NFSv4.1 fix decode_free_stateid
[linux-2.6-block.git] / fs / nfs / nfs4proc.c
1 /*
2  *  fs/nfs/nfs4proc.c
3  *
4  *  Client-side procedure declarations for NFSv4.
5  *
6  *  Copyright (c) 2002 The Regents of the University of Michigan.
7  *  All rights reserved.
8  *
9  *  Kendrick Smith <kmsmith@umich.edu>
10  *  Andy Adamson   <andros@umich.edu>
11  *
12  *  Redistribution and use in source and binary forms, with or without
13  *  modification, are permitted provided that the following conditions
14  *  are met:
15  *
16  *  1. Redistributions of source code must retain the above copyright
17  *     notice, this list of conditions and the following disclaimer.
18  *  2. Redistributions in binary form must reproduce the above copyright
19  *     notice, this list of conditions and the following disclaimer in the
20  *     documentation and/or other materials provided with the distribution.
21  *  3. Neither the name of the University nor the names of its
22  *     contributors may be used to endorse or promote products derived
23  *     from this software without specific prior written permission.
24  *
25  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36  */
37
38 #include <linux/mm.h>
39 #include <linux/delay.h>
40 #include <linux/errno.h>
41 #include <linux/string.h>
42 #include <linux/ratelimit.h>
43 #include <linux/printk.h>
44 #include <linux/slab.h>
45 #include <linux/sunrpc/clnt.h>
46 #include <linux/nfs.h>
47 #include <linux/nfs4.h>
48 #include <linux/nfs_fs.h>
49 #include <linux/nfs_page.h>
50 #include <linux/nfs_mount.h>
51 #include <linux/namei.h>
52 #include <linux/mount.h>
53 #include <linux/module.h>
54 #include <linux/nfs_idmap.h>
55 #include <linux/xattr.h>
56 #include <linux/utsname.h>
57 #include <linux/freezer.h>
58
59 #include "nfs4_fs.h"
60 #include "delegation.h"
61 #include "internal.h"
62 #include "iostat.h"
63 #include "callback.h"
64 #include "pnfs.h"
65 #include "netns.h"
66 #include "nfs4session.h"
67 #include "fscache.h"
68
69 #include "nfs4trace.h"
70
71 #define NFSDBG_FACILITY         NFSDBG_PROC
72
73 #define NFS4_POLL_RETRY_MIN     (HZ/10)
74 #define NFS4_POLL_RETRY_MAX     (15*HZ)
75
76 struct nfs4_opendata;
77 static int _nfs4_proc_open(struct nfs4_opendata *data);
78 static int _nfs4_recover_proc_open(struct nfs4_opendata *data);
79 static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
80 static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *, struct nfs4_state *);
81 static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr);
82 static int nfs4_proc_getattr(struct nfs_server *, struct nfs_fh *, struct nfs_fattr *, struct nfs4_label *label);
83 static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr, struct nfs4_label *label);
84 static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
85                             struct nfs_fattr *fattr, struct iattr *sattr,
86                             struct nfs4_state *state, struct nfs4_label *ilabel,
87                             struct nfs4_label *olabel);
88 #ifdef CONFIG_NFS_V4_1
89 static int nfs41_test_stateid(struct nfs_server *, nfs4_stateid *,
90                 struct rpc_cred *);
91 static int nfs41_free_stateid(struct nfs_server *, nfs4_stateid *,
92                 struct rpc_cred *);
93 #endif
94
95 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
96 static inline struct nfs4_label *
97 nfs4_label_init_security(struct inode *dir, struct dentry *dentry,
98         struct iattr *sattr, struct nfs4_label *label)
99 {
100         int err;
101
102         if (label == NULL)
103                 return NULL;
104
105         if (nfs_server_capable(dir, NFS_CAP_SECURITY_LABEL) == 0)
106                 return NULL;
107
108         if (NFS_SERVER(dir)->nfs_client->cl_minorversion < 2)
109                 return NULL;
110
111         err = security_dentry_init_security(dentry, sattr->ia_mode,
112                                 &dentry->d_name, (void **)&label->label, &label->len);
113         if (err == 0)
114                 return label;
115
116         return NULL;
117 }
118 static inline void
119 nfs4_label_release_security(struct nfs4_label *label)
120 {
121         if (label)
122                 security_release_secctx(label->label, label->len);
123 }
124 static inline u32 *nfs4_bitmask(struct nfs_server *server, struct nfs4_label *label)
125 {
126         if (label)
127                 return server->attr_bitmask;
128
129         return server->attr_bitmask_nl;
130 }
131 #else
132 static inline struct nfs4_label *
133 nfs4_label_init_security(struct inode *dir, struct dentry *dentry,
134         struct iattr *sattr, struct nfs4_label *l)
135 { return NULL; }
136 static inline void
137 nfs4_label_release_security(struct nfs4_label *label)
138 { return; }
139 static inline u32 *
140 nfs4_bitmask(struct nfs_server *server, struct nfs4_label *label)
141 { return server->attr_bitmask; }
142 #endif
143
144 /* Prevent leaks of NFSv4 errors into userland */
145 static int nfs4_map_errors(int err)
146 {
147         if (err >= -1000)
148                 return err;
149         switch (err) {
150         case -NFS4ERR_RESOURCE:
151         case -NFS4ERR_LAYOUTTRYLATER:
152         case -NFS4ERR_RECALLCONFLICT:
153                 return -EREMOTEIO;
154         case -NFS4ERR_WRONGSEC:
155         case -NFS4ERR_WRONG_CRED:
156                 return -EPERM;
157         case -NFS4ERR_BADOWNER:
158         case -NFS4ERR_BADNAME:
159                 return -EINVAL;
160         case -NFS4ERR_SHARE_DENIED:
161                 return -EACCES;
162         case -NFS4ERR_MINOR_VERS_MISMATCH:
163                 return -EPROTONOSUPPORT;
164         case -NFS4ERR_ACCESS:
165                 return -EACCES;
166         case -NFS4ERR_FILE_OPEN:
167                 return -EBUSY;
168         default:
169                 dprintk("%s could not handle NFSv4 error %d\n",
170                                 __func__, -err);
171                 break;
172         }
173         return -EIO;
174 }
175
176 /*
177  * This is our standard bitmap for GETATTR requests.
178  */
179 const u32 nfs4_fattr_bitmap[3] = {
180         FATTR4_WORD0_TYPE
181         | FATTR4_WORD0_CHANGE
182         | FATTR4_WORD0_SIZE
183         | FATTR4_WORD0_FSID
184         | FATTR4_WORD0_FILEID,
185         FATTR4_WORD1_MODE
186         | FATTR4_WORD1_NUMLINKS
187         | FATTR4_WORD1_OWNER
188         | FATTR4_WORD1_OWNER_GROUP
189         | FATTR4_WORD1_RAWDEV
190         | FATTR4_WORD1_SPACE_USED
191         | FATTR4_WORD1_TIME_ACCESS
192         | FATTR4_WORD1_TIME_METADATA
193         | FATTR4_WORD1_TIME_MODIFY,
194 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
195         FATTR4_WORD2_SECURITY_LABEL
196 #endif
197 };
198
199 static const u32 nfs4_pnfs_open_bitmap[3] = {
200         FATTR4_WORD0_TYPE
201         | FATTR4_WORD0_CHANGE
202         | FATTR4_WORD0_SIZE
203         | FATTR4_WORD0_FSID
204         | FATTR4_WORD0_FILEID,
205         FATTR4_WORD1_MODE
206         | FATTR4_WORD1_NUMLINKS
207         | FATTR4_WORD1_OWNER
208         | FATTR4_WORD1_OWNER_GROUP
209         | FATTR4_WORD1_RAWDEV
210         | FATTR4_WORD1_SPACE_USED
211         | FATTR4_WORD1_TIME_ACCESS
212         | FATTR4_WORD1_TIME_METADATA
213         | FATTR4_WORD1_TIME_MODIFY,
214         FATTR4_WORD2_MDSTHRESHOLD
215 };
216
217 static const u32 nfs4_open_noattr_bitmap[3] = {
218         FATTR4_WORD0_TYPE
219         | FATTR4_WORD0_CHANGE
220         | FATTR4_WORD0_FILEID,
221 };
222
223 const u32 nfs4_statfs_bitmap[3] = {
224         FATTR4_WORD0_FILES_AVAIL
225         | FATTR4_WORD0_FILES_FREE
226         | FATTR4_WORD0_FILES_TOTAL,
227         FATTR4_WORD1_SPACE_AVAIL
228         | FATTR4_WORD1_SPACE_FREE
229         | FATTR4_WORD1_SPACE_TOTAL
230 };
231
232 const u32 nfs4_pathconf_bitmap[3] = {
233         FATTR4_WORD0_MAXLINK
234         | FATTR4_WORD0_MAXNAME,
235         0
236 };
237
238 const u32 nfs4_fsinfo_bitmap[3] = { FATTR4_WORD0_MAXFILESIZE
239                         | FATTR4_WORD0_MAXREAD
240                         | FATTR4_WORD0_MAXWRITE
241                         | FATTR4_WORD0_LEASE_TIME,
242                         FATTR4_WORD1_TIME_DELTA
243                         | FATTR4_WORD1_FS_LAYOUT_TYPES,
244                         FATTR4_WORD2_LAYOUT_BLKSIZE
245 };
246
247 const u32 nfs4_fs_locations_bitmap[3] = {
248         FATTR4_WORD0_TYPE
249         | FATTR4_WORD0_CHANGE
250         | FATTR4_WORD0_SIZE
251         | FATTR4_WORD0_FSID
252         | FATTR4_WORD0_FILEID
253         | FATTR4_WORD0_FS_LOCATIONS,
254         FATTR4_WORD1_MODE
255         | FATTR4_WORD1_NUMLINKS
256         | FATTR4_WORD1_OWNER
257         | FATTR4_WORD1_OWNER_GROUP
258         | FATTR4_WORD1_RAWDEV
259         | FATTR4_WORD1_SPACE_USED
260         | FATTR4_WORD1_TIME_ACCESS
261         | FATTR4_WORD1_TIME_METADATA
262         | FATTR4_WORD1_TIME_MODIFY
263         | FATTR4_WORD1_MOUNTED_ON_FILEID,
264 };
265
266 static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
267                 struct nfs4_readdir_arg *readdir)
268 {
269         __be32 *start, *p;
270
271         if (cookie > 2) {
272                 readdir->cookie = cookie;
273                 memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
274                 return;
275         }
276
277         readdir->cookie = 0;
278         memset(&readdir->verifier, 0, sizeof(readdir->verifier));
279         if (cookie == 2)
280                 return;
281         
282         /*
283          * NFSv4 servers do not return entries for '.' and '..'
284          * Therefore, we fake these entries here.  We let '.'
285          * have cookie 0 and '..' have cookie 1.  Note that
286          * when talking to the server, we always send cookie 0
287          * instead of 1 or 2.
288          */
289         start = p = kmap_atomic(*readdir->pages);
290         
291         if (cookie == 0) {
292                 *p++ = xdr_one;                                  /* next */
293                 *p++ = xdr_zero;                   /* cookie, first word */
294                 *p++ = xdr_one;                   /* cookie, second word */
295                 *p++ = xdr_one;                             /* entry len */
296                 memcpy(p, ".\0\0\0", 4);                        /* entry */
297                 p++;
298                 *p++ = xdr_one;                         /* bitmap length */
299                 *p++ = htonl(FATTR4_WORD0_FILEID);             /* bitmap */
300                 *p++ = htonl(8);              /* attribute buffer length */
301                 p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_inode));
302         }
303         
304         *p++ = xdr_one;                                  /* next */
305         *p++ = xdr_zero;                   /* cookie, first word */
306         *p++ = xdr_two;                   /* cookie, second word */
307         *p++ = xdr_two;                             /* entry len */
308         memcpy(p, "..\0\0", 4);                         /* entry */
309         p++;
310         *p++ = xdr_one;                         /* bitmap length */
311         *p++ = htonl(FATTR4_WORD0_FILEID);             /* bitmap */
312         *p++ = htonl(8);              /* attribute buffer length */
313         p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_parent->d_inode));
314
315         readdir->pgbase = (char *)p - (char *)start;
316         readdir->count -= readdir->pgbase;
317         kunmap_atomic(start);
318 }
319
320 static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
321 {
322         int res = 0;
323
324         might_sleep();
325
326         if (*timeout <= 0)
327                 *timeout = NFS4_POLL_RETRY_MIN;
328         if (*timeout > NFS4_POLL_RETRY_MAX)
329                 *timeout = NFS4_POLL_RETRY_MAX;
330         freezable_schedule_timeout_killable_unsafe(*timeout);
331         if (fatal_signal_pending(current))
332                 res = -ERESTARTSYS;
333         *timeout <<= 1;
334         return res;
335 }
336
337 /* This is the error handling routine for processes that are allowed
338  * to sleep.
339  */
340 static int nfs4_handle_exception(struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
341 {
342         struct nfs_client *clp = server->nfs_client;
343         struct nfs4_state *state = exception->state;
344         struct inode *inode = exception->inode;
345         int ret = errorcode;
346
347         exception->retry = 0;
348         switch(errorcode) {
349                 case 0:
350                         return 0;
351                 case -NFS4ERR_OPENMODE:
352                         if (inode && nfs4_have_delegation(inode, FMODE_READ)) {
353                                 nfs4_inode_return_delegation(inode);
354                                 exception->retry = 1;
355                                 return 0;
356                         }
357                         if (state == NULL)
358                                 break;
359                         ret = nfs4_schedule_stateid_recovery(server, state);
360                         if (ret < 0)
361                                 break;
362                         goto wait_on_recovery;
363                 case -NFS4ERR_DELEG_REVOKED:
364                 case -NFS4ERR_ADMIN_REVOKED:
365                 case -NFS4ERR_BAD_STATEID:
366                         if (inode != NULL && nfs4_have_delegation(inode, FMODE_READ)) {
367                                 nfs_remove_bad_delegation(inode);
368                                 exception->retry = 1;
369                                 break;
370                         }
371                         if (state == NULL)
372                                 break;
373                         ret = nfs4_schedule_stateid_recovery(server, state);
374                         if (ret < 0)
375                                 break;
376                         goto wait_on_recovery;
377                 case -NFS4ERR_EXPIRED:
378                         if (state != NULL) {
379                                 ret = nfs4_schedule_stateid_recovery(server, state);
380                                 if (ret < 0)
381                                         break;
382                         }
383                 case -NFS4ERR_STALE_STATEID:
384                 case -NFS4ERR_STALE_CLIENTID:
385                         nfs4_schedule_lease_recovery(clp);
386                         goto wait_on_recovery;
387 #if defined(CONFIG_NFS_V4_1)
388                 case -NFS4ERR_BADSESSION:
389                 case -NFS4ERR_BADSLOT:
390                 case -NFS4ERR_BAD_HIGH_SLOT:
391                 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
392                 case -NFS4ERR_DEADSESSION:
393                 case -NFS4ERR_SEQ_FALSE_RETRY:
394                 case -NFS4ERR_SEQ_MISORDERED:
395                         dprintk("%s ERROR: %d Reset session\n", __func__,
396                                 errorcode);
397                         nfs4_schedule_session_recovery(clp->cl_session, errorcode);
398                         goto wait_on_recovery;
399 #endif /* defined(CONFIG_NFS_V4_1) */
400                 case -NFS4ERR_FILE_OPEN:
401                         if (exception->timeout > HZ) {
402                                 /* We have retried a decent amount, time to
403                                  * fail
404                                  */
405                                 ret = -EBUSY;
406                                 break;
407                         }
408                 case -NFS4ERR_GRACE:
409                 case -NFS4ERR_DELAY:
410                         ret = nfs4_delay(server->client, &exception->timeout);
411                         if (ret != 0)
412                                 break;
413                 case -NFS4ERR_RETRY_UNCACHED_REP:
414                 case -NFS4ERR_OLD_STATEID:
415                         exception->retry = 1;
416                         break;
417                 case -NFS4ERR_BADOWNER:
418                         /* The following works around a Linux server bug! */
419                 case -NFS4ERR_BADNAME:
420                         if (server->caps & NFS_CAP_UIDGID_NOMAP) {
421                                 server->caps &= ~NFS_CAP_UIDGID_NOMAP;
422                                 exception->retry = 1;
423                                 printk(KERN_WARNING "NFS: v4 server %s "
424                                                 "does not accept raw "
425                                                 "uid/gids. "
426                                                 "Reenabling the idmapper.\n",
427                                                 server->nfs_client->cl_hostname);
428                         }
429         }
430         /* We failed to handle the error */
431         return nfs4_map_errors(ret);
432 wait_on_recovery:
433         ret = nfs4_wait_clnt_recover(clp);
434         if (ret == 0)
435                 exception->retry = 1;
436         return ret;
437 }
438
439 /*
440  * Return 'true' if 'clp' is using an rpc_client that is integrity protected
441  * or 'false' otherwise.
442  */
443 static bool _nfs4_is_integrity_protected(struct nfs_client *clp)
444 {
445         rpc_authflavor_t flavor = clp->cl_rpcclient->cl_auth->au_flavor;
446
447         if (flavor == RPC_AUTH_GSS_KRB5I ||
448             flavor == RPC_AUTH_GSS_KRB5P)
449                 return true;
450
451         return false;
452 }
453
454 static void do_renew_lease(struct nfs_client *clp, unsigned long timestamp)
455 {
456         spin_lock(&clp->cl_lock);
457         if (time_before(clp->cl_last_renewal,timestamp))
458                 clp->cl_last_renewal = timestamp;
459         spin_unlock(&clp->cl_lock);
460 }
461
462 static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
463 {
464         do_renew_lease(server->nfs_client, timestamp);
465 }
466
467 struct nfs4_call_sync_data {
468         const struct nfs_server *seq_server;
469         struct nfs4_sequence_args *seq_args;
470         struct nfs4_sequence_res *seq_res;
471 };
472
473 static void nfs4_init_sequence(struct nfs4_sequence_args *args,
474                                struct nfs4_sequence_res *res, int cache_reply)
475 {
476         args->sa_slot = NULL;
477         args->sa_cache_this = cache_reply;
478         args->sa_privileged = 0;
479
480         res->sr_slot = NULL;
481 }
482
483 static void nfs4_set_sequence_privileged(struct nfs4_sequence_args *args)
484 {
485         args->sa_privileged = 1;
486 }
487
488 static int nfs40_setup_sequence(const struct nfs_server *server,
489                                 struct nfs4_sequence_args *args,
490                                 struct nfs4_sequence_res *res,
491                                 struct rpc_task *task)
492 {
493         struct nfs4_slot_table *tbl = server->nfs_client->cl_slot_tbl;
494         struct nfs4_slot *slot;
495
496         /* slot already allocated? */
497         if (res->sr_slot != NULL)
498                 goto out_start;
499
500         spin_lock(&tbl->slot_tbl_lock);
501         if (nfs4_slot_tbl_draining(tbl) && !args->sa_privileged)
502                 goto out_sleep;
503
504         slot = nfs4_alloc_slot(tbl);
505         if (IS_ERR(slot)) {
506                 if (slot == ERR_PTR(-ENOMEM))
507                         task->tk_timeout = HZ >> 2;
508                 goto out_sleep;
509         }
510         spin_unlock(&tbl->slot_tbl_lock);
511
512         args->sa_slot = slot;
513         res->sr_slot = slot;
514
515 out_start:
516         rpc_call_start(task);
517         return 0;
518
519 out_sleep:
520         if (args->sa_privileged)
521                 rpc_sleep_on_priority(&tbl->slot_tbl_waitq, task,
522                                 NULL, RPC_PRIORITY_PRIVILEGED);
523         else
524                 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
525         spin_unlock(&tbl->slot_tbl_lock);
526         return -EAGAIN;
527 }
528
529 static int nfs40_sequence_done(struct rpc_task *task,
530                                struct nfs4_sequence_res *res)
531 {
532         struct nfs4_slot *slot = res->sr_slot;
533         struct nfs4_slot_table *tbl;
534
535         if (!RPC_WAS_SENT(task))
536                 goto out;
537
538         tbl = slot->table;
539         spin_lock(&tbl->slot_tbl_lock);
540         if (!nfs41_wake_and_assign_slot(tbl, slot))
541                 nfs4_free_slot(tbl, slot);
542         spin_unlock(&tbl->slot_tbl_lock);
543
544         res->sr_slot = NULL;
545 out:
546         return 1;
547 }
548
549 #if defined(CONFIG_NFS_V4_1)
550
551 static void nfs41_sequence_free_slot(struct nfs4_sequence_res *res)
552 {
553         struct nfs4_session *session;
554         struct nfs4_slot_table *tbl;
555         bool send_new_highest_used_slotid = false;
556
557         if (!res->sr_slot) {
558                 /* just wake up the next guy waiting since
559                  * we may have not consumed a slot after all */
560                 dprintk("%s: No slot\n", __func__);
561                 return;
562         }
563         tbl = res->sr_slot->table;
564         session = tbl->session;
565
566         spin_lock(&tbl->slot_tbl_lock);
567         /* Be nice to the server: try to ensure that the last transmitted
568          * value for highest_user_slotid <= target_highest_slotid
569          */
570         if (tbl->highest_used_slotid > tbl->target_highest_slotid)
571                 send_new_highest_used_slotid = true;
572
573         if (nfs41_wake_and_assign_slot(tbl, res->sr_slot)) {
574                 send_new_highest_used_slotid = false;
575                 goto out_unlock;
576         }
577         nfs4_free_slot(tbl, res->sr_slot);
578
579         if (tbl->highest_used_slotid != NFS4_NO_SLOT)
580                 send_new_highest_used_slotid = false;
581 out_unlock:
582         spin_unlock(&tbl->slot_tbl_lock);
583         res->sr_slot = NULL;
584         if (send_new_highest_used_slotid)
585                 nfs41_server_notify_highest_slotid_update(session->clp);
586 }
587
588 static int nfs41_sequence_done(struct rpc_task *task, struct nfs4_sequence_res *res)
589 {
590         struct nfs4_session *session;
591         struct nfs4_slot *slot;
592         struct nfs_client *clp;
593         bool interrupted = false;
594         int ret = 1;
595
596         /* don't increment the sequence number if the task wasn't sent */
597         if (!RPC_WAS_SENT(task))
598                 goto out;
599
600         slot = res->sr_slot;
601         session = slot->table->session;
602
603         if (slot->interrupted) {
604                 slot->interrupted = 0;
605                 interrupted = true;
606         }
607
608         trace_nfs4_sequence_done(session, res);
609         /* Check the SEQUENCE operation status */
610         switch (res->sr_status) {
611         case 0:
612                 /* Update the slot's sequence and clientid lease timer */
613                 ++slot->seq_nr;
614                 clp = session->clp;
615                 do_renew_lease(clp, res->sr_timestamp);
616                 /* Check sequence flags */
617                 if (res->sr_status_flags != 0)
618                         nfs4_schedule_lease_recovery(clp);
619                 nfs41_update_target_slotid(slot->table, slot, res);
620                 break;
621         case 1:
622                 /*
623                  * sr_status remains 1 if an RPC level error occurred.
624                  * The server may or may not have processed the sequence
625                  * operation..
626                  * Mark the slot as having hosted an interrupted RPC call.
627                  */
628                 slot->interrupted = 1;
629                 goto out;
630         case -NFS4ERR_DELAY:
631                 /* The server detected a resend of the RPC call and
632                  * returned NFS4ERR_DELAY as per Section 2.10.6.2
633                  * of RFC5661.
634                  */
635                 dprintk("%s: slot=%u seq=%u: Operation in progress\n",
636                         __func__,
637                         slot->slot_nr,
638                         slot->seq_nr);
639                 goto out_retry;
640         case -NFS4ERR_BADSLOT:
641                 /*
642                  * The slot id we used was probably retired. Try again
643                  * using a different slot id.
644                  */
645                 goto retry_nowait;
646         case -NFS4ERR_SEQ_MISORDERED:
647                 /*
648                  * Was the last operation on this sequence interrupted?
649                  * If so, retry after bumping the sequence number.
650                  */
651                 if (interrupted) {
652                         ++slot->seq_nr;
653                         goto retry_nowait;
654                 }
655                 /*
656                  * Could this slot have been previously retired?
657                  * If so, then the server may be expecting seq_nr = 1!
658                  */
659                 if (slot->seq_nr != 1) {
660                         slot->seq_nr = 1;
661                         goto retry_nowait;
662                 }
663                 break;
664         case -NFS4ERR_SEQ_FALSE_RETRY:
665                 ++slot->seq_nr;
666                 goto retry_nowait;
667         default:
668                 /* Just update the slot sequence no. */
669                 ++slot->seq_nr;
670         }
671 out:
672         /* The session may be reset by one of the error handlers. */
673         dprintk("%s: Error %d free the slot \n", __func__, res->sr_status);
674         nfs41_sequence_free_slot(res);
675         return ret;
676 retry_nowait:
677         if (rpc_restart_call_prepare(task)) {
678                 task->tk_status = 0;
679                 ret = 0;
680         }
681         goto out;
682 out_retry:
683         if (!rpc_restart_call(task))
684                 goto out;
685         rpc_delay(task, NFS4_POLL_RETRY_MAX);
686         return 0;
687 }
688
689 static int nfs4_sequence_done(struct rpc_task *task,
690                                struct nfs4_sequence_res *res)
691 {
692         if (res->sr_slot == NULL)
693                 return 1;
694         if (!res->sr_slot->table->session)
695                 return nfs40_sequence_done(task, res);
696         return nfs41_sequence_done(task, res);
697 }
698
699 int nfs41_setup_sequence(struct nfs4_session *session,
700                                 struct nfs4_sequence_args *args,
701                                 struct nfs4_sequence_res *res,
702                                 struct rpc_task *task)
703 {
704         struct nfs4_slot *slot;
705         struct nfs4_slot_table *tbl;
706
707         dprintk("--> %s\n", __func__);
708         /* slot already allocated? */
709         if (res->sr_slot != NULL)
710                 goto out_success;
711
712         tbl = &session->fc_slot_table;
713
714         task->tk_timeout = 0;
715
716         spin_lock(&tbl->slot_tbl_lock);
717         if (test_bit(NFS4_SLOT_TBL_DRAINING, &tbl->slot_tbl_state) &&
718             !args->sa_privileged) {
719                 /* The state manager will wait until the slot table is empty */
720                 dprintk("%s session is draining\n", __func__);
721                 goto out_sleep;
722         }
723
724         slot = nfs4_alloc_slot(tbl);
725         if (IS_ERR(slot)) {
726                 /* If out of memory, try again in 1/4 second */
727                 if (slot == ERR_PTR(-ENOMEM))
728                         task->tk_timeout = HZ >> 2;
729                 dprintk("<-- %s: no free slots\n", __func__);
730                 goto out_sleep;
731         }
732         spin_unlock(&tbl->slot_tbl_lock);
733
734         args->sa_slot = slot;
735
736         dprintk("<-- %s slotid=%u seqid=%u\n", __func__,
737                         slot->slot_nr, slot->seq_nr);
738
739         res->sr_slot = slot;
740         res->sr_timestamp = jiffies;
741         res->sr_status_flags = 0;
742         /*
743          * sr_status is only set in decode_sequence, and so will remain
744          * set to 1 if an rpc level failure occurs.
745          */
746         res->sr_status = 1;
747         trace_nfs4_setup_sequence(session, args);
748 out_success:
749         rpc_call_start(task);
750         return 0;
751 out_sleep:
752         /* Privileged tasks are queued with top priority */
753         if (args->sa_privileged)
754                 rpc_sleep_on_priority(&tbl->slot_tbl_waitq, task,
755                                 NULL, RPC_PRIORITY_PRIVILEGED);
756         else
757                 rpc_sleep_on(&tbl->slot_tbl_waitq, task, NULL);
758         spin_unlock(&tbl->slot_tbl_lock);
759         return -EAGAIN;
760 }
761 EXPORT_SYMBOL_GPL(nfs41_setup_sequence);
762
763 static int nfs4_setup_sequence(const struct nfs_server *server,
764                                struct nfs4_sequence_args *args,
765                                struct nfs4_sequence_res *res,
766                                struct rpc_task *task)
767 {
768         struct nfs4_session *session = nfs4_get_session(server);
769         int ret = 0;
770
771         if (!session)
772                 return nfs40_setup_sequence(server, args, res, task);
773
774         dprintk("--> %s clp %p session %p sr_slot %u\n",
775                 __func__, session->clp, session, res->sr_slot ?
