diff options
Diffstat (limited to 'fs')
| -rw-r--r-- | fs/lockd/clntlock.c | 2 | ||||
| -rw-r--r-- | fs/lockd/host.c | 4 | ||||
| -rw-r--r-- | fs/lockd/mon.c | 2 | ||||
| -rw-r--r-- | fs/lockd/svcsubs.c | 2 | ||||
| -rw-r--r-- | fs/nfsd/export.c | 2 | ||||
| -rw-r--r-- | fs/nfsd/nfs3xdr.c | 75 | ||||
| -rw-r--r-- | fs/nfsd/nfs4acl.c | 4 | ||||
| -rw-r--r-- | fs/nfsd/nfs4callback.c | 263 | ||||
| -rw-r--r-- | fs/nfsd/nfs4proc.c | 89 | ||||
| -rw-r--r-- | fs/nfsd/nfs4state.c | 681 | ||||
| -rw-r--r-- | fs/nfsd/nfs4xdr.c | 42 | ||||
| -rw-r--r-- | fs/nfsd/nfsctl.c | 8 | ||||
| -rw-r--r-- | fs/nfsd/nfsfh.c | 158 | ||||
| -rw-r--r-- | fs/nfsd/nfssvc.c | 54 | ||||
| -rw-r--r-- | fs/nfsd/vfs.c | 9 |
15 files changed, 783 insertions, 612 deletions
diff --git a/fs/lockd/clntlock.c b/fs/lockd/clntlock.c index 1f3b0fc0d351..fc9032dc8862 100644 --- a/fs/lockd/clntlock.c +++ b/fs/lockd/clntlock.c | |||
| @@ -166,7 +166,7 @@ __be32 nlmclnt_grant(const struct sockaddr *addr, const struct nlm_lock *lock) | |||
| 166 | */ | 166 | */ |
| 167 | if (fl_blocked->fl_u.nfs_fl.owner->pid != lock->svid) | 167 | if (fl_blocked->fl_u.nfs_fl.owner->pid != lock->svid) |
| 168 | continue; | 168 | continue; |
| 169 | if (!nlm_cmp_addr(nlm_addr(block->b_host), addr)) | 169 | if (!rpc_cmp_addr(nlm_addr(block->b_host), addr)) |
| 170 | continue; | 170 | continue; |
| 171 | if (nfs_compare_fh(NFS_FH(fl_blocked->fl_file->f_path.dentry->d_inode) ,fh) != 0) | 171 | if (nfs_compare_fh(NFS_FH(fl_blocked->fl_file->f_path.dentry->d_inode) ,fh) != 0) |
| 172 | continue; | 172 | continue; |
diff --git a/fs/lockd/host.c b/fs/lockd/host.c index 7cb076ac6b45..4600c2037b8b 100644 --- a/fs/lockd/host.c +++ b/fs/lockd/host.c | |||
| @@ -111,7 +111,7 @@ static struct nlm_host *nlm_lookup_host(struct nlm_lookup_host_info *ni) | |||
| 111 | */ | 111 | */ |
| 112 | chain = &nlm_hosts[nlm_hash_address(ni->sap)]; | 112 | chain = &nlm_hosts[nlm_hash_address(ni->sap)]; |
| 113 | hlist_for_each_entry(host, pos, chain, h_hash) { | 113 | hlist_for_each_entry(host, pos, chain, h_hash) { |
| 114 | if (!nlm_cmp_addr(nlm_addr(host), ni->sap)) | 114 | if (!rpc_cmp_addr(nlm_addr(host), ni->sap)) |
| 115 | continue; | 115 | continue; |
| 116 | 116 | ||
| 117 | /* See if we have an NSM handle for this client */ | 117 | /* See if we have an NSM handle for this client */ |
| @@ -125,7 +125,7 @@ static struct nlm_host *nlm_lookup_host(struct nlm_lookup_host_info *ni) | |||
| 125 | if (host->h_server != ni->server) | 125 | if (host->h_server != ni->server) |
| 126 | continue; | 126 | continue; |
| 127 | if (ni->server && | 127 | if (ni->server && |
| 128 | !nlm_cmp_addr(nlm_srcaddr(host), ni->src_sap)) | 128 | !rpc_cmp_addr(nlm_srcaddr(host), ni->src_sap)) |
| 129 | continue; | 129 | continue; |
| 130 | 130 | ||
| 131 | /* Move to head of hash chain. */ | 131 | /* Move to head of hash chain. */ |
diff --git a/fs/lockd/mon.c b/fs/lockd/mon.c index 30c933188dd7..f956651d0f65 100644 --- a/fs/lockd/mon.c +++ b/fs/lockd/mon.c | |||
| @@ -209,7 +209,7 @@ static struct nsm_handle *nsm_lookup_addr(const struct sockaddr *sap) | |||
| 209 | struct nsm_handle *nsm; | 209 | struct nsm_handle *nsm; |
| 210 | 210 | ||
| 211 | list_for_each_entry(nsm, &nsm_handles, sm_link) | 211 | list_for_each_entry(nsm, &nsm_handles, sm_link) |
| 212 | if (nlm_cmp_addr(nsm_addr(nsm), sap)) | 212 | if (rpc_cmp_addr(nsm_addr(nsm), sap)) |
| 213 | return nsm; | 213 | return nsm; |
| 214 | return NULL; | 214 | return NULL; |
| 215 | } | 215 | } |
diff --git a/fs/lockd/svcsubs.c b/fs/lockd/svcsubs.c index 9e4d6aab611b..ad478da7ca63 100644 --- a/fs/lockd/svcsubs.c +++ b/fs/lockd/svcsubs.c | |||
| @@ -417,7 +417,7 @@ EXPORT_SYMBOL_GPL(nlmsvc_unlock_all_by_sb); | |||
| 417 | static int | 417 | static int |
| 418 | nlmsvc_match_ip(void *datap, struct nlm_host *host) | 418 | nlmsvc_match_ip(void *datap, struct nlm_host *host) |
| 419 | { | 419 | { |
| 420 | return nlm_cmp_addr(nlm_srcaddr(host), datap); | 420 | return rpc_cmp_addr(nlm_srcaddr(host), datap); |
| 421 | } | 421 | } |
| 422 | 422 | ||
| 423 | /** | 423 | /** |
diff --git a/fs/nfsd/export.c b/fs/nfsd/export.c index d9462643155c..984a5ebcc1d6 100644 --- a/fs/nfsd/export.c +++ b/fs/nfsd/export.c | |||
| @@ -1341,6 +1341,8 @@ exp_pseudoroot(struct svc_rqst *rqstp, struct svc_fh *fhp) | |||
| 1341 | if (rv) | 1341 | if (rv) |
| 1342 | goto out; | 1342 | goto out; |
| 1343 | rv = check_nfsd_access(exp, rqstp); | 1343 | rv = check_nfsd_access(exp, rqstp); |
| 1344 | if (rv) | ||
| 1345 | fh_put(fhp); | ||
| 1344 | out: | 1346 | out: |
| 1345 | exp_put(exp); | 1347 | exp_put(exp); |
| 1346 | return rv; | 1348 | return rv; |
diff --git a/fs/nfsd/nfs3xdr.c b/fs/nfsd/nfs3xdr.c index 01d4ec1c88e0..edf926e1062f 100644 --- a/fs/nfsd/nfs3xdr.c +++ b/fs/nfsd/nfs3xdr.c | |||
| @@ -814,17 +814,6 @@ encode_entry_baggage(struct nfsd3_readdirres *cd, __be32 *p, const char *name, | |||
| 814 | return p; | 814 | return p; |
| 815 | } | 815 | } |
| 816 | 816 | ||
| 817 | static __be32 * | ||
| 818 | encode_entryplus_baggage(struct nfsd3_readdirres *cd, __be32 *p, | ||
| 819 | struct svc_fh *fhp) | ||
| 820 | { | ||
| 821 | p = encode_post_op_attr(cd->rqstp, p, fhp); | ||
| 822 | *p++ = xdr_one; /* yes, a file handle follows */ | ||
| 823 | p = encode_fh(p, fhp); | ||
| 824 | fh_put(fhp); | ||
| 825 | return p; | ||
| 826 | } | ||
| 827 | |||
| 828 | static int | 817 | static int |
| 829 | compose_entry_fh(struct nfsd3_readdirres *cd, struct svc_fh *fhp, | 818 | compose_entry_fh(struct nfsd3_readdirres *cd, struct svc_fh *fhp, |
| 830 | const char *name, int namlen) | 819 | const char *name, int namlen) |
| @@ -836,29 +825,54 @@ compose_entry_fh(struct nfsd3_readdirres *cd, struct svc_fh *fhp, | |||
| 836 | dparent = cd->fh.fh_dentry; | 825 | dparent = cd->fh.fh_dentry; |
| 837 | exp = cd->fh.fh_export; | 826 | exp = cd->fh.fh_export; |
| 838 | 827 | ||
| 839 | fh_init(fhp, NFS3_FHSIZE); | ||
| 840 | if (isdotent(name, namlen)) { | 828 | if (isdotent(name, namlen)) { |
| 841 | if (namlen == 2) { | 829 | if (namlen == 2) { |
| 842 | dchild = dget_parent(dparent); | 830 | dchild = dget_parent(dparent); |
| 843 | if (dchild == dparent) { | 831 | if (dchild == dparent) { |
| 844 | /* filesystem root - cannot return filehandle for ".." */ | 832 | /* filesystem root - cannot return filehandle for ".." */ |
| 845 | dput(dchild); | 833 | dput(dchild); |
| 846 | return 1; | 834 | return -ENOENT; |
| 847 | } | 835 | } |
| 848 | } else | 836 | } else |
| 849 | dchild = dget(dparent); | 837 | dchild = dget(dparent); |
| 850 | } else | 838 | } else |
| 851 | dchild = lookup_one_len(name, dparent, namlen); | 839 | dchild = lookup_one_len(name, dparent, namlen); |
| 852 | if (IS_ERR(dchild)) | 840 | if (IS_ERR(dchild)) |
| 853 | return 1; | 841 | return -ENOENT; |
| 854 | if (d_mountpoint(dchild) || | 842 | rv = -ENOENT; |
| 855 | fh_compose(fhp, exp, dchild, &cd->fh) != 0 || | 843 | if (d_mountpoint(dchild)) |
| 856 | !dchild->d_inode) | 844 | goto out; |
| 857 | rv = 1; | 845 | rv = fh_compose(fhp, exp, dchild, &cd->fh); |
| 846 | if (rv) | ||
| 847 | goto out; | ||
| 848 | if (!dchild->d_inode) | ||
| 849 | goto out; | ||
| 850 | rv = 0; | ||
| 851 | out: | ||
| 858 | dput(dchild); | 852 | dput(dchild); |
| 859 | return rv; | 853 | return rv; |
| 860 | } | 854 | } |
| 861 | 855 | ||
| 856 | __be32 *encode_entryplus_baggage(struct nfsd3_readdirres *cd, __be32 *p, const char *name, int namlen) | ||
| 857 | { | ||
| 858 | struct svc_fh fh; | ||
| 859 | int err; | ||
| 860 | |||
| 861 | fh_init(&fh, NFS3_FHSIZE); | ||
| 862 | err = compose_entry_fh(cd, &fh, name, namlen); | ||
| 863 | if (err) { | ||
| 864 | *p++ = 0; | ||
| 865 | *p++ = 0; | ||
| 866 | goto out; | ||
| 867 | } | ||
| 868 | p = encode_post_op_attr(cd->rqstp, p, &fh); | ||
| 869 | *p++ = xdr_one; /* yes, a file handle follows */ | ||
| 870 | p = encode_fh(p, &fh); | ||
| 871 | out: | ||
| 872 | fh_put(&fh); | ||
| 873 | return p; | ||
| 874 | } | ||
| 875 | |||
| 862 | /* | 876 | /* |
| 863 | * Encode a directory entry. This one works for both normal readdir | 877 | * Encode a directory entry. This one works for both normal readdir |
| 864 | * and readdirplus. | 878 | * and readdirplus. |
| @@ -929,16 +943,8 @@ encode_entry(struct readdir_cd *ccd, const char *name, int namlen, | |||
| 929 | 943 | ||
| 930 | p = encode_entry_baggage(cd, p, name, namlen, ino); | 944 | p = encode_entry_baggage(cd, p, name, namlen, ino); |
| 931 | 945 | ||
| 932 | /* throw in readdirplus baggage */ | 946 | if (plus) |
| 933 | if (plus) { | 947 | p = encode_entryplus_baggage(cd, p, name, namlen); |
| 934 | struct svc_fh fh; | ||
| 935 | |||
| 936 | if (compose_entry_fh(cd, &fh, name, namlen) > 0) { | ||
| 937 | *p++ = 0; | ||
| 938 | *p++ = 0; | ||
| 939 | } else | ||
| 940 | p = encode_entryplus_baggage(cd, p, &fh); | ||
| 941 | } | ||
| 942 | num_entry_words = p - cd->buffer; | 948 | num_entry_words = p - cd->buffer; |
| 943 | } else if (cd->rqstp->rq_respages[pn+1] != NULL) { | 949 | } else if (cd->rqstp->rq_respages[pn+1] != NULL) { |
| 944 | /* temporarily encode entry into next page, then move back to | 950 | /* temporarily encode entry into next page, then move back to |
| @@ -951,17 +957,8 @@ encode_entry(struct readdir_cd *ccd, const char *name, int namlen, | |||
| 951 | 957 | ||
| 952 | p1 = encode_entry_baggage(cd, p1, name, namlen, ino); | 958 | p1 = encode_entry_baggage(cd, p1, name, namlen, ino); |
| 953 | 959 | ||
| 954 | /* throw in readdirplus baggage */ | 960 | if (plus) |
| 955 | if (plus) { | 961 | p = encode_entryplus_baggage(cd, p1, name, namlen); |
| 956 | struct svc_fh fh; | ||
| 957 | |||
| 958 | if (compose_entry_fh(cd, &fh, name, namlen) > 0) { | ||
| 959 | /* zero out the filehandle */ | ||
| 960 | *p1++ = 0; | ||
| 961 | *p1++ = 0; | ||
| 962 | } else | ||
| 963 | p1 = encode_entryplus_baggage(cd, p1, &fh); | ||
| 964 | } | ||
| 965 | 962 | ||
| 966 | /* determine entry word length and lengths to go in pages */ | 963 | /* determine entry word length and lengths to go in pages */ |
| 967 | num_entry_words = p1 - tmp; | 964 | num_entry_words = p1 - tmp; |
diff --git a/fs/nfsd/nfs4acl.c b/fs/nfsd/nfs4acl.c index 54b8b4140c8f..725d02f210e2 100644 --- a/fs/nfsd/nfs4acl.c +++ b/fs/nfsd/nfs4acl.c | |||
| @@ -321,7 +321,7 @@ _posix_to_nfsv4_one(struct posix_acl *pacl, struct nfs4_acl *acl, | |||
| 321 | deny = ~pas.group & pas.other; | 321 | deny = ~pas.group & pas.other; |
| 322 | if (deny) { | 322 | if (deny) { |
| 323 | ace->type = NFS4_ACE_ACCESS_DENIED_ACE_TYPE; | 323 | ace->type = NFS4_ACE_ACCESS_DENIED_ACE_TYPE; |
| 324 | ace->flag = eflag | NFS4_ACE_IDENTIFIER_GROUP; | 324 | ace->flag = eflag; |
| 325 | ace->access_mask = deny_mask_from_posix(deny, flags); | 325 | ace->access_mask = deny_mask_from_posix(deny, flags); |
| 326 | ace->whotype = NFS4_ACL_WHO_GROUP; | 326 | ace->whotype = NFS4_ACL_WHO_GROUP; |
| 327 | ace++; | 327 | ace++; |
| @@ -335,7 +335,7 @@ _posix_to_nfsv4_one(struct posix_acl *pacl, struct nfs4_acl *acl, | |||
| 335 | if (deny) { | 335 | if (deny) { |
| 336 | ace->type = NFS4_ACE_ACCESS_DENIED_ACE_TYPE; | 336 | ace->type = NFS4_ACE_ACCESS_DENIED_ACE_TYPE; |
| 337 | ace->flag = eflag | NFS4_ACE_IDENTIFIER_GROUP; | 337 | ace->flag = eflag | NFS4_ACE_IDENTIFIER_GROUP; |
| 338 | ace->access_mask = mask_from_posix(deny, flags); | 338 | ace->access_mask = deny_mask_from_posix(deny, flags); |
| 339 | ace->whotype = NFS4_ACL_WHO_NAMED; | 339 | ace->whotype = NFS4_ACL_WHO_NAMED; |
| 340 | ace->who = pa->e_id; | 340 | ace->who = pa->e_id; |
| 341 | ace++; | 341 | ace++; |
diff --git a/fs/nfsd/nfs4callback.c b/fs/nfsd/nfs4callback.c index 3fd23f7aceca..24e8d78f8dde 100644 --- a/fs/nfsd/nfs4callback.c +++ b/fs/nfsd/nfs4callback.c | |||
| @@ -43,25 +43,30 @@ | |||
| 43 | #include <linux/sunrpc/xdr.h> | 43 | #include <linux/sunrpc/xdr.h> |
| 44 | #include <linux/sunrpc/svc.h> | 44 | #include <linux/sunrpc/svc.h> |
| 45 | #include <linux/sunrpc/clnt.h> | 45 | #include <linux/sunrpc/clnt.h> |
| 46 | #include <linux/sunrpc/svcsock.h> | ||
| 46 | #include <linux/nfsd/nfsd.h> | 47 | #include <linux/nfsd/nfsd.h> |
| 47 | #include <linux/nfsd/state.h> | 48 | #include <linux/nfsd/state.h> |
| 48 | #include <linux/sunrpc/sched.h> | 49 | #include <linux/sunrpc/sched.h> |
| 49 | #include <linux/nfs4.h> | 50 | #include <linux/nfs4.h> |
| 51 | #include <linux/sunrpc/xprtsock.h> | ||
| 50 | 52 | ||
| 51 | #define NFSDDBG_FACILITY NFSDDBG_PROC | 53 | #define NFSDDBG_FACILITY NFSDDBG_PROC |
| 52 | 54 | ||
| 53 | #define NFSPROC4_CB_NULL 0 | 55 | #define NFSPROC4_CB_NULL 0 |
| 54 | #define NFSPROC4_CB_COMPOUND 1 | 56 | #define NFSPROC4_CB_COMPOUND 1 |
| 57 | #define NFS4_STATEID_SIZE 16 | ||
| 55 | 58 | ||
| 56 | /* Index of predefined Linux callback client operations */ | 59 | /* Index of predefined Linux callback client operations */ |
| 57 | 60 | ||
| 58 | enum { | 61 | enum { |
| 59 | NFSPROC4_CLNT_CB_NULL = 0, | 62 | NFSPROC4_CLNT_CB_NULL = 0, |
| 60 | NFSPROC4_CLNT_CB_RECALL, | 63 | NFSPROC4_CLNT_CB_RECALL, |
| 64 | NFSPROC4_CLNT_CB_SEQUENCE, | ||
| 61 | }; | 65 | }; |
| 62 | 66 | ||
| 63 | enum nfs_cb_opnum4 { | 67 | enum nfs_cb_opnum4 { |
| 64 | OP_CB_RECALL = 4, | 68 | OP_CB_RECALL = 4, |
| 69 | OP_CB_SEQUENCE = 11, | ||
| 65 | }; | 70 | }; |
| 66 | 71 | ||
| 67 | #define NFS4_MAXTAGLEN 20 | 72 | #define NFS4_MAXTAGLEN 20 |
| @@ -70,17 +75,29 @@ enum nfs_cb_opnum4 { | |||
| 70 | #define NFS4_dec_cb_null_sz 0 | 75 | #define NFS4_dec_cb_null_sz 0 |
| 71 | #define cb_compound_enc_hdr_sz 4 | 76 | #define cb_compound_enc_hdr_sz 4 |
| 72 | #define cb_compound_dec_hdr_sz (3 + (NFS4_MAXTAGLEN >> 2)) | 77 | #define cb_compound_dec_hdr_sz (3 + (NFS4_MAXTAGLEN >> 2)) |
| 78 | #define sessionid_sz (NFS4_MAX_SESSIONID_LEN >> 2) | ||
| 79 | #define cb_sequence_enc_sz (sessionid_sz + 4 + \ | ||
| 80 | 1 /* no referring calls list yet */) | ||
| 81 | #define cb_sequence_dec_sz (op_dec_sz + sessionid_sz + 4) | ||
| 82 | |||
| 73 | #define op_enc_sz 1 | 83 | #define op_enc_sz 1 |
| 74 | #define op_dec_sz 2 | 84 | #define op_dec_sz 2 |
| 75 | #define enc_nfs4_fh_sz (1 + (NFS4_FHSIZE >> 2)) | 85 | #define enc_nfs4_fh_sz (1 + (NFS4_FHSIZE >> 2)) |
| 76 | #define enc_stateid_sz (NFS4_STATEID_SIZE >> 2) | 86 | #define enc_stateid_sz (NFS4_STATEID_SIZE >> 2) |
| 77 | #define NFS4_enc_cb_recall_sz (cb_compound_enc_hdr_sz + \ | 87 | #define NFS4_enc_cb_recall_sz (cb_compound_enc_hdr_sz + \ |
| 88 | cb_sequence_enc_sz + \ | ||
| 78 | 1 + enc_stateid_sz + \ | 89 | 1 + enc_stateid_sz + \ |
| 79 | enc_nfs4_fh_sz) | 90 | enc_nfs4_fh_sz) |
| 80 | 91 | ||
