11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * Copyright (c) 2001 The Regents of the University of Michigan. 31da177e4SLinus Torvalds * All rights reserved. 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Kendrick Smith <kmsmith@umich.edu> 61da177e4SLinus Torvalds * Andy Adamson <kandros@umich.edu> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Redistribution and use in source and binary forms, with or without 91da177e4SLinus Torvalds * modification, are permitted provided that the following conditions 101da177e4SLinus Torvalds * are met: 111da177e4SLinus Torvalds * 121da177e4SLinus Torvalds * 1. Redistributions of source code must retain the above copyright 131da177e4SLinus Torvalds * notice, this list of conditions and the following disclaimer. 141da177e4SLinus Torvalds * 2. Redistributions in binary form must reproduce the above copyright 151da177e4SLinus Torvalds * notice, this list of conditions and the following disclaimer in the 161da177e4SLinus Torvalds * documentation and/or other materials provided with the distribution. 171da177e4SLinus Torvalds * 3. Neither the name of the University nor the names of its 181da177e4SLinus Torvalds * contributors may be used to endorse or promote products derived 191da177e4SLinus Torvalds * from this software without specific prior written permission. 201da177e4SLinus Torvalds * 211da177e4SLinus Torvalds * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 221da177e4SLinus Torvalds * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 231da177e4SLinus Torvalds * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 241da177e4SLinus Torvalds * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 251da177e4SLinus Torvalds * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 261da177e4SLinus Torvalds * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 271da177e4SLinus Torvalds * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 281da177e4SLinus Torvalds * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 291da177e4SLinus Torvalds * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 301da177e4SLinus Torvalds * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 311da177e4SLinus Torvalds * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 321da177e4SLinus Torvalds * 331da177e4SLinus Torvalds */ 341da177e4SLinus Torvalds 35aceaf78dSDave Hansen #include <linux/file.h> 36b89f4321SArnd Bergmann #include <linux/fs.h> 375a0e3ad6STejun Heo #include <linux/slab.h> 380964a3d3SNeilBrown #include <linux/namei.h> 39c2f1a551SMeelap Shah #include <linux/swap.h> 4017456804SBryan Schumaker #include <linux/pagemap.h> 4168e76ad0SOlga Kornievskaia #include <linux/sunrpc/svcauth_gss.h> 42363168b4SJeff Layton #include <linux/sunrpc/clnt.h> 439a74af21SBoaz Harrosh #include "xdr4.h" 440a3adadeSJ. Bruce Fields #include "vfs.h" 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds #define NFSDDBG_FACILITY NFSDDBG_PROC 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds /* Globals */ 49cf07d2eaSJ. Bruce Fields time_t nfsd4_lease = 90; /* default lease time */ 50efc4bb4fSJ. Bruce Fields time_t nfsd4_grace = 90; 51fd39ca9aSNeilBrown static time_t boot_time; 521da177e4SLinus Torvalds static u32 current_ownerid = 1; 531da177e4SLinus Torvalds static u32 current_fileid = 1; 541da177e4SLinus Torvalds static u32 current_delegid = 1; 55fd39ca9aSNeilBrown static stateid_t zerostateid; /* bits all 0 */ 56fd39ca9aSNeilBrown static stateid_t onestateid; /* bits all 1 */ 57ec6b5d7bSAndy Adamson static u64 current_sessionid = 1; 58fd39ca9aSNeilBrown 59fd39ca9aSNeilBrown #define ZERO_STATEID(stateid) (!memcmp((stateid), &zerostateid, sizeof(stateid_t))) 60fd39ca9aSNeilBrown #define ONE_STATEID(stateid) (!memcmp((stateid), &onestateid, sizeof(stateid_t))) 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds /* forward declarations */ 63fd39ca9aSNeilBrown static struct nfs4_stateid * find_stateid(stateid_t *stid, int flags); 64e1ca12dfSBryan Schumaker static struct nfs4_stateid * search_for_stateid(stateid_t *stid); 65e1ca12dfSBryan Schumaker static struct nfs4_delegation * search_for_delegation(stateid_t *stid); 661da177e4SLinus Torvalds static struct nfs4_delegation * find_delegation_stateid(struct inode *ino, stateid_t *stid); 67e1ca12dfSBryan Schumaker static int check_for_locks(struct nfs4_file *filp, struct nfs4_stateowner *lowner); 681da177e4SLinus Torvalds 698b671b80SJ. Bruce Fields /* Locking: */ 708b671b80SJ. Bruce Fields 718b671b80SJ. Bruce Fields /* Currently used for almost all code touching nfsv4 state: */ 72353ab6e9SIngo Molnar static DEFINE_MUTEX(client_mutex); 731da177e4SLinus Torvalds 748b671b80SJ. Bruce Fields /* 758b671b80SJ. Bruce Fields * Currently used for the del_recall_lru and file hash table. In an 768b671b80SJ. Bruce Fields * effort to decrease the scope of the client_mutex, this spinlock may 778b671b80SJ. Bruce Fields * eventually cover more: 788b671b80SJ. Bruce Fields */ 798b671b80SJ. Bruce Fields static DEFINE_SPINLOCK(recall_lock); 808b671b80SJ. Bruce Fields 81e18b890bSChristoph Lameter static struct kmem_cache *stateowner_slab = NULL; 82e18b890bSChristoph Lameter static struct kmem_cache *file_slab = NULL; 83e18b890bSChristoph Lameter static struct kmem_cache *stateid_slab = NULL; 84e18b890bSChristoph Lameter static struct kmem_cache *deleg_slab = NULL; 85e60d4398SNeilBrown 861da177e4SLinus Torvalds void 871da177e4SLinus Torvalds nfs4_lock_state(void) 881da177e4SLinus Torvalds { 89353ab6e9SIngo Molnar mutex_lock(&client_mutex); 901da177e4SLinus Torvalds } 911da177e4SLinus Torvalds 921da177e4SLinus Torvalds void 931da177e4SLinus Torvalds nfs4_unlock_state(void) 941da177e4SLinus Torvalds { 95353ab6e9SIngo Molnar mutex_unlock(&client_mutex); 961da177e4SLinus Torvalds } 971da177e4SLinus Torvalds 981da177e4SLinus Torvalds static inline u32 991da177e4SLinus Torvalds opaque_hashval(const void *ptr, int nbytes) 1001da177e4SLinus Torvalds { 1011da177e4SLinus Torvalds unsigned char *cptr = (unsigned char *) ptr; 1021da177e4SLinus Torvalds 1031da177e4SLinus Torvalds u32 x = 0; 1041da177e4SLinus Torvalds while (nbytes--) { 1051da177e4SLinus Torvalds x *= 37; 1061da177e4SLinus Torvalds x += *cptr++; 1071da177e4SLinus Torvalds } 1081da177e4SLinus Torvalds return x; 1091da177e4SLinus Torvalds } 1101da177e4SLinus Torvalds 1111da177e4SLinus Torvalds static struct list_head del_recall_lru; 1121da177e4SLinus Torvalds 11313cd2184SNeilBrown static inline void 11413cd2184SNeilBrown put_nfs4_file(struct nfs4_file *fi) 11513cd2184SNeilBrown { 1168b671b80SJ. Bruce Fields if (atomic_dec_and_lock(&fi->fi_ref, &recall_lock)) { 1178b671b80SJ. Bruce Fields list_del(&fi->fi_hash); 1188b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 1198b671b80SJ. Bruce Fields iput(fi->fi_inode); 1208b671b80SJ. Bruce Fields kmem_cache_free(file_slab, fi); 1218b671b80SJ. Bruce Fields } 12213cd2184SNeilBrown } 12313cd2184SNeilBrown 12413cd2184SNeilBrown static inline void 12513cd2184SNeilBrown get_nfs4_file(struct nfs4_file *fi) 12613cd2184SNeilBrown { 1278b671b80SJ. Bruce Fields atomic_inc(&fi->fi_ref); 12813cd2184SNeilBrown } 12913cd2184SNeilBrown 130ef0f3390SNeilBrown static int num_delegations; 131c2f1a551SMeelap Shah unsigned int max_delegations; 132ef0f3390SNeilBrown 133ef0f3390SNeilBrown /* 134ef0f3390SNeilBrown * Open owner state (share locks) 135ef0f3390SNeilBrown */ 136ef0f3390SNeilBrown 137506f275fSJ. Bruce Fields /* hash tables for open owners */ 138506f275fSJ. Bruce Fields #define OPEN_OWNER_HASH_BITS 8 139506f275fSJ. Bruce Fields #define OPEN_OWNER_HASH_SIZE (1 << OPEN_OWNER_HASH_BITS) 140506f275fSJ. Bruce Fields #define OPEN_OWNER_HASH_MASK (OPEN_OWNER_HASH_SIZE - 1) 141ef0f3390SNeilBrown 142506f275fSJ. Bruce Fields static unsigned int open_ownerid_hashval(const u32 id) 143ddc04c41SJ. Bruce Fields { 144506f275fSJ. Bruce Fields return id & OPEN_OWNER_HASH_MASK; 145ddc04c41SJ. Bruce Fields } 146ddc04c41SJ. Bruce Fields 147506f275fSJ. Bruce Fields static unsigned int open_ownerstr_hashval(u32 clientid, struct xdr_netobj *ownername) 148ddc04c41SJ. Bruce Fields { 149ddc04c41SJ. Bruce Fields unsigned int ret; 150ddc04c41SJ. Bruce Fields 151ddc04c41SJ. Bruce Fields ret = opaque_hashval(ownername->data, ownername->len); 152ddc04c41SJ. Bruce Fields ret += clientid; 153506f275fSJ. Bruce Fields return ret & OPEN_OWNER_HASH_MASK; 154ddc04c41SJ. Bruce Fields } 155ef0f3390SNeilBrown 156506f275fSJ. Bruce Fields static struct list_head open_ownerid_hashtbl[OPEN_OWNER_HASH_SIZE]; 157506f275fSJ. Bruce Fields static struct list_head open_ownerstr_hashtbl[OPEN_OWNER_HASH_SIZE]; 158ef0f3390SNeilBrown 159ef0f3390SNeilBrown /* hash table for nfs4_file */ 160ef0f3390SNeilBrown #define FILE_HASH_BITS 8 161ef0f3390SNeilBrown #define FILE_HASH_SIZE (1 << FILE_HASH_BITS) 16235079582SShan Wei 163ef0f3390SNeilBrown /* hash table for (open)nfs4_stateid */ 164ef0f3390SNeilBrown #define STATEID_HASH_BITS 10 165ef0f3390SNeilBrown #define STATEID_HASH_SIZE (1 << STATEID_HASH_BITS) 166ef0f3390SNeilBrown #define STATEID_HASH_MASK (STATEID_HASH_SIZE - 1) 167ef0f3390SNeilBrown 168ddc04c41SJ. Bruce Fields static unsigned int file_hashval(struct inode *ino) 169ddc04c41SJ. Bruce Fields { 170ddc04c41SJ. Bruce Fields /* XXX: why are we hashing on inode pointer, anyway? */ 171ddc04c41SJ. Bruce Fields return hash_ptr(ino, FILE_HASH_BITS); 172ddc04c41SJ. Bruce Fields } 173ddc04c41SJ. Bruce Fields 174ddc04c41SJ. Bruce Fields static unsigned int stateid_hashval(u32 owner_id, u32 file_id) 175ddc04c41SJ. Bruce Fields { 176ddc04c41SJ. Bruce Fields return (owner_id + file_id) & STATEID_HASH_MASK; 177ddc04c41SJ. Bruce Fields } 178ef0f3390SNeilBrown 179ef0f3390SNeilBrown static struct list_head file_hashtbl[FILE_HASH_SIZE]; 180ef0f3390SNeilBrown static struct list_head stateid_hashtbl[STATEID_HASH_SIZE]; 181ef0f3390SNeilBrown 182998db52cSJ. Bruce Fields static void __nfs4_file_get_access(struct nfs4_file *fp, int oflag) 183f9d7562fSJ. Bruce Fields { 184f9d7562fSJ. Bruce Fields BUG_ON(!(fp->fi_fds[oflag] || fp->fi_fds[O_RDWR])); 185f9d7562fSJ. Bruce Fields atomic_inc(&fp->fi_access[oflag]); 186f9d7562fSJ. Bruce Fields } 187f9d7562fSJ. Bruce Fields 188998db52cSJ. Bruce Fields static void nfs4_file_get_access(struct nfs4_file *fp, int oflag) 189998db52cSJ. Bruce Fields { 190998db52cSJ. Bruce Fields if (oflag == O_RDWR) { 191998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, O_RDONLY); 192998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, O_WRONLY); 193998db52cSJ. Bruce Fields } else 194998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, oflag); 195998db52cSJ. Bruce Fields } 196998db52cSJ. Bruce Fields 197998db52cSJ. Bruce Fields static void nfs4_file_put_fd(struct nfs4_file *fp, int oflag) 198f9d7562fSJ. Bruce Fields { 199f9d7562fSJ. Bruce Fields if (fp->fi_fds[oflag]) { 200f9d7562fSJ. Bruce Fields fput(fp->fi_fds[oflag]); 201f9d7562fSJ. Bruce Fields fp->fi_fds[oflag] = NULL; 202f9d7562fSJ. Bruce Fields } 203f9d7562fSJ. Bruce Fields } 204f9d7562fSJ. Bruce Fields 205998db52cSJ. Bruce Fields static void __nfs4_file_put_access(struct nfs4_file *fp, int oflag) 206f9d7562fSJ. Bruce Fields { 207f9d7562fSJ. Bruce Fields if (atomic_dec_and_test(&fp->fi_access[oflag])) { 208f9d7562fSJ. Bruce Fields nfs4_file_put_fd(fp, O_RDWR); 209f9d7562fSJ. Bruce Fields nfs4_file_put_fd(fp, oflag); 210f9d7562fSJ. Bruce Fields } 211f9d7562fSJ. Bruce Fields } 212f9d7562fSJ. Bruce Fields 213998db52cSJ. Bruce Fields static void nfs4_file_put_access(struct nfs4_file *fp, int oflag) 214998db52cSJ. Bruce Fields { 215998db52cSJ. Bruce Fields if (oflag == O_RDWR) { 216998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, O_RDONLY); 217998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, O_WRONLY); 218998db52cSJ. Bruce Fields } else 219998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, oflag); 220998db52cSJ. Bruce Fields } 221998db52cSJ. Bruce Fields 2221da177e4SLinus Torvalds static struct nfs4_delegation * 2231da177e4SLinus Torvalds alloc_init_deleg(struct nfs4_client *clp, struct nfs4_stateid *stp, struct svc_fh *current_fh, u32 type) 2241da177e4SLinus Torvalds { 2251da177e4SLinus Torvalds struct nfs4_delegation *dp; 2261da177e4SLinus Torvalds struct nfs4_file *fp = stp->st_file; 2271da177e4SLinus Torvalds 2281da177e4SLinus Torvalds dprintk("NFSD alloc_init_deleg\n"); 229c3e48080SJ. Bruce Fields /* 230c3e48080SJ. Bruce Fields * Major work on the lease subsystem (for example, to support 231c3e48080SJ. Bruce Fields * calbacks on stat) will be required before we can support 232c3e48080SJ. Bruce Fields * write delegations properly. 233c3e48080SJ. Bruce Fields */ 234c3e48080SJ. Bruce Fields if (type != NFS4_OPEN_DELEGATE_READ) 235c3e48080SJ. Bruce Fields return NULL; 23647f9940cSMeelap Shah if (fp->fi_had_conflict) 23747f9940cSMeelap Shah return NULL; 238c2f1a551SMeelap Shah if (num_delegations > max_delegations) 239ef0f3390SNeilBrown return NULL; 2405b2d21c1SNeilBrown dp = kmem_cache_alloc(deleg_slab, GFP_KERNEL); 2415b2d21c1SNeilBrown if (dp == NULL) 2421da177e4SLinus Torvalds return dp; 243ef0f3390SNeilBrown num_delegations++; 244ea1da636SNeilBrown INIT_LIST_HEAD(&dp->dl_perfile); 245ea1da636SNeilBrown INIT_LIST_HEAD(&dp->dl_perclnt); 2461da177e4SLinus Torvalds INIT_LIST_HEAD(&dp->dl_recall_lru); 2471da177e4SLinus Torvalds dp->dl_client = clp; 24813cd2184SNeilBrown get_nfs4_file(fp); 2491da177e4SLinus Torvalds dp->dl_file = fp; 2501da177e4SLinus Torvalds dp->dl_type = type; 251e4e83ea4SJ. Bruce Fields dp->dl_stateid.si_boot = boot_time; 2521da177e4SLinus Torvalds dp->dl_stateid.si_stateownerid = current_delegid++; 2531da177e4SLinus Torvalds dp->dl_stateid.si_fileid = 0; 2541da177e4SLinus Torvalds dp->dl_stateid.si_generation = 0; 2556c02eaa1SJ. Bruce Fields fh_copy_shallow(&dp->dl_fh, ¤t_fh->fh_handle); 2561da177e4SLinus Torvalds dp->dl_time = 0; 2571da177e4SLinus Torvalds atomic_set(&dp->dl_count, 1); 258b5a1a81eSJ. Bruce Fields INIT_WORK(&dp->dl_recall.cb_work, nfsd4_do_callback_rpc); 2591da177e4SLinus Torvalds return dp; 2601da177e4SLinus Torvalds } 2611da177e4SLinus Torvalds 2621da177e4SLinus Torvalds void 2631da177e4SLinus Torvalds nfs4_put_delegation(struct nfs4_delegation *dp) 2641da177e4SLinus Torvalds { 2651da177e4SLinus Torvalds if (atomic_dec_and_test(&dp->dl_count)) { 2661da177e4SLinus Torvalds dprintk("NFSD: freeing dp %p\n",dp); 26713cd2184SNeilBrown put_nfs4_file(dp->dl_file); 2685b2d21c1SNeilBrown kmem_cache_free(deleg_slab, dp); 269ef0f3390SNeilBrown num_delegations--; 2701da177e4SLinus Torvalds } 2711da177e4SLinus Torvalds } 2721da177e4SLinus Torvalds 273acfdf5c3SJ. Bruce Fields static void nfs4_put_deleg_lease(struct nfs4_file *fp) 2741da177e4SLinus Torvalds { 275acfdf5c3SJ. Bruce Fields if (atomic_dec_and_test(&fp->fi_delegees)) { 276acfdf5c3SJ. Bruce Fields vfs_setlease(fp->fi_deleg_file, F_UNLCK, &fp->fi_lease); 277acfdf5c3SJ. Bruce Fields fp->fi_lease = NULL; 2784ee63624SJ. Bruce Fields fput(fp->fi_deleg_file); 279acfdf5c3SJ. Bruce Fields fp->fi_deleg_file = NULL; 280acfdf5c3SJ. Bruce Fields } 2811da177e4SLinus Torvalds } 2821da177e4SLinus Torvalds 2831da177e4SLinus Torvalds /* Called under the state lock. */ 2841da177e4SLinus Torvalds static void 2851da177e4SLinus Torvalds unhash_delegation(struct nfs4_delegation *dp) 2861da177e4SLinus Torvalds { 287ea1da636SNeilBrown list_del_init(&dp->dl_perclnt); 2881da177e4SLinus Torvalds spin_lock(&recall_lock); 2895d926e8cSJ. Bruce Fields list_del_init(&dp->dl_perfile); 2901da177e4SLinus Torvalds list_del_init(&dp->dl_recall_lru); 2911da177e4SLinus Torvalds spin_unlock(&recall_lock); 292acfdf5c3SJ. Bruce Fields nfs4_put_deleg_lease(dp->dl_file); 2931da177e4SLinus Torvalds nfs4_put_delegation(dp); 2941da177e4SLinus Torvalds } 2951da177e4SLinus Torvalds 2961da177e4SLinus Torvalds /* 2971da177e4SLinus Torvalds * SETCLIENTID state 2981da177e4SLinus Torvalds */ 2991da177e4SLinus Torvalds 30036acb66bSBenny Halevy /* client_lock protects the client lru list and session hash table */ 3019089f1b4SBenny Halevy static DEFINE_SPINLOCK(client_lock); 3029089f1b4SBenny Halevy 3031da177e4SLinus Torvalds /* Hash tables for nfs4_clientid state */ 3041da177e4SLinus Torvalds #define CLIENT_HASH_BITS 4 3051da177e4SLinus Torvalds #define CLIENT_HASH_SIZE (1 << CLIENT_HASH_BITS) 3061da177e4SLinus Torvalds #define CLIENT_HASH_MASK (CLIENT_HASH_SIZE - 1) 3071da177e4SLinus Torvalds 308ddc04c41SJ. Bruce Fields static unsigned int clientid_hashval(u32 id) 309ddc04c41SJ. Bruce Fields { 310ddc04c41SJ. Bruce Fields return id & CLIENT_HASH_MASK; 311ddc04c41SJ. Bruce Fields } 312ddc04c41SJ. Bruce Fields 313ddc04c41SJ. Bruce Fields static unsigned int clientstr_hashval(const char *name) 314ddc04c41SJ. Bruce Fields { 315ddc04c41SJ. Bruce Fields return opaque_hashval(name, 8) & CLIENT_HASH_MASK; 316ddc04c41SJ. Bruce Fields } 317ddc04c41SJ. Bruce Fields 3181da177e4SLinus Torvalds /* 3191da177e4SLinus Torvalds * reclaim_str_hashtbl[] holds known client info from previous reset/reboot 3201da177e4SLinus Torvalds * used in reboot/reset lease grace period processing 3211da177e4SLinus Torvalds * 3221da177e4SLinus Torvalds * conf_id_hashtbl[], and conf_str_hashtbl[] hold confirmed 3231da177e4SLinus Torvalds * setclientid_confirmed info. 3241da177e4SLinus Torvalds * 3251da177e4SLinus Torvalds * unconf_str_hastbl[] and unconf_id_hashtbl[] hold unconfirmed 3261da177e4SLinus Torvalds * setclientid info. 3271da177e4SLinus Torvalds * 3281da177e4SLinus Torvalds * client_lru holds client queue ordered by nfs4_client.cl_time 3291da177e4SLinus Torvalds * for lease renewal. 3301da177e4SLinus Torvalds * 3311da177e4SLinus Torvalds * close_lru holds (open) stateowner queue ordered by nfs4_stateowner.so_time 3321da177e4SLinus Torvalds * for last close replay. 3331da177e4SLinus Torvalds */ 3341da177e4SLinus Torvalds static struct list_head reclaim_str_hashtbl[CLIENT_HASH_SIZE]; 3351da177e4SLinus Torvalds static int reclaim_str_hashtbl_size = 0; 3361da177e4SLinus Torvalds static struct list_head conf_id_hashtbl[CLIENT_HASH_SIZE]; 3371da177e4SLinus Torvalds static struct list_head conf_str_hashtbl[CLIENT_HASH_SIZE]; 3381da177e4SLinus Torvalds static struct list_head unconf_str_hashtbl[CLIENT_HASH_SIZE]; 3391da177e4SLinus Torvalds static struct list_head unconf_id_hashtbl[CLIENT_HASH_SIZE]; 3401da177e4SLinus Torvalds static struct list_head client_lru; 3411da177e4SLinus Torvalds static struct list_head close_lru; 3421da177e4SLinus Torvalds 343f9d7562fSJ. Bruce Fields /* 344f9d7562fSJ. Bruce Fields * We store the NONE, READ, WRITE, and BOTH bits separately in the 345f9d7562fSJ. Bruce Fields * st_{access,deny}_bmap field of the stateid, in order to track not 346f9d7562fSJ. Bruce Fields * only what share bits are currently in force, but also what 347f9d7562fSJ. Bruce Fields * combinations of share bits previous opens have used. This allows us 348f9d7562fSJ. Bruce Fields * to enforce the recommendation of rfc 3530 14.2.19 that the server 349f9d7562fSJ. Bruce Fields * return an error if the client attempt to downgrade to a combination 350f9d7562fSJ. Bruce Fields * of share bits not explicable by closing some of its previous opens. 351f9d7562fSJ. Bruce Fields * 352f9d7562fSJ. Bruce Fields * XXX: This enforcement is actually incomplete, since we don't keep 353f9d7562fSJ. Bruce Fields * track of access/deny bit combinations; so, e.g., we allow: 354f9d7562fSJ. Bruce Fields * 355f9d7562fSJ. Bruce Fields * OPEN allow read, deny write 356f9d7562fSJ. Bruce Fields * OPEN allow both, deny none 357f9d7562fSJ. Bruce Fields * DOWNGRADE allow read, deny none 358f9d7562fSJ. Bruce Fields * 359f9d7562fSJ. Bruce Fields * which we should reject. 360f9d7562fSJ. Bruce Fields */ 361f9d7562fSJ. Bruce Fields static void 362f9d7562fSJ. Bruce Fields set_access(unsigned int *access, unsigned long bmap) { 363f9d7562fSJ. Bruce Fields int i; 364f9d7562fSJ. Bruce Fields 365f9d7562fSJ. Bruce Fields *access = 0; 366f9d7562fSJ. Bruce Fields for (i = 1; i < 4; i++) { 367f9d7562fSJ. Bruce Fields if (test_bit(i, &bmap)) 368f9d7562fSJ. Bruce Fields *access |= i; 369f9d7562fSJ. Bruce Fields } 370f9d7562fSJ. Bruce Fields } 371f9d7562fSJ. Bruce Fields 372f9d7562fSJ. Bruce Fields static void 373f9d7562fSJ. Bruce Fields set_deny(unsigned int *deny, unsigned long bmap) { 374f9d7562fSJ. Bruce Fields int i; 375f9d7562fSJ. Bruce Fields 376f9d7562fSJ. Bruce Fields *deny = 0; 377f9d7562fSJ. Bruce Fields for (i = 0; i < 4; i++) { 378f9d7562fSJ. Bruce Fields if (test_bit(i, &bmap)) 379f9d7562fSJ. Bruce Fields *deny |= i ; 380f9d7562fSJ. Bruce Fields } 381f9d7562fSJ. Bruce Fields } 382f9d7562fSJ. Bruce Fields 383f9d7562fSJ. Bruce Fields static int 384f9d7562fSJ. Bruce Fields test_share(struct nfs4_stateid *stp, struct nfsd4_open *open) { 385f9d7562fSJ. Bruce Fields unsigned int access, deny; 386f9d7562fSJ. Bruce Fields 387f9d7562fSJ. Bruce Fields set_access(&access, stp->st_access_bmap); 388f9d7562fSJ. Bruce Fields set_deny(&deny, stp->st_deny_bmap); 389f9d7562fSJ. Bruce Fields if ((access & open->op_share_deny) || (deny & open->op_share_access)) 390f9d7562fSJ. Bruce Fields return 0; 391f9d7562fSJ. Bruce Fields return 1; 392f9d7562fSJ. Bruce Fields } 393f9d7562fSJ. Bruce Fields 394f9d7562fSJ. Bruce Fields static int nfs4_access_to_omode(u32 access) 395f9d7562fSJ. Bruce Fields { 3968f34a430SJ. Bruce Fields switch (access & NFS4_SHARE_ACCESS_BOTH) { 397f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_READ: 398f9d7562fSJ. Bruce Fields return O_RDONLY; 399f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_WRITE: 400f9d7562fSJ. Bruce Fields return O_WRONLY; 401f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_BOTH: 402f9d7562fSJ. Bruce Fields return O_RDWR; 403f9d7562fSJ. Bruce Fields } 404f9d7562fSJ. Bruce Fields BUG(); 405f9d7562fSJ. Bruce Fields } 406f9d7562fSJ. Bruce Fields 407529d7b2aSJ. Bruce Fields static void unhash_generic_stateid(struct nfs4_stateid *stp) 408529d7b2aSJ. Bruce Fields { 409529d7b2aSJ. Bruce Fields list_del(&stp->st_hash); 410529d7b2aSJ. Bruce Fields list_del(&stp->st_perfile); 411529d7b2aSJ. Bruce Fields list_del(&stp->st_perstateowner); 412529d7b2aSJ. Bruce Fields } 413529d7b2aSJ. Bruce Fields 414529d7b2aSJ. Bruce Fields static void free_generic_stateid(struct nfs4_stateid *stp) 415529d7b2aSJ. Bruce Fields { 416499f3edcSJ. Bruce Fields int i; 4170997b173SJ. Bruce Fields 41823fcf2ecSJ. Bruce Fields if (stp->st_access_bmap) { 419499f3edcSJ. Bruce Fields for (i = 1; i < 4; i++) { 420499f3edcSJ. Bruce Fields if (test_bit(i, &stp->st_access_bmap)) 421499f3edcSJ. Bruce Fields nfs4_file_put_access(stp->st_file, 422499f3edcSJ. Bruce Fields nfs4_access_to_omode(i)); 423499f3edcSJ. Bruce Fields } 42423fcf2ecSJ. Bruce Fields } 425a96e5b90SOGAWA Hirofumi put_nfs4_file(stp->st_file); 426529d7b2aSJ. Bruce Fields kmem_cache_free(stateid_slab, stp); 427529d7b2aSJ. Bruce Fields } 428529d7b2aSJ. Bruce Fields 429529d7b2aSJ. Bruce Fields static void release_lock_stateid(struct nfs4_stateid *stp) 430529d7b2aSJ. Bruce Fields { 431529d7b2aSJ. Bruce Fields struct file *file; 432529d7b2aSJ. Bruce Fields 433529d7b2aSJ. Bruce Fields unhash_generic_stateid(stp); 434529d7b2aSJ. Bruce Fields file = find_any_file(stp->st_file); 435529d7b2aSJ. Bruce Fields if (file) 436529d7b2aSJ. Bruce Fields locks_remove_posix(file, (fl_owner_t)stp->st_stateowner); 437529d7b2aSJ. Bruce Fields free_generic_stateid(stp); 438529d7b2aSJ. Bruce Fields } 439529d7b2aSJ. Bruce Fields 440529d7b2aSJ. Bruce Fields static void unhash_lockowner(struct nfs4_stateowner *sop) 441529d7b2aSJ. Bruce Fields { 442529d7b2aSJ. Bruce Fields struct nfs4_stateid *stp; 443529d7b2aSJ. Bruce Fields 444529d7b2aSJ. Bruce Fields list_del(&sop->so_idhash); 445529d7b2aSJ. Bruce Fields list_del(&sop->so_strhash); 446529d7b2aSJ. Bruce Fields list_del(&sop->so_perstateid); 447529d7b2aSJ. Bruce Fields while (!list_empty(&sop->so_stateids)) { 448529d7b2aSJ. Bruce Fields stp = list_first_entry(&sop->so_stateids, 449529d7b2aSJ. Bruce Fields struct nfs4_stateid, st_perstateowner); 450529d7b2aSJ. Bruce Fields release_lock_stateid(stp); 451529d7b2aSJ. Bruce Fields } 452529d7b2aSJ. Bruce Fields } 453529d7b2aSJ. Bruce Fields 454529d7b2aSJ. Bruce Fields static void release_lockowner(struct nfs4_stateowner *sop) 455529d7b2aSJ. Bruce Fields { 456529d7b2aSJ. Bruce Fields unhash_lockowner(sop); 457529d7b2aSJ. Bruce Fields nfs4_put_stateowner(sop); 458529d7b2aSJ. Bruce Fields } 459529d7b2aSJ. Bruce Fields 460529d7b2aSJ. Bruce Fields static void 461529d7b2aSJ. Bruce Fields release_stateid_lockowners(struct nfs4_stateid *open_stp) 462529d7b2aSJ. Bruce Fields { 463529d7b2aSJ. Bruce Fields struct nfs4_stateowner *lock_sop; 464529d7b2aSJ. Bruce Fields 465529d7b2aSJ. Bruce Fields while (!list_empty(&open_stp->st_lockowners)) { 466529d7b2aSJ. Bruce Fields lock_sop = list_entry(open_stp->st_lockowners.next, 467529d7b2aSJ. Bruce Fields struct nfs4_stateowner, so_perstateid); 468529d7b2aSJ. Bruce Fields /* list_del(&open_stp->st_lockowners); */ 469529d7b2aSJ. Bruce Fields BUG_ON(lock_sop->so_is_open_owner); 470529d7b2aSJ. Bruce Fields release_lockowner(lock_sop); 471529d7b2aSJ. Bruce Fields } 472529d7b2aSJ. Bruce Fields } 473529d7b2aSJ. Bruce Fields 4742283963fSJ. Bruce Fields static void release_open_stateid(struct nfs4_stateid *stp) 4752283963fSJ. Bruce Fields { 4762283963fSJ. Bruce Fields unhash_generic_stateid(stp); 4772283963fSJ. Bruce Fields release_stateid_lockowners(stp); 4782283963fSJ. Bruce Fields free_generic_stateid(stp); 4792283963fSJ. Bruce Fields } 4802283963fSJ. Bruce Fields 481f044ff83SJ. Bruce Fields static void unhash_openowner(struct nfs4_stateowner *sop) 482f1d110caSJ. Bruce Fields { 483f1d110caSJ. Bruce Fields struct nfs4_stateid *stp; 484f1d110caSJ. Bruce Fields 485f1d110caSJ. Bruce Fields list_del(&sop->so_idhash); 486f1d110caSJ. Bruce Fields list_del(&sop->so_strhash); 487f1d110caSJ. Bruce Fields list_del(&sop->so_perclient); 488f044ff83SJ. Bruce Fields list_del(&sop->so_perstateid); /* XXX: necessary? */ 489f1d110caSJ. Bruce Fields while (!list_empty(&sop->so_stateids)) { 490f044ff83SJ. Bruce Fields stp = list_first_entry(&sop->so_stateids, 491f1d110caSJ. Bruce Fields struct nfs4_stateid, st_perstateowner); 492f1d110caSJ. Bruce Fields release_open_stateid(stp); 493f1d110caSJ. Bruce Fields } 494f1d110caSJ. Bruce Fields } 495f1d110caSJ. Bruce Fields 496f044ff83SJ. Bruce Fields static void release_openowner(struct nfs4_stateowner *sop) 497f1d110caSJ. Bruce Fields { 498f044ff83SJ. Bruce Fields unhash_openowner(sop); 499f1d110caSJ. Bruce Fields list_del(&sop->so_close_lru); 500f1d110caSJ. Bruce Fields nfs4_put_stateowner(sop); 501f1d110caSJ. Bruce Fields } 502f1d110caSJ. Bruce Fields 5035282fd72SMarc Eshel #define SESSION_HASH_SIZE 512 5045282fd72SMarc Eshel static struct list_head sessionid_hashtbl[SESSION_HASH_SIZE]; 5055282fd72SMarc Eshel 5065282fd72SMarc Eshel static inline int 5075282fd72SMarc Eshel hash_sessionid(struct nfs4_sessionid *sessionid) 5085282fd72SMarc Eshel { 5095282fd72SMarc Eshel struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid; 5105282fd72SMarc Eshel 5115282fd72SMarc Eshel return sid->sequence % SESSION_HASH_SIZE; 5125282fd72SMarc Eshel } 5135282fd72SMarc Eshel 5145282fd72SMarc Eshel static inline void 5155282fd72SMarc Eshel dump_sessionid(const char *fn, struct nfs4_sessionid *sessionid) 5165282fd72SMarc Eshel { 5175282fd72SMarc Eshel u32 *ptr = (u32 *)(&sessionid->data[0]); 5185282fd72SMarc Eshel dprintk("%s: %u:%u:%u:%u\n", fn, ptr[0], ptr[1], ptr[2], ptr[3]); 5195282fd72SMarc Eshel } 5205282fd72SMarc Eshel 521ec6b5d7bSAndy Adamson static void 522ec6b5d7bSAndy Adamson gen_sessionid(struct nfsd4_session *ses) 523ec6b5d7bSAndy Adamson { 524ec6b5d7bSAndy Adamson struct nfs4_client *clp = ses->se_client; 525ec6b5d7bSAndy Adamson struct nfsd4_sessionid *sid; 526ec6b5d7bSAndy Adamson 527ec6b5d7bSAndy Adamson sid = (struct nfsd4_sessionid *)ses->se_sessionid.data; 528ec6b5d7bSAndy Adamson sid->clientid = clp->cl_clientid; 529ec6b5d7bSAndy Adamson sid->sequence = current_sessionid++; 530ec6b5d7bSAndy Adamson sid->reserved = 0; 531ec6b5d7bSAndy Adamson } 532ec6b5d7bSAndy Adamson 533ec6b5d7bSAndy Adamson /* 534a649637cSAndy Adamson * The protocol defines ca_maxresponssize_cached to include the size of 535a649637cSAndy Adamson * the rpc header, but all we need to cache is the data starting after 536a649637cSAndy Adamson * the end of the initial SEQUENCE operation--the rest we regenerate 537a649637cSAndy Adamson * each time. Therefore we can advertise a ca_maxresponssize_cached 538a649637cSAndy Adamson * value that is the number of bytes in our cache plus a few additional 539a649637cSAndy Adamson * bytes. In order to stay on the safe side, and not promise more than 540a649637cSAndy Adamson * we can cache, those additional bytes must be the minimum possible: 24 541a649637cSAndy Adamson * bytes of rpc header (xid through accept state, with AUTH_NULL 542a649637cSAndy Adamson * verifier), 12 for the compound header (with zero-length tag), and 44 543a649637cSAndy Adamson * for the SEQUENCE op response: 544ec6b5d7bSAndy Adamson */ 545a649637cSAndy Adamson #define NFSD_MIN_HDR_SEQ_SZ (24 + 12 + 44) 546a649637cSAndy Adamson 547557ce264SAndy Adamson static void 548557ce264SAndy Adamson free_session_slots(struct nfsd4_session *ses) 549557ce264SAndy Adamson { 550557ce264SAndy Adamson int i; 551557ce264SAndy Adamson 552557ce264SAndy Adamson for (i = 0; i < ses->se_fchannel.maxreqs; i++) 553557ce264SAndy Adamson kfree(ses->se_slots[i]); 554557ce264SAndy Adamson } 555557ce264SAndy Adamson 556efe0cb6dSJ. Bruce Fields /* 557efe0cb6dSJ. Bruce Fields * We don't actually need to cache the rpc and session headers, so we 558efe0cb6dSJ. Bruce Fields * can allocate a little less for each slot: 559efe0cb6dSJ. Bruce Fields */ 560efe0cb6dSJ. Bruce Fields static inline int slot_bytes(struct nfsd4_channel_attrs *ca) 561efe0cb6dSJ. Bruce Fields { 562efe0cb6dSJ. Bruce Fields return ca->maxresp_cached - NFSD_MIN_HDR_SEQ_SZ; 563efe0cb6dSJ. Bruce Fields } 564efe0cb6dSJ. Bruce Fields 5655b6feee9SJ. Bruce Fields static int nfsd4_sanitize_slot_size(u32 size) 566ec6b5d7bSAndy Adamson { 5675b6feee9SJ. Bruce Fields size -= NFSD_MIN_HDR_SEQ_SZ; /* We don't cache the rpc header */ 5685b6feee9SJ. Bruce Fields size = min_t(u32, size, NFSD_SLOT_CACHE_SIZE); 569ec6b5d7bSAndy Adamson 5705b6feee9SJ. Bruce Fields return size; 571557ce264SAndy Adamson } 572557ce264SAndy Adamson 5735b6feee9SJ. Bruce Fields /* 5745b6feee9SJ. Bruce Fields * XXX: If we run out of reserved DRC memory we could (up to a point) 5755b6feee9SJ. Bruce Fields * re-negotiate active sessions and reduce their slot usage to make 5765b6feee9SJ. Bruce Fields * rooom for new connections. For now we just fail the create session. 