776                         res->sr_slot->slot_nr : NFS4_NO_SLOT);
777
778         ret = nfs41_setup_sequence(session, args, res, task);
779
780         dprintk("<-- %s status=%d\n", __func__, ret);
781         return ret;
782 }
783
784 static void nfs41_call_sync_prepare(struct rpc_task *task, void *calldata)
785 {
786         struct nfs4_call_sync_data *data = calldata;
787         struct nfs4_session *session = nfs4_get_session(data->seq_server);
788
789         dprintk("--> %s data->seq_server %p\n", __func__, data->seq_server);
790
791         nfs41_setup_sequence(session, data->seq_args, data->seq_res, task);
792 }
793
794 static void nfs41_call_sync_done(struct rpc_task *task, void *calldata)
795 {
796         struct nfs4_call_sync_data *data = calldata;
797
798         nfs41_sequence_done(task, data->seq_res);
799 }
800
801 static const struct rpc_call_ops nfs41_call_sync_ops = {
802         .rpc_call_prepare = nfs41_call_sync_prepare,
803         .rpc_call_done = nfs41_call_sync_done,
804 };
805
806 #else   /* !CONFIG_NFS_V4_1 */
807
808 static int nfs4_setup_sequence(const struct nfs_server *server,
809                                struct nfs4_sequence_args *args,
810                                struct nfs4_sequence_res *res,
811                                struct rpc_task *task)
812 {
813         return nfs40_setup_sequence(server, args, res, task);
814 }
815
816 static int nfs4_sequence_done(struct rpc_task *task,
817                                struct nfs4_sequence_res *res)
818 {
819         return nfs40_sequence_done(task, res);
820 }
821
822 #endif  /* !CONFIG_NFS_V4_1 */
823
824 static void nfs40_call_sync_prepare(struct rpc_task *task, void *calldata)
825 {
826         struct nfs4_call_sync_data *data = calldata;
827         nfs4_setup_sequence(data->seq_server,
828                                 data->seq_args, data->seq_res, task);
829 }
830
831 static void nfs40_call_sync_done(struct rpc_task *task, void *calldata)
832 {
833         struct nfs4_call_sync_data *data = calldata;
834         nfs4_sequence_done(task, data->seq_res);
835 }
836
837 static const struct rpc_call_ops nfs40_call_sync_ops = {
838         .rpc_call_prepare = nfs40_call_sync_prepare,
839         .rpc_call_done = nfs40_call_sync_done,
840 };
841
842 static int nfs4_call_sync_sequence(struct rpc_clnt *clnt,
843                                    struct nfs_server *server,
844                                    struct rpc_message *msg,
845                                    struct nfs4_sequence_args *args,
846                                    struct nfs4_sequence_res *res)
847 {
848         int ret;
849         struct rpc_task *task;
850         struct nfs_client *clp = server->nfs_client;
851         struct nfs4_call_sync_data data = {
852                 .seq_server = server,
853                 .seq_args = args,
854                 .seq_res = res,
855         };
856         struct rpc_task_setup task_setup = {
857                 .rpc_client = clnt,
858                 .rpc_message = msg,
859                 .callback_ops = clp->cl_mvops->call_sync_ops,
860                 .callback_data = &data
861         };
862
863         task = rpc_run_task(&task_setup);
864         if (IS_ERR(task))
865                 ret = PTR_ERR(task);
866         else {
867                 ret = task->tk_status;
868                 rpc_put_task(task);
869         }
870         return ret;
871 }
872
873 static
874 int nfs4_call_sync(struct rpc_clnt *clnt,
875                    struct nfs_server *server,
876                    struct rpc_message *msg,
877                    struct nfs4_sequence_args *args,
878                    struct nfs4_sequence_res *res,
879                    int cache_reply)
880 {
881         nfs4_init_sequence(args, res, cache_reply);
882         return nfs4_call_sync_sequence(clnt, server, msg, args, res);
883 }
884
885 static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
886 {
887         struct nfs_inode *nfsi = NFS_I(dir);
888
889         spin_lock(&dir->i_lock);
890         nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_INVALID_DATA;
891         if (!cinfo->atomic || cinfo->before != dir->i_version)
892                 nfs_force_lookup_revalidate(dir);
893         dir->i_version = cinfo->after;
894         nfs_fscache_invalidate(dir);
895         spin_unlock(&dir->i_lock);
896 }
897
898 struct nfs4_opendata {
899         struct kref kref;
900         struct nfs_openargs o_arg;
901         struct nfs_openres o_res;
902         struct nfs_open_confirmargs c_arg;
903         struct nfs_open_confirmres c_res;
904         struct nfs4_string owner_name;
905         struct nfs4_string group_name;
906         struct nfs_fattr f_attr;
907         struct nfs4_label *f_label;
908         struct dentry *dir;
909         struct dentry *dentry;
910         struct nfs4_state_owner *owner;
911         struct nfs4_state *state;
912         struct iattr attrs;
913         unsigned long timestamp;
914         unsigned int rpc_done : 1;
915         unsigned int is_recover : 1;
916         int rpc_status;
917         int cancelled;
918 };
919
920 static bool nfs4_clear_cap_atomic_open_v1(struct nfs_server *server,
921                 int err, struct nfs4_exception *exception)
922 {
923         if (err != -EINVAL)
924                 return false;
925         if (!(server->caps & NFS_CAP_ATOMIC_OPEN_V1))
926                 return false;
927         server->caps &= ~NFS_CAP_ATOMIC_OPEN_V1;
928         exception->retry = 1;
929         return true;
930 }
931
932 static enum open_claim_type4
933 nfs4_map_atomic_open_claim(struct nfs_server *server,
934                 enum open_claim_type4 claim)
935 {
936         if (server->caps & NFS_CAP_ATOMIC_OPEN_V1)
937                 return claim;
938         switch (claim) {
939         default:
940                 return claim;
941         case NFS4_OPEN_CLAIM_FH:
942                 return NFS4_OPEN_CLAIM_NULL;
943         case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
944                 return NFS4_OPEN_CLAIM_DELEGATE_CUR;
945         case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
946                 return NFS4_OPEN_CLAIM_DELEGATE_PREV;
947         }
948 }
949
950 static void nfs4_init_opendata_res(struct nfs4_opendata *p)
951 {
952         p->o_res.f_attr = &p->f_attr;
953         p->o_res.f_label = p->f_label;
954         p->o_res.seqid = p->o_arg.seqid;
955         p->c_res.seqid = p->c_arg.seqid;
956         p->o_res.server = p->o_arg.server;
957         p->o_res.access_request = p->o_arg.access;
958         nfs_fattr_init(&p->f_attr);
959         nfs_fattr_init_names(&p->f_attr, &p->owner_name, &p->group_name);
960 }
961
962 static struct nfs4_opendata *nfs4_opendata_alloc(struct dentry *dentry,
963                 struct nfs4_state_owner *sp, fmode_t fmode, int flags,
964                 const struct iattr *attrs,
965                 struct nfs4_label *label,
966                 enum open_claim_type4 claim,
967                 gfp_t gfp_mask)
968 {
969         struct dentry *parent = dget_parent(dentry);
970         struct inode *dir = parent->d_inode;
971         struct nfs_server *server = NFS_SERVER(dir);
972         struct nfs4_opendata *p;
973
974         p = kzalloc(sizeof(*p), gfp_mask);
975         if (p == NULL)
976                 goto err;
977
978         p->f_label = nfs4_label_alloc(server, gfp_mask);
979         if (IS_ERR(p->f_label))
980                 goto err_free_p;
981
982         p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid, gfp_mask);
983         if (p->o_arg.seqid == NULL)
984                 goto err_free_label;
985         nfs_sb_active(dentry->d_sb);
986         p->dentry = dget(dentry);
987         p->dir = parent;
988         p->owner = sp;
989         atomic_inc(&sp->so_count);
990         p->o_arg.open_flags = flags;
991         p->o_arg.fmode = fmode & (FMODE_READ|FMODE_WRITE);
992         /* don't put an ACCESS op in OPEN compound if O_EXCL, because ACCESS
993          * will return permission denied for all bits until close */
994         if (!(flags & O_EXCL)) {
995                 /* ask server to check for all possible rights as results
996                  * are cached */
997                 p->o_arg.access = NFS4_ACCESS_READ | NFS4_ACCESS_MODIFY |
998                                   NFS4_ACCESS_EXTEND | NFS4_ACCESS_EXECUTE;
999         }
1000         p->o_arg.clientid = server->nfs_client->cl_clientid;
1001         p->o_arg.id.create_time = ktime_to_ns(sp->so_seqid.create_time);
1002         p->o_arg.id.uniquifier = sp->so_seqid.owner_id;
1003         p->o_arg.name = &dentry->d_name;
1004         p->o_arg.server = server;
1005         p->o_arg.bitmask = nfs4_bitmask(server, label);
1006         p->o_arg.open_bitmap = &nfs4_fattr_bitmap[0];
1007         p->o_arg.label = label;
1008         p->o_arg.claim = nfs4_map_atomic_open_claim(server, claim);
1009         switch (p->o_arg.claim) {
1010         case NFS4_OPEN_CLAIM_NULL:
1011         case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1012         case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1013                 p->o_arg.fh = NFS_FH(dir);
1014                 break;
1015         case NFS4_OPEN_CLAIM_PREVIOUS:
1016         case NFS4_OPEN_CLAIM_FH:
1017         case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1018         case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1019                 p->o_arg.fh = NFS_FH(dentry->d_inode);
1020         }
1021         if (attrs != NULL && attrs->ia_valid != 0) {
1022                 __u32 verf[2];
1023
1024                 p->o_arg.u.attrs = &p->attrs;
1025                 memcpy(&p->attrs, attrs, sizeof(p->attrs));
1026
1027                 verf[0] = jiffies;
1028                 verf[1] = current->pid;
1029                 memcpy(p->o_arg.u.verifier.data, verf,
1030                                 sizeof(p->o_arg.u.verifier.data));
1031         }
1032         p->c_arg.fh = &p->o_res.fh;
1033         p->c_arg.stateid = &p->o_res.stateid;
1034         p->c_arg.seqid = p->o_arg.seqid;
1035         nfs4_init_opendata_res(p);
1036         kref_init(&p->kref);
1037         return p;
1038
1039 err_free_label:
1040         nfs4_label_free(p->f_label);
1041 err_free_p:
1042         kfree(p);
1043 err:
1044         dput(parent);
1045         return NULL;
1046 }
1047
1048 static void nfs4_opendata_free(struct kref *kref)
1049 {
1050         struct nfs4_opendata *p = container_of(kref,
1051                         struct nfs4_opendata, kref);
1052         struct super_block *sb = p->dentry->d_sb;
1053
1054         nfs_free_seqid(p->o_arg.seqid);
1055         if (p->state != NULL)
1056                 nfs4_put_open_state(p->state);
1057         nfs4_put_state_owner(p->owner);
1058
1059         nfs4_label_free(p->f_label);
1060
1061         dput(p->dir);
1062         dput(p->dentry);
1063         nfs_sb_deactive(sb);
1064         nfs_fattr_free_names(&p->f_attr);
1065         kfree(p);
1066 }
1067
1068 static void nfs4_opendata_put(struct nfs4_opendata *p)
1069 {
1070         if (p != NULL)
1071                 kref_put(&p->kref, nfs4_opendata_free);
1072 }
1073
1074 static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
1075 {
1076         int ret;
1077
1078         ret = rpc_wait_for_completion_task(task);
1079         return ret;
1080 }
1081
1082 static int can_open_cached(struct nfs4_state *state, fmode_t mode, int open_mode)
1083 {
1084         int ret = 0;
1085
1086         if (open_mode & (O_EXCL|O_TRUNC))
1087                 goto out;
1088         switch (mode & (FMODE_READ|FMODE_WRITE)) {
1089                 case FMODE_READ:
1090                         ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0
1091                                 && state->n_rdonly != 0;
1092                         break;
1093                 case FMODE_WRITE:
1094                         ret |= test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0
1095                                 && state->n_wronly != 0;
1096                         break;
1097                 case FMODE_READ|FMODE_WRITE:
1098                         ret |= test_bit(NFS_O_RDWR_STATE, &state->flags) != 0
1099                                 && state->n_rdwr != 0;
1100         }
1101 out:
1102         return ret;
1103 }
1104
1105 static int can_open_delegated(struct nfs_delegation *delegation, fmode_t fmode)
1106 {
1107         if (delegation == NULL)
1108                 return 0;
1109         if ((delegation->type & fmode) != fmode)
1110                 return 0;
1111         if (test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags))
1112                 return 0;
1113         if (test_bit(NFS_DELEGATION_RETURNING, &delegation->flags))
1114                 return 0;
1115         nfs_mark_delegation_referenced(delegation);
1116         return 1;
1117 }
1118
1119 static void update_open_stateflags(struct nfs4_state *state, fmode_t fmode)
1120 {
1121         switch (fmode) {
1122                 case FMODE_WRITE:
1123                         state->n_wronly++;
1124                         break;
1125                 case FMODE_READ:
1126                         state->n_rdonly++;
1127                         break;
1128                 case FMODE_READ|FMODE_WRITE:
1129                         state->n_rdwr++;
1130         }
1131         nfs4_state_set_mode_locked(state, state->state | fmode);
1132 }
1133
1134 static void nfs_set_open_stateid_locked(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
1135 {
1136         if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
1137                 nfs4_stateid_copy(&state->stateid, stateid);
1138         nfs4_stateid_copy(&state->open_stateid, stateid);
1139         set_bit(NFS_OPEN_STATE, &state->flags);
1140         switch (fmode) {
1141                 case FMODE_READ:
1142                         set_bit(NFS_O_RDONLY_STATE, &state->flags);
1143                         break;
1144                 case FMODE_WRITE:
1145                         set_bit(NFS_O_WRONLY_STATE, &state->flags);
1146                         break;
1147                 case FMODE_READ|FMODE_WRITE:
1148                         set_bit(NFS_O_RDWR_STATE, &state->flags);
1149         }
1150 }
1151
1152 static void nfs_set_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, fmode_t fmode)
1153 {
1154         write_seqlock(&state->seqlock);
1155         nfs_set_open_stateid_locked(state, stateid, fmode);
1156         write_sequnlock(&state->seqlock);
1157 }
1158
1159 static void __update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, const nfs4_stateid *deleg_stateid, fmode_t fmode)
1160 {
1161         /*
1162          * Protect the call to nfs4_state_set_mode_locked and
1163          * serialise the stateid update
1164          */
1165         write_seqlock(&state->seqlock);
1166         if (deleg_stateid != NULL) {
1167                 nfs4_stateid_copy(&state->stateid, deleg_stateid);
1168                 set_bit(NFS_DELEGATED_STATE, &state->flags);
1169         }
1170         if (open_stateid != NULL)
1171                 nfs_set_open_stateid_locked(state, open_stateid, fmode);
1172         write_sequnlock(&state->seqlock);
1173         spin_lock(&state->owner->so_lock);
1174         update_open_stateflags(state, fmode);
1175         spin_unlock(&state->owner->so_lock);
1176 }
1177
1178 static int update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, nfs4_stateid *delegation, fmode_t fmode)
1179 {
1180         struct nfs_inode *nfsi = NFS_I(state->inode);
1181         struct nfs_delegation *deleg_cur;
1182         int ret = 0;
1183
1184         fmode &= (FMODE_READ|FMODE_WRITE);
1185
1186         rcu_read_lock();
1187         deleg_cur = rcu_dereference(nfsi->delegation);
1188         if (deleg_cur == NULL)
1189                 goto no_delegation;
1190
1191         spin_lock(&deleg_cur->lock);
1192         if (rcu_dereference(nfsi->delegation) != deleg_cur ||
1193            test_bit(NFS_DELEGATION_RETURNING, &deleg_cur->flags) ||
1194             (deleg_cur->type & fmode) != fmode)
1195                 goto no_delegation_unlock;
1196
1197         if (delegation == NULL)
1198                 delegation = &deleg_cur->stateid;
1199         else if (!nfs4_stateid_match(&deleg_cur->stateid, delegation))
1200                 goto no_delegation_unlock;
1201
1202         nfs_mark_delegation_referenced(deleg_cur);
1203         __update_open_stateid(state, open_stateid, &deleg_cur->stateid, fmode);
1204         ret = 1;
1205 no_delegation_unlock:
1206         spin_unlock(&deleg_cur->lock);
1207 no_delegation:
1208         rcu_read_unlock();
1209
1210         if (!ret && open_stateid != NULL) {
1211                 __update_open_stateid(state, open_stateid, NULL, fmode);
1212                 ret = 1;
1213         }
1214
1215         return ret;
1216 }
1217
1218
1219 static void nfs4_return_incompatible_delegation(struct inode *inode, fmode_t fmode)
1220 {
1221         struct nfs_delegation *delegation;
1222
1223         rcu_read_lock();
1224         delegation = rcu_dereference(NFS_I(inode)->delegation);
1225         if (delegation == NULL || (delegation->type & fmode) == fmode) {
1226                 rcu_read_unlock();
1227                 return;
1228         }
1229         rcu_read_unlock();
1230         nfs4_inode_return_delegation(inode);
1231 }
1232
1233 static struct nfs4_state *nfs4_try_open_cached(struct nfs4_opendata *opendata)
1234 {
1235         struct nfs4_state *state = opendata->state;
1236         struct nfs_inode *nfsi = NFS_I(state->inode);
1237         struct nfs_delegation *delegation;
1238         int open_mode = opendata->o_arg.open_flags;
1239         fmode_t fmode = opendata->o_arg.fmode;
1240         nfs4_stateid stateid;
1241         int ret = -EAGAIN;
1242
1243         for (;;) {
1244                 if (can_open_cached(state, fmode, open_mode)) {
1245                         spin_lock(&state->owner->so_lock);
1246                         if (can_open_cached(state, fmode, open_mode)) {
1247                                 update_open_stateflags(state, fmode);
1248                                 spin_unlock(&state->owner->so_lock);
1249                                 goto out_return_state;
1250                         }
1251                         spin_unlock(&state->owner->so_lock);
1252                 }
1253                 rcu_read_lock();
1254                 delegation = rcu_dereference(nfsi->delegation);
1255                 if (!can_open_delegated(delegation, fmode)) {
1256                         rcu_read_unlock();
1257                         break;
1258                 }
1259                 /* Save the delegation */
1260                 nfs4_stateid_copy(&stateid, &delegation->stateid);
1261                 rcu_read_unlock();
1262                 nfs_release_seqid(opendata->o_arg.seqid);
1263                 if (!opendata->is_recover) {
1264                         ret = nfs_may_open(state->inode, state->owner->so_cred, open_mode);
1265                         if (ret != 0)
1266                                 goto out;
1267                 }
1268                 ret = -EAGAIN;
1269
1270                 /* Try to update the stateid using the delegation */
1271                 if (update_open_stateid(state, NULL, &stateid, fmode))
1272                         goto out_return_state;
1273         }
1274 out:
1275         return ERR_PTR(ret);
1276 out_return_state:
1277         atomic_inc(&state->count);
1278         return state;
1279 }
1280
1281 static void
1282 nfs4_opendata_check_deleg(struct nfs4_opendata *data, struct nfs4_state *state)
1283 {
1284         struct nfs_client *clp = NFS_SERVER(state->inode)->nfs_client;
1285         struct nfs_delegation *delegation;
1286         int delegation_flags = 0;
1287
1288         rcu_read_lock();
1289         delegation = rcu_dereference(NFS_I(state->inode)->delegation);
1290         if (delegation)
1291                 delegation_flags = delegation->flags;
1292         rcu_read_unlock();
1293         if (data->o_arg.claim == NFS4_OPEN_CLAIM_DELEGATE_CUR) {
1294                 pr_err_ratelimited("NFS: Broken NFSv4 server %s is "
1295                                    "returning a delegation for "
1296                                    "OPEN(CLAIM_DELEGATE_CUR)\n",
1297                                    clp->cl_hostname);
1298         } else if ((delegation_flags & 1UL<<NFS_DELEGATION_NEED_RECLAIM) == 0)
1299                 nfs_inode_set_delegation(state->inode,
1300                                          data->owner->so_cred,
1301                                          &data->o_res);
1302         else
1303                 nfs_inode_reclaim_delegation(state->inode,
1304                                              data->owner->so_cred,
1305                                              &data->o_res);
1306 }
1307
1308 /*
1309  * Check the inode attributes against the CLAIM_PREVIOUS returned attributes
1310  * and update the nfs4_state.
1311  */
1312 static struct nfs4_state *
1313 _nfs4_opendata_reclaim_to_nfs4_state(struct nfs4_opendata *data)
1314 {
1315         struct inode *inode = data->state->inode;
1316         struct nfs4_state *state = data->state;
1317         int ret;
1318
1319         if (!data->rpc_done) {
1320                 ret = data->rpc_status;
1321                 goto err;
1322         }
1323
1324         ret = -ESTALE;
1325         if (!(data->f_attr.valid & NFS_ATTR_FATTR_TYPE) ||
1326             !(data->f_attr.valid & NFS_ATTR_FATTR_FILEID) ||
1327             !(data->f_attr.valid & NFS_ATTR_FATTR_CHANGE))
1328                 goto err;
1329
1330         ret = -ENOMEM;
1331         state = nfs4_get_open_state(inode, data->owner);
1332         if (state == NULL)
1333                 goto err;
1334
1335         ret = nfs_refresh_inode(inode, &data->f_attr);
1336         if (ret)
1337                 goto err;
1338
1339         nfs_setsecurity(inode, &data->f_attr, data->f_label);
1340
1341         if (data->o_res.delegation_type != 0)
1342                 nfs4_opendata_check_deleg(data, state);
1343         update_open_stateid(state, &data->o_res.stateid, NULL,
1344                             data->o_arg.fmode);
1345
1346         return state;
1347 err:
1348         return ERR_PTR(ret);
1349
1350 }
1351
1352 static struct nfs4_state *
1353 _nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
1354 {
1355         struct inode *inode;
1356         struct nfs4_state *state = NULL;
1357         int ret;
1358
1359         if (!data->rpc_done) {
1360                 state = nfs4_try_open_cached(data);
1361                 goto out;
1362         }
1363
1364         ret = -EAGAIN;
1365         if (!(data->f_attr.valid & NFS_ATTR_FATTR))
1366                 goto err;
1367         inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr, data->f_label);
1368         ret = PTR_ERR(inode);
1369         if (IS_ERR(inode))
1370                 goto err;
1371         ret = -ENOMEM;
1372         state = nfs4_get_open_state(inode, data->owner);
1373         if (state == NULL)
1374                 goto err_put_inode;
1375         if (data->o_res.delegation_type != 0)
1376                 nfs4_opendata_check_deleg(data, state);
1377         update_open_stateid(state, &data->o_res.stateid, NULL,
1378                         data->o_arg.fmode);
1379         iput(inode);
1380 out:
1381         nfs_release_seqid(data->o_arg.seqid);
1382         return state;
1383 err_put_inode:
1384         iput(inode);
1385 err:
1386         return ERR_PTR(ret);
1387 }
1388
1389 static struct nfs4_state *
1390 nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
1391 {
1392         if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS)
1393                 return _nfs4_opendata_reclaim_to_nfs4_state(data);
1394         return _nfs4_opendata_to_nfs4_state(data);
1395 }
1396
1397 static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
1398 {
1399         struct nfs_inode *nfsi = NFS_I(state->inode);
1400         struct nfs_open_context *ctx;
1401
1402         spin_lock(&state->inode->i_lock);
1403         list_for_each_entry(ctx, &nfsi->open_files, list) {
1404                 if (ctx->state != state)
1405                         continue;
1406                 get_nfs_open_context(ctx);
1407                 spin_unlock(&state->inode->i_lock);
1408                 return ctx;
1409         }
1410         spin_unlock(&state->inode->i_lock);
1411         return ERR_PTR(-ENOENT);
1412 }
1413
1414 static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx,
1415                 struct nfs4_state *state, enum open_claim_type4 claim)
1416 {
1417         struct nfs4_opendata *opendata;
1418
1419         opendata = nfs4_opendata_alloc(ctx->dentry, state->owner, 0, 0,
1420                         NULL, NULL, claim, GFP_NOFS);
1421         if (opendata == NULL)
1422                 return ERR_PTR(-ENOMEM);
1423         opendata->state = state;
1424         atomic_inc(&state->count);
1425         return opendata;
1426 }
1427
1428 static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, fmode_t fmode, struct nfs4_state **res)
1429 {
1430         struct nfs4_state *newstate;
1431         int ret;
1432
1433         opendata->o_arg.open_flags = 0;
1434         opendata->o_arg.fmode = fmode;
1435         memset(&opendata->o_res, 0, sizeof(opendata->o_res));
1436         memset(&opendata->c_res, 0, sizeof(opendata->c_res));
1437         nfs4_init_opendata_res(opendata);
1438         ret = _nfs4_recover_proc_open(opendata);
1439         if (ret != 0)
1440                 return ret; 
1441         newstate = nfs4_opendata_to_nfs4_state(opendata);
1442         if (IS_ERR(newstate))
1443                 return PTR_ERR(newstate);
1444         nfs4_close_state(newstate, fmode);
1445         *res = newstate;
1446         return 0;
1447 }
1448
1449 static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
1450 {
1451         struct nfs4_state *newstate;
1452         int ret;
1453
1454         /* memory barrier prior to reading state->n_* */
1455         clear_bit(NFS_DELEGATED_STATE, &state->flags);
1456         clear_bit(NFS_OPEN_STATE, &state->flags);
1457         smp_rmb();
1458         if (state->n_rdwr != 0) {
1459                 clear_bit(NFS_O_RDWR_STATE, &state->flags);
1460                 ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &newstate);
1461                 if (ret != 0)
1462                         return ret;
1463                 if (newstate != state)
1464                         return -ESTALE;
1465         }
1466         if (state->n_wronly != 0) {
1467                 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
1468                 ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &newstate);
1469                 if (ret != 0)
1470                         return ret;
1471                 if (newstate != state)
1472                         return -ESTALE;
1473         }
1474         if (state->n_rdonly != 0) {
1475                 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
1476                 ret = nfs4_open_recover_helper(opendata, FMODE_READ, &newstate);
1477                 if (ret != 0)
1478                         return ret;
1479                 if (newstate != state)
1480                         return -ESTALE;
1481         }
1482         /*
1483          * We may have performed cached opens for all three recoveries.
1484          * Check if we need to update the current stateid.
1485          */
1486         if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0 &&
1487             !nfs4_stateid_match(&state->stateid, &state->open_stateid)) {
1488                 write_seqlock(&state->seqlock);
1489                 if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
1490                         nfs4_stateid_copy(&state->stateid, &state->open_stateid);
1491                 write_sequnlock(&state->seqlock);
1492         }
1493         return 0;
1494 }
1495
1496 /*
1497  * OPEN_RECLAIM:
1498  *      reclaim state on the server after a reboot.
1499  */
1500 static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1501 {
1502         struct nfs_delegation *delegation;
1503         struct nfs4_opendata *opendata;
1504         fmode_t delegation_type = 0;
1505         int status;
1506
1507         opendata = nfs4_open_recoverdata_alloc(ctx, state,
1508                         NFS4_OPEN_CLAIM_PREVIOUS);
1509         if (IS_ERR(opendata))
1510                 return PTR_ERR(opendata);
1511         rcu_read_lock();
1512         delegation = rcu_dereference(NFS_I(state->inode)->delegation);
1513         if (delegation != NULL && test_bit(NFS_DELEGATION_NEED_RECLAIM, &delegation->flags) != 0)
1514                 delegation_type = delegation->type;
1515         rcu_read_unlock();
1516         opendata->o_arg.u.delegation_type = delegation_type;
1517         status = nfs4_open_recover(opendata, state);
1518         nfs4_opendata_put(opendata);
1519         return status;
1520 }
1521
1522 static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
1523 {
1524         struct nfs_server *server = NFS_SERVER(state->inode);
1525         struct nfs4_exception exception = { };
1526         int err;
1527         do {
1528                 err = _nfs4_do_open_reclaim(ctx, state);
1529                 trace_nfs4_open_reclaim(ctx, 0, err);
1530                 if (nfs4_clear_cap_atomic_open_v1(server, err, &exception))
1531                         continue;
1532                 if (err != -NFS4ERR_DELAY)
1533                         break;
1534                 nfs4_handle_exception(server, err, &exception);
1535         } while (exception.retry);
1536         return err;
1537 }
1538
1539 static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
1540 {
1541         struct nfs_open_context *ctx;
1542         int ret;
1543
1544         ctx = nfs4_state_find_open_context(state);
1545         if (IS_ERR(ctx))
1546                 return -EAGAIN;
1547         ret = nfs4_do_open_reclaim(ctx, state);
1548         put_nfs_open_context(ctx);
1549         return ret;
1550 }
1551
1552 static int nfs4_handle_delegation_recall_error(struct nfs_server *server, struct nfs4_state *state, const nfs4_stateid *stateid, int err)
1553 {
1554         switch (err) {
1555                 default:
1556                         printk(KERN_ERR "NFS: %s: unhandled error "
1557                                         "%d.\n", __func__, err);
1558                 case 0:
1559                 case -ENOENT:
1560                 case -ESTALE:
1561                         break;
1562                 case -NFS4ERR_BADSESSION:
1563                 case -NFS4ERR_BADSLOT:
1564                 case -NFS4ERR_BAD_HIGH_SLOT:
1565                 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1566                 case -NFS4ERR_DEADSESSION:
1567                         set_bit(NFS_DELEGATED_STATE, &state->flags);
1568                         nfs4_schedule_session_recovery(server->nfs_client->cl_session, err);
1569                         return -EAGAIN;
1570                 case -NFS4ERR_STALE_CLIENTID:
1571                 case -NFS4ERR_STALE_STATEID:
1572                         set_bit(NFS_DELEGATED_STATE, &state->flags);
1573                 case -NFS4ERR_EXPIRED:
1574                         /* Don't recall a delegation if it was lost */
1575                         nfs4_schedule_lease_recovery(server->nfs_client);
1576                         return -EAGAIN;
1577                 case -NFS4ERR_DELEG_REVOKED:
1578                 case -NFS4ERR_ADMIN_REVOKED:
1579                 case -NFS4ERR_BAD_STATEID:
1580                 case -NFS4ERR_OPENMODE:
1581                         nfs_inode_find_state_and_recover(state->inode,
1582                                         stateid);
1583                         nfs4_schedule_stateid_recovery(server, state);
1584                         return 0;
1585                 case -NFS4ERR_DELAY:
1586                 case -NFS4ERR_GRACE:
1587                         set_bit(NFS_DELEGATED_STATE, &state->flags);
1588                         ssleep(1);
1589                         return -EAGAIN;
1590                 case -ENOMEM:
1591                 case -NFS4ERR_DENIED:
1592                         /* kill_proc(fl->fl_pid, SIGLOST, 1); */
1593                         return 0;
1594         }
1595         return err;
1596 }
1597
1598 int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
1599 {
1600         struct nfs_server *server = NFS_SERVER(state->inode);
1601         struct nfs4_opendata *opendata;
1602         int err;
1603
1604         opendata = nfs4_open_recoverdata_alloc(ctx, state,
1605                         NFS4_OPEN_CLAIM_DELEG_CUR_FH);
1606         if (IS_ERR(opendata))
1607                 return PTR_ERR(opendata);
1608         nfs4_stateid_copy(&opendata->o_arg.u.delegation, stateid);
1609         err = nfs4_open_recover(opendata, state);
1610         nfs4_opendata_put(opendata);
1611         return nfs4_handle_delegation_recall_error(server, state, stateid, err);
1612 }
1613
1614 static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata)
1615 {
1616         struct nfs4_opendata *data = calldata;
1617
1618         nfs40_setup_sequence(data->o_arg.server, &data->o_arg.seq_args,
1619                                 &data->o_res.seq_res, task);
1620 }
1621
1622 static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
1623 {
1624         struct nfs4_opendata *data = calldata;
1625
1626         nfs40_sequence_done(task, &data->o_res.seq_res);
1627
1628         data->rpc_status = task->tk_status;
1629         if (data->rpc_status == 0) {
1630                 nfs4_stateid_copy(&data->o_res.stateid, &data->c_res.stateid);
1631                 nfs_confirm_seqid(&data->owner->so_seqid, 0);
1632                 renew_lease(data->o_res.server, data->timestamp);
1633                 data->rpc_done = 1;
1634         }
1635 }
1636
1637 static void nfs4_open_confirm_release(void *calldata)
1638 {
1639         struct nfs4_opendata *data = calldata;
1640         struct nfs4_state *state = NULL;
1641
1642         /* If this request hasn't been cancelled, do nothing */
1643         if (data->cancelled == 0)
1644                 goto out_free;
1645         /* In case of error, no cleanup! */
1646         if (!data->rpc_done)
1647                 goto out_free;
1648         state = nfs4_opendata_to_nfs4_state(data);
1649         if (!IS_ERR(state))
1650                 nfs4_close_state(state, data->o_arg.fmode);
1651 out_free:
1652         nfs4_opendata_put(data);
1653 }
1654
1655 static const struct rpc_call_ops nfs4_open_confirm_ops = {
1656         .rpc_call_prepare = nfs4_open_confirm_prepare,
1657         .rpc_call_done = nfs4_open_confirm_done,
1658         .rpc_release = nfs4_open_confirm_release,
1659 };
1660
1661 /*
1662  * Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
1663  */
1664 static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
1665 {
1666         struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
1667         struct rpc_task *task;
1668         struct  rpc_message msg = {
1669                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
1670                 .rpc_argp = &data->c_arg,
1671                 .rpc_resp = &data->c_res,
1672                 .rpc_cred = data->owner->so_cred,
1673         };
1674         struct rpc_task_setup task_setup_data = {
1675                 .rpc_client = server->client,
1676                 .rpc_message = &msg,
1677                 .callback_ops = &nfs4_open_confirm_ops,
1678                 .callback_data = data,
1679                 .workqueue = nfsiod_workqueue,
1680                 .flags = RPC_TASK_ASYNC,
1681         };
1682         int status;
1683
1684         nfs4_init_sequence(&data->o_arg.seq_args, &data->o_res.seq_res, 1);
1685         kref_get(&data->kref);
1686         data->rpc_done = 0;
1687         data->rpc_status = 0;
1688         data->timestamp = jiffies;
1689         task = rpc_run_task(&task_setup_data);
1690         if (IS_ERR(task))
1691                 return PTR_ERR(task);
1692         status = nfs4_wait_for_completion_rpc_task(task);
1693         if (status != 0) {
1694                 data->cancelled = 1;
1695                 smp_wmb();
1696         } else
1697                 status = data->rpc_status;
1698         rpc_put_task(task);
1699         return status;
1700 }
1701
1702 static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
1703 {
1704         struct nfs4_opendata *data = calldata;
1705         struct nfs4_state_owner *sp = data->owner;
1706         struct nfs_client *clp = sp->so_server->nfs_client;
1707
1708         if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
1709                 goto out_wait;
1710         /*
1711          * Check if we still need to send an OPEN call, or if we can use
1712          * a delegation instead.
1713          */
1714         if (data->state != NULL) {
1715                 struct nfs_delegation *delegation;
1716
1717                 if (can_open_cached(data->state, data->o_arg.fmode, data->o_arg.open_flags))
1718                         goto out_no_action;
1719                 rcu_read_lock();
1720                 delegation = rcu_dereference(NFS_I(data->state->inode)->delegation);
1721                 if (data->o_arg.claim != NFS4_OPEN_CLAIM_DELEGATE_CUR &&
1722                     data->o_arg.claim != NFS4_OPEN_CLAIM_DELEG_CUR_FH &&
1723                     can_open_delegated(delegation, data->o_arg.fmode))
1724                         goto unlock_no_action;
1725                 rcu_read_unlock();
1726         }
1727         /* Update client id. */
1728         data->o_arg.clientid = clp->cl_clientid;
1729         switch (data->o_arg.claim) {
1730         case NFS4_OPEN_CLAIM_PREVIOUS:
1731         case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1732         case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1733                 data->o_arg.open_bitmap = &nfs4_open_noattr_bitmap[0];
1734         case NFS4_OPEN_CLAIM_FH:
1735                 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
1736                 nfs_copy_fh(&data->o_res.fh, data->o_arg.fh);
1737         }
1738         data->timestamp = jiffies;
1739         if (nfs4_setup_sequence(data->o_arg.server,
1740                                 &data->o_arg.seq_args,
1741                                 &data->o_res.seq_res,
1742                                 task) != 0)
1743                 nfs_release_seqid(data->o_arg.seqid);
1744
1745         /* Set the create mode (note dependency on the session type) */
1746         data->o_arg.createmode = NFS4_CREATE_UNCHECKED;
1747         if (data->o_arg.open_flags & O_EXCL) {
1748                 data->o_arg.createmode = NFS4_CREATE_EXCLUSIVE;
1749                 if (nfs4_has_persistent_session(clp))
1750                         data->o_arg.createmode = NFS4_CREATE_GUARDED;
1751                 else if (clp->cl_mvops->minor_version > 0)
1752                         data->o_arg.createmode = NFS4_CREATE_EXCLUSIVE4_1;
1753         }
1754         return;
1755 unlock_no_action:
1756         rcu_read_unlock();
1757 out_no_action:
1758         task->tk_action = NULL;
1759 out_wait:
1760         nfs4_sequence_done(task, &data->o_res.seq_res);
1761 }
1762
1763 static void nfs4_open_done(struct rpc_task *task, void *calldata)
1764 {
1765         struct nfs4_opendata *data = calldata;
1766
1767         data->rpc_status = task->tk_status;
1768
1769         if (!nfs4_sequence_done(task, &data->o_res.seq_res))
1770                 return;
1771
1772         if (task->tk_status == 0) {
1773                 if (data->o_res.f_attr->valid & NFS_ATTR_FATTR_TYPE) {
1774                         switch (data->o_res.f_attr->mode & S_IFMT) {
1775                         case S_IFREG:
1776                                 break;
1777                         case S_IFLNK:
1778                                 data->rpc_status = -ELOOP;
1779                                 break;
1780                         case S_IFDIR:
1781                                 data->rpc_status = -EISDIR;
1782                                 break;
1783                         default:
1784                                 data->rpc_status = -ENOTDIR;
1785                         }
1786                 }
1787                 renew_lease(data->o_res.server, data->timestamp);
1788                 if (!(data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM))
1789                         nfs_confirm_seqid(&data->owner->so_seqid, 0);
1790         }
1791         data->rpc_done = 1;
1792 }
1793
1794 static void nfs4_open_release(void *calldata)
1795 {
1796         struct nfs4_opendata *data = calldata;
1797         struct nfs4_state *state = NULL;
1798
1799         /* If this request hasn't been cancelled, do nothing */
1800         if (data->cancelled == 0)
1801                 goto out_free;
1802         /* In case of error, no cleanup! */
1803         if (data->rpc_status != 0 || !data->rpc_done)
1804                 goto out_free;
1805         /* In case we need an open_confirm, no cleanup! */
1806         if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
1807                 goto out_free;
1808         state = nfs4_opendata_to_nfs4_state(data);
1809         if (!IS_ERR(state))
1810                 nfs4_close_state(state, data->o_arg.fmode);
1811 out_free:
1812         nfs4_opendata_put(data);
1813 }
1814
1815 static const struct rpc_call_ops nfs4_open_ops = {
1816         .rpc_call_prepare = nfs4_open_prepare,
1817         .rpc_call_done = nfs4_open_done,
1818         .rpc_release = nfs4_open_release,
1819 };
1820
1821 static int nfs4_run_open_task(struct nfs4_opendata *data, int isrecover)
1822 {
1823         struct inode *dir = data->dir->d_inode;
1824         struct nfs_server *server = NFS_SERVER(dir);
1825         struct nfs_openargs *o_arg = &data->o_arg;
1826         struct nfs_openres *o_res = &data->o_res;
1827         struct rpc_task *task;
1828         struct rpc_message msg = {
1829                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
1830                 .rpc_argp = o_arg,
1831                 .rpc_resp = o_res,
1832                 .rpc_cred = data->owner->so_cred,
1833         };
1834         struct rpc_task_setup task_setup_data = {
1835                 .rpc_client = server->client,
1836                 .rpc_message = &msg,
1837                 .callback_ops = &nfs4_open_ops,
1838                 .callback_data = data,
1839                 .workqueue = nfsiod_workqueue,
1840                 .flags = RPC_TASK_ASYNC,
1841         };
1842         int status;
1843
1844         nfs4_init_sequence(&o_arg->seq_args, &o_res->seq_res, 1);
1845         kref_get(&data->kref);
1846         data->rpc_done = 0;
1847         data->rpc_status = 0;
1848         data->cancelled = 0;
1849         data->is_recover = 0;
1850         if (isrecover) {
1851                 nfs4_set_sequence_privileged(&o_arg->seq_args);
1852                 data->is_recover = 1;
1853         }
1854         task = rpc_run_task(&task_setup_data);
1855         if (IS_ERR(task))
1856                 return PTR_ERR(task);
1857         status = nfs4_wait_for_completion_rpc_task(task);
1858         if (status != 0) {
1859                 data->cancelled = 1;
1860                 smp_wmb();
1861         } else
1862                 status = data->rpc_status;
1863         rpc_put_task(task);
1864
1865         return status;
1866 }
1867
1868 static int _nfs4_recover_proc_open(struct nfs4_opendata *data)
1869 {
1870         struct inode *dir = data->dir->d_inode;
1871         struct nfs_openres *o_res = &data->o_res;
1872         int status;
1873
1874         status = nfs4_run_open_task(data, 1);
1875         if (status != 0 || !data->rpc_done)
1876                 return status;
1877
1878         nfs_fattr_map_and_free_names(NFS_SERVER(dir), &data->f_attr);
1879
1880         if (o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
1881                 status = _nfs4_proc_open_confirm(data);
1882                 if (status != 0)
1883                         return status;
1884         }
1885
1886         return status;
1887 }
1888
1889 static int nfs4_opendata_access(struct rpc_cred *cred,
1890                                 struct nfs4_opendata *opendata,
1891                                 struct nfs4_state *state, fmode_t fmode,
1892                                 int openflags)
1893 {
1894         struct nfs_access_entry cache;
1895         u32 mask;
1896
1897         /* access call failed or for some reason the server doesn't
1898          * support any access modes -- defer access call until later */
1899         if (opendata->o_res.access_supported == 0)
1900                 return 0;
1901
1902         mask = 0;
1903         /* don't check MAY_WRITE - a newly created file may not have
1904          * write mode bits, but POSIX allows the creating process to write.
1905          * use openflags to check for exec, because fmode won't
1906          * always have FMODE_EXEC set when file open for exec. */
1907         if (openflags & __FMODE_EXEC) {
1908                 /* ONLY check for exec rights */
1909                 mask = MAY_EXEC;
1910         } else if (fmode & FMODE_READ)
1911                 mask = MAY_READ;
1912
1913         cache.cred = cred;
1914         cache.jiffies = jiffies;
1915         nfs_access_set_mask(&cache, opendata->o_res.access_result);
1916         nfs_access_add_cache(state->inode, &cache);
1917
1918         if ((mask & ~cache.mask & (MAY_READ | MAY_EXEC)) == 0)
1919                 return 0;
1920
1921         /* even though OPEN succeeded, access is denied. Close the file */
1922         nfs4_close_state(state, fmode);
1923         return -EACCES;
1924 }
1925
1926 /*
1927  * Note: On error, nfs4_proc_open will free the struct nfs4_opendata
1928  */
1929 static int _nfs4_proc_open(struct nfs4_opendata *data)
1930 {
1931         struct inode *dir = data->dir->d_inode;
1932         struct nfs_server *server = NFS_SERVER(dir);
1933         struct nfs_openargs *o_arg = &data->o_arg;
1934         struct nfs_openres *o_res = &data->o_res;
1935         int status;
1936
1937         status = nfs4_run_open_task(data, 0);
1938         if (!data->rpc_done)
1939                 return status;
1940         if (status != 0) {
1941                 if (status == -NFS4ERR_BADNAME &&
1942                                 !(o_arg->open_flags & O_CREAT))
1943                         return -ENOENT;
1944                 return status;
1945         }
1946
1947         nfs_fattr_map_and_free_names(server, &data->f_attr);
1948
1949         if (o_arg->open_flags & O_CREAT)
1950                 update_changeattr(dir, &o_res->cinfo);
1951         if ((o_res->rflags & NFS4_OPEN_RESULT_LOCKTYPE_POSIX) == 0)
1952                 server->caps &= ~NFS_CAP_POSIX_LOCK;
1953         if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
1954                 status = _nfs4_proc_open_confirm(data);
1955                 if (status != 0)
1956                         return status;
1957         }
1958         if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
1959                 _nfs4_proc_getattr(server, &o_res->fh, o_res->f_attr, o_res->f_label);
1960         return 0;
1961 }
1962
1963 static int nfs4_recover_expired_lease(struct nfs_server *server)
1964 {
1965         return nfs4_client_recover_expired_lease(server->nfs_client);
1966 }
1967
1968 /*
1969  * OPEN_EXPIRED:
1970  *      reclaim state on the server after a network partition.
1971  *      Assumes caller holds the appropriate lock
1972  */
1973 static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1974 {
1975         struct nfs4_opendata *opendata;
1976         int ret;
1977
1978         opendata = nfs4_open_recoverdata_alloc(ctx, state,
1979                         NFS4_OPEN_CLAIM_FH);
1980         if (IS_ERR(opendata))
1981                 return PTR_ERR(opendata);
1982         ret = nfs4_open_recover(opendata, state);
1983         if (ret == -ESTALE)
1984                 d_drop(ctx->dentry);
1985         nfs4_opendata_put(opendata);
1986         return ret;
1987 }
1988
1989 static int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
1990 {
1991         struct nfs_server *server = NFS_SERVER(state->inode);
1992         struct nfs4_exception exception = { };
1993         int err;
1994
1995         do {
1996                 err = _nfs4_open_expired(ctx, state);
1997                 trace_nfs4_open_expired(ctx, 0, err);
1998                 if (nfs4_clear_cap_atomic_open_v1(server, err, &exception))
1999                         continue;
2000                 switch (err) {
2001                 default:
2002                         goto out;
2003                 case -NFS4ERR_GRACE:
2004                 case -NFS4ERR_DELAY:
2005                         nfs4_handle_exception(server, err, &exception);
2006                         err = 0;
2007                 }
2008         } while (exception.retry);
2009 out:
2010         return err;
2011 }
2012
2013 static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
2014 {
2015         struct nfs_open_context *ctx;
2016         int ret;
2017
2018         ctx = nfs4_state_find_open_context(state);
2019         if (IS_ERR(ctx))
2020                 return -EAGAIN;
2021         ret = nfs4_do_open_expired(ctx, state);
2022         put_nfs_open_context(ctx);
2023         return ret;
2024 }
2025
2026 #if defined(CONFIG_NFS_V4_1)
2027 static void nfs41_clear_delegation_stateid(struct nfs4_state *state)
2028 {
2029         struct nfs_server *server = NFS_SERVER(state->inode);
2030         nfs4_stateid *stateid = &state->stateid;
2031         struct nfs_delegation *delegation;
2032         struct rpc_cred *cred = NULL;
2033         int status = -NFS4ERR_BAD_STATEID;
2034
2035         /* If a state reset has been done, test_stateid is unneeded */
2036         if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
2037                 return;
2038
2039         /* Get the delegation credential for use by test/free_stateid */
2040         rcu_read_lock();
2041         delegation = rcu_dereference(NFS_I(state->inode)->delegation);
2042         if (delegation != NULL &&
2043             nfs4_stateid_match(&delegation->stateid, stateid)) {
2044                 cred = get_rpccred(delegation->cred);
2045                 rcu_read_unlock();
2046                 status = nfs41_test_stateid(server, stateid, cred);
2047                 trace_nfs4_test_delegation_stateid(state, NULL, status);
2048         } else
2049                 rcu_read_unlock();
2050
2051         if (status != NFS_OK) {
2052                 /* Free the stateid unless the server explicitly
2053                  * informs us the stateid is unrecognized. */
2054                 if (status != -NFS4ERR_BAD_STATEID)
2055                         nfs41_free_stateid(server, stateid, cred);
2056                 nfs_remove_bad_delegation(state->inode);
2057
2058                 write_seqlock(&state->seqlock);
2059                 nfs4_stateid_copy(&state->stateid, &state->open_stateid);
2060                 write_sequnlock(&state->seqlock);
2061                 clear_bit(NFS_DELEGATED_STATE, &state->flags);
2062         }
2063
2064         if (cred != NULL)
2065                 put_rpccred(cred);
2066 }
2067
2068 /**
2069  * nfs41_check_open_stateid - possibly free an open stateid
2070  *
2071  * @state: NFSv4 state for an inode
2072  *
2073  * Returns NFS_OK if recovery for this stateid is now finished.