| 81 | #define NFS4_dec_cb_recall_sz (cb_compound_dec_hdr_sz + \ | 92 | #define NFS4_dec_cb_recall_sz (cb_compound_dec_hdr_sz + \ |
| 93 | cb_sequence_dec_sz + \ | ||
| 82 | op_dec_sz) | 94 | op_dec_sz) |
| 83 | 95 | ||
| 96 | struct nfs4_rpc_args { | ||
| 97 | void *args_op; | ||
| 98 | struct nfsd4_cb_sequence args_seq; | ||
| 99 | }; | ||
| 100 | |||
| 84 | /* | 101 | /* |
| 85 | * Generic encode routines from fs/nfs/nfs4xdr.c | 102 | * Generic encode routines from fs/nfs/nfs4xdr.c |
| 86 | */ | 103 | */ |
| @@ -137,11 +154,13 @@ xdr_error: \ | |||
| 137 | } while (0) | 154 | } while (0) |
| 138 | 155 | ||
| 139 | struct nfs4_cb_compound_hdr { | 156 | struct nfs4_cb_compound_hdr { |
| 140 | int status; | 157 | /* args */ |
| 141 | u32 ident; | 158 | u32 ident; /* minorversion 0 only */ |
| 142 | u32 nops; | 159 | u32 nops; |
| 143 | __be32 *nops_p; | 160 | __be32 *nops_p; |
| 144 | u32 minorversion; | 161 | u32 minorversion; |
| 162 | /* res */ | ||
| 163 | int status; | ||
| 145 | u32 taglen; | 164 | u32 taglen; |
| 146 | char *tag; | 165 | char *tag; |
| 147 | }; | 166 | }; |
| @@ -238,6 +257,27 @@ encode_cb_recall(struct xdr_stream *xdr, struct nfs4_delegation *dp, | |||
| 238 | hdr->nops++; | 257 | hdr->nops++; |
| 239 | } | 258 | } |
| 240 | 259 | ||
| 260 | static void | ||
| 261 | encode_cb_sequence(struct xdr_stream *xdr, struct nfsd4_cb_sequence *args, | ||
| 262 | struct nfs4_cb_compound_hdr *hdr) | ||
| 263 | { | ||
| 264 | __be32 *p; | ||
| 265 | |||
| 266 | if (hdr->minorversion == 0) | ||
| 267 | return; | ||
| 268 | |||
| 269 | RESERVE_SPACE(1 + NFS4_MAX_SESSIONID_LEN + 20); | ||
| 270 | |||
| 271 | WRITE32(OP_CB_SEQUENCE); | ||
| 272 | WRITEMEM(args->cbs_clp->cl_sessionid.data, NFS4_MAX_SESSIONID_LEN); | ||
| 273 | WRITE32(args->cbs_clp->cl_cb_seq_nr); | ||
| 274 | WRITE32(0); /* slotid, always 0 */ | ||
| 275 | WRITE32(0); /* highest slotid always 0 */ | ||
| 276 | WRITE32(0); /* cachethis always 0 */ | ||
| 277 | WRITE32(0); /* FIXME: support referring_call_lists */ | ||
| 278 | hdr->nops++; | ||
| 279 | } | ||
| 280 | |||
| 241 | static int | 281 | static int |
| 242 | nfs4_xdr_enc_cb_null(struct rpc_rqst *req, __be32 *p) | 282 | nfs4_xdr_enc_cb_null(struct rpc_rqst *req, __be32 *p) |
| 243 | { | 283 | { |
| @@ -249,15 +289,19 @@ nfs4_xdr_enc_cb_null(struct rpc_rqst *req, __be32 *p) | |||
| 249 | } | 289 | } |
| 250 | 290 | ||
| 251 | static int | 291 | static int |
| 252 | nfs4_xdr_enc_cb_recall(struct rpc_rqst *req, __be32 *p, struct nfs4_delegation *args) | 292 | nfs4_xdr_enc_cb_recall(struct rpc_rqst *req, __be32 *p, |
| 293 | struct nfs4_rpc_args *rpc_args) | ||
| 253 | { | 294 | { |
| 254 | struct xdr_stream xdr; | 295 | struct xdr_stream xdr; |
| 296 | struct nfs4_delegation *args = rpc_args->args_op; | ||
| 255 | struct nfs4_cb_compound_hdr hdr = { | 297 | struct nfs4_cb_compound_hdr hdr = { |
| 256 | .ident = args->dl_ident, | 298 | .ident = args->dl_ident, |
| 299 | .minorversion = rpc_args->args_seq.cbs_minorversion, | ||
| 257 | }; | 300 | }; |
| 258 | 301 | ||
| 259 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); | 302 | xdr_init_encode(&xdr, &req->rq_snd_buf, p); |
| 260 | encode_cb_compound_hdr(&xdr, &hdr); | 303 | encode_cb_compound_hdr(&xdr, &hdr); |
| 304 | encode_cb_sequence(&xdr, &rpc_args->args_seq, &hdr); | ||
| 261 | encode_cb_recall(&xdr, args, &hdr); | 305 | encode_cb_recall(&xdr, args, &hdr); |
| 262 | encode_cb_nops(&hdr); | 306 | encode_cb_nops(&hdr); |
| 263 | return 0; | 307 | return 0; |
| @@ -299,6 +343,57 @@ decode_cb_op_hdr(struct xdr_stream *xdr, enum nfs_opnum4 expected) | |||
| 299 | return 0; | 343 | return 0; |
| 300 | } | 344 | } |
| 301 | 345 | ||
| 346 | /* | ||
| 347 | * Our current back channel implmentation supports a single backchannel | ||
| 348 | * with a single slot. | ||
| 349 | */ | ||
| 350 | static int | ||
| 351 | decode_cb_sequence(struct xdr_stream *xdr, struct nfsd4_cb_sequence *res, | ||
| 352 | struct rpc_rqst *rqstp) | ||
| 353 | { | ||
| 354 | struct nfs4_sessionid id; | ||
| 355 | int status; | ||
| 356 | u32 dummy; | ||
| 357 | __be32 *p; | ||
| 358 | |||
| 359 | if (res->cbs_minorversion == 0) | ||
| 360 | return 0; | ||
| 361 | |||
| 362 | status = decode_cb_op_hdr(xdr, OP_CB_SEQUENCE); | ||
| 363 | if (status) | ||
| 364 | return status; | ||
| 365 | |||
| 366 | /* | ||
| 367 | * If the server returns different values for sessionID, slotID or | ||
| 368 | * sequence number, the server is looney tunes. | ||
| 369 | */ | ||
| 370 | status = -ESERVERFAULT; | ||
| 371 | |||
| 372 | READ_BUF(NFS4_MAX_SESSIONID_LEN + 16); | ||
| 373 | memcpy(id.data, p, NFS4_MAX_SESSIONID_LEN); | ||
| 374 | p += XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN); | ||
| 375 | if (memcmp(id.data, res->cbs_clp->cl_sessionid.data, | ||
| 376 | NFS4_MAX_SESSIONID_LEN)) { | ||
| 377 | dprintk("%s Invalid session id\n", __func__); | ||
| 378 | goto out; | ||
| 379 | } | ||
| 380 | READ32(dummy); | ||
| 381 | if (dummy != res->cbs_clp->cl_cb_seq_nr) { | ||
| 382 | dprintk("%s Invalid sequence number\n", __func__); | ||
| 383 | goto out; | ||
| 384 | } | ||
| 385 | READ32(dummy); /* slotid must be 0 */ | ||
| 386 | if (dummy != 0) { | ||
| 387 | dprintk("%s Invalid slotid\n", __func__); | ||
| 388 | goto out; | ||
| 389 | } | ||
| 390 | /* FIXME: process highest slotid and target highest slotid */ | ||
| 391 | status = 0; | ||
| 392 | out: | ||
| 393 | return status; | ||
| 394 | } | ||
| 395 | |||
| 396 | |||
| 302 | static int | 397 | static int |
| 303 | nfs4_xdr_dec_cb_null(struct rpc_rqst *req, __be32 *p) | 398 | nfs4_xdr_dec_cb_null(struct rpc_rqst *req, __be32 *p) |
| 304 | { | 399 | { |
| @@ -306,7 +401,8 @@ nfs4_xdr_dec_cb_null(struct rpc_rqst *req, __be32 *p) | |||
| 306 | } | 401 | } |
| 307 | 402 | ||
| 308 | static int | 403 | static int |
| 309 | nfs4_xdr_dec_cb_recall(struct rpc_rqst *rqstp, __be32 *p) | 404 | nfs4_xdr_dec_cb_recall(struct rpc_rqst *rqstp, __be32 *p, |
| 405 | struct nfsd4_cb_sequence *seq) | ||
| 310 | { | 406 | { |
| 311 | struct xdr_stream xdr; | 407 | struct xdr_stream xdr; |
| 312 | struct nfs4_cb_compound_hdr hdr; | 408 | struct nfs4_cb_compound_hdr hdr; |
| @@ -316,6 +412,11 @@ nfs4_xdr_dec_cb_recall(struct rpc_rqst *rqstp, __be32 *p) | |||
| 316 | status = decode_cb_compound_hdr(&xdr, &hdr); | 412 | status = decode_cb_compound_hdr(&xdr, &hdr); |
| 317 | if (status) | 413 | if (status) |
| 318 | goto out; | 414 | goto out; |
| 415 | if (seq) { | ||
| 416 | status = decode_cb_sequence(&xdr, seq, rqstp); | ||
| 417 | if (status) | ||
| 418 | goto out; | ||
| 419 | } | ||
| 319 | status = decode_cb_op_hdr(&xdr, OP_CB_RECALL); | 420 | status = decode_cb_op_hdr(&xdr, OP_CB_RECALL); |
| 320 | out: | 421 | out: |
| 321 | return status; | 422 | return status; |
| @@ -377,16 +478,15 @@ static int max_cb_time(void) | |||
| 377 | 478 | ||
| 378 | int setup_callback_client(struct nfs4_client *clp) | 479 | int setup_callback_client(struct nfs4_client *clp) |
| 379 | { | 480 | { |
| 380 | struct sockaddr_in addr; | ||
| 381 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; | 481 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; |
| 382 | struct rpc_timeout timeparms = { | 482 | struct rpc_timeout timeparms = { |
| 383 | .to_initval = max_cb_time(), | 483 | .to_initval = max_cb_time(), |
| 384 | .to_retries = 0, | 484 | .to_retries = 0, |
| 385 | }; | 485 | }; |
| 386 | struct rpc_create_args args = { | 486 | struct rpc_create_args args = { |
| 387 | .protocol = IPPROTO_TCP, | 487 | .protocol = XPRT_TRANSPORT_TCP, |
| 388 | .address = (struct sockaddr *)&addr, | 488 | .address = (struct sockaddr *) &cb->cb_addr, |
| 389 | .addrsize = sizeof(addr), | 489 | .addrsize = cb->cb_addrlen, |
| 390 | .timeout = &timeparms, | 490 | .timeout = &timeparms, |
| 391 | .program = &cb_program, | 491 | .program = &cb_program, |
| 392 | .prognumber = cb->cb_prog, | 492 | .prognumber = cb->cb_prog, |
| @@ -399,13 +499,10 @@ int setup_callback_client(struct nfs4_client *clp) | |||
| 399 | 499 | ||
| 400 | if (!clp->cl_principal && (clp->cl_flavor >= RPC_AUTH_GSS_KRB5)) | 500 | if (!clp->cl_principal && (clp->cl_flavor >= RPC_AUTH_GSS_KRB5)) |
| 401 | return -EINVAL; | 501 | return -EINVAL; |
| 402 | 502 | if (cb->cb_minorversion) { | |
| 403 | /* Initialize address */ | 503 | args.bc_xprt = clp->cl_cb_xprt; |
| 404 | memset(&addr, 0, sizeof(addr)); | 504 | args.protocol = XPRT_TRANSPORT_BC_TCP; |
| 405 | addr.sin_family = AF_INET; | 505 | } |
| 406 | addr.sin_port = htons(cb->cb_port); | ||
| 407 | addr.sin_addr.s_addr = htonl(cb->cb_addr); | ||
| 408 | |||
| 409 | /* Create RPC client */ | 506 | /* Create RPC client */ |
| 410 | client = rpc_create(&args); | 507 | client = rpc_create(&args); |
| 411 | if (IS_ERR(client)) { | 508 | if (IS_ERR(client)) { |
| @@ -439,42 +536,29 @@ static const struct rpc_call_ops nfsd4_cb_probe_ops = { | |||
| 439 | .rpc_call_done = nfsd4_cb_probe_done, | 536 | .rpc_call_done = nfsd4_cb_probe_done, |
| 440 | }; | 537 | }; |
| 441 | 538 | ||
| 442 | static struct rpc_cred *lookup_cb_cred(struct nfs4_cb_conn *cb) | 539 | static struct rpc_cred *callback_cred; |
| 443 | { | ||
| 444 | struct auth_cred acred = { | ||
| 445 | .machine_cred = 1 | ||
| 446 | }; | ||
| 447 | 540 | ||
| 448 | /* | 541 | int set_callback_cred(void) |
| 449 | * Note in the gss case this doesn't actually have to wait for a | 542 | { |
| 450 | * gss upcall (or any calls to the client); this just creates a | 543 | callback_cred = rpc_lookup_machine_cred(); |
| 451 | * non-uptodate cred which the rpc state machine will fill in with | 544 | if (!callback_cred) |
| 452 | * a refresh_upcall later. | 545 | return -ENOMEM; |
| 453 | */ | 546 | return 0; |
| 454 | return rpcauth_lookup_credcache(cb->cb_client->cl_auth, &acred, | ||
| 455 | RPCAUTH_LOOKUP_NEW); | ||
| 456 | } | 547 | } |
| 457 | 548 | ||
| 549 | |||
| 458 | void do_probe_callback(struct nfs4_client *clp) | 550 | void do_probe_callback(struct nfs4_client *clp) |
| 459 | { | 551 | { |
| 460 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; | 552 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; |
| 461 | struct rpc_message msg = { | 553 | struct rpc_message msg = { |
| 462 | .rpc_proc = &nfs4_cb_procedures[NFSPROC4_CLNT_CB_NULL], | 554 | .rpc_proc = &nfs4_cb_procedures[NFSPROC4_CLNT_CB_NULL], |
| 463 | .rpc_argp = clp, | 555 | .rpc_argp = clp, |
| 556 | .rpc_cred = callback_cred | ||
| 464 | }; | 557 | }; |
| 465 | struct rpc_cred *cred; | ||
| 466 | int status; | 558 | int status; |
| 467 | 559 | ||
| 468 | cred = lookup_cb_cred(cb); | ||
| 469 | if (IS_ERR(cred)) { | ||
| 470 | status = PTR_ERR(cred); | ||
| 471 | goto out; | ||
| 472 | } | ||
| 473 | cb->cb_cred = cred; | ||
| 474 | msg.rpc_cred = cb->cb_cred; | ||
| 475 | status = rpc_call_async(cb->cb_client, &msg, RPC_TASK_SOFT, | 560 | status = rpc_call_async(cb->cb_client, &msg, RPC_TASK_SOFT, |
| 476 | &nfsd4_cb_probe_ops, (void *)clp); | 561 | &nfsd4_cb_probe_ops, (void *)clp); |
| 477 | out: | ||
| 478 | if (status) { | 562 | if (status) { |
| 479 | warn_no_callback_path(clp, status); | 563 | warn_no_callback_path(clp, status); |
| 480 | put_nfs4_client(clp); | 564 | put_nfs4_client(clp); |
| @@ -503,11 +587,95 @@ nfsd4_probe_callback(struct nfs4_client *clp) | |||
| 503 | do_probe_callback(clp); | 587 | do_probe_callback(clp); |
| 504 | } | 588 | } |
| 505 | 589 | ||
| 590 | /* | ||
| 591 | * There's currently a single callback channel slot. | ||
| 592 | * If the slot is available, then mark it busy. Otherwise, set the | ||
| 593 | * thread for sleeping on the callback RPC wait queue. | ||
| 594 | */ | ||
| 595 | static int nfsd41_cb_setup_sequence(struct nfs4_client *clp, | ||
| 596 | struct rpc_task *task) | ||
| 597 | { | ||
| 598 | struct nfs4_rpc_args *args = task->tk_msg.rpc_argp; | ||
| 599 | u32 *ptr = (u32 *)clp->cl_sessionid.data; | ||
| 600 | int status = 0; | ||
| 601 | |||
| 602 | dprintk("%s: %u:%u:%u:%u\n", __func__, | ||
| 603 | ptr[0], ptr[1], ptr[2], ptr[3]); | ||
| 604 | |||
| 605 | if (test_and_set_bit(0, &clp->cl_cb_slot_busy) != 0) { | ||
| 606 | rpc_sleep_on(&clp->cl_cb_waitq, task, NULL); | ||
| 607 | dprintk("%s slot is busy\n", __func__); | ||
| 608 | status = -EAGAIN; | ||
| 609 | goto out; | ||
| 610 | } | ||
| 611 | |||
| 612 | /* | ||
| 613 | * We'll need the clp during XDR encoding and decoding, | ||
| 614 | * and the sequence during decoding to verify the reply | ||
| 615 | */ | ||
| 616 | args->args_seq.cbs_clp = clp; | ||
| 617 | task->tk_msg.rpc_resp = &args->args_seq; | ||
| 618 | |||
| 619 | out: | ||
| 620 | dprintk("%s status=%d\n", __func__, status); | ||
| 621 | return status; | ||
| 622 | } | ||
| 623 | |||
| 624 | /* | ||
| 625 | * TODO: cb_sequence should support referring call lists, cachethis, multiple | ||
| 626 | * slots, and mark callback channel down on communication errors. | ||
| 627 | */ | ||
| 628 | static void nfsd4_cb_prepare(struct rpc_task *task, void *calldata) | ||
| 629 | { | ||
| 630 | struct nfs4_delegation *dp = calldata; | ||
| 631 | struct nfs4_client *clp = dp->dl_client; | ||
| 632 | struct nfs4_rpc_args *args = task->tk_msg.rpc_argp; | ||
| 633 | u32 minorversion = clp->cl_cb_conn.cb_minorversion; | ||
| 634 | int status = 0; | ||
| 635 | |||
| 636 | args->args_seq.cbs_minorversion = minorversion; | ||
| 637 | if (minorversion) { | ||
| 638 | status = nfsd41_cb_setup_sequence(clp, task); | ||
| 639 | if (status) { | ||
| 640 | if (status != -EAGAIN) { | ||
| 641 | /* terminate rpc task */ | ||
| 642 | task->tk_status = status; | ||
| 643 | task->tk_action = NULL; | ||
| 644 | } | ||
| 645 | return; | ||
| 646 | } | ||
| 647 | } | ||
| 648 | rpc_call_start(task); | ||
| 649 | } | ||
| 650 | |||
| 651 | static void nfsd4_cb_done(struct rpc_task *task, void *calldata) | ||
| 652 | { | ||
| 653 | struct nfs4_delegation *dp = calldata; | ||
| 654 | struct nfs4_client *clp = dp->dl_client; | ||
| 655 | |||
| 656 | dprintk("%s: minorversion=%d\n", __func__, | ||
| 657 | clp->cl_cb_conn.cb_minorversion); | ||
| 658 | |||
| 659 | if (clp->cl_cb_conn.cb_minorversion) { | ||
| 660 | /* No need for lock, access serialized in nfsd4_cb_prepare */ | ||
| 661 | ++clp->cl_cb_seq_nr; | ||
| 662 | clear_bit(0, &clp->cl_cb_slot_busy); | ||
| 663 | rpc_wake_up_next(&clp->cl_cb_waitq); | ||
| 664 | dprintk("%s: freed slot, new seqid=%d\n", __func__, | ||
| 665 | clp->cl_cb_seq_nr); | ||
| 666 | |||
| 667 | /* We're done looking into the sequence information */ | ||
| 668 | task->tk_msg.rpc_resp = NULL; | ||
| 669 | } | ||
| 670 | } | ||
| 671 | |||
