2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* fs/nfs/nfs4proc.c
|
|
|
|
*
|
|
|
|
* Client-side procedure declarations for NFSv4.
|
|
|
|
*
|
|
|
|
* Copyright (c) 2002 The Regents of the University of Michigan.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Kendrick Smith <kmsmith@umich.edu>
|
|
|
|
* Andy Adamson <andros@umich.edu>
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the University nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
|
|
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
|
|
* BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
|
|
|
|
* LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
|
|
|
|
* NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
|
|
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/utsname.h>
|
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/sunrpc/clnt.h>
|
|
|
|
#include <linux/nfs.h>
|
|
|
|
#include <linux/nfs4.h>
|
|
|
|
#include <linux/nfs_fs.h>
|
|
|
|
#include <linux/nfs_page.h>
|
|
|
|
#include <linux/smp_lock.h>
|
|
|
|
#include <linux/namei.h>
|
2005-10-19 04:20:17 +07:00
|
|
|
#include <linux/mount.h>
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2005-06-23 00:16:21 +07:00
|
|
|
#include "nfs4_fs.h"
|
2005-04-17 05:20:36 +07:00
|
|
|
#include "delegation.h"
|
2006-03-21 01:44:14 +07:00
|
|
|
#include "iostat.h"
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
#define NFSDBG_FACILITY NFSDBG_PROC
|
|
|
|
|
2006-09-15 19:30:46 +07:00
|
|
|
#define NFS4_POLL_RETRY_MIN (HZ/10)
|
2005-04-17 05:20:36 +07:00
|
|
|
#define NFS4_POLL_RETRY_MAX (15*HZ)
|
|
|
|
|
2006-01-03 15:55:12 +07:00
|
|
|
struct nfs4_opendata;
|
2006-01-03 15:55:15 +07:00
|
|
|
static int _nfs4_proc_open(struct nfs4_opendata *data);
|
2005-04-17 05:20:36 +07:00
|
|
|
static int nfs4_do_fsinfo(struct nfs_server *, struct nfs_fh *, struct nfs_fsinfo *);
|
2005-10-19 04:20:15 +07:00
|
|
|
static int nfs4_async_handle_error(struct rpc_task *, const struct nfs_server *);
|
2005-04-17 05:20:36 +07:00
|
|
|
static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry);
|
2005-10-19 04:20:15 +07:00
|
|
|
static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception);
|
2006-08-23 07:06:08 +07:00
|
|
|
static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp);
|
2007-07-06 06:02:21 +07:00
|
|
|
static int _nfs4_do_access(struct inode *inode, struct rpc_cred *cred, int openflags);
|
2007-07-18 08:52:41 +07:00
|
|
|
static int _nfs4_proc_lookup(struct inode *dir, const struct qstr *name, struct nfs_fh *fhandle, struct nfs_fattr *fattr);
|
|
|
|
static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Prevent leaks of NFSv4 errors into userland */
|
|
|
|
int nfs4_map_errors(int err)
|
|
|
|
{
|
|
|
|
if (err < -1000) {
|
|
|
|
dprintk("%s could not handle NFSv4 error %d\n",
|
|
|
|
__FUNCTION__, -err);
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This is our standard bitmap for GETATTR requests.
|
|
|
|
*/
|
|
|
|
const u32 nfs4_fattr_bitmap[2] = {
|
|
|
|
FATTR4_WORD0_TYPE
|
|
|
|
| FATTR4_WORD0_CHANGE
|
|
|
|
| FATTR4_WORD0_SIZE
|
|
|
|
| FATTR4_WORD0_FSID
|
|
|
|
| FATTR4_WORD0_FILEID,
|
|
|
|
FATTR4_WORD1_MODE
|
|
|
|
| FATTR4_WORD1_NUMLINKS
|
|
|
|
| FATTR4_WORD1_OWNER
|
|
|
|
| FATTR4_WORD1_OWNER_GROUP
|
|
|
|
| FATTR4_WORD1_RAWDEV
|
|
|
|
| FATTR4_WORD1_SPACE_USED
|
|
|
|
| FATTR4_WORD1_TIME_ACCESS
|
|
|
|
| FATTR4_WORD1_TIME_METADATA
|
|
|
|
| FATTR4_WORD1_TIME_MODIFY
|
|
|
|
};
|
|
|
|
|
|
|
|
const u32 nfs4_statfs_bitmap[2] = {
|
|
|
|
FATTR4_WORD0_FILES_AVAIL
|
|
|
|
| FATTR4_WORD0_FILES_FREE
|
|
|
|
| FATTR4_WORD0_FILES_TOTAL,
|
|
|
|
FATTR4_WORD1_SPACE_AVAIL
|
|
|
|
| FATTR4_WORD1_SPACE_FREE
|
|
|
|
| FATTR4_WORD1_SPACE_TOTAL
|
|
|
|
};
|
|
|
|
|
2005-06-23 00:16:21 +07:00
|
|
|
const u32 nfs4_pathconf_bitmap[2] = {
|
2005-04-17 05:20:36 +07:00
|
|
|
FATTR4_WORD0_MAXLINK
|
|
|
|
| FATTR4_WORD0_MAXNAME,
|
|
|
|
0
|
|
|
|
};
|
|
|
|
|
|
|
|
const u32 nfs4_fsinfo_bitmap[2] = { FATTR4_WORD0_MAXFILESIZE
|
|
|
|
| FATTR4_WORD0_MAXREAD
|
|
|
|
| FATTR4_WORD0_MAXWRITE
|
|
|
|
| FATTR4_WORD0_LEASE_TIME,
|
|
|
|
0
|
|
|
|
};
|
|
|
|
|
2006-06-09 20:34:25 +07:00
|
|
|
const u32 nfs4_fs_locations_bitmap[2] = {
|
|
|
|
FATTR4_WORD0_TYPE
|
|
|
|
| FATTR4_WORD0_CHANGE
|
|
|
|
| FATTR4_WORD0_SIZE
|
|
|
|
| FATTR4_WORD0_FSID
|
|
|
|
| FATTR4_WORD0_FILEID
|
|
|
|
| FATTR4_WORD0_FS_LOCATIONS,
|
|
|
|
FATTR4_WORD1_MODE
|
|
|
|
| FATTR4_WORD1_NUMLINKS
|
|
|
|
| FATTR4_WORD1_OWNER
|
|
|
|
| FATTR4_WORD1_OWNER_GROUP
|
|
|
|
| FATTR4_WORD1_RAWDEV
|
|
|
|
| FATTR4_WORD1_SPACE_USED
|
|
|
|
| FATTR4_WORD1_TIME_ACCESS
|
|
|
|
| FATTR4_WORD1_TIME_METADATA
|
|
|
|
| FATTR4_WORD1_TIME_MODIFY
|
|
|
|
| FATTR4_WORD1_MOUNTED_ON_FILEID
|
|
|
|
};
|
|
|
|
|
2006-10-20 13:28:51 +07:00
|
|
|
static void nfs4_setup_readdir(u64 cookie, __be32 *verifier, struct dentry *dentry,
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_readdir_arg *readdir)
|
|
|
|
{
|
2006-10-20 13:28:49 +07:00
|
|
|
__be32 *start, *p;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
BUG_ON(readdir->count < 80);
|
|
|
|
if (cookie > 2) {
|
2005-06-23 00:16:28 +07:00
|
|
|
readdir->cookie = cookie;
|
2005-04-17 05:20:36 +07:00
|
|
|
memcpy(&readdir->verifier, verifier, sizeof(readdir->verifier));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
readdir->cookie = 0;
|
|
|
|
memset(&readdir->verifier, 0, sizeof(readdir->verifier));
|
|
|
|
if (cookie == 2)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* NFSv4 servers do not return entries for '.' and '..'
|
|
|
|
* Therefore, we fake these entries here. We let '.'
|
|
|
|
* have cookie 0 and '..' have cookie 1. Note that
|
|
|
|
* when talking to the server, we always send cookie 0
|
|
|
|
* instead of 1 or 2.
|
|
|
|
*/
|
2006-10-20 13:28:49 +07:00
|
|
|
start = p = kmap_atomic(*readdir->pages, KM_USER0);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (cookie == 0) {
|
|
|
|
*p++ = xdr_one; /* next */
|
|
|
|
*p++ = xdr_zero; /* cookie, first word */
|
|
|
|
*p++ = xdr_one; /* cookie, second word */
|
|
|
|
*p++ = xdr_one; /* entry len */
|
|
|
|
memcpy(p, ".\0\0\0", 4); /* entry */
|
|
|
|
p++;
|
|
|
|
*p++ = xdr_one; /* bitmap length */
|
|
|
|
*p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
|
|
|
|
*p++ = htonl(8); /* attribute buffer length */
|
2007-08-04 02:07:10 +07:00
|
|
|
p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_inode));
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
*p++ = xdr_one; /* next */
|
|
|
|
*p++ = xdr_zero; /* cookie, first word */
|
|
|
|
*p++ = xdr_two; /* cookie, second word */
|
|
|
|
*p++ = xdr_two; /* entry len */
|
|
|
|
memcpy(p, "..\0\0", 4); /* entry */
|
|
|
|
p++;
|
|
|
|
*p++ = xdr_one; /* bitmap length */
|
|
|
|
*p++ = htonl(FATTR4_WORD0_FILEID); /* bitmap */
|
|
|
|
*p++ = htonl(8); /* attribute buffer length */
|
2007-08-04 02:07:10 +07:00
|
|
|
p = xdr_encode_hyper(p, NFS_FILEID(dentry->d_parent->d_inode));
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
readdir->pgbase = (char *)p - (char *)start;
|
|
|
|
readdir->count -= readdir->pgbase;
|
|
|
|
kunmap_atomic(start, KM_USER0);
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:21 +07:00
|
|
|
static void renew_lease(const struct nfs_server *server, unsigned long timestamp)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2005-04-17 05:20:36 +07:00
|
|
|
spin_lock(&clp->cl_lock);
|
|
|
|
if (time_before(clp->cl_last_renewal,timestamp))
|
|
|
|
clp->cl_last_renewal = timestamp;
|
|
|
|
spin_unlock(&clp->cl_lock);
|
|
|
|
}
|
|
|
|
|
2006-05-25 12:40:57 +07:00
|
|
|
static void update_changeattr(struct inode *dir, struct nfs4_change_info *cinfo)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-05-25 12:40:57 +07:00
|
|
|
struct nfs_inode *nfsi = NFS_I(dir);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-05-25 12:40:57 +07:00
|
|
|
spin_lock(&dir->i_lock);
|
|
|
|
nfsi->cache_validity |= NFS_INO_INVALID_ATTR|NFS_INO_REVAL_PAGECACHE|NFS_INO_INVALID_DATA;
|
2005-04-17 05:20:36 +07:00
|
|
|
if (cinfo->before == nfsi->change_attr && cinfo->atomic)
|
|
|
|
nfsi->change_attr = cinfo->after;
|
2006-05-25 12:40:57 +07:00
|
|
|
spin_unlock(&dir->i_lock);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs4_opendata {
|
2007-06-18 03:02:44 +07:00
|
|
|
struct kref kref;
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs_openargs o_arg;
|
|
|
|
struct nfs_openres o_res;
|
2006-01-03 15:55:12 +07:00
|
|
|
struct nfs_open_confirmargs c_arg;
|
|
|
|
struct nfs_open_confirmres c_res;
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs_fattr f_attr;
|
|
|
|
struct nfs_fattr dir_attr;
|
2007-06-05 23:30:00 +07:00
|
|
|
struct path path;
|
2006-01-03 15:55:08 +07:00
|
|
|
struct dentry *dir;
|
|
|
|
struct nfs4_state_owner *owner;
|
2007-07-06 06:02:21 +07:00
|
|
|
struct nfs4_state *state;
|
2006-01-03 15:55:08 +07:00
|
|
|
struct iattr attrs;
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp;
|
2007-07-08 00:19:59 +07:00
|
|
|
unsigned int rpc_done : 1;
|
2006-01-03 15:55:11 +07:00
|
|
|
int rpc_status;
|
|
|
|
int cancelled;
|
2006-01-03 15:55:08 +07:00
|
|
|
};
|
|
|
|
|
2007-07-04 10:48:13 +07:00
|
|
|
|
|
|
|
static void nfs4_init_opendata_res(struct nfs4_opendata *p)
|
|
|
|
{
|
|
|
|
p->o_res.f_attr = &p->f_attr;
|
|
|
|
p->o_res.dir_attr = &p->dir_attr;
|
|
|
|
p->o_res.server = p->o_arg.server;
|
|
|
|
nfs_fattr_init(&p->f_attr);
|
|
|
|
nfs_fattr_init(&p->dir_attr);
|
|
|
|
}
|
|
|
|
|
2007-06-05 23:30:00 +07:00
|
|
|
static struct nfs4_opendata *nfs4_opendata_alloc(struct path *path,
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs4_state_owner *sp, int flags,
|
|
|
|
const struct iattr *attrs)
|
|
|
|
{
|
2007-06-05 23:30:00 +07:00
|
|
|
struct dentry *parent = dget_parent(path->dentry);
|
2006-01-03 15:55:08 +07:00
|
|
|
struct inode *dir = parent->d_inode;
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
struct nfs4_opendata *p;
|
|
|
|
|
|
|
|
p = kzalloc(sizeof(*p), GFP_KERNEL);
|
|
|
|
if (p == NULL)
|
|
|
|
goto err;
|
|
|
|
p->o_arg.seqid = nfs_alloc_seqid(&sp->so_seqid);
|
|
|
|
if (p->o_arg.seqid == NULL)
|
|
|
|
goto err_free;
|
2007-06-05 23:30:00 +07:00
|
|
|
p->path.mnt = mntget(path->mnt);
|
|
|
|
p->path.dentry = dget(path->dentry);
|
2006-01-03 15:55:08 +07:00
|
|
|
p->dir = parent;
|
|
|
|
p->owner = sp;
|
|
|
|
atomic_inc(&sp->so_count);
|
|
|
|
p->o_arg.fh = NFS_FH(dir);
|
|
|
|
p->o_arg.open_flags = flags,
|
2006-08-23 07:06:09 +07:00
|
|
|
p->o_arg.clientid = server->nfs_client->cl_clientid;
|
2007-07-03 00:58:33 +07:00
|
|
|
p->o_arg.id = sp->so_owner_id.id;
|
2007-06-05 23:30:00 +07:00
|
|
|
p->o_arg.name = &p->path.dentry->d_name;
|
2006-01-03 15:55:08 +07:00
|
|
|
p->o_arg.server = server;
|
|
|
|
p->o_arg.bitmask = server->attr_bitmask;
|
|
|
|
p->o_arg.claim = NFS4_OPEN_CLAIM_NULL;
|
|
|
|
if (flags & O_EXCL) {
|
|
|
|
u32 *s = (u32 *) p->o_arg.u.verifier.data;
|
|
|
|
s[0] = jiffies;
|
|
|
|
s[1] = current->pid;
|
|
|
|
} else if (flags & O_CREAT) {
|
|
|
|
p->o_arg.u.attrs = &p->attrs;
|
|
|
|
memcpy(&p->attrs, attrs, sizeof(p->attrs));
|
|
|
|
}
|
2006-01-03 15:55:12 +07:00
|
|
|
p->c_arg.fh = &p->o_res.fh;
|
|
|
|
p->c_arg.stateid = &p->o_res.stateid;
|
|
|
|
p->c_arg.seqid = p->o_arg.seqid;
|
2007-07-04 10:48:13 +07:00
|
|
|
nfs4_init_opendata_res(p);
|
2007-06-18 03:02:44 +07:00
|
|
|
kref_init(&p->kref);
|
2006-01-03 15:55:08 +07:00
|
|
|
return p;
|
|
|
|
err_free:
|
|
|
|
kfree(p);
|
|
|
|
err:
|
|
|
|
dput(parent);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-06-18 03:02:44 +07:00
|
|
|
static void nfs4_opendata_free(struct kref *kref)
|
2006-01-03 15:55:08 +07:00
|
|
|
{
|
2007-06-18 03:02:44 +07:00
|
|
|
struct nfs4_opendata *p = container_of(kref,
|
|
|
|
struct nfs4_opendata, kref);
|
|
|
|
|
|
|
|
nfs_free_seqid(p->o_arg.seqid);
|
2007-07-06 06:02:21 +07:00
|
|
|
if (p->state != NULL)
|
|
|
|
nfs4_put_open_state(p->state);
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_put_state_owner(p->owner);
|
|
|
|
dput(p->dir);
|
|
|
|
dput(p->path.dentry);
|
|
|
|
mntput(p->path.mnt);
|
|
|
|
kfree(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_opendata_put(struct nfs4_opendata *p)
|
|
|
|
{
|
|
|
|
if (p != NULL)
|
|
|
|
kref_put(&p->kref, nfs4_opendata_free);
|
2006-01-03 15:55:08 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:07 +07:00
|
|
|
static int nfs4_wait_for_completion_rpc_task(struct rpc_task *task)
|
|
|
|
{
|
|
|
|
sigset_t oldset;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
rpc_clnt_sigmask(task->tk_client, &oldset);
|
|
|
|
ret = rpc_wait_for_completion_task(task);
|
|
|
|
rpc_clnt_sigunmask(task->tk_client, &oldset);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2007-07-09 01:11:36 +07:00
|
|
|
static int can_open_cached(struct nfs4_state *state, int mode)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
switch (mode & (FMODE_READ|FMODE_WRITE|O_EXCL)) {
|
|
|
|
case FMODE_READ:
|
|
|
|
ret |= test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0;
|
|
|
|
break;
|
|
|
|
case FMODE_WRITE:
|
|
|
|
ret |= test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0;
|
|
|
|
break;
|
|
|
|
case FMODE_READ|FMODE_WRITE:
|
|
|
|
ret |= test_bit(NFS_O_RDWR_STATE, &state->flags) != 0;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2007-07-06 06:02:21 +07:00
|
|
|
static int can_open_delegated(struct nfs_delegation *delegation, mode_t open_flags)
|
|
|
|
{
|
|
|
|
if ((delegation->type & open_flags) != open_flags)
|
|
|
|
return 0;
|
|
|
|
if (delegation->flags & NFS_DELEGATION_NEED_RECLAIM)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-07-06 05:07:55 +07:00
|
|
|
static void update_open_stateflags(struct nfs4_state *state, mode_t open_flags)
|
2006-01-03 15:55:13 +07:00
|
|
|
{
|
|
|
|
switch (open_flags) {
|
|
|
|
case FMODE_WRITE:
|
|
|
|
state->n_wronly++;
|
|
|
|
break;
|
|
|
|
case FMODE_READ:
|
|
|
|
state->n_rdonly++;
|
|
|
|
break;
|
|
|
|
case FMODE_READ|FMODE_WRITE:
|
|
|
|
state->n_rdwr++;
|
|
|
|
}
|
2007-07-06 05:07:55 +07:00
|
|
|
nfs4_state_set_mode_locked(state, state->state | open_flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs_set_open_stateid_locked(struct nfs4_state *state, nfs4_stateid *stateid, int open_flags)
|
|
|
|
{
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
|
|
|
|
memcpy(state->stateid.data, stateid->data, sizeof(state->stateid.data));
|
|
|
|
memcpy(state->open_stateid.data, stateid->data, sizeof(state->open_stateid.data));
|
|
|
|
switch (open_flags) {
|
|
|
|
case FMODE_READ:
|
|
|
|
set_bit(NFS_O_RDONLY_STATE, &state->flags);
|
|
|
|
break;
|
|
|
|
case FMODE_WRITE:
|
|
|
|
set_bit(NFS_O_WRONLY_STATE, &state->flags);
|
|
|
|
break;
|
|
|
|
case FMODE_READ|FMODE_WRITE:
|
|
|
|
set_bit(NFS_O_RDWR_STATE, &state->flags);
|
|
|
|
}
|
2006-01-03 15:55:13 +07:00
|
|
|
}
|
|
|
|
|
2007-07-06 05:07:55 +07:00
|
|
|
static void nfs_set_open_stateid(struct nfs4_state *state, nfs4_stateid *stateid, int open_flags)
|
|
|
|
{
|
2007-07-09 21:45:42 +07:00
|
|
|
write_seqlock(&state->seqlock);
|
2007-07-06 05:07:55 +07:00
|
|
|
nfs_set_open_stateid_locked(state, stateid, open_flags);
|
2007-07-09 21:45:42 +07:00
|
|
|
write_sequnlock(&state->seqlock);
|
2007-07-06 05:07:55 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void update_open_stateid(struct nfs4_state *state, nfs4_stateid *open_stateid, nfs4_stateid *deleg_stateid, int open_flags)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
open_flags &= (FMODE_READ|FMODE_WRITE);
|
2007-07-09 21:45:42 +07:00
|
|
|
/*
|
|
|
|
* Protect the call to nfs4_state_set_mode_locked and
|
|
|
|
* serialise the stateid update
|
|
|
|
*/
|
|
|
|
write_seqlock(&state->seqlock);
|
2007-07-06 05:07:55 +07:00
|
|
|
if (deleg_stateid != NULL) {
|
|
|
|
memcpy(state->stateid.data, deleg_stateid->data, sizeof(state->stateid.data));
|
|
|
|
set_bit(NFS_DELEGATED_STATE, &state->flags);
|
|
|
|
}
|
|
|
|
if (open_stateid != NULL)
|
|
|
|
nfs_set_open_stateid_locked(state, open_stateid, open_flags);
|
2007-07-09 21:45:42 +07:00
|
|
|
write_sequnlock(&state->seqlock);
|
|
|
|
spin_lock(&state->owner->so_lock);
|
2006-01-03 15:55:13 +07:00
|
|
|
update_open_stateflags(state, open_flags);
|
2005-10-21 04:22:47 +07:00
|
|
|
spin_unlock(&state->owner->so_lock);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-07-06 06:02:21 +07:00
|
|
|
static void nfs4_return_incompatible_delegation(struct inode *inode, mode_t open_flags)
|
|
|
|
{
|
|
|
|
struct nfs_delegation *delegation;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(NFS_I(inode)->delegation);
|
|
|
|
if (delegation == NULL || (delegation->type & open_flags) == open_flags) {
|
|
|
|
rcu_read_unlock();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
nfs_inode_return_delegation(inode);
|
|
|
|
}
|
|
|
|
|
2007-07-09 01:11:36 +07:00
|
|
|
static struct nfs4_state *nfs4_try_open_cached(struct nfs4_opendata *opendata)
|
2007-07-06 06:02:21 +07:00
|
|
|
{
|
|
|
|
struct nfs4_state *state = opendata->state;
|
|
|
|
struct nfs_inode *nfsi = NFS_I(state->inode);
|
|
|
|
struct nfs_delegation *delegation;
|
|
|
|
int open_mode = opendata->o_arg.open_flags & (FMODE_READ|FMODE_WRITE|O_EXCL);
|
|
|
|
nfs4_stateid stateid;
|
|
|
|
int ret = -EAGAIN;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(nfsi->delegation);
|
|
|
|
for (;;) {
|
2007-07-09 01:11:36 +07:00
|
|
|
if (can_open_cached(state, open_mode)) {
|
|
|
|
spin_lock(&state->owner->so_lock);
|
|
|
|
if (can_open_cached(state, open_mode)) {
|
|
|
|
update_open_stateflags(state, open_mode);
|
|
|
|
spin_unlock(&state->owner->so_lock);
|
|
|
|
rcu_read_unlock();
|
|
|
|
goto out_return_state;
|
|
|
|
}
|
|
|
|
spin_unlock(&state->owner->so_lock);
|
|
|
|
}
|
|
|
|
if (delegation == NULL)
|
|
|
|
break;
|
2007-07-06 06:02:21 +07:00
|
|
|
if (!can_open_delegated(delegation, open_mode))
|
|
|
|
break;
|
|
|
|
/* Save the delegation */
|
|
|
|
memcpy(stateid.data, delegation->stateid.data, sizeof(stateid.data));
|
|
|
|
rcu_read_unlock();
|
|
|
|
lock_kernel();
|
|
|
|
ret = _nfs4_do_access(state->inode, state->owner->so_cred, open_mode);
|
|
|
|
unlock_kernel();
|
|
|
|
if (ret != 0)
|
|
|
|
goto out;
|
|
|
|
ret = -EAGAIN;
|
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(nfsi->delegation);
|
2007-07-09 01:11:36 +07:00
|
|
|
/* If no delegation, try a cached open */
|
2007-07-06 06:02:21 +07:00
|
|
|
if (delegation == NULL)
|
2007-07-09 01:11:36 +07:00
|
|
|
continue;
|
2007-07-06 06:02:21 +07:00
|
|
|
/* Is the delegation still valid? */
|
|
|
|
if (memcmp(stateid.data, delegation->stateid.data, sizeof(stateid.data)) != 0)
|
|
|
|
continue;
|
|
|
|
rcu_read_unlock();
|
|
|
|
update_open_stateid(state, NULL, &stateid, open_mode);
|
|
|
|
goto out_return_state;
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
out:
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
out_return_state:
|
|
|
|
atomic_inc(&state->count);
|
|
|
|
return state;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
static struct nfs4_state *nfs4_opendata_to_nfs4_state(struct nfs4_opendata *data)
|
|
|
|
{
|
|
|
|
struct inode *inode;
|
|
|
|
struct nfs4_state *state = NULL;
|
2007-07-06 05:07:55 +07:00
|
|
|
struct nfs_delegation *delegation;
|
|
|
|
nfs4_stateid *deleg_stateid = NULL;
|
2007-07-07 19:04:47 +07:00
|
|
|
int ret;
|
2006-01-03 15:55:11 +07:00
|
|
|
|
2007-07-06 06:02:21 +07:00
|
|
|
if (!data->rpc_done) {
|
2007-07-09 01:11:36 +07:00
|
|
|
state = nfs4_try_open_cached(data);
|
2007-07-06 06:02:21 +07:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2007-07-07 19:04:47 +07:00
|
|
|
ret = -EAGAIN;
|
2006-01-03 15:55:11 +07:00
|
|
|
if (!(data->f_attr.valid & NFS_ATTR_FATTR))
|
2007-07-07 19:04:47 +07:00
|
|
|
goto err;
|
2006-01-03 15:55:11 +07:00
|
|
|
inode = nfs_fhget(data->dir->d_sb, &data->o_res.fh, &data->f_attr);
|
2007-07-07 19:04:47 +07:00
|
|
|
ret = PTR_ERR(inode);
|
2006-03-21 01:44:48 +07:00
|
|
|
if (IS_ERR(inode))
|
2007-07-07 19:04:47 +07:00
|
|
|
goto err;
|
|
|
|
ret = -ENOMEM;
|
2006-01-03 15:55:11 +07:00
|
|
|
state = nfs4_get_open_state(inode, data->owner);
|
|
|
|
if (state == NULL)
|
2007-07-07 19:04:47 +07:00
|
|
|
goto err_put_inode;
|
2007-07-04 03:42:45 +07:00
|
|
|
if (data->o_res.delegation_type != 0) {
|
|
|
|
int delegation_flags = 0;
|
|
|
|
|
2007-07-06 05:07:55 +07:00
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(NFS_I(inode)->delegation);
|
|
|
|
if (delegation)
|
|
|
|
delegation_flags = delegation->flags;
|
|
|
|
rcu_read_unlock();
|
2007-07-04 03:42:45 +07:00
|
|
|
if (!(delegation_flags & NFS_DELEGATION_NEED_RECLAIM))
|
|
|
|
nfs_inode_set_delegation(state->inode,
|
|
|
|
data->owner->so_cred,
|
|
|
|
&data->o_res);
|
|
|
|
else
|
|
|
|
nfs_inode_reclaim_delegation(state->inode,
|
|
|
|
data->owner->so_cred,
|
|
|
|
&data->o_res);
|
|
|
|
}
|
2007-07-06 05:07:55 +07:00
