blob: a77a3d8c0b3f4932cab4ae79811e487a29d6482e [file] [log] [blame]
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001/*
2 * fs/nfs/nfs4state.c
3 *
4 * Client-side XDR for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 *
15 * 1. Redistributions of source code must retain the above copyright
16 * notice, this list of conditions and the following disclaimer.
17 * 2. Redistributions in binary form must reproduce the above copyright
18 * notice, this list of conditions and the following disclaimer in the
19 * documentation and/or other materials provided with the distribution.
20 * 3. Neither the name of the University nor the names of its
21 * contributors may be used to endorse or promote products derived
22 * from this software without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
25 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
26 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
27 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
31 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
32 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
33 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
34 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 *
36 * Implementation of the NFSv4 state model. For the time being,
37 * this is minimal, but will be made much more complex in a
38 * subsequent patch.
39 */
40
41#include <linux/kernel.h>
42#include <linux/slab.h>
43#include <linux/fs.h>
44#include <linux/nfs_fs.h>
45#include <linux/kthread.h>
46#include <linux/module.h>
47#include <linux/random.h>
48#include <linux/ratelimit.h>
49#include <linux/workqueue.h>
50#include <linux/bitops.h>
51#include <linux/jiffies.h>
Olivier Deprez92d4c212022-12-06 15:05:30 +010052#include <linux/sched/mm.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000053
54#include <linux/sunrpc/clnt.h>
55
56#include "nfs4_fs.h"
57#include "callback.h"
58#include "delegation.h"
59#include "internal.h"
60#include "nfs4idmap.h"
61#include "nfs4session.h"
62#include "pnfs.h"
63#include "netns.h"
Olivier Deprez157378f2022-04-04 15:47:50 +020064#include "nfs4trace.h"
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000065
66#define NFSDBG_FACILITY NFSDBG_STATE
67
68#define OPENOWNER_POOL_SIZE 8
69
70const nfs4_stateid zero_stateid = {
71 { .data = { 0 } },
72 .type = NFS4_SPECIAL_STATEID_TYPE,
73};
74const nfs4_stateid invalid_stateid = {
75 {
76 /* Funky initialiser keeps older gcc versions happy */
77 .data = { 0xff, 0xff, 0xff, 0xff, 0 },
78 },
79 .type = NFS4_INVALID_STATEID_TYPE,
80};
81
82const nfs4_stateid current_stateid = {
83 {
84 /* Funky initialiser keeps older gcc versions happy */
85 .data = { 0x0, 0x0, 0x0, 0x1, 0 },
86 },
87 .type = NFS4_SPECIAL_STATEID_TYPE,
88};
89
90static DEFINE_MUTEX(nfs_clid_init_mutex);
91
David Brazdil0f672f62019-12-10 10:32:29 +000092static int nfs4_setup_state_renewal(struct nfs_client *clp)
93{
94 int status;
95 struct nfs_fsinfo fsinfo;
David Brazdil0f672f62019-12-10 10:32:29 +000096
97 if (!test_bit(NFS_CS_CHECK_LEASE_TIME, &clp->cl_res_state)) {
98 nfs4_schedule_state_renewal(clp);
99 return 0;
100 }
101
David Brazdil0f672f62019-12-10 10:32:29 +0000102 status = nfs4_proc_get_lease_time(clp, &fsinfo);
103 if (status == 0) {
Olivier Deprez0e641232021-09-23 10:07:05 +0200104 nfs4_set_lease_period(clp, fsinfo.lease_time * HZ);
David Brazdil0f672f62019-12-10 10:32:29 +0000105 nfs4_schedule_state_renewal(clp);
106 }
107
108 return status;
109}
110
111int nfs4_init_clientid(struct nfs_client *clp, const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000112{
113 struct nfs4_setclientid_res clid = {
114 .clientid = clp->cl_clientid,
115 .confirm = clp->cl_confirm,
116 };
117 unsigned short port;
118 int status;
119 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
120
121 if (test_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state))
122 goto do_confirm;
123 port = nn->nfs_callback_tcpport;
124 if (clp->cl_addr.ss_family == AF_INET6)
125 port = nn->nfs_callback_tcpport6;
126
127 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid);
128 if (status != 0)
129 goto out;
130 clp->cl_clientid = clid.clientid;
131 clp->cl_confirm = clid.confirm;
132 set_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
133do_confirm:
134 status = nfs4_proc_setclientid_confirm(clp, &clid, cred);
135 if (status != 0)
136 goto out;
137 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
David Brazdil0f672f62019-12-10 10:32:29 +0000138 nfs4_setup_state_renewal(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000139out:
140 return status;
141}
142
143/**
144 * nfs40_discover_server_trunking - Detect server IP address trunking (mv0)
145 *
146 * @clp: nfs_client under test
147 * @result: OUT: found nfs_client, or clp
148 * @cred: credential to use for trunking test
149 *
150 * Returns zero, a negative errno, or a negative NFS4ERR status.
151 * If zero is returned, an nfs_client pointer is planted in
152 * "result".
153 *
154 * Note: The returned client may not yet be marked ready.
