairs, I'm simply sending an OPEN.
1751 * The file will be opened again in the subsequent VFS open call
1752 * (nfs4_proc_file_open).
1753 *
1754 * The open for read will just hang around to be used by any process that
1755 * opens the file O_RDONLY. This will all be resolved with the VFS changes.
1756 */
1757
1758static int
1759nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
02a913a7 1760 int flags, struct nameidata *nd)
1da177e4 1761{
ad389da7
TM
1762 struct path path = {
1763 .mnt = nd->mnt,
1764 .dentry = dentry,
1765 };
1da177e4
LT
1766 struct nfs4_state *state;
1767 struct rpc_cred *cred;
1768 int status = 0;
1769
1f163415 1770 cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
1da177e4
LT
1771 if (IS_ERR(cred)) {
1772 status = PTR_ERR(cred);
1773 goto out;
1774 }
ad389da7 1775 state = nfs4_do_open(dir, &path, flags, sattr, cred);
1da177e4
LT
1776 put_rpccred(cred);
1777 if (IS_ERR(state)) {
1778 status = PTR_ERR(state);
1779 goto out;
1780 }
24ac23ab 1781 d_instantiate(dentry, igrab(state->inode));
1da177e4
LT
1782 if (flags & O_EXCL) {
1783 struct nfs_fattr fattr;
3e4f6290 1784 status = nfs4_do_setattr(state->inode, &fattr, sattr, state);
02a913a7 1785 if (status == 0)
65e4308d 1786 nfs_setattr_update_inode(state->inode, sattr);
02a913a7 1787 }
ad389da7 1788 if (status == 0 && (nd->flags & LOOKUP_OPEN) != 0)
4a35bd41 1789 status = nfs4_intent_set_file(nd, &path, state);
02a913a7 1790 else
4a35bd41 1791 nfs4_close_state(&path, state, flags);
1da177e4
LT
1792out:
1793 return status;
1794}
1795
1796static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
1797{
16e42959 1798 struct nfs_server *server = NFS_SERVER(dir);
1da177e4
LT
1799 struct nfs4_remove_arg args = {
1800 .fh = NFS_FH(dir),
1801 .name = name,
16e42959
TM
1802 .bitmask = server->attr_bitmask,
1803 };
1804 struct nfs_fattr dir_attr;
1805 struct nfs4_remove_res res = {
1806 .server = server,
1807 .dir_attr = &dir_attr,
1da177e4 1808 };
1da177e4
LT
1809 struct rpc_message msg = {
1810 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
1811 .rpc_argp = &args,
1812 .rpc_resp = &res,
1813 };
1814 int status;
1815
16e42959
TM
1816 nfs_fattr_init(res.dir_attr);
1817 status = rpc_call_sync(server->client, &msg, 0);
1818 if (status == 0) {
1819 update_changeattr(dir, &res.cinfo);
1820 nfs_post_op_update_inode(dir, res.dir_attr);
1821 }
1da177e4
LT
1822 return status;
1823}
1824
1825static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
1826{
1827 struct nfs4_exception exception = { };
1828 int err;
1829 do {
1830 err = nfs4_handle_exception(NFS_SERVER(dir),
1831 _nfs4_proc_remove(dir, name),
1832 &exception);
1833 } while (exception.retry);
1834 return err;
1835}
1836
1837struct unlink_desc {
1838 struct nfs4_remove_arg args;
16e42959
TM
1839 struct nfs4_remove_res res;
1840 struct nfs_fattr dir_attr;
1da177e4
LT
1841};
1842
1843static int nfs4_proc_unlink_setup(struct rpc_message *msg, struct dentry *dir,
1844 struct qstr *name)
1845{
16e42959 1846 struct nfs_server *server = NFS_SERVER(dir->d_inode);
1da177e4
LT
1847 struct unlink_desc *up;
1848
5cbded58 1849 up = kmalloc(sizeof(*up), GFP_KERNEL);
1da177e4
LT
1850 if (!up)
1851 return -ENOMEM;
1852
1853 up->args.fh = NFS_FH(dir->d_inode);
1854 up->args.name = name;
16e42959
TM
1855 up->args.bitmask = server->attr_bitmask;
1856 up->res.server = server;
1857 up->res.dir_attr = &up->dir_attr;
1da177e4
LT
1858
1859 msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
1860 msg->rpc_argp = &up->args;
1861 msg->rpc_resp = &up->res;
1862 return 0;
1863}
1864
1865static int nfs4_proc_unlink_done(struct dentry *dir, struct rpc_task *task)
1866{
1867 struct rpc_message *msg = &task->tk_msg;
1868 struct unlink_desc *up;
1869
1870 if (msg->rpc_resp != NULL) {
1871 up = container_of(msg->rpc_resp, struct unlink_desc, res);
16e42959
TM
1872 update_changeattr(dir->d_inode, &up->res.cinfo);
1873 nfs_post_op_update_inode(dir->d_inode, up->res.dir_attr);
1da177e4
LT
1874 kfree(up);
1875 msg->rpc_resp = NULL;
1876 msg->rpc_argp = NULL;
1877 }
1878 return 0;
1879}
1880
1881static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
1882 struct inode *new_dir, struct qstr *new_name)
1883{
6caf2c82 1884 struct nfs_server *server = NFS_SERVER(old_dir);
1da177e4
LT
1885 struct nfs4_rename_arg arg = {
1886 .old_dir = NFS_FH(old_dir),
1887 .new_dir = NFS_FH(new_dir),
1888 .old_name = old_name,
1889 .new_name = new_name,
6caf2c82
TM
1890 .bitmask = server->attr_bitmask,
1891 };
1892 struct nfs_fattr old_fattr, new_fattr;
1893 struct nfs4_rename_res res = {
1894 .server = server,
1895 .old_fattr = &old_fattr,
1896 .new_fattr = &new_fattr,
1da177e4 1897 };
1da177e4
LT
1898 struct rpc_message msg = {
1899 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
1900 .rpc_argp = &arg,
1901 .rpc_resp = &res,
1902 };
1903 int status;
1904
6caf2c82
TM
1905 nfs_fattr_init(res.old_fattr);
1906 nfs_fattr_init(res.new_fattr);
1907 status = rpc_call_sync(server->client, &msg, 0);
1da177e4
LT
1908
1909 if (!status) {
1910 update_changeattr(old_dir, &res.old_cinfo);
6caf2c82 1911 nfs_post_op_update_inode(old_dir, res.old_fattr);
1da177e4 1912 update_changeattr(new_dir, &res.new_cinfo);
6caf2c82 1913 nfs_post_op_update_inode(new_dir, res.new_fattr);
1da177e4
LT
1914 }
1915 return status;
1916}
1917
1918static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
1919 struct inode *new_dir, struct qstr *new_name)
1920{
1921 struct nfs4_exception exception = { };
1922 int err;
1923 do {
1924 err = nfs4_handle_exception(NFS_SERVER(old_dir),
1925 _nfs4_proc_rename(old_dir, old_name,
1926 new_dir, new_name),
1927 &exception);
1928 } while (exception.retry);
1929 return err;
1930}
1931
1932static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
1933{
91ba2eee 1934 struct nfs_server *server = NFS_SERVER(inode);
1da177e4
LT
1935 struct nfs4_link_arg arg = {
1936 .fh = NFS_FH(inode),
1937 .dir_fh = NFS_FH(dir),
1938 .name = name,
91ba2eee
TM
1939 .bitmask = server->attr_bitmask,
1940 };
1941 struct nfs_fattr fattr, dir_attr;
1942 struct nfs4_link_res res = {
1943 .server = server,
1944 .fattr = &fattr,
1945 .dir_attr = &dir_attr,
1da177e4 1946 };
1da177e4
LT
1947 struct rpc_message msg = {
1948 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
1949 .rpc_argp = &arg,
91ba2eee 1950 .rpc_resp = &res,
1da177e4
LT
1951 };
1952 int status;
1953
91ba2eee
TM
1954 nfs_fattr_init(res.fattr);
1955 nfs_fattr_init(res.dir_attr);
1956 status = rpc_call_sync(server->client, &msg, 0);
1957 if (!status) {
1958 update_changeattr(dir, &res.cinfo);
1959 nfs_post_op_update_inode(dir, res.dir_attr);
73a3d07c 1960 nfs_post_op_update_inode(inode, res.fattr);
91ba2eee 1961 }
1da177e4
LT
1962
1963 return status;
1964}
1965
1966static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
1967{
1968 struct nfs4_exception exception = { };
1969 int err;
1970 do {
1971 err = nfs4_handle_exception(NFS_SERVER(inode),
1972 _nfs4_proc_link(inode, dir, name),
1973 &exception);
1974 } while (exception.retry);
1975 return err;
1976}
1977
4f390c15 1978static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 1979 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
1980{
1981 struct nfs_server *server = NFS_SERVER(dir);
4f390c15
CL
1982 struct nfs_fh fhandle;
1983 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
1984 struct nfs4_create_arg arg = {
1985 .dir_fh = NFS_FH(dir),
1986 .server = server,
4f390c15 1987 .name = &dentry->d_name,
1da177e4
