11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * Copyright (c) 2001 The Regents of the University of Michigan. 31da177e4SLinus Torvalds * All rights reserved. 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Kendrick Smith <kmsmith@umich.edu> 61da177e4SLinus Torvalds * Andy Adamson <kandros@umich.edu> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Redistribution and use in source and binary forms, with or without 91da177e4SLinus Torvalds * modification, are permitted provided that the following conditions 101da177e4SLinus Torvalds * are met: 111da177e4SLinus Torvalds * 121da177e4SLinus Torvalds * 1. Redistributions of source code must retain the above copyright 131da177e4SLinus Torvalds * notice, this list of conditions and the following disclaimer. 141da177e4SLinus Torvalds * 2. Redistributions in binary form must reproduce the above copyright 151da177e4SLinus Torvalds * notice, this list of conditions and the following disclaimer in the 161da177e4SLinus Torvalds * documentation and/or other materials provided with the distribution. 171da177e4SLinus Torvalds * 3. Neither the name of the University nor the names of its 181da177e4SLinus Torvalds * contributors may be used to endorse or promote products derived 191da177e4SLinus Torvalds * from this software without specific prior written permission. 201da177e4SLinus Torvalds * 211da177e4SLinus Torvalds * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 221da177e4SLinus Torvalds * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 231da177e4SLinus Torvalds * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 241da177e4SLinus Torvalds * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 251da177e4SLinus Torvalds * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 261da177e4SLinus Torvalds * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 271da177e4SLinus Torvalds * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 281da177e4SLinus Torvalds * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 291da177e4SLinus Torvalds * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 301da177e4SLinus Torvalds * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 311da177e4SLinus Torvalds * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 321da177e4SLinus Torvalds * 331da177e4SLinus Torvalds */ 341da177e4SLinus Torvalds 35aceaf78dSDave Hansen #include <linux/file.h> 36b89f4321SArnd Bergmann #include <linux/fs.h> 375a0e3ad6STejun Heo #include <linux/slab.h> 380964a3d3SNeilBrown #include <linux/namei.h> 39c2f1a551SMeelap Shah #include <linux/swap.h> 4017456804SBryan Schumaker #include <linux/pagemap.h> 417df302f7SChuck Lever #include <linux/ratelimit.h> 4268e76ad0SOlga Kornievskaia #include <linux/sunrpc/svcauth_gss.h> 43363168b4SJeff Layton #include <linux/sunrpc/clnt.h> 449a74af21SBoaz Harrosh #include "xdr4.h" 450a3adadeSJ. Bruce Fields #include "vfs.h" 46bfa4b365SJ. Bruce Fields #include "current_stateid.h" 471da177e4SLinus Torvalds 485e1533c7SStanislav Kinsbursky #include "netns.h" 495e1533c7SStanislav Kinsbursky 501da177e4SLinus Torvalds #define NFSDDBG_FACILITY NFSDDBG_PROC 511da177e4SLinus Torvalds 52f32f3c2dSJ. Bruce Fields #define all_ones {{~0,~0},~0} 53f32f3c2dSJ. Bruce Fields static const stateid_t one_stateid = { 54f32f3c2dSJ. Bruce Fields .si_generation = ~0, 55f32f3c2dSJ. Bruce Fields .si_opaque = all_ones, 56f32f3c2dSJ. Bruce Fields }; 57f32f3c2dSJ. Bruce Fields static const stateid_t zero_stateid = { 58f32f3c2dSJ. Bruce Fields /* all fields zero */ 59f32f3c2dSJ. Bruce Fields }; 6019ff0f28STigran Mkrtchyan static const stateid_t currentstateid = { 6119ff0f28STigran Mkrtchyan .si_generation = 1, 6219ff0f28STigran Mkrtchyan }; 63f32f3c2dSJ. Bruce Fields 64ec6b5d7bSAndy Adamson static u64 current_sessionid = 1; 65fd39ca9aSNeilBrown 66f32f3c2dSJ. Bruce Fields #define ZERO_STATEID(stateid) (!memcmp((stateid), &zero_stateid, sizeof(stateid_t))) 67f32f3c2dSJ. Bruce Fields #define ONE_STATEID(stateid) (!memcmp((stateid), &one_stateid, sizeof(stateid_t))) 6819ff0f28STigran Mkrtchyan #define CURRENT_STATEID(stateid) (!memcmp((stateid), ¤tstateid, sizeof(stateid_t))) 691da177e4SLinus Torvalds 701da177e4SLinus Torvalds /* forward declarations */ 71fe0750e5SJ. Bruce Fields static int check_for_locks(struct nfs4_file *filp, struct nfs4_lockowner *lowner); 721da177e4SLinus Torvalds 738b671b80SJ. Bruce Fields /* Locking: */ 748b671b80SJ. Bruce Fields 758b671b80SJ. Bruce Fields /* Currently used for almost all code touching nfsv4 state: */ 76353ab6e9SIngo Molnar static DEFINE_MUTEX(client_mutex); 771da177e4SLinus Torvalds 788b671b80SJ. Bruce Fields /* 798b671b80SJ. Bruce Fields * Currently used for the del_recall_lru and file hash table. In an 808b671b80SJ. Bruce Fields * effort to decrease the scope of the client_mutex, this spinlock may 818b671b80SJ. Bruce Fields * eventually cover more: 828b671b80SJ. Bruce Fields */ 838b671b80SJ. Bruce Fields static DEFINE_SPINLOCK(recall_lock); 848b671b80SJ. Bruce Fields 85fe0750e5SJ. Bruce Fields static struct kmem_cache *openowner_slab = NULL; 86fe0750e5SJ. Bruce Fields static struct kmem_cache *lockowner_slab = NULL; 87e18b890bSChristoph Lameter static struct kmem_cache *file_slab = NULL; 88e18b890bSChristoph Lameter static struct kmem_cache *stateid_slab = NULL; 89e18b890bSChristoph Lameter static struct kmem_cache *deleg_slab = NULL; 90e60d4398SNeilBrown 911da177e4SLinus Torvalds void 921da177e4SLinus Torvalds nfs4_lock_state(void) 931da177e4SLinus Torvalds { 94353ab6e9SIngo Molnar mutex_lock(&client_mutex); 951da177e4SLinus Torvalds } 961da177e4SLinus Torvalds 97508dc6e1SBenny Halevy static void free_session(struct kref *); 98508dc6e1SBenny Halevy 99508dc6e1SBenny Halevy /* Must be called under the client_lock */ 100508dc6e1SBenny Halevy static void nfsd4_put_session_locked(struct nfsd4_session *ses) 101508dc6e1SBenny Halevy { 102508dc6e1SBenny Halevy kref_put(&ses->se_ref, free_session); 103508dc6e1SBenny Halevy } 104508dc6e1SBenny Halevy 105508dc6e1SBenny Halevy static void nfsd4_get_session(struct nfsd4_session *ses) 106508dc6e1SBenny Halevy { 107508dc6e1SBenny Halevy kref_get(&ses->se_ref); 108508dc6e1SBenny Halevy } 109508dc6e1SBenny Halevy 1101da177e4SLinus Torvalds void 1111da177e4SLinus Torvalds nfs4_unlock_state(void) 1121da177e4SLinus Torvalds { 113353ab6e9SIngo Molnar mutex_unlock(&client_mutex); 1141da177e4SLinus Torvalds } 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds static inline u32 1171da177e4SLinus Torvalds opaque_hashval(const void *ptr, int nbytes) 1181da177e4SLinus Torvalds { 1191da177e4SLinus Torvalds unsigned char *cptr = (unsigned char *) ptr; 1201da177e4SLinus Torvalds 1211da177e4SLinus Torvalds u32 x = 0; 1221da177e4SLinus Torvalds while (nbytes--) { 1231da177e4SLinus Torvalds x *= 37; 1241da177e4SLinus Torvalds x += *cptr++; 1251da177e4SLinus Torvalds } 1261da177e4SLinus Torvalds return x; 1271da177e4SLinus Torvalds } 1281da177e4SLinus Torvalds 1291da177e4SLinus Torvalds static struct list_head del_recall_lru; 1301da177e4SLinus Torvalds 13132513b40SJ. Bruce Fields static void nfsd4_free_file(struct nfs4_file *f) 13232513b40SJ. Bruce Fields { 13332513b40SJ. Bruce Fields kmem_cache_free(file_slab, f); 13432513b40SJ. Bruce Fields } 13532513b40SJ. Bruce Fields 13613cd2184SNeilBrown static inline void 13713cd2184SNeilBrown put_nfs4_file(struct nfs4_file *fi) 13813cd2184SNeilBrown { 1398b671b80SJ. Bruce Fields if (atomic_dec_and_lock(&fi->fi_ref, &recall_lock)) { 1408b671b80SJ. Bruce Fields list_del(&fi->fi_hash); 1418b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 1428b671b80SJ. Bruce Fields iput(fi->fi_inode); 14332513b40SJ. Bruce Fields nfsd4_free_file(fi); 1448b671b80SJ. Bruce Fields } 14513cd2184SNeilBrown } 14613cd2184SNeilBrown 14713cd2184SNeilBrown static inline void 14813cd2184SNeilBrown get_nfs4_file(struct nfs4_file *fi) 14913cd2184SNeilBrown { 1508b671b80SJ. Bruce Fields atomic_inc(&fi->fi_ref); 15113cd2184SNeilBrown } 15213cd2184SNeilBrown 153ef0f3390SNeilBrown static int num_delegations; 154c2f1a551SMeelap Shah unsigned int max_delegations; 155ef0f3390SNeilBrown 156ef0f3390SNeilBrown /* 157ef0f3390SNeilBrown * Open owner state (share locks) 158ef0f3390SNeilBrown */ 159ef0f3390SNeilBrown 16016bfdaafSJ. Bruce Fields /* hash tables for lock and open owners */ 16116bfdaafSJ. Bruce Fields #define OWNER_HASH_BITS 8 16216bfdaafSJ. Bruce Fields #define OWNER_HASH_SIZE (1 << OWNER_HASH_BITS) 16316bfdaafSJ. Bruce Fields #define OWNER_HASH_MASK (OWNER_HASH_SIZE - 1) 164ef0f3390SNeilBrown 16516bfdaafSJ. Bruce Fields static unsigned int ownerstr_hashval(u32 clientid, struct xdr_netobj *ownername) 166ddc04c41SJ. Bruce Fields { 167ddc04c41SJ. Bruce Fields unsigned int ret; 168ddc04c41SJ. Bruce Fields 169ddc04c41SJ. Bruce Fields ret = opaque_hashval(ownername->data, ownername->len); 170ddc04c41SJ. Bruce Fields ret += clientid; 17116bfdaafSJ. Bruce Fields return ret & OWNER_HASH_MASK; 172ddc04c41SJ. Bruce Fields } 173ef0f3390SNeilBrown 174ef0f3390SNeilBrown /* hash table for nfs4_file */ 175ef0f3390SNeilBrown #define FILE_HASH_BITS 8 176ef0f3390SNeilBrown #define FILE_HASH_SIZE (1 << FILE_HASH_BITS) 17735079582SShan Wei 178ddc04c41SJ. Bruce Fields static unsigned int file_hashval(struct inode *ino) 179ddc04c41SJ. Bruce Fields { 180ddc04c41SJ. Bruce Fields /* XXX: why are we hashing on inode pointer, anyway? */ 181ddc04c41SJ. Bruce Fields return hash_ptr(ino, FILE_HASH_BITS); 182ddc04c41SJ. Bruce Fields } 183ddc04c41SJ. Bruce Fields 184ef0f3390SNeilBrown static struct list_head file_hashtbl[FILE_HASH_SIZE]; 185ef0f3390SNeilBrown 186998db52cSJ. Bruce Fields static void __nfs4_file_get_access(struct nfs4_file *fp, int oflag) 187f9d7562fSJ. Bruce Fields { 188063b0fb9SJ. Bruce Fields WARN_ON_ONCE(!(fp->fi_fds[oflag] || fp->fi_fds[O_RDWR])); 189f9d7562fSJ. Bruce Fields atomic_inc(&fp->fi_access[oflag]); 190f9d7562fSJ. Bruce Fields } 191f9d7562fSJ. Bruce Fields 192998db52cSJ. Bruce Fields static void nfs4_file_get_access(struct nfs4_file *fp, int oflag) 193998db52cSJ. Bruce Fields { 194998db52cSJ. Bruce Fields if (oflag == O_RDWR) { 195998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, O_RDONLY); 196998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, O_WRONLY); 197998db52cSJ. Bruce Fields } else 198998db52cSJ. Bruce Fields __nfs4_file_get_access(fp, oflag); 199998db52cSJ. Bruce Fields } 200998db52cSJ. Bruce Fields 201998db52cSJ. Bruce Fields static void nfs4_file_put_fd(struct nfs4_file *fp, int oflag) 202f9d7562fSJ. Bruce Fields { 203f9d7562fSJ. Bruce Fields if (fp->fi_fds[oflag]) { 204f9d7562fSJ. Bruce Fields fput(fp->fi_fds[oflag]); 205f9d7562fSJ. Bruce Fields fp->fi_fds[oflag] = NULL; 206f9d7562fSJ. Bruce Fields } 207f9d7562fSJ. Bruce Fields } 208f9d7562fSJ. Bruce Fields 209998db52cSJ. Bruce Fields static void __nfs4_file_put_access(struct nfs4_file *fp, int oflag) 210f9d7562fSJ. Bruce Fields { 211f9d7562fSJ. Bruce Fields if (atomic_dec_and_test(&fp->fi_access[oflag])) { 212f9d7562fSJ. Bruce Fields nfs4_file_put_fd(fp, oflag); 2133d02fa29SJ. Bruce Fields /* 2143d02fa29SJ. Bruce Fields * It's also safe to get rid of the RDWR open *if* 2153d02fa29SJ. Bruce Fields * we no longer have need of the other kind of access 2163d02fa29SJ. Bruce Fields * or if we already have the other kind of open: 2173d02fa29SJ. Bruce Fields */ 2183d02fa29SJ. Bruce Fields if (fp->fi_fds[1-oflag] 2193d02fa29SJ. Bruce Fields || atomic_read(&fp->fi_access[1 - oflag]) == 0) 2203d02fa29SJ. Bruce Fields nfs4_file_put_fd(fp, O_RDWR); 221f9d7562fSJ. Bruce Fields } 222f9d7562fSJ. Bruce Fields } 223f9d7562fSJ. Bruce Fields 224998db52cSJ. Bruce Fields static void nfs4_file_put_access(struct nfs4_file *fp, int oflag) 225998db52cSJ. Bruce Fields { 226998db52cSJ. Bruce Fields if (oflag == O_RDWR) { 227998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, O_RDONLY); 228998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, O_WRONLY); 229998db52cSJ. Bruce Fields } else 230998db52cSJ. Bruce Fields __nfs4_file_put_access(fp, oflag); 231998db52cSJ. Bruce Fields } 232998db52cSJ. Bruce Fields 2336136d2b4SJ. Bruce Fields static inline int get_new_stid(struct nfs4_stid *stid) 23436d44c60SJ. Bruce Fields { 2356136d2b4SJ. Bruce Fields static int min_stateid = 0; 23638c2f4b1SJ. Bruce Fields struct idr *stateids = &stid->sc_client->cl_stateids; 2376136d2b4SJ. Bruce Fields int new_stid; 2386136d2b4SJ. Bruce Fields int error; 23936d44c60SJ. Bruce Fields 24038c2f4b1SJ. Bruce Fields error = idr_get_new_above(stateids, stid, min_stateid, &new_stid); 2416136d2b4SJ. Bruce Fields /* 242996e0938SJ. Bruce Fields * Note: the necessary preallocation was done in 243996e0938SJ. Bruce Fields * nfs4_alloc_stateid(). The idr code caps the number of 244996e0938SJ. Bruce Fields * preallocations that can exist at a time, but the state lock 245996e0938SJ. Bruce Fields * prevents anyone from using ours before we get here: 2466136d2b4SJ. Bruce Fields */ 247063b0fb9SJ. Bruce Fields WARN_ON_ONCE(error); 2486136d2b4SJ. Bruce Fields /* 2496136d2b4SJ. Bruce Fields * It shouldn't be a problem to reuse an opaque stateid value. 2506136d2b4SJ. Bruce Fields * I don't think it is for 4.1. But with 4.0 I worry that, for 2516136d2b4SJ. Bruce Fields * example, a stray write retransmission could be accepted by 2526136d2b4SJ. Bruce Fields * the server when it should have been rejected. Therefore, 2536136d2b4SJ. Bruce Fields * adopt a trick from the sctp code to attempt to maximize the 2546136d2b4SJ. Bruce Fields * amount of time until an id is reused, by ensuring they always 2556136d2b4SJ. Bruce Fields * "increase" (mod INT_MAX): 2566136d2b4SJ. Bruce Fields */ 2576136d2b4SJ. Bruce Fields 2586136d2b4SJ. Bruce Fields min_stateid = new_stid+1; 2596136d2b4SJ. Bruce Fields if (min_stateid == INT_MAX) 2606136d2b4SJ. Bruce Fields min_stateid = 0; 2616136d2b4SJ. Bruce Fields return new_stid; 26236d44c60SJ. Bruce Fields } 26336d44c60SJ. Bruce Fields 264996e0938SJ. Bruce Fields static void init_stid(struct nfs4_stid *stid, struct nfs4_client *cl, unsigned char type) 2652a74aba7SJ. Bruce Fields { 2662a74aba7SJ. Bruce Fields stateid_t *s = &stid->sc_stateid; 2676136d2b4SJ. Bruce Fields int new_id; 2682a74aba7SJ. Bruce Fields 2692a74aba7SJ. Bruce Fields stid->sc_type = type; 2702a74aba7SJ. Bruce Fields stid->sc_client = cl; 2712a74aba7SJ. Bruce Fields s->si_opaque.so_clid = cl->cl_clientid; 2726136d2b4SJ. Bruce Fields new_id = get_new_stid(stid); 2736136d2b4SJ. Bruce Fields s->si_opaque.so_id = (u32)new_id; 2742a74aba7SJ. Bruce Fields /* Will be incremented before return to client: */ 2752a74aba7SJ. Bruce Fields s->si_generation = 0; 276996e0938SJ. Bruce Fields } 277996e0938SJ. Bruce Fields 278996e0938SJ. Bruce Fields static struct nfs4_stid *nfs4_alloc_stid(struct nfs4_client *cl, struct kmem_cache *slab) 279996e0938SJ. Bruce Fields { 280996e0938SJ. Bruce Fields struct idr *stateids = &cl->cl_stateids; 281996e0938SJ. Bruce Fields 282996e0938SJ. Bruce Fields if (!idr_pre_get(stateids, GFP_KERNEL)) 283996e0938SJ. Bruce Fields return NULL; 284996e0938SJ. Bruce Fields /* 285996e0938SJ. Bruce Fields * Note: if we fail here (or any time between now and the time 286996e0938SJ. Bruce Fields * we actually get the new idr), we won't need to undo the idr 287996e0938SJ. Bruce Fields * preallocation, since the idr code caps the number of 288996e0938SJ. Bruce Fields * preallocated entries. 289996e0938SJ. Bruce Fields */ 290996e0938SJ. Bruce Fields return kmem_cache_alloc(slab, GFP_KERNEL); 2912a74aba7SJ. Bruce Fields } 2922a74aba7SJ. Bruce Fields 2934cdc951bSJ. Bruce Fields static struct nfs4_ol_stateid * nfs4_alloc_stateid(struct nfs4_client *clp) 2944cdc951bSJ. Bruce Fields { 2954cdc951bSJ. Bruce Fields return openlockstateid(nfs4_alloc_stid(clp, stateid_slab)); 2964cdc951bSJ. Bruce Fields } 2974cdc951bSJ. Bruce Fields 2981da177e4SLinus Torvalds static struct nfs4_delegation * 299dcef0413SJ. Bruce Fields alloc_init_deleg(struct nfs4_client *clp, struct nfs4_ol_stateid *stp, struct svc_fh *current_fh, u32 type) 3001da177e4SLinus Torvalds { 3011da177e4SLinus Torvalds struct nfs4_delegation *dp; 3021da177e4SLinus Torvalds struct nfs4_file *fp = stp->st_file; 3031da177e4SLinus Torvalds 3041da177e4SLinus Torvalds dprintk("NFSD alloc_init_deleg\n"); 305c3e48080SJ. Bruce Fields /* 306c3e48080SJ. Bruce Fields * Major work on the lease subsystem (for example, to support 307c3e48080SJ. Bruce Fields * calbacks on stat) will be required before we can support 308c3e48080SJ. Bruce Fields * write delegations properly. 309c3e48080SJ. Bruce Fields */ 310c3e48080SJ. Bruce Fields if (type != NFS4_OPEN_DELEGATE_READ) 311c3e48080SJ. Bruce Fields return NULL; 31247f9940cSMeelap Shah if (fp->fi_had_conflict) 31347f9940cSMeelap Shah return NULL; 314c2f1a551SMeelap Shah if (num_delegations > max_delegations) 315ef0f3390SNeilBrown return NULL; 316996e0938SJ. Bruce Fields dp = delegstateid(nfs4_alloc_stid(clp, deleg_slab)); 3175b2d21c1SNeilBrown if (dp == NULL) 3181da177e4SLinus Torvalds return dp; 319996e0938SJ. Bruce Fields init_stid(&dp->dl_stid, clp, NFS4_DELEG_STID); 3202a74aba7SJ. Bruce Fields /* 3212a74aba7SJ. Bruce Fields * delegation seqid's are never incremented. The 4.1 special 3226136d2b4SJ. Bruce Fields * meaning of seqid 0 isn't meaningful, really, but let's avoid 3236136d2b4SJ. Bruce Fields * 0 anyway just for consistency and use 1: 3242a74aba7SJ. Bruce Fields */ 3252a74aba7SJ. Bruce Fields dp->dl_stid.sc_stateid.si_generation = 1; 326ef0f3390SNeilBrown num_delegations++; 327ea1da636SNeilBrown INIT_LIST_HEAD(&dp->dl_perfile); 328ea1da636SNeilBrown INIT_LIST_HEAD(&dp->dl_perclnt); 3291da177e4SLinus Torvalds INIT_LIST_HEAD(&dp->dl_recall_lru); 33013cd2184SNeilBrown get_nfs4_file(fp); 3311da177e4SLinus Torvalds dp->dl_file = fp; 3321da177e4SLinus Torvalds dp->dl_type = type; 3336c02eaa1SJ. Bruce Fields fh_copy_shallow(&dp->dl_fh, ¤t_fh->fh_handle); 3341da177e4SLinus Torvalds dp->dl_time = 0; 3351da177e4SLinus Torvalds atomic_set(&dp->dl_count, 1); 33657725155SJ. Bruce Fields nfsd4_init_callback(&dp->dl_recall); 3371da177e4SLinus Torvalds return dp; 3381da177e4SLinus Torvalds } 3391da177e4SLinus Torvalds 3401da177e4SLinus Torvalds void 3411da177e4SLinus Torvalds nfs4_put_delegation(struct nfs4_delegation *dp) 3421da177e4SLinus Torvalds { 3431da177e4SLinus Torvalds if (atomic_dec_and_test(&dp->dl_count)) { 3441da177e4SLinus Torvalds dprintk("NFSD: freeing dp %p\n",dp); 34513cd2184SNeilBrown put_nfs4_file(dp->dl_file); 3465b2d21c1SNeilBrown kmem_cache_free(deleg_slab, dp); 347ef0f3390SNeilBrown num_delegations--; 3481da177e4SLinus Torvalds } 3491da177e4SLinus Torvalds } 3501da177e4SLinus Torvalds 351acfdf5c3SJ. Bruce Fields static void nfs4_put_deleg_lease(struct nfs4_file *fp) 3521da177e4SLinus Torvalds { 353acfdf5c3SJ. Bruce Fields if (atomic_dec_and_test(&fp->fi_delegees)) { 354acfdf5c3SJ. Bruce Fields vfs_setlease(fp->fi_deleg_file, F_UNLCK, &fp->fi_lease); 355acfdf5c3SJ. Bruce Fields fp->fi_lease = NULL; 3564ee63624SJ. Bruce Fields fput(fp->fi_deleg_file); 357acfdf5c3SJ. Bruce Fields fp->fi_deleg_file = NULL; 358acfdf5c3SJ. Bruce Fields } 3591da177e4SLinus Torvalds } 3601da177e4SLinus Torvalds 3616136d2b4SJ. Bruce Fields static void unhash_stid(struct nfs4_stid *s) 3626136d2b4SJ. Bruce Fields { 36338c2f4b1SJ. Bruce Fields struct idr *stateids = &s->sc_client->cl_stateids; 36438c2f4b1SJ. Bruce Fields 36538c2f4b1SJ. Bruce Fields idr_remove(stateids, s->sc_stateid.si_opaque.so_id); 3666136d2b4SJ. Bruce Fields } 3676136d2b4SJ. Bruce Fields 3681da177e4SLinus Torvalds /* Called under the state lock. */ 3691da177e4SLinus Torvalds static void 3701da177e4SLinus Torvalds unhash_delegation(struct nfs4_delegation *dp) 3711da177e4SLinus Torvalds { 3726136d2b4SJ. Bruce Fields unhash_stid(&dp->dl_stid); 373ea1da636SNeilBrown list_del_init(&dp->dl_perclnt); 3741da177e4SLinus Torvalds spin_lock(&recall_lock); 3755d926e8cSJ. Bruce Fields list_del_init(&dp->dl_perfile); 3761da177e4SLinus Torvalds list_del_init(&dp->dl_recall_lru); 3771da177e4SLinus Torvalds spin_unlock(&recall_lock); 378acfdf5c3SJ. Bruce Fields nfs4_put_deleg_lease(dp->dl_file); 3791da177e4SLinus Torvalds nfs4_put_delegation(dp); 3801da177e4SLinus Torvalds } 3811da177e4SLinus Torvalds 3821da177e4SLinus Torvalds /* 3831da177e4SLinus Torvalds * SETCLIENTID state 3841da177e4SLinus Torvalds */ 3851da177e4SLinus Torvalds 386ddc04c41SJ. Bruce Fields static unsigned int clientid_hashval(u32 id) 387ddc04c41SJ. Bruce Fields { 388ddc04c41SJ. Bruce Fields return id & CLIENT_HASH_MASK; 389ddc04c41SJ. Bruce Fields } 390ddc04c41SJ. Bruce Fields 391ddc04c41SJ. Bruce Fields static unsigned int clientstr_hashval(const char *name) 392ddc04c41SJ. Bruce Fields { 393ddc04c41SJ. Bruce Fields return opaque_hashval(name, 8) & CLIENT_HASH_MASK; 394ddc04c41SJ. Bruce Fields } 395ddc04c41SJ. Bruce Fields 3961da177e4SLinus Torvalds /* 397f9d7562fSJ. Bruce Fields * We store the NONE, READ, WRITE, and BOTH bits separately in the 398f9d7562fSJ. Bruce Fields * st_{access,deny}_bmap field of the stateid, in order to track not 399f9d7562fSJ. Bruce Fields * only what share bits are currently in force, but also what 400f9d7562fSJ. Bruce Fields * combinations of share bits previous opens have used. This allows us 401f9d7562fSJ. Bruce Fields * to enforce the recommendation of rfc 3530 14.2.19 that the server 402f9d7562fSJ. Bruce Fields * return an error if the client attempt to downgrade to a combination 403f9d7562fSJ. Bruce Fields * of share bits not explicable by closing some of its previous opens. 404f9d7562fSJ. Bruce Fields * 405f9d7562fSJ. Bruce Fields * XXX: This enforcement is actually incomplete, since we don't keep 406f9d7562fSJ. Bruce Fields * track of access/deny bit combinations; so, e.g., we allow: 407f9d7562fSJ. Bruce Fields * 408f9d7562fSJ. Bruce Fields * OPEN allow read, deny write 409f9d7562fSJ. Bruce Fields * OPEN allow both, deny none 410f9d7562fSJ. Bruce Fields * DOWNGRADE allow read, deny none 411f9d7562fSJ. Bruce Fields * 412f9d7562fSJ. Bruce Fields * which we should reject. 413f9d7562fSJ. Bruce Fields */ 4145ae037e5SJeff Layton static unsigned int 4155ae037e5SJeff Layton bmap_to_share_mode(unsigned long bmap) { 416f9d7562fSJ. Bruce Fields int i; 4175ae037e5SJeff Layton unsigned int access = 0; 418f9d7562fSJ. Bruce Fields 419f9d7562fSJ. Bruce Fields for (i = 1; i < 4; i++) { 420f9d7562fSJ. Bruce Fields if (test_bit(i, &bmap)) 4215ae037e5SJeff Layton access |= i; 422f9d7562fSJ. Bruce Fields } 4235ae037e5SJeff Layton return access; 424f9d7562fSJ. Bruce Fields } 425f9d7562fSJ. Bruce Fields 4263a328614SJeff Layton static bool 427dcef0413SJ. Bruce Fields test_share(struct nfs4_ol_stateid *stp, struct nfsd4_open *open) { 428f9d7562fSJ. Bruce Fields unsigned int access, deny; 429f9d7562fSJ. Bruce Fields 4305ae037e5SJeff Layton access = bmap_to_share_mode(stp->st_access_bmap); 4315ae037e5SJeff Layton deny = bmap_to_share_mode(stp->st_deny_bmap); 432f9d7562fSJ. Bruce Fields if ((access & open->op_share_deny) || (deny & open->op_share_access)) 4333a328614SJeff Layton return false; 4343a328614SJeff Layton return true; 435f9d7562fSJ. Bruce Fields } 436f9d7562fSJ. Bruce Fields 43782c5ff1bSJeff Layton /* set share access for a given stateid */ 43882c5ff1bSJeff Layton static inline void 43982c5ff1bSJeff Layton set_access(u32 access, struct nfs4_ol_stateid *stp) 44082c5ff1bSJeff Layton { 44182c5ff1bSJeff Layton __set_bit(access, &stp->st_access_bmap); 44282c5ff1bSJeff Layton } 44382c5ff1bSJeff Layton 44482c5ff1bSJeff Layton /* clear share access for a given stateid */ 44582c5ff1bSJeff Layton static inline void 44682c5ff1bSJeff Layton clear_access(u32 access, struct nfs4_ol_stateid *stp) 44782c5ff1bSJeff Layton { 44882c5ff1bSJeff Layton __clear_bit(access, &stp->st_access_bmap); 44982c5ff1bSJeff Layton } 45082c5ff1bSJeff Layton 45182c5ff1bSJeff Layton /* test whether a given stateid has access */ 45282c5ff1bSJeff Layton static inline bool 45382c5ff1bSJeff Layton test_access(u32 access, struct nfs4_ol_stateid *stp) 45482c5ff1bSJeff Layton { 45582c5ff1bSJeff Layton return test_bit(access, &stp->st_access_bmap); 45682c5ff1bSJeff Layton } 45782c5ff1bSJeff Layton 458ce0fc43cSJeff Layton /* set share deny for a given stateid */ 459ce0fc43cSJeff Layton static inline void 460ce0fc43cSJeff Layton set_deny(u32 access, struct nfs4_ol_stateid *stp) 461ce0fc43cSJeff Layton { 462ce0fc43cSJeff Layton __set_bit(access, &stp->st_deny_bmap); 463ce0fc43cSJeff Layton } 464ce0fc43cSJeff Layton 465ce0fc43cSJeff Layton /* clear share deny for a given stateid */ 466ce0fc43cSJeff Layton static inline void 467ce0fc43cSJeff Layton clear_deny(u32 access, struct nfs4_ol_stateid *stp) 468ce0fc43cSJeff Layton { 469ce0fc43cSJeff Layton __clear_bit(access, &stp->st_deny_bmap); 470ce0fc43cSJeff Layton } 471ce0fc43cSJeff Layton 472ce0fc43cSJeff Layton /* test whether a given stateid is denying specific access */ 473ce0fc43cSJeff Layton static inline bool 474ce0fc43cSJeff Layton test_deny(u32 access, struct nfs4_ol_stateid *stp) 475ce0fc43cSJeff Layton { 476ce0fc43cSJeff Layton return test_bit(access, &stp->st_deny_bmap); 477f9d7562fSJ. Bruce Fields } 478f9d7562fSJ. Bruce Fields 479f9d7562fSJ. Bruce Fields static int nfs4_access_to_omode(u32 access) 480f9d7562fSJ. Bruce Fields { 4818f34a430SJ. Bruce Fields switch (access & NFS4_SHARE_ACCESS_BOTH) { 482f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_READ: 483f9d7562fSJ. Bruce Fields return O_RDONLY; 484f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_WRITE: 485f9d7562fSJ. Bruce Fields return O_WRONLY; 486f9d7562fSJ. Bruce Fields case NFS4_SHARE_ACCESS_BOTH: 487f9d7562fSJ. Bruce Fields return O_RDWR; 488f9d7562fSJ. Bruce Fields } 489063b0fb9SJ. Bruce Fields WARN_ON_ONCE(1); 490063b0fb9SJ. Bruce Fields return O_RDONLY; 491f9d7562fSJ. Bruce Fields } 492f9d7562fSJ. Bruce Fields 49382c5ff1bSJeff Layton /* release all access and file references for a given stateid */ 49482c5ff1bSJeff Layton static void 49582c5ff1bSJeff Layton release_all_access(struct nfs4_ol_stateid *stp) 49682c5ff1bSJeff Layton { 49782c5ff1bSJeff Layton int i; 49882c5ff1bSJeff Layton 49982c5ff1bSJeff Layton for (i = 1; i < 4; i++) { 50082c5ff1bSJeff Layton if (test_access(i, stp)) 50182c5ff1bSJeff Layton nfs4_file_put_access(stp->st_file, 50282c5ff1bSJeff Layton nfs4_access_to_omode(i)); 50382c5ff1bSJeff Layton clear_access(i, stp); 50482c5ff1bSJeff Layton } 50582c5ff1bSJeff Layton } 50682c5ff1bSJeff Layton 507dcef0413SJ. Bruce Fields static void unhash_generic_stateid(struct nfs4_ol_stateid *stp) 508529d7b2aSJ. Bruce Fields { 509529d7b2aSJ. Bruce Fields list_del(&stp->st_perfile); 510529d7b2aSJ. Bruce Fields list_del(&stp->st_perstateowner); 511529d7b2aSJ. Bruce Fields } 512529d7b2aSJ. Bruce Fields 513dcef0413SJ. Bruce Fields static void close_generic_stateid(struct nfs4_ol_stateid *stp) 514529d7b2aSJ. Bruce Fields { 51582c5ff1bSJeff Layton release_all_access(stp); 516a96e5b90SOGAWA Hirofumi put_nfs4_file(stp->st_file); 5174665e2baSJ. Bruce Fields stp->st_file = NULL; 5184665e2baSJ. Bruce Fields } 5194665e2baSJ. Bruce Fields 520dcef0413SJ. Bruce Fields static void free_generic_stateid(struct nfs4_ol_stateid *stp) 5214665e2baSJ. Bruce Fields { 522529d7b2aSJ. Bruce Fields kmem_cache_free(stateid_slab, stp); 523529d7b2aSJ. Bruce Fields } 524529d7b2aSJ. Bruce Fields 525dcef0413SJ. Bruce Fields static void release_lock_stateid(struct nfs4_ol_stateid *stp) 526529d7b2aSJ. Bruce Fields { 527529d7b2aSJ. Bruce Fields struct file *file; 528529d7b2aSJ. Bruce Fields 529529d7b2aSJ. Bruce Fields unhash_generic_stateid(stp); 5306136d2b4SJ. Bruce Fields unhash_stid(&stp->st_stid); 531529d7b2aSJ. Bruce Fields file = find_any_file(stp->st_file); 532529d7b2aSJ. Bruce Fields if (file) 533fe0750e5SJ. Bruce Fields locks_remove_posix(file, (fl_owner_t)lockowner(stp->st_stateowner)); 53438c387b5SJ. Bruce Fields close_generic_stateid(stp); 535529d7b2aSJ. Bruce Fields free_generic_stateid(stp); 536529d7b2aSJ. Bruce Fields } 537529d7b2aSJ. Bruce Fields 538fe0750e5SJ. Bruce Fields static void unhash_lockowner(struct nfs4_lockowner *lo) 539529d7b2aSJ. Bruce Fields { 540dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 541529d7b2aSJ. Bruce Fields 542fe0750e5SJ. Bruce Fields list_del(&lo->lo_owner.so_strhash); 543fe0750e5SJ. Bruce Fields list_del(&lo->lo_perstateid); 544009673b4SJ. Bruce Fields list_del(&lo->lo_owner_ino_hash); 545fe0750e5SJ. Bruce Fields while (!list_empty(&lo->lo_owner.so_stateids)) { 546fe0750e5SJ. Bruce Fields stp = list_first_entry(&lo->lo_owner.so_stateids, 547dcef0413SJ. Bruce Fields struct nfs4_ol_stateid, st_perstateowner); 548529d7b2aSJ. Bruce Fields release_lock_stateid(stp); 549529d7b2aSJ. Bruce Fields } 550529d7b2aSJ. Bruce Fields } 551529d7b2aSJ. Bruce Fields 552fe0750e5SJ. Bruce Fields static void release_lockowner(struct nfs4_lockowner *lo) 553529d7b2aSJ. Bruce Fields { 554fe0750e5SJ. Bruce Fields unhash_lockowner(lo); 555fe0750e5SJ. Bruce Fields nfs4_free_lockowner(lo); 556529d7b2aSJ. Bruce Fields } 557529d7b2aSJ. Bruce Fields 558529d7b2aSJ. Bruce Fields static void 559dcef0413SJ. Bruce Fields release_stateid_lockowners(struct nfs4_ol_stateid *open_stp) 560529d7b2aSJ. Bruce Fields { 561fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lo; 562529d7b2aSJ. Bruce Fields 563529d7b2aSJ. Bruce Fields while (!list_empty(&open_stp->st_lockowners)) { 564fe0750e5SJ. Bruce Fields lo = list_entry(open_stp->st_lockowners.next, 565fe0750e5SJ. Bruce Fields struct nfs4_lockowner, lo_perstateid); 566fe0750e5SJ. Bruce Fields release_lockowner(lo); 567529d7b2aSJ. Bruce Fields } 568529d7b2aSJ. Bruce Fields } 569529d7b2aSJ. Bruce Fields 57038c387b5SJ. Bruce Fields static void unhash_open_stateid(struct nfs4_ol_stateid *stp) 5712283963fSJ. Bruce Fields { 5722283963fSJ. Bruce Fields unhash_generic_stateid(stp); 5732283963fSJ. Bruce Fields release_stateid_lockowners(stp); 57438c387b5SJ. Bruce Fields close_generic_stateid(stp); 57538c387b5SJ. Bruce Fields } 57638c387b5SJ. Bruce Fields 57738c387b5SJ. Bruce Fields static void release_open_stateid(struct nfs4_ol_stateid *stp) 57838c387b5SJ. Bruce Fields { 57938c387b5SJ. Bruce Fields unhash_open_stateid(stp); 5806136d2b4SJ. Bruce Fields unhash_stid(&stp->st_stid); 5812283963fSJ. Bruce Fields free_generic_stateid(stp); 5822283963fSJ. Bruce Fields } 5832283963fSJ. Bruce Fields 584fe0750e5SJ. Bruce Fields static void unhash_openowner(struct nfs4_openowner *oo) 585f1d110caSJ. Bruce Fields { 586dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 587f1d110caSJ. Bruce Fields 588fe0750e5SJ. Bruce Fields list_del(&oo->oo_owner.so_strhash); 589fe0750e5SJ. Bruce Fields list_del(&oo->oo_perclient); 590fe0750e5SJ. Bruce Fields while (!list_empty(&oo->oo_owner.so_stateids)) { 591fe0750e5SJ. Bruce Fields stp = list_first_entry(&oo->oo_owner.so_stateids, 592dcef0413SJ. Bruce Fields struct nfs4_ol_stateid, st_perstateowner); 593f1d110caSJ. Bruce Fields release_open_stateid(stp); 594f1d110caSJ. Bruce Fields } 595f1d110caSJ. Bruce Fields } 596f1d110caSJ. Bruce Fields 597f7a4d872SJ. Bruce Fields static void release_last_closed_stateid(struct nfs4_openowner *oo) 598f7a4d872SJ. Bruce Fields { 599f7a4d872SJ. Bruce Fields struct nfs4_ol_stateid *s = oo->oo_last_closed_stid; 600f7a4d872SJ. Bruce Fields 601f7a4d872SJ. Bruce Fields if (s) { 6026136d2b4SJ. Bruce Fields unhash_stid(&s->st_stid); 603f7a4d872SJ. Bruce Fields free_generic_stateid(s); 604f7a4d872SJ. Bruce Fields oo->oo_last_closed_stid = NULL; 605f7a4d872SJ. Bruce Fields } 606f7a4d872SJ. Bruce Fields } 607f7a4d872SJ. Bruce Fields 608fe0750e5SJ. Bruce Fields static void release_openowner(struct nfs4_openowner *oo) 609f1d110caSJ. Bruce Fields { 610fe0750e5SJ. Bruce Fields unhash_openowner(oo); 611fe0750e5SJ. Bruce Fields list_del(&oo->oo_close_lru); 612f7a4d872SJ. Bruce Fields release_last_closed_stateid(oo); 613fe0750e5SJ. Bruce Fields nfs4_free_openowner(oo); 614f1d110caSJ. Bruce Fields } 615f1d110caSJ. Bruce Fields 6165282fd72SMarc Eshel static inline int 6175282fd72SMarc Eshel hash_sessionid(struct nfs4_sessionid *sessionid) 6185282fd72SMarc Eshel { 6195282fd72SMarc Eshel struct nfsd4_sessionid *sid = (struct nfsd4_sessionid *)sessionid; 6205282fd72SMarc Eshel 6215282fd72SMarc Eshel return sid->sequence % SESSION_HASH_SIZE; 6225282fd72SMarc Eshel } 6235282fd72SMarc Eshel 6248f199b82STrond Myklebust #ifdef NFSD_DEBUG 6255282fd72SMarc Eshel static inline void 6265282fd72SMarc Eshel dump_sessionid(const char *fn, struct nfs4_sessionid *sessionid) 6275282fd72SMarc Eshel { 6285282fd72SMarc Eshel u32 *ptr = (u32 *)(&sessionid->data[0]); 6295282fd72SMarc Eshel dprintk("%s: %u:%u:%u:%u\n", fn, ptr[0], ptr[1], ptr[2], ptr[3]); 6305282fd72SMarc Eshel } 6318f199b82STrond Myklebust #else 6328f199b82STrond Myklebust static inline void 6338f199b82STrond Myklebust dump_sessionid(const char *fn, struct nfs4_sessionid *sessionid) 6348f199b82STrond Myklebust { 6358f199b82STrond Myklebust } 6368f199b82STrond Myklebust #endif 6378f199b82STrond Myklebust 6385282fd72SMarc Eshel 639ec6b5d7bSAndy Adamson static void 640ec6b5d7bSAndy Adamson gen_sessionid(struct nfsd4_session *ses) 641ec6b5d7bSAndy Adamson { 642ec6b5d7bSAndy Adamson struct nfs4_client *clp = ses->se_client; 643ec6b5d7bSAndy Adamson struct nfsd4_sessionid *sid; 644ec6b5d7bSAndy Adamson 645ec6b5d7bSAndy Adamson sid = (struct nfsd4_sessionid *)ses->se_sessionid.data; 646ec6b5d7bSAndy Adamson sid->clientid = clp->cl_clientid; 647ec6b5d7bSAndy Adamson sid->sequence = current_sessionid++; 648ec6b5d7bSAndy Adamson sid->reserved = 0; 649ec6b5d7bSAndy Adamson } 650ec6b5d7bSAndy Adamson 651ec6b5d7bSAndy Adamson /* 652a649637cSAndy Adamson * The protocol defines ca_maxresponssize_cached to include the size of 653a649637cSAndy Adamson * the rpc header, but all we need to cache is the data starting after 654a649637cSAndy Adamson * the end of the initial SEQUENCE operation--the rest we regenerate 655a649637cSAndy Adamson * each time. Therefore we can advertise a ca_maxresponssize_cached 656a649637cSAndy Adamson * value that is the number of bytes in our cache plus a few additional 657a649637cSAndy Adamson * bytes. In order to stay on the safe side, and not promise more than 658a649637cSAndy Adamson * we can cache, those additional bytes must be the minimum possible: 24 659a649637cSAndy Adamson * bytes of rpc header (xid through accept state, with AUTH_NULL 660a649637cSAndy Adamson * verifier), 12 for the compound header (with zero-length tag), and 44 661a649637cSAndy Adamson * for the SEQUENCE op response: 662ec6b5d7bSAndy Adamson */ 663a649637cSAndy Adamson #define NFSD_MIN_HDR_SEQ_SZ (24 + 12 + 44) 664a649637cSAndy Adamson 665557ce264SAndy Adamson static void 666557ce264SAndy Adamson free_session_slots(struct nfsd4_session *ses) 667557ce264SAndy Adamson { 668557ce264SAndy Adamson int i; 669557ce264SAndy Adamson 670557ce264SAndy Adamson for (i = 0; i < ses->se_fchannel.maxreqs; i++) 671557ce264SAndy Adamson kfree(ses->se_slots[i]); 672557ce264SAndy Adamson } 673557ce264SAndy Adamson 674efe0cb6dSJ. Bruce Fields /* 675efe0cb6dSJ. Bruce Fields * We don't actually need to cache the rpc and session headers, so we 676efe0cb6dSJ. Bruce Fields * can allocate a little less for each slot: 677efe0cb6dSJ. Bruce Fields */ 678efe0cb6dSJ. Bruce Fields static inline int slot_bytes(struct nfsd4_channel_attrs *ca) 679efe0cb6dSJ. Bruce Fields { 680efe0cb6dSJ. Bruce Fields return ca->maxresp_cached - NFSD_MIN_HDR_SEQ_SZ; 681efe0cb6dSJ. Bruce Fields } 682efe0cb6dSJ. Bruce Fields 6835b6feee9SJ. Bruce Fields static int nfsd4_sanitize_slot_size(u32 size) 684ec6b5d7bSAndy Adamson { 6855b6feee9SJ. Bruce Fields size -= NFSD_MIN_HDR_SEQ_SZ; /* We don't cache the rpc header */ 6865b6feee9SJ. Bruce Fields size = min_t(u32, size, NFSD_SLOT_CACHE_SIZE); 687ec6b5d7bSAndy Adamson 6885b6feee9SJ. Bruce Fields return size; 689557ce264SAndy Adamson } 690557ce264SAndy Adamson 6915b6feee9SJ. Bruce Fields /* 6925b6feee9SJ. Bruce Fields * XXX: If we run out of reserved DRC memory we could (up to a point) 6935b6feee9SJ. Bruce Fields * re-negotiate active sessions and reduce their slot usage to make 69442b2aa86SJustin P. Mattock * room for new connections. For now we just fail the create session. 