155 */
156int nfs40_discover_server_trunking(struct nfs_client *clp,
157 struct nfs_client **result,
David Brazdil0f672f62019-12-10 10:32:29 +0000158 const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000159{
160 struct nfs4_setclientid_res clid = {
161 .clientid = clp->cl_clientid,
162 .confirm = clp->cl_confirm,
163 };
164 struct nfs_net *nn = net_generic(clp->cl_net, nfs_net_id);
165 unsigned short port;
166 int status;
167
168 port = nn->nfs_callback_tcpport;
169 if (clp->cl_addr.ss_family == AF_INET6)
170 port = nn->nfs_callback_tcpport6;
171
172 status = nfs4_proc_setclientid(clp, NFS4_CALLBACK, port, cred, &clid);
173 if (status != 0)
174 goto out;
175 clp->cl_clientid = clid.clientid;
176 clp->cl_confirm = clid.confirm;
177
178 status = nfs40_walk_client_list(clp, result, cred);
179 if (status == 0) {
180 /* Sustain the lease, even if it's empty. If the clientid4
181 * goes stale it's of no use for trunking discovery. */
182 nfs4_schedule_state_renewal(*result);
David Brazdil0f672f62019-12-10 10:32:29 +0000183
184 /* If the client state need to recover, do it. */
185 if (clp->cl_state)
186 nfs4_schedule_state_manager(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000187 }
188out:
189 return status;
190}
191
David Brazdil0f672f62019-12-10 10:32:29 +0000192const struct cred *nfs4_get_machine_cred(struct nfs_client *clp)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000193{
David Brazdil0f672f62019-12-10 10:32:29 +0000194 return get_cred(rpc_machine_cred());
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000195}
196
197static void nfs4_root_machine_cred(struct nfs_client *clp)
198{
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000199
David Brazdil0f672f62019-12-10 10:32:29 +0000200 /* Force root creds instead of machine */
201 clp->cl_principal = NULL;
202 clp->cl_rpcclient->cl_principal = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000203}
204
David Brazdil0f672f62019-12-10 10:32:29 +0000205static const struct cred *
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000206nfs4_get_renew_cred_server_locked(struct nfs_server *server)
207{
David Brazdil0f672f62019-12-10 10:32:29 +0000208 const struct cred *cred = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000209 struct nfs4_state_owner *sp;
210 struct rb_node *pos;
211
212 for (pos = rb_first(&server->state_owners);
213 pos != NULL;
214 pos = rb_next(pos)) {
215 sp = rb_entry(pos, struct nfs4_state_owner, so_server_node);
216 if (list_empty(&sp->so_states))
217 continue;
David Brazdil0f672f62019-12-10 10:32:29 +0000218 cred = get_cred(sp->so_cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000219 break;
220 }
221 return cred;
222}
223
224/**
David Brazdil0f672f62019-12-10 10:32:29 +0000225 * nfs4_get_renew_cred - Acquire credential for a renew operation
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000226 * @clp: client state handle
227 *
228 * Returns an rpc_cred with reference count bumped, or NULL.
229 * Caller must hold clp->cl_lock.
230 */
David Brazdil0f672f62019-12-10 10:32:29 +0000231const struct cred *nfs4_get_renew_cred(struct nfs_client *clp)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000232{
David Brazdil0f672f62019-12-10 10:32:29 +0000233 const struct cred *cred = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000234 struct nfs_server *server;
235
236 /* Use machine credentials if available */
David Brazdil0f672f62019-12-10 10:32:29 +0000237 cred = nfs4_get_machine_cred(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000238 if (cred != NULL)
239 goto out;
240
David Brazdil0f672f62019-12-10 10:32:29 +0000241 spin_lock(&clp->cl_lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000242 rcu_read_lock();
243 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link) {
244 cred = nfs4_get_renew_cred_server_locked(server);
245 if (cred != NULL)
246 break;
247 }
248 rcu_read_unlock();
David Brazdil0f672f62019-12-10 10:32:29 +0000249 spin_unlock(&clp->cl_lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000250
251out:
252 return cred;
253}
254
255static void nfs4_end_drain_slot_table(struct nfs4_slot_table *tbl)
256{
257 if (test_and_clear_bit(NFS4_SLOT_TBL_DRAINING, &tbl->slot_tbl_state)) {
258 spin_lock(&tbl->slot_tbl_lock);
259 nfs41_wake_slot_table(tbl);
260 spin_unlock(&tbl->slot_tbl_lock);
261 }
262}
263
264static void nfs4_end_drain_session(struct nfs_client *clp)
265{
266 struct nfs4_session *ses = clp->cl_session;
267
268 if (clp->cl_slot_tbl) {
269 nfs4_end_drain_slot_table(clp->cl_slot_tbl);
270 return;
271 }
272
273 if (ses != NULL) {
274 nfs4_end_drain_slot_table(&ses->bc_slot_table);
275 nfs4_end_drain_slot_table(&ses->fc_slot_table);
276 }
277}
278
279static int nfs4_drain_slot_tbl(struct nfs4_slot_table *tbl)
280{
281 set_bit(NFS4_SLOT_TBL_DRAINING, &tbl->slot_tbl_state);
282 spin_lock(&tbl->slot_tbl_lock);
283 if (tbl->highest_used_slotid != NFS4_NO_SLOT) {
284 reinit_completion(&tbl->complete);
285 spin_unlock(&tbl->slot_tbl_lock);
286 return wait_for_completion_interruptible(&tbl->complete);
287 }
288 spin_unlock(&tbl->slot_tbl_lock);
289 return 0;
290}
291
292static int nfs4_begin_drain_session(struct nfs_client *clp)
293{
294 struct nfs4_session *ses = clp->cl_session;
295 int ret;
296
297 if (clp->cl_slot_tbl)
298 return nfs4_drain_slot_tbl(clp->cl_slot_tbl);
299
300 /* back channel */
301 ret = nfs4_drain_slot_tbl(&ses->bc_slot_table);
302 if (ret)
303 return ret;
304 /* fore channel */
305 return nfs4_drain_slot_tbl(&ses->fc_slot_table);
306}
307
308#if defined(CONFIG_NFS_V4_1)
309
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000310static void nfs41_finish_session_reset(struct nfs_client *clp)
311{
312 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
313 clear_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state);
314 /* create_session negotiated new slot table */
315 clear_bit(NFS4CLNT_BIND_CONN_TO_SESSION, &clp->cl_state);
David Brazdil0f672f62019-12-10 10:32:29 +0000316 nfs4_setup_state_renewal(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000317}
318
David Brazdil0f672f62019-12-10 10:32:29 +0000319int nfs41_init_clientid(struct nfs_client *clp, const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000320{
321 int status;
322
323 if (test_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state))
324 goto do_confirm;
325 status = nfs4_proc_exchange_id(clp, cred);
326 if (status != 0)
327 goto out;
328 set_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
329do_confirm:
330 status = nfs4_proc_create_session(clp, cred);
331 if (status != 0)
332 goto out;
333 nfs41_finish_session_reset(clp);
334 nfs_mark_client_ready(clp, NFS_CS_READY);
335out:
336 return status;
337}
338
339/**
340 * nfs41_discover_server_trunking - Detect server IP address trunking (mv1)
341 *
342 * @clp: nfs_client under test
343 * @result: OUT: found nfs_client, or clp
344 * @cred: credential to use for trunking test
345 *
346 * Returns NFS4_OK, a negative errno, or a negative NFS4ERR status.