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(NFS_I(inode)->delegation);
|
|
|
|
if (delegation != NULL)
|
|
|
|
deleg_stateid = &delegation->stateid;
|
|
|
|
update_open_stateid(state, &data->o_res.stateid, deleg_stateid, data->o_arg.open_flags);
|
|
|
|
rcu_read_unlock();
|
2006-01-03 15:55:11 +07:00
|
|
|
iput(inode);
|
2007-07-06 06:02:21 +07:00
|
|
|
out:
|
2006-01-03 15:55:11 +07:00
|
|
|
return state;
|
2007-07-07 19:04:47 +07:00
|
|
|
err_put_inode:
|
|
|
|
iput(inode);
|
|
|
|
err:
|
|
|
|
return ERR_PTR(ret);
|
2006-01-03 15:55:11 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:15 +07:00
|
|
|
static struct nfs_open_context *nfs4_state_find_open_context(struct nfs4_state *state)
|
|
|
|
{
|
|
|
|
struct nfs_inode *nfsi = NFS_I(state->inode);
|
|
|
|
struct nfs_open_context *ctx;
|
|
|
|
|
|
|
|
spin_lock(&state->inode->i_lock);
|
|
|
|
list_for_each_entry(ctx, &nfsi->open_files, list) {
|
|
|
|
if (ctx->state != state)
|
|
|
|
continue;
|
|
|
|
get_nfs_open_context(ctx);
|
|
|
|
spin_unlock(&state->inode->i_lock);
|
|
|
|
return ctx;
|
|
|
|
}
|
|
|
|
spin_unlock(&state->inode->i_lock);
|
|
|
|
return ERR_PTR(-ENOENT);
|
|
|
|
}
|
|
|
|
|
2007-07-18 08:50:45 +07:00
|
|
|
static struct nfs4_opendata *nfs4_open_recoverdata_alloc(struct nfs_open_context *ctx, struct nfs4_state *state)
|
|
|
|
{
|
|
|
|
struct nfs4_opendata *opendata;
|
|
|
|
|
|
|
|
opendata = nfs4_opendata_alloc(&ctx->path, state->owner, 0, NULL);
|
|
|
|
if (opendata == NULL)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
opendata->state = state;
|
|
|
|
atomic_inc(&state->count);
|
|
|
|
return opendata;
|
|
|
|
}
|
|
|
|
|
2007-07-04 10:48:13 +07:00
|
|
|
static int nfs4_open_recover_helper(struct nfs4_opendata *opendata, mode_t openflags, struct nfs4_state **res)
|
2006-01-03 15:55:15 +07:00
|
|
|
{
|
2007-07-04 10:48:13 +07:00
|
|
|
struct nfs4_state *newstate;
|
2006-01-03 15:55:15 +07:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
opendata->o_arg.open_flags = openflags;
|
2007-07-04 10:48:13 +07:00
|
|
|
memset(&opendata->o_res, 0, sizeof(opendata->o_res));
|
|
|
|
memset(&opendata->c_res, 0, sizeof(opendata->c_res));
|
|
|
|
nfs4_init_opendata_res(opendata);
|
2006-01-03 15:55:15 +07:00
|
|
|
ret = _nfs4_proc_open(opendata);
|
|
|
|
if (ret != 0)
|
|
|
|
return ret;
|
2007-07-04 10:48:13 +07:00
|
|
|
newstate = nfs4_opendata_to_nfs4_state(opendata);
|
2007-07-07 19:04:47 +07:00
|
|
|
if (IS_ERR(newstate))
|
|
|
|
return PTR_ERR(newstate);
|
|
|
|
nfs4_close_state(&opendata->path, newstate, openflags);
|
2007-07-04 10:48:13 +07:00
|
|
|
*res = newstate;
|
2006-01-03 15:55:15 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_open_recover(struct nfs4_opendata *opendata, struct nfs4_state *state)
|
|
|
|
{
|
|
|
|
struct nfs4_state *newstate;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* memory barrier prior to reading state->n_* */
|
2007-07-04 10:48:13 +07:00
|
|
|
clear_bit(NFS_DELEGATED_STATE, &state->flags);
|
2006-01-03 15:55:15 +07:00
|
|
|
smp_rmb();
|
|
|
|
if (state->n_rdwr != 0) {
|
2007-07-04 10:48:13 +07:00
|
|
|
ret = nfs4_open_recover_helper(opendata, FMODE_READ|FMODE_WRITE, &newstate);
|
2006-01-03 15:55:15 +07:00
|
|
|
if (ret != 0)
|
|
|
|
return ret;
|
2007-07-04 10:48:13 +07:00
|
|
|
if (newstate != state)
|
|
|
|
return -ESTALE;
|
2006-01-03 15:55:15 +07:00
|
|
|
}
|
|
|
|
if (state->n_wronly != 0) {
|
2007-07-04 10:48:13 +07:00
|
|
|
ret = nfs4_open_recover_helper(opendata, FMODE_WRITE, &newstate);
|
2006-01-03 15:55:15 +07:00
|
|
|
if (ret != 0)
|
|
|
|
return ret;
|
2007-07-04 10:48:13 +07:00
|
|
|
if (newstate != state)
|
|
|
|
return -ESTALE;
|
2006-01-03 15:55:15 +07:00
|
|
|
}
|
|
|
|
if (state->n_rdonly != 0) {
|
2007-07-04 10:48:13 +07:00
|
|
|
ret = nfs4_open_recover_helper(opendata, FMODE_READ, &newstate);
|
2006-01-03 15:55:15 +07:00
|
|
|
if (ret != 0)
|
|
|
|
return ret;
|
2007-07-04 10:48:13 +07:00
|
|
|
if (newstate != state)
|
|
|
|
return -ESTALE;
|
2006-01-03 15:55:15 +07:00
|
|
|
}
|
2007-07-09 08:04:15 +07:00
|
|
|
/*
|
|
|
|
* We may have performed cached opens for all three recoveries.
|
|
|
|
* Check if we need to update the current stateid.
|
|
|
|
*/
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0 &&
|
|
|
|
memcmp(state->stateid.data, state->open_stateid.data, sizeof(state->stateid.data)) != 0) {
|
2007-07-09 21:45:42 +07:00
|
|
|
write_seqlock(&state->seqlock);
|
2007-07-09 08:04:15 +07:00
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags) == 0)
|
|
|
|
memcpy(state->stateid.data, state->open_stateid.data, sizeof(state->stateid.data));
|
2007-07-09 21:45:42 +07:00
|
|
|
write_sequnlock(&state->seqlock);
|
2007-07-09 08:04:15 +07:00
|
|
|
}
|
2006-01-03 15:55:15 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* OPEN_RECLAIM:
|
|
|
|
* reclaim state on the server after a reboot.
|
|
|
|
*/
|
2007-06-05 22:46:42 +07:00
|
|
|
static int _nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-07-09 08:04:15 +07:00
|
|
|
struct nfs_delegation *delegation;
|
2006-01-03 15:55:15 +07:00
|
|
|
struct nfs4_opendata *opendata;
|
|
|
|
int delegation_type = 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
int status;
|
|
|
|
|
2007-07-18 08:50:45 +07:00
|
|
|
opendata = nfs4_open_recoverdata_alloc(ctx, state);
|
|
|
|
if (IS_ERR(opendata))
|
|
|
|
return PTR_ERR(opendata);
|
2006-01-03 15:55:15 +07:00
|
|
|
opendata->o_arg.claim = NFS4_OPEN_CLAIM_PREVIOUS;
|
|
|
|
opendata->o_arg.fh = NFS_FH(state->inode);
|
2007-07-09 08:04:15 +07:00
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(NFS_I(state->inode)->delegation);
|
|
|
|
if (delegation != NULL && (delegation->flags & NFS_DELEGATION_NEED_RECLAIM) != 0)
|
2007-08-27 20:57:46 +07:00
|
|
|
delegation_type = delegation->type;
|
2007-07-09 08:04:15 +07:00
|
|
|
rcu_read_unlock();
|
2006-01-03 15:55:15 +07:00
|
|
|
opendata->o_arg.u.delegation_type = delegation_type;
|
|
|
|
status = nfs4_open_recover(opendata, state);
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_opendata_put(opendata);
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2007-06-05 22:46:42 +07:00
|
|
|
static int nfs4_do_open_reclaim(struct nfs_open_context *ctx, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
2007-06-05 22:46:42 +07:00
|
|
|
err = _nfs4_do_open_reclaim(ctx, state);
|
2005-06-23 00:16:29 +07:00
|
|
|
if (err != -NFS4ERR_DELAY)
|
|
|
|
break;
|
|
|
|
nfs4_handle_exception(server, err, &exception);
|
2005-04-17 05:20:36 +07:00
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:15 +07:00
|
|
|
static int nfs4_open_reclaim(struct nfs4_state_owner *sp, struct nfs4_state *state)
|
|
|
|
{
|
|
|
|
struct nfs_open_context *ctx;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ctx = nfs4_state_find_open_context(state);
|
|
|
|
if (IS_ERR(ctx))
|
|
|
|
return PTR_ERR(ctx);
|
2007-06-05 22:46:42 +07:00
|
|
|
ret = nfs4_do_open_reclaim(ctx, state);
|
2006-01-03 15:55:15 +07:00
|
|
|
put_nfs_open_context(ctx);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2007-07-07 02:10:43 +07:00
|
|
|
static int _nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs4_opendata *opendata;
|
2006-01-03 15:55:15 +07:00
|
|
|
int ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-07-18 08:50:45 +07:00
|
|
|
opendata = nfs4_open_recoverdata_alloc(ctx, state);
|
|
|
|
if (IS_ERR(opendata))
|
|
|
|
return PTR_ERR(opendata);
|
2006-01-03 15:55:08 +07:00
|
|
|
opendata->o_arg.claim = NFS4_OPEN_CLAIM_DELEGATE_CUR;
|
2007-07-07 02:10:43 +07:00
|
|
|
memcpy(opendata->o_arg.u.delegation.data, stateid->data,
|
2006-01-03 15:55:08 +07:00
|
|
|
sizeof(opendata->o_arg.u.delegation.data));
|
2006-01-03 15:55:15 +07:00
|
|
|
ret = nfs4_open_recover(opendata, state);
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_opendata_put(opendata);
|
2006-01-03 15:55:15 +07:00
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-07-07 02:10:43 +07:00
|
|
|
int nfs4_open_delegation_recall(struct nfs_open_context *ctx, struct nfs4_state *state, const nfs4_stateid *stateid)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
2007-06-05 22:46:42 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
int err;
|
|
|
|
do {
|
2007-07-07 02:10:43 +07:00
|
|
|
err = _nfs4_open_delegation_recall(ctx, state, stateid);
|
2005-04-17 05:20:36 +07:00
|
|
|
switch (err) {
|
|
|
|
case 0:
|
|
|
|
return err;
|
|
|
|
case -NFS4ERR_STALE_CLIENTID:
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
/* Don't recall a delegation if it was lost */
|
2006-08-23 07:06:09 +07:00
|
|
|
nfs4_schedule_state_recovery(server->nfs_client);
|
2005-04-17 05:20:36 +07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
err = nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:12 +07:00
|
|
|
static void nfs4_open_confirm_prepare(struct rpc_task *task, void *calldata)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:12 +07:00
|
|
|
struct nfs4_opendata *data = calldata;
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_CONFIRM],
|
|
|
|
.rpc_argp = &data->c_arg,
|
|
|
|
.rpc_resp = &data->c_res,
|
|
|
|
.rpc_cred = data->owner->so_cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2006-01-03 15:55:21 +07:00
|
|
|
data->timestamp = jiffies;
|
2006-01-03 15:55:12 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_open_confirm_done(struct rpc_task *task, void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_opendata *data = calldata;
|
|
|
|
|
|
|
|
data->rpc_status = task->tk_status;
|
|
|
|
if (RPC_ASSASSINATED(task))
|
|
|
|
return;
|
2006-01-03 15:55:21 +07:00
|
|
|
if (data->rpc_status == 0) {
|
2006-01-03 15:55:12 +07:00
|
|
|
memcpy(data->o_res.stateid.data, data->c_res.stateid.data,
|
|
|
|
sizeof(data->o_res.stateid.data));
|
2006-01-03 15:55:21 +07:00
|
|
|
renew_lease(data->o_res.server, data->timestamp);
|
2007-07-08 00:19:59 +07:00
|
|
|
data->rpc_done = 1;
|
2006-01-03 15:55:21 +07:00
|
|
|
}
|
2006-01-03 15:55:12 +07:00
|
|
|
nfs_confirm_seqid(&data->owner->so_seqid, data->rpc_status);
|
2007-07-09 03:19:56 +07:00
|
|
|
nfs_increment_open_seqid(data->rpc_status, data->c_arg.seqid);
|
2006-01-03 15:55:12 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_open_confirm_release(void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_opendata *data = calldata;
|
|
|
|
struct nfs4_state *state = NULL;
|
|
|
|
|
|
|
|
/* If this request hasn't been cancelled, do nothing */
|
|
|
|
if (data->cancelled == 0)
|
|
|
|
goto out_free;
|
|
|
|
/* In case of error, no cleanup! */
|
2007-07-08 00:19:59 +07:00
|
|
|
if (!data->rpc_done)
|
2006-01-03 15:55:12 +07:00
|
|
|
goto out_free;
|
|
|
|
nfs_confirm_seqid(&data->owner->so_seqid, 0);
|
|
|
|
state = nfs4_opendata_to_nfs4_state(data);
|
2007-07-07 19:04:47 +07:00
|
|
|
if (!IS_ERR(state))
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_close_state(&data->path, state, data->o_arg.open_flags);
|
2006-01-03 15:55:12 +07:00
|
|
|
out_free:
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_opendata_put(data);
|
2006-01-03 15:55:12 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct rpc_call_ops nfs4_open_confirm_ops = {
|
|
|
|
.rpc_call_prepare = nfs4_open_confirm_prepare,
|
|
|
|
.rpc_call_done = nfs4_open_confirm_done,
|
|
|
|
.rpc_release = nfs4_open_confirm_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Note: On error, nfs4_proc_open_confirm will free the struct nfs4_opendata
|
|
|
|
*/
|
|
|
|
static int _nfs4_proc_open_confirm(struct nfs4_opendata *data)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(data->dir->d_inode);
|
|
|
|
struct rpc_task *task;
|
2005-04-17 05:20:36 +07:00
|
|
|
int status;
|
|
|
|
|
2007-06-18 03:02:44 +07:00
|
|
|
kref_get(&data->kref);
|
2007-07-08 00:19:59 +07:00
|
|
|
data->rpc_done = 0;
|
|
|
|
data->rpc_status = 0;
|
2006-01-03 15:55:12 +07:00
|
|
|
task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_confirm_ops, data);
|
2006-03-21 06:11:10 +07:00
|
|
|
if (IS_ERR(task))
|
2006-01-03 15:55:12 +07:00
|
|
|
return PTR_ERR(task);
|
|
|
|
status = nfs4_wait_for_completion_rpc_task(task);
|
|
|
|
if (status != 0) {
|
|
|
|
data->cancelled = 1;
|
|
|
|
smp_wmb();
|
|
|
|
} else
|
|
|
|
status = data->rpc_status;
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
static void nfs4_open_prepare(struct rpc_task *task, void *calldata)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:11 +07:00
|
|
|
struct nfs4_opendata *data = calldata;
|
|
|
|
struct nfs4_state_owner *sp = data->owner;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN],
|
2006-01-03 15:55:11 +07:00
|
|
|
.rpc_argp = &data->o_arg,
|
|
|
|
.rpc_resp = &data->o_res,
|
2005-04-17 05:20:36 +07:00
|
|
|
.rpc_cred = sp->so_cred,
|
|
|
|
};
|
2006-01-03 15:55:11 +07:00
|
|
|
|
|
|
|
if (nfs_wait_on_sequence(data->o_arg.seqid, task) != 0)
|
|
|
|
return;
|
2007-07-06 06:02:21 +07:00
|
|
|
/*
|
|
|
|
* Check if we still need to send an OPEN call, or if we can use
|
|
|
|
* a delegation instead.
|
|
|
|
*/
|
|
|
|
if (data->state != NULL) {
|
|
|
|
struct nfs_delegation *delegation;
|
|
|
|
|
2007-07-09 01:11:36 +07:00
|
|
|
if (can_open_cached(data->state, data->o_arg.open_flags & (FMODE_READ|FMODE_WRITE|O_EXCL)))
|
|
|
|
goto out_no_action;
|
2007-07-06 06:02:21 +07:00
|
|
|
rcu_read_lock();
|
|
|
|
delegation = rcu_dereference(NFS_I(data->state->inode)->delegation);
|
|
|
|
if (delegation != NULL &&
|
|
|
|
(delegation->flags & NFS_DELEGATION_NEED_RECLAIM) == 0) {
|
|
|
|
rcu_read_unlock();
|
2007-07-09 01:11:36 +07:00
|
|
|
goto out_no_action;
|
2007-07-06 06:02:21 +07:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
2006-01-03 15:55:11 +07:00
|
|
|
/* Update sequence id. */
|
2007-07-03 00:58:33 +07:00
|
|
|
data->o_arg.id = sp->so_owner_id.id;
|
2006-01-03 15:55:11 +07:00
|
|
|
data->o_arg.clientid = sp->so_client->cl_clientid;
|
2007-07-18 08:50:45 +07:00
|
|
|
if (data->o_arg.claim == NFS4_OPEN_CLAIM_PREVIOUS) {
|
2006-01-03 15:55:15 +07:00
|
|
|
msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_NOATTR];
|
2007-07-18 08:50:45 +07:00
|
|
|
nfs_copy_fh(&data->o_res.fh, data->o_arg.fh);
|
|
|
|
}
|
2006-01-03 15:55:21 +07:00
|
|
|
data->timestamp = jiffies;
|
2006-01-03 15:55:11 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
2007-07-09 01:11:36 +07:00
|
|
|
return;
|
|
|
|
out_no_action:
|
|
|
|
task->tk_action = NULL;
|
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
static void nfs4_open_done(struct rpc_task *task, void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_opendata *data = calldata;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
data->rpc_status = task->tk_status;
|
|
|
|
if (RPC_ASSASSINATED(task))
|
|
|
|
return;
|
|
|
|
if (task->tk_status == 0) {
|
|
|
|
switch (data->o_res.f_attr->mode & S_IFMT) {
|
2005-10-19 04:20:18 +07:00
|
|
|
case S_IFREG:
|
|
|
|
break;
|
|
|
|
case S_IFLNK:
|
2006-01-03 15:55:11 +07:00
|
|
|
data->rpc_status = -ELOOP;
|
2005-10-19 04:20:18 +07:00
|
|
|
break;
|
|
|
|
case S_IFDIR:
|
2006-01-03 15:55:11 +07:00
|
|
|
data->rpc_status = -EISDIR;
|
2005-10-19 04:20:18 +07:00
|
|
|
break;
|
|
|
|
default:
|
2006-01-03 15:55:11 +07:00
|
|
|
data->rpc_status = -ENOTDIR;
|
2005-10-19 04:20:18 +07:00
|
|
|
}
|
2006-01-03 15:55:21 +07:00
|
|
|
renew_lease(data->o_res.server, data->timestamp);
|
2007-07-09 03:19:56 +07:00
|
|
|
if (!(data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM))
|
|
|
|
nfs_confirm_seqid(&data->owner->so_seqid, 0);
|
2005-10-19 04:20:18 +07:00
|
|
|
}
|
2006-01-03 15:55:11 +07:00
|
|
|
nfs_increment_open_seqid(data->rpc_status, data->o_arg.seqid);
|
2007-07-08 00:19:59 +07:00
|
|
|
data->rpc_done = 1;
|
2006-01-03 15:55:11 +07:00
|
|
|
}
|
2005-10-19 04:20:18 +07:00
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
static void nfs4_open_release(void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_opendata *data = calldata;
|
|
|
|
struct nfs4_state *state = NULL;
|
|
|
|
|
|
|
|
/* If this request hasn't been cancelled, do nothing */
|
|
|
|
if (data->cancelled == 0)
|
|
|
|
goto out_free;
|
|
|
|
/* In case of error, no cleanup! */
|
2007-07-08 00:19:59 +07:00
|
|
|
if (data->rpc_status != 0 || !data->rpc_done)
|
2006-01-03 15:55:11 +07:00
|
|
|
goto out_free;
|
|
|
|
/* In case we need an open_confirm, no cleanup! */
|
|
|
|
if (data->o_res.rflags & NFS4_OPEN_RESULT_CONFIRM)
|
|
|
|
goto out_free;
|
|
|
|
nfs_confirm_seqid(&data->owner->so_seqid, 0);
|
|
|
|
state = nfs4_opendata_to_nfs4_state(data);
|
2007-07-07 19:04:47 +07:00
|
|
|
if (!IS_ERR(state))
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_close_state(&data->path, state, data->o_arg.open_flags);
|
2006-01-03 15:55:11 +07:00
|
|
|
out_free:
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_opendata_put(data);
|
2006-01-03 15:55:11 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct rpc_call_ops nfs4_open_ops = {
|
|
|
|
.rpc_call_prepare = nfs4_open_prepare,
|
|
|
|
.rpc_call_done = nfs4_open_done,
|
|
|
|
.rpc_release = nfs4_open_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Note: On error, nfs4_proc_open will free the struct nfs4_opendata
|
|
|
|
*/
|
|
|
|
static int _nfs4_proc_open(struct nfs4_opendata *data)
|
|
|
|
{
|
|
|
|
struct inode *dir = data->dir->d_inode;
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
struct nfs_openargs *o_arg = &data->o_arg;
|
|
|
|
struct nfs_openres *o_res = &data->o_res;
|
|
|
|
struct rpc_task *task;
|
|
|
|
int status;
|
|
|
|
|
2007-06-18 03:02:44 +07:00
|
|
|
kref_get(&data->kref);
|
2007-07-08 00:19:59 +07:00
|
|
|
data->rpc_done = 0;
|
|
|
|
data->rpc_status = 0;
|
2007-07-04 10:48:13 +07:00
|
|
|
data->cancelled = 0;
|
2006-01-03 15:55:11 +07:00
|
|
|
task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_open_ops, data);
|
2006-03-21 06:11:10 +07:00
|
|
|
if (IS_ERR(task))
|
2006-01-03 15:55:11 +07:00
|
|
|
return PTR_ERR(task);
|
|
|
|
status = nfs4_wait_for_completion_rpc_task(task);
|
|
|
|
if (status != 0) {
|
|
|
|
data->cancelled = 1;
|
|
|
|
smp_wmb();
|
|
|
|
} else
|
|
|
|
status = data->rpc_status;
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2007-07-08 00:19:59 +07:00
|
|
|
if (status != 0 || !data->rpc_done)
|
2006-01-03 15:55:11 +07:00
|
|
|
return status;
|
|
|
|
|
2007-07-18 08:52:41 +07:00
|
|
|
if (o_res->fh.size == 0)
|
|
|
|
_nfs4_proc_lookup(dir, o_arg->name, &o_res->fh, o_res->f_attr);
|
|
|
|
|
2005-10-28 09:12:40 +07:00
|
|
|
if (o_arg->open_flags & O_CREAT) {
|
|
|
|
update_changeattr(dir, &o_res->cinfo);
|
|
|
|
nfs_post_op_update_inode(dir, o_res->dir_attr);
|
|
|
|
} else
|
|
|
|
nfs_refresh_inode(dir, o_res->dir_attr);
|
2005-04-17 05:20:36 +07:00
|
|
|
if(o_res->rflags & NFS4_OPEN_RESULT_CONFIRM) {
|
2006-01-03 15:55:12 +07:00
|
|
|
status = _nfs4_proc_open_confirm(data);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (status != 0)
|
2006-01-03 15:55:11 +07:00
|
|
|
return status;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
if (!(o_res->f_attr->valid & NFS_ATTR_FATTR))
|
2007-07-18 08:52:41 +07:00
|
|
|
_nfs4_proc_getattr(server, &o_res->fh, o_res->f_attr);
|
2006-01-03 15:55:11 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_do_access(struct inode *inode, struct rpc_cred *cred, int openflags)
|
|
|
|
{
|
|
|
|
struct nfs_access_entry cache;
|
|
|
|
int mask = 0;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
if (openflags & FMODE_READ)
|
|
|
|
mask |= MAY_READ;
|
|
|
|
if (openflags & FMODE_WRITE)
|
|
|
|
mask |= MAY_WRITE;
|
2007-07-04 00:04:56 +07:00
|
|
|
if (openflags & FMODE_EXEC)
|
|
|
|
mask |= MAY_EXEC;
|
2005-04-17 05:20:36 +07:00
|
|
|
status = nfs_access_get_cached(inode, cred, &cache);
|
|
|
|
if (status == 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Be clever: ask server to check for all possible rights */
|
|
|
|
cache.mask = MAY_EXEC | MAY_WRITE | MAY_READ;
|
|
|
|
cache.cred = cred;
|
|
|
|
cache.jiffies = jiffies;
|
|
|
|
status = _nfs4_proc_access(inode, &cache);
|
|
|
|
if (status != 0)
|
|
|
|
return status;
|
|
|
|
nfs_access_add_cache(inode, &cache);
|
|
|
|
out:
|
|
|
|
if ((cache.mask & mask) == mask)
|
|
|
|
return 0;
|
|
|
|
return -EACCES;
|
|
|
|
}
|
|
|
|
|
2007-05-15 04:16:04 +07:00
|
|
|
static int nfs4_recover_expired_lease(struct nfs_server *server)
|
2006-01-03 15:55:24 +07:00
|
|
|
{
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2006-09-15 01:03:14 +07:00
|
|
|
int ret;
|
2006-01-03 15:55:24 +07:00
|
|
|
|
2006-09-15 01:03:14 +07:00
|
|
|
for (;;) {
|
|
|
|
ret = nfs4_wait_clnt_recover(server->client, clp);
|
|
|
|
if (ret != 0)
|
|
|
|
return ret;
|
|
|
|
if (!test_and_clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
|
|
|
|
break;
|
2006-01-03 15:55:24 +07:00
|
|
|
nfs4_schedule_state_recovery(clp);
|
2006-09-15 01:03:14 +07:00
|
|
|
}
|
|
|
|
return 0;
|
2006-01-03 15:55:24 +07:00
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* OPEN_EXPIRED:
|
|
|
|
* reclaim state on the server after a network partition.