6955b6feee9SJ. Bruce Fields */ 6965b6feee9SJ. Bruce Fields static int nfsd4_get_drc_mem(int slotsize, u32 num) 6975b6feee9SJ. Bruce Fields { 6985b6feee9SJ. Bruce Fields int avail; 6995b6feee9SJ. Bruce Fields 7005b6feee9SJ. Bruce Fields num = min_t(u32, num, NFSD_MAX_SLOTS_PER_SESSION); 7015b6feee9SJ. Bruce Fields 7025b6feee9SJ. Bruce Fields spin_lock(&nfsd_drc_lock); 7035b6feee9SJ. Bruce Fields avail = min_t(int, NFSD_MAX_MEM_PER_SESSION, 7045b6feee9SJ. Bruce Fields nfsd_drc_max_mem - nfsd_drc_mem_used); 7055b6feee9SJ. Bruce Fields num = min_t(int, num, avail / slotsize); 7065b6feee9SJ. Bruce Fields nfsd_drc_mem_used += num * slotsize; 7075b6feee9SJ. Bruce Fields spin_unlock(&nfsd_drc_lock); 7085b6feee9SJ. Bruce Fields 7095b6feee9SJ. Bruce Fields return num; 7105b6feee9SJ. Bruce Fields } 7115b6feee9SJ. Bruce Fields 7125b6feee9SJ. Bruce Fields static void nfsd4_put_drc_mem(int slotsize, int num) 7135b6feee9SJ. Bruce Fields { 7145b6feee9SJ. Bruce Fields spin_lock(&nfsd_drc_lock); 7155b6feee9SJ. Bruce Fields nfsd_drc_mem_used -= slotsize * num; 7165b6feee9SJ. Bruce Fields spin_unlock(&nfsd_drc_lock); 7175b6feee9SJ. Bruce Fields } 7185b6feee9SJ. Bruce Fields 719a827bcb2SJ. Bruce Fields static struct nfsd4_session *__alloc_session(int slotsize, int numslots) 7205b6feee9SJ. Bruce Fields { 7215b6feee9SJ. Bruce Fields struct nfsd4_session *new; 7225b6feee9SJ. Bruce Fields int mem, i; 723ec6b5d7bSAndy Adamson 724c23753daSJ. Bruce Fields BUILD_BUG_ON(NFSD_MAX_SLOTS_PER_SESSION * sizeof(struct nfsd4_slot *) 725ec6b5d7bSAndy Adamson + sizeof(struct nfsd4_session) > PAGE_SIZE); 7265b6feee9SJ. Bruce Fields mem = numslots * sizeof(struct nfsd4_slot *); 727ec6b5d7bSAndy Adamson 7285b6feee9SJ. Bruce Fields new = kzalloc(sizeof(*new) + mem, GFP_KERNEL); 7296c18ba9fSAlexandros Batsakis if (!new) 7305b6feee9SJ. Bruce Fields return NULL; 731ec6b5d7bSAndy Adamson /* allocate each struct nfsd4_slot and data cache in one piece */ 7325b6feee9SJ. Bruce Fields for (i = 0; i < numslots; i++) { 7335b6feee9SJ. Bruce Fields mem = sizeof(struct nfsd4_slot) + slotsize; 7345b6feee9SJ. Bruce Fields new->se_slots[i] = kzalloc(mem, GFP_KERNEL); 7355b6feee9SJ. Bruce Fields if (!new->se_slots[i]) 736ec6b5d7bSAndy Adamson goto out_free; 737ec6b5d7bSAndy Adamson } 7385b6feee9SJ. Bruce Fields return new; 7395b6feee9SJ. Bruce Fields out_free: 7405b6feee9SJ. Bruce Fields while (i--) 7415b6feee9SJ. Bruce Fields kfree(new->se_slots[i]); 7425b6feee9SJ. Bruce Fields kfree(new); 7435b6feee9SJ. Bruce Fields return NULL; 7445b6feee9SJ. Bruce Fields } 7455b6feee9SJ. Bruce Fields 7469dd9845fSStanislav Kinsbursky static void init_forechannel_attrs(struct nfsd4_channel_attrs *new, 7479dd9845fSStanislav Kinsbursky struct nfsd4_channel_attrs *req, 7489dd9845fSStanislav Kinsbursky int numslots, int slotsize, 7499dd9845fSStanislav Kinsbursky struct nfsd_net *nn) 7505b6feee9SJ. Bruce Fields { 7519dd9845fSStanislav Kinsbursky u32 maxrpc = nn->nfsd_serv->sv_max_mesg; 7525b6feee9SJ. Bruce Fields 7535b6feee9SJ. Bruce Fields new->maxreqs = numslots; 754d2b21743SMi Jinlong new->maxresp_cached = min_t(u32, req->maxresp_cached, 755d2b21743SMi Jinlong slotsize + NFSD_MIN_HDR_SEQ_SZ); 7565b6feee9SJ. Bruce Fields new->maxreq_sz = min_t(u32, req->maxreq_sz, maxrpc); 7575b6feee9SJ. Bruce Fields new->maxresp_sz = min_t(u32, req->maxresp_sz, maxrpc); 7585b6feee9SJ. Bruce Fields new->maxops = min_t(u32, req->maxops, NFSD_MAX_OPS_PER_COMPOUND); 7595b6feee9SJ. Bruce Fields } 7605b6feee9SJ. Bruce Fields 76119cf5c02SJ. Bruce Fields static void free_conn(struct nfsd4_conn *c) 76219cf5c02SJ. Bruce Fields { 76319cf5c02SJ. Bruce Fields svc_xprt_put(c->cn_xprt); 76419cf5c02SJ. Bruce Fields kfree(c); 76519cf5c02SJ. Bruce Fields } 76619cf5c02SJ. Bruce Fields 76719cf5c02SJ. Bruce Fields static void nfsd4_conn_lost(struct svc_xpt_user *u) 76819cf5c02SJ. Bruce Fields { 76919cf5c02SJ. Bruce Fields struct nfsd4_conn *c = container_of(u, struct nfsd4_conn, cn_xpt_user); 77019cf5c02SJ. Bruce Fields struct nfs4_client *clp = c->cn_session->se_client; 77119cf5c02SJ. Bruce Fields 77219cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 77319cf5c02SJ. Bruce Fields if (!list_empty(&c->cn_persession)) { 77419cf5c02SJ. Bruce Fields list_del(&c->cn_persession); 77519cf5c02SJ. Bruce Fields free_conn(c); 77619cf5c02SJ. Bruce Fields } 77719cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 778eea49806SJ. Bruce Fields nfsd4_probe_callback(clp); 77919cf5c02SJ. Bruce Fields } 78019cf5c02SJ. Bruce Fields 781d29c374cSJ. Bruce Fields static struct nfsd4_conn *alloc_conn(struct svc_rqst *rqstp, u32 flags) 782c7662518SJ. Bruce Fields { 783c7662518SJ. Bruce Fields struct nfsd4_conn *conn; 784c7662518SJ. Bruce Fields 785c7662518SJ. Bruce Fields conn = kmalloc(sizeof(struct nfsd4_conn), GFP_KERNEL); 786c7662518SJ. Bruce Fields if (!conn) 787db90681dSJ. Bruce Fields return NULL; 788c7662518SJ. Bruce Fields svc_xprt_get(rqstp->rq_xprt); 789c7662518SJ. Bruce Fields conn->cn_xprt = rqstp->rq_xprt; 790d29c374cSJ. Bruce Fields conn->cn_flags = flags; 791db90681dSJ. Bruce Fields INIT_LIST_HEAD(&conn->cn_xpt_user.list); 792db90681dSJ. Bruce Fields return conn; 793db90681dSJ. Bruce Fields } 794db90681dSJ. Bruce Fields 795328ead28SJ. Bruce Fields static void __nfsd4_hash_conn(struct nfsd4_conn *conn, struct nfsd4_session *ses) 796328ead28SJ. Bruce Fields { 797328ead28SJ. Bruce Fields conn->cn_session = ses; 798328ead28SJ. Bruce Fields list_add(&conn->cn_persession, &ses->se_conns); 799328ead28SJ. Bruce Fields } 800328ead28SJ. Bruce Fields 801db90681dSJ. Bruce Fields static void nfsd4_hash_conn(struct nfsd4_conn *conn, struct nfsd4_session *ses) 802db90681dSJ. Bruce Fields { 803db90681dSJ. Bruce Fields struct nfs4_client *clp = ses->se_client; 804c7662518SJ. Bruce Fields 805c7662518SJ. Bruce Fields spin_lock(&clp->cl_lock); 806328ead28SJ. Bruce Fields __nfsd4_hash_conn(conn, ses); 807c7662518SJ. Bruce Fields spin_unlock(&clp->cl_lock); 808db90681dSJ. Bruce Fields } 809c7662518SJ. Bruce Fields 81021b75b01SJ. Bruce Fields static int nfsd4_register_conn(struct nfsd4_conn *conn) 811db90681dSJ. Bruce Fields { 81219cf5c02SJ. Bruce Fields conn->cn_xpt_user.callback = nfsd4_conn_lost; 81321b75b01SJ. Bruce Fields return register_xpt_user(conn->cn_xprt, &conn->cn_xpt_user); 814db90681dSJ. Bruce Fields } 815db90681dSJ. Bruce Fields 816e1ff371fSJ. Bruce Fields static void nfsd4_init_conn(struct svc_rqst *rqstp, struct nfsd4_conn *conn, struct nfsd4_session *ses) 817db90681dSJ. Bruce Fields { 81821b75b01SJ. Bruce Fields int ret; 819db90681dSJ. Bruce Fields 820db90681dSJ. Bruce Fields nfsd4_hash_conn(conn, ses); 82121b75b01SJ. Bruce Fields ret = nfsd4_register_conn(conn); 82221b75b01SJ. Bruce Fields if (ret) 82321b75b01SJ. Bruce Fields /* oops; xprt is already down: */ 82421b75b01SJ. Bruce Fields nfsd4_conn_lost(&conn->cn_xpt_user); 8256a3b1563SJ. Bruce Fields if (conn->cn_flags & NFS4_CDFC4_BACK) { 82624119673SWeston Andros Adamson /* callback channel may be back up */ 82724119673SWeston Andros Adamson nfsd4_probe_callback(ses->se_client); 82824119673SWeston Andros Adamson } 829c7662518SJ. Bruce Fields } 830c7662518SJ. Bruce Fields 831e1ff371fSJ. Bruce Fields static struct nfsd4_conn *alloc_conn_from_crses(struct svc_rqst *rqstp, struct nfsd4_create_session *cses) 8321d1bc8f2SJ. Bruce Fields { 8331d1bc8f2SJ. Bruce Fields u32 dir = NFS4_CDFC4_FORE; 8341d1bc8f2SJ. Bruce Fields 835e1ff371fSJ. Bruce Fields if (cses->flags & SESSION4_BACK_CHAN) 8361d1bc8f2SJ. Bruce Fields dir |= NFS4_CDFC4_BACK; 837e1ff371fSJ. Bruce Fields return alloc_conn(rqstp, dir); 8381d1bc8f2SJ. Bruce Fields } 8391d1bc8f2SJ. Bruce Fields 8401d1bc8f2SJ. Bruce Fields /* must be called under client_lock */ 84119cf5c02SJ. Bruce Fields static void nfsd4_del_conns(struct nfsd4_session *s) 842c7662518SJ. Bruce Fields { 84319cf5c02SJ. Bruce Fields struct nfs4_client *clp = s->se_client; 84419cf5c02SJ. Bruce Fields struct nfsd4_conn *c; 84519cf5c02SJ. Bruce Fields 84619cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 84719cf5c02SJ. Bruce Fields while (!list_empty(&s->se_conns)) { 84819cf5c02SJ. Bruce Fields c = list_first_entry(&s->se_conns, struct nfsd4_conn, cn_persession); 84919cf5c02SJ. Bruce Fields list_del_init(&c->cn_persession); 85019cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 85119cf5c02SJ. Bruce Fields 85219cf5c02SJ. Bruce Fields unregister_xpt_user(c->cn_xprt, &c->cn_xpt_user); 85319cf5c02SJ. Bruce Fields free_conn(c); 85419cf5c02SJ. Bruce Fields 85519cf5c02SJ. Bruce Fields spin_lock(&clp->cl_lock); 85619cf5c02SJ. Bruce Fields } 85719cf5c02SJ. Bruce Fields spin_unlock(&clp->cl_lock); 858c7662518SJ. Bruce Fields } 859c7662518SJ. Bruce Fields 8601377b69eSJ. Bruce Fields static void __free_session(struct nfsd4_session *ses) 8611377b69eSJ. Bruce Fields { 8621377b69eSJ. Bruce Fields nfsd4_put_drc_mem(slot_bytes(&ses->se_fchannel), ses->se_fchannel.maxreqs); 8631377b69eSJ. Bruce Fields free_session_slots(ses); 8641377b69eSJ. Bruce Fields kfree(ses); 8651377b69eSJ. Bruce Fields } 8661377b69eSJ. Bruce Fields 867508dc6e1SBenny Halevy static void free_session(struct kref *kref) 868c7662518SJ. Bruce Fields { 869c7662518SJ. Bruce Fields struct nfsd4_session *ses; 870c9a49628SStanislav Kinsbursky struct nfsd_net *nn; 871c7662518SJ. Bruce Fields 872c7662518SJ. Bruce Fields ses = container_of(kref, struct nfsd4_session, se_ref); 873c9a49628SStanislav Kinsbursky nn = net_generic(ses->se_client->net, nfsd_net_id); 874c9a49628SStanislav Kinsbursky 875c9a49628SStanislav Kinsbursky lockdep_assert_held(&nn->client_lock); 87619cf5c02SJ. Bruce Fields nfsd4_del_conns(ses); 8771377b69eSJ. Bruce Fields __free_session(ses); 878c7662518SJ. Bruce Fields } 879c7662518SJ. Bruce Fields 880508dc6e1SBenny Halevy void nfsd4_put_session(struct nfsd4_session *ses) 881508dc6e1SBenny Halevy { 882c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(ses->se_client->net, nfsd_net_id); 883c9a49628SStanislav Kinsbursky 884c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 885508dc6e1SBenny Halevy nfsd4_put_session_locked(ses); 886c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 887508dc6e1SBenny Halevy } 888508dc6e1SBenny Halevy 8899dd9845fSStanislav Kinsbursky static struct nfsd4_session *alloc_session(struct nfsd4_channel_attrs *fchan, 8909dd9845fSStanislav Kinsbursky struct nfsd_net *nn) 8915b6feee9SJ. Bruce Fields { 8925b6feee9SJ. Bruce Fields struct nfsd4_session *new; 8935b6feee9SJ. Bruce Fields int numslots, slotsize; 8945b6feee9SJ. Bruce Fields /* 8955b6feee9SJ. Bruce Fields * Note decreasing slot size below client's request may 8965b6feee9SJ. Bruce Fields * make it difficult for client to function correctly, whereas 8975b6feee9SJ. Bruce Fields * decreasing the number of slots will (just?) affect 8985b6feee9SJ. Bruce Fields * performance. When short on memory we therefore prefer to 8995b6feee9SJ. Bruce Fields * decrease number of slots instead of their size. 9005b6feee9SJ. Bruce Fields */ 9015b6feee9SJ. Bruce Fields slotsize = nfsd4_sanitize_slot_size(fchan->maxresp_cached); 9025b6feee9SJ. Bruce Fields numslots = nfsd4_get_drc_mem(slotsize, fchan->maxreqs); 903ced6dfe9SMi Jinlong if (numslots < 1) 904ced6dfe9SMi Jinlong return NULL; 9055b6feee9SJ. Bruce Fields 906a827bcb2SJ. Bruce Fields new = __alloc_session(slotsize, numslots); 9075b6feee9SJ. Bruce Fields if (!new) { 908*74b70ddeSYanchuan Nian nfsd4_put_drc_mem(slotsize, numslots); 909ac7c46f2SJ. Bruce Fields return NULL; 9105b6feee9SJ. Bruce Fields } 9119dd9845fSStanislav Kinsbursky init_forechannel_attrs(&new->se_fchannel, fchan, numslots, slotsize, nn); 912a827bcb2SJ. Bruce Fields return new; 913a827bcb2SJ. Bruce Fields } 914ec6b5d7bSAndy Adamson 915135ae827SFengguang Wu static void init_session(struct svc_rqst *rqstp, struct nfsd4_session *new, struct nfs4_client *clp, struct nfsd4_create_session *cses) 916a827bcb2SJ. Bruce Fields { 917a827bcb2SJ. Bruce Fields int idx; 9181872de0eSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 919a827bcb2SJ. Bruce Fields 920ec6b5d7bSAndy Adamson new->se_client = clp; 921ec6b5d7bSAndy Adamson gen_sessionid(new); 922ec6b5d7bSAndy Adamson 923c7662518SJ. Bruce Fields INIT_LIST_HEAD(&new->se_conns); 924c7662518SJ. Bruce Fields 925ac7c46f2SJ. Bruce Fields new->se_cb_seq_nr = 1; 926ec6b5d7bSAndy Adamson new->se_flags = cses->flags; 9278b5ce5cdSJ. Bruce Fields new->se_cb_prog = cses->callback_prog; 928c6bb3ca2SJ. Bruce Fields new->se_cb_sec = cses->cb_sec; 929ec6b5d7bSAndy Adamson kref_init(&new->se_ref); 9305b6feee9SJ. Bruce Fields idx = hash_sessionid(&new->se_sessionid); 931c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 9321872de0eSStanislav Kinsbursky list_add(&new->se_hash, &nn->sessionid_hashtbl[idx]); 9334c649378SJ. Bruce Fields spin_lock(&clp->cl_lock); 934ec6b5d7bSAndy Adamson list_add(&new->se_perclnt, &clp->cl_sessions); 9354c649378SJ. Bruce Fields spin_unlock(&clp->cl_lock); 936c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 937ec6b5d7bSAndy Adamson 938dcbeaa68SJ. Bruce Fields if (cses->flags & SESSION4_BACK_CHAN) { 939edd76786SJ. Bruce Fields struct sockaddr *sa = svc_addr(rqstp); 940dcbeaa68SJ. Bruce Fields /* 941dcbeaa68SJ. Bruce Fields * This is a little silly; with sessions there's no real 942dcbeaa68SJ. Bruce Fields * use for the callback address. Use the peer address 943dcbeaa68SJ. Bruce Fields * as a reasonable default for now, but consider fixing 944dcbeaa68SJ. Bruce Fields * the rpc client not to require an address in the 945dcbeaa68SJ. Bruce Fields * future: 946dcbeaa68SJ. Bruce Fields */ 947edd76786SJ. Bruce Fields rpc_copy_addr((struct sockaddr *)&clp->cl_cb_conn.cb_addr, sa); 948edd76786SJ. Bruce Fields clp->cl_cb_conn.cb_addrlen = svc_addr_len(sa); 949edd76786SJ. Bruce Fields } 950ec6b5d7bSAndy Adamson } 951ec6b5d7bSAndy Adamson 9529089f1b4SBenny Halevy /* caller must hold client_lock */ 9535282fd72SMarc Eshel static struct nfsd4_session * 9541872de0eSStanislav Kinsbursky find_in_sessionid_hashtbl(struct nfs4_sessionid *sessionid, struct net *net) 9555282fd72SMarc Eshel { 9565282fd72SMarc Eshel struct nfsd4_session *elem; 9575282fd72SMarc Eshel int idx; 9581872de0eSStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 9595282fd72SMarc Eshel 9605282fd72SMarc Eshel dump_sessionid(__func__, sessionid); 9615282fd72SMarc Eshel idx = hash_sessionid(sessionid); 9625282fd72SMarc Eshel /* Search in the appropriate list */ 9631872de0eSStanislav Kinsbursky list_for_each_entry(elem, &nn->sessionid_hashtbl[idx], se_hash) { 9645282fd72SMarc Eshel if (!memcmp(elem->se_sessionid.data, sessionid->data, 9655282fd72SMarc Eshel NFS4_MAX_SESSIONID_LEN)) { 9665282fd72SMarc Eshel return elem; 9675282fd72SMarc Eshel } 9685282fd72SMarc Eshel } 9695282fd72SMarc Eshel 9705282fd72SMarc Eshel dprintk("%s: session not found\n", __func__); 9715282fd72SMarc Eshel return NULL; 9725282fd72SMarc Eshel } 9735282fd72SMarc Eshel 9749089f1b4SBenny Halevy /* caller must hold client_lock */ 9757116ed6bSAndy Adamson static void 9765282fd72SMarc Eshel unhash_session(struct nfsd4_session *ses) 9777116ed6bSAndy Adamson { 9787116ed6bSAndy Adamson list_del(&ses->se_hash); 9794c649378SJ. Bruce Fields spin_lock(&ses->se_client->cl_lock); 9807116ed6bSAndy Adamson list_del(&ses->se_perclnt); 9814c649378SJ. Bruce Fields spin_unlock(&ses->se_client->cl_lock); 9825282fd72SMarc Eshel } 9835282fd72SMarc Eshel 98436acb66bSBenny Halevy /* must be called under the client_lock */ 9851da177e4SLinus Torvalds static inline void 98636acb66bSBenny Halevy renew_client_locked(struct nfs4_client *clp) 9871da177e4SLinus Torvalds { 9885ed58bb2SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 9895ed58bb2SStanislav Kinsbursky 99007cd4909SBenny Halevy if (is_client_expired(clp)) { 9917447758bSJ. Bruce Fields WARN_ON(1); 9927447758bSJ. Bruce Fields printk("%s: client (clientid %08x/%08x) already expired\n", 99307cd4909SBenny Halevy __func__, 99407cd4909SBenny Halevy clp->cl_clientid.cl_boot, 99507cd4909SBenny Halevy clp->cl_clientid.cl_id); 99607cd4909SBenny Halevy return; 99707cd4909SBenny Halevy } 99807cd4909SBenny Halevy 9991da177e4SLinus Torvalds dprintk("renewing client (clientid %08x/%08x)\n", 10001da177e4SLinus Torvalds clp->cl_clientid.cl_boot, 10011da177e4SLinus Torvalds clp->cl_clientid.cl_id); 10025ed58bb2SStanislav Kinsbursky list_move_tail(&clp->cl_lru, &nn->client_lru); 10031da177e4SLinus Torvalds clp->cl_time = get_seconds(); 10041da177e4SLinus Torvalds } 10051da177e4SLinus Torvalds 100636acb66bSBenny Halevy static inline void 100736acb66bSBenny Halevy renew_client(struct nfs4_client *clp) 100836acb66bSBenny Halevy { 1009c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 1010c9a49628SStanislav Kinsbursky 1011c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 101236acb66bSBenny Halevy renew_client_locked(clp); 1013c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 101436acb66bSBenny Halevy } 101536acb66bSBenny Halevy 10161da177e4SLinus Torvalds /* SETCLIENTID and SETCLIENTID_CONFIRM Helper functions */ 10171da177e4SLinus Torvalds static int 10182c142baaSStanislav Kinsbursky STALE_CLIENTID(clientid_t *clid, struct nfsd_net *nn) 10191da177e4SLinus Torvalds { 10202c142baaSStanislav Kinsbursky if (clid->cl_boot == nn->boot_time) 10211da177e4SLinus Torvalds return 0; 102260adfc50SAndy Adamson dprintk("NFSD stale clientid (%08x/%08x) boot_time %08lx\n", 10232c142baaSStanislav Kinsbursky clid->cl_boot, clid->cl_id, nn->boot_time); 10241da177e4SLinus Torvalds return 1; 10251da177e4SLinus Torvalds } 10261da177e4SLinus Torvalds 10271da177e4SLinus Torvalds /* 10281da177e4SLinus Torvalds * XXX Should we use a slab cache ? 10291da177e4SLinus Torvalds * This type of memory management is somewhat inefficient, but we use it 10301da177e4SLinus Torvalds * anyway since SETCLIENTID is not a common operation. 10311da177e4SLinus Torvalds */ 103235bba9a3SJ. Bruce Fields static struct nfs4_client *alloc_client(struct xdr_netobj name) 10331da177e4SLinus Torvalds { 10341da177e4SLinus Torvalds struct nfs4_client *clp; 10351da177e4SLinus Torvalds 103635bba9a3SJ. Bruce Fields clp = kzalloc(sizeof(struct nfs4_client), GFP_KERNEL); 103735bba9a3SJ. Bruce Fields if (clp == NULL) 103835bba9a3SJ. Bruce Fields return NULL; 103967114fe6SThomas Meyer clp->cl_name.data = kmemdup(name.data, name.len, GFP_KERNEL); 104035bba9a3SJ. Bruce Fields if (clp->cl_name.data == NULL) { 104135bba9a3SJ. Bruce Fields kfree(clp); 104235bba9a3SJ. Bruce Fields return NULL; 104335bba9a3SJ. Bruce Fields } 10441da177e4SLinus Torvalds clp->cl_name.len = name.len; 10451da177e4SLinus Torvalds return clp; 10461da177e4SLinus Torvalds } 10471da177e4SLinus Torvalds 10481da177e4SLinus Torvalds static inline void 10491da177e4SLinus Torvalds free_client(struct nfs4_client *clp) 10501da177e4SLinus Torvalds { 1051c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 1052c9a49628SStanislav Kinsbursky 1053c9a49628SStanislav Kinsbursky lockdep_assert_held(&nn->client_lock); 1054792c95ddSJ. Bruce Fields while (!list_empty(&clp->cl_sessions)) { 1055792c95ddSJ. Bruce Fields struct nfsd4_session *ses; 1056792c95ddSJ. Bruce Fields ses = list_entry(clp->cl_sessions.next, struct nfsd4_session, 1057792c95ddSJ. Bruce Fields se_perclnt); 1058792c95ddSJ. Bruce Fields list_del(&ses->se_perclnt); 1059508dc6e1SBenny Halevy nfsd4_put_session_locked(ses); 1060792c95ddSJ. Bruce Fields } 106103a4e1f6SJ. Bruce Fields free_svc_cred(&clp->cl_cred); 10621da177e4SLinus Torvalds kfree(clp->cl_name.data); 10631da177e4SLinus Torvalds kfree(clp); 10641da177e4SLinus Torvalds } 10651da177e4SLinus Torvalds 1066d7682988SBenny Halevy void 1067d7682988SBenny Halevy release_session_client(struct nfsd4_session *session) 1068d7682988SBenny Halevy { 1069d7682988SBenny Halevy struct nfs4_client *clp = session->se_client; 1070c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 1071d7682988SBenny Halevy 1072c9a49628SStanislav Kinsbursky if (!atomic_dec_and_lock(&clp->cl_refcount, &nn->client_lock)) 1073d7682988SBenny Halevy return; 1074d7682988SBenny Halevy if (is_client_expired(clp)) { 1075d7682988SBenny Halevy free_client(clp); 1076d7682988SBenny Halevy session->se_client = NULL; 1077d7682988SBenny Halevy } else 1078d7682988SBenny Halevy renew_client_locked(clp); 1079c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1080d7682988SBenny Halevy } 1081d7682988SBenny Halevy 108284d38ac9SBenny Halevy /* must be called under the client_lock */ 108384d38ac9SBenny Halevy static inline void 108484d38ac9SBenny Halevy unhash_client_locked(struct nfs4_client *clp) 108584d38ac9SBenny Halevy { 1086792c95ddSJ. Bruce Fields struct nfsd4_session *ses; 1087792c95ddSJ. Bruce Fields 108807cd4909SBenny Halevy mark_client_expired(clp); 108984d38ac9SBenny Halevy list_del(&clp->cl_lru); 10904c649378SJ. Bruce Fields spin_lock(&clp->cl_lock); 1091792c95ddSJ. Bruce Fields list_for_each_entry(ses, &clp->cl_sessions, se_perclnt) 1092792c95ddSJ. Bruce Fields list_del_init(&ses->se_hash); 10934c649378SJ. Bruce Fields spin_unlock(&clp->cl_lock); 109484d38ac9SBenny Halevy } 109584d38ac9SBenny Halevy 10961da177e4SLinus Torvalds static void 10970d22f68fSJ. Bruce Fields destroy_client(struct nfs4_client *clp) 10981da177e4SLinus Torvalds { 1099fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo; 11001da177e4SLinus Torvalds struct nfs4_delegation *dp; 11011da177e4SLinus Torvalds struct list_head reaplist; 1102382a62e7SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 11031da177e4SLinus Torvalds 11041da177e4SLinus Torvalds INIT_LIST_HEAD(&reaplist); 11051da177e4SLinus Torvalds spin_lock(&recall_lock); 1106ea1da636SNeilBrown while (!list_empty(&clp->cl_delegations)) { 1107ea1da636SNeilBrown dp = list_entry(clp->cl_delegations.next, struct nfs4_delegation, dl_perclnt); 1108ea1da636SNeilBrown list_del_init(&dp->dl_perclnt); 11091da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 11101da177e4SLinus Torvalds } 11111da177e4SLinus Torvalds spin_unlock(&recall_lock); 11121da177e4SLinus Torvalds while (!list_empty(&reaplist)) { 11131da177e4SLinus Torvalds dp = list_entry(reaplist.next, struct nfs4_delegation, dl_recall_lru); 11141da177e4SLinus Torvalds unhash_delegation(dp); 11151da177e4SLinus Torvalds } 1116ea1da636SNeilBrown while (!list_empty(&clp->cl_openowners)) { 1117fe0750e5SJ. Bruce Fields oo = list_entry(clp->cl_openowners.next, struct nfs4_openowner, oo_perclient); 1118fe0750e5SJ. Bruce Fields release_openowner(oo); 11191da177e4SLinus Torvalds } 11206ff8da08SJ. Bruce Fields nfsd4_shutdown_callback(clp); 11212bf23875SJ. Bruce Fields if (clp->cl_cb_conn.cb_xprt) 11222bf23875SJ. Bruce Fields svc_xprt_put(clp->cl_cb_conn.cb_xprt); 112384d38ac9SBenny Halevy list_del(&clp->cl_idhash); 1124ac55fdc4SJeff Layton if (test_bit(NFSD4_CLIENT_CONFIRMED, &clp->cl_flags)) 1125382a62e7SStanislav Kinsbursky rb_erase(&clp->cl_namenode, &nn->conf_name_tree); 1126ac55fdc4SJeff Layton else 1127a99454aaSStanislav Kinsbursky rb_erase(&clp->cl_namenode, &nn->unconf_name_tree); 1128c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 112984d38ac9SBenny Halevy unhash_client_locked(clp); 113046583e25SBenny Halevy if (atomic_read(&clp->cl_refcount) == 0) 1131b12a05cbSJ. Bruce Fields free_client(clp); 1132c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 11331da177e4SLinus Torvalds } 11341da177e4SLinus Torvalds 11350d22f68fSJ. Bruce Fields static void expire_client(struct nfs4_client *clp) 11360d22f68fSJ. Bruce Fields { 11370d22f68fSJ. Bruce Fields nfsd4_client_record_remove(clp); 11380d22f68fSJ. Bruce Fields destroy_client(clp); 11390d22f68fSJ. Bruce Fields } 11400d22f68fSJ. Bruce Fields 114135bba9a3SJ. Bruce Fields static void copy_verf(struct nfs4_client *target, nfs4_verifier *source) 114235bba9a3SJ. Bruce Fields { 114335bba9a3SJ. Bruce Fields memcpy(target->cl_verifier.data, source->data, 114435bba9a3SJ. Bruce Fields sizeof(target->cl_verifier.data)); 11451da177e4SLinus Torvalds } 11461da177e4SLinus Torvalds 114735bba9a3SJ. Bruce Fields static void copy_clid(struct nfs4_client *target, struct nfs4_client *source) 114835bba9a3SJ. Bruce Fields { 11491da177e4SLinus Torvalds target->cl_clientid.cl_boot = source->cl_clientid.cl_boot; 11501da177e4SLinus Torvalds target->cl_clientid.cl_id = source->cl_clientid.cl_id; 11511da177e4SLinus Torvalds } 11521da177e4SLinus Torvalds 115303a4e1f6SJ. Bruce Fields static int copy_cred(struct svc_cred *target, struct svc_cred *source) 115435bba9a3SJ. Bruce Fields { 115503a4e1f6SJ. Bruce Fields if (source->cr_principal) { 115603a4e1f6SJ. Bruce Fields target->cr_principal = 115703a4e1f6SJ. Bruce Fields kstrdup(source->cr_principal, GFP_KERNEL); 115803a4e1f6SJ. Bruce Fields if (target->cr_principal == NULL) 115903a4e1f6SJ. Bruce Fields return -ENOMEM; 116003a4e1f6SJ. Bruce Fields } else 116103a4e1f6SJ. Bruce Fields target->cr_principal = NULL; 1162d5497fc6SJ. Bruce Fields target->cr_flavor = source->cr_flavor; 11631da177e4SLinus Torvalds target->cr_uid = source->cr_uid; 11641da177e4SLinus Torvalds target->cr_gid = source->cr_gid; 11651da177e4SLinus Torvalds target->cr_group_info = source->cr_group_info; 11661da177e4SLinus Torvalds get_group_info(target->cr_group_info); 116703a4e1f6SJ. Bruce Fields return 0; 11681da177e4SLinus Torvalds } 11691da177e4SLinus Torvalds 1170ac55fdc4SJeff Layton static long long 1171ac55fdc4SJeff Layton compare_blob(const struct xdr_netobj *o1, const struct xdr_netobj *o2) 1172ac55fdc4SJeff Layton { 1173ac55fdc4SJeff Layton long long res; 1174ac55fdc4SJeff Layton 1175ac55fdc4SJeff Layton res = o1->len - o2->len; 1176ac55fdc4SJeff Layton if (res) 1177ac55fdc4SJeff Layton return res; 1178ac55fdc4SJeff Layton return (long long)memcmp(o1->data, o2->data, o1->len); 1179ac55fdc4SJeff Layton } 1180ac55fdc4SJeff Layton 118135bba9a3SJ. Bruce Fields static int same_name(const char *n1, const char *n2) 1182599e0a22SJ. Bruce Fields { 1183a55370a3SNeilBrown return 0 == memcmp(n1, n2, HEXDIR_LEN); 11841da177e4SLinus Torvalds } 11851da177e4SLinus Torvalds 11861da177e4SLinus Torvalds static int 1187599e0a22SJ. Bruce Fields same_verf(nfs4_verifier *v1, nfs4_verifier *v2) 1188599e0a22SJ. Bruce Fields { 1189599e0a22SJ. Bruce Fields return 0 == memcmp(v1->data, v2->data, sizeof(v1->data)); 11901da177e4SLinus Torvalds } 11911da177e4SLinus Torvalds 11921da177e4SLinus Torvalds static int 1193599e0a22SJ. Bruce Fields same_clid(clientid_t *cl1, clientid_t *cl2) 1194599e0a22SJ. Bruce Fields { 1195599e0a22SJ. Bruce Fields return (cl1->cl_boot == cl2->cl_boot) && (cl1->cl_id == cl2->cl_id); 11961da177e4SLinus Torvalds } 11971da177e4SLinus Torvalds 11988fbba96eSJ. Bruce Fields static bool groups_equal(struct group_info *g1, struct group_info *g2) 11998fbba96eSJ. Bruce Fields { 12008fbba96eSJ. Bruce Fields int i; 12018fbba96eSJ. Bruce Fields 12028fbba96eSJ. Bruce Fields if (g1->ngroups != g2->ngroups) 12038fbba96eSJ. Bruce Fields return false; 12048fbba96eSJ. Bruce Fields for (i=0; i<g1->ngroups; i++) 12058fbba96eSJ. Bruce Fields if (GROUP_AT(g1, i) != GROUP_AT(g2, i)) 12068fbba96eSJ. Bruce Fields return false; 12078fbba96eSJ. Bruce Fields return true; 12088fbba96eSJ. Bruce Fields } 12098fbba96eSJ. Bruce Fields 121068eb3508SJ. Bruce Fields /* 121168eb3508SJ. Bruce Fields * RFC 3530 language requires clid_inuse be returned when the 121268eb3508SJ. Bruce Fields * "principal" associated with a requests differs from that previously 121368eb3508SJ. Bruce Fields * used. We use uid, gid's, and gss principal string as our best 121468eb3508SJ. Bruce Fields * approximation. We also don't want to allow non-gss use of a client 121568eb3508SJ. Bruce Fields * established using gss: in theory cr_principal should catch that 121668eb3508SJ. Bruce Fields * change, but in practice cr_principal can be null even in the gss case 121768eb3508SJ. Bruce Fields * since gssd doesn't always pass down a principal string. 