347 * If NFS4_OK is returned, an nfs_client pointer is planted in
348 * "result".
349 *
350 * Note: The returned client may not yet be marked ready.
351 */
352int nfs41_discover_server_trunking(struct nfs_client *clp,
353 struct nfs_client **result,
David Brazdil0f672f62019-12-10 10:32:29 +0000354 const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000355{
356 int status;
357
358 status = nfs4_proc_exchange_id(clp, cred);
359 if (status != NFS4_OK)
360 return status;
361
362 status = nfs41_walk_client_list(clp, result, cred);
363 if (status < 0)
364 return status;
365 if (clp != *result)
366 return 0;
367
368 /*
369 * Purge state if the client id was established in a prior
370 * instance and the client id could not have arrived on the
371 * server via Transparent State Migration.
372 */
373 if (clp->cl_exchange_flags & EXCHGID4_FLAG_CONFIRMED_R) {
374 if (!test_bit(NFS_CS_TSM_POSSIBLE, &clp->cl_flags))
375 set_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state);
376 else
377 set_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
378 }
379 nfs4_schedule_state_manager(clp);
380 status = nfs_wait_client_init_complete(clp);
381 if (status < 0)
382 nfs_put_client(clp);
383 return status;
384}
385
386#endif /* CONFIG_NFS_V4_1 */
387
388/**
389 * nfs4_get_clid_cred - Acquire credential for a setclientid operation
390 * @clp: client state handle
391 *
David Brazdil0f672f62019-12-10 10:32:29 +0000392 * Returns a cred with reference count bumped, or NULL.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000393 */
David Brazdil0f672f62019-12-10 10:32:29 +0000394const struct cred *nfs4_get_clid_cred(struct nfs_client *clp)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000395{
David Brazdil0f672f62019-12-10 10:32:29 +0000396 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000397
David Brazdil0f672f62019-12-10 10:32:29 +0000398 cred = nfs4_get_machine_cred(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000399 return cred;
400}
401
402static struct nfs4_state_owner *
David Brazdil0f672f62019-12-10 10:32:29 +0000403nfs4_find_state_owner_locked(struct nfs_server *server, const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000404{
405 struct rb_node **p = &server->state_owners.rb_node,
406 *parent = NULL;
407 struct nfs4_state_owner *sp;
David Brazdil0f672f62019-12-10 10:32:29 +0000408 int cmp;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000409
410 while (*p != NULL) {
411 parent = *p;
412 sp = rb_entry(parent, struct nfs4_state_owner, so_server_node);
David Brazdil0f672f62019-12-10 10:32:29 +0000413 cmp = cred_fscmp(cred, sp->so_cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000414
David Brazdil0f672f62019-12-10 10:32:29 +0000415 if (cmp < 0)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000416 p = &parent->rb_left;
David Brazdil0f672f62019-12-10 10:32:29 +0000417 else if (cmp > 0)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000418 p = &parent->rb_right;
419 else {
420 if (!list_empty(&sp->so_lru))
421 list_del_init(&sp->so_lru);
422 atomic_inc(&sp->so_count);
423 return sp;
424 }
425 }
426 return NULL;
427}
428
429static struct nfs4_state_owner *
430nfs4_insert_state_owner_locked(struct nfs4_state_owner *new)
431{
432 struct nfs_server *server = new->so_server;
433 struct rb_node **p = &server->state_owners.rb_node,
434 *parent = NULL;
435 struct nfs4_state_owner *sp;
David Brazdil0f672f62019-12-10 10:32:29 +0000436 int cmp;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000437
438 while (*p != NULL) {
439 parent = *p;
440 sp = rb_entry(parent, struct nfs4_state_owner, so_server_node);
David Brazdil0f672f62019-12-10 10:32:29 +0000441 cmp = cred_fscmp(new->so_cred, sp->so_cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000442
David Brazdil0f672f62019-12-10 10:32:29 +0000443 if (cmp < 0)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000444 p = &parent->rb_left;
David Brazdil0f672f62019-12-10 10:32:29 +0000445 else if (cmp > 0)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000446 p = &parent->rb_right;
447 else {
448 if (!list_empty(&sp->so_lru))
449 list_del_init(&sp->so_lru);
450 atomic_inc(&sp->so_count);
451 return sp;
452 }
453 }
454 rb_link_node(&new->so_server_node, parent, p);
455 rb_insert_color(&new->so_server_node, &server->state_owners);
456 return new;
457}
458
459static void
460nfs4_remove_state_owner_locked(struct nfs4_state_owner *sp)
461{
462 struct nfs_server *server = sp->so_server;
463
464 if (!RB_EMPTY_NODE(&sp->so_server_node))
465 rb_erase(&sp->so_server_node, &server->state_owners);
466}
467
468static void
469nfs4_init_seqid_counter(struct nfs_seqid_counter *sc)
470{
471 sc->create_time = ktime_get();
472 sc->flags = 0;
473 sc->counter = 0;
474 spin_lock_init(&sc->lock);
475 INIT_LIST_HEAD(&sc->list);
476 rpc_init_wait_queue(&sc->wait, "Seqid_waitqueue");
477}
478
479static void
480nfs4_destroy_seqid_counter(struct nfs_seqid_counter *sc)
481{
482 rpc_destroy_wait_queue(&sc->wait);
483}
484
485/*
486 * nfs4_alloc_state_owner(): this is called on the OPEN or CREATE path to
487 * create a new state_owner.