5775b6feee9SJ. Bruce Fields */ 5785b6feee9SJ. Bruce Fields static int nfsd4_get_drc_mem(int slotsize, u32 num) 5795b6feee9SJ. Bruce Fields { 5805b6feee9SJ. Bruce Fields int avail; 5815b6feee9SJ. Bruce Fields 5825b6feee9SJ. Bruce Fields num = min_t(u32, num, NFSD_MAX_SLOTS_PER_SESSION); 5835b6feee9SJ. Bruce Fields 5845b6feee9SJ. Bruce Fields spin_lock(&nfsd_drc_lock); 5855b6feee9SJ. Bruce Fields avail = min_t(int, NFSD_MAX_MEM_PER_SESSION, 5865b6feee9SJ. Bruce Fields nfsd_drc_max_mem - nfsd_drc_mem_used); 5875b6feee9SJ. Bruce Fields num = min_t(int, num, avail / slotsize); 5885b6feee9SJ. Bruce Fields nfsd_drc_mem_used += num * slotsize; 5895b6feee9SJ. Bruce Fields spin_unlock(&nfsd_drc_lock); 5905b6feee9SJ. Bruce Fields 5915b6feee9SJ. Bruce Fields return num; 5925b6feee9SJ. Bruce Fields } 5935b6feee9SJ. Bruce Fields 5945b6feee9SJ. Bruce Fields static void nfsd4_put_drc_mem(int slotsize, int num) 5955b6feee9SJ. Bruce Fields { 5965b6feee9SJ. Bruce Fields spin_lock(&nfsd_drc_lock); 5975b6feee9SJ. Bruce Fields nfsd_drc_mem_used -= slotsize * num; 5985b6feee9SJ. Bruce Fields spin_unlock(&nfsd_drc_lock); 5995b6feee9SJ. Bruce Fields } 6005b6feee9SJ. Bruce Fields 6015b6feee9SJ. Bruce Fields static struct nfsd4_session *alloc_session(int slotsize, int numslots) 6025b6feee9SJ. Bruce Fields { 6035b6feee9SJ. Bruce Fields struct nfsd4_session *new; 6045b6feee9SJ. Bruce Fields int mem, i; 605ec6b5d7bSAndy Adamson 606c23753daSJ. Bruce Fields BUILD_BUG_ON(NFSD_MAX_SLOTS_PER_SESSION * sizeof(struct nfsd4_slot *) 607ec6b5d7bSAndy Adamson + sizeof(struct nfsd4_session) > PAGE_SIZE); 6085b6feee9SJ. Bruce Fields mem = numslots * sizeof(struct nfsd4_slot *); 609ec6b5d7bSAndy Adamson 6105b6feee9SJ. Bruce Fields new = kzalloc(sizeof(*new) + mem, GFP_KERNEL); 6116c18ba9fSAlexandros Batsakis if (!new) 6125b6feee9SJ. Bruce Fields return NULL; 613ec6b5d7bSAndy Adamson /* allocate each struct nfsd4_slot and data cache in one piece */ 6145b6feee9SJ. Bruce Fields for (i = 0; i < numslots; i++) { 6155b6feee9SJ. Bruce Fields mem = sizeof(struct nfsd4_slot) + slotsize; 6165b6feee9SJ. Bruce Fields new->se_slots[i] = kzalloc(mem, GFP_KERNEL); 6175b6feee9SJ. Bruce Fields if (!new->se_slots[i]) 618ec6b5d7bSAndy Adamson goto out_free; 619ec6b5d7bSAndy Adamson } 6205b6feee9SJ. Bruce Fields return new; 6215b6feee9SJ. Bruce Fields out_free: 6225b6feee9SJ. Bruce Fields while (i--) 6235b6feee9SJ. Bruce Fields kfree(new->se_slots[i]); 6245b6feee9SJ. Bruce Fields kfree(new); 6255b6feee9SJ. Bruce Fields return NULL; 6265b6feee9SJ. Bruce Fields } 6275b6feee9SJ. Bruce Fields 6285b6feee9SJ. Bruce Fields static void init_forechannel_attrs(struct nfsd4_channel_attrs *new, struct nfsd4_channel_attrs *req, int numslots, int slotsize) 6295b6feee9SJ. Bruce Fields { 6305b6feee9SJ. Bruce Fields u32 maxrpc = nfsd_serv->sv_max_mesg; 6315b6feee9SJ. Bruce Fields 6325b6feee9SJ. Bruce Fields new->maxreqs = numslots; 633d2b21743SMi Jinlong new->maxresp_cached = min_t(u32, req->maxresp_cached, 634d2b21743SMi Jinlong slotsize + NFSD_MIN_HDR_SEQ_SZ); 6355b6feee9SJ. Bruce Fields new->maxreq_sz = min_t(u32, req->maxreq_sz, maxrpc); 6365b6feee9SJ. Bruce Fields new->maxresp_sz = min_t(u32, req->maxresp_sz, maxrpc); 6375b6feee9SJ. Bruce Fields new->maxops = min_t(u32, req->maxops, NFSD_MAX_OPS_PER_COMPOUND); 6385b6feee9SJ. Bruce Fields } 6395b6feee9SJ. Bruce Fields 64019cf5c02SJ. Bruce Fields static void free_conn(struct nfsd4_conn *c) 64119cf5c02SJ. Bruce Fields { 64219cf5c02SJ. Bruce Fields svc_xprt_put(c->cn_xprt); 64319cf5c02SJ. Bruce Fields kfree(c); 64419cf5c02SJ. Bruce Fields } 64519cf5c02SJ. Bruce Fields 64619cf5c02SJ. Bruce Fields static void nfsd4_conn_lost(struct svc_xpt_user *u) 64719cf5c02SJ. Bruce Fields { 64819cf5c02SJ. Bruce Fields struct nfsd4_conn *c = container_of(u, struct nfsd4_conn, cn_xpt_user); 64919cf5c02SJ. Bruce Fields struct nfs4_client *clp = c->cn_session->se_client; 65019cf5c02SJ. Bruce Fields 65119cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 65219cf5c02SJ. Bruce Fields if (!list_empty(&c->cn_persession)) { 65319cf5c02SJ. Bruce Fields list_del(&c->cn_persession); 65419cf5c02SJ. Bruce Fields free_conn(c); 65519cf5c02SJ. Bruce Fields } 65619cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 657eea49806SJ. Bruce Fields nfsd4_probe_callback(clp); 65819cf5c02SJ. Bruce Fields } 65919cf5c02SJ. Bruce Fields 660d29c374cSJ. Bruce Fields static struct nfsd4_conn *alloc_conn(struct svc_rqst *rqstp, u32 flags) 661c7662518SJ. Bruce Fields { 662c7662518SJ. Bruce Fields struct nfsd4_conn *conn; 663c7662518SJ. Bruce Fields 664c7662518SJ. Bruce Fields conn = kmalloc(sizeof(struct nfsd4_conn), GFP_KERNEL); 665c7662518SJ. Bruce Fields if (!conn) 666db90681dSJ. Bruce Fields return NULL; 667c7662518SJ. Bruce Fields svc_xprt_get(rqstp->rq_xprt); 668c7662518SJ. Bruce Fields conn->cn_xprt = rqstp->rq_xprt; 669d29c374cSJ. Bruce Fields conn->cn_flags = flags; 670db90681dSJ. Bruce Fields INIT_LIST_HEAD(&conn->cn_xpt_user.list); 671db90681dSJ. Bruce Fields return conn; 672db90681dSJ. Bruce Fields } 673db90681dSJ. Bruce Fields 674328ead28SJ. Bruce Fields static void __nfsd4_hash_conn(struct nfsd4_conn *conn, struct nfsd4_session *ses) 675328ead28SJ. Bruce Fields { 676328ead28SJ. Bruce Fields conn->cn_session = ses; 677328ead28SJ. Bruce Fields list_add(&conn->cn_persession, &ses->se_conns); 678328ead28SJ. Bruce Fields } 679328ead28SJ. Bruce Fields 680db90681dSJ. Bruce Fields static void nfsd4_hash_conn(struct nfsd4_conn *conn, struct nfsd4_session *ses) 681db90681dSJ. Bruce Fields { 682db90681dSJ. Bruce Fields struct nfs4_client *clp = ses->se_client; 683c7662518SJ. Bruce Fields 684c7662518SJ. Bruce Fields spin_lock(&clp->cl_lock); 685328ead28SJ. Bruce Fields __nfsd4_hash_conn(conn, ses); 686c7662518SJ. Bruce Fields spin_unlock(&clp->cl_lock); 687db90681dSJ. Bruce Fields } 688c7662518SJ. Bruce Fields 68921b75b01SJ. Bruce Fields static int nfsd4_register_conn(struct nfsd4_conn *conn) 690db90681dSJ. Bruce Fields { 69119cf5c02SJ. Bruce Fields conn->cn_xpt_user.callback = nfsd4_conn_lost; 69221b75b01SJ. Bruce Fields return register_xpt_user(conn->cn_xprt, &conn->cn_xpt_user); 693db90681dSJ. Bruce Fields } 694db90681dSJ. Bruce Fields 6951d1bc8f2SJ. Bruce Fields static __be32 nfsd4_new_conn(struct svc_rqst *rqstp, struct nfsd4_session *ses, u32 dir) 696db90681dSJ. Bruce Fields { 697db90681dSJ. Bruce Fields struct nfsd4_conn *conn; 69821b75b01SJ. Bruce Fields int ret; 699db90681dSJ. Bruce Fields 7001d1bc8f2SJ. Bruce Fields conn = alloc_conn(rqstp, dir); 701db90681dSJ. Bruce Fields if (!conn) 702db90681dSJ. Bruce Fields return nfserr_jukebox; 703db90681dSJ. Bruce Fields nfsd4_hash_conn(conn, ses); 70421b75b01SJ. Bruce Fields ret = nfsd4_register_conn(conn); 70521b75b01SJ. Bruce Fields if (ret) 70621b75b01SJ. Bruce Fields /* oops; xprt is already down: */ 70721b75b01SJ. Bruce Fields nfsd4_conn_lost(&conn->cn_xpt_user); 708c7662518SJ. Bruce Fields return nfs_ok; 709c7662518SJ. Bruce Fields } 710c7662518SJ. Bruce Fields 7111d1bc8f2SJ. Bruce Fields static __be32 nfsd4_new_conn_from_crses(struct svc_rqst *rqstp, struct nfsd4_session *ses) 7121d1bc8f2SJ. Bruce Fields { 7131d1bc8f2SJ. Bruce Fields u32 dir = NFS4_CDFC4_FORE; 7141d1bc8f2SJ. Bruce Fields 7151d1bc8f2SJ. Bruce Fields if (ses->se_flags & SESSION4_BACK_CHAN) 7161d1bc8f2SJ. Bruce Fields dir |= NFS4_CDFC4_BACK; 7171d1bc8f2SJ. Bruce Fields 7181d1bc8f2SJ. Bruce Fields return nfsd4_new_conn(rqstp, ses, dir); 7191d1bc8f2SJ. Bruce Fields } 7201d1bc8f2SJ. Bruce Fields 7211d1bc8f2SJ. Bruce Fields /* must be called under client_lock */ 72219cf5c02SJ. Bruce Fields static void nfsd4_del_conns(struct nfsd4_session *s) 723c7662518SJ. Bruce Fields { 72419cf5c02SJ. Bruce Fields struct nfs4_client *clp = s->se_client; 72519cf5c02SJ. Bruce Fields struct nfsd4_conn *c; 72619cf5c02SJ. Bruce Fields 72719cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 72819cf5c02SJ. Bruce Fields while (!list_empty(&s->se_conns)) { 72919cf5c02SJ. Bruce Fields c = list_first_entry(&s->se_conns, struct nfsd4_conn, cn_persession); 73019cf5c02SJ. Bruce Fields list_del_init(&c->cn_persession); 73119cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 73219cf5c02SJ. Bruce Fields 73319cf5c02SJ. Bruce Fields unregister_xpt_user(c->cn_xprt, &c->cn_xpt_user); 73419cf5c02SJ. Bruce Fields free_conn(c); 73519cf5c02SJ. Bruce Fields 73619cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 73719cf5c02SJ. Bruce Fields } 73819cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 739c7662518SJ. Bruce Fields } 740c7662518SJ. Bruce Fields 741c7662518SJ. Bruce Fields void free_session(struct kref *kref) 742c7662518SJ. Bruce Fields { 743c7662518SJ. Bruce Fields struct nfsd4_session *ses; 744c7662518SJ. Bruce Fields int mem; 745c7662518SJ. Bruce Fields 746c7662518SJ. Bruce Fields ses = container_of(kref, struct nfsd4_session, se_ref); 74719cf5c02SJ. Bruce Fields nfsd4_del_conns(ses); 748c7662518SJ. Bruce Fields spin_lock(&nfsd_drc_lock); 749c7662518SJ. Bruce Fields mem = ses->se_fchannel.maxreqs * slot_bytes(&ses->se_fchannel); 750c7662518SJ. Bruce Fields nfsd_drc_mem_used -= mem; 751c7662518SJ. Bruce Fields spin_unlock(&nfsd_drc_lock); 752c7662518SJ. Bruce Fields free_session_slots(ses); 753c7662518SJ. Bruce Fields kfree(ses); 754c7662518SJ. Bruce Fields } 755c7662518SJ. Bruce Fields 756ac7c46f2SJ. Bruce Fields static struct nfsd4_session *alloc_init_session(struct svc_rqst *rqstp, struct nfs4_client *clp, struct nfsd4_create_session *cses) 7575b6feee9SJ. Bruce Fields { 7585b6feee9SJ. Bruce Fields struct nfsd4_session *new; 7595b6feee9SJ. Bruce Fields struct nfsd4_channel_attrs *fchan = &cses->fore_channel; 7605b6feee9SJ. Bruce Fields int numslots, slotsize; 761c7662518SJ. Bruce Fields int status; 7625b6feee9SJ. Bruce Fields int idx; 7635b6feee9SJ. Bruce Fields 7645b6feee9SJ. Bruce Fields /* 7655b6feee9SJ. Bruce Fields * Note decreasing slot size below client's request may 7665b6feee9SJ. Bruce Fields * make it difficult for client to function correctly, whereas 7675b6feee9SJ. Bruce Fields * decreasing the number of slots will (just?) affect 7685b6feee9SJ. Bruce Fields * performance. When short on memory we therefore prefer to 7695b6feee9SJ. Bruce Fields * decrease number of slots instead of their size. 7705b6feee9SJ. Bruce Fields */ 7715b6feee9SJ. Bruce Fields slotsize = nfsd4_sanitize_slot_size(fchan->maxresp_cached); 7725b6feee9SJ. Bruce Fields numslots = nfsd4_get_drc_mem(slotsize, fchan->maxreqs); 773ced6dfe9SMi Jinlong if (numslots < 1) 774ced6dfe9SMi Jinlong return NULL; 7755b6feee9SJ. Bruce Fields 7765b6feee9SJ. Bruce Fields new = alloc_session(slotsize, numslots); 7775b6feee9SJ. Bruce Fields if (!new) { 7785b6feee9SJ. Bruce Fields nfsd4_put_drc_mem(slotsize, fchan->maxreqs); 779ac7c46f2SJ. Bruce Fields return NULL; 7805b6feee9SJ. Bruce Fields } 7815b6feee9SJ. Bruce Fields init_forechannel_attrs(&new->se_fchannel, fchan, numslots, slotsize); 782ec6b5d7bSAndy Adamson 783ec6b5d7bSAndy Adamson new->se_client = clp; 784ec6b5d7bSAndy Adamson gen_sessionid(new); 785ec6b5d7bSAndy Adamson 786c7662518SJ. Bruce Fields INIT_LIST_HEAD(&new->se_conns); 787c7662518SJ. Bruce Fields 788ac7c46f2SJ. Bruce Fields new->se_cb_seq_nr = 1; 789ec6b5d7bSAndy Adamson new->se_flags = cses->flags; 7908b5ce5cdSJ. Bruce Fields new->se_cb_prog = cses->callback_prog; 791ec6b5d7bSAndy Adamson kref_init(&new->se_ref); 7925b6feee9SJ. Bruce Fields idx = hash_sessionid(&new->se_sessionid); 7939089f1b4SBenny Halevy spin_lock(&client_lock); 794ec6b5d7bSAndy Adamson list_add(&new->se_hash, &sessionid_hashtbl[idx]); 7954c649378SJ. Bruce Fields spin_lock(&clp->cl_lock); 796ec6b5d7bSAndy Adamson list_add(&new->se_perclnt, &clp->cl_sessions); 7974c649378SJ. Bruce Fields spin_unlock(&clp->cl_lock); 7989089f1b4SBenny Halevy spin_unlock(&client_lock); 799ec6b5d7bSAndy Adamson 8001d1bc8f2SJ. Bruce Fields status = nfsd4_new_conn_from_crses(rqstp, new); 801ac7c46f2SJ. Bruce Fields /* whoops: benny points out, status is ignored! (err, or bogus) */ 802c7662518SJ. Bruce Fields if (status) { 803c7662518SJ. Bruce Fields free_session(&new->se_ref); 804ac7c46f2SJ. Bruce Fields return NULL; 805c7662518SJ. Bruce Fields } 806dcbeaa68SJ. Bruce Fields if (cses->flags & SESSION4_BACK_CHAN) { 807edd76786SJ. Bruce Fields struct sockaddr *sa = svc_addr(rqstp); 808dcbeaa68SJ. Bruce Fields /* 809dcbeaa68SJ. Bruce Fields * This is a little silly; with sessions there's no real 810dcbeaa68SJ. Bruce Fields * use for the callback address. Use the peer address 811dcbeaa68SJ. Bruce Fields * as a reasonable default for now, but consider fixing 812dcbeaa68SJ. Bruce Fields * the rpc client not to require an address in the 813dcbeaa68SJ. Bruce Fields * future: 814dcbeaa68SJ. Bruce Fields */ 815edd76786SJ. Bruce Fields rpc_copy_addr((struct sockaddr *)&clp->cl_cb_conn.cb_addr, sa); 816edd76786SJ. Bruce Fields clp->cl_cb_conn.cb_addrlen = svc_addr_len(sa); 817edd76786SJ. Bruce Fields } 818dcbeaa68SJ. Bruce Fields nfsd4_probe_callback(clp); 819ac7c46f2SJ. Bruce Fields return new; 820ec6b5d7bSAndy Adamson } 821ec6b5d7bSAndy Adamson 8229089f1b4SBenny Halevy /* caller must hold client_lock */ 8235282fd72SMarc Eshel static struct nfsd4_session * 8245282fd72SMarc Eshel find_in_sessionid_hashtbl(struct nfs4_sessionid *sessionid) 8255282fd72SMarc Eshel { 8265282fd72SMarc Eshel struct nfsd4_session *elem; 8275282fd72SMarc Eshel int idx; 8285282fd72SMarc Eshel 8295282fd72SMarc Eshel dump_sessionid(__func__, sessionid); 8305282fd72SMarc Eshel idx = hash_sessionid(sessionid); 8315282fd72SMarc Eshel /* Search in the appropriate list */ 8325282fd72SMarc Eshel list_for_each_entry(elem, &sessionid_hashtbl[idx], se_hash) { 8335282fd72SMarc Eshel if (!memcmp(elem->se_sessionid.data, sessionid->data, 8345282fd72SMarc Eshel NFS4_MAX_SESSIONID_LEN)) { 8355282fd72SMarc Eshel return elem; 8365282fd72SMarc Eshel } 8375282fd72SMarc Eshel } 8385282fd72SMarc Eshel 8395282fd72SMarc Eshel dprintk("%s: session not found\n", __func__); 8405282fd72SMarc Eshel return NULL; 8415282fd72SMarc Eshel } 8425282fd72SMarc Eshel 8439089f1b4SBenny Halevy /* caller must hold client_lock */ 8447116ed6bSAndy Adamson static void 8455282fd72SMarc Eshel unhash_session(struct nfsd4_session *ses) 8467116ed6bSAndy Adamson { 8477116ed6bSAndy Adamson list_del(&ses->se_hash); 8484c649378SJ. Bruce Fields spin_lock(&ses->se_client->cl_lock); 8497116ed6bSAndy Adamson list_del(&ses->se_perclnt); 8504c649378SJ. Bruce Fields spin_unlock(&ses->se_client->cl_lock); 8515282fd72SMarc Eshel } 8525282fd72SMarc Eshel 85336acb66bSBenny Halevy /* must be called under the client_lock */ 8541da177e4SLinus Torvalds static inline void 85536acb66bSBenny Halevy renew_client_locked(struct nfs4_client *clp) 8561da177e4SLinus Torvalds { 85707cd4909SBenny Halevy if (is_client_expired(clp)) { 85807cd4909SBenny Halevy dprintk("%s: client (clientid %08x/%08x) already expired\n", 85907cd4909SBenny Halevy __func__, 86007cd4909SBenny Halevy clp->cl_clientid.cl_boot, 86107cd4909SBenny Halevy clp->cl_clientid.cl_id); 86207cd4909SBenny Halevy return; 86307cd4909SBenny Halevy } 86407cd4909SBenny Halevy 8651da177e4SLinus Torvalds /* 8661da177e4SLinus Torvalds * Move client to the end to the LRU list. 8671da177e4SLinus Torvalds */ 8681da177e4SLinus Torvalds dprintk("renewing client (clientid %08x/%08x)\n", 8691da177e4SLinus Torvalds clp->cl_clientid.cl_boot, 8701da177e4SLinus Torvalds clp->cl_clientid.cl_id); 8711da177e4SLinus Torvalds list_move_tail(&clp->cl_lru, &client_lru); 8721da177e4SLinus Torvalds clp->cl_time = get_seconds(); 8731da177e4SLinus Torvalds } 8741da177e4SLinus Torvalds 87536acb66bSBenny Halevy static inline void 87636acb66bSBenny Halevy renew_client(struct nfs4_client *clp) 87736acb66bSBenny Halevy { 87836acb66bSBenny Halevy spin_lock(&client_lock); 87936acb66bSBenny Halevy renew_client_locked(clp); 88036acb66bSBenny Halevy spin_unlock(&client_lock); 88136acb66bSBenny Halevy } 88236acb66bSBenny Halevy 8831da177e4SLinus Torvalds /* SETCLIENTID and SETCLIENTID_CONFIRM Helper functions */ 8841da177e4SLinus Torvalds static int 8851da177e4SLinus Torvalds STALE_CLIENTID(clientid_t *clid) 8861da177e4SLinus Torvalds { 8871da177e4SLinus Torvalds if (clid->cl_boot == boot_time) 8881da177e4SLinus Torvalds return 0; 88960adfc50SAndy Adamson dprintk("NFSD stale clientid (%08x/%08x) boot_time %08lx\n", 89060adfc50SAndy Adamson clid->cl_boot, clid->cl_id, boot_time); 8911da177e4SLinus Torvalds return 1; 8921da177e4SLinus Torvalds } 8931da177e4SLinus Torvalds 8941da177e4SLinus Torvalds /* 8951da177e4SLinus Torvalds * XXX Should we use a slab cache ? 8961da177e4SLinus Torvalds * This type of memory management is somewhat inefficient, but we use it 8971da177e4SLinus Torvalds * anyway since SETCLIENTID is not a common operation. 8981da177e4SLinus Torvalds */ 89935bba9a3SJ. Bruce Fields static struct nfs4_client *alloc_client(struct xdr_netobj name) 9001da177e4SLinus Torvalds { 9011da177e4SLinus Torvalds struct nfs4_client *clp; 9021da177e4SLinus Torvalds 90335bba9a3SJ. Bruce Fields clp = kzalloc(sizeof(struct nfs4_client), GFP_KERNEL); 90435bba9a3SJ. Bruce Fields if (clp == NULL) 90535bba9a3SJ. Bruce Fields return NULL; 90635bba9a3SJ. Bruce Fields clp->cl_name.data = kmalloc(name.len, GFP_KERNEL); 90735bba9a3SJ. Bruce Fields if (clp->cl_name.data == NULL) { 90835bba9a3SJ. Bruce Fields kfree(clp); 90935bba9a3SJ. Bruce Fields return NULL; 91035bba9a3SJ. Bruce Fields } 9111da177e4SLinus Torvalds memcpy(clp->cl_name.data, name.data, name.len); 9121da177e4SLinus Torvalds clp->cl_name.len = name.len; 9131da177e4SLinus Torvalds return clp; 9141da177e4SLinus Torvalds } 9151da177e4SLinus Torvalds 9161da177e4SLinus Torvalds static inline void 9171da177e4SLinus Torvalds free_client(struct nfs4_client *clp) 9181da177e4SLinus Torvalds { 919792c95ddSJ. Bruce Fields while (!list_empty(&clp->cl_sessions)) { 920792c95ddSJ. Bruce Fields struct nfsd4_session *ses; 921792c95ddSJ. Bruce Fields ses = list_entry(clp->cl_sessions.next, struct nfsd4_session, 922792c95ddSJ. Bruce Fields se_perclnt); 923792c95ddSJ. Bruce Fields list_del(&ses->se_perclnt); 924792c95ddSJ. Bruce Fields nfsd4_put_session(ses); 925792c95ddSJ. Bruce Fields } 9261da177e4SLinus Torvalds if (clp->cl_cred.cr_group_info) 9271da177e4SLinus Torvalds put_group_info(clp->cl_cred.cr_group_info); 92868e76ad0SOlga Kornievskaia kfree(clp->cl_principal); 9291da177e4SLinus Torvalds kfree(clp->cl_name.data); 9301da177e4SLinus Torvalds kfree(clp); 9311da177e4SLinus Torvalds } 9321da177e4SLinus Torvalds 933d7682988SBenny Halevy void 934d7682988SBenny Halevy release_session_client(struct nfsd4_session *session) 935d7682988SBenny Halevy { 936d7682988SBenny Halevy struct nfs4_client *clp = session->se_client; 937d7682988SBenny Halevy 938d7682988SBenny Halevy if (!atomic_dec_and_lock(&clp->cl_refcount, &client_lock)) 939d7682988SBenny Halevy return; 940d7682988SBenny Halevy if (is_client_expired(clp)) { 941d7682988SBenny Halevy free_client(clp); 942d7682988SBenny Halevy session->se_client = NULL; 943d7682988SBenny Halevy } else 944d7682988SBenny Halevy renew_client_locked(clp); 945d7682988SBenny Halevy spin_unlock(&client_lock); 946d7682988SBenny Halevy } 947d7682988SBenny Halevy 94884d38ac9SBenny Halevy /* must be called under the client_lock */ 94984d38ac9SBenny Halevy static inline void 95084d38ac9SBenny Halevy unhash_client_locked(struct nfs4_client *clp) 95184d38ac9SBenny Halevy { 952792c95ddSJ. Bruce Fields struct nfsd4_session *ses; 953792c95ddSJ. Bruce Fields 95407cd4909SBenny Halevy mark_client_expired(clp); 95584d38ac9SBenny Halevy list_del(&clp->cl_lru); 9564c649378SJ. Bruce Fields spin_lock(&clp->cl_lock); 957792c95ddSJ. Bruce Fields list_for_each_entry(ses, &clp->cl_sessions, se_perclnt) 958792c95ddSJ. Bruce Fields list_del_init(&ses->se_hash); 9594c649378SJ. Bruce Fields spin_unlock(&clp->cl_lock); 96084d38ac9SBenny Halevy } 96184d38ac9SBenny Halevy 9621da177e4SLinus Torvalds static void 9631da177e4SLinus Torvalds expire_client(struct nfs4_client *clp) 9641da177e4SLinus Torvalds { 9651da177e4SLinus Torvalds struct nfs4_stateowner *sop; 9661da177e4SLinus Torvalds struct nfs4_delegation *dp; 9671da177e4SLinus Torvalds struct list_head reaplist; 9681da177e4SLinus Torvalds 9691da177e4SLinus Torvalds INIT_LIST_HEAD(&reaplist); 9701da177e4SLinus Torvalds spin_lock(&recall_lock); 971ea1da636SNeilBrown while (!list_empty(&clp->cl_delegations)) { 972ea1da636SNeilBrown dp = list_entry(clp->cl_delegations.next, struct nfs4_delegation, dl_perclnt); 973ea1da636SNeilBrown list_del_init(&dp->dl_perclnt); 9741da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 9751da177e4SLinus Torvalds } 9761da177e4SLinus Torvalds spin_unlock(&recall_lock); 9771da177e4SLinus Torvalds while (!list_empty(&reaplist)) { 9781da177e4SLinus Torvalds dp = list_entry(reaplist.next, struct nfs4_delegation, dl_recall_lru); 9791da177e4SLinus Torvalds list_del_init(&dp->dl_recall_lru); 9801da177e4SLinus Torvalds unhash_delegation(dp); 9811da177e4SLinus Torvalds } 982ea1da636SNeilBrown while (!list_empty(&clp->cl_openowners)) { 983ea1da636SNeilBrown sop = list_entry(clp->cl_openowners.next, struct nfs4_stateowner, so_perclient); 984f044ff83SJ. Bruce Fields release_openowner(sop); 9851da177e4SLinus Torvalds } 9866ff8da08SJ. Bruce Fields nfsd4_shutdown_callback(clp); 9872bf23875SJ. Bruce Fields if (clp->cl_cb_conn.cb_xprt) 9882bf23875SJ. Bruce Fields svc_xprt_put(clp->cl_cb_conn.cb_xprt); 98984d38ac9SBenny Halevy list_del(&clp->cl_idhash); 99084d38ac9SBenny Halevy list_del(&clp->cl_strhash); 99184d38ac9SBenny Halevy spin_lock(&client_lock); 99284d38ac9SBenny Halevy unhash_client_locked(clp); 99346583e25SBenny Halevy if (atomic_read(&clp->cl_refcount) == 0) 994b12a05cbSJ. Bruce Fields free_client(clp); 99546583e25SBenny Halevy spin_unlock(&client_lock); 9961da177e4SLinus Torvalds } 9971da177e4SLinus Torvalds 99835bba9a3SJ. Bruce Fields static void copy_verf(struct nfs4_client *target, nfs4_verifier *source) 99935bba9a3SJ. Bruce Fields { 100035bba9a3SJ. Bruce Fields memcpy(target->cl_verifier.data, source->data, 100135bba9a3SJ. Bruce Fields sizeof(target->cl_verifier.data)); 10021da177e4SLinus Torvalds } 10031da177e4SLinus Torvalds 100435bba9a3SJ. Bruce Fields static void copy_clid(struct nfs4_client *target, struct nfs4_client *source) 100535bba9a3SJ. Bruce Fields { 10061da177e4SLinus Torvalds target->cl_clientid.cl_boot = source->cl_clientid.cl_boot; 10071da177e4SLinus Torvalds target->cl_clientid.cl_id = source->cl_clientid.cl_id; 10081da177e4SLinus Torvalds } 10091da177e4SLinus Torvalds 101035bba9a3SJ. Bruce Fields static void copy_cred(struct svc_cred *target, struct svc_cred *source) 101135bba9a3SJ. Bruce Fields { 10121da177e4SLinus Torvalds target->cr_uid = source->cr_uid; 10131da177e4SLinus Torvalds target->cr_gid = source->cr_gid; 10141da177e4SLinus Torvalds target->cr_group_info = source->cr_group_info; 10151da177e4SLinus Torvalds get_group_info(target->cr_group_info); 10161da177e4SLinus Torvalds } 10171da177e4SLinus Torvalds 101835bba9a3SJ. Bruce Fields static int same_name(const char *n1, const char *n2) 1019599e0a22SJ. Bruce Fields { 1020a55370a3SNeilBrown return 0 == memcmp(n1, n2, HEXDIR_LEN); 10211da177e4SLinus Torvalds } 10221da177e4SLinus Torvalds 10231da177e4SLinus Torvalds static int 1024599e0a22SJ. Bruce Fields same_verf(nfs4_verifier *v1, nfs4_verifier *v2) 1025599e0a22SJ. Bruce Fields { 1026599e0a22SJ. Bruce Fields return 0 == memcmp(v1->data, v2->data, sizeof(v1->data)); 10271da177e4SLinus Torvalds } 10281da177e4SLinus Torvalds 10291da177e4SLinus Torvalds static int 1030599e0a22SJ. Bruce Fields same_clid(clientid_t *cl1, clientid_t *cl2) 1031599e0a22SJ. Bruce Fields { 1032599e0a22SJ. Bruce Fields return (cl1->cl_boot == cl2->cl_boot) && (cl1->cl_id == cl2->cl_id); 10331da177e4SLinus Torvalds } 10341da177e4SLinus Torvalds 10351da177e4SLinus Torvalds /* XXX what about NGROUP */ 10361da177e4SLinus Torvalds static int 1037599e0a22SJ. Bruce Fields same_creds(struct svc_cred *cr1, struct svc_cred *cr2) 1038599e0a22SJ. Bruce Fields { 1039599e0a22SJ. Bruce Fields return cr1->cr_uid == cr2->cr_uid; 10401da177e4SLinus Torvalds } 10411da177e4SLinus Torvalds 10425ec7b46cSJ. Bruce Fields static void gen_clid(struct nfs4_client *clp) 10435ec7b46cSJ. Bruce Fields { 10445ec7b46cSJ. Bruce Fields static u32 current_clientid = 1; 10455ec7b46cSJ. Bruce Fields 10461da177e4SLinus Torvalds clp->cl_clientid.cl_boot = boot_time; 10471da177e4SLinus Torvalds clp->cl_clientid.cl_id = current_clientid++; 10481da177e4SLinus Torvalds } 10491da177e4SLinus Torvalds 1050deda2faaSJ. Bruce Fields static void gen_confirm(struct nfs4_client *clp) 1051deda2faaSJ. Bruce Fields { 1052deda2faaSJ. Bruce Fields static u32 i; 10531da177e4SLinus Torvalds u32 *p; 10541da177e4SLinus Torvalds 10551da177e4SLinus Torvalds p = (u32 *)clp->cl_confirm.data; 1056deda2faaSJ. Bruce Fields *p++ = get_seconds(); 1057deda2faaSJ. Bruce Fields *p++ = i++; 10581da177e4SLinus Torvalds } 10591da177e4SLinus Torvalds 1060b09333c4SRicardo Labiaga static struct nfs4_client *create_client(struct xdr_netobj name, char *recdir, 1061b09333c4SRicardo Labiaga struct svc_rqst *rqstp, nfs4_verifier *verf) 1062b09333c4SRicardo Labiaga { 1063b09333c4SRicardo Labiaga struct nfs4_client *clp; 1064b09333c4SRicardo Labiaga struct sockaddr *sa = svc_addr(rqstp); 1065b09333c4SRicardo Labiaga char *princ; 1066b09333c4SRicardo Labiaga 1067b09333c4SRicardo Labiaga clp = alloc_client(name); 1068b09333c4SRicardo Labiaga if (clp == NULL) 1069b09333c4SRicardo Labiaga return NULL; 1070b09333c4SRicardo Labiaga 1071792c95ddSJ. Bruce Fields INIT_LIST_HEAD(&clp->cl_sessions); 1072792c95ddSJ. Bruce Fields 1073b09333c4SRicardo Labiaga princ = svc_gss_principal(rqstp); 1074b09333c4SRicardo Labiaga if (princ) { 1075b09333c4SRicardo Labiaga clp->cl_principal = kstrdup(princ, GFP_KERNEL); 1076b09333c4SRicardo Labiaga if (clp->cl_principal == NULL) { 1077b09333c4SRicardo Labiaga free_client(clp); 1078b09333c4SRicardo Labiaga return NULL; 1079b09333c4SRicardo Labiaga } 1080b09333c4SRicardo Labiaga } 1081b09333c4SRicardo Labiaga 1082b09333c4SRicardo Labiaga memcpy(clp->cl_recdir, recdir, HEXDIR_LEN); 108346583e25SBenny Halevy atomic_set(&clp->cl_refcount, 0); 108477a3569dSJ. Bruce Fields clp->cl_cb_state = NFSD4_CB_UNKNOWN; 1085b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_idhash); 1086b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_strhash); 1087b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_openowners); 1088b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_delegations); 1089b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_lru); 10905ce8ba25SJ. Bruce Fields INIT_LIST_HEAD(&clp->cl_callbacks); 10916ff8da08SJ. Bruce Fields spin_lock_init(&clp->cl_lock); 1092cee277d9SJ. Bruce Fields INIT_WORK(&clp->cl_cb_null.cb_work, nfsd4_do_callback_rpc); 109307cd4909SBenny Halevy clp->cl_time = get_seconds(); 1094b09333c4SRicardo Labiaga clear_bit(0, &clp->cl_cb_slot_busy); 1095b09333c4SRicardo Labiaga rpc_init_wait_queue(&clp->cl_cb_waitq, "Backchannel slot table"); 1096b09333c4SRicardo Labiaga copy_verf(clp, verf); 1097b09333c4SRicardo Labiaga rpc_copy_addr((struct sockaddr *) &clp->cl_addr, sa); 1098b09333c4SRicardo Labiaga clp->cl_flavor = rqstp->rq_flavor; 1099b09333c4SRicardo Labiaga copy_cred(&clp->cl_cred, &rqstp->rq_cred); 1100b09333c4SRicardo Labiaga gen_confirm(clp); 1101edd76786SJ. Bruce Fields clp->cl_cb_session = NULL; 1102b09333c4SRicardo Labiaga return clp; 1103b09333c4SRicardo Labiaga } 1104b09333c4SRicardo Labiaga 110535bba9a3SJ. Bruce Fields static int check_name(struct xdr_netobj name) 110635bba9a3SJ. Bruce Fields { 11071da177e4SLinus Torvalds if (name.len == 0) 11081da177e4SLinus Torvalds return 0; 11091da177e4SLinus Torvalds if (name.len > NFS4_OPAQUE_LIMIT) { 11102fdada03SJ. Bruce Fields dprintk("NFSD: check_name: name too long(%d)!