121868eb3508SJ. Bruce Fields */ 121968eb3508SJ. Bruce Fields static bool is_gss_cred(struct svc_cred *cr) 122068eb3508SJ. Bruce Fields { 122168eb3508SJ. Bruce Fields /* Is cr_flavor one of the gss "pseudoflavors"?: */ 122268eb3508SJ. Bruce Fields return (cr->cr_flavor > RPC_AUTH_MAXFLAVOR); 122368eb3508SJ. Bruce Fields } 122468eb3508SJ. Bruce Fields 122568eb3508SJ. Bruce Fields 12265559b50aSVivek Trivedi static bool 1227599e0a22SJ. Bruce Fields same_creds(struct svc_cred *cr1, struct svc_cred *cr2) 1228599e0a22SJ. Bruce Fields { 122968eb3508SJ. Bruce Fields if ((is_gss_cred(cr1) != is_gss_cred(cr2)) 1230d5497fc6SJ. Bruce Fields || (cr1->cr_uid != cr2->cr_uid) 12318fbba96eSJ. Bruce Fields || (cr1->cr_gid != cr2->cr_gid) 12328fbba96eSJ. Bruce Fields || !groups_equal(cr1->cr_group_info, cr2->cr_group_info)) 12338fbba96eSJ. Bruce Fields return false; 12348fbba96eSJ. Bruce Fields if (cr1->cr_principal == cr2->cr_principal) 12358fbba96eSJ. Bruce Fields return true; 12368fbba96eSJ. Bruce Fields if (!cr1->cr_principal || !cr2->cr_principal) 12378fbba96eSJ. Bruce Fields return false; 12385559b50aSVivek Trivedi return 0 == strcmp(cr1->cr_principal, cr2->cr_principal); 12391da177e4SLinus Torvalds } 12401da177e4SLinus Torvalds 1241c212cecfSStanislav Kinsbursky static void gen_clid(struct nfs4_client *clp, struct nfsd_net *nn) 12425ec7b46cSJ. Bruce Fields { 12435ec7b46cSJ. Bruce Fields static u32 current_clientid = 1; 12445ec7b46cSJ. Bruce Fields 12452c142baaSStanislav Kinsbursky clp->cl_clientid.cl_boot = nn->boot_time; 12461da177e4SLinus Torvalds clp->cl_clientid.cl_id = current_clientid++; 12471da177e4SLinus Torvalds } 12481da177e4SLinus Torvalds 1249deda2faaSJ. Bruce Fields static void gen_confirm(struct nfs4_client *clp) 1250deda2faaSJ. Bruce Fields { 1251ab4684d1SChuck Lever __be32 verf[2]; 1252deda2faaSJ. Bruce Fields static u32 i; 12531da177e4SLinus Torvalds 1254ab4684d1SChuck Lever verf[0] = (__be32)get_seconds(); 1255ab4684d1SChuck Lever verf[1] = (__be32)i++; 1256ab4684d1SChuck Lever memcpy(clp->cl_confirm.data, verf, sizeof(clp->cl_confirm.data)); 12571da177e4SLinus Torvalds } 12581da177e4SLinus Torvalds 125938c2f4b1SJ. Bruce Fields static struct nfs4_stid *find_stateid(struct nfs4_client *cl, stateid_t *t) 12604581d140SJ. Bruce Fields { 126138c2f4b1SJ. Bruce Fields return idr_find(&cl->cl_stateids, t->si_opaque.so_id); 12624581d140SJ. Bruce Fields } 12634d71ab87SJ. Bruce Fields 126438c2f4b1SJ. Bruce Fields static struct nfs4_stid *find_stateid_by_type(struct nfs4_client *cl, stateid_t *t, char typemask) 1265f459e453SJ. Bruce Fields { 1266f459e453SJ. Bruce Fields struct nfs4_stid *s; 1267f459e453SJ. Bruce Fields 126838c2f4b1SJ. Bruce Fields s = find_stateid(cl, t); 1269f459e453SJ. Bruce Fields if (!s) 1270f459e453SJ. Bruce Fields return NULL; 1271f459e453SJ. Bruce Fields if (typemask & s->sc_type) 12724d71ab87SJ. Bruce Fields return s; 12734581d140SJ. Bruce Fields return NULL; 12744581d140SJ. Bruce Fields } 12754581d140SJ. Bruce Fields 12762216d449SJeff Layton static struct nfs4_client *create_client(struct xdr_netobj name, 1277b09333c4SRicardo Labiaga struct svc_rqst *rqstp, nfs4_verifier *verf) 1278b09333c4SRicardo Labiaga { 1279b09333c4SRicardo Labiaga struct nfs4_client *clp; 1280b09333c4SRicardo Labiaga struct sockaddr *sa = svc_addr(rqstp); 128103a4e1f6SJ. Bruce Fields int ret; 1282c212cecfSStanislav Kinsbursky struct net *net = SVC_NET(rqstp); 1283c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 1284b09333c4SRicardo Labiaga 1285b09333c4SRicardo Labiaga clp = alloc_client(name); 1286b09333c4SRicardo Labiaga if (clp == NULL) 1287b09333c4SRicardo Labiaga return NULL; 1288b09333c4SRicardo Labiaga 1289792c95ddSJ. Bruce Fields INIT_LIST_HEAD(&clp->cl_sessions); 129003a4e1f6SJ. Bruce Fields ret = copy_cred(&clp->cl_cred, &rqstp->rq_cred); 129103a4e1f6SJ. Bruce Fields if (ret) { 1292c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 1293b09333c4SRicardo Labiaga free_client(clp); 1294c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1295b09333c4SRicardo Labiaga return NULL; 1296b09333c4SRicardo Labiaga } 129738c2f4b1SJ. Bruce Fields idr_init(&clp->cl_stateids); 129846583e25SBenny Halevy atomic_set(&clp->cl_refcount, 0); 129977a3569dSJ. Bruce Fields clp->cl_cb_state = NFSD4_CB_UNKNOWN; 1300b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_idhash); 1301b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_openowners); 1302b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_delegations); 1303b09333c4SRicardo Labiaga INIT_LIST_HEAD(&clp->cl_lru); 13045ce8ba25SJ. Bruce Fields INIT_LIST_HEAD(&clp->cl_callbacks); 13056ff8da08SJ. Bruce Fields spin_lock_init(&clp->cl_lock); 130657725155SJ. Bruce Fields nfsd4_init_callback(&clp->cl_cb_null); 130707cd4909SBenny Halevy clp->cl_time = get_seconds(); 1308b09333c4SRicardo Labiaga clear_bit(0, &clp->cl_cb_slot_busy); 1309b09333c4SRicardo Labiaga rpc_init_wait_queue(&clp->cl_cb_waitq, "Backchannel slot table"); 1310b09333c4SRicardo Labiaga copy_verf(clp, verf); 1311b09333c4SRicardo Labiaga rpc_copy_addr((struct sockaddr *) &clp->cl_addr, sa); 1312b09333c4SRicardo Labiaga gen_confirm(clp); 1313edd76786SJ. Bruce Fields clp->cl_cb_session = NULL; 1314c212cecfSStanislav Kinsbursky clp->net = net; 1315b09333c4SRicardo Labiaga return clp; 1316b09333c4SRicardo Labiaga } 1317b09333c4SRicardo Labiaga 1318fd39ca9aSNeilBrown static void 1319ac55fdc4SJeff Layton add_clp_to_name_tree(struct nfs4_client *new_clp, struct rb_root *root) 1320ac55fdc4SJeff Layton { 1321ac55fdc4SJeff Layton struct rb_node **new = &(root->rb_node), *parent = NULL; 1322ac55fdc4SJeff Layton struct nfs4_client *clp; 1323ac55fdc4SJeff Layton 1324ac55fdc4SJeff Layton while (*new) { 1325ac55fdc4SJeff Layton clp = rb_entry(*new, struct nfs4_client, cl_namenode); 1326ac55fdc4SJeff Layton parent = *new; 1327ac55fdc4SJeff Layton 1328ac55fdc4SJeff Layton if (compare_blob(&clp->cl_name, &new_clp->cl_name) > 0) 1329ac55fdc4SJeff Layton new = &((*new)->rb_left); 1330ac55fdc4SJeff Layton else 1331ac55fdc4SJeff Layton new = &((*new)->rb_right); 1332ac55fdc4SJeff Layton } 1333ac55fdc4SJeff Layton 1334ac55fdc4SJeff Layton rb_link_node(&new_clp->cl_namenode, parent, new); 1335ac55fdc4SJeff Layton rb_insert_color(&new_clp->cl_namenode, root); 1336ac55fdc4SJeff Layton } 1337ac55fdc4SJeff Layton 1338ac55fdc4SJeff Layton static struct nfs4_client * 1339ac55fdc4SJeff Layton find_clp_in_name_tree(struct xdr_netobj *name, struct rb_root *root) 1340ac55fdc4SJeff Layton { 1341ac55fdc4SJeff Layton long long cmp; 1342ac55fdc4SJeff Layton struct rb_node *node = root->rb_node; 1343ac55fdc4SJeff Layton struct nfs4_client *clp; 1344ac55fdc4SJeff Layton 1345ac55fdc4SJeff Layton while (node) { 1346ac55fdc4SJeff Layton clp = rb_entry(node, struct nfs4_client, cl_namenode); 1347ac55fdc4SJeff Layton cmp = compare_blob(&clp->cl_name, name); 1348ac55fdc4SJeff Layton if (cmp > 0) 1349ac55fdc4SJeff Layton node = node->rb_left; 1350ac55fdc4SJeff Layton else if (cmp < 0) 1351ac55fdc4SJeff Layton node = node->rb_right; 1352ac55fdc4SJeff Layton else 1353ac55fdc4SJeff Layton return clp; 1354ac55fdc4SJeff Layton } 1355ac55fdc4SJeff Layton return NULL; 1356ac55fdc4SJeff Layton } 1357ac55fdc4SJeff Layton 1358ac55fdc4SJeff Layton static void 1359ac55fdc4SJeff Layton add_to_unconfirmed(struct nfs4_client *clp) 13601da177e4SLinus Torvalds { 13611da177e4SLinus Torvalds unsigned int idhashval; 13620a7ec377SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 13631da177e4SLinus Torvalds 1364ac55fdc4SJeff Layton clear_bit(NFSD4_CLIENT_CONFIRMED, &clp->cl_flags); 1365a99454aaSStanislav Kinsbursky add_clp_to_name_tree(clp, &nn->unconf_name_tree); 13661da177e4SLinus Torvalds idhashval = clientid_hashval(clp->cl_clientid.cl_id); 13670a7ec377SStanislav Kinsbursky list_add(&clp->cl_idhash, &nn->unconf_id_hashtbl[idhashval]); 136836acb66bSBenny Halevy renew_client(clp); 13691da177e4SLinus Torvalds } 13701da177e4SLinus Torvalds 1371fd39ca9aSNeilBrown static void 13721da177e4SLinus Torvalds move_to_confirmed(struct nfs4_client *clp) 13731da177e4SLinus Torvalds { 13741da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clp->cl_clientid.cl_id); 13758daae4dcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 13761da177e4SLinus Torvalds 13771da177e4SLinus Torvalds dprintk("NFSD: move_to_confirm nfs4_client %p\n", clp); 13788daae4dcSStanislav Kinsbursky list_move(&clp->cl_idhash, &nn->conf_id_hashtbl[idhashval]); 1379a99454aaSStanislav Kinsbursky rb_erase(&clp->cl_namenode, &nn->unconf_name_tree); 1380382a62e7SStanislav Kinsbursky add_clp_to_name_tree(clp, &nn->conf_name_tree); 1381ac55fdc4SJeff Layton set_bit(NFSD4_CLIENT_CONFIRMED, &clp->cl_flags); 13821da177e4SLinus Torvalds renew_client(clp); 13831da177e4SLinus Torvalds } 13841da177e4SLinus Torvalds 13851da177e4SLinus Torvalds static struct nfs4_client * 13868daae4dcSStanislav Kinsbursky find_confirmed_client(clientid_t *clid, bool sessions, struct nfsd_net *nn) 13871da177e4SLinus Torvalds { 13881da177e4SLinus Torvalds struct nfs4_client *clp; 13891da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clid->cl_id); 13901da177e4SLinus Torvalds 13918daae4dcSStanislav Kinsbursky list_for_each_entry(clp, &nn->conf_id_hashtbl[idhashval], cl_idhash) { 1392a50d2ad1SJ. Bruce Fields if (same_clid(&clp->cl_clientid, clid)) { 1393d15c077eSJ. Bruce Fields if ((bool)clp->cl_minorversion != sessions) 1394d15c077eSJ. Bruce Fields return NULL; 1395a50d2ad1SJ. Bruce Fields renew_client(clp); 13961da177e4SLinus Torvalds return clp; 13971da177e4SLinus Torvalds } 1398a50d2ad1SJ. Bruce Fields } 13991da177e4SLinus Torvalds return NULL; 14001da177e4SLinus Torvalds } 14011da177e4SLinus Torvalds 14021da177e4SLinus Torvalds static struct nfs4_client * 14030a7ec377SStanislav Kinsbursky find_unconfirmed_client(clientid_t *clid, bool sessions, struct nfsd_net *nn) 14041da177e4SLinus Torvalds { 14051da177e4SLinus Torvalds struct nfs4_client *clp; 14061da177e4SLinus Torvalds unsigned int idhashval = clientid_hashval(clid->cl_id); 14071da177e4SLinus Torvalds 14080a7ec377SStanislav Kinsbursky list_for_each_entry(clp, &nn->unconf_id_hashtbl[idhashval], cl_idhash) { 1409d15c077eSJ. Bruce Fields if (same_clid(&clp->cl_clientid, clid)) { 1410d15c077eSJ. Bruce Fields if ((bool)clp->cl_minorversion != sessions) 1411d15c077eSJ. Bruce Fields return NULL; 14121da177e4SLinus Torvalds return clp; 14131da177e4SLinus Torvalds } 1414d15c077eSJ. Bruce Fields } 14151da177e4SLinus Torvalds return NULL; 14161da177e4SLinus Torvalds } 14171da177e4SLinus Torvalds 14186e5f15c9SJ. Bruce Fields static bool clp_used_exchangeid(struct nfs4_client *clp) 1419a1bcecd2SAndy Adamson { 14206e5f15c9SJ. Bruce Fields return clp->cl_exchange_flags != 0; 1421a1bcecd2SAndy Adamson } 1422a1bcecd2SAndy Adamson 142328ce6054SNeilBrown static struct nfs4_client * 1424382a62e7SStanislav Kinsbursky find_confirmed_client_by_name(struct xdr_netobj *name, struct nfsd_net *nn) 142528ce6054SNeilBrown { 1426382a62e7SStanislav Kinsbursky return find_clp_in_name_tree(name, &nn->conf_name_tree); 142728ce6054SNeilBrown } 142828ce6054SNeilBrown 142928ce6054SNeilBrown static struct nfs4_client * 1430a99454aaSStanislav Kinsbursky find_unconfirmed_client_by_name(struct xdr_netobj *name, struct nfsd_net *nn) 143128ce6054SNeilBrown { 1432a99454aaSStanislav Kinsbursky return find_clp_in_name_tree(name, &nn->unconf_name_tree); 143328ce6054SNeilBrown } 143428ce6054SNeilBrown 1435fd39ca9aSNeilBrown static void 14366f3d772fSTakuma Umeya gen_callback(struct nfs4_client *clp, struct nfsd4_setclientid *se, struct svc_rqst *rqstp) 14371da177e4SLinus Torvalds { 143807263f1eSJ. Bruce Fields struct nfs4_cb_conn *conn = &clp->cl_cb_conn; 14396f3d772fSTakuma Umeya struct sockaddr *sa = svc_addr(rqstp); 14406f3d772fSTakuma Umeya u32 scopeid = rpc_get_scope_id(sa); 14417077ecbaSJeff Layton unsigned short expected_family; 14421da177e4SLinus Torvalds 14437077ecbaSJeff Layton /* Currently, we only support tcp and tcp6 for the callback channel */ 14447077ecbaSJeff Layton if (se->se_callback_netid_len == 3 && 14457077ecbaSJeff Layton !memcmp(se->se_callback_netid_val, "tcp", 3)) 14467077ecbaSJeff Layton expected_family = AF_INET; 14477077ecbaSJeff Layton else if (se->se_callback_netid_len == 4 && 14487077ecbaSJeff Layton !memcmp(se->se_callback_netid_val, "tcp6", 4)) 14497077ecbaSJeff Layton expected_family = AF_INET6; 14507077ecbaSJeff Layton else 14511da177e4SLinus Torvalds goto out_err; 14521da177e4SLinus Torvalds 1453c212cecfSStanislav Kinsbursky conn->cb_addrlen = rpc_uaddr2sockaddr(clp->net, se->se_callback_addr_val, 1454aa9a4ec7SJeff Layton se->se_callback_addr_len, 145507263f1eSJ. Bruce Fields (struct sockaddr *)&conn->cb_addr, 145607263f1eSJ. Bruce Fields sizeof(conn->cb_addr)); 1457aa9a4ec7SJeff Layton 145807263f1eSJ. Bruce Fields if (!conn->cb_addrlen || conn->cb_addr.ss_family != expected_family) 14591da177e4SLinus Torvalds goto out_err; 1460aa9a4ec7SJeff Layton 146107263f1eSJ. Bruce Fields if (conn->cb_addr.ss_family == AF_INET6) 146207263f1eSJ. Bruce Fields ((struct sockaddr_in6 *)&conn->cb_addr)->sin6_scope_id = scopeid; 1463fbf4665fSJeff Layton 146407263f1eSJ. Bruce Fields conn->cb_prog = se->se_callback_prog; 146507263f1eSJ. Bruce Fields conn->cb_ident = se->se_callback_ident; 1466849a1cf1SMi Jinlong memcpy(&conn->cb_saddr, &rqstp->rq_daddr, rqstp->rq_daddrlen); 14671da177e4SLinus Torvalds return; 14681da177e4SLinus Torvalds out_err: 146907263f1eSJ. Bruce Fields conn->cb_addr.ss_family = AF_UNSPEC; 147007263f1eSJ. Bruce Fields conn->cb_addrlen = 0; 1471849823c5SNeil Brown dprintk(KERN_INFO "NFSD: this client (clientid %08x/%08x) " 14721da177e4SLinus Torvalds "will not receive delegations\n", 14731da177e4SLinus Torvalds clp->cl_clientid.cl_boot, clp->cl_clientid.cl_id); 14741da177e4SLinus Torvalds 14751da177e4SLinus Torvalds return; 14761da177e4SLinus Torvalds } 14771da177e4SLinus Torvalds 1478074fe897SAndy Adamson /* 1479557ce264SAndy Adamson * Cache a reply. nfsd4_check_drc_limit() has bounded the cache size. 1480074fe897SAndy Adamson */ 1481074fe897SAndy Adamson void 1482074fe897SAndy Adamson nfsd4_store_cache_entry(struct nfsd4_compoundres *resp) 1483074fe897SAndy Adamson { 1484557ce264SAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1485557ce264SAndy Adamson unsigned int base; 1486074fe897SAndy Adamson 1487557ce264SAndy Adamson dprintk("--> %s slot %p\n", __func__, slot); 1488074fe897SAndy Adamson 1489557ce264SAndy Adamson slot->sl_opcnt = resp->opcnt; 1490557ce264SAndy Adamson slot->sl_status = resp->cstate.status; 1491bf864a31SAndy Adamson 1492bf5c43c8SJ. Bruce Fields slot->sl_flags |= NFSD4_SLOT_INITIALIZED; 1493bf864a31SAndy Adamson if (nfsd4_not_cached(resp)) { 1494557ce264SAndy Adamson slot->sl_datalen = 0; 1495bf864a31SAndy Adamson return; 1496bf864a31SAndy Adamson } 1497557ce264SAndy Adamson slot->sl_datalen = (char *)resp->p - (char *)resp->cstate.datap; 1498557ce264SAndy Adamson base = (char *)resp->cstate.datap - 1499557ce264SAndy Adamson (char *)resp->xbuf->head[0].iov_base; 1500557ce264SAndy Adamson if (read_bytes_from_xdr_buf(resp->xbuf, base, slot->sl_data, 1501557ce264SAndy Adamson slot->sl_datalen)) 1502557ce264SAndy Adamson WARN("%s: sessions DRC could not cache compound\n", __func__); 1503557ce264SAndy Adamson return; 1504074fe897SAndy Adamson } 1505074fe897SAndy Adamson 1506074fe897SAndy Adamson /* 1507abfabf8cSAndy Adamson * Encode the replay sequence operation from the slot values. 1508abfabf8cSAndy Adamson * If cachethis is FALSE encode the uncached rep error on the next 1509abfabf8cSAndy Adamson * operation which sets resp->p and increments resp->opcnt for 1510abfabf8cSAndy Adamson * nfs4svc_encode_compoundres. 1511abfabf8cSAndy Adamson * 1512074fe897SAndy Adamson */ 1513abfabf8cSAndy Adamson static __be32 1514abfabf8cSAndy Adamson nfsd4_enc_sequence_replay(struct nfsd4_compoundargs *args, 1515abfabf8cSAndy Adamson struct nfsd4_compoundres *resp) 1516074fe897SAndy Adamson { 1517abfabf8cSAndy Adamson struct nfsd4_op *op; 1518abfabf8cSAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1519074fe897SAndy Adamson 1520abfabf8cSAndy Adamson /* Encode the replayed sequence operation */ 1521abfabf8cSAndy Adamson op = &args->ops[resp->opcnt - 1]; 1522abfabf8cSAndy Adamson nfsd4_encode_operation(resp, op); 1523abfabf8cSAndy Adamson 1524abfabf8cSAndy Adamson /* Return nfserr_retry_uncached_rep in next operation. */ 152573e79482SJ. Bruce Fields if (args->opcnt > 1 && !(slot->sl_flags & NFSD4_SLOT_CACHETHIS)) { 1526abfabf8cSAndy Adamson op = &args->ops[resp->opcnt++]; 1527abfabf8cSAndy Adamson op->status = nfserr_retry_uncached_rep; 1528abfabf8cSAndy Adamson nfsd4_encode_operation(resp, op); 1529074fe897SAndy Adamson } 1530abfabf8cSAndy Adamson return op->status; 1531074fe897SAndy Adamson } 1532074fe897SAndy Adamson 1533074fe897SAndy Adamson /* 1534557ce264SAndy Adamson * The sequence operation is not cached because we can use the slot and 1535557ce264SAndy Adamson * session values. 1536074fe897SAndy Adamson */ 1537074fe897SAndy Adamson __be32 1538bf864a31SAndy Adamson nfsd4_replay_cache_entry(struct nfsd4_compoundres *resp, 1539bf864a31SAndy Adamson struct nfsd4_sequence *seq) 1540074fe897SAndy Adamson { 1541557ce264SAndy Adamson struct nfsd4_slot *slot = resp->cstate.slot; 1542074fe897SAndy Adamson __be32 status; 1543074fe897SAndy Adamson 1544557ce264SAndy Adamson dprintk("--> %s slot %p\n", __func__, slot); 1545074fe897SAndy Adamson 1546abfabf8cSAndy Adamson /* Either returns 0 or nfserr_retry_uncached */ 1547abfabf8cSAndy Adamson status = nfsd4_enc_sequence_replay(resp->rqstp->rq_argp, resp); 1548abfabf8cSAndy Adamson if (status == nfserr_retry_uncached_rep) 1549abfabf8cSAndy Adamson return status; 1550074fe897SAndy Adamson 1551557ce264SAndy Adamson /* The sequence operation has been encoded, cstate->datap set. */ 1552557ce264SAndy Adamson memcpy(resp->cstate.datap, slot->sl_data, slot->sl_datalen); 1553074fe897SAndy Adamson 1554557ce264SAndy Adamson resp->opcnt = slot->sl_opcnt; 1555557ce264SAndy Adamson resp->p = resp->cstate.datap + XDR_QUADLEN(slot->sl_datalen); 1556557ce264SAndy Adamson status = slot->sl_status; 1557074fe897SAndy Adamson 1558074fe897SAndy Adamson return status; 1559074fe897SAndy Adamson } 1560074fe897SAndy Adamson 15610733d213SAndy Adamson /* 15620733d213SAndy Adamson * Set the exchange_id flags returned by the server. 15630733d213SAndy Adamson */ 15640733d213SAndy Adamson static void 15650733d213SAndy Adamson nfsd4_set_ex_flags(struct nfs4_client *new, struct nfsd4_exchange_id *clid) 15660733d213SAndy Adamson { 15670733d213SAndy Adamson /* pNFS is not supported */ 15680733d213SAndy Adamson new->cl_exchange_flags |= EXCHGID4_FLAG_USE_NON_PNFS; 15690733d213SAndy Adamson 15700733d213SAndy Adamson /* Referrals are supported, Migration is not. */ 15710733d213SAndy Adamson new->cl_exchange_flags |= EXCHGID4_FLAG_SUPP_MOVED_REFER; 15720733d213SAndy Adamson 15730733d213SAndy Adamson /* set the wire flags to return to client. */ 15740733d213SAndy Adamson clid->flags = new->cl_exchange_flags; 15750733d213SAndy Adamson } 15760733d213SAndy Adamson 1577631fc9eaSJ. Bruce Fields static bool client_has_state(struct nfs4_client *clp) 1578631fc9eaSJ. Bruce Fields { 1579631fc9eaSJ. Bruce Fields /* 1580631fc9eaSJ. Bruce Fields * Note clp->cl_openowners check isn't quite right: there's no 1581631fc9eaSJ. Bruce Fields * need to count owners without stateid's. 1582631fc9eaSJ. Bruce Fields * 1583631fc9eaSJ. Bruce Fields * Also note we should probably be using this in 4.0 case too. 1584631fc9eaSJ. Bruce Fields */ 15856eccece9SJ. Bruce Fields return !list_empty(&clp->cl_openowners) 15866eccece9SJ. Bruce Fields || !list_empty(&clp->cl_delegations) 15876eccece9SJ. Bruce Fields || !list_empty(&clp->cl_sessions); 1588631fc9eaSJ. Bruce Fields } 1589631fc9eaSJ. Bruce Fields 1590b37ad28bSAl Viro __be32 1591069b6ad4SAndy Adamson nfsd4_exchange_id(struct svc_rqst *rqstp, 1592069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1593069b6ad4SAndy Adamson struct nfsd4_exchange_id *exid) 1594069b6ad4SAndy Adamson { 15950733d213SAndy Adamson struct nfs4_client *unconf, *conf, *new; 159657b7b43bSJ. Bruce Fields __be32 status; 1597363168b4SJeff Layton char addr_str[INET6_ADDRSTRLEN]; 15980733d213SAndy Adamson nfs4_verifier verf = exid->verifier; 1599363168b4SJeff Layton struct sockaddr *sa = svc_addr(rqstp); 160083e08fd4SJ. Bruce Fields bool update = exid->flags & EXCHGID4_FLAG_UPD_CONFIRMED_REC_A; 1601c212cecfSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 16020733d213SAndy Adamson 1603363168b4SJeff Layton rpc_ntop(sa, addr_str, sizeof(addr_str)); 16040733d213SAndy Adamson dprintk("%s rqstp=%p exid=%p clname.len=%u clname.data=%p " 1605363168b4SJeff Layton "ip_addr=%s flags %x, spa_how %d\n", 16060733d213SAndy Adamson __func__, rqstp, exid, exid->clname.len, exid->clname.data, 1607363168b4SJeff Layton addr_str, exid->flags, exid->spa_how); 16080733d213SAndy Adamson 1609a084daf5SJ. Bruce Fields if (exid->flags & ~EXCHGID4_FLAG_MASK_A) 16100733d213SAndy Adamson return nfserr_inval; 16110733d213SAndy Adamson 16120733d213SAndy Adamson /* Currently only support SP4_NONE */ 16130733d213SAndy Adamson switch (exid->spa_how) { 16140733d213SAndy Adamson case SP4_NONE: 16150733d213SAndy Adamson break; 1616063b0fb9SJ. Bruce Fields default: /* checked by xdr code */ 1617063b0fb9SJ. Bruce Fields WARN_ON_ONCE(1); 16180733d213SAndy Adamson case SP4_SSV: 16190733d213SAndy Adamson case SP4_MACH_CRED: 16200733d213SAndy Adamson return nfserr_serverfault; /* no excuse :-/ */ 16210733d213SAndy Adamson } 16220733d213SAndy Adamson 16232dbb269dSJ. Bruce Fields /* Cases below refer to rfc 5661 section 18.35.4: */ 16240733d213SAndy Adamson nfs4_lock_state(); 1625382a62e7SStanislav Kinsbursky conf = find_confirmed_client_by_name(&exid->clname, nn); 16260733d213SAndy Adamson if (conf) { 162783e08fd4SJ. Bruce Fields bool creds_match = same_creds(&conf->cl_cred, &rqstp->rq_cred); 162883e08fd4SJ. Bruce Fields bool verfs_match = same_verf(&verf, &conf->cl_verifier); 162983e08fd4SJ. Bruce Fields 1630136e658dSJ. Bruce Fields if (update) { 1631136e658dSJ. Bruce Fields if (!clp_used_exchangeid(conf)) { /* buggy client */ 16322dbb269dSJ. Bruce Fields status = nfserr_inval; 1633e203d506SJ. Bruce Fields goto out; 1634e203d506SJ. Bruce Fields } 16352dbb269dSJ. Bruce Fields if (!creds_match) { /* case 9 */ 16360733d213SAndy Adamson status = nfserr_perm; 16370733d213SAndy Adamson goto out; 16380733d213SAndy Adamson } 16392dbb269dSJ. Bruce Fields if (!verfs_match) { /* case 8 */ 16400733d213SAndy Adamson status = nfserr_not_same; 16410733d213SAndy Adamson goto out; 16420733d213SAndy Adamson } 1643136e658dSJ. Bruce Fields /* case 6 */ 16440733d213SAndy Adamson exid->flags |= EXCHGID4_FLAG_CONFIRMED_R; 16450733d213SAndy Adamson new = conf; 16460733d213SAndy Adamson goto out_copy; 16476ddbbbfeSMike Sager } 1648136e658dSJ. Bruce Fields if (!creds_match) { /* case 3 */ 1649631fc9eaSJ. Bruce Fields if (client_has_state(conf)) { 1650136e658dSJ. Bruce Fields status = nfserr_clid_inuse; 1651136e658dSJ. Bruce Fields goto out; 1652136e658dSJ. Bruce Fields } 1653b9831b59SJ. Bruce Fields expire_client(conf); 1654b9831b59SJ. Bruce Fields goto out_new; 1655631fc9eaSJ. Bruce Fields } 1656136e658dSJ. Bruce Fields if (verfs_match) { /* case 2 */ 16570f1ba0efSJ. Bruce Fields conf->cl_exchange_flags |= EXCHGID4_FLAG_CONFIRMED_R; 1658136e658dSJ. Bruce Fields new = conf; 1659136e658dSJ. Bruce Fields goto out_copy; 1660136e658dSJ. Bruce Fields } 16612dbb269dSJ. Bruce Fields /* case 5, client reboot */ 16620733d213SAndy Adamson goto out_new; 16630733d213SAndy Adamson } 16646ddbbbfeSMike Sager 16652dbb269dSJ. Bruce Fields if (update) { /* case 7 */ 16660733d213SAndy Adamson status = nfserr_noent; 16670733d213SAndy Adamson goto out; 16680733d213SAndy Adamson } 16690733d213SAndy Adamson 1670a99454aaSStanislav Kinsbursky unconf = find_unconfirmed_client_by_name(&exid->clname, nn); 16712dbb269dSJ. Bruce Fields if (unconf) /* case 4, possible retry or client restart */ 16720733d213SAndy Adamson expire_client(unconf); 16730733d213SAndy Adamson 16742dbb269dSJ. Bruce Fields /* case 1 (normal case) */ 16750733d213SAndy Adamson out_new: 16762216d449SJeff Layton new = create_client(exid->clname, rqstp, &verf); 16770733d213SAndy Adamson if (new == NULL) { 16784731030dSJ. Bruce Fields status = nfserr_jukebox; 16790733d213SAndy Adamson goto out; 16800733d213SAndy Adamson } 1681c116a0afSJ. Bruce Fields new->cl_minorversion = 1; 16820733d213SAndy Adamson 1683c212cecfSStanislav Kinsbursky gen_clid(new, nn); 1684ac55fdc4SJeff Layton add_to_unconfirmed(new); 16850733d213SAndy Adamson out_copy: 16860733d213SAndy Adamson exid->clientid.cl_boot = new->cl_clientid.cl_boot; 16870733d213SAndy Adamson exid->clientid.cl_id = new->cl_clientid.cl_id; 16880733d213SAndy Adamson 1689778df3f0SJ. Bruce Fields exid->seqid = new->cl_cs_slot.sl_seqid + 1; 16900733d213SAndy Adamson nfsd4_set_ex_flags(new, exid); 16910733d213SAndy Adamson 16920733d213SAndy Adamson dprintk("nfsd4_exchange_id seqid %d flags %x\n", 169349557cc7SAndy Adamson new->cl_cs_slot.sl_seqid, new->cl_exchange_flags); 16940733d213SAndy Adamson status = nfs_ok; 16950733d213SAndy Adamson 16960733d213SAndy Adamson out: 16970733d213SAndy Adamson nfs4_unlock_state(); 16980733d213SAndy Adamson return status; 1699069b6ad4SAndy Adamson } 1700069b6ad4SAndy Adamson 170157b7b43bSJ. Bruce Fields static __be32 170288e588d5SAndy Adamson check_slot_seqid(u32 seqid, u32 slot_seqid, int slot_inuse) 1703b85d4c01SBenny Halevy { 170488e588d5SAndy Adamson dprintk("%s enter. seqid %d slot_seqid %d\n", __func__, seqid, 170588e588d5SAndy Adamson slot_seqid); 1706b85d4c01SBenny Halevy 1707b85d4c01SBenny Halevy /* The slot is in use, and no response has been sent. */ 170888e588d5SAndy Adamson if (slot_inuse) { 170988e588d5SAndy Adamson if (seqid == slot_seqid) 1710b85d4c01SBenny Halevy return nfserr_jukebox; 1711b85d4c01SBenny Halevy else 1712b85d4c01SBenny Halevy return nfserr_seq_misordered; 1713b85d4c01SBenny Halevy } 1714f6d82485SJ. Bruce Fields /* Note unsigned 32-bit arithmetic handles wraparound: */ 171588e588d5SAndy Adamson if (likely(seqid == slot_seqid + 1)) 1716b85d4c01SBenny Halevy return nfs_ok; 171788e588d5SAndy Adamson if (seqid == slot_seqid) 1718b85d4c01SBenny Halevy return nfserr_replay_cache; 1719b85d4c01SBenny Halevy return nfserr_seq_misordered; 1720b85d4c01SBenny Halevy } 1721b85d4c01SBenny Halevy 172249557cc7SAndy Adamson /* 172349557cc7SAndy Adamson * Cache the create session result into the create session single DRC 172449557cc7SAndy Adamson * slot cache by saving the xdr structure. sl_seqid has been set. 172549557cc7SAndy Adamson * Do this for solo or embedded create session operations. 172649557cc7SAndy Adamson */ 172749557cc7SAndy Adamson static void 172849557cc7SAndy Adamson nfsd4_cache_create_session(struct nfsd4_create_session *cr_ses, 172957b7b43bSJ. Bruce Fields struct nfsd4_clid_slot *slot, __be32 nfserr) 173049557cc7SAndy Adamson { 173149557cc7SAndy Adamson slot->sl_status = nfserr; 173249557cc7SAndy Adamson memcpy(&slot->sl_cr_ses, cr_ses, sizeof(*cr_ses)); 173349557cc7SAndy Adamson } 173449557cc7SAndy Adamson 173549557cc7SAndy Adamson static __be32 173649557cc7SAndy Adamson nfsd4_replay_create_session(struct nfsd4_create_session *cr_ses, 173749557cc7SAndy Adamson struct nfsd4_clid_slot *slot) 173849557cc7SAndy Adamson { 173949557cc7SAndy Adamson memcpy(cr_ses, &slot->sl_cr_ses, sizeof(*cr_ses)); 174049557cc7SAndy Adamson return slot->sl_status; 174149557cc7SAndy Adamson } 174249557cc7SAndy Adamson 17431b74c25bSMi Jinlong #define NFSD_MIN_REQ_HDR_SEQ_SZ ((\ 17441b74c25bSMi Jinlong 2 * 2 + /* credential,verifier: AUTH_NULL, length 0 */ \ 17451b74c25bSMi Jinlong 1 + /* MIN tag is length with zero, only length */ \ 17461b74c25bSMi Jinlong 3 + /* version, opcount, opcode */ \ 17471b74c25bSMi Jinlong XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + \ 17481b74c25bSMi Jinlong /* seqid, slotID, slotID, cache */ \ 17491b74c25bSMi Jinlong 4 ) * sizeof(__be32)) 17501b74c25bSMi Jinlong 17511b74c25bSMi Jinlong #define NFSD_MIN_RESP_HDR_SEQ_SZ ((\ 17521b74c25bSMi Jinlong 2 + /* verifier: AUTH_NULL, length 0 */\ 17531b74c25bSMi Jinlong 1 + /* status */ \ 17541b74c25bSMi Jinlong 1 + /* MIN tag is length with zero, only length */ \ 17551b74c25bSMi Jinlong 3 + /* opcount, opcode, opstatus*/ \ 17561b74c25bSMi Jinlong XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + \ 17571b74c25bSMi Jinlong /* seqid, slotID, slotID, slotID, status */ \ 17581b74c25bSMi Jinlong 5 ) * sizeof(__be32)) 17591b74c25bSMi Jinlong 176057b7b43bSJ. Bruce Fields static bool check_forechannel_attrs(struct nfsd4_channel_attrs fchannel) 17611b74c25bSMi Jinlong { 17621b74c25bSMi Jinlong return fchannel.maxreq_sz < NFSD_MIN_REQ_HDR_SEQ_SZ 17631b74c25bSMi Jinlong || fchannel.maxresp_sz < NFSD_MIN_RESP_HDR_SEQ_SZ; 17641b74c25bSMi Jinlong } 17651b74c25bSMi Jinlong 1766069b6ad4SAndy Adamson __be32 1767069b6ad4SAndy Adamson nfsd4_create_session(struct svc_rqst *rqstp, 1768069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1769069b6ad4SAndy Adamson struct nfsd4_create_session *cr_ses) 1770069b6ad4SAndy Adamson { 1771363168b4SJeff Layton struct sockaddr *sa = svc_addr(rqstp); 1772ec6b5d7bSAndy Adamson struct nfs4_client *conf, *unconf; 1773ac7c46f2SJ. Bruce Fields struct nfsd4_session *new; 177481f0b2a4SJ. Bruce Fields struct nfsd4_conn *conn; 177549557cc7SAndy Adamson struct nfsd4_clid_slot *cs_slot = NULL; 177657b7b43bSJ. Bruce Fields __be32 status = 0; 17778daae4dcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 1778ec6b5d7bSAndy Adamson 1779a62573dcSMi Jinlong if (cr_ses->flags & ~SESSION4_FLAG_MASK_A) 1780a62573dcSMi Jinlong return nfserr_inval; 178149730501SJ. Bruce Fields if (check_forechannel_attrs(cr_ses->fore_channel)) 178249730501SJ. Bruce Fields return nfserr_toosmall; 17839dd9845fSStanislav Kinsbursky new = alloc_session(&cr_ses->fore_channel, nn); 178481f0b2a4SJ. Bruce Fields if (!new) 178581f0b2a4SJ. Bruce Fields return nfserr_jukebox; 178681f0b2a4SJ. Bruce Fields status = nfserr_jukebox; 178781f0b2a4SJ. Bruce Fields conn = alloc_conn_from_crses(rqstp, cr_ses); 178881f0b2a4SJ. Bruce Fields if (!conn) 178981f0b2a4SJ. Bruce Fields goto out_free_session; 1790a62573dcSMi Jinlong 1791ec6b5d7bSAndy Adamson nfs4_lock_state(); 17920a7ec377SStanislav Kinsbursky unconf = find_unconfirmed_client(&cr_ses->clientid, true, nn); 17938daae4dcSStanislav Kinsbursky conf = find_confirmed_client(&cr_ses->clientid, true, nn); 1794ec6b5d7bSAndy Adamson 1795ec6b5d7bSAndy Adamson if (conf) { 179649557cc7SAndy Adamson cs_slot = &conf->cl_cs_slot; 179749557cc7SAndy Adamson status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); 179838eb76a5SAndy Adamson if (status == nfserr_replay_cache) { 179949557cc7SAndy Adamson status = nfsd4_replay_create_session(cr_ses, cs_slot); 180081f0b2a4SJ. Bruce Fields goto out_free_conn; 180149557cc7SAndy Adamson } else if (cr_ses->seqid != cs_slot->sl_seqid + 1) { 1802ec6b5d7bSAndy Adamson status = nfserr_seq_misordered; 180381f0b2a4SJ. Bruce Fields goto out_free_conn; 1804ec6b5d7bSAndy Adamson } 1805ec6b5d7bSAndy Adamson } else if (unconf) { 18068f9d3d3bSJ. Bruce Fields struct nfs4_client *old; 1807ec6b5d7bSAndy Adamson if (!same_creds(&unconf->cl_cred, &rqstp->rq_cred) || 1808363168b4SJeff Layton !rpc_cmp_addr(sa, (struct sockaddr *) &unconf->cl_addr)) { 1809ec6b5d7bSAndy Adamson status = nfserr_clid_inuse; 181081f0b2a4SJ. Bruce Fields goto out_free_conn; 1811ec6b5d7bSAndy Adamson } 181249557cc7SAndy Adamson cs_slot = &unconf->cl_cs_slot; 181349557cc7SAndy Adamson status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); 181438eb76a5SAndy Adamson if (status) { 181538eb76a5SAndy Adamson /* an unconfirmed replay returns misordered */ 1816ec6b5d7bSAndy Adamson status = nfserr_seq_misordered; 181781f0b2a4SJ. Bruce Fields goto out_free_conn; 1818ec6b5d7bSAndy Adamson } 1819382a62e7SStanislav Kinsbursky old = find_confirmed_client_by_name(&unconf->cl_name, nn); 18208f9d3d3bSJ. Bruce Fields if (old) 18218f9d3d3bSJ. Bruce Fields expire_client(old); 18228f9d3d3bSJ. Bruce Fields move_to_confirmed(unconf); 1823ec6b5d7bSAndy Adamson conf = unconf; 1824ec6b5d7bSAndy Adamson } else { 1825ec6b5d7bSAndy Adamson status = nfserr_stale_clientid; 182681f0b2a4SJ. Bruce Fields goto out_free_conn; 1827ec6b5d7bSAndy Adamson } 182881f0b2a4SJ. Bruce Fields status = nfs_ok; 18298323c3b2SJ. Bruce Fields /* 1830408b79bcSJ. Bruce Fields * We do not support RDMA or persistent sessions 1831408b79bcSJ. Bruce Fields */ 1832408b79bcSJ. Bruce Fields cr_ses->flags &= ~SESSION4_PERSIST; 1833408b79bcSJ. Bruce Fields cr_ses->flags &= ~SESSION4_RDMA; 1834408b79bcSJ. Bruce Fields 183581f0b2a4SJ. Bruce Fields init_session(rqstp, new, conf, cr_ses); 183681f0b2a4SJ. Bruce Fields nfsd4_init_conn(rqstp, conn, new); 183781f0b2a4SJ. Bruce Fields 1838ac7c46f2SJ. Bruce Fields memcpy(cr_ses->sessionid.data, new->se_sessionid.data, 1839ec6b5d7bSAndy Adamson NFS4_MAX_SESSIONID_LEN); 184012050657SMi Jinlong memcpy(&cr_ses->fore_channel, &new->se_fchannel, 184112050657SMi Jinlong sizeof(struct nfsd4_channel_attrs)); 184286c3e16cSJ. Bruce Fields cs_slot->sl_seqid++; 184349557cc7SAndy Adamson cr_ses->seqid = cs_slot->sl_seqid; 1844ec6b5d7bSAndy Adamson 184549557cc7SAndy Adamson /* cache solo and embedded create sessions under the state lock */ 184649557cc7SAndy Adamson nfsd4_cache_create_session(cr_ses, cs_slot, status); 1847ec6b5d7bSAndy Adamson out: 1848ec6b5d7bSAndy Adamson nfs4_unlock_state(); 1849ec6b5d7bSAndy Adamson dprintk("%s returns %d\n", __func__, ntohl(status)); 1850ec6b5d7bSAndy Adamson return status; 185181f0b2a4SJ. Bruce Fields out_free_conn: 185281f0b2a4SJ. Bruce Fields free_conn(conn); 185381f0b2a4SJ. Bruce Fields out_free_session: 185481f0b2a4SJ. Bruce Fields __free_session(new); 185581f0b2a4SJ. Bruce Fields goto out; 1856069b6ad4SAndy Adamson } 1857069b6ad4SAndy Adamson 18581d1bc8f2SJ. Bruce Fields static __be32 nfsd4_map_bcts_dir(u32 *dir) 18591d1bc8f2SJ. Bruce Fields { 18601d1bc8f2SJ. Bruce Fields switch (*dir) { 18611d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_FORE: 18621d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_BACK: 18631d1bc8f2SJ. Bruce Fields return nfs_ok; 18641d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_FORE_OR_BOTH: 18651d1bc8f2SJ. Bruce Fields case NFS4_CDFC4_BACK_OR_BOTH: 18661d1bc8f2SJ. Bruce Fields *dir = NFS4_CDFC4_BOTH; 18671d1bc8f2SJ. Bruce Fields return nfs_ok; 18681d1bc8f2SJ. Bruce Fields }; 18691d1bc8f2SJ. Bruce Fields return nfserr_inval; 18701d1bc8f2SJ. Bruce Fields } 18711d1bc8f2SJ. Bruce Fields 1872cb73a9f4SJ. Bruce Fields __be32 nfsd4_backchannel_ctl(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_backchannel_ctl *bc) 1873cb73a9f4SJ. Bruce Fields { 1874cb73a9f4SJ. Bruce Fields struct nfsd4_session *session = cstate->session; 1875c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 1876cb73a9f4SJ. Bruce Fields 1877c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 1878cb73a9f4SJ. Bruce Fields session->se_cb_prog = bc->bc_cb_program; 1879cb73a9f4SJ. Bruce Fields session->se_cb_sec = bc->bc_cb_sec; 1880c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1881cb73a9f4SJ. Bruce Fields 1882cb73a9f4SJ. Bruce Fields nfsd4_probe_callback(session->se_client); 1883cb73a9f4SJ. Bruce Fields 1884cb73a9f4SJ. Bruce Fields return nfs_ok; 1885cb73a9f4SJ. Bruce Fields } 1886cb73a9f4SJ. Bruce Fields 18871d1bc8f2SJ. Bruce Fields __be32 nfsd4_bind_conn_to_session(struct svc_rqst *rqstp, 18881d1bc8f2SJ. Bruce Fields struct nfsd4_compound_state *cstate, 18891d1bc8f2SJ. Bruce Fields struct nfsd4_bind_conn_to_session *bcts) 18901d1bc8f2SJ. Bruce Fields { 18911d1bc8f2SJ. Bruce Fields __be32 status; 18923ba63671SJ. Bruce Fields struct nfsd4_conn *conn; 1893c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 18941d1bc8f2SJ. Bruce Fields 18951d1bc8f2SJ. Bruce Fields if (!nfsd4_last_compound_op(rqstp)) 18961d1bc8f2SJ. Bruce Fields return nfserr_not_only_op; 1897c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 18981872de0eSStanislav Kinsbursky cstate->session = find_in_sessionid_hashtbl(&bcts->sessionid, SVC_NET(rqstp)); 18991d1bc8f2SJ. Bruce Fields /* Sorta weird: we only need the refcnt'ing because new_conn acquires 19001d1bc8f2SJ. Bruce Fields * client_lock iself: */ 19011d1bc8f2SJ. Bruce Fields if (cstate->session) { 19021d1bc8f2SJ. Bruce Fields nfsd4_get_session(cstate->session); 19031d1bc8f2SJ. Bruce Fields atomic_inc(&cstate->session->se_client->cl_refcount); 19041d1bc8f2SJ. Bruce Fields } 1905c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 19061d1bc8f2SJ. Bruce Fields if (!cstate->session) 19071d1bc8f2SJ. Bruce Fields return nfserr_badsession; 19081d1bc8f2SJ. Bruce Fields 19091d1bc8f2SJ. Bruce Fields status = nfsd4_map_bcts_dir(&bcts->dir); 19103ba63671SJ. Bruce Fields if (status) 19111db2b9ddSBryan Schumaker return status; 19123ba63671SJ. Bruce Fields conn = alloc_conn(rqstp, bcts->dir); 19133ba63671SJ. Bruce Fields if (!conn) 19143ba63671SJ. Bruce Fields return nfserr_jukebox; 1915e1ff371fSJ. Bruce Fields nfsd4_init_conn(rqstp, conn, cstate->session); 19163ba63671SJ. Bruce Fields return nfs_ok; 19171d1bc8f2SJ. Bruce Fields } 19181d1bc8f2SJ. Bruce Fields 19195d4cec2fSJ. Bruce Fields static bool nfsd4_compound_in_session(struct nfsd4_session *session, struct nfs4_sessionid *sid) 19205d4cec2fSJ. Bruce Fields { 19215d4cec2fSJ. Bruce Fields if (!session) 19225d4cec2fSJ. Bruce Fields return 0; 19235d4cec2fSJ. Bruce Fields return !memcmp(sid, &session->se_sessionid, sizeof(*sid)); 19245d4cec2fSJ. Bruce Fields } 19255d4cec2fSJ. Bruce Fields 1926069b6ad4SAndy Adamson __be32 1927069b6ad4SAndy Adamson nfsd4_destroy_session(struct svc_rqst *r, 1928069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 1929069b6ad4SAndy Adamson struct nfsd4_destroy_session *sessionid) 1930069b6ad4SAndy Adamson { 1931e10e0cfcSBenny Halevy struct nfsd4_session *ses; 193257b7b43bSJ. Bruce Fields __be32 status = nfserr_badsession; 1933c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(r), nfsd_net_id); 1934e10e0cfcSBenny Halevy 1935e10e0cfcSBenny Halevy /* Notes: 1936e10e0cfcSBenny Halevy * - The confirmed nfs4_client->cl_sessionid holds destroyed sessinid 1937e10e0cfcSBenny Halevy * - Should we return nfserr_back_chan_busy if waiting for 1938e10e0cfcSBenny Halevy * callbacks on to-be-destroyed session? 