2074  * Otherwise a negative NFS4ERR value is returned.
2075  */
2076 static int nfs41_check_open_stateid(struct nfs4_state *state)
2077 {
2078         struct nfs_server *server = NFS_SERVER(state->inode);
2079         nfs4_stateid *stateid = &state->open_stateid;
2080         struct rpc_cred *cred = state->owner->so_cred;
2081         int status;
2082
2083         /* If a state reset has been done, test_stateid is unneeded */
2084         if ((test_bit(NFS_O_RDONLY_STATE, &state->flags) == 0) &&
2085             (test_bit(NFS_O_WRONLY_STATE, &state->flags) == 0) &&
2086             (test_bit(NFS_O_RDWR_STATE, &state->flags) == 0))
2087                 return -NFS4ERR_BAD_STATEID;
2088
2089         status = nfs41_test_stateid(server, stateid, cred);
2090         trace_nfs4_test_open_stateid(state, NULL, status);
2091         if (status != NFS_OK) {
2092                 /* Free the stateid unless the server explicitly
2093                  * informs us the stateid is unrecognized. */
2094                 if (status != -NFS4ERR_BAD_STATEID)
2095                         nfs41_free_stateid(server, stateid, cred);
2096
2097                 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2098                 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2099                 clear_bit(NFS_O_RDWR_STATE, &state->flags);
2100                 clear_bit(NFS_OPEN_STATE, &state->flags);
2101         }
2102         return status;
2103 }
2104
2105 static int nfs41_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
2106 {
2107         int status;
2108
2109         nfs41_clear_delegation_stateid(state);
2110         status = nfs41_check_open_stateid(state);
2111         if (status != NFS_OK)
2112                 status = nfs4_open_expired(sp, state);
2113         return status;
2114 }
2115 #endif
2116
2117 /*
2118  * on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
2119  * fields corresponding to attributes that were used to store the verifier.
2120  * Make sure we clobber those fields in the later setattr call
2121  */
2122 static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
2123 {
2124         if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
2125             !(sattr->ia_valid & ATTR_ATIME_SET))
2126                 sattr->ia_valid |= ATTR_ATIME;
2127
2128         if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
2129             !(sattr->ia_valid & ATTR_MTIME_SET))
2130                 sattr->ia_valid |= ATTR_MTIME;
2131 }
2132
2133 static int _nfs4_open_and_get_state(struct nfs4_opendata *opendata,
2134                 fmode_t fmode,
2135                 int flags,
2136                 struct nfs_open_context *ctx)
2137 {
2138         struct nfs4_state_owner *sp = opendata->owner;
2139         struct nfs_server *server = sp->so_server;
2140         struct dentry *dentry;
2141         struct nfs4_state *state;
2142         unsigned int seq;
2143         int ret;
2144
2145         seq = raw_seqcount_begin(&sp->so_reclaim_seqcount);
2146
2147         ret = _nfs4_proc_open(opendata);
2148         if (ret != 0)
2149                 goto out;
2150
2151         state = nfs4_opendata_to_nfs4_state(opendata);
2152         ret = PTR_ERR(state);
2153         if (IS_ERR(state))
2154                 goto out;
2155         if (server->caps & NFS_CAP_POSIX_LOCK)
2156                 set_bit(NFS_STATE_POSIX_LOCKS, &state->flags);
2157
2158         dentry = opendata->dentry;
2159         if (dentry->d_inode == NULL) {
2160                 /* FIXME: Is this d_drop() ever needed? */
2161                 d_drop(dentry);
2162                 dentry = d_add_unique(dentry, igrab(state->inode));
2163                 if (dentry == NULL) {
2164                         dentry = opendata->dentry;
2165                 } else if (dentry != ctx->dentry) {
2166                         dput(ctx->dentry);
2167                         ctx->dentry = dget(dentry);
2168                 }
2169                 nfs_set_verifier(dentry,
2170                                 nfs_save_change_attribute(opendata->dir->d_inode));
2171         }
2172
2173         ret = nfs4_opendata_access(sp->so_cred, opendata, state, fmode, flags);
2174         if (ret != 0)
2175                 goto out;
2176
2177         ctx->state = state;
2178         if (dentry->d_inode == state->inode) {
2179                 nfs_inode_attach_open_context(ctx);
2180                 if (read_seqcount_retry(&sp->so_reclaim_seqcount, seq))
2181                         nfs4_schedule_stateid_recovery(server, state);
2182         }
2183 out:
2184         return ret;
2185 }
2186
2187 /*
2188  * Returns a referenced nfs4_state
2189  */
2190 static int _nfs4_do_open(struct inode *dir,
2191                         struct nfs_open_context *ctx,
2192                         int flags,
2193                         struct iattr *sattr,
2194                         struct nfs4_label *label)
2195 {
2196         struct nfs4_state_owner  *sp;
2197         struct nfs4_state     *state = NULL;
2198         struct nfs_server       *server = NFS_SERVER(dir);
2199         struct nfs4_opendata *opendata;
2200         struct dentry *dentry = ctx->dentry;
2201         struct rpc_cred *cred = ctx->cred;
2202         struct nfs4_threshold **ctx_th = &ctx->mdsthreshold;
2203         fmode_t fmode = ctx->mode & (FMODE_READ|FMODE_WRITE|FMODE_EXEC);
2204         enum open_claim_type4 claim = NFS4_OPEN_CLAIM_NULL;
2205         struct nfs4_label *olabel = NULL;
2206         int status;
2207
2208         /* Protect against reboot recovery conflicts */
2209         status = -ENOMEM;
2210         sp = nfs4_get_state_owner(server, cred, GFP_KERNEL);
2211         if (sp == NULL) {
2212                 dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
2213                 goto out_err;
2214         }
2215         status = nfs4_recover_expired_lease(server);
2216         if (status != 0)
2217                 goto err_put_state_owner;
2218         if (dentry->d_inode != NULL)
2219                 nfs4_return_incompatible_delegation(dentry->d_inode, fmode);
2220         status = -ENOMEM;
2221         if (dentry->d_inode)
2222                 claim = NFS4_OPEN_CLAIM_FH;
2223         opendata = nfs4_opendata_alloc(dentry, sp, fmode, flags, sattr,
2224                         label, claim, GFP_KERNEL);
2225         if (opendata == NULL)
2226                 goto err_put_state_owner;
2227
2228         if (label) {
2229                 olabel = nfs4_label_alloc(server, GFP_KERNEL);
2230                 if (IS_ERR(olabel)) {
2231                         status = PTR_ERR(olabel);
2232                         goto err_opendata_put;
2233                 }
2234         }
2235
2236         if (ctx_th && server->attr_bitmask[2] & FATTR4_WORD2_MDSTHRESHOLD) {
2237                 opendata->f_attr.mdsthreshold = pnfs_mdsthreshold_alloc();
2238                 if (!opendata->f_attr.mdsthreshold)
2239                         goto err_free_label;
2240                 opendata->o_arg.open_bitmap = &nfs4_pnfs_open_bitmap[0];
2241         }
2242         if (dentry->d_inode != NULL)
2243                 opendata->state = nfs4_get_open_state(dentry->d_inode, sp);
2244
2245         status = _nfs4_open_and_get_state(opendata, fmode, flags, ctx);
2246         if (status != 0)
2247                 goto err_free_label;
2248         state = ctx->state;
2249
2250         if ((opendata->o_arg.open_flags & O_EXCL) &&
2251             (opendata->o_arg.createmode != NFS4_CREATE_GUARDED)) {
2252                 nfs4_exclusive_attrset(opendata, sattr);
2253
2254                 nfs_fattr_init(opendata->o_res.f_attr);
2255                 status = nfs4_do_setattr(state->inode, cred,
2256                                 opendata->o_res.f_attr, sattr,
2257                                 state, label, olabel);
2258                 if (status == 0) {
2259                         nfs_setattr_update_inode(state->inode, sattr);
2260                         nfs_post_op_update_inode(state->inode, opendata->o_res.f_attr);
2261                         nfs_setsecurity(state->inode, opendata->o_res.f_attr, olabel);
2262                 }
2263         }
2264
2265         if (pnfs_use_threshold(ctx_th, opendata->f_attr.mdsthreshold, server))
2266                 *ctx_th = opendata->f_attr.mdsthreshold;
2267         else
2268                 kfree(opendata->f_attr.mdsthreshold);
2269         opendata->f_attr.mdsthreshold = NULL;
2270
2271         nfs4_label_free(olabel);
2272
2273         nfs4_opendata_put(opendata);
2274         nfs4_put_state_owner(sp);
2275         return 0;
2276 err_free_label:
2277         nfs4_label_free(olabel);
2278 err_opendata_put:
2279         kfree(opendata->f_attr.mdsthreshold);
2280         nfs4_opendata_put(opendata);
2281 err_put_state_owner:
2282         nfs4_put_state_owner(sp);
2283 out_err:
2284         return status;
2285 }
2286
2287
2288 static struct nfs4_state *nfs4_do_open(struct inode *dir,
2289                                         struct nfs_open_context *ctx,
2290                                         int flags,
2291                                         struct iattr *sattr,
2292                                         struct nfs4_label *label)
2293 {
2294         struct nfs_server *server = NFS_SERVER(dir);
2295         struct nfs4_exception exception = { };
2296         struct nfs4_state *res;
2297         int status;
2298
2299         do {
2300                 status = _nfs4_do_open(dir, ctx, flags, sattr, label);
2301                 res = ctx->state;
2302                 trace_nfs4_open_file(ctx, flags, status);
2303                 if (status == 0)
2304                         break;
2305                 /* NOTE: BAD_SEQID means the server and client disagree about the
2306                  * book-keeping w.r.t. state-changing operations
2307                  * (OPEN/CLOSE/LOCK/LOCKU...)
2308                  * It is actually a sign of a bug on the client or on the server.
2309                  *
2310                  * If we receive a BAD_SEQID error in the particular case of
2311                  * doing an OPEN, we assume that nfs_increment_open_seqid() will
2312                  * have unhashed the old state_owner for us, and that we can
2313                  * therefore safely retry using a new one. We should still warn
2314                  * the user though...
2315                  */
2316                 if (status == -NFS4ERR_BAD_SEQID) {
2317                         pr_warn_ratelimited("NFS: v4 server %s "
2318                                         " returned a bad sequence-id error!\n",
2319                                         NFS_SERVER(dir)->nfs_client->cl_hostname);
2320                         exception.retry = 1;
2321                         continue;
2322                 }
2323                 /*
2324                  * BAD_STATEID on OPEN means that the server cancelled our
2325                  * state before it received the OPEN_CONFIRM.
2326                  * Recover by retrying the request as per the discussion
2327                  * on Page 181 of RFC3530.
2328                  */
2329                 if (status == -NFS4ERR_BAD_STATEID) {
2330                         exception.retry = 1;
2331                         continue;
2332                 }
2333                 if (status == -EAGAIN) {
2334                         /* We must have found a delegation */
2335                         exception.retry = 1;
2336                         continue;
2337                 }
2338                 if (nfs4_clear_cap_atomic_open_v1(server, status, &exception))
2339                         continue;
2340                 res = ERR_PTR(nfs4_handle_exception(server,
2341                                         status, &exception));
2342         } while (exception.retry);
2343         return res;
2344 }
2345
2346 static int _nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
2347                             struct nfs_fattr *fattr, struct iattr *sattr,
2348                             struct nfs4_state *state, struct nfs4_label *ilabel,
2349                             struct nfs4_label *olabel)
2350 {
2351         struct nfs_server *server = NFS_SERVER(inode);
2352         struct nfs_setattrargs  arg = {
2353                 .fh             = NFS_FH(inode),
2354                 .iap            = sattr,
2355                 .server         = server,
2356                 .bitmask = server->attr_bitmask,
2357                 .label          = ilabel,
2358         };
2359         struct nfs_setattrres  res = {
2360                 .fattr          = fattr,
2361                 .label          = olabel,
2362                 .server         = server,
2363         };
2364         struct rpc_message msg = {
2365                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
2366                 .rpc_argp       = &arg,
2367                 .rpc_resp       = &res,
2368                 .rpc_cred       = cred,
2369         };
2370         unsigned long timestamp = jiffies;
2371         fmode_t fmode;
2372         bool truncate;
2373         int status;
2374
2375         arg.bitmask = nfs4_bitmask(server, ilabel);
2376         if (ilabel)
2377                 arg.bitmask = nfs4_bitmask(server, olabel);
2378
2379         nfs_fattr_init(fattr);
2380
2381         /* Servers should only apply open mode checks for file size changes */
2382         truncate = (sattr->ia_valid & ATTR_SIZE) ? true : false;
2383         fmode = truncate ? FMODE_WRITE : FMODE_READ;
2384
2385         if (nfs4_copy_delegation_stateid(&arg.stateid, inode, fmode)) {
2386                 /* Use that stateid */
2387         } else if (truncate && state != NULL && nfs4_valid_open_stateid(state)) {
2388                 struct nfs_lockowner lockowner = {
2389                         .l_owner = current->files,
2390                         .l_pid = current->tgid,
2391                 };
2392                 nfs4_select_rw_stateid(&arg.stateid, state, FMODE_WRITE,
2393                                 &lockowner);
2394         } else
2395                 nfs4_stateid_copy(&arg.stateid, &zero_stateid);
2396
2397         status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
2398         if (status == 0 && state != NULL)
2399                 renew_lease(server, timestamp);
2400         return status;
2401 }
2402
2403 static int nfs4_do_setattr(struct inode *inode, struct rpc_cred *cred,
2404                            struct nfs_fattr *fattr, struct iattr *sattr,
2405                            struct nfs4_state *state, struct nfs4_label *ilabel,
2406                            struct nfs4_label *olabel)
2407 {
2408         struct nfs_server *server = NFS_SERVER(inode);
2409         struct nfs4_exception exception = {
2410                 .state = state,
2411                 .inode = inode,
2412         };
2413         int err;
2414         do {
2415                 err = _nfs4_do_setattr(inode, cred, fattr, sattr, state, ilabel, olabel);
2416                 trace_nfs4_setattr(inode, err);
2417                 switch (err) {
2418                 case -NFS4ERR_OPENMODE:
2419                         if (!(sattr->ia_valid & ATTR_SIZE)) {
2420                                 pr_warn_once("NFSv4: server %s is incorrectly "
2421                                                 "applying open mode checks to "
2422                                                 "a SETATTR that is not "
2423                                                 "changing file size.\n",
2424                                                 server->nfs_client->cl_hostname);
2425                         }
2426                         if (state && !(state->state & FMODE_WRITE)) {
2427                                 err = -EBADF;
2428                                 if (sattr->ia_valid & ATTR_OPEN)
2429                                         err = -EACCES;
2430                                 goto out;
2431                         }
2432                 }
2433                 err = nfs4_handle_exception(server, err, &exception);
2434         } while (exception.retry);
2435 out:
2436         return err;
2437 }
2438
2439 struct nfs4_closedata {
2440         struct inode *inode;
2441         struct nfs4_state *state;
2442         struct nfs_closeargs arg;
2443         struct nfs_closeres res;
2444         struct nfs_fattr fattr;
2445         unsigned long timestamp;
2446         bool roc;
2447         u32 roc_barrier;
2448 };
2449
2450 static void nfs4_free_closedata(void *data)
2451 {
2452         struct nfs4_closedata *calldata = data;
2453         struct nfs4_state_owner *sp = calldata->state->owner;
2454         struct super_block *sb = calldata->state->inode->i_sb;
2455
2456         if (calldata->roc)
2457                 pnfs_roc_release(calldata->state->inode);
2458         nfs4_put_open_state(calldata->state);
2459         nfs_free_seqid(calldata->arg.seqid);
2460         nfs4_put_state_owner(sp);
2461         nfs_sb_deactive(sb);
2462         kfree(calldata);
2463 }
2464
2465 static void nfs4_close_clear_stateid_flags(struct nfs4_state *state,
2466                 fmode_t fmode)
2467 {
2468         spin_lock(&state->owner->so_lock);
2469         clear_bit(NFS_O_RDWR_STATE, &state->flags);
2470         switch (fmode & (FMODE_READ|FMODE_WRITE)) {
2471         case FMODE_WRITE:
2472                 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2473                 break;
2474         case FMODE_READ:
2475                 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2476                 break;
2477         case 0:
2478                 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
2479                 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
2480                 clear_bit(NFS_OPEN_STATE, &state->flags);
2481         }
2482         spin_unlock(&state->owner->so_lock);
2483 }
2484
2485 static void nfs4_close_done(struct rpc_task *task, void *data)
2486 {
2487         struct nfs4_closedata *calldata = data;
2488         struct nfs4_state *state = calldata->state;
2489         struct nfs_server *server = NFS_SERVER(calldata->inode);
2490
2491         dprintk("%s: begin!\n", __func__);
2492         if (!nfs4_sequence_done(task, &calldata->res.seq_res))
2493                 return;
2494         trace_nfs4_close(state, &calldata->arg, &calldata->res, task->tk_status);
2495         /* hmm. we are done with the inode, and in the process of freeing
2496          * the state_owner. we keep this around to process errors
2497          */
2498         switch (task->tk_status) {
2499                 case 0:
2500                         if (calldata->roc)
2501                                 pnfs_roc_set_barrier(state->inode,
2502                                                      calldata->roc_barrier);
2503                         nfs_set_open_stateid(state, &calldata->res.stateid, 0);
2504                         renew_lease(server, calldata->timestamp);
2505                         nfs4_close_clear_stateid_flags(state,
2506                                         calldata->arg.fmode);
2507                         break;
2508                 case -NFS4ERR_STALE_STATEID:
2509                 case -NFS4ERR_OLD_STATEID:
2510                 case -NFS4ERR_BAD_STATEID:
2511                 case -NFS4ERR_EXPIRED:
2512                         if (calldata->arg.fmode == 0)
2513                                 break;
2514                 default:
2515                         if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
2516                                 rpc_restart_call_prepare(task);
2517         }
2518         nfs_release_seqid(calldata->arg.seqid);
2519         nfs_refresh_inode(calldata->inode, calldata->res.fattr);
2520         dprintk("%s: done, ret = %d!\n", __func__, task->tk_status);
2521 }
2522
2523 static void nfs4_close_prepare(struct rpc_task *task, void *data)
2524 {
2525         struct nfs4_closedata *calldata = data;
2526         struct nfs4_state *state = calldata->state;
2527         struct inode *inode = calldata->inode;
2528         int call_close = 0;
2529
2530         dprintk("%s: begin!\n", __func__);
2531         if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
2532                 goto out_wait;
2533
2534         task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
2535         calldata->arg.fmode = FMODE_READ|FMODE_WRITE;
2536         spin_lock(&state->owner->so_lock);
2537         /* Calculate the change in open mode */
2538         if (state->n_rdwr == 0) {
2539                 if (state->n_rdonly == 0) {
2540                         call_close |= test_bit(NFS_O_RDONLY_STATE, &state->flags);
2541                         call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2542                         calldata->arg.fmode &= ~FMODE_READ;
2543                 }
2544                 if (state->n_wronly == 0) {
2545                         call_close |= test_bit(NFS_O_WRONLY_STATE, &state->flags);
2546                         call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
2547                         calldata->arg.fmode &= ~FMODE_WRITE;
2548                 }
2549         }
2550         if (!nfs4_valid_open_stateid(state))
2551                 call_close = 0;
2552         spin_unlock(&state->owner->so_lock);
2553
2554         if (!call_close) {
2555                 /* Note: exit _without_ calling nfs4_close_done */
2556                 goto out_no_action;
2557         }
2558
2559         if (calldata->arg.fmode == 0) {
2560                 task->tk_msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE];
2561                 if (calldata->roc &&
2562                     pnfs_roc_drain(inode, &calldata->roc_barrier, task)) {
2563                         nfs_release_seqid(calldata->arg.seqid);
2564                         goto out_wait;
2565                     }
2566         }
2567
2568         nfs_fattr_init(calldata->res.fattr);
2569         calldata->timestamp = jiffies;
2570         if (nfs4_setup_sequence(NFS_SERVER(inode),
2571                                 &calldata->arg.seq_args,
2572                                 &calldata->res.seq_res,
2573                                 task) != 0)
2574                 nfs_release_seqid(calldata->arg.seqid);
2575         dprintk("%s: done!\n", __func__);
2576         return;
2577 out_no_action:
2578         task->tk_action = NULL;
2579 out_wait:
2580         nfs4_sequence_done(task, &calldata->res.seq_res);
2581 }
2582
2583 static const struct rpc_call_ops nfs4_close_ops = {
2584         .rpc_call_prepare = nfs4_close_prepare,
2585         .rpc_call_done = nfs4_close_done,
2586         .rpc_release = nfs4_free_closedata,
2587 };
2588
2589 /* 
2590  * It is possible for data to be read/written from a mem-mapped file 
2591  * after the sys_close call (which hits the vfs layer as a flush).
2592  * This means that we can't safely call nfsv4 close on a file until 
2593  * the inode is cleared. This in turn means that we are not good
2594  * NFSv4 citizens - we do not indicate to the server to update the file's 
2595  * share state even when we are done with one of the three share 
2596  * stateid's in the inode.
2597  *
2598  * NOTE: Caller must be holding the sp->so_owner semaphore!
2599  */
2600 int nfs4_do_close(struct nfs4_state *state, gfp_t gfp_mask, int wait)
2601 {
2602         struct nfs_server *server = NFS_SERVER(state->inode);
2603         struct nfs4_closedata *calldata;
2604         struct nfs4_state_owner *sp = state->owner;
2605         struct rpc_task *task;
2606         struct rpc_message msg = {
2607                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
2608                 .rpc_cred = state->owner->so_cred,
2609         };
2610         struct rpc_task_setup task_setup_data = {
2611                 .rpc_client = server->client,
2612                 .rpc_message = &msg,
2613                 .callback_ops = &nfs4_close_ops,
2614                 .workqueue = nfsiod_workqueue,
2615                 .flags = RPC_TASK_ASYNC,
2616         };
2617         int status = -ENOMEM;
2618
2619         nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_CLEANUP,
2620                 &task_setup_data.rpc_client, &msg);
2621
2622         calldata = kzalloc(sizeof(*calldata), gfp_mask);
2623         if (calldata == NULL)
2624                 goto out;
2625         nfs4_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 1);
2626         calldata->inode = state->inode;
2627         calldata->state = state;
2628         calldata->arg.fh = NFS_FH(state->inode);
2629         calldata->arg.stateid = &state->open_stateid;
2630         /* Serialization for the sequence id */
2631         calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid, gfp_mask);
2632         if (calldata->arg.seqid == NULL)
2633                 goto out_free_calldata;
2634         calldata->arg.fmode = 0;
2635         calldata->arg.bitmask = server->cache_consistency_bitmask;
2636         calldata->res.fattr = &calldata->fattr;
2637         calldata->res.seqid = calldata->arg.seqid;
2638         calldata->res.server = server;
2639         calldata->roc = pnfs_roc(state->inode);
2640         nfs_sb_active(calldata->inode->i_sb);
2641
2642         msg.rpc_argp = &calldata->arg;
2643         msg.rpc_resp = &calldata->res;
2644         task_setup_data.callback_data = calldata;
2645         task = rpc_run_task(&task_setup_data);
2646         if (IS_ERR(task))
2647                 return PTR_ERR(task);
2648         status = 0;
2649         if (wait)
2650                 status = rpc_wait_for_completion_task(task);
2651         rpc_put_task(task);
2652         return status;
2653 out_free_calldata:
2654         kfree(calldata);
2655 out:
2656         nfs4_put_open_state(state);
2657         nfs4_put_state_owner(sp);
2658         return status;
2659 }
2660
2661 static struct inode *
2662 nfs4_atomic_open(struct inode *dir, struct nfs_open_context *ctx, int open_flags, struct iattr *attr)
2663 {
2664         struct nfs4_state *state;
2665         struct nfs4_label l = {0, 0, 0, NULL}, *label = NULL;
2666
2667         label = nfs4_label_init_security(dir, ctx->dentry, attr, &l);
2668
2669         /* Protect against concurrent sillydeletes */
2670         state = nfs4_do_open(dir, ctx, open_flags, attr, label);
2671
2672         nfs4_label_release_security(label);
2673
2674         if (IS_ERR(state))
2675                 return ERR_CAST(state);
2676         return state->inode;
2677 }
2678
2679 static void nfs4_close_context(struct nfs_open_context *ctx, int is_sync)
2680 {
2681         if (ctx->state == NULL)
2682                 return;
2683         if (is_sync)
2684                 nfs4_close_sync(ctx->state, ctx->mode);
2685         else
2686                 nfs4_close_state(ctx->state, ctx->mode);
2687 }
2688
2689 static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
2690 {
2691         struct nfs4_server_caps_arg args = {
2692                 .fhandle = fhandle,
2693         };
2694         struct nfs4_server_caps_res res = {};
2695         struct rpc_message msg = {
2696                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
2697                 .rpc_argp = &args,
2698                 .rpc_resp = &res,
2699         };
2700         int status;
2701
2702         status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
2703         if (status == 0) {
2704                 memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
2705                 server->caps &= ~(NFS_CAP_ACLS|NFS_CAP_HARDLINKS|
2706                                 NFS_CAP_SYMLINKS|NFS_CAP_FILEID|
2707                                 NFS_CAP_MODE|NFS_CAP_NLINK|NFS_CAP_OWNER|
2708                                 NFS_CAP_OWNER_GROUP|NFS_CAP_ATIME|
2709                                 NFS_CAP_CTIME|NFS_CAP_MTIME);
2710                 if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
2711                         server->caps |= NFS_CAP_ACLS;
2712                 if (res.has_links != 0)
2713                         server->caps |= NFS_CAP_HARDLINKS;
2714                 if (res.has_symlinks != 0)
2715                         server->caps |= NFS_CAP_SYMLINKS;
2716                 if (res.attr_bitmask[0] & FATTR4_WORD0_FILEID)
2717                         server->caps |= NFS_CAP_FILEID;
2718                 if (res.attr_bitmask[1] & FATTR4_WORD1_MODE)
2719                         server->caps |= NFS_CAP_MODE;
2720                 if (res.attr_bitmask[1] & FATTR4_WORD1_NUMLINKS)
2721                         server->caps |= NFS_CAP_NLINK;
2722                 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER)
2723                         server->caps |= NFS_CAP_OWNER;
2724                 if (res.attr_bitmask[1] & FATTR4_WORD1_OWNER_GROUP)
2725                         server->caps |= NFS_CAP_OWNER_GROUP;
2726                 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_ACCESS)
2727                         server->caps |= NFS_CAP_ATIME;
2728                 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_METADATA)
2729                         server->caps |= NFS_CAP_CTIME;
2730                 if (res.attr_bitmask[1] & FATTR4_WORD1_TIME_MODIFY)
2731                         server->caps |= NFS_CAP_MTIME;
2732 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
2733                 if (res.attr_bitmask[2] & FATTR4_WORD2_SECURITY_LABEL)
2734                         server->caps |= NFS_CAP_SECURITY_LABEL;
2735 #endif
2736                 memcpy(server->attr_bitmask_nl, res.attr_bitmask,
2737                                 sizeof(server->attr_bitmask));
2738
2739                 if (server->caps & NFS_CAP_SECURITY_LABEL) {
2740                         server->attr_bitmask_nl[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2741                         res.attr_bitmask[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2742                 }
2743                 memcpy(server->cache_consistency_bitmask, res.attr_bitmask, sizeof(server->cache_consistency_bitmask));
2744                 server->cache_consistency_bitmask[0] &= FATTR4_WORD0_CHANGE|FATTR4_WORD0_SIZE;
2745                 server->cache_consistency_bitmask[1] &= FATTR4_WORD1_TIME_METADATA|FATTR4_WORD1_TIME_MODIFY;
2746                 server->acl_bitmask = res.acl_bitmask;
2747                 server->fh_expire_type = res.fh_expire_type;
2748         }
2749
2750         return status;
2751 }
2752
2753 int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
2754 {
2755         struct nfs4_exception exception = { };
2756         int err;
2757         do {
2758                 err = nfs4_handle_exception(server,
2759                                 _nfs4_server_capabilities(server, fhandle),
2760                                 &exception);
2761         } while (exception.retry);
2762         return err;
2763 }
2764
2765 static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2766                 struct nfs_fsinfo *info)
2767 {
2768         u32 bitmask[3];
2769         struct nfs4_lookup_root_arg args = {
2770                 .bitmask = bitmask,
2771         };
2772         struct nfs4_lookup_res res = {
2773                 .server = server,
2774                 .fattr = info->fattr,
2775                 .fh = fhandle,
2776         };
2777         struct rpc_message msg = {
2778                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
2779                 .rpc_argp = &args,
2780                 .rpc_resp = &res,
2781         };
2782
2783         bitmask[0] = nfs4_fattr_bitmap[0];
2784         bitmask[1] = nfs4_fattr_bitmap[1];
2785         /*
2786          * Process the label in the upcoming getfattr
2787          */
2788         bitmask[2] = nfs4_fattr_bitmap[2] & ~FATTR4_WORD2_SECURITY_LABEL;
2789
2790         nfs_fattr_init(info->fattr);
2791         return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
2792 }
2793
2794 static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
2795                 struct nfs_fsinfo *info)
2796 {
2797         struct nfs4_exception exception = { };
2798         int err;
2799         do {
2800                 err = _nfs4_lookup_root(server, fhandle, info);
2801                 trace_nfs4_lookup_root(server, fhandle, info->fattr, err);
2802                 switch (err) {
2803                 case 0:
2804                 case -NFS4ERR_WRONGSEC:
2805                         goto out;
2806                 default:
2807                         err = nfs4_handle_exception(server, err, &exception);
2808                 }
2809         } while (exception.retry);
2810 out:
2811         return err;
2812 }
2813
2814 static int nfs4_lookup_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
2815                                 struct nfs_fsinfo *info, rpc_authflavor_t flavor)
2816 {
2817         struct rpc_auth_create_args auth_args = {
2818                 .pseudoflavor = flavor,
2819         };
2820         struct rpc_auth *auth;
2821         int ret;
2822
2823         auth = rpcauth_create(&auth_args, server->client);
2824         if (IS_ERR(auth)) {
2825                 ret = -EACCES;
2826                 goto out;
2827         }
2828         ret = nfs4_lookup_root(server, fhandle, info);
2829 out:
2830         return ret;
2831 }
2832
2833 /*
2834  * Retry pseudoroot lookup with various security flavors.  We do this when:
2835  *
2836  *   NFSv4.0: the PUTROOTFH operation returns NFS4ERR_WRONGSEC
2837  *   NFSv4.1: the server does not support the SECINFO_NO_NAME operation
2838  *
2839  * Returns zero on success, or a negative NFS4ERR value, or a
2840  * negative errno value.
2841  */
2842 static int nfs4_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
2843                               struct nfs_fsinfo *info)
2844 {
2845         /* Per 3530bis 15.33.5 */
2846         static const rpc_authflavor_t flav_array[] = {
2847                 RPC_AUTH_GSS_KRB5P,
2848                 RPC_AUTH_GSS_KRB5I,
2849                 RPC_AUTH_GSS_KRB5,
2850                 RPC_AUTH_UNIX,                  /* courtesy */
2851                 RPC_AUTH_NULL,
2852         };
2853         int status = -EPERM;
2854         size_t i;
2855
2856         for (i = 0; i < ARRAY_SIZE(flav_array); i++) {
2857                 status = nfs4_lookup_root_sec(server, fhandle, info, flav_array[i]);
2858                 if (status == -NFS4ERR_WRONGSEC || status == -EACCES)
2859                         continue;
2860                 break;
2861         }
2862
2863         /*
2864          * -EACCESS could mean that the user doesn't have correct permissions
2865          * to access the mount.  It could also mean that we tried to mount
2866          * with a gss auth flavor, but rpc.gssd isn't running.  Either way,
2867          * existing mount programs don't handle -EACCES very well so it should
2868          * be mapped to -EPERM instead.
2869          */
2870         if (status == -EACCES)
2871                 status = -EPERM;
2872         return status;
2873 }
2874
2875 static int nfs4_do_find_root_sec(struct nfs_server *server,
2876                 struct nfs_fh *fhandle, struct nfs_fsinfo *info)
2877 {
2878         int mv = server->nfs_client->cl_minorversion;
2879         return nfs_v4_minor_ops[mv]->find_root_sec(server, fhandle, info);
2880 }
2881
2882 /**
2883  * nfs4_proc_get_rootfh - get file handle for server's pseudoroot
2884  * @server: initialized nfs_server handle
2885  * @fhandle: we fill in the pseudo-fs root file handle
2886  * @info: we fill in an FSINFO struct
2887  * @auth_probe: probe the auth flavours
2888  *
2889  * Returns zero on success, or a negative errno.
2890  */
2891 int nfs4_proc_get_rootfh(struct nfs_server *server, struct nfs_fh *fhandle,
2892                          struct nfs_fsinfo *info,
2893                          bool auth_probe)
2894 {
2895         int status;
2896
2897         switch (auth_probe) {
2898         case false:
2899                 status = nfs4_lookup_root(server, fhandle, info);
2900                 if (status != -NFS4ERR_WRONGSEC)
2901                         break;
2902                 /* Did user force a 'sec=' mount option? */
2903                 if (server->flags & NFS_MOUNT_SECFLAVOUR)
2904                         break;
2905         default:
2906                 status = nfs4_do_find_root_sec(server, fhandle, info);
2907         }
2908
2909         if (status == 0)
2910                 status = nfs4_server_capabilities(server, fhandle);
2911         if (status == 0)
2912                 status = nfs4_do_fsinfo(server, fhandle, info);
2913
2914         return nfs4_map_errors(status);
2915 }
2916
2917 static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *mntfh,
2918                               struct nfs_fsinfo *info)
2919 {
2920         int error;
2921         struct nfs_fattr *fattr = info->fattr;
2922         struct nfs4_label *label = NULL;
2923
2924         error = nfs4_server_capabilities(server, mntfh);
2925         if (error < 0) {
2926                 dprintk("nfs4_get_root: getcaps error = %d\n", -error);
2927                 return error;
2928         }
2929
2930         label = nfs4_label_alloc(server, GFP_KERNEL);
2931         if (IS_ERR(label))
2932                 return PTR_ERR(label);
2933
2934         error = nfs4_proc_getattr(server, mntfh, fattr, label);
2935         if (error < 0) {
2936                 dprintk("nfs4_get_root: getattr error = %d\n", -error);
2937                 goto err_free_label;
2938         }
2939
2940         if (fattr->valid & NFS_ATTR_FATTR_FSID &&
2941             !nfs_fsid_equal(&server->fsid, &fattr->fsid))
2942                 memcpy(&server->fsid, &fattr->fsid, sizeof(server->fsid));
2943
2944 err_free_label:
2945         nfs4_label_free(label);
2946
2947         return error;
2948 }
2949
2950 /*
2951  * Get locations and (maybe) other attributes of a referral.
2952  * Note that we'll actually follow the referral later when
2953  * we detect fsid mismatch in inode revalidation
2954  */
2955 static int nfs4_get_referral(struct rpc_clnt *client, struct inode *dir,
2956                              const struct qstr *name, struct nfs_fattr *fattr,
2957                              struct nfs_fh *fhandle)
2958 {
2959         int status = -ENOMEM;
2960         struct page *page = NULL;
2961         struct nfs4_fs_locations *locations = NULL;
2962
2963         page = alloc_page(GFP_KERNEL);
2964         if (page == NULL)
2965                 goto out;
2966         locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
2967         if (locations == NULL)
2968                 goto out;
2969
2970         status = nfs4_proc_fs_locations(client, dir, name, locations, page);
2971         if (status != 0)
2972                 goto out;
2973         /* Make sure server returned a different fsid for the referral */
2974         if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
2975                 dprintk("%s: server did not return a different fsid for"
2976                         " a referral at %s\n", __func__, name->name);
2977                 status = -EIO;
2978                 goto out;
2979         }
2980         /* Fixup attributes for the nfs_lookup() call to nfs_fhget() */
2981         nfs_fixup_referral_attributes(&locations->fattr);
2982
2983         /* replace the lookup nfs_fattr with the locations nfs_fattr */
2984         memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
2985         memset(fhandle, 0, sizeof(struct nfs_fh));
2986 out:
2987         if (page)
2988                 __free_page(page);
2989         kfree(locations);
2990         return status;
2991 }
2992
2993 static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle,
2994                                 struct nfs_fattr *fattr, struct nfs4_label *label)
2995 {
2996         struct nfs4_getattr_arg args = {
2997                 .fh = fhandle,
2998                 .bitmask = server->attr_bitmask,
2999         };
3000         struct nfs4_getattr_res res = {
3001                 .fattr = fattr,
3002                 .label = label,
3003                 .server = server,
3004         };
3005         struct rpc_message msg = {
3006                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
3007                 .rpc_argp = &args,
3008                 .rpc_resp = &res,
3009         };
3010
3011         args.bitmask = nfs4_bitmask(server, label);
3012
3013         nfs_fattr_init(fattr);
3014         return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3015 }
3016
3017 static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle,
3018                                 struct nfs_fattr *fattr, struct nfs4_label *label)
3019 {
3020         struct nfs4_exception exception = { };
3021         int err;
3022         do {
3023                 err = _nfs4_proc_getattr(server, fhandle, fattr, label);
3024                 trace_nfs4_getattr(server, fhandle, fattr, err);
3025                 err = nfs4_handle_exception(server, err,
3026                                 &exception);
3027         } while (exception.retry);
3028         return err;
3029 }
3030
3031 /* 
3032  * The file is not closed if it is opened due to the a request to change
3033  * the size of the file. The open call will not be needed once the
3034  * VFS layer lookup-intents are implemented.