\n", name.len); 11111da177e4SLinus Torvalds return 0; 11121da177e4SLinus Torvalds } 11131da177e4SLinus Torvalds return 1; 11141da177e4SLinus Torvalds } 11151da177e4SLinus Torvalds 1116fd39ca9aSNeilBrown static void 11171da177e4SLinus Torvalds add_to_unconfirmed(struct nfs4_client *clp, unsigned int strhashval) 11181da177e4SLinus Torvalds { 11191da177e4SLinus Torvalds unsigned int idhashval; 11201da177e4SLinus Torvalds 11211da177e4SLinus Torvalds list_add(&clp->cl_strhash, &unconf_str_hashtbl[strhashval]); 11221da177e4SLinus Torvalds idhashval = clientid_hashval(clp->cl_clientid.cl_id); 11231da177e4SLinus Torvalds list_add(&clp->cl_idhash, &unconf_id_hashtbl[idhashval]); 112436acb66bSBenny Halevy renew_client(clp); 11251da177e4SLinus Torvalds } 11261da177e4SLinus Torvalds 1127fd39ca9aSNeilBrown static void 11281da177e4SLinus Torvalds move_to_confirmed(struct nfs4_client *clp) 11291da177e4SLinus Torvalds { 11301da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clp->cl_clientid.cl_id); 11311da177e4SLinus Torvalds unsigned int strhashval; 11321da177e4SLinus Torvalds 11331da177e4SLinus Torvalds dprintk("NFSD: move_to_confirm nfs4_client %p\n", clp); 1134f116629dSAkinobu Mita list_move(&clp->cl_idhash, &conf_id_hashtbl[idhashval]); 1135a55370a3SNeilBrown strhashval = clientstr_hashval(clp->cl_recdir); 1136328efbabSBenny Halevy list_move(&clp->cl_strhash, &conf_str_hashtbl[strhashval]); 11371da177e4SLinus Torvalds renew_client(clp); 11381da177e4SLinus Torvalds } 11391da177e4SLinus Torvalds 11401da177e4SLinus Torvalds static struct nfs4_client * 11411da177e4SLinus Torvalds find_confirmed_client(clientid_t *clid) 11421da177e4SLinus Torvalds { 11431da177e4SLinus Torvalds struct nfs4_client *clp; 11441da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clid->cl_id); 11451da177e4SLinus Torvalds 11461da177e4SLinus Torvalds list_for_each_entry(clp, &conf_id_hashtbl[idhashval], cl_idhash) { 1147599e0a22SJ. Bruce Fields if (same_clid(&clp->cl_clientid, clid)) 11481da177e4SLinus Torvalds return clp; 11491da177e4SLinus Torvalds } 11501da177e4SLinus Torvalds return NULL; 11511da177e4SLinus Torvalds } 11521da177e4SLinus Torvalds 11531da177e4SLinus Torvalds static struct nfs4_client * 11541da177e4SLinus Torvalds find_unconfirmed_client(clientid_t *clid) 11551da177e4SLinus Torvalds { 11561da177e4SLinus Torvalds struct nfs4_client *clp; 11571da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clid->cl_id); 11581da177e4SLinus Torvalds 11591da177e4SLinus Torvalds list_for_each_entry(clp, &unconf_id_hashtbl[idhashval], cl_idhash) { 1160599e0a22SJ. Bruce Fields if (same_clid(&clp->cl_clientid, clid)) 11611da177e4SLinus Torvalds return clp; 11621da177e4SLinus Torvalds } 11631da177e4SLinus Torvalds return NULL; 11641da177e4SLinus Torvalds } 11651da177e4SLinus Torvalds 11666e5f15c9SJ. Bruce Fields static bool clp_used_exchangeid(struct nfs4_client *clp) 1167a1bcecd2SAndy Adamson { 11686e5f15c9SJ. Bruce Fields return clp->cl_exchange_flags != 0; 1169a1bcecd2SAndy Adamson } 1170a1bcecd2SAndy Adamson 117128ce6054SNeilBrown static struct nfs4_client * 1172e203d506SJ. Bruce Fields find_confirmed_client_by_str(const char *dname, unsigned int hashval) 117328ce6054SNeilBrown { 117428ce6054SNeilBrown struct nfs4_client *clp; 117528ce6054SNeilBrown 117628ce6054SNeilBrown list_for_each_entry(clp, &conf_str_hashtbl[hashval], cl_strhash) { 1177e203d506SJ. Bruce Fields if (same_name(clp->cl_recdir, dname)) 117828ce6054SNeilBrown return clp; 117928ce6054SNeilBrown } 118028ce6054SNeilBrown return NULL; 118128ce6054SNeilBrown } 118228ce6054SNeilBrown 118328ce6054SNeilBrown static struct nfs4_client * 1184e203d506SJ. Bruce Fields find_unconfirmed_client_by_str(const char *dname, unsigned int hashval) 118528ce6054SNeilBrown { 118628ce6054SNeilBrown struct nfs4_client *clp; 118728ce6054SNeilBrown 118828ce6054SNeilBrown list_for_each_entry(clp, &unconf_str_hashtbl[hashval], cl_strhash) { 1189e203d506SJ. Bruce Fields if (same_name(clp->cl_recdir, dname)) 119028ce6054SNeilBrown return clp; 119128ce6054SNeilBrown } 119228ce6054SNeilBrown return NULL; 119328ce6054SNeilBrown } 119428ce6054SNeilBrown 11956f3d772fSTakuma Umeya static void rpc_svcaddr2sockaddr(struct sockaddr *sa, unsigned short family, union svc_addr_u *svcaddr) 11966f3d772fSTakuma Umeya { 11976f3d772fSTakuma Umeya switch (family) { 11986f3d772fSTakuma Umeya case AF_INET: 11996f3d772fSTakuma Umeya ((struct sockaddr_in *)sa)->sin_family = AF_INET; 12006f3d772fSTakuma Umeya ((struct sockaddr_in *)sa)->sin_addr = svcaddr->addr; 12016f3d772fSTakuma Umeya return; 12026f3d772fSTakuma Umeya case AF_INET6: 12036f3d772fSTakuma Umeya ((struct sockaddr_in6 *)sa)->sin6_family = AF_INET6; 12046f3d772fSTakuma Umeya ((struct sockaddr_in6 *)sa)->sin6_addr = svcaddr->addr6; 12056f3d772fSTakuma Umeya return; 12066f3d772fSTakuma Umeya } 12076f3d772fSTakuma Umeya } 12086f3d772fSTakuma Umeya 1209fd39ca9aSNeilBrown static void 12106f3d772fSTakuma Umeya gen_callback(struct nfs4_client *clp, struct nfsd4_setclientid *se, struct svc_rqst *rqstp) 12111da177e4SLinus Torvalds { 121207263f1eSJ. Bruce Fields struct nfs4_cb_conn *conn = &clp->cl_cb_conn; 12136f3d772fSTakuma Umeya struct sockaddr *sa = svc_addr(rqstp); 12146f3d772fSTakuma Umeya u32 scopeid = rpc_get_scope_id(sa); 12157077ecbaSJeff Layton unsigned short expected_family; 12161da177e4SLinus Torvalds 12177077ecbaSJeff Layton /* Currently, we only support tcp and tcp6 for the callback channel */ 12187077ecbaSJeff Layton if (se->se_callback_netid_len == 3 && 12197077ecbaSJeff Layton !memcmp(se->se_callback_netid_val, "tcp", 3)) 12207077ecbaSJeff Layton expected_family = AF_INET; 12217077ecbaSJeff Layton else if (se->se_callback_netid_len == 4 && 12227077ecbaSJeff Layton !memcmp(se->se_callback_netid_val, "tcp6", 4)) 12237077ecbaSJeff Layton expected_family = AF_INET6; 12247077ecbaSJeff Layton else 12251da177e4SLinus Torvalds goto out_err; 12261da177e4SLinus Torvalds 122707263f1eSJ. Bruce Fields conn->cb_addrlen = rpc_uaddr2sockaddr(se->se_callback_addr_val, 1228aa9a4ec7SJeff Layton se->se_callback_addr_len, 122907263f1eSJ. Bruce Fields (struct sockaddr *)&conn->cb_addr, 123007263f1eSJ. Bruce Fields sizeof(conn->cb_addr)); 1231aa9a4ec7SJeff Layton 123207263f1eSJ. Bruce Fields if (!conn->cb_addrlen || conn->cb_addr.ss_family != expected_family) 12331da177e4SLinus Torvalds goto out_err; 1234aa9a4ec7SJeff Layton 123507263f1eSJ. Bruce Fields if (conn->cb_addr.ss_family == AF_INET6) 123607263f1eSJ. Bruce Fields ((struct sockaddr_in6 *)&conn->cb_addr)->sin6_scope_id = scopeid; 1237fbf4665fSJeff Layton 123807263f1eSJ. Bruce Fields conn->cb_prog = se->se_callback_prog; 123907263f1eSJ. Bruce Fields conn->cb_ident = se->se_callback_ident; 12406f3d772fSTakuma Umeya rpc_svcaddr2sockaddr((struct sockaddr *)&conn->cb_saddr, expected_family, &rqstp->rq_daddr); 12411da177e4SLinus Torvalds return; 12421da177e4SLinus Torvalds out_err: 124307263f1eSJ. Bruce Fields conn->cb_addr.ss_family = AF_UNSPEC; 124407263f1eSJ. Bruce Fields conn->cb_addrlen = 0; 1245849823c5SNeil Brown dprintk(KERN_INFO "NFSD: this client (clientid %08x/%08x) " 12461da177e4SLinus Torvalds "will not receive delegations\n", 12471da177e4SLinus Torvalds clp->cl_clientid.cl_boot, clp->cl_clientid.cl_id); 12481da177e4SLinus Torvalds 12491da177e4SLinus Torvalds return; 12501da177e4SLinus Torvalds } 12511da177e4SLinus Torvalds 1252074fe897SAndy Adamson /* 1253557ce264SAndy Adamson * Cache a reply. nfsd4_check_drc_limit() has bounded the cache size. 1254074fe897SAndy Adamson */ 1255074fe897SAndy Adamson void 1256074fe897SAndy Adamson nfsd4_store_cache_entry(struct nfsd4_compoundres *resp) 1257074fe897SAndy Adamson { 1258557ce264SAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1259557ce264SAndy Adamson unsigned int base; 1260074fe897SAndy Adamson 1261557ce264SAndy Adamson dprintk("--> %s slot %p\n", __func__, slot); 1262074fe897SAndy Adamson 1263557ce264SAndy Adamson slot->sl_opcnt = resp->opcnt; 1264557ce264SAndy Adamson slot->sl_status = resp->cstate.status; 1265bf864a31SAndy Adamson 1266bf864a31SAndy Adamson if (nfsd4_not_cached(resp)) { 1267557ce264SAndy Adamson slot->sl_datalen = 0; 1268bf864a31SAndy Adamson return; 1269bf864a31SAndy Adamson } 1270557ce264SAndy Adamson slot->sl_datalen = (char *)resp->p - (char *)resp->cstate.datap; 1271557ce264SAndy Adamson base = (char *)resp->cstate.datap - 1272557ce264SAndy Adamson (char *)resp->xbuf->head[0].iov_base; 1273557ce264SAndy Adamson if (read_bytes_from_xdr_buf(resp->xbuf, base, slot->sl_data, 1274557ce264SAndy Adamson slot->sl_datalen)) 1275557ce264SAndy Adamson WARN("%s: sessions DRC could not cache compound\n", __func__); 1276557ce264SAndy Adamson return; 1277074fe897SAndy Adamson } 1278074fe897SAndy Adamson 1279074fe897SAndy Adamson /* 1280abfabf8cSAndy Adamson * Encode the replay sequence operation from the slot values. 1281abfabf8cSAndy Adamson * If cachethis is FALSE encode the uncached rep error on the next 1282abfabf8cSAndy Adamson * operation which sets resp->p and increments resp->opcnt for 1283abfabf8cSAndy Adamson * nfs4svc_encode_compoundres. 1284abfabf8cSAndy Adamson * 1285074fe897SAndy Adamson */ 1286abfabf8cSAndy Adamson static __be32 1287abfabf8cSAndy Adamson nfsd4_enc_sequence_replay(struct nfsd4_compoundargs *args, 1288abfabf8cSAndy Adamson struct nfsd4_compoundres *resp) 1289074fe897SAndy Adamson { 1290abfabf8cSAndy Adamson struct nfsd4_op *op; 1291abfabf8cSAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1292074fe897SAndy Adamson 1293abfabf8cSAndy Adamson dprintk("--> %s resp->opcnt %d cachethis %u \n", __func__, 1294557ce264SAndy Adamson resp->opcnt, resp->cstate.slot->sl_cachethis); 1295abfabf8cSAndy Adamson 1296abfabf8cSAndy Adamson /* Encode the replayed sequence operation */ 1297abfabf8cSAndy Adamson op = &args->ops[resp->opcnt - 1]; 1298abfabf8cSAndy Adamson nfsd4_encode_operation(resp, op); 1299abfabf8cSAndy Adamson 1300abfabf8cSAndy Adamson /* Return nfserr_retry_uncached_rep in next operation. */ 1301557ce264SAndy Adamson if (args->opcnt > 1 && slot->sl_cachethis == 0) { 1302abfabf8cSAndy Adamson op = &args->ops[resp->opcnt++]; 1303abfabf8cSAndy Adamson op->status = nfserr_retry_uncached_rep; 1304abfabf8cSAndy Adamson nfsd4_encode_operation(resp, op); 1305074fe897SAndy Adamson } 1306abfabf8cSAndy Adamson return op->status; 1307074fe897SAndy Adamson } 1308074fe897SAndy Adamson 1309074fe897SAndy Adamson /* 1310557ce264SAndy Adamson * The sequence operation is not cached because we can use the slot and 1311557ce264SAndy Adamson * session values. 1312074fe897SAndy Adamson */ 1313074fe897SAndy Adamson __be32 1314bf864a31SAndy Adamson nfsd4_replay_cache_entry(struct nfsd4_compoundres *resp, 1315bf864a31SAndy Adamson struct nfsd4_sequence *seq) 1316074fe897SAndy Adamson { 1317557ce264SAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1318074fe897SAndy Adamson __be32 status; 1319074fe897SAndy Adamson 1320557ce264SAndy Adamson dprintk("--> %s slot %p\n", __func__, slot); 1321074fe897SAndy Adamson 1322abfabf8cSAndy Adamson /* Either returns 0 or nfserr_retry_uncached */ 1323abfabf8cSAndy Adamson status = nfsd4_enc_sequence_replay(resp->rqstp->rq_argp, resp); 1324abfabf8cSAndy Adamson if (status == nfserr_retry_uncached_rep) 1325abfabf8cSAndy Adamson return status; 1326074fe897SAndy Adamson 1327557ce264SAndy Adamson /* The sequence operation has been encoded, cstate->datap set. */ 1328557ce264SAndy Adamson memcpy(resp->cstate.datap, slot->sl_data, slot->sl_datalen); 1329074fe897SAndy Adamson 1330557ce264SAndy Adamson resp->opcnt = slot->sl_opcnt; 1331557ce264SAndy Adamson resp->p = resp->cstate.datap + XDR_QUADLEN(slot->sl_datalen); 1332557ce264SAndy Adamson status = slot->sl_status; 1333074fe897SAndy Adamson 1334074fe897SAndy Adamson return status; 1335074fe897SAndy Adamson } 1336074fe897SAndy Adamson 13370733d213SAndy Adamson /* 13380733d213SAndy Adamson * Set the exchange_id flags returned by the server. 13390733d213SAndy Adamson */ 13400733d213SAndy Adamson static void 13410733d213SAndy Adamson nfsd4_set_ex_flags(struct nfs4_client *new, struct nfsd4_exchange_id *clid) 13420733d213SAndy Adamson { 13430733d213SAndy Adamson /* pNFS is not supported */ 13440733d213SAndy Adamson new->cl_exchange_flags |= EXCHGID4_FLAG_USE_NON_PNFS; 13450733d213SAndy Adamson 13460733d213SAndy Adamson /* Referrals are supported, Migration is not. */ 13470733d213SAndy Adamson new->cl_exchange_flags |= EXCHGID4_FLAG_SUPP_MOVED_REFER; 13480733d213SAndy Adamson 13490733d213SAndy Adamson /* set the wire flags to return to client. */ 13500733d213SAndy Adamson clid->flags = new->cl_exchange_flags; 13510733d213SAndy Adamson } 13520733d213SAndy Adamson 1353b37ad28bSAl Viro __be32 1354069b6ad4SAndy Adamson nfsd4_exchange_id(struct svc_rqst *rqstp, 1355069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1356069b6ad4SAndy Adamson struct nfsd4_exchange_id *exid) 1357069b6ad4SAndy Adamson { 13580733d213SAndy Adamson struct nfs4_client *unconf, *conf, *new; 13590733d213SAndy Adamson int status; 13600733d213SAndy Adamson unsigned int strhashval; 13610733d213SAndy Adamson char dname[HEXDIR_LEN]; 1362363168b4SJeff Layton char addr_str[INET6_ADDRSTRLEN]; 13630733d213SAndy Adamson nfs4_verifier verf = exid->verifier; 1364363168b4SJeff Layton struct sockaddr *sa = svc_addr(rqstp); 13650733d213SAndy Adamson 1366363168b4SJeff Layton rpc_ntop(sa, addr_str, sizeof(addr_str)); 13670733d213SAndy Adamson dprintk("%s rqstp=%p exid=%p clname.len=%u clname.data=%p " 1368363168b4SJeff Layton "ip_addr=%s flags %x, spa_how %d\n", 13690733d213SAndy Adamson __func__, rqstp, exid, exid->clname.len, exid->clname.data, 1370363168b4SJeff Layton addr_str, exid->flags, exid->spa_how); 13710733d213SAndy Adamson 13720733d213SAndy Adamson if (!check_name(exid->clname) || (exid->flags & ~EXCHGID4_FLAG_MASK_A)) 13730733d213SAndy Adamson return nfserr_inval; 13740733d213SAndy Adamson 13750733d213SAndy Adamson /* Currently only support SP4_NONE */ 13760733d213SAndy Adamson switch (exid->spa_how) { 13770733d213SAndy Adamson case SP4_NONE: 13780733d213SAndy Adamson break; 13790733d213SAndy Adamson case SP4_SSV: 1380044bc1d4SJ. Bruce Fields return nfserr_serverfault; 13810733d213SAndy Adamson default: 13820733d213SAndy Adamson BUG(); /* checked by xdr code */ 13830733d213SAndy Adamson case SP4_MACH_CRED: 13840733d213SAndy Adamson return nfserr_serverfault; /* no excuse :-/ */ 13850733d213SAndy Adamson } 13860733d213SAndy Adamson 13870733d213SAndy Adamson status = nfs4_make_rec_clidname(dname, &exid->clname); 13880733d213SAndy Adamson 13890733d213SAndy Adamson if (status) 13900733d213SAndy Adamson goto error; 13910733d213SAndy Adamson 13920733d213SAndy Adamson strhashval = clientstr_hashval(dname); 13930733d213SAndy Adamson 13940733d213SAndy Adamson nfs4_lock_state(); 13950733d213SAndy Adamson status = nfs_ok; 13960733d213SAndy Adamson 1397e203d506SJ. Bruce Fields conf = find_confirmed_client_by_str(dname, strhashval); 13980733d213SAndy Adamson if (conf) { 1399e203d506SJ. Bruce Fields if (!clp_used_exchangeid(conf)) { 1400e203d506SJ. Bruce Fields status = nfserr_clid_inuse; /* XXX: ? */ 1401e203d506SJ. Bruce Fields goto out; 1402e203d506SJ. Bruce Fields } 14030733d213SAndy Adamson if (!same_verf(&verf, &conf->cl_verifier)) { 14040733d213SAndy Adamson /* 18.35.4 case 8 */ 14050733d213SAndy Adamson if (exid->flags & EXCHGID4_FLAG_UPD_CONFIRMED_REC_A) { 14060733d213SAndy Adamson status = nfserr_not_same; 14070733d213SAndy Adamson goto out; 14080733d213SAndy Adamson } 14090733d213SAndy Adamson /* Client reboot: destroy old state */ 14100733d213SAndy Adamson expire_client(conf); 14110733d213SAndy Adamson goto out_new; 14120733d213SAndy Adamson } 14130733d213SAndy Adamson if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) { 14140733d213SAndy Adamson /* 18.35.4 case 9 */ 14150733d213SAndy Adamson if (exid->flags & EXCHGID4_FLAG_UPD_CONFIRMED_REC_A) { 14160733d213SAndy Adamson status = nfserr_perm; 14170733d213SAndy Adamson goto out; 14180733d213SAndy Adamson } 14190733d213SAndy Adamson expire_client(conf); 14200733d213SAndy Adamson goto out_new; 14210733d213SAndy Adamson } 14220733d213SAndy Adamson /* 14230733d213SAndy Adamson * Set bit when the owner id and verifier map to an already 14240733d213SAndy Adamson * confirmed client id (18.35.3). 14250733d213SAndy Adamson */ 14260733d213SAndy Adamson exid->flags |= EXCHGID4_FLAG_CONFIRMED_R; 14270733d213SAndy Adamson 14280733d213SAndy Adamson /* 14290733d213SAndy Adamson * Falling into 18.35.4 case 2, possible router replay. 14300733d213SAndy Adamson * Leave confirmed record intact and return same result. 14310733d213SAndy Adamson */ 14320733d213SAndy Adamson copy_verf(conf, &verf); 14330733d213SAndy Adamson new = conf; 14340733d213SAndy Adamson goto out_copy; 14356ddbbbfeSMike Sager } 14366ddbbbfeSMike Sager 14370733d213SAndy Adamson /* 18.35.4 case 7 */ 14380733d213SAndy Adamson if (exid->flags & EXCHGID4_FLAG_UPD_CONFIRMED_REC_A) { 14390733d213SAndy Adamson status = nfserr_noent; 14400733d213SAndy Adamson goto out; 14410733d213SAndy Adamson } 14420733d213SAndy Adamson 1443e203d506SJ. Bruce Fields unconf = find_unconfirmed_client_by_str(dname, strhashval); 14440733d213SAndy Adamson if (unconf) { 14450733d213SAndy Adamson /* 14460733d213SAndy Adamson * Possible retry or client restart. Per 18.35.4 case 4, 14470733d213SAndy Adamson * a new unconfirmed record should be generated regardless 14480733d213SAndy Adamson * of whether any properties have changed. 14490733d213SAndy Adamson */ 14500733d213SAndy Adamson expire_client(unconf); 14510733d213SAndy Adamson } 14520733d213SAndy Adamson 14530733d213SAndy Adamson out_new: 14540733d213SAndy Adamson /* Normal case */ 1455b09333c4SRicardo Labiaga new = create_client(exid->clname, dname, rqstp, &verf); 14560733d213SAndy Adamson if (new == NULL) { 14574731030dSJ. Bruce Fields status = nfserr_jukebox; 14580733d213SAndy Adamson goto out; 14590733d213SAndy Adamson } 14600733d213SAndy Adamson 14610733d213SAndy Adamson gen_clid(new); 14620733d213SAndy Adamson add_to_unconfirmed(new, strhashval); 14630733d213SAndy Adamson out_copy: 14640733d213SAndy Adamson exid->clientid.cl_boot = new->cl_clientid.cl_boot; 14650733d213SAndy Adamson exid->clientid.cl_id = new->cl_clientid.cl_id; 14660733d213SAndy Adamson 146738eb76a5SAndy Adamson exid->seqid = 1; 14680733d213SAndy Adamson nfsd4_set_ex_flags(new, exid); 14690733d213SAndy Adamson 14700733d213SAndy Adamson dprintk("nfsd4_exchange_id seqid %d flags %x\n", 147149557cc7SAndy Adamson new->cl_cs_slot.sl_seqid, new->cl_exchange_flags); 14720733d213SAndy Adamson status = nfs_ok; 14730733d213SAndy Adamson 14740733d213SAndy Adamson out: 14750733d213SAndy Adamson nfs4_unlock_state(); 14760733d213SAndy Adamson error: 14770733d213SAndy Adamson dprintk("nfsd4_exchange_id returns %d\n", ntohl(status)); 14780733d213SAndy Adamson return status; 1479069b6ad4SAndy Adamson } 1480069b6ad4SAndy Adamson 1481b85d4c01SBenny Halevy static int 148288e588d5SAndy Adamson check_slot_seqid(u32 seqid, u32 slot_seqid, int slot_inuse) 1483b85d4c01SBenny Halevy { 148488e588d5SAndy Adamson dprintk("%s enter. seqid %d slot_seqid %d\n", __func__, seqid, 148588e588d5SAndy Adamson slot_seqid); 1486b85d4c01SBenny Halevy 1487b85d4c01SBenny Halevy /* The slot is in use, and no response has been sent. */ 148888e588d5SAndy Adamson if (slot_inuse) { 148988e588d5SAndy Adamson if (seqid == slot_seqid) 1490b85d4c01SBenny Halevy return nfserr_jukebox; 1491b85d4c01SBenny Halevy else 1492b85d4c01SBenny Halevy return nfserr_seq_misordered; 1493b85d4c01SBenny Halevy } 1494b85d4c01SBenny Halevy /* Normal */ 149588e588d5SAndy Adamson if (likely(seqid == slot_seqid + 1)) 1496b85d4c01SBenny Halevy return nfs_ok; 1497b85d4c01SBenny Halevy /* Replay */ 149888e588d5SAndy Adamson if (seqid == slot_seqid) 1499b85d4c01SBenny Halevy return nfserr_replay_cache; 1500b85d4c01SBenny Halevy /* Wraparound */ 150188e588d5SAndy Adamson if (seqid == 1 && (slot_seqid + 1) == 0) 1502b85d4c01SBenny Halevy return nfs_ok; 1503b85d4c01SBenny Halevy /* Misordered replay or misordered new request */ 1504b85d4c01SBenny Halevy return nfserr_seq_misordered; 1505b85d4c01SBenny Halevy } 1506b85d4c01SBenny Halevy 150749557cc7SAndy Adamson /* 150849557cc7SAndy Adamson * Cache the create session result into the create session single DRC 150949557cc7SAndy Adamson * slot cache by saving the xdr structure. sl_seqid has been set. 151049557cc7SAndy Adamson * Do this for solo or embedded create session operations. 151149557cc7SAndy Adamson */ 151249557cc7SAndy Adamson static void 151349557cc7SAndy Adamson nfsd4_cache_create_session(struct nfsd4_create_session *cr_ses, 151449557cc7SAndy Adamson struct nfsd4_clid_slot *slot, int nfserr) 151549557cc7SAndy Adamson { 151649557cc7SAndy Adamson slot->sl_status = nfserr; 151749557cc7SAndy Adamson memcpy(&slot->sl_cr_ses, cr_ses, sizeof(*cr_ses)); 151849557cc7SAndy Adamson } 151949557cc7SAndy Adamson 152049557cc7SAndy Adamson static __be32 152149557cc7SAndy Adamson nfsd4_replay_create_session(struct nfsd4_create_session *cr_ses, 152249557cc7SAndy Adamson struct nfsd4_clid_slot *slot) 152349557cc7SAndy Adamson { 152449557cc7SAndy Adamson memcpy(cr_ses, &slot->sl_cr_ses, sizeof(*cr_ses)); 152549557cc7SAndy Adamson return slot->sl_status; 152649557cc7SAndy Adamson } 152749557cc7SAndy Adamson 15281b74c25bSMi Jinlong #define NFSD_MIN_REQ_HDR_SEQ_SZ ((\ 15291b74c25bSMi Jinlong 2 * 2 + /* credential,verifier: AUTH_NULL, length 0 */ \ 15301b74c25bSMi Jinlong 1 + /* MIN tag is length with zero, only length */ \ 15311b74c25bSMi Jinlong 3 + /* version, opcount, opcode */ \ 15321b74c25bSMi Jinlong XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + \ 15331b74c25bSMi Jinlong /* seqid, slotID, slotID, cache */ \ 15341b74c25bSMi Jinlong 4 ) * sizeof(__be32)) 15351b74c25bSMi Jinlong 15361b74c25bSMi Jinlong #define NFSD_MIN_RESP_HDR_SEQ_SZ ((\ 15371b74c25bSMi Jinlong 2 + /* verifier: AUTH_NULL, length 0 */\ 15381b74c25bSMi Jinlong 1 + /* status */ \ 15391b74c25bSMi Jinlong 1 + /* MIN tag is length with zero, only length */ \ 15401b74c25bSMi Jinlong 3 + /* opcount, opcode, opstatus*/ \ 15411b74c25bSMi Jinlong XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + \ 15421b74c25bSMi Jinlong /* seqid, slotID, slotID, slotID, status */ \ 15431b74c25bSMi Jinlong 5 ) * sizeof(__be32)) 15441b74c25bSMi Jinlong 15451b74c25bSMi Jinlong static __be32 check_forechannel_attrs(struct nfsd4_channel_attrs fchannel) 15461b74c25bSMi Jinlong { 15471b74c25bSMi Jinlong return fchannel.maxreq_sz < NFSD_MIN_REQ_HDR_SEQ_SZ 15481b74c25bSMi Jinlong || fchannel.maxresp_sz < NFSD_MIN_RESP_HDR_SEQ_SZ; 15491b74c25bSMi Jinlong } 15501b74c25bSMi Jinlong 1551069b6ad4SAndy Adamson __be32 1552069b6ad4SAndy Adamson nfsd4_create_session(struct svc_rqst *rqstp, 1553069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1554069b6ad4SAndy Adamson struct nfsd4_create_session *cr_ses) 1555069b6ad4SAndy Adamson { 1556363168b4SJeff Layton struct sockaddr *sa = svc_addr(rqstp); 1557ec6b5d7bSAndy Adamson struct nfs4_client *conf, *unconf; 1558ac7c46f2SJ. Bruce Fields struct nfsd4_session *new; 155949557cc7SAndy Adamson struct nfsd4_clid_slot *cs_slot = NULL; 156086c3e16cSJ. Bruce Fields bool confirm_me = false; 1561ec6b5d7bSAndy Adamson int status = 0; 1562ec6b5d7bSAndy Adamson 1563a62573dcSMi Jinlong if (cr_ses->flags & ~SESSION4_FLAG_MASK_A) 1564a62573dcSMi Jinlong return nfserr_inval; 1565a62573dcSMi Jinlong 1566ec6b5d7bSAndy Adamson nfs4_lock_state(); 1567ec6b5d7bSAndy Adamson unconf = find_unconfirmed_client(&cr_ses->clientid); 1568ec6b5d7bSAndy Adamson conf = find_confirmed_client(&cr_ses->clientid); 1569ec6b5d7bSAndy Adamson 1570ec6b5d7bSAndy Adamson if (conf) { 157149557cc7SAndy Adamson cs_slot = &conf->cl_cs_slot; 157249557cc7SAndy Adamson status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); 157338eb76a5SAndy Adamson if (status == nfserr_replay_cache) { 1574ec6b5d7bSAndy Adamson dprintk("Got a create_session replay! seqid= %d\n", 157549557cc7SAndy Adamson cs_slot->sl_seqid); 157638eb76a5SAndy Adamson /* Return the cached reply status */ 157749557cc7SAndy Adamson status = nfsd4_replay_create_session(cr_ses, cs_slot); 157838eb76a5SAndy Adamson goto out; 157949557cc7SAndy Adamson } else if (cr_ses->seqid != cs_slot->sl_seqid + 1) { 1580ec6b5d7bSAndy Adamson status = nfserr_seq_misordered; 1581ec6b5d7bSAndy Adamson dprintk("Sequence misordered!\n"); 1582ec6b5d7bSAndy Adamson dprintk("Expected seqid= %d but got seqid= %d\n", 158349557cc7SAndy Adamson cs_slot->sl_seqid, cr_ses->seqid); 1584ec6b5d7bSAndy Adamson goto out; 1585ec6b5d7bSAndy Adamson } 1586ec6b5d7bSAndy Adamson } else if (unconf) { 1587ec6b5d7bSAndy Adamson if (!same_creds(&unconf->cl_cred, &rqstp->rq_cred) || 1588363168b4SJeff Layton !rpc_cmp_addr(sa, (struct sockaddr *) &unconf->cl_addr)) { 1589ec6b5d7bSAndy Adamson status = nfserr_clid_inuse; 1590ec6b5d7bSAndy Adamson goto out; 1591ec6b5d7bSAndy Adamson } 1592ec6b5d7bSAndy Adamson 159349557cc7SAndy Adamson cs_slot = &unconf->cl_cs_slot; 159449557cc7SAndy Adamson status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); 159538eb76a5SAndy Adamson if (status) { 159638eb76a5SAndy Adamson /* an unconfirmed replay returns misordered */ 1597ec6b5d7bSAndy Adamson status = nfserr_seq_misordered; 1598cd5b8144SJ. Bruce Fields goto out; 1599ec6b5d7bSAndy Adamson } 1600ec6b5d7bSAndy Adamson 160186c3e16cSJ. Bruce Fields confirm_me = true; 1602ec6b5d7bSAndy Adamson conf = unconf; 1603ec6b5d7bSAndy Adamson } else { 1604ec6b5d7bSAndy Adamson status = nfserr_stale_clientid; 1605ec6b5d7bSAndy Adamson goto out; 1606ec6b5d7bSAndy Adamson } 1607ec6b5d7bSAndy Adamson 1608408b79bcSJ. Bruce Fields /* 16098323c3b2SJ. Bruce Fields * XXX: we should probably set this at creation time, and check 16108323c3b2SJ. Bruce Fields * for consistent minorversion use throughout: 16118323c3b2SJ. Bruce Fields */ 16128323c3b2SJ. Bruce Fields conf->cl_minorversion = 1; 16138323c3b2SJ. Bruce Fields /* 1614408b79bcSJ. Bruce Fields * We do not support RDMA or persistent sessions 1615408b79bcSJ. Bruce Fields */ 1616408b79bcSJ. Bruce Fields cr_ses->flags &= ~SESSION4_PERSIST; 1617408b79bcSJ. Bruce Fields cr_ses->flags &= ~SESSION4_RDMA; 1618408b79bcSJ. Bruce Fields 16191b74c25bSMi Jinlong status = nfserr_toosmall; 16201b74c25bSMi Jinlong if (check_forechannel_attrs(cr_ses->fore_channel)) 16211b74c25bSMi Jinlong goto out; 16221b74c25bSMi Jinlong 1623ac7c46f2SJ. Bruce Fields status = nfserr_jukebox; 1624ac7c46f2SJ. Bruce Fields new = alloc_init_session(rqstp, conf, cr_ses); 1625ac7c46f2SJ. Bruce Fields if (!new) 1626ec6b5d7bSAndy Adamson goto out; 1627ac7c46f2SJ. Bruce Fields status = nfs_ok; 1628ac7c46f2SJ. Bruce Fields memcpy(cr_ses->sessionid.data, new->se_sessionid.data, 1629ec6b5d7bSAndy Adamson NFS4_MAX_SESSIONID_LEN); 163012050657SMi Jinlong memcpy(&cr_ses->fore_channel, &new->se_fchannel, 163112050657SMi Jinlong sizeof(struct nfsd4_channel_attrs)); 163286c3e16cSJ. Bruce Fields cs_slot->sl_seqid++; 163349557cc7SAndy Adamson cr_ses->seqid = cs_slot->sl_seqid; 1634ec6b5d7bSAndy Adamson 163549557cc7SAndy Adamson /* cache solo and embedded create sessions under the state lock */ 163649557cc7SAndy Adamson nfsd4_cache_create_session(cr_ses, cs_slot, status); 163786c3e16cSJ. Bruce Fields if (confirm_me) 163886c3e16cSJ. Bruce Fields move_to_confirmed(conf); 1639ec6b5d7bSAndy Adamson out: 1640ec6b5d7bSAndy Adamson nfs4_unlock_state(); 1641ec6b5d7bSAndy Adamson dprintk("%s returns %d\n", __func__, ntohl(status)); 1642ec6b5d7bSAndy Adamson return status; 1643069b6ad4SAndy Adamson } 1644069b6ad4SAndy Adamson 164557716355SJ. Bruce Fields static bool nfsd4_last_compound_op(struct svc_rqst *rqstp) 164657716355SJ. Bruce Fields { 164757716355SJ. Bruce Fields struct nfsd4_compoundres *resp = rqstp->rq_resp; 164857716355SJ. Bruce Fields struct nfsd4_compoundargs *argp = rqstp->rq_argp; 164957716355SJ. Bruce Fields 165057716355SJ. Bruce Fields return argp->opcnt == resp->opcnt; 165157716355SJ. Bruce Fields } 165257716355SJ. Bruce Fields 16531d1bc8f2SJ. Bruce Fields static __be32 nfsd4_map_bcts_dir(u32 *dir) 16541d1bc8f2SJ. Bruce Fields { 16551d1bc8f2SJ. Bruce Fields switch (*dir) { 16561d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_FORE: 16571d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_BACK: 16581d1bc8f2SJ. Bruce Fields return nfs_ok; 16591d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_FORE_OR_BOTH: 16601d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_BACK_OR_BOTH: 16611d1bc8f2SJ. Bruce Fields *dir = NFS4_CDFC4_BOTH; 16621d1bc8f2SJ. Bruce Fields return nfs_ok; 16631d1bc8f2SJ. Bruce Fields }; 16641d1bc8f2SJ. Bruce Fields return nfserr_inval; 16651d1bc8f2SJ. Bruce Fields } 16661d1bc8f2SJ. Bruce Fields 16671d1bc8f2SJ. Bruce Fields __be32 nfsd4_bind_conn_to_session(struct svc_rqst *rqstp, 16681d1bc8f2SJ. Bruce Fields struct nfsd4_compound_state *cstate, 16691d1bc8f2SJ. Bruce Fields struct nfsd4_bind_conn_to_session *bcts) 16701d1bc8f2SJ. Bruce Fields { 16711d1bc8f2SJ. Bruce Fields __be32 status; 16721d1bc8f2SJ. Bruce Fields 16731d1bc8f2SJ. Bruce Fields if (!nfsd4_last_compound_op(rqstp)) 16741d1bc8f2SJ. Bruce Fields return nfserr_not_only_op; 16751d1bc8f2SJ. Bruce Fields spin_lock(&client_lock); 16761d1bc8f2SJ. Bruce Fields cstate->session = find_in_sessionid_hashtbl(&bcts->sessionid); 16771d1bc8f2SJ. Bruce Fields /* Sorta weird: we only need the refcnt'ing because new_conn acquires 16781d1bc8f2SJ. Bruce Fields * client_lock iself: */ 16791d1bc8f2SJ. Bruce Fields if (cstate->session) { 16801d1bc8f2SJ. Bruce Fields nfsd4_get_session(cstate->session); 16811d1bc8f2SJ. Bruce Fields atomic_inc(&cstate->session->se_client->cl_refcount); 16821d1bc8f2SJ. Bruce Fields } 16831d1bc8f2SJ. Bruce Fields spin_unlock(&client_lock); 16841d1bc8f2SJ. Bruce Fields if (!cstate->session) 16851d1bc8f2SJ. Bruce Fields return nfserr_badsession; 16861d1bc8f2SJ. Bruce Fields 16871d1bc8f2SJ. Bruce Fields status = nfsd4_map_bcts_dir(&bcts->dir); 16881db2b9ddSBryan Schumaker if (!status) 16891d1bc8f2SJ. Bruce Fields nfsd4_new_conn(rqstp, cstate->session, bcts->dir); 16901db2b9ddSBryan Schumaker return status; 16911d1bc8f2SJ. Bruce Fields } 16921d1bc8f2SJ. Bruce Fields 16935d4cec2fSJ. Bruce Fields static bool nfsd4_compound_in_session(struct nfsd4_session *session, struct nfs4_sessionid *sid) 16945d4cec2fSJ. Bruce Fields { 16955d4cec2fSJ. Bruce Fields if (!session) 16965d4cec2fSJ. Bruce Fields return 0; 16975d4cec2fSJ. Bruce Fields return !memcmp(sid, &session->se_sessionid, sizeof(*sid)); 16985d4cec2fSJ. Bruce Fields } 16995d4cec2fSJ. Bruce Fields 1700069b6ad4SAndy Adamson __be32 1701069b6ad4SAndy Adamson nfsd4_destroy_session(struct svc_rqst *r, 1702069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1703069b6ad4SAndy Adamson struct nfsd4_destroy_session *sessionid) 1704069b6ad4SAndy Adamson { 1705e10e0cfcSBenny Halevy struct nfsd4_session *ses; 1706e10e0cfcSBenny Halevy u32 status = nfserr_badsession; 1707e10e0cfcSBenny Halevy 1708e10e0cfcSBenny Halevy /* Notes: 1709e10e0cfcSBenny Halevy * - The confirmed nfs4_client->cl_sessionid holds destroyed sessinid 1710e10e0cfcSBenny Halevy * - Should we return nfserr_back_chan_busy if waiting for 1711e10e0cfcSBenny Halevy * callbacks on to-be-destroyed session? 1712e10e0cfcSBenny Halevy * - Do we need to clear any callback info from previous session? 