1939e10e0cfcSBenny Halevy * - Do we need to clear any callback info from previous session? 1940e10e0cfcSBenny Halevy */ 1941e10e0cfcSBenny Halevy 19425d4cec2fSJ. Bruce Fields if (nfsd4_compound_in_session(cstate->session, &sessionid->sessionid)) { 194357716355SJ. Bruce Fields if (!nfsd4_last_compound_op(r)) 194457716355SJ. Bruce Fields return nfserr_not_only_op; 194557716355SJ. Bruce Fields } 1946e10e0cfcSBenny Halevy dump_sessionid(__func__, &sessionid->sessionid); 1947c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 19481872de0eSStanislav Kinsbursky ses = find_in_sessionid_hashtbl(&sessionid->sessionid, SVC_NET(r)); 1949e10e0cfcSBenny Halevy if (!ses) { 1950c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1951e10e0cfcSBenny Halevy goto out; 1952e10e0cfcSBenny Halevy } 1953e10e0cfcSBenny Halevy 1954e10e0cfcSBenny Halevy unhash_session(ses); 1955c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1956e10e0cfcSBenny Halevy 1957ab707e15SBenny Halevy nfs4_lock_state(); 195884f5f7ccSJ. Bruce Fields nfsd4_probe_callback_sync(ses->se_client); 1959ab707e15SBenny Halevy nfs4_unlock_state(); 196019cf5c02SJ. Bruce Fields 1961c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 196219cf5c02SJ. Bruce Fields nfsd4_del_conns(ses); 1963508dc6e1SBenny Halevy nfsd4_put_session_locked(ses); 1964c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 1965e10e0cfcSBenny Halevy status = nfs_ok; 1966e10e0cfcSBenny Halevy out: 1967e10e0cfcSBenny Halevy dprintk("%s returns %d\n", __func__, ntohl(status)); 1968e10e0cfcSBenny Halevy return status; 1969069b6ad4SAndy Adamson } 1970069b6ad4SAndy Adamson 1971a663bdd8SJ. Bruce Fields static struct nfsd4_conn *__nfsd4_find_conn(struct svc_xprt *xpt, struct nfsd4_session *s) 1972328ead28SJ. Bruce Fields { 1973328ead28SJ. Bruce Fields struct nfsd4_conn *c; 1974328ead28SJ. Bruce Fields 1975328ead28SJ. Bruce Fields list_for_each_entry(c, &s->se_conns, cn_persession) { 1976a663bdd8SJ. Bruce Fields if (c->cn_xprt == xpt) { 1977328ead28SJ. Bruce Fields return c; 1978328ead28SJ. Bruce Fields } 1979328ead28SJ. Bruce Fields } 1980328ead28SJ. Bruce Fields return NULL; 1981328ead28SJ. Bruce Fields } 1982328ead28SJ. Bruce Fields 1983a663bdd8SJ. Bruce Fields static void nfsd4_sequence_check_conn(struct nfsd4_conn *new, struct nfsd4_session *ses) 1984328ead28SJ. Bruce Fields { 1985328ead28SJ. Bruce Fields struct nfs4_client *clp = ses->se_client; 1986a663bdd8SJ. Bruce Fields struct nfsd4_conn *c; 198721b75b01SJ. Bruce Fields int ret; 1988328ead28SJ. Bruce Fields 1989328ead28SJ. Bruce Fields spin_lock(&clp->cl_lock); 1990a663bdd8SJ. Bruce Fields c = __nfsd4_find_conn(new->cn_xprt, ses); 1991328ead28SJ. Bruce Fields if (c) { 1992328ead28SJ. Bruce Fields spin_unlock(&clp->cl_lock); 1993328ead28SJ. Bruce Fields free_conn(new); 1994328ead28SJ. Bruce Fields return; 1995328ead28SJ. Bruce Fields } 1996328ead28SJ. Bruce Fields __nfsd4_hash_conn(new, ses); 1997328ead28SJ. Bruce Fields spin_unlock(&clp->cl_lock); 199821b75b01SJ. Bruce Fields ret = nfsd4_register_conn(new); 199921b75b01SJ. Bruce Fields if (ret) 200021b75b01SJ. Bruce Fields /* oops; xprt is already down: */ 200121b75b01SJ. Bruce Fields nfsd4_conn_lost(&new->cn_xpt_user); 2002328ead28SJ. Bruce Fields return; 2003328ead28SJ. Bruce Fields } 2004328ead28SJ. Bruce Fields 2005868b89c3SMi Jinlong static bool nfsd4_session_too_many_ops(struct svc_rqst *rqstp, struct nfsd4_session *session) 2006868b89c3SMi Jinlong { 2007868b89c3SMi Jinlong struct nfsd4_compoundargs *args = rqstp->rq_argp; 2008868b89c3SMi Jinlong 2009868b89c3SMi Jinlong return args->opcnt > session->se_fchannel.maxops; 2010868b89c3SMi Jinlong } 2011868b89c3SMi Jinlong 2012ae82a8d0SMi Jinlong static bool nfsd4_request_too_big(struct svc_rqst *rqstp, 2013ae82a8d0SMi Jinlong struct nfsd4_session *session) 2014ae82a8d0SMi Jinlong { 2015ae82a8d0SMi Jinlong struct xdr_buf *xb = &rqstp->rq_arg; 2016ae82a8d0SMi Jinlong 2017ae82a8d0SMi Jinlong return xb->len > session->se_fchannel.maxreq_sz; 2018ae82a8d0SMi Jinlong } 2019ae82a8d0SMi Jinlong 2020069b6ad4SAndy Adamson __be32 2021b85d4c01SBenny Halevy nfsd4_sequence(struct svc_rqst *rqstp, 2022069b6ad4SAndy Adamson struct nfsd4_compound_state *cstate, 2023069b6ad4SAndy Adamson struct nfsd4_sequence *seq) 2024069b6ad4SAndy Adamson { 2025f9bb94c4SAndy Adamson struct nfsd4_compoundres *resp = rqstp->rq_resp; 2026b85d4c01SBenny Halevy struct nfsd4_session *session; 2027b85d4c01SBenny Halevy struct nfsd4_slot *slot; 2028a663bdd8SJ. Bruce Fields struct nfsd4_conn *conn; 202957b7b43bSJ. Bruce Fields __be32 status; 2030c9a49628SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2031b85d4c01SBenny Halevy 2032f9bb94c4SAndy Adamson if (resp->opcnt != 1) 2033f9bb94c4SAndy Adamson return nfserr_sequence_pos; 2034f9bb94c4SAndy Adamson 2035a663bdd8SJ. Bruce Fields /* 2036a663bdd8SJ. Bruce Fields * Will be either used or freed by nfsd4_sequence_check_conn 2037a663bdd8SJ. Bruce Fields * below. 2038a663bdd8SJ. Bruce Fields */ 2039a663bdd8SJ. Bruce Fields conn = alloc_conn(rqstp, NFS4_CDFC4_FORE); 2040a663bdd8SJ. Bruce Fields if (!conn) 2041a663bdd8SJ. Bruce Fields return nfserr_jukebox; 2042a663bdd8SJ. Bruce Fields 2043c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 2044b85d4c01SBenny Halevy status = nfserr_badsession; 20451872de0eSStanislav Kinsbursky session = find_in_sessionid_hashtbl(&seq->sessionid, SVC_NET(rqstp)); 2046b85d4c01SBenny Halevy if (!session) 2047b85d4c01SBenny Halevy goto out; 2048b85d4c01SBenny Halevy 2049868b89c3SMi Jinlong status = nfserr_too_many_ops; 2050868b89c3SMi Jinlong if (nfsd4_session_too_many_ops(rqstp, session)) 2051868b89c3SMi Jinlong goto out; 2052868b89c3SMi Jinlong 2053ae82a8d0SMi Jinlong status = nfserr_req_too_big; 2054ae82a8d0SMi Jinlong if (nfsd4_request_too_big(rqstp, session)) 2055ae82a8d0SMi Jinlong goto out; 2056ae82a8d0SMi Jinlong 2057b85d4c01SBenny Halevy status = nfserr_badslot; 20586c18ba9fSAlexandros Batsakis if (seq->slotid >= session->se_fchannel.maxreqs) 2059b85d4c01SBenny Halevy goto out; 2060b85d4c01SBenny Halevy 2061557ce264SAndy Adamson slot = session->se_slots[seq->slotid]; 2062b85d4c01SBenny Halevy dprintk("%s: slotid %d\n", __func__, seq->slotid); 2063b85d4c01SBenny Halevy 2064a8dfdaebSAndy Adamson /* We do not negotiate the number of slots yet, so set the 2065a8dfdaebSAndy Adamson * maxslots to the session maxreqs which is used to encode 2066a8dfdaebSAndy Adamson * sr_highest_slotid and the sr_target_slot id to maxslots */ 2067a8dfdaebSAndy Adamson seq->maxslots = session->se_fchannel.maxreqs; 2068a8dfdaebSAndy Adamson 206973e79482SJ. Bruce Fields status = check_slot_seqid(seq->seqid, slot->sl_seqid, 207073e79482SJ. Bruce Fields slot->sl_flags & NFSD4_SLOT_INUSE); 2071b85d4c01SBenny Halevy if (status == nfserr_replay_cache) { 2072bf5c43c8SJ. Bruce Fields status = nfserr_seq_misordered; 2073bf5c43c8SJ. Bruce Fields if (!(slot->sl_flags & NFSD4_SLOT_INITIALIZED)) 2074bf5c43c8SJ. Bruce Fields goto out; 2075b85d4c01SBenny Halevy cstate->slot = slot; 2076b85d4c01SBenny Halevy cstate->session = session; 2077da3846a2SAndy Adamson /* Return the cached reply status and set cstate->status 2078557ce264SAndy Adamson * for nfsd4_proc_compound processing */ 2079bf864a31SAndy Adamson status = nfsd4_replay_cache_entry(resp, seq); 2080da3846a2SAndy Adamson cstate->status = nfserr_replay_cache; 2081aaf84eb9SBenny Halevy goto out; 2082b85d4c01SBenny Halevy } 2083b85d4c01SBenny Halevy if (status) 2084b85d4c01SBenny Halevy goto out; 2085b85d4c01SBenny Halevy 2086a663bdd8SJ. Bruce Fields nfsd4_sequence_check_conn(conn, session); 2087a663bdd8SJ. Bruce Fields conn = NULL; 2088328ead28SJ. Bruce Fields 2089b85d4c01SBenny Halevy /* Success! bump slot seqid */ 2090b85d4c01SBenny Halevy slot->sl_seqid = seq->seqid; 2091bf5c43c8SJ. Bruce Fields slot->sl_flags |= NFSD4_SLOT_INUSE; 209273e79482SJ. Bruce Fields if (seq->cachethis) 209373e79482SJ. Bruce Fields slot->sl_flags |= NFSD4_SLOT_CACHETHIS; 2094bf5c43c8SJ. Bruce Fields else 2095bf5c43c8SJ. Bruce Fields slot->sl_flags &= ~NFSD4_SLOT_CACHETHIS; 2096b85d4c01SBenny Halevy 2097b85d4c01SBenny Halevy cstate->slot = slot; 2098b85d4c01SBenny Halevy cstate->session = session; 2099b85d4c01SBenny Halevy 2100b85d4c01SBenny Halevy out: 210126c0c75eSJ. Bruce Fields /* Hold a session reference until done processing the compound. */ 2102aaf84eb9SBenny Halevy if (cstate->session) { 21030d7bb719SJ. Bruce Fields struct nfs4_client *clp = session->se_client; 21040d7bb719SJ. Bruce Fields 210536acb66bSBenny Halevy nfsd4_get_session(cstate->session); 21060d7bb719SJ. Bruce Fields atomic_inc(&clp->cl_refcount); 21075423732aSBenny Halevy switch (clp->cl_cb_state) { 21085423732aSBenny Halevy case NFSD4_CB_DOWN: 2109fc0c3dd1SBenny Halevy seq->status_flags = SEQ4_STATUS_CB_PATH_DOWN; 21105423732aSBenny Halevy break; 21115423732aSBenny Halevy case NFSD4_CB_FAULT: 2112fc0c3dd1SBenny Halevy seq->status_flags = SEQ4_STATUS_BACKCHANNEL_FAULT; 21135423732aSBenny Halevy break; 2114fc0c3dd1SBenny Halevy default: 2115fc0c3dd1SBenny Halevy seq->status_flags = 0; 21165423732aSBenny Halevy } 2117aaf84eb9SBenny Halevy } 2118a663bdd8SJ. Bruce Fields kfree(conn); 2119c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 2120b85d4c01SBenny Halevy dprintk("%s: return %d\n", __func__, ntohl(status)); 2121b85d4c01SBenny Halevy return status; 2122069b6ad4SAndy Adamson } 2123069b6ad4SAndy Adamson 2124345c2842SMi Jinlong __be32 2125345c2842SMi Jinlong nfsd4_destroy_clientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_destroy_clientid *dc) 2126345c2842SMi Jinlong { 2127345c2842SMi Jinlong struct nfs4_client *conf, *unconf, *clp; 212857b7b43bSJ. Bruce Fields __be32 status = 0; 21298daae4dcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2130345c2842SMi Jinlong 2131345c2842SMi Jinlong nfs4_lock_state(); 21320a7ec377SStanislav Kinsbursky unconf = find_unconfirmed_client(&dc->clientid, true, nn); 21338daae4dcSStanislav Kinsbursky conf = find_confirmed_client(&dc->clientid, true, nn); 2134345c2842SMi Jinlong 2135345c2842SMi Jinlong if (conf) { 2136345c2842SMi Jinlong clp = conf; 2137345c2842SMi Jinlong 21386eccece9SJ. Bruce Fields if (!is_client_expired(conf) && client_has_state(conf)) { 2139345c2842SMi Jinlong status = nfserr_clientid_busy; 2140345c2842SMi Jinlong goto out; 2141345c2842SMi Jinlong } 2142345c2842SMi Jinlong 2143345c2842SMi Jinlong /* rfc5661 18.50.3 */ 2144345c2842SMi Jinlong if (cstate->session && conf == cstate->session->se_client) { 2145345c2842SMi Jinlong status = nfserr_clientid_busy; 2146345c2842SMi Jinlong goto out; 2147345c2842SMi Jinlong } 2148345c2842SMi Jinlong } else if (unconf) 2149345c2842SMi Jinlong clp = unconf; 2150345c2842SMi Jinlong else { 2151345c2842SMi Jinlong status = nfserr_stale_clientid; 2152345c2842SMi Jinlong goto out; 2153345c2842SMi Jinlong } 2154345c2842SMi Jinlong 2155345c2842SMi Jinlong expire_client(clp); 2156345c2842SMi Jinlong out: 2157345c2842SMi Jinlong nfs4_unlock_state(); 2158345c2842SMi Jinlong dprintk("%s return %d\n", __func__, ntohl(status)); 2159345c2842SMi Jinlong return status; 2160345c2842SMi Jinlong } 2161345c2842SMi Jinlong 2162069b6ad4SAndy Adamson __be32 21634dc6ec00SJ. Bruce Fields nfsd4_reclaim_complete(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_reclaim_complete *rc) 21644dc6ec00SJ. Bruce Fields { 216557b7b43bSJ. Bruce Fields __be32 status = 0; 2166bcecf1ccSMi Jinlong 21674dc6ec00SJ. Bruce Fields if (rc->rca_one_fs) { 21684dc6ec00SJ. Bruce Fields if (!cstate->current_fh.fh_dentry) 21694dc6ec00SJ. Bruce Fields return nfserr_nofilehandle; 21704dc6ec00SJ. Bruce Fields /* 21714dc6ec00SJ. Bruce Fields * We don't take advantage of the rca_one_fs case. 21724dc6ec00SJ. Bruce Fields * That's OK, it's optional, we can safely ignore it. 21734dc6ec00SJ. Bruce Fields */ 21744dc6ec00SJ. Bruce Fields return nfs_ok; 21754dc6ec00SJ. Bruce Fields } 2176bcecf1ccSMi Jinlong 21774dc6ec00SJ. Bruce Fields nfs4_lock_state(); 2178bcecf1ccSMi Jinlong status = nfserr_complete_already; 2179a52d726bSJeff Layton if (test_and_set_bit(NFSD4_CLIENT_RECLAIM_COMPLETE, 2180a52d726bSJeff Layton &cstate->session->se_client->cl_flags)) 2181bcecf1ccSMi Jinlong goto out; 2182bcecf1ccSMi Jinlong 2183bcecf1ccSMi Jinlong status = nfserr_stale_clientid; 2184bcecf1ccSMi Jinlong if (is_client_expired(cstate->session->se_client)) 21854dc6ec00SJ. Bruce Fields /* 21864dc6ec00SJ. Bruce Fields * The following error isn't really legal. 21874dc6ec00SJ. Bruce Fields * But we only get here if the client just explicitly 21884dc6ec00SJ. Bruce Fields * destroyed the client. Surely it no longer cares what 21894dc6ec00SJ. Bruce Fields * error it gets back on an operation for the dead 21904dc6ec00SJ. Bruce Fields * client. 21914dc6ec00SJ. Bruce Fields */ 2192bcecf1ccSMi Jinlong goto out; 2193bcecf1ccSMi Jinlong 2194bcecf1ccSMi Jinlong status = nfs_ok; 21952a4317c5SJeff Layton nfsd4_client_record_create(cstate->session->se_client); 2196bcecf1ccSMi Jinlong out: 21974dc6ec00SJ. Bruce Fields nfs4_unlock_state(); 2198bcecf1ccSMi Jinlong return status; 21994dc6ec00SJ. Bruce Fields } 22004dc6ec00SJ. Bruce Fields 22014dc6ec00SJ. Bruce Fields __be32 2202b591480bSJ.Bruce Fields nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 2203b591480bSJ.Bruce Fields struct nfsd4_setclientid *setclid) 22041da177e4SLinus Torvalds { 2205a084daf5SJ. Bruce Fields struct xdr_netobj clname = setclid->se_name; 22061da177e4SLinus Torvalds nfs4_verifier clverifier = setclid->se_verf; 220728ce6054SNeilBrown struct nfs4_client *conf, *unconf, *new; 2208b37ad28bSAl Viro __be32 status; 2209c212cecfSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2210a55370a3SNeilBrown 221163db4632SJ. Bruce Fields /* Cases below refer to rfc 3530 section 14.2.33: */ 22121da177e4SLinus Torvalds nfs4_lock_state(); 2213382a62e7SStanislav Kinsbursky conf = find_confirmed_client_by_name(&clname, nn); 221428ce6054SNeilBrown if (conf) { 221563db4632SJ. Bruce Fields /* case 0: */ 22161da177e4SLinus Torvalds status = nfserr_clid_inuse; 2217e203d506SJ. Bruce Fields if (clp_used_exchangeid(conf)) 2218e203d506SJ. Bruce Fields goto out; 2219026722c2SJ. Bruce Fields if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) { 2220363168b4SJeff Layton char addr_str[INET6_ADDRSTRLEN]; 2221363168b4SJeff Layton rpc_ntop((struct sockaddr *) &conf->cl_addr, addr_str, 2222363168b4SJeff Layton sizeof(addr_str)); 2223026722c2SJ. Bruce Fields dprintk("NFSD: setclientid: string in use by client " 2224363168b4SJeff Layton "at %s\n", addr_str); 22251da177e4SLinus Torvalds goto out; 22261da177e4SLinus Torvalds } 22271da177e4SLinus Torvalds } 2228a99454aaSStanislav Kinsbursky unconf = find_unconfirmed_client_by_name(&clname, nn); 22291da177e4SLinus Torvalds if (unconf) 22301da177e4SLinus Torvalds expire_client(unconf); 22318f930711SJ. Bruce Fields status = nfserr_jukebox; 22322216d449SJeff Layton new = create_client(clname, rqstp, &clverifier); 2233a55370a3SNeilBrown if (new == NULL) 22341da177e4SLinus Torvalds goto out; 223534b232bbSJ. Bruce Fields if (conf && same_verf(&conf->cl_verifier, &clverifier)) 223663db4632SJ. Bruce Fields /* case 1: probable callback update */ 22371da177e4SLinus Torvalds copy_clid(new, conf); 223834b232bbSJ. Bruce Fields else /* case 4 (new client) or cases 2, 3 (client reboot): */ 2239c212cecfSStanislav Kinsbursky gen_clid(new, nn); 22408323c3b2SJ. Bruce Fields new->cl_minorversion = 0; 22416f3d772fSTakuma Umeya gen_callback(new, setclid, rqstp); 2242ac55fdc4SJeff Layton add_to_unconfirmed(new); 22431da177e4SLinus Torvalds setclid->se_clientid.cl_boot = new->cl_clientid.cl_boot; 22441da177e4SLinus Torvalds setclid->se_clientid.cl_id = new->cl_clientid.cl_id; 22451da177e4SLinus Torvalds memcpy(setclid->se_confirm.data, new->cl_confirm.data, sizeof(setclid->se_confirm.data)); 22461da177e4SLinus Torvalds status = nfs_ok; 22471da177e4SLinus Torvalds out: 22481da177e4SLinus Torvalds nfs4_unlock_state(); 22491da177e4SLinus Torvalds return status; 22501da177e4SLinus Torvalds } 22511da177e4SLinus Torvalds 22521da177e4SLinus Torvalds 2253b37ad28bSAl Viro __be32 2254b591480bSJ.Bruce Fields nfsd4_setclientid_confirm(struct svc_rqst *rqstp, 2255b591480bSJ.Bruce Fields struct nfsd4_compound_state *cstate, 2256b591480bSJ.Bruce Fields struct nfsd4_setclientid_confirm *setclientid_confirm) 22571da177e4SLinus Torvalds { 225821ab45a4SNeilBrown struct nfs4_client *conf, *unconf; 22591da177e4SLinus Torvalds nfs4_verifier confirm = setclientid_confirm->sc_confirm; 22601da177e4SLinus Torvalds clientid_t * clid = &setclientid_confirm->sc_clientid; 2261b37ad28bSAl Viro __be32 status; 22627f2210faSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 22631da177e4SLinus Torvalds 22642c142baaSStanislav Kinsbursky if (STALE_CLIENTID(clid, nn)) 22651da177e4SLinus Torvalds return nfserr_stale_clientid; 22661da177e4SLinus Torvalds nfs4_lock_state(); 226721ab45a4SNeilBrown 22688daae4dcSStanislav Kinsbursky conf = find_confirmed_client(clid, false, nn); 22690a7ec377SStanislav Kinsbursky unconf = find_unconfirmed_client(clid, false, nn); 2270a186e767SJ. Bruce Fields /* 22718695b90aSJ. Bruce Fields * We try hard to give out unique clientid's, so if we get an 22728695b90aSJ. Bruce Fields * attempt to confirm the same clientid with a different cred, 22738695b90aSJ. Bruce Fields * there's a bug somewhere. Let's charitably assume it's our 22748695b90aSJ. Bruce Fields * bug. 2275a186e767SJ. Bruce Fields */ 22768695b90aSJ. Bruce Fields status = nfserr_serverfault; 22778695b90aSJ. Bruce Fields if (unconf && !same_creds(&unconf->cl_cred, &rqstp->rq_cred)) 22788695b90aSJ. Bruce Fields goto out; 22798695b90aSJ. Bruce Fields if (conf && !same_creds(&conf->cl_cred, &rqstp->rq_cred)) 22808695b90aSJ. Bruce Fields goto out; 228163db4632SJ. Bruce Fields /* cases below refer to rfc 3530 section 14.2.34: */ 228290d700b7SJ. Bruce Fields if (!unconf || !same_verf(&confirm, &unconf->cl_confirm)) { 228390d700b7SJ. Bruce Fields if (conf && !unconf) /* case 2: probable retransmit */ 228490d700b7SJ. Bruce Fields status = nfs_ok; 228590d700b7SJ. Bruce Fields else /* case 4: client hasn't noticed we rebooted yet? */ 228690d700b7SJ. Bruce Fields status = nfserr_stale_clientid; 228790d700b7SJ. Bruce Fields goto out; 228890d700b7SJ. Bruce Fields } 228990d700b7SJ. Bruce Fields status = nfs_ok; 229090d700b7SJ. Bruce Fields if (conf) { /* case 1: callback update */ 22915a3c9d71SJ. Bruce Fields nfsd4_change_callback(conf, &unconf->cl_cb_conn); 22925a3c9d71SJ. Bruce Fields nfsd4_probe_callback(conf); 22931a69c179SNeilBrown expire_client(unconf); 229490d700b7SJ. Bruce Fields } else { /* case 3: normal case; new or rebooted client */ 2295382a62e7SStanislav Kinsbursky conf = find_confirmed_client_by_name(&unconf->cl_name, nn); 22960d22f68fSJ. Bruce Fields if (conf) 22971a69c179SNeilBrown expire_client(conf); 22981da177e4SLinus Torvalds move_to_confirmed(unconf); 2299f3d03b92SJ. Bruce Fields nfsd4_probe_callback(unconf); 230008e8987cSNeilBrown } 23011da177e4SLinus Torvalds out: 23021da177e4SLinus Torvalds nfs4_unlock_state(); 23031da177e4SLinus Torvalds return status; 23041da177e4SLinus Torvalds } 23051da177e4SLinus Torvalds 230632513b40SJ. Bruce Fields static struct nfs4_file *nfsd4_alloc_file(void) 23071da177e4SLinus Torvalds { 230832513b40SJ. Bruce Fields return kmem_cache_alloc(file_slab, GFP_KERNEL); 230932513b40SJ. Bruce Fields } 231032513b40SJ. Bruce Fields 231132513b40SJ. Bruce Fields /* OPEN Share state helper functions */ 231232513b40SJ. Bruce Fields static void nfsd4_init_file(struct nfs4_file *fp, struct inode *ino) 231332513b40SJ. Bruce Fields { 23141da177e4SLinus Torvalds unsigned int hashval = file_hashval(ino); 23151da177e4SLinus Torvalds 23168b671b80SJ. Bruce Fields atomic_set(&fp->fi_ref, 1); 23171da177e4SLinus Torvalds INIT_LIST_HEAD(&fp->fi_hash); 23188beefa24SNeilBrown INIT_LIST_HEAD(&fp->fi_stateids); 23198beefa24SNeilBrown INIT_LIST_HEAD(&fp->fi_delegations); 23201da177e4SLinus Torvalds fp->fi_inode = igrab(ino); 232147f9940cSMeelap Shah fp->fi_had_conflict = false; 2322acfdf5c3SJ. Bruce Fields fp->fi_lease = NULL; 2323f9d7562fSJ. Bruce Fields memset(fp->fi_fds, 0, sizeof(fp->fi_fds)); 2324f9d7562fSJ. Bruce Fields memset(fp->fi_access, 0, sizeof(fp->fi_access)); 232547cee541SPavel Emelyanov spin_lock(&recall_lock); 232647cee541SPavel Emelyanov list_add(&fp->fi_hash, &file_hashtbl[hashval]); 232747cee541SPavel Emelyanov spin_unlock(&recall_lock); 23281da177e4SLinus Torvalds } 23291da177e4SLinus Torvalds 23301da177e4SLinus Torvalds static void 2331e18b890bSChristoph Lameter nfsd4_free_slab(struct kmem_cache **slab) 2332e60d4398SNeilBrown { 2333e60d4398SNeilBrown if (*slab == NULL) 2334e60d4398SNeilBrown return; 23351a1d92c1SAlexey Dobriyan kmem_cache_destroy(*slab); 2336e60d4398SNeilBrown *slab = NULL; 2337e60d4398SNeilBrown } 2338e60d4398SNeilBrown 2339e8ff2a84SJ. Bruce Fields void 2340e60d4398SNeilBrown nfsd4_free_slabs(void) 2341e60d4398SNeilBrown { 2342fe0750e5SJ. Bruce Fields nfsd4_free_slab(&openowner_slab); 2343fe0750e5SJ. Bruce Fields nfsd4_free_slab(&lockowner_slab); 2344e60d4398SNeilBrown nfsd4_free_slab(&file_slab); 23455ac049acSNeilBrown nfsd4_free_slab(&stateid_slab); 23465b2d21c1SNeilBrown nfsd4_free_slab(&deleg_slab); 2347e60d4398SNeilBrown } 23481da177e4SLinus Torvalds 234972083396SBryan Schumaker int 23501da177e4SLinus Torvalds nfsd4_init_slabs(void) 23511da177e4SLinus Torvalds { 2352fe0750e5SJ. Bruce Fields openowner_slab = kmem_cache_create("nfsd4_openowners", 2353fe0750e5SJ. Bruce Fields sizeof(struct nfs4_openowner), 0, 0, NULL); 2354fe0750e5SJ. Bruce Fields if (openowner_slab == NULL) 2355fe0750e5SJ. Bruce Fields goto out_nomem; 2356fe0750e5SJ. Bruce Fields lockowner_slab = kmem_cache_create("nfsd4_lockowners", 23573c40794bSYanchuan Nian sizeof(struct nfs4_lockowner), 0, 0, NULL); 2358fe0750e5SJ. Bruce Fields if (lockowner_slab == NULL) 2359e60d4398SNeilBrown goto out_nomem; 2360e60d4398SNeilBrown file_slab = kmem_cache_create("nfsd4_files", 236120c2df83SPaul Mundt sizeof(struct nfs4_file), 0, 0, NULL); 2362e60d4398SNeilBrown if (file_slab == NULL) 2363e60d4398SNeilBrown goto out_nomem; 23645ac049acSNeilBrown stateid_slab = kmem_cache_create("nfsd4_stateids", 2365dcef0413SJ. Bruce Fields sizeof(struct nfs4_ol_stateid), 0, 0, NULL); 23665ac049acSNeilBrown if (stateid_slab == NULL) 23675ac049acSNeilBrown goto out_nomem; 23685b2d21c1SNeilBrown deleg_slab = kmem_cache_create("nfsd4_delegations", 236920c2df83SPaul Mundt sizeof(struct nfs4_delegation), 0, 0, NULL); 23705b2d21c1SNeilBrown if (deleg_slab == NULL) 23715b2d21c1SNeilBrown goto out_nomem; 2372e60d4398SNeilBrown return 0; 2373e60d4398SNeilBrown out_nomem: 2374e60d4398SNeilBrown nfsd4_free_slabs(); 23751da177e4SLinus Torvalds dprintk("nfsd4: out of memory while initializing nfsv4\n"); 23761da177e4SLinus Torvalds return -ENOMEM; 23771da177e4SLinus Torvalds } 23781da177e4SLinus Torvalds 2379fe0750e5SJ. Bruce Fields void nfs4_free_openowner(struct nfs4_openowner *oo) 23801da177e4SLinus Torvalds { 2381fe0750e5SJ. Bruce Fields kfree(oo->oo_owner.so_owner.data); 2382fe0750e5SJ. Bruce Fields kmem_cache_free(openowner_slab, oo); 2383fe0750e5SJ. Bruce Fields } 2384fe0750e5SJ. Bruce Fields 2385fe0750e5SJ. Bruce Fields void nfs4_free_lockowner(struct nfs4_lockowner *lo) 2386fe0750e5SJ. Bruce Fields { 2387fe0750e5SJ. Bruce Fields kfree(lo->lo_owner.so_owner.data); 2388fe0750e5SJ. Bruce Fields kmem_cache_free(lockowner_slab, lo); 23891da177e4SLinus Torvalds } 23901da177e4SLinus Torvalds 2391ff194bd9SJ. Bruce Fields static void init_nfs4_replay(struct nfs4_replay *rp) 2392ff194bd9SJ. Bruce Fields { 2393ff194bd9SJ. Bruce Fields rp->rp_status = nfserr_serverfault; 2394ff194bd9SJ. Bruce Fields rp->rp_buflen = 0; 2395ff194bd9SJ. Bruce Fields rp->rp_buf = rp->rp_ibuf; 2396ff194bd9SJ. Bruce Fields } 2397ff194bd9SJ. Bruce Fields 2398fe0750e5SJ. Bruce Fields static inline void *alloc_stateowner(struct kmem_cache *slab, struct xdr_netobj *owner, struct nfs4_client *clp) 23991da177e4SLinus Torvalds { 24001da177e4SLinus Torvalds struct nfs4_stateowner *sop; 24011da177e4SLinus Torvalds 2402fe0750e5SJ. Bruce Fields sop = kmem_cache_alloc(slab, GFP_KERNEL); 2403ff194bd9SJ. Bruce Fields if (!sop) 2404ff194bd9SJ. Bruce Fields return NULL; 2405ff194bd9SJ. Bruce Fields 2406ff194bd9SJ. Bruce Fields sop->so_owner.data = kmemdup(owner->data, owner->len, GFP_KERNEL); 2407ff194bd9SJ. Bruce Fields if (!sop->so_owner.data) { 2408fe0750e5SJ. Bruce Fields kmem_cache_free(slab, sop); 2409ff194bd9SJ. Bruce Fields return NULL; 2410ff194bd9SJ. Bruce Fields } 24111da177e4SLinus Torvalds sop->so_owner.len = owner->len; 2412ff194bd9SJ. Bruce Fields 2413ff194bd9SJ. Bruce Fields INIT_LIST_HEAD(&sop->so_stateids); 2414ff194bd9SJ. Bruce Fields sop->so_client = clp; 2415ff194bd9SJ. Bruce Fields init_nfs4_replay(&sop->so_replay); 24161da177e4SLinus Torvalds return sop; 24171da177e4SLinus Torvalds } 2418ff194bd9SJ. Bruce Fields 2419fe0750e5SJ. Bruce Fields static void hash_openowner(struct nfs4_openowner *oo, struct nfs4_client *clp, unsigned int strhashval) 2420ff194bd9SJ. Bruce Fields { 24219b531137SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 24229b531137SStanislav Kinsbursky 24239b531137SStanislav Kinsbursky list_add(&oo->oo_owner.so_strhash, &nn->ownerstr_hashtbl[strhashval]); 2424fe0750e5SJ. Bruce Fields list_add(&oo->oo_perclient, &clp->cl_openowners); 24251da177e4SLinus Torvalds } 24261da177e4SLinus Torvalds 2427fe0750e5SJ. Bruce Fields static struct nfs4_openowner * 24281da177e4SLinus Torvalds alloc_init_open_stateowner(unsigned int strhashval, struct nfs4_client *clp, struct nfsd4_open *open) { 2429fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo; 24301da177e4SLinus Torvalds 2431fe0750e5SJ. Bruce Fields oo = alloc_stateowner(openowner_slab, &open->op_owner, clp); 2432fe0750e5SJ. Bruce Fields if (!oo) 24331da177e4SLinus Torvalds return NULL; 2434fe0750e5SJ. Bruce Fields oo->oo_owner.so_is_open_owner = 1; 2435fe0750e5SJ. Bruce Fields oo->oo_owner.so_seqid = open->op_seqid; 2436d29b20cdSJ. Bruce Fields oo->oo_flags = NFS4_OO_NEW; 2437fe0750e5SJ. Bruce Fields oo->oo_time = 0; 243838c387b5SJ. Bruce Fields oo->oo_last_closed_stid = NULL; 2439fe0750e5SJ. Bruce Fields INIT_LIST_HEAD(&oo->oo_close_lru); 2440fe0750e5SJ. Bruce Fields hash_openowner(oo, clp, strhashval); 2441fe0750e5SJ. Bruce Fields return oo; 24421da177e4SLinus Torvalds } 24431da177e4SLinus Torvalds 2444996e0938SJ. Bruce Fields static void init_open_stateid(struct nfs4_ol_stateid *stp, struct nfs4_file *fp, struct nfsd4_open *open) { 2445fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo = open->op_openowner; 2446d3b313a4SJ. Bruce Fields struct nfs4_client *clp = oo->oo_owner.so_client; 24471da177e4SLinus Torvalds 2448996e0938SJ. Bruce Fields init_stid(&stp->st_stid, clp, NFS4_OPEN_STID); 2449ea1da636SNeilBrown INIT_LIST_HEAD(&stp->st_lockowners); 2450fe0750e5SJ. Bruce Fields list_add(&stp->st_perstateowner, &oo->oo_owner.so_stateids); 24518beefa24SNeilBrown list_add(&stp->st_perfile, &fp->fi_stateids); 2452fe0750e5SJ. Bruce Fields stp->st_stateowner = &oo->oo_owner; 245313cd2184SNeilBrown get_nfs4_file(fp); 24541da177e4SLinus Torvalds stp->st_file = fp; 24551da177e4SLinus Torvalds stp->st_access_bmap = 0; 24561da177e4SLinus Torvalds stp->st_deny_bmap = 0; 245782c5ff1bSJeff Layton set_access(open->op_share_access, stp); 2458ce0fc43cSJeff Layton set_deny(open->op_share_deny, stp); 24594c4cd222SNeilBrown stp->st_openstp = NULL; 24601da177e4SLinus Torvalds } 24611da177e4SLinus Torvalds 24621da177e4SLinus Torvalds static void 246373758fedSStanislav Kinsbursky move_to_close_lru(struct nfs4_openowner *oo, struct net *net) 24641da177e4SLinus Torvalds { 246573758fedSStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 246673758fedSStanislav Kinsbursky 2467fe0750e5SJ. Bruce Fields dprintk("NFSD: move_to_close_lru nfs4_openowner %p\n", oo); 24681da177e4SLinus Torvalds 246973758fedSStanislav Kinsbursky list_move_tail(&oo->oo_close_lru, &nn->close_lru); 2470fe0750e5SJ. Bruce Fields oo->oo_time = get_seconds(); 24711da177e4SLinus Torvalds } 24721da177e4SLinus Torvalds 24731da177e4SLinus Torvalds static int 2474599e0a22SJ. Bruce Fields same_owner_str(struct nfs4_stateowner *sop, struct xdr_netobj *owner, 2475599e0a22SJ. Bruce Fields clientid_t *clid) 2476599e0a22SJ. Bruce Fields { 2477599e0a22SJ. Bruce Fields return (sop->so_owner.len == owner->len) && 2478599e0a22SJ. Bruce Fields 0 == memcmp(sop->so_owner.data, owner->data, owner->len) && 2479599e0a22SJ. Bruce Fields (sop->so_client->cl_clientid.cl_id == clid->cl_id); 24801da177e4SLinus Torvalds } 24811da177e4SLinus Torvalds 2482fe0750e5SJ. Bruce Fields static struct nfs4_openowner * 24839b531137SStanislav Kinsbursky find_openstateowner_str(unsigned int hashval, struct nfsd4_open *open, 24849b531137SStanislav Kinsbursky bool sessions, struct nfsd_net *nn) 24851da177e4SLinus Torvalds { 2486a50d2ad1SJ. Bruce Fields struct nfs4_stateowner *so; 2487a50d2ad1SJ. Bruce Fields struct nfs4_openowner *oo; 2488d15c077eSJ. Bruce Fields struct nfs4_client *clp; 24891da177e4SLinus Torvalds 24909b531137SStanislav Kinsbursky list_for_each_entry(so, &nn->ownerstr_hashtbl[hashval], so_strhash) { 249116bfdaafSJ. Bruce Fields if (!so->so_is_open_owner) 249216bfdaafSJ. Bruce Fields continue; 2493a50d2ad1SJ. Bruce Fields if (same_owner_str(so, &open->op_owner, &open->op_clientid)) { 2494a50d2ad1SJ. Bruce Fields oo = openowner(so); 2495d15c077eSJ. Bruce Fields clp = oo->oo_owner.so_client; 2496d15c077eSJ. Bruce Fields if ((bool)clp->cl_minorversion != sessions) 2497d15c077eSJ. Bruce Fields return NULL; 2498a50d2ad1SJ. Bruce Fields renew_client(oo->oo_owner.so_client); 2499a50d2ad1SJ. Bruce Fields return oo; 2500a50d2ad1SJ. Bruce Fields } 25011da177e4SLinus Torvalds } 25021da177e4SLinus Torvalds return NULL; 25031da177e4SLinus Torvalds } 25041da177e4SLinus Torvalds 25051da177e4SLinus Torvalds /* search file_hashtbl[] for file */ 25061da177e4SLinus Torvalds static struct nfs4_file * 25071da177e4SLinus Torvalds find_file(struct inode *ino) 25081da177e4SLinus Torvalds { 25091da177e4SLinus Torvalds unsigned int hashval = file_hashval(ino); 25101da177e4SLinus Torvalds struct nfs4_file *fp; 25111da177e4SLinus Torvalds 25128b671b80SJ. Bruce Fields spin_lock(&recall_lock); 25131da177e4SLinus Torvalds list_for_each_entry(fp, &file_hashtbl[hashval], fi_hash) { 251413cd2184SNeilBrown if (fp->fi_inode == ino) { 251513cd2184SNeilBrown get_nfs4_file(fp); 25168b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 25171da177e4SLinus Torvalds return fp; 25181da177e4SLinus Torvalds } 251913cd2184SNeilBrown } 25208b671b80SJ. Bruce Fields spin_unlock(&recall_lock); 25211da177e4SLinus Torvalds return NULL; 25221da177e4SLinus Torvalds } 25231da177e4SLinus Torvalds 25244f83aa30SJ. Bruce Fields /* 25251da177e4SLinus Torvalds * Called to check deny when READ with all zero stateid or 25261da177e4SLinus Torvalds * WRITE with all zero or all one stateid 25271da177e4SLinus Torvalds */ 2528b37ad28bSAl Viro static __be32 25291da177e4SLinus Torvalds nfs4_share_conflict(struct svc_fh *current_fh, unsigned int deny_type) 25301da177e4SLinus Torvalds { 25311da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 25321da177e4SLinus Torvalds struct nfs4_file *fp; 2533dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 2534b37ad28bSAl Viro __be32 ret; 25351da177e4SLinus Torvalds 25361da177e4SLinus Torvalds dprintk("NFSD: nfs4_share_conflict\n"); 25371da177e4SLinus Torvalds 25381da177e4SLinus Torvalds fp = find_file(ino); 253913cd2184SNeilBrown if (!fp) 254013cd2184SNeilBrown return nfs_ok; 2541b700949bSNeilBrown ret = nfserr_locked; 25421da177e4SLinus Torvalds /* Search for conflicting share reservations */ 25438beefa24SNeilBrown list_for_each_entry(stp, &fp->fi_stateids, st_perfile) { 2544ce0fc43cSJeff Layton if (test_deny(deny_type, stp) || 2545ce0fc43cSJeff Layton test_deny(NFS4_SHARE_DENY_BOTH, stp)) 254613cd2184SNeilBrown goto out; 25471da177e4SLinus Torvalds } 254813cd2184SNeilBrown ret = nfs_ok; 254913cd2184SNeilBrown out: 255013cd2184SNeilBrown put_nfs4_file(fp); 255113cd2184SNeilBrown return ret; 25521da177e4SLinus Torvalds } 25531da177e4SLinus Torvalds 25546b57d9c8SJ. Bruce Fields static void nfsd_break_one_deleg(struct nfs4_delegation *dp) 25551da177e4SLinus Torvalds { 25561da177e4SLinus Torvalds /* We're assuming the state code never drops its reference 25571da177e4SLinus Torvalds * without first removing the lease. Since we're in this lease 25581da177e4SLinus Torvalds * callback (and since the lease code is serialized by the kernel 25591da177e4SLinus Torvalds * lock) we know the server hasn't removed the lease yet, we know 25601da177e4SLinus Torvalds * it's safe to take a reference: */ 25611da177e4SLinus Torvalds atomic_inc(&dp->dl_count); 25621da177e4SLinus Torvalds 25631da177e4SLinus Torvalds list_add_tail(&dp->dl_recall_lru, &del_recall_lru); 25641da177e4SLinus Torvalds 2565460781b5SArnd Bergmann /* only place dl_time is set. protected by lock_flocks*/ 25661da177e4SLinus Torvalds dp->dl_time = get_seconds(); 25671da177e4SLinus Torvalds 25686b57d9c8SJ. Bruce Fields nfsd4_cb_recall(dp); 25696b57d9c8SJ. Bruce Fields } 25706b57d9c8SJ. Bruce Fields 2571acfdf5c3SJ. Bruce Fields /* Called from break_lease() with lock_flocks() held. */ 25726b57d9c8SJ. Bruce Fields static void nfsd_break_deleg_cb(struct file_lock *fl) 25736b57d9c8SJ. Bruce Fields { 2574acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = (struct nfs4_file *)fl->fl_owner; 2575acfdf5c3SJ. Bruce Fields struct nfs4_delegation *dp; 25766b57d9c8SJ. Bruce Fields 25777fa10cd1SJ. Bruce Fields if (!fp) { 25787fa10cd1SJ. Bruce Fields WARN(1, "(%p)->fl_owner NULL\n", fl); 25797fa10cd1SJ. Bruce Fields return; 25807fa10cd1SJ. Bruce Fields } 25817fa10cd1SJ. Bruce Fields if (fp->fi_had_conflict) { 25827fa10cd1SJ. Bruce Fields WARN(1, "duplicate break on %p\n", fp); 25837fa10cd1SJ. Bruce Fields return; 25847fa10cd1SJ. Bruce Fields } 25850272e1fdSJ. Bruce Fields /* 25860272e1fdSJ. Bruce Fields * We don't want the locks code to timeout the lease for us; 2587acfdf5c3SJ. Bruce Fields * we'll remove it ourself if a delegation isn't returned 25886b57d9c8SJ. Bruce Fields * in time: 25890272e1fdSJ. Bruce Fields */ 25900272e1fdSJ. Bruce Fields fl->fl_break_time = 0; 25911da177e4SLinus Torvalds 25925d926e8cSJ. Bruce Fields spin_lock(&recall_lock); 2593acfdf5c3SJ. Bruce Fields fp->fi_had_conflict = true; 2594acfdf5c3SJ. Bruce Fields list_for_each_entry(dp, &fp->fi_delegations, dl_perfile) 25955d926e8cSJ. Bruce Fields nfsd_break_one_deleg(dp); 25965d926e8cSJ. Bruce Fields spin_unlock(&recall_lock); 25971da177e4SLinus Torvalds } 25981da177e4SLinus Torvalds 25991da177e4SLinus Torvalds static 26001da177e4SLinus Torvalds int nfsd_change_deleg_cb(struct file_lock **onlist, int arg) 26011da177e4SLinus Torvalds { 26021da177e4SLinus Torvalds if (arg & F_UNLCK) 26031da177e4SLinus Torvalds return lease_modify(onlist, arg); 26041da177e4SLinus Torvalds else 26051da177e4SLinus Torvalds return -EAGAIN; 26061da177e4SLinus Torvalds } 26071da177e4SLinus Torvalds 26087b021967SAlexey Dobriyan static const struct lock_manager_operations nfsd_lease_mng_ops = { 26098fb47a4fSJ. Bruce Fields .lm_break = nfsd_break_deleg_cb, 26108fb47a4fSJ. Bruce Fields .lm_change = nfsd_change_deleg_cb, 26111da177e4SLinus Torvalds }; 26121da177e4SLinus Torvalds 26137a8711c9SJ. Bruce Fields static __be32 nfsd4_check_seqid(struct nfsd4_compound_state *cstate, struct nfs4_stateowner *so, u32 seqid) 26147a8711c9SJ. Bruce Fields { 26157a8711c9SJ. Bruce Fields if (nfsd4_has_session(cstate)) 26167a8711c9SJ. Bruce Fields return nfs_ok; 26177a8711c9SJ. Bruce Fields if (seqid == so->so_seqid - 1) 26187a8711c9SJ. Bruce Fields return nfserr_replay_me; 26197a8711c9SJ. Bruce Fields if (seqid == so->so_seqid) 26207a8711c9SJ. Bruce Fields return nfs_ok; 26217a8711c9SJ. Bruce Fields return nfserr_bad_seqid; 26227a8711c9SJ. Bruce Fields } 26231da177e4SLinus Torvalds 2624b37ad28bSAl Viro __be32 26256668958fSAndy Adamson nfsd4_process_open1(struct nfsd4_compound_state *cstate, 26263320fef1SStanislav Kinsbursky struct nfsd4_open *open, struct nfsd_net *nn) 26271da177e4SLinus Torvalds { 26281da177e4SLinus Torvalds clientid_t *clientid = &open->op_clientid; 26291da177e4SLinus Torvalds struct nfs4_client *clp = NULL; 26301da177e4SLinus Torvalds unsigned int strhashval; 2631fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo = NULL; 26324cdc951bSJ. Bruce Fields __be32 status; 26331da177e4SLinus Torvalds 26342c142baaSStanislav Kinsbursky if (STALE_CLIENTID(&open->op_clientid, nn)) 26351da177e4SLinus Torvalds return nfserr_stale_clientid; 263632513b40SJ. Bruce Fields /* 263732513b40SJ. Bruce Fields * In case we need it later, after we've already created the 263832513b40SJ. Bruce Fields * file and don't want to risk a further failure: 263932513b40SJ. Bruce Fields */ 264032513b40SJ. Bruce Fields open->op_file = nfsd4_alloc_file(); 264132513b40SJ. Bruce Fields if (open->op_file == NULL) 264232513b40SJ. Bruce Fields return nfserr_jukebox; 26431da177e4SLinus Torvalds 264416bfdaafSJ. Bruce Fields strhashval = ownerstr_hashval(clientid->cl_id, &open->op_owner); 26459b531137SStanislav Kinsbursky oo = find_openstateowner_str(strhashval, open, cstate->minorversion, nn); 2646fe0750e5SJ. Bruce Fields open->op_openowner = oo; 2647fe0750e5SJ. Bruce Fields if (!oo) { 26488daae4dcSStanislav Kinsbursky clp = find_confirmed_client(clientid, cstate->minorversion, 26498daae4dcSStanislav Kinsbursky nn); 26500f442aa2SJ. Bruce Fields if (clp == NULL) 26510f442aa2SJ. Bruce Fields return nfserr_expired; 2652bcf130f9SJ. Bruce Fields goto new_owner; 26530f442aa2SJ. Bruce Fields } 2654dad1c067SJ. Bruce Fields if (!