LT
1988 .attrs = sattr,
1989 .ftype = NF4LNK,
1990 .bitmask = server->attr_bitmask,
1991 };
1992 struct nfs4_create_res res = {
1993 .server = server,
4f390c15
CL
1994 .fh = &fhandle,
1995 .fattr = &fattr,
56ae19f3 1996 .dir_fattr = &dir_fattr,
1da177e4
LT
1997 };
1998 struct rpc_message msg = {
1999 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK],
2000 .rpc_argp = &arg,
2001 .rpc_resp = &res,
2002 };
2003 int status;
2004
94a6d753 2005 if (len > NFS4_MAXPATHLEN)
1da177e4 2006 return -ENAMETOOLONG;
4f390c15 2007
94a6d753
CL
2008 arg.u.symlink.pages = &page;
2009 arg.u.symlink.len = len;
4f390c15 2010 nfs_fattr_init(&fattr);
56ae19f3 2011 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2012
2013 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
4f390c15 2014 if (!status) {
1da177e4 2015 update_changeattr(dir, &res.dir_cinfo);
4f390c15
CL
2016 nfs_post_op_update_inode(dir, res.dir_fattr);
2017 status = nfs_instantiate(dentry, &fhandle, &fattr);
2018 }
1da177e4
LT
2019 return status;
2020}
2021
4f390c15 2022static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
94a6d753 2023 struct page *page, unsigned int len, struct iattr *sattr)
1da177e4
LT
2024{
2025 struct nfs4_exception exception = { };
2026 int err;
2027 do {
2028 err = nfs4_handle_exception(NFS_SERVER(dir),
94a6d753
CL
2029 _nfs4_proc_symlink(dir, dentry, page,
2030 len, sattr),
1da177e4
LT
2031 &exception);
2032 } while (exception.retry);
2033 return err;
2034}
2035
2036static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2037 struct iattr *sattr)
2038{
2039 struct nfs_server *server = NFS_SERVER(dir);
2040 struct nfs_fh fhandle;
56ae19f3 2041 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
2042 struct nfs4_create_arg arg = {
2043 .dir_fh = NFS_FH(dir),
2044 .server = server,
2045 .name = &dentry->d_name,
2046 .attrs = sattr,
2047 .ftype = NF4DIR,
2048 .bitmask = server->attr_bitmask,
2049 };
2050 struct nfs4_create_res res = {
2051 .server = server,
2052 .fh = &fhandle,
2053 .fattr = &fattr,
56ae19f3 2054 .dir_fattr = &dir_fattr,
1da177e4
LT
2055 };
2056 struct rpc_message msg = {
2057 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
2058 .rpc_argp = &arg,
2059 .rpc_resp = &res,
2060 };
2061 int status;
2062
0e574af1 2063 nfs_fattr_init(&fattr);
56ae19f3 2064 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2065
2066 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2067 if (!status) {
2068 update_changeattr(dir, &res.dir_cinfo);
56ae19f3 2069 nfs_post_op_update_inode(dir, res.dir_fattr);
1da177e4
LT
2070 status = nfs_instantiate(dentry, &fhandle, &fattr);
2071 }
2072 return status;
2073}
2074
2075static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
2076 struct iattr *sattr)
2077{
2078 struct nfs4_exception exception = { };
2079 int err;
2080 do {
2081 err = nfs4_handle_exception(NFS_SERVER(dir),
2082 _nfs4_proc_mkdir(dir, dentry, sattr),
2083 &exception);
2084 } while (exception.retry);
2085 return err;
2086}
2087
2088static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
2089 u64 cookie, struct page *page, unsigned int count, int plus)
2090{
2091 struct inode *dir = dentry->d_inode;
2092 struct nfs4_readdir_arg args = {
2093 .fh = NFS_FH(dir),
2094 .pages = &page,
2095 .pgbase = 0,
2096 .count = count,
2097 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
2098 };
2099 struct nfs4_readdir_res res;
2100 struct rpc_message msg = {
2101 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
2102 .rpc_argp = &args,
2103 .rpc_resp = &res,
2104 .rpc_cred = cred,
2105 };
2106 int status;
2107
eadf4598
TM
2108 dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __FUNCTION__,
2109 dentry->d_parent->d_name.name,
2110 dentry->d_name.name,
2111 (unsigned long long)cookie);
1da177e4
LT
2112 nfs4_setup_readdir(cookie, NFS_COOKIEVERF(dir), dentry, &args);
2113 res.pgbase = args.pgbase;
2114 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2115 if (status == 0)
2116 memcpy(NFS_COOKIEVERF(dir), res.verifier.data, NFS4_VERIFIER_SIZE);
eadf4598 2117 dprintk("%s: returns %d\n", __FUNCTION__, status);
1da177e4
LT
2118 return status;
2119}
2120
2121static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
2122 u64 cookie, struct page *page, unsigned int count, int plus)
2123{
2124 struct nfs4_exception exception = { };
2125 int err;
2126 do {
2127 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode),
2128 _nfs4_proc_readdir(dentry, cred, cookie,
2129 page, count, plus),
2130 &exception);
2131 } while (exception.retry);
2132 return err;
2133}
2134
2135static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
2136 struct iattr *sattr, dev_t rdev)
2137{
2138 struct nfs_server *server = NFS_SERVER(dir);
2139 struct nfs_fh fh;
56ae19f3 2140 struct nfs_fattr fattr, dir_fattr;
1da177e4
LT
2141 struct nfs4_create_arg arg = {
2142 .dir_fh = NFS_FH(dir),
2143 .server = server,
2144 .name = &dentry->d_name,
2145 .attrs = sattr,
2146 .bitmask = server->attr_bitmask,
2147 };
2148 struct nfs4_create_res res = {
2149 .server = server,
2150 .fh = &fh,
2151 .fattr = &fattr,
56ae19f3 2152 .dir_fattr = &dir_fattr,
1da177e4
LT
2153 };
2154 struct rpc_message msg = {
2155 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
2156 .rpc_argp = &arg,
2157 .rpc_resp = &res,
2158 };
2159 int status;
2160 int mode = sattr->ia_mode;
2161
0e574af1 2162 nfs_fattr_init(&fattr);
56ae19f3 2163 nfs_fattr_init(&dir_fattr);
1da177e4
LT
2164
2165 BUG_ON(!(sattr->ia_valid & ATTR_MODE));
2166 BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
2167 if (S_ISFIFO(mode))
2168 arg.ftype = NF4FIFO;
2169 else if (S_ISBLK(mode)) {
2170 arg.ftype = NF4BLK;
2171 arg.u.device.specdata1 = MAJOR(rdev);
2172 arg.u.device.specdata2 = MINOR(rdev);
2173 }
2174 else if (S_ISCHR(mode)) {
2175 arg.ftype = NF4CHR;
2176 arg.u.device.specdata1 = MAJOR(rdev);
2177 arg.u.device.specdata2 = MINOR(rdev);
2178 }
2179 else
2180 arg.ftype = NF4SOCK;
2181
2182 status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
2183 if (status == 0) {
2184 update_changeattr(dir, &res.dir_cinfo);
56ae19f3 2185 nfs_post_op_update_inode(dir, res.dir_fattr);
1da177e4
LT
2186 status = nfs_instantiate(dentry, &fh, &fattr);
2187 }
2188 return status;
2189}
2190
2191static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
2192 struct iattr *sattr, dev_t rdev)
2193{
2194 struct nfs4_exception exception = { };
2195 int err;
2196 do {
2197 err = nfs4_handle_exception(NFS_SERVER(dir),
2198 _nfs4_proc_mknod(dir, dentry, sattr, rdev),
2199 &exception);
2200 } while (exception.retry);
2201 return err;
2202}
2203
2204static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
2205 struct nfs_fsstat *fsstat)
2206{
2207 struct nfs4_statfs_arg args = {
2208 .fh = fhandle,
2209 .bitmask = server->attr_bitmask,
2210 };
2211 struct rpc_message msg = {
2212 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
2213 .rpc_argp = &args,
2214 .rpc_resp = fsstat,
2215 };
2216
0e574af1 2217 nfs_fattr_init(fsstat->fattr);
1da177e4
LT
2218 return rpc_call_sync(server->client, &msg, 0);
2219}
2220
2221static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
2222{
2223 struct nfs4_exception exception = { };
2224 int err;
2225 do {
2226 err = nfs4_handle_exception(server,
2227 _nfs4_proc_statfs(server, fhandle, fsstat),
2228 &exception);
2229 } while (exception.retry);
2230 return err;
2231}
2232
2233static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
2234 struct nfs_fsinfo *fsinfo)