1713e10e0cfcSBenny Halevy */ 1714e10e0cfcSBenny Halevy 17155d4cec2fSJ. Bruce Fields if (nfsd4_compound_in_session(cstate->session, &sessionid->sessionid)) { 171657716355SJ. Bruce Fields if (!nfsd4_last_compound_op(r)) 171757716355SJ. Bruce Fields return nfserr_not_only_op; 171857716355SJ. Bruce Fields } 1719e10e0cfcSBenny Halevy dump_sessionid(__func__, &sessionid->sessionid); 17209089f1b4SBenny Halevy spin_lock(&client_lock); 1721e10e0cfcSBenny Halevy ses = find_in_sessionid_hashtbl(&sessionid->sessionid); 1722e10e0cfcSBenny Halevy if (!ses) { 17239089f1b4SBenny Halevy spin_unlock(&client_lock); 1724e10e0cfcSBenny Halevy goto out; 1725e10e0cfcSBenny Halevy } 1726e10e0cfcSBenny Halevy 1727e10e0cfcSBenny Halevy unhash_session(ses); 17289089f1b4SBenny Halevy spin_unlock(&client_lock); 1729e10e0cfcSBenny Halevy 1730ab707e15SBenny Halevy nfs4_lock_state(); 173184f5f7ccSJ. Bruce Fields nfsd4_probe_callback_sync(ses->se_client); 1732ab707e15SBenny Halevy nfs4_unlock_state(); 173319cf5c02SJ. Bruce Fields 173419cf5c02SJ. Bruce Fields nfsd4_del_conns(ses); 173519cf5c02SJ. Bruce Fields 1736e10e0cfcSBenny Halevy nfsd4_put_session(ses); 1737e10e0cfcSBenny Halevy status = nfs_ok; 1738e10e0cfcSBenny Halevy out: 1739e10e0cfcSBenny Halevy dprintk("%s returns %d\n", __func__, ntohl(status)); 1740e10e0cfcSBenny Halevy return status; 1741069b6ad4SAndy Adamson } 1742069b6ad4SAndy Adamson 1743a663bdd8SJ. Bruce Fields static struct nfsd4_conn *__nfsd4_find_conn(struct svc_xprt *xpt, struct nfsd4_session *s) 1744328ead28SJ. Bruce Fields { 1745328ead28SJ. Bruce Fields struct nfsd4_conn *c; 1746328ead28SJ. Bruce Fields 1747328ead28SJ. Bruce Fields list_for_each_entry(c, &s->se_conns, cn_persession) { 1748a663bdd8SJ. Bruce Fields if (c->cn_xprt == xpt) { 1749328ead28SJ. Bruce Fields return c; 1750328ead28SJ. Bruce Fields } 1751328ead28SJ. Bruce Fields } 1752328ead28SJ. Bruce Fields return NULL; 1753328ead28SJ. Bruce Fields } 1754328ead28SJ. Bruce Fields 1755a663bdd8SJ. Bruce Fields static void nfsd4_sequence_check_conn(struct nfsd4_conn *new, struct nfsd4_session *ses) 1756328ead28SJ. Bruce Fields { 1757328ead28SJ. Bruce Fields struct nfs4_client *clp = ses->se_client; 1758a663bdd8SJ. Bruce Fields struct nfsd4_conn *c; 175921b75b01SJ. Bruce Fields int ret; 1760328ead28SJ. Bruce Fields 1761328ead28SJ. Bruce Fields spin_lock(&clp->cl_lock); 1762a663bdd8SJ. Bruce Fields c = __nfsd4_find_conn(new->cn_xprt, ses); 1763328ead28SJ. Bruce Fields if (c) { 1764328ead28SJ. Bruce Fields spin_unlock(&clp->cl_lock); 1765328ead28SJ. Bruce Fields free_conn(new); 1766328ead28SJ. Bruce Fields return; 1767328ead28SJ. Bruce Fields } 1768328ead28SJ. Bruce Fields __nfsd4_hash_conn(new, ses); 1769328ead28SJ. Bruce Fields spin_unlock(&clp->cl_lock); 177021b75b01SJ. Bruce Fields ret = nfsd4_register_conn(new); 177121b75b01SJ. Bruce Fields if (ret) 177221b75b01SJ. Bruce Fields /* oops; xprt is already down: */ 177321b75b01SJ. Bruce Fields nfsd4_conn_lost(&new->cn_xpt_user); 1774328ead28SJ. Bruce Fields return; 1775328ead28SJ. Bruce Fields } 1776328ead28SJ. Bruce Fields 1777868b89c3SMi Jinlong static bool nfsd4_session_too_many_ops(struct svc_rqst *rqstp, struct nfsd4_session *session) 1778868b89c3SMi Jinlong { 1779868b89c3SMi Jinlong struct nfsd4_compoundargs *args = rqstp->rq_argp; 1780868b89c3SMi Jinlong 1781868b89c3SMi Jinlong return args->opcnt > session->se_fchannel.maxops; 1782868b89c3SMi Jinlong } 1783868b89c3SMi Jinlong 1784ae82a8d0SMi Jinlong static bool nfsd4_request_too_big(struct svc_rqst *rqstp, 1785ae82a8d0SMi Jinlong struct nfsd4_session *session) 1786ae82a8d0SMi Jinlong { 1787ae82a8d0SMi Jinlong struct xdr_buf *xb = &rqstp->rq_arg; 1788ae82a8d0SMi Jinlong 1789ae82a8d0SMi Jinlong return xb->len > session->se_fchannel.maxreq_sz; 1790ae82a8d0SMi Jinlong } 1791ae82a8d0SMi Jinlong 1792069b6ad4SAndy Adamson __be32 1793b85d4c01SBenny Halevy nfsd4_sequence(struct svc_rqst *rqstp, 1794069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1795069b6ad4SAndy Adamson struct nfsd4_sequence *seq) 1796069b6ad4SAndy Adamson { 1797f9bb94c4SAndy Adamson struct nfsd4_compoundres *resp = rqstp->rq_resp; 1798b85d4c01SBenny Halevy struct nfsd4_session *session; 1799b85d4c01SBenny Halevy struct nfsd4_slot *slot; 1800a663bdd8SJ. Bruce Fields struct nfsd4_conn *conn; 1801b85d4c01SBenny Halevy int status; 1802b85d4c01SBenny Halevy 1803f9bb94c4SAndy Adamson if (resp->opcnt != 1) 1804f9bb94c4SAndy Adamson return nfserr_sequence_pos; 1805f9bb94c4SAndy Adamson 1806a663bdd8SJ. Bruce Fields /* 1807a663bdd8SJ. Bruce Fields * Will be either used or freed by nfsd4_sequence_check_conn 1808a663bdd8SJ. Bruce Fields * below. 1809a663bdd8SJ. Bruce Fields */ 1810a663bdd8SJ. Bruce Fields conn = alloc_conn(rqstp, NFS4_CDFC4_FORE); 1811a663bdd8SJ. Bruce Fields if (!conn) 1812a663bdd8SJ. Bruce Fields return nfserr_jukebox; 1813a663bdd8SJ. Bruce Fields 18149089f1b4SBenny Halevy spin_lock(&client_lock); 1815b85d4c01SBenny Halevy status = nfserr_badsession; 1816b85d4c01SBenny Halevy session = find_in_sessionid_hashtbl(&seq->sessionid); 1817b85d4c01SBenny Halevy if (!session) 1818b85d4c01SBenny Halevy goto out; 1819b85d4c01SBenny Halevy 1820868b89c3SMi Jinlong status = nfserr_too_many_ops; 1821868b89c3SMi Jinlong if (nfsd4_session_too_many_ops(rqstp, session)) 1822868b89c3SMi Jinlong goto out; 1823868b89c3SMi Jinlong 1824ae82a8d0SMi Jinlong status = nfserr_req_too_big; 1825ae82a8d0SMi Jinlong if (nfsd4_request_too_big(rqstp, session)) 1826ae82a8d0SMi Jinlong goto out; 1827ae82a8d0SMi Jinlong 1828b85d4c01SBenny Halevy status = nfserr_badslot; 18296c18ba9fSAlexandros Batsakis if (seq->slotid >= session->se_fchannel.maxreqs) 1830b85d4c01SBenny Halevy goto out; 1831b85d4c01SBenny Halevy 1832557ce264SAndy Adamson slot = session->se_slots[seq->slotid]; 1833b85d4c01SBenny Halevy dprintk("%s: slotid %d\n", __func__, seq->slotid); 1834b85d4c01SBenny Halevy 1835a8dfdaebSAndy Adamson /* We do not negotiate the number of slots yet, so set the 1836a8dfdaebSAndy Adamson * maxslots to the session maxreqs which is used to encode 1837a8dfdaebSAndy Adamson * sr_highest_slotid and the sr_target_slot id to maxslots */ 1838a8dfdaebSAndy Adamson seq->maxslots = session->se_fchannel.maxreqs; 1839a8dfdaebSAndy Adamson 184088e588d5SAndy Adamson status = check_slot_seqid(seq->seqid, slot->sl_seqid, slot->sl_inuse); 1841b85d4c01SBenny Halevy if (status == nfserr_replay_cache) { 1842b85d4c01SBenny Halevy cstate->slot = slot; 1843b85d4c01SBenny Halevy cstate->session = session; 1844da3846a2SAndy Adamson /* Return the cached reply status and set cstate->status 1845557ce264SAndy Adamson * for nfsd4_proc_compound processing */ 1846bf864a31SAndy Adamson status = nfsd4_replay_cache_entry(resp, seq); 1847da3846a2SAndy Adamson cstate->status = nfserr_replay_cache; 1848aaf84eb9SBenny Halevy goto out; 1849b85d4c01SBenny Halevy } 1850b85d4c01SBenny Halevy if (status) 1851b85d4c01SBenny Halevy goto out; 1852b85d4c01SBenny Halevy 1853a663bdd8SJ. Bruce Fields nfsd4_sequence_check_conn(conn, session); 1854a663bdd8SJ. Bruce Fields conn = NULL; 1855328ead28SJ. Bruce Fields 1856b85d4c01SBenny Halevy /* Success! bump slot seqid */ 1857b85d4c01SBenny Halevy slot->sl_inuse = true; 1858b85d4c01SBenny Halevy slot->sl_seqid = seq->seqid; 1859557ce264SAndy Adamson slot->sl_cachethis = seq->cachethis; 1860b85d4c01SBenny Halevy 1861b85d4c01SBenny Halevy cstate->slot = slot; 1862b85d4c01SBenny Halevy cstate->session = session; 1863b85d4c01SBenny Halevy 1864b85d4c01SBenny Halevy out: 186526c0c75eSJ. Bruce Fields /* Hold a session reference until done processing the compound. */ 1866aaf84eb9SBenny Halevy if (cstate->session) { 18670d7bb719SJ. Bruce Fields struct nfs4_client *clp = session->se_client; 18680d7bb719SJ. Bruce Fields 186936acb66bSBenny Halevy nfsd4_get_session(cstate->session); 18700d7bb719SJ. Bruce Fields atomic_inc(&clp->cl_refcount); 18710d7bb719SJ. Bruce Fields if (clp->cl_cb_state == NFSD4_CB_DOWN) 18720d7bb719SJ. Bruce Fields seq->status_flags |= SEQ4_STATUS_CB_PATH_DOWN; 1873aaf84eb9SBenny Halevy } 1874a663bdd8SJ. Bruce Fields kfree(conn); 187536acb66bSBenny Halevy spin_unlock(&client_lock); 1876b85d4c01SBenny Halevy dprintk("%s: return %d\n", __func__, ntohl(status)); 1877b85d4c01SBenny Halevy return status; 1878069b6ad4SAndy Adamson } 1879069b6ad4SAndy Adamson 1880069b6ad4SAndy Adamson __be32 18814dc6ec00SJ. Bruce Fields nfsd4_reclaim_complete(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_reclaim_complete *rc) 18824dc6ec00SJ. Bruce Fields { 1883bcecf1ccSMi Jinlong int status = 0; 1884bcecf1ccSMi Jinlong 18854dc6ec00SJ. Bruce Fields if (rc->rca_one_fs) { 18864dc6ec00SJ. Bruce Fields if (!cstate->current_fh.fh_dentry) 18874dc6ec00SJ. Bruce Fields return nfserr_nofilehandle; 18884dc6ec00SJ. Bruce Fields /* 18894dc6ec00SJ. Bruce Fields * We don't take advantage of the rca_one_fs case. 18904dc6ec00SJ. Bruce Fields * That's OK, it's optional, we can safely ignore it. 18914dc6ec00SJ. Bruce Fields */ 18924dc6ec00SJ. Bruce Fields return nfs_ok; 18934dc6ec00SJ. Bruce Fields } 1894bcecf1ccSMi Jinlong 18954dc6ec00SJ. Bruce Fields nfs4_lock_state(); 1896bcecf1ccSMi Jinlong status = nfserr_complete_already; 1897bcecf1ccSMi Jinlong if (cstate->session->se_client->cl_firststate) 1898bcecf1ccSMi Jinlong goto out; 1899bcecf1ccSMi Jinlong 1900bcecf1ccSMi Jinlong status = nfserr_stale_clientid; 1901bcecf1ccSMi Jinlong if (is_client_expired(cstate->session->se_client)) 19024dc6ec00SJ. Bruce Fields /* 19034dc6ec00SJ. Bruce Fields * The following error isn't really legal. 19044dc6ec00SJ. Bruce Fields * But we only get here if the client just explicitly 19054dc6ec00SJ. Bruce Fields * destroyed the client. Surely it no longer cares what 19064dc6ec00SJ. Bruce Fields * error it gets back on an operation for the dead 19074dc6ec00SJ. Bruce Fields * client. 19084dc6ec00SJ. Bruce Fields */ 1909bcecf1ccSMi Jinlong goto out; 1910bcecf1ccSMi Jinlong 1911bcecf1ccSMi Jinlong status = nfs_ok; 19124dc6ec00SJ. Bruce Fields nfsd4_create_clid_dir(cstate->session->se_client); 1913bcecf1ccSMi Jinlong out: 19144dc6ec00SJ. Bruce Fields nfs4_unlock_state(); 1915bcecf1ccSMi Jinlong return status; 19164dc6ec00SJ. Bruce Fields } 19174dc6ec00SJ. Bruce Fields 19184dc6ec00SJ. Bruce Fields __be32 1919b591480bSJ.Bruce Fields nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1920b591480bSJ.Bruce Fields struct nfsd4_setclientid *setclid) 19211da177e4SLinus Torvalds { 19221da177e4SLinus Torvalds struct xdr_netobj clname = { 19231da177e4SLinus Torvalds .len = setclid->se_namelen, 19241da177e4SLinus Torvalds .data = setclid->se_name, 19251da177e4SLinus Torvalds }; 19261da177e4SLinus Torvalds nfs4_verifier clverifier = setclid->se_verf; 19271da177e4SLinus Torvalds unsigned int strhashval; 192828ce6054SNeilBrown struct nfs4_client *conf, *unconf, *new; 1929b37ad28bSAl Viro __be32 status; 1930a55370a3SNeilBrown char dname[HEXDIR_LEN]; 19311da177e4SLinus Torvalds 19321da177e4SLinus Torvalds if (!check_name(clname)) 193373aea4ecSNeil Brown return nfserr_inval; 19341da177e4SLinus Torvalds 1935a55370a3SNeilBrown status = nfs4_make_rec_clidname(dname, &clname); 1936a55370a3SNeilBrown if (status) 193773aea4ecSNeil Brown return status; 1938a55370a3SNeilBrown 19391da177e4SLinus Torvalds /* 19401da177e4SLinus Torvalds * XXX The Duplicate Request Cache (DRC) has been checked (??) 19411da177e4SLinus Torvalds * We get here on a DRC miss. 19421da177e4SLinus Torvalds */ 19431da177e4SLinus Torvalds 1944a55370a3SNeilBrown strhashval = clientstr_hashval(dname); 19451da177e4SLinus Torvalds 19461da177e4SLinus Torvalds nfs4_lock_state(); 1947e203d506SJ. Bruce Fields conf = find_confirmed_client_by_str(dname, strhashval); 194828ce6054SNeilBrown if (conf) { 1949a186e767SJ. Bruce Fields /* RFC 3530 14.2.33 CASE 0: */ 19501da177e4SLinus Torvalds status = nfserr_clid_inuse; 1951e203d506SJ. Bruce Fields if (clp_used_exchangeid(conf)) 1952e203d506SJ. Bruce Fields goto out; 1953026722c2SJ. Bruce Fields if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) { 1954363168b4SJeff Layton char addr_str[INET6_ADDRSTRLEN]; 1955363168b4SJeff Layton rpc_ntop((struct sockaddr *) &conf->cl_addr, addr_str, 1956363168b4SJeff Layton sizeof(addr_str)); 1957026722c2SJ. Bruce Fields dprintk("NFSD: setclientid: string in use by client " 1958363168b4SJeff Layton "at %s\n", addr_str); 19591da177e4SLinus Torvalds goto out; 19601da177e4SLinus Torvalds } 19611da177e4SLinus Torvalds } 1962a186e767SJ. Bruce Fields /* 1963a186e767SJ. Bruce Fields * section 14.2.33 of RFC 3530 (under the heading "IMPLEMENTATION") 1964a186e767SJ. Bruce Fields * has a description of SETCLIENTID request processing consisting 1965a186e767SJ. Bruce Fields * of 5 bullet points, labeled as CASE0 - CASE4 below. 1966a186e767SJ. Bruce Fields */ 1967e203d506SJ. Bruce Fields unconf = find_unconfirmed_client_by_str(dname, strhashval); 19683e772463SJ. Bruce Fields status = nfserr_jukebox; 19691da177e4SLinus Torvalds if (!conf) { 19701da177e4SLinus Torvalds /* 1971a186e767SJ. Bruce Fields * RFC 3530 14.2.33 CASE 4: 1972a186e767SJ. Bruce Fields * placed first, because it is the normal case 19731da177e4SLinus Torvalds */ 19741da177e4SLinus Torvalds if (unconf) 19751da177e4SLinus Torvalds expire_client(unconf); 1976b09333c4SRicardo Labiaga new = create_client(clname, dname, rqstp, &clverifier); 1977a55370a3SNeilBrown if (new == NULL) 19781da177e4SLinus Torvalds goto out; 19791da177e4SLinus Torvalds gen_clid(new); 1980599e0a22SJ. Bruce Fields } else if (same_verf(&conf->cl_verifier, &clverifier)) { 19811da177e4SLinus Torvalds /* 1982a186e767SJ. Bruce Fields * RFC 3530 14.2.33 CASE 1: 1983a186e767SJ. Bruce Fields * probable callback update 19841da177e4SLinus Torvalds */ 198531f4a6c1SNeilBrown if (unconf) { 198631f4a6c1SNeilBrown /* Note this is removing unconfirmed {*x***}, 198731f4a6c1SNeilBrown * which is stronger than RFC recommended {vxc**}. 198831f4a6c1SNeilBrown * This has the advantage that there is at most 198931f4a6c1SNeilBrown * one {*x***} in either list at any time. 199031f4a6c1SNeilBrown */ 19911da177e4SLinus Torvalds expire_client(unconf); 19921da177e4SLinus Torvalds } 1993b09333c4SRicardo Labiaga new = create_client(clname, dname, rqstp, &clverifier); 1994a55370a3SNeilBrown if (new == NULL) 19951da177e4SLinus Torvalds goto out; 19961da177e4SLinus Torvalds copy_clid(new, conf); 19971da177e4SLinus Torvalds } else if (!unconf) { 19981da177e4SLinus Torvalds /* 1999a186e767SJ. Bruce Fields * RFC 3530 14.2.33 CASE 2: 2000a186e767SJ. Bruce Fields * probable client reboot; state will be removed if 2001a186e767SJ. Bruce Fields * confirmed. 20021da177e4SLinus Torvalds */ 2003b09333c4SRicardo Labiaga new = create_client(clname, dname, rqstp, &clverifier); 2004a55370a3SNeilBrown if (new == NULL) 20051da177e4SLinus Torvalds goto out; 20061da177e4SLinus Torvalds gen_clid(new); 200749ba8781SJ. Bruce Fields } else { 20081da177e4SLinus Torvalds /* 2009a186e767SJ. Bruce Fields * RFC 3530 14.2.33 CASE 3: 2010a186e767SJ. Bruce Fields * probable client reboot; state will be removed if 2011a186e767SJ. Bruce Fields * confirmed. 20121da177e4SLinus Torvalds */ 20131da177e4SLinus Torvalds expire_client(unconf); 2014b09333c4SRicardo Labiaga new = create_client(clname, dname, rqstp, &clverifier); 2015a55370a3SNeilBrown if (new == NULL) 20161da177e4SLinus Torvalds goto out; 20171da177e4SLinus Torvalds gen_clid(new); 20181da177e4SLinus Torvalds } 20198323c3b2SJ. Bruce Fields /* 20208323c3b2SJ. Bruce Fields * XXX: we should probably set this at creation time, and check 20218323c3b2SJ. Bruce Fields * for consistent minorversion use throughout: 20228323c3b2SJ. Bruce Fields */ 20238323c3b2SJ. Bruce Fields new->cl_minorversion = 0; 20246f3d772fSTakuma Umeya gen_callback(new, setclid, rqstp); 2025c175b83cSJ. Bruce Fields add_to_unconfirmed(new, strhashval); 20261da177e4SLinus Torvalds setclid->se_clientid.cl_boot = new->cl_clientid.cl_boot; 20271da177e4SLinus Torvalds setclid->se_clientid.cl_id = new->cl_clientid.cl_id; 20281da177e4SLinus Torvalds memcpy(setclid->se_confirm.data, new->cl_confirm.data, sizeof(setclid->se_confirm.data)); 20291da177e4SLinus Torvalds status = nfs_ok; 20301da177e4SLinus Torvalds out: 20311da177e4SLinus Torvalds nfs4_unlock_state(); 20321da177e4SLinus Torvalds return status; 20331da177e4SLinus Torvalds } 20341da177e4SLinus Torvalds 20351da177e4SLinus Torvalds 20361da177e4SLinus Torvalds /* 2037a186e767SJ. Bruce Fields * Section 14.2.34 of RFC 3530 (under the heading "IMPLEMENTATION") has 2038a186e767SJ. Bruce Fields * a description of SETCLIENTID_CONFIRM request processing consisting of 4 2039a186e767SJ. Bruce Fields * bullets, labeled as CASE1 - CASE4 below. 20401da177e4SLinus Torvalds */ 2041b37ad28bSAl Viro __be32 2042b591480bSJ.Bruce Fields nfsd4_setclientid_confirm(struct svc_rqst *rqstp, 2043b591480bSJ.Bruce Fields struct nfsd4_compound_state *cstate, 2044b591480bSJ.Bruce Fields struct nfsd4_setclientid_confirm *setclientid_confirm) 20451da177e4SLinus Torvalds { 2046363168b4SJeff Layton struct sockaddr *sa = svc_addr(rqstp); 204721ab45a4SNeilBrown struct nfs4_client *conf, *unconf; 20481da177e4SLinus Torvalds nfs4_verifier confirm = setclientid_confirm->sc_confirm; 20491da177e4SLinus Torvalds clientid_t * clid = &setclientid_confirm->sc_clientid; 2050b37ad28bSAl Viro __be32 status; 20511da177e4SLinus Torvalds 20521da177e4SLinus Torvalds if (STALE_CLIENTID(clid)) 20531da177e4SLinus Torvalds return nfserr_stale_clientid; 20541da177e4SLinus Torvalds /* 20551da177e4SLinus Torvalds * XXX The Duplicate Request Cache (DRC) has been checked (??) 20561da177e4SLinus Torvalds * We get here on a DRC miss. 20571da177e4SLinus Torvalds */ 20581da177e4SLinus Torvalds 20591da177e4SLinus Torvalds nfs4_lock_state(); 206021ab45a4SNeilBrown 206121ab45a4SNeilBrown conf = find_confirmed_client(clid); 206221ab45a4SNeilBrown unconf = find_unconfirmed_client(clid); 206321ab45a4SNeilBrown 206422de4d83SNeilBrown status = nfserr_clid_inuse; 2065363168b4SJeff Layton if (conf && !rpc_cmp_addr((struct sockaddr *) &conf->cl_addr, sa)) 20661da177e4SLinus Torvalds goto out; 2067363168b4SJeff Layton if (unconf && !rpc_cmp_addr((struct sockaddr *) &unconf->cl_addr, sa)) 20681da177e4SLinus Torvalds goto out; 206921ab45a4SNeilBrown 2070a186e767SJ. Bruce Fields /* 2071a186e767SJ. Bruce Fields * section 14.2.34 of RFC 3530 has a description of 2072a186e767SJ. Bruce Fields * SETCLIENTID_CONFIRM request processing consisting 2073a186e767SJ. Bruce Fields * of 4 bullet points, labeled as CASE1 - CASE4 below. 2074a186e767SJ. Bruce Fields */ 2075366e0c1dSJ. Bruce Fields if (conf && unconf && same_verf(&confirm, &unconf->cl_confirm)) { 2076a186e767SJ. Bruce Fields /* 2077a186e767SJ. Bruce Fields * RFC 3530 14.2.34 CASE 1: 2078a186e767SJ. Bruce Fields * callback update 20797c79f737SNeilBrown */ 2080599e0a22SJ. Bruce Fields if (!same_creds(&conf->cl_cred, &unconf->cl_cred)) 20811da177e4SLinus Torvalds status = nfserr_clid_inuse; 20821da177e4SLinus Torvalds else { 20835a3c9d71SJ. Bruce Fields nfsd4_change_callback(conf, &unconf->cl_cb_conn); 20845a3c9d71SJ. Bruce Fields nfsd4_probe_callback(conf); 20851a69c179SNeilBrown expire_client(unconf); 20861da177e4SLinus Torvalds status = nfs_ok; 20871a69c179SNeilBrown 20881da177e4SLinus Torvalds } 2089f3aba4e5SJ. Bruce Fields } else if (conf && !unconf) { 2090a186e767SJ. Bruce Fields /* 2091a186e767SJ. Bruce Fields * RFC 3530 14.2.34 CASE 2: 2092a186e767SJ. Bruce Fields * probable retransmitted request; play it safe and 2093a186e767SJ. Bruce Fields * do nothing. 20947c79f737SNeilBrown */ 2095599e0a22SJ. Bruce Fields if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) 20961da177e4SLinus Torvalds status = nfserr_clid_inuse; 209721ab45a4SNeilBrown else 20981da177e4SLinus Torvalds status = nfs_ok; 20997c79f737SNeilBrown } else if (!conf && unconf 2100599e0a22SJ. Bruce Fields && same_verf(&unconf->cl_confirm, &confirm)) { 2101a186e767SJ. Bruce Fields /* 2102a186e767SJ. Bruce Fields * RFC 3530 14.2.34 CASE 3: 2103a186e767SJ. Bruce Fields * Normal case; new or rebooted client: 21041da177e4SLinus Torvalds */ 2105599e0a22SJ. Bruce Fields if (!same_creds(&unconf->cl_cred, &rqstp->rq_cred)) { 21061da177e4SLinus Torvalds status = nfserr_clid_inuse; 21071da177e4SLinus Torvalds } else { 21081a69c179SNeilBrown unsigned int hash = 21091a69c179SNeilBrown clientstr_hashval(unconf->cl_recdir); 21101a69c179SNeilBrown conf = find_confirmed_client_by_str(unconf->cl_recdir, 2111e203d506SJ. Bruce Fields hash); 21121a69c179SNeilBrown if (conf) { 2113c7b9a459SNeilBrown nfsd4_remove_clid_dir(conf); 21141a69c179SNeilBrown expire_client(conf); 21151a69c179SNeilBrown } 21161da177e4SLinus Torvalds move_to_confirmed(unconf); 211721ab45a4SNeilBrown conf = unconf; 21185a3c9d71SJ. Bruce Fields nfsd4_probe_callback(conf); 21191a69c179SNeilBrown status = nfs_ok; 21201da177e4SLinus Torvalds } 2121599e0a22SJ. Bruce Fields } else if ((!conf || (conf && !same_verf(&conf->cl_confirm, &confirm))) 2122599e0a22SJ. Bruce Fields && (!unconf || (unconf && !same_verf(&unconf->cl_confirm, 21237c79f737SNeilBrown &confirm)))) { 2124a186e767SJ. Bruce Fields /* 2125a186e767SJ. Bruce Fields * RFC 3530 14.2.34 CASE 4: 2126a186e767SJ. Bruce Fields * Client probably hasn't noticed that we rebooted yet. 21271da177e4SLinus Torvalds */ 21281da177e4SLinus Torvalds status = nfserr_stale_clientid; 21297c79f737SNeilBrown } else { 21301da177e4SLinus Torvalds /* check that we have hit one of the cases...*/ 213122de4d83SNeilBrown status = nfserr_clid_inuse; 213208e8987cSNeilBrown } 21331da177e4SLinus Torvalds out: 21341da177e4SLinus Torvalds nfs4_unlock_state(); 21351da177e4SLinus Torvalds return status; 21361da177e4SLinus Torvalds } 21371da177e4SLinus Torvalds 21381da177e4SLinus Torvalds /* OPEN Share state helper functions */ 21391da177e4SLinus Torvalds static inline struct nfs4_file * 21401da177e4SLinus Torvalds alloc_init_file(struct inode *ino) 21411da177e4SLinus Torvalds { 21421da177e4SLinus Torvalds struct nfs4_file *fp; 21431da177e4SLinus Torvalds unsigned int hashval = file_hashval(ino); 21441da177e4SLinus Torvalds 2145e60d4398SNeilBrown fp = kmem_cache_alloc(file_slab, GFP_KERNEL); 2146e60d4398SNeilBrown if (fp) { 21478b671b80SJ. Bruce Fields atomic_set(&fp->fi_ref, 1); 21481da177e4SLinus Torvalds INIT_LIST_HEAD(&fp->fi_hash); 21498beefa24SNeilBrown INIT_LIST_HEAD(&fp->fi_stateids); 21508beefa24SNeilBrown INIT_LIST_HEAD(&fp->fi_delegations); 21511da177e4SLinus Torvalds fp->fi_inode = igrab(ino); 21521da177e4SLinus Torvalds fp->fi_id = current_fileid++; 215347f9940cSMeelap Shah fp->fi_had_conflict = false; 2154acfdf5c3SJ. Bruce Fields fp->fi_lease = NULL; 2155f9d7562fSJ. Bruce Fields memset(fp->fi_fds, 0, sizeof(fp->fi_fds)); 2156f9d7562fSJ. Bruce Fields memset(fp->fi_access, 0, sizeof(fp->fi_access)); 215747cee541SPavel Emelyanov spin_lock(&recall_lock); 215847cee541SPavel Emelyanov list_add(&fp->fi_hash, &file_hashtbl[hashval]); 215947cee541SPavel Emelyanov spin_unlock(&recall_lock); 21601da177e4SLinus Torvalds return fp; 21611da177e4SLinus Torvalds } 21621da177e4SLinus Torvalds return NULL; 21631da177e4SLinus Torvalds } 21641da177e4SLinus Torvalds 21651da177e4SLinus Torvalds static void 2166e18b890bSChristoph Lameter nfsd4_free_slab(struct kmem_cache **slab) 2167e60d4398SNeilBrown { 2168e60d4398SNeilBrown if (*slab == NULL) 2169e60d4398SNeilBrown return; 21701a1d92c1SAlexey Dobriyan kmem_cache_destroy(*slab); 2171e60d4398SNeilBrown *slab = NULL; 2172e60d4398SNeilBrown } 2173e60d4398SNeilBrown 2174e8ff2a84SJ. Bruce Fields void 2175e60d4398SNeilBrown nfsd4_free_slabs(void) 2176e60d4398SNeilBrown { 2177e60d4398SNeilBrown nfsd4_free_slab(&stateowner_slab); 2178e60d4398SNeilBrown nfsd4_free_slab(&file_slab); 21795ac049acSNeilBrown nfsd4_free_slab(&stateid_slab); 21805b2d21c1SNeilBrown nfsd4_free_slab(&deleg_slab); 2181e60d4398SNeilBrown } 21821da177e4SLinus Torvalds 21831da177e4SLinus Torvalds static int 21841da177e4SLinus Torvalds nfsd4_init_slabs(void) 21851da177e4SLinus Torvalds { 21861da177e4SLinus Torvalds stateowner_slab = kmem_cache_create("nfsd4_stateowners", 218720c2df83SPaul Mundt sizeof(struct nfs4_stateowner), 0, 0, NULL); 2188e60d4398SNeilBrown if (stateowner_slab == NULL) 2189e60d4398SNeilBrown goto out_nomem; 2190e60d4398SNeilBrown file_slab = kmem_cache_create("nfsd4_files", 219120c2df83SPaul Mundt sizeof(struct nfs4_file), 0, 0, NULL); 2192e60d4398SNeilBrown if (file_slab == NULL) 2193e60d4398SNeilBrown goto out_nomem; 21945ac049acSNeilBrown stateid_slab = kmem_cache_create("nfsd4_stateids", 219520c2df83SPaul Mundt sizeof(struct nfs4_stateid), 0, 0, NULL); 21965ac049acSNeilBrown if (stateid_slab == NULL) 21975ac049acSNeilBrown goto out_nomem; 21985b2d21c1SNeilBrown deleg_slab = kmem_cache_create("nfsd4_delegations", 219920c2df83SPaul Mundt sizeof(struct nfs4_delegation), 0, 0, NULL); 22005b2d21c1SNeilBrown if (deleg_slab == NULL) 22015b2d21c1SNeilBrown goto out_nomem; 2202e60d4398SNeilBrown return 0; 2203e60d4398SNeilBrown out_nomem: 2204e60d4398SNeilBrown nfsd4_free_slabs(); 22051da177e4SLinus Torvalds dprintk("nfsd4: out of memory while initializing nfsv4\n"); 22061da177e4SLinus Torvalds return -ENOMEM; 22071da177e4SLinus Torvalds } 22081da177e4SLinus Torvalds 22091da177e4SLinus Torvalds void 22101da177e4SLinus Torvalds nfs4_free_stateowner(struct kref *kref) 22111da177e4SLinus Torvalds { 22121da177e4SLinus Torvalds struct nfs4_stateowner *sop = 22131da177e4SLinus Torvalds container_of(kref, struct nfs4_stateowner, so_ref); 22141da177e4SLinus Torvalds kfree(sop->so_owner.data); 22151da177e4SLinus Torvalds kmem_cache_free(stateowner_slab, sop); 22161da177e4SLinus Torvalds } 22171da177e4SLinus Torvalds 22181da177e4SLinus Torvalds static inline struct nfs4_stateowner * 22191da177e4SLinus Torvalds alloc_stateowner(struct xdr_netobj *owner) 22201da177e4SLinus Torvalds { 22211da177e4SLinus Torvalds struct nfs4_stateowner *sop; 22221da177e4SLinus Torvalds 22231da177e4SLinus Torvalds if ((sop = kmem_cache_alloc(stateowner_slab, GFP_KERNEL))) { 22241da177e4SLinus Torvalds if ((sop->so_owner.data = kmalloc(owner->len, GFP_KERNEL))) { 22251da177e4SLinus Torvalds memcpy(sop->so_owner.data, owner->data, owner->len); 22261da177e4SLinus Torvalds sop->so_owner.len = owner->len; 22271da177e4SLinus Torvalds kref_init(&sop->so_ref); 22281da177e4SLinus Torvalds return sop; 22291da177e4SLinus Torvalds } 22301da177e4SLinus Torvalds kmem_cache_free(stateowner_slab, sop); 22311da177e4SLinus Torvalds } 22321da177e4SLinus Torvalds return NULL; 22331da177e4SLinus Torvalds } 22341da177e4SLinus Torvalds 22351da177e4SLinus Torvalds static struct nfs4_stateowner * 22361da177e4SLinus Torvalds alloc_init_open_stateowner(unsigned int strhashval, struct nfs4_client *clp, struct nfsd4_open *open) { 22371da177e4SLinus Torvalds struct nfs4_stateowner *sop; 22381da177e4SLinus Torvalds struct nfs4_replay *rp; 22391da177e4SLinus Torvalds unsigned int idhashval; 22401da177e4SLinus Torvalds 22411da177e4SLinus Torvalds if (!