(oo->oo_flags & NFS4_OO_CONFIRMED)) { 26550f442aa2SJ. Bruce Fields /* Replace unconfirmed owners without checking for replay. */ 2656fe0750e5SJ. Bruce Fields clp = oo->oo_owner.so_client; 2657fe0750e5SJ. Bruce Fields release_openowner(oo); 2658fe0750e5SJ. Bruce Fields open->op_openowner = NULL; 2659bcf130f9SJ. Bruce Fields goto new_owner; 26600f442aa2SJ. Bruce Fields } 26614cdc951bSJ. Bruce Fields status = nfsd4_check_seqid(cstate, &oo->oo_owner, open->op_seqid); 26624cdc951bSJ. Bruce Fields if (status) 26634cdc951bSJ. Bruce Fields return status; 26644cdc951bSJ. Bruce Fields clp = oo->oo_owner.so_client; 26654cdc951bSJ. Bruce Fields goto alloc_stateid; 2666bcf130f9SJ. Bruce Fields new_owner: 2667fe0750e5SJ. Bruce Fields oo = alloc_init_open_stateowner(strhashval, clp, open); 2668fe0750e5SJ. Bruce Fields if (oo == NULL) 26693e772463SJ. Bruce Fields return nfserr_jukebox; 2670fe0750e5SJ. Bruce Fields open->op_openowner = oo; 26714cdc951bSJ. Bruce Fields alloc_stateid: 26724cdc951bSJ. Bruce Fields open->op_stp = nfs4_alloc_stateid(clp); 26734cdc951bSJ. Bruce Fields if (!open->op_stp) 26744cdc951bSJ. Bruce Fields return nfserr_jukebox; 26750f442aa2SJ. Bruce Fields return nfs_ok; 26761da177e4SLinus Torvalds } 26771da177e4SLinus Torvalds 2678b37ad28bSAl Viro static inline __be32 26794a6e43e6SNeilBrown nfs4_check_delegmode(struct nfs4_delegation *dp, int flags) 26804a6e43e6SNeilBrown { 26814a6e43e6SNeilBrown if ((flags & WR_STATE) && (dp->dl_type == NFS4_OPEN_DELEGATE_READ)) 26824a6e43e6SNeilBrown return nfserr_openmode; 26834a6e43e6SNeilBrown else 26844a6e43e6SNeilBrown return nfs_ok; 26854a6e43e6SNeilBrown } 26864a6e43e6SNeilBrown 2687c47d832bSDaniel Mack static int share_access_to_flags(u32 share_access) 268824a0111eSJ. Bruce Fields { 268924a0111eSJ. Bruce Fields return share_access == NFS4_SHARE_ACCESS_READ ? RD_STATE : WR_STATE; 269024a0111eSJ. Bruce Fields } 269124a0111eSJ. Bruce Fields 269238c2f4b1SJ. Bruce Fields static struct nfs4_delegation *find_deleg_stateid(struct nfs4_client *cl, stateid_t *s) 2693f459e453SJ. Bruce Fields { 2694f459e453SJ. Bruce Fields struct nfs4_stid *ret; 2695f459e453SJ. Bruce Fields 269638c2f4b1SJ. Bruce Fields ret = find_stateid_by_type(cl, s, NFS4_DELEG_STID); 2697f459e453SJ. Bruce Fields if (!ret) 2698f459e453SJ. Bruce Fields return NULL; 2699f459e453SJ. Bruce Fields return delegstateid(ret); 2700f459e453SJ. Bruce Fields } 2701f459e453SJ. Bruce Fields 27028b289b2cSJ. Bruce Fields static bool nfsd4_is_deleg_cur(struct nfsd4_open *open) 27038b289b2cSJ. Bruce Fields { 27048b289b2cSJ. Bruce Fields return open->op_claim_type == NFS4_OPEN_CLAIM_DELEGATE_CUR || 27058b289b2cSJ. Bruce Fields open->op_claim_type == NFS4_OPEN_CLAIM_DELEG_CUR_FH; 27068b289b2cSJ. Bruce Fields } 27078b289b2cSJ. Bruce Fields 2708b37ad28bSAl Viro static __be32 270938c2f4b1SJ. Bruce Fields nfs4_check_deleg(struct nfs4_client *cl, struct nfs4_file *fp, struct nfsd4_open *open, 2710567d9829SNeilBrown struct nfs4_delegation **dp) 2711567d9829SNeilBrown { 2712567d9829SNeilBrown int flags; 2713b37ad28bSAl Viro __be32 status = nfserr_bad_stateid; 2714567d9829SNeilBrown 271538c2f4b1SJ. Bruce Fields *dp = find_deleg_stateid(cl, &open->op_delegate_stateid); 2716567d9829SNeilBrown if (*dp == NULL) 2717c44c5eebSNeilBrown goto out; 271824a0111eSJ. Bruce Fields flags = share_access_to_flags(open->op_share_access); 2719567d9829SNeilBrown status = nfs4_check_delegmode(*dp, flags); 2720567d9829SNeilBrown if (status) 2721567d9829SNeilBrown *dp = NULL; 2722c44c5eebSNeilBrown out: 27238b289b2cSJ. Bruce Fields if (!nfsd4_is_deleg_cur(open)) 2724c44c5eebSNeilBrown return nfs_ok; 2725c44c5eebSNeilBrown if (status) 2726c44c5eebSNeilBrown return status; 2727dad1c067SJ. Bruce Fields open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED; 2728c44c5eebSNeilBrown return nfs_ok; 2729567d9829SNeilBrown } 2730567d9829SNeilBrown 2731b37ad28bSAl Viro static __be32 2732dcef0413SJ. Bruce Fields nfs4_check_open(struct nfs4_file *fp, struct nfsd4_open *open, struct nfs4_ol_stateid **stpp) 27331da177e4SLinus Torvalds { 2734dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *local; 2735fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo = open->op_openowner; 27361da177e4SLinus Torvalds 27378beefa24SNeilBrown list_for_each_entry(local, &fp->fi_stateids, st_perfile) { 27381da177e4SLinus Torvalds /* ignore lock owners */ 27391da177e4SLinus Torvalds if (local->st_stateowner->so_is_open_owner == 0) 27401da177e4SLinus Torvalds continue; 27411da177e4SLinus Torvalds /* remember if we have seen this open owner */ 2742fe0750e5SJ. Bruce Fields if (local->st_stateowner == &oo->oo_owner) 27431da177e4SLinus Torvalds *stpp = local; 27441da177e4SLinus Torvalds /* check for conflicting share reservations */ 27451da177e4SLinus Torvalds if (!test_share(local, open)) 274677eaae8dSJ. Bruce Fields return nfserr_share_denied; 27471da177e4SLinus Torvalds } 274877eaae8dSJ. Bruce Fields return nfs_ok; 27491da177e4SLinus Torvalds } 27501da177e4SLinus Torvalds 275121fb4016SJ. Bruce Fields static inline int nfs4_access_to_access(u32 nfs4_access) 275221fb4016SJ. Bruce Fields { 275321fb4016SJ. Bruce Fields int flags = 0; 275421fb4016SJ. Bruce Fields 275521fb4016SJ. Bruce Fields if (nfs4_access & NFS4_SHARE_ACCESS_READ) 275621fb4016SJ. Bruce Fields flags |= NFSD_MAY_READ; 275721fb4016SJ. Bruce Fields if (nfs4_access & NFS4_SHARE_ACCESS_WRITE) 275821fb4016SJ. Bruce Fields flags |= NFSD_MAY_WRITE; 275921fb4016SJ. Bruce Fields return flags; 276021fb4016SJ. Bruce Fields } 276121fb4016SJ. Bruce Fields 27620c12eaffSCasey Bodley static __be32 nfs4_get_vfs_file(struct svc_rqst *rqstp, struct nfs4_file *fp, 27630c12eaffSCasey Bodley struct svc_fh *cur_fh, struct nfsd4_open *open) 2764f9d7562fSJ. Bruce Fields { 2765f9d7562fSJ. Bruce Fields __be32 status; 27660c12eaffSCasey Bodley int oflag = nfs4_access_to_omode(open->op_share_access); 27670c12eaffSCasey Bodley int access = nfs4_access_to_access(open->op_share_access); 27680c12eaffSCasey Bodley 2769f9d7562fSJ. Bruce Fields if (!fp->fi_fds[oflag]) { 2770f9d7562fSJ. Bruce Fields status = nfsd_open(rqstp, cur_fh, S_IFREG, access, 2771f9d7562fSJ. Bruce Fields &fp->fi_fds[oflag]); 2772f9d7562fSJ. Bruce Fields if (status) 2773f9d7562fSJ. Bruce Fields return status; 2774f9d7562fSJ. Bruce Fields } 2775f9d7562fSJ. Bruce Fields nfs4_file_get_access(fp, oflag); 2776f9d7562fSJ. Bruce Fields 2777f9d7562fSJ. Bruce Fields return nfs_ok; 2778f9d7562fSJ. Bruce Fields } 2779f9d7562fSJ. Bruce Fields 2780b37ad28bSAl Viro static inline __be32 27811da177e4SLinus Torvalds nfsd4_truncate(struct svc_rqst *rqstp, struct svc_fh *fh, 27821da177e4SLinus Torvalds struct nfsd4_open *open) 27831da177e4SLinus Torvalds { 27841da177e4SLinus Torvalds struct iattr iattr = { 27851da177e4SLinus Torvalds .ia_valid = ATTR_SIZE, 27861da177e4SLinus Torvalds .ia_size = 0, 27871da177e4SLinus Torvalds }; 27881da177e4SLinus Torvalds if (!open->op_truncate) 27891da177e4SLinus Torvalds return 0; 27901da177e4SLinus Torvalds if (!(open->op_share_access & NFS4_SHARE_ACCESS_WRITE)) 27919246585aSAl Viro return nfserr_inval; 27921da177e4SLinus Torvalds return nfsd_setattr(rqstp, fh, &iattr, 0, (time_t)0); 27931da177e4SLinus Torvalds } 27941da177e4SLinus Torvalds 2795b37ad28bSAl Viro static __be32 2796dcef0413SJ. Bruce Fields nfs4_upgrade_open(struct svc_rqst *rqstp, struct nfs4_file *fp, struct svc_fh *cur_fh, struct nfs4_ol_stateid *stp, struct nfsd4_open *open) 27971da177e4SLinus Torvalds { 2798b6d2f1caSJ. Bruce Fields u32 op_share_access = open->op_share_access; 27997d947842SJ. Bruce Fields bool new_access; 2800b37ad28bSAl Viro __be32 status; 28011da177e4SLinus Torvalds 280282c5ff1bSJeff Layton new_access = !test_access(op_share_access, stp); 2803f9d7562fSJ. Bruce Fields if (new_access) { 28040c12eaffSCasey Bodley status = nfs4_get_vfs_file(rqstp, fp, cur_fh, open); 2805f9d7562fSJ. Bruce Fields if (status) 2806f9d7562fSJ. Bruce Fields return status; 28076c26d08fSJ. Bruce Fields } 28081da177e4SLinus Torvalds status = nfsd4_truncate(rqstp, cur_fh, open); 28091da177e4SLinus Torvalds if (status) { 2810f9d7562fSJ. Bruce Fields if (new_access) { 2811f197c271SJ. Bruce Fields int oflag = nfs4_access_to_omode(op_share_access); 2812f9d7562fSJ. Bruce Fields nfs4_file_put_access(fp, oflag); 2813f9d7562fSJ. Bruce Fields } 28141da177e4SLinus Torvalds return status; 28151da177e4SLinus Torvalds } 28161da177e4SLinus Torvalds /* remember the open */ 281782c5ff1bSJeff Layton set_access(op_share_access, stp); 2818ce0fc43cSJeff Layton set_deny(open->op_share_deny, stp); 28191da177e4SLinus Torvalds 28201da177e4SLinus Torvalds return nfs_ok; 28211da177e4SLinus Torvalds } 28221da177e4SLinus Torvalds 28231da177e4SLinus Torvalds 28241da177e4SLinus Torvalds static void 28251255a8f3SJ. Bruce Fields nfs4_set_claim_prev(struct nfsd4_open *open, bool has_session) 28261da177e4SLinus Torvalds { 2827dad1c067SJ. Bruce Fields open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED; 28281da177e4SLinus Torvalds } 28291da177e4SLinus Torvalds 283014a24e99SJ. Bruce Fields /* Should we give out recallable state?: */ 283114a24e99SJ. Bruce Fields static bool nfsd4_cb_channel_good(struct nfs4_client *clp) 283214a24e99SJ. Bruce Fields { 283314a24e99SJ. Bruce Fields if (clp->cl_cb_state == NFSD4_CB_UP) 283414a24e99SJ. Bruce Fields return true; 283514a24e99SJ. Bruce Fields /* 283614a24e99SJ. Bruce Fields * In the sessions case, since we don't have to establish a 283714a24e99SJ. Bruce Fields * separate connection for callbacks, we assume it's OK 283814a24e99SJ. Bruce Fields * until we hear otherwise: 283914a24e99SJ. Bruce Fields */ 284014a24e99SJ. Bruce Fields return clp->cl_minorversion && clp->cl_cb_state == NFSD4_CB_UNKNOWN; 284114a24e99SJ. Bruce Fields } 284214a24e99SJ. Bruce Fields 284322d38c4cSJ. Bruce Fields static struct file_lock *nfs4_alloc_init_lease(struct nfs4_delegation *dp, int flag) 284422d38c4cSJ. Bruce Fields { 284522d38c4cSJ. Bruce Fields struct file_lock *fl; 284622d38c4cSJ. Bruce Fields 284722d38c4cSJ. Bruce Fields fl = locks_alloc_lock(); 284822d38c4cSJ. Bruce Fields if (!fl) 284922d38c4cSJ. Bruce Fields return NULL; 285022d38c4cSJ. Bruce Fields locks_init_lock(fl); 285122d38c4cSJ. Bruce Fields fl->fl_lmops = &nfsd_lease_mng_ops; 285222d38c4cSJ. Bruce Fields fl->fl_flags = FL_LEASE; 285322d38c4cSJ. Bruce Fields fl->fl_type = flag == NFS4_OPEN_DELEGATE_READ? F_RDLCK: F_WRLCK; 285422d38c4cSJ. Bruce Fields fl->fl_end = OFFSET_MAX; 2855acfdf5c3SJ. Bruce Fields fl->fl_owner = (fl_owner_t)(dp->dl_file); 285622d38c4cSJ. Bruce Fields fl->fl_pid = current->tgid; 285722d38c4cSJ. Bruce Fields return fl; 285822d38c4cSJ. Bruce Fields } 285922d38c4cSJ. Bruce Fields 2860edab9782SJ. Bruce Fields static int nfs4_setlease(struct nfs4_delegation *dp, int flag) 2861edab9782SJ. Bruce Fields { 2862acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = dp->dl_file; 2863edab9782SJ. Bruce Fields struct file_lock *fl; 2864edab9782SJ. Bruce Fields int status; 2865edab9782SJ. Bruce Fields 2866edab9782SJ. Bruce Fields fl = nfs4_alloc_init_lease(dp, flag); 2867edab9782SJ. Bruce Fields if (!fl) 2868edab9782SJ. Bruce Fields return -ENOMEM; 2869acfdf5c3SJ. Bruce Fields fl->fl_file = find_readable_file(fp); 28702a74aba7SJ. Bruce Fields list_add(&dp->dl_perclnt, &dp->dl_stid.sc_client->cl_delegations); 2871acfdf5c3SJ. Bruce Fields status = vfs_setlease(fl->fl_file, fl->fl_type, &fl); 2872edab9782SJ. Bruce Fields if (status) { 2873acfdf5c3SJ. Bruce Fields list_del_init(&dp->dl_perclnt); 2874edab9782SJ. Bruce Fields locks_free_lock(fl); 2875edab9782SJ. Bruce Fields return -ENOMEM; 2876edab9782SJ. Bruce Fields } 2877acfdf5c3SJ. Bruce Fields fp->fi_lease = fl; 2878cb0942b8SAl Viro fp->fi_deleg_file = get_file(fl->fl_file); 2879acfdf5c3SJ. Bruce Fields atomic_set(&fp->fi_delegees, 1); 2880acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perfile, &fp->fi_delegations); 2881acfdf5c3SJ. Bruce Fields return 0; 2882acfdf5c3SJ. Bruce Fields } 2883acfdf5c3SJ. Bruce Fields 2884acfdf5c3SJ. Bruce Fields static int nfs4_set_delegation(struct nfs4_delegation *dp, int flag) 2885acfdf5c3SJ. Bruce Fields { 2886acfdf5c3SJ. Bruce Fields struct nfs4_file *fp = dp->dl_file; 2887acfdf5c3SJ. Bruce Fields 2888acfdf5c3SJ. Bruce Fields if (!fp->fi_lease) 2889acfdf5c3SJ. Bruce Fields return nfs4_setlease(dp, flag); 2890acfdf5c3SJ. Bruce Fields spin_lock(&recall_lock); 2891acfdf5c3SJ. Bruce Fields if (fp->fi_had_conflict) { 2892acfdf5c3SJ. Bruce Fields spin_unlock(&recall_lock); 2893acfdf5c3SJ. Bruce Fields return -EAGAIN; 2894acfdf5c3SJ. Bruce Fields } 2895acfdf5c3SJ. Bruce Fields atomic_inc(&fp->fi_delegees); 2896acfdf5c3SJ. Bruce Fields list_add(&dp->dl_perfile, &fp->fi_delegations); 2897acfdf5c3SJ. Bruce Fields spin_unlock(&recall_lock); 28982a74aba7SJ. Bruce Fields list_add(&dp->dl_perclnt, &dp->dl_stid.sc_client->cl_delegations); 2899edab9782SJ. Bruce Fields return 0; 2900edab9782SJ. Bruce Fields } 2901edab9782SJ. Bruce Fields 29024aa8913cSBenny Halevy static void nfsd4_open_deleg_none_ext(struct nfsd4_open *open, int status) 29034aa8913cSBenny Halevy { 29044aa8913cSBenny Halevy open->op_delegate_type = NFS4_OPEN_DELEGATE_NONE_EXT; 29054aa8913cSBenny Halevy if (status == -EAGAIN) 29064aa8913cSBenny Halevy open->op_why_no_deleg = WND4_CONTENTION; 29074aa8913cSBenny Halevy else { 29084aa8913cSBenny Halevy open->op_why_no_deleg = WND4_RESOURCE; 29094aa8913cSBenny Halevy switch (open->op_deleg_want) { 29104aa8913cSBenny Halevy case NFS4_SHARE_WANT_READ_DELEG: 29114aa8913cSBenny Halevy case NFS4_SHARE_WANT_WRITE_DELEG: 29124aa8913cSBenny Halevy case NFS4_SHARE_WANT_ANY_DELEG: 29134aa8913cSBenny Halevy break; 29144aa8913cSBenny Halevy case NFS4_SHARE_WANT_CANCEL: 29154aa8913cSBenny Halevy open->op_why_no_deleg = WND4_CANCELLED; 29164aa8913cSBenny Halevy break; 29174aa8913cSBenny Halevy case NFS4_SHARE_WANT_NO_DELEG: 2918063b0fb9SJ. Bruce Fields WARN_ON_ONCE(1); 29194aa8913cSBenny Halevy } 29204aa8913cSBenny Halevy } 29214aa8913cSBenny Halevy } 29224aa8913cSBenny Halevy 29231da177e4SLinus Torvalds /* 29241da177e4SLinus Torvalds * Attempt to hand out a delegation. 29251da177e4SLinus Torvalds */ 29261da177e4SLinus Torvalds static void 29275ccb0066SStanislav Kinsbursky nfs4_open_delegation(struct net *net, struct svc_fh *fh, 29285ccb0066SStanislav Kinsbursky struct nfsd4_open *open, struct nfs4_ol_stateid *stp) 29291da177e4SLinus Torvalds { 29301da177e4SLinus Torvalds struct nfs4_delegation *dp; 2931fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo = container_of(stp->st_stateowner, struct nfs4_openowner, oo_owner); 293214a24e99SJ. Bruce Fields int cb_up; 2933d24433cdSBenny Halevy int status = 0, flag = 0; 29341da177e4SLinus Torvalds 2935fe0750e5SJ. Bruce Fields cb_up = nfsd4_cb_channel_good(oo->oo_owner.so_client); 29361da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_NONE; 29377b190fecSNeilBrown open->op_recall = 0; 29387b190fecSNeilBrown switch (open->op_claim_type) { 29397b190fecSNeilBrown case NFS4_OPEN_CLAIM_PREVIOUS: 29402bf23875SJ. Bruce Fields if (!cb_up) 29417b190fecSNeilBrown open->op_recall = 1; 29427b190fecSNeilBrown flag = open->op_delegate_type; 29437b190fecSNeilBrown if (flag == NFS4_OPEN_DELEGATE_NONE) 29441da177e4SLinus Torvalds goto out; 29457b190fecSNeilBrown break; 29467b190fecSNeilBrown case NFS4_OPEN_CLAIM_NULL: 29477b190fecSNeilBrown /* Let's not give out any delegations till everyone's 29487b190fecSNeilBrown * had the chance to reclaim theirs.... */ 29495ccb0066SStanislav Kinsbursky if (locks_in_grace(net)) 29507b190fecSNeilBrown goto out; 2951dad1c067SJ. Bruce Fields if (!cb_up || !(oo->oo_flags & NFS4_OO_CONFIRMED)) 29527b190fecSNeilBrown goto out; 29531da177e4SLinus Torvalds if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE) 29541da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_WRITE; 29551da177e4SLinus Torvalds else 29561da177e4SLinus Torvalds flag = NFS4_OPEN_DELEGATE_READ; 29577b190fecSNeilBrown break; 29587b190fecSNeilBrown default: 29597b190fecSNeilBrown goto out; 29607b190fecSNeilBrown } 29611da177e4SLinus Torvalds 2962fe0750e5SJ. Bruce Fields dp = alloc_init_deleg(oo->oo_owner.so_client, stp, fh, flag); 2963dd239cc0SJ. Bruce Fields if (dp == NULL) 2964dd239cc0SJ. Bruce Fields goto out_no_deleg; 2965acfdf5c3SJ. Bruce Fields status = nfs4_set_delegation(dp, flag); 2966edab9782SJ. Bruce Fields if (status) 2967dd239cc0SJ. Bruce Fields goto out_free; 29681da177e4SLinus Torvalds 2969d5477a8dSJ. Bruce Fields memcpy(&open->op_delegate_stateid, &dp->dl_stid.sc_stateid, sizeof(dp->dl_stid.sc_stateid)); 29701da177e4SLinus Torvalds 29718c10cbdbSBenny Halevy dprintk("NFSD: delegation stateid=" STATEID_FMT "\n", 2972d5477a8dSJ. Bruce Fields STATEID_VAL(&dp->dl_stid.sc_stateid)); 29731da177e4SLinus Torvalds out: 29741da177e4SLinus Torvalds open->op_delegate_type = flag; 2975d24433cdSBenny Halevy if (flag == NFS4_OPEN_DELEGATE_NONE) { 2976d24433cdSBenny Halevy if (open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS && 2977d24433cdSBenny Halevy open->op_delegate_type != NFS4_OPEN_DELEGATE_NONE) 2978d24433cdSBenny Halevy dprintk("NFSD: WARNING: refusing delegation reclaim\n"); 2979d24433cdSBenny Halevy 29804aa8913cSBenny Halevy /* 4.1 client asking for a delegation? */ 29814aa8913cSBenny Halevy if (open->op_deleg_want) 29824aa8913cSBenny Halevy nfsd4_open_deleg_none_ext(open, status); 2983d24433cdSBenny Halevy } 2984dd239cc0SJ. Bruce Fields return; 2985dd239cc0SJ. Bruce Fields out_free: 298624ffb938SJ. Bruce Fields unhash_stid(&dp->dl_stid); 2987acfdf5c3SJ. Bruce Fields nfs4_put_delegation(dp); 2988dd239cc0SJ. Bruce Fields out_no_deleg: 2989dd239cc0SJ. Bruce Fields flag = NFS4_OPEN_DELEGATE_NONE; 2990dd239cc0SJ. Bruce Fields goto out; 29911da177e4SLinus Torvalds } 29921da177e4SLinus Torvalds 2993e27f49c3SBenny Halevy static void nfsd4_deleg_xgrade_none_ext(struct nfsd4_open *open, 2994e27f49c3SBenny Halevy struct nfs4_delegation *dp) 2995e27f49c3SBenny Halevy { 2996e27f49c3SBenny Halevy if (open->op_deleg_want == NFS4_SHARE_WANT_READ_DELEG && 2997e27f49c3SBenny Halevy dp->dl_type == NFS4_OPEN_DELEGATE_WRITE) { 2998e27f49c3SBenny Halevy open->op_delegate_type = NFS4_OPEN_DELEGATE_NONE_EXT; 2999e27f49c3SBenny Halevy open->op_why_no_deleg = WND4_NOT_SUPP_DOWNGRADE; 3000e27f49c3SBenny Halevy } else if (open->op_deleg_want == NFS4_SHARE_WANT_WRITE_DELEG && 3001e27f49c3SBenny Halevy dp->dl_type == NFS4_OPEN_DELEGATE_WRITE) { 3002e27f49c3SBenny Halevy open->op_delegate_type = NFS4_OPEN_DELEGATE_NONE_EXT; 3003e27f49c3SBenny Halevy open->op_why_no_deleg = WND4_NOT_SUPP_UPGRADE; 3004e27f49c3SBenny Halevy } 3005e27f49c3SBenny Halevy /* Otherwise the client must be confused wanting a delegation 3006e27f49c3SBenny Halevy * it already has, therefore we don't return 3007e27f49c3SBenny Halevy * NFS4_OPEN_DELEGATE_NONE_EXT and reason. 3008e27f49c3SBenny Halevy */ 3009e27f49c3SBenny Halevy } 3010e27f49c3SBenny Halevy 30111da177e4SLinus Torvalds /* 30121da177e4SLinus Torvalds * called with nfs4_lock_state() held. 30131da177e4SLinus Torvalds */ 3014b37ad28bSAl Viro __be32 30151da177e4SLinus Torvalds nfsd4_process_open2(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open) 30161da177e4SLinus Torvalds { 30176668958fSAndy Adamson struct nfsd4_compoundres *resp = rqstp->rq_resp; 301838c2f4b1SJ. Bruce Fields struct nfs4_client *cl = open->op_openowner->oo_owner.so_client; 30191da177e4SLinus Torvalds struct nfs4_file *fp = NULL; 30201da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 3021dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp = NULL; 3022567d9829SNeilBrown struct nfs4_delegation *dp = NULL; 3023b37ad28bSAl Viro __be32 status; 30241da177e4SLinus Torvalds 30251da177e4SLinus Torvalds /* 30261da177e4SLinus Torvalds * Lookup file; if found, lookup stateid and check open request, 30271da177e4SLinus Torvalds * and check for delegations in the process of being recalled. 30281da177e4SLinus Torvalds * If not found, create the nfs4_file struct 30291da177e4SLinus Torvalds */ 30301da177e4SLinus Torvalds fp = find_file(ino); 30311da177e4SLinus Torvalds if (fp) { 30321da177e4SLinus Torvalds if ((status = nfs4_check_open(fp, open, &stp))) 30331da177e4SLinus Torvalds goto out; 303438c2f4b1SJ. Bruce Fields status = nfs4_check_deleg(cl, fp, open, &dp); 3035c44c5eebSNeilBrown if (status) 3036c44c5eebSNeilBrown goto out; 30371da177e4SLinus Torvalds } else { 3038c44c5eebSNeilBrown status = nfserr_bad_stateid; 30398b289b2cSJ. Bruce Fields if (nfsd4_is_deleg_cur(open)) 3040c44c5eebSNeilBrown goto out; 30413e772463SJ. Bruce Fields status = nfserr_jukebox; 304232513b40SJ. Bruce Fields fp = open->op_file; 304332513b40SJ. Bruce Fields open->op_file = NULL; 304432513b40SJ. Bruce Fields nfsd4_init_file(fp, ino); 30451da177e4SLinus Torvalds } 30461da177e4SLinus Torvalds 30471da177e4SLinus Torvalds /* 30481da177e4SLinus Torvalds * OPEN the file, or upgrade an existing OPEN. 30491da177e4SLinus Torvalds * If truncate fails, the OPEN fails. 30501da177e4SLinus Torvalds */ 30511da177e4SLinus Torvalds if (stp) { 30521da177e4SLinus Torvalds /* Stateid was found, this is an OPEN upgrade */ 3053f9d7562fSJ. Bruce Fields status = nfs4_upgrade_open(rqstp, fp, current_fh, stp, open); 30541da177e4SLinus Torvalds if (status) 30551da177e4SLinus Torvalds goto out; 30561da177e4SLinus Torvalds } else { 30574cdc951bSJ. Bruce Fields status = nfs4_get_vfs_file(rqstp, fp, current_fh, open); 3058567d9829SNeilBrown if (status) 30591da177e4SLinus Torvalds goto out; 30604af82504SJ. Bruce Fields status = nfsd4_truncate(rqstp, current_fh, open); 30614af82504SJ. Bruce Fields if (status) 30624af82504SJ. Bruce Fields goto out; 30634cdc951bSJ. Bruce Fields stp = open->op_stp; 30644cdc951bSJ. Bruce Fields open->op_stp = NULL; 3065996e0938SJ. Bruce Fields init_open_stateid(stp, fp, open); 30661da177e4SLinus Torvalds } 3067dcef0413SJ. Bruce Fields update_stateid(&stp->st_stid.sc_stateid); 3068dcef0413SJ. Bruce Fields memcpy(&open->op_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t)); 30691da177e4SLinus Torvalds 3070d24433cdSBenny Halevy if (nfsd4_has_session(&resp->cstate)) { 3071dad1c067SJ. Bruce Fields open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED; 30726668958fSAndy Adamson 3073d24433cdSBenny Halevy if (open->op_deleg_want & NFS4_SHARE_WANT_NO_DELEG) { 3074d24433cdSBenny Halevy open->op_delegate_type = NFS4_OPEN_DELEGATE_NONE_EXT; 3075d24433cdSBenny Halevy open->op_why_no_deleg = WND4_NOT_WANTED; 3076d24433cdSBenny Halevy goto nodeleg; 3077d24433cdSBenny Halevy } 3078d24433cdSBenny Halevy } 3079d24433cdSBenny Halevy 30801da177e4SLinus Torvalds /* 30811da177e4SLinus Torvalds * Attempt to hand out a delegation. No error return, because the 30821da177e4SLinus Torvalds * OPEN succeeds even if we fail. 30831da177e4SLinus Torvalds */ 30845ccb0066SStanislav Kinsbursky nfs4_open_delegation(SVC_NET(rqstp), current_fh, open, stp); 3085d24433cdSBenny Halevy nodeleg: 30861da177e4SLinus Torvalds status = nfs_ok; 30871da177e4SLinus Torvalds 30888c10cbdbSBenny Halevy dprintk("%s: stateid=" STATEID_FMT "\n", __func__, 3089dcef0413SJ. Bruce Fields STATEID_VAL(&stp->st_stid.sc_stateid)); 30901da177e4SLinus Torvalds out: 3091d24433cdSBenny Halevy /* 4.1 client trying to upgrade/downgrade delegation? */ 3092d24433cdSBenny Halevy if (open->op_delegate_type == NFS4_OPEN_DELEGATE_NONE && dp && 3093e27f49c3SBenny Halevy open->op_deleg_want) 3094e27f49c3SBenny Halevy nfsd4_deleg_xgrade_none_ext(open, dp); 3095d24433cdSBenny Halevy 309613cd2184SNeilBrown if (fp) 309713cd2184SNeilBrown put_nfs4_file(fp); 309837515177SNeilBrown if (status == 0 && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS) 30991255a8f3SJ. Bruce Fields nfs4_set_claim_prev(open, nfsd4_has_session(&resp->cstate)); 31001da177e4SLinus Torvalds /* 31011da177e4SLinus Torvalds * To finish the open response, we just need to set the rflags. 31021da177e4SLinus Torvalds */ 31031da177e4SLinus Torvalds open->op_rflags = NFS4_OPEN_RESULT_LOCKTYPE_POSIX; 3104dad1c067SJ. Bruce Fields if (!(open->op_openowner->oo_flags & NFS4_OO_CONFIRMED) && 31056668958fSAndy Adamson !nfsd4_has_session(&resp->cstate)) 31061da177e4SLinus Torvalds open->op_rflags |= NFS4_OPEN_RESULT_CONFIRM; 31071da177e4SLinus Torvalds 31081da177e4SLinus Torvalds return status; 31091da177e4SLinus Torvalds } 31101da177e4SLinus Torvalds 3111d29b20cdSJ. Bruce Fields void nfsd4_cleanup_open_state(struct nfsd4_open *open, __be32 status) 3112d29b20cdSJ. Bruce Fields { 3113d29b20cdSJ. Bruce Fields if (open->op_openowner) { 3114d29b20cdSJ. Bruce Fields struct nfs4_openowner *oo = open->op_openowner; 3115d29b20cdSJ. Bruce Fields 3116d29b20cdSJ. Bruce Fields if (!list_empty(&oo->oo_owner.so_stateids)) 3117d29b20cdSJ. Bruce Fields list_del_init(&oo->oo_close_lru); 3118d29b20cdSJ. Bruce Fields if (oo->oo_flags & NFS4_OO_NEW) { 3119d29b20cdSJ. Bruce Fields if (status) { 3120d29b20cdSJ. Bruce Fields release_openowner(oo); 3121d29b20cdSJ. Bruce Fields open->op_openowner = NULL; 3122d29b20cdSJ. Bruce Fields } else 3123d29b20cdSJ. Bruce Fields oo->oo_flags &= ~NFS4_OO_NEW; 3124d29b20cdSJ. Bruce Fields } 3125d29b20cdSJ. Bruce Fields } 312632513b40SJ. Bruce Fields if (open->op_file) 312732513b40SJ. Bruce Fields nfsd4_free_file(open->op_file); 31284cdc951bSJ. Bruce Fields if (open->op_stp) 3129ef79859eSJ. Bruce Fields free_generic_stateid(open->op_stp); 3130d29b20cdSJ. Bruce Fields } 3131d29b20cdSJ. Bruce Fields 31329b2ef62bSJ. Bruce Fields static __be32 lookup_clientid(clientid_t *clid, bool session, struct nfsd_net *nn, struct nfs4_client **clp) 31339b2ef62bSJ. Bruce Fields { 31349b2ef62bSJ. Bruce Fields struct nfs4_client *found; 31359b2ef62bSJ. Bruce Fields 31369b2ef62bSJ. Bruce Fields if (STALE_CLIENTID(clid, nn)) 31379b2ef62bSJ. Bruce Fields return nfserr_stale_clientid; 31389b2ef62bSJ. Bruce Fields found = find_confirmed_client(clid, session, nn); 31399b2ef62bSJ. Bruce Fields if (clp) 31409b2ef62bSJ. Bruce Fields *clp = found; 31419b2ef62bSJ. Bruce Fields return found ? nfs_ok : nfserr_expired; 31429b2ef62bSJ. Bruce Fields } 31439b2ef62bSJ. Bruce Fields 3144b37ad28bSAl Viro __be32 3145b591480bSJ.Bruce Fields nfsd4_renew(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3146b591480bSJ.Bruce Fields clientid_t *clid) 31471da177e4SLinus Torvalds { 31481da177e4SLinus Torvalds struct nfs4_client *clp; 3149b37ad28bSAl Viro __be32 status; 31507f2210faSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 31511da177e4SLinus Torvalds 31521da177e4SLinus Torvalds nfs4_lock_state(); 31531da177e4SLinus Torvalds dprintk("process_renew(%08x/%08x): starting\n", 31541da177e4SLinus Torvalds clid->cl_boot, clid->cl_id); 31559b2ef62bSJ. Bruce Fields status = lookup_clientid(clid, cstate->minorversion, nn, &clp); 31569b2ef62bSJ. Bruce Fields if (status) 31571da177e4SLinus Torvalds goto out; 31581da177e4SLinus Torvalds status = nfserr_cb_path_down; 3159ea1da636SNeilBrown if (!list_empty(&clp->cl_delegations) 316077a3569dSJ. Bruce Fields && clp->cl_cb_state != NFSD4_CB_UP) 31611da177e4SLinus Torvalds goto out; 31621da177e4SLinus Torvalds status = nfs_ok; 31631da177e4SLinus Torvalds out: 31641da177e4SLinus Torvalds nfs4_unlock_state(); 31651da177e4SLinus Torvalds return status; 31661da177e4SLinus Torvalds } 31671da177e4SLinus Torvalds 3168a76b4319SNeilBrown static void 316912760c66SStanislav Kinsbursky nfsd4_end_grace(struct nfsd_net *nn) 3170a76b4319SNeilBrown { 317133dcc481SJeff Layton /* do nothing if grace period already ended */ 3172a51c84edSStanislav Kinsbursky if (nn->grace_ended) 317333dcc481SJeff Layton return; 317433dcc481SJeff Layton 3175a76b4319SNeilBrown dprintk("NFSD: end of grace period\n"); 3176a51c84edSStanislav Kinsbursky nn->grace_ended = true; 317712760c66SStanislav Kinsbursky nfsd4_record_grace_done(nn, nn->boot_time); 31785e1533c7SStanislav Kinsbursky locks_end_grace(&nn->nfsd4_manager); 3179e46b498cSJ. Bruce Fields /* 3180e46b498cSJ. Bruce Fields * Now that every NFSv4 client has had the chance to recover and 3181e46b498cSJ. Bruce Fields * to see the (possibly new, possibly shorter) lease time, we 3182e46b498cSJ. Bruce Fields * can safely set the next grace time to the current lease time: 3183e46b498cSJ. Bruce Fields */ 31845284b44eSStanislav Kinsbursky nn->nfsd4_grace = nn->nfsd4_lease; 3185a76b4319SNeilBrown } 3186a76b4319SNeilBrown 3187fd39ca9aSNeilBrown static time_t 318809121281SStanislav Kinsbursky nfs4_laundromat(struct nfsd_net *nn) 31891da177e4SLinus Torvalds { 31901da177e4SLinus Torvalds struct nfs4_client *clp; 3191fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo; 31921da177e4SLinus Torvalds struct nfs4_delegation *dp; 31931da177e4SLinus Torvalds struct list_head *pos, *next, reaplist; 31943d733711SStanislav Kinsbursky time_t cutoff = get_seconds() - nn->nfsd4_lease; 31953d733711SStanislav Kinsbursky time_t t, clientid_val = nn->nfsd4_lease; 31963d733711SStanislav Kinsbursky time_t u, test_val = nn->nfsd4_lease; 31971da177e4SLinus Torvalds 31981da177e4SLinus Torvalds nfs4_lock_state(); 31991da177e4SLinus Torvalds 32001da177e4SLinus Torvalds dprintk("NFSD: laundromat service - starting\n"); 320112760c66SStanislav Kinsbursky nfsd4_end_grace(nn); 320236acb66bSBenny Halevy INIT_LIST_HEAD(&reaplist); 3203c9a49628SStanislav Kinsbursky spin_lock(&nn->client_lock); 32045ed58bb2SStanislav Kinsbursky list_for_each_safe(pos, next, &nn->client_lru) { 32051da177e4SLinus Torvalds clp = list_entry(pos, struct nfs4_client, cl_lru); 32061da177e4SLinus Torvalds if (time_after((unsigned long)clp->cl_time, (unsigned long)cutoff)) { 32071da177e4SLinus Torvalds t = clp->cl_time - cutoff; 32081da177e4SLinus Torvalds if (clientid_val > t) 32091da177e4SLinus Torvalds clientid_val = t; 32101da177e4SLinus Torvalds break; 32111da177e4SLinus Torvalds } 3212d7682988SBenny Halevy if (atomic_read(&clp->cl_refcount)) { 3213d7682988SBenny Halevy dprintk("NFSD: client in use (clientid %08x)\n", 3214d7682988SBenny Halevy clp->cl_clientid.cl_id); 3215d7682988SBenny Halevy continue; 3216d7682988SBenny Halevy } 3217d7682988SBenny Halevy unhash_client_locked(clp); 3218d7682988SBenny Halevy list_add(&clp->cl_lru, &reaplist); 321936acb66bSBenny Halevy } 3220c9a49628SStanislav Kinsbursky spin_unlock(&nn->client_lock); 322136acb66bSBenny Halevy list_for_each_safe(pos, next, &reaplist) { 322236acb66bSBenny Halevy clp = list_entry(pos, struct nfs4_client, cl_lru); 32231da177e4SLinus Torvalds dprintk("NFSD: purging unused client (clientid %08x)\n", 32241da177e4SLinus Torvalds clp->cl_clientid.cl_id); 32251da177e4SLinus Torvalds expire_client(clp); 32261da177e4SLinus Torvalds } 32271da177e4SLinus Torvalds spin_lock(&recall_lock); 32281da177e4SLinus Torvalds list_for_each_safe(pos, next, &del_recall_lru) { 32291da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 32304e37a7c2SStanislav Kinsbursky if (net_generic(dp->dl_stid.sc_client->net, nfsd_net_id) != nn) 32314e37a7c2SStanislav Kinsbursky continue; 32321da177e4SLinus Torvalds if (time_after((unsigned long)dp->dl_time, (unsigned long)cutoff)) { 32331da177e4SLinus Torvalds u = dp->dl_time - cutoff; 32341da177e4SLinus Torvalds if (test_val > u) 32351da177e4SLinus Torvalds test_val = u; 32361da177e4SLinus Torvalds break; 32371da177e4SLinus Torvalds } 32381da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 32391da177e4SLinus Torvalds } 32401da177e4SLinus Torvalds spin_unlock(&recall_lock); 32411da177e4SLinus Torvalds list_for_each_safe(pos, next, &reaplist) { 32421da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 32431da177e4SLinus Torvalds unhash_delegation(dp); 32441da177e4SLinus Torvalds } 32453d733711SStanislav Kinsbursky test_val = nn->nfsd4_lease; 324673758fedSStanislav Kinsbursky list_for_each_safe(pos, next, &nn->close_lru) { 3247fe0750e5SJ. Bruce Fields oo = container_of(pos, struct nfs4_openowner, oo_close_lru); 3248fe0750e5SJ. Bruce Fields if (time_after((unsigned long)oo->oo_time, (unsigned long)cutoff)) { 3249fe0750e5SJ. Bruce Fields u = oo->oo_time - cutoff; 32501da177e4SLinus Torvalds if (test_val > u) 32511da177e4SLinus Torvalds test_val = u; 32521da177e4SLinus Torvalds break; 32531da177e4SLinus Torvalds } 3254fe0750e5SJ. Bruce Fields release_openowner(oo); 32551da177e4SLinus Torvalds } 32561da177e4SLinus Torvalds if (clientid_val < NFSD_LAUNDROMAT_MINTIMEOUT) 32571da177e4SLinus Torvalds clientid_val = NFSD_LAUNDROMAT_MINTIMEOUT; 32581da177e4SLinus Torvalds nfs4_unlock_state(); 32591da177e4SLinus Torvalds return clientid_val; 32601da177e4SLinus Torvalds } 32611da177e4SLinus Torvalds 3262a254b246SHarvey Harrison static struct workqueue_struct *laundry_wq; 3263a254b246SHarvey Harrison static void laundromat_main(struct work_struct *); 3264a254b246SHarvey Harrison 3265a254b246SHarvey Harrison static void 326609121281SStanislav Kinsbursky laundromat_main(struct work_struct *laundry) 32671da177e4SLinus Torvalds { 32681da177e4SLinus Torvalds time_t t; 326909121281SStanislav Kinsbursky struct delayed_work *dwork = container_of(laundry, struct delayed_work, 327009121281SStanislav Kinsbursky work); 327109121281SStanislav Kinsbursky struct nfsd_net *nn = container_of(dwork, struct nfsd_net, 327209121281SStanislav Kinsbursky laundromat_work); 32731da177e4SLinus Torvalds 327409121281SStanislav Kinsbursky t = nfs4_laundromat(nn); 32751da177e4SLinus Torvalds dprintk("NFSD: laundromat_main - sleeping for %ld seconds\n", t); 327609121281SStanislav Kinsbursky queue_delayed_work(laundry_wq, &nn->laundromat_work, t*HZ); 32771da177e4SLinus Torvalds } 32781da177e4SLinus Torvalds 3279f7a4d872SJ. Bruce Fields static inline __be32 nfs4_check_fh(struct svc_fh *fhp, struct nfs4_ol_stateid *stp) 3280f8816512SNeilBrown { 3281f7a4d872SJ. Bruce Fields if (fhp->fh_dentry->d_inode != stp->st_file->fi_inode) 3282f7a4d872SJ. Bruce Fields return nfserr_bad_stateid; 3283f7a4d872SJ. Bruce Fields return nfs_ok; 32841da177e4SLinus Torvalds } 32851da177e4SLinus Torvalds 32861da177e4SLinus Torvalds static int 32872c142baaSStanislav Kinsbursky STALE_STATEID(stateid_t *stateid, struct nfsd_net *nn) 32881da177e4SLinus Torvalds { 32892c142baaSStanislav Kinsbursky if (stateid->si_opaque.so_clid.cl_boot == nn->boot_time) 3290e4e83ea4SJ. Bruce Fields return 0; 32918c10cbdbSBenny Halevy dprintk("NFSD: stale stateid " STATEID_FMT "!