2235{
2236 struct nfs4_fsinfo_arg args = {
2237 .fh = fhandle,
2238 .bitmask = server->attr_bitmask,
2239 };
2240 struct rpc_message msg = {
2241 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
2242 .rpc_argp = &args,
2243 .rpc_resp = fsinfo,
2244 };
2245
2246 return rpc_call_sync(server->client, &msg, 0);
2247}
2248
2249static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
2250{
2251 struct nfs4_exception exception = { };
2252 int err;
2253
2254 do {
2255 err = nfs4_handle_exception(server,
2256 _nfs4_do_fsinfo(server, fhandle, fsinfo),
2257 &exception);
2258 } while (exception.retry);
2259 return err;
2260}
2261
2262static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
2263{
0e574af1 2264 nfs_fattr_init(fsinfo->fattr);
1da177e4
LT
2265 return nfs4_do_fsinfo(server, fhandle, fsinfo);
2266}
2267
2268static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
2269 struct nfs_pathconf *pathconf)
2270{
2271 struct nfs4_pathconf_arg args = {
2272 .fh = fhandle,
2273 .bitmask = server->attr_bitmask,
2274 };
2275 struct rpc_message msg = {
2276 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
2277 .rpc_argp = &args,
2278 .rpc_resp = pathconf,
2279 };
2280
2281 /* None of the pathconf attributes are mandatory to implement */
2282 if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
2283 memset(pathconf, 0, sizeof(*pathconf));
2284 return 0;
2285 }
2286
0e574af1 2287 nfs_fattr_init(pathconf->fattr);
1da177e4
LT
2288 return rpc_call_sync(server->client, &msg, 0);
2289}
2290
2291static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
2292 struct nfs_pathconf *pathconf)
2293{
2294 struct nfs4_exception exception = { };
2295 int err;
2296
2297 do {
2298 err = nfs4_handle_exception(server,
2299 _nfs4_proc_pathconf(server, fhandle, pathconf),
2300 &exception);
2301 } while (exception.retry);
2302 return err;
2303}
2304
ec06c096 2305static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
1da177e4 2306{
ec06c096 2307 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 2308
ec06c096 2309 if (nfs4_async_handle_error(task, server) == -EAGAIN) {
1da177e4 2310 rpc_restart_call(task);
ec06c096 2311 return -EAGAIN;
1da177e4
LT
2312 }
2313 if (task->tk_status > 0)
ec06c096
TM
2314 renew_lease(server, data->timestamp);
2315 return 0;
1da177e4
LT
2316}
2317
ec06c096 2318static void nfs4_proc_read_setup(struct nfs_read_data *data)
1da177e4 2319{
1da177e4
LT
2320 struct rpc_message msg = {
2321 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ],
2322 .rpc_argp = &data->args,
2323 .rpc_resp = &data->res,
2324 .rpc_cred = data->cred,
2325 };
1da177e4
LT
2326
2327 data->timestamp = jiffies;
2328
ec06c096 2329 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2330}
2331
788e7a89 2332static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 2333{
1da177e4
LT
2334 struct inode *inode = data->inode;
2335
2336 if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
2337 rpc_restart_call(task);
788e7a89 2338 return -EAGAIN;
1da177e4 2339 }
4f9838c7 2340 if (task->tk_status >= 0) {
1da177e4 2341 renew_lease(NFS_SERVER(inode), data->timestamp);
4f9838c7
TM
2342 nfs_post_op_update_inode(inode, data->res.fattr);
2343 }
788e7a89 2344 return 0;
1da177e4
LT
2345}
2346
788e7a89 2347static void nfs4_proc_write_setup(struct nfs_write_data *data, int how)
1da177e4 2348{
1da177e4
LT
2349 struct rpc_message msg = {
2350 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE],
2351 .rpc_argp = &data->args,
2352 .rpc_resp = &data->res,
2353 .rpc_cred = data->cred,
2354 };
2355 struct inode *inode = data->inode;
4f9838c7 2356 struct nfs_server *server = NFS_SERVER(inode);
1da177e4 2357 int stable;
1da177e4
LT
2358
2359 if (how & FLUSH_STABLE) {
2360 if (!NFS_I(inode)->ncommit)
2361 stable = NFS_FILE_SYNC;
2362 else
2363 stable = NFS_DATA_SYNC;
2364 } else
2365 stable = NFS_UNSTABLE;
2366 data->args.stable = stable;
4f9838c7
TM
2367 data->args.bitmask = server->attr_bitmask;
2368 data->res.server = server;
1da177e4
LT
2369
2370 data->timestamp = jiffies;
2371
1da177e4 2372 /* Finalize the task. */
788e7a89 2373 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2374}
2375
788e7a89 2376static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data)
1da177e4 2377{
1da177e4
LT
2378 struct inode *inode = data->inode;
2379
2380 if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
2381 rpc_restart_call(task);
788e7a89 2382 return -EAGAIN;
1da177e4 2383 }
4f9838c7
TM
2384 if (task->tk_status >= 0)
2385 nfs_post_op_update_inode(inode, data->res.fattr);
788e7a89 2386 return 0;
1da177e4
LT
2387}
2388
788e7a89 2389static void nfs4_proc_commit_setup(struct nfs_write_data *data, int how)
1da177e4 2390{
1da177e4
LT
2391 struct rpc_message msg = {
2392 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT],
2393 .rpc_argp = &data->args,
2394 .rpc_resp = &data->res,
2395 .rpc_cred = data->cred,
2396 };
788e7a89 2397 struct nfs_server *server = NFS_SERVER(data->inode);
1da177e4 2398
4f9838c7
TM
2399 data->args.bitmask = server->attr_bitmask;
2400 data->res.server = server;
2401
788e7a89 2402 rpc_call_setup(&data->task, &msg, 0);
1da177e4
LT
2403}
2404
2405/*
2406 * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
2407 * standalone procedure for queueing an asynchronous RENEW.
2408 */
963d8fe5 2409static void nfs4_renew_done(struct rpc_task *task, void *data)
1da177e4 2410{
adfa6f98 2411 struct nfs_client *clp = (struct nfs_client *)task->tk_msg.rpc_argp;
963d8fe5 2412 unsigned long timestamp = (unsigned long)data;
1da177e4
LT
2413
2414 if (task->tk_status < 0) {
2415 switch (task->tk_status) {
2416 case -NFS4ERR_STALE_CLIENTID:
2417 case -NFS4ERR_EXPIRED:
2418 case -NFS4ERR_CB_PATH_DOWN:
2419 nfs4_schedule_state_recovery(clp);
2420 }
2421 return;
2422 }
2423 spin_lock(&clp->cl_lock);
2424 if (time_before(clp->cl_last_renewal,timestamp))
2425 clp->cl_last_renewal = timestamp;
2426 spin_unlock(&clp->cl_lock);
2427}
2428
963d8fe5
TM
2429static const struct rpc_call_ops nfs4_renew_ops = {
2430 .rpc_call_done = nfs4_renew_done,
2431};
2432
adfa6f98 2433int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2434{
2435 struct rpc_message msg = {
2436 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
2437 .rpc_argp = clp,
b4454fe1 2438 .rpc_cred = cred,
1da177e4
LT
2439 };
2440
2441 return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_SOFT,
963d8fe5 2442 &nfs4_renew_ops, (void *)jiffies);
1da177e4
LT
2443}
2444
adfa6f98 2445int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2446{
2447 struct rpc_message msg = {
2448 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
2449 .rpc_argp = clp,
b4454fe1 2450 .rpc_cred = cred,
1da177e4
LT
2451 };
2452 unsigned long now = jiffies;
2453 int status;
2454
2455 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2456 if (status < 0)
2457 return status;
2458 spin_lock(&clp->cl_lock);
2459 if (time_before(clp->cl_last_renewal,now))
2460 clp->cl_last_renewal = now;
2461 spin_unlock(&clp->cl_lock);
2462 return 0;
2463}
2464
aa1870af
BF
2465static inline int nfs4_server_supports_acls(struct nfs_server *server)
2466{
2467 return (server->caps & NFS_CAP_ACLS)
2468 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
2469 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
2470}
2471
2472/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_CACHE_SIZE, and that
2473 * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_CACHE_SIZE) bytes on
2474 * the stack.