(sop = alloc_stateowner(&open->op_owner))) 22421da177e4SLinus Torvalds return NULL; 2243506f275fSJ. Bruce Fields idhashval = open_ownerid_hashval(current_ownerid); 22441da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_idhash); 22451da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_strhash); 22461da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_perclient); 2247ea1da636SNeilBrown INIT_LIST_HEAD(&sop->so_stateids); 2248ea1da636SNeilBrown INIT_LIST_HEAD(&sop->so_perstateid); /* not used */ 22491da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_close_lru); 22501da177e4SLinus Torvalds sop->so_time = 0; 2251506f275fSJ. Bruce Fields list_add(&sop->so_idhash, &open_ownerid_hashtbl[idhashval]); 2252506f275fSJ. Bruce Fields list_add(&sop->so_strhash, &open_ownerstr_hashtbl[strhashval]); 2253ea1da636SNeilBrown list_add(&sop->so_perclient, &clp->cl_openowners); 22541da177e4SLinus Torvalds sop->so_is_open_owner = 1; 22551da177e4SLinus Torvalds sop->so_id = current_ownerid++; 22561da177e4SLinus Torvalds sop->so_client = clp; 22571da177e4SLinus Torvalds sop->so_seqid = open->op_seqid; 22581da177e4SLinus Torvalds sop->so_confirmed = 0; 22591da177e4SLinus Torvalds rp = &sop->so_replay; 2260de1ae286SAl Viro rp->rp_status = nfserr_serverfault; 22611da177e4SLinus Torvalds rp->rp_buflen = 0; 22621da177e4SLinus Torvalds rp->rp_buf = rp->rp_ibuf; 22631da177e4SLinus Torvalds return sop; 22641da177e4SLinus Torvalds } 22651da177e4SLinus Torvalds 22661da177e4SLinus Torvalds static inline void 22671da177e4SLinus Torvalds init_stateid(struct nfs4_stateid *stp, struct nfs4_file *fp, struct nfsd4_open *open) { 22681da177e4SLinus Torvalds struct nfs4_stateowner *sop = open->op_stateowner; 22691da177e4SLinus Torvalds unsigned int hashval = stateid_hashval(sop->so_id, fp->fi_id); 22701da177e4SLinus Torvalds 22711da177e4SLinus Torvalds INIT_LIST_HEAD(&stp->st_hash); 2272ea1da636SNeilBrown INIT_LIST_HEAD(&stp->st_perstateowner); 2273ea1da636SNeilBrown INIT_LIST_HEAD(&stp->st_lockowners); 22741da177e4SLinus Torvalds INIT_LIST_HEAD(&stp->st_perfile); 22751da177e4SLinus Torvalds list_add(&stp->st_hash, &stateid_hashtbl[hashval]); 2276ea1da636SNeilBrown list_add(&stp->st_perstateowner, &sop->so_stateids); 22778beefa24SNeilBrown list_add(&stp->st_perfile, &fp->fi_stateids); 22781da177e4SLinus Torvalds stp->st_stateowner = sop; 227913cd2184SNeilBrown get_nfs4_file(fp); 22801da177e4SLinus Torvalds stp->st_file = fp; 2281e4e83ea4SJ. Bruce Fields stp->st_stateid.si_boot = boot_time; 22821da177e4SLinus Torvalds stp->st_stateid.si_stateownerid = sop->so_id; 22831da177e4SLinus Torvalds stp->st_stateid.si_fileid = fp->fi_id; 22841da177e4SLinus Torvalds stp->st_stateid.si_generation = 0; 22851da177e4SLinus Torvalds stp->st_access_bmap = 0; 22861da177e4SLinus Torvalds stp->st_deny_bmap = 0; 228784459a11SAndy Adamson __set_bit(open->op_share_access & ~NFS4_SHARE_WANT_MASK, 228884459a11SAndy Adamson &stp->st_access_bmap); 22891da177e4SLinus Torvalds __set_bit(open->op_share_deny, &stp->st_deny_bmap); 22904c4cd222SNeilBrown stp->st_openstp = NULL; 22911da177e4SLinus Torvalds } 22921da177e4SLinus Torvalds 22931da177e4SLinus Torvalds static void 22941da177e4SLinus Torvalds move_to_close_lru(struct nfs4_stateowner *sop) 22951da177e4SLinus Torvalds { 22961da177e4SLinus Torvalds dprintk("NFSD: move_to_close_lru nfs4_stateowner %p\n", sop); 22971da177e4SLinus Torvalds 2298358dd55aSNeilBrown list_move_tail(&sop->so_close_lru, &close_lru); 22991da177e4SLinus Torvalds sop->so_time = get_seconds(); 23001da177e4SLinus Torvalds } 23011da177e4SLinus Torvalds 23021da177e4SLinus Torvalds static int 2303599e0a22SJ. Bruce Fields same_owner_str(struct nfs4_stateowner *sop, struct xdr_netobj *owner, 2304599e0a22SJ. Bruce Fields clientid_t *clid) 2305599e0a22SJ. Bruce Fields { 2306599e0a22SJ. Bruce Fields return (sop->so_owner.len == owner->len) && 2307599e0a22SJ. Bruce Fields 0 == memcmp(sop->so_owner.data, owner->data, owner->len) && 2308599e0a22SJ. Bruce Fields (sop->so_client->cl_clientid.cl_id == clid->cl_id); 23091da177e4SLinus Torvalds } 23101da177e4SLinus Torvalds 23111da177e4SLinus Torvalds static struct nfs4_stateowner * 23121da177e4SLinus Torvalds find_openstateowner_str(unsigned int hashval, struct nfsd4_open *open) 23131da177e4SLinus Torvalds { 23141da177e4SLinus Torvalds struct nfs4_stateowner *so = NULL; 23151da177e4SLinus Torvalds 2316506f275fSJ. Bruce Fields list_for_each_entry(so, &open_ownerstr_hashtbl[hashval], so_strhash) { 2317599e0a22SJ. Bruce Fields if (same_owner_str(so, &open->op_owner, &open->op_clientid)) 23181da177e4SLinus Torvalds return so; 23191da177e4SLinus Torvalds } 23201da177e4SLinus Torvalds return NULL; 23211da177e4SLinus Torvalds } 23221da177e4SLinus Torvalds 23231da177e4SLinus Torvalds /* search file_hashtbl[] for file */ 23241da177e4SLinus Torvalds static struct nfs4_file * 23251da177e4SLinus Torvalds find_file(struct inode *ino) 23261da177e4SLinus Torvalds { 23271da177e4SLinus Torvalds unsigned int hashval = file_hashval(ino); 23281da177e4SLinus Torvalds struct nfs4_file *fp; 23291da177e4SLinus Torvalds 23308b671b80SJ. Bruce Fields spin_lock(&recall_lock); 23311da177e4SLinus Torvalds list_for_each_entry(fp, &file_hashtbl[hashval], fi_hash) { 233213cd2184SNeilBrown if (fp->fi_inode == ino) { 233313cd2184SNeilBrown get_nfs4_file(fp); 23348b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 23351da177e4SLinus Torvalds return fp; 23361da177e4SLinus Torvalds } 233713cd2184SNeilBrown } 23388b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 23391da177e4SLinus Torvalds return NULL; 23401da177e4SLinus Torvalds } 23411da177e4SLinus Torvalds 2342d87a8adeSAndy Adamson static inline int access_valid(u32 x, u32 minorversion) 2343ba5a6a19SJ. Bruce Fields { 2344d87a8adeSAndy Adamson if ((x & NFS4_SHARE_ACCESS_MASK) < NFS4_SHARE_ACCESS_READ) 23458838dc43SJ. Bruce Fields return 0; 2346d87a8adeSAndy Adamson if ((x & NFS4_SHARE_ACCESS_MASK) > NFS4_SHARE_ACCESS_BOTH) 2347d87a8adeSAndy Adamson return 0; 2348d87a8adeSAndy Adamson x &= ~NFS4_SHARE_ACCESS_MASK; 2349d87a8adeSAndy Adamson if (minorversion && x) { 2350d87a8adeSAndy Adamson if ((x & NFS4_SHARE_WANT_MASK) > NFS4_SHARE_WANT_CANCEL) 2351d87a8adeSAndy Adamson return 0; 2352d87a8adeSAndy Adamson if ((x & NFS4_SHARE_WHEN_MASK) > NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED) 2353d87a8adeSAndy Adamson return 0; 2354d87a8adeSAndy Adamson x &= ~(NFS4_SHARE_WANT_MASK | NFS4_SHARE_WHEN_MASK); 2355d87a8adeSAndy Adamson } 2356d87a8adeSAndy Adamson if (x) 23578838dc43SJ. Bruce Fields return 0; 23588838dc43SJ. Bruce Fields return 1; 2359ba5a6a19SJ. Bruce Fields } 2360ba5a6a19SJ. Bruce Fields 23618838dc43SJ. Bruce Fields static inline int deny_valid(u32 x) 2362ba5a6a19SJ. Bruce Fields { 23638838dc43SJ. Bruce Fields /* Note: unlike access bits, deny bits may be zero. */ 23648838dc43SJ. Bruce Fields return x <= NFS4_SHARE_DENY_BOTH; 2365ba5a6a19SJ. Bruce Fields } 23661da177e4SLinus Torvalds 23674f83aa30SJ. Bruce Fields /* 23681da177e4SLinus Torvalds * Called to check deny when READ with all zero stateid or 23691da177e4SLinus Torvalds * WRITE with all zero or all one stateid 23701da177e4SLinus Torvalds */ 2371b37ad28bSAl Viro static __be32 23721da177e4SLinus Torvalds nfs4_share_conflict(struct svc_fh *current_fh, unsigned int deny_type) 23731da177e4SLinus Torvalds { 23741da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 23751da177e4SLinus Torvalds struct nfs4_file *fp; 23761da177e4SLinus Torvalds struct nfs4_stateid *stp; 2377b37ad28bSAl Viro __be32 ret; 23781da177e4SLinus Torvalds 23791da177e4SLinus Torvalds dprintk("NFSD: nfs4_share_conflict\n"); 23801da177e4SLinus Torvalds 23811da177e4SLinus Torvalds fp = find_file(ino); 238213cd2184SNeilBrown if (!fp) 238313cd2184SNeilBrown return nfs_ok; 2384b700949bSNeilBrown ret = nfserr_locked; 23851da177e4SLinus Torvalds /* Search for conflicting share reservations */ 23868beefa24SNeilBrown list_for_each_entry(stp, &fp->fi_stateids, st_perfile) { 23871da177e4SLinus Torvalds if (test_bit(deny_type, &stp->st_deny_bmap) || 23881da177e4SLinus Torvalds test_bit(NFS4_SHARE_DENY_BOTH, &stp->st_deny_bmap)) 238913cd2184SNeilBrown goto out; 23901da177e4SLinus Torvalds } 239113cd2184SNeilBrown ret = nfs_ok; 239213cd2184SNeilBrown out: 239313cd2184SNeilBrown put_nfs4_file(fp); 239413cd2184SNeilBrown return ret; 23951da177e4SLinus Torvalds } 23961da177e4SLinus Torvalds 23976b57d9c8SJ. Bruce Fields static void nfsd_break_one_deleg(struct nfs4_delegation *dp) 23981da177e4SLinus Torvalds { 23991da177e4SLinus Torvalds /* We're assuming the state code never drops its reference 24001da177e4SLinus Torvalds * without first removing the lease. Since we're in this lease 24011da177e4SLinus Torvalds * callback (and since the lease code is serialized by the kernel 24021da177e4SLinus Torvalds * lock) we know the server hasn't removed the lease yet, we know 24031da177e4SLinus Torvalds * it's safe to take a reference: */ 24041da177e4SLinus Torvalds atomic_inc(&dp->dl_count); 24051da177e4SLinus Torvalds 24061da177e4SLinus Torvalds list_add_tail(&dp->dl_recall_lru, &del_recall_lru); 24071da177e4SLinus Torvalds 2408460781b5SArnd Bergmann /* only place dl_time is set. protected by lock_flocks*/ 24091da177e4SLinus Torvalds dp->dl_time = get_seconds(); 24101da177e4SLinus Torvalds 24116b57d9c8SJ. Bruce Fields nfsd4_cb_recall(dp); 24126b57d9c8SJ. Bruce Fields } 24136b57d9c8SJ. Bruce Fields 2414acfdf5c3SJ. Bruce Fields /* Called from break_lease() with lock_flocks() held. */ 24156b57d9c8SJ. Bruce Fields static void nfsd_break_deleg_cb(struct file_lock *fl) 24166b57d9c8SJ. Bruce Fields { 2417acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = (struct nfs4_file *)fl->fl_owner; 2418acfdf5c3SJ. Bruce Fields struct nfs4_delegation *dp; 24196b57d9c8SJ. Bruce Fields 2420acfdf5c3SJ. Bruce Fields BUG_ON(!fp); 2421acfdf5c3SJ. Bruce Fields /* We assume break_lease is only called once per lease: */ 2422acfdf5c3SJ. Bruce Fields BUG_ON(fp->fi_had_conflict); 24230272e1fdSJ. Bruce Fields /* 24240272e1fdSJ. Bruce Fields * We don't want the locks code to timeout the lease for us; 2425acfdf5c3SJ. Bruce Fields * we'll remove it ourself if a delegation isn't returned 24266b57d9c8SJ. Bruce Fields * in time: 24270272e1fdSJ. Bruce Fields */ 24280272e1fdSJ. Bruce Fields fl->fl_break_time = 0; 24291da177e4SLinus Torvalds 24305d926e8cSJ. Bruce Fields spin_lock(&recall_lock); 2431acfdf5c3SJ. Bruce Fields fp->fi_had_conflict = true; 2432acfdf5c3SJ. Bruce Fields list_for_each_entry(dp, &fp->fi_delegations, dl_perfile) 24335d926e8cSJ. Bruce Fields nfsd_break_one_deleg(dp); 24345d926e8cSJ. Bruce Fields spin_unlock(&recall_lock); 24351da177e4SLinus Torvalds } 24361da177e4SLinus Torvalds 24371da177e4SLinus Torvalds static 24381da177e4SLinus Torvalds int nfsd_change_deleg_cb(struct file_lock **onlist, int arg) 24391da177e4SLinus Torvalds { 24401da177e4SLinus Torvalds if (arg & F_UNLCK) 24411da177e4SLinus Torvalds return lease_modify(onlist, arg); 24421da177e4SLinus Torvalds else 24431da177e4SLinus Torvalds return -EAGAIN; 24441da177e4SLinus Torvalds } 24451da177e4SLinus Torvalds 24467b021967SAlexey Dobriyan static const struct lock_manager_operations nfsd_lease_mng_ops = { 24478fb47a4fSJ. Bruce Fields .lm_break = nfsd_break_deleg_cb, 24488fb47a4fSJ. Bruce Fields .lm_change = nfsd_change_deleg_cb, 24491da177e4SLinus Torvalds }; 24501da177e4SLinus Torvalds 24511da177e4SLinus Torvalds 2452b37ad28bSAl Viro __be32 24536668958fSAndy Adamson nfsd4_process_open1(struct nfsd4_compound_state *cstate, 24546668958fSAndy Adamson struct nfsd4_open *open) 24551da177e4SLinus Torvalds { 24561da177e4SLinus Torvalds clientid_t *clientid = &open->op_clientid; 24571da177e4SLinus Torvalds struct nfs4_client *clp = NULL; 24581da177e4SLinus Torvalds unsigned int strhashval; 24591da177e4SLinus Torvalds struct nfs4_stateowner *sop = NULL; 24601da177e4SLinus Torvalds 24611da177e4SLinus Torvalds if (!check_name(open->op_owner)) 24620f442aa2SJ. Bruce Fields return nfserr_inval; 24631da177e4SLinus Torvalds 24641da177e4SLinus Torvalds if (STALE_CLIENTID(&open->op_clientid)) 24651da177e4SLinus Torvalds return nfserr_stale_clientid; 24661da177e4SLinus Torvalds 2467506f275fSJ. Bruce Fields strhashval = open_ownerstr_hashval(clientid->cl_id, &open->op_owner); 24681da177e4SLinus Torvalds sop = find_openstateowner_str(strhashval, open); 24691da177e4SLinus Torvalds open->op_stateowner = sop; 24700f442aa2SJ. Bruce Fields if (!sop) { 24710f442aa2SJ. Bruce Fields /* Make sure the client's lease hasn't expired. */ 24720f442aa2SJ. Bruce Fields clp = find_confirmed_client(clientid); 24730f442aa2SJ. Bruce Fields if (clp == NULL) 24740f442aa2SJ. Bruce Fields return nfserr_expired; 24750f442aa2SJ. Bruce Fields goto renew; 24760f442aa2SJ. Bruce Fields } 24776668958fSAndy Adamson /* When sessions are used, skip open sequenceid processing */ 24786668958fSAndy Adamson if (nfsd4_has_session(cstate)) 24796668958fSAndy Adamson goto renew; 2480ae8b6253SJ. Bruce Fields if (!sop->so_confirmed) { 24810f442aa2SJ. Bruce Fields /* Replace unconfirmed owners without checking for replay. */ 2482ae8b6253SJ. Bruce Fields clp = sop->so_client; 2483f044ff83SJ. Bruce Fields release_openowner(sop); 24840f442aa2SJ. Bruce Fields open->op_stateowner = NULL; 2485ae8b6253SJ. Bruce Fields goto renew; 24860f442aa2SJ. Bruce Fields } 24870f442aa2SJ. Bruce Fields if (open->op_seqid == sop->so_seqid - 1) { 24881da177e4SLinus Torvalds if (sop->so_replay.rp_buflen) 2489a90b061cSAl Viro return nfserr_replay_me; 24901da177e4SLinus Torvalds /* The original OPEN failed so spectacularly 24911da177e4SLinus Torvalds * that we don't even have replay data saved! 24921da177e4SLinus Torvalds * Therefore, we have no choice but to continue 24931da177e4SLinus Torvalds * processing this OPEN; presumably, we'll 24941da177e4SLinus Torvalds * fail again for the same reason. 24951da177e4SLinus Torvalds */ 24960f442aa2SJ. Bruce Fields dprintk("nfsd4_process_open1: replay with no replay cache\n"); 24971da177e4SLinus Torvalds goto renew; 24981da177e4SLinus Torvalds } 24990f442aa2SJ. Bruce Fields if (open->op_seqid != sop->so_seqid) 25000f442aa2SJ. Bruce Fields return nfserr_bad_seqid; 25010f442aa2SJ. Bruce Fields renew: 25020f442aa2SJ. Bruce Fields if (open->op_stateowner == NULL) { 25031da177e4SLinus Torvalds sop = alloc_init_open_stateowner(strhashval, clp, open); 25041da177e4SLinus Torvalds if (sop == NULL) 25053e772463SJ. Bruce Fields return nfserr_jukebox; 25061da177e4SLinus Torvalds open->op_stateowner = sop; 25070f442aa2SJ. Bruce Fields } 25080f442aa2SJ. Bruce Fields list_del_init(&sop->so_close_lru); 25091da177e4SLinus Torvalds renew_client(sop->so_client); 25100f442aa2SJ. Bruce Fields return nfs_ok; 25111da177e4SLinus Torvalds } 25121da177e4SLinus Torvalds 2513b37ad28bSAl Viro static inline __be32 25144a6e43e6SNeilBrown nfs4_check_delegmode(struct nfs4_delegation *dp, int flags) 25154a6e43e6SNeilBrown { 25164a6e43e6SNeilBrown if ((flags & WR_STATE) && (dp->dl_type == NFS4_OPEN_DELEGATE_READ)) 25174a6e43e6SNeilBrown return nfserr_openmode; 25184a6e43e6SNeilBrown else 25194a6e43e6SNeilBrown return nfs_ok; 25204a6e43e6SNeilBrown } 25214a6e43e6SNeilBrown 252252f4fb43SNeilBrown static struct nfs4_delegation * 252352f4fb43SNeilBrown find_delegation_file(struct nfs4_file *fp, stateid_t *stid) 252452f4fb43SNeilBrown { 252532b007b4SJ. Bruce Fields struct nfs4_delegation *dp; 252652f4fb43SNeilBrown 2527acfdf5c3SJ. Bruce Fields spin_lock(&recall_lock); 252832b007b4SJ. Bruce Fields list_for_each_entry(dp, &fp->fi_delegations, dl_perfile) 252932b007b4SJ. Bruce Fields if (dp->dl_stateid.si_stateownerid == stid->si_stateownerid) { 2530acfdf5c3SJ. Bruce Fields spin_unlock(&recall_lock); 2531acfdf5c3SJ. Bruce Fields return dp; 253252f4fb43SNeilBrown } 253332b007b4SJ. Bruce Fields spin_unlock(&recall_lock); 253432b007b4SJ. Bruce Fields return NULL; 253532b007b4SJ. Bruce Fields } 253652f4fb43SNeilBrown 2537c47d832bSDaniel Mack static int share_access_to_flags(u32 share_access) 253824a0111eSJ. Bruce Fields { 253924a0111eSJ. Bruce Fields share_access &= ~NFS4_SHARE_WANT_MASK; 254024a0111eSJ. Bruce Fields 254124a0111eSJ. Bruce Fields return share_access == NFS4_SHARE_ACCESS_READ ? RD_STATE : WR_STATE; 254224a0111eSJ. Bruce Fields } 254324a0111eSJ. Bruce Fields 2544b37ad28bSAl Viro static __be32 2545567d9829SNeilBrown nfs4_check_deleg(struct nfs4_file *fp, struct nfsd4_open *open, 2546567d9829SNeilBrown struct nfs4_delegation **dp) 2547567d9829SNeilBrown { 2548567d9829SNeilBrown int flags; 2549b37ad28bSAl Viro __be32 status = nfserr_bad_stateid; 2550567d9829SNeilBrown 2551567d9829SNeilBrown *dp = find_delegation_file(fp, &open->op_delegate_stateid); 2552567d9829SNeilBrown if (*dp == NULL) 2553c44c5eebSNeilBrown goto out; 255424a0111eSJ. Bruce Fields flags = share_access_to_flags(open->op_share_access); 2555567d9829SNeilBrown status = nfs4_check_delegmode(*dp, flags); 2556567d9829SNeilBrown if (status) 2557567d9829SNeilBrown *dp = NULL; 2558c44c5eebSNeilBrown out: 2559c44c5eebSNeilBrown if (open->op_claim_type != NFS4_OPEN_CLAIM_DELEGATE_CUR) 2560c44c5eebSNeilBrown return nfs_ok; 2561c44c5eebSNeilBrown if (status) 2562c44c5eebSNeilBrown return status; 2563c44c5eebSNeilBrown open->op_stateowner->so_confirmed = 1; 2564c44c5eebSNeilBrown return nfs_ok; 2565567d9829SNeilBrown } 2566567d9829SNeilBrown 2567b37ad28bSAl Viro static __be32 25681da177e4SLinus Torvalds nfs4_check_open(struct nfs4_file *fp, struct nfsd4_open *open, struct nfs4_stateid **stpp) 25691da177e4SLinus Torvalds { 25701da177e4SLinus Torvalds struct nfs4_stateid *local; 2571b37ad28bSAl Viro __be32 status = nfserr_share_denied; 25721da177e4SLinus Torvalds struct nfs4_stateowner *sop = open->op_stateowner; 25731da177e4SLinus Torvalds 25748beefa24SNeilBrown list_for_each_entry(local, &fp->fi_stateids, st_perfile) { 25751da177e4SLinus Torvalds /* ignore lock owners */ 25761da177e4SLinus Torvalds if (local->st_stateowner->so_is_open_owner == 0) 25771da177e4SLinus Torvalds continue; 25781da177e4SLinus Torvalds /* remember if we have seen this open owner */ 25791da177e4SLinus Torvalds if (local->st_stateowner == sop) 25801da177e4SLinus Torvalds *stpp = local; 25811da177e4SLinus Torvalds /* check for conflicting share reservations */ 25821da177e4SLinus Torvalds if (!test_share(local, open)) 25831da177e4SLinus Torvalds goto out; 25841da177e4SLinus Torvalds } 25851da177e4SLinus Torvalds status = 0; 25861da177e4SLinus Torvalds out: 25871da177e4SLinus Torvalds return status; 25881da177e4SLinus Torvalds } 25891da177e4SLinus Torvalds 25905ac049acSNeilBrown static inline struct nfs4_stateid * 25915ac049acSNeilBrown nfs4_alloc_stateid(void) 25925ac049acSNeilBrown { 25935ac049acSNeilBrown return kmem_cache_alloc(stateid_slab, GFP_KERNEL); 25945ac049acSNeilBrown } 25955ac049acSNeilBrown 259621fb4016SJ. Bruce Fields static inline int nfs4_access_to_access(u32 nfs4_access) 259721fb4016SJ. Bruce Fields { 259821fb4016SJ. Bruce Fields int flags = 0; 259921fb4016SJ. Bruce Fields 260021fb4016SJ. Bruce Fields if (nfs4_access & NFS4_SHARE_ACCESS_READ) 260121fb4016SJ. Bruce Fields flags |= NFSD_MAY_READ; 260221fb4016SJ. Bruce Fields if (nfs4_access & NFS4_SHARE_ACCESS_WRITE) 260321fb4016SJ. Bruce Fields flags |= NFSD_MAY_WRITE; 260421fb4016SJ. Bruce Fields return flags; 260521fb4016SJ. Bruce Fields } 260621fb4016SJ. Bruce Fields 26070c12eaffSCasey Bodley static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp, 26080c12eaffSCasey Bodley struct svc_fh *cur_fh, struct nfsd4_open *open) 2609f9d7562fSJ. Bruce Fields { 2610f9d7562fSJ. Bruce Fields __be32 status; 26110c12eaffSCasey Bodley int oflag = nfs4_access_to_omode(open->op_share_access); 26120c12eaffSCasey Bodley int access = nfs4_access_to_access(open->op_share_access); 26130c12eaffSCasey Bodley 26140c12eaffSCasey Bodley /* CLAIM_DELEGATE_CUR is used in response to a broken lease; 26150c12eaffSCasey Bodley * allowing it to break the lease and return EAGAIN leaves the 26160c12eaffSCasey Bodley * client unable to make progress in returning the delegation */ 26170c12eaffSCasey Bodley if (open->op_claim_type == NFS4_OPEN_CLAIM_DELEGATE_CUR) 26180c12eaffSCasey Bodley access |= NFSD_MAY_NOT_BREAK_LEASE; 2619f9d7562fSJ. Bruce Fields 2620f9d7562fSJ. Bruce Fields if (!fp->fi_fds[oflag]) { 2621f9d7562fSJ. Bruce Fields status = nfsd_open(rqstp, cur_fh, S_IFREG, access, 2622f9d7562fSJ. Bruce Fields &fp->fi_fds[oflag]); 2623f9d7562fSJ. Bruce Fields if (status) 2624f9d7562fSJ. Bruce Fields return status; 2625f9d7562fSJ. Bruce Fields } 2626f9d7562fSJ. Bruce Fields nfs4_file_get_access(fp, oflag); 2627f9d7562fSJ. Bruce Fields 2628f9d7562fSJ. Bruce Fields return nfs_ok; 2629f9d7562fSJ. Bruce Fields } 2630f9d7562fSJ. Bruce Fields 2631b37ad28bSAl Viro static __be32 26321da177e4SLinus Torvalds nfs4_new_open(struct svc_rqst *rqstp, struct nfs4_stateid **stpp, 2633f9d7562fSJ. Bruce Fields struct nfs4_file *fp, struct svc_fh *cur_fh, 2634f9d7562fSJ. Bruce Fields struct nfsd4_open *open) 26351da177e4SLinus Torvalds { 26361da177e4SLinus Torvalds struct nfs4_stateid *stp; 2637f9d7562fSJ. Bruce Fields __be32 status; 26381da177e4SLinus Torvalds 26395ac049acSNeilBrown stp = nfs4_alloc_stateid(); 26401da177e4SLinus Torvalds if (stp == NULL) 26413e772463SJ. Bruce Fields return nfserr_jukebox; 26421da177e4SLinus Torvalds 26430c12eaffSCasey Bodley status = nfs4_get_vfs_file(rqstp, fp, cur_fh, open); 26441da177e4SLinus Torvalds if (status) { 26455ac049acSNeilBrown kmem_cache_free(stateid_slab, stp); 26461da177e4SLinus Torvalds return status; 26471da177e4SLinus Torvalds } 26481da177e4SLinus Torvalds *stpp = stp; 26491da177e4SLinus Torvalds return 0; 26501da177e4SLinus Torvalds } 26511da177e4SLinus Torvalds 2652b37ad28bSAl Viro static inline __be32 26531da177e4SLinus Torvalds nfsd4_truncate(struct svc_rqst *rqstp, struct svc_fh *fh, 26541da177e4SLinus Torvalds struct nfsd4_open *open) 26551da177e4SLinus Torvalds { 26561da177e4SLinus Torvalds struct iattr iattr = { 26571da177e4SLinus Torvalds .ia_valid = ATTR_SIZE, 26581da177e4SLinus Torvalds .ia_size = 0, 26591da177e4SLinus Torvalds }; 26601da177e4SLinus Torvalds if (!open->op_truncate) 26611da177e4SLinus Torvalds return 0; 26621da177e4SLinus Torvalds if (!(open->op_share_access & NFS4_SHARE_ACCESS_WRITE)) 26639246585aSAl Viro return nfserr_inval; 26641da177e4SLinus Torvalds return nfsd_setattr(rqstp, fh, &iattr, 0, (time_t)0); 26651da177e4SLinus Torvalds } 26661da177e4SLinus Torvalds 2667b37ad28bSAl Viro static __be32 2668f9d7562fSJ. Bruce Fields nfs4_upgrade_open(struct svc_rqst *rqstp, struct nfs4_file *fp, struct svc_fh *cur_fh, struct nfs4_stateid *stp, struct nfsd4_open *open) 26691da177e4SLinus Torvalds { 26707d947842SJ. Bruce Fields u32 op_share_access = open->op_share_access & ~NFS4_SHARE_WANT_MASK; 26717d947842SJ. Bruce Fields bool new_access; 2672b37ad28bSAl Viro __be32 status; 26731da177e4SLinus Torvalds 26747d947842SJ. Bruce Fields new_access = !test_bit(op_share_access, &stp->st_access_bmap); 2675f9d7562fSJ. Bruce Fields if (new_access) { 26760c12eaffSCasey Bodley status = nfs4_get_vfs_file(rqstp, fp, cur_fh, open); 2677f9d7562fSJ. Bruce Fields if (status) 2678f9d7562fSJ. Bruce Fields return status; 26796c26d08fSJ. Bruce Fields } 26801da177e4SLinus Torvalds status = nfsd4_truncate(rqstp, cur_fh, open); 26811da177e4SLinus Torvalds if (status) { 2682f9d7562fSJ. Bruce Fields if (new_access) { 2683f197c271SJ. Bruce Fields int oflag = nfs4_access_to_omode(op_share_access); 2684f9d7562fSJ. Bruce Fields nfs4_file_put_access(fp, oflag); 2685f9d7562fSJ. Bruce Fields } 26861da177e4SLinus Torvalds return status; 26871da177e4SLinus Torvalds } 26881da177e4SLinus Torvalds /* remember the open */ 268924a0111eSJ. Bruce Fields __set_bit(op_share_access, &stp->st_access_bmap); 2690b55e0ba1SJ. Bruce Fields __set_bit(open->op_share_deny, &stp->st_deny_bmap); 26911da177e4SLinus Torvalds 26921da177e4SLinus Torvalds return nfs_ok; 26931da177e4SLinus Torvalds } 26941da177e4SLinus Torvalds 26951da177e4SLinus Torvalds 26961da177e4SLinus Torvalds static void 269737515177SNeilBrown nfs4_set_claim_prev(struct nfsd4_open *open) 26981da177e4SLinus Torvalds { 26991da177e4SLinus Torvalds open->op_stateowner->so_confirmed = 1; 2700c7b9a459SNeilBrown open->op_stateowner->so_client->cl_firststate = 1; 27011da177e4SLinus Torvalds } 27021da177e4SLinus Torvalds 270314a24e99SJ. Bruce Fields /* Should we give out recallable state?: */ 270414a24e99SJ. Bruce Fields static bool nfsd4_cb_channel_good(struct nfs4_client *clp) 270514a24e99SJ. Bruce Fields { 270614a24e99SJ. Bruce Fields if (clp->cl_cb_state == NFSD4_CB_UP) 270714a24e99SJ. Bruce Fields return true; 270814a24e99SJ. Bruce Fields /* 270914a24e99SJ. Bruce Fields * In the sessions case, since we don't have to establish a 271014a24e99SJ. Bruce Fields * separate connection for callbacks, we assume it's OK 271114a24e99SJ. Bruce Fields * until we hear otherwise: 271214a24e99SJ. Bruce Fields */ 271314a24e99SJ. Bruce Fields return clp->cl_minorversion && clp->cl_cb_state == NFSD4_CB_UNKNOWN; 271414a24e99SJ. Bruce Fields } 271514a24e99SJ. Bruce Fields 271622d38c4cSJ. Bruce Fields static struct file_lock *nfs4_alloc_init_lease(struct nfs4_delegation *dp, int flag) 271722d38c4cSJ. Bruce Fields { 271822d38c4cSJ. Bruce Fields struct file_lock *fl; 271922d38c4cSJ. Bruce Fields 272022d38c4cSJ. Bruce Fields fl = locks_alloc_lock(); 272122d38c4cSJ. Bruce Fields if (!fl) 272222d38c4cSJ. Bruce Fields return NULL; 272322d38c4cSJ. Bruce Fields locks_init_lock(fl); 272422d38c4cSJ. Bruce Fields fl->fl_lmops = &nfsd_lease_mng_ops; 272522d38c4cSJ. Bruce Fields fl->fl_flags = FL_LEASE; 272622d38c4cSJ. Bruce Fields fl->fl_type = flag == NFS4_OPEN_DELEGATE_READ? F_RDLCK: F_WRLCK; 272722d38c4cSJ. Bruce Fields fl->fl_end = OFFSET_MAX; 2728acfdf5c3SJ. Bruce Fields fl->fl_owner = (fl_owner_t)(dp->dl_file); 272922d38c4cSJ. Bruce Fields fl->fl_pid = current->tgid; 273022d38c4cSJ. Bruce Fields return fl; 273122d38c4cSJ. Bruce Fields } 273222d38c4cSJ. Bruce Fields 2733edab9782SJ. Bruce Fields static int nfs4_setlease(struct nfs4_delegation *dp, int flag) 2734edab9782SJ. Bruce Fields { 2735acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = dp->dl_file; 2736edab9782SJ. Bruce Fields struct file_lock *fl; 2737edab9782SJ. Bruce Fields int status; 2738edab9782SJ. Bruce Fields 2739edab9782SJ. Bruce Fields fl = nfs4_alloc_init_lease(dp, flag); 2740edab9782SJ. Bruce Fields if (!fl) 2741edab9782SJ. Bruce Fields return -ENOMEM; 2742acfdf5c3SJ. Bruce Fields fl->fl_file = find_readable_file(fp); 2743acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perclnt, &dp->dl_client->cl_delegations); 2744acfdf5c3SJ. Bruce Fields status = vfs_setlease(fl->fl_file, fl->fl_type, &fl); 2745edab9782SJ. Bruce Fields if (status) { 2746acfdf5c3SJ. Bruce Fields list_del_init(&dp->dl_perclnt); 2747edab9782SJ. Bruce Fields locks_free_lock(fl); 2748edab9782SJ. Bruce Fields return -ENOMEM; 2749edab9782SJ. Bruce Fields } 2750acfdf5c3SJ. Bruce Fields fp->fi_lease = fl; 2751acfdf5c3SJ. Bruce Fields fp->fi_deleg_file = fl->fl_file; 2752acfdf5c3SJ. Bruce Fields get_file(fp->fi_deleg_file); 2753acfdf5c3SJ. Bruce Fields atomic_set(&fp->fi_delegees, 1); 2754acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perfile, &fp->fi_delegations); 2755acfdf5c3SJ. Bruce Fields return 0; 2756acfdf5c3SJ. Bruce Fields } 2757acfdf5c3SJ. Bruce Fields 2758acfdf5c3SJ. Bruce Fields static int nfs4_set_delegation(struct nfs4_delegation *dp, int flag) 2759acfdf5c3SJ. Bruce Fields { 2760acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = dp->dl_file; 2761acfdf5c3SJ. Bruce Fields 2762acfdf5c3SJ. Bruce Fields if (!fp->fi_lease) 2763acfdf5c3SJ. Bruce Fields return nfs4_setlease(dp, flag); 2764acfdf5c3SJ. Bruce Fields spin_lock(&recall_lock); 2765acfdf5c3SJ. Bruce Fields if (fp->fi_had_conflict) { 2766acfdf5c3SJ. Bruce Fields spin_unlock(&recall_lock); 2767acfdf5c3SJ. Bruce Fields return -EAGAIN; 2768acfdf5c3SJ. Bruce Fields } 2769acfdf5c3SJ. Bruce Fields atomic_inc(&fp->fi_delegees); 2770acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perfile, &fp->fi_delegations); 2771acfdf5c3SJ. Bruce Fields spin_unlock(&recall_lock); 2772acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perclnt, &dp->dl_client->cl_delegations); 2773edab9782SJ. Bruce Fields return 0; 2774edab9782SJ. Bruce Fields } 2775edab9782SJ. Bruce Fields 27761da177e4SLinus Torvalds /* 27771da177e4SLinus Torvalds * Attempt to hand out a delegation. 27781da177e4SLinus Torvalds */ 27791da177e4SLinus Torvalds static void 27801da177e4SLinus Torvalds nfs4_open_delegation(struct svc_fh *fh, struct nfsd4_open *open, struct nfs4_stateid *stp) 27811da177e4SLinus Torvalds { 27821da177e4SLinus Torvalds struct nfs4_delegation *dp; 27831da177e4SLinus Torvalds struct nfs4_stateowner *sop = stp->st_stateowner; 278414a24e99SJ. Bruce Fields int cb_up; 27851da177e4SLinus Torvalds int status, flag = 0; 27861da177e4SLinus Torvalds 278714a24e99SJ. Bruce Fields cb_up = nfsd4_cb_channel_good(sop->so_client); 27881da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_NONE; 27897b190fecSNeilBrown open->op_recall = 0; 27907b190fecSNeilBrown switch (open->op_claim_type) { 27917b190fecSNeilBrown case NFS4_OPEN_CLAIM_PREVIOUS: 27922bf23875SJ. Bruce Fields if (!cb_up) 27937b190fecSNeilBrown open->op_recall = 1; 27947b190fecSNeilBrown flag = open->op_delegate_type; 27957b190fecSNeilBrown if (flag == NFS4_OPEN_DELEGATE_NONE) 27961da177e4SLinus Torvalds goto out; 27977b190fecSNeilBrown break; 27987b190fecSNeilBrown case NFS4_OPEN_CLAIM_NULL: 27997b190fecSNeilBrown /* Let's not give out any delegations till everyone's 28007b190fecSNeilBrown * had the chance to reclaim theirs.... */ 2801af558e33SJ. Bruce Fields if (locks_in_grace()) 28027b190fecSNeilBrown goto out; 28032bf23875SJ. Bruce Fields if (!cb_up || !sop->so_confirmed) 28047b190fecSNeilBrown goto out; 28051da177e4SLinus Torvalds if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE) 28061da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_WRITE; 28071da177e4SLinus Torvalds else 28081da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_READ; 28097b190fecSNeilBrown break; 28107b190fecSNeilBrown default: 28117b190fecSNeilBrown goto out; 28127b190fecSNeilBrown } 28131da177e4SLinus Torvalds 28141da177e4SLinus Torvalds dp = alloc_init_deleg(sop->so_client, stp, fh, flag); 2815dd239cc0SJ. Bruce Fields if (dp == NULL) 2816dd239cc0SJ. Bruce Fields goto out_no_deleg; 2817acfdf5c3SJ. Bruce Fields status = nfs4_set_delegation(dp, flag); 2818edab9782SJ. Bruce Fields if (status) 2819dd239cc0SJ. Bruce Fields goto out_free; 28201da177e4SLinus Torvalds 28211da177e4SLinus Torvalds memcpy(&open->op_delegate_stateid, &dp->dl_stateid, sizeof(dp->dl_stateid)); 28221da177e4SLinus Torvalds 28238c10cbdbSBenny Halevy dprintk("NFSD: delegation stateid=" STATEID_FMT "\n", 28248c10cbdbSBenny Halevy STATEID_VAL(&dp->dl_stateid)); 28251da177e4SLinus Torvalds out: 28267b190fecSNeilBrown if (open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS 28277b190fecSNeilBrown && flag == NFS4_OPEN_DELEGATE_NONE 28287b190fecSNeilBrown && open->op_delegate_type != NFS4_OPEN_DELEGATE_NONE) 28292fdada03SJ. Bruce Fields dprintk("NFSD: WARNING: refusing delegation reclaim\n"); 28301da177e4SLinus Torvalds open->op_delegate_type = flag; 2831dd239cc0SJ. Bruce Fields return; 2832dd239cc0SJ. Bruce Fields out_free: 2833acfdf5c3SJ. Bruce Fields nfs4_put_delegation(dp); 2834dd239cc0SJ. Bruce Fields out_no_deleg: 2835dd239cc0SJ. Bruce Fields flag = NFS4_OPEN_DELEGATE_NONE; 2836dd239cc0SJ. Bruce Fields goto out; 28371da177e4SLinus Torvalds } 28381da177e4SLinus Torvalds 28391da177e4SLinus Torvalds /* 28401da177e4SLinus Torvalds * called with nfs4_lock_state() held. 28411da177e4SLinus Torvalds */ 2842b37ad28bSAl Viro __be32 28431da177e4SLinus Torvalds nfsd4_process_open2(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open) 28441da177e4SLinus Torvalds { 28456668958fSAndy Adamson struct nfsd4_compoundres *resp = rqstp->rq_resp; 28461da177e4SLinus Torvalds struct nfs4_file *fp = NULL; 28471da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 28481da177e4SLinus Torvalds struct nfs4_stateid *stp = NULL; 2849567d9829SNeilBrown struct nfs4_delegation *dp = NULL; 2850b37ad28bSAl Viro __be32 status; 28511da177e4SLinus Torvalds 28521da177e4SLinus Torvalds status = nfserr_inval; 2853d87a8adeSAndy Adamson if (!access_valid(open->op_share_access, resp->cstate.minorversion) 2854ba5a6a19SJ. Bruce Fields || !deny_valid(open->op_share_deny)) 28551da177e4SLinus Torvalds goto out; 28561da177e4SLinus Torvalds /* 28571da177e4SLinus Torvalds * Lookup file; if found, lookup stateid and check open request, 28581da177e4SLinus Torvalds * and check for delegations in the process of being recalled. 28591da177e4SLinus Torvalds * If not found, create the nfs4_file struct 28601da177e4SLinus Torvalds */ 28611da177e4SLinus Torvalds fp = find_file(ino); 28621da177e4SLinus Torvalds if (fp) { 28631da177e4SLinus Torvalds if ((status = nfs4_check_open(fp, open, &stp))) 28641da177e4SLinus Torvalds goto out; 2865c44c5eebSNeilBrown status = nfs4_check_deleg(fp, open, &dp); 2866c44c5eebSNeilBrown if (status) 2867c44c5eebSNeilBrown goto out; 28681da177e4SLinus Torvalds } else { 2869c44c5eebSNeilBrown status = nfserr_bad_stateid; 2870c44c5eebSNeilBrown if (open->op_claim_type == NFS4_OPEN_CLAIM_DELEGATE_CUR) 2871c44c5eebSNeilBrown goto out; 28723e772463SJ. Bruce Fields status = nfserr_jukebox; 28731da177e4SLinus Torvalds fp = alloc_init_file(ino); 28741da177e4SLinus Torvalds if (fp == NULL) 28751da177e4SLinus Torvalds goto out; 28761da177e4SLinus Torvalds } 28771da177e4SLinus Torvalds 28781da177e4SLinus Torvalds /* 28791da177e4SLinus Torvalds * OPEN the file, or upgrade an existing OPEN. 28801da177e4SLinus Torvalds * If truncate fails, the OPEN fails. 