488 *
489 */
490static struct nfs4_state_owner *
491nfs4_alloc_state_owner(struct nfs_server *server,
David Brazdil0f672f62019-12-10 10:32:29 +0000492 const struct cred *cred,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000493 gfp_t gfp_flags)
494{
495 struct nfs4_state_owner *sp;
496
497 sp = kzalloc(sizeof(*sp), gfp_flags);
498 if (!sp)
499 return NULL;
500 sp->so_seqid.owner_id = ida_simple_get(&server->openowner_id, 0, 0,
501 gfp_flags);
502 if (sp->so_seqid.owner_id < 0) {
503 kfree(sp);
504 return NULL;
505 }
506 sp->so_server = server;
David Brazdil0f672f62019-12-10 10:32:29 +0000507 sp->so_cred = get_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000508 spin_lock_init(&sp->so_lock);
509 INIT_LIST_HEAD(&sp->so_states);
510 nfs4_init_seqid_counter(&sp->so_seqid);
511 atomic_set(&sp->so_count, 1);
512 INIT_LIST_HEAD(&sp->so_lru);
Olivier Deprez157378f2022-04-04 15:47:50 +0200513 seqcount_spinlock_init(&sp->so_reclaim_seqcount, &sp->so_lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000514 mutex_init(&sp->so_delegreturn_mutex);
515 return sp;
516}
517
518static void
519nfs4_reset_state_owner(struct nfs4_state_owner *sp)
520{
521 /* This state_owner is no longer usable, but must
522 * remain in place so that state recovery can find it
523 * and the opens associated with it.
524 * It may also be used for new 'open' request to
525 * return a delegation to the server.
526 * So update the 'create_time' so that it looks like
527 * a new state_owner. This will cause the server to
528 * request an OPEN_CONFIRM to start a new sequence.
529 */
530 sp->so_seqid.create_time = ktime_get();
531}
532
533static void nfs4_free_state_owner(struct nfs4_state_owner *sp)
534{
535 nfs4_destroy_seqid_counter(&sp->so_seqid);
David Brazdil0f672f62019-12-10 10:32:29 +0000536 put_cred(sp->so_cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000537 ida_simple_remove(&sp->so_server->openowner_id, sp->so_seqid.owner_id);
538 kfree(sp);
539}
540
541static void nfs4_gc_state_owners(struct nfs_server *server)
542{
543 struct nfs_client *clp = server->nfs_client;
544 struct nfs4_state_owner *sp, *tmp;
545 unsigned long time_min, time_max;
546 LIST_HEAD(doomed);
547
548 spin_lock(&clp->cl_lock);
549 time_max = jiffies;
550 time_min = (long)time_max - (long)clp->cl_lease_time;
551 list_for_each_entry_safe(sp, tmp, &server->state_owners_lru, so_lru) {
552 /* NB: LRU is sorted so that oldest is at the head */
553 if (time_in_range(sp->so_expires, time_min, time_max))
554 break;
555 list_move(&sp->so_lru, &doomed);
556 nfs4_remove_state_owner_locked(sp);
557 }
558 spin_unlock(&clp->cl_lock);
559
560 list_for_each_entry_safe(sp, tmp, &doomed, so_lru) {
561 list_del(&sp->so_lru);
562 nfs4_free_state_owner(sp);
563 }
564}
565
566/**
567 * nfs4_get_state_owner - Look up a state owner given a credential
568 * @server: nfs_server to search
569 * @cred: RPC credential to match
David Brazdil0f672f62019-12-10 10:32:29 +0000570 * @gfp_flags: allocation mode
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000571 *
572 * Returns a pointer to an instantiated nfs4_state_owner struct, or NULL.
573 */
574struct nfs4_state_owner *nfs4_get_state_owner(struct nfs_server *server,
David Brazdil0f672f62019-12-10 10:32:29 +0000575 const struct cred *cred,
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000576 gfp_t gfp_flags)
577{
578 struct nfs_client *clp = server->nfs_client;
579 struct nfs4_state_owner *sp, *new;
580
581 spin_lock(&clp->cl_lock);
582 sp = nfs4_find_state_owner_locked(server, cred);
583 spin_unlock(&clp->cl_lock);
584 if (sp != NULL)
585 goto out;
586 new = nfs4_alloc_state_owner(server, cred, gfp_flags);
587 if (new == NULL)
588 goto out;
589 spin_lock(&clp->cl_lock);
590 sp = nfs4_insert_state_owner_locked(new);
591 spin_unlock(&clp->cl_lock);
592 if (sp != new)
593 nfs4_free_state_owner(new);
594out:
595 nfs4_gc_state_owners(server);
596 return sp;
597}
598
599/**
600 * nfs4_put_state_owner - Release a nfs4_state_owner
601 * @sp: state owner data to release
602 *
603 * Note that we keep released state owners on an LRU
604 * list.