3035  *
3036  * Close is called when the inode is destroyed.
3037  * If we haven't opened the file for O_WRONLY, we
3038  * need to in the size_change case to obtain a stateid.
3039  *
3040  * Got race?
3041  * Because OPEN is always done by name in nfsv4, it is
3042  * possible that we opened a different file by the same
3043  * name.  We can recognize this race condition, but we
3044  * can't do anything about it besides returning an error.
3045  *
3046  * This will be fixed with VFS changes (lookup-intent).
3047  */
3048 static int
3049 nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
3050                   struct iattr *sattr)
3051 {
3052         struct inode *inode = dentry->d_inode;
3053         struct rpc_cred *cred = NULL;
3054         struct nfs4_state *state = NULL;
3055         struct nfs4_label *label = NULL;
3056         int status;
3057
3058         if (pnfs_ld_layoutret_on_setattr(inode))
3059                 pnfs_commit_and_return_layout(inode);
3060
3061         nfs_fattr_init(fattr);
3062         
3063         /* Deal with open(O_TRUNC) */
3064         if (sattr->ia_valid & ATTR_OPEN)
3065                 sattr->ia_valid &= ~(ATTR_MTIME|ATTR_CTIME);
3066
3067         /* Optimization: if the end result is no change, don't RPC */
3068         if ((sattr->ia_valid & ~(ATTR_FILE|ATTR_OPEN)) == 0)
3069                 return 0;
3070
3071         /* Search for an existing open(O_WRITE) file */
3072         if (sattr->ia_valid & ATTR_FILE) {
3073                 struct nfs_open_context *ctx;
3074
3075                 ctx = nfs_file_open_context(sattr->ia_file);
3076                 if (ctx) {
3077                         cred = ctx->cred;
3078                         state = ctx->state;
3079                 }
3080         }
3081
3082         label = nfs4_label_alloc(NFS_SERVER(inode), GFP_KERNEL);
3083         if (IS_ERR(label))
3084                 return PTR_ERR(label);
3085
3086         status = nfs4_do_setattr(inode, cred, fattr, sattr, state, NULL, label);
3087         if (status == 0) {
3088                 nfs_setattr_update_inode(inode, sattr);
3089                 nfs_setsecurity(inode, fattr, label);
3090         }
3091         nfs4_label_free(label);
3092         return status;
3093 }
3094
3095 static int _nfs4_proc_lookup(struct rpc_clnt *clnt, struct inode *dir,
3096                 const struct qstr *name, struct nfs_fh *fhandle,
3097                 struct nfs_fattr *fattr, struct nfs4_label *label)
3098 {
3099         struct nfs_server *server = NFS_SERVER(dir);
3100         int                    status;
3101         struct nfs4_lookup_arg args = {
3102                 .bitmask = server->attr_bitmask,
3103                 .dir_fh = NFS_FH(dir),
3104                 .name = name,
3105         };
3106         struct nfs4_lookup_res res = {
3107                 .server = server,
3108                 .fattr = fattr,
3109                 .label = label,
3110                 .fh = fhandle,
3111         };
3112         struct rpc_message msg = {
3113                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
3114                 .rpc_argp = &args,
3115                 .rpc_resp = &res,
3116         };
3117
3118         args.bitmask = nfs4_bitmask(server, label);
3119
3120         nfs_fattr_init(fattr);
3121
3122         dprintk("NFS call  lookup %s\n", name->name);
3123         status = nfs4_call_sync(clnt, server, &msg, &args.seq_args, &res.seq_res, 0);
3124         dprintk("NFS reply lookup: %d\n", status);
3125         return status;
3126 }
3127
3128 static void nfs_fixup_secinfo_attributes(struct nfs_fattr *fattr)
3129 {
3130         fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
3131                 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_MOUNTPOINT;
3132         fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
3133         fattr->nlink = 2;
3134 }
3135
3136 static int nfs4_proc_lookup_common(struct rpc_clnt **clnt, struct inode *dir,
3137                                    struct qstr *name, struct nfs_fh *fhandle,
3138                                    struct nfs_fattr *fattr, struct nfs4_label *label)
3139 {
3140         struct nfs4_exception exception = { };
3141         struct rpc_clnt *client = *clnt;
3142         int err;
3143         do {
3144                 err = _nfs4_proc_lookup(client, dir, name, fhandle, fattr, label);
3145                 trace_nfs4_lookup(dir, name, err);
3146                 switch (err) {
3147                 case -NFS4ERR_BADNAME:
3148                         err = -ENOENT;
3149                         goto out;
3150                 case -NFS4ERR_MOVED:
3151                         err = nfs4_get_referral(client, dir, name, fattr, fhandle);
3152                         goto out;
3153                 case -NFS4ERR_WRONGSEC:
3154                         err = -EPERM;
3155                         if (client != *clnt)
3156                                 goto out;
3157                         /* No security negotiation if the user specified 'sec=' */
3158                         if (NFS_SERVER(dir)->flags & NFS_MOUNT_SECFLAVOUR)
3159                                 goto out;
3160                         client = nfs4_create_sec_client(client, dir, name);
3161                         if (IS_ERR(client))
3162                                 return PTR_ERR(client);
3163
3164                         exception.retry = 1;
3165                         break;
3166                 default:
3167                         err = nfs4_handle_exception(NFS_SERVER(dir), err, &exception);
3168                 }
3169         } while (exception.retry);
3170
3171 out:
3172         if (err == 0)
3173                 *clnt = client;
3174         else if (client != *clnt)
3175                 rpc_shutdown_client(client);
3176
3177         return err;
3178 }
3179
3180 static int nfs4_proc_lookup(struct inode *dir, struct qstr *name,
3181                             struct nfs_fh *fhandle, struct nfs_fattr *fattr,
3182                             struct nfs4_label *label)
3183 {
3184         int status;
3185         struct rpc_clnt *client = NFS_CLIENT(dir);
3186
3187         status = nfs4_proc_lookup_common(&client, dir, name, fhandle, fattr, label);
3188         if (client != NFS_CLIENT(dir)) {
3189                 rpc_shutdown_client(client);
3190                 nfs_fixup_secinfo_attributes(fattr);
3191         }
3192         return status;
3193 }
3194
3195 struct rpc_clnt *
3196 nfs4_proc_lookup_mountpoint(struct inode *dir, struct qstr *name,
3197                             struct nfs_fh *fhandle, struct nfs_fattr *fattr)
3198 {
3199         int status;
3200         struct rpc_clnt *client = rpc_clone_client(NFS_CLIENT(dir));
3201
3202         status = nfs4_proc_lookup_common(&client, dir, name, fhandle, fattr, NULL);
3203         if (status < 0) {
3204                 rpc_shutdown_client(client);
3205                 return ERR_PTR(status);
3206         }
3207         return client;
3208 }
3209
3210 static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
3211 {
3212         struct nfs_server *server = NFS_SERVER(inode);
3213         struct nfs4_accessargs args = {
3214                 .fh = NFS_FH(inode),
3215                 .bitmask = server->cache_consistency_bitmask,
3216         };
3217         struct nfs4_accessres res = {
3218                 .server = server,
3219         };
3220         struct rpc_message msg = {
3221                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
3222                 .rpc_argp = &args,
3223                 .rpc_resp = &res,
3224                 .rpc_cred = entry->cred,
3225         };
3226         int mode = entry->mask;
3227         int status = 0;
3228
3229         /*
3230          * Determine which access bits we want to ask for...
3231          */
3232         if (mode & MAY_READ)
3233                 args.access |= NFS4_ACCESS_READ;
3234         if (S_ISDIR(inode->i_mode)) {
3235                 if (mode & MAY_WRITE)
3236                         args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
3237                 if (mode & MAY_EXEC)
3238                         args.access |= NFS4_ACCESS_LOOKUP;
3239         } else {
3240                 if (mode & MAY_WRITE)
3241                         args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
3242                 if (mode & MAY_EXEC)
3243                         args.access |= NFS4_ACCESS_EXECUTE;
3244         }
3245
3246         res.fattr = nfs_alloc_fattr();
3247         if (res.fattr == NULL)
3248                 return -ENOMEM;
3249
3250         status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3251         if (!status) {
3252                 nfs_access_set_mask(entry, res.access);
3253                 nfs_refresh_inode(inode, res.fattr);
3254         }
3255         nfs_free_fattr(res.fattr);
3256         return status;
3257 }
3258
3259 static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
3260 {
3261         struct nfs4_exception exception = { };
3262         int err;
3263         do {
3264                 err = _nfs4_proc_access(inode, entry);
3265                 trace_nfs4_access(inode, err);
3266                 err = nfs4_handle_exception(NFS_SERVER(inode), err,
3267                                 &exception);
3268         } while (exception.retry);
3269         return err;
3270 }
3271
3272 /*
3273  * TODO: For the time being, we don't try to get any attributes
3274  * along with any of the zero-copy operations READ, READDIR,
3275  * READLINK, WRITE.
3276  *
3277  * In the case of the first three, we want to put the GETATTR
3278  * after the read-type operation -- this is because it is hard
3279  * to predict the length of a GETATTR response in v4, and thus
3280  * align the READ data correctly.  This means that the GETATTR
3281  * may end up partially falling into the page cache, and we should
3282  * shift it into the 'tail' of the xdr_buf before processing.
3283  * To do this efficiently, we need to know the total length
3284  * of data received, which doesn't seem to be available outside
3285  * of the RPC layer.
3286  *
3287  * In the case of WRITE, we also want to put the GETATTR after
3288  * the operation -- in this case because we want to make sure
3289  * we get the post-operation mtime and size.
3290  *
3291  * Both of these changes to the XDR layer would in fact be quite
3292  * minor, but I decided to leave them for a subsequent patch.
3293  */
3294 static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
3295                 unsigned int pgbase, unsigned int pglen)
3296 {
3297         struct nfs4_readlink args = {
3298                 .fh       = NFS_FH(inode),
3299                 .pgbase   = pgbase,
3300                 .pglen    = pglen,
3301                 .pages    = &page,
3302         };
3303         struct nfs4_readlink_res res;
3304         struct rpc_message msg = {
3305                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
3306                 .rpc_argp = &args,
3307                 .rpc_resp = &res,
3308         };
3309
3310         return nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode), &msg, &args.seq_args, &res.seq_res, 0);
3311 }
3312
3313 static int nfs4_proc_readlink(struct inode *inode, struct page *page,
3314                 unsigned int pgbase, unsigned int pglen)
3315 {
3316         struct nfs4_exception exception = { };
3317         int err;
3318         do {
3319                 err = _nfs4_proc_readlink(inode, page, pgbase, pglen);
3320                 trace_nfs4_readlink(inode, err);
3321                 err = nfs4_handle_exception(NFS_SERVER(inode), err,
3322                                 &exception);
3323         } while (exception.retry);
3324         return err;
3325 }
3326
3327 /*
3328  * This is just for mknod.  open(O_CREAT) will always do ->open_context().
3329  */
3330 static int
3331 nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
3332                  int flags)
3333 {
3334         struct nfs4_label l, *ilabel = NULL;
3335         struct nfs_open_context *ctx;
3336         struct nfs4_state *state;
3337         int status = 0;
3338
3339         ctx = alloc_nfs_open_context(dentry, FMODE_READ);
3340         if (IS_ERR(ctx))
3341                 return PTR_ERR(ctx);
3342
3343         ilabel = nfs4_label_init_security(dir, dentry, sattr, &l);
3344
3345         sattr->ia_mode &= ~current_umask();
3346         state = nfs4_do_open(dir, ctx, flags, sattr, ilabel);
3347         if (IS_ERR(state)) {
3348                 status = PTR_ERR(state);
3349                 goto out;
3350         }
3351 out:
3352         nfs4_label_release_security(ilabel);
3353         put_nfs_open_context(ctx);
3354         return status;
3355 }
3356
3357 static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
3358 {
3359         struct nfs_server *server = NFS_SERVER(dir);
3360         struct nfs_removeargs args = {
3361                 .fh = NFS_FH(dir),
3362                 .name = *name,
3363         };
3364         struct nfs_removeres res = {
3365                 .server = server,
3366         };
3367         struct rpc_message msg = {
3368                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
3369                 .rpc_argp = &args,
3370                 .rpc_resp = &res,
3371         };
3372         int status;
3373
3374         status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 1);
3375         if (status == 0)
3376                 update_changeattr(dir, &res.cinfo);
3377         return status;
3378 }
3379
3380 static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
3381 {
3382         struct nfs4_exception exception = { };
3383         int err;
3384         do {
3385                 err = _nfs4_proc_remove(dir, name);
3386                 trace_nfs4_remove(dir, name, err);
3387                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
3388                                 &exception);
3389         } while (exception.retry);
3390         return err;
3391 }
3392
3393 static void nfs4_proc_unlink_setup(struct rpc_message *msg, struct inode *dir)
3394 {
3395         struct nfs_server *server = NFS_SERVER(dir);
3396         struct nfs_removeargs *args = msg->rpc_argp;
3397         struct nfs_removeres *res = msg->rpc_resp;
3398
3399         res->server = server;
3400         msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
3401         nfs4_init_sequence(&args->seq_args, &res->seq_res, 1);
3402
3403         nfs_fattr_init(res->dir_attr);
3404 }
3405
3406 static void nfs4_proc_unlink_rpc_prepare(struct rpc_task *task, struct nfs_unlinkdata *data)
3407 {
3408         nfs4_setup_sequence(NFS_SERVER(data->dir),
3409                         &data->args.seq_args,
3410                         &data->res.seq_res,
3411                         task);
3412 }
3413
3414 static int nfs4_proc_unlink_done(struct rpc_task *task, struct inode *dir)
3415 {
3416         struct nfs_unlinkdata *data = task->tk_calldata;
3417         struct nfs_removeres *res = &data->res;
3418
3419         if (!nfs4_sequence_done(task, &res->seq_res))
3420                 return 0;
3421         if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
3422                 return 0;
3423         update_changeattr(dir, &res->cinfo);
3424         return 1;
3425 }
3426
3427 static void nfs4_proc_rename_setup(struct rpc_message *msg, struct inode *dir)
3428 {
3429         struct nfs_server *server = NFS_SERVER(dir);
3430         struct nfs_renameargs *arg = msg->rpc_argp;
3431         struct nfs_renameres *res = msg->rpc_resp;
3432
3433         msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME];
3434         res->server = server;
3435         nfs4_init_sequence(&arg->seq_args, &res->seq_res, 1);
3436 }
3437
3438 static void nfs4_proc_rename_rpc_prepare(struct rpc_task *task, struct nfs_renamedata *data)
3439 {
3440         nfs4_setup_sequence(NFS_SERVER(data->old_dir),
3441                         &data->args.seq_args,
3442                         &data->res.seq_res,
3443                         task);
3444 }
3445
3446 static int nfs4_proc_rename_done(struct rpc_task *task, struct inode *old_dir,
3447                                  struct inode *new_dir)
3448 {
3449         struct nfs_renamedata *data = task->tk_calldata;
3450         struct nfs_renameres *res = &data->res;
3451
3452         if (!nfs4_sequence_done(task, &res->seq_res))
3453                 return 0;
3454         if (nfs4_async_handle_error(task, res->server, NULL) == -EAGAIN)
3455                 return 0;
3456
3457         update_changeattr(old_dir, &res->old_cinfo);
3458         update_changeattr(new_dir, &res->new_cinfo);
3459         return 1;
3460 }
3461
3462 static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
3463                 struct inode *new_dir, struct qstr *new_name)
3464 {
3465         struct nfs_server *server = NFS_SERVER(old_dir);
3466         struct nfs_renameargs arg = {
3467                 .old_dir = NFS_FH(old_dir),
3468                 .new_dir = NFS_FH(new_dir),
3469                 .old_name = old_name,
3470                 .new_name = new_name,
3471         };
3472         struct nfs_renameres res = {
3473                 .server = server,
3474         };
3475         struct rpc_message msg = {
3476                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
3477                 .rpc_argp = &arg,
3478                 .rpc_resp = &res,
3479         };
3480         int status = -ENOMEM;
3481
3482         status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
3483         if (!status) {
3484                 update_changeattr(old_dir, &res.old_cinfo);
3485                 update_changeattr(new_dir, &res.new_cinfo);
3486         }
3487         return status;
3488 }
3489
3490 static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
3491                 struct inode *new_dir, struct qstr *new_name)
3492 {
3493         struct nfs4_exception exception = { };
3494         int err;
3495         do {
3496                 err = _nfs4_proc_rename(old_dir, old_name,
3497                                         new_dir, new_name);
3498                 trace_nfs4_rename(old_dir, old_name, new_dir, new_name, err);
3499                 err = nfs4_handle_exception(NFS_SERVER(old_dir), err,
3500                                 &exception);
3501         } while (exception.retry);
3502         return err;
3503 }
3504
3505 static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
3506 {
3507         struct nfs_server *server = NFS_SERVER(inode);
3508         struct nfs4_link_arg arg = {
3509                 .fh     = NFS_FH(inode),
3510                 .dir_fh = NFS_FH(dir),
3511                 .name   = name,
3512                 .bitmask = server->attr_bitmask,
3513         };
3514         struct nfs4_link_res res = {
3515                 .server = server,
3516                 .label = NULL,
3517         };
3518         struct rpc_message msg = {
3519                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
3520                 .rpc_argp = &arg,
3521                 .rpc_resp = &res,
3522         };
3523         int status = -ENOMEM;
3524
3525         res.fattr = nfs_alloc_fattr();
3526         if (res.fattr == NULL)
3527                 goto out;
3528
3529         res.label = nfs4_label_alloc(server, GFP_KERNEL);
3530         if (IS_ERR(res.label)) {
3531                 status = PTR_ERR(res.label);
3532                 goto out;
3533         }
3534         arg.bitmask = nfs4_bitmask(server, res.label);
3535
3536         status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
3537         if (!status) {
3538                 update_changeattr(dir, &res.cinfo);
3539                 status = nfs_post_op_update_inode(inode, res.fattr);
3540                 if (!status)
3541                         nfs_setsecurity(inode, res.fattr, res.label);
3542         }
3543
3544
3545         nfs4_label_free(res.label);
3546
3547 out:
3548         nfs_free_fattr(res.fattr);
3549         return status;
3550 }
3551
3552 static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
3553 {
3554         struct nfs4_exception exception = { };
3555         int err;
3556         do {
3557                 err = nfs4_handle_exception(NFS_SERVER(inode),
3558                                 _nfs4_proc_link(inode, dir, name),
3559                                 &exception);
3560         } while (exception.retry);
3561         return err;
3562 }
3563
3564 struct nfs4_createdata {
3565         struct rpc_message msg;
3566         struct nfs4_create_arg arg;
3567         struct nfs4_create_res res;
3568         struct nfs_fh fh;
3569         struct nfs_fattr fattr;
3570         struct nfs4_label *label;
3571 };
3572
3573 static struct nfs4_createdata *nfs4_alloc_createdata(struct inode *dir,
3574                 struct qstr *name, struct iattr *sattr, u32 ftype)
3575 {
3576         struct nfs4_createdata *data;
3577
3578         data = kzalloc(sizeof(*data), GFP_KERNEL);
3579         if (data != NULL) {
3580                 struct nfs_server *server = NFS_SERVER(dir);
3581
3582                 data->label = nfs4_label_alloc(server, GFP_KERNEL);
3583                 if (IS_ERR(data->label))
3584                         goto out_free;
3585
3586                 data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE];
3587                 data->msg.rpc_argp = &data->arg;
3588                 data->msg.rpc_resp = &data->res;
3589                 data->arg.dir_fh = NFS_FH(dir);
3590                 data->arg.server = server;
3591                 data->arg.name = name;
3592                 data->arg.attrs = sattr;
3593                 data->arg.ftype = ftype;
3594                 data->arg.bitmask = nfs4_bitmask(server, data->label);
3595                 data->res.server = server;
3596                 data->res.fh = &data->fh;
3597                 data->res.fattr = &data->fattr;
3598                 data->res.label = data->label;
3599                 nfs_fattr_init(data->res.fattr);
3600         }
3601         return data;
3602 out_free:
3603         kfree(data);
3604         return NULL;
3605 }
3606
3607 static int nfs4_do_create(struct inode *dir, struct dentry *dentry, struct nfs4_createdata *data)
3608 {
3609         int status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &data->msg,
3610                                     &data->arg.seq_args, &data->res.seq_res, 1);
3611         if (status == 0) {
3612                 update_changeattr(dir, &data->res.dir_cinfo);
3613                 status = nfs_instantiate(dentry, data->res.fh, data->res.fattr, data->res.label);
3614         }
3615         return status;
3616 }
3617
3618 static void nfs4_free_createdata(struct nfs4_createdata *data)
3619 {
3620         nfs4_label_free(data->label);
3621         kfree(data);
3622 }
3623
3624 static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
3625                 struct page *page, unsigned int len, struct iattr *sattr,
3626                 struct nfs4_label *label)
3627 {
3628         struct nfs4_createdata *data;
3629         int status = -ENAMETOOLONG;
3630
3631         if (len > NFS4_MAXPATHLEN)
3632                 goto out;
3633
3634         status = -ENOMEM;
3635         data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4LNK);
3636         if (data == NULL)
3637                 goto out;
3638
3639         data->msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK];
3640         data->arg.u.symlink.pages = &page;
3641         data->arg.u.symlink.len = len;
3642         data->arg.label = label;
3643         
3644         status = nfs4_do_create(dir, dentry, data);
3645
3646         nfs4_free_createdata(data);
3647 out:
3648         return status;
3649 }
3650
3651 static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
3652                 struct page *page, unsigned int len, struct iattr *sattr)
3653 {
3654         struct nfs4_exception exception = { };
3655         struct nfs4_label l, *label = NULL;
3656         int err;
3657
3658         label = nfs4_label_init_security(dir, dentry, sattr, &l);
3659
3660         do {
3661                 err = _nfs4_proc_symlink(dir, dentry, page, len, sattr, label);
3662                 trace_nfs4_symlink(dir, &dentry->d_name, err);
3663                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
3664                                 &exception);
3665         } while (exception.retry);
3666
3667         nfs4_label_release_security(label);
3668         return err;
3669 }
3670
3671 static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
3672                 struct iattr *sattr, struct nfs4_label *label)
3673 {
3674         struct nfs4_createdata *data;
3675         int status = -ENOMEM;
3676
3677         data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4DIR);
3678         if (data == NULL)
3679                 goto out;
3680
3681         data->arg.label = label;
3682         status = nfs4_do_create(dir, dentry, data);
3683
3684         nfs4_free_createdata(data);
3685 out:
3686         return status;
3687 }
3688
3689 static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
3690                 struct iattr *sattr)
3691 {
3692         struct nfs4_exception exception = { };
3693         struct nfs4_label l, *label = NULL;
3694         int err;
3695
3696         label = nfs4_label_init_security(dir, dentry, sattr, &l);
3697
3698         sattr->ia_mode &= ~current_umask();
3699         do {
3700                 err = _nfs4_proc_mkdir(dir, dentry, sattr, label);
3701                 trace_nfs4_mkdir(dir, &dentry->d_name, err);
3702                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
3703                                 &exception);
3704         } while (exception.retry);
3705         nfs4_label_release_security(label);
3706
3707         return err;
3708 }
3709
3710 static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
3711                 u64 cookie, struct page **pages, unsigned int count, int plus)
3712 {
3713         struct inode            *dir = dentry->d_inode;
3714         struct nfs4_readdir_arg args = {
3715                 .fh = NFS_FH(dir),
3716                 .pages = pages,
3717                 .pgbase = 0,
3718                 .count = count,
3719                 .bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
3720                 .plus = plus,
3721         };
3722         struct nfs4_readdir_res res;
3723         struct rpc_message msg = {
3724                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
3725                 .rpc_argp = &args,
3726                 .rpc_resp = &res,
3727                 .rpc_cred = cred,
3728         };
3729         int                     status;
3730
3731         dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __func__,
3732                         dentry->d_parent->d_name.name,
3733                         dentry->d_name.name,
3734                         (unsigned long long)cookie);
3735         nfs4_setup_readdir(cookie, NFS_I(dir)->cookieverf, dentry, &args);
3736         res.pgbase = args.pgbase;
3737         status = nfs4_call_sync(NFS_SERVER(dir)->client, NFS_SERVER(dir), &msg, &args.seq_args, &res.seq_res, 0);
3738         if (status >= 0) {
3739                 memcpy(NFS_I(dir)->cookieverf, res.verifier.data, NFS4_VERIFIER_SIZE);
3740                 status += args.pgbase;
3741         }
3742
3743         nfs_invalidate_atime(dir);
3744
3745         dprintk("%s: returns %d\n", __func__, status);
3746         return status;
3747 }
3748
3749 static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
3750                 u64 cookie, struct page **pages, unsigned int count, int plus)
3751 {
3752         struct nfs4_exception exception = { };
3753         int err;
3754         do {
3755                 err = _nfs4_proc_readdir(dentry, cred, cookie,
3756                                 pages, count, plus);
3757                 trace_nfs4_readdir(dentry->d_inode, err);
3758                 err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode), err,
3759                                 &exception);
3760         } while (exception.retry);
3761         return err;
3762 }
3763
3764 static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3765                 struct iattr *sattr, struct nfs4_label *label, dev_t rdev)
3766 {
3767         struct nfs4_createdata *data;
3768         int mode = sattr->ia_mode;
3769         int status = -ENOMEM;
3770
3771         data = nfs4_alloc_createdata(dir, &dentry->d_name, sattr, NF4SOCK);
3772         if (data == NULL)
3773                 goto out;
3774
3775         if (S_ISFIFO(mode))
3776                 data->arg.ftype = NF4FIFO;
3777         else if (S_ISBLK(mode)) {
3778                 data->arg.ftype = NF4BLK;
3779                 data->arg.u.device.specdata1 = MAJOR(rdev);
3780                 data->arg.u.device.specdata2 = MINOR(rdev);
3781         }
3782         else if (S_ISCHR(mode)) {
3783                 data->arg.ftype = NF4CHR;
3784                 data->arg.u.device.specdata1 = MAJOR(rdev);
3785                 data->arg.u.device.specdata2 = MINOR(rdev);
3786         } else if (!S_ISSOCK(mode)) {
3787                 status = -EINVAL;
3788                 goto out_free;
3789         }
3790
3791         data->arg.label = label;
3792         status = nfs4_do_create(dir, dentry, data);
3793 out_free:
3794         nfs4_free_createdata(data);
3795 out:
3796         return status;
3797 }
3798
3799 static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
3800                 struct iattr *sattr, dev_t rdev)
3801 {
3802         struct nfs4_exception exception = { };
3803         struct nfs4_label l, *label = NULL;
3804         int err;
3805
3806         label = nfs4_label_init_security(dir, dentry, sattr, &l);
3807
3808         sattr->ia_mode &= ~current_umask();
3809         do {
3810                 err = _nfs4_proc_mknod(dir, dentry, sattr, label, rdev);
3811                 trace_nfs4_mknod(dir, &dentry->d_name, err);
3812                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
3813                                 &exception);
3814         } while (exception.retry);
3815
3816         nfs4_label_release_security(label);
3817
3818         return err;
3819 }
3820
3821 static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
3822                  struct nfs_fsstat *fsstat)
3823 {
3824         struct nfs4_statfs_arg args = {
3825                 .fh = fhandle,
3826                 .bitmask = server->attr_bitmask,
3827         };
3828         struct nfs4_statfs_res res = {
3829                 .fsstat = fsstat,
3830         };
3831         struct rpc_message msg = {
3832                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
3833                 .rpc_argp = &args,
3834                 .rpc_resp = &res,
3835         };
3836
3837         nfs_fattr_init(fsstat->fattr);
3838         return  nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3839 }
3840
3841 static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
3842 {
3843         struct nfs4_exception exception = { };
3844         int err;
3845         do {
3846                 err = nfs4_handle_exception(server,
3847                                 _nfs4_proc_statfs(server, fhandle, fsstat),
3848                                 &exception);
3849         } while (exception.retry);
3850         return err;
3851 }
3852
3853 static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
3854                 struct nfs_fsinfo *fsinfo)
3855 {
3856         struct nfs4_fsinfo_arg args = {
3857                 .fh = fhandle,
3858                 .bitmask = server->attr_bitmask,
3859         };
3860         struct nfs4_fsinfo_res res = {
3861                 .fsinfo = fsinfo,
3862         };
3863         struct rpc_message msg = {
3864                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
3865                 .rpc_argp = &args,
3866                 .rpc_resp = &res,
3867         };
3868
3869         return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3870 }
3871
3872 static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3873 {
3874         struct nfs4_exception exception = { };
3875         unsigned long now = jiffies;
3876         int err;
3877
3878         do {
3879                 err = _nfs4_do_fsinfo(server, fhandle, fsinfo);
3880                 trace_nfs4_fsinfo(server, fhandle, fsinfo->fattr, err);
3881                 if (err == 0) {
3882                         struct nfs_client *clp = server->nfs_client;
3883
3884                         spin_lock(&clp->cl_lock);
3885                         clp->cl_lease_time = fsinfo->lease_time * HZ;
3886                         clp->cl_last_renewal = now;
3887                         spin_unlock(&clp->cl_lock);
3888                         break;
3889                 }
3890                 err = nfs4_handle_exception(server, err, &exception);
3891         } while (exception.retry);
3892         return err;
3893 }
3894
3895 static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
3896 {
3897         int error;
3898
3899         nfs_fattr_init(fsinfo->fattr);
3900         error = nfs4_do_fsinfo(server, fhandle, fsinfo);
3901         if (error == 0) {
3902                 /* block layout checks this! */
3903                 server->pnfs_blksize = fsinfo->blksize;
3904                 set_pnfs_layoutdriver(server, fhandle, fsinfo->layouttype);
3905         }
3906
3907         return error;
3908 }
3909
3910 static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3911                 struct nfs_pathconf *pathconf)
3912 {
3913         struct nfs4_pathconf_arg args = {
3914                 .fh = fhandle,
3915                 .bitmask = server->attr_bitmask,
3916         };
3917         struct nfs4_pathconf_res res = {
3918                 .pathconf = pathconf,
3919         };
3920         struct rpc_message msg = {
3921                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
3922                 .rpc_argp = &args,
3923                 .rpc_resp = &res,
3924         };
3925
3926         /* None of the pathconf attributes are mandatory to implement */
3927         if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
3928                 memset(pathconf, 0, sizeof(*pathconf));
3929                 return 0;
3930         }
3931
3932         nfs_fattr_init(pathconf->fattr);
3933         return nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
3934 }
3935
3936 static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
3937                 struct nfs_pathconf *pathconf)
3938 {
3939         struct nfs4_exception exception = { };
3940         int err;
3941
3942         do {
3943                 err = nfs4_handle_exception(server,
3944                                 _nfs4_proc_pathconf(server, fhandle, pathconf),
3945                                 &exception);
3946         } while (exception.retry);
3947         return err;
3948 }
3949
3950 int nfs4_set_rw_stateid(nfs4_stateid *stateid,
3951                 const struct nfs_open_context *ctx,
3952                 const struct nfs_lock_context *l_ctx,
3953                 fmode_t fmode)
3954 {
3955         const struct nfs_lockowner *lockowner = NULL;
3956
3957         if (l_ctx != NULL)
3958                 lockowner = &l_ctx->lockowner;
3959         return nfs4_select_rw_stateid(stateid, ctx->state, fmode, lockowner);
3960 }
3961 EXPORT_SYMBOL_GPL(nfs4_set_rw_stateid);
3962
3963 static bool nfs4_stateid_is_current(nfs4_stateid *stateid,
3964                 const struct nfs_open_context *ctx,
3965                 const struct nfs_lock_context *l_ctx,
3966                 fmode_t fmode)
3967 {
3968         nfs4_stateid current_stateid;
3969
3970         if (nfs4_set_rw_stateid(&current_stateid, ctx, l_ctx, fmode))
3971                 return false;
3972         return nfs4_stateid_match(stateid, &current_stateid);
3973 }
3974
3975 static bool nfs4_error_stateid_expired(int err)
3976 {
3977         switch (err) {
3978         case -NFS4ERR_DELEG_REVOKED:
3979         case -NFS4ERR_ADMIN_REVOKED:
3980         case -NFS4ERR_BAD_STATEID:
3981         case -NFS4ERR_STALE_STATEID:
3982         case -NFS4ERR_OLD_STATEID:
3983         case -NFS4ERR_OPENMODE:
3984         case -NFS4ERR_EXPIRED:
3985                 return true;
3986         }
3987         return false;
3988 }
3989
3990 void __nfs4_read_done_cb(struct nfs_read_data *data)
3991 {
3992         nfs_invalidate_atime(data->header->inode);
3993 }
3994
3995 static int nfs4_read_done_cb(struct rpc_task *task, struct nfs_read_data *data)
3996 {
3997         struct nfs_server *server = NFS_SERVER(data->header->inode);
3998
3999         trace_nfs4_read(data, task->tk_status);
4000         if (nfs4_async_handle_error(task, server, data->args.context->state) == -EAGAIN) {
4001                 rpc_restart_call_prepare(task);
4002                 return -EAGAIN;
4003         }
4004
4005         __nfs4_read_done_cb(data);
4006         if (task->tk_status > 0)
4007                 renew_lease(server, data->timestamp);
4008         return 0;
4009 }
4010
4011 static bool nfs4_read_stateid_changed(struct rpc_task *task,
4012                 struct nfs_readargs *args)
4013 {
4014
4015         if (!nfs4_error_stateid_expired(task->tk_status) ||
4016                 nfs4_stateid_is_current(&args->stateid,
4017                                 args->context,
4018                                 args->lock_context,
4019                                 FMODE_READ))
4020                 return false;
4021         rpc_restart_call_prepare(task);
4022         return true;
4023 }
4024
4025 static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
4026 {
4027
4028         dprintk("--> %s\n", __func__);
4029
4030         if (!nfs4_sequence_done(task, &data->res.seq_res))
4031                 return -EAGAIN;
4032         if (nfs4_read_stateid_changed(task, &data->args))
4033                 return -EAGAIN;
4034         return data->read_done_cb ? data->read_done_cb(task, data) :
4035                                     nfs4_read_done_cb(task, data);
4036 }
4037
4038 static void nfs4_proc_read_setup(struct nfs_read_data *data, struct rpc_message *msg)
4039 {
4040         data->timestamp   = jiffies;
4041         data->read_done_cb = nfs4_read_done_cb;
4042         msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ];
4043         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 0);
4044 }
4045
4046 static int nfs4_proc_read_rpc_prepare(struct rpc_task *task, struct nfs_read_data *data)
4047 {
4048         if (nfs4_setup_sequence(NFS_SERVER(data->header->inode),
4049                         &data->args.seq_args,
4050                         &data->res.seq_res,
4051                         task))
4052                 return 0;
4053         if (nfs4_set_rw_stateid(&data->args.stateid, data->args.context,
4054                                 data->args.lock_context, FMODE_READ) == -EIO)
4055                 return -EIO;
4056         if (unlikely(test_bit(NFS_CONTEXT_BAD, &data->args.context->flags)))
4057                 return -EIO;
4058         return 0;
4059 }
4060
4061 static int nfs4_write_done_cb(struct rpc_task *task, struct nfs_write_data *data)
4062 {
4063         struct inode *inode = data->header->inode;
4064         
4065         trace_nfs4_write(data, task->tk_status);
4066         if (nfs4_async_handle_error(task, NFS_SERVER(inode), data->args.context->state) == -EAGAIN) {
4067                 rpc_restart_call_prepare(task);
4068                 return -EAGAIN;
4069         }
4070         if (task->tk_status >= 0) {
4071                 renew_lease(NFS_SERVER(inode), data->timestamp);
4072                 nfs_post_op_update_inode_force_wcc(inode, &data->fattr);
4073         }
4074         return 0;
4075 }
4076
4077 static bool nfs4_write_stateid_changed(struct rpc_task *task,
4078                 struct nfs_writeargs *args)
4079 {
4080
4081         if (!nfs4_error_stateid_expired(task->tk_status) ||
4082                 nfs4_stateid_is_current(&args->stateid,
4083                                 args->context,
4084                                 args->lock_context,
4085                                 FMODE_WRITE))
4086                 return false;
4087         rpc_restart_call_prepare(task);
4088         return true;
4089 }
4090
4091 static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
4092 {
4093         if (!nfs4_sequence_done(task, &data->res.seq_res))
4094                 return -EAGAIN;
4095         if (nfs4_write_stateid_changed(task, &data->args))
4096                 return -EAGAIN;
4097         return data->write_done_cb ? data->write_done_cb(task, data) :
4098                 nfs4_write_done_cb(task, data);
4099 }
4100
4101 static
4102 bool nfs4_write_need_cache_consistency_data(const struct nfs_write_data *data)
4103 {
4104         const struct nfs_pgio_header *hdr = data->header;
4105
4106         /* Don't request attributes for pNFS or O_DIRECT writes */
4107         if (data->ds_clp != NULL || hdr->dreq != NULL)
4108                 return false;
4109         /* Otherwise, request attributes if and only if we don't hold
4110          * a delegation
4111          */
4112         return nfs4_have_delegation(hdr->inode, FMODE_READ) == 0;
4113 }
4114
4115 static void nfs4_proc_write_setup(struct nfs_write_data *data, struct rpc_message *msg)
4116 {
4117         struct nfs_server *server = NFS_SERVER(data->header->inode);
4118
4119         if (!nfs4_write_need_cache_consistency_data(data)) {
4120                 data->args.bitmask = NULL;
4121                 data->res.fattr = NULL;
4122         } else
4123                 data->args.bitmask = server->cache_consistency_bitmask;
4124
4125         if (!data->write_done_cb)
4126                 data->write_done_cb = nfs4_write_done_cb;
4127         data->res.server = server;
4128         data->timestamp   = jiffies;
4129
4130         msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE];
4131         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
4132 }
4133
4134 static int nfs4_proc_write_rpc_prepare(struct rpc_task *task, struct nfs_write_data *data)
4135 {
4136         if (nfs4_setup_sequence(NFS_SERVER(data->header->inode),
4137                         &data->args.seq_args,
4138                         &data->res.seq_res,
4139                         task))
4140                 return 0;
4141         if (nfs4_set_rw_stateid(&data->args.stateid, data->args.context,
4142                                 data->args.lock_context, FMODE_WRITE) == -EIO)
4143                 return -EIO;
4144         if (unlikely(test_bit(NFS_CONTEXT_BAD, &data->args.context->flags)))
4145                 return -EIO;
4146         return 0;
4147 }
4148
4149 static void nfs4_proc_commit_rpc_prepare(struct rpc_task *task, struct nfs_commit_data *data)
4150 {
4151         nfs4_setup_sequence(NFS_SERVER(data->inode),
4152                         &data->args.seq_args,
4153                         &data->res.seq_res,
4154                         task);
4155 }
4156
4157 static int nfs4_commit_done_cb(struct rpc_task *task, struct nfs_commit_data *data)
4158 {
4159         struct inode *inode = data->inode;
4160
4161         trace_nfs4_commit(data, task->tk_status);
4162         if (nfs4_async_handle_error(task, NFS_SERVER(inode), NULL) == -EAGAIN) {
4163                 rpc_restart_call_prepare(task);
4164                 return -EAGAIN;
4165         }
4166         return 0;
4167 }
4168
4169 static int nfs4_commit_done(struct rpc_task *task, struct nfs_commit_data *data)
4170 {
4171         if (!nfs4_sequence_done(task, &data->res.seq_res))
4172                 return -EAGAIN;
4173         return data->commit_done_cb(task, data);
4174 }
4175
4176 static void nfs4_proc_commit_setup(struct nfs_commit_data *data, struct rpc_message *msg)
4177 {
4178         struct nfs_server *server = NFS_SERVER(data->inode);
4179
4180         if (data->commit_done_cb == NULL)
4181                 data->commit_done_cb = nfs4_commit_done_cb;
4182         data->res.server = server;
4183         msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT];
4184         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
4185 }
4186
4187 struct nfs4_renewdata {
4188         struct nfs_client       *client;
4189         unsigned long           timestamp;
4190 };
4191
4192 /*
4193  * nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
4194  * standalone procedure for queueing an asynchronous RENEW.