2475 */
2476#define NFS4ACL_MAXPAGES (XATTR_SIZE_MAX >> PAGE_CACHE_SHIFT)
2477
2478static void buf_to_pages(const void *buf, size_t buflen,
2479 struct page **pages, unsigned int *pgbase)
2480{
2481 const void *p = buf;
2482
2483 *pgbase = offset_in_page(buf);
2484 p -= *pgbase;
2485 while (p < buf + buflen) {
2486 *(pages++) = virt_to_page(p);
2487 p += PAGE_CACHE_SIZE;
2488 }
2489}
2490
e50a1c2e
BF
2491struct nfs4_cached_acl {
2492 int cached;
2493 size_t len;
3e9d4154 2494 char data[0];
e50a1c2e
BF
2495};
2496
2497static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
2498{
2499 struct nfs_inode *nfsi = NFS_I(inode);
2500
2501 spin_lock(&inode->i_lock);
2502 kfree(nfsi->nfs4_acl);
2503 nfsi->nfs4_acl = acl;
2504 spin_unlock(&inode->i_lock);
2505}
2506
2507static void nfs4_zap_acl_attr(struct inode *inode)
2508{
2509 nfs4_set_cached_acl(inode, NULL);
2510}
2511
2512static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
2513{
2514 struct nfs_inode *nfsi = NFS_I(inode);
2515 struct nfs4_cached_acl *acl;
2516 int ret = -ENOENT;
2517
2518 spin_lock(&inode->i_lock);
2519 acl = nfsi->nfs4_acl;
2520 if (acl == NULL)
2521 goto out;
2522 if (buf == NULL) /* user is just asking for length */
2523 goto out_len;
2524 if (acl->cached == 0)
2525 goto out;
2526 ret = -ERANGE; /* see getxattr(2) man page */
2527 if (acl->len > buflen)
2528 goto out;
2529 memcpy(buf, acl->data, acl->len);
2530out_len:
2531 ret = acl->len;
2532out:
2533 spin_unlock(&inode->i_lock);
2534 return ret;
2535}
2536
2537static void nfs4_write_cached_acl(struct inode *inode, const char *buf, size_t acl_len)
2538{
2539 struct nfs4_cached_acl *acl;
2540
2541 if (buf && acl_len <= PAGE_SIZE) {
2542 acl = kmalloc(sizeof(*acl) + acl_len, GFP_KERNEL);
2543 if (acl == NULL)
2544 goto out;
2545 acl->cached = 1;
2546 memcpy(acl->data, buf, acl_len);
2547 } else {
2548 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
2549 if (acl == NULL)
2550 goto out;
2551 acl->cached = 0;
2552 }
2553 acl->len = acl_len;
2554out:
2555 nfs4_set_cached_acl(inode, acl);
2556}
2557
16b4289c 2558static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
aa1870af 2559{
aa1870af
BF
2560 struct page *pages[NFS4ACL_MAXPAGES];
2561 struct nfs_getaclargs args = {
2562 .fh = NFS_FH(inode),
2563 .acl_pages = pages,
2564 .acl_len = buflen,
2565 };
2566 size_t resp_len = buflen;
e50a1c2e 2567 void *resp_buf;
aa1870af
BF
2568 struct rpc_message msg = {
2569 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
2570 .rpc_argp = &args,
2571 .rpc_resp = &resp_len,
2572 };
e50a1c2e 2573 struct page *localpage = NULL;
aa1870af
BF
2574 int ret;
2575
e50a1c2e
BF
2576 if (buflen < PAGE_SIZE) {
2577 /* As long as we're doing a round trip to the server anyway,
2578 * let's be prepared for a page of acl data. */
2579 localpage = alloc_page(GFP_KERNEL);
2580 resp_buf = page_address(localpage);
2581 if (localpage == NULL)
2582 return -ENOMEM;
2583 args.acl_pages[0] = localpage;
2584 args.acl_pgbase = 0;
1d95db8e 2585 resp_len = args.acl_len = PAGE_SIZE;
e50a1c2e
BF
2586 } else {
2587 resp_buf = buf;
2588 buf_to_pages(buf, buflen, args.acl_pages, &args.acl_pgbase);
2589 }
aa1870af 2590 ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
e50a1c2e
BF
2591 if (ret)
2592 goto out_free;
2593 if (resp_len > args.acl_len)
2594 nfs4_write_cached_acl(inode, NULL, resp_len);
2595 else
2596 nfs4_write_cached_acl(inode, resp_buf, resp_len);
2597 if (buf) {
2598 ret = -ERANGE;
2599 if (resp_len > buflen)
2600 goto out_free;
2601 if (localpage)
2602 memcpy(buf, resp_buf, resp_len);
2603 }
2604 ret = resp_len;
2605out_free:
2606 if (localpage)
2607 __free_page(localpage);
aa1870af
BF
2608 return ret;
2609}
2610
16b4289c
TM
2611static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
2612{
2613 struct nfs4_exception exception = { };
2614 ssize_t ret;
2615 do {
2616 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
2617 if (ret >= 0)
2618 break;
2619 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
2620 } while (exception.retry);
2621 return ret;
2622}
2623
e50a1c2e
BF
2624static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
2625{
2626 struct nfs_server *server = NFS_SERVER(inode);
2627 int ret;
2628
2629 if (!nfs4_server_supports_acls(server))
2630 return -EOPNOTSUPP;
2631 ret = nfs_revalidate_inode(server, inode);
2632 if (ret < 0)
2633 return ret;
2634 ret = nfs4_read_cached_acl(inode, buf, buflen);
2635 if (ret != -ENOENT)
2636 return ret;
2637 return nfs4_get_acl_uncached(inode, buf, buflen);
2638}
2639
16b4289c 2640static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4b580ee3
BF
2641{
2642 struct nfs_server *server = NFS_SERVER(inode);
2643 struct page *pages[NFS4ACL_MAXPAGES];
2644 struct nfs_setaclargs arg = {
2645 .fh = NFS_FH(inode),
2646 .acl_pages = pages,
2647 .acl_len = buflen,
2648 };
2649 struct rpc_message msg = {
2650 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
2651 .rpc_argp = &arg,
2652 .rpc_resp = NULL,
2653 };
2654 int ret;
2655
2656 if (!nfs4_server_supports_acls(server))
2657 return -EOPNOTSUPP;
642ac549 2658 nfs_inode_return_delegation(inode);
4b580ee3 2659 buf_to_pages(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
1f163415 2660 ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
08efa202 2661 nfs_zap_caches(inode);
4b580ee3
BF
2662 return ret;
2663}
2664
16b4289c
TM
2665static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
2666{
2667 struct nfs4_exception exception = { };
2668 int err;
2669 do {
2670 err = nfs4_handle_exception(NFS_SERVER(inode),
2671 __nfs4_proc_set_acl(inode, buf, buflen),
2672 &exception);
2673 } while (exception.retry);
2674 return err;
2675}
2676
1da177e4 2677static int
faf5f49c 2678nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server)
1da177e4 2679{
7539bbab 2680 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
2681
2682 if (!clp || task->tk_status >= 0)
2683 return 0;
2684 switch(task->tk_status) {
2685 case -NFS4ERR_STALE_CLIENTID:
2686 case -NFS4ERR_STALE_STATEID:
2687 case -NFS4ERR_EXPIRED:
2688 rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL, NULL);
2689 nfs4_schedule_state_recovery(clp);
433fbe4c 2690 if (test_bit(NFS4CLNT_STATE_RECOVER, &clp->cl_state) == 0)
1da177e4
LT
2691 rpc_wake_up_task(task);
2692 task->tk_status = 0;
2693 return -EAGAIN;
1da177e4 2694 case -NFS4ERR_DELAY:
006ea73e
CL
2695 nfs_inc_server_stats((struct nfs_server *) server,
2696 NFSIOS_DELAY);
2697 case -NFS4ERR_GRACE:
1da177e4
LT
2698 rpc_delay(task, NFS4_POLL_RETRY_MAX);
2699 task->tk_status = 0;
2700 return -EAGAIN;
2701 case -NFS4ERR_OLD_STATEID:
2702 task->tk_status = 0;
2703 return -EAGAIN;
2704 }
2705 task->tk_status = nfs4_map_errors(task->tk_status);
2706 return 0;
2707}
2708
433fbe4c
TM
2709static int nfs4_wait_bit_interruptible(void *word)
2710{
2711 if (signal_pending(current))
2712 return -ERESTARTSYS;
2713 schedule();
2714 return 0;
2715}
2716
adfa6f98 2717static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp)
1da177e4 2718{
1da177e4 2719 sigset_t oldset;
433fbe4c 2720 int res;
1da177e4
LT
2721
2722 might_sleep();
2723
e148582e
TM
2724 rwsem_acquire(&clp->cl_sem.dep_map, 0, 0, _RET_IP_);
2725
1da177e4 2726 rpc_clnt_sigmask(clnt, &oldset);
433fbe4c
TM
2727 res = wait_on_bit(&clp->cl_state, NFS4CLNT_STATE_RECOVER,
2728 nfs4_wait_bit_interruptible,
2729 TASK_INTERRUPTIBLE);
1da177e4 2730 rpc_clnt_sigunmask(clnt, &oldset);
e148582e
TM
2731
2732 rwsem_release(&clp->cl_sem.dep_map, 1, _RET_IP_);
1da177e4
LT
2733 return res;
2734}
2735
2736static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
2737{
2738 sigset_t oldset;
2739 int res = 0;
2740
2741 might_sleep();
2742
2743 if (*timeout <= 0)
2744 *timeout = NFS4_POLL_RETRY_MIN;
2745 if (*timeout > NFS4_POLL_RETRY_MAX)
2746 *timeout = NFS4_POLL_RETRY_MAX;
2747 rpc_clnt_sigmask(clnt, &oldset);
2748 if (clnt->cl_intr) {
041e0e3b 2749 schedule_timeout_interruptible(*timeout);
1da177e4
LT
2750 if (signalled())
2751 res = -ERESTARTSYS;
041e0e3b
NA
2752 } else
2753 schedule_timeout_uninterruptible(*timeout);
1da177e4
LT
2754 rpc_clnt_sigunmask(clnt, &oldset);
2755 *timeout <<= 1;
2756 return res;
2757}
2758
2759/* This is the error handling routine for processes that are allowed
2760 * to sleep.