| 506 | static void nfsd4_cb_recall_done(struct rpc_task *task, void *calldata) | 672 | static void nfsd4_cb_recall_done(struct rpc_task *task, void *calldata) |
| 507 | { | 673 | { |
| 508 | struct nfs4_delegation *dp = calldata; | 674 | struct nfs4_delegation *dp = calldata; |
| 509 | struct nfs4_client *clp = dp->dl_client; | 675 | struct nfs4_client *clp = dp->dl_client; |
| 510 | 676 | ||
| 677 | nfsd4_cb_done(task, calldata); | ||
| 678 | |||
| 511 | switch (task->tk_status) { | 679 | switch (task->tk_status) { |
| 512 | case -EIO: | 680 | case -EIO: |
| 513 | /* Network partition? */ | 681 | /* Network partition? */ |
| @@ -520,16 +688,19 @@ static void nfsd4_cb_recall_done(struct rpc_task *task, void *calldata) | |||
| 520 | break; | 688 | break; |
| 521 | default: | 689 | default: |
| 522 | /* success, or error we can't handle */ | 690 | /* success, or error we can't handle */ |
| 523 | return; | 691 | goto done; |
| 524 | } | 692 | } |
| 525 | if (dp->dl_retries--) { | 693 | if (dp->dl_retries--) { |
| 526 | rpc_delay(task, 2*HZ); | 694 | rpc_delay(task, 2*HZ); |
| 527 | task->tk_status = 0; | 695 | task->tk_status = 0; |
| 528 | rpc_restart_call(task); | 696 | rpc_restart_call(task); |
| 697 | return; | ||
| 529 | } else { | 698 | } else { |
| 530 | atomic_set(&clp->cl_cb_conn.cb_set, 0); | 699 | atomic_set(&clp->cl_cb_conn.cb_set, 0); |
| 531 | warn_no_callback_path(clp, task->tk_status); | 700 | warn_no_callback_path(clp, task->tk_status); |
| 532 | } | 701 | } |
| 702 | done: | ||
| 703 | kfree(task->tk_msg.rpc_argp); | ||
| 533 | } | 704 | } |
| 534 | 705 | ||
| 535 | static void nfsd4_cb_recall_release(void *calldata) | 706 | static void nfsd4_cb_recall_release(void *calldata) |
| @@ -542,6 +713,7 @@ static void nfsd4_cb_recall_release(void *calldata) | |||
| 542 | } | 713 | } |
| 543 | 714 | ||
| 544 | static const struct rpc_call_ops nfsd4_cb_recall_ops = { | 715 | static const struct rpc_call_ops nfsd4_cb_recall_ops = { |
| 716 | .rpc_call_prepare = nfsd4_cb_prepare, | ||
| 545 | .rpc_call_done = nfsd4_cb_recall_done, | 717 | .rpc_call_done = nfsd4_cb_recall_done, |
| 546 | .rpc_release = nfsd4_cb_recall_release, | 718 | .rpc_release = nfsd4_cb_recall_release, |
| 547 | }; | 719 | }; |
| @@ -554,17 +726,24 @@ nfsd4_cb_recall(struct nfs4_delegation *dp) | |||
| 554 | { | 726 | { |
| 555 | struct nfs4_client *clp = dp->dl_client; | 727 | struct nfs4_client *clp = dp->dl_client; |
| 556 | struct rpc_clnt *clnt = clp->cl_cb_conn.cb_client; | 728 | struct rpc_clnt *clnt = clp->cl_cb_conn.cb_client; |
| 729 | struct nfs4_rpc_args *args; | ||
| 557 | struct rpc_message msg = { | 730 | struct rpc_message msg = { |
| 558 | .rpc_proc = &nfs4_cb_procedures[NFSPROC4_CLNT_CB_RECALL], | 731 | .rpc_proc = &nfs4_cb_procedures[NFSPROC4_CLNT_CB_RECALL], |
| 559 | .rpc_argp = dp, | 732 | .rpc_cred = callback_cred |
| 560 | .rpc_cred = clp->cl_cb_conn.cb_cred | ||
| 561 | }; | 733 | }; |
| 562 | int status; | 734 | int status = -ENOMEM; |
| 563 | 735 | ||
| 736 | args = kzalloc(sizeof(*args), GFP_KERNEL); | ||
| 737 | if (!args) | ||
| 738 | goto out; | ||
| 739 | args->args_op = dp; | ||
| 740 | msg.rpc_argp = args; | ||
| 564 | dp->dl_retries = 1; | 741 | dp->dl_retries = 1; |
| 565 | status = rpc_call_async(clnt, &msg, RPC_TASK_SOFT, | 742 | status = rpc_call_async(clnt, &msg, RPC_TASK_SOFT, |
| 566 | &nfsd4_cb_recall_ops, dp); | 743 | &nfsd4_cb_recall_ops, dp); |
| 744 | out: | ||
| 567 | if (status) { | 745 | if (status) { |
| 746 | kfree(args); | ||
| 568 | put_nfs4_client(clp); | 747 | put_nfs4_client(clp); |
| 569 | nfs4_put_delegation(dp); | 748 | nfs4_put_delegation(dp); |
| 570 | } | 749 | } |
diff --git a/fs/nfsd/nfs4proc.c b/fs/nfsd/nfs4proc.c index 7c8801769a3c..bebc0c2e1b0a 100644 --- a/fs/nfsd/nfs4proc.c +++ b/fs/nfsd/nfs4proc.c | |||
| @@ -68,7 +68,6 @@ check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 68 | u32 *bmval, u32 *writable) | 68 | u32 *bmval, u32 *writable) |
| 69 | { | 69 | { |
| 70 | struct dentry *dentry = cstate->current_fh.fh_dentry; | 70 | struct dentry *dentry = cstate->current_fh.fh_dentry; |
| 71 | struct svc_export *exp = cstate->current_fh.fh_export; | ||
| 72 | 71 | ||
| 73 | /* | 72 | /* |
| 74 | * Check about attributes are supported by the NFSv4 server or not. | 73 | * Check about attributes are supported by the NFSv4 server or not. |
| @@ -80,17 +79,13 @@ check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 80 | return nfserr_attrnotsupp; | 79 | return nfserr_attrnotsupp; |
| 81 | 80 | ||
| 82 | /* | 81 | /* |
| 83 | * Check FATTR4_WORD0_ACL & FATTR4_WORD0_FS_LOCATIONS can be supported | 82 | * Check FATTR4_WORD0_ACL can be supported |
| 84 | * in current environment or not. | 83 | * in current environment or not. |
| 85 | */ | 84 | */ |
| 86 | if (bmval[0] & FATTR4_WORD0_ACL) { | 85 | if (bmval[0] & FATTR4_WORD0_ACL) { |
| 87 | if (!IS_POSIXACL(dentry->d_inode)) | 86 | if (!IS_POSIXACL(dentry->d_inode)) |
| 88 | return nfserr_attrnotsupp; | 87 | return nfserr_attrnotsupp; |
| 89 | } | 88 | } |
| 90 | if (bmval[0] & FATTR4_WORD0_FS_LOCATIONS) { | ||
| 91 | if (exp->ex_fslocs.locations == NULL) | ||
| 92 | return nfserr_attrnotsupp; | ||
| 93 | } | ||
| 94 | 89 | ||
| 95 | /* | 90 | /* |
| 96 | * According to spec, read-only attributes return ERR_INVAL. | 91 | * According to spec, read-only attributes return ERR_INVAL. |
| @@ -123,6 +118,35 @@ nfsd4_check_open_attributes(struct svc_rqst *rqstp, | |||
| 123 | return status; | 118 | return status; |
| 124 | } | 119 | } |
| 125 | 120 | ||
| 121 | static int | ||
| 122 | is_create_with_attrs(struct nfsd4_open *open) | ||
| 123 | { | ||
| 124 | return open->op_create == NFS4_OPEN_CREATE | ||
| 125 | && (open->op_createmode == NFS4_CREATE_UNCHECKED | ||
| 126 | || open->op_createmode == NFS4_CREATE_GUARDED | ||
| 127 | || open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1); | ||
| 128 | } | ||
| 129 | |||
| 130 | /* | ||
| 131 | * if error occurs when setting the acl, just clear the acl bit | ||
| 132 | * in the returned attr bitmap. | ||
| 133 | */ | ||
| 134 | static void | ||
| 135 | do_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp, | ||
| 136 | struct nfs4_acl *acl, u32 *bmval) | ||
| 137 | { | ||
| 138 | __be32 status; | ||
| 139 | |||
| 140 | status = nfsd4_set_nfs4_acl(rqstp, fhp, acl); | ||
| 141 | if (status) | ||
| 142 | /* | ||
| 143 | * We should probably fail the whole open at this point, | ||
| 144 | * but we've already created the file, so it's too late; | ||
| 145 | * So this seems the least of evils: | ||
| 146 | */ | ||
| 147 | bmval[0] &= ~FATTR4_WORD0_ACL; | ||
| 148 | } | ||
| 149 | |||
| 126 | static inline void | 150 | static inline void |
| 127 | fh_dup2(struct svc_fh *dst, struct svc_fh *src) | 151 | fh_dup2(struct svc_fh *dst, struct svc_fh *src) |
| 128 | { | 152 | { |
| @@ -206,6 +230,9 @@ do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_o | |||
| 206 | if (status) | 230 | if (status) |
| 207 | goto out; | 231 | goto out; |
| 208 | 232 | ||
| 233 | if (is_create_with_attrs(open) && open->op_acl != NULL) | ||
| 234 | do_set_nfs4_acl(rqstp, &resfh, open->op_acl, open->op_bmval); | ||
| 235 | |||
| 209 | set_change_info(&open->op_cinfo, current_fh); | 236 | set_change_info(&open->op_cinfo, current_fh); |
| 210 | fh_dup2(current_fh, &resfh); | 237 | fh_dup2(current_fh, &resfh); |
| 211 | 238 | ||
| @@ -536,12 +563,17 @@ nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 536 | status = nfserr_badtype; | 563 | status = nfserr_badtype; |
| 537 | } | 564 | } |
| 538 | 565 | ||
| 539 | if (!status) { | 566 | if (status) |
| 540 | fh_unlock(&cstate->current_fh); | 567 | goto out; |
| 541 | set_change_info(&create->cr_cinfo, &cstate->current_fh); | 568 | |
| 542 | fh_dup2(&cstate->current_fh, &resfh); | 569 | if (create->cr_acl != NULL) |
| 543 | } | 570 | do_set_nfs4_acl(rqstp, &resfh, create->cr_acl, |
| 571 | create->cr_bmval); | ||
| 544 | 572 | ||
| 573 | fh_unlock(&cstate->current_fh); | ||
| 574 | set_change_info(&create->cr_cinfo, &cstate->current_fh); | ||
| 575 | fh_dup2(&cstate->current_fh, &resfh); | ||
| 576 | out: | ||
| 545 | fh_put(&resfh); | 577 | fh_put(&resfh); |
| 546 | return status; | 578 | return status; |
| 547 | } | 579 | } |
| @@ -947,34 +979,6 @@ static struct nfsd4_operation nfsd4_ops[]; | |||
| 947 | static const char *nfsd4_op_name(unsigned opnum); | 979 | static const char *nfsd4_op_name(unsigned opnum); |
| 948 | 980 | ||
| 949 | /* | 981 | /* |
| 950 | * This is a replay of a compound for which no cache entry pages | ||
| 951 | * were used. Encode the sequence operation, and if cachethis is FALSE | ||
| 952 | * encode the uncache rep error on the next operation. | ||
| 953 | */ | ||
| 954 | static __be32 | ||
| 955 | nfsd4_enc_uncached_replay(struct nfsd4_compoundargs *args, | ||
| 956 | struct nfsd4_compoundres *resp) | ||
| 957 | { | ||
| 958 | struct nfsd4_op *op; | ||
| 959 | |||
| 960 | dprintk("--> %s resp->opcnt %d ce_cachethis %u \n", __func__, | ||
| 961 | resp->opcnt, resp->cstate.slot->sl_cache_entry.ce_cachethis); | ||
| 962 | |||
| 963 | /* Encode the replayed sequence operation */ | ||
| 964 | BUG_ON(resp->opcnt != 1); | ||
| 965 | op = &args->ops[resp->opcnt - 1]; | ||
| 966 | nfsd4_encode_operation(resp, op); | ||
| 967 | |||
| 968 | /*return nfserr_retry_uncached_rep in next operation. */ | ||
| 969 | if (resp->cstate.slot->sl_cache_entry.ce_cachethis == 0) { | ||
| 970 | op = &args->ops[resp->opcnt++]; | ||
| 971 | op->status = nfserr_retry_uncached_rep; | ||
| 972 | nfsd4_encode_operation(resp, op); | ||
| 973 | } | ||
| 974 | return op->status; | ||
| 975 | } | ||
| 976 | |||
| 977 | /* | ||
| 978 | * Enforce NFSv4.1 COMPOUND ordering rules. | 982 | * Enforce NFSv4.1 COMPOUND ordering rules. |
| 979 | * | 983 | * |
| 980 | * TODO: | 984 | * TODO: |
| @@ -1083,13 +1087,10 @@ nfsd4_proc_compound(struct svc_rqst *rqstp, | |||
| 1083 | BUG_ON(op->status == nfs_ok); | 1087 | BUG_ON(op->status == nfs_ok); |
| 1084 | 1088 | ||
| 1085 | encode_op: | 1089 | encode_op: |
| 1086 | /* Only from SEQUENCE or CREATE_SESSION */ | 1090 | /* Only from SEQUENCE */ |
| 1087 | if (resp->cstate.status == nfserr_replay_cache) { | 1091 | if (resp->cstate.status == nfserr_replay_cache) { |
| 1088 | dprintk("%s NFS4.1 replay from cache\n", __func__); | 1092 | dprintk("%s NFS4.1 replay from cache\n", __func__); |
| 1089 | if (nfsd4_not_cached(resp)) | 1093 | status = op->status; |
| 1090 | status = nfsd4_enc_uncached_replay(args, resp); | ||
| 1091 | else | ||
| 1092 | status = op->status; | ||
| 1093 | goto out; | 1094 | goto out; |
| 1094 | } | 1095 | } |
| 1095 | if (op->status == nfserr_replay_me) { | 1096 | if (op->status == nfserr_replay_me) { |
diff --git a/fs/nfsd/nfs4state.c b/fs/nfsd/nfs4state.c index 766d3d544544..2153f9bdbebd 100644 --- a/fs/nfsd/nfs4state.c +++ b/fs/nfsd/nfs4state.c | |||
| @@ -55,6 +55,7 @@ | |||
| 55 | #include <linux/lockd/bind.h> | 55 | #include <linux/lockd/bind.h> |
| 56 | #include <linux/module.h> | 56 | #include <linux/module.h> |
| 57 | #include <linux/sunrpc/svcauth_gss.h> | 57 | #include <linux/sunrpc/svcauth_gss.h> |
| 58 | #include <linux/sunrpc/clnt.h> | ||
| 58 | 59 | ||
| 59 | #define NFSDDBG_FACILITY NFSDDBG_PROC | 60 | #define NFSDDBG_FACILITY NFSDDBG_PROC |
| 60 | 61 | ||
| @@ -413,36 +414,65 @@ gen_sessionid(struct nfsd4_session *ses) | |||
| 413 | } | 414 | } |
| 414 | 415 | ||
| 415 | /* | 416 | /* |
| 416 | * Give the client the number of slots it requests bound by | 417 | * The protocol defines ca_maxresponssize_cached to include the size of |
| 417 | * NFSD_MAX_SLOTS_PER_SESSION and by sv_drc_max_pages. | 418 | * the rpc header, but all we need to cache is the data starting after |
| 419 | * the end of the initial SEQUENCE operation--the rest we regenerate | ||
| 420 | * each time. Therefore we can advertise a ca_maxresponssize_cached | ||
| 421 | * value that is the number of bytes in our cache plus a few additional | ||
| 422 | * bytes. In order to stay on the safe side, and not promise more than | ||
| 423 | * we can cache, those additional bytes must be the minimum possible: 24 | ||
| 424 | * bytes of rpc header (xid through accept state, with AUTH_NULL | ||
| 425 | * verifier), 12 for the compound header (with zero-length tag), and 44 | ||
| 426 | * for the SEQUENCE op response: | ||
| 427 | */ | ||
| 428 | #define NFSD_MIN_HDR_SEQ_SZ (24 + 12 + 44) | ||
| 429 | |||
| 430 | /* | ||
| 431 | * Give the client the number of ca_maxresponsesize_cached slots it | ||
| 432 | * requests, of size bounded by NFSD_SLOT_CACHE_SIZE, | ||
| 433 | * NFSD_MAX_MEM_PER_SESSION, and nfsd_drc_max_mem. Do not allow more | ||
| 434 | * than NFSD_MAX_SLOTS_PER_SESSION. | ||
| 418 | * | 435 | * |
| 419 | * If we run out of pages (sv_drc_pages_used == sv_drc_max_pages) we | 436 | * If we run out of reserved DRC memory we should (up to a point) |
| 420 | * should (up to a point) re-negotiate active sessions and reduce their | 437 | * re-negotiate active sessions and reduce their slot usage to make |
| 421 | * slot usage to make rooom for new connections. For now we just fail the | 438 | * rooom for new connections. For now we just fail the create session. |
| 422 | * create session. | ||
| 423 | */ | 439 | */ |
| 424 | static int set_forechannel_maxreqs(struct nfsd4_channel_attrs *fchan) | 440 | static int set_forechannel_drc_size(struct nfsd4_channel_attrs *fchan) |
| 425 | { | 441 | { |
| 426 | int status = 0, np = fchan->maxreqs * NFSD_PAGES_PER_SLOT; | 442 | int mem, size = fchan->maxresp_cached; |
| 427 | 443 | ||
| 428 | if (fchan->maxreqs < 1) | 444 | if (fchan->maxreqs < 1) |
| 429 | return nfserr_inval; | 445 | return nfserr_inval; |
| 430 | else if (fchan->maxreqs > NFSD_MAX_SLOTS_PER_SESSION) | ||
| 431 | fchan->maxreqs = NFSD_MAX_SLOTS_PER_SESSION; | ||
| 432 | 446 | ||
| 433 | spin_lock(&nfsd_serv->sv_lock); | 447 | if (size < NFSD_MIN_HDR_SEQ_SZ) |
| 434 | if (np + nfsd_serv->sv_drc_pages_used > nfsd_serv->sv_drc_max_pages) | 448 | size = NFSD_MIN_HDR_SEQ_SZ; |
| 435 | np = nfsd_serv->sv_drc_max_pages - nfsd_serv->sv_drc_pages_used; | 449 | size -= NFSD_MIN_HDR_SEQ_SZ; |
| 436 | nfsd_serv->sv_drc_pages_used += np; | 450 | if (size > NFSD_SLOT_CACHE_SIZE) |
| 437 | spin_unlock(&nfsd_serv->sv_lock); | 451 | size = NFSD_SLOT_CACHE_SIZE; |
| 452 | |||
| 453 | /* bound the maxreqs by NFSD_MAX_MEM_PER_SESSION */ | ||
| 454 | mem = fchan->maxreqs * size; | ||
| 455 | if (mem > NFSD_MAX_MEM_PER_SESSION) { | ||
| 456 | fchan->maxreqs = NFSD_MAX_MEM_PER_SESSION / size; | ||
| 457 | if (fchan->maxreqs > NFSD_MAX_SLOTS_PER_SESSION) | ||
| 458 | fchan->maxreqs = NFSD_MAX_SLOTS_PER_SESSION; | ||