28811da177e4SLinus Torvalds */ 28821da177e4SLinus Torvalds if (stp) { 28831da177e4SLinus Torvalds /* Stateid was found, this is an OPEN upgrade */ 2884f9d7562fSJ. Bruce Fields status = nfs4_upgrade_open(rqstp, fp, current_fh, stp, open); 28851da177e4SLinus Torvalds if (status) 28861da177e4SLinus Torvalds goto out; 2887444c2c07SNeilBrown update_stateid(&stp->st_stateid); 28881da177e4SLinus Torvalds } else { 2889f9d7562fSJ. Bruce Fields status = nfs4_new_open(rqstp, &stp, fp, current_fh, open); 2890567d9829SNeilBrown if (status) 28911da177e4SLinus Torvalds goto out; 28921da177e4SLinus Torvalds init_stateid(stp, fp, open); 28931da177e4SLinus Torvalds status = nfsd4_truncate(rqstp, current_fh, open); 28941da177e4SLinus Torvalds if (status) { 28952283963fSJ. Bruce Fields release_open_stateid(stp); 28961da177e4SLinus Torvalds goto out; 28971da177e4SLinus Torvalds } 28986668958fSAndy Adamson if (nfsd4_has_session(&resp->cstate)) 28996668958fSAndy Adamson update_stateid(&stp->st_stateid); 29001da177e4SLinus Torvalds } 29011da177e4SLinus Torvalds memcpy(&open->op_stateid, &stp->st_stateid, sizeof(stateid_t)); 29021da177e4SLinus Torvalds 29034dc6ec00SJ. Bruce Fields if (nfsd4_has_session(&resp->cstate)) 29046668958fSAndy Adamson open->op_stateowner->so_confirmed = 1; 29056668958fSAndy Adamson 29061da177e4SLinus Torvalds /* 29071da177e4SLinus Torvalds * Attempt to hand out a delegation. No error return, because the 29081da177e4SLinus Torvalds * OPEN succeeds even if we fail. 29091da177e4SLinus Torvalds */ 29101da177e4SLinus Torvalds nfs4_open_delegation(current_fh, open, stp); 29111da177e4SLinus Torvalds 29121da177e4SLinus Torvalds status = nfs_ok; 29131da177e4SLinus Torvalds 29148c10cbdbSBenny Halevy dprintk("%s: stateid=" STATEID_FMT "\n", __func__, 29158c10cbdbSBenny Halevy STATEID_VAL(&stp->st_stateid)); 29161da177e4SLinus Torvalds out: 291713cd2184SNeilBrown if (fp) 291813cd2184SNeilBrown put_nfs4_file(fp); 291937515177SNeilBrown if (status == 0 && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS) 292037515177SNeilBrown nfs4_set_claim_prev(open); 29211da177e4SLinus Torvalds /* 29221da177e4SLinus Torvalds * To finish the open response, we just need to set the rflags. 29231da177e4SLinus Torvalds */ 29241da177e4SLinus Torvalds open->op_rflags = NFS4_OPEN_RESULT_LOCKTYPE_POSIX; 29256668958fSAndy Adamson if (!open->op_stateowner->so_confirmed && 29266668958fSAndy Adamson !nfsd4_has_session(&resp->cstate)) 29271da177e4SLinus Torvalds open->op_rflags |= NFS4_OPEN_RESULT_CONFIRM; 29281da177e4SLinus Torvalds 29291da177e4SLinus Torvalds return status; 29301da177e4SLinus Torvalds } 29311da177e4SLinus Torvalds 2932b37ad28bSAl Viro __be32 2933b591480bSJ.Bruce Fields nfsd4_renew(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 2934b591480bSJ.Bruce Fields clientid_t *clid) 29351da177e4SLinus Torvalds { 29361da177e4SLinus Torvalds struct nfs4_client *clp; 2937b37ad28bSAl Viro __be32 status; 29381da177e4SLinus Torvalds 29391da177e4SLinus Torvalds nfs4_lock_state(); 29401da177e4SLinus Torvalds dprintk("process_renew(%08x/%08x): starting\n", 29411da177e4SLinus Torvalds clid->cl_boot, clid->cl_id); 29421da177e4SLinus Torvalds status = nfserr_stale_clientid; 29431da177e4SLinus Torvalds if (STALE_CLIENTID(clid)) 29441da177e4SLinus Torvalds goto out; 29451da177e4SLinus Torvalds clp = find_confirmed_client(clid); 29461da177e4SLinus Torvalds status = nfserr_expired; 29471da177e4SLinus Torvalds if (clp == NULL) { 29481da177e4SLinus Torvalds /* We assume the client took too long to RENEW. */ 29491da177e4SLinus Torvalds dprintk("nfsd4_renew: clientid not found!\n"); 29501da177e4SLinus Torvalds goto out; 29511da177e4SLinus Torvalds } 29521da177e4SLinus Torvalds renew_client(clp); 29531da177e4SLinus Torvalds status = nfserr_cb_path_down; 2954ea1da636SNeilBrown if (!list_empty(&clp->cl_delegations) 295577a3569dSJ. Bruce Fields && clp->cl_cb_state != NFSD4_CB_UP) 29561da177e4SLinus Torvalds goto out; 29571da177e4SLinus Torvalds status = nfs_ok; 29581da177e4SLinus Torvalds out: 29591da177e4SLinus Torvalds nfs4_unlock_state(); 29601da177e4SLinus Torvalds return status; 29611da177e4SLinus Torvalds } 29621da177e4SLinus Torvalds 2963c47d832bSDaniel Mack static struct lock_manager nfsd4_manager = { 2964af558e33SJ. Bruce Fields }; 2965af558e33SJ. Bruce Fields 2966a76b4319SNeilBrown static void 2967af558e33SJ. Bruce Fields nfsd4_end_grace(void) 2968a76b4319SNeilBrown { 2969a76b4319SNeilBrown dprintk("NFSD: end of grace period\n"); 2970c7b9a459SNeilBrown nfsd4_recdir_purge_old(); 2971af558e33SJ. Bruce Fields locks_end_grace(&nfsd4_manager); 2972e46b498cSJ. Bruce Fields /* 2973e46b498cSJ. Bruce Fields * Now that every NFSv4 client has had the chance to recover and 2974e46b498cSJ. Bruce Fields * to see the (possibly new, possibly shorter) lease time, we 2975e46b498cSJ. Bruce Fields * can safely set the next grace time to the current lease time: 2976e46b498cSJ. Bruce Fields */ 2977e46b498cSJ. Bruce Fields nfsd4_grace = nfsd4_lease; 2978a76b4319SNeilBrown } 2979a76b4319SNeilBrown 2980fd39ca9aSNeilBrown static time_t 29811da177e4SLinus Torvalds nfs4_laundromat(void) 29821da177e4SLinus Torvalds { 29831da177e4SLinus Torvalds struct nfs4_client *clp; 29841da177e4SLinus Torvalds struct nfs4_stateowner *sop; 29851da177e4SLinus Torvalds struct nfs4_delegation *dp; 29861da177e4SLinus Torvalds struct list_head *pos, *next, reaplist; 2987cf07d2eaSJ. Bruce Fields time_t cutoff = get_seconds() - nfsd4_lease; 2988cf07d2eaSJ. Bruce Fields time_t t, clientid_val = nfsd4_lease; 2989cf07d2eaSJ. Bruce Fields time_t u, test_val = nfsd4_lease; 29901da177e4SLinus Torvalds 29911da177e4SLinus Torvalds nfs4_lock_state(); 29921da177e4SLinus Torvalds 29931da177e4SLinus Torvalds dprintk("NFSD: laundromat service - starting\n"); 2994af558e33SJ. Bruce Fields if (locks_in_grace()) 2995af558e33SJ. Bruce Fields nfsd4_end_grace(); 299636acb66bSBenny Halevy INIT_LIST_HEAD(&reaplist); 299736acb66bSBenny Halevy spin_lock(&client_lock); 29981da177e4SLinus Torvalds list_for_each_safe(pos, next, &client_lru) { 29991da177e4SLinus Torvalds clp = list_entry(pos, struct nfs4_client, cl_lru); 30001da177e4SLinus Torvalds if (time_after((unsigned long)clp->cl_time, (unsigned long)cutoff)) { 30011da177e4SLinus Torvalds t = clp->cl_time - cutoff; 30021da177e4SLinus Torvalds if (clientid_val > t) 30031da177e4SLinus Torvalds clientid_val = t; 30041da177e4SLinus Torvalds break; 30051da177e4SLinus Torvalds } 3006d7682988SBenny Halevy if (atomic_read(&clp->cl_refcount)) { 3007d7682988SBenny Halevy dprintk("NFSD: client in use (clientid %08x)\n", 3008d7682988SBenny Halevy clp->cl_clientid.cl_id); 3009d7682988SBenny Halevy continue; 3010d7682988SBenny Halevy } 3011d7682988SBenny Halevy unhash_client_locked(clp); 3012d7682988SBenny Halevy list_add(&clp->cl_lru, &reaplist); 301336acb66bSBenny Halevy } 301436acb66bSBenny Halevy spin_unlock(&client_lock); 301536acb66bSBenny Halevy list_for_each_safe(pos, next, &reaplist) { 301636acb66bSBenny Halevy clp = list_entry(pos, struct nfs4_client, cl_lru); 30171da177e4SLinus Torvalds dprintk("NFSD: purging unused client (clientid %08x)\n", 30181da177e4SLinus Torvalds clp->cl_clientid.cl_id); 3019c7b9a459SNeilBrown nfsd4_remove_clid_dir(clp); 30201da177e4SLinus Torvalds expire_client(clp); 30211da177e4SLinus Torvalds } 30221da177e4SLinus Torvalds spin_lock(&recall_lock); 30231da177e4SLinus Torvalds list_for_each_safe(pos, next, &del_recall_lru) { 30241da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 30251da177e4SLinus Torvalds if (time_after((unsigned long)dp->dl_time, (unsigned long)cutoff)) { 30261da177e4SLinus Torvalds u = dp->dl_time - cutoff; 30271da177e4SLinus Torvalds if (test_val > u) 30281da177e4SLinus Torvalds test_val = u; 30291da177e4SLinus Torvalds break; 30301da177e4SLinus Torvalds } 30311da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 30321da177e4SLinus Torvalds } 30331da177e4SLinus Torvalds spin_unlock(&recall_lock); 30341da177e4SLinus Torvalds list_for_each_safe(pos, next, &reaplist) { 30351da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 30361da177e4SLinus Torvalds list_del_init(&dp->dl_recall_lru); 30371da177e4SLinus Torvalds unhash_delegation(dp); 30381da177e4SLinus Torvalds } 3039cf07d2eaSJ. Bruce Fields test_val = nfsd4_lease; 30401da177e4SLinus Torvalds list_for_each_safe(pos, next, &close_lru) { 30411da177e4SLinus Torvalds sop = list_entry(pos, struct nfs4_stateowner, so_close_lru); 30421da177e4SLinus Torvalds if (time_after((unsigned long)sop->so_time, (unsigned long)cutoff)) { 30431da177e4SLinus Torvalds u = sop->so_time - cutoff; 30441da177e4SLinus Torvalds if (test_val > u) 30451da177e4SLinus Torvalds test_val = u; 30461da177e4SLinus Torvalds break; 30471da177e4SLinus Torvalds } 30481da177e4SLinus Torvalds dprintk("NFSD: purging unused open stateowner (so_id %d)\n", 30491da177e4SLinus Torvalds sop->so_id); 3050f044ff83SJ. Bruce Fields release_openowner(sop); 30511da177e4SLinus Torvalds } 30521da177e4SLinus Torvalds if (clientid_val < NFSD_LAUNDROMAT_MINTIMEOUT) 30531da177e4SLinus Torvalds clientid_val = NFSD_LAUNDROMAT_MINTIMEOUT; 30541da177e4SLinus Torvalds nfs4_unlock_state(); 30551da177e4SLinus Torvalds return clientid_val; 30561da177e4SLinus Torvalds } 30571da177e4SLinus Torvalds 3058a254b246SHarvey Harrison static struct workqueue_struct *laundry_wq; 3059a254b246SHarvey Harrison static void laundromat_main(struct work_struct *); 3060a254b246SHarvey Harrison static DECLARE_DELAYED_WORK(laundromat_work, laundromat_main); 3061a254b246SHarvey Harrison 3062a254b246SHarvey Harrison static void 3063c4028958SDavid Howells laundromat_main(struct work_struct *not_used) 30641da177e4SLinus Torvalds { 30651da177e4SLinus Torvalds time_t t; 30661da177e4SLinus Torvalds 30671da177e4SLinus Torvalds t = nfs4_laundromat(); 30681da177e4SLinus Torvalds dprintk("NFSD: laundromat_main - sleeping for %ld seconds\n", t); 306958da282bSNeilBrown queue_delayed_work(laundry_wq, &laundromat_work, t*HZ); 30701da177e4SLinus Torvalds } 30711da177e4SLinus Torvalds 3072fd39ca9aSNeilBrown static struct nfs4_stateowner * 3073f8816512SNeilBrown search_close_lru(u32 st_id, int flags) 3074f8816512SNeilBrown { 30751da177e4SLinus Torvalds struct nfs4_stateowner *local = NULL; 30761da177e4SLinus Torvalds 30771da177e4SLinus Torvalds if (flags & CLOSE_STATE) { 30781da177e4SLinus Torvalds list_for_each_entry(local, &close_lru, so_close_lru) { 30791da177e4SLinus Torvalds if (local->so_id == st_id) 30801da177e4SLinus Torvalds return local; 30811da177e4SLinus Torvalds } 30821da177e4SLinus Torvalds } 30831da177e4SLinus Torvalds return NULL; 30841da177e4SLinus Torvalds } 30851da177e4SLinus Torvalds 30861da177e4SLinus Torvalds static inline int 30871da177e4SLinus Torvalds nfs4_check_fh(struct svc_fh *fhp, struct nfs4_stateid *stp) 30881da177e4SLinus Torvalds { 3089f9d7562fSJ. Bruce Fields return fhp->fh_dentry->d_inode != stp->st_file->fi_inode; 30901da177e4SLinus Torvalds } 30911da177e4SLinus Torvalds 30921da177e4SLinus Torvalds static int 30931da177e4SLinus Torvalds STALE_STATEID(stateid_t *stateid) 30941da177e4SLinus Torvalds { 3095e4e83ea4SJ. Bruce Fields if (stateid->si_boot == boot_time) 3096e4e83ea4SJ. Bruce Fields return 0; 30978c10cbdbSBenny Halevy dprintk("NFSD: stale stateid " STATEID_FMT "!\n", 30988c10cbdbSBenny Halevy STATEID_VAL(stateid)); 30991da177e4SLinus Torvalds return 1; 31001da177e4SLinus Torvalds } 31011da177e4SLinus Torvalds 31021da177e4SLinus Torvalds static inline int 31031da177e4SLinus Torvalds access_permit_read(unsigned long access_bmap) 31041da177e4SLinus Torvalds { 31051da177e4SLinus Torvalds return test_bit(NFS4_SHARE_ACCESS_READ, &access_bmap) || 31061da177e4SLinus Torvalds test_bit(NFS4_SHARE_ACCESS_BOTH, &access_bmap) || 31071da177e4SLinus Torvalds test_bit(NFS4_SHARE_ACCESS_WRITE, &access_bmap); 31081da177e4SLinus Torvalds } 31091da177e4SLinus Torvalds 31101da177e4SLinus Torvalds static inline int 31111da177e4SLinus Torvalds access_permit_write(unsigned long access_bmap) 31121da177e4SLinus Torvalds { 31131da177e4SLinus Torvalds return test_bit(NFS4_SHARE_ACCESS_WRITE, &access_bmap) || 31141da177e4SLinus Torvalds test_bit(NFS4_SHARE_ACCESS_BOTH, &access_bmap); 31151da177e4SLinus Torvalds } 31161da177e4SLinus Torvalds 31171da177e4SLinus Torvalds static 3118b37ad28bSAl Viro __be32 nfs4_check_openmode(struct nfs4_stateid *stp, int flags) 31191da177e4SLinus Torvalds { 3120b37ad28bSAl Viro __be32 status = nfserr_openmode; 31211da177e4SLinus Torvalds 312202921914SJ. Bruce Fields /* For lock stateid's, we test the parent open, not the lock: */ 312302921914SJ. Bruce Fields if (stp->st_openstp) 312402921914SJ. Bruce Fields stp = stp->st_openstp; 31251da177e4SLinus Torvalds if ((flags & WR_STATE) && (!access_permit_write(stp->st_access_bmap))) 31261da177e4SLinus Torvalds goto out; 31271da177e4SLinus Torvalds if ((flags & RD_STATE) && (!access_permit_read(stp->st_access_bmap))) 31281da177e4SLinus Torvalds goto out; 31291da177e4SLinus Torvalds status = nfs_ok; 31301da177e4SLinus Torvalds out: 31311da177e4SLinus Torvalds return status; 31321da177e4SLinus Torvalds } 31331da177e4SLinus Torvalds 3134b37ad28bSAl Viro static inline __be32 31351da177e4SLinus Torvalds check_special_stateids(svc_fh *current_fh, stateid_t *stateid, int flags) 31361da177e4SLinus Torvalds { 3137203a8c8eSJ. Bruce Fields if (ONE_STATEID(stateid) && (flags & RD_STATE)) 31381da177e4SLinus Torvalds return nfs_ok; 3139af558e33SJ. Bruce Fields else if (locks_in_grace()) { 314025985edcSLucas De Marchi /* Answer in remaining cases depends on existence of 31411da177e4SLinus Torvalds * conflicting state; so we must wait out the grace period. */ 31421da177e4SLinus Torvalds return nfserr_grace; 31431da177e4SLinus Torvalds } else if (flags & WR_STATE) 31441da177e4SLinus Torvalds return nfs4_share_conflict(current_fh, 31451da177e4SLinus Torvalds NFS4_SHARE_DENY_WRITE); 31461da177e4SLinus Torvalds else /* (flags & RD_STATE) && ZERO_STATEID(stateid) */ 31471da177e4SLinus Torvalds return nfs4_share_conflict(current_fh, 31481da177e4SLinus Torvalds NFS4_SHARE_DENY_READ); 31491da177e4SLinus Torvalds } 31501da177e4SLinus Torvalds 31511da177e4SLinus Torvalds /* 31521da177e4SLinus Torvalds * Allow READ/WRITE during grace period on recovered state only for files 31531da177e4SLinus Torvalds * that are not able to provide mandatory locking. 31541da177e4SLinus Torvalds */ 31551da177e4SLinus Torvalds static inline int 315618f82731SJ. Bruce Fields grace_disallows_io(struct inode *inode) 31571da177e4SLinus Torvalds { 3158203a8c8eSJ. Bruce Fields return locks_in_grace() && mandatory_lock(inode); 31591da177e4SLinus Torvalds } 31601da177e4SLinus Torvalds 31616668958fSAndy Adamson static int check_stateid_generation(stateid_t *in, stateid_t *ref, int flags) 31620836f587SJ. Bruce Fields { 31636668958fSAndy Adamson /* 31646668958fSAndy Adamson * When sessions are used the stateid generation number is ignored 31656668958fSAndy Adamson * when it is zero. 31666668958fSAndy Adamson */ 31676668958fSAndy Adamson if ((flags & HAS_SESSION) && in->si_generation == 0) 31686668958fSAndy Adamson goto out; 31696668958fSAndy Adamson 31700836f587SJ. Bruce Fields /* If the client sends us a stateid from the future, it's buggy: */ 31710836f587SJ. Bruce Fields if (in->si_generation > ref->si_generation) 31720836f587SJ. Bruce Fields return nfserr_bad_stateid; 31730836f587SJ. Bruce Fields /* 31740836f587SJ. Bruce Fields * The following, however, can happen. For example, if the 31750836f587SJ. Bruce Fields * client sends an open and some IO at the same time, the open 31760836f587SJ. Bruce Fields * may bump si_generation while the IO is still in flight. 31770836f587SJ. Bruce Fields * Thanks to hard links and renames, the client never knows what 31780836f587SJ. Bruce Fields * file an open will affect. So it could avoid that situation 31790836f587SJ. Bruce Fields * only by serializing all opens and IO from the same open 31800836f587SJ. Bruce Fields * owner. To recover from the old_stateid error, the client 31810836f587SJ. Bruce Fields * will just have to retry the IO: 31820836f587SJ. Bruce Fields */ 31830836f587SJ. Bruce Fields if (in->si_generation < ref->si_generation) 31840836f587SJ. Bruce Fields return nfserr_old_stateid; 31856668958fSAndy Adamson out: 31860836f587SJ. Bruce Fields return nfs_ok; 31870836f587SJ. Bruce Fields } 31880836f587SJ. Bruce Fields 31893e633079SJ. Bruce Fields static int is_delegation_stateid(stateid_t *stateid) 31903e633079SJ. Bruce Fields { 31913e633079SJ. Bruce Fields return stateid->si_fileid == 0; 31923e633079SJ. Bruce Fields } 31933e633079SJ. Bruce Fields 3194e1ca12dfSBryan Schumaker static int is_open_stateid(struct nfs4_stateid *stateid) 3195e1ca12dfSBryan Schumaker { 3196e1ca12dfSBryan Schumaker return stateid->st_openstp == NULL; 3197e1ca12dfSBryan Schumaker } 3198e1ca12dfSBryan Schumaker 319917456804SBryan Schumaker __be32 nfs4_validate_stateid(stateid_t *stateid, int flags) 320017456804SBryan Schumaker { 320117456804SBryan Schumaker struct nfs4_stateid *stp = NULL; 320217456804SBryan Schumaker __be32 status = nfserr_stale_stateid; 320317456804SBryan Schumaker 320417456804SBryan Schumaker if (STALE_STATEID(stateid)) 320517456804SBryan Schumaker goto out; 320617456804SBryan Schumaker 320717456804SBryan Schumaker status = nfserr_expired; 320817456804SBryan Schumaker stp = search_for_stateid(stateid); 320917456804SBryan Schumaker if (!stp) 321017456804SBryan Schumaker goto out; 321117456804SBryan Schumaker status = nfserr_bad_stateid; 321217456804SBryan Schumaker 321317456804SBryan Schumaker if (!stp->st_stateowner->so_confirmed) 321417456804SBryan Schumaker goto out; 321517456804SBryan Schumaker 321617456804SBryan Schumaker status = check_stateid_generation(stateid, &stp->st_stateid, flags); 321717456804SBryan Schumaker if (status) 321817456804SBryan Schumaker goto out; 321917456804SBryan Schumaker 322017456804SBryan Schumaker status = nfs_ok; 322117456804SBryan Schumaker out: 322217456804SBryan Schumaker return status; 322317456804SBryan Schumaker } 322417456804SBryan Schumaker 32251da177e4SLinus Torvalds /* 32261da177e4SLinus Torvalds * Checks for stateid operations 32271da177e4SLinus Torvalds */ 3228b37ad28bSAl Viro __be32 3229dd453dfdSBenny Halevy nfs4_preprocess_stateid_op(struct nfsd4_compound_state *cstate, 3230dd453dfdSBenny Halevy stateid_t *stateid, int flags, struct file **filpp) 32311da177e4SLinus Torvalds { 32321da177e4SLinus Torvalds struct nfs4_stateid *stp = NULL; 32331da177e4SLinus Torvalds struct nfs4_delegation *dp = NULL; 3234dd453dfdSBenny Halevy struct svc_fh *current_fh = &cstate->current_fh; 32351da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 3236b37ad28bSAl Viro __be32 status; 32371da177e4SLinus Torvalds 32381da177e4SLinus Torvalds if (filpp) 32391da177e4SLinus Torvalds *filpp = NULL; 32401da177e4SLinus Torvalds 324118f82731SJ. Bruce Fields if (grace_disallows_io(ino)) 32421da177e4SLinus Torvalds return nfserr_grace; 32431da177e4SLinus Torvalds 32446668958fSAndy Adamson if (nfsd4_has_session(cstate)) 32456668958fSAndy Adamson flags |= HAS_SESSION; 32466668958fSAndy Adamson 32471da177e4SLinus Torvalds if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) 32481da177e4SLinus Torvalds return check_special_stateids(current_fh, stateid, flags); 32491da177e4SLinus Torvalds 32501da177e4SLinus Torvalds status = nfserr_stale_stateid; 32511da177e4SLinus Torvalds if (STALE_STATEID(stateid)) 32521da177e4SLinus Torvalds goto out; 32531da177e4SLinus Torvalds 325433515142SJ. Bruce Fields /* 325533515142SJ. Bruce Fields * We assume that any stateid that has the current boot time, 325633515142SJ. Bruce Fields * but that we can't find, is expired: 325733515142SJ. Bruce Fields */ 325833515142SJ. Bruce Fields status = nfserr_expired; 32593e633079SJ. Bruce Fields if (is_delegation_stateid(stateid)) { 3260a4455be0SJ. Bruce Fields dp = find_delegation_stateid(ino, stateid); 3261e4e83ea4SJ. Bruce Fields if (!dp) 32621da177e4SLinus Torvalds goto out; 32636668958fSAndy Adamson status = check_stateid_generation(stateid, &dp->dl_stateid, 32646668958fSAndy Adamson flags); 32650c2a498fSJ. Bruce Fields if (status) 32660c2a498fSJ. Bruce Fields goto out; 3267dc9bf700SJ. Bruce Fields status = nfs4_check_delegmode(dp, flags); 3268dc9bf700SJ. Bruce Fields if (status) 3269dc9bf700SJ. Bruce Fields goto out; 3270dc9bf700SJ. Bruce Fields renew_client(dp->dl_client); 327143b0178eSDan Carpenter if (filpp) { 3272acfdf5c3SJ. Bruce Fields *filpp = dp->dl_file->fi_deleg_file; 3273f9d7562fSJ. Bruce Fields BUG_ON(!*filpp); 327443b0178eSDan Carpenter } 32751da177e4SLinus Torvalds } else { /* open or lock stateid */ 3276a4455be0SJ. Bruce Fields stp = find_stateid(stateid, flags); 3277e4e83ea4SJ. Bruce Fields if (!stp) 32781da177e4SLinus Torvalds goto out; 327933515142SJ. Bruce Fields status = nfserr_bad_stateid; 32806150ef0dSJ. Bruce Fields if (nfs4_check_fh(current_fh, stp)) 32811da177e4SLinus Torvalds goto out; 32821da177e4SLinus Torvalds if (!stp->st_stateowner->so_confirmed) 32831da177e4SLinus Torvalds goto out; 32846668958fSAndy Adamson status = check_stateid_generation(stateid, &stp->st_stateid, 32856668958fSAndy Adamson flags); 32860836f587SJ. Bruce Fields if (status) 32871da177e4SLinus Torvalds goto out; 3288a4455be0SJ. Bruce Fields status = nfs4_check_openmode(stp, flags); 3289a4455be0SJ. Bruce Fields if (status) 32901da177e4SLinus Torvalds goto out; 32911da177e4SLinus Torvalds renew_client(stp->st_stateowner->so_client); 3292f9d7562fSJ. Bruce Fields if (filpp) { 3293f9d7562fSJ. Bruce Fields if (flags & RD_STATE) 3294f9d7562fSJ. Bruce Fields *filpp = find_readable_file(stp->st_file); 3295f9d7562fSJ. Bruce Fields else 3296f9d7562fSJ. Bruce Fields *filpp = find_writeable_file(stp->st_file); 3297f9d7562fSJ. Bruce Fields } 32981da177e4SLinus Torvalds } 32991da177e4SLinus Torvalds status = nfs_ok; 33001da177e4SLinus Torvalds out: 33011da177e4SLinus Torvalds return status; 33021da177e4SLinus Torvalds } 33031da177e4SLinus Torvalds 3304e1ca12dfSBryan Schumaker static __be32 3305e1ca12dfSBryan Schumaker nfsd4_free_delegation_stateid(stateid_t *stateid) 3306e1ca12dfSBryan Schumaker { 3307e1ca12dfSBryan Schumaker struct nfs4_delegation *dp = search_for_delegation(stateid); 3308e1ca12dfSBryan Schumaker if (dp) 3309e1ca12dfSBryan Schumaker return nfserr_locks_held; 3310e1ca12dfSBryan Schumaker return nfserr_bad_stateid; 3311e1ca12dfSBryan Schumaker } 3312e1ca12dfSBryan Schumaker 3313e1ca12dfSBryan Schumaker static __be32 3314e1ca12dfSBryan Schumaker nfsd4_free_lock_stateid(struct nfs4_stateid *stp) 3315e1ca12dfSBryan Schumaker { 3316e1ca12dfSBryan Schumaker if (check_for_locks(stp->st_file, stp->st_stateowner)) 3317e1ca12dfSBryan Schumaker return nfserr_locks_held; 3318e1ca12dfSBryan Schumaker release_lock_stateid(stp); 3319e1ca12dfSBryan Schumaker return nfs_ok; 3320e1ca12dfSBryan Schumaker } 3321e1ca12dfSBryan Schumaker 3322e1ca12dfSBryan Schumaker /* 332317456804SBryan Schumaker * Test if the stateid is valid 332417456804SBryan Schumaker */ 332517456804SBryan Schumaker __be32 332617456804SBryan Schumaker nfsd4_test_stateid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 332717456804SBryan Schumaker struct nfsd4_test_stateid *test_stateid) 332817456804SBryan Schumaker { 332917456804SBryan Schumaker test_stateid->ts_has_session = nfsd4_has_session(cstate); 333017456804SBryan Schumaker return nfs_ok; 333117456804SBryan Schumaker } 333217456804SBryan Schumaker 333317456804SBryan Schumaker /* 3334e1ca12dfSBryan Schumaker * Free a state id 3335e1ca12dfSBryan Schumaker */ 3336e1ca12dfSBryan Schumaker __be32 3337e1ca12dfSBryan Schumaker nfsd4_free_stateid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3338e1ca12dfSBryan Schumaker struct nfsd4_free_stateid *free_stateid) 3339e1ca12dfSBryan Schumaker { 3340e1ca12dfSBryan Schumaker stateid_t *stateid = &free_stateid->fr_stateid; 3341e1ca12dfSBryan Schumaker struct nfs4_stateid *stp; 3342e1ca12dfSBryan Schumaker __be32 ret; 3343e1ca12dfSBryan Schumaker 3344e1ca12dfSBryan Schumaker nfs4_lock_state(); 3345e1ca12dfSBryan Schumaker if (is_delegation_stateid(stateid)) { 3346e1ca12dfSBryan Schumaker ret = nfsd4_free_delegation_stateid(stateid); 3347e1ca12dfSBryan Schumaker goto out; 3348e1ca12dfSBryan Schumaker } 3349e1ca12dfSBryan Schumaker 3350e1ca12dfSBryan Schumaker stp = search_for_stateid(stateid); 3351e1ca12dfSBryan Schumaker if (!stp) { 3352e1ca12dfSBryan Schumaker ret = nfserr_bad_stateid; 3353e1ca12dfSBryan Schumaker goto out; 3354e1ca12dfSBryan Schumaker } 3355e1ca12dfSBryan Schumaker if (stateid->si_generation != 0) { 3356e1ca12dfSBryan Schumaker if (stateid->si_generation < stp->st_stateid.si_generation) { 3357e1ca12dfSBryan Schumaker ret = nfserr_old_stateid; 3358e1ca12dfSBryan Schumaker goto out; 3359e1ca12dfSBryan Schumaker } 3360e1ca12dfSBryan Schumaker if (stateid->si_generation > stp->st_stateid.si_generation) { 3361e1ca12dfSBryan Schumaker ret = nfserr_bad_stateid; 3362e1ca12dfSBryan Schumaker goto out; 3363e1ca12dfSBryan Schumaker } 3364e1ca12dfSBryan Schumaker } 3365e1ca12dfSBryan Schumaker 3366e1ca12dfSBryan Schumaker if (is_open_stateid(stp)) { 3367e1ca12dfSBryan Schumaker ret = nfserr_locks_held; 3368e1ca12dfSBryan Schumaker goto out; 3369e1ca12dfSBryan Schumaker } else { 3370e1ca12dfSBryan Schumaker ret = nfsd4_free_lock_stateid(stp); 3371e1ca12dfSBryan Schumaker goto out; 3372e1ca12dfSBryan Schumaker } 3373e1ca12dfSBryan Schumaker 3374e1ca12dfSBryan Schumaker out: 3375e1ca12dfSBryan Schumaker nfs4_unlock_state(); 3376e1ca12dfSBryan Schumaker return ret; 3377e1ca12dfSBryan Schumaker } 3378e1ca12dfSBryan Schumaker 33794c4cd222SNeilBrown static inline int 33804c4cd222SNeilBrown setlkflg (int type) 33814c4cd222SNeilBrown { 33824c4cd222SNeilBrown return (type == NFS4_READW_LT || type == NFS4_READ_LT) ? 33834c4cd222SNeilBrown RD_STATE : WR_STATE; 33844c4cd222SNeilBrown } 33851da177e4SLinus Torvalds 33861da177e4SLinus Torvalds /* 33871da177e4SLinus Torvalds * Checks for sequence id mutating operations. 33881da177e4SLinus Torvalds */ 3389b37ad28bSAl Viro static __be32 3390dd453dfdSBenny Halevy nfs4_preprocess_seqid_op(struct nfsd4_compound_state *cstate, u32 seqid, 3391dd453dfdSBenny Halevy stateid_t *stateid, int flags, 3392dd453dfdSBenny Halevy struct nfs4_stateowner **sopp, 3393dd453dfdSBenny Halevy struct nfs4_stateid **stpp, struct nfsd4_lock *lock) 33941da177e4SLinus Torvalds { 33951da177e4SLinus Torvalds struct nfs4_stateid *stp; 33961da177e4SLinus Torvalds struct nfs4_stateowner *sop; 3397dd453dfdSBenny Halevy struct svc_fh *current_fh = &cstate->current_fh; 33980836f587SJ. Bruce Fields __be32 status; 33991da177e4SLinus Torvalds 34008c10cbdbSBenny Halevy dprintk("NFSD: %s: seqid=%d stateid = " STATEID_FMT "\n", __func__, 34018c10cbdbSBenny Halevy seqid, STATEID_VAL(stateid)); 34021da177e4SLinus Torvalds 34031da177e4SLinus Torvalds *stpp = NULL; 34041da177e4SLinus Torvalds *sopp = NULL; 34051da177e4SLinus Torvalds 34061da177e4SLinus Torvalds if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) { 34072fdada03SJ. Bruce Fields dprintk("NFSD: preprocess_seqid_op: magic stateid!\n"); 34083a4f98bbSNeilBrown return nfserr_bad_stateid; 34091da177e4SLinus Torvalds } 34101da177e4SLinus Torvalds 34111da177e4SLinus Torvalds if (STALE_STATEID(stateid)) 34123a4f98bbSNeilBrown return nfserr_stale_stateid; 34136668958fSAndy Adamson 34146668958fSAndy Adamson if (nfsd4_has_session(cstate)) 34156668958fSAndy Adamson flags |= HAS_SESSION; 34166668958fSAndy Adamson 34171da177e4SLinus Torvalds /* 34181da177e4SLinus Torvalds * We return BAD_STATEID if filehandle doesn't match stateid, 34191da177e4SLinus Torvalds * the confirmed flag is incorrecly set, or the generation 34201da177e4SLinus Torvalds * number is incorrect. 34211da177e4SLinus Torvalds */ 3422f8816512SNeilBrown stp = find_stateid(stateid, flags); 3423f8816512SNeilBrown if (stp == NULL) { 3424f8816512SNeilBrown /* 3425f8816512SNeilBrown * Also, we should make sure this isn't just the result of 3426f8816512SNeilBrown * a replayed close: 3427f8816512SNeilBrown */ 3428f8816512SNeilBrown sop = search_close_lru(stateid->si_stateownerid, flags); 342933515142SJ. Bruce Fields /* It's not stale; let's assume it's expired: */ 3430f8816512SNeilBrown if (sop == NULL) 343133515142SJ. Bruce Fields return nfserr_expired; 3432f8816512SNeilBrown *sopp = sop; 3433f8816512SNeilBrown goto check_replay; 3434f8816512SNeilBrown } 34351da177e4SLinus Torvalds 343639325bd0SJ. Bruce Fields *stpp = stp; 343739325bd0SJ. Bruce Fields *sopp = sop = stp->st_stateowner; 343839325bd0SJ. Bruce Fields 34394c4cd222SNeilBrown if (lock) { 34404c4cd222SNeilBrown clientid_t *lockclid = &lock->v.new.clientid; 34411da177e4SLinus Torvalds struct nfs4_client *clp = sop->so_client; 34424c4cd222SNeilBrown int lkflg = 0; 3443b37ad28bSAl Viro __be32 status; 34441da177e4SLinus Torvalds 34454c4cd222SNeilBrown lkflg = setlkflg(lock->lk_type); 34464c4cd222SNeilBrown 34474c4cd222SNeilBrown if (lock->lk_is_new) { 34481da177e4SLinus Torvalds if (!sop->so_is_open_owner) 34493a4f98bbSNeilBrown return nfserr_bad_stateid; 345060adfc50SAndy Adamson if (!(flags & HAS_SESSION) && 345160adfc50SAndy Adamson !same_clid(&clp->cl_clientid, lockclid)) 34523a4f98bbSNeilBrown return nfserr_bad_stateid; 34534c4cd222SNeilBrown /* stp is the open stateid */ 34544c4cd222SNeilBrown status = nfs4_check_openmode(stp, lkflg); 34554c4cd222SNeilBrown if (status) 34564c4cd222SNeilBrown return status; 34574c4cd222SNeilBrown } else { 34584c4cd222SNeilBrown /* stp is the lock stateid */ 34594c4cd222SNeilBrown status = nfs4_check_openmode(stp->st_openstp, lkflg); 34604c4cd222SNeilBrown if (status) 34614c4cd222SNeilBrown return status; 34624c4cd222SNeilBrown } 34631da177e4SLinus Torvalds } 34641da177e4SLinus Torvalds 3465f3362737SJ. Bruce Fields if (nfs4_check_fh(current_fh, stp)) { 34662fdada03SJ. Bruce Fields dprintk("NFSD: preprocess_seqid_op: fh-stateid mismatch!\n"); 34673a4f98bbSNeilBrown return nfserr_bad_stateid; 34681da177e4SLinus Torvalds } 34691da177e4SLinus Torvalds 34701da177e4SLinus Torvalds /* 34711da177e4SLinus Torvalds * We now validate the seqid and stateid generation numbers. 34721da177e4SLinus Torvalds * For the moment, we ignore the possibility of 34731da177e4SLinus Torvalds * generation number wraparound. 34741da177e4SLinus Torvalds */ 34756668958fSAndy Adamson if (!(flags & HAS_SESSION) && seqid != sop->so_seqid) 34761da177e4SLinus Torvalds goto check_replay; 34771da177e4SLinus Torvalds 34783a4f98bbSNeilBrown if (sop->so_confirmed && flags & CONFIRM) { 34792fdada03SJ. Bruce Fields dprintk("NFSD: preprocess_seqid_op: expected" 34803a4f98bbSNeilBrown " unconfirmed stateowner!\n"); 34813a4f98bbSNeilBrown return nfserr_bad_stateid; 34821da177e4SLinus Torvalds } 34833a4f98bbSNeilBrown if (!sop->so_confirmed && !(flags & CONFIRM)) { 34842fdada03SJ. Bruce Fields dprintk("NFSD: preprocess_seqid_op: stateowner not" 34853a4f98bbSNeilBrown " confirmed yet!