2761 */
10afec90 2762static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
1da177e4 2763{
7539bbab 2764 struct nfs_client *clp = server->nfs_client;
1da177e4
LT
2765 int ret = errorcode;
2766
2767 exception->retry = 0;
2768 switch(errorcode) {
2769 case 0:
2770 return 0;
2771 case -NFS4ERR_STALE_CLIENTID:
2772 case -NFS4ERR_STALE_STATEID:
2773 case -NFS4ERR_EXPIRED:
433fbe4c 2774 nfs4_schedule_state_recovery(clp);
1da177e4
LT
2775 ret = nfs4_wait_clnt_recover(server->client, clp);
2776 if (ret == 0)
2777 exception->retry = 1;
2778 break;
c514983d 2779 case -NFS4ERR_FILE_OPEN:
1da177e4
LT
2780 case -NFS4ERR_GRACE:
2781 case -NFS4ERR_DELAY:
2782 ret = nfs4_delay(server->client, &exception->timeout);
2c56617d
TM
2783 if (ret != 0)
2784 break;
1da177e4 2785 case -NFS4ERR_OLD_STATEID:
2c56617d 2786 exception->retry = 1;
1da177e4
LT
2787 }
2788 /* We failed to handle the error */
2789 return nfs4_map_errors(ret);
2790}
2791
adfa6f98 2792int nfs4_proc_setclientid(struct nfs_client *clp, u32 program, unsigned short port, struct rpc_cred *cred)
1da177e4
LT
2793{
2794 nfs4_verifier sc_verifier;
2795 struct nfs4_setclientid setclientid = {
2796 .sc_verifier = &sc_verifier,
2797 .sc_prog = program,
2798 };
2799 struct rpc_message msg = {
2800 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
2801 .rpc_argp = &setclientid,
2802 .rpc_resp = clp,
286d7d6a 2803 .rpc_cred = cred,
1da177e4 2804 };
bc4785cd 2805 __be32 *p;
1da177e4
LT
2806 int loop = 0;
2807 int status;
2808
bc4785cd 2809 p = (__be32*)sc_verifier.data;
1da177e4
LT
2810 *p++ = htonl((u32)clp->cl_boot_time.tv_sec);
2811 *p = htonl((u32)clp->cl_boot_time.tv_nsec);
2812
2813 for(;;) {
2814 setclientid.sc_name_len = scnprintf(setclientid.sc_name,
2815 sizeof(setclientid.sc_name), "%s/%u.%u.%u.%u %s %u",
24c8dbbb 2816 clp->cl_ipaddr, NIPQUAD(clp->cl_addr.sin_addr),
286d7d6a 2817 cred->cr_ops->cr_name,
1da177e4
LT
2818 clp->cl_id_uniquifier);
2819 setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
2820 sizeof(setclientid.sc_netid), "tcp");
2821 setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
2822 sizeof(setclientid.sc_uaddr), "%s.%d.%d",
2823 clp->cl_ipaddr, port >> 8, port & 255);
2824
2825 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2826 if (status != -NFS4ERR_CLID_INUSE)
2827 break;
2828 if (signalled())
2829 break;
2830 if (loop++ & 1)
2831 ssleep(clp->cl_lease_time + 1);
2832 else
2833 if (++clp->cl_id_uniquifier == 0)
2834 break;
2835 }
2836 return status;
2837}
2838
adfa6f98 2839static int _nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
1da177e4
LT
2840{
2841 struct nfs_fsinfo fsinfo;
2842 struct rpc_message msg = {
2843 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
2844 .rpc_argp = clp,
2845 .rpc_resp = &fsinfo,
286d7d6a 2846 .rpc_cred = cred,
1da177e4
LT
2847 };
2848 unsigned long now;
2849 int status;
2850
2851 now = jiffies;
2852 status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
2853 if (status == 0) {
2854 spin_lock(&clp->cl_lock);
2855 clp->cl_lease_time = fsinfo.lease_time * HZ;
2856 clp->cl_last_renewal = now;
58d9714a 2857 clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
1da177e4
LT
2858 spin_unlock(&clp->cl_lock);
2859 }
2860 return status;
2861}
2862
adfa6f98 2863int nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
51581f3b
TM
2864{
2865 long timeout;
2866 int err;
2867 do {
2868 err = _nfs4_proc_setclientid_confirm(clp, cred);
2869 switch (err) {
2870 case 0:
2871 return err;
2872 case -NFS4ERR_RESOURCE:
2873 /* The IBM lawyers misread another document! */
2874 case -NFS4ERR_DELAY:
2875 err = nfs4_delay(clp->cl_rpcclient, &timeout);
2876 }
2877 } while (err == 0);
2878 return err;
2879}
2880
fe650407
TM
2881struct nfs4_delegreturndata {
2882 struct nfs4_delegreturnargs args;
fa178f29 2883 struct nfs4_delegreturnres res;
fe650407
TM
2884 struct nfs_fh fh;
2885 nfs4_stateid stateid;
2886 struct rpc_cred *cred;
26e976a8 2887 unsigned long timestamp;
fa178f29 2888 struct nfs_fattr fattr;
fe650407
TM
2889 int rpc_status;
2890};
2891
2892static void nfs4_delegreturn_prepare(struct rpc_task *task, void *calldata)
1da177e4 2893{
fe650407 2894 struct nfs4_delegreturndata *data = calldata;
1da177e4
LT
2895 struct rpc_message msg = {
2896 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
fe650407 2897 .rpc_argp = &data->args,
fa178f29 2898 .rpc_resp = &data->res,
fe650407 2899 .rpc_cred = data->cred,
1da177e4 2900 };
fa178f29 2901 nfs_fattr_init(data->res.fattr);
fe650407
TM
2902 rpc_call_setup(task, &msg, 0);
2903}
1da177e4 2904
fe650407
TM
2905static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
2906{
2907 struct nfs4_delegreturndata *data = calldata;
2908 data->rpc_status = task->tk_status;
26e976a8 2909 if (data->rpc_status == 0)
fa178f29 2910 renew_lease(data->res.server, data->timestamp);
fe650407
TM
2911}
2912
2913static void nfs4_delegreturn_release(void *calldata)
2914{
2915 struct nfs4_delegreturndata *data = calldata;
2916
2917 put_rpccred(data->cred);
2918 kfree(calldata);
2919}
2920
c8d149f3 2921static const struct rpc_call_ops nfs4_delegreturn_ops = {
fe650407
TM
2922 .rpc_call_prepare = nfs4_delegreturn_prepare,
2923 .rpc_call_done = nfs4_delegreturn_done,
2924 .rpc_release = nfs4_delegreturn_release,
2925};
2926
2927static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
2928{
2929 struct nfs4_delegreturndata *data;
fa178f29 2930 struct nfs_server *server = NFS_SERVER(inode);
fe650407
TM
2931 struct rpc_task *task;
2932 int status;
2933
2934 data = kmalloc(sizeof(*data), GFP_KERNEL);
2935 if (data == NULL)
2936 return -ENOMEM;
2937 data->args.fhandle = &data->fh;
2938 data->args.stateid = &data->stateid;
fa178f29 2939 data->args.bitmask = server->attr_bitmask;
fe650407
TM
2940 nfs_copy_fh(&data->fh, NFS_FH(inode));
2941 memcpy(&data->stateid, stateid, sizeof(data->stateid));
fa178f29
TM
2942 data->res.fattr = &data->fattr;
2943 data->res.server = server;
fe650407 2944 data->cred = get_rpccred(cred);
26e976a8 2945 data->timestamp = jiffies;
fe650407
TM
2946 data->rpc_status = 0;
2947
2948 task = rpc_run_task(NFS_CLIENT(inode), RPC_TASK_ASYNC, &nfs4_delegreturn_ops, data);
7a1218a2 2949 if (IS_ERR(task))
fe650407 2950 return PTR_ERR(task);
fe650407 2951 status = nfs4_wait_for_completion_rpc_task(task);
fa178f29 2952 if (status == 0) {
fe650407 2953 status = data->rpc_status;
fa178f29
TM
2954 if (status == 0)
2955 nfs_post_op_update_inode(inode, &data->fattr);
2956 }
e6b3c4db 2957 rpc_put_task(task);
fe650407 2958 return status;
1da177e4
LT
2959}
2960
2961int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
2962{
2963 struct nfs_server *server = NFS_SERVER(inode);
2964 struct nfs4_exception exception = { };
2965 int err;
2966 do {
2967 err = _nfs4_proc_delegreturn(inode, cred, stateid);
2968 switch (err) {
2969 case -NFS4ERR_STALE_STATEID:
2970 case -NFS4ERR_EXPIRED:
1da177e4
LT
2971 case 0:
2972 return 0;
2973 }
2974 err = nfs4_handle_exception(server, err, &exception);
2975 } while (exception.retry);
2976 return err;
2977}
2978
2979#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
2980#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
2981
2982/*
2983 * sleep, with exponential backoff, and retry the LOCK operation.