\n", 32928c10cbdbSBenny Halevy STATEID_VAL(stateid)); 32931da177e4SLinus Torvalds return 1; 32941da177e4SLinus Torvalds } 32951da177e4SLinus Torvalds 32961da177e4SLinus Torvalds static inline int 329782c5ff1bSJeff Layton access_permit_read(struct nfs4_ol_stateid *stp) 32981da177e4SLinus Torvalds { 329982c5ff1bSJeff Layton return test_access(NFS4_SHARE_ACCESS_READ, stp) || 330082c5ff1bSJeff Layton test_access(NFS4_SHARE_ACCESS_BOTH, stp) || 330182c5ff1bSJeff Layton test_access(NFS4_SHARE_ACCESS_WRITE, stp); 33021da177e4SLinus Torvalds } 33031da177e4SLinus Torvalds 33041da177e4SLinus Torvalds static inline int 330582c5ff1bSJeff Layton access_permit_write(struct nfs4_ol_stateid *stp) 33061da177e4SLinus Torvalds { 330782c5ff1bSJeff Layton return test_access(NFS4_SHARE_ACCESS_WRITE, stp) || 330882c5ff1bSJeff Layton test_access(NFS4_SHARE_ACCESS_BOTH, stp); 33091da177e4SLinus Torvalds } 33101da177e4SLinus Torvalds 33111da177e4SLinus Torvalds static 3312dcef0413SJ. Bruce Fields __be32 nfs4_check_openmode(struct nfs4_ol_stateid *stp, int flags) 33131da177e4SLinus Torvalds { 3314b37ad28bSAl Viro __be32 status = nfserr_openmode; 33151da177e4SLinus Torvalds 331602921914SJ. Bruce Fields /* For lock stateid's, we test the parent open, not the lock: */ 331702921914SJ. Bruce Fields if (stp->st_openstp) 331802921914SJ. Bruce Fields stp = stp->st_openstp; 331982c5ff1bSJeff Layton if ((flags & WR_STATE) && !access_permit_write(stp)) 33201da177e4SLinus Torvalds goto out; 332182c5ff1bSJeff Layton if ((flags & RD_STATE) && !access_permit_read(stp)) 33221da177e4SLinus Torvalds goto out; 33231da177e4SLinus Torvalds status = nfs_ok; 33241da177e4SLinus Torvalds out: 33251da177e4SLinus Torvalds return status; 33261da177e4SLinus Torvalds } 33271da177e4SLinus Torvalds 3328b37ad28bSAl Viro static inline __be32 33295ccb0066SStanislav Kinsbursky check_special_stateids(struct net *net, svc_fh *current_fh, stateid_t *stateid, int flags) 33301da177e4SLinus Torvalds { 3331203a8c8eSJ. Bruce Fields if (ONE_STATEID(stateid) && (flags & RD_STATE)) 33321da177e4SLinus Torvalds return nfs_ok; 33335ccb0066SStanislav Kinsbursky else if (locks_in_grace(net)) { 333425985edcSLucas De Marchi /* Answer in remaining cases depends on existence of 33351da177e4SLinus Torvalds * conflicting state; so we must wait out the grace period. */ 33361da177e4SLinus Torvalds return nfserr_grace; 33371da177e4SLinus Torvalds } else if (flags & WR_STATE) 33381da177e4SLinus Torvalds return nfs4_share_conflict(current_fh, 33391da177e4SLinus Torvalds NFS4_SHARE_DENY_WRITE); 33401da177e4SLinus Torvalds else /* (flags & RD_STATE) && ZERO_STATEID(stateid) */ 33411da177e4SLinus Torvalds return nfs4_share_conflict(current_fh, 33421da177e4SLinus Torvalds NFS4_SHARE_DENY_READ); 33431da177e4SLinus Torvalds } 33441da177e4SLinus Torvalds 33451da177e4SLinus Torvalds /* 33461da177e4SLinus Torvalds * Allow READ/WRITE during grace period on recovered state only for files 33471da177e4SLinus Torvalds * that are not able to provide mandatory locking. 33481da177e4SLinus Torvalds */ 33491da177e4SLinus Torvalds static inline int 33505ccb0066SStanislav Kinsbursky grace_disallows_io(struct net *net, struct inode *inode) 33511da177e4SLinus Torvalds { 33525ccb0066SStanislav Kinsbursky return locks_in_grace(net) && mandatory_lock(inode); 33531da177e4SLinus Torvalds } 33541da177e4SLinus Torvalds 335581b82965SJ. Bruce Fields /* Returns true iff a is later than b: */ 335681b82965SJ. Bruce Fields static bool stateid_generation_after(stateid_t *a, stateid_t *b) 335781b82965SJ. Bruce Fields { 335881b82965SJ. Bruce Fields return (s32)a->si_generation - (s32)b->si_generation > 0; 335981b82965SJ. Bruce Fields } 336081b82965SJ. Bruce Fields 336157b7b43bSJ. Bruce Fields static __be32 check_stateid_generation(stateid_t *in, stateid_t *ref, bool has_session) 33620836f587SJ. Bruce Fields { 33636668958fSAndy Adamson /* 33646668958fSAndy Adamson * When sessions are used the stateid generation number is ignored 33656668958fSAndy Adamson * when it is zero. 33666668958fSAndy Adamson */ 336728dde241SJ. Bruce Fields if (has_session && in->si_generation == 0) 336881b82965SJ. Bruce Fields return nfs_ok; 336981b82965SJ. Bruce Fields 337081b82965SJ. Bruce Fields if (in->si_generation == ref->si_generation) 337181b82965SJ. Bruce Fields return nfs_ok; 33726668958fSAndy Adamson 33730836f587SJ. Bruce Fields /* If the client sends us a stateid from the future, it's buggy: */ 337481b82965SJ. Bruce Fields if (stateid_generation_after(in, ref)) 33750836f587SJ. Bruce Fields return nfserr_bad_stateid; 33760836f587SJ. Bruce Fields /* 337781b82965SJ. Bruce Fields * However, we could see a stateid from the past, even from a 337881b82965SJ. Bruce Fields * non-buggy client. For example, if the client sends a lock 337981b82965SJ. Bruce Fields * while some IO is outstanding, the lock may bump si_generation 338081b82965SJ. Bruce Fields * while the IO is still in flight. The client could avoid that 338181b82965SJ. Bruce Fields * situation by waiting for responses on all the IO requests, 338281b82965SJ. Bruce Fields * but better performance may result in retrying IO that 338381b82965SJ. Bruce Fields * receives an old_stateid error if requests are rarely 338481b82965SJ. Bruce Fields * reordered in flight: 33850836f587SJ. Bruce Fields */ 33860836f587SJ. Bruce Fields return nfserr_old_stateid; 33870836f587SJ. Bruce Fields } 33880836f587SJ. Bruce Fields 33897df302f7SChuck Lever static __be32 nfsd4_validate_stateid(struct nfs4_client *cl, stateid_t *stateid) 339017456804SBryan Schumaker { 339197b7e3b6SJ. Bruce Fields struct nfs4_stid *s; 339297b7e3b6SJ. Bruce Fields struct nfs4_ol_stateid *ols; 339397b7e3b6SJ. Bruce Fields __be32 status; 339417456804SBryan Schumaker 33957df302f7SChuck Lever if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) 33967df302f7SChuck Lever return nfserr_bad_stateid; 33977df302f7SChuck Lever /* Client debugging aid. */ 33987df302f7SChuck Lever if (!same_clid(&stateid->si_opaque.so_clid, &cl->cl_clientid)) { 33997df302f7SChuck Lever char addr_str[INET6_ADDRSTRLEN]; 34007df302f7SChuck Lever rpc_ntop((struct sockaddr *)&cl->cl_addr, addr_str, 34017df302f7SChuck Lever sizeof(addr_str)); 34027df302f7SChuck Lever pr_warn_ratelimited("NFSD: client %s testing state ID " 34037df302f7SChuck Lever "with incorrect client ID\n", addr_str); 34047df302f7SChuck Lever return nfserr_bad_stateid; 34057df302f7SChuck Lever } 340638c2f4b1SJ. Bruce Fields s = find_stateid(cl, stateid); 340797b7e3b6SJ. Bruce Fields if (!s) 34087df302f7SChuck Lever return nfserr_bad_stateid; 340936279ac1SJ. Bruce Fields status = check_stateid_generation(stateid, &s->sc_stateid, 1); 341017456804SBryan Schumaker if (status) 341117456804SBryan Schumaker return status; 341297b7e3b6SJ. Bruce Fields if (!(s->sc_type & (NFS4_OPEN_STID | NFS4_LOCK_STID))) 341397b7e3b6SJ. Bruce Fields return nfs_ok; 341497b7e3b6SJ. Bruce Fields ols = openlockstateid(s); 341597b7e3b6SJ. Bruce Fields if (ols->st_stateowner->so_is_open_owner 3416dad1c067SJ. Bruce Fields && !(openowner(ols->st_stateowner)->oo_flags & NFS4_OO_CONFIRMED)) 341797b7e3b6SJ. Bruce Fields return nfserr_bad_stateid; 341897b7e3b6SJ. Bruce Fields return nfs_ok; 341917456804SBryan Schumaker } 342017456804SBryan Schumaker 34213320fef1SStanislav Kinsbursky static __be32 nfsd4_lookup_stateid(stateid_t *stateid, unsigned char typemask, 34223320fef1SStanislav Kinsbursky struct nfs4_stid **s, bool sessions, 34233320fef1SStanislav Kinsbursky struct nfsd_net *nn) 342438c2f4b1SJ. Bruce Fields { 342538c2f4b1SJ. Bruce Fields struct nfs4_client *cl; 342638c2f4b1SJ. Bruce Fields 342738c2f4b1SJ. Bruce Fields if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) 342838c2f4b1SJ. Bruce Fields return nfserr_bad_stateid; 34292c142baaSStanislav Kinsbursky if (STALE_STATEID(stateid, nn)) 343038c2f4b1SJ. Bruce Fields return nfserr_stale_stateid; 34318daae4dcSStanislav Kinsbursky cl = find_confirmed_client(&stateid->si_opaque.so_clid, sessions, nn); 343238c2f4b1SJ. Bruce Fields if (!cl) 343338c2f4b1SJ. Bruce Fields return nfserr_expired; 343438c2f4b1SJ. Bruce Fields *s = find_stateid_by_type(cl, stateid, typemask); 343538c2f4b1SJ. Bruce Fields if (!*s) 343638c2f4b1SJ. Bruce Fields return nfserr_bad_stateid; 343738c2f4b1SJ. Bruce Fields return nfs_ok; 343838c2f4b1SJ. Bruce Fields 343938c2f4b1SJ. Bruce Fields } 344038c2f4b1SJ. Bruce Fields 34411da177e4SLinus Torvalds /* 34421da177e4SLinus Torvalds * Checks for stateid operations 34431da177e4SLinus Torvalds */ 3444b37ad28bSAl Viro __be32 34455ccb0066SStanislav Kinsbursky nfs4_preprocess_stateid_op(struct net *net, struct nfsd4_compound_state *cstate, 3446dd453dfdSBenny Halevy stateid_t *stateid, int flags, struct file **filpp) 34471da177e4SLinus Torvalds { 344869064a27SJ. Bruce Fields struct nfs4_stid *s; 3449dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp = NULL; 34501da177e4SLinus Torvalds struct nfs4_delegation *dp = NULL; 3451dd453dfdSBenny Halevy struct svc_fh *current_fh = &cstate->current_fh; 34521da177e4SLinus Torvalds struct inode *ino = current_fh->fh_dentry->d_inode; 34533320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 3454b37ad28bSAl Viro __be32 status; 34551da177e4SLinus Torvalds 34561da177e4SLinus Torvalds if (filpp) 34571da177e4SLinus Torvalds *filpp = NULL; 34581da177e4SLinus Torvalds 34595ccb0066SStanislav Kinsbursky if (grace_disallows_io(net, ino)) 34601da177e4SLinus Torvalds return nfserr_grace; 34611da177e4SLinus Torvalds 34621da177e4SLinus Torvalds if (ZERO_STATEID(stateid) || ONE_STATEID(stateid)) 34635ccb0066SStanislav Kinsbursky return check_special_stateids(net, current_fh, stateid, flags); 34641da177e4SLinus Torvalds 34653320fef1SStanislav Kinsbursky status = nfsd4_lookup_stateid(stateid, NFS4_DELEG_STID|NFS4_OPEN_STID|NFS4_LOCK_STID, 34663320fef1SStanislav Kinsbursky &s, cstate->minorversion, nn); 346738c2f4b1SJ. Bruce Fields if (status) 346838c2f4b1SJ. Bruce Fields return status; 346969064a27SJ. Bruce Fields status = check_stateid_generation(stateid, &s->sc_stateid, nfsd4_has_session(cstate)); 34700c2a498fSJ. Bruce Fields if (status) 34710c2a498fSJ. Bruce Fields goto out; 3472f7a4d872SJ. Bruce Fields switch (s->sc_type) { 3473f7a4d872SJ. Bruce Fields case NFS4_DELEG_STID: 347469064a27SJ. Bruce Fields dp = delegstateid(s); 3475dc9bf700SJ. Bruce Fields status = nfs4_check_delegmode(dp, flags); 3476dc9bf700SJ. Bruce Fields if (status) 3477dc9bf700SJ. Bruce Fields goto out; 347843b0178eSDan Carpenter if (filpp) { 3479acfdf5c3SJ. Bruce Fields *filpp = dp->dl_file->fi_deleg_file; 3480063b0fb9SJ. Bruce Fields if (!*filpp) { 3481063b0fb9SJ. Bruce Fields WARN_ON_ONCE(1); 3482063b0fb9SJ. Bruce Fields status = nfserr_serverfault; 3483063b0fb9SJ. Bruce Fields goto out; 3484063b0fb9SJ. Bruce Fields } 348543b0178eSDan Carpenter } 3486f7a4d872SJ. Bruce Fields break; 3487f7a4d872SJ. Bruce Fields case NFS4_OPEN_STID: 3488f7a4d872SJ. Bruce Fields case NFS4_LOCK_STID: 348969064a27SJ. Bruce Fields stp = openlockstateid(s); 3490f7a4d872SJ. Bruce Fields status = nfs4_check_fh(current_fh, stp); 3491f7a4d872SJ. Bruce Fields if (status) 34921da177e4SLinus Torvalds goto out; 3493fe0750e5SJ. Bruce Fields if (stp->st_stateowner->so_is_open_owner 3494dad1c067SJ. Bruce Fields && !(openowner(stp->st_stateowner)->oo_flags & NFS4_OO_CONFIRMED)) 34951da177e4SLinus Torvalds goto out; 3496a4455be0SJ. Bruce Fields status = nfs4_check_openmode(stp, flags); 3497a4455be0SJ. Bruce Fields if (status) 34981da177e4SLinus Torvalds goto out; 3499f9d7562fSJ. Bruce Fields if (filpp) { 3500f9d7562fSJ. Bruce Fields if (flags & RD_STATE) 3501f9d7562fSJ. Bruce Fields *filpp = find_readable_file(stp->st_file); 3502f9d7562fSJ. Bruce Fields else 3503f9d7562fSJ. Bruce Fields *filpp = find_writeable_file(stp->st_file); 3504f9d7562fSJ. Bruce Fields } 3505f7a4d872SJ. Bruce Fields break; 3506f7a4d872SJ. Bruce Fields default: 3507f7a4d872SJ. Bruce Fields return nfserr_bad_stateid; 35081da177e4SLinus Torvalds } 35091da177e4SLinus Torvalds status = nfs_ok; 35101da177e4SLinus Torvalds out: 35111da177e4SLinus Torvalds return status; 35121da177e4SLinus Torvalds } 35131da177e4SLinus Torvalds 3514e1ca12dfSBryan Schumaker static __be32 3515dcef0413SJ. Bruce Fields nfsd4_free_lock_stateid(struct nfs4_ol_stateid *stp) 3516e1ca12dfSBryan Schumaker { 3517fe0750e5SJ. Bruce Fields if (check_for_locks(stp->st_file, lockowner(stp->st_stateowner))) 3518e1ca12dfSBryan Schumaker return nfserr_locks_held; 3519e1ca12dfSBryan Schumaker release_lock_stateid(stp); 3520e1ca12dfSBryan Schumaker return nfs_ok; 3521e1ca12dfSBryan Schumaker } 3522e1ca12dfSBryan Schumaker 3523e1ca12dfSBryan Schumaker /* 352417456804SBryan Schumaker * Test if the stateid is valid 352517456804SBryan Schumaker */ 352617456804SBryan Schumaker __be32 352717456804SBryan Schumaker nfsd4_test_stateid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 352817456804SBryan Schumaker struct nfsd4_test_stateid *test_stateid) 352917456804SBryan Schumaker { 353003cfb420SBryan Schumaker struct nfsd4_test_stateid_id *stateid; 353103cfb420SBryan Schumaker struct nfs4_client *cl = cstate->session->se_client; 353203cfb420SBryan Schumaker 353303cfb420SBryan Schumaker nfs4_lock_state(); 353403cfb420SBryan Schumaker list_for_each_entry(stateid, &test_stateid->ts_stateid_list, ts_id_list) 35357df302f7SChuck Lever stateid->ts_id_status = 35367df302f7SChuck Lever nfsd4_validate_stateid(cl, &stateid->ts_id_stateid); 353703cfb420SBryan Schumaker nfs4_unlock_state(); 353803cfb420SBryan Schumaker 353917456804SBryan Schumaker return nfs_ok; 354017456804SBryan Schumaker } 354117456804SBryan Schumaker 3542e1ca12dfSBryan Schumaker __be32 3543e1ca12dfSBryan Schumaker nfsd4_free_stateid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3544e1ca12dfSBryan Schumaker struct nfsd4_free_stateid *free_stateid) 3545e1ca12dfSBryan Schumaker { 3546e1ca12dfSBryan Schumaker stateid_t *stateid = &free_stateid->fr_stateid; 35472da1cec7SJ. Bruce Fields struct nfs4_stid *s; 354838c2f4b1SJ. Bruce Fields struct nfs4_client *cl = cstate->session->se_client; 35492da1cec7SJ. Bruce Fields __be32 ret = nfserr_bad_stateid; 3550e1ca12dfSBryan Schumaker 3551e1ca12dfSBryan Schumaker nfs4_lock_state(); 355238c2f4b1SJ. Bruce Fields s = find_stateid(cl, stateid); 35532da1cec7SJ. Bruce Fields if (!s) 3554e1ca12dfSBryan Schumaker goto out; 35552da1cec7SJ. Bruce Fields switch (s->sc_type) { 35562da1cec7SJ. Bruce Fields case NFS4_DELEG_STID: 3557e1ca12dfSBryan Schumaker ret = nfserr_locks_held; 3558e1ca12dfSBryan Schumaker goto out; 35592da1cec7SJ. Bruce Fields case NFS4_OPEN_STID: 35602da1cec7SJ. Bruce Fields case NFS4_LOCK_STID: 35612da1cec7SJ. Bruce Fields ret = check_stateid_generation(stateid, &s->sc_stateid, 1); 35622da1cec7SJ. Bruce Fields if (ret) 3563e1ca12dfSBryan Schumaker goto out; 35642da1cec7SJ. Bruce Fields if (s->sc_type == NFS4_LOCK_STID) 35652da1cec7SJ. Bruce Fields ret = nfsd4_free_lock_stateid(openlockstateid(s)); 35662da1cec7SJ. Bruce Fields else 35672da1cec7SJ. Bruce Fields ret = nfserr_locks_held; 3568f7a4d872SJ. Bruce Fields break; 3569f7a4d872SJ. Bruce Fields default: 3570f7a4d872SJ. Bruce Fields ret = nfserr_bad_stateid; 3571e1ca12dfSBryan Schumaker } 3572e1ca12dfSBryan Schumaker out: 3573e1ca12dfSBryan Schumaker nfs4_unlock_state(); 3574e1ca12dfSBryan Schumaker return ret; 3575e1ca12dfSBryan Schumaker } 3576e1ca12dfSBryan Schumaker 35774c4cd222SNeilBrown static inline int 35784c4cd222SNeilBrown setlkflg (int type) 35794c4cd222SNeilBrown { 35804c4cd222SNeilBrown return (type == NFS4_READW_LT || type == NFS4_READ_LT) ? 35814c4cd222SNeilBrown RD_STATE : WR_STATE; 35824c4cd222SNeilBrown } 35831da177e4SLinus Torvalds 3584dcef0413SJ. Bruce Fields static __be32 nfs4_seqid_op_checks(struct nfsd4_compound_state *cstate, stateid_t *stateid, u32 seqid, struct nfs4_ol_stateid *stp) 3585c0a5d93eSJ. Bruce Fields { 3586c0a5d93eSJ. Bruce Fields struct svc_fh *current_fh = &cstate->current_fh; 3587c0a5d93eSJ. Bruce Fields struct nfs4_stateowner *sop = stp->st_stateowner; 3588c0a5d93eSJ. Bruce Fields __be32 status; 3589c0a5d93eSJ. Bruce Fields 3590c0a5d93eSJ. Bruce Fields status = nfsd4_check_seqid(cstate, sop, seqid); 3591c0a5d93eSJ. Bruce Fields if (status) 3592c0a5d93eSJ. Bruce Fields return status; 3593f7a4d872SJ. Bruce Fields if (stp->st_stid.sc_type == NFS4_CLOSED_STID) 3594f7a4d872SJ. Bruce Fields /* 3595f7a4d872SJ. Bruce Fields * "Closed" stateid's exist *only* to return 3596f7a4d872SJ. Bruce Fields * nfserr_replay_me from the previous step. 3597f7a4d872SJ. Bruce Fields */ 3598f7a4d872SJ. Bruce Fields return nfserr_bad_stateid; 3599f7a4d872SJ. Bruce Fields status = check_stateid_generation(stateid, &stp->st_stid.sc_stateid, nfsd4_has_session(cstate)); 3600f7a4d872SJ. Bruce Fields if (status) 3601f7a4d872SJ. Bruce Fields return status; 3602f7a4d872SJ. Bruce Fields return nfs4_check_fh(current_fh, stp); 3603c0a5d93eSJ. Bruce Fields } 3604c0a5d93eSJ. Bruce Fields 36051da177e4SLinus Torvalds /* 36061da177e4SLinus Torvalds * Checks for sequence id mutating operations. 36071da177e4SLinus Torvalds */ 3608b37ad28bSAl Viro static __be32 3609dd453dfdSBenny Halevy nfs4_preprocess_seqid_op(struct nfsd4_compound_state *cstate, u32 seqid, 36102288d0e3SJ. Bruce Fields stateid_t *stateid, char typemask, 36113320fef1SStanislav Kinsbursky struct nfs4_ol_stateid **stpp, 36123320fef1SStanislav Kinsbursky struct nfsd_net *nn) 36131da177e4SLinus Torvalds { 36140836f587SJ. Bruce Fields __be32 status; 361538c2f4b1SJ. Bruce Fields struct nfs4_stid *s; 36161da177e4SLinus Torvalds 36178c10cbdbSBenny Halevy dprintk("NFSD: %s: seqid=%d stateid = " STATEID_FMT "\n", __func__, 36188c10cbdbSBenny Halevy seqid, STATEID_VAL(stateid)); 36191da177e4SLinus Torvalds 36201da177e4SLinus Torvalds *stpp = NULL; 36213320fef1SStanislav Kinsbursky status = nfsd4_lookup_stateid(stateid, typemask, &s, 36223320fef1SStanislav Kinsbursky cstate->minorversion, nn); 3623c0a5d93eSJ. Bruce Fields if (status) 3624c0a5d93eSJ. Bruce Fields return status; 362538c2f4b1SJ. Bruce Fields *stpp = openlockstateid(s); 3626c0a5d93eSJ. Bruce Fields cstate->replay_owner = (*stpp)->st_stateowner; 36271da177e4SLinus Torvalds 3628c0a5d93eSJ. Bruce Fields return nfs4_seqid_op_checks(cstate, stateid, seqid, *stpp); 36291da177e4SLinus Torvalds } 36301da177e4SLinus Torvalds 36313320fef1SStanislav Kinsbursky static __be32 nfs4_preprocess_confirmed_seqid_op(struct nfsd4_compound_state *cstate, u32 seqid, 36323320fef1SStanislav Kinsbursky stateid_t *stateid, struct nfs4_ol_stateid **stpp, struct nfsd_net *nn) 3633c0a5d93eSJ. Bruce Fields { 3634c0a5d93eSJ. Bruce Fields __be32 status; 3635c0a5d93eSJ. Bruce Fields struct nfs4_openowner *oo; 36361da177e4SLinus Torvalds 3637c0a5d93eSJ. Bruce Fields status = nfs4_preprocess_seqid_op(cstate, seqid, stateid, 36383320fef1SStanislav Kinsbursky NFS4_OPEN_STID, stpp, nn); 36390836f587SJ. Bruce Fields if (status) 36400836f587SJ. Bruce Fields return status; 3641c0a5d93eSJ. Bruce Fields oo = openowner((*stpp)->st_stateowner); 3642dad1c067SJ. Bruce Fields if (!(oo->oo_flags & NFS4_OO_CONFIRMED)) 3643c0a5d93eSJ. Bruce Fields return nfserr_bad_stateid; 36443a4f98bbSNeilBrown return nfs_ok; 36451da177e4SLinus Torvalds } 36461da177e4SLinus Torvalds 3647b37ad28bSAl Viro __be32 3648ca364317SJ.Bruce Fields nfsd4_open_confirm(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3649a4f1706aSJ.Bruce Fields struct nfsd4_open_confirm *oc) 36501da177e4SLinus Torvalds { 3651b37ad28bSAl Viro __be32 status; 3652fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo; 3653dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 36543320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 36551da177e4SLinus Torvalds 36561da177e4SLinus Torvalds dprintk("NFSD: nfsd4_open_confirm on file %.*s\n", 3657ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3658ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 36591da177e4SLinus Torvalds 3660ca364317SJ.Bruce Fields status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0); 3661a8cddc5dSJ. Bruce Fields if (status) 3662a8cddc5dSJ. Bruce Fields return status; 36631da177e4SLinus Torvalds 36641da177e4SLinus Torvalds nfs4_lock_state(); 36651da177e4SLinus Torvalds 36669072d5c6SJ. Bruce Fields status = nfs4_preprocess_seqid_op(cstate, 3667ca364317SJ.Bruce Fields oc->oc_seqid, &oc->oc_req_stateid, 36683320fef1SStanislav Kinsbursky NFS4_OPEN_STID, &stp, nn); 36699072d5c6SJ. Bruce Fields if (status) 36701da177e4SLinus Torvalds goto out; 3671fe0750e5SJ. Bruce Fields oo = openowner(stp->st_stateowner); 367268b66e82SJ. Bruce Fields status = nfserr_bad_stateid; 3673dad1c067SJ. Bruce Fields if (oo->oo_flags & NFS4_OO_CONFIRMED) 367468b66e82SJ. Bruce Fields goto out; 3675dad1c067SJ. Bruce Fields oo->oo_flags |= NFS4_OO_CONFIRMED; 3676dcef0413SJ. Bruce Fields update_stateid(&stp->st_stid.sc_stateid); 3677dcef0413SJ. Bruce Fields memcpy(&oc->oc_resp_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t)); 36788c10cbdbSBenny Halevy dprintk("NFSD: %s: success, seqid=%d stateid=" STATEID_FMT "\n", 3679dcef0413SJ. Bruce Fields __func__, oc->oc_seqid, STATEID_VAL(&stp->st_stid.sc_stateid)); 3680c7b9a459SNeilBrown 36812a4317c5SJeff Layton nfsd4_client_record_create(oo->oo_owner.so_client); 368268b66e82SJ. Bruce Fields status = nfs_ok; 36831da177e4SLinus Torvalds out: 36845ec094c1SJ. Bruce Fields if (!cstate->replay_owner) 36851da177e4SLinus Torvalds nfs4_unlock_state(); 36861da177e4SLinus Torvalds return status; 36871da177e4SLinus Torvalds } 36881da177e4SLinus Torvalds 36896409a5a6SJ. Bruce Fields static inline void nfs4_stateid_downgrade_bit(struct nfs4_ol_stateid *stp, u32 access) 36901da177e4SLinus Torvalds { 369182c5ff1bSJeff Layton if (!test_access(access, stp)) 36926409a5a6SJ. Bruce Fields return; 36936409a5a6SJ. Bruce Fields nfs4_file_put_access(stp->st_file, nfs4_access_to_omode(access)); 369482c5ff1bSJeff Layton clear_access(access, stp); 3695f197c271SJ. Bruce Fields } 36966409a5a6SJ. Bruce Fields 36976409a5a6SJ. Bruce Fields static inline void nfs4_stateid_downgrade(struct nfs4_ol_stateid *stp, u32 to_access) 36986409a5a6SJ. Bruce Fields { 36996409a5a6SJ. Bruce Fields switch (to_access) { 37006409a5a6SJ. Bruce Fields case NFS4_SHARE_ACCESS_READ: 37016409a5a6SJ. Bruce Fields nfs4_stateid_downgrade_bit(stp, NFS4_SHARE_ACCESS_WRITE); 37026409a5a6SJ. Bruce Fields nfs4_stateid_downgrade_bit(stp, NFS4_SHARE_ACCESS_BOTH); 37036409a5a6SJ. Bruce Fields break; 37046409a5a6SJ. Bruce Fields case NFS4_SHARE_ACCESS_WRITE: 37056409a5a6SJ. Bruce Fields nfs4_stateid_downgrade_bit(stp, NFS4_SHARE_ACCESS_READ); 37066409a5a6SJ. Bruce Fields nfs4_stateid_downgrade_bit(stp, NFS4_SHARE_ACCESS_BOTH); 37076409a5a6SJ. Bruce Fields break; 37086409a5a6SJ. Bruce Fields case NFS4_SHARE_ACCESS_BOTH: 37096409a5a6SJ. Bruce Fields break; 37106409a5a6SJ. Bruce Fields default: 3711063b0fb9SJ. Bruce Fields WARN_ON_ONCE(1); 37121da177e4SLinus Torvalds } 37131da177e4SLinus Torvalds } 37141da177e4SLinus Torvalds 37151da177e4SLinus Torvalds static void 3716ce0fc43cSJeff Layton reset_union_bmap_deny(unsigned long deny, struct nfs4_ol_stateid *stp) 37171da177e4SLinus Torvalds { 37181da177e4SLinus Torvalds int i; 37191da177e4SLinus Torvalds for (i = 0; i < 4; i++) { 37201da177e4SLinus Torvalds if ((i & deny) != i) 3721ce0fc43cSJeff Layton clear_deny(i, stp); 37221da177e4SLinus Torvalds } 37231da177e4SLinus Torvalds } 37241da177e4SLinus Torvalds 3725b37ad28bSAl Viro __be32 3726ca364317SJ.Bruce Fields nfsd4_open_downgrade(struct svc_rqst *rqstp, 3727ca364317SJ.Bruce Fields struct nfsd4_compound_state *cstate, 3728a4f1706aSJ.Bruce Fields struct nfsd4_open_downgrade *od) 37291da177e4SLinus Torvalds { 3730b37ad28bSAl Viro __be32 status; 3731dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 37323320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 37331da177e4SLinus Torvalds 37341da177e4SLinus Torvalds dprintk("NFSD: nfsd4_open_downgrade on file %.*s\n", 3735ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3736ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 37371da177e4SLinus Torvalds 3738c30e92dfSJ. Bruce Fields /* We don't yet support WANT bits: */ 37392c8bd7e0SBenny Halevy if (od->od_deleg_want) 37402c8bd7e0SBenny Halevy dprintk("NFSD: %s: od_deleg_want=0x%x ignored\n", __func__, 37412c8bd7e0SBenny Halevy od->od_deleg_want); 37421da177e4SLinus Torvalds 37431da177e4SLinus Torvalds nfs4_lock_state(); 3744c0a5d93eSJ. Bruce Fields status = nfs4_preprocess_confirmed_seqid_op(cstate, od->od_seqid, 37453320fef1SStanislav Kinsbursky &od->od_stateid, &stp, nn); 37469072d5c6SJ. Bruce Fields if (status) 37471da177e4SLinus Torvalds goto out; 37481da177e4SLinus Torvalds status = nfserr_inval; 374982c5ff1bSJeff Layton if (!test_access(od->od_share_access, stp)) { 37501da177e4SLinus Torvalds dprintk("NFSD: access not a subset current bitmap: 0x%lx, input access=%08x\n", 37511da177e4SLinus Torvalds stp->st_access_bmap, od->od_share_access); 37521da177e4SLinus Torvalds goto out; 37531da177e4SLinus Torvalds } 3754ce0fc43cSJeff Layton if (!test_deny(od->od_share_deny, stp)) { 37551da177e4SLinus Torvalds dprintk("NFSD:deny not a subset current bitmap: 0x%lx, input deny=%08x\n", 37561da177e4SLinus Torvalds stp->st_deny_bmap, od->od_share_deny); 37571da177e4SLinus Torvalds goto out; 37581da177e4SLinus Torvalds } 37596409a5a6SJ. Bruce Fields nfs4_stateid_downgrade(stp, od->od_share_access); 37601da177e4SLinus Torvalds 3761ce0fc43cSJeff Layton reset_union_bmap_deny(od->od_share_deny, stp); 37621da177e4SLinus Torvalds 3763dcef0413SJ. Bruce Fields update_stateid(&stp->st_stid.sc_stateid); 3764dcef0413SJ. Bruce Fields memcpy(&od->od_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t)); 37651da177e4SLinus Torvalds status = nfs_ok; 37661da177e4SLinus Torvalds out: 37675ec094c1SJ. Bruce Fields if (!cstate->replay_owner) 37681da177e4SLinus Torvalds nfs4_unlock_state(); 37691da177e4SLinus Torvalds return status; 37701da177e4SLinus Torvalds } 37711da177e4SLinus Torvalds 377238c387b5SJ. Bruce Fields void nfsd4_purge_closed_stateid(struct nfs4_stateowner *so) 377338c387b5SJ. Bruce Fields { 377438c387b5SJ. Bruce Fields struct nfs4_openowner *oo; 377538c387b5SJ. Bruce Fields struct nfs4_ol_stateid *s; 377638c387b5SJ. Bruce Fields 377738c387b5SJ. Bruce Fields if (!so->so_is_open_owner) 377838c387b5SJ. Bruce Fields return; 377938c387b5SJ. Bruce Fields oo = openowner(so); 378038c387b5SJ. Bruce Fields s = oo->oo_last_closed_stid; 378138c387b5SJ. Bruce Fields if (!s) 378238c387b5SJ. Bruce Fields return; 378338c387b5SJ. Bruce Fields if (!(oo->oo_flags & NFS4_OO_PURGE_CLOSE)) { 378438c387b5SJ. Bruce Fields /* Release the last_closed_stid on the next seqid bump: */ 378538c387b5SJ. Bruce Fields oo->oo_flags |= NFS4_OO_PURGE_CLOSE; 378638c387b5SJ. Bruce Fields return; 378738c387b5SJ. Bruce Fields } 378838c387b5SJ. Bruce Fields oo->oo_flags &= ~NFS4_OO_PURGE_CLOSE; 3789f7a4d872SJ. Bruce Fields release_last_closed_stateid(oo); 3790f7a4d872SJ. Bruce Fields } 3791f7a4d872SJ. Bruce Fields 3792f7a4d872SJ. Bruce Fields static void nfsd4_close_open_stateid(struct nfs4_ol_stateid *s) 3793f7a4d872SJ. Bruce Fields { 3794f7a4d872SJ. Bruce Fields unhash_open_stateid(s); 3795f7a4d872SJ. Bruce Fields s->st_stid.sc_type = NFS4_CLOSED_STID; 379638c387b5SJ. Bruce Fields } 379738c387b5SJ. Bruce Fields 37981da177e4SLinus Torvalds /* 37991da177e4SLinus Torvalds * nfs4_unlock_state() called after encode 38001da177e4SLinus Torvalds */ 3801b37ad28bSAl Viro __be32 3802ca364317SJ.Bruce Fields nfsd4_close(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3803a4f1706aSJ.Bruce Fields struct nfsd4_close *close) 38041da177e4SLinus Torvalds { 3805b37ad28bSAl Viro __be32 status; 3806fe0750e5SJ. Bruce Fields struct nfs4_openowner *oo; 3807dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 38083320fef1SStanislav Kinsbursky struct net *net = SVC_NET(rqstp); 38093320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 38101da177e4SLinus Torvalds 38111da177e4SLinus Torvalds dprintk("NFSD: nfsd4_close on file %.*s\n", 3812ca364317SJ.Bruce Fields (int)cstate->current_fh.fh_dentry->d_name.len, 3813ca364317SJ.Bruce Fields cstate->current_fh.fh_dentry->d_name.name); 38141da177e4SLinus Torvalds 38151da177e4SLinus Torvalds nfs4_lock_state(); 3816f7a4d872SJ. Bruce Fields status = nfs4_preprocess_seqid_op(cstate, close->cl_seqid, 3817f7a4d872SJ. Bruce Fields &close->cl_stateid, 3818f7a4d872SJ. Bruce Fields NFS4_OPEN_STID|NFS4_CLOSED_STID, 38193320fef1SStanislav Kinsbursky &stp, nn); 38209072d5c6SJ. Bruce Fields if (status) 38211da177e4SLinus Torvalds goto out; 3822fe0750e5SJ. Bruce Fields oo = openowner(stp->st_stateowner); 38231da177e4SLinus Torvalds status = nfs_ok; 3824dcef0413SJ. Bruce Fields update_stateid(&stp->st_stid.sc_stateid); 3825dcef0413SJ. Bruce Fields memcpy(&close->cl_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t)); 38261da177e4SLinus Torvalds 3827f7a4d872SJ. Bruce Fields nfsd4_close_open_stateid(stp); 3828cf9182e9SJ. Bruce Fields release_last_closed_stateid(oo); 382938c387b5SJ. Bruce Fields oo->oo_last_closed_stid = stp; 383004ef5954SJ. Bruce Fields 383174dbafafSJ. Bruce Fields if (list_empty(&oo->oo_owner.so_stateids)) { 383274dbafafSJ. Bruce Fields if (cstate->minorversion) { 383374dbafafSJ. Bruce Fields release_openowner(oo); 383474dbafafSJ. Bruce Fields cstate->replay_owner = NULL; 383574dbafafSJ. Bruce Fields } else { 383674dbafafSJ. Bruce Fields /* 383774dbafafSJ. Bruce Fields * In the 4.0 case we need to keep the owners around a 383874dbafafSJ. Bruce Fields * little while to handle CLOSE replay. 