|
|
|
|
* Assumes caller holds the appropriate lock
|
|
|
|
*/
|
2007-06-05 22:46:42 +07:00
|
|
|
static int _nfs4_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs4_opendata *opendata;
|
2006-01-03 15:55:15 +07:00
|
|
|
int ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-07-18 08:50:45 +07:00
|
|
|
opendata = nfs4_open_recoverdata_alloc(ctx, state);
|
|
|
|
if (IS_ERR(opendata))
|
|
|
|
return PTR_ERR(opendata);
|
2006-01-03 15:55:15 +07:00
|
|
|
ret = nfs4_open_recover(opendata, state);
|
|
|
|
if (ret == -ESTALE) {
|
|
|
|
/* Invalidate the state owner so we don't ever use it again */
|
2007-06-05 22:46:42 +07:00
|
|
|
nfs4_drop_state_owner(state->owner);
|
|
|
|
d_drop(ctx->path.dentry);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2007-06-18 03:02:44 +07:00
|
|
|
nfs4_opendata_put(opendata);
|
2006-01-03 15:55:15 +07:00
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-06-05 22:46:42 +07:00
|
|
|
static inline int nfs4_do_open_expired(struct nfs_open_context *ctx, struct nfs4_state *state)
|
2005-06-23 00:16:29 +07:00
|
|
|
{
|
2007-06-05 22:46:42 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
2005-06-23 00:16:29 +07:00
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
2007-06-05 22:46:42 +07:00
|
|
|
err = _nfs4_open_expired(ctx, state);
|
2005-06-23 00:16:29 +07:00
|
|
|
if (err == -NFS4ERR_DELAY)
|
|
|
|
nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static int nfs4_open_expired(struct nfs4_state_owner *sp, struct nfs4_state *state)
|
|
|
|
{
|
|
|
|
struct nfs_open_context *ctx;
|
2006-01-03 15:55:15 +07:00
|
|
|
int ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-03 15:55:15 +07:00
|
|
|
ctx = nfs4_state_find_open_context(state);
|
|
|
|
if (IS_ERR(ctx))
|
|
|
|
return PTR_ERR(ctx);
|
2007-06-05 22:46:42 +07:00
|
|
|
ret = nfs4_do_open_expired(ctx, state);
|
2006-01-03 15:55:15 +07:00
|
|
|
put_nfs_open_context(ctx);
|
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-06-06 01:49:03 +07:00
|
|
|
/*
|
|
|
|
* on an EXCLUSIVE create, the server should send back a bitmask with FATTR4-*
|
|
|
|
* fields corresponding to attributes that were used to store the verifier.
|
|
|
|
* Make sure we clobber those fields in the later setattr call
|
|
|
|
*/
|
|
|
|
static inline void nfs4_exclusive_attrset(struct nfs4_opendata *opendata, struct iattr *sattr)
|
|
|
|
{
|
|
|
|
if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_ACCESS) &&
|
|
|
|
!(sattr->ia_valid & ATTR_ATIME_SET))
|
|
|
|
sattr->ia_valid |= ATTR_ATIME;
|
|
|
|
|
|
|
|
if ((opendata->o_res.attrset[1] & FATTR4_WORD1_TIME_MODIFY) &&
|
|
|
|
!(sattr->ia_valid & ATTR_MTIME_SET))
|
|
|
|
sattr->ia_valid |= ATTR_MTIME;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
2006-01-03 15:55:11 +07:00
|
|
|
* Returns a referenced nfs4_state
|
2005-04-17 05:20:36 +07:00
|
|
|
*/
|
2007-06-05 23:30:00 +07:00
|
|
|
static int _nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred, struct nfs4_state **res)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs4_state_owner *sp;
|
|
|
|
struct nfs4_state *state = NULL;
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2006-01-03 15:55:08 +07:00
|
|
|
struct nfs4_opendata *opendata;
|
2007-07-06 06:02:21 +07:00
|
|
|
int status;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
/* Protect against reboot recovery conflicts */
|
|
|
|
status = -ENOMEM;
|
|
|
|
if (!(sp = nfs4_get_state_owner(server, cred))) {
|
|
|
|
dprintk("nfs4_do_open: nfs4_get_state_owner failed!\n");
|
|
|
|
goto out_err;
|
|
|
|
}
|
2006-01-03 15:55:24 +07:00
|
|
|
status = nfs4_recover_expired_lease(server);
|
|
|
|
if (status != 0)
|
2006-01-03 15:55:25 +07:00
|
|
|
goto err_put_state_owner;
|
2007-07-06 06:02:21 +07:00
|
|
|
if (path->dentry->d_inode != NULL)
|
|
|
|
nfs4_return_incompatible_delegation(path->dentry->d_inode, flags & (FMODE_READ|FMODE_WRITE));
|
2006-01-03 15:55:24 +07:00
|
|
|
down_read(&clp->cl_sem);
|
|
|
|
status = -ENOMEM;
|
2007-06-05 23:30:00 +07:00
|
|
|
opendata = nfs4_opendata_alloc(path, sp, flags, sattr);
|
2006-01-03 15:55:08 +07:00
|
|
|
if (opendata == NULL)
|
2006-09-15 19:11:51 +07:00
|
|
|
goto err_release_rwsem;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-07-06 06:02:21 +07:00
|
|
|
if (path->dentry->d_inode != NULL)
|
|
|
|
opendata->state = nfs4_get_open_state(path->dentry->d_inode, sp);
|
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
status = _nfs4_proc_open(opendata);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (status != 0)
|
2007-06-18 03:02:44 +07:00
|
|
|
goto err_opendata_put;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-06-06 01:49:03 +07:00
|
|
|
if (opendata->o_arg.open_flags & O_EXCL)
|
|
|
|
nfs4_exclusive_attrset(opendata, sattr);
|
|
|
|
|
2006-01-03 15:55:11 +07:00
|
|
|
state = nfs4_opendata_to_nfs4_state(opendata);
|
2007-07-07 19:04:47 +07:00
|
|
|
status = PTR_ERR(state);
|
|
|
|
if (IS_ERR(state))
|
2007-06-18 03:02:44 +07:00
|
|
|
goto err_opendata_put;
|
|
|
|
nfs4_opendata_put(opendata);
|
2005-04-17 05:20:36 +07:00
|
|
|
nfs4_put_state_owner(sp);
|
|
|
|
up_read(&clp->cl_sem);
|
|
|
|
*res = state;
|
|
|
|
return 0;
|
2007-06-18 03:02:44 +07:00
|
|
|
err_opendata_put:
|
|
|
|
nfs4_opendata_put(opendata);
|
2006-09-15 19:11:51 +07:00
|
|
|
err_release_rwsem:
|
|
|
|
up_read(&clp->cl_sem);
|
2006-01-03 15:55:08 +07:00
|
|
|
err_put_state_owner:
|
|
|
|
nfs4_put_state_owner(sp);
|
2005-04-17 05:20:36 +07:00
|
|
|
out_err:
|
|
|
|
*res = NULL;
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-06-05 23:30:00 +07:00
|
|
|
static struct nfs4_state *nfs4_do_open(struct inode *dir, struct path *path, int flags, struct iattr *sattr, struct rpc_cred *cred)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
struct nfs4_state *res;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
do {
|
2007-06-05 23:30:00 +07:00
|
|
|
status = _nfs4_do_open(dir, path, flags, sattr, cred, &res);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (status == 0)
|
|
|
|
break;
|
|
|
|
/* NOTE: BAD_SEQID means the server and client disagree about the
|
|
|
|
* book-keeping w.r.t. state-changing operations
|
|
|
|
* (OPEN/CLOSE/LOCK/LOCKU...)
|
|
|
|
* It is actually a sign of a bug on the client or on the server.
|
|
|
|
*
|
|
|
|
* If we receive a BAD_SEQID error in the particular case of
|
NFSv4: Add functions to order RPC calls
NFSv4 file state-changing functions such as OPEN, CLOSE, LOCK,... are all
labelled with "sequence identifiers" in order to prevent the server from
reordering RPC requests, as this could cause its file state to
become out of sync with the client.
Currently the NFS client code enforces this ordering locally using
semaphores to restrict access to structures until the RPC call is done.
This, of course, only works with synchronous RPC calls, since the
user process must first grab the semaphore.
By dropping semaphores, and instead teaching the RPC engine to hold
the RPC calls until they are ready to be sent, we can extend this
process to work nicely with asynchronous RPC calls too.
This patch adds a new list called "rpc_sequence" that defines the order
of the RPC calls to be sent. We add one such list for each state_owner.
When an RPC call is ready to be sent, it checks if it is top of the
rpc_sequence list. If so, it proceeds. If not, it goes back to sleep,
and loops until it hits top of the list.
Once the RPC call has completed, it can then bump the sequence id counter,
and remove itself from the rpc_sequence list, and then wake up the next
sleeper.
Note that the state_owner sequence ids and lock_owner sequence ids are
all indexed to the same rpc_sequence list, so OPEN, LOCK,... requests
are all ordered w.r.t. each other.
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2005-10-19 04:20:12 +07:00
|
|
|
* doing an OPEN, we assume that nfs_increment_open_seqid() will
|
2005-04-17 05:20:36 +07:00
|
|
|
* have unhashed the old state_owner for us, and that we can
|
|
|
|
* therefore safely retry using a new one. We should still warn
|
|
|
|
* the user though...
|
|
|
|
*/
|
|
|
|
if (status == -NFS4ERR_BAD_SEQID) {
|
2007-07-09 03:49:11 +07:00
|
|
|
printk(KERN_WARNING "NFS: v4 server %s "
|
|
|
|
" returned a bad sequence-id error!\n",
|
|
|
|
NFS_SERVER(dir)->nfs_client->cl_hostname);
|
2005-04-17 05:20:36 +07:00
|
|
|
exception.retry = 1;
|
|
|
|
continue;
|
|
|
|
}
|
2005-10-19 04:20:21 +07:00
|
|
|
/*
|
|
|
|
* BAD_STATEID on OPEN means that the server cancelled our
|
|
|
|
* state before it received the OPEN_CONFIRM.
|
|
|
|
* Recover by retrying the request as per the discussion
|
|
|
|
* on Page 181 of RFC3530.
|
|
|
|
*/
|
|
|
|
if (status == -NFS4ERR_BAD_STATEID) {
|
|
|
|
exception.retry = 1;
|
|
|
|
continue;
|
|
|
|
}
|
2007-07-06 06:02:21 +07:00
|
|
|
if (status == -EAGAIN) {
|
|
|
|
/* We must have found a delegation */
|
|
|
|
exception.retry = 1;
|
|
|
|
continue;
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
res = ERR_PTR(nfs4_handle_exception(NFS_SERVER(dir),
|
|
|
|
status, &exception));
|
|
|
|
} while (exception.retry);
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:46 +07:00
|
|
|
static int _nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
|
|
|
|
struct iattr *sattr, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-03-21 01:44:46 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs_setattrargs arg = {
|
2006-03-21 01:44:46 +07:00
|
|
|
.fh = NFS_FH(inode),
|
2005-04-17 05:20:36 +07:00
|
|
|
.iap = sattr,
|
|
|
|
.server = server,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs_setattrres res = {
|
|
|
|
.fattr = fattr,
|
|
|
|
.server = server,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETATTR],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp = jiffies;
|
2005-08-16 22:49:44 +07:00
|
|
|
int status;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-03-21 01:44:46 +07:00
|
|
|
if (nfs4_copy_delegation_stateid(&arg.stateid, inode)) {
|
|
|
|
/* Use that stateid */
|
|
|
|
} else if (state != NULL) {
|
2005-04-17 05:20:36 +07:00
|
|
|
msg.rpc_cred = state->owner->so_cred;
|
2005-06-23 00:16:29 +07:00
|
|
|
nfs4_copy_stateid(&arg.stateid, state, current->files);
|
|
|
|
} else
|
2005-04-17 05:20:36 +07:00
|
|
|
memcpy(&arg.stateid, &zero_stateid, sizeof(arg.stateid));
|
|
|
|
|
2005-08-16 22:49:44 +07:00
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
2006-01-03 15:55:21 +07:00
|
|
|
if (status == 0 && state != NULL)
|
|
|
|
renew_lease(server, timestamp);
|
2005-08-16 22:49:44 +07:00
|
|
|
return status;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:46 +07:00
|
|
|
static int nfs4_do_setattr(struct inode *inode, struct nfs_fattr *fattr,
|
|
|
|
struct iattr *sattr, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-03-21 01:44:46 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
2006-03-21 01:44:46 +07:00
|
|
|
_nfs4_do_setattr(inode, fattr, sattr, state),
|
2005-04-17 05:20:36 +07:00
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct nfs4_closedata {
|
2007-06-05 21:31:33 +07:00
|
|
|
struct path path;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct inode *inode;
|
|
|
|
struct nfs4_state *state;
|
|
|
|
struct nfs_closeargs arg;
|
|
|
|
struct nfs_closeres res;
|
2005-10-28 09:12:41 +07:00
|
|
|
struct nfs_fattr fattr;
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp;
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static void nfs4_free_closedata(void *data)
|
2005-10-19 04:20:12 +07:00
|
|
|
{
|
2006-01-03 15:55:04 +07:00
|
|
|
struct nfs4_closedata *calldata = data;
|
|
|
|
struct nfs4_state_owner *sp = calldata->state->owner;
|
2005-10-19 04:20:12 +07:00
|
|
|
|
|
|
|
nfs4_put_open_state(calldata->state);
|
|
|
|
nfs_free_seqid(calldata->arg.seqid);
|
|
|
|
nfs4_put_state_owner(sp);
|
2007-06-05 21:31:33 +07:00
|
|
|
dput(calldata->path.dentry);
|
|
|
|
mntput(calldata->path.mnt);
|
2005-10-19 04:20:12 +07:00
|
|
|
kfree(calldata);
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static void nfs4_close_done(struct rpc_task *task, void *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:04 +07:00
|
|
|
struct nfs4_closedata *calldata = data;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_state *state = calldata->state;
|
|
|
|
struct nfs_server *server = NFS_SERVER(calldata->inode);
|
|
|
|
|
2006-01-03 15:55:05 +07:00
|
|
|
if (RPC_ASSASSINATED(task))
|
|
|
|
return;
|
2005-04-17 05:20:36 +07:00
|
|
|
/* hmm. we are done with the inode, and in the process of freeing
|
|
|
|
* the state_owner. we keep this around to process errors
|
|
|
|
*/
|
NFSv4: Add functions to order RPC calls
NFSv4 file state-changing functions such as OPEN, CLOSE, LOCK,... are all
labelled with "sequence identifiers" in order to prevent the server from
reordering RPC requests, as this could cause its file state to
become out of sync with the client.
Currently the NFS client code enforces this ordering locally using
semaphores to restrict access to structures until the RPC call is done.
This, of course, only works with synchronous RPC calls, since the
user process must first grab the semaphore.
By dropping semaphores, and instead teaching the RPC engine to hold
the RPC calls until they are ready to be sent, we can extend this
process to work nicely with asynchronous RPC calls too.
This patch adds a new list called "rpc_sequence" that defines the order
of the RPC calls to be sent. We add one such list for each state_owner.
When an RPC call is ready to be sent, it checks if it is top of the
rpc_sequence list. If so, it proceeds. If not, it goes back to sleep,
and loops until it hits top of the list.
Once the RPC call has completed, it can then bump the sequence id counter,
and remove itself from the rpc_sequence list, and then wake up the next
sleeper.
Note that the state_owner sequence ids and lock_owner sequence ids are
all indexed to the same rpc_sequence list, so OPEN, LOCK,... requests
are all ordered w.r.t. each other.
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2005-10-19 04:20:12 +07:00
|
|
|
nfs_increment_open_seqid(task->tk_status, calldata->arg.seqid);
|
2005-04-17 05:20:36 +07:00
|
|
|
switch (task->tk_status) {
|
|
|
|
case 0:
|
2007-07-27 04:47:34 +07:00
|
|
|
nfs_set_open_stateid(state, &calldata->res.stateid, 0);
|
2006-01-03 15:55:21 +07:00
|
|
|
renew_lease(server, calldata->timestamp);
|
2005-04-17 05:20:36 +07:00
|
|
|
break;
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
if (nfs4_async_handle_error(task, server) == -EAGAIN) {
|
|
|
|
rpc_restart_call(task);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2005-10-28 09:12:41 +07:00
|
|
|
nfs_refresh_inode(calldata->inode, calldata->res.fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:05 +07:00
|
|
|
static void nfs4_close_prepare(struct rpc_task *task, void *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:05 +07:00
|
|
|
struct nfs4_closedata *calldata = data;
|
2005-10-19 04:20:12 +07:00
|
|
|
struct nfs4_state *state = calldata->state;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CLOSE],
|
|
|
|
.rpc_argp = &calldata->arg,
|
|
|
|
.rpc_resp = &calldata->res,
|
2005-10-19 04:20:12 +07:00
|
|
|
.rpc_cred = state->owner->so_cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2007-07-06 05:07:55 +07:00
|
|
|
int clear_rd, clear_wr, clear_rdwr;
|
2005-10-19 04:20:12 +07:00
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
|
2005-10-19 04:20:12 +07:00
|
|
|
return;
|
2007-07-06 05:07:55 +07:00
|
|
|
|
|
|
|
clear_rd = clear_wr = clear_rdwr = 0;
|
2005-11-05 03:32:58 +07:00
|
|
|
spin_lock(&state->owner->so_lock);
|
2007-07-06 05:07:55 +07:00
|
|
|
/* Calculate the change in open mode */
|
2006-01-03 15:55:13 +07:00
|
|
|
if (state->n_rdwr == 0) {
|
2007-07-06 05:07:55 +07:00
|
|
|
if (state->n_rdonly == 0) {
|
|
|
|
clear_rd |= test_and_clear_bit(NFS_O_RDONLY_STATE, &state->flags);
|
|
|
|
clear_rdwr |= test_and_clear_bit(NFS_O_RDWR_STATE, &state->flags);
|
|
|
|
}
|
|
|
|
if (state->n_wronly == 0) {
|
|
|
|
clear_wr |= test_and_clear_bit(NFS_O_WRONLY_STATE, &state->flags);
|
|
|
|
clear_rdwr |= test_and_clear_bit(NFS_O_RDWR_STATE, &state->flags);
|
|
|
|
}
|
2006-01-03 15:55:13 +07:00
|
|
|
}
|
2005-11-05 03:32:58 +07:00
|
|
|
spin_unlock(&state->owner->so_lock);
|
2007-07-06 05:07:55 +07:00
|
|
|
if (!clear_rd && !clear_wr && !clear_rdwr) {
|
2006-01-03 15:55:04 +07:00
|
|
|
/* Note: exit _without_ calling nfs4_close_done */
|
|
|
|
task->tk_action = NULL;
|
2005-10-19 04:20:12 +07:00
|
|
|
return;
|
|
|
|
}
|
2005-10-28 09:12:41 +07:00
|
|
|
nfs_fattr_init(calldata->res.fattr);
|
2007-07-27 04:47:34 +07:00
|
|
|
if (test_bit(NFS_O_RDONLY_STATE, &state->flags) != 0) {
|
2005-04-17 05:20:36 +07:00
|
|
|
msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
|
2007-07-27 04:47:34 +07:00
|
|
|
calldata->arg.open_flags = FMODE_READ;
|
|
|
|
} else if (test_bit(NFS_O_WRONLY_STATE, &state->flags) != 0) {
|
|
|
|
msg.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_OPEN_DOWNGRADE];
|
|
|
|
calldata->arg.open_flags = FMODE_WRITE;
|
|
|
|
}
|
2006-01-03 15:55:21 +07:00
|
|
|
calldata->timestamp = jiffies;
|
2005-10-19 04:20:12 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static const struct rpc_call_ops nfs4_close_ops = {
|
2006-01-03 15:55:05 +07:00
|
|
|
.rpc_call_prepare = nfs4_close_prepare,
|
2006-01-03 15:55:04 +07:00
|
|
|
.rpc_call_done = nfs4_close_done,
|
|
|
|
.rpc_release = nfs4_free_closedata,
|
|
|
|
};
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
/*
|
|
|
|
* It is possible for data to be read/written from a mem-mapped file
|
|
|
|
* after the sys_close call (which hits the vfs layer as a flush).
|
|
|
|
* This means that we can't safely call nfsv4 close on a file until
|
|
|
|
* the inode is cleared. This in turn means that we are not good
|
|
|
|
* NFSv4 citizens - we do not indicate to the server to update the file's
|
|
|
|
* share state even when we are done with one of the three share
|
|
|
|
* stateid's in the inode.
|
|
|
|
*
|
|
|
|
* NOTE: Caller must be holding the sp->so_owner semaphore!
|
|
|
|
*/
|
2007-06-05 21:31:33 +07:00
|
|
|
int nfs4_do_close(struct path *path, struct nfs4_state *state)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-06-05 21:31:33 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_closedata *calldata;
|
2007-06-12 10:05:07 +07:00
|
|
|
struct nfs4_state_owner *sp = state->owner;
|
|
|
|
struct rpc_task *task;
|
2005-10-19 04:20:12 +07:00
|
|
|
int status = -ENOMEM;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2005-10-19 04:20:12 +07:00
|
|
|
calldata = kmalloc(sizeof(*calldata), GFP_KERNEL);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (calldata == NULL)
|
2005-10-19 04:20:12 +07:00
|
|
|
goto out;
|
2007-06-05 21:31:33 +07:00
|
|
|
calldata->inode = state->inode;
|
2005-04-17 05:20:36 +07:00
|
|
|
calldata->state = state;
|
2007-06-05 21:31:33 +07:00
|
|
|
calldata->arg.fh = NFS_FH(state->inode);
|
2007-07-06 05:07:55 +07:00
|
|
|
calldata->arg.stateid = &state->open_stateid;
|
2005-04-17 05:20:36 +07:00
|
|
|
/* Serialization for the sequence id */
|
NFSv4: Add functions to order RPC calls
NFSv4 file state-changing functions such as OPEN, CLOSE, LOCK,... are all
labelled with "sequence identifiers" in order to prevent the server from
reordering RPC requests, as this could cause its file state to
become out of sync with the client.