4195  */
4196 static void nfs4_renew_release(void *calldata)
4197 {
4198         struct nfs4_renewdata *data = calldata;
4199         struct nfs_client *clp = data->client;
4200
4201         if (atomic_read(&clp->cl_count) > 1)
4202                 nfs4_schedule_state_renewal(clp);
4203         nfs_put_client(clp);
4204         kfree(data);
4205 }
4206
4207 static void nfs4_renew_done(struct rpc_task *task, void *calldata)
4208 {
4209         struct nfs4_renewdata *data = calldata;
4210         struct nfs_client *clp = data->client;
4211         unsigned long timestamp = data->timestamp;
4212
4213         trace_nfs4_renew_async(clp, task->tk_status);
4214         if (task->tk_status < 0) {
4215                 /* Unless we're shutting down, schedule state recovery! */
4216                 if (test_bit(NFS_CS_RENEWD, &clp->cl_res_state) == 0)
4217                         return;
4218                 if (task->tk_status != NFS4ERR_CB_PATH_DOWN) {
4219                         nfs4_schedule_lease_recovery(clp);
4220                         return;
4221                 }
4222                 nfs4_schedule_path_down_recovery(clp);
4223         }
4224         do_renew_lease(clp, timestamp);
4225 }
4226
4227 static const struct rpc_call_ops nfs4_renew_ops = {
4228         .rpc_call_done = nfs4_renew_done,
4229         .rpc_release = nfs4_renew_release,
4230 };
4231
4232 static int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
4233 {
4234         struct rpc_message msg = {
4235                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
4236                 .rpc_argp       = clp,
4237                 .rpc_cred       = cred,
4238         };
4239         struct nfs4_renewdata *data;
4240
4241         if (renew_flags == 0)
4242                 return 0;
4243         if (!atomic_inc_not_zero(&clp->cl_count))
4244                 return -EIO;
4245         data = kmalloc(sizeof(*data), GFP_NOFS);
4246         if (data == NULL)
4247                 return -ENOMEM;
4248         data->client = clp;
4249         data->timestamp = jiffies;
4250         return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT,
4251                         &nfs4_renew_ops, data);
4252 }
4253
4254 static int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
4255 {
4256         struct rpc_message msg = {
4257                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
4258                 .rpc_argp       = clp,
4259                 .rpc_cred       = cred,
4260         };
4261         unsigned long now = jiffies;
4262         int status;
4263
4264         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
4265         if (status < 0)
4266                 return status;
4267         do_renew_lease(clp, now);
4268         return 0;
4269 }
4270
4271 static inline int nfs4_server_supports_acls(struct nfs_server *server)
4272 {
4273         return (server->caps & NFS_CAP_ACLS)
4274                 && (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
4275                 && (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
4276 }
4277
4278 /* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_SIZE, and that
4279  * it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_SIZE) bytes on
4280  * the stack.
4281  */
4282 #define NFS4ACL_MAXPAGES DIV_ROUND_UP(XATTR_SIZE_MAX, PAGE_SIZE)
4283
4284 static int buf_to_pages_noslab(const void *buf, size_t buflen,
4285                 struct page **pages, unsigned int *pgbase)
4286 {
4287         struct page *newpage, **spages;
4288         int rc = 0;
4289         size_t len;
4290         spages = pages;
4291
4292         do {
4293                 len = min_t(size_t, PAGE_SIZE, buflen);
4294                 newpage = alloc_page(GFP_KERNEL);
4295
4296                 if (newpage == NULL)
4297                         goto unwind;
4298                 memcpy(page_address(newpage), buf, len);
4299                 buf += len;
4300                 buflen -= len;
4301                 *pages++ = newpage;
4302                 rc++;
4303         } while (buflen != 0);
4304
4305         return rc;
4306
4307 unwind:
4308         for(; rc > 0; rc--)
4309                 __free_page(spages[rc-1]);
4310         return -ENOMEM;
4311 }
4312
4313 struct nfs4_cached_acl {
4314         int cached;
4315         size_t len;
4316         char data[0];
4317 };
4318
4319 static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
4320 {
4321         struct nfs_inode *nfsi = NFS_I(inode);
4322
4323         spin_lock(&inode->i_lock);
4324         kfree(nfsi->nfs4_acl);
4325         nfsi->nfs4_acl = acl;
4326         spin_unlock(&inode->i_lock);
4327 }
4328
4329 static void nfs4_zap_acl_attr(struct inode *inode)
4330 {
4331         nfs4_set_cached_acl(inode, NULL);
4332 }
4333
4334 static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
4335 {
4336         struct nfs_inode *nfsi = NFS_I(inode);
4337         struct nfs4_cached_acl *acl;
4338         int ret = -ENOENT;
4339
4340         spin_lock(&inode->i_lock);
4341         acl = nfsi->nfs4_acl;
4342         if (acl == NULL)
4343                 goto out;
4344         if (buf == NULL) /* user is just asking for length */
4345                 goto out_len;
4346         if (acl->cached == 0)
4347                 goto out;
4348         ret = -ERANGE; /* see getxattr(2) man page */
4349         if (acl->len > buflen)
4350                 goto out;
4351         memcpy(buf, acl->data, acl->len);
4352 out_len:
4353         ret = acl->len;
4354 out:
4355         spin_unlock(&inode->i_lock);
4356         return ret;
4357 }
4358
4359 static void nfs4_write_cached_acl(struct inode *inode, struct page **pages, size_t pgbase, size_t acl_len)
4360 {
4361         struct nfs4_cached_acl *acl;
4362         size_t buflen = sizeof(*acl) + acl_len;
4363
4364         if (buflen <= PAGE_SIZE) {
4365                 acl = kmalloc(buflen, GFP_KERNEL);
4366                 if (acl == NULL)
4367                         goto out;
4368                 acl->cached = 1;
4369                 _copy_from_pages(acl->data, pages, pgbase, acl_len);
4370         } else {
4371                 acl = kmalloc(sizeof(*acl), GFP_KERNEL);
4372                 if (acl == NULL)
4373                         goto out;
4374                 acl->cached = 0;
4375         }
4376         acl->len = acl_len;
4377 out:
4378         nfs4_set_cached_acl(inode, acl);
4379 }
4380
4381 /*
4382  * The getxattr API returns the required buffer length when called with a
4383  * NULL buf. The NFSv4 acl tool then calls getxattr again after allocating
4384  * the required buf.  On a NULL buf, we send a page of data to the server
4385  * guessing that the ACL request can be serviced by a page. If so, we cache
4386  * up to the page of ACL data, and the 2nd call to getxattr is serviced by
4387  * the cache. If not so, we throw away the page, and cache the required
4388  * length. The next getxattr call will then produce another round trip to
4389  * the server, this time with the input buf of the required size.
4390  */
4391 static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
4392 {
4393         struct page *pages[NFS4ACL_MAXPAGES] = {NULL, };
4394         struct nfs_getaclargs args = {
4395                 .fh = NFS_FH(inode),
4396                 .acl_pages = pages,
4397                 .acl_len = buflen,
4398         };
4399         struct nfs_getaclres res = {
4400                 .acl_len = buflen,
4401         };
4402         struct rpc_message msg = {
4403                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
4404                 .rpc_argp = &args,
4405                 .rpc_resp = &res,
4406         };
4407         unsigned int npages = DIV_ROUND_UP(buflen, PAGE_SIZE);
4408         int ret = -ENOMEM, i;
4409
4410         /* As long as we're doing a round trip to the server anyway,
4411          * let's be prepared for a page of acl data. */
4412         if (npages == 0)
4413                 npages = 1;
4414         if (npages > ARRAY_SIZE(pages))
4415                 return -ERANGE;
4416
4417         for (i = 0; i < npages; i++) {
4418                 pages[i] = alloc_page(GFP_KERNEL);
4419                 if (!pages[i])
4420                         goto out_free;
4421         }
4422
4423         /* for decoding across pages */
4424         res.acl_scratch = alloc_page(GFP_KERNEL);
4425         if (!res.acl_scratch)
4426                 goto out_free;
4427
4428         args.acl_len = npages * PAGE_SIZE;
4429         args.acl_pgbase = 0;
4430
4431         dprintk("%s  buf %p buflen %zu npages %d args.acl_len %zu\n",
4432                 __func__, buf, buflen, npages, args.acl_len);
4433         ret = nfs4_call_sync(NFS_SERVER(inode)->client, NFS_SERVER(inode),
4434                              &msg, &args.seq_args, &res.seq_res, 0);
4435         if (ret)
4436                 goto out_free;
4437
4438         /* Handle the case where the passed-in buffer is too short */
4439         if (res.acl_flags & NFS4_ACL_TRUNC) {
4440                 /* Did the user only issue a request for the acl length? */
4441                 if (buf == NULL)
4442                         goto out_ok;
4443                 ret = -ERANGE;
4444                 goto out_free;
4445         }
4446         nfs4_write_cached_acl(inode, pages, res.acl_data_offset, res.acl_len);
4447         if (buf) {
4448                 if (res.acl_len > buflen) {
4449                         ret = -ERANGE;
4450                         goto out_free;
4451                 }
4452                 _copy_from_pages(buf, pages, res.acl_data_offset, res.acl_len);
4453         }
4454 out_ok:
4455         ret = res.acl_len;
4456 out_free:
4457         for (i = 0; i < npages; i++)
4458                 if (pages[i])
4459                         __free_page(pages[i]);
4460         if (res.acl_scratch)
4461                 __free_page(res.acl_scratch);
4462         return ret;
4463 }
4464
4465 static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
4466 {
4467         struct nfs4_exception exception = { };
4468         ssize_t ret;
4469         do {
4470                 ret = __nfs4_get_acl_uncached(inode, buf, buflen);
4471                 trace_nfs4_get_acl(inode, ret);
4472                 if (ret >= 0)
4473                         break;
4474                 ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
4475         } while (exception.retry);
4476         return ret;
4477 }
4478
4479 static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
4480 {
4481         struct nfs_server *server = NFS_SERVER(inode);
4482         int ret;
4483
4484         if (!nfs4_server_supports_acls(server))
4485                 return -EOPNOTSUPP;
4486         ret = nfs_revalidate_inode(server, inode);
4487         if (ret < 0)
4488                 return ret;
4489         if (NFS_I(inode)->cache_validity & NFS_INO_INVALID_ACL)
4490                 nfs_zap_acl_cache(inode);
4491         ret = nfs4_read_cached_acl(inode, buf, buflen);
4492         if (ret != -ENOENT)
4493                 /* -ENOENT is returned if there is no ACL or if there is an ACL
4494                  * but no cached acl data, just the acl length */
4495                 return ret;
4496         return nfs4_get_acl_uncached(inode, buf, buflen);
4497 }
4498
4499 static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4500 {
4501         struct nfs_server *server = NFS_SERVER(inode);
4502         struct page *pages[NFS4ACL_MAXPAGES];
4503         struct nfs_setaclargs arg = {
4504                 .fh             = NFS_FH(inode),
4505                 .acl_pages      = pages,
4506                 .acl_len        = buflen,
4507         };
4508         struct nfs_setaclres res;
4509         struct rpc_message msg = {
4510                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
4511                 .rpc_argp       = &arg,
4512                 .rpc_resp       = &res,
4513         };
4514         unsigned int npages = DIV_ROUND_UP(buflen, PAGE_SIZE);
4515         int ret, i;
4516
4517         if (!nfs4_server_supports_acls(server))
4518                 return -EOPNOTSUPP;
4519         if (npages > ARRAY_SIZE(pages))
4520                 return -ERANGE;
4521         i = buf_to_pages_noslab(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
4522         if (i < 0)
4523                 return i;
4524         nfs4_inode_return_delegation(inode);
4525         ret = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
4526
4527         /*
4528          * Free each page after tx, so the only ref left is
4529          * held by the network stack
4530          */
4531         for (; i > 0; i--)
4532                 put_page(pages[i-1]);
4533
4534         /*
4535          * Acl update can result in inode attribute update.
4536          * so mark the attribute cache invalid.
4537          */
4538         spin_lock(&inode->i_lock);
4539         NFS_I(inode)->cache_validity |= NFS_INO_INVALID_ATTR;
4540         spin_unlock(&inode->i_lock);
4541         nfs_access_zap_cache(inode);
4542         nfs_zap_acl_cache(inode);
4543         return ret;
4544 }
4545
4546 static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
4547 {
4548         struct nfs4_exception exception = { };
4549         int err;
4550         do {
4551                 err = __nfs4_proc_set_acl(inode, buf, buflen);
4552                 trace_nfs4_set_acl(inode, err);
4553                 err = nfs4_handle_exception(NFS_SERVER(inode), err,
4554                                 &exception);
4555         } while (exception.retry);
4556         return err;
4557 }
4558
4559 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
4560 static int _nfs4_get_security_label(struct inode *inode, void *buf,
4561                                         size_t buflen)
4562 {
4563         struct nfs_server *server = NFS_SERVER(inode);
4564         struct nfs_fattr fattr;
4565         struct nfs4_label label = {0, 0, buflen, buf};
4566
4567         u32 bitmask[3] = { 0, 0, FATTR4_WORD2_SECURITY_LABEL };
4568         struct nfs4_getattr_arg args = {
4569                 .fh             = NFS_FH(inode),
4570                 .bitmask        = bitmask,
4571         };
4572         struct nfs4_getattr_res res = {
4573                 .fattr          = &fattr,
4574                 .label          = &label,
4575                 .server         = server,
4576         };
4577         struct rpc_message msg = {
4578                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
4579                 .rpc_argp       = &args,
4580                 .rpc_resp       = &res,
4581         };
4582         int ret;
4583
4584         nfs_fattr_init(&fattr);
4585
4586         ret = rpc_call_sync(server->client, &msg, 0);
4587         if (ret)
4588                 return ret;
4589         if (!(fattr.valid & NFS_ATTR_FATTR_V4_SECURITY_LABEL))
4590                 return -ENOENT;
4591         if (buflen < label.len)
4592                 return -ERANGE;
4593         return 0;
4594 }
4595
4596 static int nfs4_get_security_label(struct inode *inode, void *buf,
4597                                         size_t buflen)
4598 {
4599         struct nfs4_exception exception = { };
4600         int err;
4601
4602         if (!nfs_server_capable(inode, NFS_CAP_SECURITY_LABEL))
4603                 return -EOPNOTSUPP;
4604
4605         do {
4606                 err = _nfs4_get_security_label(inode, buf, buflen);
4607                 trace_nfs4_get_security_label(inode, err);
4608                 err = nfs4_handle_exception(NFS_SERVER(inode), err,
4609                                 &exception);
4610         } while (exception.retry);
4611         return err;
4612 }
4613
4614 static int _nfs4_do_set_security_label(struct inode *inode,
4615                 struct nfs4_label *ilabel,
4616                 struct nfs_fattr *fattr,
4617                 struct nfs4_label *olabel)
4618 {
4619
4620         struct iattr sattr = {0};
4621         struct nfs_server *server = NFS_SERVER(inode);
4622         const u32 bitmask[3] = { 0, 0, FATTR4_WORD2_SECURITY_LABEL };
4623         struct nfs_setattrargs args = {
4624                 .fh             = NFS_FH(inode),
4625                 .iap            = &sattr,
4626                 .server         = server,
4627                 .bitmask        = bitmask,
4628                 .label          = ilabel,
4629         };
4630         struct nfs_setattrres res = {
4631                 .fattr          = fattr,
4632                 .label          = olabel,
4633                 .server         = server,
4634         };
4635         struct rpc_message msg = {
4636                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
4637                 .rpc_argp       = &args,
4638                 .rpc_resp       = &res,
4639         };
4640         int status;
4641
4642         nfs4_stateid_copy(&args.stateid, &zero_stateid);
4643
4644         status = rpc_call_sync(server->client, &msg, 0);
4645         if (status)
4646                 dprintk("%s failed: %d\n", __func__, status);
4647
4648         return status;
4649 }
4650
4651 static int nfs4_do_set_security_label(struct inode *inode,
4652                 struct nfs4_label *ilabel,
4653                 struct nfs_fattr *fattr,
4654                 struct nfs4_label *olabel)
4655 {
4656         struct nfs4_exception exception = { };
4657         int err;
4658
4659         do {
4660                 err = _nfs4_do_set_security_label(inode, ilabel,
4661                                 fattr, olabel);
4662                 trace_nfs4_set_security_label(inode, err);
4663                 err = nfs4_handle_exception(NFS_SERVER(inode), err,
4664                                 &exception);
4665         } while (exception.retry);
4666         return err;
4667 }
4668
4669 static int
4670 nfs4_set_security_label(struct dentry *dentry, const void *buf, size_t buflen)
4671 {
4672         struct nfs4_label ilabel, *olabel = NULL;
4673         struct nfs_fattr fattr;
4674         struct rpc_cred *cred;
4675         struct inode *inode = dentry->d_inode;
4676         int status;
4677
4678         if (!nfs_server_capable(inode, NFS_CAP_SECURITY_LABEL))
4679                 return -EOPNOTSUPP;
4680
4681         nfs_fattr_init(&fattr);
4682
4683         ilabel.pi = 0;
4684         ilabel.lfs = 0;
4685         ilabel.label = (char *)buf;
4686         ilabel.len = buflen;
4687
4688         cred = rpc_lookup_cred();
4689         if (IS_ERR(cred))
4690                 return PTR_ERR(cred);
4691
4692         olabel = nfs4_label_alloc(NFS_SERVER(inode), GFP_KERNEL);
4693         if (IS_ERR(olabel)) {
4694                 status = -PTR_ERR(olabel);
4695                 goto out;
4696         }
4697
4698         status = nfs4_do_set_security_label(inode, &ilabel, &fattr, olabel);
4699         if (status == 0)
4700                 nfs_setsecurity(inode, &fattr, olabel);
4701
4702         nfs4_label_free(olabel);
4703 out:
4704         put_rpccred(cred);
4705         return status;
4706 }
4707 #endif  /* CONFIG_NFS_V4_SECURITY_LABEL */
4708
4709
4710 static int
4711 nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server, struct nfs4_state *state)
4712 {
4713         struct nfs_client *clp = server->nfs_client;
4714
4715         if (task->tk_status >= 0)
4716                 return 0;
4717         switch(task->tk_status) {
4718                 case -NFS4ERR_DELEG_REVOKED:
4719                 case -NFS4ERR_ADMIN_REVOKED:
4720                 case -NFS4ERR_BAD_STATEID:
4721                         if (state == NULL)
4722                                 break;
4723                         nfs_remove_bad_delegation(state->inode);
4724                 case -NFS4ERR_OPENMODE:
4725                         if (state == NULL)
4726                                 break;
4727                         if (nfs4_schedule_stateid_recovery(server, state) < 0)
4728                                 goto stateid_invalid;
4729                         goto wait_on_recovery;
4730                 case -NFS4ERR_EXPIRED:
4731                         if (state != NULL) {
4732                                 if (nfs4_schedule_stateid_recovery(server, state) < 0)
4733                                         goto stateid_invalid;
4734                         }
4735                 case -NFS4ERR_STALE_STATEID:
4736                 case -NFS4ERR_STALE_CLIENTID:
4737                         nfs4_schedule_lease_recovery(clp);
4738                         goto wait_on_recovery;
4739 #if defined(CONFIG_NFS_V4_1)
4740                 case -NFS4ERR_BADSESSION:
4741                 case -NFS4ERR_BADSLOT:
4742                 case -NFS4ERR_BAD_HIGH_SLOT:
4743                 case -NFS4ERR_DEADSESSION:
4744                 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
4745                 case -NFS4ERR_SEQ_FALSE_RETRY:
4746                 case -NFS4ERR_SEQ_MISORDERED:
4747                         dprintk("%s ERROR %d, Reset session\n", __func__,
4748                                 task->tk_status);
4749                         nfs4_schedule_session_recovery(clp->cl_session, task->tk_status);
4750                         task->tk_status = 0;
4751                         return -EAGAIN;
4752 #endif /* CONFIG_NFS_V4_1 */
4753                 case -NFS4ERR_DELAY:
4754                         nfs_inc_server_stats(server, NFSIOS_DELAY);
4755                 case -NFS4ERR_GRACE:
4756                         rpc_delay(task, NFS4_POLL_RETRY_MAX);
4757                         task->tk_status = 0;
4758                         return -EAGAIN;
4759                 case -NFS4ERR_RETRY_UNCACHED_REP:
4760                 case -NFS4ERR_OLD_STATEID:
4761                         task->tk_status = 0;
4762                         return -EAGAIN;
4763         }
4764         task->tk_status = nfs4_map_errors(task->tk_status);
4765         return 0;
4766 stateid_invalid:
4767         task->tk_status = -EIO;
4768         return 0;
4769 wait_on_recovery:
4770         rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL);
4771         if (test_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) == 0)
4772                 rpc_wake_up_queued_task(&clp->cl_rpcwaitq, task);
4773         task->tk_status = 0;
4774         return -EAGAIN;
4775 }
4776
4777 static void nfs4_init_boot_verifier(const struct nfs_client *clp,
4778                                     nfs4_verifier *bootverf)
4779 {
4780         __be32 verf[2];
4781
4782         if (test_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state)) {
4783                 /* An impossible timestamp guarantees this value
4784                  * will never match a generated boot time. */
4785                 verf[0] = 0;
4786                 verf[1] = cpu_to_be32(NSEC_PER_SEC + 1);
4787         } else {
4788                 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
4789                 verf[0] = cpu_to_be32(nn->boot_time.tv_sec);
4790                 verf[1] = cpu_to_be32(nn->boot_time.tv_nsec);
4791         }
4792         memcpy(bootverf->data, verf, sizeof(bootverf->data));
4793 }
4794
4795 static unsigned int
4796 nfs4_init_nonuniform_client_string(const struct nfs_client *clp,
4797                                    char *buf, size_t len)
4798 {
4799         unsigned int result;
4800
4801         rcu_read_lock();
4802         result = scnprintf(buf, len, "Linux NFSv4.0 %s/%s %s",
4803                                 clp->cl_ipaddr,
4804                                 rpc_peeraddr2str(clp->cl_rpcclient,
4805                                                         RPC_DISPLAY_ADDR),
4806                                 rpc_peeraddr2str(clp->cl_rpcclient,
4807                                                         RPC_DISPLAY_PROTO));
4808         rcu_read_unlock();
4809         return result;
4810 }
4811
4812 static unsigned int
4813 nfs4_init_uniform_client_string(const struct nfs_client *clp,
4814                                 char *buf, size_t len)
4815 {
4816         const char *nodename = clp->cl_rpcclient->cl_nodename;
4817
4818         if (nfs4_client_id_uniquifier[0] != '\0')
4819                 return scnprintf(buf, len, "Linux NFSv%u.%u %s/%s",
4820                                 clp->rpc_ops->version,
4821                                 clp->cl_minorversion,
4822                                 nfs4_client_id_uniquifier,
4823                                 nodename);
4824         return scnprintf(buf, len, "Linux NFSv%u.%u %s",
4825                                 clp->rpc_ops->version, clp->cl_minorversion,
4826                                 nodename);
4827 }
4828
4829 /**
4830  * nfs4_proc_setclientid - Negotiate client ID
4831  * @clp: state data structure
4832  * @program: RPC program for NFSv4 callback service
4833  * @port: IP port number for NFS4 callback service
4834  * @cred: RPC credential to use for this call
4835  * @res: where to place the result
4836  *
4837  * Returns zero, a negative errno, or a negative NFS4ERR status code.
4838  */
4839 int nfs4_proc_setclientid(struct nfs_client *clp, u32 program,
4840                 unsigned short port, struct rpc_cred *cred,
4841                 struct nfs4_setclientid_res *res)
4842 {
4843         nfs4_verifier sc_verifier;
4844         struct nfs4_setclientid setclientid = {
4845                 .sc_verifier = &sc_verifier,
4846                 .sc_prog = program,
4847                 .sc_cb_ident = clp->cl_cb_ident,
4848         };
4849         struct rpc_message msg = {
4850                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
4851                 .rpc_argp = &setclientid,
4852                 .rpc_resp = res,
4853                 .rpc_cred = cred,
4854         };
4855         int status;
4856
4857         /* nfs_client_id4 */
4858         nfs4_init_boot_verifier(clp, &sc_verifier);
4859         if (test_bit(NFS_CS_MIGRATION, &clp->cl_flags))
4860                 setclientid.sc_name_len =
4861                                 nfs4_init_uniform_client_string(clp,
4862                                                 setclientid.sc_name,
4863                                                 sizeof(setclientid.sc_name));
4864         else
4865                 setclientid.sc_name_len =
4866                                 nfs4_init_nonuniform_client_string(clp,
4867                                                 setclientid.sc_name,
4868                                                 sizeof(setclientid.sc_name));
4869         /* cb_client4 */
4870         rcu_read_lock();
4871         setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
4872                                 sizeof(setclientid.sc_netid), "%s",
4873                                 rpc_peeraddr2str(clp->cl_rpcclient,
4874                                                         RPC_DISPLAY_NETID));
4875         rcu_read_unlock();
4876         setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
4877                                 sizeof(setclientid.sc_uaddr), "%s.%u.%u",
4878                                 clp->cl_ipaddr, port >> 8, port & 255);
4879
4880         dprintk("NFS call  setclientid auth=%s, '%.*s'\n",
4881                 clp->cl_rpcclient->cl_auth->au_ops->au_name,
4882                 setclientid.sc_name_len, setclientid.sc_name);
4883         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
4884         trace_nfs4_setclientid(clp, status);
4885         dprintk("NFS reply setclientid: %d\n", status);
4886         return status;
4887 }
4888
4889 /**
4890  * nfs4_proc_setclientid_confirm - Confirm client ID
4891  * @clp: state data structure
4892  * @res: result of a previous SETCLIENTID
4893  * @cred: RPC credential to use for this call
4894  *
4895  * Returns zero, a negative errno, or a negative NFS4ERR status code.
4896  */
4897 int nfs4_proc_setclientid_confirm(struct nfs_client *clp,
4898                 struct nfs4_setclientid_res *arg,
4899                 struct rpc_cred *cred)
4900 {
4901         struct rpc_message msg = {
4902                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
4903                 .rpc_argp = arg,
4904                 .rpc_cred = cred,
4905         };
4906         int status;
4907
4908         dprintk("NFS call  setclientid_confirm auth=%s, (client ID %llx)\n",
4909                 clp->cl_rpcclient->cl_auth->au_ops->au_name,
4910                 clp->cl_clientid);
4911         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
4912         trace_nfs4_setclientid_confirm(clp, status);
4913         dprintk("NFS reply setclientid_confirm: %d\n", status);
4914         return status;
4915 }
4916
4917 struct nfs4_delegreturndata {
4918         struct nfs4_delegreturnargs args;
4919         struct nfs4_delegreturnres res;
4920         struct nfs_fh fh;
4921         nfs4_stateid stateid;
4922         unsigned long timestamp;
4923         struct nfs_fattr fattr;
4924         int rpc_status;
4925 };
4926
4927 static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
4928 {
4929         struct nfs4_delegreturndata *data = calldata;
4930
4931         if (!nfs4_sequence_done(task, &data->res.seq_res))
4932                 return;
4933
4934         trace_nfs4_delegreturn_exit(&data->args, &data->res, task->tk_status);
4935         switch (task->tk_status) {
4936         case -NFS4ERR_STALE_STATEID:
4937         case -NFS4ERR_EXPIRED:
4938         case 0:
4939                 renew_lease(data->res.server, data->timestamp);
4940                 break;
4941         default:
4942                 if (nfs4_async_handle_error(task, data->res.server, NULL) ==
4943                                 -EAGAIN) {
4944                         rpc_restart_call_prepare(task);
4945                         return;
4946                 }
4947         }
4948         data->rpc_status = task->tk_status;
4949 }
4950
4951 static void nfs4_delegreturn_release(void *calldata)
4952 {
4953         kfree(calldata);
4954 }
4955
4956 static void nfs4_delegreturn_prepare(struct rpc_task *task, void *data)
4957 {
4958         struct nfs4_delegreturndata *d_data;
4959
4960         d_data = (struct nfs4_delegreturndata *)data;
4961
4962         nfs4_setup_sequence(d_data->res.server,
4963                         &d_data->args.seq_args,
4964                         &d_data->res.seq_res,
4965                         task);
4966 }
4967
4968 static const struct rpc_call_ops nfs4_delegreturn_ops = {
4969         .rpc_call_prepare = nfs4_delegreturn_prepare,
4970         .rpc_call_done = nfs4_delegreturn_done,
4971         .rpc_release = nfs4_delegreturn_release,
4972 };
4973
4974 static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
4975 {
4976         struct nfs4_delegreturndata *data;
4977         struct nfs_server *server = NFS_SERVER(inode);
4978         struct rpc_task *task;
4979         struct rpc_message msg = {
4980                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
4981                 .rpc_cred = cred,
4982         };
4983         struct rpc_task_setup task_setup_data = {
4984                 .rpc_client = server->client,
4985                 .rpc_message = &msg,
4986                 .callback_ops = &nfs4_delegreturn_ops,
4987                 .flags = RPC_TASK_ASYNC,
4988         };
4989         int status = 0;
4990
4991         data = kzalloc(sizeof(*data), GFP_NOFS);
4992         if (data == NULL)
4993                 return -ENOMEM;
4994         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
4995         data->args.fhandle = &data->fh;
4996         data->args.stateid = &data->stateid;
4997         data->args.bitmask = server->cache_consistency_bitmask;
4998         nfs_copy_fh(&data->fh, NFS_FH(inode));
4999         nfs4_stateid_copy(&data->stateid, stateid);
5000         data->res.fattr = &data->fattr;
5001         data->res.server = server;
5002         nfs_fattr_init(data->res.fattr);
5003         data->timestamp = jiffies;
5004         data->rpc_status = 0;
5005
5006         task_setup_data.callback_data = data;
5007         msg.rpc_argp = &data->args;
5008         msg.rpc_resp = &data->res;
5009         task = rpc_run_task(&task_setup_data);
5010         if (IS_ERR(task))
5011                 return PTR_ERR(task);
5012         if (!issync)
5013                 goto out;
5014         status = nfs4_wait_for_completion_rpc_task(task);
5015         if (status != 0)
5016                 goto out;
5017         status = data->rpc_status;
5018         if (status == 0)
5019                 nfs_post_op_update_inode_force_wcc(inode, &data->fattr);
5020         else
5021                 nfs_refresh_inode(inode, &data->fattr);
5022 out:
5023         rpc_put_task(task);
5024         return status;
5025 }
5026
5027 int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid, int issync)
5028 {
5029         struct nfs_server *server = NFS_SERVER(inode);
5030         struct nfs4_exception exception = { };
5031         int err;
5032         do {
5033                 err = _nfs4_proc_delegreturn(inode, cred, stateid, issync);
5034                 trace_nfs4_delegreturn(inode, err);
5035                 switch (err) {
5036                         case -NFS4ERR_STALE_STATEID:
5037                         case -NFS4ERR_EXPIRED:
5038                         case 0:
5039                                 return 0;
5040                 }
5041                 err = nfs4_handle_exception(server, err, &exception);
5042         } while (exception.retry);
5043         return err;
5044 }
5045
5046 #define NFS4_LOCK_MINTIMEOUT (1 * HZ)
5047 #define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
5048
5049 /* 
5050  * sleep, with exponential backoff, and retry the LOCK operation. 
5051  */
5052 static unsigned long
5053 nfs4_set_lock_task_retry(unsigned long timeout)
5054 {
5055         freezable_schedule_timeout_killable_unsafe(timeout);
5056         timeout <<= 1;
5057         if (timeout > NFS4_LOCK_MAXTIMEOUT)
5058                 return NFS4_LOCK_MAXTIMEOUT;
5059         return timeout;
5060 }
5061
5062 static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5063 {
5064         struct inode *inode = state->inode;
5065         struct nfs_server *server = NFS_SERVER(inode);
5066         struct nfs_client *clp = server->nfs_client;
5067         struct nfs_lockt_args arg = {
5068                 .fh = NFS_FH(inode),
5069                 .fl = request,
5070         };
5071         struct nfs_lockt_res res = {
5072                 .denied = request,
5073         };
5074         struct rpc_message msg = {
5075                 .rpc_proc       = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
5076                 .rpc_argp       = &arg,
5077                 .rpc_resp       = &res,
5078                 .rpc_cred       = state->owner->so_cred,
5079         };
5080         struct nfs4_lock_state *lsp;
5081         int status;
5082
5083         arg.lock_owner.clientid = clp->cl_clientid;
5084         status = nfs4_set_lock_state(state, request);
5085         if (status != 0)
5086                 goto out;
5087         lsp = request->fl_u.nfs4_fl.owner;
5088         arg.lock_owner.id = lsp->ls_seqid.owner_id;
5089         arg.lock_owner.s_dev = server->s_dev;
5090         status = nfs4_call_sync(server->client, server, &msg, &arg.seq_args, &res.seq_res, 1);
5091         switch (status) {
5092                 case 0:
5093                         request->fl_type = F_UNLCK;
5094                         break;
5095                 case -NFS4ERR_DENIED:
5096                         status = 0;
5097         }
5098         request->fl_ops->fl_release_private(request);
5099 out:
5100         return status;
5101 }
5102
5103 static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5104 {
5105         struct nfs4_exception exception = { };
5106         int err;
5107
5108         do {
5109                 err = _nfs4_proc_getlk(state, cmd, request);
5110                 trace_nfs4_get_lock(request, state, cmd, err);
5111                 err = nfs4_handle_exception(NFS_SERVER(state->inode), err,
5112                                 &exception);
5113         } while (exception.retry);
5114         return err;
5115 }
5116
5117 static int do_vfs_lock(struct file *file, struct file_lock *fl)
5118 {
5119         int res = 0;
5120         switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
5121                 case FL_POSIX:
5122                         res = posix_lock_file_wait(file, fl);
5123                         break;
5124                 case FL_FLOCK:
5125                         res = flock_lock_file_wait(file, fl);
5126                         break;
5127                 default:
5128                         BUG();
5129         }
5130         return res;
5131 }
5132
5133 struct nfs4_unlockdata {
5134         struct nfs_locku_args arg;
5135         struct nfs_locku_res res;
5136         struct nfs4_lock_state *lsp;
5137         struct nfs_open_context *ctx;
5138         struct file_lock fl;
5139         const struct nfs_server *server;
5140         unsigned long timestamp;
5141 };
5142
5143 static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
5144                 struct nfs_open_context *ctx,
5145                 struct nfs4_lock_state *lsp,
5146                 struct nfs_seqid *seqid)
5147 {
5148         struct nfs4_unlockdata *p;
5149         struct inode *inode = lsp->ls_state->inode;
5150
5151         p = kzalloc(sizeof(*p), GFP_NOFS);
5152         if (p == NULL)
5153                 return NULL;
5154         p->arg.fh = NFS_FH(inode);
5155         p->arg.fl = &p->fl;
5156         p->arg.seqid = seqid;
5157         p->res.seqid = seqid;
5158         p->arg.stateid = &lsp->ls_stateid;
5159         p->lsp = lsp;
5160         atomic_inc(&lsp->ls_count);
5161         /* Ensure we don't close file until we're done freeing locks! */
5162         p->ctx = get_nfs_open_context(ctx);
5163         memcpy(&p->fl, fl, sizeof(p->fl));
5164         p->server = NFS_SERVER(inode);
5165         return p;
5166 }
5167
5168 static void nfs4_locku_release_calldata(void *data)
5169 {
5170         struct nfs4_unlockdata *calldata = data;
5171         nfs_free_seqid(calldata->arg.seqid);
5172         nfs4_put_lock_state(calldata->lsp);
5173         put_nfs_open_context(calldata->ctx);
5174         kfree(calldata);
5175 }
5176
5177 static void nfs4_locku_done(struct rpc_task *task, void *data)
5178 {
5179         struct nfs4_unlockdata *calldata = data;
5180
5181         if (!nfs4_sequence_done(task, &calldata->res.seq_res))
5182                 return;
5183         switch (task->tk_status) {
5184                 case 0:
5185                         nfs4_stateid_copy(&calldata->lsp->ls_stateid,
5186                                         &calldata->res.stateid);
5187                         renew_lease(calldata->server, calldata->timestamp);
5188                         break;
5189                 case -NFS4ERR_BAD_STATEID:
5190                 case -NFS4ERR_OLD_STATEID:
5191                 case -NFS4ERR_STALE_STATEID:
5192                 case -NFS4ERR_EXPIRED:
5193                         break;
5194                 default:
5195                         if (nfs4_async_handle_error(task, calldata->server, NULL) == -EAGAIN)
5196                                 rpc_restart_call_prepare(task);
5197         }
5198         nfs_release_seqid(calldata->arg.seqid);
5199 }
5200
5201 static void nfs4_locku_prepare(struct rpc_task *task, void *data)
5202 {
5203         struct nfs4_unlockdata *calldata = data;
5204
5205         if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
5206                 goto out_wait;
5207         if (test_bit(NFS_LOCK_INITIALIZED, &calldata->lsp->ls_flags) == 0) {
5208                 /* Note: exit _without_ running nfs4_locku_done */
5209                 goto out_no_action;
5210         }
5211         calldata->timestamp = jiffies;
5212         if (nfs4_setup_sequence(calldata->server,
5213                                 &calldata->arg.seq_args,
5214                                 &calldata->res.seq_res,
5215                                 task) != 0)
5216                 nfs_release_seqid(calldata->arg.seqid);
5217         return;
5218 out_no_action:
5219         task->tk_action = NULL;
5220 out_wait:
5221         nfs4_sequence_done(task, &calldata->res.seq_res);
5222 }
5223
5224 static const struct rpc_call_ops nfs4_locku_ops = {
5225         .rpc_call_prepare = nfs4_locku_prepare,
5226         .rpc_call_done = nfs4_locku_done,
5227         .rpc_release = nfs4_locku_release_calldata,
5228 };
5229
5230 static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
5231                 struct nfs_open_context *ctx,
5232                 struct nfs4_lock_state *lsp,
5233                 struct nfs_seqid *seqid)
5234 {
5235         struct nfs4_unlockdata *data;
5236         struct rpc_message msg = {
5237                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
5238                 .rpc_cred = ctx->cred,
5239         };
5240         struct rpc_task_setup task_setup_data = {
5241                 .rpc_client = NFS_CLIENT(lsp->ls_state->inode),
5242                 .rpc_message = &msg,
5243                 .callback_ops = &nfs4_locku_ops,
5244                 .workqueue = nfsiod_workqueue,
5245                 .flags = RPC_TASK_ASYNC,
5246         };
5247
5248         nfs4_state_protect(NFS_SERVER(lsp->ls_state->inode)->nfs_client,
5249                 NFS_SP4_MACH_CRED_CLEANUP, &task_setup_data.rpc_client, &msg);
5250
5251         /* Ensure this is an unlock - when canceling a lock, the
5252          * canceled lock is passed in, and it won't be an unlock.