605 * This caches valid state owners so that they can be
606 * reused, to avoid the OPEN_CONFIRM on minor version 0.
607 * It also pins the uniquifier of dropped state owners for
608 * a while, to ensure that those state owner names are
609 * never reused.
610 */
611void nfs4_put_state_owner(struct nfs4_state_owner *sp)
612{
613 struct nfs_server *server = sp->so_server;
614 struct nfs_client *clp = server->nfs_client;
615
616 if (!atomic_dec_and_lock(&sp->so_count, &clp->cl_lock))
617 return;
618
619 sp->so_expires = jiffies;
620 list_add_tail(&sp->so_lru, &server->state_owners_lru);
621 spin_unlock(&clp->cl_lock);
622}
623
624/**
625 * nfs4_purge_state_owners - Release all cached state owners
626 * @server: nfs_server with cached state owners to release
David Brazdil0f672f62019-12-10 10:32:29 +0000627 * @head: resulting list of state owners
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000628 *
629 * Called at umount time. Remaining state owners will be on
630 * the LRU with ref count of zero.
David Brazdil0f672f62019-12-10 10:32:29 +0000631 * Note that the state owners are not freed, but are added
632 * to the list @head, which can later be used as an argument
633 * to nfs4_free_state_owners.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000634 */
David Brazdil0f672f62019-12-10 10:32:29 +0000635void nfs4_purge_state_owners(struct nfs_server *server, struct list_head *head)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000636{
637 struct nfs_client *clp = server->nfs_client;
638 struct nfs4_state_owner *sp, *tmp;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000639
640 spin_lock(&clp->cl_lock);
641 list_for_each_entry_safe(sp, tmp, &server->state_owners_lru, so_lru) {
David Brazdil0f672f62019-12-10 10:32:29 +0000642 list_move(&sp->so_lru, head);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000643 nfs4_remove_state_owner_locked(sp);
644 }
645 spin_unlock(&clp->cl_lock);
David Brazdil0f672f62019-12-10 10:32:29 +0000646}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000647
David Brazdil0f672f62019-12-10 10:32:29 +0000648/**
649 * nfs4_purge_state_owners - Release all cached state owners
650 * @head: resulting list of state owners
651 *
652 * Frees a list of state owners that was generated by
653 * nfs4_purge_state_owners
654 */
655void nfs4_free_state_owners(struct list_head *head)
656{
657 struct nfs4_state_owner *sp, *tmp;
658
659 list_for_each_entry_safe(sp, tmp, head, so_lru) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000660 list_del(&sp->so_lru);
661 nfs4_free_state_owner(sp);
662 }
663}
664
665static struct nfs4_state *
666nfs4_alloc_open_state(void)
667{
668 struct nfs4_state *state;
669
670 state = kzalloc(sizeof(*state), GFP_NOFS);
671 if (!state)
672 return NULL;
David Brazdil0f672f62019-12-10 10:32:29 +0000673 refcount_set(&state->count, 1);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000674 INIT_LIST_HEAD(&state->lock_states);
675 spin_lock_init(&state->state_lock);
676 seqlock_init(&state->seqlock);
677 init_waitqueue_head(&state->waitq);
678 return state;
679}
680
681void
682nfs4_state_set_mode_locked(struct nfs4_state *state, fmode_t fmode)
683{
684 if (state->state == fmode)
685 return;
686 /* NB! List reordering - see the reclaim code for why. */
687 if ((fmode & FMODE_WRITE) != (state->state & FMODE_WRITE)) {
688 if (fmode & FMODE_WRITE)
689 list_move(&state->open_states, &state->owner->so_states);
690 else
691 list_move_tail(&state->open_states, &state->owner->so_states);
692 }
693 state->state = fmode;
694}
695
696static struct nfs4_state *
697__nfs4_find_state_byowner(struct inode *inode, struct nfs4_state_owner *owner)
698{
699 struct nfs_inode *nfsi = NFS_I(inode);
700 struct nfs4_state *state;
701
David Brazdil0f672f62019-12-10 10:32:29 +0000702 list_for_each_entry_rcu(state, &nfsi->open_states, inode_states) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000703 if (state->owner != owner)
704 continue;
705 if (!nfs4_valid_open_stateid(state))
706 continue;
David Brazdil0f672f62019-12-10 10:32:29 +0000707 if (refcount_inc_not_zero(&state->count))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000708 return state;
709 }
710 return NULL;
711}
712
713static void
714nfs4_free_open_state(struct nfs4_state *state)
715{
David Brazdil0f672f62019-12-10 10:32:29 +0000716 kfree_rcu(state, rcu_head);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000717}
718
719struct nfs4_state *
720nfs4_get_open_state(struct inode *inode, struct nfs4_state_owner *owner)
721{
722 struct nfs4_state *state, *new;
723 struct nfs_inode *nfsi = NFS_I(inode);
724
David Brazdil0f672f62019-12-10 10:32:29 +0000725 rcu_read_lock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000726 state = __nfs4_find_state_byowner(inode, owner);