2984 */
2985static unsigned long
2986nfs4_set_lock_task_retry(unsigned long timeout)
2987{
041e0e3b 2988 schedule_timeout_interruptible(timeout);
1da177e4
LT
2989 timeout <<= 1;
2990 if (timeout > NFS4_LOCK_MAXTIMEOUT)
2991 return NFS4_LOCK_MAXTIMEOUT;
2992 return timeout;
2993}
2994
1da177e4
LT
2995static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
2996{
2997 struct inode *inode = state->inode;
2998 struct nfs_server *server = NFS_SERVER(inode);
7539bbab 2999 struct nfs_client *clp = server->nfs_client;
911d1aaf 3000 struct nfs_lockt_args arg = {
1da177e4 3001 .fh = NFS_FH(inode),
911d1aaf 3002 .fl = request,
1da177e4 3003 };
911d1aaf
TM
3004 struct nfs_lockt_res res = {
3005 .denied = request,
1da177e4
LT
3006 };
3007 struct rpc_message msg = {
3008 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
3009 .rpc_argp = &arg,
3010 .rpc_resp = &res,
3011 .rpc_cred = state->owner->so_cred,
3012 };
1da177e4
LT
3013 struct nfs4_lock_state *lsp;
3014 int status;
3015
3016 down_read(&clp->cl_sem);
911d1aaf 3017 arg.lock_owner.clientid = clp->cl_clientid;
8d0a8a9d
TM
3018 status = nfs4_set_lock_state(state, request);
3019 if (status != 0)
3020 goto out;
3021 lsp = request->fl_u.nfs4_fl.owner;
911d1aaf 3022 arg.lock_owner.id = lsp->ls_id;
1da177e4 3023 status = rpc_call_sync(server->client, &msg, 0);
911d1aaf
TM
3024 switch (status) {
3025 case 0:
3026 request->fl_type = F_UNLCK;
3027 break;
3028 case -NFS4ERR_DENIED:
3029 status = 0;
1da177e4 3030 }
70cc6487 3031 request->fl_ops->fl_release_private(request);
8d0a8a9d 3032out:
1da177e4
LT
3033 up_read(&clp->cl_sem);
3034 return status;
3035}
3036
3037static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3038{
3039 struct nfs4_exception exception = { };
3040 int err;
3041
3042 do {
3043 err = nfs4_handle_exception(NFS_SERVER(state->inode),
3044 _nfs4_proc_getlk(state, cmd, request),
3045 &exception);
3046 } while (exception.retry);
3047 return err;
3048}
3049
3050static int do_vfs_lock(struct file *file, struct file_lock *fl)
3051{
3052 int res = 0;
3053 switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
3054 case FL_POSIX:
3055 res = posix_lock_file_wait(file, fl);
3056 break;
3057 case FL_FLOCK:
3058 res = flock_lock_file_wait(file, fl);
3059 break;
3060 default:
3061 BUG();
3062 }
1da177e4
LT
3063 return res;
3064}
3065
faf5f49c 3066struct nfs4_unlockdata {
911d1aaf
TM
3067 struct nfs_locku_args arg;
3068 struct nfs_locku_res res;
faf5f49c
TM
3069 struct nfs4_lock_state *lsp;
3070 struct nfs_open_context *ctx;
911d1aaf
TM
3071 struct file_lock fl;
3072 const struct nfs_server *server;
26e976a8 3073 unsigned long timestamp;
faf5f49c
TM
3074};
3075
911d1aaf
TM
3076static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
3077 struct nfs_open_context *ctx,
3078 struct nfs4_lock_state *lsp,
3079 struct nfs_seqid *seqid)
3080{
3081 struct nfs4_unlockdata *p;
3082 struct inode *inode = lsp->ls_state->inode;
3083
3084 p = kmalloc(sizeof(*p), GFP_KERNEL);
3085 if (p == NULL)
3086 return NULL;
3087 p->arg.fh = NFS_FH(inode);
3088 p->arg.fl = &p->fl;
3089 p->arg.seqid = seqid;
3090 p->arg.stateid = &lsp->ls_stateid;
3091 p->lsp = lsp;
3092 atomic_inc(&lsp->ls_count);
3093 /* Ensure we don't close file until we're done freeing locks! */
3094 p->ctx = get_nfs_open_context(ctx);
3095 memcpy(&p->fl, fl, sizeof(p->fl));
3096 p->server = NFS_SERVER(inode);
3097 return p;
3098}
3099
06f814a3 3100static void nfs4_locku_release_calldata(void *data)
faf5f49c 3101{
963d8fe5 3102 struct nfs4_unlockdata *calldata = data;
911d1aaf 3103 nfs_free_seqid(calldata->arg.seqid);
06f814a3
TM
3104 nfs4_put_lock_state(calldata->lsp);
3105 put_nfs_open_context(calldata->ctx);
3106 kfree(calldata);
faf5f49c
TM
3107}
3108
963d8fe5 3109static void nfs4_locku_done(struct rpc_task *task, void *data)
faf5f49c 3110{
963d8fe5 3111 struct nfs4_unlockdata *calldata = data;
faf5f49c 3112
06f814a3
TM
3113 if (RPC_ASSASSINATED(task))
3114 return;
911d1aaf 3115 nfs_increment_lock_seqid(task->tk_status, calldata->arg.seqid);
faf5f49c
TM
3116 switch (task->tk_status) {
3117 case 0:
3118 memcpy(calldata->lsp->ls_stateid.data,
911d1aaf 3119 calldata->res.stateid.data,
faf5f49c 3120 sizeof(calldata->lsp->ls_stateid.data));
26e976a8 3121 renew_lease(calldata->server, calldata->timestamp);
faf5f49c
TM
3122 break;
3123 case -NFS4ERR_STALE_STATEID:
3124 case -NFS4ERR_EXPIRED:
faf5f49c
TM
3125 break;
3126 default:
a6a352e9 3127 if (nfs4_async_handle_error(task, calldata->server) == -EAGAIN)
faf5f49c 3128 rpc_restart_call(task);
faf5f49c 3129 }
faf5f49c
TM
3130}
3131
4ce70ada 3132static void nfs4_locku_prepare(struct rpc_task *task, void *data)
faf5f49c 3133{
4ce70ada 3134 struct nfs4_unlockdata *calldata = data;
1da177e4
LT
3135 struct rpc_message msg = {
3136 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
faf5f49c
TM
3137 .rpc_argp = &calldata->arg,
3138 .rpc_resp = &calldata->res,
3139 .rpc_cred = calldata->lsp->ls_state->owner->so_cred,
1da177e4 3140 };
faf5f49c 3141
911d1aaf 3142 if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
faf5f49c
TM
3143 return;
3144 if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) {
963d8fe5
TM
3145 /* Note: exit _without_ running nfs4_locku_done */
3146 task->tk_action = NULL;
faf5f49c
TM
3147 return;
3148 }
26e976a8 3149 calldata->timestamp = jiffies;
faf5f49c
TM
3150 rpc_call_setup(task, &msg, 0);
3151}
3152
963d8fe5 3153static const struct rpc_call_ops nfs4_locku_ops = {
4ce70ada 3154 .rpc_call_prepare = nfs4_locku_prepare,
963d8fe5 3155 .rpc_call_done = nfs4_locku_done,
06f814a3 3156 .rpc_release = nfs4_locku_release_calldata,
963d8fe5
TM
3157};
3158
a5d16a4d
TM
3159static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
3160 struct nfs_open_context *ctx,
3161 struct nfs4_lock_state *lsp,
3162 struct nfs_seqid *seqid)
3163{
3164 struct nfs4_unlockdata *data;
a5d16a4d
TM
3165
3166 data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
3167 if (data == NULL) {
3168 nfs_free_seqid(seqid);
3169 return ERR_PTR(-ENOMEM);
3170 }
3171
7a1218a2 3172 return rpc_run_task(NFS_CLIENT(lsp->ls_state->inode), RPC_TASK_ASYNC, &nfs4_locku_ops, data);
a5d16a4d
TM
3173}
3174
faf5f49c
TM
3175static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
3176{
911d1aaf 3177 struct nfs_seqid *seqid;
1da177e4 3178 struct nfs4_lock_state *lsp;
06f814a3
TM
3179 struct rpc_task *task;
3180 int status = 0;
faf5f49c 3181
8d0a8a9d 3182 status = nfs4_set_lock_state(state, request);
9b073574
TM
3183 /* Unlock _before_ we do the RPC call */
3184 request->fl_flags |= FL_EXISTS;
3185 if (do_vfs_lock(request->fl_file, request) == -ENOENT)
3186 goto out;
8d0a8a9d 3187 if (status != 0)
9b073574
TM
3188 goto out;
3189 /* Is this a delegated lock? */
3190 if (test_bit(NFS_DELEGATED_STATE, &state->flags))
3191 goto out;
8d0a8a9d 3192 lsp = request->fl_u.nfs4_fl.owner;
911d1aaf 3193 seqid = nfs_alloc_seqid(&lsp->ls_seqid);
9b073574 3194 status = -ENOMEM;
911d1aaf 3195 if (seqid == NULL)
9b073574 3196 goto out;
a5d16a4d
TM
3197 task = nfs4_do_unlck(request, request->fl_file->private_data, lsp, seqid);
3198 status = PTR_ERR(task);
3199 if (IS_ERR(task))
9b073574 3200 goto out;
a5d16a4d 3201 status = nfs4_wait_for_completion_rpc_task(task);
e6b3c4db 3202 rpc_put_task(task);
9b073574 3203out:
1da177e4
LT
3204 return status;
3205}
3206
a5d16a4d
TM
3207struct nfs4_lockdata {
3208 struct nfs_lock_args arg;
3209 struct nfs_lock_res res;