5253          */
5254         fl->fl_type = F_UNLCK;
5255
5256         data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
5257         if (data == NULL) {
5258                 nfs_free_seqid(seqid);
5259                 return ERR_PTR(-ENOMEM);
5260         }
5261
5262         nfs4_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
5263         msg.rpc_argp = &data->arg;
5264         msg.rpc_resp = &data->res;
5265         task_setup_data.callback_data = data;
5266         return rpc_run_task(&task_setup_data);
5267 }
5268
5269 static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
5270 {
5271         struct inode *inode = state->inode;
5272         struct nfs4_state_owner *sp = state->owner;
5273         struct nfs_inode *nfsi = NFS_I(inode);
5274         struct nfs_seqid *seqid;
5275         struct nfs4_lock_state *lsp;
5276         struct rpc_task *task;
5277         int status = 0;
5278         unsigned char fl_flags = request->fl_flags;
5279
5280         status = nfs4_set_lock_state(state, request);
5281         /* Unlock _before_ we do the RPC call */
5282         request->fl_flags |= FL_EXISTS;
5283         /* Exclude nfs_delegation_claim_locks() */
5284         mutex_lock(&sp->so_delegreturn_mutex);
5285         /* Exclude nfs4_reclaim_open_stateid() - note nesting! */
5286         down_read(&nfsi->rwsem);
5287         if (do_vfs_lock(request->fl_file, request) == -ENOENT) {
5288                 up_read(&nfsi->rwsem);
5289                 mutex_unlock(&sp->so_delegreturn_mutex);
5290                 goto out;
5291         }
5292         up_read(&nfsi->rwsem);
5293         mutex_unlock(&sp->so_delegreturn_mutex);
5294         if (status != 0)
5295                 goto out;
5296         /* Is this a delegated lock? */
5297         lsp = request->fl_u.nfs4_fl.owner;
5298         if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags) == 0)
5299                 goto out;
5300         seqid = nfs_alloc_seqid(&lsp->ls_seqid, GFP_KERNEL);
5301         status = -ENOMEM;
5302         if (seqid == NULL)
5303                 goto out;
5304         task = nfs4_do_unlck(request, nfs_file_open_context(request->fl_file), lsp, seqid);
5305         status = PTR_ERR(task);
5306         if (IS_ERR(task))
5307                 goto out;
5308         status = nfs4_wait_for_completion_rpc_task(task);
5309         rpc_put_task(task);
5310 out:
5311         request->fl_flags = fl_flags;
5312         trace_nfs4_unlock(request, state, F_SETLK, status);
5313         return status;
5314 }
5315
5316 struct nfs4_lockdata {
5317         struct nfs_lock_args arg;
5318         struct nfs_lock_res res;
5319         struct nfs4_lock_state *lsp;
5320         struct nfs_open_context *ctx;
5321         struct file_lock fl;
5322         unsigned long timestamp;
5323         int rpc_status;
5324         int cancelled;
5325         struct nfs_server *server;
5326 };
5327
5328 static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
5329                 struct nfs_open_context *ctx, struct nfs4_lock_state *lsp,
5330                 gfp_t gfp_mask)
5331 {
5332         struct nfs4_lockdata *p;
5333         struct inode *inode = lsp->ls_state->inode;
5334         struct nfs_server *server = NFS_SERVER(inode);
5335
5336         p = kzalloc(sizeof(*p), gfp_mask);
5337         if (p == NULL)
5338                 return NULL;
5339
5340         p->arg.fh = NFS_FH(inode);
5341         p->arg.fl = &p->fl;
5342         p->arg.open_seqid = nfs_alloc_seqid(&lsp->ls_state->owner->so_seqid, gfp_mask);
5343         if (p->arg.open_seqid == NULL)
5344                 goto out_free;
5345         p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid, gfp_mask);
5346         if (p->arg.lock_seqid == NULL)
5347                 goto out_free_seqid;
5348         p->arg.lock_stateid = &lsp->ls_stateid;
5349         p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
5350         p->arg.lock_owner.id = lsp->ls_seqid.owner_id;
5351         p->arg.lock_owner.s_dev = server->s_dev;
5352         p->res.lock_seqid = p->arg.lock_seqid;
5353         p->lsp = lsp;
5354         p->server = server;
5355         atomic_inc(&lsp->ls_count);
5356         p->ctx = get_nfs_open_context(ctx);
5357         memcpy(&p->fl, fl, sizeof(p->fl));
5358         return p;
5359 out_free_seqid:
5360         nfs_free_seqid(p->arg.open_seqid);
5361 out_free:
5362         kfree(p);
5363         return NULL;
5364 }
5365
5366 static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
5367 {
5368         struct nfs4_lockdata *data = calldata;
5369         struct nfs4_state *state = data->lsp->ls_state;
5370
5371         dprintk("%s: begin!\n", __func__);
5372         if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
5373                 goto out_wait;
5374         /* Do we need to do an open_to_lock_owner? */
5375         if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
5376                 if (nfs_wait_on_sequence(data->arg.open_seqid, task) != 0) {
5377                         goto out_release_lock_seqid;
5378                 }
5379                 data->arg.open_stateid = &state->open_stateid;
5380                 data->arg.new_lock_owner = 1;
5381                 data->res.open_seqid = data->arg.open_seqid;
5382         } else
5383                 data->arg.new_lock_owner = 0;
5384         if (!nfs4_valid_open_stateid(state)) {
5385                 data->rpc_status = -EBADF;
5386                 task->tk_action = NULL;
5387                 goto out_release_open_seqid;
5388         }
5389         data->timestamp = jiffies;
5390         if (nfs4_setup_sequence(data->server,
5391                                 &data->arg.seq_args,
5392                                 &data->res.seq_res,
5393                                 task) == 0)
5394                 return;
5395 out_release_open_seqid:
5396         nfs_release_seqid(data->arg.open_seqid);
5397 out_release_lock_seqid:
5398         nfs_release_seqid(data->arg.lock_seqid);
5399 out_wait:
5400         nfs4_sequence_done(task, &data->res.seq_res);
5401         dprintk("%s: done!, ret = %d\n", __func__, data->rpc_status);
5402 }
5403
5404 static void nfs4_lock_done(struct rpc_task *task, void *calldata)
5405 {
5406         struct nfs4_lockdata *data = calldata;
5407
5408         dprintk("%s: begin!\n", __func__);
5409
5410         if (!nfs4_sequence_done(task, &data->res.seq_res))
5411                 return;
5412
5413         data->rpc_status = task->tk_status;
5414         if (data->arg.new_lock_owner != 0) {
5415                 if (data->rpc_status == 0)
5416                         nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
5417                 else
5418                         goto out;
5419         }
5420         if (data->rpc_status == 0) {
5421                 nfs4_stateid_copy(&data->lsp->ls_stateid, &data->res.stateid);
5422                 set_bit(NFS_LOCK_INITIALIZED, &data->lsp->ls_flags);
5423                 renew_lease(NFS_SERVER(data->ctx->dentry->d_inode), data->timestamp);
5424         }
5425 out:
5426         dprintk("%s: done, ret = %d!\n", __func__, data->rpc_status);
5427 }
5428
5429 static void nfs4_lock_release(void *calldata)
5430 {
5431         struct nfs4_lockdata *data = calldata;
5432
5433         dprintk("%s: begin!\n", __func__);
5434         nfs_free_seqid(data->arg.open_seqid);
5435         if (data->cancelled != 0) {
5436                 struct rpc_task *task;
5437                 task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
5438                                 data->arg.lock_seqid);
5439                 if (!IS_ERR(task))
5440                         rpc_put_task_async(task);
5441                 dprintk("%s: cancelling lock!\n", __func__);
5442         } else
5443                 nfs_free_seqid(data->arg.lock_seqid);
5444         nfs4_put_lock_state(data->lsp);
5445         put_nfs_open_context(data->ctx);
5446         kfree(data);
5447         dprintk("%s: done!\n", __func__);
5448 }
5449
5450 static const struct rpc_call_ops nfs4_lock_ops = {
5451         .rpc_call_prepare = nfs4_lock_prepare,
5452         .rpc_call_done = nfs4_lock_done,
5453         .rpc_release = nfs4_lock_release,
5454 };
5455
5456 static void nfs4_handle_setlk_error(struct nfs_server *server, struct nfs4_lock_state *lsp, int new_lock_owner, int error)
5457 {
5458         switch (error) {
5459         case -NFS4ERR_ADMIN_REVOKED:
5460         case -NFS4ERR_BAD_STATEID:
5461                 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
5462                 if (new_lock_owner != 0 ||
5463                    test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags) != 0)
5464                         nfs4_schedule_stateid_recovery(server, lsp->ls_state);
5465                 break;
5466         case -NFS4ERR_STALE_STATEID:
5467                 lsp->ls_seqid.flags &= ~NFS_SEQID_CONFIRMED;
5468         case -NFS4ERR_EXPIRED:
5469                 nfs4_schedule_lease_recovery(server->nfs_client);
5470         };
5471 }
5472
5473 static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int recovery_type)
5474 {
5475         struct nfs4_lockdata *data;
5476         struct rpc_task *task;
5477         struct rpc_message msg = {
5478                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
5479                 .rpc_cred = state->owner->so_cred,
5480         };
5481         struct rpc_task_setup task_setup_data = {
5482                 .rpc_client = NFS_CLIENT(state->inode),
5483                 .rpc_message = &msg,
5484                 .callback_ops = &nfs4_lock_ops,
5485                 .workqueue = nfsiod_workqueue,
5486                 .flags = RPC_TASK_ASYNC,
5487         };
5488         int ret;
5489
5490         dprintk("%s: begin!\n", __func__);
5491         data = nfs4_alloc_lockdata(fl, nfs_file_open_context(fl->fl_file),
5492                         fl->fl_u.nfs4_fl.owner,
5493                         recovery_type == NFS_LOCK_NEW ? GFP_KERNEL : GFP_NOFS);
5494         if (data == NULL)
5495                 return -ENOMEM;
5496         if (IS_SETLKW(cmd))
5497                 data->arg.block = 1;
5498         nfs4_init_sequence(&data->arg.seq_args, &data->res.seq_res, 1);
5499         msg.rpc_argp = &data->arg;
5500         msg.rpc_resp = &data->res;
5501         task_setup_data.callback_data = data;
5502         if (recovery_type > NFS_LOCK_NEW) {
5503                 if (recovery_type == NFS_LOCK_RECLAIM)
5504                         data->arg.reclaim = NFS_LOCK_RECLAIM;
5505                 nfs4_set_sequence_privileged(&data->arg.seq_args);
5506         }
5507         task = rpc_run_task(&task_setup_data);
5508         if (IS_ERR(task))
5509                 return PTR_ERR(task);
5510         ret = nfs4_wait_for_completion_rpc_task(task);
5511         if (ret == 0) {
5512                 ret = data->rpc_status;
5513                 if (ret)
5514                         nfs4_handle_setlk_error(data->server, data->lsp,
5515                                         data->arg.new_lock_owner, ret);
5516         } else
5517                 data->cancelled = 1;
5518         rpc_put_task(task);
5519         dprintk("%s: done, ret = %d!\n", __func__, ret);
5520         return ret;
5521 }
5522
5523 static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
5524 {
5525         struct nfs_server *server = NFS_SERVER(state->inode);
5526         struct nfs4_exception exception = {
5527                 .inode = state->inode,
5528         };
5529         int err;
5530
5531         do {
5532                 /* Cache the lock if possible... */
5533                 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
5534                         return 0;
5535                 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_RECLAIM);
5536                 trace_nfs4_lock_reclaim(request, state, F_SETLK, err);
5537                 if (err != -NFS4ERR_DELAY)
5538                         break;
5539                 nfs4_handle_exception(server, err, &exception);
5540         } while (exception.retry);
5541         return err;
5542 }
5543
5544 static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
5545 {
5546         struct nfs_server *server = NFS_SERVER(state->inode);
5547         struct nfs4_exception exception = {
5548                 .inode = state->inode,
5549         };
5550         int err;
5551
5552         err = nfs4_set_lock_state(state, request);
5553         if (err != 0)
5554                 return err;
5555         if (!recover_lost_locks) {
5556                 set_bit(NFS_LOCK_LOST, &request->fl_u.nfs4_fl.owner->ls_flags);
5557                 return 0;
5558         }
5559         do {
5560                 if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
5561                         return 0;
5562                 err = _nfs4_do_setlk(state, F_SETLK, request, NFS_LOCK_EXPIRED);
5563                 trace_nfs4_lock_expired(request, state, F_SETLK, err);
5564                 switch (err) {
5565                 default:
5566                         goto out;
5567                 case -NFS4ERR_GRACE:
5568                 case -NFS4ERR_DELAY:
5569                         nfs4_handle_exception(server, err, &exception);
5570                         err = 0;
5571                 }
5572         } while (exception.retry);
5573 out:
5574         return err;
5575 }
5576
5577 #if defined(CONFIG_NFS_V4_1)
5578 /**
5579  * nfs41_check_expired_locks - possibly free a lock stateid
5580  *
5581  * @state: NFSv4 state for an inode
5582  *
5583  * Returns NFS_OK if recovery for this stateid is now finished.
5584  * Otherwise a negative NFS4ERR value is returned.
5585  */
5586 static int nfs41_check_expired_locks(struct nfs4_state *state)
5587 {
5588         int status, ret = -NFS4ERR_BAD_STATEID;
5589         struct nfs4_lock_state *lsp;
5590         struct nfs_server *server = NFS_SERVER(state->inode);
5591
5592         list_for_each_entry(lsp, &state->lock_states, ls_locks) {
5593                 if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags)) {
5594                         struct rpc_cred *cred = lsp->ls_state->owner->so_cred;
5595
5596                         status = nfs41_test_stateid(server,
5597                                         &lsp->ls_stateid,
5598                                         cred);
5599                         trace_nfs4_test_lock_stateid(state, lsp, status);
5600                         if (status != NFS_OK) {
5601                                 /* Free the stateid unless the server
5602                                  * informs us the stateid is unrecognized. */
5603                                 if (status != -NFS4ERR_BAD_STATEID)
5604                                         nfs41_free_stateid(server,
5605                                                         &lsp->ls_stateid,
5606                                                         cred);
5607                                 clear_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags);
5608                                 ret = status;
5609                         }
5610                 }
5611         };
5612
5613         return ret;
5614 }
5615
5616 static int nfs41_lock_expired(struct nfs4_state *state, struct file_lock *request)
5617 {
5618         int status = NFS_OK;
5619
5620         if (test_bit(LK_STATE_IN_USE, &state->flags))
5621                 status = nfs41_check_expired_locks(state);
5622         if (status != NFS_OK)
5623                 status = nfs4_lock_expired(state, request);
5624         return status;
5625 }
5626 #endif
5627
5628 static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5629 {
5630         struct nfs4_state_owner *sp = state->owner;
5631         struct nfs_inode *nfsi = NFS_I(state->inode);
5632         unsigned char fl_flags = request->fl_flags;
5633         unsigned int seq;
5634         int status = -ENOLCK;
5635
5636         if ((fl_flags & FL_POSIX) &&
5637                         !test_bit(NFS_STATE_POSIX_LOCKS, &state->flags))
5638                 goto out;
5639         /* Is this a delegated open? */
5640         status = nfs4_set_lock_state(state, request);
5641         if (status != 0)
5642                 goto out;
5643         request->fl_flags |= FL_ACCESS;
5644         status = do_vfs_lock(request->fl_file, request);
5645         if (status < 0)
5646                 goto out;
5647         down_read(&nfsi->rwsem);
5648         if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
5649                 /* Yes: cache locks! */
5650                 /* ...but avoid races with delegation recall... */
5651                 request->fl_flags = fl_flags & ~FL_SLEEP;
5652                 status = do_vfs_lock(request->fl_file, request);
5653                 goto out_unlock;
5654         }
5655         seq = raw_seqcount_begin(&sp->so_reclaim_seqcount);
5656         up_read(&nfsi->rwsem);
5657         status = _nfs4_do_setlk(state, cmd, request, NFS_LOCK_NEW);
5658         if (status != 0)
5659                 goto out;
5660         down_read(&nfsi->rwsem);
5661         if (read_seqcount_retry(&sp->so_reclaim_seqcount, seq)) {
5662                 status = -NFS4ERR_DELAY;
5663                 goto out_unlock;
5664         }
5665         /* Note: we always want to sleep here! */
5666         request->fl_flags = fl_flags | FL_SLEEP;
5667         if (do_vfs_lock(request->fl_file, request) < 0)
5668                 printk(KERN_WARNING "NFS: %s: VFS is out of sync with lock "
5669                         "manager!\n", __func__);
5670 out_unlock:
5671         up_read(&nfsi->rwsem);
5672 out:
5673         request->fl_flags = fl_flags;
5674         return status;
5675 }
5676
5677 static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
5678 {
5679         struct nfs4_exception exception = {
5680                 .state = state,
5681                 .inode = state->inode,
5682         };
5683         int err;
5684
5685         do {
5686                 err = _nfs4_proc_setlk(state, cmd, request);
5687                 trace_nfs4_set_lock(request, state, cmd, err);
5688                 if (err == -NFS4ERR_DENIED)
5689                         err = -EAGAIN;
5690                 err = nfs4_handle_exception(NFS_SERVER(state->inode),
5691                                 err, &exception);
5692         } while (exception.retry);
5693         return err;
5694 }
5695
5696 static int
5697 nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
5698 {
5699         struct nfs_open_context *ctx;
5700         struct nfs4_state *state;
5701         unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
5702         int status;
5703
5704         /* verify open state */
5705         ctx = nfs_file_open_context(filp);
5706         state = ctx->state;
5707
5708         if (request->fl_start < 0 || request->fl_end < 0)
5709                 return -EINVAL;
5710
5711         if (IS_GETLK(cmd)) {
5712                 if (state != NULL)
5713                         return nfs4_proc_getlk(state, F_GETLK, request);
5714                 return 0;
5715         }
5716
5717         if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
5718                 return -EINVAL;
5719
5720         if (request->fl_type == F_UNLCK) {
5721                 if (state != NULL)
5722                         return nfs4_proc_unlck(state, cmd, request);
5723                 return 0;
5724         }
5725
5726         if (state == NULL)
5727                 return -ENOLCK;
5728         /*
5729          * Don't rely on the VFS having checked the file open mode,
5730          * since it won't do this for flock() locks.
5731          */
5732         switch (request->fl_type) {
5733         case F_RDLCK:
5734                 if (!(filp->f_mode & FMODE_READ))
5735                         return -EBADF;
5736                 break;
5737         case F_WRLCK:
5738                 if (!(filp->f_mode & FMODE_WRITE))
5739                         return -EBADF;
5740         }
5741
5742         do {
5743                 status = nfs4_proc_setlk(state, cmd, request);
5744                 if ((status != -EAGAIN) || IS_SETLK(cmd))
5745                         break;
5746                 timeout = nfs4_set_lock_task_retry(timeout);
5747                 status = -ERESTARTSYS;
5748                 if (signalled())
5749                         break;
5750         } while(status < 0);
5751         return status;
5752 }
5753
5754 int nfs4_lock_delegation_recall(struct file_lock *fl, struct nfs4_state *state, const nfs4_stateid *stateid)
5755 {
5756         struct nfs_server *server = NFS_SERVER(state->inode);
5757         int err;
5758
5759         err = nfs4_set_lock_state(state, fl);
5760         if (err != 0)
5761                 return err;
5762         err = _nfs4_do_setlk(state, F_SETLK, fl, NFS_LOCK_NEW);
5763         return nfs4_handle_delegation_recall_error(server, state, stateid, err);
5764 }
5765
5766 struct nfs_release_lockowner_data {
5767         struct nfs4_lock_state *lsp;
5768         struct nfs_server *server;
5769         struct nfs_release_lockowner_args args;
5770         struct nfs4_sequence_args seq_args;
5771         struct nfs4_sequence_res seq_res;
5772 };
5773
5774 static void nfs4_release_lockowner_prepare(struct rpc_task *task, void *calldata)
5775 {
5776         struct nfs_release_lockowner_data *data = calldata;
5777         nfs40_setup_sequence(data->server,
5778                                 &data->seq_args, &data->seq_res, task);
5779 }
5780
5781 static void nfs4_release_lockowner_done(struct rpc_task *task, void *calldata)
5782 {
5783         struct nfs_release_lockowner_data *data = calldata;
5784         nfs40_sequence_done(task, &data->seq_res);
5785 }
5786
5787 static void nfs4_release_lockowner_release(void *calldata)
5788 {
5789         struct nfs_release_lockowner_data *data = calldata;
5790         nfs4_free_lock_state(data->server, data->lsp);
5791         kfree(calldata);
5792 }
5793
5794 static const struct rpc_call_ops nfs4_release_lockowner_ops = {
5795         .rpc_call_prepare = nfs4_release_lockowner_prepare,
5796         .rpc_call_done = nfs4_release_lockowner_done,
5797         .rpc_release = nfs4_release_lockowner_release,
5798 };
5799
5800 static int nfs4_release_lockowner(struct nfs_server *server, struct nfs4_lock_state *lsp)
5801 {
5802         struct nfs_release_lockowner_data *data;
5803         struct rpc_message msg = {
5804                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RELEASE_LOCKOWNER],
5805         };
5806
5807         if (server->nfs_client->cl_mvops->minor_version != 0)
5808                 return -EINVAL;
5809
5810         data = kmalloc(sizeof(*data), GFP_NOFS);
5811         if (!data)
5812                 return -ENOMEM;
5813         nfs4_init_sequence(&data->seq_args, &data->seq_res, 0);
5814         data->lsp = lsp;
5815         data->server = server;
5816         data->args.lock_owner.clientid = server->nfs_client->cl_clientid;
5817         data->args.lock_owner.id = lsp->ls_seqid.owner_id;
5818         data->args.lock_owner.s_dev = server->s_dev;
5819
5820         msg.rpc_argp = &data->args;
5821         rpc_call_async(server->client, &msg, 0, &nfs4_release_lockowner_ops, data);
5822         return 0;
5823 }
5824
5825 #define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
5826
5827 static int nfs4_xattr_set_nfs4_acl(struct dentry *dentry, const char *key,
5828                                    const void *buf, size_t buflen,
5829                                    int flags, int type)
5830 {
5831         if (strcmp(key, "") != 0)
5832                 return -EINVAL;
5833
5834         return nfs4_proc_set_acl(dentry->d_inode, buf, buflen);
5835 }
5836
5837 static int nfs4_xattr_get_nfs4_acl(struct dentry *dentry, const char *key,
5838                                    void *buf, size_t buflen, int type)
5839 {
5840         if (strcmp(key, "") != 0)
5841                 return -EINVAL;
5842
5843         return nfs4_proc_get_acl(dentry->d_inode, buf, buflen);
5844 }
5845
5846 static size_t nfs4_xattr_list_nfs4_acl(struct dentry *dentry, char *list,
5847                                        size_t list_len, const char *name,
5848                                        size_t name_len, int type)
5849 {
5850         size_t len = sizeof(XATTR_NAME_NFSV4_ACL);
5851
5852         if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
5853                 return 0;
5854
5855         if (list && len <= list_len)
5856                 memcpy(list, XATTR_NAME_NFSV4_ACL, len);
5857         return len;
5858 }
5859
5860 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
5861 static inline int nfs4_server_supports_labels(struct nfs_server *server)
5862 {
5863         return server->caps & NFS_CAP_SECURITY_LABEL;
5864 }
5865
5866 static int nfs4_xattr_set_nfs4_label(struct dentry *dentry, const char *key,
5867                                    const void *buf, size_t buflen,
5868                                    int flags, int type)
5869 {
5870         if (security_ismaclabel(key))
5871                 return nfs4_set_security_label(dentry, buf, buflen);
5872
5873         return -EOPNOTSUPP;
5874 }
5875
5876 static int nfs4_xattr_get_nfs4_label(struct dentry *dentry, const char *key,
5877                                    void *buf, size_t buflen, int type)
5878 {
5879         if (security_ismaclabel(key))
5880                 return nfs4_get_security_label(dentry->d_inode, buf, buflen);
5881         return -EOPNOTSUPP;
5882 }
5883
5884 static size_t nfs4_xattr_list_nfs4_label(struct dentry *dentry, char *list,
5885                                        size_t list_len, const char *name,
5886                                        size_t name_len, int type)
5887 {
5888         size_t len = 0;
5889
5890         if (nfs_server_capable(dentry->d_inode, NFS_CAP_SECURITY_LABEL)) {
5891                 len = security_inode_listsecurity(dentry->d_inode, NULL, 0);
5892                 if (list && len <= list_len)
5893                         security_inode_listsecurity(dentry->d_inode, list, len);
5894         }
5895         return len;
5896 }
5897
5898 static const struct xattr_handler nfs4_xattr_nfs4_label_handler = {
5899         .prefix = XATTR_SECURITY_PREFIX,
5900         .list   = nfs4_xattr_list_nfs4_label,
5901         .get    = nfs4_xattr_get_nfs4_label,
5902         .set    = nfs4_xattr_set_nfs4_label,
5903 };
5904 #endif
5905
5906
5907 /*
5908  * nfs_fhget will use either the mounted_on_fileid or the fileid
5909  */
5910 static void nfs_fixup_referral_attributes(struct nfs_fattr *fattr)
5911 {
5912         if (!(((fattr->valid & NFS_ATTR_FATTR_MOUNTED_ON_FILEID) ||
5913                (fattr->valid & NFS_ATTR_FATTR_FILEID)) &&
5914               (fattr->valid & NFS_ATTR_FATTR_FSID) &&
5915               (fattr->valid & NFS_ATTR_FATTR_V4_LOCATIONS)))
5916                 return;
5917
5918         fattr->valid |= NFS_ATTR_FATTR_TYPE | NFS_ATTR_FATTR_MODE |
5919                 NFS_ATTR_FATTR_NLINK | NFS_ATTR_FATTR_V4_REFERRAL;
5920         fattr->mode = S_IFDIR | S_IRUGO | S_IXUGO;
5921         fattr->nlink = 2;
5922 }
5923
5924 static int _nfs4_proc_fs_locations(struct rpc_clnt *client, struct inode *dir,
5925                                    const struct qstr *name,
5926                                    struct nfs4_fs_locations *fs_locations,
5927                                    struct page *page)
5928 {
5929         struct nfs_server *server = NFS_SERVER(dir);
5930         u32 bitmask[3] = {
5931                 [0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
5932         };
5933         struct nfs4_fs_locations_arg args = {
5934                 .dir_fh = NFS_FH(dir),
5935                 .name = name,
5936                 .page = page,
5937                 .bitmask = bitmask,
5938         };
5939         struct nfs4_fs_locations_res res = {
5940                 .fs_locations = fs_locations,
5941         };
5942         struct rpc_message msg = {
5943                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
5944                 .rpc_argp = &args,
5945                 .rpc_resp = &res,
5946         };
5947         int status;
5948
5949         dprintk("%s: start\n", __func__);
5950
5951         /* Ask for the fileid of the absent filesystem if mounted_on_fileid
5952          * is not supported */
5953         if (NFS_SERVER(dir)->attr_bitmask[1] & FATTR4_WORD1_MOUNTED_ON_FILEID)
5954                 bitmask[1] |= FATTR4_WORD1_MOUNTED_ON_FILEID;
5955         else
5956                 bitmask[0] |= FATTR4_WORD0_FILEID;
5957
5958         nfs_fattr_init(&fs_locations->fattr);
5959         fs_locations->server = server;
5960         fs_locations->nlocations = 0;
5961         status = nfs4_call_sync(client, server, &msg, &args.seq_args, &res.seq_res, 0);
5962         dprintk("%s: returned status = %d\n", __func__, status);
5963         return status;
5964 }
5965
5966 int nfs4_proc_fs_locations(struct rpc_clnt *client, struct inode *dir,
5967                            const struct qstr *name,
5968                            struct nfs4_fs_locations *fs_locations,
5969                            struct page *page)
5970 {
5971         struct nfs4_exception exception = { };
5972         int err;
5973         do {
5974                 err = _nfs4_proc_fs_locations(client, dir, name,
5975                                 fs_locations, page);
5976                 trace_nfs4_get_fs_locations(dir, name, err);
5977                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
5978                                 &exception);
5979         } while (exception.retry);
5980         return err;
5981 }
5982
5983 /**
5984  * If 'use_integrity' is true and the state managment nfs_client
5985  * cl_rpcclient is using krb5i/p, use the integrity protected cl_rpcclient
5986  * and the machine credential as per RFC3530bis and RFC5661 Security
5987  * Considerations sections. Otherwise, just use the user cred with the
5988  * filesystem's rpc_client.
5989  */
5990 static int _nfs4_proc_secinfo(struct inode *dir, const struct qstr *name, struct nfs4_secinfo_flavors *flavors, bool use_integrity)
5991 {
5992         int status;
5993         struct nfs4_secinfo_arg args = {
5994                 .dir_fh = NFS_FH(dir),
5995                 .name   = name,
5996         };
5997         struct nfs4_secinfo_res res = {
5998                 .flavors     = flavors,
5999         };
6000         struct rpc_message msg = {
6001                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO],
6002                 .rpc_argp = &args,
6003                 .rpc_resp = &res,
6004         };
6005         struct rpc_clnt *clnt = NFS_SERVER(dir)->client;
6006
6007         if (use_integrity) {
6008                 clnt = NFS_SERVER(dir)->nfs_client->cl_rpcclient;
6009                 msg.rpc_cred = nfs4_get_clid_cred(NFS_SERVER(dir)->nfs_client);
6010         }
6011
6012         dprintk("NFS call  secinfo %s\n", name->name);
6013
6014         nfs4_state_protect(NFS_SERVER(dir)->nfs_client,
6015                 NFS_SP4_MACH_CRED_SECINFO, &clnt, &msg);
6016
6017         status = nfs4_call_sync(clnt, NFS_SERVER(dir), &msg, &args.seq_args,
6018                                 &res.seq_res, 0);
6019         dprintk("NFS reply  secinfo: %d\n", status);
6020
6021         if (msg.rpc_cred)
6022                 put_rpccred(msg.rpc_cred);
6023
6024         return status;
6025 }
6026
6027 int nfs4_proc_secinfo(struct inode *dir, const struct qstr *name,
6028                       struct nfs4_secinfo_flavors *flavors)
6029 {
6030         struct nfs4_exception exception = { };
6031         int err;
6032         do {
6033                 err = -NFS4ERR_WRONGSEC;
6034
6035                 /* try to use integrity protection with machine cred */
6036                 if (_nfs4_is_integrity_protected(NFS_SERVER(dir)->nfs_client))
6037                         err = _nfs4_proc_secinfo(dir, name, flavors, true);
6038
6039                 /*
6040                  * if unable to use integrity protection, or SECINFO with
6041                  * integrity protection returns NFS4ERR_WRONGSEC (which is
6042                  * disallowed by spec, but exists in deployed servers) use
6043                  * the current filesystem's rpc_client and the user cred.
6044                  */
6045                 if (err == -NFS4ERR_WRONGSEC)
6046                         err = _nfs4_proc_secinfo(dir, name, flavors, false);
6047
6048                 trace_nfs4_secinfo(dir, name, err);
6049                 err = nfs4_handle_exception(NFS_SERVER(dir), err,
6050                                 &exception);
6051         } while (exception.retry);
6052         return err;
6053 }
6054
6055 #ifdef CONFIG_NFS_V4_1
6056 /*
6057  * Check the exchange flags returned by the server for invalid flags, having
6058  * both PNFS and NON_PNFS flags set, and not having one of NON_PNFS, PNFS, or
6059  * DS flags set.
6060  */
6061 static int nfs4_check_cl_exchange_flags(u32 flags)
6062 {
6063         if (flags & ~EXCHGID4_FLAG_MASK_R)
6064                 goto out_inval;
6065         if ((flags & EXCHGID4_FLAG_USE_PNFS_MDS) &&
6066             (flags & EXCHGID4_FLAG_USE_NON_PNFS))
6067                 goto out_inval;
6068         if (!(flags & (EXCHGID4_FLAG_MASK_PNFS)))
6069                 goto out_inval;
6070         return NFS_OK;
6071 out_inval:
6072         return -NFS4ERR_INVAL;
6073 }
6074
6075 static bool
6076 nfs41_same_server_scope(struct nfs41_server_scope *a,
6077                         struct nfs41_server_scope *b)
6078 {
6079         if (a->server_scope_sz == b->server_scope_sz &&
6080             memcmp(a->server_scope, b->server_scope, a->server_scope_sz) == 0)
6081                 return true;
6082
6083         return false;
6084 }
6085
6086 /*
6087  * nfs4_proc_bind_conn_to_session()
6088  *
6089  * The 4.1 client currently uses the same TCP connection for the
6090  * fore and backchannel.
6091  */
6092 int nfs4_proc_bind_conn_to_session(struct nfs_client *clp, struct rpc_cred *cred)
6093 {
6094         int status;
6095         struct nfs41_bind_conn_to_session_res res;
6096         struct rpc_message msg = {
6097                 .rpc_proc =
6098                         &nfs4_procedures[NFSPROC4_CLNT_BIND_CONN_TO_SESSION],
6099                 .rpc_argp = clp,
6100                 .rpc_resp = &res,
6101                 .rpc_cred = cred,
6102         };
6103
6104         dprintk("--> %s\n", __func__);
6105
6106         res.session = kzalloc(sizeof(struct nfs4_session), GFP_NOFS);
6107         if (unlikely(res.session == NULL)) {
6108                 status = -ENOMEM;
6109                 goto out;
6110         }
6111
6112         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
6113         trace_nfs4_bind_conn_to_session(clp, status);
6114         if (status == 0) {
6115                 if (memcmp(res.session->sess_id.data,
6116                     clp->cl_session->sess_id.data, NFS4_MAX_SESSIONID_LEN)) {
6117                         dprintk("NFS: %s: Session ID mismatch\n", __func__);
6118                         status = -EIO;
6119                         goto out_session;
6120                 }
6121                 if (res.dir != NFS4_CDFS4_BOTH) {
6122                         dprintk("NFS: %s: Unexpected direction from server\n",
6123                                 __func__);
6124                         status = -EIO;
6125                         goto out_session;
6126                 }
6127                 if (res.use_conn_in_rdma_mode) {
6128                         dprintk("NFS: %s: Server returned RDMA mode = true\n",
6129                                 __func__);
6130                         status = -EIO;
6131                         goto out_session;
6132                 }
6133         }
6134 out_session:
6135         kfree(res.session);
6136 out:
6137         dprintk("<-- %s status= %d\n", __func__, status);
6138         return status;
6139 }
6140
6141 /*
6142  * Minimum set of SP4_MACH_CRED operations from RFC 5661 in the enforce map
6143  * and operations we'd like to see to enable certain features in the allow map
6144  */
6145 static const struct nfs41_state_protection nfs4_sp4_mach_cred_request = {
6146         .how = SP4_MACH_CRED,
6147         .enforce.u.words = {
6148                 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
6149                       1 << (OP_EXCHANGE_ID - 32) |
6150                       1 << (OP_CREATE_SESSION - 32) |
6151                       1 << (OP_DESTROY_SESSION - 32) |
6152                       1 << (OP_DESTROY_CLIENTID - 32)
6153         },
6154         .allow.u.words = {
6155                 [0] = 1 << (OP_CLOSE) |
6156                       1 << (OP_LOCKU),
6157                 [1] = 1 << (OP_SECINFO - 32) |
6158                       1 << (OP_SECINFO_NO_NAME - 32) |
6159                       1 << (OP_TEST_STATEID - 32) |
6160                       1 << (OP_FREE_STATEID - 32)
6161         }
6162 };
6163
6164 /*
6165  * Select the state protection mode for client `clp' given the server results
6166  * from exchange_id in `sp'.