David Brazdil0f672f62019-12-10 10:32:29 +0000727 rcu_read_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000728 if (state)
729 goto out;
730 new = nfs4_alloc_open_state();
731 spin_lock(&owner->so_lock);
732 spin_lock(&inode->i_lock);
733 state = __nfs4_find_state_byowner(inode, owner);
734 if (state == NULL && new != NULL) {
735 state = new;
736 state->owner = owner;
737 atomic_inc(&owner->so_count);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000738 ihold(inode);
739 state->inode = inode;
Olivier Deprez0e641232021-09-23 10:07:05 +0200740 list_add_rcu(&state->inode_states, &nfsi->open_states);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000741 spin_unlock(&inode->i_lock);
742 /* Note: The reclaim code dictates that we add stateless
743 * and read-only stateids to the end of the list */
744 list_add_tail(&state->open_states, &owner->so_states);
745 spin_unlock(&owner->so_lock);
746 } else {
747 spin_unlock(&inode->i_lock);
748 spin_unlock(&owner->so_lock);
749 if (new)
750 nfs4_free_open_state(new);
751 }
752out:
753 return state;
754}
755
756void nfs4_put_open_state(struct nfs4_state *state)
757{
758 struct inode *inode = state->inode;
759 struct nfs4_state_owner *owner = state->owner;
760
David Brazdil0f672f62019-12-10 10:32:29 +0000761 if (!refcount_dec_and_lock(&state->count, &owner->so_lock))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000762 return;
763 spin_lock(&inode->i_lock);
David Brazdil0f672f62019-12-10 10:32:29 +0000764 list_del_rcu(&state->inode_states);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000765 list_del(&state->open_states);
766 spin_unlock(&inode->i_lock);
767 spin_unlock(&owner->so_lock);
Olivier Deprez157378f2022-04-04 15:47:50 +0200768 nfs4_inode_return_delegation_on_close(inode);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000769 iput(inode);
770 nfs4_free_open_state(state);
771 nfs4_put_state_owner(owner);
772}
773
774/*
775 * Close the current file.
776 */
777static void __nfs4_close(struct nfs4_state *state,
778 fmode_t fmode, gfp_t gfp_mask, int wait)
779{
780 struct nfs4_state_owner *owner = state->owner;
781 int call_close = 0;
782 fmode_t newstate;
783
784 atomic_inc(&owner->so_count);
785 /* Protect against nfs4_find_state() */
786 spin_lock(&owner->so_lock);
787 switch (fmode & (FMODE_READ | FMODE_WRITE)) {
788 case FMODE_READ:
789 state->n_rdonly--;
790 break;
791 case FMODE_WRITE:
792 state->n_wronly--;
793 break;
794 case FMODE_READ|FMODE_WRITE:
795 state->n_rdwr--;
796 }
797 newstate = FMODE_READ|FMODE_WRITE;
798 if (state->n_rdwr == 0) {
799 if (state->n_rdonly == 0) {
800 newstate &= ~FMODE_READ;
801 call_close |= test_bit(NFS_O_RDONLY_STATE, &state->flags);
802 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
803 }
804 if (state->n_wronly == 0) {
805 newstate &= ~FMODE_WRITE;
806 call_close |= test_bit(NFS_O_WRONLY_STATE, &state->flags);
807 call_close |= test_bit(NFS_O_RDWR_STATE, &state->flags);
808 }
809 if (newstate == 0)
810 clear_bit(NFS_DELEGATED_STATE, &state->flags);
811 }
812 nfs4_state_set_mode_locked(state, newstate);
813 spin_unlock(&owner->so_lock);
814
815 if (!call_close) {
816 nfs4_put_open_state(state);
817 nfs4_put_state_owner(owner);
818 } else
819 nfs4_do_close(state, gfp_mask, wait);
820}
821
822void nfs4_close_state(struct nfs4_state *state, fmode_t fmode)
823{
824 __nfs4_close(state, fmode, GFP_NOFS, 0);
825}
826
827void nfs4_close_sync(struct nfs4_state *state, fmode_t fmode)
828{
829 __nfs4_close(state, fmode, GFP_KERNEL, 1);
830}
831
832/*
833 * Search the state->lock_states for an existing lock_owner
834 * that is compatible with either of the given owners.
835 * If the second is non-zero, then the first refers to a Posix-lock
836 * owner (current->files) and the second refers to a flock/OFD
837 * owner (struct file*). In that case, prefer a match for the first
838 * owner.
839 * If both sorts of locks are held on the one file we cannot know
840 * which stateid was intended to be used, so a "correct" choice cannot
841 * be made. Failing that, a "consistent" choice is preferable. The
842 * consistent choice we make is to prefer the first owner, that of a
843 * Posix lock.
844 */
845static struct nfs4_lock_state *
846__nfs4_find_lock_state(struct nfs4_state *state,
847 fl_owner_t fl_owner, fl_owner_t fl_owner2)
848{
849 struct nfs4_lock_state *pos, *ret = NULL;
850 list_for_each_entry(pos, &state->lock_states, ls_locks) {
851 if (pos->ls_owner == fl_owner) {
852 ret = pos;
853 break;
854 }
855 if (pos->ls_owner == fl_owner2)
856 ret = pos;
857 }
858 if (ret)
859 refcount_inc(&ret->ls_count);
860 return ret;
861}
862
863/*
864 * Return a compatible lock_state. If no initialized lock_state structure
865 * exists, return an uninitialized one.