\n"); 34863a4f98bbSNeilBrown return nfserr_bad_stateid; 34871da177e4SLinus Torvalds } 34886668958fSAndy Adamson status = check_stateid_generation(stateid, &stp->st_stateid, flags); 34890836f587SJ. Bruce Fields if (status) 34900836f587SJ. Bruce Fields return status; 349152fd004eSNeilBrown renew_client(sop->so_client); 34923a4f98bbSNeilBrown return nfs_ok; 34931da177e4SLinus Torvalds 34941da177e4SLinus Torvalds check_replay: 3495bd9aac52SNeilBrown if (seqid == sop->so_seqid - 1) { 3496849823c5SNeil Brown dprintk("NFSD: preprocess_seqid_op: retransmission?\n"); 34971da177e4SLinus Torvalds /* indicate replay to calling function */ 3498a90b061cSAl Viro return nfserr_replay_me; 34991da177e4SLinus Torvalds } 35002fdada03SJ. Bruce Fields dprintk("NFSD: preprocess_seqid_op: bad seqid (expected %d, got %d)\n", 35013a4f98bbSNeilBrown sop->so_seqid, seqid); 35023a4f98bbSNeilBrown *sopp = NULL; 35033a4f98bbSNeilBrown return nfserr_bad_seqid; 35041da177e4SLinus Torvalds } 35051da177e4SLinus Torvalds 3506b37ad28bSAl Viro __be32 3507ca364317SJ.Bruce Fields nfsd4_open_confirm(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3508a4f1706aSJ.Bruce Fields struct nfsd4_open_confirm *oc) 35091da177e4SLinus Torvalds { 3510b37ad28bSAl Viro __be32 status; 35111da177e4SLinus Torvalds struct nfs4_stateowner *sop; 35121da177e4SLinus Torvalds struct nfs4_stateid *stp; 35131da177e4SLinus Torvalds 35141da177e4SLinus Torvalds dprintk("NFSD: nfsd4_open_confirm on file %.*s\n", 3515ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3516ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 35171da177e4SLinus Torvalds 3518ca364317SJ.Bruce Fields status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0); 3519a8cddc5dSJ. Bruce Fields if (status) 3520a8cddc5dSJ. Bruce Fields return status; 35211da177e4SLinus Torvalds 35221da177e4SLinus Torvalds nfs4_lock_state(); 35231da177e4SLinus Torvalds 3524dd453dfdSBenny Halevy if ((status = nfs4_preprocess_seqid_op(cstate, 3525ca364317SJ.Bruce Fields oc->oc_seqid, &oc->oc_req_stateid, 3526f3362737SJ. Bruce Fields CONFIRM | OPEN_STATE, 35271da177e4SLinus Torvalds &oc->oc_stateowner, &stp, NULL))) 35281da177e4SLinus Torvalds goto out; 35291da177e4SLinus Torvalds 35301da177e4SLinus Torvalds sop = oc->oc_stateowner; 35311da177e4SLinus Torvalds sop->so_confirmed = 1; 35321da177e4SLinus Torvalds update_stateid(&stp->st_stateid); 35331da177e4SLinus Torvalds memcpy(&oc->oc_resp_stateid, &stp->st_stateid, sizeof(stateid_t)); 35348c10cbdbSBenny Halevy dprintk("NFSD: %s: success, seqid=%d stateid=" STATEID_FMT "\n", 35358c10cbdbSBenny Halevy __func__, oc->oc_seqid, STATEID_VAL(&stp->st_stateid)); 3536c7b9a459SNeilBrown 3537c7b9a459SNeilBrown nfsd4_create_clid_dir(sop->so_client); 35381da177e4SLinus Torvalds out: 3539f2327d9aSNeil Brown if (oc->oc_stateowner) { 35401da177e4SLinus Torvalds nfs4_get_stateowner(oc->oc_stateowner); 3541a4f1706aSJ.Bruce Fields cstate->replay_owner = oc->oc_stateowner; 3542f2327d9aSNeil Brown } 35431da177e4SLinus Torvalds nfs4_unlock_state(); 35441da177e4SLinus Torvalds return status; 35451da177e4SLinus Torvalds } 35461da177e4SLinus Torvalds 3547f197c271SJ. Bruce Fields static inline void nfs4_file_downgrade(struct nfs4_stateid *stp, unsigned int to_access) 35481da177e4SLinus Torvalds { 35491da177e4SLinus Torvalds int i; 3550f197c271SJ. Bruce Fields 35511da177e4SLinus Torvalds for (i = 1; i < 4; i++) { 3552f197c271SJ. Bruce Fields if (test_bit(i, &stp->st_access_bmap) && !(i & to_access)) { 3553f197c271SJ. Bruce Fields nfs4_file_put_access(stp->st_file, i); 3554f197c271SJ. Bruce Fields __clear_bit(i, &stp->st_access_bmap); 3555f197c271SJ. Bruce Fields } 35561da177e4SLinus Torvalds } 35571da177e4SLinus Torvalds } 35581da177e4SLinus Torvalds 35591da177e4SLinus Torvalds static void 35601da177e4SLinus Torvalds reset_union_bmap_deny(unsigned long deny, unsigned long *bmap) 35611da177e4SLinus Torvalds { 35621da177e4SLinus Torvalds int i; 35631da177e4SLinus Torvalds for (i = 0; i < 4; i++) { 35641da177e4SLinus Torvalds if ((i & deny) != i) 35651da177e4SLinus Torvalds __clear_bit(i, bmap); 35661da177e4SLinus Torvalds } 35671da177e4SLinus Torvalds } 35681da177e4SLinus Torvalds 3569b37ad28bSAl Viro __be32 3570ca364317SJ.Bruce Fields nfsd4_open_downgrade(struct svc_rqst *rqstp, 3571ca364317SJ.Bruce Fields struct nfsd4_compound_state *cstate, 3572a4f1706aSJ.Bruce Fields struct nfsd4_open_downgrade *od) 35731da177e4SLinus Torvalds { 3574b37ad28bSAl Viro __be32 status; 35751da177e4SLinus Torvalds struct nfs4_stateid *stp; 35761da177e4SLinus Torvalds 35771da177e4SLinus Torvalds dprintk("NFSD: nfsd4_open_downgrade on file %.*s\n", 3578ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3579ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 35801da177e4SLinus Torvalds 3581d87a8adeSAndy Adamson if (!access_valid(od->od_share_access, cstate->minorversion) 3582ba5a6a19SJ. Bruce Fields || !deny_valid(od->od_share_deny)) 35831da177e4SLinus Torvalds return nfserr_inval; 35841da177e4SLinus Torvalds 35851da177e4SLinus Torvalds nfs4_lock_state(); 3586dd453dfdSBenny Halevy if ((status = nfs4_preprocess_seqid_op(cstate, 3587ca364317SJ.Bruce Fields od->od_seqid, 35881da177e4SLinus Torvalds &od->od_stateid, 3589f3362737SJ. Bruce Fields OPEN_STATE, 35901da177e4SLinus Torvalds &od->od_stateowner, &stp, NULL))) 35911da177e4SLinus Torvalds goto out; 35921da177e4SLinus Torvalds 35931da177e4SLinus Torvalds status = nfserr_inval; 35941da177e4SLinus Torvalds if (!test_bit(od->od_share_access, &stp->st_access_bmap)) { 35951da177e4SLinus Torvalds dprintk("NFSD:access not a subset current bitmap: 0x%lx, input access=%08x\n", 35961da177e4SLinus Torvalds stp->st_access_bmap, od->od_share_access); 35971da177e4SLinus Torvalds goto out; 35981da177e4SLinus Torvalds } 35991da177e4SLinus Torvalds if (!test_bit(od->od_share_deny, &stp->st_deny_bmap)) { 36001da177e4SLinus Torvalds dprintk("NFSD:deny not a subset current bitmap: 0x%lx, input deny=%08x\n", 36011da177e4SLinus Torvalds stp->st_deny_bmap, od->od_share_deny); 36021da177e4SLinus Torvalds goto out; 36031da177e4SLinus Torvalds } 3604f197c271SJ. Bruce Fields nfs4_file_downgrade(stp, od->od_share_access); 36051da177e4SLinus Torvalds 36061da177e4SLinus Torvalds reset_union_bmap_deny(od->od_share_deny, &stp->st_deny_bmap); 36071da177e4SLinus Torvalds 36081da177e4SLinus Torvalds update_stateid(&stp->st_stateid); 36091da177e4SLinus Torvalds memcpy(&od->od_stateid, &stp->st_stateid, sizeof(stateid_t)); 36101da177e4SLinus Torvalds status = nfs_ok; 36111da177e4SLinus Torvalds out: 3612f2327d9aSNeil Brown if (od->od_stateowner) { 36131da177e4SLinus Torvalds nfs4_get_stateowner(od->od_stateowner); 3614a4f1706aSJ.Bruce Fields cstate->replay_owner = od->od_stateowner; 3615f2327d9aSNeil Brown } 36161da177e4SLinus Torvalds nfs4_unlock_state(); 36171da177e4SLinus Torvalds return status; 36181da177e4SLinus Torvalds } 36191da177e4SLinus Torvalds 36201da177e4SLinus Torvalds /* 36211da177e4SLinus Torvalds * nfs4_unlock_state() called after encode 36221da177e4SLinus Torvalds */ 3623b37ad28bSAl Viro __be32 3624ca364317SJ.Bruce Fields nfsd4_close(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3625a4f1706aSJ.Bruce Fields struct nfsd4_close *close) 36261da177e4SLinus Torvalds { 3627b37ad28bSAl Viro __be32 status; 36281da177e4SLinus Torvalds struct nfs4_stateid *stp; 36291da177e4SLinus Torvalds 36301da177e4SLinus Torvalds dprintk("NFSD: nfsd4_close on file %.*s\n", 3631ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3632ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 36331da177e4SLinus Torvalds 36341da177e4SLinus Torvalds nfs4_lock_state(); 36351da177e4SLinus Torvalds /* check close_lru for replay */ 3636dd453dfdSBenny Halevy if ((status = nfs4_preprocess_seqid_op(cstate, 3637ca364317SJ.Bruce Fields close->cl_seqid, 36381da177e4SLinus Torvalds &close->cl_stateid, 3639f3362737SJ. Bruce Fields OPEN_STATE | CLOSE_STATE, 36401da177e4SLinus Torvalds &close->cl_stateowner, &stp, NULL))) 36411da177e4SLinus Torvalds goto out; 36421da177e4SLinus Torvalds status = nfs_ok; 36431da177e4SLinus Torvalds update_stateid(&stp->st_stateid); 36441da177e4SLinus Torvalds memcpy(&close->cl_stateid, &stp->st_stateid, sizeof(stateid_t)); 36451da177e4SLinus Torvalds 364604ef5954SJ. Bruce Fields /* release_stateid() calls nfsd_close() if needed */ 36472283963fSJ. Bruce Fields release_open_stateid(stp); 364804ef5954SJ. Bruce Fields 364904ef5954SJ. Bruce Fields /* place unused nfs4_stateowners on so_close_lru list to be 365004ef5954SJ. Bruce Fields * released by the laundromat service after the lease period 365104ef5954SJ. Bruce Fields * to enable us to handle CLOSE replay 365204ef5954SJ. Bruce Fields */ 365304ef5954SJ. Bruce Fields if (list_empty(&close->cl_stateowner->so_stateids)) 365404ef5954SJ. Bruce Fields move_to_close_lru(close->cl_stateowner); 36551da177e4SLinus Torvalds out: 3656f2327d9aSNeil Brown if (close->cl_stateowner) { 36571da177e4SLinus Torvalds nfs4_get_stateowner(close->cl_stateowner); 3658a4f1706aSJ.Bruce Fields cstate->replay_owner = close->cl_stateowner; 3659f2327d9aSNeil Brown } 36601da177e4SLinus Torvalds nfs4_unlock_state(); 36611da177e4SLinus Torvalds return status; 36621da177e4SLinus Torvalds } 36631da177e4SLinus Torvalds 3664b37ad28bSAl Viro __be32 3665ca364317SJ.Bruce Fields nfsd4_delegreturn(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3666ca364317SJ.Bruce Fields struct nfsd4_delegreturn *dr) 36671da177e4SLinus Torvalds { 3668203a8c8eSJ. Bruce Fields struct nfs4_delegation *dp; 3669203a8c8eSJ. Bruce Fields stateid_t *stateid = &dr->dr_stateid; 3670203a8c8eSJ. Bruce Fields struct inode *inode; 3671b37ad28bSAl Viro __be32 status; 36726668958fSAndy Adamson int flags = 0; 36731da177e4SLinus Torvalds 3674ca364317SJ.Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0))) 3675203a8c8eSJ. Bruce Fields return status; 3676203a8c8eSJ. Bruce Fields inode = cstate->current_fh.fh_dentry->d_inode; 36771da177e4SLinus Torvalds 36786668958fSAndy Adamson if (nfsd4_has_session(cstate)) 36796668958fSAndy Adamson flags |= HAS_SESSION; 36801da177e4SLinus Torvalds nfs4_lock_state(); 3681203a8c8eSJ. Bruce Fields status = nfserr_bad_stateid; 3682203a8c8eSJ. Bruce Fields if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) 3683203a8c8eSJ. Bruce Fields goto out; 3684203a8c8eSJ. Bruce Fields status = nfserr_stale_stateid; 3685203a8c8eSJ. Bruce Fields if (STALE_STATEID(stateid)) 3686203a8c8eSJ. Bruce Fields goto out; 36877e0f7cf5SJ. Bruce Fields status = nfserr_bad_stateid; 3688203a8c8eSJ. Bruce Fields if (!is_delegation_stateid(stateid)) 3689203a8c8eSJ. Bruce Fields goto out; 369033515142SJ. Bruce Fields status = nfserr_expired; 3691203a8c8eSJ. Bruce Fields dp = find_delegation_stateid(inode, stateid); 3692e4e83ea4SJ. Bruce Fields if (!dp) 3693203a8c8eSJ. Bruce Fields goto out; 36946668958fSAndy Adamson status = check_stateid_generation(stateid, &dp->dl_stateid, flags); 3695203a8c8eSJ. Bruce Fields if (status) 3696203a8c8eSJ. Bruce Fields goto out; 3697203a8c8eSJ. Bruce Fields renew_client(dp->dl_client); 3698203a8c8eSJ. Bruce Fields 3699203a8c8eSJ. Bruce Fields unhash_delegation(dp); 37001da177e4SLinus Torvalds out: 3701203a8c8eSJ. Bruce Fields nfs4_unlock_state(); 3702203a8c8eSJ. Bruce Fields 37031da177e4SLinus Torvalds return status; 37041da177e4SLinus Torvalds } 37051da177e4SLinus Torvalds 37061da177e4SLinus Torvalds 37071da177e4SLinus Torvalds /* 37081da177e4SLinus Torvalds * Lock owner state (byte-range locks) 37091da177e4SLinus Torvalds */ 37101da177e4SLinus Torvalds #define LOFF_OVERFLOW(start, len) ((u64)(len) > ~(u64)(start)) 37111da177e4SLinus Torvalds #define LOCK_HASH_BITS 8 37121da177e4SLinus Torvalds #define LOCK_HASH_SIZE (1 << LOCK_HASH_BITS) 37131da177e4SLinus Torvalds #define LOCK_HASH_MASK (LOCK_HASH_SIZE - 1) 37141da177e4SLinus Torvalds 371587df4de8SBenny Halevy static inline u64 371687df4de8SBenny Halevy end_offset(u64 start, u64 len) 371787df4de8SBenny Halevy { 371887df4de8SBenny Halevy u64 end; 371987df4de8SBenny Halevy 372087df4de8SBenny Halevy end = start + len; 372187df4de8SBenny Halevy return end >= start ? end: NFS4_MAX_UINT64; 372287df4de8SBenny Halevy } 372387df4de8SBenny Halevy 372487df4de8SBenny Halevy /* last octet in a range */ 372587df4de8SBenny Halevy static inline u64 372687df4de8SBenny Halevy last_byte_offset(u64 start, u64 len) 372787df4de8SBenny Halevy { 372887df4de8SBenny Halevy u64 end; 372987df4de8SBenny Halevy 373087df4de8SBenny Halevy BUG_ON(!len); 373187df4de8SBenny Halevy end = start + len; 373287df4de8SBenny Halevy return end > start ? end - 1: NFS4_MAX_UINT64; 373387df4de8SBenny Halevy } 373487df4de8SBenny Halevy 3735ddc04c41SJ. Bruce Fields static unsigned int lockownerid_hashval(u32 id) 3736ddc04c41SJ. Bruce Fields { 3737ddc04c41SJ. Bruce Fields return id & LOCK_HASH_MASK; 3738ddc04c41SJ. Bruce Fields } 37391da177e4SLinus Torvalds 37401da177e4SLinus Torvalds static inline unsigned int 37411da177e4SLinus Torvalds lock_ownerstr_hashval(struct inode *inode, u32 cl_id, 37421da177e4SLinus Torvalds struct xdr_netobj *ownername) 37431da177e4SLinus Torvalds { 37441da177e4SLinus Torvalds return (file_hashval(inode) + cl_id 37451da177e4SLinus Torvalds + opaque_hashval(ownername->data, ownername->len)) 37461da177e4SLinus Torvalds & LOCK_HASH_MASK; 37471da177e4SLinus Torvalds } 37481da177e4SLinus Torvalds 37491da177e4SLinus Torvalds static struct list_head lock_ownerid_hashtbl[LOCK_HASH_SIZE]; 37501da177e4SLinus Torvalds static struct list_head lock_ownerstr_hashtbl[LOCK_HASH_SIZE]; 37511da177e4SLinus Torvalds static struct list_head lockstateid_hashtbl[STATEID_HASH_SIZE]; 37521da177e4SLinus Torvalds 3753e1ca12dfSBryan Schumaker static int 3754e1ca12dfSBryan Schumaker same_stateid(stateid_t *id_one, stateid_t *id_two) 3755e1ca12dfSBryan Schumaker { 3756e1ca12dfSBryan Schumaker if (id_one->si_stateownerid != id_two->si_stateownerid) 3757e1ca12dfSBryan Schumaker return 0; 3758e1ca12dfSBryan Schumaker return id_one->si_fileid == id_two->si_fileid; 3759e1ca12dfSBryan Schumaker } 3760e1ca12dfSBryan Schumaker 3761fd39ca9aSNeilBrown static struct nfs4_stateid * 37621da177e4SLinus Torvalds find_stateid(stateid_t *stid, int flags) 37631da177e4SLinus Torvalds { 37649346eff0SKrishna Kumar struct nfs4_stateid *local; 37651da177e4SLinus Torvalds u32 st_id = stid->si_stateownerid; 37661da177e4SLinus Torvalds u32 f_id = stid->si_fileid; 37671da177e4SLinus Torvalds unsigned int hashval; 37681da177e4SLinus Torvalds 37691da177e4SLinus Torvalds dprintk("NFSD: find_stateid flags 0x%x\n",flags); 37709346eff0SKrishna Kumar if (flags & (LOCK_STATE | RD_STATE | WR_STATE)) { 37711da177e4SLinus Torvalds hashval = stateid_hashval(st_id, f_id); 37721da177e4SLinus Torvalds list_for_each_entry(local, &lockstateid_hashtbl[hashval], st_hash) { 37731da177e4SLinus Torvalds if ((local->st_stateid.si_stateownerid == st_id) && 37741da177e4SLinus Torvalds (local->st_stateid.si_fileid == f_id)) 37751da177e4SLinus Torvalds return local; 37761da177e4SLinus Torvalds } 37771da177e4SLinus Torvalds } 37789346eff0SKrishna Kumar 37799346eff0SKrishna Kumar if (flags & (OPEN_STATE | RD_STATE | WR_STATE)) { 37801da177e4SLinus Torvalds hashval = stateid_hashval(st_id, f_id); 37811da177e4SLinus Torvalds list_for_each_entry(local, &stateid_hashtbl[hashval], st_hash) { 37821da177e4SLinus Torvalds if ((local->st_stateid.si_stateownerid == st_id) && 37831da177e4SLinus Torvalds (local->st_stateid.si_fileid == f_id)) 37841da177e4SLinus Torvalds return local; 37851da177e4SLinus Torvalds } 3786849823c5SNeil Brown } 37871da177e4SLinus Torvalds return NULL; 37881da177e4SLinus Torvalds } 37891da177e4SLinus Torvalds 3790e1ca12dfSBryan Schumaker static struct nfs4_stateid * 3791e1ca12dfSBryan Schumaker search_for_stateid(stateid_t *stid) 3792e1ca12dfSBryan Schumaker { 3793e1ca12dfSBryan Schumaker struct nfs4_stateid *local; 3794e1ca12dfSBryan Schumaker unsigned int hashval = stateid_hashval(stid->si_stateownerid, stid->si_fileid); 3795e1ca12dfSBryan Schumaker 3796e1ca12dfSBryan Schumaker list_for_each_entry(local, &lockstateid_hashtbl[hashval], st_hash) { 3797e1ca12dfSBryan Schumaker if (same_stateid(&local->st_stateid, stid)) 3798e1ca12dfSBryan Schumaker return local; 3799e1ca12dfSBryan Schumaker } 3800e1ca12dfSBryan Schumaker 3801e1ca12dfSBryan Schumaker list_for_each_entry(local, &stateid_hashtbl[hashval], st_hash) { 3802e1ca12dfSBryan Schumaker if (same_stateid(&local->st_stateid, stid)) 3803e1ca12dfSBryan Schumaker return local; 3804e1ca12dfSBryan Schumaker } 3805e1ca12dfSBryan Schumaker return NULL; 3806e1ca12dfSBryan Schumaker } 3807e1ca12dfSBryan Schumaker 3808e1ca12dfSBryan Schumaker static struct nfs4_delegation * 3809e1ca12dfSBryan Schumaker search_for_delegation(stateid_t *stid) 3810e1ca12dfSBryan Schumaker { 3811e1ca12dfSBryan Schumaker struct nfs4_file *fp; 3812e1ca12dfSBryan Schumaker struct nfs4_delegation *dp; 3813e1ca12dfSBryan Schumaker struct list_head *pos; 3814e1ca12dfSBryan Schumaker int i; 3815e1ca12dfSBryan Schumaker 3816e1ca12dfSBryan Schumaker for (i = 0; i < FILE_HASH_SIZE; i++) { 3817e1ca12dfSBryan Schumaker list_for_each_entry(fp, &file_hashtbl[i], fi_hash) { 3818e1ca12dfSBryan Schumaker list_for_each(pos, &fp->fi_delegations) { 3819e1ca12dfSBryan Schumaker dp = list_entry(pos, struct nfs4_delegation, dl_perfile); 3820e1ca12dfSBryan Schumaker if (same_stateid(&dp->dl_stateid, stid)) 3821e1ca12dfSBryan Schumaker return dp; 3822e1ca12dfSBryan Schumaker } 3823e1ca12dfSBryan Schumaker } 3824e1ca12dfSBryan Schumaker } 3825e1ca12dfSBryan Schumaker return NULL; 3826e1ca12dfSBryan Schumaker } 3827e1ca12dfSBryan Schumaker 38281da177e4SLinus Torvalds static struct nfs4_delegation * 38291da177e4SLinus Torvalds find_delegation_stateid(struct inode *ino, stateid_t *stid) 38301da177e4SLinus Torvalds { 383113cd2184SNeilBrown struct nfs4_file *fp; 383213cd2184SNeilBrown struct nfs4_delegation *dl; 38331da177e4SLinus Torvalds 38348c10cbdbSBenny Halevy dprintk("NFSD: %s: stateid=" STATEID_FMT "\n", __func__, 38358c10cbdbSBenny Halevy STATEID_VAL(stid)); 38361da177e4SLinus Torvalds 38371da177e4SLinus Torvalds fp = find_file(ino); 383813cd2184SNeilBrown if (!fp) 38391da177e4SLinus Torvalds return NULL; 384013cd2184SNeilBrown dl = find_delegation_file(fp, stid); 384113cd2184SNeilBrown put_nfs4_file(fp); 384213cd2184SNeilBrown return dl; 38431da177e4SLinus Torvalds } 38441da177e4SLinus Torvalds 38451da177e4SLinus Torvalds /* 38461da177e4SLinus Torvalds * TODO: Linux file offsets are _signed_ 64-bit quantities, which means that 38471da177e4SLinus Torvalds * we can't properly handle lock requests that go beyond the (2^63 - 1)-th 38481da177e4SLinus Torvalds * byte, because of sign extension problems. Since NFSv4 calls for 64-bit 38491da177e4SLinus Torvalds * locking, this prevents us from being completely protocol-compliant. The 38501da177e4SLinus Torvalds * real solution to this problem is to start using unsigned file offsets in 38511da177e4SLinus Torvalds * the VFS, but this is a very deep change! 38521da177e4SLinus Torvalds */ 38531da177e4SLinus Torvalds static inline void 38541da177e4SLinus Torvalds nfs4_transform_lock_offset(struct file_lock *lock) 38551da177e4SLinus Torvalds { 38561da177e4SLinus Torvalds if (lock->fl_start < 0) 38571da177e4SLinus Torvalds lock->fl_start = OFFSET_MAX; 38581da177e4SLinus Torvalds if (lock->fl_end < 0) 38591da177e4SLinus Torvalds lock->fl_end = OFFSET_MAX; 38601da177e4SLinus Torvalds } 38611da177e4SLinus Torvalds 3862d5b9026aSNeilBrown /* Hack!: For now, we're defining this just so we can use a pointer to it 3863d5b9026aSNeilBrown * as a unique cookie to identify our (NFSv4's) posix locks. */ 38647b021967SAlexey Dobriyan static const struct lock_manager_operations nfsd_posix_mng_ops = { 3865d5b9026aSNeilBrown }; 38661da177e4SLinus Torvalds 38671da177e4SLinus Torvalds static inline void 38681da177e4SLinus Torvalds nfs4_set_lock_denied(struct file_lock *fl, struct nfsd4_lock_denied *deny) 38691da177e4SLinus Torvalds { 3870d5b9026aSNeilBrown struct nfs4_stateowner *sop; 38711da177e4SLinus Torvalds 3872d5b9026aSNeilBrown if (fl->fl_lmops == &nfsd_posix_mng_ops) { 3873d5b9026aSNeilBrown sop = (struct nfs4_stateowner *) fl->fl_owner; 38741da177e4SLinus Torvalds kref_get(&sop->so_ref); 38751da177e4SLinus Torvalds deny->ld_sop = sop; 38761da177e4SLinus Torvalds deny->ld_clientid = sop->so_client->cl_clientid; 3877d5b9026aSNeilBrown } else { 3878d5b9026aSNeilBrown deny->ld_sop = NULL; 3879d5b9026aSNeilBrown deny->ld_clientid.cl_boot = 0; 3880d5b9026aSNeilBrown deny->ld_clientid.cl_id = 0; 38811da177e4SLinus Torvalds } 38821da177e4SLinus Torvalds deny->ld_start = fl->fl_start; 388387df4de8SBenny Halevy deny->ld_length = NFS4_MAX_UINT64; 388487df4de8SBenny Halevy if (fl->fl_end != NFS4_MAX_UINT64) 38851da177e4SLinus Torvalds deny->ld_length = fl->fl_end - fl->fl_start + 1; 38861da177e4SLinus Torvalds deny->ld_type = NFS4_READ_LT; 38871da177e4SLinus Torvalds if (fl->fl_type != F_RDLCK) 38881da177e4SLinus Torvalds deny->ld_type = NFS4_WRITE_LT; 38891da177e4SLinus Torvalds } 38901da177e4SLinus Torvalds 38911da177e4SLinus Torvalds static struct nfs4_stateowner * 38921da177e4SLinus Torvalds find_lockstateowner_str(struct inode *inode, clientid_t *clid, 38931da177e4SLinus Torvalds struct xdr_netobj *owner) 38941da177e4SLinus Torvalds { 38951da177e4SLinus Torvalds unsigned int hashval = lock_ownerstr_hashval(inode, clid->cl_id, owner); 38961da177e4SLinus Torvalds struct nfs4_stateowner *op; 38971da177e4SLinus Torvalds 38981da177e4SLinus Torvalds list_for_each_entry(op, &lock_ownerstr_hashtbl[hashval], so_strhash) { 3899599e0a22SJ. Bruce Fields if (same_owner_str(op, owner, clid)) 39001da177e4SLinus Torvalds return op; 39011da177e4SLinus Torvalds } 39021da177e4SLinus Torvalds return NULL; 39031da177e4SLinus Torvalds } 39041da177e4SLinus Torvalds 39051da177e4SLinus Torvalds /* 39061da177e4SLinus Torvalds * Alloc a lock owner structure. 39071da177e4SLinus Torvalds * Called in nfsd4_lock - therefore, OPEN and OPEN_CONFIRM (if needed) has 390825985edcSLucas De Marchi * occurred. 39091da177e4SLinus Torvalds * 39101da177e4SLinus Torvalds * strhashval = lock_ownerstr_hashval 39111da177e4SLinus Torvalds */ 39121da177e4SLinus Torvalds 39131da177e4SLinus Torvalds static struct nfs4_stateowner * 39141da177e4SLinus Torvalds alloc_init_lock_stateowner(unsigned int strhashval, struct nfs4_client *clp, struct nfs4_stateid *open_stp, struct nfsd4_lock *lock) { 39151da177e4SLinus Torvalds struct nfs4_stateowner *sop; 39161da177e4SLinus Torvalds struct nfs4_replay *rp; 39171da177e4SLinus Torvalds unsigned int idhashval; 39181da177e4SLinus Torvalds 39191da177e4SLinus Torvalds if (!(sop = alloc_stateowner(&lock->lk_new_owner))) 39201da177e4SLinus Torvalds return NULL; 39211da177e4SLinus Torvalds idhashval = lockownerid_hashval(current_ownerid); 39221da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_idhash); 39231da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_strhash); 39241da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_perclient); 3925ea1da636SNeilBrown INIT_LIST_HEAD(&sop->so_stateids); 3926ea1da636SNeilBrown INIT_LIST_HEAD(&sop->so_perstateid); 39271da177e4SLinus Torvalds INIT_LIST_HEAD(&sop->so_close_lru); /* not used */ 39281da177e4SLinus Torvalds sop->so_time = 0; 39291da177e4SLinus Torvalds list_add(&sop->so_idhash, &lock_ownerid_hashtbl[idhashval]); 39301da177e4SLinus Torvalds list_add(&sop->so_strhash, &lock_ownerstr_hashtbl[strhashval]); 3931ea1da636SNeilBrown list_add(&sop->so_perstateid, &open_stp->st_lockowners); 39321da177e4SLinus Torvalds sop->so_is_open_owner = 0; 39331da177e4SLinus Torvalds sop->so_id = current_ownerid++; 39341da177e4SLinus Torvalds sop->so_client = clp; 3935b59e3c0eSNeil Brown /* It is the openowner seqid that will be incremented in encode in the 3936b59e3c0eSNeil Brown * case of new lockowners; so increment the lock seqid manually: */ 3937b59e3c0eSNeil Brown sop->so_seqid = lock->lk_new_lock_seqid + 1; 39381da177e4SLinus Torvalds sop->so_confirmed = 1; 39391da177e4SLinus Torvalds rp = &sop->so_replay; 3940de1ae286SAl Viro rp->rp_status = nfserr_serverfault; 39411da177e4SLinus Torvalds rp->rp_buflen = 0; 39421da177e4SLinus Torvalds rp->rp_buf = rp->rp_ibuf; 39431da177e4SLinus Torvalds return sop; 39441da177e4SLinus Torvalds } 39451da177e4SLinus Torvalds 3946fd39ca9aSNeilBrown static struct nfs4_stateid * 39471da177e4SLinus Torvalds alloc_init_lock_stateid(struct nfs4_stateowner *sop, struct nfs4_file *fp, struct nfs4_stateid *open_stp) 39481da177e4SLinus Torvalds { 39491da177e4SLinus Torvalds struct nfs4_stateid *stp; 39501da177e4SLinus Torvalds unsigned int hashval = stateid_hashval(sop->so_id, fp->fi_id); 39511da177e4SLinus Torvalds 39525ac049acSNeilBrown stp = nfs4_alloc_stateid(); 39535ac049acSNeilBrown if (stp == NULL) 39541da177e4SLinus Torvalds goto out; 39551da177e4SLinus Torvalds INIT_LIST_HEAD(&stp->st_hash); 39561da177e4SLinus Torvalds INIT_LIST_HEAD(&stp->st_perfile); 3957ea1da636SNeilBrown INIT_LIST_HEAD(&stp->st_perstateowner); 3958ea1da636SNeilBrown INIT_LIST_HEAD(&stp->st_lockowners); /* not used */ 39591da177e4SLinus Torvalds list_add(&stp->st_hash, &lockstateid_hashtbl[hashval]); 39608beefa24SNeilBrown list_add(&stp->st_perfile, &fp->fi_stateids); 3961ea1da636SNeilBrown list_add(&stp->st_perstateowner, &sop->so_stateids); 39621da177e4SLinus Torvalds stp->st_stateowner = sop; 396313cd2184SNeilBrown get_nfs4_file(fp); 39641da177e4SLinus Torvalds stp->st_file = fp; 3965e4e83ea4SJ. Bruce Fields stp->st_stateid.si_boot = boot_time; 39661da177e4SLinus Torvalds stp->st_stateid.si_stateownerid = sop->so_id; 39671da177e4SLinus Torvalds stp->st_stateid.si_fileid = fp->fi_id; 39681da177e4SLinus Torvalds stp->st_stateid.si_generation = 0; 39690997b173SJ. Bruce Fields stp->st_access_bmap = 0; 39701da177e4SLinus Torvalds stp->st_deny_bmap = open_stp->st_deny_bmap; 39714c4cd222SNeilBrown stp->st_openstp = open_stp; 39721da177e4SLinus Torvalds 39731da177e4SLinus Torvalds out: 39741da177e4SLinus Torvalds return stp; 39751da177e4SLinus Torvalds } 39761da177e4SLinus Torvalds 3977fd39ca9aSNeilBrown static int 39781da177e4SLinus Torvalds check_lock_length(u64 offset, u64 length) 39791da177e4SLinus Torvalds { 398087df4de8SBenny Halevy return ((length == 0) || ((length != NFS4_MAX_UINT64) && 39811da177e4SLinus Torvalds LOFF_OVERFLOW(offset, length))); 39821da177e4SLinus Torvalds } 39831da177e4SLinus Torvalds 39840997b173SJ. Bruce Fields static void get_lock_access(struct nfs4_stateid *lock_stp, u32 access) 39850997b173SJ. Bruce Fields { 39860997b173SJ. Bruce Fields struct nfs4_file *fp = lock_stp->st_file; 39870997b173SJ. Bruce Fields int oflag = nfs4_access_to_omode(access); 39880997b173SJ. Bruce Fields 39890997b173SJ. Bruce Fields if (test_bit(access, &lock_stp->st_access_bmap)) 39900997b173SJ. Bruce Fields return; 39910997b173SJ. Bruce Fields nfs4_file_get_access(fp, oflag); 39920997b173SJ. Bruce Fields __set_bit(access, &lock_stp->st_access_bmap); 39930997b173SJ. Bruce Fields } 39940997b173SJ. Bruce Fields 39951da177e4SLinus Torvalds /* 39961da177e4SLinus Torvalds * LOCK operation 39971da177e4SLinus Torvalds */ 3998b37ad28bSAl Viro __be32 3999ca364317SJ.Bruce Fields nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4000a4f1706aSJ.Bruce Fields struct nfsd4_lock *lock) 40011da177e4SLinus Torvalds { 40023e9e3dbeSNeilBrown struct nfs4_stateowner *open_sop = NULL; 4003b59e3c0eSNeil Brown struct nfs4_stateowner *lock_sop = NULL; 40041da177e4SLinus Torvalds struct nfs4_stateid *lock_stp; 40057d947842SJ. Bruce Fields struct nfs4_file *fp; 40067d947842SJ. Bruce Fields struct file *filp = NULL; 40071da177e4SLinus Torvalds struct file_lock file_lock; 40088dc7c311SAndy Adamson struct file_lock conflock; 4009b37ad28bSAl Viro __be32 status = 0; 40101da177e4SLinus Torvalds unsigned int strhashval; 4011b8dd7b9aSAl Viro int err; 40121da177e4SLinus Torvalds 40131da177e4SLinus Torvalds dprintk("NFSD: nfsd4_lock: start=%Ld length=%Ld\n", 40141da177e4SLinus Torvalds (long long) lock->lk_offset, 40151da177e4SLinus Torvalds (long long) lock->lk_length); 40161da177e4SLinus Torvalds 40171da177e4SLinus Torvalds if (check_lock_length(lock->lk_offset, lock->lk_length)) 40181da177e4SLinus Torvalds return nfserr_inval; 40191da177e4SLinus Torvalds 4020ca364317SJ.Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, 40218837abcaSMiklos Szeredi S_IFREG, NFSD_MAY_LOCK))) { 4022a6f6ef2fSAndy Adamson dprintk("NFSD: nfsd4_lock: permission denied!\n"); 4023a6f6ef2fSAndy Adamson return status; 4024a6f6ef2fSAndy Adamson } 4025a6f6ef2fSAndy Adamson 40261da177e4SLinus Torvalds nfs4_lock_state(); 40271da177e4SLinus Torvalds 40281da177e4SLinus Torvalds if (lock->lk_is_new) { 40291da177e4SLinus Torvalds /* 40301da177e4SLinus Torvalds * Client indicates that this is a new lockowner. 4031893f8770SNeilBrown * Use open owner and open stateid to create lock owner and 4032893f8770SNeilBrown * lock stateid. 