6167  *
6168  * Returns 0 on success, negative errno otherwise.
6169  */
6170 static int nfs4_sp4_select_mode(struct nfs_client *clp,
6171                                  struct nfs41_state_protection *sp)
6172 {
6173         static const u32 supported_enforce[NFS4_OP_MAP_NUM_WORDS] = {
6174                 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
6175                       1 << (OP_EXCHANGE_ID - 32) |
6176                       1 << (OP_CREATE_SESSION - 32) |
6177                       1 << (OP_DESTROY_SESSION - 32) |
6178                       1 << (OP_DESTROY_CLIENTID - 32)
6179         };
6180         unsigned int i;
6181
6182         if (sp->how == SP4_MACH_CRED) {
6183                 /* Print state protect result */
6184                 dfprintk(MOUNT, "Server SP4_MACH_CRED support:\n");
6185                 for (i = 0; i <= LAST_NFS4_OP; i++) {
6186                         if (test_bit(i, sp->enforce.u.longs))
6187                                 dfprintk(MOUNT, "  enforce op %d\n", i);
6188                         if (test_bit(i, sp->allow.u.longs))
6189                                 dfprintk(MOUNT, "  allow op %d\n", i);
6190                 }
6191
6192                 /* make sure nothing is on enforce list that isn't supported */
6193                 for (i = 0; i < NFS4_OP_MAP_NUM_WORDS; i++) {
6194                         if (sp->enforce.u.words[i] & ~supported_enforce[i]) {
6195                                 dfprintk(MOUNT, "sp4_mach_cred: disabled\n");
6196                                 return -EINVAL;
6197                         }
6198                 }
6199
6200                 /*
6201                  * Minimal mode - state operations are allowed to use machine
6202                  * credential.  Note this already happens by default, so the
6203                  * client doesn't have to do anything more than the negotiation.
6204                  *
6205                  * NOTE: we don't care if EXCHANGE_ID is in the list -
6206                  *       we're already using the machine cred for exchange_id
6207                  *       and will never use a different cred.
6208                  */
6209                 if (test_bit(OP_BIND_CONN_TO_SESSION, sp->enforce.u.longs) &&
6210                     test_bit(OP_CREATE_SESSION, sp->enforce.u.longs) &&
6211                     test_bit(OP_DESTROY_SESSION, sp->enforce.u.longs) &&
6212                     test_bit(OP_DESTROY_CLIENTID, sp->enforce.u.longs)) {
6213                         dfprintk(MOUNT, "sp4_mach_cred:\n");
6214                         dfprintk(MOUNT, "  minimal mode enabled\n");
6215                         set_bit(NFS_SP4_MACH_CRED_MINIMAL, &clp->cl_sp4_flags);
6216                 } else {
6217                         dfprintk(MOUNT, "sp4_mach_cred: disabled\n");
6218                         return -EINVAL;
6219                 }
6220
6221                 if (test_bit(OP_CLOSE, sp->allow.u.longs) &&
6222                     test_bit(OP_LOCKU, sp->allow.u.longs)) {
6223                         dfprintk(MOUNT, "  cleanup mode enabled\n");
6224                         set_bit(NFS_SP4_MACH_CRED_CLEANUP, &clp->cl_sp4_flags);
6225                 }
6226
6227                 if (test_bit(OP_SECINFO, sp->allow.u.longs) &&
6228                     test_bit(OP_SECINFO_NO_NAME, sp->allow.u.longs)) {
6229                         dfprintk(MOUNT, "  secinfo mode enabled\n");
6230                         set_bit(NFS_SP4_MACH_CRED_SECINFO, &clp->cl_sp4_flags);
6231                 }
6232
6233                 if (test_bit(OP_TEST_STATEID, sp->allow.u.longs) &&
6234                     test_bit(OP_FREE_STATEID, sp->allow.u.longs)) {
6235                         dfprintk(MOUNT, "  stateid mode enabled\n");
6236                         set_bit(NFS_SP4_MACH_CRED_STATEID, &clp->cl_sp4_flags);
6237                 }
6238
6239                 if (test_bit(OP_WRITE, sp->allow.u.longs)) {
6240                         dfprintk(MOUNT, "  write mode enabled\n");
6241                         set_bit(NFS_SP4_MACH_CRED_WRITE, &clp->cl_sp4_flags);
6242                 }
6243
6244                 if (test_bit(OP_COMMIT, sp->allow.u.longs)) {
6245                         dfprintk(MOUNT, "  commit mode enabled\n");
6246                         set_bit(NFS_SP4_MACH_CRED_COMMIT, &clp->cl_sp4_flags);
6247                 }
6248         }
6249
6250         return 0;
6251 }
6252
6253 /*
6254  * _nfs4_proc_exchange_id()
6255  *
6256  * Wrapper for EXCHANGE_ID operation.
6257  */
6258 static int _nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred,
6259         u32 sp4_how)
6260 {
6261         nfs4_verifier verifier;
6262         struct nfs41_exchange_id_args args = {
6263                 .verifier = &verifier,
6264                 .client = clp,
6265                 .flags = EXCHGID4_FLAG_SUPP_MOVED_REFER |
6266                         EXCHGID4_FLAG_BIND_PRINC_STATEID,
6267         };
6268         struct nfs41_exchange_id_res res = {
6269                 0
6270         };
6271         int status;
6272         struct rpc_message msg = {
6273                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_EXCHANGE_ID],
6274                 .rpc_argp = &args,
6275                 .rpc_resp = &res,
6276                 .rpc_cred = cred,
6277         };
6278
6279         nfs4_init_boot_verifier(clp, &verifier);
6280         args.id_len = nfs4_init_uniform_client_string(clp, args.id,
6281                                                         sizeof(args.id));
6282         dprintk("NFS call  exchange_id auth=%s, '%.*s'\n",
6283                 clp->cl_rpcclient->cl_auth->au_ops->au_name,
6284                 args.id_len, args.id);
6285
6286         res.server_owner = kzalloc(sizeof(struct nfs41_server_owner),
6287                                         GFP_NOFS);
6288         if (unlikely(res.server_owner == NULL)) {
6289                 status = -ENOMEM;
6290                 goto out;
6291         }
6292
6293         res.server_scope = kzalloc(sizeof(struct nfs41_server_scope),
6294                                         GFP_NOFS);
6295         if (unlikely(res.server_scope == NULL)) {
6296                 status = -ENOMEM;
6297                 goto out_server_owner;
6298         }
6299
6300         res.impl_id = kzalloc(sizeof(struct nfs41_impl_id), GFP_NOFS);
6301         if (unlikely(res.impl_id == NULL)) {
6302                 status = -ENOMEM;
6303                 goto out_server_scope;
6304         }
6305
6306         switch (sp4_how) {
6307         case SP4_NONE:
6308                 args.state_protect.how = SP4_NONE;
6309                 break;
6310
6311         case SP4_MACH_CRED:
6312                 args.state_protect = nfs4_sp4_mach_cred_request;
6313                 break;
6314
6315         default:
6316                 /* unsupported! */
6317                 WARN_ON_ONCE(1);
6318                 status = -EINVAL;
6319                 goto out_server_scope;
6320         }
6321
6322         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
6323         trace_nfs4_exchange_id(clp, status);
6324         if (status == 0)
6325                 status = nfs4_check_cl_exchange_flags(res.flags);
6326
6327         if (status == 0)
6328                 status = nfs4_sp4_select_mode(clp, &res.state_protect);
6329
6330         if (status == 0) {
6331                 clp->cl_clientid = res.clientid;
6332                 clp->cl_exchange_flags = (res.flags & ~EXCHGID4_FLAG_CONFIRMED_R);
6333                 if (!(res.flags & EXCHGID4_FLAG_CONFIRMED_R))
6334                         clp->cl_seqid = res.seqid;
6335
6336                 kfree(clp->cl_serverowner);
6337                 clp->cl_serverowner = res.server_owner;
6338                 res.server_owner = NULL;
6339
6340                 /* use the most recent implementation id */
6341                 kfree(clp->cl_implid);
6342                 clp->cl_implid = res.impl_id;
6343
6344                 if (clp->cl_serverscope != NULL &&
6345                     !nfs41_same_server_scope(clp->cl_serverscope,
6346                                              res.server_scope)) {
6347                         dprintk("%s: server_scope mismatch detected\n",
6348                                 __func__);
6349                         set_bit(NFS4CLNT_SERVER_SCOPE_MISMATCH, &clp->cl_state);
6350                         kfree(clp->cl_serverscope);
6351                         clp->cl_serverscope = NULL;
6352                 }
6353
6354                 if (clp->cl_serverscope == NULL) {
6355                         clp->cl_serverscope = res.server_scope;
6356                         goto out;
6357                 }
6358         } else
6359                 kfree(res.impl_id);
6360
6361 out_server_owner:
6362         kfree(res.server_owner);
6363 out_server_scope:
6364         kfree(res.server_scope);
6365 out:
6366         if (clp->cl_implid != NULL)
6367                 dprintk("NFS reply exchange_id: Server Implementation ID: "
6368                         "domain: %s, name: %s, date: %llu,%u\n",
6369                         clp->cl_implid->domain, clp->cl_implid->name,
6370                         clp->cl_implid->date.seconds,
6371                         clp->cl_implid->date.nseconds);
6372         dprintk("NFS reply exchange_id: %d\n", status);
6373         return status;
6374 }
6375
6376 /*
6377  * nfs4_proc_exchange_id()
6378  *
6379  * Returns zero, a negative errno, or a negative NFS4ERR status code.
6380  *
6381  * Since the clientid has expired, all compounds using sessions
6382  * associated with the stale clientid will be returning
6383  * NFS4ERR_BADSESSION in the sequence operation, and will therefore
6384  * be in some phase of session reset.
6385  *
6386  * Will attempt to negotiate SP4_MACH_CRED if krb5i / krb5p auth is used.
6387  */
6388 int nfs4_proc_exchange_id(struct nfs_client *clp, struct rpc_cred *cred)
6389 {
6390         rpc_authflavor_t authflavor = clp->cl_rpcclient->cl_auth->au_flavor;
6391         int status;
6392
6393         /* try SP4_MACH_CRED if krb5i/p */
6394         if (authflavor == RPC_AUTH_GSS_KRB5I ||
6395             authflavor == RPC_AUTH_GSS_KRB5P) {
6396                 status = _nfs4_proc_exchange_id(clp, cred, SP4_MACH_CRED);
6397                 if (!status)
6398                         return 0;
6399         }
6400
6401         /* try SP4_NONE */
6402         return _nfs4_proc_exchange_id(clp, cred, SP4_NONE);
6403 }
6404
6405 static int _nfs4_proc_destroy_clientid(struct nfs_client *clp,
6406                 struct rpc_cred *cred)
6407 {
6408         struct rpc_message msg = {
6409                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_CLIENTID],
6410                 .rpc_argp = clp,
6411                 .rpc_cred = cred,
6412         };
6413         int status;
6414
6415         status = rpc_call_sync(clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
6416         trace_nfs4_destroy_clientid(clp, status);
6417         if (status)
6418                 dprintk("NFS: Got error %d from the server %s on "
6419                         "DESTROY_CLIENTID.", status, clp->cl_hostname);
6420         return status;
6421 }
6422
6423 static int nfs4_proc_destroy_clientid(struct nfs_client *clp,
6424                 struct rpc_cred *cred)
6425 {
6426         unsigned int loop;
6427         int ret;
6428
6429         for (loop = NFS4_MAX_LOOP_ON_RECOVER; loop != 0; loop--) {
6430                 ret = _nfs4_proc_destroy_clientid(clp, cred);
6431                 switch (ret) {
6432                 case -NFS4ERR_DELAY:
6433                 case -NFS4ERR_CLIENTID_BUSY:
6434                         ssleep(1);
6435                         break;
6436                 default:
6437                         return ret;
6438                 }
6439         }
6440         return 0;
6441 }
6442
6443 int nfs4_destroy_clientid(struct nfs_client *clp)
6444 {
6445         struct rpc_cred *cred;
6446         int ret = 0;
6447
6448         if (clp->cl_mvops->minor_version < 1)
6449                 goto out;
6450         if (clp->cl_exchange_flags == 0)
6451                 goto out;
6452         if (clp->cl_preserve_clid)
6453                 goto out;
6454         cred = nfs4_get_clid_cred(clp);
6455         ret = nfs4_proc_destroy_clientid(clp, cred);
6456         if (cred)
6457                 put_rpccred(cred);
6458         switch (ret) {
6459         case 0:
6460         case -NFS4ERR_STALE_CLIENTID:
6461                 clp->cl_exchange_flags = 0;
6462         }
6463 out:
6464         return ret;
6465 }
6466
6467 struct nfs4_get_lease_time_data {
6468         struct nfs4_get_lease_time_args *args;
6469         struct nfs4_get_lease_time_res *res;
6470         struct nfs_client *clp;
6471 };
6472
6473 static void nfs4_get_lease_time_prepare(struct rpc_task *task,
6474                                         void *calldata)
6475 {
6476         struct nfs4_get_lease_time_data *data =
6477                         (struct nfs4_get_lease_time_data *)calldata;
6478
6479         dprintk("--> %s\n", __func__);
6480         /* just setup sequence, do not trigger session recovery
6481            since we're invoked within one */
6482         nfs41_setup_sequence(data->clp->cl_session,
6483                         &data->args->la_seq_args,
6484                         &data->res->lr_seq_res,
6485                         task);
6486         dprintk("<-- %s\n", __func__);
6487 }
6488
6489 /*
6490  * Called from nfs4_state_manager thread for session setup, so don't recover
6491  * from sequence operation or clientid errors.
6492  */
6493 static void nfs4_get_lease_time_done(struct rpc_task *task, void *calldata)
6494 {
6495         struct nfs4_get_lease_time_data *data =
6496                         (struct nfs4_get_lease_time_data *)calldata;
6497
6498         dprintk("--> %s\n", __func__);
6499         if (!nfs41_sequence_done(task, &data->res->lr_seq_res))
6500                 return;
6501         switch (task->tk_status) {
6502         case -NFS4ERR_DELAY:
6503         case -NFS4ERR_GRACE:
6504                 dprintk("%s Retry: tk_status %d\n", __func__, task->tk_status);
6505                 rpc_delay(task, NFS4_POLL_RETRY_MIN);
6506                 task->tk_status = 0;
6507                 /* fall through */
6508         case -NFS4ERR_RETRY_UNCACHED_REP:
6509                 rpc_restart_call_prepare(task);
6510                 return;
6511         }
6512         dprintk("<-- %s\n", __func__);
6513 }
6514
6515 static const struct rpc_call_ops nfs4_get_lease_time_ops = {
6516         .rpc_call_prepare = nfs4_get_lease_time_prepare,
6517         .rpc_call_done = nfs4_get_lease_time_done,
6518 };
6519
6520 int nfs4_proc_get_lease_time(struct nfs_client *clp, struct nfs_fsinfo *fsinfo)
6521 {
6522         struct rpc_task *task;
6523         struct nfs4_get_lease_time_args args;
6524         struct nfs4_get_lease_time_res res = {
6525                 .lr_fsinfo = fsinfo,
6526         };
6527         struct nfs4_get_lease_time_data data = {
6528                 .args = &args,
6529                 .res = &res,
6530                 .clp = clp,
6531         };
6532         struct rpc_message msg = {
6533                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GET_LEASE_TIME],
6534                 .rpc_argp = &args,
6535                 .rpc_resp = &res,
6536         };
6537         struct rpc_task_setup task_setup = {
6538                 .rpc_client = clp->cl_rpcclient,
6539                 .rpc_message = &msg,
6540                 .callback_ops = &nfs4_get_lease_time_ops,
6541                 .callback_data = &data,
6542                 .flags = RPC_TASK_TIMEOUT,
6543         };
6544         int status;
6545
6546         nfs4_init_sequence(&args.la_seq_args, &res.lr_seq_res, 0);
6547         nfs4_set_sequence_privileged(&args.la_seq_args);
6548         dprintk("--> %s\n", __func__);
6549         task = rpc_run_task(&task_setup);
6550
6551         if (IS_ERR(task))
6552                 status = PTR_ERR(task);
6553         else {
6554                 status = task->tk_status;
6555                 rpc_put_task(task);
6556         }
6557         dprintk("<-- %s return %d\n", __func__, status);
6558
6559         return status;
6560 }
6561
6562 /*
6563  * Initialize the values to be used by the client in CREATE_SESSION
6564  * If nfs4_init_session set the fore channel request and response sizes,
6565  * use them.
6566  *
6567  * Set the back channel max_resp_sz_cached to zero to force the client to
6568  * always set csa_cachethis to FALSE because the current implementation
6569  * of the back channel DRC only supports caching the CB_SEQUENCE operation.
6570  */
6571 static void nfs4_init_channel_attrs(struct nfs41_create_session_args *args)
6572 {
6573         unsigned int max_rqst_sz, max_resp_sz;
6574
6575         max_rqst_sz = NFS_MAX_FILE_IO_SIZE + nfs41_maxwrite_overhead;
6576         max_resp_sz = NFS_MAX_FILE_IO_SIZE + nfs41_maxread_overhead;
6577
6578         /* Fore channel attributes */
6579         args->fc_attrs.max_rqst_sz = max_rqst_sz;
6580         args->fc_attrs.max_resp_sz = max_resp_sz;
6581         args->fc_attrs.max_ops = NFS4_MAX_OPS;
6582         args->fc_attrs.max_reqs = max_session_slots;
6583
6584         dprintk("%s: Fore Channel : max_rqst_sz=%u max_resp_sz=%u "
6585                 "max_ops=%u max_reqs=%u\n",
6586                 __func__,
6587                 args->fc_attrs.max_rqst_sz, args->fc_attrs.max_resp_sz,
6588                 args->fc_attrs.max_ops, args->fc_attrs.max_reqs);
6589
6590         /* Back channel attributes */
6591         args->bc_attrs.max_rqst_sz = PAGE_SIZE;
6592         args->bc_attrs.max_resp_sz = PAGE_SIZE;
6593         args->bc_attrs.max_resp_sz_cached = 0;
6594         args->bc_attrs.max_ops = NFS4_MAX_BACK_CHANNEL_OPS;
6595         args->bc_attrs.max_reqs = 1;
6596
6597         dprintk("%s: Back Channel : max_rqst_sz=%u max_resp_sz=%u "
6598                 "max_resp_sz_cached=%u max_ops=%u max_reqs=%u\n",
6599                 __func__,
6600                 args->bc_attrs.max_rqst_sz, args->bc_attrs.max_resp_sz,
6601                 args->bc_attrs.max_resp_sz_cached, args->bc_attrs.max_ops,
6602                 args->bc_attrs.max_reqs);
6603 }
6604
6605 static int nfs4_verify_fore_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
6606 {
6607         struct nfs4_channel_attrs *sent = &args->fc_attrs;
6608         struct nfs4_channel_attrs *rcvd = &session->fc_attrs;
6609
6610         if (rcvd->max_resp_sz > sent->max_resp_sz)
6611                 return -EINVAL;
6612         /*
6613          * Our requested max_ops is the minimum we need; we're not
6614          * prepared to break up compounds into smaller pieces than that.
6615          * So, no point even trying to continue if the server won't
6616          * cooperate:
6617          */
6618         if (rcvd->max_ops < sent->max_ops)
6619                 return -EINVAL;
6620         if (rcvd->max_reqs == 0)
6621                 return -EINVAL;
6622         if (rcvd->max_reqs > NFS4_MAX_SLOT_TABLE)
6623                 rcvd->max_reqs = NFS4_MAX_SLOT_TABLE;
6624         return 0;
6625 }
6626
6627 static int nfs4_verify_back_channel_attrs(struct nfs41_create_session_args *args, struct nfs4_session *session)
6628 {
6629         struct nfs4_channel_attrs *sent = &args->bc_attrs;
6630         struct nfs4_channel_attrs *rcvd = &session->bc_attrs;
6631
6632         if (rcvd->max_rqst_sz > sent->max_rqst_sz)
6633                 return -EINVAL;
6634         if (rcvd->max_resp_sz < sent->max_resp_sz)
6635                 return -EINVAL;
6636         if (rcvd->max_resp_sz_cached > sent->max_resp_sz_cached)
6637                 return -EINVAL;
6638         /* These would render the backchannel useless: */
6639         if (rcvd->max_ops != sent->max_ops)
6640                 return -EINVAL;
6641         if (rcvd->max_reqs != sent->max_reqs)
6642                 return -EINVAL;
6643         return 0;
6644 }
6645
6646 static int nfs4_verify_channel_attrs(struct nfs41_create_session_args *args,
6647                                      struct nfs4_session *session)
6648 {
6649         int ret;
6650
6651         ret = nfs4_verify_fore_channel_attrs(args, session);
6652         if (ret)
6653                 return ret;
6654         return nfs4_verify_back_channel_attrs(args, session);
6655 }
6656
6657 static int _nfs4_proc_create_session(struct nfs_client *clp,
6658                 struct rpc_cred *cred)
6659 {
6660         struct nfs4_session *session = clp->cl_session;
6661         struct nfs41_create_session_args args = {
6662                 .client = clp,
6663                 .cb_program = NFS4_CALLBACK,
6664         };
6665         struct nfs41_create_session_res res = {
6666                 .client = clp,
6667         };
6668         struct rpc_message msg = {
6669                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE_SESSION],
6670                 .rpc_argp = &args,
6671                 .rpc_resp = &res,
6672                 .rpc_cred = cred,
6673         };
6674         int status;
6675
6676         nfs4_init_channel_attrs(&args);
6677         args.flags = (SESSION4_PERSIST | SESSION4_BACK_CHAN);
6678
6679         status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
6680         trace_nfs4_create_session(clp, status);
6681
6682         if (!status) {
6683                 /* Verify the session's negotiated channel_attrs values */
6684                 status = nfs4_verify_channel_attrs(&args, session);
6685                 /* Increment the clientid slot sequence id */
6686                 clp->cl_seqid++;
6687         }
6688
6689         return status;
6690 }
6691
6692 /*
6693  * Issues a CREATE_SESSION operation to the server.
6694  * It is the responsibility of the caller to verify the session is
6695  * expired before calling this routine.
6696  */
6697 int nfs4_proc_create_session(struct nfs_client *clp, struct rpc_cred *cred)
6698 {
6699         int status;
6700         unsigned *ptr;
6701         struct nfs4_session *session = clp->cl_session;
6702
6703         dprintk("--> %s clp=%p session=%p\n", __func__, clp, session);
6704
6705         status = _nfs4_proc_create_session(clp, cred);
6706         if (status)
6707                 goto out;
6708
6709         /* Init or reset the session slot tables */
6710         status = nfs4_setup_session_slot_tables(session);
6711         dprintk("slot table setup returned %d\n", status);
6712         if (status)
6713                 goto out;
6714
6715         ptr = (unsigned *)&session->sess_id.data[0];
6716         dprintk("%s client>seqid %d sessionid %u:%u:%u:%u\n", __func__,
6717                 clp->cl_seqid, ptr[0], ptr[1], ptr[2], ptr[3]);
6718 out:
6719         dprintk("<-- %s\n", __func__);
6720         return status;
6721 }
6722
6723 /*
6724  * Issue the over-the-wire RPC DESTROY_SESSION.
6725  * The caller must serialize access to this routine.
6726  */
6727 int nfs4_proc_destroy_session(struct nfs4_session *session,
6728                 struct rpc_cred *cred)
6729 {
6730         struct rpc_message msg = {
6731                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DESTROY_SESSION],
6732                 .rpc_argp = session,
6733                 .rpc_cred = cred,
6734         };
6735         int status = 0;
6736
6737         dprintk("--> nfs4_proc_destroy_session\n");
6738
6739         /* session is still being setup */
6740         if (session->clp->cl_cons_state != NFS_CS_READY)
6741                 return status;
6742
6743         status = rpc_call_sync(session->clp->cl_rpcclient, &msg, RPC_TASK_TIMEOUT);
6744         trace_nfs4_destroy_session(session->clp, status);
6745
6746         if (status)
6747                 dprintk("NFS: Got error %d from the server on DESTROY_SESSION. "
6748                         "Session has been destroyed regardless...\n", status);
6749
6750         dprintk("<-- nfs4_proc_destroy_session\n");
6751         return status;
6752 }
6753
6754 /*
6755  * Renew the cl_session lease.
6756  */
6757 struct nfs4_sequence_data {
6758         struct nfs_client *clp;
6759         struct nfs4_sequence_args args;
6760         struct nfs4_sequence_res res;
6761 };
6762
6763 static void nfs41_sequence_release(void *data)
6764 {
6765         struct nfs4_sequence_data *calldata = data;
6766         struct nfs_client *clp = calldata->clp;
6767
6768         if (atomic_read(&clp->cl_count) > 1)
6769                 nfs4_schedule_state_renewal(clp);
6770         nfs_put_client(clp);
6771         kfree(calldata);
6772 }
6773
6774 static int nfs41_sequence_handle_errors(struct rpc_task *task, struct nfs_client *clp)
6775 {
6776         switch(task->tk_status) {
6777         case -NFS4ERR_DELAY:
6778                 rpc_delay(task, NFS4_POLL_RETRY_MAX);
6779                 return -EAGAIN;
6780         default:
6781                 nfs4_schedule_lease_recovery(clp);
6782         }
6783         return 0;
6784 }
6785
6786 static void nfs41_sequence_call_done(struct rpc_task *task, void *data)
6787 {
6788         struct nfs4_sequence_data *calldata = data;
6789         struct nfs_client *clp = calldata->clp;
6790
6791         if (!nfs41_sequence_done(task, task->tk_msg.rpc_resp))
6792                 return;
6793
6794         trace_nfs4_sequence(clp, task->tk_status);
6795         if (task->tk_status < 0) {
6796                 dprintk("%s ERROR %d\n", __func__, task->tk_status);
6797                 if (atomic_read(&clp->cl_count) == 1)
6798                         goto out;
6799
6800                 if (nfs41_sequence_handle_errors(task, clp) == -EAGAIN) {
6801                         rpc_restart_call_prepare(task);
6802                         return;
6803                 }
6804         }
6805         dprintk("%s rpc_cred %p\n", __func__, task->tk_msg.rpc_cred);
6806 out:
6807         dprintk("<-- %s\n", __func__);
6808 }
6809
6810 static void nfs41_sequence_prepare(struct rpc_task *task, void *data)
6811 {
6812         struct nfs4_sequence_data *calldata = data;
6813         struct nfs_client *clp = calldata->clp;
6814         struct nfs4_sequence_args *args;
6815         struct nfs4_sequence_res *res;
6816
6817         args = task->tk_msg.rpc_argp;
6818         res = task->tk_msg.rpc_resp;
6819
6820         nfs41_setup_sequence(clp->cl_session, args, res, task);
6821 }
6822
6823 static const struct rpc_call_ops nfs41_sequence_ops = {
6824         .rpc_call_done = nfs41_sequence_call_done,
6825         .rpc_call_prepare = nfs41_sequence_prepare,
6826         .rpc_release = nfs41_sequence_release,
6827 };
6828
6829 static struct rpc_task *_nfs41_proc_sequence(struct nfs_client *clp,
6830                 struct rpc_cred *cred,
6831                 bool is_privileged)
6832 {
6833         struct nfs4_sequence_data *calldata;
6834         struct rpc_message msg = {
6835                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SEQUENCE],
6836                 .rpc_cred = cred,
6837         };
6838         struct rpc_task_setup task_setup_data = {
6839                 .rpc_client = clp->cl_rpcclient,
6840                 .rpc_message = &msg,
6841                 .callback_ops = &nfs41_sequence_ops,
6842                 .flags = RPC_TASK_ASYNC | RPC_TASK_TIMEOUT,
6843         };
6844
6845         if (!atomic_inc_not_zero(&clp->cl_count))
6846                 return ERR_PTR(-EIO);
6847         calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
6848         if (calldata == NULL) {
6849                 nfs_put_client(clp);
6850                 return ERR_PTR(-ENOMEM);
6851         }
6852         nfs4_init_sequence(&calldata->args, &calldata->res, 0);
6853         if (is_privileged)
6854                 nfs4_set_sequence_privileged(&calldata->args);
6855         msg.rpc_argp = &calldata->args;
6856         msg.rpc_resp = &calldata->res;
6857         calldata->clp = clp;
6858         task_setup_data.callback_data = calldata;
6859
6860         return rpc_run_task(&task_setup_data);
6861 }
6862
6863 static int nfs41_proc_async_sequence(struct nfs_client *clp, struct rpc_cred *cred, unsigned renew_flags)
6864 {
6865         struct rpc_task *task;
6866         int ret = 0;
6867
6868         if ((renew_flags & NFS4_RENEW_TIMEOUT) == 0)
6869                 return 0;
6870         task = _nfs41_proc_sequence(clp, cred, false);
6871         if (IS_ERR(task))
6872                 ret = PTR_ERR(task);
6873         else
6874                 rpc_put_task_async(task);
6875         dprintk("<-- %s status=%d\n", __func__, ret);
6876         return ret;
6877 }
6878
6879 static int nfs4_proc_sequence(struct nfs_client *clp, struct rpc_cred *cred)
6880 {
6881         struct rpc_task *task;
6882         int ret;
6883
6884         task = _nfs41_proc_sequence(clp, cred, true);
6885         if (IS_ERR(task)) {
6886                 ret = PTR_ERR(task);
6887                 goto out;
6888         }
6889         ret = rpc_wait_for_completion_task(task);
6890         if (!ret) {
6891                 struct nfs4_sequence_res *res = task->tk_msg.rpc_resp;
6892
6893                 if (task->tk_status == 0)
6894                         nfs41_handle_sequence_flag_errors(clp, res->sr_status_flags);
6895                 ret = task->tk_status;
6896         }
6897         rpc_put_task(task);
6898 out:
6899         dprintk("<-- %s status=%d\n", __func__, ret);
6900         return ret;
6901 }
6902
6903 struct nfs4_reclaim_complete_data {
6904         struct nfs_client *clp;
6905         struct nfs41_reclaim_complete_args arg;
6906         struct nfs41_reclaim_complete_res res;
6907 };
6908
6909 static void nfs4_reclaim_complete_prepare(struct rpc_task *task, void *data)
6910 {
6911         struct nfs4_reclaim_complete_data *calldata = data;
6912
6913         nfs41_setup_sequence(calldata->clp->cl_session,
6914                         &calldata->arg.seq_args,
6915                         &calldata->res.seq_res,
6916                         task);
6917 }
6918
6919 static int nfs41_reclaim_complete_handle_errors(struct rpc_task *task, struct nfs_client *clp)
6920 {
6921         switch(task->tk_status) {
6922         case 0:
6923         case -NFS4ERR_COMPLETE_ALREADY:
6924         case -NFS4ERR_WRONG_CRED: /* What to do here? */
6925                 break;
6926         case -NFS4ERR_DELAY:
6927                 rpc_delay(task, NFS4_POLL_RETRY_MAX);
6928                 /* fall through */
6929         case -NFS4ERR_RETRY_UNCACHED_REP:
6930                 return -EAGAIN;
6931         default:
6932                 nfs4_schedule_lease_recovery(clp);
6933         }
6934         return 0;
6935 }
6936
6937 static void nfs4_reclaim_complete_done(struct rpc_task *task, void *data)
6938 {
6939         struct nfs4_reclaim_complete_data *calldata = data;
6940         struct nfs_client *clp = calldata->clp;
6941         struct nfs4_sequence_res *res = &calldata->res.seq_res;
6942
6943         dprintk("--> %s\n", __func__);
6944         if (!nfs41_sequence_done(task, res))
6945                 return;
6946
6947         trace_nfs4_reclaim_complete(clp, task->tk_status);
6948         if (nfs41_reclaim_complete_handle_errors(task, clp) == -EAGAIN) {
6949                 rpc_restart_call_prepare(task);
6950                 return;
6951         }
6952         dprintk("<-- %s\n", __func__);
6953 }
6954
6955 static void nfs4_free_reclaim_complete_data(void *data)
6956 {
6957         struct nfs4_reclaim_complete_data *calldata = data;
6958
6959         kfree(calldata);
6960 }
6961
6962 static const struct rpc_call_ops nfs4_reclaim_complete_call_ops = {
6963         .rpc_call_prepare = nfs4_reclaim_complete_prepare,
6964         .rpc_call_done = nfs4_reclaim_complete_done,
6965         .rpc_release = nfs4_free_reclaim_complete_data,
6966 };
6967
6968 /*
6969  * Issue a global reclaim complete.
6970  */
6971 static int nfs41_proc_reclaim_complete(struct nfs_client *clp,
6972                 struct rpc_cred *cred)
6973 {
6974         struct nfs4_reclaim_complete_data *calldata;
6975         struct rpc_task *task;
6976         struct rpc_message msg = {
6977                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RECLAIM_COMPLETE],
6978                 .rpc_cred = cred,
6979         };
6980         struct rpc_task_setup task_setup_data = {
6981                 .rpc_client = clp->cl_rpcclient,
6982                 .rpc_message = &msg,
6983                 .callback_ops = &nfs4_reclaim_complete_call_ops,
6984                 .flags = RPC_TASK_ASYNC,
6985         };
6986         int status = -ENOMEM;
6987
6988         dprintk("--> %s\n", __func__);
6989         calldata = kzalloc(sizeof(*calldata), GFP_NOFS);
6990         if (calldata == NULL)
6991                 goto out;
6992         calldata->clp = clp;
6993         calldata->arg.one_fs = 0;
6994
6995         nfs4_init_sequence(&calldata->arg.seq_args, &calldata->res.seq_res, 0);
6996         nfs4_set_sequence_privileged(&calldata->arg.seq_args);
6997         msg.rpc_argp = &calldata->arg;
6998         msg.rpc_resp = &calldata->res;
6999         task_setup_data.callback_data = calldata;
7000         task = rpc_run_task(&task_setup_data);
7001         if (IS_ERR(task)) {
7002                 status = PTR_ERR(task);
7003                 goto out;
7004         }
7005         status = nfs4_wait_for_completion_rpc_task(task);
7006         if (status == 0)
7007                 status = task->tk_status;
7008         rpc_put_task(task);
7009         return 0;
7010 out:
7011         dprintk("<-- %s status=%d\n", __func__, status);
7012         return status;
7013 }
7014
7015 static void
7016 nfs4_layoutget_prepare(struct rpc_task *task, void *calldata)
7017 {
7018         struct nfs4_layoutget *lgp = calldata;
7019         struct nfs_server *server = NFS_SERVER(lgp->args.inode);
7020         struct nfs4_session *session = nfs4_get_session(server);
7021
7022         dprintk("--> %s\n", __func__);
7023         /* Note the is a race here, where a CB_LAYOUTRECALL can come in
7024          * right now covering the LAYOUTGET we are about to send.
7025          * However, that is not so catastrophic, and there seems
7026          * to be no way to prevent it completely.