866 *
867 */
868static struct nfs4_lock_state *nfs4_alloc_lock_state(struct nfs4_state *state, fl_owner_t fl_owner)
869{
870 struct nfs4_lock_state *lsp;
871 struct nfs_server *server = state->owner->so_server;
872
873 lsp = kzalloc(sizeof(*lsp), GFP_NOFS);
874 if (lsp == NULL)
875 return NULL;
876 nfs4_init_seqid_counter(&lsp->ls_seqid);
877 refcount_set(&lsp->ls_count, 1);
878 lsp->ls_state = state;
879 lsp->ls_owner = fl_owner;
880 lsp->ls_seqid.owner_id = ida_simple_get(&server->lockowner_id, 0, 0, GFP_NOFS);
881 if (lsp->ls_seqid.owner_id < 0)
882 goto out_free;
883 INIT_LIST_HEAD(&lsp->ls_locks);
884 return lsp;
885out_free:
886 kfree(lsp);
887 return NULL;
888}
889
890void nfs4_free_lock_state(struct nfs_server *server, struct nfs4_lock_state *lsp)
891{
892 ida_simple_remove(&server->lockowner_id, lsp->ls_seqid.owner_id);
893 nfs4_destroy_seqid_counter(&lsp->ls_seqid);
894 kfree(lsp);
895}
896
897/*
898 * Return a compatible lock_state. If no initialized lock_state structure
899 * exists, return an uninitialized one.
900 *
901 */
902static struct nfs4_lock_state *nfs4_get_lock_state(struct nfs4_state *state, fl_owner_t owner)
903{
904 struct nfs4_lock_state *lsp, *new = NULL;
905
906 for(;;) {
907 spin_lock(&state->state_lock);
908 lsp = __nfs4_find_lock_state(state, owner, NULL);
909 if (lsp != NULL)
910 break;
911 if (new != NULL) {
912 list_add(&new->ls_locks, &state->lock_states);
913 set_bit(LK_STATE_IN_USE, &state->flags);
914 lsp = new;
915 new = NULL;
916 break;
917 }
918 spin_unlock(&state->state_lock);
919 new = nfs4_alloc_lock_state(state, owner);
920 if (new == NULL)
921 return NULL;
922 }
923 spin_unlock(&state->state_lock);
924 if (new != NULL)
925 nfs4_free_lock_state(state->owner->so_server, new);
926 return lsp;
927}
928
929/*
930 * Release reference to lock_state, and free it if we see that
931 * it is no longer in use
932 */
933void nfs4_put_lock_state(struct nfs4_lock_state *lsp)
934{
935 struct nfs_server *server;
936 struct nfs4_state *state;
937
938 if (lsp == NULL)
939 return;
940 state = lsp->ls_state;
941 if (!refcount_dec_and_lock(&lsp->ls_count, &state->state_lock))
942 return;
943 list_del(&lsp->ls_locks);
944 if (list_empty(&state->lock_states))
945 clear_bit(LK_STATE_IN_USE, &state->flags);
946 spin_unlock(&state->state_lock);
947 server = state->owner->so_server;
948 if (test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags)) {
949 struct nfs_client *clp = server->nfs_client;
950
951 clp->cl_mvops->free_lock_state(server, lsp);
952 } else
953 nfs4_free_lock_state(server, lsp);
954}
955
956static void nfs4_fl_copy_lock(struct file_lock *dst, struct file_lock *src)
957{
958 struct nfs4_lock_state *lsp = src->fl_u.nfs4_fl.owner;
959
960 dst->fl_u.nfs4_fl.owner = lsp;
961 refcount_inc(&lsp->ls_count);
962}
963
964static void nfs4_fl_release_lock(struct file_lock *fl)
965{
966 nfs4_put_lock_state(fl->fl_u.nfs4_fl.owner);
967}
968
969static const struct file_lock_operations nfs4_fl_lock_ops = {
970 .fl_copy_lock = nfs4_fl_copy_lock,
971 .fl_release_private = nfs4_fl_release_lock,
972};
973
974int nfs4_set_lock_state(struct nfs4_state *state, struct file_lock *fl)
975{
976 struct nfs4_lock_state *lsp;
977
978 if (fl->fl_ops != NULL)
979 return 0;
980 lsp = nfs4_get_lock_state(state, fl->fl_owner);
981 if (lsp == NULL)
982 return -ENOMEM;
983 fl->fl_u.nfs4_fl.owner = lsp;
984 fl->fl_ops = &nfs4_fl_lock_ops;
985 return 0;
986}
987
988static int nfs4_copy_lock_stateid(nfs4_stateid *dst,
989 struct nfs4_state *state,
990 const struct nfs_lock_context *l_ctx)
991{
992 struct nfs4_lock_state *lsp;
993 fl_owner_t fl_owner, fl_flock_owner;
994 int ret = -ENOENT;
995
996 if (l_ctx == NULL)
997 goto out;
998
999 if (test_bit(LK_STATE_IN_USE, &state->flags) == 0)
1000 goto out;
1001
1002 fl_owner = l_ctx->lockowner;
1003 fl_flock_owner = l_ctx->open_context->flock_owner;
1004
1005 spin_lock(&state->state_lock);
1006 lsp = __nfs4_find_lock_state(state, fl_owner, fl_flock_owner);
1007 if (lsp && test_bit(NFS_LOCK_LOST, &lsp->ls_flags))
1008 ret = -EIO;
1009 else if (lsp != NULL && test_bit(NFS_LOCK_INITIALIZED, &lsp->ls_flags) != 0) {
1010 nfs4_stateid_copy(dst, &lsp->ls_stateid);
1011 ret = 0;
1012 }
1013 spin_unlock(&state->state_lock);
1014 nfs4_put_lock_state(lsp);
1015out:
1016 return ret;
1017}
1018
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001019bool nfs4_copy_open_stateid(nfs4_stateid *dst, struct nfs4_state *state)
1020{
1021 bool ret;
1022 const nfs4_stateid *src;
1023 int seq;
1024
1025 do {
1026 ret = false;
1027 src = &zero_stateid;
1028 seq = read_seqbegin(&state->seqlock);
1029 if (test_bit(NFS_OPEN_STATE, &state->flags)) {
1030 src = &state->open_stateid;
1031 ret = true;
1032 }
1033 nfs4_stateid_copy(dst, src);
1034 } while (read_seqretry(&state->seqlock, seq));
1035 return ret;
1036}
1037
1038/*
1039 * Byte-range lock aware utility to initialize the stateid of read/write
1040 * requests.