Currently the NFS client code enforces this ordering locally using
semaphores to restrict access to structures until the RPC call is done.
This, of course, only works with synchronous RPC calls, since the
user process must first grab the semaphore.
By dropping semaphores, and instead teaching the RPC engine to hold
the RPC calls until they are ready to be sent, we can extend this
process to work nicely with asynchronous RPC calls too.
This patch adds a new list called "rpc_sequence" that defines the order
of the RPC calls to be sent. We add one such list for each state_owner.
When an RPC call is ready to be sent, it checks if it is top of the
rpc_sequence list. If so, it proceeds. If not, it goes back to sleep,
and loops until it hits top of the list.
Once the RPC call has completed, it can then bump the sequence id counter,
and remove itself from the rpc_sequence list, and then wake up the next
sleeper.
Note that the state_owner sequence ids and lock_owner sequence ids are
all indexed to the same rpc_sequence list, so OPEN, LOCK,... requests
are all ordered w.r.t. each other.
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2005-10-19 04:20:12 +07:00
|
|
|
calldata->arg.seqid = nfs_alloc_seqid(&state->owner->so_seqid);
|
2005-10-19 04:20:12 +07:00
|
|
|
if (calldata->arg.seqid == NULL)
|
|
|
|
goto out_free_calldata;
|
2005-10-28 09:12:41 +07:00
|
|
|
calldata->arg.bitmask = server->attr_bitmask;
|
|
|
|
calldata->res.fattr = &calldata->fattr;
|
|
|
|
calldata->res.server = server;
|
2007-06-05 21:31:33 +07:00
|
|
|
calldata->path.mnt = mntget(path->mnt);
|
|
|
|
calldata->path.dentry = dget(path->dentry);
|
2005-10-19 04:20:12 +07:00
|
|
|
|
2007-06-12 10:05:07 +07:00
|
|
|
task = rpc_run_task(server->client, RPC_TASK_ASYNC, &nfs4_close_ops, calldata);
|
|
|
|
if (IS_ERR(task))
|
|
|
|
return PTR_ERR(task);
|
|
|
|
rpc_put_task(task);
|
|
|
|
return 0;
|
2005-10-19 04:20:12 +07:00
|
|
|
out_free_calldata:
|
|
|
|
kfree(calldata);
|
|
|
|
out:
|
2007-06-12 10:05:07 +07:00
|
|
|
nfs4_put_open_state(state);
|
|
|
|
nfs4_put_state_owner(sp);
|
2005-10-19 04:20:12 +07:00
|
|
|
return status;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2007-06-05 21:31:33 +07:00
|
|
|
static int nfs4_intent_set_file(struct nameidata *nd, struct path *path, struct nfs4_state *state)
|
2005-10-19 04:20:17 +07:00
|
|
|
{
|
|
|
|
struct file *filp;
|
2007-07-04 00:04:56 +07:00
|
|
|
int ret;
|
2005-10-19 04:20:17 +07:00
|
|
|
|
2007-07-04 00:04:56 +07:00
|
|
|
/* If the open_intent is for execute, we have an extra check to make */
|
|
|
|
if (nd->intent.open.flags & FMODE_EXEC) {
|
|
|
|
ret = _nfs4_do_access(state->inode,
|
|
|
|
state->owner->so_cred,
|
|
|
|
nd->intent.open.flags);
|
|
|
|
if (ret < 0)
|
|
|
|
goto out_close;
|
|
|
|
}
|
2007-06-05 21:31:33 +07:00
|
|
|
filp = lookup_instantiate_filp(nd, path->dentry, NULL);
|
2005-10-19 04:20:17 +07:00
|
|
|
if (!IS_ERR(filp)) {
|
|
|
|
struct nfs_open_context *ctx;
|
2007-08-11 04:44:32 +07:00
|
|
|
ctx = nfs_file_open_context(filp);
|
2005-10-19 04:20:17 +07:00
|
|
|
ctx->state = state;
|
2006-04-19 00:14:06 +07:00
|
|
|
return 0;
|
|
|
|
}
|
2007-07-04 00:04:56 +07:00
|
|
|
ret = PTR_ERR(filp);
|
|
|
|
out_close:
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_close_state(path, state, nd->intent.open.flags);
|
2007-07-04 00:04:56 +07:00
|
|
|
return ret;
|
2005-10-19 04:20:17 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
struct dentry *
|
2005-04-17 05:20:36 +07:00
|
|
|
nfs4_atomic_open(struct inode *dir, struct dentry *dentry, struct nameidata *nd)
|
|
|
|
{
|
2007-06-05 23:30:00 +07:00
|
|
|
struct path path = {
|
|
|
|
.mnt = nd->mnt,
|
|
|
|
.dentry = dentry,
|
|
|
|
};
|
2005-04-17 05:20:36 +07:00
|
|
|
struct iattr attr;
|
|
|
|
struct rpc_cred *cred;
|
|
|
|
struct nfs4_state *state;
|
2005-10-19 04:20:17 +07:00
|
|
|
struct dentry *res;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (nd->flags & LOOKUP_CREATE) {
|
|
|
|
attr.ia_mode = nd->intent.open.create_mode;
|
|
|
|
attr.ia_valid = ATTR_MODE;
|
|
|
|
if (!IS_POSIXACL(dir))
|
|
|
|
attr.ia_mode &= ~current->fs->umask;
|
|
|
|
} else {
|
|
|
|
attr.ia_valid = 0;
|
|
|
|
BUG_ON(nd->intent.open.flags & O_CREAT);
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:11 +07:00
|
|
|
cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (IS_ERR(cred))
|
2005-10-19 04:20:17 +07:00
|
|
|
return (struct dentry *)cred;
|
2007-06-05 23:30:00 +07:00
|
|
|
state = nfs4_do_open(dir, &path, nd->intent.open.flags, &attr, cred);
|
2005-04-17 05:20:36 +07:00
|
|
|
put_rpccred(cred);
|
2005-10-19 04:20:17 +07:00
|
|
|
if (IS_ERR(state)) {
|
|
|
|
if (PTR_ERR(state) == -ENOENT)
|
|
|
|
d_add(dentry, NULL);
|
|
|
|
return (struct dentry *)state;
|
|
|
|
}
|
2006-01-03 15:55:11 +07:00
|
|
|
res = d_add_unique(dentry, igrab(state->inode));
|
2005-10-19 04:20:17 +07:00
|
|
|
if (res != NULL)
|
2007-08-27 22:33:00 +07:00
|
|
|
path.dentry = res;
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_intent_set_file(nd, &path, state);
|
2005-10-19 04:20:17 +07:00
|
|
|
return res;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2005-10-19 04:20:17 +07:00
|
|
|
nfs4_open_revalidate(struct inode *dir, struct dentry *dentry, int openflags, struct nameidata *nd)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-06-05 23:30:00 +07:00
|
|
|
struct path path = {
|
|
|
|
.mnt = nd->mnt,
|
|
|
|
.dentry = dentry,
|
|
|
|
};
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_cred *cred;
|
|
|
|
struct nfs4_state *state;
|
|
|
|
|
2006-08-23 07:06:11 +07:00
|
|
|
cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (IS_ERR(cred))
|
|
|
|
return PTR_ERR(cred);
|
2007-07-06 06:02:21 +07:00
|
|
|
state = nfs4_do_open(dir, &path, openflags, NULL, cred);
|
2005-04-17 05:20:36 +07:00
|
|
|
put_rpccred(cred);
|
2005-10-19 04:20:17 +07:00
|
|
|
if (IS_ERR(state)) {
|
|
|
|
switch (PTR_ERR(state)) {
|
|
|
|
case -EPERM:
|
|
|
|
case -EACCES:
|
|
|
|
case -EDQUOT:
|
|
|
|
case -ENOSPC:
|
|
|
|
case -EROFS:
|
|
|
|
lookup_instantiate_filp(nd, (struct dentry *)state, NULL);
|
|
|
|
return 1;
|
2006-10-20 13:28:42 +07:00
|
|
|
default:
|
|
|
|
goto out_drop;
|
2005-10-19 04:20:17 +07:00
|
|
|
}
|
|
|
|
}
|
2006-01-03 15:55:11 +07:00
|
|
|
if (state->inode == dentry->d_inode) {
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_intent_set_file(nd, &path, state);
|
2005-04-17 05:20:36 +07:00
|
|
|
return 1;
|
|
|
|
}
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_close_state(&path, state, openflags);
|
2005-10-19 04:20:17 +07:00
|
|
|
out_drop:
|
|
|
|
d_drop(dentry);
|
2005-04-17 05:20:36 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int _nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
|
|
|
|
{
|
|
|
|
struct nfs4_server_caps_res res = {};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SERVER_CAPS],
|
|
|
|
.rpc_argp = fhandle,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
|
|
|
if (status == 0) {
|
|
|
|
memcpy(server->attr_bitmask, res.attr_bitmask, sizeof(server->attr_bitmask));
|
|
|
|
if (res.attr_bitmask[0] & FATTR4_WORD0_ACL)
|
|
|
|
server->caps |= NFS_CAP_ACLS;
|
|
|
|
if (res.has_links != 0)
|
|
|
|
server->caps |= NFS_CAP_HARDLINKS;
|
|
|
|
if (res.has_symlinks != 0)
|
|
|
|
server->caps |= NFS_CAP_SYMLINKS;
|
|
|
|
server->acl_bitmask = res.acl_bitmask;
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-06-09 20:34:19 +07:00
|
|
|
int nfs4_server_capabilities(struct nfs_server *server, struct nfs_fh *fhandle)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_server_capabilities(server, fhandle),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_fsinfo *info)
|
|
|
|
{
|
|
|
|
struct nfs4_lookup_root_arg args = {
|
|
|
|
.bitmask = nfs4_fattr_bitmap,
|
|
|
|
};
|
|
|
|
struct nfs4_lookup_res res = {
|
|
|
|
.server = server,
|
2005-10-28 09:12:38 +07:00
|
|
|
.fattr = info->fattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
.fh = fhandle,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP_ROOT],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(info->fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
return rpc_call_sync(server->client, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_lookup_root(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_fsinfo *info)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_lookup_root(server, fhandle, info),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
NFS: Share NFS superblocks per-protocol per-server per-FSID
The attached patch makes NFS share superblocks between mounts from the same
server and FSID over the same protocol.
It does this by creating each superblock with a false root and returning the
real root dentry in the vfsmount presented by get_sb(). The root dentry set
starts off as an anonymous dentry if we don't already have the dentry for its
inode, otherwise it simply returns the dentry we already have.
We may thus end up with several trees of dentries in the superblock, and if at
some later point one of anonymous tree roots is discovered by normal filesystem
activity to be located in another tree within the superblock, the anonymous
root is named and materialises attached to the second tree at the appropriate
point.
Why do it this way? Why not pass an extra argument to the mount() syscall to
indicate the subpath and then pathwalk from the server root to the desired
directory? You can't guarantee this will work for two reasons:
(1) The root and intervening nodes may not be accessible to the client.
With NFS2 and NFS3, for instance, mountd is called on the server to get
the filehandle for the tip of a path. mountd won't give us handles for
anything we don't have permission to access, and so we can't set up NFS
inodes for such nodes, and so can't easily set up dentries (we'd have to
have ghost inodes or something).
With this patch we don't actually create dentries until we get handles
from the server that we can use to set up their inodes, and we don't
actually bind them into the tree until we know for sure where they go.
(2) Inaccessible symbolic links.
If we're asked to mount two exports from the server, eg:
mount warthog:/warthog/aaa/xxx /mmm
mount warthog:/warthog/bbb/yyy /nnn
We may not be able to access anything nearer the root than xxx and yyy,
but we may find out later that /mmm/www/yyy, say, is actually the same
directory as the one mounted on /nnn. What we might then find out, for
example, is that /warthog/bbb was actually a symbolic link to
/warthog/aaa/xxx/www, but we can't actually determine that by talking to
the server until /warthog is made available by NFS.
This would lead to having constructed an errneous dentry tree which we
can't easily fix. We can end up with a dentry marked as a directory when
it should actually be a symlink, or we could end up with an apparently
hardlinked directory.
With this patch we need not make assumptions about the type of a dentry
for which we can't retrieve information, nor need we assume we know its
place in the grand scheme of things until we actually see that place.
This patch reduces the possibility of aliasing in the inode and page caches for
inodes that may be accessed by more than one NFS export. It also reduces the
number of superblocks required for NFS where there are many NFS exports being
used from a server (home directory server + autofs for example).
This in turn makes it simpler to do local caching of network filesystems, as it
can then be guaranteed that there won't be links from multiple inodes in
separate superblocks to the same cache file.
Obviously, cache aliasing between different levels of NFS protocol could still
be a problem, but at least that gives us another key to use when indexing the
cache.
This patch makes the following changes:
(1) The server record construction/destruction has been abstracted out into
its own set of functions to make things easier to get right. These have
been moved into fs/nfs/client.c.
All the code in fs/nfs/client.c has to do with the management of
connections to servers, and doesn't touch superblocks in any way; the
remaining code in fs/nfs/super.c has to do with VFS superblock management.
(2) The sequence of events undertaken by NFS mount is now reordered:
(a) A volume representation (struct nfs_server) is allocated.
(b) A server representation (struct nfs_client) is acquired. This may be
allocated or shared, and is keyed on server address, port and NFS
version.
(c) If allocated, the client representation is initialised. The state
member variable of nfs_client is used to prevent a race during
initialisation from two mounts.
(d) For NFS4 a simple pathwalk is performed, walking from FH to FH to find
the root filehandle for the mount (fs/nfs/getroot.c). For NFS2/3 we
are given the root FH in advance.
(e) The volume FSID is probed for on the root FH.
(f) The volume representation is initialised from the FSINFO record
retrieved on the root FH.
(g) sget() is called to acquire a superblock. This may be allocated or
shared, keyed on client pointer and FSID.
(h) If allocated, the superblock is initialised.
(i) If the superblock is shared, then the new nfs_server record is
discarded.
(j) The root dentry for this mount is looked up from the root FH.
(k) The root dentry for this mount is assigned to the vfsmount.
(3) nfs_readdir_lookup() creates dentries for each of the entries readdir()
returns; this function now attaches disconnected trees from alternate
roots that happen to be discovered attached to a directory being read (in
the same way nfs_lookup() is made to do for lookup ops).
The new d_materialise_unique() function is now used to do this, thus
permitting the whole thing to be done under one set of locks, and thus
avoiding any race between mount and lookup operations on the same
directory.
(4) The client management code uses a new debug facility: NFSDBG_CLIENT which
is set by echoing 1024 to /proc/net/sunrpc/nfs_debug.
(5) Clone mounts are now called xdev mounts.
(6) Use the dentry passed to the statfs() op as the handle for retrieving fs
statistics rather than the root dentry of the superblock (which is now a
dummy).
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2006-08-23 07:06:13 +07:00
|
|
|
/*
|
|
|
|
* get the file handle for the "/" directory on the server
|
|
|
|
*/
|
2005-04-17 05:20:36 +07:00
|
|
|
static int nfs4_proc_get_root(struct nfs_server *server, struct nfs_fh *fhandle,
|
NFS: Share NFS superblocks per-protocol per-server per-FSID
The attached patch makes NFS share superblocks between mounts from the same
server and FSID over the same protocol.
It does this by creating each superblock with a false root and returning the
real root dentry in the vfsmount presented by get_sb(). The root dentry set
starts off as an anonymous dentry if we don't already have the dentry for its
inode, otherwise it simply returns the dentry we already have.
We may thus end up with several trees of dentries in the superblock, and if at
some later point one of anonymous tree roots is discovered by normal filesystem
activity to be located in another tree within the superblock, the anonymous
root is named and materialises attached to the second tree at the appropriate
point.
Why do it this way? Why not pass an extra argument to the mount() syscall to
indicate the subpath and then pathwalk from the server root to the desired
directory? You can't guarantee this will work for two reasons:
(1) The root and intervening nodes may not be accessible to the client.
With NFS2 and NFS3, for instance, mountd is called on the server to get
the filehandle for the tip of a path. mountd won't give us handles for
anything we don't have permission to access, and so we can't set up NFS
inodes for such nodes, and so can't easily set up dentries (we'd have to
have ghost inodes or something).
With this patch we don't actually create dentries until we get handles
from the server that we can use to set up their inodes, and we don't
actually bind them into the tree until we know for sure where they go.
(2) Inaccessible symbolic links.
If we're asked to mount two exports from the server, eg:
mount warthog:/warthog/aaa/xxx /mmm
mount warthog:/warthog/bbb/yyy /nnn
We may not be able to access anything nearer the root than xxx and yyy,
but we may find out later that /mmm/www/yyy, say, is actually the same
directory as the one mounted on /nnn. What we might then find out, for
example, is that /warthog/bbb was actually a symbolic link to
/warthog/aaa/xxx/www, but we can't actually determine that by talking to
the server until /warthog is made available by NFS.
This would lead to having constructed an errneous dentry tree which we
can't easily fix. We can end up with a dentry marked as a directory when
it should actually be a symlink, or we could end up with an apparently
hardlinked directory.
With this patch we need not make assumptions about the type of a dentry
for which we can't retrieve information, nor need we assume we know its
place in the grand scheme of things until we actually see that place.
This patch reduces the possibility of aliasing in the inode and page caches for
inodes that may be accessed by more than one NFS export. It also reduces the
number of superblocks required for NFS where there are many NFS exports being
used from a server (home directory server + autofs for example).
This in turn makes it simpler to do local caching of network filesystems, as it
can then be guaranteed that there won't be links from multiple inodes in
separate superblocks to the same cache file.
Obviously, cache aliasing between different levels of NFS protocol could still
be a problem, but at least that gives us another key to use when indexing the
cache.
This patch makes the following changes:
(1) The server record construction/destruction has been abstracted out into
its own set of functions to make things easier to get right. These have
been moved into fs/nfs/client.c.
All the code in fs/nfs/client.c has to do with the management of
connections to servers, and doesn't touch superblocks in any way; the
remaining code in fs/nfs/super.c has to do with VFS superblock management.
(2) The sequence of events undertaken by NFS mount is now reordered:
(a) A volume representation (struct nfs_server) is allocated.
(b) A server representation (struct nfs_client) is acquired. This may be
allocated or shared, and is keyed on server address, port and NFS
version.
(c) If allocated, the client representation is initialised. The state
member variable of nfs_client is used to prevent a race during
initialisation from two mounts.
(d) For NFS4 a simple pathwalk is performed, walking from FH to FH to find
the root filehandle for the mount (fs/nfs/getroot.c). For NFS2/3 we
are given the root FH in advance.
(e) The volume FSID is probed for on the root FH.
(f) The volume representation is initialised from the FSINFO record
retrieved on the root FH.
(g) sget() is called to acquire a superblock. This may be allocated or
shared, keyed on client pointer and FSID.
(h) If allocated, the superblock is initialised.
(i) If the superblock is shared, then the new nfs_server record is
discarded.
(j) The root dentry for this mount is looked up from the root FH.
(k) The root dentry for this mount is assigned to the vfsmount.
(3) nfs_readdir_lookup() creates dentries for each of the entries readdir()
returns; this function now attaches disconnected trees from alternate
roots that happen to be discovered attached to a directory being read (in
the same way nfs_lookup() is made to do for lookup ops).
The new d_materialise_unique() function is now used to do this, thus
permitting the whole thing to be done under one set of locks, and thus
avoiding any race between mount and lookup operations on the same
directory.
(4) The client management code uses a new debug facility: NFSDBG_CLIENT which
is set by echoing 1024 to /proc/net/sunrpc/nfs_debug.
(5) Clone mounts are now called xdev mounts.
(6) Use the dentry passed to the statfs() op as the handle for retrieving fs
statistics rather than the root dentry of the superblock (which is now a
dummy).
Signed-Off-By: David Howells <dhowells@redhat.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2006-08-23 07:06:13 +07:00
|
|
|
struct nfs_fsinfo *info)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
int status;
|
|
|
|
|
|
|
|
status = nfs4_lookup_root(server, fhandle, info);
|
|
|
|
if (status == 0)
|
|
|
|
status = nfs4_server_capabilities(server, fhandle);
|
|
|
|
if (status == 0)
|
|
|
|
status = nfs4_do_fsinfo(server, fhandle, info);
|
2006-03-14 12:20:47 +07:00
|
|
|
return nfs4_map_errors(status);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-06-09 20:34:29 +07:00
|
|
|
/*
|
|
|
|
* Get locations and (maybe) other attributes of a referral.
|
|
|
|
* Note that we'll actually follow the referral later when
|
|
|
|
* we detect fsid mismatch in inode revalidation
|
|
|
|
*/
|
2007-07-18 08:52:39 +07:00
|
|
|
static int nfs4_get_referral(struct inode *dir, const struct qstr *name, struct nfs_fattr *fattr, struct nfs_fh *fhandle)
|
2006-06-09 20:34:29 +07:00
|
|
|
{
|
|
|
|
int status = -ENOMEM;
|
|
|
|
struct page *page = NULL;
|
|
|
|
struct nfs4_fs_locations *locations = NULL;
|
|
|
|
|
|
|
|
page = alloc_page(GFP_KERNEL);
|
|
|
|
if (page == NULL)
|
|
|
|
goto out;
|
|
|
|
locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
|
|
|
|
if (locations == NULL)
|
|
|
|
goto out;
|
|
|
|
|
2007-01-13 14:28:11 +07:00
|
|
|
status = nfs4_proc_fs_locations(dir, name, locations, page);
|
2006-06-09 20:34:29 +07:00
|
|
|
if (status != 0)
|
|
|
|
goto out;
|
|
|
|
/* Make sure server returned a different fsid for the referral */
|
|
|
|
if (nfs_fsid_equal(&NFS_SERVER(dir)->fsid, &locations->fattr.fsid)) {
|
|
|
|
dprintk("%s: server did not return a different fsid for a referral at %s\n", __FUNCTION__, name->name);
|
|
|
|
status = -EIO;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(fattr, &locations->fattr, sizeof(struct nfs_fattr));
|
|
|
|
fattr->valid |= NFS_ATTR_FATTR_V4_REFERRAL;
|
|
|
|
if (!fattr->mode)
|
|
|
|
fattr->mode = S_IFDIR;
|
|
|
|
memset(fhandle, 0, sizeof(struct nfs_fh));
|
|
|
|
out:
|
|
|
|
if (page)
|
|
|
|
__free_page(page);
|
|
|
|
if (locations)
|
|
|
|
kfree(locations);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static int _nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
|
|
|
|
{
|
|
|
|
struct nfs4_getattr_arg args = {
|
|
|
|
.fh = fhandle,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs4_getattr_res res = {
|
|
|
|
.fattr = fattr,
|
|
|
|
.server = server,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETATTR],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
return rpc_call_sync(server->client, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_getattr(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_proc_getattr(server, fhandle, fattr),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The file is not closed if it is opened due to the a request to change
|
|
|
|
* the size of the file. The open call will not be needed once the
|
|
|
|
* VFS layer lookup-intents are implemented.
|
|
|
|
*
|
|
|
|
* Close is called when the inode is destroyed.
|
|
|
|
* If we haven't opened the file for O_WRONLY, we
|
|
|
|
* need to in the size_change case to obtain a stateid.
|
|
|
|
*
|
|
|
|
* Got race?
|
|
|
|
* Because OPEN is always done by name in nfsv4, it is
|
|
|
|
* possible that we opened a different file by the same
|
|
|
|
* name. We can recognize this race condition, but we
|
|
|
|
* can't do anything about it besides returning an error.
|
|
|
|
*
|
|
|
|
* This will be fixed with VFS changes (lookup-intent).