| 459 | mem = fchan->maxreqs * size; | ||
| 460 | } | ||
| 438 | 461 | ||
| 439 | if (np <= 0) { | 462 | spin_lock(&nfsd_drc_lock); |
| 440 | status = nfserr_resource; | 463 | /* bound the total session drc memory ussage */ |
| 441 | fchan->maxreqs = 0; | 464 | if (mem + nfsd_drc_mem_used > nfsd_drc_max_mem) { |
| 442 | } else | 465 | fchan->maxreqs = (nfsd_drc_max_mem - nfsd_drc_mem_used) / size; |
| 443 | fchan->maxreqs = np / NFSD_PAGES_PER_SLOT; | 466 | mem = fchan->maxreqs * size; |
| 467 | } | ||
| 468 | nfsd_drc_mem_used += mem; | ||
| 469 | spin_unlock(&nfsd_drc_lock); | ||
| 444 | 470 | ||
| 445 | return status; | 471 | if (fchan->maxreqs == 0) |
| 472 | return nfserr_serverfault; | ||
| 473 | |||
| 474 | fchan->maxresp_cached = size + NFSD_MIN_HDR_SEQ_SZ; | ||
| 475 | return 0; | ||
| 446 | } | 476 | } |
| 447 | 477 | ||
| 448 | /* | 478 | /* |
| @@ -466,36 +496,41 @@ static int init_forechannel_attrs(struct svc_rqst *rqstp, | |||
| 466 | fchan->maxresp_sz = maxcount; | 496 | fchan->maxresp_sz = maxcount; |
| 467 | session_fchan->maxresp_sz = fchan->maxresp_sz; | 497 | session_fchan->maxresp_sz = fchan->maxresp_sz; |
| 468 | 498 | ||
| 469 | /* Set the max response cached size our default which is | ||
| 470 | * a multiple of PAGE_SIZE and small */ | ||
| 471 | session_fchan->maxresp_cached = NFSD_PAGES_PER_SLOT * PAGE_SIZE; | ||
| 472 | fchan->maxresp_cached = session_fchan->maxresp_cached; | ||
| 473 | |||
| 474 | /* Use the client's maxops if possible */ | 499 | /* Use the client's maxops if possible */ |
| 475 | if (fchan->maxops > NFSD_MAX_OPS_PER_COMPOUND) | 500 | if (fchan->maxops > NFSD_MAX_OPS_PER_COMPOUND) |
| 476 | fchan->maxops = NFSD_MAX_OPS_PER_COMPOUND; | 501 | fchan->maxops = NFSD_MAX_OPS_PER_COMPOUND; |
| 477 | session_fchan->maxops = fchan->maxops; | 502 | session_fchan->maxops = fchan->maxops; |
| 478 | 503 | ||
| 479 | /* try to use the client requested number of slots */ | ||
| 480 | if (fchan->maxreqs > NFSD_MAX_SLOTS_PER_SESSION) | ||
| 481 | fchan->maxreqs = NFSD_MAX_SLOTS_PER_SESSION; | ||
| 482 | |||
| 483 | /* FIXME: Error means no more DRC pages so the server should | 504 | /* FIXME: Error means no more DRC pages so the server should |
| 484 | * recover pages from existing sessions. For now fail session | 505 | * recover pages from existing sessions. For now fail session |
| 485 | * creation. | 506 | * creation. |
| 486 | */ | 507 | */ |
| 487 | status = set_forechannel_maxreqs(fchan); | 508 | status = set_forechannel_drc_size(fchan); |
| 488 | 509 | ||
| 510 | session_fchan->maxresp_cached = fchan->maxresp_cached; | ||
| 489 | session_fchan->maxreqs = fchan->maxreqs; | 511 | session_fchan->maxreqs = fchan->maxreqs; |
| 512 | |||
| 513 | dprintk("%s status %d\n", __func__, status); | ||
| 490 | return status; | 514 | return status; |
| 491 | } | 515 | } |
| 492 | 516 | ||
| 517 | static void | ||
| 518 | free_session_slots(struct nfsd4_session *ses) | ||
| 519 | { | ||
| 520 | int i; | ||
| 521 | |||
| 522 | for (i = 0; i < ses->se_fchannel.maxreqs; i++) | ||
| 523 | kfree(ses->se_slots[i]); | ||
| 524 | } | ||
| 525 | |||
| 493 | static int | 526 | static int |
| 494 | alloc_init_session(struct svc_rqst *rqstp, struct nfs4_client *clp, | 527 | alloc_init_session(struct svc_rqst *rqstp, struct nfs4_client *clp, |
| 495 | struct nfsd4_create_session *cses) | 528 | struct nfsd4_create_session *cses) |
| 496 | { | 529 | { |
| 497 | struct nfsd4_session *new, tmp; | 530 | struct nfsd4_session *new, tmp; |
| 498 | int idx, status = nfserr_resource, slotsize; | 531 | struct nfsd4_slot *sp; |
| 532 | int idx, slotsize, cachesize, i; | ||
| 533 | int status; | ||
| 499 | 534 | ||
| 500 | memset(&tmp, 0, sizeof(tmp)); | 535 | memset(&tmp, 0, sizeof(tmp)); |
| 501 | 536 | ||
| @@ -506,14 +541,27 @@ alloc_init_session(struct svc_rqst *rqstp, struct nfs4_client *clp, | |||
| 506 | if (status) | 541 | if (status) |
| 507 | goto out; | 542 | goto out; |
| 508 | 543 | ||
| 509 | /* allocate struct nfsd4_session and slot table in one piece */ | 544 | BUILD_BUG_ON(NFSD_MAX_SLOTS_PER_SESSION * sizeof(struct nfsd4_slot) |
| 510 | slotsize = tmp.se_fchannel.maxreqs * sizeof(struct nfsd4_slot); | 545 | + sizeof(struct nfsd4_session) > PAGE_SIZE); |
| 546 | |||
| 547 | status = nfserr_serverfault; | ||
| 548 | /* allocate struct nfsd4_session and slot table pointers in one piece */ | ||
| 549 | slotsize = tmp.se_fchannel.maxreqs * sizeof(struct nfsd4_slot *); | ||
| 511 | new = kzalloc(sizeof(*new) + slotsize, GFP_KERNEL); | 550 | new = kzalloc(sizeof(*new) + slotsize, GFP_KERNEL); |
| 512 | if (!new) | 551 | if (!new) |
| 513 | goto out; | 552 | goto out; |
| 514 | 553 | ||
| 515 | memcpy(new, &tmp, sizeof(*new)); | 554 | memcpy(new, &tmp, sizeof(*new)); |
| 516 | 555 | ||
| 556 | /* allocate each struct nfsd4_slot and data cache in one piece */ | ||
| 557 | cachesize = new->se_fchannel.maxresp_cached - NFSD_MIN_HDR_SEQ_SZ; | ||
| 558 | for (i = 0; i < new->se_fchannel.maxreqs; i++) { | ||
| 559 | sp = kzalloc(sizeof(*sp) + cachesize, GFP_KERNEL); | ||
| 560 | if (!sp) | ||
| 561 | goto out_free; | ||
| 562 | new->se_slots[i] = sp; | ||
| 563 | } | ||
| 564 | |||
| 517 | new->se_client = clp; | 565 | new->se_client = clp; |
| 518 | gen_sessionid(new); | 566 | gen_sessionid(new); |
| 519 | idx = hash_sessionid(&new->se_sessionid); | 567 | idx = hash_sessionid(&new->se_sessionid); |
| @@ -530,6 +578,10 @@ alloc_init_session(struct svc_rqst *rqstp, struct nfs4_client *clp, | |||
| 530 | status = nfs_ok; | 578 | status = nfs_ok; |
| 531 | out: | 579 | out: |
| 532 | return status; | 580 | return status; |
| 581 | out_free: | ||
| 582 | free_session_slots(new); | ||
| 583 | kfree(new); | ||
| 584 | goto out; | ||
| 533 | } | 585 | } |
| 534 | 586 | ||
| 535 | /* caller must hold sessionid_lock */ | 587 | /* caller must hold sessionid_lock */ |
| @@ -572,19 +624,16 @@ release_session(struct nfsd4_session *ses) | |||
| 572 | nfsd4_put_session(ses); | 624 | nfsd4_put_session(ses); |
| 573 | } | 625 | } |
| 574 | 626 | ||
| 575 | static void nfsd4_release_respages(struct page **respages, short resused); | ||
| 576 | |||
| 577 | void | 627 | void |
| 578 | free_session(struct kref *kref) | 628 | free_session(struct kref *kref) |
| 579 | { | 629 | { |
| 580 | struct nfsd4_session *ses; | 630 | struct nfsd4_session *ses; |
| 581 | int i; | ||
| 582 | 631 | ||
| 583 | ses = container_of(kref, struct nfsd4_session, se_ref); | 632 | ses = container_of(kref, struct nfsd4_session, se_ref); |
| 584 | for (i = 0; i < ses->se_fchannel.maxreqs; i++) { | 633 | spin_lock(&nfsd_drc_lock); |
| 585 | struct nfsd4_cache_entry *e = &ses->se_slots[i].sl_cache_entry; | 634 | nfsd_drc_mem_used -= ses->se_fchannel.maxreqs * NFSD_SLOT_CACHE_SIZE; |
| 586 | nfsd4_release_respages(e->ce_respages, e->ce_resused); | 635 | spin_unlock(&nfsd_drc_lock); |
| 587 | } | 636 | free_session_slots(ses); |
| 588 | kfree(ses); | 637 | kfree(ses); |
| 589 | } | 638 | } |
| 590 | 639 | ||
| @@ -647,18 +696,14 @@ shutdown_callback_client(struct nfs4_client *clp) | |||
| 647 | clp->cl_cb_conn.cb_client = NULL; | 696 | clp->cl_cb_conn.cb_client = NULL; |
| 648 | rpc_shutdown_client(clnt); | 697 | rpc_shutdown_client(clnt); |
| 649 | } | 698 | } |
| 650 | if (clp->cl_cb_conn.cb_cred) { | ||
| 651 | put_rpccred(clp->cl_cb_conn.cb_cred); | ||
| 652 | clp->cl_cb_conn.cb_cred = NULL; | ||
| 653 | } | ||
| 654 | } | 699 | } |
| 655 | 700 | ||
| 656 | static inline void | 701 | static inline void |
| 657 | free_client(struct nfs4_client *clp) | 702 | free_client(struct nfs4_client *clp) |
| 658 | { | 703 | { |
| 659 | shutdown_callback_client(clp); | 704 | shutdown_callback_client(clp); |
| 660 | nfsd4_release_respages(clp->cl_slot.sl_cache_entry.ce_respages, | 705 | if (clp->cl_cb_xprt) |
| 661 | clp->cl_slot.sl_cache_entry.ce_resused); | 706 | svc_xprt_put(clp->cl_cb_xprt); |
| 662 | if (clp->cl_cred.cr_group_info) | 707 | if (clp->cl_cred.cr_group_info) |
| 663 | put_group_info(clp->cl_cred.cr_group_info); | 708 | put_group_info(clp->cl_cred.cr_group_info); |
| 664 | kfree(clp->cl_principal); | 709 | kfree(clp->cl_principal); |
| @@ -714,25 +759,6 @@ expire_client(struct nfs4_client *clp) | |||
| 714 | put_nfs4_client(clp); | 759 | put_nfs4_client(clp); |
| 715 | } | 760 | } |
| 716 | 761 | ||
| 717 | static struct nfs4_client *create_client(struct xdr_netobj name, char *recdir) | ||
| 718 | { | ||
| 719 | struct nfs4_client *clp; | ||
| 720 | |||
| 721 | clp = alloc_client(name); | ||
| 722 | if (clp == NULL) | ||
| 723 | return NULL; | ||
| 724 | memcpy(clp->cl_recdir, recdir, HEXDIR_LEN); | ||
| 725 | atomic_set(&clp->cl_count, 1); | ||
| 726 | atomic_set(&clp->cl_cb_conn.cb_set, 0); | ||
| 727 | INIT_LIST_HEAD(&clp->cl_idhash); | ||
| 728 | INIT_LIST_HEAD(&clp->cl_strhash); | ||
| 729 | INIT_LIST_HEAD(&clp->cl_openowners); | ||
| 730 | INIT_LIST_HEAD(&clp->cl_delegations); | ||
| 731 | INIT_LIST_HEAD(&clp->cl_sessions); | ||
| 732 | INIT_LIST_HEAD(&clp->cl_lru); | ||
| 733 | return clp; | ||
| 734 | } | ||
| 735 | |||
| 736 | static void copy_verf(struct nfs4_client *target, nfs4_verifier *source) | 762 | static void copy_verf(struct nfs4_client *target, nfs4_verifier *source) |
| 737 | { | 763 | { |
| 738 | memcpy(target->cl_verifier.data, source->data, | 764 | memcpy(target->cl_verifier.data, source->data, |
| @@ -795,6 +821,46 @@ static void gen_confirm(struct nfs4_client *clp) | |||
| 795 | *p++ = i++; | 821 | *p++ = i++; |
| 796 | } | 822 | } |
| 797 | 823 | ||
| 824 | static struct nfs4_client *create_client(struct xdr_netobj name, char *recdir, | ||
| 825 | struct svc_rqst *rqstp, nfs4_verifier *verf) | ||
| 826 | { | ||
| 827 | struct nfs4_client *clp; | ||
| 828 | struct sockaddr *sa = svc_addr(rqstp); | ||
| 829 | char *princ; | ||
| 830 | |||
| 831 | clp = alloc_client(name); | ||
| 832 | if (clp == NULL) | ||
| 833 | return NULL; | ||
| 834 | |||
| 835 | princ = svc_gss_principal(rqstp); | ||
| 836 | if (princ) { | ||
| 837 | clp->cl_principal = kstrdup(princ, GFP_KERNEL); | ||
| 838 | if (clp->cl_principal == NULL) { | ||
| 839 | free_client(clp); | ||
| 840 | return NULL; | ||
| 841 | } | ||
| 842 | } | ||
| 843 | |||
| 844 | memcpy(clp->cl_recdir, recdir, HEXDIR_LEN); | ||
| 845 | atomic_set(&clp->cl_count, 1); | ||
| 846 | atomic_set(&clp->cl_cb_conn.cb_set, 0); | ||
| 847 | INIT_LIST_HEAD(&clp->cl_idhash); | ||
| 848 | INIT_LIST_HEAD(&clp->cl_strhash); | ||
| 849 | INIT_LIST_HEAD(&clp->cl_openowners); | ||
| 850 | INIT_LIST_HEAD(&clp->cl_delegations); | ||
| 851 | INIT_LIST_HEAD(&clp->cl_sessions); | ||
| 852 | INIT_LIST_HEAD(&clp->cl_lru); | ||
| 853 | clear_bit(0, &clp->cl_cb_slot_busy); | ||
| 854 | rpc_init_wait_queue(&clp->cl_cb_waitq, "Backchannel slot table"); | ||
| 855 | copy_verf(clp, verf); | ||
| 856 | rpc_copy_addr((struct sockaddr *) &clp->cl_addr, sa); | ||
| 857 | clp->cl_flavor = rqstp->rq_flavor; | ||
| 858 | copy_cred(&clp->cl_cred, &rqstp->rq_cred); | ||
| 859 | gen_confirm(clp); | ||
| 860 | |||
| 861 | return clp; | ||
| 862 | } | ||
| 863 | |||
| 798 | static int check_name(struct xdr_netobj name) | 864 | static int check_name(struct xdr_netobj name) |
| 799 | { | 865 | { |
| 800 | if (name.len == 0) | 866 | if (name.len == 0) |
| @@ -902,93 +968,40 @@ find_unconfirmed_client_by_str(const char *dname, unsigned int hashval, | |||
| 902 | return NULL; | 968 | return NULL; |
| 903 | } | 969 | } |
| 904 | 970 | ||
| 905 | /* a helper function for parse_callback */ | ||
| 906 | static int | ||
| 907 | parse_octet(unsigned int *lenp, char **addrp) | ||
| 908 | { | ||
| 909 | unsigned int len = *lenp; | ||
| 910 | char *p = *addrp; | ||
| 911 | int n = -1; | ||
| 912 | char c; | ||
| 913 | |||
| 914 | for (;;) { | ||
| 915 | if (!len) | ||
| 916 | break; | ||
| 917 | len--; | ||
| 918 | c = *p++; | ||
| 919 | if (c == '.') | ||
| 920 | break; | ||
| 921 | if ((c < '0') || (c > '9')) { | ||
| 922 | n = -1; | ||
| 923 | break; | ||
| 924 | } | ||
| 925 | if (n < 0) | ||
| 926 | n = 0; | ||
| 927 | n = (n * 10) + (c - '0'); | ||
| 928 | if (n > 255) { | ||
| 929 | n = -1; | ||
| 930 | break; | ||
| 931 | } | ||
| 932 | } | ||
| 933 | *lenp = len; | ||
| 934 | *addrp = p; | ||
| 935 | return n; | ||
| 936 | } | ||
| 937 | |||
| 938 | /* parse and set the setclientid ipv4 callback address */ | ||
| 939 | static int | ||
| 940 | parse_ipv4(unsigned int addr_len, char *addr_val, unsigned int *cbaddrp, unsigned short *cbportp) | ||
| 941 | { | ||
| 942 | int temp = 0; | ||
| 943 | u32 cbaddr = 0; | ||
| 944 | u16 cbport = 0; | ||
| 945 | u32 addrlen = addr_len; | ||
| 946 | char *addr = addr_val; | ||
| 947 | int i, shift; | ||
| 948 | |||
| 949 | /* ipaddress */ | ||
| 950 | shift = 24; | ||
| 951 | for(i = 4; i > 0 ; i--) { | ||
| 952 | if ((temp = parse_octet(&addrlen, &addr)) < 0) { | ||
| 953 | return 0; | ||
| 954 | } | ||
| 955 | cbaddr |= (temp << shift); | ||
| 956 | if (shift > 0) | ||
| 957 | shift -= 8; | ||
| 958 | } | ||
| 959 | *cbaddrp = cbaddr; | ||
| 960 | |||
| 961 | /* port */ | ||
| 962 | shift = 8; | ||
| 963 | for(i = 2; i > 0 ; i--) { | ||
| 964 | if ((temp = parse_octet(&addrlen, &addr)) < 0) { | ||
| 965 | return 0; | ||
| 966 | } | ||
| 967 | cbport |= (temp << shift); | ||
| 968 | if (shift > 0) | ||
| 969 | shift -= 8; | ||
| 970 | } | ||
| 971 | *cbportp = cbport; | ||
| 972 | return 1; | ||
| 973 | } | ||
| 974 | |||
| 975 | static void | 971 | static void |
| 976 | gen_callback(struct nfs4_client *clp, struct nfsd4_setclientid *se) | 972 | gen_callback(struct nfs4_client *clp, struct nfsd4_setclientid *se, u32 scopeid) |
| 977 | { | 973 | { |
| 978 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; | 974 | struct nfs4_cb_conn *cb = &clp->cl_cb_conn; |
| 979 | 975 | unsigned short expected_family; | |
| 980 | /* Currently, we only support tcp for the callback channel */ | 976 | |
| 981 | if ((se->se_callback_netid_len != 3) || memcmp((char *)se->se_callback_netid_val, "tcp", 3)) | 977 | /* Currently, we only support tcp and tcp6 for the callback channel */ |
| 978 | if (se->se_callback_netid_len == 3 && | ||
| 979 | !memcmp(se->se_callback_netid_val, "tcp", 3)) | ||
| 980 | expected_family = AF_INET; | ||
| 981 | else if (se->se_callback_netid_len == 4 && | ||
| 982 | !memcmp(se->se_callback_netid_val, "tcp6", 4)) | ||
| 983 | expected_family = AF_INET6; | ||
| 984 | else | ||
| 982 | goto out_err; | 985 | goto out_err; |
| 983 | 986 | ||
| 984 | if ( !(parse_ipv4(se->se_callback_addr_len, se->se_callback_addr_val, | 987 | cb->cb_addrlen = rpc_uaddr2sockaddr(se->se_callback_addr_val, |
| 985 | &cb->cb_addr, &cb->cb_port))) | 988 | se->se_callback_addr_len, |