3210 struct nfs4_lock_state *lsp;
3211 struct nfs_open_context *ctx;
3212 struct file_lock fl;
26e976a8 3213 unsigned long timestamp;
a5d16a4d
TM
3214 int rpc_status;
3215 int cancelled;
3216};
3217
3218static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
3219 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp)
1da177e4 3220{
a5d16a4d
TM
3221 struct nfs4_lockdata *p;
3222 struct inode *inode = lsp->ls_state->inode;
1da177e4 3223 struct nfs_server *server = NFS_SERVER(inode);
a5d16a4d
TM
3224
3225 p = kzalloc(sizeof(*p), GFP_KERNEL);
3226 if (p == NULL)
3227 return NULL;
3228
3229 p->arg.fh = NFS_FH(inode);
3230 p->arg.fl = &p->fl;
3231 p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid);
3232 if (p->arg.lock_seqid == NULL)
3233 goto out_free;
3234 p->arg.lock_stateid = &lsp->ls_stateid;
7539bbab 3235 p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
a5d16a4d
TM
3236 p->arg.lock_owner.id = lsp->ls_id;
3237 p->lsp = lsp;
3238 atomic_inc(&lsp->ls_count);
3239 p->ctx = get_nfs_open_context(ctx);
3240 memcpy(&p->fl, fl, sizeof(p->fl));
3241 return p;
3242out_free:
3243 kfree(p);
3244 return NULL;
3245}
3246
3247static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
3248{
3249 struct nfs4_lockdata *data = calldata;
3250 struct nfs4_state *state = data->lsp->ls_state;
3251 struct nfs4_state_owner *sp = state->owner;
1da177e4 3252 struct rpc_message msg = {
a5d16a4d
TM
3253 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
3254 .rpc_argp = &data->arg,
3255 .rpc_resp = &data->res,
3256 .rpc_cred = sp->so_cred,
1da177e4 3257 };
06735b34 3258
a5d16a4d
TM
3259 if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
3260 return;
3261 dprintk("%s: begin!\n", __FUNCTION__);
3262 /* Do we need to do an open_to_lock_owner? */
3263 if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
3264 data->arg.open_seqid = nfs_alloc_seqid(&sp->so_seqid);
3265 if (data->arg.open_seqid == NULL) {
3266 data->rpc_status = -ENOMEM;
3267 task->tk_action = NULL;
06735b34 3268 goto out;
8d0a8a9d 3269 }
a5d16a4d
TM
3270 data->arg.open_stateid = &state->stateid;
3271 data->arg.new_lock_owner = 1;
3272 }
26e976a8 3273 data->timestamp = jiffies;
a5d16a4d 3274 rpc_call_setup(task, &msg, 0);
06735b34 3275out:
a5d16a4d
TM
3276 dprintk("%s: done!, ret = %d\n", __FUNCTION__, data->rpc_status);
3277}
3278
3279static void nfs4_lock_done(struct rpc_task *task, void *calldata)
3280{
3281 struct nfs4_lockdata *data = calldata;
3282
3283 dprintk("%s: begin!\n", __FUNCTION__);
3284
3285 data->rpc_status = task->tk_status;
3286 if (RPC_ASSASSINATED(task))
3287 goto out;
3288 if (data->arg.new_lock_owner != 0) {
3289 nfs_increment_open_seqid(data->rpc_status, data->arg.open_seqid);
3290 if (data->rpc_status == 0)
3291 nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
3292 else
3293 goto out;
3294 }
3295 if (data->rpc_status == 0) {
3296 memcpy(data->lsp->ls_stateid.data, data->res.stateid.data,
3297 sizeof(data->lsp->ls_stateid.data));
3298 data->lsp->ls_flags |= NFS_LOCK_INITIALIZED;
88be9f99 3299 renew_lease(NFS_SERVER(data->ctx->path.dentry->d_inode), data->timestamp);
a5d16a4d
TM
3300 }
3301 nfs_increment_lock_seqid(data->rpc_status, data->arg.lock_seqid);
3302out:
3303 dprintk("%s: done, ret = %d!\n", __FUNCTION__, data->rpc_status);
3304}
3305
3306static void nfs4_lock_release(void *calldata)
3307{
3308 struct nfs4_lockdata *data = calldata;
3309
3310 dprintk("%s: begin!\n", __FUNCTION__);
3311 if (data->arg.open_seqid != NULL)
3312 nfs_free_seqid(data->arg.open_seqid);
3313 if (data->cancelled != 0) {
3314 struct rpc_task *task;
3315 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
3316 data->arg.lock_seqid);
3317 if (!IS_ERR(task))
e6b3c4db 3318 rpc_put_task(task);
a5d16a4d
TM
3319 dprintk("%s: cancelling lock!\n", __FUNCTION__);
3320 } else
3321 nfs_free_seqid(data->arg.lock_seqid);
3322 nfs4_put_lock_state(data->lsp);
3323 put_nfs_open_context(data->ctx);
3324 kfree(data);
3325 dprintk("%s: done!\n", __FUNCTION__);
3326}
3327
3328static const struct rpc_call_ops nfs4_lock_ops = {
3329 .rpc_call_prepare = nfs4_lock_prepare,
3330 .rpc_call_done = nfs4_lock_done,
3331 .rpc_release = nfs4_lock_release,
3332};
3333
3334static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int reclaim)
3335{
3336 struct nfs4_lockdata *data;
3337 struct rpc_task *task;
3338 int ret;
3339
3340 dprintk("%s: begin!\n", __FUNCTION__);
3341 data = nfs4_alloc_lockdata(fl, fl->fl_file->private_data,
3342 fl->fl_u.nfs4_fl.owner);
3343 if (data == NULL)
3344 return -ENOMEM;
3345 if (IS_SETLKW(cmd))
3346 data->arg.block = 1;
3347 if (reclaim != 0)
3348 data->arg.reclaim = 1;
3349 task = rpc_run_task(NFS_CLIENT(state->inode), RPC_TASK_ASYNC,
3350 &nfs4_lock_ops, data);
7a1218a2 3351 if (IS_ERR(task))
a5d16a4d 3352 return PTR_ERR(task);
a5d16a4d
TM
3353 ret = nfs4_wait_for_completion_rpc_task(task);
3354 if (ret == 0) {
3355 ret = data->rpc_status;
3356 if (ret == -NFS4ERR_DENIED)
3357 ret = -EAGAIN;
3358 } else
3359 data->cancelled = 1;
e6b3c4db 3360 rpc_put_task(task);
a5d16a4d
TM
3361 dprintk("%s: done, ret = %d!\n", __FUNCTION__, ret);
3362 return ret;
1da177e4
LT
3363}
3364
3365static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
3366{
202b50dc
TM
3367 struct nfs_server *server = NFS_SERVER(state->inode);
3368 struct nfs4_exception exception = { };
3369 int err;
3370
3371 do {
42a2d13e
TM
3372 /* Cache the lock if possible... */
3373 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
3374 return 0;
202b50dc
TM
3375 err = _nfs4_do_setlk(state, F_SETLK, request, 1);
3376 if (err != -NFS4ERR_DELAY)
3377 break;
3378 nfs4_handle_exception(server, err, &exception);
3379 } while (exception.retry);
3380 return err;
1da177e4
LT
3381}
3382
3383static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
3384{
202b50dc
TM
3385 struct nfs_server *server = NFS_SERVER(state->inode);
3386 struct nfs4_exception exception = { };
3387 int err;
3388
6bfc93ef
TM
3389 err = nfs4_set_lock_state(state, request);
3390 if (err != 0)
3391 return err;
202b50dc 3392 do {
42a2d13e
TM
3393 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
3394 return 0;
202b50dc
TM
3395 err = _nfs4_do_setlk(state, F_SETLK, request, 0);
3396 if (err != -NFS4ERR_DELAY)
3397 break;
3398 nfs4_handle_exception(server, err, &exception);
3399 } while (exception.retry);
3400 return err;
1da177e4
LT
3401}
3402
3403static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3404{
adfa6f98 3405 struct nfs_client *clp = state->owner->so_client;
01c3b861 3406 unsigned char fl_flags = request->fl_flags;
1da177e4
LT
3407 int status;
3408
6bfc93ef 3409 /* Is this a delegated open? */
6bfc93ef
TM
3410 status = nfs4_set_lock_state(state, request);
3411 if (status != 0)
3412 goto out;
01c3b861
TM
3413 request->fl_flags |= FL_ACCESS;
3414 status = do_vfs_lock(request->fl_file, request);
3415 if (status < 0)
3416 goto out;
3417 down_read(&clp->cl_sem);
3418 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
3419 struct nfs_inode *nfsi = NFS_I(state->inode);
3420 /* Yes: cache locks! */
3421 down_read(&nfsi->rwsem);
3422 /* ...but avoid races with delegation recall... */
3423 if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
3424 request->fl_flags = fl_flags & ~FL_SLEEP;
3425 status = do_vfs_lock(request->fl_file, request);
3426 up_read(&nfsi->rwsem);
3427 goto out_unlock;
3428 }
3429 up_read(&nfsi->rwsem);
3430 }
6bfc93ef