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
nfs4_proc_setattr(struct dentry *dentry, struct nfs_fattr *fattr,
|
|
|
|
struct iattr *sattr)
|
|
|
|
{
|
2005-06-23 00:16:29 +07:00
|
|
|
struct rpc_cred *cred;
|
|
|
|
struct inode *inode = dentry->d_inode;
|
2005-11-05 03:33:38 +07:00
|
|
|
struct nfs_open_context *ctx;
|
|
|
|
struct nfs4_state *state = NULL;
|
2005-04-17 05:20:36 +07:00
|
|
|
int status;
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-08-23 07:06:11 +07:00
|
|
|
cred = rpcauth_lookupcred(NFS_CLIENT(inode)->cl_auth, 0);
|
2005-06-23 00:16:29 +07:00
|
|
|
if (IS_ERR(cred))
|
|
|
|
return PTR_ERR(cred);
|
2005-11-05 03:33:38 +07:00
|
|
|
|
|
|
|
/* Search for an existing open(O_WRITE) file */
|
|
|
|
ctx = nfs_find_open_context(inode, cred, FMODE_WRITE);
|
|
|
|
if (ctx != NULL)
|
|
|
|
state = ctx->state;
|
2005-06-23 00:16:29 +07:00
|
|
|
|
2006-03-21 01:44:46 +07:00
|
|
|
status = nfs4_do_setattr(inode, fattr, sattr, state);
|
2005-08-16 22:49:44 +07:00
|
|
|
if (status == 0)
|
|
|
|
nfs_setattr_update_inode(inode, sattr);
|
2005-11-05 03:33:38 +07:00
|
|
|
if (ctx != NULL)
|
|
|
|
put_nfs_open_context(ctx);
|
2005-06-23 00:16:29 +07:00
|
|
|
put_rpccred(cred);
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2007-07-18 08:52:39 +07:00
|
|
|
static int _nfs4_proc_lookupfh(struct nfs_server *server, const struct nfs_fh *dirfh,
|
|
|
|
const struct qstr *name, struct nfs_fh *fhandle,
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_fattr *fattr)
|
|
|
|
{
|
|
|
|
int status;
|
|
|
|
struct nfs4_lookup_arg args = {
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
.dir_fh = dirfh,
|
|
|
|
.name = name,
|
|
|
|
};
|
|
|
|
struct nfs4_lookup_res res = {
|
|
|
|
.server = server,
|
|
|
|
.fattr = fattr,
|
|
|
|
.fh = fhandle,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOOKUP],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
|
|
|
|
nfs_fattr_init(fattr);
|
|
|
|
|
|
|
|
dprintk("NFS call lookupfh %s\n", name->name);
|
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
|
|
|
dprintk("NFS reply lookupfh: %d\n", status);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_lookupfh(struct nfs_server *server, struct nfs_fh *dirfh,
|
|
|
|
struct qstr *name, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_fattr *fattr)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
2007-07-02 05:13:52 +07:00
|
|
|
err = _nfs4_proc_lookupfh(server, dirfh, name, fhandle, fattr);
|
|
|
|
/* FIXME: !!!! */
|
|
|
|
if (err == -NFS4ERR_MOVED) {
|
|
|
|
err = -EREMOTE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
err = nfs4_handle_exception(server, err, &exception);
|
2006-08-23 07:06:09 +07:00
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-07-18 08:52:39 +07:00
|
|
|
static int _nfs4_proc_lookup(struct inode *dir, const struct qstr *name,
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs_fh *fhandle, struct nfs_fattr *fattr)
|
|
|
|
{
|
2007-07-02 05:13:52 +07:00
|
|
|
int status;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
dprintk("NFS call lookup %s\n", name->name);
|
2007-07-02 05:13:52 +07:00
|
|
|
status = _nfs4_proc_lookupfh(NFS_SERVER(dir), NFS_FH(dir), name, fhandle, fattr);
|
2006-06-09 20:34:29 +07:00
|
|
|
if (status == -NFS4ERR_MOVED)
|
|
|
|
status = nfs4_get_referral(dir, name, fattr, fhandle);
|
2005-04-17 05:20:36 +07:00
|
|
|
dprintk("NFS reply lookup: %d\n", status);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_lookup(struct inode *dir, struct qstr *name, struct nfs_fh *fhandle, struct nfs_fattr *fattr)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dir),
|
|
|
|
_nfs4_proc_lookup(dir, name, fhandle, fattr),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
|
|
|
|
{
|
|
|
|
struct nfs4_accessargs args = {
|
|
|
|
.fh = NFS_FH(inode),
|
|
|
|
};
|
|
|
|
struct nfs4_accessres res = { 0 };
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_ACCESS],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
.rpc_cred = entry->cred,
|
|
|
|
};
|
|
|
|
int mode = entry->mask;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Determine which access bits we want to ask for...
|
|
|
|
*/
|
|
|
|
if (mode & MAY_READ)
|
|
|
|
args.access |= NFS4_ACCESS_READ;
|
|
|
|
if (S_ISDIR(inode->i_mode)) {
|
|
|
|
if (mode & MAY_WRITE)
|
|
|
|
args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE;
|
|
|
|
if (mode & MAY_EXEC)
|
|
|
|
args.access |= NFS4_ACCESS_LOOKUP;
|
|
|
|
} else {
|
|
|
|
if (mode & MAY_WRITE)
|
|
|
|
args.access |= NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND;
|
|
|
|
if (mode & MAY_EXEC)
|
|
|
|
args.access |= NFS4_ACCESS_EXECUTE;
|
|
|
|
}
|
|
|
|
status = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
|
|
|
|
if (!status) {
|
|
|
|
entry->mask = 0;
|
|
|
|
if (res.access & NFS4_ACCESS_READ)
|
|
|
|
entry->mask |= MAY_READ;
|
|
|
|
if (res.access & (NFS4_ACCESS_MODIFY | NFS4_ACCESS_EXTEND | NFS4_ACCESS_DELETE))
|
|
|
|
entry->mask |= MAY_WRITE;
|
|
|
|
if (res.access & (NFS4_ACCESS_LOOKUP|NFS4_ACCESS_EXECUTE))
|
|
|
|
entry->mask |= MAY_EXEC;
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_access(struct inode *inode, struct nfs_access_entry *entry)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(inode),
|
|
|
|
_nfs4_proc_access(inode, entry),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* TODO: For the time being, we don't try to get any attributes
|
|
|
|
* along with any of the zero-copy operations READ, READDIR,
|
|
|
|
* READLINK, WRITE.
|
|
|
|
*
|
|
|
|
* In the case of the first three, we want to put the GETATTR
|
|
|
|
* after the read-type operation -- this is because it is hard
|
|
|
|
* to predict the length of a GETATTR response in v4, and thus
|
|
|
|
* align the READ data correctly. This means that the GETATTR
|
|
|
|
* may end up partially falling into the page cache, and we should
|
|
|
|
* shift it into the 'tail' of the xdr_buf before processing.
|
|
|
|
* To do this efficiently, we need to know the total length
|
|
|
|
* of data received, which doesn't seem to be available outside
|
|
|
|
* of the RPC layer.
|
|
|
|
*
|
|
|
|
* In the case of WRITE, we also want to put the GETATTR after
|
|
|
|
* the operation -- in this case because we want to make sure
|
|
|
|
* we get the post-operation mtime and size. This means that
|
|
|
|
* we can't use xdr_encode_pages() as written: we need a variant
|
|
|
|
* of it which would leave room in the 'tail' iovec.
|
|
|
|
*
|
|
|
|
* Both of these changes to the XDR layer would in fact be quite
|
|
|
|
* minor, but I decided to leave them for a subsequent patch.
|
|
|
|
*/
|
|
|
|
static int _nfs4_proc_readlink(struct inode *inode, struct page *page,
|
|
|
|
unsigned int pgbase, unsigned int pglen)
|
|
|
|
{
|
|
|
|
struct nfs4_readlink args = {
|
|
|
|
.fh = NFS_FH(inode),
|
|
|
|
.pgbase = pgbase,
|
|
|
|
.pglen = pglen,
|
|
|
|
.pages = &page,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READLINK],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
return rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_readlink(struct inode *inode, struct page *page,
|
|
|
|
unsigned int pgbase, unsigned int pglen)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(inode),
|
|
|
|
_nfs4_proc_readlink(inode, page, pgbase, pglen),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Got race?
|
|
|
|
* We will need to arrange for the VFS layer to provide an atomic open.
|
|
|
|
* Until then, this create/open method is prone to inefficiency and race
|
|
|
|
* conditions due to the lookup, create, and open VFS calls from sys_open()
|
|
|
|
* placed on the wire.
|
|
|
|
*
|
|
|
|
* Given the above sorry state of affairs, I'm simply sending an OPEN.
|
|
|
|
* The file will be opened again in the subsequent VFS open call
|
|
|
|
* (nfs4_proc_file_open).
|
|
|
|
*
|
|
|
|
* The open for read will just hang around to be used by any process that
|
|
|
|
* opens the file O_RDONLY. This will all be resolved with the VFS changes.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int
|
|
|
|
nfs4_proc_create(struct inode *dir, struct dentry *dentry, struct iattr *sattr,
|
2005-10-19 04:20:17 +07:00
|
|
|
int flags, struct nameidata *nd)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-06-05 23:30:00 +07:00
|
|
|
struct path path = {
|
|
|
|
.mnt = nd->mnt,
|
|
|
|
.dentry = dentry,
|
|
|
|
};
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_state *state;
|
|
|
|
struct rpc_cred *cred;
|
|
|
|
int status = 0;
|
|
|
|
|
2006-08-23 07:06:11 +07:00
|
|
|
cred = rpcauth_lookupcred(NFS_CLIENT(dir)->cl_auth, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (IS_ERR(cred)) {
|
|
|
|
status = PTR_ERR(cred);
|
|
|
|
goto out;
|
|
|
|
}
|
2007-06-05 23:30:00 +07:00
|
|
|
state = nfs4_do_open(dir, &path, flags, sattr, cred);
|
2005-04-17 05:20:36 +07:00
|
|
|
put_rpccred(cred);
|
|
|
|
if (IS_ERR(state)) {
|
|
|
|
status = PTR_ERR(state);
|
|
|
|
goto out;
|
|
|
|
}
|
2006-01-03 15:55:11 +07:00
|
|
|
d_instantiate(dentry, igrab(state->inode));
|
2005-04-17 05:20:36 +07:00
|
|
|
if (flags & O_EXCL) {
|
|
|
|
struct nfs_fattr fattr;
|
2006-03-21 01:44:46 +07:00
|
|
|
status = nfs4_do_setattr(state->inode, &fattr, sattr, state);
|
2005-10-19 04:20:17 +07:00
|
|
|
if (status == 0)
|
2005-08-16 22:49:44 +07:00
|
|
|
nfs_setattr_update_inode(state->inode, sattr);
|
2007-06-06 01:49:03 +07:00
|
|
|
nfs_post_op_update_inode(state->inode, &fattr);
|
2005-10-19 04:20:17 +07:00
|
|
|
}
|
2007-06-05 23:30:00 +07:00
|
|
|
if (status == 0 && (nd->flags & LOOKUP_OPEN) != 0)
|
2007-06-05 21:31:33 +07:00
|
|
|
status = nfs4_intent_set_file(nd, &path, state);
|
2005-10-19 04:20:17 +07:00
|
|
|
else
|
2007-06-05 21:31:33 +07:00
|
|
|
nfs4_close_state(&path, state, flags);
|
2005-04-17 05:20:36 +07:00
|
|
|
out:
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_remove(struct inode *dir, struct qstr *name)
|
|
|
|
{
|
2005-10-28 09:12:44 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
2007-07-15 02:39:57 +07:00
|
|
|
struct nfs_removeargs args = {
|
2005-04-17 05:20:36 +07:00
|
|
|
.fh = NFS_FH(dir),
|
2007-07-15 02:39:57 +07:00
|
|
|
.name.len = name->len,
|
|
|
|
.name.name = name->name,
|
2005-10-28 09:12:44 +07:00
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
2007-07-15 02:39:57 +07:00
|
|
|
struct nfs_removeres res = {
|
2005-10-28 09:12:44 +07:00
|
|
|
.server = server,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
2007-07-15 02:39:57 +07:00
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2007-07-15 02:39:57 +07:00
|
|
|
nfs_fattr_init(&res.dir_attr);
|
2005-10-28 09:12:44 +07:00
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
|
|
|
if (status == 0) {
|
|
|
|
update_changeattr(dir, &res.cinfo);
|
2007-07-15 02:39:57 +07:00
|
|
|
nfs_post_op_update_inode(dir, &res.dir_attr);
|
2005-10-28 09:12:44 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_remove(struct inode *dir, struct qstr *name)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dir),
|
|
|
|
_nfs4_proc_remove(dir, name),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2007-07-15 02:39:58 +07:00
|
|
|
static void nfs4_proc_unlink_setup(struct rpc_message *msg, struct inode *dir)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-07-15 02:39:58 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
struct nfs_removeargs *args = msg->rpc_argp;
|
|
|
|
struct nfs_removeres *res = msg->rpc_resp;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2007-07-15 02:39:58 +07:00
|
|
|
args->bitmask = server->attr_bitmask;
|
|
|
|
res->server = server;
|
2005-04-17 05:20:36 +07:00
|
|
|
msg->rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_REMOVE];
|
|
|
|
}
|
|
|
|
|
2007-07-15 02:39:58 +07:00
|
|
|
static int nfs4_proc_unlink_done(struct rpc_task *task, struct inode *dir)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2007-07-15 02:39:58 +07:00
|
|
|
struct nfs_removeres *res = task->tk_msg.rpc_resp;
|
|
|
|
|
|
|
|
if (nfs4_async_handle_error(task, res->server) == -EAGAIN)
|
|
|
|
return 0;
|
|
|
|
update_changeattr(dir, &res->cinfo);
|
|
|
|
nfs_post_op_update_inode(dir, &res->dir_attr);
|
|
|
|
return 1;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
|
|
|
|
struct inode *new_dir, struct qstr *new_name)
|
|
|
|
{
|
2005-10-28 09:12:43 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(old_dir);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_rename_arg arg = {
|
|
|
|
.old_dir = NFS_FH(old_dir),
|
|
|
|
.new_dir = NFS_FH(new_dir),
|
|
|
|
.old_name = old_name,
|
|
|
|
.new_name = new_name,
|
2005-10-28 09:12:43 +07:00
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs_fattr old_fattr, new_fattr;
|
|
|
|
struct nfs4_rename_res res = {
|
|
|
|
.server = server,
|
|
|
|
.old_fattr = &old_fattr,
|
|
|
|
.new_fattr = &new_fattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENAME],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2005-10-28 09:12:43 +07:00
|
|
|
nfs_fattr_init(res.old_fattr);
|
|
|
|
nfs_fattr_init(res.new_fattr);
|
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (!status) {
|
|
|
|
update_changeattr(old_dir, &res.old_cinfo);
|
2005-10-28 09:12:43 +07:00
|
|
|
nfs_post_op_update_inode(old_dir, res.old_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
update_changeattr(new_dir, &res.new_cinfo);
|
2005-10-28 09:12:43 +07:00
|
|
|
nfs_post_op_update_inode(new_dir, res.new_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_rename(struct inode *old_dir, struct qstr *old_name,
|
|
|
|
struct inode *new_dir, struct qstr *new_name)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(old_dir),
|
|
|
|
_nfs4_proc_rename(old_dir, old_name,
|
|
|
|
new_dir, new_name),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
|
|
|
|
{
|
2005-10-28 09:12:42 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_link_arg arg = {
|
|
|
|
.fh = NFS_FH(inode),
|
|
|
|
.dir_fh = NFS_FH(dir),
|
|
|
|
.name = name,
|
2005-10-28 09:12:42 +07:00
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs_fattr fattr, dir_attr;
|
|
|
|
struct nfs4_link_res res = {
|
|
|
|
.server = server,
|
|
|
|
.fattr = &fattr,
|
|
|
|
.dir_attr = &dir_attr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LINK],
|
|
|
|
.rpc_argp = &arg,
|
2005-10-28 09:12:42 +07:00
|
|
|
.rpc_resp = &res,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2005-10-28 09:12:42 +07:00
|
|
|
nfs_fattr_init(res.fattr);
|
|
|
|
nfs_fattr_init(res.dir_attr);
|
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
|
|
|
if (!status) {
|
|
|
|
update_changeattr(dir, &res.cinfo);
|
|
|
|
nfs_post_op_update_inode(dir, res.dir_attr);
|
2006-05-25 12:40:47 +07:00
|
|
|
nfs_post_op_update_inode(inode, res.fattr);
|
2005-10-28 09:12:42 +07:00
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_link(struct inode *inode, struct inode *dir, struct qstr *name)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(inode),
|
|
|
|
_nfs4_proc_link(inode, dir, name),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:22 +07:00
|
|
|
static int _nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
|
2006-08-23 07:06:23 +07:00
|
|
|
struct page *page, unsigned int len, struct iattr *sattr)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
2006-08-23 07:06:22 +07:00
|
|
|
struct nfs_fh fhandle;
|
|
|
|
struct nfs_fattr fattr, dir_fattr;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_create_arg arg = {
|
|
|
|
.dir_fh = NFS_FH(dir),
|
|
|
|
.server = server,
|
2006-08-23 07:06:22 +07:00
|
|
|
.name = &dentry->d_name,
|
2005-04-17 05:20:36 +07:00
|
|
|
.attrs = sattr,
|
|
|
|
.ftype = NF4LNK,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs4_create_res res = {
|
|
|
|
.server = server,
|
2006-08-23 07:06:22 +07:00
|
|
|
.fh = &fhandle,
|
|
|
|
.fattr = &fattr,
|
2005-10-28 09:12:40 +07:00
|
|
|
.dir_fattr = &dir_fattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SYMLINK],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2006-08-23 07:06:23 +07:00
|
|
|
if (len > NFS4_MAXPATHLEN)
|
2005-04-17 05:20:36 +07:00
|
|
|
return -ENAMETOOLONG;
|
2006-08-23 07:06:22 +07:00
|
|
|
|
2006-08-23 07:06:23 +07:00
|
|
|
arg.u.symlink.pages = &page;
|
|
|
|
arg.u.symlink.len = len;
|
2006-08-23 07:06:22 +07:00
|
|
|
nfs_fattr_init(&fattr);
|
2005-10-28 09:12:40 +07:00
|
|
|
nfs_fattr_init(&dir_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
|
2006-08-23 07:06:22 +07:00
|
|
|
if (!status) {
|
2005-04-17 05:20:36 +07:00
|
|
|
update_changeattr(dir, &res.dir_cinfo);
|
2006-08-23 07:06:22 +07:00
|
|
|
nfs_post_op_update_inode(dir, res.dir_fattr);
|
|
|
|
status = nfs_instantiate(dentry, &fhandle, &fattr);
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:22 +07:00
|
|
|
static int nfs4_proc_symlink(struct inode *dir, struct dentry *dentry,
|
2006-08-23 07:06:23 +07:00
|
|
|
struct page *page, unsigned int len, struct iattr *sattr)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dir),
|
2006-08-23 07:06:23 +07:00
|
|
|
_nfs4_proc_symlink(dir, dentry, page,
|
|
|
|
len, sattr),
|
2005-04-17 05:20:36 +07:00
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
|
|
|
|
struct iattr *sattr)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
struct nfs_fh fhandle;
|
2005-10-28 09:12:40 +07:00
|
|
|
struct nfs_fattr fattr, dir_fattr;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_create_arg arg = {
|
|
|
|
.dir_fh = NFS_FH(dir),
|
|
|
|
.server = server,
|
|
|
|
.name = &dentry->d_name,
|
|
|
|
.attrs = sattr,
|
|
|
|
.ftype = NF4DIR,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs4_create_res res = {
|
|
|
|
.server = server,
|
|
|
|
.fh = &fhandle,
|
|
|
|
.fattr = &fattr,
|
2005-10-28 09:12:40 +07:00
|
|
|
.dir_fattr = &dir_fattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(&fattr);
|
2005-10-28 09:12:40 +07:00
|
|
|
nfs_fattr_init(&dir_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
|
|
|
|
if (!status) {
|
|
|
|
update_changeattr(dir, &res.dir_cinfo);
|
2005-10-28 09:12:40 +07:00
|
|
|
nfs_post_op_update_inode(dir, res.dir_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
status = nfs_instantiate(dentry, &fhandle, &fattr);
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_mkdir(struct inode *dir, struct dentry *dentry,
|
|
|
|
struct iattr *sattr)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dir),
|
|
|
|
_nfs4_proc_mkdir(dir, dentry, sattr),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
|
|
|
|
u64 cookie, struct page *page, unsigned int count, int plus)
|
|
|
|
{
|
|
|
|
struct inode *dir = dentry->d_inode;
|
|
|
|
struct nfs4_readdir_arg args = {
|
|
|
|
.fh = NFS_FH(dir),
|
|
|
|
.pages = &page,
|
|
|
|
.pgbase = 0,
|
|
|
|
.count = count,
|
|
|
|
.bitmask = NFS_SERVER(dentry->d_inode)->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs4_readdir_res res;
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READDIR],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
.rpc_cred = cred,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
2005-06-23 00:16:39 +07:00
|
|
|
dprintk("%s: dentry = %s/%s, cookie = %Lu\n", __FUNCTION__,
|
|
|
|
dentry->d_parent->d_name.name,
|
|
|
|
dentry->d_name.name,
|
|
|
|
(unsigned long long)cookie);
|
2005-04-17 05:20:36 +07:00
|
|
|
nfs4_setup_readdir(cookie, NFS_COOKIEVERF(dir), dentry, &args);
|
|
|
|
res.pgbase = args.pgbase;
|
|
|
|
status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
|
|
|
|
if (status == 0)
|
|
|
|
memcpy(NFS_COOKIEVERF(dir), res.verifier.data, NFS4_VERIFIER_SIZE);
|
2005-06-23 00:16:39 +07:00
|
|
|
dprintk("%s: returns %d\n", __FUNCTION__, status);
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_readdir(struct dentry *dentry, struct rpc_cred *cred,
|
|
|
|
u64 cookie, struct page *page, unsigned int count, int plus)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dentry->d_inode),
|
|
|
|
_nfs4_proc_readdir(dentry, cred, cookie,
|
|
|
|
page, count, plus),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
|
|
|
|
struct iattr *sattr, dev_t rdev)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
struct nfs_fh fh;
|
2005-10-28 09:12:40 +07:00
|
|
|
struct nfs_fattr fattr, dir_fattr;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_create_arg arg = {
|
|
|
|
.dir_fh = NFS_FH(dir),
|
|
|
|
.server = server,
|
|
|
|
.name = &dentry->d_name,
|
|
|
|
.attrs = sattr,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct nfs4_create_res res = {
|
|
|
|
.server = server,
|
|
|
|
.fh = &fh,
|
|
|
|
.fattr = &fattr,