| 989 | (struct sockaddr *) &cb->cb_addr, | ||
| 990 | sizeof(cb->cb_addr)); | ||
| 991 | |||
| 992 | if (!cb->cb_addrlen || cb->cb_addr.ss_family != expected_family) | ||
| 986 | goto out_err; | 993 | goto out_err; |
| 994 | |||
| 995 | if (cb->cb_addr.ss_family == AF_INET6) | ||
| 996 | ((struct sockaddr_in6 *) &cb->cb_addr)->sin6_scope_id = scopeid; | ||
| 997 | |||
| 987 | cb->cb_minorversion = 0; | 998 | cb->cb_minorversion = 0; |
| 988 | cb->cb_prog = se->se_callback_prog; | 999 | cb->cb_prog = se->se_callback_prog; |
| 989 | cb->cb_ident = se->se_callback_ident; | 1000 | cb->cb_ident = se->se_callback_ident; |
| 990 | return; | 1001 | return; |
| 991 | out_err: | 1002 | out_err: |
| 1003 | cb->cb_addr.ss_family = AF_UNSPEC; | ||
| 1004 | cb->cb_addrlen = 0; | ||
| 992 | dprintk(KERN_INFO "NFSD: this client (clientid %08x/%08x) " | 1005 | dprintk(KERN_INFO "NFSD: this client (clientid %08x/%08x) " |
| 993 | "will not receive delegations\n", | 1006 | "will not receive delegations\n", |
| 994 | clp->cl_clientid.cl_boot, clp->cl_clientid.cl_id); | 1007 | clp->cl_clientid.cl_boot, clp->cl_clientid.cl_id); |
| @@ -996,175 +1009,87 @@ out_err: | |||
| 996 | return; | 1009 | return; |
| 997 | } | 1010 | } |
| 998 | 1011 | ||
| 999 | void | ||
| 1000 | nfsd4_set_statp(struct svc_rqst *rqstp, __be32 *statp) | ||
| 1001 | { | ||
| 1002 | struct nfsd4_compoundres *resp = rqstp->rq_resp; | ||
| 1003 | |||
| 1004 | resp->cstate.statp = statp; | ||
| 1005 | } | ||
| 1006 | |||
| 1007 | /* | 1012 | /* |
| 1008 | * Dereference the result pages. | 1013 | * Cache a reply. nfsd4_check_drc_limit() has bounded the cache size. |
| 1009 | */ | 1014 | */ |
| 1010 | static void | 1015 | void |
| 1011 | nfsd4_release_respages(struct page **respages, short resused) | 1016 | nfsd4_store_cache_entry(struct nfsd4_compoundres *resp) |
| 1012 | { | 1017 | { |
| 1013 | int i; | 1018 | struct nfsd4_slot *slot = resp->cstate.slot; |
| 1019 | unsigned int base; | ||
| 1014 | 1020 | ||
| 1015 | dprintk("--> %s\n", __func__); | 1021 | dprintk("--> %s slot %p\n", __func__, slot); |
| 1016 | for (i = 0; i < resused; i++) { | ||
| 1017 | if (!respages[i]) | ||
| 1018 | continue; | ||
| 1019 | put_page(respages[i]); | ||
| 1020 | respages[i] = NULL; | ||
| 1021 | } | ||
| 1022 | } | ||
| 1023 | 1022 | ||
| 1024 | static void | 1023 | slot->sl_opcnt = resp->opcnt; |
| 1025 | nfsd4_copy_pages(struct page **topages, struct page **frompages, short count) | 1024 | slot->sl_status = resp->cstate.status; |
| 1026 | { | ||
| 1027 | int i; | ||
| 1028 | 1025 | ||
| 1029 | for (i = 0; i < count; i++) { | 1026 | if (nfsd4_not_cached(resp)) { |
| 1030 | topages[i] = frompages[i]; | 1027 | slot->sl_datalen = 0; |
| 1031 | if (!topages[i]) | 1028 | return; |
| 1032 | continue; | ||
| 1033 | get_page(topages[i]); | ||
| 1034 | } | 1029 | } |
| 1030 | slot->sl_datalen = (char *)resp->p - (char *)resp->cstate.datap; | ||
| 1031 | base = (char *)resp->cstate.datap - | ||
| 1032 | (char *)resp->xbuf->head[0].iov_base; | ||
| 1033 | if (read_bytes_from_xdr_buf(resp->xbuf, base, slot->sl_data, | ||
| 1034 | slot->sl_datalen)) | ||
| 1035 | WARN("%s: sessions DRC could not cache compound\n", __func__); | ||
| 1036 | return; | ||
| 1035 | } | 1037 | } |
| 1036 | 1038 | ||
| 1037 | /* | 1039 | /* |
| 1038 | * Cache the reply pages up to NFSD_PAGES_PER_SLOT + 1, clearing the previous | 1040 | * Encode the replay sequence operation from the slot values. |
| 1039 | * pages. We add a page to NFSD_PAGES_PER_SLOT for the case where the total | 1041 | * If cachethis is FALSE encode the uncached rep error on the next |
| 1040 | * length of the XDR response is less than se_fmaxresp_cached | 1042 | * operation which sets resp->p and increments resp->opcnt for |
| 1041 | * (NFSD_PAGES_PER_SLOT * PAGE_SIZE) but the xdr_buf pages is used for a | 1043 | * nfs4svc_encode_compoundres. |
| 1042 | * of the reply (e.g. readdir). | ||
| 1043 | * | 1044 | * |
| 1044 | * Store the base and length of the rq_req.head[0] page | ||
| 1045 | * of the NFSv4.1 data, just past the rpc header. | ||
| 1046 | */ | 1045 | */ |
| 1047 | void | 1046 | static __be32 |
| 1048 | nfsd4_store_cache_entry(struct nfsd4_compoundres *resp) | 1047 | nfsd4_enc_sequence_replay(struct nfsd4_compoundargs *args, |
| 1048 | struct nfsd4_compoundres *resp) | ||
| 1049 | { | 1049 | { |
| 1050 | struct nfsd4_cache_entry *entry = &resp->cstate.slot->sl_cache_entry; | 1050 | struct nfsd4_op *op; |
| 1051 | struct svc_rqst *rqstp = resp->rqstp; | 1051 | struct nfsd4_slot *slot = resp->cstate.slot; |
| 1052 | struct nfsd4_compoundargs *args = rqstp->rq_argp; | ||
| 1053 | struct nfsd4_op *op = &args->ops[resp->opcnt]; | ||
| 1054 | struct kvec *resv = &rqstp->rq_res.head[0]; | ||
| 1055 | |||
| 1056 | dprintk("--> %s entry %p\n", __func__, entry); | ||
| 1057 | |||
| 1058 | /* Don't cache a failed OP_SEQUENCE. */ | ||
| 1059 | if (resp->opcnt == 1 && op->opnum == OP_SEQUENCE && resp->cstate.status) | ||
| 1060 | return; | ||
| 1061 | 1052 | ||
| 1062 | nfsd4_release_respages(entry->ce_respages, entry->ce_resused); | 1053 | dprintk("--> %s resp->opcnt %d cachethis %u \n", __func__, |
| 1063 | entry->ce_opcnt = resp->opcnt; | 1054 | resp->opcnt, resp->cstate.slot->sl_cachethis); |
| 1064 | entry->ce_status = resp->cstate.status; | ||
| 1065 | 1055 | ||
| 1066 | /* | 1056 | /* Encode the replayed sequence operation */ |
| 1067 | * Don't need a page to cache just the sequence operation - the slot | 1057 | op = &args->ops[resp->opcnt - 1]; |
| 1068 | * does this for us! | 1058 | nfsd4_encode_operation(resp, op); |
| 1069 | */ | ||
| 1070 | 1059 | ||
| 1071 | if (nfsd4_not_cached(resp)) { | 1060 | /* Return nfserr_retry_uncached_rep in next operation. */ |
| 1072 | entry->ce_resused = 0; | 1061 | if (args->opcnt > 1 && slot->sl_cachethis == 0) { |
| 1073 | entry->ce_rpchdrlen = 0; | 1062 | op = &args->ops[resp->opcnt++]; |
| 1074 | dprintk("%s Just cache SEQUENCE. ce_cachethis %d\n", __func__, | 1063 | op->status = nfserr_retry_uncached_rep; |
| 1075 | resp->cstate.slot->sl_cache_entry.ce_cachethis); | 1064 | nfsd4_encode_operation(resp, op); |
| 1076 | return; | ||
| 1077 | } | ||
| 1078 | entry->ce_resused = rqstp->rq_resused; | ||
| 1079 | if (entry->ce_resused > NFSD_PAGES_PER_SLOT + 1) | ||
| 1080 | entry->ce_resused = NFSD_PAGES_PER_SLOT + 1; | ||
| 1081 | nfsd4_copy_pages(entry->ce_respages, rqstp->rq_respages, | ||
| 1082 | entry->ce_resused); | ||
| 1083 | entry->ce_datav.iov_base = resp->cstate.statp; | ||
| 1084 | entry->ce_datav.iov_len = resv->iov_len - ((char *)resp->cstate.statp - | ||
| 1085 | (char *)page_address(rqstp->rq_respages[0])); | ||
| 1086 | /* Current request rpc header length*/ | ||
| 1087 | entry->ce_rpchdrlen = (char *)resp->cstate.statp - | ||
| 1088 | (char *)page_address(rqstp->rq_respages[0]); | ||
| 1089 | } | ||
| 1090 | |||
| 1091 | /* | ||
| 1092 | * We keep the rpc header, but take the nfs reply from the replycache. | ||
| 1093 | */ | ||
| 1094 | static int | ||
| 1095 | nfsd41_copy_replay_data(struct nfsd4_compoundres *resp, | ||
| 1096 | struct nfsd4_cache_entry *entry) | ||
| 1097 | { | ||
| 1098 | struct svc_rqst *rqstp = resp->rqstp; | ||
| 1099 | struct kvec *resv = &resp->rqstp->rq_res.head[0]; | ||
| 1100 | int len; | ||
| 1101 | |||
| 1102 | /* Current request rpc header length*/ | ||
| 1103 | len = (char *)resp->cstate.statp - | ||
| 1104 | (char *)page_address(rqstp->rq_respages[0]); | ||
| 1105 | if (entry->ce_datav.iov_len + len > PAGE_SIZE) { | ||
| 1106 | dprintk("%s v41 cached reply too large (%Zd).\n", __func__, | ||
| 1107 | entry->ce_datav.iov_len); | ||
| 1108 | return 0; | ||
| 1109 | } | 1065 | } |
| 1110 | /* copy the cached reply nfsd data past the current rpc header */ | 1066 | return op->status; |
| 1111 | memcpy((char *)resv->iov_base + len, entry->ce_datav.iov_base, | ||
| 1112 | entry->ce_datav.iov_len); | ||
| 1113 | resv->iov_len = len + entry->ce_datav.iov_len; | ||
| 1114 | return 1; | ||
| 1115 | } | 1067 | } |
| 1116 | 1068 | ||
| 1117 | /* | 1069 | /* |
| 1118 | * Keep the first page of the replay. Copy the NFSv4.1 data from the first | 1070 | * The sequence operation is not cached because we can use the slot and |
| 1119 | * cached page. Replace any futher replay pages from the cache. | 1071 | * session values. |
| 1120 | */ | 1072 | */ |
| 1121 | __be32 | 1073 | __be32 |
| 1122 | nfsd4_replay_cache_entry(struct nfsd4_compoundres *resp, | 1074 | nfsd4_replay_cache_entry(struct nfsd4_compoundres *resp, |
| 1123 | struct nfsd4_sequence *seq) | 1075 | struct nfsd4_sequence *seq) |
| 1124 | { | 1076 | { |
| 1125 | struct nfsd4_cache_entry *entry = &resp->cstate.slot->sl_cache_entry; | 1077 | struct nfsd4_slot *slot = resp->cstate.slot; |
| 1126 | __be32 status; | 1078 | __be32 status; |
| 1127 | 1079 | ||
| 1128 | dprintk("--> %s entry %p\n", __func__, entry); | 1080 | dprintk("--> %s slot %p\n", __func__, slot); |
| 1129 | |||
| 1130 | /* | ||
| 1131 | * If this is just the sequence operation, we did not keep | ||
| 1132 | * a page in the cache entry because we can just use the | ||
| 1133 | * slot info stored in struct nfsd4_sequence that was checked | ||
| 1134 | * against the slot in nfsd4_sequence(). | ||
| 1135 | * | ||
| 1136 | * This occurs when seq->cachethis is FALSE, or when the client | ||
| 1137 | * session inactivity timer fires and a solo sequence operation | ||
| 1138 | * is sent (lease renewal). | ||
| 1139 | */ | ||
| 1140 | if (seq && nfsd4_not_cached(resp)) { | ||
| 1141 | seq->maxslots = resp->cstate.session->se_fchannel.maxreqs; | ||
| 1142 | return nfs_ok; | ||
| 1143 | } | ||
| 1144 | |||
| 1145 | if (!nfsd41_copy_replay_data(resp, entry)) { | ||
| 1146 | /* | ||
| 1147 | * Not enough room to use the replay rpc header, send the | ||
| 1148 | * cached header. Release all the allocated result pages. | ||
| 1149 | */ | ||
| 1150 | svc_free_res_pages(resp->rqstp); | ||
| 1151 | nfsd4_copy_pages(resp->rqstp->rq_respages, entry->ce_respages, | ||
| 1152 | entry->ce_resused); | ||
| 1153 | } else { | ||
| 1154 | /* Release all but the first allocated result page */ | ||
| 1155 | 1081 | ||
| 1156 | resp->rqstp->rq_resused--; | 1082 | /* Either returns 0 or nfserr_retry_uncached */ |
| 1157 | svc_free_res_pages(resp->rqstp); | 1083 | status = nfsd4_enc_sequence_replay(resp->rqstp->rq_argp, resp); |
| 1084 | if (status == nfserr_retry_uncached_rep) | ||
| 1085 | return status; | ||
| 1158 | 1086 | ||
| 1159 | nfsd4_copy_pages(&resp->rqstp->rq_respages[1], | 1087 | /* The sequence operation has been encoded, cstate->datap set. */ |
| 1160 | &entry->ce_respages[1], | 1088 | memcpy(resp->cstate.datap, slot->sl_data, slot->sl_datalen); |
| 1161 | entry->ce_resused - 1); | ||
| 1162 | } | ||
| 1163 | 1089 | ||
| 1164 | resp->rqstp->rq_resused = entry->ce_resused; | 1090 | resp->opcnt = slot->sl_opcnt; |
| 1165 | resp->opcnt = entry->ce_opcnt; | 1091 | resp->p = resp->cstate.datap + XDR_QUADLEN(slot->sl_datalen); |
| 1166 | resp->cstate.iovlen = entry->ce_datav.iov_len + entry->ce_rpchdrlen; | 1092 | status = slot->sl_status; |
| 1167 | status = entry->ce_status; | ||
| 1168 | 1093 | ||
| 1169 | return status; | 1094 | return status; |
| 1170 | } | 1095 | } |
| @@ -1194,13 +1119,15 @@ nfsd4_exchange_id(struct svc_rqst *rqstp, | |||
| 1194 | int status; | 1119 | int status; |
| 1195 | unsigned int strhashval; | 1120 | unsigned int strhashval; |
| 1196 | char dname[HEXDIR_LEN]; | 1121 | char dname[HEXDIR_LEN]; |
| 1122 | char addr_str[INET6_ADDRSTRLEN]; | ||
| 1197 | nfs4_verifier verf = exid->verifier; | 1123 | nfs4_verifier verf = exid->verifier; |
| 1198 | u32 ip_addr = svc_addr_in(rqstp)->sin_addr.s_addr; | 1124 | struct sockaddr *sa = svc_addr(rqstp); |
| 1199 | 1125 | ||
| 1126 | rpc_ntop(sa, addr_str, sizeof(addr_str)); | ||
| 1200 | dprintk("%s rqstp=%p exid=%p clname.len=%u clname.data=%p " | 1127 | dprintk("%s rqstp=%p exid=%p clname.len=%u clname.data=%p " |
| 1201 | " ip_addr=%u flags %x, spa_how %d\n", | 1128 | "ip_addr=%s flags %x, spa_how %d\n", |
| 1202 | __func__, rqstp, exid, exid->clname.len, exid->clname.data, | 1129 | __func__, rqstp, exid, exid->clname.len, exid->clname.data, |
| 1203 | ip_addr, exid->flags, exid->spa_how); | 1130 | addr_str, exid->flags, exid->spa_how); |
| 1204 | 1131 | ||
| 1205 | if (!check_name(exid->clname) || (exid->flags & ~EXCHGID4_FLAG_MASK_A)) | 1132 | if (!check_name(exid->clname) || (exid->flags & ~EXCHGID4_FLAG_MASK_A)) |
| 1206 | return nfserr_inval; | 1133 | return nfserr_inval; |
| @@ -1281,28 +1208,23 @@ nfsd4_exchange_id(struct svc_rqst *rqstp, | |||
| 1281 | 1208 | ||
| 1282 | out_new: | 1209 | out_new: |
| 1283 | /* Normal case */ | 1210 | /* Normal case */ |
| 1284 | new = create_client(exid->clname, dname); | 1211 | new = create_client(exid->clname, dname, rqstp, &verf); |
| 1285 | if (new == NULL) { | 1212 | if (new == NULL) { |
| 1286 | status = nfserr_resource; | 1213 | status = nfserr_serverfault; |
| 1287 | goto out; | 1214 | goto out; |
| 1288 | } | 1215 | } |
| 1289 | 1216 | ||
| 1290 | copy_verf(new, &verf); | ||
| 1291 | copy_cred(&new->cl_cred, &rqstp->rq_cred); | ||
| 1292 | new->cl_addr = ip_addr; | ||
| 1293 | gen_clid(new); | 1217 | gen_clid(new); |
| 1294 | gen_confirm(new); | ||
| 1295 | add_to_unconfirmed(new, strhashval); | 1218 | add_to_unconfirmed(new, strhashval); |
| 1296 | out_copy: | 1219 | out_copy: |
| 1297 | exid->clientid.cl_boot = new->cl_clientid.cl_boot; | 1220 | exid->clientid.cl_boot = new->cl_clientid.cl_boot; |
| 1298 | exid->clientid.cl_id = new->cl_clientid.cl_id; | 1221 | exid->clientid.cl_id = new->cl_clientid.cl_id; |
| 1299 | 1222 | ||
| 1300 | new->cl_slot.sl_seqid = 0; | ||
| 1301 | exid->seqid = 1; | 1223 | exid->seqid = 1; |
| 1302 | nfsd4_set_ex_flags(new, exid); | 1224 | nfsd4_set_ex_flags(new, exid); |
| 1303 | 1225 | ||
| 1304 | dprintk("nfsd4_exchange_id seqid %d flags %x\n", | 1226 | dprintk("nfsd4_exchange_id seqid %d flags %x\n", |
| 1305 | new->cl_slot.sl_seqid, new->cl_exchange_flags); | 1227 | new->cl_cs_slot.sl_seqid, new->cl_exchange_flags); |
| 1306 | status = nfs_ok; | 1228 | status = nfs_ok; |
| 1307 | 1229 | ||
| 1308 | out: | 1230 | out: |
| @@ -1313,40 +1235,60 @@ error: | |||
| 1313 | } | 1235 | } |
| 1314 | 1236 | ||
| 1315 | static int | 1237 | static int |
| 1316 | check_slot_seqid(u32 seqid, struct nfsd4_slot *slot) | 1238 | check_slot_seqid(u32 seqid, u32 slot_seqid, int slot_inuse) |
| 1317 | { | 1239 | { |
| 1318 | dprintk("%s enter. seqid %d slot->sl_seqid %d\n", __func__, seqid, | 1240 | dprintk("%s enter. seqid %d slot_seqid %d\n", __func__, seqid, |