383904ef5954SJ. Bruce Fields */ 3840fe0750e5SJ. Bruce Fields if (list_empty(&oo->oo_owner.so_stateids)) 384173758fedSStanislav Kinsbursky move_to_close_lru(oo, SVC_NET(rqstp)); 384274dbafafSJ. Bruce Fields } 384374dbafafSJ. Bruce Fields } 38441da177e4SLinus Torvalds out: 38455ec094c1SJ. Bruce Fields if (!cstate->replay_owner) 38461da177e4SLinus Torvalds nfs4_unlock_state(); 38471da177e4SLinus Torvalds return status; 38481da177e4SLinus Torvalds } 38491da177e4SLinus Torvalds 3850b37ad28bSAl Viro __be32 3851ca364317SJ.Bruce Fields nfsd4_delegreturn(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 3852ca364317SJ.Bruce Fields struct nfsd4_delegreturn *dr) 38531da177e4SLinus Torvalds { 3854203a8c8eSJ. Bruce Fields struct nfs4_delegation *dp; 3855203a8c8eSJ. Bruce Fields stateid_t *stateid = &dr->dr_stateid; 385638c2f4b1SJ. Bruce Fields struct nfs4_stid *s; 3857b37ad28bSAl Viro __be32 status; 38583320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 38591da177e4SLinus Torvalds 3860ca364317SJ.Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0))) 3861203a8c8eSJ. Bruce Fields return status; 38621da177e4SLinus Torvalds 38631da177e4SLinus Torvalds nfs4_lock_state(); 38643320fef1SStanislav Kinsbursky status = nfsd4_lookup_stateid(stateid, NFS4_DELEG_STID, &s, 38653320fef1SStanislav Kinsbursky cstate->minorversion, nn); 386638c2f4b1SJ. Bruce Fields if (status) 3867203a8c8eSJ. Bruce Fields goto out; 386838c2f4b1SJ. Bruce Fields dp = delegstateid(s); 3869d5477a8dSJ. Bruce Fields status = check_stateid_generation(stateid, &dp->dl_stid.sc_stateid, nfsd4_has_session(cstate)); 3870203a8c8eSJ. Bruce Fields if (status) 3871203a8c8eSJ. Bruce Fields goto out; 3872203a8c8eSJ. Bruce Fields 3873203a8c8eSJ. Bruce Fields unhash_delegation(dp); 38741da177e4SLinus Torvalds out: 3875203a8c8eSJ. Bruce Fields nfs4_unlock_state(); 3876203a8c8eSJ. Bruce Fields 38771da177e4SLinus Torvalds return status; 38781da177e4SLinus Torvalds } 38791da177e4SLinus Torvalds 38801da177e4SLinus Torvalds 38811da177e4SLinus Torvalds #define LOFF_OVERFLOW(start, len) ((u64)(len) > ~(u64)(start)) 38821da177e4SLinus Torvalds 3883009673b4SJ. Bruce Fields #define LOCKOWNER_INO_HASH_MASK (LOCKOWNER_INO_HASH_SIZE - 1) 38841da177e4SLinus Torvalds 388587df4de8SBenny Halevy static inline u64 388687df4de8SBenny Halevy end_offset(u64 start, u64 len) 388787df4de8SBenny Halevy { 388887df4de8SBenny Halevy u64 end; 388987df4de8SBenny Halevy 389087df4de8SBenny Halevy end = start + len; 389187df4de8SBenny Halevy return end >= start ? end: NFS4_MAX_UINT64; 389287df4de8SBenny Halevy } 389387df4de8SBenny Halevy 389487df4de8SBenny Halevy /* last octet in a range */ 389587df4de8SBenny Halevy static inline u64 389687df4de8SBenny Halevy last_byte_offset(u64 start, u64 len) 389787df4de8SBenny Halevy { 389887df4de8SBenny Halevy u64 end; 389987df4de8SBenny Halevy 3900063b0fb9SJ. Bruce Fields WARN_ON_ONCE(!len); 390187df4de8SBenny Halevy end = start + len; 390287df4de8SBenny Halevy return end > start ? end - 1: NFS4_MAX_UINT64; 390387df4de8SBenny Halevy } 390487df4de8SBenny Halevy 3905009673b4SJ. Bruce Fields static unsigned int lockowner_ino_hashval(struct inode *inode, u32 cl_id, struct xdr_netobj *ownername) 39061da177e4SLinus Torvalds { 39071da177e4SLinus Torvalds return (file_hashval(inode) + cl_id 39081da177e4SLinus Torvalds + opaque_hashval(ownername->data, ownername->len)) 3909009673b4SJ. Bruce Fields & LOCKOWNER_INO_HASH_MASK; 39101da177e4SLinus Torvalds } 39111da177e4SLinus Torvalds 39121da177e4SLinus Torvalds /* 39131da177e4SLinus Torvalds * TODO: Linux file offsets are _signed_ 64-bit quantities, which means that 39141da177e4SLinus Torvalds * we can't properly handle lock requests that go beyond the (2^63 - 1)-th 39151da177e4SLinus Torvalds * byte, because of sign extension problems. Since NFSv4 calls for 64-bit 39161da177e4SLinus Torvalds * locking, this prevents us from being completely protocol-compliant. The 39171da177e4SLinus Torvalds * real solution to this problem is to start using unsigned file offsets in 39181da177e4SLinus Torvalds * the VFS, but this is a very deep change! 39191da177e4SLinus Torvalds */ 39201da177e4SLinus Torvalds static inline void 39211da177e4SLinus Torvalds nfs4_transform_lock_offset(struct file_lock *lock) 39221da177e4SLinus Torvalds { 39231da177e4SLinus Torvalds if (lock->fl_start < 0) 39241da177e4SLinus Torvalds lock->fl_start = OFFSET_MAX; 39251da177e4SLinus Torvalds if (lock->fl_end < 0) 39261da177e4SLinus Torvalds lock->fl_end = OFFSET_MAX; 39271da177e4SLinus Torvalds } 39281da177e4SLinus Torvalds 3929d5b9026aSNeilBrown /* Hack!: For now, we're defining this just so we can use a pointer to it 3930d5b9026aSNeilBrown * as a unique cookie to identify our (NFSv4's) posix locks. */ 39317b021967SAlexey Dobriyan static const struct lock_manager_operations nfsd_posix_mng_ops = { 3932d5b9026aSNeilBrown }; 39331da177e4SLinus Torvalds 39341da177e4SLinus Torvalds static inline void 39351da177e4SLinus Torvalds nfs4_set_lock_denied(struct file_lock *fl, struct nfsd4_lock_denied *deny) 39361da177e4SLinus Torvalds { 3937fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lo; 39381da177e4SLinus Torvalds 3939d5b9026aSNeilBrown if (fl->fl_lmops == &nfsd_posix_mng_ops) { 3940fe0750e5SJ. Bruce Fields lo = (struct nfs4_lockowner *) fl->fl_owner; 3941fe0750e5SJ. Bruce Fields deny->ld_owner.data = kmemdup(lo->lo_owner.so_owner.data, 3942fe0750e5SJ. Bruce Fields lo->lo_owner.so_owner.len, GFP_KERNEL); 39437c13f344SJ. Bruce Fields if (!deny->ld_owner.data) 39447c13f344SJ. Bruce Fields /* We just don't care that much */ 39457c13f344SJ. Bruce Fields goto nevermind; 3946fe0750e5SJ. Bruce Fields deny->ld_owner.len = lo->lo_owner.so_owner.len; 3947fe0750e5SJ. Bruce Fields deny->ld_clientid = lo->lo_owner.so_client->cl_clientid; 3948d5b9026aSNeilBrown } else { 39497c13f344SJ. Bruce Fields nevermind: 39507c13f344SJ. Bruce Fields deny->ld_owner.len = 0; 39517c13f344SJ. Bruce Fields deny->ld_owner.data = NULL; 3952d5b9026aSNeilBrown deny->ld_clientid.cl_boot = 0; 3953d5b9026aSNeilBrown deny->ld_clientid.cl_id = 0; 39541da177e4SLinus Torvalds } 39551da177e4SLinus Torvalds deny->ld_start = fl->fl_start; 395687df4de8SBenny Halevy deny->ld_length = NFS4_MAX_UINT64; 395787df4de8SBenny Halevy if (fl->fl_end != NFS4_MAX_UINT64) 39581da177e4SLinus Torvalds deny->ld_length = fl->fl_end - fl->fl_start + 1; 39591da177e4SLinus Torvalds deny->ld_type = NFS4_READ_LT; 39601da177e4SLinus Torvalds if (fl->fl_type != F_RDLCK) 39611da177e4SLinus Torvalds deny->ld_type = NFS4_WRITE_LT; 39621da177e4SLinus Torvalds } 39631da177e4SLinus Torvalds 3964b93d87c1SJ. Bruce Fields static bool same_lockowner_ino(struct nfs4_lockowner *lo, struct inode *inode, clientid_t *clid, struct xdr_netobj *owner) 3965b93d87c1SJ. Bruce Fields { 3966b93d87c1SJ. Bruce Fields struct nfs4_ol_stateid *lst; 3967b93d87c1SJ. Bruce Fields 3968b93d87c1SJ. Bruce Fields if (!same_owner_str(&lo->lo_owner, owner, clid)) 3969b93d87c1SJ. Bruce Fields return false; 3970b93d87c1SJ. Bruce Fields lst = list_first_entry(&lo->lo_owner.so_stateids, 3971b93d87c1SJ. Bruce Fields struct nfs4_ol_stateid, st_perstateowner); 3972b93d87c1SJ. Bruce Fields return lst->st_file->fi_inode == inode; 3973b93d87c1SJ. Bruce Fields } 3974b93d87c1SJ. Bruce Fields 3975fe0750e5SJ. Bruce Fields static struct nfs4_lockowner * 3976fe0750e5SJ. Bruce Fields find_lockowner_str(struct inode *inode, clientid_t *clid, 397720e9e2bcSStanislav Kinsbursky struct xdr_netobj *owner, struct nfsd_net *nn) 39781da177e4SLinus Torvalds { 3979009673b4SJ. Bruce Fields unsigned int hashval = lockowner_ino_hashval(inode, clid->cl_id, owner); 3980b93d87c1SJ. Bruce Fields struct nfs4_lockowner *lo; 39811da177e4SLinus Torvalds 398220e9e2bcSStanislav Kinsbursky list_for_each_entry(lo, &nn->lockowner_ino_hashtbl[hashval], lo_owner_ino_hash) { 3983b93d87c1SJ. Bruce Fields if (same_lockowner_ino(lo, inode, clid, owner)) 3984b93d87c1SJ. Bruce Fields return lo; 39851da177e4SLinus Torvalds } 39861da177e4SLinus Torvalds return NULL; 39871da177e4SLinus Torvalds } 39881da177e4SLinus Torvalds 3989dcef0413SJ. Bruce Fields static void hash_lockowner(struct nfs4_lockowner *lo, unsigned int strhashval, struct nfs4_client *clp, struct nfs4_ol_stateid *open_stp) 3990ff194bd9SJ. Bruce Fields { 3991009673b4SJ. Bruce Fields struct inode *inode = open_stp->st_file->fi_inode; 3992009673b4SJ. Bruce Fields unsigned int inohash = lockowner_ino_hashval(inode, 3993009673b4SJ. Bruce Fields clp->cl_clientid.cl_id, &lo->lo_owner.so_owner); 39949b531137SStanislav Kinsbursky struct nfsd_net *nn = net_generic(clp->net, nfsd_net_id); 3995009673b4SJ. Bruce Fields 39969b531137SStanislav Kinsbursky list_add(&lo->lo_owner.so_strhash, &nn->ownerstr_hashtbl[strhashval]); 399720e9e2bcSStanislav Kinsbursky list_add(&lo->lo_owner_ino_hash, &nn->lockowner_ino_hashtbl[inohash]); 3998fe0750e5SJ. Bruce Fields list_add(&lo->lo_perstateid, &open_stp->st_lockowners); 3999ff194bd9SJ. Bruce Fields } 4000ff194bd9SJ. Bruce Fields 40011da177e4SLinus Torvalds /* 40021da177e4SLinus Torvalds * Alloc a lock owner structure. 40031da177e4SLinus Torvalds * Called in nfsd4_lock - therefore, OPEN and OPEN_CONFIRM (if needed) has 400425985edcSLucas De Marchi * occurred. 40051da177e4SLinus Torvalds * 400616bfdaafSJ. Bruce Fields * strhashval = ownerstr_hashval 40071da177e4SLinus Torvalds */ 40081da177e4SLinus Torvalds 4009fe0750e5SJ. Bruce Fields static struct nfs4_lockowner * 4010dcef0413SJ. Bruce Fields alloc_init_lock_stateowner(unsigned int strhashval, struct nfs4_client *clp, struct nfs4_ol_stateid *open_stp, struct nfsd4_lock *lock) { 4011fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lo; 40121da177e4SLinus Torvalds 4013fe0750e5SJ. Bruce Fields lo = alloc_stateowner(lockowner_slab, &lock->lk_new_owner, clp); 4014fe0750e5SJ. Bruce Fields if (!lo) 40151da177e4SLinus Torvalds return NULL; 4016fe0750e5SJ. Bruce Fields INIT_LIST_HEAD(&lo->lo_owner.so_stateids); 4017fe0750e5SJ. Bruce Fields lo->lo_owner.so_is_open_owner = 0; 4018b59e3c0eSNeil Brown /* It is the openowner seqid that will be incremented in encode in the 4019b59e3c0eSNeil Brown * case of new lockowners; so increment the lock seqid manually: */ 4020fe0750e5SJ. Bruce Fields lo->lo_owner.so_seqid = lock->lk_new_lock_seqid + 1; 4021fe0750e5SJ. Bruce Fields hash_lockowner(lo, strhashval, clp, open_stp); 4022fe0750e5SJ. Bruce Fields return lo; 40231da177e4SLinus Torvalds } 40241da177e4SLinus Torvalds 4025dcef0413SJ. Bruce Fields static struct nfs4_ol_stateid * 4026dcef0413SJ. Bruce Fields alloc_init_lock_stateid(struct nfs4_lockowner *lo, struct nfs4_file *fp, struct nfs4_ol_stateid *open_stp) 40271da177e4SLinus Torvalds { 4028dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 4029d3b313a4SJ. Bruce Fields struct nfs4_client *clp = lo->lo_owner.so_client; 40301da177e4SLinus Torvalds 4031996e0938SJ. Bruce Fields stp = nfs4_alloc_stateid(clp); 40325ac049acSNeilBrown if (stp == NULL) 40336136d2b4SJ. Bruce Fields return NULL; 4034996e0938SJ. Bruce Fields init_stid(&stp->st_stid, clp, NFS4_LOCK_STID); 40358beefa24SNeilBrown list_add(&stp->st_perfile, &fp->fi_stateids); 4036fe0750e5SJ. Bruce Fields list_add(&stp->st_perstateowner, &lo->lo_owner.so_stateids); 4037fe0750e5SJ. Bruce Fields stp->st_stateowner = &lo->lo_owner; 403813cd2184SNeilBrown get_nfs4_file(fp); 40391da177e4SLinus Torvalds stp->st_file = fp; 40400997b173SJ. Bruce Fields stp->st_access_bmap = 0; 40411da177e4SLinus Torvalds stp->st_deny_bmap = open_stp->st_deny_bmap; 40424c4cd222SNeilBrown stp->st_openstp = open_stp; 40431da177e4SLinus Torvalds return stp; 40441da177e4SLinus Torvalds } 40451da177e4SLinus Torvalds 4046fd39ca9aSNeilBrown static int 40471da177e4SLinus Torvalds check_lock_length(u64 offset, u64 length) 40481da177e4SLinus Torvalds { 404987df4de8SBenny Halevy return ((length == 0) || ((length != NFS4_MAX_UINT64) && 40501da177e4SLinus Torvalds LOFF_OVERFLOW(offset, length))); 40511da177e4SLinus Torvalds } 40521da177e4SLinus Torvalds 4053dcef0413SJ. Bruce Fields static void get_lock_access(struct nfs4_ol_stateid *lock_stp, u32 access) 40540997b173SJ. Bruce Fields { 40550997b173SJ. Bruce Fields struct nfs4_file *fp = lock_stp->st_file; 40560997b173SJ. Bruce Fields int oflag = nfs4_access_to_omode(access); 40570997b173SJ. Bruce Fields 405882c5ff1bSJeff Layton if (test_access(access, lock_stp)) 40590997b173SJ. Bruce Fields return; 40600997b173SJ. Bruce Fields nfs4_file_get_access(fp, oflag); 406182c5ff1bSJeff Layton set_access(access, lock_stp); 40620997b173SJ. Bruce Fields } 40630997b173SJ. Bruce Fields 40642355c596SJ. Bruce Fields static __be32 lookup_or_create_lock_state(struct nfsd4_compound_state *cstate, struct nfs4_ol_stateid *ost, struct nfsd4_lock *lock, struct nfs4_ol_stateid **lst, bool *new) 406564a284d0SJ. Bruce Fields { 406664a284d0SJ. Bruce Fields struct nfs4_file *fi = ost->st_file; 406764a284d0SJ. Bruce Fields struct nfs4_openowner *oo = openowner(ost->st_stateowner); 406864a284d0SJ. Bruce Fields struct nfs4_client *cl = oo->oo_owner.so_client; 406964a284d0SJ. Bruce Fields struct nfs4_lockowner *lo; 407064a284d0SJ. Bruce Fields unsigned int strhashval; 407120e9e2bcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(cl->net, nfsd_net_id); 407264a284d0SJ. Bruce Fields 407320e9e2bcSStanislav Kinsbursky lo = find_lockowner_str(fi->fi_inode, &cl->cl_clientid, 407420e9e2bcSStanislav Kinsbursky &lock->v.new.owner, nn); 407564a284d0SJ. Bruce Fields if (lo) { 407664a284d0SJ. Bruce Fields if (!cstate->minorversion) 407764a284d0SJ. Bruce Fields return nfserr_bad_seqid; 407864a284d0SJ. Bruce Fields /* XXX: a lockowner always has exactly one stateid: */ 407964a284d0SJ. Bruce Fields *lst = list_first_entry(&lo->lo_owner.so_stateids, 408064a284d0SJ. Bruce Fields struct nfs4_ol_stateid, st_perstateowner); 408164a284d0SJ. Bruce Fields return nfs_ok; 408264a284d0SJ. Bruce Fields } 408316bfdaafSJ. Bruce Fields strhashval = ownerstr_hashval(cl->cl_clientid.cl_id, 408464a284d0SJ. Bruce Fields &lock->v.new.owner); 408564a284d0SJ. Bruce Fields lo = alloc_init_lock_stateowner(strhashval, cl, ost, lock); 408664a284d0SJ. Bruce Fields if (lo == NULL) 408764a284d0SJ. Bruce Fields return nfserr_jukebox; 408864a284d0SJ. Bruce Fields *lst = alloc_init_lock_stateid(lo, fi, ost); 408964a284d0SJ. Bruce Fields if (*lst == NULL) { 409064a284d0SJ. Bruce Fields release_lockowner(lo); 409164a284d0SJ. Bruce Fields return nfserr_jukebox; 409264a284d0SJ. Bruce Fields } 409364a284d0SJ. Bruce Fields *new = true; 409464a284d0SJ. Bruce Fields return nfs_ok; 409564a284d0SJ. Bruce Fields } 409664a284d0SJ. Bruce Fields 40971da177e4SLinus Torvalds /* 40981da177e4SLinus Torvalds * LOCK operation 40991da177e4SLinus Torvalds */ 4100b37ad28bSAl Viro __be32 4101ca364317SJ.Bruce Fields nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4102a4f1706aSJ.Bruce Fields struct nfsd4_lock *lock) 41031da177e4SLinus Torvalds { 4104fe0750e5SJ. Bruce Fields struct nfs4_openowner *open_sop = NULL; 4105fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lock_sop = NULL; 4106dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *lock_stp; 41077d947842SJ. Bruce Fields struct file *filp = NULL; 410821179d81SJeff Layton struct file_lock *file_lock = NULL; 410921179d81SJeff Layton struct file_lock *conflock = NULL; 4110b37ad28bSAl Viro __be32 status = 0; 411164a284d0SJ. Bruce Fields bool new_state = false; 4112b34f27aaSJ. Bruce Fields int lkflg; 4113b8dd7b9aSAl Viro int err; 41143320fef1SStanislav Kinsbursky struct net *net = SVC_NET(rqstp); 41153320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 41161da177e4SLinus Torvalds 41171da177e4SLinus Torvalds dprintk("NFSD: nfsd4_lock: start=%Ld length=%Ld\n", 41181da177e4SLinus Torvalds (long long) lock->lk_offset, 41191da177e4SLinus Torvalds (long long) lock->lk_length); 41201da177e4SLinus Torvalds 41211da177e4SLinus Torvalds if (check_lock_length(lock->lk_offset, lock->lk_length)) 41221da177e4SLinus Torvalds return nfserr_inval; 41231da177e4SLinus Torvalds 4124ca364317SJ.Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, 41258837abcaSMiklos Szeredi S_IFREG, NFSD_MAY_LOCK))) { 4126a6f6ef2fSAndy Adamson dprintk("NFSD: nfsd4_lock: permission denied!\n"); 4127a6f6ef2fSAndy Adamson return status; 4128a6f6ef2fSAndy Adamson } 4129a6f6ef2fSAndy Adamson 41301da177e4SLinus Torvalds nfs4_lock_state(); 41311da177e4SLinus Torvalds 41321da177e4SLinus Torvalds if (lock->lk_is_new) { 4133dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *open_stp = NULL; 41341da177e4SLinus Torvalds 4135684e5638SJ. Bruce Fields if (nfsd4_has_session(cstate)) 4136684e5638SJ. Bruce Fields /* See rfc 5661 18.10.3: given clientid is ignored: */ 4137684e5638SJ. Bruce Fields memcpy(&lock->v.new.clientid, 4138684e5638SJ. Bruce Fields &cstate->session->se_client->cl_clientid, 4139684e5638SJ. Bruce Fields sizeof(clientid_t)); 4140684e5638SJ. Bruce Fields 41411da177e4SLinus Torvalds status = nfserr_stale_clientid; 41422c142baaSStanislav Kinsbursky if (STALE_CLIENTID(&lock->lk_new_clientid, nn)) 41431da177e4SLinus Torvalds goto out; 41441da177e4SLinus Torvalds 41451da177e4SLinus Torvalds /* validate and update open stateid and open seqid */ 4146c0a5d93eSJ. Bruce Fields status = nfs4_preprocess_confirmed_seqid_op(cstate, 41471da177e4SLinus Torvalds lock->lk_new_open_seqid, 41481da177e4SLinus Torvalds &lock->lk_new_open_stateid, 41493320fef1SStanislav Kinsbursky &open_stp, nn); 415037515177SNeilBrown if (status) 41511da177e4SLinus Torvalds goto out; 4152fe0750e5SJ. Bruce Fields open_sop = openowner(open_stp->st_stateowner); 4153b34f27aaSJ. Bruce Fields status = nfserr_bad_stateid; 4154684e5638SJ. Bruce Fields if (!same_clid(&open_sop->oo_owner.so_client->cl_clientid, 4155b34f27aaSJ. Bruce Fields &lock->v.new.clientid)) 4156b34f27aaSJ. Bruce Fields goto out; 415764a284d0SJ. Bruce Fields status = lookup_or_create_lock_state(cstate, open_stp, lock, 415864a284d0SJ. Bruce Fields &lock_stp, &new_state); 4159e1aaa891SJ. Bruce Fields } else 4160dd453dfdSBenny Halevy status = nfs4_preprocess_seqid_op(cstate, 41611da177e4SLinus Torvalds lock->lk_old_lock_seqid, 41621da177e4SLinus Torvalds &lock->lk_old_lock_stateid, 41633320fef1SStanislav Kinsbursky NFS4_LOCK_STID, &lock_stp, nn); 41641da177e4SLinus Torvalds if (status) 41651da177e4SLinus Torvalds goto out; 4166fe0750e5SJ. Bruce Fields lock_sop = lockowner(lock_stp->st_stateowner); 41671da177e4SLinus Torvalds 4168b34f27aaSJ. Bruce Fields lkflg = setlkflg(lock->lk_type); 4169b34f27aaSJ. Bruce Fields status = nfs4_check_openmode(lock_stp, lkflg); 4170b34f27aaSJ. Bruce Fields if (status) 4171b34f27aaSJ. Bruce Fields goto out; 4172b34f27aaSJ. Bruce Fields 41730dd395dcSNeilBrown status = nfserr_grace; 41743320fef1SStanislav Kinsbursky if (locks_in_grace(net) && !lock->lk_reclaim) 41750dd395dcSNeilBrown goto out; 41760dd395dcSNeilBrown status = nfserr_no_grace; 41773320fef1SStanislav Kinsbursky if (!locks_in_grace(net) && lock->lk_reclaim) 41780dd395dcSNeilBrown goto out; 41790dd395dcSNeilBrown 418021179d81SJeff Layton file_lock = locks_alloc_lock(); 418121179d81SJeff Layton if (!file_lock) { 418221179d81SJeff Layton dprintk("NFSD: %s: unable to allocate lock!\n", __func__); 418321179d81SJeff Layton status = nfserr_jukebox; 418421179d81SJeff Layton goto out; 418521179d81SJeff Layton } 418621179d81SJeff Layton 418721179d81SJeff Layton locks_init_lock(file_lock); 41881da177e4SLinus Torvalds switch (lock->lk_type) { 41891da177e4SLinus Torvalds case NFS4_READ_LT: 41901da177e4SLinus Torvalds case NFS4_READW_LT: 4191f9d7562fSJ. Bruce Fields filp = find_readable_file(lock_stp->st_file); 41920997b173SJ. Bruce Fields if (filp) 41930997b173SJ. Bruce Fields get_lock_access(lock_stp, NFS4_SHARE_ACCESS_READ); 419421179d81SJeff Layton file_lock->fl_type = F_RDLCK; 41951da177e4SLinus Torvalds break; 41961da177e4SLinus Torvalds case NFS4_WRITE_LT: 41971da177e4SLinus Torvalds case NFS4_WRITEW_LT: 4198f9d7562fSJ. Bruce Fields filp = find_writeable_file(lock_stp->st_file); 41990997b173SJ. Bruce Fields if (filp) 42000997b173SJ. Bruce Fields get_lock_access(lock_stp, NFS4_SHARE_ACCESS_WRITE); 420121179d81SJeff Layton file_lock->fl_type = F_WRLCK; 42021da177e4SLinus Torvalds break; 42031da177e4SLinus Torvalds default: 42041da177e4SLinus Torvalds status = nfserr_inval; 42051da177e4SLinus Torvalds goto out; 42061da177e4SLinus Torvalds } 4207f9d7562fSJ. Bruce Fields if (!filp) { 4208f9d7562fSJ. Bruce Fields status = nfserr_openmode; 4209f9d7562fSJ. Bruce Fields goto out; 4210f9d7562fSJ. Bruce Fields } 421121179d81SJeff Layton file_lock->fl_owner = (fl_owner_t)lock_sop; 421221179d81SJeff Layton file_lock->fl_pid = current->tgid; 421321179d81SJeff Layton file_lock->fl_file = filp; 421421179d81SJeff Layton file_lock->fl_flags = FL_POSIX; 421521179d81SJeff Layton file_lock->fl_lmops = &nfsd_posix_mng_ops; 421621179d81SJeff Layton file_lock->fl_start = lock->lk_offset; 421721179d81SJeff Layton file_lock->fl_end = last_byte_offset(lock->lk_offset, lock->lk_length); 421821179d81SJeff Layton nfs4_transform_lock_offset(file_lock); 42191da177e4SLinus Torvalds 422021179d81SJeff Layton conflock = locks_alloc_lock(); 422121179d81SJeff Layton if (!conflock) { 422221179d81SJeff Layton dprintk("NFSD: %s: unable to allocate lock!\n", __func__); 422321179d81SJeff Layton status = nfserr_jukebox; 422421179d81SJeff Layton goto out; 422521179d81SJeff Layton } 42261da177e4SLinus Torvalds 422721179d81SJeff Layton err = vfs_lock_file(filp, F_SETLK, file_lock, conflock); 4228b8dd7b9aSAl Viro switch (-err) { 42291da177e4SLinus Torvalds case 0: /* success! */ 4230dcef0413SJ. Bruce Fields update_stateid(&lock_stp->st_stid.sc_stateid); 4231dcef0413SJ. Bruce Fields memcpy(&lock->lk_resp_stateid, &lock_stp->st_stid.sc_stateid, 42321da177e4SLinus Torvalds sizeof(stateid_t)); 4233b8dd7b9aSAl Viro status = 0; 4234eb76b3fdSAndy Adamson break; 4235eb76b3fdSAndy Adamson case (EAGAIN): /* conflock holds conflicting lock */ 4236eb76b3fdSAndy Adamson status = nfserr_denied; 4237eb76b3fdSAndy Adamson dprintk("NFSD: nfsd4_lock: conflicting lock found!\n"); 423821179d81SJeff Layton nfs4_set_lock_denied(conflock, &lock->lk_denied); 4239eb76b3fdSAndy Adamson break; 42401da177e4SLinus Torvalds case (EDEADLK): 42411da177e4SLinus Torvalds status = nfserr_deadlock; 4242eb76b3fdSAndy Adamson break; 42431da177e4SLinus Torvalds default: 4244fd85b817SMarc Eshel dprintk("NFSD: nfsd4_lock: vfs_lock_file() failed! status %d\n",err); 42453e772463SJ. Bruce Fields status = nfserrno(err); 4246eb76b3fdSAndy Adamson break; 42471da177e4SLinus Torvalds } 42481da177e4SLinus Torvalds out: 424964a284d0SJ. Bruce Fields if (status && new_state) 4250f044ff83SJ. Bruce Fields release_lockowner(lock_sop); 42515ec094c1SJ. Bruce Fields if (!cstate->replay_owner) 42521da177e4SLinus Torvalds nfs4_unlock_state(); 425321179d81SJeff Layton if (file_lock) 425421179d81SJeff Layton locks_free_lock(file_lock); 425521179d81SJeff Layton if (conflock) 425621179d81SJeff Layton locks_free_lock(conflock); 42571da177e4SLinus Torvalds return status; 42581da177e4SLinus Torvalds } 42591da177e4SLinus Torvalds 42601da177e4SLinus Torvalds /* 426155ef1274SJ. Bruce Fields * The NFSv4 spec allows a client to do a LOCKT without holding an OPEN, 426255ef1274SJ. Bruce Fields * so we do a temporary open here just to get an open file to pass to 426355ef1274SJ. Bruce Fields * vfs_test_lock. (Arguably perhaps test_lock should be done with an 426455ef1274SJ. Bruce Fields * inode operation.) 426555ef1274SJ. Bruce Fields */ 426604da6e9dSAl Viro static __be32 nfsd_test_lock(struct svc_rqst *rqstp, struct svc_fh *fhp, struct file_lock *lock) 426755ef1274SJ. Bruce Fields { 426855ef1274SJ. Bruce Fields struct file *file; 426904da6e9dSAl Viro __be32 err = nfsd_open(rqstp, fhp, S_IFREG, NFSD_MAY_READ, &file); 427004da6e9dSAl Viro if (!err) { 427104da6e9dSAl Viro err = nfserrno(vfs_test_lock(file, lock)); 427255ef1274SJ. Bruce Fields nfsd_close(file); 427304da6e9dSAl Viro } 427455ef1274SJ. Bruce Fields return err; 427555ef1274SJ. Bruce Fields } 427655ef1274SJ. Bruce Fields 427755ef1274SJ. Bruce Fields /* 42781da177e4SLinus Torvalds * LOCKT operation 42791da177e4SLinus Torvalds */ 4280b37ad28bSAl Viro __be32 4281ca364317SJ.Bruce Fields nfsd4_lockt(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4282ca364317SJ.Bruce Fields struct nfsd4_lockt *lockt) 42831da177e4SLinus Torvalds { 42841da177e4SLinus Torvalds struct inode *inode; 428521179d81SJeff Layton struct file_lock *file_lock = NULL; 4286fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lo; 4287b37ad28bSAl Viro __be32 status; 42887f2210faSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 42891da177e4SLinus Torvalds 42905ccb0066SStanislav Kinsbursky if (locks_in_grace(SVC_NET(rqstp))) 42911da177e4SLinus Torvalds return nfserr_grace; 42921da177e4SLinus Torvalds 42931da177e4SLinus Torvalds if (check_lock_length(lockt->lt_offset, lockt->lt_length)) 42941da177e4SLinus Torvalds return nfserr_inval; 42951da177e4SLinus Torvalds 42961da177e4SLinus Torvalds nfs4_lock_state(); 42971da177e4SLinus Torvalds 42989b2ef62bSJ. Bruce Fields if (!nfsd4_has_session(cstate)) { 42999b2ef62bSJ. Bruce Fields status = lookup_clientid(&lockt->lt_clientid, false, nn, NULL); 43009b2ef62bSJ. Bruce Fields if (status) 43011da177e4SLinus Torvalds goto out; 43029b2ef62bSJ. Bruce Fields } 43031da177e4SLinus Torvalds 430475c096f7SJ. Bruce Fields if ((status = fh_verify(rqstp, &cstate->current_fh, S_IFREG, 0))) 43051da177e4SLinus Torvalds goto out; 43061da177e4SLinus Torvalds 4307ca364317SJ.Bruce Fields inode = cstate->current_fh.fh_dentry->d_inode; 430821179d81SJeff Layton file_lock = locks_alloc_lock(); 430921179d81SJeff Layton if (!file_lock) { 431021179d81SJeff Layton dprintk("NFSD: %s: unable to allocate lock!\n", __func__); 431121179d81SJeff Layton status = nfserr_jukebox; 431221179d81SJeff Layton goto out; 431321179d81SJeff Layton } 431421179d81SJeff Layton locks_init_lock(file_lock); 43151da177e4SLinus Torvalds switch (lockt->lt_type) { 43161da177e4SLinus Torvalds case NFS4_READ_LT: 43171da177e4SLinus Torvalds case NFS4_READW_LT: 431821179d81SJeff Layton file_lock->fl_type = F_RDLCK; 43191da177e4SLinus Torvalds break; 43201da177e4SLinus Torvalds case NFS4_WRITE_LT: 43211da177e4SLinus Torvalds case NFS4_WRITEW_LT: 432221179d81SJeff Layton file_lock->fl_type = F_WRLCK; 43231da177e4SLinus Torvalds break; 43241da177e4SLinus Torvalds default: 43252fdada03SJ. Bruce Fields dprintk("NFSD: nfs4_lockt: bad lock type!\n"); 43261da177e4SLinus Torvalds status = nfserr_inval; 43271da177e4SLinus Torvalds goto out; 43281da177e4SLinus Torvalds } 43291da177e4SLinus Torvalds 433020e9e2bcSStanislav Kinsbursky lo = find_lockowner_str(inode, &lockt->lt_clientid, &lockt->lt_owner, nn); 4331fe0750e5SJ. Bruce Fields if (lo) 433221179d81SJeff Layton file_lock->fl_owner = (fl_owner_t)lo; 433321179d81SJeff Layton file_lock->fl_pid = current->tgid; 433421179d81SJeff Layton file_lock->fl_flags = FL_POSIX; 43351da177e4SLinus Torvalds 433621179d81SJeff Layton file_lock->fl_start = lockt->lt_offset; 433721179d81SJeff Layton file_lock->fl_end = last_byte_offset(lockt->lt_offset, lockt->lt_length); 43381da177e4SLinus Torvalds 433921179d81SJeff Layton nfs4_transform_lock_offset(file_lock); 43401da177e4SLinus Torvalds 434121179d81SJeff Layton status = nfsd_test_lock(rqstp, &cstate->current_fh, file_lock); 434204da6e9dSAl Viro if (status) 4343fd85b817SMarc Eshel goto out; 434404da6e9dSAl Viro 434521179d81SJeff Layton if (file_lock->fl_type != F_UNLCK) { 43461da177e4SLinus Torvalds status = nfserr_denied; 434721179d81SJeff Layton nfs4_set_lock_denied(file_lock, &lockt->lt_denied); 43481da177e4SLinus Torvalds } 43491da177e4SLinus Torvalds out: 43501da177e4SLinus Torvalds nfs4_unlock_state(); 435121179d81SJeff Layton if (file_lock) 435221179d81SJeff Layton locks_free_lock(file_lock); 43531da177e4SLinus Torvalds return status; 43541da177e4SLinus Torvalds } 43551da177e4SLinus Torvalds 4356b37ad28bSAl Viro __be32 4357ca364317SJ.Bruce Fields nfsd4_locku(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 4358a4f1706aSJ.Bruce Fields struct nfsd4_locku *locku) 43591da177e4SLinus Torvalds { 4360dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 43611da177e4SLinus Torvalds struct file *filp = NULL; 436221179d81SJeff Layton struct file_lock *file_lock = NULL; 4363b37ad28bSAl Viro __be32 status; 4364b8dd7b9aSAl Viro int err; 43653320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 43661da177e4SLinus Torvalds 43671da177e4SLinus Torvalds dprintk("NFSD: nfsd4_locku: start=%Ld length=%Ld\n", 43681da177e4SLinus Torvalds (long long) locku->lu_offset, 43691da177e4SLinus Torvalds (long long) locku->lu_length); 43701da177e4SLinus Torvalds 43711da177e4SLinus Torvalds if (check_lock_length(locku->lu_offset, locku->lu_length)) 43721da177e4SLinus Torvalds return nfserr_inval; 43731da177e4SLinus Torvalds 43741da177e4SLinus Torvalds nfs4_lock_state(); 43751da177e4SLinus Torvalds 43769072d5c6SJ. Bruce Fields status = nfs4_preprocess_seqid_op(cstate, locku->lu_seqid, 43773320fef1SStanislav Kinsbursky &locku->lu_stateid, NFS4_LOCK_STID, 43783320fef1SStanislav Kinsbursky &stp, nn); 43799072d5c6SJ. Bruce Fields if (status) 43801da177e4SLinus Torvalds goto out; 4381f9d7562fSJ. Bruce Fields filp = find_any_file(stp->st_file); 4382f9d7562fSJ. Bruce Fields if (!filp) { 4383f9d7562fSJ. Bruce Fields status = nfserr_lock_range; 4384f9d7562fSJ. Bruce Fields goto out; 4385f9d7562fSJ. Bruce Fields } 438621179d81SJeff Layton file_lock = locks_alloc_lock(); 438721179d81SJeff Layton if (!file_lock) { 438821179d81SJeff Layton dprintk("NFSD: %s: unable to allocate lock!\n", __func__); 438921179d81SJeff Layton status = nfserr_jukebox; 439021179d81SJeff Layton goto out; 439121179d81SJeff Layton } 439221179d81SJeff Layton locks_init_lock(file_lock); 439321179d81SJeff Layton file_lock->fl_type = F_UNLCK; 439421179d81SJeff Layton file_lock->fl_owner = (fl_owner_t)lockowner(stp->st_stateowner); 439521179d81SJeff Layton file_lock->fl_pid = current->tgid; 439621179d81SJeff Layton file_lock->fl_file = filp; 439721179d81SJeff Layton file_lock->fl_flags = FL_POSIX; 439821179d81SJeff Layton file_lock->fl_lmops = &nfsd_posix_mng_ops; 439921179d81SJeff Layton file_lock->fl_start = locku->lu_offset; 44001da177e4SLinus Torvalds 440121179d81SJeff Layton file_lock->fl_end = last_byte_offset(locku->lu_offset, 440221179d81SJeff Layton locku->lu_length); 440321179d81SJeff Layton nfs4_transform_lock_offset(file_lock); 44041da177e4SLinus Torvalds 44051da177e4SLinus Torvalds /* 44061da177e4SLinus Torvalds * Try to unlock the file in the VFS. 44071da177e4SLinus Torvalds */ 440821179d81SJeff Layton err = vfs_lock_file(filp, F_SETLK, file_lock, NULL); 4409b8dd7b9aSAl Viro if (err) { 4410fd85b817SMarc Eshel dprintk("NFSD: nfs4_locku: vfs_lock_file failed!\n"); 44111da177e4SLinus Torvalds goto out_nfserr; 44121da177e4SLinus Torvalds } 44131da177e4SLinus Torvalds /* 44141da177e4SLinus Torvalds * OK, unlock succeeded; the only thing left to do is update the stateid. 