7027          */
7028         if (nfs41_setup_sequence(session, &lgp->args.seq_args,
7029                                 &lgp->res.seq_res, task))
7030                 return;
7031         if (pnfs_choose_layoutget_stateid(&lgp->args.stateid,
7032                                           NFS_I(lgp->args.inode)->layout,
7033                                           lgp->args.ctx->state)) {
7034                 rpc_exit(task, NFS4_OK);
7035         }
7036 }
7037
7038 static void nfs4_layoutget_done(struct rpc_task *task, void *calldata)
7039 {
7040         struct nfs4_layoutget *lgp = calldata;
7041         struct inode *inode = lgp->args.inode;
7042         struct nfs_server *server = NFS_SERVER(inode);
7043         struct pnfs_layout_hdr *lo;
7044         struct nfs4_state *state = NULL;
7045         unsigned long timeo, giveup;
7046
7047         dprintk("--> %s\n", __func__);
7048
7049         if (!nfs41_sequence_done(task, &lgp->res.seq_res))
7050                 goto out;
7051
7052         switch (task->tk_status) {
7053         case 0:
7054                 goto out;
7055         case -NFS4ERR_LAYOUTTRYLATER:
7056         case -NFS4ERR_RECALLCONFLICT:
7057                 timeo = rpc_get_timeout(task->tk_client);
7058                 giveup = lgp->args.timestamp + timeo;
7059                 if (time_after(giveup, jiffies))
7060                         task->tk_status = -NFS4ERR_DELAY;
7061                 break;
7062         case -NFS4ERR_EXPIRED:
7063         case -NFS4ERR_BAD_STATEID:
7064                 spin_lock(&inode->i_lock);
7065                 lo = NFS_I(inode)->layout;
7066                 if (!lo || list_empty(&lo->plh_segs)) {
7067                         spin_unlock(&inode->i_lock);
7068                         /* If the open stateid was bad, then recover it. */
7069                         state = lgp->args.ctx->state;
7070                 } else {
7071                         LIST_HEAD(head);
7072
7073                         pnfs_mark_matching_lsegs_invalid(lo, &head, NULL);
7074                         spin_unlock(&inode->i_lock);
7075                         /* Mark the bad layout state as invalid, then
7076                          * retry using the open stateid. */
7077                         pnfs_free_lseg_list(&head);
7078                 }
7079         }
7080         if (nfs4_async_handle_error(task, server, state) == -EAGAIN)
7081                 rpc_restart_call_prepare(task);
7082 out:
7083         dprintk("<-- %s\n", __func__);
7084 }
7085
7086 static size_t max_response_pages(struct nfs_server *server)
7087 {
7088         u32 max_resp_sz = server->nfs_client->cl_session->fc_attrs.max_resp_sz;
7089         return nfs_page_array_len(0, max_resp_sz);
7090 }
7091
7092 static void nfs4_free_pages(struct page **pages, size_t size)
7093 {
7094         int i;
7095
7096         if (!pages)
7097                 return;
7098
7099         for (i = 0; i < size; i++) {
7100                 if (!pages[i])
7101                         break;
7102                 __free_page(pages[i]);
7103         }
7104         kfree(pages);
7105 }
7106
7107 static struct page **nfs4_alloc_pages(size_t size, gfp_t gfp_flags)
7108 {
7109         struct page **pages;
7110         int i;
7111
7112         pages = kcalloc(size, sizeof(struct page *), gfp_flags);
7113         if (!pages) {
7114                 dprintk("%s: can't alloc array of %zu pages\n", __func__, size);
7115                 return NULL;
7116         }
7117
7118         for (i = 0; i < size; i++) {
7119                 pages[i] = alloc_page(gfp_flags);
7120                 if (!pages[i]) {
7121                         dprintk("%s: failed to allocate page\n", __func__);
7122                         nfs4_free_pages(pages, size);
7123                         return NULL;
7124                 }
7125         }
7126
7127         return pages;
7128 }
7129
7130 static void nfs4_layoutget_release(void *calldata)
7131 {
7132         struct nfs4_layoutget *lgp = calldata;
7133         struct inode *inode = lgp->args.inode;
7134         struct nfs_server *server = NFS_SERVER(inode);
7135         size_t max_pages = max_response_pages(server);
7136
7137         dprintk("--> %s\n", __func__);
7138         nfs4_free_pages(lgp->args.layout.pages, max_pages);
7139         pnfs_put_layout_hdr(NFS_I(inode)->layout);
7140         put_nfs_open_context(lgp->args.ctx);
7141         kfree(calldata);
7142         dprintk("<-- %s\n", __func__);
7143 }
7144
7145 static const struct rpc_call_ops nfs4_layoutget_call_ops = {
7146         .rpc_call_prepare = nfs4_layoutget_prepare,
7147         .rpc_call_done = nfs4_layoutget_done,
7148         .rpc_release = nfs4_layoutget_release,
7149 };
7150
7151 struct pnfs_layout_segment *
7152 nfs4_proc_layoutget(struct nfs4_layoutget *lgp, gfp_t gfp_flags)
7153 {
7154         struct inode *inode = lgp->args.inode;
7155         struct nfs_server *server = NFS_SERVER(inode);
7156         size_t max_pages = max_response_pages(server);
7157         struct rpc_task *task;
7158         struct rpc_message msg = {
7159                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTGET],
7160                 .rpc_argp = &lgp->args,
7161                 .rpc_resp = &lgp->res,
7162                 .rpc_cred = lgp->cred,
7163         };
7164         struct rpc_task_setup task_setup_data = {
7165                 .rpc_client = server->client,
7166                 .rpc_message = &msg,
7167                 .callback_ops = &nfs4_layoutget_call_ops,
7168                 .callback_data = lgp,
7169                 .flags = RPC_TASK_ASYNC,
7170         };
7171         struct pnfs_layout_segment *lseg = NULL;
7172         int status = 0;
7173
7174         dprintk("--> %s\n", __func__);
7175
7176         lgp->args.layout.pages = nfs4_alloc_pages(max_pages, gfp_flags);
7177         if (!lgp->args.layout.pages) {
7178                 nfs4_layoutget_release(lgp);
7179                 return ERR_PTR(-ENOMEM);
7180         }
7181         lgp->args.layout.pglen = max_pages * PAGE_SIZE;
7182         lgp->args.timestamp = jiffies;
7183
7184         lgp->res.layoutp = &lgp->args.layout;
7185         lgp->res.seq_res.sr_slot = NULL;
7186         nfs4_init_sequence(&lgp->args.seq_args, &lgp->res.seq_res, 0);
7187
7188         /* nfs4_layoutget_release calls pnfs_put_layout_hdr */
7189         pnfs_get_layout_hdr(NFS_I(inode)->layout);
7190
7191         task = rpc_run_task(&task_setup_data);
7192         if (IS_ERR(task))
7193                 return ERR_CAST(task);
7194         status = nfs4_wait_for_completion_rpc_task(task);
7195         if (status == 0)
7196                 status = task->tk_status;
7197         trace_nfs4_layoutget(lgp->args.ctx,
7198                         &lgp->args.range,
7199                         &lgp->res.range,
7200                         status);
7201         /* if layoutp->len is 0, nfs4_layoutget_prepare called rpc_exit */
7202         if (status == 0 && lgp->res.layoutp->len)
7203                 lseg = pnfs_layout_process(lgp);
7204         rpc_put_task(task);
7205         dprintk("<-- %s status=%d\n", __func__, status);
7206         if (status)
7207                 return ERR_PTR(status);
7208         return lseg;
7209 }
7210
7211 static void
7212 nfs4_layoutreturn_prepare(struct rpc_task *task, void *calldata)
7213 {
7214         struct nfs4_layoutreturn *lrp = calldata;
7215
7216         dprintk("--> %s\n", __func__);
7217         nfs41_setup_sequence(lrp->clp->cl_session,
7218                         &lrp->args.seq_args,
7219                         &lrp->res.seq_res,
7220                         task);
7221 }
7222
7223 static void nfs4_layoutreturn_done(struct rpc_task *task, void *calldata)
7224 {
7225         struct nfs4_layoutreturn *lrp = calldata;
7226         struct nfs_server *server;
7227
7228         dprintk("--> %s\n", __func__);
7229
7230         if (!nfs41_sequence_done(task, &lrp->res.seq_res))
7231                 return;
7232
7233         server = NFS_SERVER(lrp->args.inode);
7234         if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
7235                 rpc_restart_call_prepare(task);
7236                 return;
7237         }
7238         dprintk("<-- %s\n", __func__);
7239 }
7240
7241 static void nfs4_layoutreturn_release(void *calldata)
7242 {
7243         struct nfs4_layoutreturn *lrp = calldata;
7244         struct pnfs_layout_hdr *lo = lrp->args.layout;
7245
7246         dprintk("--> %s\n", __func__);
7247         spin_lock(&lo->plh_inode->i_lock);
7248         if (lrp->res.lrs_present)
7249                 pnfs_set_layout_stateid(lo, &lrp->res.stateid, true);
7250         lo->plh_block_lgets--;
7251         spin_unlock(&lo->plh_inode->i_lock);
7252         pnfs_put_layout_hdr(lrp->args.layout);
7253         kfree(calldata);
7254         dprintk("<-- %s\n", __func__);
7255 }
7256
7257 static const struct rpc_call_ops nfs4_layoutreturn_call_ops = {
7258         .rpc_call_prepare = nfs4_layoutreturn_prepare,
7259         .rpc_call_done = nfs4_layoutreturn_done,
7260         .rpc_release = nfs4_layoutreturn_release,
7261 };
7262
7263 int nfs4_proc_layoutreturn(struct nfs4_layoutreturn *lrp)
7264 {
7265         struct rpc_task *task;
7266         struct rpc_message msg = {
7267                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTRETURN],
7268                 .rpc_argp = &lrp->args,
7269                 .rpc_resp = &lrp->res,
7270                 .rpc_cred = lrp->cred,
7271         };
7272         struct rpc_task_setup task_setup_data = {
7273                 .rpc_client = NFS_SERVER(lrp->args.inode)->client,
7274                 .rpc_message = &msg,
7275                 .callback_ops = &nfs4_layoutreturn_call_ops,
7276                 .callback_data = lrp,
7277         };
7278         int status;
7279
7280         dprintk("--> %s\n", __func__);
7281         nfs4_init_sequence(&lrp->args.seq_args, &lrp->res.seq_res, 1);
7282         task = rpc_run_task(&task_setup_data);
7283         if (IS_ERR(task))
7284                 return PTR_ERR(task);
7285         status = task->tk_status;
7286         trace_nfs4_layoutreturn(lrp->args.inode, status);
7287         dprintk("<-- %s status=%d\n", __func__, status);
7288         rpc_put_task(task);
7289         return status;
7290 }
7291
7292 /*
7293  * Retrieve the list of Data Server devices from the MDS.
7294  */
7295 static int _nfs4_getdevicelist(struct nfs_server *server,
7296                                     const struct nfs_fh *fh,
7297                                     struct pnfs_devicelist *devlist)
7298 {
7299         struct nfs4_getdevicelist_args args = {
7300                 .fh = fh,
7301                 .layoutclass = server->pnfs_curr_ld->id,
7302         };
7303         struct nfs4_getdevicelist_res res = {
7304                 .devlist = devlist,
7305         };
7306         struct rpc_message msg = {
7307                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICELIST],
7308                 .rpc_argp = &args,
7309                 .rpc_resp = &res,
7310         };
7311         int status;
7312
7313         dprintk("--> %s\n", __func__);
7314         status = nfs4_call_sync(server->client, server, &msg, &args.seq_args,
7315                                 &res.seq_res, 0);
7316         dprintk("<-- %s status=%d\n", __func__, status);
7317         return status;
7318 }
7319
7320 int nfs4_proc_getdevicelist(struct nfs_server *server,
7321                             const struct nfs_fh *fh,
7322                             struct pnfs_devicelist *devlist)
7323 {
7324         struct nfs4_exception exception = { };
7325         int err;
7326
7327         do {
7328                 err = nfs4_handle_exception(server,
7329                                 _nfs4_getdevicelist(server, fh, devlist),
7330                                 &exception);
7331         } while (exception.retry);
7332
7333         dprintk("%s: err=%d, num_devs=%u\n", __func__,
7334                 err, devlist->num_devs);
7335
7336         return err;
7337 }
7338 EXPORT_SYMBOL_GPL(nfs4_proc_getdevicelist);
7339
7340 static int
7341 _nfs4_proc_getdeviceinfo(struct nfs_server *server,
7342                 struct pnfs_device *pdev,
7343                 struct rpc_cred *cred)
7344 {
7345         struct nfs4_getdeviceinfo_args args = {
7346                 .pdev = pdev,
7347         };
7348         struct nfs4_getdeviceinfo_res res = {
7349                 .pdev = pdev,
7350         };
7351         struct rpc_message msg = {
7352                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETDEVICEINFO],
7353                 .rpc_argp = &args,
7354                 .rpc_resp = &res,
7355                 .rpc_cred = cred,
7356         };
7357         int status;
7358
7359         dprintk("--> %s\n", __func__);
7360         status = nfs4_call_sync(server->client, server, &msg, &args.seq_args, &res.seq_res, 0);
7361         dprintk("<-- %s status=%d\n", __func__, status);
7362
7363         return status;
7364 }
7365
7366 int nfs4_proc_getdeviceinfo(struct nfs_server *server,
7367                 struct pnfs_device *pdev,
7368                 struct rpc_cred *cred)
7369 {
7370         struct nfs4_exception exception = { };
7371         int err;
7372
7373         do {
7374                 err = nfs4_handle_exception(server,
7375                                         _nfs4_proc_getdeviceinfo(server, pdev, cred),
7376                                         &exception);
7377         } while (exception.retry);
7378         return err;
7379 }
7380 EXPORT_SYMBOL_GPL(nfs4_proc_getdeviceinfo);
7381
7382 static void nfs4_layoutcommit_prepare(struct rpc_task *task, void *calldata)
7383 {
7384         struct nfs4_layoutcommit_data *data = calldata;
7385         struct nfs_server *server = NFS_SERVER(data->args.inode);
7386         struct nfs4_session *session = nfs4_get_session(server);
7387
7388         nfs41_setup_sequence(session,
7389                         &data->args.seq_args,
7390                         &data->res.seq_res,
7391                         task);
7392 }
7393
7394 static void
7395 nfs4_layoutcommit_done(struct rpc_task *task, void *calldata)
7396 {
7397         struct nfs4_layoutcommit_data *data = calldata;
7398         struct nfs_server *server = NFS_SERVER(data->args.inode);
7399
7400         if (!nfs41_sequence_done(task, &data->res.seq_res))
7401                 return;
7402
7403         switch (task->tk_status) { /* Just ignore these failures */
7404         case -NFS4ERR_DELEG_REVOKED: /* layout was recalled */
7405         case -NFS4ERR_BADIOMODE:     /* no IOMODE_RW layout for range */
7406         case -NFS4ERR_BADLAYOUT:     /* no layout */
7407         case -NFS4ERR_GRACE:        /* loca_recalim always false */
7408                 task->tk_status = 0;
7409                 break;
7410         case 0:
7411                 nfs_post_op_update_inode_force_wcc(data->args.inode,
7412                                                    data->res.fattr);
7413                 break;
7414         default:
7415                 if (nfs4_async_handle_error(task, server, NULL) == -EAGAIN) {
7416                         rpc_restart_call_prepare(task);
7417                         return;
7418                 }
7419         }
7420 }
7421
7422 static void nfs4_layoutcommit_release(void *calldata)
7423 {
7424         struct nfs4_layoutcommit_data *data = calldata;
7425
7426         pnfs_cleanup_layoutcommit(data);
7427         put_rpccred(data->cred);
7428         kfree(data);
7429 }
7430
7431 static const struct rpc_call_ops nfs4_layoutcommit_ops = {
7432         .rpc_call_prepare = nfs4_layoutcommit_prepare,
7433         .rpc_call_done = nfs4_layoutcommit_done,
7434         .rpc_release = nfs4_layoutcommit_release,
7435 };
7436
7437 int
7438 nfs4_proc_layoutcommit(struct nfs4_layoutcommit_data *data, bool sync)
7439 {
7440         struct rpc_message msg = {
7441                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LAYOUTCOMMIT],
7442                 .rpc_argp = &data->args,
7443                 .rpc_resp = &data->res,
7444                 .rpc_cred = data->cred,
7445         };
7446         struct rpc_task_setup task_setup_data = {
7447                 .task = &data->task,
7448                 .rpc_client = NFS_CLIENT(data->args.inode),
7449                 .rpc_message = &msg,
7450                 .callback_ops = &nfs4_layoutcommit_ops,
7451                 .callback_data = data,
7452                 .flags = RPC_TASK_ASYNC,
7453         };
7454         struct rpc_task *task;
7455         int status = 0;
7456
7457         dprintk("NFS: %4d initiating layoutcommit call. sync %d "
7458                 "lbw: %llu inode %lu\n",
7459                 data->task.tk_pid, sync,
7460                 data->args.lastbytewritten,
7461                 data->args.inode->i_ino);
7462
7463         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 1);
7464         task = rpc_run_task(&task_setup_data);
7465         if (IS_ERR(task))
7466                 return PTR_ERR(task);
7467         if (sync == false)
7468                 goto out;
7469         status = nfs4_wait_for_completion_rpc_task(task);
7470         if (status != 0)
7471                 goto out;
7472         status = task->tk_status;
7473         trace_nfs4_layoutcommit(data->args.inode, status);
7474 out:
7475         dprintk("%s: status %d\n", __func__, status);
7476         rpc_put_task(task);
7477         return status;
7478 }
7479
7480 /**
7481  * Use the state managment nfs_client cl_rpcclient, which uses krb5i (if
7482  * possible) as per RFC3530bis and RFC5661 Security Considerations sections
7483  */
7484 static int
7485 _nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
7486                     struct nfs_fsinfo *info,
7487                     struct nfs4_secinfo_flavors *flavors, bool use_integrity)
7488 {
7489         struct nfs41_secinfo_no_name_args args = {
7490                 .style = SECINFO_STYLE_CURRENT_FH,
7491         };
7492         struct nfs4_secinfo_res res = {
7493                 .flavors = flavors,
7494         };
7495         struct rpc_message msg = {
7496                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SECINFO_NO_NAME],
7497                 .rpc_argp = &args,
7498                 .rpc_resp = &res,
7499         };
7500         struct rpc_clnt *clnt = server->client;
7501         int status;
7502
7503         if (use_integrity) {
7504                 clnt = server->nfs_client->cl_rpcclient;
7505                 msg.rpc_cred = nfs4_get_clid_cred(server->nfs_client);
7506         }
7507
7508         dprintk("--> %s\n", __func__);
7509         status = nfs4_call_sync(clnt, server, &msg, &args.seq_args,
7510                                 &res.seq_res, 0);
7511         dprintk("<-- %s status=%d\n", __func__, status);
7512
7513         if (msg.rpc_cred)
7514                 put_rpccred(msg.rpc_cred);
7515
7516         return status;
7517 }
7518
7519 static int
7520 nfs41_proc_secinfo_no_name(struct nfs_server *server, struct nfs_fh *fhandle,
7521                            struct nfs_fsinfo *info, struct nfs4_secinfo_flavors *flavors)
7522 {
7523         struct nfs4_exception exception = { };
7524         int err;
7525         do {
7526                 /* first try using integrity protection */
7527                 err = -NFS4ERR_WRONGSEC;
7528
7529                 /* try to use integrity protection with machine cred */
7530                 if (_nfs4_is_integrity_protected(server->nfs_client))
7531                         err = _nfs41_proc_secinfo_no_name(server, fhandle, info,
7532                                                           flavors, true);
7533
7534                 /*
7535                  * if unable to use integrity protection, or SECINFO with
7536                  * integrity protection returns NFS4ERR_WRONGSEC (which is
7537                  * disallowed by spec, but exists in deployed servers) use
7538                  * the current filesystem's rpc_client and the user cred.
7539                  */
7540                 if (err == -NFS4ERR_WRONGSEC)
7541                         err = _nfs41_proc_secinfo_no_name(server, fhandle, info,
7542                                                           flavors, false);
7543
7544                 switch (err) {
7545                 case 0:
7546                 case -NFS4ERR_WRONGSEC:
7547                 case -NFS4ERR_NOTSUPP:
7548                         goto out;
7549                 default:
7550                         err = nfs4_handle_exception(server, err, &exception);
7551                 }
7552         } while (exception.retry);
7553 out:
7554         return err;
7555 }
7556
7557 static int
7558 nfs41_find_root_sec(struct nfs_server *server, struct nfs_fh *fhandle,
7559                     struct nfs_fsinfo *info)
7560 {
7561         int err;
7562         struct page *page;
7563         rpc_authflavor_t flavor;
7564         struct nfs4_secinfo_flavors *flavors;
7565
7566         page = alloc_page(GFP_KERNEL);
7567         if (!page) {
7568                 err = -ENOMEM;
7569                 goto out;
7570         }
7571
7572         flavors = page_address(page);
7573         err = nfs41_proc_secinfo_no_name(server, fhandle, info, flavors);
7574
7575         /*
7576          * Fall back on "guess and check" method if
7577          * the server doesn't support SECINFO_NO_NAME
7578          */
7579         if (err == -NFS4ERR_WRONGSEC || err == -NFS4ERR_NOTSUPP) {
7580                 err = nfs4_find_root_sec(server, fhandle, info);
7581                 goto out_freepage;
7582         }
7583         if (err)
7584                 goto out_freepage;
7585
7586         flavor = nfs_find_best_sec(flavors);
7587         if (err == 0)
7588                 err = nfs4_lookup_root_sec(server, fhandle, info, flavor);
7589
7590 out_freepage:
7591         put_page(page);
7592         if (err == -EACCES)
7593                 return -EPERM;
7594 out:
7595         return err;
7596 }
7597
7598 static int _nfs41_test_stateid(struct nfs_server *server,
7599                 nfs4_stateid *stateid,
7600                 struct rpc_cred *cred)
7601 {
7602         int status;
7603         struct nfs41_test_stateid_args args = {
7604                 .stateid = stateid,
7605         };
7606         struct nfs41_test_stateid_res res;
7607         struct rpc_message msg = {
7608                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_TEST_STATEID],
7609                 .rpc_argp = &args,
7610                 .rpc_resp = &res,
7611                 .rpc_cred = cred,
7612         };
7613         struct rpc_clnt *rpc_client = server->client;
7614
7615         nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_STATEID,
7616                 &rpc_client, &msg);
7617
7618         dprintk("NFS call  test_stateid %p\n", stateid);
7619         nfs4_init_sequence(&args.seq_args, &res.seq_res, 0);
7620         nfs4_set_sequence_privileged(&args.seq_args);
7621         status = nfs4_call_sync_sequence(rpc_client, server, &msg,
7622                         &args.seq_args, &res.seq_res);
7623         if (status != NFS_OK) {
7624                 dprintk("NFS reply test_stateid: failed, %d\n", status);
7625                 return status;
7626         }
7627         dprintk("NFS reply test_stateid: succeeded, %d\n", -res.status);
7628         return -res.status;
7629 }
7630
7631 /**
7632  * nfs41_test_stateid - perform a TEST_STATEID operation
7633  *
7634  * @server: server / transport on which to perform the operation
7635  * @stateid: state ID to test
7636  * @cred: credential
7637  *
7638  * Returns NFS_OK if the server recognizes that "stateid" is valid.
7639  * Otherwise a negative NFS4ERR value is returned if the operation
7640  * failed or the state ID is not currently valid.
7641  */
7642 static int nfs41_test_stateid(struct nfs_server *server,
7643                 nfs4_stateid *stateid,
7644                 struct rpc_cred *cred)
7645 {
7646         struct nfs4_exception exception = { };
7647         int err;
7648         do {
7649                 err = _nfs41_test_stateid(server, stateid, cred);
7650                 if (err != -NFS4ERR_DELAY)
7651                         break;
7652                 nfs4_handle_exception(server, err, &exception);
7653         } while (exception.retry);
7654         return err;
7655 }
7656
7657 struct nfs_free_stateid_data {
7658         struct nfs_server *server;
7659         struct nfs41_free_stateid_args args;
7660         struct nfs41_free_stateid_res res;
7661 };
7662
7663 static void nfs41_free_stateid_prepare(struct rpc_task *task, void *calldata)
7664 {
7665         struct nfs_free_stateid_data *data = calldata;
7666         nfs41_setup_sequence(nfs4_get_session(data->server),
7667                         &data->args.seq_args,
7668                         &data->res.seq_res,
7669                         task);
7670 }
7671
7672 static void nfs41_free_stateid_done(struct rpc_task *task, void *calldata)
7673 {
7674         struct nfs_free_stateid_data *data = calldata;
7675
7676         nfs41_sequence_done(task, &data->res.seq_res);
7677
7678         switch (task->tk_status) {
7679         case -NFS4ERR_DELAY:
7680                 if (nfs4_async_handle_error(task, data->server, NULL) == -EAGAIN)
7681                         rpc_restart_call_prepare(task);
7682         }
7683 }
7684
7685 static void nfs41_free_stateid_release(void *calldata)
7686 {
7687         kfree(calldata);
7688 }
7689
7690 static const struct rpc_call_ops nfs41_free_stateid_ops = {
7691         .rpc_call_prepare = nfs41_free_stateid_prepare,
7692         .rpc_call_done = nfs41_free_stateid_done,
7693         .rpc_release = nfs41_free_stateid_release,
7694 };
7695
7696 static struct rpc_task *_nfs41_free_stateid(struct nfs_server *server,
7697                 nfs4_stateid *stateid,
7698                 struct rpc_cred *cred,
7699                 bool privileged)
7700 {
7701         struct rpc_message msg = {
7702                 .rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FREE_STATEID],
7703                 .rpc_cred = cred,
7704         };
7705         struct rpc_task_setup task_setup = {
7706                 .rpc_client = server->client,
7707                 .rpc_message = &msg,
7708                 .callback_ops = &nfs41_free_stateid_ops,
7709                 .flags = RPC_TASK_ASYNC,
7710         };
7711         struct nfs_free_stateid_data *data;
7712
7713         nfs4_state_protect(server->nfs_client, NFS_SP4_MACH_CRED_STATEID,
7714                 &task_setup.rpc_client, &msg);
7715
7716         dprintk("NFS call  free_stateid %p\n", stateid);
7717         data = kmalloc(sizeof(*data), GFP_NOFS);
7718         if (!data)
7719                 return ERR_PTR(-ENOMEM);
7720         data->server = server;
7721         nfs4_stateid_copy(&data->args.stateid, stateid);
7722
7723         task_setup.callback_data = data;
7724
7725         msg.rpc_argp = &data->args;
7726         msg.rpc_resp = &data->res;
7727         nfs4_init_sequence(&data->args.seq_args, &data->res.seq_res, 0);
7728         if (privileged)
7729                 nfs4_set_sequence_privileged(&data->args.seq_args);
7730
7731         return rpc_run_task(&task_setup);
7732 }
7733
7734 /**
7735  * nfs41_free_stateid - perform a FREE_STATEID operation
7736  *
7737  * @server: server / transport on which to perform the operation
7738  * @stateid: state ID to release
7739  * @cred: credential
7740  *
7741  * Returns NFS_OK if the server freed "stateid".  Otherwise a
7742  * negative NFS4ERR value is returned.
7743  */
7744 static int nfs41_free_stateid(struct nfs_server *server,
7745                 nfs4_stateid *stateid,
7746                 struct rpc_cred *cred)
7747 {
7748         struct rpc_task *task;
7749         int ret;
7750
7751         task = _nfs41_free_stateid(server, stateid, cred, true);
7752         if (IS_ERR(task))
7753                 return PTR_ERR(task);
7754         ret = rpc_wait_for_completion_task(task);
7755         if (!ret)
7756                 ret = task->tk_status;
7757         rpc_put_task(task);
7758         return ret;
7759 }
7760
7761 static int nfs41_free_lock_state(struct nfs_server *server, struct nfs4_lock_state *lsp)
7762 {
7763         struct rpc_task *task;
7764         struct rpc_cred *cred = lsp->ls_state->owner->so_cred;
7765
7766         task = _nfs41_free_stateid(server, &lsp->ls_stateid, cred, false);
7767         nfs4_free_lock_state(server, lsp);
7768         if (IS_ERR(task))
7769                 return PTR_ERR(task);
7770         rpc_put_task(task);
7771         return 0;
7772 }
7773
7774 static bool nfs41_match_stateid(const nfs4_stateid *s1,
7775                 const nfs4_stateid *s2)
7776 {
7777         if (memcmp(s1->other, s2->other, sizeof(s1->other)) != 0)
7778                 return false;
7779
7780         if (s1->seqid == s2->seqid)
7781                 return true;
7782         if (s1->seqid == 0 || s2->seqid == 0)
7783                 return true;
7784
7785         return false;
7786 }
7787
7788 #endif /* CONFIG_NFS_V4_1 */
7789
7790 static bool nfs4_match_stateid(const nfs4_stateid *s1,
7791                 const nfs4_stateid *s2)
7792 {
7793         return nfs4_stateid_match(s1, s2);
7794 }
7795
7796
7797 static const struct nfs4_state_recovery_ops nfs40_reboot_recovery_ops = {
7798         .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
7799         .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
7800         .recover_open   = nfs4_open_reclaim,
7801         .recover_lock   = nfs4_lock_reclaim,
7802         .establish_clid = nfs4_init_clientid,
7803         .detect_trunking = nfs40_discover_server_trunking,
7804 };
7805
7806 #if defined(CONFIG_NFS_V4_1)
7807 static const struct nfs4_state_recovery_ops nfs41_reboot_recovery_ops = {
7808         .owner_flag_bit = NFS_OWNER_RECLAIM_REBOOT,
7809         .state_flag_bit = NFS_STATE_RECLAIM_REBOOT,
7810         .recover_open   = nfs4_open_reclaim,
7811         .recover_lock   = nfs4_lock_reclaim,
7812         .establish_clid = nfs41_init_clientid,
7813         .reclaim_complete = nfs41_proc_reclaim_complete,
7814         .detect_trunking = nfs41_discover_server_trunking,
7815 };
7816 #endif /* CONFIG_NFS_V4_1 */
7817
7818 static const struct nfs4_state_recovery_ops nfs40_nograce_recovery_ops = {
7819         .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
7820         .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
7821         .recover_open   = nfs4_open_expired,
7822         .recover_lock   = nfs4_lock_expired,
7823         .establish_clid = nfs4_init_clientid,
7824 };
7825
7826 #if defined(CONFIG_NFS_V4_1)
7827 static const struct nfs4_state_recovery_ops nfs41_nograce_recovery_ops = {
7828         .owner_flag_bit = NFS_OWNER_RECLAIM_NOGRACE,
7829         .state_flag_bit = NFS_STATE_RECLAIM_NOGRACE,
7830         .recover_open   = nfs41_open_expired,
7831         .recover_lock   = nfs41_lock_expired,
7832         .establish_clid = nfs41_init_clientid,
7833 };
7834 #endif /* CONFIG_NFS_V4_1 */
7835
7836 static const struct nfs4_state_maintenance_ops nfs40_state_renewal_ops = {
7837         .sched_state_renewal = nfs4_proc_async_renew,
7838         .get_state_renewal_cred_locked = nfs4_get_renew_cred_locked,
7839         .renew_lease = nfs4_proc_renew,
7840 };
7841
7842 #if defined(CONFIG_NFS_V4_1)
7843 static const struct nfs4_state_maintenance_ops nfs41_state_renewal_ops = {
7844         .sched_state_renewal = nfs41_proc_async_sequence,
7845         .get_state_renewal_cred_locked = nfs4_get_machine_cred_locked,
7846         .renew_lease = nfs4_proc_sequence,
7847 };
7848 #endif
7849
7850 static const struct nfs4_minor_version_ops nfs_v4_0_minor_ops = {
7851         .minor_version = 0,
7852         .init_caps = NFS_CAP_READDIRPLUS
7853                 | NFS_CAP_ATOMIC_OPEN
7854                 | NFS_CAP_CHANGE_ATTR
7855                 | NFS_CAP_POSIX_LOCK,
7856         .init_client = nfs40_init_client,
7857         .shutdown_client = nfs40_shutdown_client,
7858         .match_stateid = nfs4_match_stateid,
7859         .find_root_sec = nfs4_find_root_sec,
7860         .free_lock_state = nfs4_release_lockowner,
7861         .call_sync_ops = &nfs40_call_sync_ops,
7862         .reboot_recovery_ops = &nfs40_reboot_recovery_ops,
7863         .nograce_recovery_ops = &nfs40_nograce_recovery_ops,
7864         .state_renewal_ops = &nfs40_state_renewal_ops,
7865 };
7866
7867 #if defined(CONFIG_NFS_V4_1)
7868 static const struct nfs4_minor_version_ops nfs_v4_1_minor_ops = {
7869         .minor_version = 1,
7870         .init_caps = NFS_CAP_READDIRPLUS
7871                 | NFS_CAP_ATOMIC_OPEN
7872                 | NFS_CAP_CHANGE_ATTR
7873                 | NFS_CAP_POSIX_LOCK
7874                 | NFS_CAP_STATEID_NFSV41
7875                 | NFS_CAP_ATOMIC_OPEN_V1,
7876         .init_client = nfs41_init_client,
7877         .shutdown_client = nfs41_shutdown_client,
7878         .match_stateid = nfs41_match_stateid,
7879         .find_root_sec = nfs41_find_root_sec,
7880         .free_lock_state = nfs41_free_lock_state,
7881         .call_sync_ops = &nfs41_call_sync_ops,
7882         .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
7883         .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
7884         .state_renewal_ops = &nfs41_state_renewal_ops,
7885 };
7886 #endif
7887
7888 #if defined(CONFIG_NFS_V4_2)
7889 static const struct nfs4_minor_version_ops nfs_v4_2_minor_ops = {
7890         .minor_version = 2,
7891         .init_caps = NFS_CAP_READDIRPLUS
7892                 | NFS_CAP_ATOMIC_OPEN
7893                 | NFS_CAP_CHANGE_ATTR
7894                 | NFS_CAP_POSIX_LOCK
7895                 | NFS_CAP_STATEID_NFSV41
7896                 | NFS_CAP_ATOMIC_OPEN_V1,
7897         .init_client = nfs41_init_client,
7898         .shutdown_client = nfs41_shutdown_client,
7899         .match_stateid = nfs41_match_stateid,
7900         .find_root_sec = nfs41_find_root_sec,
7901         .free_lock_state = nfs41_free_lock_state,
7902         .call_sync_ops = &nfs41_call_sync_ops,
7903         .reboot_recovery_ops = &nfs41_reboot_recovery_ops,
7904         .nograce_recovery_ops = &nfs41_nograce_recovery_ops,
7905         .state_renewal_ops = &nfs41_state_renewal_ops,
7906 };
7907 #endif
7908
7909 const struct nfs4_minor_version_ops *nfs_v4_minor_ops[] = {
7910         [0] = &nfs_v4_0_minor_ops,
7911 #if defined(CONFIG_NFS_V4_1)
7912         [1] = &nfs_v4_1_minor_ops,
7913 #endif
7914 #if defined(CONFIG_NFS_V4_2)
7915         [2] = &nfs_v4_2_minor_ops,
7916 #endif
7917 };
7918
7919 static const struct inode_operations nfs4_dir_inode_operations = {
7920         .create         = nfs_create,
7921         .lookup         = nfs_lookup,
7922         .atomic_open    = nfs_atomic_open,
7923         .link           = nfs_link,
7924         .unlink         = nfs_unlink,
7925         .symlink        = nfs_symlink,
7926         .mkdir          = nfs_mkdir,
7927         .rmdir          = nfs_rmdir,
7928         .mknod          = nfs_mknod,
7929         .rename         = nfs_rename,
7930         .permission     = nfs_permission,
7931         .getattr        = nfs_getattr,
7932         .setattr        = nfs_setattr,
7933         .getxattr       = generic_getxattr,
7934         .setxattr       = generic_setxattr,
7935         .listxattr      = generic_listxattr,
7936         .removexattr    = generic_removexattr,
7937 };
7938
7939 static const struct inode_operations nfs4_file_inode_operations = {
7940         .permission     = nfs_permission,
7941         .getattr        = nfs_getattr,
7942         .setattr        = nfs_setattr,
7943         .getxattr       = generic_getxattr,
7944         .setxattr       = generic_setxattr,
7945         .listxattr      = generic_listxattr,
7946         .removexattr    = generic_removexattr,
7947 };
7948
7949 const struct nfs_rpc_ops nfs_v4_clientops = {
7950         .version        = 4,                    /* protocol version */
7951         .dentry_ops     = &nfs4_dentry_operations,
7952         .dir_inode_ops  = &nfs4_dir_inode_operations,
7953         .file_inode_ops = &nfs4_file_inode_operations,
7954         .file_ops       = &nfs4_file_operations,
7955         .getroot        = nfs4_proc_get_root,
7956         .submount       = nfs4_submount,
7957         .try_mount      = nfs4_try_mount,
7958         .getattr        = nfs4_proc_getattr,
7959         .setattr        = nfs4_proc_setattr,
7960         .lookup         = nfs4_proc_lookup,
7961         .access         = nfs4_proc_access,
7962         .readlink       = nfs4_proc_readlink,
7963         .create         = nfs4_proc_create,
7964         .remove         = nfs4_proc_remove,
7965         .unlink_setup   = nfs4_proc_unlink_setup,
7966         .unlink_rpc_prepare = nfs4_proc_unlink_rpc_prepare,
7967         .unlink_done    = nfs4_proc_unlink_done,
7968         .rename         = nfs4_proc_rename,
7969         .rename_setup   = nfs4_proc_rename_setup,
7970         .rename_rpc_prepare = nfs4_proc_rename_rpc_prepare,
7971         .rename_done    = nfs4_proc_rename_done,
7972         .link           = nfs4_proc_link,
7973         .symlink        = nfs4_proc_symlink,
7974         .mkdir          = nfs4_proc_mkdir,
7975         .rmdir          = nfs4_proc_remove,
7976         .readdir        = nfs4_proc_readdir,
7977         .mknod          = nfs4_proc_mknod,
7978         .statfs         = nfs4_proc_statfs,
7979         .fsinfo         = nfs4_proc_fsinfo,
7980         .pathconf       = nfs4_proc_pathconf,
7981         .set_capabilities = nfs4_server_capabilities,
7982         .decode_dirent  = nfs4_decode_dirent,
7983         .read_setup     = nfs4_proc_read_setup,
7984         .read_pageio_init = pnfs_pageio_init_read,
7985         .read_rpc_prepare = nfs4_proc_read_rpc_prepare,
7986         .read_done      = nfs4_read_done,
7987         .write_setup    = nfs4_proc_write_setup,
7988         .write_pageio_init = pnfs_pageio_init_write,
7989         .write_rpc_prepare = nfs4_proc_write_rpc_prepare,
7990         .write_done     = nfs4_write_done,
7991         .commit_setup   = nfs4_proc_commit_setup,
7992         .commit_rpc_prepare = nfs4_proc_commit_rpc_prepare,
7993         .commit_done    = nfs4_commit_done,
7994         .lock           = nfs4_proc_lock,
7995         .clear_acl_cache = nfs4_zap_acl_attr,
7996         .close_context  = nfs4_close_context,
7997         .open_context   = nfs4_atomic_open,
7998         .have_delegation = nfs4_have_delegation,
7999         .return_delegation = nfs4_inode_return_delegation,
8000         .alloc_client   = nfs4_alloc_client,
8001         .init_client    = nfs4_init_client,
8002         .free_client    = nfs4_free_client,
8003         .create_server  = nfs4_create_server,
8004         .clone_server   = nfs_clone_server,
8005 };
8006
8007 static const struct xattr_handler nfs4_xattr_nfs4_acl_handler = {
8008         .prefix = XATTR_NAME_NFSV4_ACL,
8009         .list   = nfs4_xattr_list_nfs4_acl,
8010         .get    = nfs4_xattr_get_nfs4_acl,
8011         .set    = nfs4_xattr_set_nfs4_acl,
8012 };
8013
8014 const struct xattr_handler *nfs4_xattr_handlers[] = {
8015         &nfs4_xattr_nfs4_acl_handler,
8016 #ifdef CONFIG_NFS_V4_SECURITY_LABEL
8017         &nfs4_xattr_nfs4_label_handler,
8018 #endif
8019         NULL
8020 };
8021
8022 /*
8023  * Local variables:
8024  *  c-basic-offset: 8
8025  * End:
8026  */