| 1319 | slot->sl_seqid); | 1241 | slot_seqid); |
| 1320 | 1242 | ||
| 1321 | /* The slot is in use, and no response has been sent. */ | 1243 | /* The slot is in use, and no response has been sent. */ |
| 1322 | if (slot->sl_inuse) { | 1244 | if (slot_inuse) { |
| 1323 | if (seqid == slot->sl_seqid) | 1245 | if (seqid == slot_seqid) |
| 1324 | return nfserr_jukebox; | 1246 | return nfserr_jukebox; |
| 1325 | else | 1247 | else |
| 1326 | return nfserr_seq_misordered; | 1248 | return nfserr_seq_misordered; |
| 1327 | } | 1249 | } |
| 1328 | /* Normal */ | 1250 | /* Normal */ |
| 1329 | if (likely(seqid == slot->sl_seqid + 1)) | 1251 | if (likely(seqid == slot_seqid + 1)) |
| 1330 | return nfs_ok; | 1252 | return nfs_ok; |
| 1331 | /* Replay */ | 1253 | /* Replay */ |
| 1332 | if (seqid == slot->sl_seqid) | 1254 | if (seqid == slot_seqid) |
| 1333 | return nfserr_replay_cache; | 1255 | return nfserr_replay_cache; |
| 1334 | /* Wraparound */ | 1256 | /* Wraparound */ |
| 1335 | if (seqid == 1 && (slot->sl_seqid + 1) == 0) | 1257 | if (seqid == 1 && (slot_seqid + 1) == 0) |
| 1336 | return nfs_ok; | 1258 | return nfs_ok; |
| 1337 | /* Misordered replay or misordered new request */ | 1259 | /* Misordered replay or misordered new request */ |
| 1338 | return nfserr_seq_misordered; | 1260 | return nfserr_seq_misordered; |
| 1339 | } | 1261 | } |
| 1340 | 1262 | ||
| 1263 | /* | ||
| 1264 | * Cache the create session result into the create session single DRC | ||
| 1265 | * slot cache by saving the xdr structure. sl_seqid has been set. | ||
| 1266 | * Do this for solo or embedded create session operations. | ||
| 1267 | */ | ||
| 1268 | static void | ||
| 1269 | nfsd4_cache_create_session(struct nfsd4_create_session *cr_ses, | ||
| 1270 | struct nfsd4_clid_slot *slot, int nfserr) | ||
| 1271 | { | ||
| 1272 | slot->sl_status = nfserr; | ||
| 1273 | memcpy(&slot->sl_cr_ses, cr_ses, sizeof(*cr_ses)); | ||
| 1274 | } | ||
| 1275 | |||
| 1276 | static __be32 | ||
| 1277 | nfsd4_replay_create_session(struct nfsd4_create_session *cr_ses, | ||
| 1278 | struct nfsd4_clid_slot *slot) | ||
| 1279 | { | ||
| 1280 | memcpy(cr_ses, &slot->sl_cr_ses, sizeof(*cr_ses)); | ||
| 1281 | return slot->sl_status; | ||
| 1282 | } | ||
| 1283 | |||
| 1341 | __be32 | 1284 | __be32 |
| 1342 | nfsd4_create_session(struct svc_rqst *rqstp, | 1285 | nfsd4_create_session(struct svc_rqst *rqstp, |
| 1343 | struct nfsd4_compound_state *cstate, | 1286 | struct nfsd4_compound_state *cstate, |
| 1344 | struct nfsd4_create_session *cr_ses) | 1287 | struct nfsd4_create_session *cr_ses) |
| 1345 | { | 1288 | { |
| 1346 | u32 ip_addr = svc_addr_in(rqstp)->sin_addr.s_addr; | 1289 | struct sockaddr *sa = svc_addr(rqstp); |
| 1347 | struct nfsd4_compoundres *resp = rqstp->rq_resp; | ||
| 1348 | struct nfs4_client *conf, *unconf; | 1290 | struct nfs4_client *conf, *unconf; |
| 1349 | struct nfsd4_slot *slot = NULL; | 1291 | struct nfsd4_clid_slot *cs_slot = NULL; |
| 1350 | int status = 0; | 1292 | int status = 0; |
| 1351 | 1293 | ||
| 1352 | nfs4_lock_state(); | 1294 | nfs4_lock_state(); |
| @@ -1354,40 +1296,38 @@ nfsd4_create_session(struct svc_rqst *rqstp, | |||
| 1354 | conf = find_confirmed_client(&cr_ses->clientid); | 1296 | conf = find_confirmed_client(&cr_ses->clientid); |
| 1355 | 1297 | ||
| 1356 | if (conf) { | 1298 | if (conf) { |
| 1357 | slot = &conf->cl_slot; | 1299 | cs_slot = &conf->cl_cs_slot; |
| 1358 | status = check_slot_seqid(cr_ses->seqid, slot); | 1300 | status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); |
| 1359 | if (status == nfserr_replay_cache) { | 1301 | if (status == nfserr_replay_cache) { |
| 1360 | dprintk("Got a create_session replay! seqid= %d\n", | 1302 | dprintk("Got a create_session replay! seqid= %d\n", |
| 1361 | slot->sl_seqid); | 1303 | cs_slot->sl_seqid); |
| 1362 | cstate->slot = slot; | ||
| 1363 | cstate->status = status; | ||
| 1364 | /* Return the cached reply status */ | 1304 | /* Return the cached reply status */ |
| 1365 | status = nfsd4_replay_cache_entry(resp, NULL); | 1305 | status = nfsd4_replay_create_session(cr_ses, cs_slot); |
| 1366 | goto out; | 1306 | goto out; |
| 1367 | } else if (cr_ses->seqid != conf->cl_slot.sl_seqid + 1) { | 1307 | } else if (cr_ses->seqid != cs_slot->sl_seqid + 1) { |
| 1368 | status = nfserr_seq_misordered; | 1308 | status = nfserr_seq_misordered; |
| 1369 | dprintk("Sequence misordered!\n"); | 1309 | dprintk("Sequence misordered!\n"); |
| 1370 | dprintk("Expected seqid= %d but got seqid= %d\n", | 1310 | dprintk("Expected seqid= %d but got seqid= %d\n", |
| 1371 | slot->sl_seqid, cr_ses->seqid); | 1311 | cs_slot->sl_seqid, cr_ses->seqid); |
| 1372 | goto out; | 1312 | goto out; |
| 1373 | } | 1313 | } |
| 1374 | conf->cl_slot.sl_seqid++; | 1314 | cs_slot->sl_seqid++; |
| 1375 | } else if (unconf) { | 1315 | } else if (unconf) { |
| 1376 | if (!same_creds(&unconf->cl_cred, &rqstp->rq_cred) || | 1316 | if (!same_creds(&unconf->cl_cred, &rqstp->rq_cred) || |
| 1377 | (ip_addr != unconf->cl_addr)) { | 1317 | !rpc_cmp_addr(sa, (struct sockaddr *) &unconf->cl_addr)) { |
| 1378 | status = nfserr_clid_inuse; | 1318 | status = nfserr_clid_inuse; |
| 1379 | goto out; | 1319 | goto out; |
| 1380 | } | 1320 | } |
| 1381 | 1321 | ||
| 1382 | slot = &unconf->cl_slot; | 1322 | cs_slot = &unconf->cl_cs_slot; |
| 1383 | status = check_slot_seqid(cr_ses->seqid, slot); | 1323 | status = check_slot_seqid(cr_ses->seqid, cs_slot->sl_seqid, 0); |
| 1384 | if (status) { | 1324 | if (status) { |
| 1385 | /* an unconfirmed replay returns misordered */ | 1325 | /* an unconfirmed replay returns misordered */ |
| 1386 | status = nfserr_seq_misordered; | 1326 | status = nfserr_seq_misordered; |
| 1387 | goto out; | 1327 | goto out_cache; |
| 1388 | } | 1328 | } |
| 1389 | 1329 | ||
| 1390 | slot->sl_seqid++; /* from 0 to 1 */ | 1330 | cs_slot->sl_seqid++; /* from 0 to 1 */ |
| 1391 | move_to_confirmed(unconf); | 1331 | move_to_confirmed(unconf); |
| 1392 | 1332 | ||
| 1393 | /* | 1333 | /* |
| @@ -1396,6 +1336,19 @@ nfsd4_create_session(struct svc_rqst *rqstp, | |||
| 1396 | cr_ses->flags &= ~SESSION4_PERSIST; | 1336 | cr_ses->flags &= ~SESSION4_PERSIST; |
| 1397 | cr_ses->flags &= ~SESSION4_RDMA; | 1337 | cr_ses->flags &= ~SESSION4_RDMA; |
| 1398 | 1338 | ||
| 1339 | if (cr_ses->flags & SESSION4_BACK_CHAN) { | ||
| 1340 | unconf->cl_cb_xprt = rqstp->rq_xprt; | ||
| 1341 | svc_xprt_get(unconf->cl_cb_xprt); | ||
| 1342 | rpc_copy_addr( | ||
| 1343 | (struct sockaddr *)&unconf->cl_cb_conn.cb_addr, | ||
| 1344 | sa); | ||
| 1345 | unconf->cl_cb_conn.cb_addrlen = svc_addr_len(sa); | ||
| 1346 | unconf->cl_cb_conn.cb_minorversion = | ||
| 1347 | cstate->minorversion; | ||
| 1348 | unconf->cl_cb_conn.cb_prog = cr_ses->callback_prog; | ||
| 1349 | unconf->cl_cb_seq_nr = 1; | ||
| 1350 | nfsd4_probe_callback(unconf); | ||
| 1351 | } | ||
| 1399 | conf = unconf; | 1352 | conf = unconf; |
| 1400 | } else { | 1353 | } else { |
| 1401 | status = nfserr_stale_clientid; | 1354 | status = nfserr_stale_clientid; |
| @@ -1408,12 +1361,11 @@ nfsd4_create_session(struct svc_rqst *rqstp, | |||
| 1408 | 1361 | ||
| 1409 | memcpy(cr_ses->sessionid.data, conf->cl_sessionid.data, | 1362 | memcpy(cr_ses->sessionid.data, conf->cl_sessionid.data, |
| 1410 | NFS4_MAX_SESSIONID_LEN); | 1363 | NFS4_MAX_SESSIONID_LEN); |
| 1411 | cr_ses->seqid = slot->sl_seqid; | 1364 | cr_ses->seqid = cs_slot->sl_seqid; |
| 1412 | 1365 | ||
| 1413 | slot->sl_inuse = true; | 1366 | out_cache: |
| 1414 | cstate->slot = slot; | 1367 | /* cache solo and embedded create sessions under the state lock */ |
| 1415 | /* Ensure a page is used for the cache */ | 1368 | nfsd4_cache_create_session(cr_ses, cs_slot, status); |
| 1416 | slot->sl_cache_entry.ce_cachethis = 1; | ||
| 1417 | out: | 1369 | out: |
| 1418 | nfs4_unlock_state(); | 1370 | nfs4_unlock_state(); |
| 1419 | dprintk("%s returns %d\n", __func__, ntohl(status)); | 1371 | dprintk("%s returns %d\n", __func__, ntohl(status)); |
| @@ -1478,18 +1430,23 @@ nfsd4_sequence(struct svc_rqst *rqstp, | |||
| 1478 | if (seq->slotid >= session->se_fchannel.maxreqs) | 1430 | if (seq->slotid >= session->se_fchannel.maxreqs) |
| 1479 | goto out; | 1431 | goto out; |
| 1480 | 1432 | ||
| 1481 | slot = &session->se_slots[seq->slotid]; | 1433 | slot = session->se_slots[seq->slotid]; |
| 1482 | dprintk("%s: slotid %d\n", __func__, seq->slotid); | 1434 | dprintk("%s: slotid %d\n", __func__, seq->slotid); |
| 1483 | 1435 | ||
| 1484 | status = check_slot_seqid(seq->seqid, slot); | 1436 | /* We do not negotiate the number of slots yet, so set the |
| 1437 | * maxslots to the session maxreqs which is used to encode | ||
| 1438 | * sr_highest_slotid and the sr_target_slot id to maxslots */ | ||
| 1439 | seq->maxslots = session->se_fchannel.maxreqs; | ||
| 1440 | |||
| 1441 | status = check_slot_seqid(seq->seqid, slot->sl_seqid, slot->sl_inuse); | ||
| 1485 | if (status == nfserr_replay_cache) { | 1442 | if (status == nfserr_replay_cache) { |
| 1486 | cstate->slot = slot; | 1443 | cstate->slot = slot; |
| 1487 | cstate->session = session; | 1444 | cstate->session = session; |
| 1488 | /* Return the cached reply status and set cstate->status | 1445 | /* Return the cached reply status and set cstate->status |
| 1489 | * for nfsd4_svc_encode_compoundres processing */ | 1446 | * for nfsd4_proc_compound processing */ |
| 1490 | status = nfsd4_replay_cache_entry(resp, seq); | 1447 | status = nfsd4_replay_cache_entry(resp, seq); |
| 1491 | cstate->status = nfserr_replay_cache; | 1448 | cstate->status = nfserr_replay_cache; |
| 1492 | goto replay_cache; | 1449 | goto out; |
| 1493 | } | 1450 | } |
| 1494 | if (status) | 1451 | if (status) |
| 1495 | goto out; | 1452 | goto out; |
| @@ -1497,23 +1454,23 @@ nfsd4_sequence(struct svc_rqst *rqstp, | |||
| 1497 | /* Success! bump slot seqid */ | 1454 | /* Success! bump slot seqid */ |
| 1498 | slot->sl_inuse = true; | 1455 | slot->sl_inuse = true; |
| 1499 | slot->sl_seqid = seq->seqid; | 1456 | slot->sl_seqid = seq->seqid; |
| 1500 | slot->sl_cache_entry.ce_cachethis = seq->cachethis; | 1457 | slot->sl_cachethis = seq->cachethis; |
| 1501 | /* Always set the cache entry cachethis for solo sequence */ | ||
| 1502 | if (nfsd4_is_solo_sequence(resp)) | ||
| 1503 | slot->sl_cache_entry.ce_cachethis = 1; | ||
| 1504 | 1458 | ||
| 1505 | cstate->slot = slot; | 1459 | cstate->slot = slot; |
| 1506 | cstate->session = session; | 1460 | cstate->session = session; |
| 1507 | 1461 | ||
| 1508 | replay_cache: | 1462 | /* Hold a session reference until done processing the compound: |
| 1509 | /* Renew the clientid on success and on replay. | ||
| 1510 | * Hold a session reference until done processing the compound: | ||
| 1511 | * nfsd4_put_session called only if the cstate slot is set. | 1463 | * nfsd4_put_session called only if the cstate slot is set. |
| 1512 | */ | 1464 | */ |
| 1513 | renew_client(session->se_client); | ||
| 1514 | nfsd4_get_session(session); | 1465 | nfsd4_get_session(session); |
| 1515 | out: | 1466 | out: |
| 1516 | spin_unlock(&sessionid_lock); | 1467 | spin_unlock(&sessionid_lock); |
| 1468 | /* Renew the clientid on success and on replay */ | ||
| 1469 | if (cstate->session) { | ||
| 1470 | nfs4_lock_state(); | ||
| 1471 | renew_client(session->se_client); | ||
| 1472 | nfs4_unlock_state(); | ||
| 1473 | } | ||
| 1517 | dprintk("%s: return %d\n", __func__, ntohl(status)); | 1474 | dprintk("%s: return %d\n", __func__, ntohl(status)); |
| 1518 | return status; | 1475 | return status; |
| 1519 | } | 1476 | } |
| @@ -1522,7 +1479,7 @@ __be32 | |||
| 1522 | nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | 1479 | nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, |
| 1523 | struct nfsd4_setclientid *setclid) | 1480 | struct nfsd4_setclientid *setclid) |
| 1524 | { | 1481 | { |
| 1525 | struct sockaddr_in *sin = svc_addr_in(rqstp); | 1482 | struct sockaddr *sa = svc_addr(rqstp); |
| 1526 | struct xdr_netobj clname = { | 1483 | struct xdr_netobj clname = { |
| 1527 | .len = setclid->se_namelen, | 1484 | .len = setclid->se_namelen, |
| 1528 | .data = setclid->se_name, | 1485 | .data = setclid->se_name, |
| @@ -1531,7 +1488,6 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1531 | unsigned int strhashval; | 1488 | unsigned int strhashval; |
| 1532 | struct nfs4_client *conf, *unconf, *new; | 1489 | struct nfs4_client *conf, *unconf, *new; |
| 1533 | __be32 status; | 1490 | __be32 status; |
| 1534 | char *princ; | ||
| 1535 | char dname[HEXDIR_LEN]; | 1491 | char dname[HEXDIR_LEN]; |
| 1536 | 1492 | ||
| 1537 | if (!check_name(clname)) | 1493 | if (!check_name(clname)) |
| @@ -1554,8 +1510,11 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1554 | /* RFC 3530 14.2.33 CASE 0: */ | 1510 | /* RFC 3530 14.2.33 CASE 0: */ |
| 1555 | status = nfserr_clid_inuse; | 1511 | status = nfserr_clid_inuse; |
| 1556 | if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) { | 1512 | if (!same_creds(&conf->cl_cred, &rqstp->rq_cred)) { |
| 1557 | dprintk("NFSD: setclientid: string in use by client" | 1513 | char addr_str[INET6_ADDRSTRLEN]; |
| 1558 | " at %pI4\n", &conf->cl_addr); | 1514 | rpc_ntop((struct sockaddr *) &conf->cl_addr, addr_str, |
| 1515 | sizeof(addr_str)); | ||
| 1516 | dprintk("NFSD: setclientid: string in use by client " | ||
| 1517 | "at %s\n", addr_str); | ||
| 1559 | goto out; | 1518 | goto out; |
| 1560 | } | 1519 | } |
| 1561 | } | 1520 | } |
| @@ -1573,7 +1532,7 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1573 | */ | 1532 | */ |
| 1574 | if (unconf) | 1533 | if (unconf) |
| 1575 | expire_client(unconf); | 1534 | expire_client(unconf); |
| 1576 | new = create_client(clname, dname); | 1535 | new = create_client(clname, dname, rqstp, &clverifier); |
| 1577 | if (new == NULL) | 1536 | if (new == NULL) |
| 1578 | goto out; | 1537 | goto out; |
| 1579 | gen_clid(new); | 1538 | gen_clid(new); |
| @@ -1590,7 +1549,7 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1590 | */ | 1549 | */ |
| 1591 | expire_client(unconf); | 1550 | expire_client(unconf); |
| 1592 | } | 1551 | } |
| 1593 | new = create_client(clname, dname); | 1552 | new = create_client(clname, dname, rqstp, &clverifier); |
| 1594 | if (new == NULL) | 1553 | if (new == NULL) |
| 1595 | goto out; | 1554 | goto out; |
| 1596 | copy_clid(new, conf); | 1555 | copy_clid(new, conf); |
| @@ -1600,7 +1559,7 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1600 | * probable client reboot; state will be removed if | 1559 | * probable client reboot; state will be removed if |