|
2005-10-28 09:12:40 +07:00
|
|
|
.dir_fattr = &dir_fattr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_CREATE],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
};
|
|
|
|
int status;
|
|
|
|
int mode = sattr->ia_mode;
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(&fattr);
|
2005-10-28 09:12:40 +07:00
|
|
|
nfs_fattr_init(&dir_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
BUG_ON(!(sattr->ia_valid & ATTR_MODE));
|
|
|
|
BUG_ON(!S_ISFIFO(mode) && !S_ISBLK(mode) && !S_ISCHR(mode) && !S_ISSOCK(mode));
|
|
|
|
if (S_ISFIFO(mode))
|
|
|
|
arg.ftype = NF4FIFO;
|
|
|
|
else if (S_ISBLK(mode)) {
|
|
|
|
arg.ftype = NF4BLK;
|
|
|
|
arg.u.device.specdata1 = MAJOR(rdev);
|
|
|
|
arg.u.device.specdata2 = MINOR(rdev);
|
|
|
|
}
|
|
|
|
else if (S_ISCHR(mode)) {
|
|
|
|
arg.ftype = NF4CHR;
|
|
|
|
arg.u.device.specdata1 = MAJOR(rdev);
|
|
|
|
arg.u.device.specdata2 = MINOR(rdev);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
arg.ftype = NF4SOCK;
|
|
|
|
|
|
|
|
status = rpc_call_sync(NFS_CLIENT(dir), &msg, 0);
|
|
|
|
if (status == 0) {
|
|
|
|
update_changeattr(dir, &res.dir_cinfo);
|
2005-10-28 09:12:40 +07:00
|
|
|
nfs_post_op_update_inode(dir, res.dir_fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
status = nfs_instantiate(dentry, &fh, &fattr);
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_mknod(struct inode *dir, struct dentry *dentry,
|
|
|
|
struct iattr *sattr, dev_t rdev)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(dir),
|
|
|
|
_nfs4_proc_mknod(dir, dentry, sattr, rdev),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_fsstat *fsstat)
|
|
|
|
{
|
|
|
|
struct nfs4_statfs_arg args = {
|
|
|
|
.fh = fhandle,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_STATFS],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = fsstat,
|
|
|
|
};
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(fsstat->fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
return rpc_call_sync(server->client, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_statfs(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsstat *fsstat)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_proc_statfs(server, fhandle, fsstat),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_fsinfo *fsinfo)
|
|
|
|
{
|
|
|
|
struct nfs4_fsinfo_arg args = {
|
|
|
|
.fh = fhandle,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FSINFO],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = fsinfo,
|
|
|
|
};
|
|
|
|
|
|
|
|
return rpc_call_sync(server->client, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_do_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_do_fsinfo(server, fhandle, fsinfo),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_fsinfo(struct nfs_server *server, struct nfs_fh *fhandle, struct nfs_fsinfo *fsinfo)
|
|
|
|
{
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(fsinfo->fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
return nfs4_do_fsinfo(server, fhandle, fsinfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_pathconf *pathconf)
|
|
|
|
{
|
|
|
|
struct nfs4_pathconf_arg args = {
|
|
|
|
.fh = fhandle,
|
|
|
|
.bitmask = server->attr_bitmask,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_PATHCONF],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = pathconf,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* None of the pathconf attributes are mandatory to implement */
|
|
|
|
if ((args.bitmask[0] & nfs4_pathconf_bitmap[0]) == 0) {
|
|
|
|
memset(pathconf, 0, sizeof(*pathconf));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-10-28 09:12:38 +07:00
|
|
|
nfs_fattr_init(pathconf->fattr);
|
2005-04-17 05:20:36 +07:00
|
|
|
return rpc_call_sync(server->client, &msg, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_pathconf(struct nfs_server *server, struct nfs_fh *fhandle,
|
|
|
|
struct nfs_pathconf *pathconf)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(server,
|
|
|
|
_nfs4_proc_pathconf(server, fhandle, pathconf),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static int nfs4_read_done(struct rpc_task *task, struct nfs_read_data *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-03-21 01:44:27 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(data->inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
if (nfs4_async_handle_error(task, server) == -EAGAIN) {
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_restart_call(task);
|
2006-03-21 01:44:27 +07:00
|
|
|
return -EAGAIN;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
if (task->tk_status > 0)
|
2006-03-21 01:44:27 +07:00
|
|
|
renew_lease(server, data->timestamp);
|
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static void nfs4_proc_read_setup(struct nfs_read_data *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_READ],
|
|
|
|
.rpc_argp = &data->args,
|
|
|
|
.rpc_resp = &data->res,
|
|
|
|
.rpc_cred = data->cred,
|
|
|
|
};
|
|
|
|
|
|
|
|
data->timestamp = jiffies;
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
rpc_call_setup(&data->task, &msg, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static int nfs4_write_done(struct rpc_task *task, struct nfs_write_data *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct inode *inode = data->inode;
|
|
|
|
|
|
|
|
if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
|
|
|
|
rpc_restart_call(task);
|
2006-03-21 01:44:27 +07:00
|
|
|
return -EAGAIN;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2005-10-28 09:12:44 +07:00
|
|
|
if (task->tk_status >= 0) {
|
2005-04-17 05:20:36 +07:00
|
|
|
renew_lease(NFS_SERVER(inode), data->timestamp);
|
2005-10-28 09:12:44 +07:00
|
|
|
nfs_post_op_update_inode(inode, data->res.fattr);
|
|
|
|
}
|
2006-03-21 01:44:27 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static void nfs4_proc_write_setup(struct nfs_write_data *data, int how)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_WRITE],
|
|
|
|
.rpc_argp = &data->args,
|
|
|
|
.rpc_resp = &data->res,
|
|
|
|
.rpc_cred = data->cred,
|
|
|
|
};
|
|
|
|
struct inode *inode = data->inode;
|
2005-10-28 09:12:44 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
int stable;
|
|
|
|
|
|
|
|
if (how & FLUSH_STABLE) {
|
|
|
|
if (!NFS_I(inode)->ncommit)
|
|
|
|
stable = NFS_FILE_SYNC;
|
|
|
|
else
|
|
|
|
stable = NFS_DATA_SYNC;
|
|
|
|
} else
|
|
|
|
stable = NFS_UNSTABLE;
|
|
|
|
data->args.stable = stable;
|
2005-10-28 09:12:44 +07:00
|
|
|
data->args.bitmask = server->attr_bitmask;
|
|
|
|
data->res.server = server;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
data->timestamp = jiffies;
|
|
|
|
|
|
|
|
/* Finalize the task. */
|
2006-03-21 01:44:27 +07:00
|
|
|
rpc_call_setup(&data->task, &msg, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static int nfs4_commit_done(struct rpc_task *task, struct nfs_write_data *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct inode *inode = data->inode;
|
|
|
|
|
|
|
|
if (nfs4_async_handle_error(task, NFS_SERVER(inode)) == -EAGAIN) {
|
|
|
|
rpc_restart_call(task);
|
2006-03-21 01:44:27 +07:00
|
|
|
return -EAGAIN;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2005-10-28 09:12:44 +07:00
|
|
|
if (task->tk_status >= 0)
|
|
|
|
nfs_post_op_update_inode(inode, data->res.fattr);
|
2006-03-21 01:44:27 +07:00
|
|
|
return 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
static void nfs4_proc_commit_setup(struct nfs_write_data *data, int how)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_COMMIT],
|
|
|
|
.rpc_argp = &data->args,
|
|
|
|
.rpc_resp = &data->res,
|
|
|
|
.rpc_cred = data->cred,
|
|
|
|
};
|
2006-03-21 01:44:27 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(data->inode);
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2005-10-28 09:12:44 +07:00
|
|
|
data->args.bitmask = server->attr_bitmask;
|
|
|
|
data->res.server = server;
|
|
|
|
|
2006-03-21 01:44:27 +07:00
|
|
|
rpc_call_setup(&data->task, &msg, 0);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* nfs4_proc_async_renew(): This is not one of the nfs_rpc_ops; it is a special
|
|
|
|
* standalone procedure for queueing an asynchronous RENEW.
|
|
|
|
*/
|
2006-01-03 15:55:04 +07:00
|
|
|
static void nfs4_renew_done(struct rpc_task *task, void *data)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-08-23 07:06:08 +07:00
|
|
|
struct nfs_client *clp = (struct nfs_client *)task->tk_msg.rpc_argp;
|
2006-01-03 15:55:04 +07:00
|
|
|
unsigned long timestamp = (unsigned long)data;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (task->tk_status < 0) {
|
|
|
|
switch (task->tk_status) {
|
|
|
|
case -NFS4ERR_STALE_CLIENTID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
case -NFS4ERR_CB_PATH_DOWN:
|
|
|
|
nfs4_schedule_state_recovery(clp);
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
spin_lock(&clp->cl_lock);
|
|
|
|
if (time_before(clp->cl_last_renewal,timestamp))
|
|
|
|
clp->cl_last_renewal = timestamp;
|
|
|
|
spin_unlock(&clp->cl_lock);
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static const struct rpc_call_ops nfs4_renew_ops = {
|
|
|
|
.rpc_call_done = nfs4_renew_done,
|
|
|
|
};
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
int nfs4_proc_async_renew(struct nfs_client *clp, struct rpc_cred *cred)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
|
|
|
|
.rpc_argp = clp,
|
2006-01-03 15:55:25 +07:00
|
|
|
.rpc_cred = cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
return rpc_call_async(clp->cl_rpcclient, &msg, RPC_TASK_SOFT,
|
2006-01-03 15:55:04 +07:00
|
|
|
&nfs4_renew_ops, (void *)jiffies);
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
int nfs4_proc_renew(struct nfs_client *clp, struct rpc_cred *cred)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_RENEW],
|
|
|
|
.rpc_argp = clp,
|
2006-01-03 15:55:25 +07:00
|
|
|
.rpc_cred = cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
unsigned long now = jiffies;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
|
|
|
|
if (status < 0)
|
|
|
|
return status;
|
|
|
|
spin_lock(&clp->cl_lock);
|
|
|
|
if (time_before(clp->cl_last_renewal,now))
|
|
|
|
clp->cl_last_renewal = now;
|
|
|
|
spin_unlock(&clp->cl_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-06-23 00:16:22 +07:00
|
|
|
static inline int nfs4_server_supports_acls(struct nfs_server *server)
|
|
|
|
{
|
|
|
|
return (server->caps & NFS_CAP_ACLS)
|
|
|
|
&& (server->acl_bitmask & ACL4_SUPPORT_ALLOW_ACL)
|
|
|
|
&& (server->acl_bitmask & ACL4_SUPPORT_DENY_ACL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Assuming that XATTR_SIZE_MAX is a multiple of PAGE_CACHE_SIZE, and that
|
|
|
|
* it's OK to put sizeof(void) * (XATTR_SIZE_MAX/PAGE_CACHE_SIZE) bytes on
|
|
|
|
* the stack.
|
|
|
|
*/
|
|
|
|
#define NFS4ACL_MAXPAGES (XATTR_SIZE_MAX >> PAGE_CACHE_SHIFT)
|
|
|
|
|
|
|
|
static void buf_to_pages(const void *buf, size_t buflen,
|
|
|
|
struct page **pages, unsigned int *pgbase)
|
|
|
|
{
|
|
|
|
const void *p = buf;
|
|
|
|
|
|
|
|
*pgbase = offset_in_page(buf);
|
|
|
|
p -= *pgbase;
|
|
|
|
while (p < buf + buflen) {
|
|
|
|
*(pages++) = virt_to_page(p);
|
|
|
|
p += PAGE_CACHE_SIZE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-06-23 00:16:23 +07:00
|
|
|
struct nfs4_cached_acl {
|
|
|
|
int cached;
|
|
|
|
size_t len;
|
2005-06-23 00:16:28 +07:00
|
|
|
char data[0];
|
2005-06-23 00:16:23 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
static void nfs4_set_cached_acl(struct inode *inode, struct nfs4_cached_acl *acl)
|
|
|
|
{
|
|
|
|
struct nfs_inode *nfsi = NFS_I(inode);
|
|
|
|
|
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
kfree(nfsi->nfs4_acl);
|
|
|
|
nfsi->nfs4_acl = acl;
|
|
|
|
spin_unlock(&inode->i_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_zap_acl_attr(struct inode *inode)
|
|
|
|
{
|
|
|
|
nfs4_set_cached_acl(inode, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline ssize_t nfs4_read_cached_acl(struct inode *inode, char *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
struct nfs_inode *nfsi = NFS_I(inode);
|
|
|
|
struct nfs4_cached_acl *acl;
|
|
|
|
int ret = -ENOENT;
|
|
|
|
|
|
|
|
spin_lock(&inode->i_lock);
|
|
|
|
acl = nfsi->nfs4_acl;
|
|
|
|
if (acl == NULL)
|
|
|
|
goto out;
|
|
|
|
if (buf == NULL) /* user is just asking for length */
|
|
|
|
goto out_len;
|
|
|
|
if (acl->cached == 0)
|
|
|
|
goto out;
|
|
|
|
ret = -ERANGE; /* see getxattr(2) man page */
|
|
|
|
if (acl->len > buflen)
|
|
|
|
goto out;
|
|
|
|
memcpy(buf, acl->data, acl->len);
|
|
|
|
out_len:
|
|
|
|
ret = acl->len;
|
|
|
|
out:
|
|
|
|
spin_unlock(&inode->i_lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_write_cached_acl(struct inode *inode, const char *buf, size_t acl_len)
|
|
|
|
{
|
|
|
|
struct nfs4_cached_acl *acl;
|
|
|
|
|
|
|
|
if (buf && acl_len <= PAGE_SIZE) {
|
|
|
|
acl = kmalloc(sizeof(*acl) + acl_len, GFP_KERNEL);
|
|
|
|
if (acl == NULL)
|
|
|
|
goto out;
|
|
|
|
acl->cached = 1;
|
|
|
|
memcpy(acl->data, buf, acl_len);
|
|
|
|
} else {
|
|
|
|
acl = kmalloc(sizeof(*acl), GFP_KERNEL);
|
|
|
|
if (acl == NULL)
|
|
|
|
goto out;
|
|
|
|
acl->cached = 0;
|
|
|
|
}
|
|
|
|
acl->len = acl_len;
|
|
|
|
out:
|
|
|
|
nfs4_set_cached_acl(inode, acl);
|
|
|
|
}
|
|
|
|
|
2006-08-24 23:27:15 +07:00
|
|
|
static ssize_t __nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
|
2005-06-23 00:16:22 +07:00
|
|
|
{
|
|
|
|
struct page *pages[NFS4ACL_MAXPAGES];
|
|
|
|
struct nfs_getaclargs args = {
|
|
|
|
.fh = NFS_FH(inode),
|
|
|
|
.acl_pages = pages,
|
|
|
|
.acl_len = buflen,
|
|
|
|
};
|
|
|
|
size_t resp_len = buflen;
|
2005-06-23 00:16:23 +07:00
|
|
|
void *resp_buf;
|
2005-06-23 00:16:22 +07:00
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_GETACL],
|
|
|
|
.rpc_argp = &args,
|
|
|
|
.rpc_resp = &resp_len,
|
|
|
|
};
|
2005-06-23 00:16:23 +07:00
|
|
|
struct page *localpage = NULL;
|
2005-06-23 00:16:22 +07:00
|
|
|
int ret;
|
|
|
|
|
2005-06-23 00:16:23 +07:00
|
|
|
if (buflen < PAGE_SIZE) {
|
|
|
|
/* As long as we're doing a round trip to the server anyway,
|
|
|
|
* let's be prepared for a page of acl data. */
|
|
|
|
localpage = alloc_page(GFP_KERNEL);
|
|
|
|
resp_buf = page_address(localpage);
|
|
|
|
if (localpage == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
args.acl_pages[0] = localpage;
|
|
|
|
args.acl_pgbase = 0;
|
2005-10-14 03:54:32 +07:00
|
|
|
resp_len = args.acl_len = PAGE_SIZE;
|
2005-06-23 00:16:23 +07:00
|
|
|
} else {
|
|
|
|
resp_buf = buf;
|
|
|
|
buf_to_pages(buf, buflen, args.acl_pages, &args.acl_pgbase);
|
|
|
|
}
|
2005-06-23 00:16:22 +07:00
|
|
|
ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
|
2005-06-23 00:16:23 +07:00
|
|
|
if (ret)
|
|
|
|
goto out_free;
|
|
|
|
if (resp_len > args.acl_len)
|
|
|
|
nfs4_write_cached_acl(inode, NULL, resp_len);
|
|
|
|
else
|
|
|
|
nfs4_write_cached_acl(inode, resp_buf, resp_len);
|
|
|
|
if (buf) {
|
|
|
|
ret = -ERANGE;
|
|
|
|
if (resp_len > buflen)
|
|
|
|
goto out_free;
|
|
|
|
if (localpage)
|
|
|
|
memcpy(buf, resp_buf, resp_len);
|
|
|
|
}
|
|
|
|
ret = resp_len;
|
|
|
|
out_free:
|
|
|
|
if (localpage)
|
|
|
|
__free_page(localpage);
|
2005-06-23 00:16:22 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-08-24 23:27:15 +07:00
|
|
|
static ssize_t nfs4_get_acl_uncached(struct inode *inode, void *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
ssize_t ret;
|
|
|
|
do {
|
|
|
|
ret = __nfs4_get_acl_uncached(inode, buf, buflen);
|
|
|
|
if (ret >= 0)
|
|
|
|
break;
|
|
|
|
ret = nfs4_handle_exception(NFS_SERVER(inode), ret, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2005-06-23 00:16:23 +07:00
|
|
|
static ssize_t nfs4_proc_get_acl(struct inode *inode, void *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!nfs4_server_supports_acls(server))
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
ret = nfs_revalidate_inode(server, inode);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
ret = nfs4_read_cached_acl(inode, buf, buflen);
|
|
|
|
if (ret != -ENOENT)
|
|
|
|
return ret;
|
|
|
|
return nfs4_get_acl_uncached(inode, buf, buflen);
|
|
|
|
}
|
|
|
|
|
2006-08-24 23:27:15 +07:00
|
|
|
static int __nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
|
2005-06-23 00:16:23 +07:00
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
|
|
|
struct page *pages[NFS4ACL_MAXPAGES];
|
|
|
|
struct nfs_setaclargs arg = {
|
|
|
|
.fh = NFS_FH(inode),
|
|
|
|
.acl_pages = pages,
|
|
|
|
.acl_len = buflen,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETACL],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = NULL,
|
|
|
|
};
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!nfs4_server_supports_acls(server))
|
|
|
|
return -EOPNOTSUPP;
|
2005-10-19 04:20:19 +07:00
|
|
|
nfs_inode_return_delegation(inode);
|
2005-06-23 00:16:23 +07:00
|
|
|
buf_to_pages(buf, buflen, arg.acl_pages, &arg.acl_pgbase);
|
2006-08-23 07:06:11 +07:00
|
|
|
ret = rpc_call_sync(NFS_CLIENT(inode), &msg, 0);
|
2007-05-01 21:56:25 +07:00
|
|
|
nfs_zap_caches(inode);
|
2005-06-23 00:16:23 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2006-08-24 23:27:15 +07:00
|
|
|
static int nfs4_proc_set_acl(struct inode *inode, const void *buf, size_t buflen)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(inode),
|
|
|
|
__nfs4_proc_set_acl(inode, buf, buflen),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
static int
|
2005-10-19 04:20:15 +07:00
|
|
|
nfs4_async_handle_error(struct rpc_task *task, const struct nfs_server *server)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
if (!clp || task->tk_status >= 0)
|
|
|
|
return 0;
|
|
|
|
switch(task->tk_status) {
|
|
|
|
case -NFS4ERR_STALE_CLIENTID:
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
rpc_sleep_on(&clp->cl_rpcwaitq, task, NULL, NULL);
|
|
|
|
nfs4_schedule_state_recovery(clp);
|
2006-01-03 15:55:22 +07:00
|
|
|
if (test_bit(NFS4CLNT_STATE_RECOVER, &clp->cl_state) == 0)
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_wake_up_task(task);
|
|
|
|
task->tk_status = 0;
|
|
|
|
return -EAGAIN;
|
|
|
|
case -NFS4ERR_DELAY:
|
2006-03-21 01:44:14 +07:00
|
|
|
nfs_inc_server_stats((struct nfs_server *) server,
|
|
|
|
NFSIOS_DELAY);
|
|
|
|
case -NFS4ERR_GRACE:
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_delay(task, NFS4_POLL_RETRY_MAX);
|
|
|
|
task->tk_status = 0;
|
|
|
|
return -EAGAIN;
|
|
|
|
case -NFS4ERR_OLD_STATEID:
|
|
|
|
task->tk_status = 0;
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
|
|
|
task->tk_status = nfs4_map_errors(task->tk_status);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:22 +07:00
|
|
|
static int nfs4_wait_bit_interruptible(void *word)
|
|
|
|
{
|
|
|
|
if (signal_pending(current))
|
|
|
|
return -ERESTARTSYS;
|
|
|
|
schedule();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
static int nfs4_wait_clnt_recover(struct rpc_clnt *clnt, struct nfs_client *clp)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
sigset_t oldset;
|
2006-01-03 15:55:22 +07:00
|
|
|
int res;
|
2005-04-17 05:20:36 +07:00
|
|
|
|
|
|
|
might_sleep();
|
|
|
|
|
2006-12-14 04:43:13 +07:00
|
|
|
rwsem_acquire(&clp->cl_sem.dep_map, 0, 0, _RET_IP_);
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_clnt_sigmask(clnt, &oldset);
|
2006-01-03 15:55:22 +07:00
|
|
|
res = wait_on_bit(&clp->cl_state, NFS4CLNT_STATE_RECOVER,
|
|
|
|
nfs4_wait_bit_interruptible,
|
|
|
|
TASK_INTERRUPTIBLE);
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_clnt_sigunmask(clnt, &oldset);
|
2006-12-14 04:43:13 +07:00
|
|
|
|
|
|
|
rwsem_release(&clp->cl_sem.dep_map, 1, _RET_IP_);
|
2005-04-17 05:20:36 +07:00
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_delay(struct rpc_clnt *clnt, long *timeout)
|
|
|
|
{
|
|
|
|
sigset_t oldset;
|
|
|
|
int res = 0;
|
|
|
|
|
|
|
|
might_sleep();
|
|
|
|
|
|
|
|
if (*timeout <= 0)
|
|
|
|
*timeout = NFS4_POLL_RETRY_MIN;
|
|
|
|
if (*timeout > NFS4_POLL_RETRY_MAX)
|
|
|
|
*timeout = NFS4_POLL_RETRY_MAX;
|
|
|
|
rpc_clnt_sigmask(clnt, &oldset);
|
|
|
|
if (clnt->cl_intr) {
|
2005-09-10 14:27:23 +07:00
|
|
|
schedule_timeout_interruptible(*timeout);
|
2005-04-17 05:20:36 +07:00
|
|
|
if (signalled())
|
|
|
|
res = -ERESTARTSYS;
|
2005-09-10 14:27:23 +07:00
|
|
|
} else
|
|
|
|
schedule_timeout_uninterruptible(*timeout);
|
2005-04-17 05:20:36 +07:00
|
|
|
rpc_clnt_sigunmask(clnt, &oldset);
|
|
|
|
*timeout <<= 1;
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* This is the error handling routine for processes that are allowed
|
|
|
|
* to sleep.