44151da177e4SLinus Torvalds */ 4416dcef0413SJ. Bruce Fields update_stateid(&stp->st_stid.sc_stateid); 4417dcef0413SJ. Bruce Fields memcpy(&locku->lu_stateid, &stp->st_stid.sc_stateid, sizeof(stateid_t)); 44181da177e4SLinus Torvalds 44191da177e4SLinus Torvalds out: 442071c3bcd7SJ. Bruce Fields if (!cstate->replay_owner) 44211da177e4SLinus Torvalds nfs4_unlock_state(); 442221179d81SJeff Layton if (file_lock) 442321179d81SJeff Layton locks_free_lock(file_lock); 44241da177e4SLinus Torvalds return status; 44251da177e4SLinus Torvalds 44261da177e4SLinus Torvalds out_nfserr: 4427b8dd7b9aSAl Viro status = nfserrno(err); 44281da177e4SLinus Torvalds goto out; 44291da177e4SLinus Torvalds } 44301da177e4SLinus Torvalds 44311da177e4SLinus Torvalds /* 44321da177e4SLinus Torvalds * returns 44331da177e4SLinus Torvalds * 1: locks held by lockowner 44341da177e4SLinus Torvalds * 0: no locks held by lockowner 44351da177e4SLinus Torvalds */ 44361da177e4SLinus Torvalds static int 4437fe0750e5SJ. Bruce Fields check_for_locks(struct nfs4_file *filp, struct nfs4_lockowner *lowner) 44381da177e4SLinus Torvalds { 44391da177e4SLinus Torvalds struct file_lock **flpp; 4440f9d7562fSJ. Bruce Fields struct inode *inode = filp->fi_inode; 44411da177e4SLinus Torvalds int status = 0; 44421da177e4SLinus Torvalds 4443b89f4321SArnd Bergmann lock_flocks(); 44441da177e4SLinus Torvalds for (flpp = &inode->i_flock; *flpp != NULL; flpp = &(*flpp)->fl_next) { 4445796dadfdSJ. Bruce Fields if ((*flpp)->fl_owner == (fl_owner_t)lowner) { 44461da177e4SLinus Torvalds status = 1; 44471da177e4SLinus Torvalds goto out; 44481da177e4SLinus Torvalds } 4449796dadfdSJ. Bruce Fields } 44501da177e4SLinus Torvalds out: 4451b89f4321SArnd Bergmann unlock_flocks(); 44521da177e4SLinus Torvalds return status; 44531da177e4SLinus Torvalds } 44541da177e4SLinus Torvalds 4455b37ad28bSAl Viro __be32 4456b591480bSJ.Bruce Fields nfsd4_release_lockowner(struct svc_rqst *rqstp, 4457b591480bSJ.Bruce Fields struct nfsd4_compound_state *cstate, 4458b591480bSJ.Bruce Fields struct nfsd4_release_lockowner *rlockowner) 44591da177e4SLinus Torvalds { 44601da177e4SLinus Torvalds clientid_t *clid = &rlockowner->rl_clientid; 44613e9e3dbeSNeilBrown struct nfs4_stateowner *sop; 4462fe0750e5SJ. Bruce Fields struct nfs4_lockowner *lo; 4463dcef0413SJ. Bruce Fields struct nfs4_ol_stateid *stp; 44641da177e4SLinus Torvalds struct xdr_netobj *owner = &rlockowner->rl_owner; 44653e9e3dbeSNeilBrown struct list_head matches; 446616bfdaafSJ. Bruce Fields unsigned int hashval = ownerstr_hashval(clid->cl_id, owner); 4467b37ad28bSAl Viro __be32 status; 44687f2210faSStanislav Kinsbursky struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 44691da177e4SLinus Torvalds 44701da177e4SLinus Torvalds dprintk("nfsd4_release_lockowner clientid: (%08x/%08x):\n", 44711da177e4SLinus Torvalds clid->cl_boot, clid->cl_id); 44721da177e4SLinus Torvalds 44731da177e4SLinus Torvalds nfs4_lock_state(); 44741da177e4SLinus Torvalds 44759b2ef62bSJ. Bruce Fields status = lookup_clientid(clid, cstate->minorversion, nn, NULL); 44769b2ef62bSJ. Bruce Fields if (status) 44779b2ef62bSJ. Bruce Fields goto out; 44789b2ef62bSJ. Bruce Fields 44791da177e4SLinus Torvalds status = nfserr_locks_held; 44803e9e3dbeSNeilBrown INIT_LIST_HEAD(&matches); 448106f1f864SJ. Bruce Fields 44829b531137SStanislav Kinsbursky list_for_each_entry(sop, &nn->ownerstr_hashtbl[hashval], so_strhash) { 448316bfdaafSJ. Bruce Fields if (sop->so_is_open_owner) 448416bfdaafSJ. Bruce Fields continue; 4485599e0a22SJ. Bruce Fields if (!same_owner_str(sop, owner, clid)) 44863e9e3dbeSNeilBrown continue; 44873e9e3dbeSNeilBrown list_for_each_entry(stp, &sop->so_stateids, 4488ea1da636SNeilBrown st_perstateowner) { 4489fe0750e5SJ. Bruce Fields lo = lockowner(sop); 4490fe0750e5SJ. Bruce Fields if (check_for_locks(stp->st_file, lo)) 44911da177e4SLinus Torvalds goto out; 4492fe0750e5SJ. Bruce Fields list_add(&lo->lo_list, &matches); 44931da177e4SLinus Torvalds } 44943e9e3dbeSNeilBrown } 44953e9e3dbeSNeilBrown /* Clients probably won't expect us to return with some (but not all) 44963e9e3dbeSNeilBrown * of the lockowner state released; so don't release any until all 44973e9e3dbeSNeilBrown * have been checked. */ 44981da177e4SLinus Torvalds status = nfs_ok; 44990fa822e4SNeilBrown while (!list_empty(&matches)) { 4500fe0750e5SJ. Bruce Fields lo = list_entry(matches.next, struct nfs4_lockowner, 4501fe0750e5SJ. Bruce Fields lo_list); 45020fa822e4SNeilBrown /* unhash_stateowner deletes so_perclient only 45030fa822e4SNeilBrown * for openowners. */ 4504fe0750e5SJ. Bruce Fields list_del(&lo->lo_list); 4505fe0750e5SJ. Bruce Fields release_lockowner(lo); 45061da177e4SLinus Torvalds } 45071da177e4SLinus Torvalds out: 45081da177e4SLinus Torvalds nfs4_unlock_state(); 45091da177e4SLinus Torvalds return status; 45101da177e4SLinus Torvalds } 45111da177e4SLinus Torvalds 45121da177e4SLinus Torvalds static inline struct nfs4_client_reclaim * 4513a55370a3SNeilBrown alloc_reclaim(void) 45141da177e4SLinus Torvalds { 4515a55370a3SNeilBrown return kmalloc(sizeof(struct nfs4_client_reclaim), GFP_KERNEL); 45161da177e4SLinus Torvalds } 45171da177e4SLinus Torvalds 45180ce0c2b5SJeff Layton bool 451952e19c09SStanislav Kinsbursky nfs4_has_reclaimed_state(const char *name, struct nfsd_net *nn) 4520c7b9a459SNeilBrown { 45210ce0c2b5SJeff Layton struct nfs4_client_reclaim *crp; 4522c7b9a459SNeilBrown 452352e19c09SStanislav Kinsbursky crp = nfsd4_find_reclaim_client(name, nn); 45240ce0c2b5SJeff Layton return (crp && crp->cr_clp); 4525c7b9a459SNeilBrown } 4526c7b9a459SNeilBrown 45271da177e4SLinus Torvalds /* 45281da177e4SLinus Torvalds * failure => all reset bets are off, nfserr_no_grace... 45291da177e4SLinus Torvalds */ 4530772a9bbbSJeff Layton struct nfs4_client_reclaim * 453152e19c09SStanislav Kinsbursky nfs4_client_to_reclaim(const char *name, struct nfsd_net *nn) 45321da177e4SLinus Torvalds { 45331da177e4SLinus Torvalds unsigned int strhashval; 4534772a9bbbSJeff Layton struct nfs4_client_reclaim *crp; 45351da177e4SLinus Torvalds 4536a55370a3SNeilBrown dprintk("NFSD nfs4_client_to_reclaim NAME: %.*s\n", HEXDIR_LEN, name); 4537a55370a3SNeilBrown crp = alloc_reclaim(); 4538772a9bbbSJeff Layton if (crp) { 4539a55370a3SNeilBrown strhashval = clientstr_hashval(name); 45401da177e4SLinus Torvalds INIT_LIST_HEAD(&crp->cr_strhash); 454152e19c09SStanislav Kinsbursky list_add(&crp->cr_strhash, &nn->reclaim_str_hashtbl[strhashval]); 4542a55370a3SNeilBrown memcpy(crp->cr_recdir, name, HEXDIR_LEN); 45430ce0c2b5SJeff Layton crp->cr_clp = NULL; 454452e19c09SStanislav Kinsbursky nn->reclaim_str_hashtbl_size++; 4545772a9bbbSJeff Layton } 4546772a9bbbSJeff Layton return crp; 45471da177e4SLinus Torvalds } 45481da177e4SLinus Torvalds 45492a4317c5SJeff Layton void 455052e19c09SStanislav Kinsbursky nfs4_remove_reclaim_record(struct nfs4_client_reclaim *crp, struct nfsd_net *nn) 4551ce30e539SJeff Layton { 4552ce30e539SJeff Layton list_del(&crp->cr_strhash); 4553ce30e539SJeff Layton kfree(crp); 455452e19c09SStanislav Kinsbursky nn->reclaim_str_hashtbl_size--; 4555ce30e539SJeff Layton } 4556ce30e539SJeff Layton 4557ce30e539SJeff Layton void 455852e19c09SStanislav Kinsbursky nfs4_release_reclaim(struct nfsd_net *nn) 45591da177e4SLinus Torvalds { 45601da177e4SLinus Torvalds struct nfs4_client_reclaim *crp = NULL; 45611da177e4SLinus Torvalds int i; 45621da177e4SLinus Torvalds 45631da177e4SLinus Torvalds for (i = 0; i < CLIENT_HASH_SIZE; i++) { 456452e19c09SStanislav Kinsbursky while (!list_empty(&nn->reclaim_str_hashtbl[i])) { 456552e19c09SStanislav Kinsbursky crp = list_entry(nn->reclaim_str_hashtbl[i].next, 45661da177e4SLinus Torvalds struct nfs4_client_reclaim, cr_strhash); 456752e19c09SStanislav Kinsbursky nfs4_remove_reclaim_record(crp, nn); 45681da177e4SLinus Torvalds } 45691da177e4SLinus Torvalds } 4570063b0fb9SJ. Bruce Fields WARN_ON_ONCE(nn->reclaim_str_hashtbl_size); 45711da177e4SLinus Torvalds } 45721da177e4SLinus Torvalds 45731da177e4SLinus Torvalds /* 45741da177e4SLinus Torvalds * called from OPEN, CLAIM_PREVIOUS with a new clientid. */ 45752a4317c5SJeff Layton struct nfs4_client_reclaim * 457652e19c09SStanislav Kinsbursky nfsd4_find_reclaim_client(const char *recdir, struct nfsd_net *nn) 45771da177e4SLinus Torvalds { 45781da177e4SLinus Torvalds unsigned int strhashval; 45791da177e4SLinus Torvalds struct nfs4_client_reclaim *crp = NULL; 45801da177e4SLinus Torvalds 4581278c931cSJeff Layton dprintk("NFSD: nfs4_find_reclaim_client for recdir %s\n", recdir); 45821da177e4SLinus Torvalds 4583278c931cSJeff Layton strhashval = clientstr_hashval(recdir); 458452e19c09SStanislav Kinsbursky list_for_each_entry(crp, &nn->reclaim_str_hashtbl[strhashval], cr_strhash) { 4585278c931cSJeff Layton if (same_name(crp->cr_recdir, recdir)) { 45861da177e4SLinus Torvalds return crp; 45871da177e4SLinus Torvalds } 45881da177e4SLinus Torvalds } 45891da177e4SLinus Torvalds return NULL; 45901da177e4SLinus Torvalds } 45911da177e4SLinus Torvalds 45921da177e4SLinus Torvalds /* 45931da177e4SLinus Torvalds * Called from OPEN. Look for clientid in reclaim list. 45941da177e4SLinus Torvalds */ 4595b37ad28bSAl Viro __be32 45963320fef1SStanislav Kinsbursky nfs4_check_open_reclaim(clientid_t *clid, bool sessions, struct nfsd_net *nn) 45971da177e4SLinus Torvalds { 4598a52d726bSJeff Layton struct nfs4_client *clp; 4599a52d726bSJeff Layton 4600a52d726bSJeff Layton /* find clientid in conf_id_hashtbl */ 46018daae4dcSStanislav Kinsbursky clp = find_confirmed_client(clid, sessions, nn); 4602a52d726bSJeff Layton if (clp == NULL) 4603a52d726bSJeff Layton return nfserr_reclaim_bad; 4604a52d726bSJeff Layton 4605a52d726bSJeff Layton return nfsd4_client_record_check(clp) ? nfserr_reclaim_bad : nfs_ok; 46061da177e4SLinus Torvalds } 46071da177e4SLinus Torvalds 460865178db4SBryan Schumaker #ifdef CONFIG_NFSD_FAULT_INJECTION 460965178db4SBryan Schumaker 461044e34da6SBryan Schumaker u64 nfsd_forget_client(struct nfs4_client *clp, u64 max) 461144e34da6SBryan Schumaker { 461244e34da6SBryan Schumaker expire_client(clp); 461344e34da6SBryan Schumaker return 1; 461444e34da6SBryan Schumaker } 461544e34da6SBryan Schumaker 4616184c1847SBryan Schumaker u64 nfsd_print_client(struct nfs4_client *clp, u64 num) 4617184c1847SBryan Schumaker { 4618184c1847SBryan Schumaker char buf[INET6_ADDRSTRLEN]; 46190a5c33e2SBryan Schumaker rpc_ntop((struct sockaddr *)&clp->cl_addr, buf, sizeof(buf)); 4620184c1847SBryan Schumaker printk(KERN_INFO "NFS Client: %s\n", buf); 4621184c1847SBryan Schumaker return 1; 4622184c1847SBryan Schumaker } 4623184c1847SBryan Schumaker 4624184c1847SBryan Schumaker static void nfsd_print_count(struct nfs4_client *clp, unsigned int count, 4625184c1847SBryan Schumaker const char *type) 4626184c1847SBryan Schumaker { 4627184c1847SBryan Schumaker char buf[INET6_ADDRSTRLEN]; 46280a5c33e2SBryan Schumaker rpc_ntop((struct sockaddr *)&clp->cl_addr, buf, sizeof(buf)); 4629184c1847SBryan Schumaker printk(KERN_INFO "NFS Client: %s has %u %s\n", buf, count, type); 4630184c1847SBryan Schumaker } 4631184c1847SBryan Schumaker 4632fc29171fSBryan Schumaker static u64 nfsd_foreach_client_lock(struct nfs4_client *clp, u64 max, void (*func)(struct nfs4_lockowner *)) 4633fc29171fSBryan Schumaker { 4634fc29171fSBryan Schumaker struct nfs4_openowner *oop; 4635fc29171fSBryan Schumaker struct nfs4_lockowner *lop, *lo_next; 4636fc29171fSBryan Schumaker struct nfs4_ol_stateid *stp, *st_next; 4637fc29171fSBryan Schumaker u64 count = 0; 4638fc29171fSBryan Schumaker 4639fc29171fSBryan Schumaker list_for_each_entry(oop, &clp->cl_openowners, oo_perclient) { 4640fc29171fSBryan Schumaker list_for_each_entry_safe(stp, st_next, &oop->oo_owner.so_stateids, st_perstateowner) { 4641fc29171fSBryan Schumaker list_for_each_entry_safe(lop, lo_next, &stp->st_lockowners, lo_perstateid) { 4642fc29171fSBryan Schumaker if (func) 4643fc29171fSBryan Schumaker func(lop); 4644fc29171fSBryan Schumaker if (++count == max) 4645fc29171fSBryan Schumaker return count; 4646fc29171fSBryan Schumaker } 4647fc29171fSBryan Schumaker } 4648fc29171fSBryan Schumaker } 4649fc29171fSBryan Schumaker 4650fc29171fSBryan Schumaker return count; 4651fc29171fSBryan Schumaker } 4652fc29171fSBryan Schumaker 4653fc29171fSBryan Schumaker u64 nfsd_forget_client_locks(struct nfs4_client *clp, u64 max) 4654fc29171fSBryan Schumaker { 4655fc29171fSBryan Schumaker return nfsd_foreach_client_lock(clp, max, release_lockowner); 4656fc29171fSBryan Schumaker } 4657fc29171fSBryan Schumaker 4658184c1847SBryan Schumaker u64 nfsd_print_client_locks(struct nfs4_client *clp, u64 max) 4659184c1847SBryan Schumaker { 4660184c1847SBryan Schumaker u64 count = nfsd_foreach_client_lock(clp, max, NULL); 4661184c1847SBryan Schumaker nfsd_print_count(clp, count, "locked files"); 4662184c1847SBryan Schumaker return count; 4663184c1847SBryan Schumaker } 4664184c1847SBryan Schumaker 46654dbdbda8SBryan Schumaker static u64 nfsd_foreach_client_open(struct nfs4_client *clp, u64 max, void (*func)(struct nfs4_openowner *)) 46664dbdbda8SBryan Schumaker { 46674dbdbda8SBryan Schumaker struct nfs4_openowner *oop, *next; 46684dbdbda8SBryan Schumaker u64 count = 0; 46694dbdbda8SBryan Schumaker 46704dbdbda8SBryan Schumaker list_for_each_entry_safe(oop, next, &clp->cl_openowners, oo_perclient) { 46714dbdbda8SBryan Schumaker if (func) 46724dbdbda8SBryan Schumaker func(oop); 46734dbdbda8SBryan Schumaker if (++count == max) 46744dbdbda8SBryan Schumaker break; 46754dbdbda8SBryan Schumaker } 46764dbdbda8SBryan Schumaker 46774dbdbda8SBryan Schumaker return count; 46784dbdbda8SBryan Schumaker } 46794dbdbda8SBryan Schumaker 46804dbdbda8SBryan Schumaker u64 nfsd_forget_client_openowners(struct nfs4_client *clp, u64 max) 46814dbdbda8SBryan Schumaker { 46824dbdbda8SBryan Schumaker return nfsd_foreach_client_open(clp, max, release_openowner); 46834dbdbda8SBryan Schumaker } 46844dbdbda8SBryan Schumaker 4685184c1847SBryan Schumaker u64 nfsd_print_client_openowners(struct nfs4_client *clp, u64 max) 4686184c1847SBryan Schumaker { 4687184c1847SBryan Schumaker u64 count = nfsd_foreach_client_open(clp, max, NULL); 4688184c1847SBryan Schumaker nfsd_print_count(clp, count, "open files"); 4689184c1847SBryan Schumaker return count; 4690184c1847SBryan Schumaker } 4691184c1847SBryan Schumaker 4692269de30fSBryan Schumaker static u64 nfsd_find_all_delegations(struct nfs4_client *clp, u64 max, 4693269de30fSBryan Schumaker struct list_head *victims) 4694269de30fSBryan Schumaker { 4695269de30fSBryan Schumaker struct nfs4_delegation *dp, *next; 4696269de30fSBryan Schumaker u64 count = 0; 4697269de30fSBryan Schumaker 4698269de30fSBryan Schumaker list_for_each_entry_safe(dp, next, &clp->cl_delegations, dl_perclnt) { 4699269de30fSBryan Schumaker if (victims) 4700269de30fSBryan Schumaker list_move(&dp->dl_recall_lru, victims); 4701269de30fSBryan Schumaker if (++count == max) 4702269de30fSBryan Schumaker break; 4703269de30fSBryan Schumaker } 4704269de30fSBryan Schumaker return count; 4705269de30fSBryan Schumaker } 4706269de30fSBryan Schumaker 4707269de30fSBryan Schumaker u64 nfsd_forget_client_delegations(struct nfs4_client *clp, u64 max) 4708269de30fSBryan Schumaker { 4709269de30fSBryan Schumaker struct nfs4_delegation *dp, *next; 4710269de30fSBryan Schumaker LIST_HEAD(victims); 4711269de30fSBryan Schumaker u64 count; 4712269de30fSBryan Schumaker 4713269de30fSBryan Schumaker spin_lock(&recall_lock); 4714269de30fSBryan Schumaker count = nfsd_find_all_delegations(clp, max, &victims); 4715269de30fSBryan Schumaker spin_unlock(&recall_lock); 4716269de30fSBryan Schumaker 4717269de30fSBryan Schumaker list_for_each_entry_safe(dp, next, &victims, dl_recall_lru) 4718269de30fSBryan Schumaker unhash_delegation(dp); 4719269de30fSBryan Schumaker 4720269de30fSBryan Schumaker return count; 4721269de30fSBryan Schumaker } 4722269de30fSBryan Schumaker 4723269de30fSBryan Schumaker u64 nfsd_recall_client_delegations(struct nfs4_client *clp, u64 max) 4724269de30fSBryan Schumaker { 4725269de30fSBryan Schumaker struct nfs4_delegation *dp, *next; 4726269de30fSBryan Schumaker LIST_HEAD(victims); 4727269de30fSBryan Schumaker u64 count; 4728269de30fSBryan Schumaker 4729269de30fSBryan Schumaker spin_lock(&recall_lock); 4730269de30fSBryan Schumaker count = nfsd_find_all_delegations(clp, max, &victims); 4731269de30fSBryan Schumaker list_for_each_entry_safe(dp, next, &victims, dl_recall_lru) 4732269de30fSBryan Schumaker nfsd_break_one_deleg(dp); 4733269de30fSBryan Schumaker spin_unlock(&recall_lock); 4734269de30fSBryan Schumaker 4735269de30fSBryan Schumaker return count; 4736269de30fSBryan Schumaker } 4737269de30fSBryan Schumaker 4738184c1847SBryan Schumaker u64 nfsd_print_client_delegations(struct nfs4_client *clp, u64 max) 4739184c1847SBryan Schumaker { 4740184c1847SBryan Schumaker u64 count = 0; 4741184c1847SBryan Schumaker 4742184c1847SBryan Schumaker spin_lock(&recall_lock); 4743184c1847SBryan Schumaker count = nfsd_find_all_delegations(clp, max, NULL); 4744184c1847SBryan Schumaker spin_unlock(&recall_lock); 4745184c1847SBryan Schumaker 4746184c1847SBryan Schumaker nfsd_print_count(clp, count, "delegations"); 4747184c1847SBryan Schumaker return count; 4748184c1847SBryan Schumaker } 4749184c1847SBryan Schumaker 475044e34da6SBryan Schumaker u64 nfsd_for_n_state(u64 max, u64 (*func)(struct nfs4_client *, u64)) 475165178db4SBryan Schumaker { 475265178db4SBryan Schumaker struct nfs4_client *clp, *next; 475344e34da6SBryan Schumaker u64 count = 0; 47543320fef1SStanislav Kinsbursky struct nfsd_net *nn = net_generic(current->nsproxy->net_ns, nfsd_net_id); 475565178db4SBryan Schumaker 475644e34da6SBryan Schumaker if (!nfsd_netns_ready(nn)) 475744e34da6SBryan Schumaker return 0; 475844e34da6SBryan Schumaker 47595ed58bb2SStanislav Kinsbursky list_for_each_entry_safe(clp, next, &nn->client_lru, cl_lru) { 476044e34da6SBryan Schumaker count += func(clp, max - count); 476144e34da6SBryan Schumaker if ((max != 0) && (count >= max)) 476265178db4SBryan Schumaker break; 476365178db4SBryan Schumaker } 476465178db4SBryan Schumaker 476544e34da6SBryan Schumaker return count; 476644e34da6SBryan Schumaker } 476744e34da6SBryan Schumaker 47686c1e82a4SBryan Schumaker struct nfs4_client *nfsd_find_client(struct sockaddr_storage *addr, size_t addr_size) 47696c1e82a4SBryan Schumaker { 47706c1e82a4SBryan Schumaker struct nfs4_client *clp; 47716c1e82a4SBryan Schumaker struct nfsd_net *nn = net_generic(current->nsproxy->net_ns, nfsd_net_id); 47726c1e82a4SBryan Schumaker 47736c1e82a4SBryan Schumaker if (!nfsd_netns_ready(nn)) 47746c1e82a4SBryan Schumaker return NULL; 47756c1e82a4SBryan Schumaker 47766c1e82a4SBryan Schumaker list_for_each_entry(clp, &nn->client_lru, cl_lru) { 47776c1e82a4SBryan Schumaker if (memcmp(&clp->cl_addr, addr, addr_size) == 0) 47786c1e82a4SBryan Schumaker return clp; 47796c1e82a4SBryan Schumaker } 47806c1e82a4SBryan Schumaker return NULL; 47816c1e82a4SBryan Schumaker } 47826c1e82a4SBryan Schumaker 478365178db4SBryan Schumaker #endif /* CONFIG_NFSD_FAULT_INJECTION */ 478465178db4SBryan Schumaker 4785ac4d8ff2SNeilBrown /* initialization to perform at module load time: */ 47861da177e4SLinus Torvalds 478772083396SBryan Schumaker void 4788ac4d8ff2SNeilBrown nfs4_state_init(void) 47891da177e4SLinus Torvalds { 479072083396SBryan Schumaker int i; 47911da177e4SLinus Torvalds 47921da177e4SLinus Torvalds for (i = 0; i < FILE_HASH_SIZE; i++) { 47931da177e4SLinus Torvalds INIT_LIST_HEAD(&file_hashtbl[i]); 47941da177e4SLinus Torvalds } 47951da177e4SLinus Torvalds INIT_LIST_HEAD(&del_recall_lru); 4796ac4d8ff2SNeilBrown } 4797ac4d8ff2SNeilBrown 4798c2f1a551SMeelap Shah /* 4799c2f1a551SMeelap Shah * Since the lifetime of a delegation isn't limited to that of an open, a 4800c2f1a551SMeelap Shah * client may quite reasonably hang on to a delegation as long as it has 4801c2f1a551SMeelap Shah * the inode cached. This becomes an obvious problem the first time a 4802c2f1a551SMeelap Shah * client's inode cache approaches the size of the server's total memory. 4803c2f1a551SMeelap Shah * 4804c2f1a551SMeelap Shah * For now we avoid this problem by imposing a hard limit on the number 4805c2f1a551SMeelap Shah * of delegations, which varies according to the server's memory size. 4806c2f1a551SMeelap Shah */ 4807c2f1a551SMeelap Shah static void 4808c2f1a551SMeelap Shah set_max_delegations(void) 4809c2f1a551SMeelap Shah { 4810c2f1a551SMeelap Shah /* 4811c2f1a551SMeelap Shah * Allow at most 4 delegations per megabyte of RAM. Quick 4812c2f1a551SMeelap Shah * estimates suggest that in the worst case (where every delegation 4813c2f1a551SMeelap Shah * is for a different inode), a delegation could take about 1.5K, 4814c2f1a551SMeelap Shah * giving a worst case usage of about 6% of memory. 4815c2f1a551SMeelap Shah */ 4816c2f1a551SMeelap Shah max_delegations = nr_free_buffer_pages() >> (20 - 2 - PAGE_SHIFT); 4817c2f1a551SMeelap Shah } 4818c2f1a551SMeelap Shah 4819d85ed443SStanislav Kinsbursky static int nfs4_state_create_net(struct net *net) 48208daae4dcSStanislav Kinsbursky { 48218daae4dcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 48228daae4dcSStanislav Kinsbursky int i; 48238daae4dcSStanislav Kinsbursky 48248daae4dcSStanislav Kinsbursky nn->conf_id_hashtbl = kmalloc(sizeof(struct list_head) * 48258daae4dcSStanislav Kinsbursky CLIENT_HASH_SIZE, GFP_KERNEL); 48268daae4dcSStanislav Kinsbursky if (!nn->conf_id_hashtbl) 4827382a62e7SStanislav Kinsbursky goto err; 48280a7ec377SStanislav Kinsbursky nn->unconf_id_hashtbl = kmalloc(sizeof(struct list_head) * 48290a7ec377SStanislav Kinsbursky CLIENT_HASH_SIZE, GFP_KERNEL); 48300a7ec377SStanislav Kinsbursky if (!nn->unconf_id_hashtbl) 48310a7ec377SStanislav Kinsbursky goto err_unconf_id; 48329b531137SStanislav Kinsbursky nn->ownerstr_hashtbl = kmalloc(sizeof(struct list_head) * 48339b531137SStanislav Kinsbursky OWNER_HASH_SIZE, GFP_KERNEL); 48349b531137SStanislav Kinsbursky if (!nn->ownerstr_hashtbl) 48359b531137SStanislav Kinsbursky goto err_ownerstr; 483620e9e2bcSStanislav Kinsbursky nn->lockowner_ino_hashtbl = kmalloc(sizeof(struct list_head) * 483720e9e2bcSStanislav Kinsbursky LOCKOWNER_INO_HASH_SIZE, GFP_KERNEL); 483820e9e2bcSStanislav Kinsbursky if (!nn->lockowner_ino_hashtbl) 483920e9e2bcSStanislav Kinsbursky goto err_lockowner_ino; 48401872de0eSStanislav Kinsbursky nn->sessionid_hashtbl = kmalloc(sizeof(struct list_head) * 48411872de0eSStanislav Kinsbursky SESSION_HASH_SIZE, GFP_KERNEL); 48421872de0eSStanislav Kinsbursky if (!nn->sessionid_hashtbl) 48431872de0eSStanislav Kinsbursky goto err_sessionid; 48448daae4dcSStanislav Kinsbursky 4845382a62e7SStanislav Kinsbursky for (i = 0; i < CLIENT_HASH_SIZE; i++) { 48468daae4dcSStanislav Kinsbursky INIT_LIST_HEAD(&nn->conf_id_hashtbl[i]); 48470a7ec377SStanislav Kinsbursky INIT_LIST_HEAD(&nn->unconf_id_hashtbl[i]); 4848382a62e7SStanislav Kinsbursky } 48499b531137SStanislav Kinsbursky for (i = 0; i < OWNER_HASH_SIZE; i++) 48509b531137SStanislav Kinsbursky INIT_LIST_HEAD(&nn->ownerstr_hashtbl[i]); 485120e9e2bcSStanislav Kinsbursky for (i = 0; i < LOCKOWNER_INO_HASH_SIZE; i++) 485220e9e2bcSStanislav Kinsbursky INIT_LIST_HEAD(&nn->lockowner_ino_hashtbl[i]); 48531872de0eSStanislav Kinsbursky for (i = 0; i < SESSION_HASH_SIZE; i++) 48541872de0eSStanislav Kinsbursky INIT_LIST_HEAD(&nn->sessionid_hashtbl[i]); 4855382a62e7SStanislav Kinsbursky nn->conf_name_tree = RB_ROOT; 4856a99454aaSStanislav Kinsbursky nn->unconf_name_tree = RB_ROOT; 48575ed58bb2SStanislav Kinsbursky INIT_LIST_HEAD(&nn->client_lru); 485873758fedSStanislav Kinsbursky INIT_LIST_HEAD(&nn->close_lru); 4859c9a49628SStanislav Kinsbursky spin_lock_init(&nn->client_lock); 48608daae4dcSStanislav Kinsbursky 486109121281SStanislav Kinsbursky INIT_DELAYED_WORK(&nn->laundromat_work, laundromat_main); 4862d85ed443SStanislav Kinsbursky get_net(net); 486309121281SStanislav Kinsbursky 48648daae4dcSStanislav Kinsbursky return 0; 4865382a62e7SStanislav Kinsbursky 48661872de0eSStanislav Kinsbursky err_sessionid: 48671872de0eSStanislav Kinsbursky kfree(nn->lockowner_ino_hashtbl); 486820e9e2bcSStanislav Kinsbursky err_lockowner_ino: 486920e9e2bcSStanislav Kinsbursky kfree(nn->ownerstr_hashtbl); 48709b531137SStanislav Kinsbursky err_ownerstr: 48719b531137SStanislav Kinsbursky kfree(nn->unconf_id_hashtbl); 48720a7ec377SStanislav Kinsbursky err_unconf_id: 48730a7ec377SStanislav Kinsbursky kfree(nn->conf_id_hashtbl); 4874382a62e7SStanislav Kinsbursky err: 4875382a62e7SStanislav Kinsbursky return -ENOMEM; 48768daae4dcSStanislav Kinsbursky } 48778daae4dcSStanislav Kinsbursky 48788daae4dcSStanislav Kinsbursky static void 48794dce0ac9SStanislav Kinsbursky nfs4_state_destroy_net(struct net *net) 48808daae4dcSStanislav Kinsbursky { 48818daae4dcSStanislav Kinsbursky int i; 48828daae4dcSStanislav Kinsbursky struct nfs4_client *clp = NULL; 48838daae4dcSStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 4884a99454aaSStanislav Kinsbursky struct rb_node *node, *tmp; 48858daae4dcSStanislav Kinsbursky 48868daae4dcSStanislav Kinsbursky for (i = 0; i < CLIENT_HASH_SIZE; i++) { 48878daae4dcSStanislav Kinsbursky while (!list_empty(&nn->conf_id_hashtbl[i])) { 48888daae4dcSStanislav Kinsbursky clp = list_entry(nn->conf_id_hashtbl[i].next, struct nfs4_client, cl_idhash); 48898daae4dcSStanislav Kinsbursky destroy_client(clp); 48908daae4dcSStanislav Kinsbursky } 48918daae4dcSStanislav Kinsbursky } 4892a99454aaSStanislav Kinsbursky 4893a99454aaSStanislav Kinsbursky node = rb_first(&nn->unconf_name_tree); 4894a99454aaSStanislav Kinsbursky while (node != NULL) { 4895a99454aaSStanislav Kinsbursky tmp = node; 4896a99454aaSStanislav Kinsbursky node = rb_next(tmp); 4897a99454aaSStanislav Kinsbursky clp = rb_entry(tmp, struct nfs4_client, cl_namenode); 4898a99454aaSStanislav Kinsbursky rb_erase(tmp, &nn->unconf_name_tree); 4899a99454aaSStanislav Kinsbursky destroy_client(clp); 4900a99454aaSStanislav Kinsbursky } 4901a99454aaSStanislav Kinsbursky 49021872de0eSStanislav Kinsbursky kfree(nn->sessionid_hashtbl); 490320e9e2bcSStanislav Kinsbursky kfree(nn->lockowner_ino_hashtbl); 49049b531137SStanislav Kinsbursky kfree(nn->ownerstr_hashtbl); 49050a7ec377SStanislav Kinsbursky kfree(nn->unconf_id_hashtbl); 49068daae4dcSStanislav Kinsbursky kfree(nn->conf_id_hashtbl); 49074dce0ac9SStanislav Kinsbursky put_net(net); 49088daae4dcSStanislav Kinsbursky } 49098daae4dcSStanislav Kinsbursky 4910f252bc68SStanislav Kinsbursky int 4911d85ed443SStanislav Kinsbursky nfs4_state_start_net(struct net *net) 4912ac4d8ff2SNeilBrown { 49135e1533c7SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 4914b5a1a81eSJ. Bruce Fields int ret; 4915b5a1a81eSJ. Bruce Fields 4916f252bc68SStanislav Kinsbursky /* 4917f252bc68SStanislav Kinsbursky * FIXME: For now, we hang most of the pernet global stuff off of 4918f252bc68SStanislav Kinsbursky * init_net until nfsd is fully containerized. Eventually, we'll 4919f252bc68SStanislav Kinsbursky * need to pass a net pointer into this function, take a reference 4920f252bc68SStanislav Kinsbursky * to that instead and then do most of the rest of this on a per-net 4921f252bc68SStanislav Kinsbursky * basis. 4922f252bc68SStanislav Kinsbursky */ 4923f252bc68SStanislav Kinsbursky if (net != &init_net) 4924f252bc68SStanislav Kinsbursky return -EINVAL; 4925f252bc68SStanislav Kinsbursky 4926d85ed443SStanislav Kinsbursky ret = nfs4_state_create_net(net); 49278daae4dcSStanislav Kinsbursky if (ret) 49288daae4dcSStanislav Kinsbursky return ret; 49295e1533c7SStanislav Kinsbursky nfsd4_client_tracking_init(net); 49302c142baaSStanislav Kinsbursky nn->boot_time = get_seconds(); 49315ccb0066SStanislav Kinsbursky locks_start_grace(net, &nn->nfsd4_manager); 4932a51c84edSStanislav Kinsbursky nn->grace_ended = false; 4933d85ed443SStanislav Kinsbursky printk(KERN_INFO "NFSD: starting %ld-second grace period (net %p)\n", 49345284b44eSStanislav Kinsbursky nn->nfsd4_grace, net); 49355284b44eSStanislav Kinsbursky queue_delayed_work(laundry_wq, &nn->laundromat_work, nn->nfsd4_grace * HZ); 4936d85ed443SStanislav Kinsbursky return 0; 4937a6d6b781SJeff Layton } 4938d85ed443SStanislav Kinsbursky 4939d85ed443SStanislav Kinsbursky /* initialization to perform when the nfsd service is started: */ 4940d85ed443SStanislav Kinsbursky 4941d85ed443SStanislav Kinsbursky int 4942d85ed443SStanislav Kinsbursky nfs4_state_start(void) 4943d85ed443SStanislav Kinsbursky { 4944d85ed443SStanislav Kinsbursky int ret; 4945d85ed443SStanislav Kinsbursky 4946d85ed443SStanislav Kinsbursky ret = set_callback_cred(); 4947d85ed443SStanislav Kinsbursky if (ret) 4948d85ed443SStanislav Kinsbursky return -ENOMEM; 494958da282bSNeilBrown laundry_wq = create_singlethread_workqueue("nfsd4"); 4950a6d6b781SJeff Layton if (laundry_wq == NULL) { 4951a6d6b781SJeff Layton ret = -ENOMEM; 4952a6d6b781SJeff Layton goto out_recovery; 4953a6d6b781SJeff Layton } 4954b5a1a81eSJ. Bruce Fields ret = nfsd4_create_callback_queue(); 4955b5a1a81eSJ. Bruce Fields if (ret) 4956b5a1a81eSJ. Bruce Fields goto out_free_laundry; 495709121281SStanislav Kinsbursky 4958c2f1a551SMeelap Shah set_max_delegations(); 4959d85ed443SStanislav Kinsbursky 4960b5a1a81eSJ. Bruce Fields return 0; 4961d85ed443SStanislav Kinsbursky 4962b5a1a81eSJ. Bruce Fields out_free_laundry: 4963b5a1a81eSJ. Bruce Fields destroy_workqueue(laundry_wq); 4964a6d6b781SJeff Layton out_recovery: 4965b5a1a81eSJ. Bruce Fields return ret; 49661da177e4SLinus Torvalds } 49671da177e4SLinus Torvalds 4968ac55fdc4SJeff Layton /* should be called with the state lock held */ 4969f252bc68SStanislav Kinsbursky void 49704dce0ac9SStanislav Kinsbursky nfs4_state_shutdown_net(struct net *net) 49711da177e4SLinus Torvalds { 49721da177e4SLinus Torvalds struct nfs4_delegation *dp = NULL; 49731da177e4SLinus Torvalds struct list_head *pos, *next, reaplist; 49744dce0ac9SStanislav Kinsbursky struct nfsd_net *nn = net_generic(net, nfsd_net_id); 49751da177e4SLinus Torvalds 49764dce0ac9SStanislav Kinsbursky cancel_delayed_work_sync(&nn->laundromat_work); 49774dce0ac9SStanislav Kinsbursky locks_end_grace(&nn->nfsd4_manager); 4978ac55fdc4SJeff Layton 49791da177e4SLinus Torvalds INIT_LIST_HEAD(&reaplist); 49801da177e4SLinus Torvalds spin_lock(&recall_lock); 49811da177e4SLinus Torvalds list_for_each_safe(pos, next, &del_recall_lru) { 49821da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 49834e37a7c2SStanislav Kinsbursky if (dp->dl_stid.sc_client->net != net) 49844e37a7c2SStanislav Kinsbursky continue; 49851da177e4SLinus Torvalds list_move(&dp->dl_recall_lru, &reaplist); 49861da177e4SLinus Torvalds } 49871da177e4SLinus Torvalds spin_unlock(&recall_lock); 49881da177e4SLinus Torvalds list_for_each_safe(pos, next, &reaplist) { 49891da177e4SLinus Torvalds dp = list_entry (pos, struct nfs4_delegation, dl_recall_lru); 49901da177e4SLinus Torvalds unhash_delegation(dp); 49911da177e4SLinus Torvalds } 49921da177e4SLinus Torvalds 49933320fef1SStanislav Kinsbursky nfsd4_client_tracking_exit(net); 49944dce0ac9SStanislav Kinsbursky nfs4_state_destroy_net(net); 49951da177e4SLinus Torvalds } 49961da177e4SLinus Torvalds 49971da177e4SLinus Torvalds void 49981da177e4SLinus Torvalds nfs4_state_shutdown(void) 49991da177e4SLinus Torvalds { 50005e8d5c29SNeilBrown destroy_workqueue(laundry_wq); 5001c3935e30SJ. Bruce Fields nfsd4_destroy_callback_queue(); 50021da177e4SLinus Torvalds } 50038b70484cSTigran Mkrtchyan 50048b70484cSTigran Mkrtchyan static void 50058b70484cSTigran Mkrtchyan get_stateid(struct nfsd4_compound_state *cstate, stateid_t *stateid) 50068b70484cSTigran Mkrtchyan { 500737c593c5STigran Mkrtchyan if (HAS_STATE_ID(cstate, CURRENT_STATE_ID_FLAG) && CURRENT_STATEID(stateid)) 500837c593c5STigran Mkrtchyan memcpy(stateid, &cstate->current_stateid, sizeof(stateid_t)); 50098b70484cSTigran Mkrtchyan } 50108b70484cSTigran Mkrtchyan 50118b70484cSTigran Mkrtchyan static void 50128b70484cSTigran Mkrtchyan put_stateid(struct nfsd4_compound_state *cstate, stateid_t *stateid) 50138b70484cSTigran Mkrtchyan { 501437c593c5STigran Mkrtchyan if (cstate->minorversion) { 501537c593c5STigran Mkrtchyan memcpy(&cstate->current_stateid, stateid, sizeof(stateid_t)); 501637c593c5STigran Mkrtchyan SET_STATE_ID(cstate, CURRENT_STATE_ID_FLAG); 501737c593c5STigran Mkrtchyan } 501837c593c5STigran Mkrtchyan } 501937c593c5STigran Mkrtchyan 502037c593c5STigran Mkrtchyan void 502137c593c5STigran Mkrtchyan clear_current_stateid(struct nfsd4_compound_state *cstate) 502237c593c5STigran Mkrtchyan { 502337c593c5STigran Mkrtchyan CLEAR_STATE_ID(cstate, CURRENT_STATE_ID_FLAG); 50248b70484cSTigran Mkrtchyan } 50258b70484cSTigran Mkrtchyan 502662cd4a59STigran Mkrtchyan /* 502762cd4a59STigran Mkrtchyan * functions to set current state id 502862cd4a59STigran Mkrtchyan */ 50298b70484cSTigran Mkrtchyan void 50309428fe1aSTigran Mkrtchyan nfsd4_set_opendowngradestateid(struct nfsd4_compound_state *cstate, struct nfsd4_open_downgrade *odp) 50319428fe1aSTigran Mkrtchyan { 50329428fe1aSTigran Mkrtchyan put_stateid(cstate, &odp->od_stateid); 50339428fe1aSTigran Mkrtchyan } 50349428fe1aSTigran Mkrtchyan 50359428fe1aSTigran Mkrtchyan void 50368b70484cSTigran Mkrtchyan nfsd4_set_openstateid(struct nfsd4_compound_state *cstate, struct nfsd4_open *open) 50378b70484cSTigran Mkrtchyan { 50388b70484cSTigran Mkrtchyan put_stateid(cstate, &open->op_stateid); 50398b70484cSTigran Mkrtchyan } 50408b70484cSTigran Mkrtchyan 50418b70484cSTigran Mkrtchyan void 504262cd4a59STigran Mkrtchyan nfsd4_set_closestateid(struct nfsd4_compound_state *cstate, struct nfsd4_close *close) 504362cd4a59STigran Mkrtchyan { 504462cd4a59STigran Mkrtchyan put_stateid(cstate, &close->cl_stateid); 504562cd4a59STigran Mkrtchyan } 504662cd4a59STigran Mkrtchyan 504762cd4a59STigran Mkrtchyan void 504862cd4a59STigran Mkrtchyan nfsd4_set_lockstateid(struct nfsd4_compound_state *cstate, struct nfsd4_lock *lock) 504962cd4a59STigran Mkrtchyan { 505062cd4a59STigran Mkrtchyan put_stateid(cstate, &lock->lk_resp_stateid); 505162cd4a59STigran Mkrtchyan } 505262cd4a59STigran Mkrtchyan 505362cd4a59STigran Mkrtchyan /* 505462cd4a59STigran Mkrtchyan * functions to consume current state id 505562cd4a59STigran Mkrtchyan */ 50561e97b519STigran Mkrtchyan 50571e97b519STigran Mkrtchyan void 50589428fe1aSTigran Mkrtchyan nfsd4_get_opendowngradestateid(struct nfsd4_compound_state *cstate, struct nfsd4_open_downgrade *odp) 50599428fe1aSTigran Mkrtchyan { 50609428fe1aSTigran Mkrtchyan get_stateid(cstate, &odp->od_stateid); 50619428fe1aSTigran Mkrtchyan } 50629428fe1aSTigran Mkrtchyan 50639428fe1aSTigran Mkrtchyan void 50649428fe1aSTigran Mkrtchyan nfsd4_get_delegreturnstateid(struct nfsd4_compound_state *cstate, struct nfsd4_delegreturn *drp) 50659428fe1aSTigran Mkrtchyan { 50669428fe1aSTigran Mkrtchyan get_stateid(cstate, &drp->dr_stateid); 50679428fe1aSTigran Mkrtchyan } 50689428fe1aSTigran Mkrtchyan 50699428fe1aSTigran Mkrtchyan void 50701e97b519STigran Mkrtchyan nfsd4_get_freestateid(struct nfsd4_compound_state *cstate, struct nfsd4_free_stateid *fsp) 50711e97b519STigran Mkrtchyan { 50721e97b519STigran Mkrtchyan get_stateid(cstate, &fsp->fr_stateid); 50731e97b519STigran Mkrtchyan } 50741e97b519STigran Mkrtchyan 50751e97b519STigran Mkrtchyan void 50761e97b519STigran Mkrtchyan nfsd4_get_setattrstateid(struct nfsd4_compound_state *cstate, struct nfsd4_setattr *setattr) 50771e97b519STigran Mkrtchyan { 50781e97b519STigran Mkrtchyan get_stateid(cstate, &setattr->sa_stateid); 50791e97b519STigran Mkrtchyan } 50801e97b519STigran Mkrtchyan 508162cd4a59STigran Mkrtchyan void 50828b70484cSTigran Mkrtchyan nfsd4_get_closestateid(struct nfsd4_compound_state *cstate, struct nfsd4_close *close) 50838b70484cSTigran Mkrtchyan { 50848b70484cSTigran Mkrtchyan get_stateid(cstate, &close->cl_stateid); 50858b70484cSTigran Mkrtchyan } 50868b70484cSTigran Mkrtchyan 50878b70484cSTigran Mkrtchyan void 508862cd4a59STigran Mkrtchyan nfsd4_get_lockustateid(struct nfsd4_compound_state *cstate, struct nfsd4_locku *locku) 50898b70484cSTigran Mkrtchyan { 509062cd4a59STigran Mkrtchyan get_stateid(cstate, &locku->lu_stateid); 50918b70484cSTigran Mkrtchyan } 509230813e27STigran Mkrtchyan 509330813e27STigran Mkrtchyan void 509430813e27STigran Mkrtchyan nfsd4_get_readstateid(struct nfsd4_compound_state *cstate, struct nfsd4_read *read) 509530813e27STigran Mkrtchyan { 509630813e27STigran Mkrtchyan get_stateid(cstate, &read->rd_stateid); 509730813e27STigran Mkrtchyan } 509830813e27STigran Mkrtchyan 509930813e27STigran Mkrtchyan void 510030813e27STigran Mkrtchyan nfsd4_get_writestateid(struct nfsd4_compound_state *cstate, struct nfsd4_write *write) 510130813e27STigran Mkrtchyan { 510230813e27STigran Mkrtchyan get_stateid(cstate, &write->wr_stateid); 510330813e27STigran Mkrtchyan } 5104