| 1601 | * confirmed. | 1560 | * confirmed. |
| 1602 | */ | 1561 | */ |
| 1603 | new = create_client(clname, dname); | 1562 | new = create_client(clname, dname, rqstp, &clverifier); |
| 1604 | if (new == NULL) | 1563 | if (new == NULL) |
| 1605 | goto out; | 1564 | goto out; |
| 1606 | gen_clid(new); | 1565 | gen_clid(new); |
| @@ -1611,25 +1570,12 @@ nfsd4_setclientid(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, | |||
| 1611 | * confirmed. | 1570 | * confirmed. |
| 1612 | */ | 1571 | */ |
| 1613 | expire_client(unconf); | 1572 | expire_client(unconf); |
| 1614 | new = create_client(clname, dname); | 1573 | new = create_client(clname, dname, rqstp, &clverifier); |
| 1615 | if (new == NULL) | 1574 | if (new == NULL) |
| 1616 | goto out; | 1575 | goto out; |
| 1617 | gen_clid(new); | 1576 | gen_clid(new); |
| 1618 | } | 1577 | } |
| 1619 | copy_verf(new, &clverifier); | 1578 | gen_callback(new, setclid, rpc_get_scope_id(sa)); |
| 1620 | new->cl_addr = sin->sin_addr.s_addr; | ||
| 1621 | new->cl_flavor = rqstp->rq_flavor; | ||
| 1622 | princ = svc_gss_principal(rqstp); | ||
| 1623 | if (princ) { | ||
| 1624 | new->cl_principal = kstrdup(princ, GFP_KERNEL); | ||
| 1625 | if (new->cl_principal == NULL) { | ||
| 1626 | free_client(new); | ||
| 1627 | goto out; | ||
| 1628 | } | ||
| 1629 | } | ||
| 1630 | copy_cred(&new->cl_cred, &rqstp->rq_cred); | ||
| 1631 | gen_confirm(new); | ||
| 1632 | gen_callback(new, setclid); | ||
| 1633 | add_to_unconfirmed(new, strhashval); | 1579 | add_to_unconfirmed(new, strhashval); |
| 1634 | setclid->se_clientid.cl_boot = new->cl_clientid.cl_boot; | 1580 | setclid->se_clientid.cl_boot = new->cl_clientid.cl_boot; |
| 1635 | setclid->se_clientid.cl_id = new->cl_clientid.cl_id; | 1581 | setclid->se_clientid.cl_id = new->cl_clientid.cl_id; |
| @@ -1651,7 +1597,7 @@ nfsd4_setclientid_confirm(struct svc_rqst *rqstp, | |||
| 1651 | struct nfsd4_compound_state *cstate, | 1597 | struct nfsd4_compound_state *cstate, |
| 1652 | struct nfsd4_setclientid_confirm *setclientid_confirm) | 1598 | struct nfsd4_setclientid_confirm *setclientid_confirm) |
| 1653 | { | 1599 | { |
| 1654 | struct sockaddr_in *sin = svc_addr_in(rqstp); | 1600 | struct sockaddr *sa = svc_addr(rqstp); |
| 1655 | struct nfs4_client *conf, *unconf; | 1601 | struct nfs4_client *conf, *unconf; |
| 1656 | nfs4_verifier confirm = setclientid_confirm->sc_confirm; | 1602 | nfs4_verifier confirm = setclientid_confirm->sc_confirm; |
| 1657 | clientid_t * clid = &setclientid_confirm->sc_clientid; | 1603 | clientid_t * clid = &setclientid_confirm->sc_clientid; |
| @@ -1670,9 +1616,9 @@ nfsd4_setclientid_confirm(struct svc_rqst *rqstp, | |||
| 1670 | unconf = find_unconfirmed_client(clid); | 1616 | unconf = find_unconfirmed_client(clid); |
| 1671 | 1617 | ||
| 1672 | status = nfserr_clid_inuse; | 1618 | status = nfserr_clid_inuse; |
| 1673 | if (conf && conf->cl_addr != sin->sin_addr.s_addr) | 1619 | if (conf && !rpc_cmp_addr((struct sockaddr *) &conf->cl_addr, sa)) |
| 1674 | goto out; | 1620 | goto out; |
| 1675 | if (unconf && unconf->cl_addr != sin->sin_addr.s_addr) | 1621 | if (unconf && !rpc_cmp_addr((struct sockaddr *) &unconf->cl_addr, sa)) |
| 1676 | goto out; | 1622 | goto out; |
| 1677 | 1623 | ||
| 1678 | /* | 1624 | /* |
| @@ -4072,7 +4018,7 @@ set_max_delegations(void) | |||
| 4072 | 4018 | ||
| 4073 | /* initialization to perform when the nfsd service is started: */ | 4019 | /* initialization to perform when the nfsd service is started: */ |
| 4074 | 4020 | ||
| 4075 | static void | 4021 | static int |
| 4076 | __nfs4_state_start(void) | 4022 | __nfs4_state_start(void) |
| 4077 | { | 4023 | { |
| 4078 | unsigned long grace_time; | 4024 | unsigned long grace_time; |
| @@ -4084,19 +4030,26 @@ __nfs4_state_start(void) | |||
| 4084 | printk(KERN_INFO "NFSD: starting %ld-second grace period\n", | 4030 | printk(KERN_INFO "NFSD: starting %ld-second grace period\n", |
| 4085 | grace_time/HZ); | 4031 | grace_time/HZ); |
| 4086 | laundry_wq = create_singlethread_workqueue("nfsd4"); | 4032 | laundry_wq = create_singlethread_workqueue("nfsd4"); |
| 4033 | if (laundry_wq == NULL) | ||
| 4034 | return -ENOMEM; | ||
| 4087 | queue_delayed_work(laundry_wq, &laundromat_work, grace_time); | 4035 | queue_delayed_work(laundry_wq, &laundromat_work, grace_time); |
| 4088 | set_max_delegations(); | 4036 | set_max_delegations(); |
| 4037 | return set_callback_cred(); | ||
| 4089 | } | 4038 | } |
| 4090 | 4039 | ||
| 4091 | void | 4040 | int |
| 4092 | nfs4_state_start(void) | 4041 | nfs4_state_start(void) |
| 4093 | { | 4042 | { |
| 4043 | int ret; | ||
| 4044 | |||
| 4094 | if (nfs4_init) | 4045 | if (nfs4_init) |
| 4095 | return; | 4046 | return 0; |
| 4096 | nfsd4_load_reboot_recovery_data(); | 4047 | nfsd4_load_reboot_recovery_data(); |
| 4097 | __nfs4_state_start(); | 4048 | ret = __nfs4_state_start(); |
| 4049 | if (ret) | ||
| 4050 | return ret; | ||
| 4098 | nfs4_init = 1; | 4051 | nfs4_init = 1; |
| 4099 | return; | 4052 | return 0; |
| 4100 | } | 4053 | } |
| 4101 | 4054 | ||
| 4102 | time_t | 4055 | time_t |
diff --git a/fs/nfsd/nfs4xdr.c b/fs/nfsd/nfs4xdr.c index 2dcc7feaa6ff..0fbd50cee1f6 100644 --- a/fs/nfsd/nfs4xdr.c +++ b/fs/nfsd/nfs4xdr.c | |||
| @@ -1599,7 +1599,8 @@ static __be32 nfsd4_encode_fs_location4(struct nfsd4_fs_location *location, | |||
| 1599 | static char *nfsd4_path(struct svc_rqst *rqstp, struct svc_export *exp, __be32 *stat) | 1599 | static char *nfsd4_path(struct svc_rqst *rqstp, struct svc_export *exp, __be32 *stat) |
| 1600 | { | 1600 | { |
| 1601 | struct svc_fh tmp_fh; | 1601 | struct svc_fh tmp_fh; |
| 1602 | char *path, *rootpath; | 1602 | char *path = NULL, *rootpath; |
| 1603 | size_t rootlen; | ||
| 1603 | 1604 | ||
| 1604 | fh_init(&tmp_fh, NFS4_FHSIZE); | 1605 | fh_init(&tmp_fh, NFS4_FHSIZE); |
| 1605 | *stat = exp_pseudoroot(rqstp, &tmp_fh); | 1606 | *stat = exp_pseudoroot(rqstp, &tmp_fh); |
| @@ -1609,14 +1610,18 @@ static char *nfsd4_path(struct svc_rqst *rqstp, struct svc_export *exp, __be32 * | |||
| 1609 | 1610 | ||
| 1610 | path = exp->ex_pathname; | 1611 | path = exp->ex_pathname; |
| 1611 | 1612 | ||
| 1612 | if (strncmp(path, rootpath, strlen(rootpath))) { | 1613 | rootlen = strlen(rootpath); |
| 1614 | if (strncmp(path, rootpath, rootlen)) { | ||
| 1613 | dprintk("nfsd: fs_locations failed;" | 1615 | dprintk("nfsd: fs_locations failed;" |
| 1614 | "%s is not contained in %s\n", path, rootpath); | 1616 | "%s is not contained in %s\n", path, rootpath); |
| 1615 | *stat = nfserr_notsupp; | 1617 | *stat = nfserr_notsupp; |
| 1616 | return NULL; | 1618 | path = NULL; |
| 1619 | goto out; | ||
| 1617 | } | 1620 | } |
| 1618 | 1621 | path += rootlen; | |
| 1619 | return path + strlen(rootpath); | 1622 | out: |
| 1623 | fh_put(&tmp_fh); | ||
| 1624 | return path; | ||
| 1620 | } | 1625 | } |
| 1621 | 1626 | ||
| 1622 | /* | 1627 | /* |
| @@ -1793,11 +1798,6 @@ nfsd4_encode_fattr(struct svc_fh *fhp, struct svc_export *exp, | |||
| 1793 | goto out_nfserr; | 1798 | goto out_nfserr; |
| 1794 | } | 1799 | } |
| 1795 | } | 1800 | } |
| 1796 | if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { | ||
| 1797 | if (exp->ex_fslocs.locations == NULL) { | ||
| 1798 | bmval0 &= ~FATTR4_WORD0_FS_LOCATIONS; | ||
| 1799 | } | ||
| 1800 | } | ||
| 1801 | if ((buflen -= 16) < 0) | 1801 | if ((buflen -= 16) < 0) |
| 1802 | goto out_resource; | 1802 | goto out_resource; |
| 1803 | 1803 | ||
| @@ -1825,8 +1825,6 @@ nfsd4_encode_fattr(struct svc_fh *fhp, struct svc_export *exp, | |||
| 1825 | goto out_resource; | 1825 | goto out_resource; |
| 1826 | if (!aclsupport) | 1826 | if (!aclsupport) |
| 1827 | word0 &= ~FATTR4_WORD0_ACL; | 1827 | word0 &= ~FATTR4_WORD0_ACL; |
| 1828 | if (!exp->ex_fslocs.locations) | ||
| 1829 | word0 &= ~FATTR4_WORD0_FS_LOCATIONS; | ||
| 1830 | if (!word2) { | 1828 | if (!word2) { |
| 1831 | WRITE32(2); | 1829 | WRITE32(2); |
| 1832 | WRITE32(word0); | 1830 | WRITE32(word0); |
| @@ -3064,6 +3062,7 @@ nfsd4_encode_sequence(struct nfsd4_compoundres *resp, int nfserr, | |||
| 3064 | WRITE32(0); | 3062 | WRITE32(0); |
| 3065 | 3063 | ||
| 3066 | ADJUST_ARGS(); | 3064 | ADJUST_ARGS(); |
| 3065 | resp->cstate.datap = p; /* DRC cache data pointer */ | ||
| 3067 | return 0; | 3066 | return 0; |
| 3068 | } | 3067 | } |
| 3069 | 3068 | ||
| @@ -3166,7 +3165,7 @@ static int nfsd4_check_drc_limit(struct nfsd4_compoundres *resp) | |||
| 3166 | return status; | 3165 | return status; |
| 3167 | 3166 | ||
| 3168 | session = resp->cstate.session; | 3167 | session = resp->cstate.session; |
| 3169 | if (session == NULL || slot->sl_cache_entry.ce_cachethis == 0) | 3168 | if (session == NULL || slot->sl_cachethis == 0) |
| 3170 | return status; | 3169 | return status; |
| 3171 | 3170 | ||
| 3172 | if (resp->opcnt >= args->opcnt) | 3171 | if (resp->opcnt >= args->opcnt) |
| @@ -3291,6 +3290,7 @@ nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compo | |||
| 3291 | /* | 3290 | /* |
| 3292 | * All that remains is to write the tag and operation count... | 3291 | * All that remains is to write the tag and operation count... |
| 3293 | */ | 3292 | */ |
| 3293 | struct nfsd4_compound_state *cs = &resp->cstate; | ||
| 3294 | struct kvec *iov; | 3294 | struct kvec *iov; |
| 3295 | p = resp->tagp; | 3295 | p = resp->tagp; |
| 3296 | *p++ = htonl(resp->taglen); | 3296 | *p++ = htonl(resp->taglen); |
| @@ -3304,17 +3304,11 @@ nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compo | |||
| 3304 | iov = &rqstp->rq_res.head[0]; | 3304 | iov = &rqstp->rq_res.head[0]; |
| 3305 | iov->iov_len = ((char*)resp->p) - (char*)iov->iov_base; | 3305 | iov->iov_len = ((char*)resp->p) - (char*)iov->iov_base; |
| 3306 | BUG_ON(iov->iov_len > PAGE_SIZE); | 3306 | BUG_ON(iov->iov_len > PAGE_SIZE); |
| 3307 | if (nfsd4_has_session(&resp->cstate)) { | 3307 | if (nfsd4_has_session(cs) && cs->status != nfserr_replay_cache) { |
| 3308 | if (resp->cstate.status == nfserr_replay_cache && | 3308 | nfsd4_store_cache_entry(resp); |
| 3309 | !nfsd4_not_cached(resp)) { | 3309 | dprintk("%s: SET SLOT STATE TO AVAILABLE\n", __func__); |
| 3310 | iov->iov_len = resp->cstate.iovlen; | 3310 | resp->cstate.slot->sl_inuse = false; |
| 3311 | } else { | 3311 | nfsd4_put_session(resp->cstate.session); |
| 3312 | nfsd4_store_cache_entry(resp); | ||
| 3313 | dprintk("%s: SET SLOT STATE TO AVAILABLE\n", __func__); | ||
| 3314 | resp->cstate.slot->sl_inuse = 0; | ||
| 3315 | } | ||
| 3316 | if (resp->cstate.session) | ||
| 3317 | nfsd4_put_session(resp->cstate.session); | ||
| 3318 | } | 3312 | } |
| 3319 | return 1; | 3313 | return 1; |
| 3320 | } | 3314 | } |
diff --git a/fs/nfsd/nfsctl.c b/fs/nfsd/nfsctl.c index 7e906c5b7671..00388d2a3c99 100644 --- a/fs/nfsd/nfsctl.c +++ b/fs/nfsd/nfsctl.c | |||
| @@ -174,12 +174,13 @@ static const struct file_operations exports_operations = { | |||
| 174 | }; | 174 | }; |
| 175 | 175 | ||
| 176 | extern int nfsd_pool_stats_open(struct inode *inode, struct file *file); | 176 | extern int nfsd_pool_stats_open(struct inode *inode, struct file *file); |
| 177 | extern int nfsd_pool_stats_release(struct inode *inode, struct file *file); | ||
| 177 | 178 | ||
| 178 | static struct file_operations pool_stats_operations = { | 179 | static struct file_operations pool_stats_operations = { |
| 179 | .open = nfsd_pool_stats_open, | 180 | .open = nfsd_pool_stats_open, |
| 180 | .read = seq_read, | 181 | .read = seq_read, |
| 181 | .llseek = seq_lseek, | 182 | .llseek = seq_lseek, |
| 182 | .release = seq_release, | 183 | .release = nfsd_pool_stats_release, |
| 183 | .owner = THIS_MODULE, | 184 | .owner = THIS_MODULE, |
| 184 | }; | 185 | }; |
| 185 | 186 | ||
| @@ -776,10 +777,7 @@ static ssize_t write_pool_threads(struct file *file, char *buf, size_t size) | |||
| 776 | size -= len; | 777 | size -= len; |
| 777 | mesg += len; | 778 | mesg += len; |
| 778 | } | 779 | } |
| 779 | 780 | rv = mesg - buf; | |
| 780 | mutex_unlock(&nfsd_mutex); | ||
| 781 | return (mesg-buf); | ||
| 782 | |||
| 783 | out_free: | 781 | out_free: |
| 784 | kfree(nthreads); | 782 | kfree(nthreads); |
| 785 | mutex_unlock(&nfsd_mutex); | 783 | mutex_unlock(&nfsd_mutex); |
diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c index 8847f3fbfc1e..01965b2f3a76 100644 --- a/fs/nfsd/nfsfh.c +++ b/fs/nfsd/nfsfh.c | |||
| @@ -397,44 +397,51 @@ static inline void _fh_update_old(struct dentry *dentry, | |||
| 397 | fh->ofh_dirino = 0; | 397 | fh->ofh_dirino = 0; |
| 398 | } | 398 | } |
| 399 | 399 | ||
| 400 | __be32 | 400 | static bool is_root_export(struct svc_export *exp) |
| 401 | fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, | ||
| 402 | struct svc_fh *ref_fh) | ||
| 403 | { | 401 | { |
| 404 | /* ref_fh is a reference file handle. | 402 | return exp->ex_path.dentry == exp->ex_path.dentry->d_sb->s_root; |
| 405 | * if it is non-null and for the same filesystem, then we should compose | 403 | } |
| 406 | * a filehandle which is of the same version, where possible. | ||
| 407 | * Currently, that means that if ref_fh->fh_handle.fh_version == 0xca | ||
| 408 | * Then create a 32byte filehandle using nfs_fhbase_old | ||
| 409 | * | ||
| 410 | */ | ||
| 411 | 404 | ||
| 412 | u8 version; | 405 | static struct super_block *exp_sb(struct svc_export *exp) |
| 413 | u8 fsid_type = 0; | 406 | { |
| 414 | struct inode * inode = dentry->d_inode; | 407 | return exp->ex_path.dentry->d_inode->i_sb; |
| 415 | struct dentry *parent = dentry->d_parent; | 408 | } |
| 416 | __u32 *datap; | ||
| 417 | dev_t ex_dev = exp->ex_path.dentry->d_inode->i_sb->s_dev; | ||
| 418 | int root_export = (exp->ex_path.dentry == exp->ex_path.dentry->d_sb->s_root); | ||
| 419 | 409 | ||
| 420 | dprintk("nfsd: fh_compose(exp %02x:%02x/%ld %s/%s, ino=%ld)\n", | 410 | static bool fsid_type_ok_for_exp(u8 fsid_type, struct svc_export *exp) |
| 421 | MAJOR(ex_dev), MINOR(ex_dev), | 411 | { |
| 422 | (long) exp->ex_path.dentry->d_inode->i_ino, | 412 | switch (fsid_type) { |
| 423 | parent->d_name.name, dentry->d_name.name, | 413 | case FSID_DEV: |
| 424 | (inode ? inode->i_ino : 0)); | 414 | if (!old_valid_dev(exp_sb(exp)->s_dev)) |
| 415 | return 0; | ||
| 416 | /* FALL THROUGH */ | ||
| 417 | case FSID_MAJOR_MINOR: | ||
| 418 | case FSID_ENCODE_DEV: | ||
| 419 | return exp_sb(exp)->s_type->fs_flags & FS_REQUIRES_DEV; | ||
| 420 | case FSID_NUM: | ||
| 421 | return exp->ex_flags & NFSEXP_FSID; | ||
| 422 | case FSID_UUID8: | ||
| 423 | case FSID_UUID16: | ||
| 424 | if (!is_root_export(exp)) | ||
| 425 | return 0; | ||
| 426 | /* fall through */ | ||
| 427 | case FSID_UUID4_INUM: | ||
| 428 | case FSID_UUID16_INUM: | ||