TM
3431 status = _nfs4_do_setlk(state, cmd, request, 0);
3432 if (status != 0)
01c3b861 3433 goto out_unlock;
6bfc93ef 3434 /* Note: we always want to sleep here! */
01c3b861 3435 request->fl_flags = fl_flags | FL_SLEEP;
6bfc93ef
TM
3436 if (do_vfs_lock(request->fl_file, request) < 0)
3437 printk(KERN_WARNING "%s: VFS is out of sync with lock manager!\n", __FUNCTION__);
01c3b861 3438out_unlock:
1da177e4 3439 up_read(&clp->cl_sem);
01c3b861
TM
3440out:
3441 request->fl_flags = fl_flags;
1da177e4
LT
3442 return status;
3443}
3444
3445static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
3446{
3447 struct nfs4_exception exception = { };
3448 int err;
3449
3450 do {
3451 err = nfs4_handle_exception(NFS_SERVER(state->inode),
3452 _nfs4_proc_setlk(state, cmd, request),
3453 &exception);
3454 } while (exception.retry);
3455 return err;
3456}
3457
3458static int
3459nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
3460{
3461 struct nfs_open_context *ctx;
3462 struct nfs4_state *state;
3463 unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
3464 int status;
3465
3466 /* verify open state */
3467 ctx = (struct nfs_open_context *)filp->private_data;
3468 state = ctx->state;
3469
3470 if (request->fl_start < 0 || request->fl_end < 0)
3471 return -EINVAL;
3472
3473 if (IS_GETLK(cmd))
3474 return nfs4_proc_getlk(state, F_GETLK, request);
3475
3476 if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
3477 return -EINVAL;
3478
3479 if (request->fl_type == F_UNLCK)
3480 return nfs4_proc_unlck(state, cmd, request);
3481
3482 do {
3483 status = nfs4_proc_setlk(state, cmd, request);
3484 if ((status != -EAGAIN) || IS_SETLK(cmd))
3485 break;
3486 timeout = nfs4_set_lock_task_retry(timeout);
3487 status = -ERESTARTSYS;
3488 if (signalled())
3489 break;
3490 } while(status < 0);
1da177e4
LT
3491 return status;
3492}
3493
888e694c
TM
3494int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
3495{
3496 struct nfs_server *server = NFS_SERVER(state->inode);
3497 struct nfs4_exception exception = { };
3498 int err;
3499
3500 err = nfs4_set_lock_state(state, fl);
3501 if (err != 0)
3502 goto out;
3503 do {
3504 err = _nfs4_do_setlk(state, F_SETLK, fl, 0);
3505 if (err != -NFS4ERR_DELAY)
3506 break;
3507 err = nfs4_handle_exception(server, err, &exception);
3508 } while (exception.retry);
3509out:
3510 return err;
3511}
6b3b5496 3512
aa1870af
BF
3513#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
3514
6b3b5496
BF
3515int nfs4_setxattr(struct dentry *dentry, const char *key, const void *buf,
3516 size_t buflen, int flags)
3517{
4b580ee3
BF
3518 struct inode *inode = dentry->d_inode;
3519
3520 if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
3521 return -EOPNOTSUPP;
3522
3523 if (!S_ISREG(inode->i_mode) &&
3524 (!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX))
3525 return -EPERM;
3526
3527 return nfs4_proc_set_acl(inode, buf, buflen);
6b3b5496
BF
3528}
3529
3530/* The getxattr man page suggests returning -ENODATA for unknown attributes,
3531 * and that's what we'll do for e.g. user attributes that haven't been set.
3532 * But we'll follow ext2/ext3's lead by returning -EOPNOTSUPP for unsupported
3533 * attributes in kernel-managed attribute namespaces. */
3534ssize_t nfs4_getxattr(struct dentry *dentry, const char *key, void *buf,
3535 size_t buflen)
3536{
aa1870af
BF
3537 struct inode *inode = dentry->d_inode;
3538
3539 if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
3540 return -EOPNOTSUPP;
3541
3542 return nfs4_proc_get_acl(inode, buf, buflen);
6b3b5496
BF
3543}
3544
3545ssize_t nfs4_listxattr(struct dentry *dentry, char *buf, size_t buflen)
3546{
aa1870af 3547 size_t len = strlen(XATTR_NAME_NFSV4_ACL) + 1;
6b3b5496 3548
096455a2
BF
3549 if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
3550 return 0;
6b3b5496
BF
3551 if (buf && buflen < len)
3552 return -ERANGE;
3553 if (buf)
aa1870af
BF
3554 memcpy(buf, XATTR_NAME_NFSV4_ACL, len);
3555 return len;
6b3b5496
BF
3556}
3557
c228fd3a 3558int nfs4_proc_fs_locations(struct inode *dir, struct qstr *name,
7aaa0b3b 3559 struct nfs4_fs_locations *fs_locations, struct page *page)
683b57b4
TM
3560{
3561 struct nfs_server *server = NFS_SERVER(dir);
3562 u32 bitmask[2] = {
361e624f
MN
3563 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
3564 [1] = FATTR4_WORD1_MOUNTED_ON_FILEID,
683b57b4
TM
3565 };
3566 struct nfs4_fs_locations_arg args = {
3567 .dir_fh = NFS_FH(dir),
c228fd3a 3568 .name = name,
683b57b4
TM
3569 .page = page,
3570 .bitmask = bitmask,
3571 };
3572 struct rpc_message msg = {
3573 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
3574 .rpc_argp = &args,
7aaa0b3b 3575 .rpc_resp = fs_locations,
683b57b4
TM
3576 };
3577 int status;
3578
3579 dprintk("%s: start\n", __FUNCTION__);
c228fd3a 3580 nfs_fattr_init(&fs_locations->fattr);
683b57b4 3581 fs_locations->server = server;
830b8e33 3582 fs_locations->nlocations = 0;
683b57b4
TM
3583 status = rpc_call_sync(server->client, &msg, 0);
3584 dprintk("%s: returned status = %d\n", __FUNCTION__, status);
3585 return status;
3586}
3587
1da177e4
LT
3588struct nfs4_state_recovery_ops nfs4_reboot_recovery_ops = {
3589 .recover_open = nfs4_open_reclaim,
3590 .recover_lock = nfs4_lock_reclaim,
3591};
3592
3593struct nfs4_state_recovery_ops nfs4_network_partition_recovery_ops = {
3594 .recover_open = nfs4_open_expired,
3595 .recover_lock = nfs4_lock_expired,
3596};
3597
92e1d5be 3598static const struct inode_operations nfs4_file_inode_operations = {
6b3b5496
BF
3599 .permission = nfs_permission,
3600 .getattr = nfs_getattr,
3601 .setattr = nfs_setattr,
3602 .getxattr = nfs4_getxattr,
3603 .setxattr = nfs4_setxattr,
3604 .listxattr = nfs4_listxattr,
3605};
3606
509de811 3607const struct nfs_rpc_ops nfs_v4_clientops = {
1da177e4
LT
3608 .version = 4, /* protocol version */
3609 .dentry_ops = &nfs4_dentry_operations,
3610 .dir_inode_ops = &nfs4_dir_inode_operations,
6b3b5496 3611 .file_inode_ops = &nfs4_file_inode_operations,
1da177e4
LT
3612 .getroot = nfs4_proc_get_root,
3613 .getattr = nfs4_proc_getattr,
3614 .setattr = nfs4_proc_setattr,
2b3de441 3615 .lookupfh = nfs4_proc_lookupfh,
1da177e4
LT
3616 .lookup = nfs4_proc_lookup,
3617 .access = nfs4_proc_access,
3618 .readlink = nfs4_proc_readlink,
1da177e4
LT
3619 .create = nfs4_proc_create,
3620 .remove = nfs4_proc_remove,
3621 .unlink_setup = nfs4_proc_unlink_setup,
3622 .unlink_done = nfs4_proc_unlink_done,
3623 .rename = nfs4_proc_rename,
3624 .link = nfs4_proc_link,
3625 .symlink = nfs4_proc_symlink,
3626 .mkdir = nfs4_proc_mkdir,
3627 .rmdir = nfs4_proc_remove,
3628 .readdir = nfs4_proc_readdir,
3629 .mknod = nfs4_proc_mknod,
3630 .statfs = nfs4_proc_statfs,
3631 .fsinfo = nfs4_proc_fsinfo,
3632 .pathconf = nfs4_proc_pathconf,
e9326dca 3633 .set_capabilities = nfs4_server_capabilities,
1da177e4
LT
3634 .decode_dirent = nfs4_decode_dirent,
3635 .read_setup = nfs4_proc_read_setup,
ec06c096 3636 .read_done = nfs4_read_done,
1da177e4 3637 .write_setup = nfs4_proc_write_setup,
788e7a89 3638 .write_done = nfs4_write_done,
1da177e4 3639 .commit_setup = nfs4_proc_commit_setup,
788e7a89 3640 .commit_done = nfs4_commit_done,
02a913a7
TM
3641 .file_open = nfs_open,
3642 .file_release = nfs_release,
1da177e4 3643 .lock = nfs4_proc_lock,
e50a1c2e 3644 .clear_acl_cache = nfs4_zap_acl_attr,
1da177e4
LT
3645};
3646
3647/*
3648 * Local variables:
3649 * c-basic-offset: 8
3650 * End:
3651 */