|
|
|
|
*/
|
2007-05-15 04:16:04 +07:00
|
|
|
static int nfs4_handle_exception(const struct nfs_server *server, int errorcode, struct nfs4_exception *exception)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2005-04-17 05:20:36 +07:00
|
|
|
int ret = errorcode;
|
|
|
|
|
|
|
|
exception->retry = 0;
|
|
|
|
switch(errorcode) {
|
|
|
|
case 0:
|
|
|
|
return 0;
|
|
|
|
case -NFS4ERR_STALE_CLIENTID:
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
2006-01-03 15:55:22 +07:00
|
|
|
nfs4_schedule_state_recovery(clp);
|
2005-04-17 05:20:36 +07:00
|
|
|
ret = nfs4_wait_clnt_recover(server->client, clp);
|
|
|
|
if (ret == 0)
|
|
|
|
exception->retry = 1;
|
|
|
|
break;
|
2006-09-15 19:25:04 +07:00
|
|
|
case -NFS4ERR_FILE_OPEN:
|
2005-04-17 05:20:36 +07:00
|
|
|
case -NFS4ERR_GRACE:
|
|
|
|
case -NFS4ERR_DELAY:
|
|
|
|
ret = nfs4_delay(server->client, &exception->timeout);
|
2005-11-05 03:33:50 +07:00
|
|
|
if (ret != 0)
|
|
|
|
break;
|
2005-04-17 05:20:36 +07:00
|
|
|
case -NFS4ERR_OLD_STATEID:
|
2005-11-05 03:33:50 +07:00
|
|
|
exception->retry = 1;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
/* We failed to handle the error */
|
|
|
|
return nfs4_map_errors(ret);
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
int nfs4_proc_setclientid(struct nfs_client *clp, u32 program, unsigned short port, struct rpc_cred *cred)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
nfs4_verifier sc_verifier;
|
|
|
|
struct nfs4_setclientid setclientid = {
|
|
|
|
.sc_verifier = &sc_verifier,
|
|
|
|
.sc_prog = program,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID],
|
|
|
|
.rpc_argp = &setclientid,
|
|
|
|
.rpc_resp = clp,
|
2006-01-03 15:55:26 +07:00
|
|
|
.rpc_cred = cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2006-10-20 13:28:51 +07:00
|
|
|
__be32 *p;
|
2005-04-17 05:20:36 +07:00
|
|
|
int loop = 0;
|
|
|
|
int status;
|
|
|
|
|
2006-10-20 13:28:51 +07:00
|
|
|
p = (__be32*)sc_verifier.data;
|
2005-04-17 05:20:36 +07:00
|
|
|
*p++ = htonl((u32)clp->cl_boot_time.tv_sec);
|
|
|
|
*p = htonl((u32)clp->cl_boot_time.tv_nsec);
|
|
|
|
|
|
|
|
for(;;) {
|
|
|
|
setclientid.sc_name_len = scnprintf(setclientid.sc_name,
|
|
|
|
sizeof(setclientid.sc_name), "%s/%u.%u.%u.%u %s %u",
|
2006-08-23 07:06:10 +07:00
|
|
|
clp->cl_ipaddr, NIPQUAD(clp->cl_addr.sin_addr),
|
2006-01-03 15:55:26 +07:00
|
|
|
cred->cr_ops->cr_name,
|
2005-04-17 05:20:36 +07:00
|
|
|
clp->cl_id_uniquifier);
|
|
|
|
setclientid.sc_netid_len = scnprintf(setclientid.sc_netid,
|
|
|
|
sizeof(setclientid.sc_netid), "tcp");
|
|
|
|
setclientid.sc_uaddr_len = scnprintf(setclientid.sc_uaddr,
|
|
|
|
sizeof(setclientid.sc_uaddr), "%s.%d.%d",
|
|
|
|
clp->cl_ipaddr, port >> 8, port & 255);
|
|
|
|
|
|
|
|
status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
|
|
|
|
if (status != -NFS4ERR_CLID_INUSE)
|
|
|
|
break;
|
|
|
|
if (signalled())
|
|
|
|
break;
|
|
|
|
if (loop++ & 1)
|
|
|
|
ssleep(clp->cl_lease_time + 1);
|
|
|
|
else
|
|
|
|
if (++clp->cl_id_uniquifier == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
static int _nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
|
|
|
struct nfs_fsinfo fsinfo;
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_SETCLIENTID_CONFIRM],
|
|
|
|
.rpc_argp = clp,
|
|
|
|
.rpc_resp = &fsinfo,
|
2006-01-03 15:55:26 +07:00
|
|
|
.rpc_cred = cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
unsigned long now;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
now = jiffies;
|
|
|
|
status = rpc_call_sync(clp->cl_rpcclient, &msg, 0);
|
|
|
|
if (status == 0) {
|
|
|
|
spin_lock(&clp->cl_lock);
|
|
|
|
clp->cl_lease_time = fsinfo.lease_time * HZ;
|
|
|
|
clp->cl_last_renewal = now;
|
2006-01-03 15:55:24 +07:00
|
|
|
clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
|
2005-04-17 05:20:36 +07:00
|
|
|
spin_unlock(&clp->cl_lock);
|
|
|
|
}
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-08-23 07:06:08 +07:00
|
|
|
int nfs4_proc_setclientid_confirm(struct nfs_client *clp, struct rpc_cred *cred)
|
2006-03-21 01:44:47 +07:00
|
|
|
{
|
|
|
|
long timeout;
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = _nfs4_proc_setclientid_confirm(clp, cred);
|
|
|
|
switch (err) {
|
|
|
|
case 0:
|
|
|
|
return err;
|
|
|
|
case -NFS4ERR_RESOURCE:
|
|
|
|
/* The IBM lawyers misread another document! */
|
|
|
|
case -NFS4ERR_DELAY:
|
|
|
|
err = nfs4_delay(clp->cl_rpcclient, &timeout);
|
|
|
|
}
|
|
|
|
} while (err == 0);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:18 +07:00
|
|
|
struct nfs4_delegreturndata {
|
|
|
|
struct nfs4_delegreturnargs args;
|
2006-01-03 15:55:38 +07:00
|
|
|
struct nfs4_delegreturnres res;
|
2006-01-03 15:55:18 +07:00
|
|
|
struct nfs_fh fh;
|
|
|
|
nfs4_stateid stateid;
|
|
|
|
struct rpc_cred *cred;
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp;
|
2006-01-03 15:55:38 +07:00
|
|
|
struct nfs_fattr fattr;
|
2006-01-03 15:55:18 +07:00
|
|
|
int rpc_status;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void nfs4_delegreturn_prepare(struct rpc_task *task, void *calldata)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:18 +07:00
|
|
|
struct nfs4_delegreturndata *data = calldata;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_DELEGRETURN],
|
2006-01-03 15:55:18 +07:00
|
|
|
.rpc_argp = &data->args,
|
2006-01-03 15:55:38 +07:00
|
|
|
.rpc_resp = &data->res,
|
2006-01-03 15:55:18 +07:00
|
|
|
.rpc_cred = data->cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2006-01-03 15:55:38 +07:00
|
|
|
nfs_fattr_init(data->res.fattr);
|
2006-01-03 15:55:18 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
|
|
|
}
|
2005-04-17 05:20:36 +07:00
|
|
|
|
2006-01-03 15:55:18 +07:00
|
|
|
static void nfs4_delegreturn_done(struct rpc_task *task, void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_delegreturndata *data = calldata;
|
|
|
|
data->rpc_status = task->tk_status;
|
2006-01-03 15:55:21 +07:00
|
|
|
if (data->rpc_status == 0)
|
2006-01-03 15:55:38 +07:00
|
|
|
renew_lease(data->res.server, data->timestamp);
|
2006-01-03 15:55:18 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_delegreturn_release(void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_delegreturndata *data = calldata;
|
|
|
|
|
|
|
|
put_rpccred(data->cred);
|
|
|
|
kfree(calldata);
|
|
|
|
}
|
|
|
|
|
2006-03-21 01:44:07 +07:00
|
|
|
static const struct rpc_call_ops nfs4_delegreturn_ops = {
|
2006-01-03 15:55:18 +07:00
|
|
|
.rpc_call_prepare = nfs4_delegreturn_prepare,
|
|
|
|
.rpc_call_done = nfs4_delegreturn_done,
|
|
|
|
.rpc_release = nfs4_delegreturn_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int _nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
|
|
|
|
{
|
|
|
|
struct nfs4_delegreturndata *data;
|
2006-01-03 15:55:38 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2006-01-03 15:55:18 +07:00
|
|
|
struct rpc_task *task;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
data = kmalloc(sizeof(*data), GFP_KERNEL);
|
|
|
|
if (data == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
data->args.fhandle = &data->fh;
|
|
|
|
data->args.stateid = &data->stateid;
|
2006-01-03 15:55:38 +07:00
|
|
|
data->args.bitmask = server->attr_bitmask;
|
2006-01-03 15:55:18 +07:00
|
|
|
nfs_copy_fh(&data->fh, NFS_FH(inode));
|
|
|
|
memcpy(&data->stateid, stateid, sizeof(data->stateid));
|
2006-01-03 15:55:38 +07:00
|
|
|
data->res.fattr = &data->fattr;
|
|
|
|
data->res.server = server;
|
2006-01-03 15:55:18 +07:00
|
|
|
data->cred = get_rpccred(cred);
|
2006-01-03 15:55:21 +07:00
|
|
|
data->timestamp = jiffies;
|
2006-01-03 15:55:18 +07:00
|
|
|
data->rpc_status = 0;
|
|
|
|
|
|
|
|
task = rpc_run_task(NFS_CLIENT(inode), RPC_TASK_ASYNC, &nfs4_delegreturn_ops, data);
|
2006-03-21 06:11:10 +07:00
|
|
|
if (IS_ERR(task))
|
2006-01-03 15:55:18 +07:00
|
|
|
return PTR_ERR(task);
|
|
|
|
status = nfs4_wait_for_completion_rpc_task(task);
|
2006-01-03 15:55:38 +07:00
|
|
|
if (status == 0) {
|
2006-01-03 15:55:18 +07:00
|
|
|
status = data->rpc_status;
|
2006-01-03 15:55:38 +07:00
|
|
|
if (status == 0)
|
|
|
|
nfs_post_op_update_inode(inode, &data->fattr);
|
|
|
|
}
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2006-01-03 15:55:18 +07:00
|
|
|
return status;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
int nfs4_proc_delegreturn(struct inode *inode, struct rpc_cred *cred, const nfs4_stateid *stateid)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
do {
|
|
|
|
err = _nfs4_proc_delegreturn(inode, cred, stateid);
|
|
|
|
switch (err) {
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
case 0:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
err = nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define NFS4_LOCK_MINTIMEOUT (1 * HZ)
|
|
|
|
#define NFS4_LOCK_MAXTIMEOUT (30 * HZ)
|
|
|
|
|
|
|
|
/*
|
|
|
|
* sleep, with exponential backoff, and retry the LOCK operation.
|
|
|
|
*/
|
|
|
|
static unsigned long
|
|
|
|
nfs4_set_lock_task_retry(unsigned long timeout)
|
|
|
|
{
|
2005-09-10 14:27:23 +07:00
|
|
|
schedule_timeout_interruptible(timeout);
|
2005-04-17 05:20:36 +07:00
|
|
|
timeout <<= 1;
|
|
|
|
if (timeout > NFS4_LOCK_MAXTIMEOUT)
|
|
|
|
return NFS4_LOCK_MAXTIMEOUT;
|
|
|
|
return timeout;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
|
|
|
|
{
|
|
|
|
struct inode *inode = state->inode;
|
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2006-08-23 07:06:09 +07:00
|
|
|
struct nfs_client *clp = server->nfs_client;
|
2006-01-03 15:55:16 +07:00
|
|
|
struct nfs_lockt_args arg = {
|
2005-04-17 05:20:36 +07:00
|
|
|
.fh = NFS_FH(inode),
|
2006-01-03 15:55:16 +07:00
|
|
|
.fl = request,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2006-01-03 15:55:16 +07:00
|
|
|
struct nfs_lockt_res res = {
|
|
|
|
.denied = request,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKT],
|
|
|
|
.rpc_argp = &arg,
|
|
|
|
.rpc_resp = &res,
|
|
|
|
.rpc_cred = state->owner->so_cred,
|
|
|
|
};
|
|
|
|
struct nfs4_lock_state *lsp;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
down_read(&clp->cl_sem);
|
2006-01-03 15:55:16 +07:00
|
|
|
arg.lock_owner.clientid = clp->cl_clientid;
|
2005-06-23 00:16:32 +07:00
|
|
|
status = nfs4_set_lock_state(state, request);
|
|
|
|
if (status != 0)
|
|
|
|
goto out;
|
|
|
|
lsp = request->fl_u.nfs4_fl.owner;
|
2007-07-03 00:58:33 +07:00
|
|
|
arg.lock_owner.id = lsp->ls_id.id;
|
2005-04-17 05:20:36 +07:00
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
2006-01-03 15:55:16 +07:00
|
|
|
switch (status) {
|
|
|
|
case 0:
|
|
|
|
request->fl_type = F_UNLCK;
|
|
|
|
break;
|
|
|
|
case -NFS4ERR_DENIED:
|
|
|
|
status = 0;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
2007-02-23 06:48:53 +07:00
|
|
|
request->fl_ops->fl_release_private(request);
|
2005-06-23 00:16:32 +07:00
|
|
|
out:
|
2005-04-17 05:20:36 +07:00
|
|
|
up_read(&clp->cl_sem);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_getlk(struct nfs4_state *state, int cmd, struct file_lock *request)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(state->inode),
|
|
|
|
_nfs4_proc_getlk(state, cmd, request),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int do_vfs_lock(struct file *file, struct file_lock *fl)
|
|
|
|
{
|
|
|
|
int res = 0;
|
|
|
|
switch (fl->fl_flags & (FL_POSIX|FL_FLOCK)) {
|
|
|
|
case FL_POSIX:
|
|
|
|
res = posix_lock_file_wait(file, fl);
|
|
|
|
break;
|
|
|
|
case FL_FLOCK:
|
|
|
|
res = flock_lock_file_wait(file, fl);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
2005-10-19 04:20:15 +07:00
|
|
|
struct nfs4_unlockdata {
|
2006-01-03 15:55:16 +07:00
|
|
|
struct nfs_locku_args arg;
|
|
|
|
struct nfs_locku_res res;
|
2005-10-19 04:20:15 +07:00
|
|
|
struct nfs4_lock_state *lsp;
|
|
|
|
struct nfs_open_context *ctx;
|
2006-01-03 15:55:16 +07:00
|
|
|
struct file_lock fl;
|
|
|
|
const struct nfs_server *server;
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp;
|
2005-10-19 04:20:15 +07:00
|
|
|
};
|
|
|
|
|
2006-01-03 15:55:16 +07:00
|
|
|
static struct nfs4_unlockdata *nfs4_alloc_unlockdata(struct file_lock *fl,
|
|
|
|
struct nfs_open_context *ctx,
|
|
|
|
struct nfs4_lock_state *lsp,
|
|
|
|
struct nfs_seqid *seqid)
|
|
|
|
{
|
|
|
|
struct nfs4_unlockdata *p;
|
|
|
|
struct inode *inode = lsp->ls_state->inode;
|
|
|
|
|
|
|
|
p = kmalloc(sizeof(*p), GFP_KERNEL);
|
|
|
|
if (p == NULL)
|
|
|
|
return NULL;
|
|
|
|
p->arg.fh = NFS_FH(inode);
|
|
|
|
p->arg.fl = &p->fl;
|
|
|
|
p->arg.seqid = seqid;
|
|
|
|
p->arg.stateid = &lsp->ls_stateid;
|
|
|
|
p->lsp = lsp;
|
|
|
|
atomic_inc(&lsp->ls_count);
|
|
|
|
/* Ensure we don't close file until we're done freeing locks! */
|
|
|
|
p->ctx = get_nfs_open_context(ctx);
|
|
|
|
memcpy(&p->fl, fl, sizeof(p->fl));
|
|
|
|
p->server = NFS_SERVER(inode);
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:07 +07:00
|
|
|
static void nfs4_locku_release_calldata(void *data)
|
2005-10-19 04:20:15 +07:00
|
|
|
{
|
2006-01-03 15:55:04 +07:00
|
|
|
struct nfs4_unlockdata *calldata = data;
|
2006-01-03 15:55:16 +07:00
|
|
|
nfs_free_seqid(calldata->arg.seqid);
|
2006-01-03 15:55:07 +07:00
|
|
|
nfs4_put_lock_state(calldata->lsp);
|
|
|
|
put_nfs_open_context(calldata->ctx);
|
|
|
|
kfree(calldata);
|
2005-10-19 04:20:15 +07:00
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static void nfs4_locku_done(struct rpc_task *task, void *data)
|
2005-10-19 04:20:15 +07:00
|
|
|
{
|
2006-01-03 15:55:04 +07:00
|
|
|
struct nfs4_unlockdata *calldata = data;
|
2005-10-19 04:20:15 +07:00
|
|
|
|
2006-01-03 15:55:07 +07:00
|
|
|
if (RPC_ASSASSINATED(task))
|
|
|
|
return;
|
2006-01-03 15:55:16 +07:00
|
|
|
nfs_increment_lock_seqid(task->tk_status, calldata->arg.seqid);
|
2005-10-19 04:20:15 +07:00
|
|
|
switch (task->tk_status) {
|
|
|
|
case 0:
|
|
|
|
memcpy(calldata->lsp->ls_stateid.data,
|
2006-01-03 15:55:16 +07:00
|
|
|
calldata->res.stateid.data,
|
2005-10-19 04:20:15 +07:00
|
|
|
sizeof(calldata->lsp->ls_stateid.data));
|
2006-01-03 15:55:21 +07:00
|
|
|
renew_lease(calldata->server, calldata->timestamp);
|
2005-10-19 04:20:15 +07:00
|
|
|
break;
|
|
|
|
case -NFS4ERR_STALE_STATEID:
|
|
|
|
case -NFS4ERR_EXPIRED:
|
|
|
|
break;
|
|
|
|
default:
|
2006-12-14 04:43:06 +07:00
|
|
|
if (nfs4_async_handle_error(task, calldata->server) == -EAGAIN)
|
2005-10-19 04:20:15 +07:00
|
|
|
rpc_restart_call(task);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:05 +07:00
|
|
|
static void nfs4_locku_prepare(struct rpc_task *task, void *data)
|
2005-10-19 04:20:15 +07:00
|
|
|
{
|
2006-01-03 15:55:05 +07:00
|
|
|
struct nfs4_unlockdata *calldata = data;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCKU],
|
2005-10-19 04:20:15 +07:00
|
|
|
.rpc_argp = &calldata->arg,
|
|
|
|
.rpc_resp = &calldata->res,
|
|
|
|
.rpc_cred = calldata->lsp->ls_state->owner->so_cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2005-10-19 04:20:15 +07:00
|
|
|
|
2006-01-03 15:55:16 +07:00
|
|
|
if (nfs_wait_on_sequence(calldata->arg.seqid, task) != 0)
|
2005-10-19 04:20:15 +07:00
|
|
|
return;
|
|
|
|
if ((calldata->lsp->ls_flags & NFS_LOCK_INITIALIZED) == 0) {
|
2006-01-03 15:55:04 +07:00
|
|
|
/* Note: exit _without_ running nfs4_locku_done */
|
|
|
|
task->tk_action = NULL;
|
2005-10-19 04:20:15 +07:00
|
|
|
return;
|
|
|
|
}
|
2006-01-03 15:55:21 +07:00
|
|
|
calldata->timestamp = jiffies;
|
2005-10-19 04:20:15 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:04 +07:00
|
|
|
static const struct rpc_call_ops nfs4_locku_ops = {
|
2006-01-03 15:55:05 +07:00
|
|
|
.rpc_call_prepare = nfs4_locku_prepare,
|
2006-01-03 15:55:04 +07:00
|
|
|
.rpc_call_done = nfs4_locku_done,
|
2006-01-03 15:55:07 +07:00
|
|
|
.rpc_release = nfs4_locku_release_calldata,
|
2006-01-03 15:55:04 +07:00
|
|
|
};
|
|
|
|
|
2006-01-03 15:55:17 +07:00
|
|
|
static struct rpc_task *nfs4_do_unlck(struct file_lock *fl,
|
|
|
|
struct nfs_open_context *ctx,
|
|
|
|
struct nfs4_lock_state *lsp,
|
|
|
|
struct nfs_seqid *seqid)
|
|
|
|
{
|
|
|
|
struct nfs4_unlockdata *data;
|
|
|
|
|
NFSv4: Make sure unlock is really an unlock when cancelling a lock
I ran into a curious issue when a lock is being canceled. The
cancellation results in a lock request to the vfs layer instead of an
unlock request. This is particularly insidious when the process that
owns the lock is exiting. In that case, sometimes the erroneous lock is
applied AFTER the process has entered zombie state, preventing the lock
from ever being released. Eventually other processes block on the lock
causing a slow degredation of the system. In the 2.6.16 kernel this was
investigated on, the problem is compounded by the fact that the cl_sem
is held while blocking on the vfs lock, which results in most processes
accessing the nfs file system in question hanging.
In more detail, here is how the situation occurs:
first _nfs4_do_setlk():
static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int reclaim)
...
ret = nfs4_wait_for_completion_rpc_task(task);
if (ret == 0) {
...
} else
data->cancelled = 1;
then nfs4_lock_release():
static void nfs4_lock_release(void *calldata)
...
if (data->cancelled != 0) {
struct rpc_task *task;
task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
data->arg.lock_seqid);
The problem is the same file_lock that was passed in to _nfs4_do_setlk()
gets passed to nfs4_do_unlck() from nfs4_lock_release(). So the type is
still F_RDLCK or FWRLCK, not F_UNLCK. At some point, when cancelling the
lock, the type needs to be changed to F_UNLCK. It seemed easiest to do
that in nfs4_do_unlck(), but it could be done in nfs4_lock_release().
The concern I had with doing it there was if something still needed the
original file_lock, though it turns out the original file_lock still
needs to be modified by nfs4_do_unlck() because nfs4_do_unlck() uses the
original file_lock to pass to the vfs layer, and a copy of the original
file_lock for the RPC request.