| 429 | return exp->ex_uuid != NULL; | ||
| 430 | } | ||
| 431 | return 1; | ||
| 432 | } | ||
| 425 | 433 | ||
| 426 | /* Choose filehandle version and fsid type based on | 434 | |
| 427 | * the reference filehandle (if it is in the same export) | 435 | static void set_version_and_fsid_type(struct svc_fh *fhp, struct svc_export *exp, struct svc_fh *ref_fh) |
| 428 | * or the export options. | 436 | { |
| 429 | */ | 437 | u8 version; |
| 430 | retry: | 438 | u8 fsid_type; |
| 439 | retry: | ||
| 431 | version = 1; | 440 | version = 1; |
| 432 | if (ref_fh && ref_fh->fh_export == exp) { | 441 | if (ref_fh && ref_fh->fh_export == exp) { |
| 433 | version = ref_fh->fh_handle.fh_version; | 442 | version = ref_fh->fh_handle.fh_version; |
| 434 | fsid_type = ref_fh->fh_handle.fh_fsid_type; | 443 | fsid_type = ref_fh->fh_handle.fh_fsid_type; |
| 435 | 444 | ||
| 436 | if (ref_fh == fhp) | ||
| 437 | fh_put(ref_fh); | ||
| 438 | ref_fh = NULL; | 445 | ref_fh = NULL; |
| 439 | 446 | ||
| 440 | switch (version) { | 447 | switch (version) { |
| @@ -447,58 +454,66 @@ fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, | |||
| 447 | goto retry; | 454 | goto retry; |
| 448 | } | 455 | } |
| 449 | 456 | ||
| 450 | /* Need to check that this type works for this | 457 | /* |
| 451 | * export point. As the fsid -> filesystem mapping | 458 | * As the fsid -> filesystem mapping was guided by |
| 452 | * was guided by user-space, there is no guarantee | 459 | * user-space, there is no guarantee that the filesystem |
| 453 | * that the filesystem actually supports that fsid | 460 | * actually supports that fsid type. If it doesn't we |
| 454 | * type. If it doesn't we loop around again without | 461 | * loop around again without ref_fh set. |
| 455 | * ref_fh set. | ||
| 456 | */ | 462 | */ |
| 457 | switch(fsid_type) { | 463 | if (!fsid_type_ok_for_exp(fsid_type, exp)) |
| 458 | case FSID_DEV: | 464 | goto retry; |
| 459 | if (!old_valid_dev(ex_dev)) | ||
| 460 | goto retry; | ||
| 461 | /* FALL THROUGH */ | ||
| 462 | case FSID_MAJOR_MINOR: | ||
| 463 | case FSID_ENCODE_DEV: | ||
| 464 | if (!(exp->ex_path.dentry->d_inode->i_sb->s_type->fs_flags | ||
| 465 | & FS_REQUIRES_DEV)) | ||
| 466 | goto retry; | ||
| 467 | break; | ||
| 468 | case FSID_NUM: | ||
| 469 | if (! (exp->ex_flags & NFSEXP_FSID)) | ||
| 470 | goto retry; | ||
| 471 | break; | ||
| 472 | case FSID_UUID8: | ||
| 473 | case FSID_UUID16: | ||
| 474 | if (!root_export) | ||
| 475 | goto retry; | ||
| 476 | /* fall through */ | ||
| 477 | case FSID_UUID4_INUM: | ||
| 478 | case FSID_UUID16_INUM: | ||
| 479 | if (exp->ex_uuid == NULL) | ||
| 480 | goto retry; | ||
| 481 | break; | ||
| 482 | } | ||
| 483 | } else if (exp->ex_flags & NFSEXP_FSID) { | 465 | } else if (exp->ex_flags & NFSEXP_FSID) { |
| 484 | fsid_type = FSID_NUM; | 466 | fsid_type = FSID_NUM; |
| 485 | } else if (exp->ex_uuid) { | 467 | } else if (exp->ex_uuid) { |
| 486 | if (fhp->fh_maxsize >= 64) { | 468 | if (fhp->fh_maxsize >= 64) { |
| 487 | if (root_export) | 469 | if (is_root_export(exp)) |
| 488 | fsid_type = FSID_UUID16; | 470 | fsid_type = FSID_UUID16; |
| 489 | else | 471 | else |
| 490 | fsid_type = FSID_UUID16_INUM; | 472 | fsid_type = FSID_UUID16_INUM; |
| 491 | } else { | 473 | } else { |
| 492 | if (root_export) | 474 | if (is_root_export(exp)) |
| 493 | fsid_type = FSID_UUID8; | 475 | fsid_type = FSID_UUID8; |
| 494 | else | 476 | else |
| 495 | fsid_type = FSID_UUID4_INUM; | 477 | fsid_type = FSID_UUID4_INUM; |
| 496 | } | 478 | } |
| 497 | } else if (!old_valid_dev(ex_dev)) | 479 | } else if (!old_valid_dev(exp_sb(exp)->s_dev)) |
| 498 | /* for newer device numbers, we must use a newer fsid format */ | 480 | /* for newer device numbers, we must use a newer fsid format */ |
| 499 | fsid_type = FSID_ENCODE_DEV; | 481 | fsid_type = FSID_ENCODE_DEV; |
| 500 | else | 482 | else |
| 501 | fsid_type = FSID_DEV; | 483 | fsid_type = FSID_DEV; |
| 484 | fhp->fh_handle.fh_version = version; | ||
| 485 | if (version) | ||
| 486 | fhp->fh_handle.fh_fsid_type = fsid_type; | ||
| 487 | } | ||
| 488 | |||
| 489 | __be32 | ||
| 490 | fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, | ||
| 491 | struct svc_fh *ref_fh) | ||
| 492 | { | ||
| 493 | /* ref_fh is a reference file handle. | ||
| 494 | * if it is non-null and for the same filesystem, then we should compose | ||
| 495 | * a filehandle which is of the same version, where possible. | ||
| 496 | * Currently, that means that if ref_fh->fh_handle.fh_version == 0xca | ||
| 497 | * Then create a 32byte filehandle using nfs_fhbase_old | ||
| 498 | * | ||
| 499 | */ | ||
| 500 | |||
| 501 | struct inode * inode = dentry->d_inode; | ||
| 502 | struct dentry *parent = dentry->d_parent; | ||
| 503 | __u32 *datap; | ||
| 504 | dev_t ex_dev = exp_sb(exp)->s_dev; | ||
| 505 | |||
| 506 | dprintk("nfsd: fh_compose(exp %02x:%02x/%ld %s/%s, ino=%ld)\n", | ||
| 507 | MAJOR(ex_dev), MINOR(ex_dev), | ||
| 508 | (long) exp->ex_path.dentry->d_inode->i_ino, | ||
| 509 | parent->d_name.name, dentry->d_name.name, | ||
| 510 | (inode ? inode->i_ino : 0)); | ||
| 511 | |||
| 512 | /* Choose filehandle version and fsid type based on | ||
| 513 | * the reference filehandle (if it is in the same export) | ||
| 514 | * or the export options. | ||
| 515 | */ | ||
| 516 | set_version_and_fsid_type(fhp, exp, ref_fh); | ||
| 502 | 517 | ||
| 503 | if (ref_fh == fhp) | 518 | if (ref_fh == fhp) |
| 504 | fh_put(ref_fh); | 519 | fh_put(ref_fh); |
| @@ -516,7 +531,7 @@ fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, | |||
| 516 | fhp->fh_export = exp; | 531 | fhp->fh_export = exp; |
| 517 | cache_get(&exp->h); | 532 | cache_get(&exp->h); |
| 518 | 533 | ||
| 519 | if (version == 0xca) { | 534 | if (fhp->fh_handle.fh_version == 0xca) { |
| 520 | /* old style filehandle please */ | 535 | /* old style filehandle please */ |
| 521 | memset(&fhp->fh_handle.fh_base, 0, NFS_FHSIZE); | 536 | memset(&fhp->fh_handle.fh_base, 0, NFS_FHSIZE); |
| 522 | fhp->fh_handle.fh_size = NFS_FHSIZE; | 537 | fhp->fh_handle.fh_size = NFS_FHSIZE; |
| @@ -530,22 +545,22 @@ fh_compose(struct svc_fh *fhp, struct svc_export *exp, struct dentry *dentry, | |||
| 530 | _fh_update_old(dentry, exp, &fhp->fh_handle); | 545 | _fh_update_old(dentry, exp, &fhp->fh_handle); |
| 531 | } else { | 546 | } else { |
| 532 | int len; | 547 | int len; |
| 533 | fhp->fh_handle.fh_version = 1; | ||
| 534 | fhp->fh_handle.fh_auth_type = 0; | 548 | fhp->fh_handle.fh_auth_type = 0; |
| 535 | datap = fhp->fh_handle.fh_auth+0; | 549 | datap = fhp->fh_handle.fh_auth+0; |
| 536 | fhp->fh_handle.fh_fsid_type = fsid_type; | 550 | mk_fsid(fhp->fh_handle.fh_fsid_type, datap, ex_dev, |
| 537 | mk_fsid(fsid_type, datap, ex_dev, | ||
| 538 | exp->ex_path.dentry->d_inode->i_ino, | 551 | exp->ex_path.dentry->d_inode->i_ino, |
| 539 | exp->ex_fsid, exp->ex_uuid); | 552 | exp->ex_fsid, exp->ex_uuid); |
| 540 | 553 | ||
| 541 | len = key_len(fsid_type); | 554 | len = key_len(fhp->fh_handle.fh_fsid_type); |
| 542 | datap += len/4; | 555 | datap += len/4; |
| 543 | fhp->fh_handle.fh_size = 4 + len; | 556 | fhp->fh_handle.fh_size = 4 + len; |
| 544 | 557 | ||
| 545 | if (inode) | 558 | if (inode) |
| 546 | _fh_update(fhp, exp, dentry); | 559 | _fh_update(fhp, exp, dentry); |
| 547 | if (fhp->fh_handle.fh_fileid_type == 255) | 560 | if (fhp->fh_handle.fh_fileid_type == 255) { |
| 561 | fh_put(fhp); | ||
| 548 | return nfserr_opnotsupp; | 562 | return nfserr_opnotsupp; |
| 563 | } | ||
| 549 | } | 564 | } |
| 550 | 565 | ||
| 551 | return 0; | 566 | return 0; |
| @@ -639,8 +654,7 @@ enum fsid_source fsid_source(struct svc_fh *fhp) | |||
| 639 | case FSID_DEV: | 654 | case FSID_DEV: |
| 640 | case FSID_ENCODE_DEV: | 655 | case FSID_ENCODE_DEV: |
| 641 | case FSID_MAJOR_MINOR: | 656 | case FSID_MAJOR_MINOR: |
| 642 | if (fhp->fh_export->ex_path.dentry->d_inode->i_sb->s_type->fs_flags | 657 | if (exp_sb(fhp->fh_export)->s_type->fs_flags & FS_REQUIRES_DEV) |
| 643 | & FS_REQUIRES_DEV) | ||
| 644 | return FSIDSOURCE_DEV; | 658 | return FSIDSOURCE_DEV; |
| 645 | break; | 659 | break; |
| 646 | case FSID_NUM: | 660 | case FSID_NUM: |
diff --git a/fs/nfsd/nfssvc.c b/fs/nfsd/nfssvc.c index 24d58adfe5fd..67ea83eedd43 100644 --- a/fs/nfsd/nfssvc.c +++ b/fs/nfsd/nfssvc.c | |||
| @@ -34,6 +34,7 @@ | |||
| 34 | #include <linux/nfsd/syscall.h> | 34 | #include <linux/nfsd/syscall.h> |
| 35 | #include <linux/lockd/bind.h> | 35 | #include <linux/lockd/bind.h> |
| 36 | #include <linux/nfsacl.h> | 36 | #include <linux/nfsacl.h> |
| 37 | #include <linux/seq_file.h> | ||
| 37 | 38 | ||
| 38 | #define NFSDDBG_FACILITY NFSDDBG_SVC | 39 | #define NFSDDBG_FACILITY NFSDDBG_SVC |
| 39 | 40 | ||
| @@ -66,6 +67,16 @@ struct timeval nfssvc_boot; | |||
| 66 | DEFINE_MUTEX(nfsd_mutex); | 67 | DEFINE_MUTEX(nfsd_mutex); |
| 67 | struct svc_serv *nfsd_serv; | 68 | struct svc_serv *nfsd_serv; |
| 68 | 69 | ||
| 70 | /* | ||
| 71 | * nfsd_drc_lock protects nfsd_drc_max_pages and nfsd_drc_pages_used. | ||
| 72 | * nfsd_drc_max_pages limits the total amount of memory available for | ||
| 73 | * version 4.1 DRC caches. | ||
| 74 | * nfsd_drc_pages_used tracks the current version 4.1 DRC memory usage. | ||
| 75 | */ | ||
| 76 | spinlock_t nfsd_drc_lock; | ||
| 77 | unsigned int nfsd_drc_max_mem; | ||
| 78 | unsigned int nfsd_drc_mem_used; | ||
| 79 | |||
| 69 | #if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL) | 80 | #if defined(CONFIG_NFSD_V2_ACL) || defined(CONFIG_NFSD_V3_ACL) |
| 70 | static struct svc_stat nfsd_acl_svcstats; | 81 | static struct svc_stat nfsd_acl_svcstats; |
| 71 | static struct svc_version * nfsd_acl_version[] = { | 82 | static struct svc_version * nfsd_acl_version[] = { |
| @@ -235,13 +246,12 @@ void nfsd_reset_versions(void) | |||
| 235 | */ | 246 | */ |
| 236 | static void set_max_drc(void) | 247 | static void set_max_drc(void) |
| 237 | { | 248 | { |
| 238 | /* The percent of nr_free_buffer_pages used by the V4.1 server DRC */ | 249 | #define NFSD_DRC_SIZE_SHIFT 10 |
| 239 | #define NFSD_DRC_SIZE_SHIFT 7 | 250 | nfsd_drc_max_mem = (nr_free_buffer_pages() |
| 240 | nfsd_serv->sv_drc_max_pages = nr_free_buffer_pages() | 251 | >> NFSD_DRC_SIZE_SHIFT) * PAGE_SIZE; |
| 241 | >> NFSD_DRC_SIZE_SHIFT; | 252 | nfsd_drc_mem_used = 0; |
| 242 | nfsd_serv->sv_drc_pages_used = 0; | 253 | spin_lock_init(&nfsd_drc_lock); |
| 243 | dprintk("%s svc_drc_max_pages %u\n", __func__, | 254 | dprintk("%s nfsd_drc_max_mem %u \n", __func__, nfsd_drc_max_mem); |
| 244 | nfsd_serv->sv_drc_max_pages); | ||
| 245 | } | 255 | } |
| 246 | 256 | ||
| 247 | int nfsd_create_serv(void) | 257 | int nfsd_create_serv(void) |
| @@ -401,7 +411,9 @@ nfsd_svc(unsigned short port, int nrservs) | |||
| 401 | error = nfsd_racache_init(2*nrservs); | 411 | error = nfsd_racache_init(2*nrservs); |
| 402 | if (error<0) | 412 | if (error<0) |
| 403 | goto out; | 413 | goto out; |
| 404 | nfs4_state_start(); | 414 | error = nfs4_state_start(); |
| 415 | if (error) | ||
| 416 | goto out; | ||
| 405 | 417 | ||
| 406 | nfsd_reset_versions(); | 418 | nfsd_reset_versions(); |
| 407 | 419 | ||
| @@ -569,10 +581,6 @@ nfsd_dispatch(struct svc_rqst *rqstp, __be32 *statp) | |||
| 569 | + rqstp->rq_res.head[0].iov_len; | 581 | + rqstp->rq_res.head[0].iov_len; |
| 570 | rqstp->rq_res.head[0].iov_len += sizeof(__be32); | 582 | rqstp->rq_res.head[0].iov_len += sizeof(__be32); |
| 571 | 583 | ||
| 572 | /* NFSv4.1 DRC requires statp */ | ||
| 573 | if (rqstp->rq_vers == 4) | ||
| 574 | nfsd4_set_statp(rqstp, statp); | ||
| 575 | |||
| 576 | /* Now call the procedure handler, and encode NFS status. */ | 584 | /* Now call the procedure handler, and encode NFS status. */ |
| 577 | nfserr = proc->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp); | 585 | nfserr = proc->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp); |
| 578 | nfserr = map_new_errors(rqstp->rq_vers, nfserr); | 586 | nfserr = map_new_errors(rqstp->rq_vers, nfserr); |
| @@ -607,7 +615,25 @@ nfsd_dispatch(struct svc_rqst *rqstp, __be32 *statp) | |||
| 607 | 615 | ||
| 608 | int nfsd_pool_stats_open(struct inode *inode, struct file *file) | 616 | int nfsd_pool_stats_open(struct inode *inode, struct file *file) |
| 609 | { | 617 | { |
| 610 | if (nfsd_serv == NULL) | 618 | int ret; |
| 619 | mutex_lock(&nfsd_mutex); | ||
| 620 | if (nfsd_serv == NULL) { | ||
| 621 | mutex_unlock(&nfsd_mutex); | ||
| 611 | return -ENODEV; | 622 | return -ENODEV; |
| 612 | return svc_pool_stats_open(nfsd_serv, file); | 623 | } |
| 624 | /* bump up the psudo refcount while traversing */ | ||
| 625 | svc_get(nfsd_serv); | ||
| 626 | ret = svc_pool_stats_open(nfsd_serv, file); | ||
| 627 | mutex_unlock(&nfsd_mutex); | ||
| 628 | return ret; | ||
| 629 | } | ||
| 630 | |||
| 631 | int nfsd_pool_stats_release(struct inode *inode, struct file *file) | ||
| 632 | { | ||
| 633 | int ret = seq_release(inode, file); | ||
| 634 | mutex_lock(&nfsd_mutex); | ||
| 635 | /* this function really, really should have been called svc_put() */ | ||
| 636 | svc_destroy(nfsd_serv); | ||
| 637 | mutex_unlock(&nfsd_mutex); | ||
| 638 | return ret; | ||
| 613 | } | 639 | } |
diff --git a/fs/nfsd/vfs.c b/fs/nfsd/vfs.c index 8fa09bfbcba7..a293f0273263 100644 --- a/fs/nfsd/vfs.c +++ b/fs/nfsd/vfs.c | |||
| @@ -89,6 +89,12 @@ struct raparm_hbucket { | |||
| 89 | #define RAPARM_HASH_MASK (RAPARM_HASH_SIZE-1) | 89 | #define RAPARM_HASH_MASK (RAPARM_HASH_SIZE-1) |
| 90 | static struct raparm_hbucket raparm_hash[RAPARM_HASH_SIZE]; | 90 | static struct raparm_hbucket raparm_hash[RAPARM_HASH_SIZE]; |
| 91 | 91 | ||
| 92 | static inline int | ||
| 93 | nfsd_v4client(struct svc_rqst *rq) | ||
| 94 | { | ||
| 95 | return rq->rq_prog == NFS_PROGRAM && rq->rq_vers == 4; | ||
| 96 | } | ||
| 97 | |||
| 92 | /* | 98 | /* |
| 93 | * Called from nfsd_lookup and encode_dirent. Check if we have crossed | 99 | * Called from nfsd_lookup and encode_dirent. Check if we have crossed |
| 94 | * a mount point. | 100 | * a mount point. |
| @@ -115,7 +121,8 @@ nfsd_cross_mnt(struct svc_rqst *rqstp, struct dentry **dpp, | |||
| 115 | path_put(&path); | 121 | path_put(&path); |
| 116 | goto out; | 122 | goto out; |
| 117 | } | 123 | } |
| 118 | if ((exp->ex_flags & NFSEXP_CROSSMOUNT) || EX_NOHIDE(exp2)) { | 124 | if (nfsd_v4client(rqstp) || |
| 125 | (exp->ex_flags & NFSEXP_CROSSMOUNT) || EX_NOHIDE(exp2)) { | ||
| 119 | /* successfully crossed mount point */ | 126 | /* successfully crossed mount point */ |
| 120 | /* | 127 | /* |
| 121 | * This is subtle: path.dentry is *not* on path.mnt | 128 | * This is subtle: path.dentry is *not* on path.mnt |