40331da177e4SLinus Torvalds */ 40341da177e4SLinus Torvalds struct nfs4_stateid *open_stp = NULL; 40351da177e4SLinus Torvalds 40361da177e4SLinus Torvalds status = nfserr_stale_clientid; 403760adfc50SAndy Adamson if (!nfsd4_has_session(cstate) && 403860adfc50SAndy Adamson STALE_CLIENTID(&lock->lk_new_clientid)) 40391da177e4SLinus Torvalds goto out; 40401da177e4SLinus Torvalds 40411da177e4SLinus Torvalds /* validate and update open stateid and open seqid */ 4042dd453dfdSBenny Halevy status = nfs4_preprocess_seqid_op(cstate, 40431da177e4SLinus Torvalds lock->lk_new_open_seqid, 40441da177e4SLinus Torvalds &lock->lk_new_open_stateid, 4045f3362737SJ. Bruce Fields OPEN_STATE, 40463a65588aSJ. Bruce Fields &lock->lk_replay_owner, &open_stp, 4047b59e3c0eSNeil Brown lock); 404837515177SNeilBrown if (status) 40491da177e4SLinus Torvalds goto out; 40503a65588aSJ. Bruce Fields open_sop = lock->lk_replay_owner; 40511da177e4SLinus Torvalds /* create lockowner and lock stateid */ 40521da177e4SLinus Torvalds fp = open_stp->st_file; 40531da177e4SLinus Torvalds strhashval = lock_ownerstr_hashval(fp->fi_inode, 40541da177e4SLinus Torvalds open_sop->so_client->cl_clientid.cl_id, 40551da177e4SLinus Torvalds &lock->v.new.owner); 40563e9e3dbeSNeilBrown /* XXX: Do we need to check for duplicate stateowners on 40573e9e3dbeSNeilBrown * the same file, or should they just be allowed (and 40583e9e3dbeSNeilBrown * create new stateids)? */ 40593e772463SJ. Bruce Fields status = nfserr_jukebox; 4060b59e3c0eSNeil Brown lock_sop = alloc_init_lock_stateowner(strhashval, 4061b59e3c0eSNeil Brown open_sop->so_client, open_stp, lock); 4062b59e3c0eSNeil Brown if (lock_sop == NULL) 40631da177e4SLinus Torvalds goto out; 4064b59e3c0eSNeil Brown lock_stp = alloc_init_lock_stateid(lock_sop, fp, open_stp); 40658a280510SJ. Bruce Fields if (lock_stp == NULL) 40661da177e4SLinus Torvalds goto out; 40671da177e4SLinus Torvalds } else { 40681da177e4SLinus Torvalds /* lock (lock owner + lock stateid) already exists */ 4069dd453dfdSBenny Halevy status = nfs4_preprocess_seqid_op(cstate, 40701da177e4SLinus Torvalds lock->lk_old_lock_seqid, 40711da177e4SLinus Torvalds &lock->lk_old_lock_stateid, 4072f3362737SJ. Bruce Fields LOCK_STATE, 40733a65588aSJ. Bruce Fields &lock->lk_replay_owner, &lock_stp, lock); 40741da177e4SLinus Torvalds if (status) 40751da177e4SLinus Torvalds goto out; 40763a65588aSJ. Bruce Fields lock_sop = lock->lk_replay_owner; 40777d947842SJ. Bruce Fields fp = lock_stp->st_file; 40781da177e4SLinus Torvalds } 40793a65588aSJ. Bruce Fields /* lock->lk_replay_owner and lock_stp have been created or found */ 40801da177e4SLinus Torvalds 40810dd395dcSNeilBrown status = nfserr_grace; 4082af558e33SJ. Bruce Fields if (locks_in_grace() && !lock->lk_reclaim) 40830dd395dcSNeilBrown goto out; 40840dd395dcSNeilBrown status = nfserr_no_grace; 4085af558e33SJ. Bruce Fields if (!locks_in_grace() && lock->lk_reclaim) 40860dd395dcSNeilBrown goto out; 40870dd395dcSNeilBrown 40881da177e4SLinus Torvalds locks_init_lock(&file_lock); 40891da177e4SLinus Torvalds switch (lock->lk_type) { 40901da177e4SLinus Torvalds case NFS4_READ_LT: 40911da177e4SLinus Torvalds case NFS4_READW_LT: 4092f9d7562fSJ. Bruce Fields filp = find_readable_file(lock_stp->st_file); 40930997b173SJ. Bruce Fields if (filp) 40940997b173SJ. Bruce Fields get_lock_access(lock_stp, NFS4_SHARE_ACCESS_READ); 40951da177e4SLinus Torvalds file_lock.fl_type = F_RDLCK; 40961da177e4SLinus Torvalds break; 40971da177e4SLinus Torvalds case NFS4_WRITE_LT: 40981da177e4SLinus Torvalds case NFS4_WRITEW_LT: 4099f9d7562fSJ. Bruce Fields filp = find_writeable_file(lock_stp->st_file); 41000997b173SJ. Bruce Fields if (filp) 41010997b173SJ. Bruce Fields get_lock_access(lock_stp, NFS4_SHARE_ACCESS_WRITE); 41021da177e4SLinus Torvalds file_lock.fl_type = F_WRLCK; 41031da177e4SLinus Torvalds break; 41041da177e4SLinus Torvalds default: 41051da177e4SLinus Torvalds status = nfserr_inval; 41061da177e4SLinus Torvalds goto out; 41071da177e4SLinus Torvalds } 4108f9d7562fSJ. Bruce Fields if (!filp) { 4109f9d7562fSJ. Bruce Fields status = nfserr_openmode; 4110f9d7562fSJ. Bruce Fields goto out; 4111f9d7562fSJ. Bruce Fields } 4112b59e3c0eSNeil Brown file_lock.fl_owner = (fl_owner_t)lock_sop; 41131da177e4SLinus Torvalds file_lock.fl_pid = current->tgid; 41141da177e4SLinus Torvalds file_lock.fl_file = filp; 41151da177e4SLinus Torvalds file_lock.fl_flags = FL_POSIX; 4116d5b9026aSNeilBrown file_lock.fl_lmops = &nfsd_posix_mng_ops; 41171da177e4SLinus Torvalds 41181da177e4SLinus Torvalds file_lock.fl_start = lock->lk_offset; 411987df4de8SBenny Halevy file_lock.fl_end = last_byte_offset(lock->lk_offset, lock->lk_length); 41201da177e4SLinus Torvalds nfs4_transform_lock_offset(&file_lock); 41211da177e4SLinus Torvalds 41221da177e4SLinus Torvalds /* 41231da177e4SLinus Torvalds * Try to lock the file in the VFS. 41241da177e4SLinus Torvalds * Note: locks.c uses the BKL to protect the inode's lock list. 41251da177e4SLinus Torvalds */ 41261da177e4SLinus Torvalds 4127529d7b2aSJ. Bruce Fields err = vfs_lock_file(filp, F_SETLK, &file_lock, &conflock); 4128b8dd7b9aSAl Viro switch (-err) { 41291da177e4SLinus Torvalds case 0: /* success! */ 41301da177e4SLinus Torvalds update_stateid(&lock_stp->st_stateid); 41311da177e4SLinus Torvalds memcpy(&lock->lk_resp_stateid, &lock_stp->st_stateid, 41321da177e4SLinus Torvalds sizeof(stateid_t)); 4133b8dd7b9aSAl Viro status = 0; 4134eb76b3fdSAndy Adamson break; 4135eb76b3fdSAndy Adamson case (EAGAIN): /* conflock holds conflicting lock */ 4136eb76b3fdSAndy Adamson status = nfserr_denied; 4137eb76b3fdSAndy Adamson dprintk("NFSD: nfsd4_lock: conflicting lock found!\n"); 4138eb76b3fdSAndy Adamson nfs4_set_lock_denied(&conflock, &lock->lk_denied); 4139eb76b3fdSAndy Adamson break; 41401da177e4SLinus Torvalds case (EDEADLK): 41411da177e4SLinus Torvalds status = nfserr_deadlock; 4142eb76b3fdSAndy Adamson break; 41431da177e4SLinus Torvalds default: 4144fd85b817SMarc Eshel dprintk("NFSD: nfsd4_lock: vfs_lock_file() failed! status %d\n",err); 41453e772463SJ. Bruce Fields status = nfserrno(err); 4146eb76b3fdSAndy Adamson break; 41471da177e4SLinus Torvalds } 41481da177e4SLinus Torvalds out: 41498a280510SJ. Bruce Fields if (status && lock->lk_is_new && lock_sop) 4150f044ff83SJ. Bruce Fields release_lockowner(lock_sop); 41513a65588aSJ. Bruce Fields if (lock->lk_replay_owner) { 41523a65588aSJ. Bruce Fields nfs4_get_stateowner(lock->lk_replay_owner); 4153a4f1706aSJ.Bruce Fields cstate->replay_owner = lock->lk_replay_owner; 4154f2327d9aSNeil Brown } 41551da177e4SLinus Torvalds nfs4_unlock_state(); 41561da177e4SLinus Torvalds return status; 41571da177e4SLinus Torvalds } 41581da177e4SLinus Torvalds 41591da177e4SLinus Torvalds /* 416055ef1274SJ. Bruce Fields * The NFSv4 spec allows a client to do a LOCKT without holding an OPEN, 416155ef1274SJ. Bruce Fields * so we do a temporary open here just to get an open file to pass to 416255ef1274SJ. Bruce Fields * vfs_test_lock. (Arguably perhaps test_lock should be done with an 416355ef1274SJ. Bruce Fields * inode operation.) 416455ef1274SJ. Bruce Fields */ 416555ef1274SJ. Bruce Fields static int nfsd_test_lock(struct svc_rqst *rqstp, struct svc_fh *fhp, struct file_lock *lock) 416655ef1274SJ. Bruce Fields { 416755ef1274SJ. Bruce Fields struct file *file; 416855ef1274SJ. Bruce Fields int err; 416955ef1274SJ. Bruce Fields 417055ef1274SJ. Bruce Fields err = nfsd_open(rqstp, fhp, S_IFREG, NFSD_MAY_READ, &file); 417155ef1274SJ. Bruce Fields if (err) 417255ef1274SJ. Bruce Fields return err; 417355ef1274SJ. Bruce Fields err = vfs_test_lock(file, lock); 417455ef1274SJ. Bruce Fields nfsd_close(file); 417555ef1274SJ. Bruce Fields return err; 417655ef1274SJ. Bruce Fields } 417755ef1274SJ. Bruce Fields 417855ef1274SJ. Bruce Fields /* 41791da177e4SLinus Torvalds * LOCKT operation 41801da177e4SLinus Torvalds */ 4181b37ad28bSAl Viro __be32 4182ca364317SJ.Bruce Fields nfsd4_lockt(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4183ca364317SJ.Bruce Fields struct nfsd4_lockt *lockt) 41841da177e4SLinus Torvalds { 41851da177e4SLinus Torvalds struct inode *inode; 41861da177e4SLinus Torvalds struct file_lock file_lock; 4187fd85b817SMarc Eshel int error; 4188b37ad28bSAl Viro __be32 status; 41891da177e4SLinus Torvalds 4190af558e33SJ. Bruce Fields if (locks_in_grace()) 41911da177e4SLinus Torvalds return nfserr_grace; 41921da177e4SLinus Torvalds 41931da177e4SLinus Torvalds if (check_lock_length(lockt->lt_offset, lockt->lt_length)) 41941da177e4SLinus Torvalds return nfserr_inval; 41951da177e4SLinus Torvalds 41961da177e4SLinus Torvalds lockt->lt_stateowner = NULL; 41971da177e4SLinus Torvalds nfs4_lock_state(); 41981da177e4SLinus Torvalds 41991da177e4SLinus Torvalds status = nfserr_stale_clientid; 420060adfc50SAndy Adamson if (!nfsd4_has_session(cstate) && STALE_CLIENTID(&lockt->lt_clientid)) 42011da177e4SLinus Torvalds goto out; 42021da177e4SLinus Torvalds 420375c096f7SJ. Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0))) 42041da177e4SLinus Torvalds goto out; 42051da177e4SLinus Torvalds 4206ca364317SJ.Bruce Fields inode = cstate->current_fh.fh_dentry->d_inode; 42071da177e4SLinus Torvalds locks_init_lock(&file_lock); 42081da177e4SLinus Torvalds switch (lockt->lt_type) { 42091da177e4SLinus Torvalds case NFS4_READ_LT: 42101da177e4SLinus Torvalds case NFS4_READW_LT: 42111da177e4SLinus Torvalds file_lock.fl_type = F_RDLCK; 42121da177e4SLinus Torvalds break; 42131da177e4SLinus Torvalds case NFS4_WRITE_LT: 42141da177e4SLinus Torvalds case NFS4_WRITEW_LT: 42151da177e4SLinus Torvalds file_lock.fl_type = F_WRLCK; 42161da177e4SLinus Torvalds break; 42171da177e4SLinus Torvalds default: 42182fdada03SJ. Bruce Fields dprintk("NFSD: nfs4_lockt: bad lock type!\n"); 42191da177e4SLinus Torvalds status = nfserr_inval; 42201da177e4SLinus Torvalds goto out; 42211da177e4SLinus Torvalds } 42221da177e4SLinus Torvalds 42231da177e4SLinus Torvalds lockt->lt_stateowner = find_lockstateowner_str(inode, 42241da177e4SLinus Torvalds &lockt->lt_clientid, &lockt->lt_owner); 42251da177e4SLinus Torvalds if (lockt->lt_stateowner) 42261da177e4SLinus Torvalds file_lock.fl_owner = (fl_owner_t)lockt->lt_stateowner; 42271da177e4SLinus Torvalds file_lock.fl_pid = current->tgid; 42281da177e4SLinus Torvalds file_lock.fl_flags = FL_POSIX; 42291da177e4SLinus Torvalds 42301da177e4SLinus Torvalds file_lock.fl_start = lockt->lt_offset; 423187df4de8SBenny Halevy file_lock.fl_end = last_byte_offset(lockt->lt_offset, lockt->lt_length); 42321da177e4SLinus Torvalds 42331da177e4SLinus Torvalds nfs4_transform_lock_offset(&file_lock); 42341da177e4SLinus Torvalds 42351da177e4SLinus Torvalds status = nfs_ok; 423655ef1274SJ. Bruce Fields error = nfsd_test_lock(rqstp, &cstate->current_fh, &file_lock); 4237fd85b817SMarc Eshel if (error) { 4238fd85b817SMarc Eshel status = nfserrno(error); 4239fd85b817SMarc Eshel goto out; 4240fd85b817SMarc Eshel } 42419d6a8c5cSMarc Eshel if (file_lock.fl_type != F_UNLCK) { 42421da177e4SLinus Torvalds status = nfserr_denied; 42439d6a8c5cSMarc Eshel nfs4_set_lock_denied(&file_lock, &lockt->lt_denied); 42441da177e4SLinus Torvalds } 42451da177e4SLinus Torvalds out: 42461da177e4SLinus Torvalds nfs4_unlock_state(); 42471da177e4SLinus Torvalds return status; 42481da177e4SLinus Torvalds } 42491da177e4SLinus Torvalds 4250b37ad28bSAl Viro __be32 4251ca364317SJ.Bruce Fields nfsd4_locku(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4252a4f1706aSJ.Bruce Fields struct nfsd4_locku *locku) 42531da177e4SLinus Torvalds { 42541da177e4SLinus Torvalds struct nfs4_stateid *stp; 42551da177e4SLinus Torvalds struct file *filp = NULL; 42561da177e4SLinus Torvalds struct file_lock file_lock; 4257b37ad28bSAl Viro __be32 status; 4258b8dd7b9aSAl Viro int err; 42591da177e4SLinus Torvalds 42601da177e4SLinus Torvalds dprintk("NFSD: nfsd4_locku: start=%Ld length=%Ld\n", 42611da177e4SLinus Torvalds (long long) locku->lu_offset, 42621da177e4SLinus Torvalds (long long) locku->lu_length); 42631da177e4SLinus Torvalds 42641da177e4SLinus Torvalds if (check_lock_length(locku->lu_offset, locku->lu_length)) 42651da177e4SLinus Torvalds return nfserr_inval; 42661da177e4SLinus Torvalds 42671da177e4SLinus Torvalds nfs4_lock_state(); 42681da177e4SLinus Torvalds 4269dd453dfdSBenny Halevy if ((status = nfs4_preprocess_seqid_op(cstate, 42701da177e4SLinus Torvalds locku->lu_seqid, 42711da177e4SLinus Torvalds &locku->lu_stateid, 4272f3362737SJ. Bruce Fields LOCK_STATE, 42731da177e4SLinus Torvalds &locku->lu_stateowner, &stp, NULL))) 42741da177e4SLinus Torvalds goto out; 42751da177e4SLinus Torvalds 4276f9d7562fSJ. Bruce Fields filp = find_any_file(stp->st_file); 4277f9d7562fSJ. Bruce Fields if (!filp) { 4278f9d7562fSJ. Bruce Fields status = nfserr_lock_range; 4279f9d7562fSJ. Bruce Fields goto out; 4280f9d7562fSJ. Bruce Fields } 42811da177e4SLinus Torvalds BUG_ON(!filp); 42821da177e4SLinus Torvalds locks_init_lock(&file_lock); 42831da177e4SLinus Torvalds file_lock.fl_type = F_UNLCK; 42841da177e4SLinus Torvalds file_lock.fl_owner = (fl_owner_t) locku->lu_stateowner; 42851da177e4SLinus Torvalds file_lock.fl_pid = current->tgid; 42861da177e4SLinus Torvalds file_lock.fl_file = filp; 42871da177e4SLinus Torvalds file_lock.fl_flags = FL_POSIX; 4288d5b9026aSNeilBrown file_lock.fl_lmops = &nfsd_posix_mng_ops; 42891da177e4SLinus Torvalds file_lock.fl_start = locku->lu_offset; 42901da177e4SLinus Torvalds 429187df4de8SBenny Halevy file_lock.fl_end = last_byte_offset(locku->lu_offset, locku->lu_length); 42921da177e4SLinus Torvalds nfs4_transform_lock_offset(&file_lock); 42931da177e4SLinus Torvalds 42941da177e4SLinus Torvalds /* 42951da177e4SLinus Torvalds * Try to unlock the file in the VFS. 42961da177e4SLinus Torvalds */ 4297fd85b817SMarc Eshel err = vfs_lock_file(filp, F_SETLK, &file_lock, NULL); 4298b8dd7b9aSAl Viro if (err) { 4299fd85b817SMarc Eshel dprintk("NFSD: nfs4_locku: vfs_lock_file failed!\n"); 43001da177e4SLinus Torvalds goto out_nfserr; 43011da177e4SLinus Torvalds } 43021da177e4SLinus Torvalds /* 43031da177e4SLinus Torvalds * OK, unlock succeeded; the only thing left to do is update the stateid. 43041da177e4SLinus Torvalds */ 43051da177e4SLinus Torvalds update_stateid(&stp->st_stateid); 43061da177e4SLinus Torvalds memcpy(&locku->lu_stateid, &stp->st_stateid, sizeof(stateid_t)); 43071da177e4SLinus Torvalds 43081da177e4SLinus Torvalds out: 4309f2327d9aSNeil Brown if (locku->lu_stateowner) { 43101da177e4SLinus Torvalds nfs4_get_stateowner(locku->lu_stateowner); 4311a4f1706aSJ.Bruce Fields cstate->replay_owner = locku->lu_stateowner; 4312f2327d9aSNeil Brown } 43131da177e4SLinus Torvalds nfs4_unlock_state(); 43141da177e4SLinus Torvalds return status; 43151da177e4SLinus Torvalds 43161da177e4SLinus Torvalds out_nfserr: 4317b8dd7b9aSAl Viro status = nfserrno(err); 43181da177e4SLinus Torvalds goto out; 43191da177e4SLinus Torvalds } 43201da177e4SLinus Torvalds 43211da177e4SLinus Torvalds /* 43221da177e4SLinus Torvalds * returns 43231da177e4SLinus Torvalds * 1: locks held by lockowner 43241da177e4SLinus Torvalds * 0: no locks held by lockowner 43251da177e4SLinus Torvalds */ 43261da177e4SLinus Torvalds static int 4327f9d7562fSJ. Bruce Fields check_for_locks(struct nfs4_file *filp, struct nfs4_stateowner *lowner) 43281da177e4SLinus Torvalds { 43291da177e4SLinus Torvalds struct file_lock **flpp; 4330f9d7562fSJ. Bruce Fields struct inode *inode = filp->fi_inode; 43311da177e4SLinus Torvalds int status = 0; 43321da177e4SLinus Torvalds 4333b89f4321SArnd Bergmann lock_flocks(); 43341da177e4SLinus Torvalds for (flpp = &inode->i_flock; *flpp != NULL; flpp = &(*flpp)->fl_next) { 4335796dadfdSJ. Bruce Fields if ((*flpp)->fl_owner == (fl_owner_t)lowner) { 43361da177e4SLinus Torvalds status = 1; 43371da177e4SLinus Torvalds goto out; 43381da177e4SLinus Torvalds } 4339796dadfdSJ. Bruce Fields } 43401da177e4SLinus Torvalds out: 4341b89f4321SArnd Bergmann unlock_flocks(); 43421da177e4SLinus Torvalds return status; 43431da177e4SLinus Torvalds } 43441da177e4SLinus Torvalds 4345b37ad28bSAl Viro __be32 4346b591480bSJ.Bruce Fields nfsd4_release_lockowner(struct svc_rqst *rqstp, 4347b591480bSJ.Bruce Fields struct nfsd4_compound_state *cstate, 4348b591480bSJ.Bruce Fields struct nfsd4_release_lockowner *rlockowner) 43491da177e4SLinus Torvalds { 43501da177e4SLinus Torvalds clientid_t *clid = &rlockowner->rl_clientid; 43513e9e3dbeSNeilBrown struct nfs4_stateowner *sop; 43523e9e3dbeSNeilBrown struct nfs4_stateid *stp; 43531da177e4SLinus Torvalds struct xdr_netobj *owner = &rlockowner->rl_owner; 43543e9e3dbeSNeilBrown struct list_head matches; 43553e9e3dbeSNeilBrown int i; 4356b37ad28bSAl Viro __be32 status; 43571da177e4SLinus Torvalds 43581da177e4SLinus Torvalds dprintk("nfsd4_release_lockowner clientid: (%08x/%08x):\n", 43591da177e4SLinus Torvalds clid->cl_boot, clid->cl_id); 43601da177e4SLinus Torvalds 43611da177e4SLinus Torvalds /* XXX check for lease expiration */ 43621da177e4SLinus Torvalds 43631da177e4SLinus Torvalds status = nfserr_stale_clientid; 4364849823c5SNeil Brown if (STALE_CLIENTID(clid)) 43651da177e4SLinus Torvalds return status; 43661da177e4SLinus Torvalds 43671da177e4SLinus Torvalds nfs4_lock_state(); 43681da177e4SLinus Torvalds 43691da177e4SLinus Torvalds status = nfserr_locks_held; 43703e9e3dbeSNeilBrown /* XXX: we're doing a linear search through all the lockowners. 43713e9e3dbeSNeilBrown * Yipes! For now we'll just hope clients aren't really using 43723e9e3dbeSNeilBrown * release_lockowner much, but eventually we have to fix these 43733e9e3dbeSNeilBrown * data structures. */ 43743e9e3dbeSNeilBrown INIT_LIST_HEAD(&matches); 43753e9e3dbeSNeilBrown for (i = 0; i < LOCK_HASH_SIZE; i++) { 43763e9e3dbeSNeilBrown list_for_each_entry(sop, &lock_ownerid_hashtbl[i], so_idhash) { 4377599e0a22SJ. Bruce Fields if (!same_owner_str(sop, owner, clid)) 43783e9e3dbeSNeilBrown continue; 43793e9e3dbeSNeilBrown list_for_each_entry(stp, &sop->so_stateids, 4380ea1da636SNeilBrown st_perstateowner) { 4381f9d7562fSJ. Bruce Fields if (check_for_locks(stp->st_file, sop)) 43821da177e4SLinus Torvalds goto out; 43833e9e3dbeSNeilBrown /* Note: so_perclient unused for lockowners, 43843e9e3dbeSNeilBrown * so it's OK to fool with here. */ 43853e9e3dbeSNeilBrown list_add(&sop->so_perclient, &matches); 43861da177e4SLinus Torvalds } 43873e9e3dbeSNeilBrown } 43883e9e3dbeSNeilBrown } 43893e9e3dbeSNeilBrown /* Clients probably won't expect us to return with some (but not all) 43903e9e3dbeSNeilBrown * of the lockowner state released; so don't release any until all 43913e9e3dbeSNeilBrown * have been checked. */ 43921da177e4SLinus Torvalds status = nfs_ok; 43930fa822e4SNeilBrown while (!list_empty(&matches)) { 43940fa822e4SNeilBrown sop = list_entry(matches.next, struct nfs4_stateowner, 43950fa822e4SNeilBrown so_perclient); 43960fa822e4SNeilBrown /* unhash_stateowner deletes so_perclient only 43970fa822e4SNeilBrown * for openowners. */ 43980fa822e4SNeilBrown list_del(&sop->so_perclient); 4399f044ff83SJ. Bruce Fields release_lockowner(sop); 44001da177e4SLinus Torvalds } 44011da177e4SLinus Torvalds out: 44021da177e4SLinus Torvalds nfs4_unlock_state(); 44031da177e4SLinus Torvalds return status; 44041da177e4SLinus Torvalds } 44051da177e4SLinus Torvalds 44061da177e4SLinus Torvalds static inline struct nfs4_client_reclaim * 4407a55370a3SNeilBrown alloc_reclaim(void) 44081da177e4SLinus Torvalds { 4409a55370a3SNeilBrown return kmalloc(sizeof(struct nfs4_client_reclaim), GFP_KERNEL); 44101da177e4SLinus Torvalds } 44111da177e4SLinus Torvalds 4412c7b9a459SNeilBrown int 4413a1bcecd2SAndy Adamson nfs4_has_reclaimed_state(const char *name, bool use_exchange_id) 4414c7b9a459SNeilBrown { 4415c7b9a459SNeilBrown unsigned int strhashval = clientstr_hashval(name); 4416c7b9a459SNeilBrown struct nfs4_client *clp; 4417c7b9a459SNeilBrown 4418e203d506SJ. Bruce Fields clp = find_confirmed_client_by_str(name, strhashval); 4419c7b9a459SNeilBrown return clp ? 1 : 0; 4420c7b9a459SNeilBrown } 4421c7b9a459SNeilBrown 44221da177e4SLinus Torvalds /* 44231da177e4SLinus Torvalds * failure => all reset bets are off, nfserr_no_grace... 44241da177e4SLinus Torvalds */ 4425190e4fbfSNeilBrown int 4426190e4fbfSNeilBrown nfs4_client_to_reclaim(const char *name) 44271da177e4SLinus Torvalds { 44281da177e4SLinus Torvalds unsigned int strhashval; 44291da177e4SLinus Torvalds struct nfs4_client_reclaim *crp = NULL; 44301da177e4SLinus Torvalds 4431a55370a3SNeilBrown dprintk("NFSD nfs4_client_to_reclaim NAME: %.*s\n", HEXDIR_LEN, name); 4432a55370a3SNeilBrown crp = alloc_reclaim(); 44331da177e4SLinus Torvalds if (!crp) 44341da177e4SLinus Torvalds return 0; 4435a55370a3SNeilBrown strhashval = clientstr_hashval(name); 44361da177e4SLinus Torvalds INIT_LIST_HEAD(&crp->cr_strhash); 44371da177e4SLinus Torvalds list_add(&crp->cr_strhash, &reclaim_str_hashtbl[strhashval]); 4438a55370a3SNeilBrown memcpy(crp->cr_recdir, name, HEXDIR_LEN); 44391da177e4SLinus Torvalds reclaim_str_hashtbl_size++; 44401da177e4SLinus Torvalds return 1; 44411da177e4SLinus Torvalds } 44421da177e4SLinus Torvalds 44431da177e4SLinus Torvalds static void 44441da177e4SLinus Torvalds nfs4_release_reclaim(void) 44451da177e4SLinus Torvalds { 44461da177e4SLinus Torvalds struct nfs4_client_reclaim *crp = NULL; 44471da177e4SLinus Torvalds int i; 44481da177e4SLinus Torvalds 44491da177e4SLinus Torvalds for (i = 0; i < CLIENT_HASH_SIZE; i++) { 44501da177e4SLinus Torvalds while (!list_empty(&reclaim_str_hashtbl[i])) { 44511da177e4SLinus Torvalds crp = list_entry(reclaim_str_hashtbl[i].next, 44521da177e4SLinus Torvalds struct nfs4_client_reclaim, cr_strhash); 44531da177e4SLinus Torvalds list_del(&crp->cr_strhash); 44541da177e4SLinus Torvalds kfree(crp); 44551da177e4SLinus Torvalds reclaim_str_hashtbl_size--; 44561da177e4SLinus Torvalds } 44571da177e4SLinus Torvalds } 44581da177e4SLinus Torvalds BUG_ON(reclaim_str_hashtbl_size); 44591da177e4SLinus Torvalds } 44601da177e4SLinus Torvalds 44611da177e4SLinus Torvalds /* 44621da177e4SLinus Torvalds * called from OPEN, CLAIM_PREVIOUS with a new clientid. */ 4463fd39ca9aSNeilBrown static struct nfs4_client_reclaim * 44641da177e4SLinus Torvalds nfs4_find_reclaim_client(clientid_t *clid) 44651da177e4SLinus Torvalds { 44661da177e4SLinus Torvalds unsigned int strhashval; 44671da177e4SLinus Torvalds struct nfs4_client *clp; 44681da177e4SLinus Torvalds struct nfs4_client_reclaim *crp = NULL; 44691da177e4SLinus Torvalds 44701da177e4SLinus Torvalds 44711da177e4SLinus Torvalds /* find clientid in conf_id_hashtbl */ 44721da177e4SLinus Torvalds clp = find_confirmed_client(clid); 44731da177e4SLinus Torvalds if (clp == NULL) 44741da177e4SLinus Torvalds return NULL; 44751da177e4SLinus Torvalds 4476a55370a3SNeilBrown dprintk("NFSD: nfs4_find_reclaim_client for %.*s with recdir %s\n", 4477a55370a3SNeilBrown clp->cl_name.len, clp->cl_name.data, 4478a55370a3SNeilBrown clp->cl_recdir); 44791da177e4SLinus Torvalds 44801da177e4SLinus Torvalds /* find clp->cl_name in reclaim_str_hashtbl */ 4481a55370a3SNeilBrown strhashval = clientstr_hashval(clp->cl_recdir); 44821da177e4SLinus Torvalds list_for_each_entry(crp, &reclaim_str_hashtbl[strhashval], cr_strhash) { 4483a55370a3SNeilBrown if (same_name(crp->cr_recdir, clp->cl_recdir)) { 44841da177e4SLinus Torvalds return crp; 44851da177e4SLinus Torvalds } 44861da177e4SLinus Torvalds } 44871da177e4SLinus Torvalds return NULL; 44881da177e4SLinus Torvalds } 44891da177e4SLinus Torvalds 44901da177e4SLinus Torvalds /* 44911da177e4SLinus Torvalds * Called from OPEN. Look for clientid in reclaim list. 44921da177e4SLinus Torvalds */ 4493b37ad28bSAl Viro __be32 44941da177e4SLinus Torvalds nfs4_check_open_reclaim(clientid_t *clid) 44951da177e4SLinus Torvalds { 4496dfc83565SNeilBrown return nfs4_find_reclaim_client(clid) ? nfs_ok : nfserr_reclaim_bad; 44971da177e4SLinus Torvalds } 44981da177e4SLinus Torvalds 4499ac4d8ff2SNeilBrown /* initialization to perform at module load time: */ 45001da177e4SLinus Torvalds 4501e8ff2a84SJ. Bruce Fields int 4502ac4d8ff2SNeilBrown nfs4_state_init(void) 45031da177e4SLinus Torvalds { 4504e8ff2a84SJ. Bruce Fields int i, status; 45051da177e4SLinus Torvalds 4506e8ff2a84SJ. Bruce Fields status = nfsd4_init_slabs(); 4507e8ff2a84SJ. Bruce Fields if (status) 4508e8ff2a84SJ. Bruce Fields return status; 45091da177e4SLinus Torvalds for (i = 0; i < CLIENT_HASH_SIZE; i++) { 45101da177e4SLinus Torvalds INIT_LIST_HEAD(&conf_id_hashtbl[i]); 45111da177e4SLinus Torvalds INIT_LIST_HEAD(&conf_str_hashtbl[i]); 45121da177e4SLinus Torvalds INIT_LIST_HEAD(&unconf_str_hashtbl[i]); 45131da177e4SLinus Torvalds INIT_LIST_HEAD(&unconf_id_hashtbl[i]); 451402cb2858SWang Chen INIT_LIST_HEAD(&reclaim_str_hashtbl[i]); 45151da177e4SLinus Torvalds } 45165282fd72SMarc Eshel for (i = 0; i < SESSION_HASH_SIZE; i++) 45175282fd72SMarc Eshel INIT_LIST_HEAD(&sessionid_hashtbl[i]); 45181da177e4SLinus Torvalds for (i = 0; i < FILE_HASH_SIZE; i++) { 45191da177e4SLinus Torvalds INIT_LIST_HEAD(&file_hashtbl[i]); 45201da177e4SLinus Torvalds } 4521506f275fSJ. Bruce Fields for (i = 0; i < OPEN_OWNER_HASH_SIZE; i++) { 4522506f275fSJ. Bruce Fields INIT_LIST_HEAD(&open_ownerstr_hashtbl[i]); 4523506f275fSJ. Bruce Fields INIT_LIST_HEAD(&open_ownerid_hashtbl[i]); 45241da177e4SLinus Torvalds } 45251da177e4SLinus Torvalds for (i = 0; i < STATEID_HASH_SIZE; i++) { 45261da177e4SLinus Torvalds INIT_LIST_HEAD(&stateid_hashtbl[i]); 45271da177e4SLinus Torvalds INIT_LIST_HEAD(&lockstateid_hashtbl[i]); 45281da177e4SLinus Torvalds } 45291da177e4SLinus Torvalds for (i = 0; i < LOCK_HASH_SIZE; i++) { 45301da177e4SLinus Torvalds INIT_LIST_HEAD(&lock_ownerid_hashtbl[i]); 45311da177e4SLinus Torvalds INIT_LIST_HEAD(&lock_ownerstr_hashtbl[i]); 45321da177e4SLinus Torvalds } 45331da177e4SLinus Torvalds memset(&onestateid, ~0, sizeof(stateid_t)); 45341da177e4SLinus Torvalds INIT_LIST_HEAD(&close_lru); 45351da177e4SLinus Torvalds INIT_LIST_HEAD(&client_lru); 45361da177e4SLinus Torvalds INIT_LIST_HEAD(&del_recall_lru); 4537ac4d8ff2SNeilBrown reclaim_str_hashtbl_size = 0; 4538e8ff2a84SJ. Bruce Fields return 0; 4539ac4d8ff2SNeilBrown } 4540ac4d8ff2SNeilBrown 4541190e4fbfSNeilBrown static void 4542190e4fbfSNeilBrown nfsd4_load_reboot_recovery_data(void) 4543190e4fbfSNeilBrown { 4544190e4fbfSNeilBrown int status; 4545190e4fbfSNeilBrown 45460964a3d3SNeilBrown nfs4_lock_state(); 454748483bf2SJ. Bruce Fields nfsd4_init_recdir(); 4548190e4fbfSNeilBrown status = nfsd4_recdir_load(); 45490964a3d3SNeilBrown nfs4_unlock_state(); 4550190e4fbfSNeilBrown if (status) 4551190e4fbfSNeilBrown printk("NFSD: Failure reading reboot recovery data\n"); 4552190e4fbfSNeilBrown } 4553190e4fbfSNeilBrown 4554c2f1a551SMeelap Shah /* 4555c2f1a551SMeelap Shah * Since the lifetime of a delegation isn't limited to that of an open, a 4556c2f1a551SMeelap Shah * client may quite reasonably hang on to a delegation as long as it has 4557c2f1a551SMeelap Shah * the inode cached. This becomes an obvious problem the first time a 4558c2f1a551SMeelap Shah * client's inode cache approaches the size of the server's total memory. 4559c2f1a551SMeelap Shah * 4560c2f1a551SMeelap Shah * For now we avoid this problem by imposing a hard limit on the number 4561c2f1a551SMeelap Shah * of delegations, which varies according to the server's memory size. 4562c2f1a551SMeelap Shah */ 4563c2f1a551SMeelap Shah static void 4564c2f1a551SMeelap Shah set_max_delegations(void) 4565c2f1a551SMeelap Shah { 4566c2f1a551SMeelap Shah /* 4567c2f1a551SMeelap Shah * Allow at most 4 delegations per megabyte of RAM. Quick 4568c2f1a551SMeelap Shah * estimates suggest that in the worst case (where every delegation 4569c2f1a551SMeelap Shah * is for a different inode), a delegation could take about 1.5K, 4570c2f1a551SMeelap Shah * giving a worst case usage of about 6% of memory. 4571c2f1a551SMeelap Shah */ 4572c2f1a551SMeelap Shah max_delegations = nr_free_buffer_pages() >> (20 - 2 - PAGE_SHIFT); 4573c2f1a551SMeelap Shah } 4574c2f1a551SMeelap Shah 4575ac4d8ff2SNeilBrown /* initialization to perform when the nfsd service is started: */ 4576ac4d8ff2SNeilBrown 457729ab23ccSJ. Bruce Fields static int 4578ac4d8ff2SNeilBrown __nfs4_state_start(void) 4579ac4d8ff2SNeilBrown { 4580b5a1a81eSJ. Bruce Fields int ret; 4581b5a1a81eSJ. Bruce Fields 45821da177e4SLinus Torvalds boot_time = get_seconds(); 4583af558e33SJ. Bruce Fields locks_start_grace(&nfsd4_manager); 45849a8db97eSMarc Eshel printk(KERN_INFO "NFSD: starting %ld-second grace period\n", 4585e46b498cSJ. Bruce Fields nfsd4_grace); 4586b5a1a81eSJ. Bruce Fields ret = set_callback_cred(); 4587b5a1a81eSJ. Bruce Fields if (ret) 4588b5a1a81eSJ. Bruce Fields return -ENOMEM; 458958da282bSNeilBrown laundry_wq = create_singlethread_workqueue("nfsd4"); 459029ab23ccSJ. Bruce Fields if (laundry_wq == NULL) 459129ab23ccSJ. Bruce Fields return -ENOMEM; 4592b5a1a81eSJ. Bruce Fields ret = nfsd4_create_callback_queue(); 4593b5a1a81eSJ. Bruce Fields if (ret) 4594b5a1a81eSJ. Bruce Fields goto out_free_laundry; 4595e46b498cSJ. Bruce Fields queue_delayed_work(laundry_wq, &laundromat_work, nfsd4_grace * HZ); 4596c2f1a551SMeelap Shah set_max_delegations(); 4597b5a1a81eSJ. Bruce Fields return 0; 4598b5a1a81eSJ. Bruce Fields out_free_laundry: 4599b5a1a81eSJ. Bruce Fields destroy_workqueue(laundry_wq); 4600b5a1a81eSJ. Bruce Fields return ret; 46011da177e4SLinus Torvalds } 46021da177e4SLinus Torvalds 460329ab23ccSJ. Bruce Fields int 460476a3550eSNeilBrown nfs4_state_start(void) 46051da177e4SLinus Torvalds { 4606190e4fbfSNeilBrown nfsd4_load_reboot_recovery_data(); 46074ad9a344SJeff Layton return __nfs4_state_start(); 46081da177e4SLinus Torvalds } 46091da177e4SLinus Torvalds 46101da177e4SLinus Torvalds static void 46111da177e4SLinus Torvalds __nfs4_state_shutdown(void) 46121da177e4SLinus Torvalds { 46131da177e4SLinus Torvalds int i; 46141da177e4SLinus Torvalds struct nfs4_client *clp = NULL; 46151da177e4SLinus Torvalds struct nfs4_delegation *dp = NULL; 46161da177e4SLinus Torvalds struct list_head *pos, *next, reaplist; 46171da177e4SLinus Torvalds 46181da177e4SLinus Torvalds for (i = 0; i < CLIENT_HASH_SIZE; i++) { 46191da177e4SLinus Torvalds while (!list_empty(&conf_id_hashtbl[i])) { 46201da177e4SLinus Torvalds clp = list_entry(conf_id_hashtbl[i].next, struct nfs4_client, cl_idhash); 46211da177e4SLinus Torvalds expire_client(clp); 46221da177e4SLinus Torvalds } 46231da177e4SLinus Torvalds while (!list_empty(&unconf_str_hashtbl[i])) { 46241da177e4SLinus Torvalds clp = list_entry(unconf_str_hashtbl[i].next, struct nfs4_client, cl_strhash); 46251da177e4SLinus Torvalds expire_client(clp); 46261da177e4SLinus Torvalds } 46271da177e4SLinus Torvalds } 46281da177e4SLinus Torvalds INIT_LIST_HEAD(&reaplist); 46291da177e4SLinus Torvalds spin_lock(&recall_lock); 46301da177e4SLinus Torvalds list_for_each_safe(pos, next, &del_recall_lru) { 46311da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 46321da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 46331da177e4SLinus Torvalds } 46341da177e4SLinus Torvalds spin_unlock(&recall_lock); 46351da177e4SLinus Torvalds list_for_each_safe(pos, next, &reaplist) { 46361da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 46371da177e4SLinus Torvalds list_del_init(&dp->dl_recall_lru); 46381da177e4SLinus Torvalds unhash_delegation(dp); 46391da177e4SLinus Torvalds } 46401da177e4SLinus Torvalds 4641190e4fbfSNeilBrown nfsd4_shutdown_recdir(); 46421da177e4SLinus Torvalds } 46431da177e4SLinus Torvalds 46441da177e4SLinus Torvalds void 46451da177e4SLinus Torvalds nfs4_state_shutdown(void) 46461da177e4SLinus Torvalds { 4647afe2c511STejun Heo cancel_delayed_work_sync(&laundromat_work); 46485e8d5c29SNeilBrown destroy_workqueue(laundry_wq); 46492c5e7615SJ. Bruce Fields locks_end_grace(&nfsd4_manager); 46501da177e4SLinus Torvalds nfs4_lock_state(); 46511da177e4SLinus Torvalds nfs4_release_reclaim(); 46521da177e4SLinus Torvalds __nfs4_state_shutdown(); 46531da177e4SLinus Torvalds nfs4_unlock_state(); 4654c3935e30SJ. Bruce Fields nfsd4_destroy_callback_queue(); 46551da177e4SLinus Torvalds } 4656