It seems like the simplest solution is to force all situations where
nfs4_do_unlck() is being used to result in an unlock, so with that in
mind, I made the following change:
Signed-off-by: Frank Filz <ffilzlnx@us.ibm.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
2007-07-10 05:32:29 +07:00
|
|
|
/* Ensure this is an unlock - when canceling a lock, the
|
|
|
|
* canceled lock is passed in, and it won't be an unlock.
|
|
|
|
*/
|
|
|
|
fl->fl_type = F_UNLCK;
|
|
|
|
|
2006-01-03 15:55:17 +07:00
|
|
|
data = nfs4_alloc_unlockdata(fl, ctx, lsp, seqid);
|
|
|
|
if (data == NULL) {
|
|
|
|
nfs_free_seqid(seqid);
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
}
|
|
|
|
|
2006-03-21 06:11:10 +07:00
|
|
|
return rpc_run_task(NFS_CLIENT(lsp->ls_state->inode), RPC_TASK_ASYNC, &nfs4_locku_ops, data);
|
2006-01-03 15:55:17 +07:00
|
|
|
}
|
|
|
|
|
2005-10-19 04:20:15 +07:00
|
|
|
static int nfs4_proc_unlck(struct nfs4_state *state, int cmd, struct file_lock *request)
|
|
|
|
{
|
2006-01-03 15:55:16 +07:00
|
|
|
struct nfs_seqid *seqid;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_lock_state *lsp;
|
2006-01-03 15:55:07 +07:00
|
|
|
struct rpc_task *task;
|
|
|
|
int status = 0;
|
2005-10-19 04:20:15 +07:00
|
|
|
|
2005-06-23 00:16:32 +07:00
|
|
|
status = nfs4_set_lock_state(state, request);
|
2006-06-30 03:38:34 +07:00
|
|
|
/* Unlock _before_ we do the RPC call */
|
|
|
|
request->fl_flags |= FL_EXISTS;
|
|
|
|
if (do_vfs_lock(request->fl_file, request) == -ENOENT)
|
|
|
|
goto out;
|
2005-06-23 00:16:32 +07:00
|
|
|
if (status != 0)
|
2006-06-30 03:38:34 +07:00
|
|
|
goto out;
|
|
|
|
/* Is this a delegated lock? */
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags))
|
|
|
|
goto out;
|
2005-06-23 00:16:32 +07:00
|
|
|
lsp = request->fl_u.nfs4_fl.owner;
|
2006-01-03 15:55:16 +07:00
|
|
|
seqid = nfs_alloc_seqid(&lsp->ls_seqid);
|
2006-06-30 03:38:34 +07:00
|
|
|
status = -ENOMEM;
|
2006-01-03 15:55:16 +07:00
|
|
|
if (seqid == NULL)
|
2006-06-30 03:38:34 +07:00
|
|
|
goto out;
|
2007-08-11 04:44:32 +07:00
|
|
|
task = nfs4_do_unlck(request, nfs_file_open_context(request->fl_file), lsp, seqid);
|
2006-01-03 15:55:17 +07:00
|
|
|
status = PTR_ERR(task);
|
|
|
|
if (IS_ERR(task))
|
2006-06-30 03:38:34 +07:00
|
|
|
goto out;
|
2006-01-03 15:55:17 +07:00
|
|
|
status = nfs4_wait_for_completion_rpc_task(task);
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2006-06-30 03:38:34 +07:00
|
|
|
out:
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2006-01-03 15:55:17 +07:00
|
|
|
struct nfs4_lockdata {
|
|
|
|
struct nfs_lock_args arg;
|
|
|
|
struct nfs_lock_res res;
|
|
|
|
struct nfs4_lock_state *lsp;
|
|
|
|
struct nfs_open_context *ctx;
|
|
|
|
struct file_lock fl;
|
2006-01-03 15:55:21 +07:00
|
|
|
unsigned long timestamp;
|
2006-01-03 15:55:17 +07:00
|
|
|
int rpc_status;
|
|
|
|
int cancelled;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct nfs4_lockdata *nfs4_alloc_lockdata(struct file_lock *fl,
|
|
|
|
struct nfs_open_context *ctx, struct nfs4_lock_state *lsp)
|
2005-04-17 05:20:36 +07:00
|
|
|
{
|
2006-01-03 15:55:17 +07:00
|
|
|
struct nfs4_lockdata *p;
|
|
|
|
struct inode *inode = lsp->ls_state->inode;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(inode);
|
2006-01-03 15:55:17 +07:00
|
|
|
|
|
|
|
p = kzalloc(sizeof(*p), GFP_KERNEL);
|
|
|
|
if (p == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
p->arg.fh = NFS_FH(inode);
|
|
|
|
p->arg.fl = &p->fl;
|
|
|
|
p->arg.lock_seqid = nfs_alloc_seqid(&lsp->ls_seqid);
|
|
|
|
if (p->arg.lock_seqid == NULL)
|
|
|
|
goto out_free;
|
|
|
|
p->arg.lock_stateid = &lsp->ls_stateid;
|
2006-08-23 07:06:09 +07:00
|
|
|
p->arg.lock_owner.clientid = server->nfs_client->cl_clientid;
|
2007-07-03 00:58:33 +07:00
|
|
|
p->arg.lock_owner.id = lsp->ls_id.id;
|
2006-01-03 15:55:17 +07:00
|
|
|
p->lsp = lsp;
|
|
|
|
atomic_inc(&lsp->ls_count);
|
|
|
|
p->ctx = get_nfs_open_context(ctx);
|
|
|
|
memcpy(&p->fl, fl, sizeof(p->fl));
|
|
|
|
return p;
|
|
|
|
out_free:
|
|
|
|
kfree(p);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_lock_prepare(struct rpc_task *task, void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_lockdata *data = calldata;
|
|
|
|
struct nfs4_state *state = data->lsp->ls_state;
|
|
|
|
struct nfs4_state_owner *sp = state->owner;
|
2005-04-17 05:20:36 +07:00
|
|
|
struct rpc_message msg = {
|
2006-01-03 15:55:17 +07:00
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_LOCK],
|
|
|
|
.rpc_argp = &data->arg,
|
|
|
|
.rpc_resp = &data->res,
|
|
|
|
.rpc_cred = sp->so_cred,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
2005-10-19 04:20:15 +07:00
|
|
|
|
2006-01-03 15:55:17 +07:00
|
|
|
if (nfs_wait_on_sequence(data->arg.lock_seqid, task) != 0)
|
|
|
|
return;
|
|
|
|
dprintk("%s: begin!\n", __FUNCTION__);
|
|
|
|
/* Do we need to do an open_to_lock_owner? */
|
|
|
|
if (!(data->arg.lock_seqid->sequence->flags & NFS_SEQID_CONFIRMED)) {
|
|
|
|
data->arg.open_seqid = nfs_alloc_seqid(&sp->so_seqid);
|
|
|
|
if (data->arg.open_seqid == NULL) {
|
|
|
|
data->rpc_status = -ENOMEM;
|
|
|
|
task->tk_action = NULL;
|
2005-10-19 04:20:15 +07:00
|
|
|
goto out;
|
2005-06-23 00:16:32 +07:00
|
|
|
}
|
2006-01-03 15:55:17 +07:00
|
|
|
data->arg.open_stateid = &state->stateid;
|
|
|
|
data->arg.new_lock_owner = 1;
|
|
|
|
}
|
2006-01-03 15:55:21 +07:00
|
|
|
data->timestamp = jiffies;
|
2006-01-03 15:55:17 +07:00
|
|
|
rpc_call_setup(task, &msg, 0);
|
2005-10-19 04:20:15 +07:00
|
|
|
out:
|
2006-01-03 15:55:17 +07:00
|
|
|
dprintk("%s: done!, ret = %d\n", __FUNCTION__, data->rpc_status);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_lock_done(struct rpc_task *task, void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_lockdata *data = calldata;
|
|
|
|
|
|
|
|
dprintk("%s: begin!\n", __FUNCTION__);
|
|
|
|
|
|
|
|
data->rpc_status = task->tk_status;
|
|
|
|
if (RPC_ASSASSINATED(task))
|
|
|
|
goto out;
|
|
|
|
if (data->arg.new_lock_owner != 0) {
|
|
|
|
nfs_increment_open_seqid(data->rpc_status, data->arg.open_seqid);
|
|
|
|
if (data->rpc_status == 0)
|
|
|
|
nfs_confirm_seqid(&data->lsp->ls_seqid, 0);
|
|
|
|
else
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (data->rpc_status == 0) {
|
|
|
|
memcpy(data->lsp->ls_stateid.data, data->res.stateid.data,
|
|
|
|
sizeof(data->lsp->ls_stateid.data));
|
|
|
|
data->lsp->ls_flags |= NFS_LOCK_INITIALIZED;
|
2007-06-05 21:42:27 +07:00
|
|
|
renew_lease(NFS_SERVER(data->ctx->path.dentry->d_inode), data->timestamp);
|
2006-01-03 15:55:17 +07:00
|
|
|
}
|
|
|
|
nfs_increment_lock_seqid(data->rpc_status, data->arg.lock_seqid);
|
|
|
|
out:
|
|
|
|
dprintk("%s: done, ret = %d!\n", __FUNCTION__, data->rpc_status);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void nfs4_lock_release(void *calldata)
|
|
|
|
{
|
|
|
|
struct nfs4_lockdata *data = calldata;
|
|
|
|
|
|
|
|
dprintk("%s: begin!\n", __FUNCTION__);
|
|
|
|
if (data->arg.open_seqid != NULL)
|
|
|
|
nfs_free_seqid(data->arg.open_seqid);
|
|
|
|
if (data->cancelled != 0) {
|
|
|
|
struct rpc_task *task;
|
|
|
|
task = nfs4_do_unlck(&data->fl, data->ctx, data->lsp,
|
|
|
|
data->arg.lock_seqid);
|
|
|
|
if (!IS_ERR(task))
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2006-01-03 15:55:17 +07:00
|
|
|
dprintk("%s: cancelling lock!\n", __FUNCTION__);
|
|
|
|
} else
|
|
|
|
nfs_free_seqid(data->arg.lock_seqid);
|
|
|
|
nfs4_put_lock_state(data->lsp);
|
|
|
|
put_nfs_open_context(data->ctx);
|
|
|
|
kfree(data);
|
|
|
|
dprintk("%s: done!\n", __FUNCTION__);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct rpc_call_ops nfs4_lock_ops = {
|
|
|
|
.rpc_call_prepare = nfs4_lock_prepare,
|
|
|
|
.rpc_call_done = nfs4_lock_done,
|
|
|
|
.rpc_release = nfs4_lock_release,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int _nfs4_do_setlk(struct nfs4_state *state, int cmd, struct file_lock *fl, int reclaim)
|
|
|
|
{
|
|
|
|
struct nfs4_lockdata *data;
|
|
|
|
struct rpc_task *task;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
dprintk("%s: begin!\n", __FUNCTION__);
|
2007-08-11 04:44:32 +07:00
|
|
|
data = nfs4_alloc_lockdata(fl, nfs_file_open_context(fl->fl_file),
|
2006-01-03 15:55:17 +07:00
|
|
|
fl->fl_u.nfs4_fl.owner);
|
|
|
|
if (data == NULL)
|
|
|
|
return -ENOMEM;
|
|
|
|
if (IS_SETLKW(cmd))
|
|
|
|
data->arg.block = 1;
|
|
|
|
if (reclaim != 0)
|
|
|
|
data->arg.reclaim = 1;
|
|
|
|
task = rpc_run_task(NFS_CLIENT(state->inode), RPC_TASK_ASYNC,
|
|
|
|
&nfs4_lock_ops, data);
|
2006-03-21 06:11:10 +07:00
|
|
|
if (IS_ERR(task))
|
2006-01-03 15:55:17 +07:00
|
|
|
return PTR_ERR(task);
|
|
|
|
ret = nfs4_wait_for_completion_rpc_task(task);
|
|
|
|
if (ret == 0) {
|
|
|
|
ret = data->rpc_status;
|
|
|
|
if (ret == -NFS4ERR_DENIED)
|
|
|
|
ret = -EAGAIN;
|
|
|
|
} else
|
|
|
|
data->cancelled = 1;
|
2006-11-12 10:18:03 +07:00
|
|
|
rpc_put_task(task);
|
2006-01-03 15:55:17 +07:00
|
|
|
dprintk("%s: done, ret = %d!\n", __FUNCTION__, ret);
|
|
|
|
return ret;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_lock_reclaim(struct nfs4_state *state, struct file_lock *request)
|
|
|
|
{
|
2005-06-23 00:16:29 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
2006-06-30 03:38:36 +07:00
|
|
|
/* Cache the lock if possible... */
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
|
|
|
|
return 0;
|
2005-06-23 00:16:29 +07:00
|
|
|
err = _nfs4_do_setlk(state, F_SETLK, request, 1);
|
|
|
|
if (err != -NFS4ERR_DELAY)
|
|
|
|
break;
|
|
|
|
nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_lock_expired(struct nfs4_state *state, struct file_lock *request)
|
|
|
|
{
|
2005-06-23 00:16:29 +07:00
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
2005-11-05 03:39:36 +07:00
|
|
|
err = nfs4_set_lock_state(state, request);
|
|
|
|
if (err != 0)
|
|
|
|
return err;
|
2005-06-23 00:16:29 +07:00
|
|
|
do {
|
2006-06-30 03:38:36 +07:00
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags) != 0)
|
|
|
|
return 0;
|
2005-06-23 00:16:29 +07:00
|
|
|
err = _nfs4_do_setlk(state, F_SETLK, request, 0);
|
|
|
|
if (err != -NFS4ERR_DELAY)
|
|
|
|
break;
|
|
|
|
nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
2005-04-17 05:20:36 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int _nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
|
|
|
|
{
|
2006-08-23 07:06:08 +07:00
|
|
|
struct nfs_client *clp = state->owner->so_client;
|
2006-06-30 03:38:39 +07:00
|
|
|
unsigned char fl_flags = request->fl_flags;
|
2005-04-17 05:20:36 +07:00
|
|
|
int status;
|
|
|
|
|
2005-11-05 03:39:36 +07:00
|
|
|
/* Is this a delegated open? */
|
|
|
|
status = nfs4_set_lock_state(state, request);
|
|
|
|
if (status != 0)
|
|
|
|
goto out;
|
2006-06-30 03:38:39 +07:00
|
|
|
request->fl_flags |= FL_ACCESS;
|
|
|
|
status = do_vfs_lock(request->fl_file, request);
|
|
|
|
if (status < 0)
|
|
|
|
goto out;
|
|
|
|
down_read(&clp->cl_sem);
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
|
|
|
|
struct nfs_inode *nfsi = NFS_I(state->inode);
|
|
|
|
/* Yes: cache locks! */
|
|
|
|
down_read(&nfsi->rwsem);
|
|
|
|
/* ...but avoid races with delegation recall... */
|
|
|
|
if (test_bit(NFS_DELEGATED_STATE, &state->flags)) {
|
|
|
|
request->fl_flags = fl_flags & ~FL_SLEEP;
|
|
|
|
status = do_vfs_lock(request->fl_file, request);
|
|
|
|
up_read(&nfsi->rwsem);
|
|
|
|
goto out_unlock;
|
|
|
|
}
|
|
|
|
up_read(&nfsi->rwsem);
|
|
|
|
}
|
2005-11-05 03:39:36 +07:00
|
|
|
status = _nfs4_do_setlk(state, cmd, request, 0);
|
|
|
|
if (status != 0)
|
2006-06-30 03:38:39 +07:00
|
|
|
goto out_unlock;
|
2005-11-05 03:39:36 +07:00
|
|
|
/* Note: we always want to sleep here! */
|
2006-06-30 03:38:39 +07:00
|
|
|
request->fl_flags = fl_flags | FL_SLEEP;
|
2005-11-05 03:39:36 +07:00
|
|
|
if (do_vfs_lock(request->fl_file, request) < 0)
|
|
|
|
printk(KERN_WARNING "%s: VFS is out of sync with lock manager!\n", __FUNCTION__);
|
2006-06-30 03:38:39 +07:00
|
|
|
out_unlock:
|
2005-04-17 05:20:36 +07:00
|
|
|
up_read(&clp->cl_sem);
|
2006-06-30 03:38:39 +07:00
|
|
|
out:
|
|
|
|
request->fl_flags = fl_flags;
|
2005-04-17 05:20:36 +07:00
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int nfs4_proc_setlk(struct nfs4_state *state, int cmd, struct file_lock *request)
|
|
|
|
{
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
do {
|
|
|
|
err = nfs4_handle_exception(NFS_SERVER(state->inode),
|
|
|
|
_nfs4_proc_setlk(state, cmd, request),
|
|
|
|
&exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
nfs4_proc_lock(struct file *filp, int cmd, struct file_lock *request)
|
|
|
|
{
|
|
|
|
struct nfs_open_context *ctx;
|
|
|
|
struct nfs4_state *state;
|
|
|
|
unsigned long timeout = NFS4_LOCK_MINTIMEOUT;
|
|
|
|
int status;
|
|
|
|
|
|
|
|
/* verify open state */
|
2007-08-11 04:44:32 +07:00
|
|
|
ctx = nfs_file_open_context(filp);
|
2005-04-17 05:20:36 +07:00
|
|
|
state = ctx->state;
|
|
|
|
|
|
|
|
if (request->fl_start < 0 || request->fl_end < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (IS_GETLK(cmd))
|
|
|
|
return nfs4_proc_getlk(state, F_GETLK, request);
|
|
|
|
|
|
|
|
if (!(IS_SETLK(cmd) || IS_SETLKW(cmd)))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (request->fl_type == F_UNLCK)
|
|
|
|
return nfs4_proc_unlck(state, cmd, request);
|
|
|
|
|
|
|
|
do {
|
|
|
|
status = nfs4_proc_setlk(state, cmd, request);
|
|
|
|
if ((status != -EAGAIN) || IS_SETLK(cmd))
|
|
|
|
break;
|
|
|
|
timeout = nfs4_set_lock_task_retry(timeout);
|
|
|
|
status = -ERESTARTSYS;
|
|
|
|
if (signalled())
|
|
|
|
break;
|
|
|
|
} while(status < 0);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2005-11-05 03:38:11 +07:00
|
|
|
int nfs4_lock_delegation_recall(struct nfs4_state *state, struct file_lock *fl)
|
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(state->inode);
|
|
|
|
struct nfs4_exception exception = { };
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = nfs4_set_lock_state(state, fl);
|
|
|
|
if (err != 0)
|
|
|
|
goto out;
|
|
|
|
do {
|
|
|
|
err = _nfs4_do_setlk(state, F_SETLK, fl, 0);
|
|
|
|
if (err != -NFS4ERR_DELAY)
|
|
|
|
break;
|
|
|
|
err = nfs4_handle_exception(server, err, &exception);
|
|
|
|
} while (exception.retry);
|
|
|
|
out:
|
|
|
|
return err;
|
|
|
|
}
|
2005-06-23 00:16:22 +07:00
|
|
|
|
2005-06-23 00:16:22 +07:00
|
|
|
#define XATTR_NAME_NFSV4_ACL "system.nfs4_acl"
|
|
|
|
|
2005-06-23 00:16:22 +07:00
|
|
|
int nfs4_setxattr(struct dentry *dentry, const char *key, const void *buf,
|
|
|
|
size_t buflen, int flags)
|
|
|
|
{
|
2005-06-23 00:16:23 +07:00
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
|
|
|
|
if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
if (!S_ISREG(inode->i_mode) &&
|
|
|
|
(!S_ISDIR(inode->i_mode) || inode->i_mode & S_ISVTX))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
return nfs4_proc_set_acl(inode, buf, buflen);
|
2005-06-23 00:16:22 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* The getxattr man page suggests returning -ENODATA for unknown attributes,
|
|
|
|
* and that's what we'll do for e.g. user attributes that haven't been set.
|
|
|
|
* But we'll follow ext2/ext3's lead by returning -EOPNOTSUPP for unsupported
|
|
|
|
* attributes in kernel-managed attribute namespaces. */
|
|
|
|
ssize_t nfs4_getxattr(struct dentry *dentry, const char *key, void *buf,
|
|
|
|
size_t buflen)
|
|
|
|
{
|
2005-06-23 00:16:22 +07:00
|
|
|
struct inode *inode = dentry->d_inode;
|
|
|
|
|
|
|
|
if (strcmp(key, XATTR_NAME_NFSV4_ACL) != 0)
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
|
|
|
return nfs4_proc_get_acl(inode, buf, buflen);
|
2005-06-23 00:16:22 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t nfs4_listxattr(struct dentry *dentry, char *buf, size_t buflen)
|
|
|
|
{
|
2005-06-23 00:16:22 +07:00
|
|
|
size_t len = strlen(XATTR_NAME_NFSV4_ACL) + 1;
|
2005-06-23 00:16:22 +07:00
|
|
|
|
2006-03-21 11:23:42 +07:00
|
|
|
if (!nfs4_server_supports_acls(NFS_SERVER(dentry->d_inode)))
|
|
|
|
return 0;
|
2005-06-23 00:16:22 +07:00
|
|
|
if (buf && buflen < len)
|
|
|
|
return -ERANGE;
|
|
|
|
if (buf)
|
2005-06-23 00:16:22 +07:00
|
|
|
memcpy(buf, XATTR_NAME_NFSV4_ACL, len);
|
|
|
|
return len;
|
2005-06-23 00:16:22 +07:00
|
|
|
}
|
|
|
|
|
2007-07-18 08:52:39 +07:00
|
|
|
int nfs4_proc_fs_locations(struct inode *dir, const struct qstr *name,
|
2006-06-09 20:34:23 +07:00
|
|
|
struct nfs4_fs_locations *fs_locations, struct page *page)
|
2006-06-09 20:34:22 +07:00
|
|
|
{
|
|
|
|
struct nfs_server *server = NFS_SERVER(dir);
|
|
|
|
u32 bitmask[2] = {
|
2006-06-09 20:34:24 +07:00
|
|
|
[0] = FATTR4_WORD0_FSID | FATTR4_WORD0_FS_LOCATIONS,
|
|
|
|
[1] = FATTR4_WORD1_MOUNTED_ON_FILEID,
|
2006-06-09 20:34:22 +07:00
|
|
|
};
|
|
|
|
struct nfs4_fs_locations_arg args = {
|
|
|
|
.dir_fh = NFS_FH(dir),
|
2007-01-13 14:28:11 +07:00
|
|
|
.name = name,
|
2006-06-09 20:34:22 +07:00
|
|
|
.page = page,
|
|
|
|
.bitmask = bitmask,
|
|
|
|
};
|
|
|
|
struct rpc_message msg = {
|
|
|
|
.rpc_proc = &nfs4_procedures[NFSPROC4_CLNT_FS_LOCATIONS],
|
|
|
|
.rpc_argp = &args,
|
2006-06-09 20:34:23 +07:00
|
|
|
.rpc_resp = fs_locations,
|
2006-06-09 20:34:22 +07:00
|
|
|
};
|
|
|
|
int status;
|
|
|
|
|
|
|
|
dprintk("%s: start\n", __FUNCTION__);
|
2007-01-13 14:28:11 +07:00
|
|
|
nfs_fattr_init(&fs_locations->fattr);
|
2006-06-09 20:34:22 +07:00
|
|
|
fs_locations->server = server;
|
2006-06-09 20:34:25 +07:00
|
|
|
fs_locations->nlocations = 0;
|
2006-06-09 20:34:22 +07:00
|
|
|
status = rpc_call_sync(server->client, &msg, 0);
|
|
|
|
dprintk("%s: returned status = %d\n", __FUNCTION__, status);
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2005-04-17 05:20:36 +07:00
|
|
|
struct nfs4_state_recovery_ops nfs4_reboot_recovery_ops = {
|
|
|
|
.recover_open = nfs4_open_reclaim,
|
|
|
|
.recover_lock = nfs4_lock_reclaim,
|
|
|
|
};
|
|
|
|
|
|
|
|
struct nfs4_state_recovery_ops nfs4_network_partition_recovery_ops = {
|
|
|
|
.recover_open = nfs4_open_expired,
|
|
|
|
.recover_lock = nfs4_lock_expired,
|
|
|
|
};
|
|
|
|
|
2007-02-12 15:55:39 +07:00
|
|
|
static const struct inode_operations nfs4_file_inode_operations = {
|
2005-06-23 00:16:22 +07:00
|
|
|
.permission = nfs_permission,
|
|
|
|
.getattr = nfs_getattr,
|
|
|
|
.setattr = nfs_setattr,
|
|
|
|
.getxattr = nfs4_getxattr,
|
|
|
|
.setxattr = nfs4_setxattr,
|
|
|
|
.listxattr = nfs4_listxattr,
|
|
|
|
};
|
|
|
|
|
2006-08-23 07:06:11 +07:00
|
|
|
const struct nfs_rpc_ops nfs_v4_clientops = {
|
2005-04-17 05:20:36 +07:00
|
|
|
.version = 4, /* protocol version */
|
|
|
|
.dentry_ops = &nfs4_dentry_operations,
|
|
|
|
.dir_inode_ops = &nfs4_dir_inode_operations,
|
2005-06-23 00:16:22 +07:00
|
|
|
.file_inode_ops = &nfs4_file_inode_operations,
|
2005-04-17 05:20:36 +07:00
|
|
|
.getroot = nfs4_proc_get_root,
|
|
|
|
.getattr = nfs4_proc_getattr,
|
|
|
|
.setattr = nfs4_proc_setattr,
|
2006-08-23 07:06:09 +07:00
|
|
|
.lookupfh = nfs4_proc_lookupfh,
|
2005-04-17 05:20:36 +07:00
|
|
|
.lookup = nfs4_proc_lookup,
|
|
|
|
.access = nfs4_proc_access,
|
|
|
|
.readlink = nfs4_proc_readlink,
|
|
|
|
.create = nfs4_proc_create,
|
|
|
|
.remove = nfs4_proc_remove,
|
|
|
|
.unlink_setup = nfs4_proc_unlink_setup,
|
|
|
|
.unlink_done = nfs4_proc_unlink_done,
|
|
|
|
.rename = nfs4_proc_rename,
|
|
|
|
.link = nfs4_proc_link,
|
|
|
|
.symlink = nfs4_proc_symlink,
|
|
|
|
.mkdir = nfs4_proc_mkdir,
|
|
|
|
.rmdir = nfs4_proc_remove,
|
|
|
|
.readdir = nfs4_proc_readdir,
|
|
|
|
.mknod = nfs4_proc_mknod,
|
|
|
|
.statfs = nfs4_proc_statfs,
|
|
|
|
.fsinfo = nfs4_proc_fsinfo,
|
|
|
|
.pathconf = nfs4_proc_pathconf,
|
2006-08-23 07:06:10 +07:00
|
|
|
.set_capabilities = nfs4_server_capabilities,
|
2005-04-17 05:20:36 +07:00
|
|
|
.decode_dirent = nfs4_decode_dirent,
|
|
|
|
.read_setup = nfs4_proc_read_setup,
|
2006-03-21 01:44:27 +07:00
|
|
|
.read_done = nfs4_read_done,
|
2005-04-17 05:20:36 +07:00
|
|
|
.write_setup = nfs4_proc_write_setup,
|
2006-03-21 01:44:27 +07:00
|
|
|
.write_done = nfs4_write_done,
|
2005-04-17 05:20:36 +07:00
|
|
|
.commit_setup = nfs4_proc_commit_setup,
|
2006-03-21 01:44:27 +07:00
|
|
|
.commit_done = nfs4_commit_done,
|
2005-10-19 04:20:17 +07:00
|
|
|
.file_open = nfs_open,
|
|
|
|
.file_release = nfs_release,
|
2005-04-17 05:20:36 +07:00
|
|
|
.lock = nfs4_proc_lock,
|
2005-06-23 00:16:23 +07:00
|
|
|
.clear_acl_cache = nfs4_zap_acl_attr,
|
2005-04-17 05:20:36 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Local variables:
|
|
|
|
* c-basic-offset: 8
|
|
|
|
* End:
|
|
|
|
*/
|