1041 */
1042int nfs4_select_rw_stateid(struct nfs4_state *state,
1043 fmode_t fmode, const struct nfs_lock_context *l_ctx,
David Brazdil0f672f62019-12-10 10:32:29 +00001044 nfs4_stateid *dst, const struct cred **cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001045{
1046 int ret;
1047
1048 if (!nfs4_valid_open_stateid(state))
1049 return -EIO;
1050 if (cred != NULL)
1051 *cred = NULL;
1052 ret = nfs4_copy_lock_stateid(dst, state, l_ctx);
1053 if (ret == -EIO)
1054 /* A lost lock - don't even consider delegations */
1055 goto out;
1056 /* returns true if delegation stateid found and copied */
1057 if (nfs4_copy_delegation_stateid(state->inode, fmode, dst, cred)) {
1058 ret = 0;
1059 goto out;
1060 }
1061 if (ret != -ENOENT)
1062 /* nfs4_copy_delegation_stateid() didn't over-write
1063 * dst, so it still has the lock stateid which we now
1064 * choose to use.
1065 */
1066 goto out;
David Brazdil0f672f62019-12-10 10:32:29 +00001067 ret = nfs4_copy_open_stateid(dst, state) ? 0 : -EAGAIN;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001068out:
1069 if (nfs_server_capable(state->inode, NFS_CAP_STATEID_NFSV41))
1070 dst->seqid = 0;
1071 return ret;
1072}
1073
1074struct nfs_seqid *nfs_alloc_seqid(struct nfs_seqid_counter *counter, gfp_t gfp_mask)
1075{
1076 struct nfs_seqid *new;
1077
1078 new = kmalloc(sizeof(*new), gfp_mask);
1079 if (new == NULL)
1080 return ERR_PTR(-ENOMEM);
1081 new->sequence = counter;
1082 INIT_LIST_HEAD(&new->list);
1083 new->task = NULL;
1084 return new;
1085}
1086
1087void nfs_release_seqid(struct nfs_seqid *seqid)
1088{
1089 struct nfs_seqid_counter *sequence;
1090
1091 if (seqid == NULL || list_empty(&seqid->list))
1092 return;
1093 sequence = seqid->sequence;
1094 spin_lock(&sequence->lock);
1095 list_del_init(&seqid->list);
1096 if (!list_empty(&sequence->list)) {
1097 struct nfs_seqid *next;
1098
1099 next = list_first_entry(&sequence->list,
1100 struct nfs_seqid, list);
1101 rpc_wake_up_queued_task(&sequence->wait, next->task);
1102 }
1103 spin_unlock(&sequence->lock);
1104}
1105
1106void nfs_free_seqid(struct nfs_seqid *seqid)
1107{
1108 nfs_release_seqid(seqid);
1109 kfree(seqid);
1110}
1111
1112/*
1113 * Increment the seqid if the OPEN/OPEN_DOWNGRADE/CLOSE succeeded, or
1114 * failed with a seqid incrementing error -
1115 * see comments nfs4.h:seqid_mutating_error()
1116 */
1117static void nfs_increment_seqid(int status, struct nfs_seqid *seqid)
1118{
1119 switch (status) {
1120 case 0:
1121 break;
1122 case -NFS4ERR_BAD_SEQID:
1123 if (seqid->sequence->flags & NFS_SEQID_CONFIRMED)
1124 return;
1125 pr_warn_ratelimited("NFS: v4 server returned a bad"
1126 " sequence-id error on an"
1127 " unconfirmed sequence %p!\n",
1128 seqid->sequence);
1129 case -NFS4ERR_STALE_CLIENTID:
1130 case -NFS4ERR_STALE_STATEID:
1131 case -NFS4ERR_BAD_STATEID:
1132 case -NFS4ERR_BADXDR:
1133 case -NFS4ERR_RESOURCE:
1134 case -NFS4ERR_NOFILEHANDLE:
1135 case -NFS4ERR_MOVED:
1136 /* Non-seqid mutating errors */
1137 return;
Olivier Deprez157378f2022-04-04 15:47:50 +02001138 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001139 /*
1140 * Note: no locking needed as we are guaranteed to be first
1141 * on the sequence list
1142 */
1143 seqid->sequence->counter++;
1144}
1145
1146void nfs_increment_open_seqid(int status, struct nfs_seqid *seqid)
1147{
1148 struct nfs4_state_owner *sp;
1149
1150 if (seqid == NULL)
1151 return;
1152
1153 sp = container_of(seqid->sequence, struct nfs4_state_owner, so_seqid);
1154 if (status == -NFS4ERR_BAD_SEQID)
1155 nfs4_reset_state_owner(sp);
1156 if (!nfs4_has_session(sp->so_server->nfs_client))
1157 nfs_increment_seqid(status, seqid);
1158}
1159
1160/*
1161 * Increment the seqid if the LOCK/LOCKU succeeded, or
1162 * failed with a seqid incrementing error -
1163 * see comments nfs4.h:seqid_mutating_error()
1164 */
1165void nfs_increment_lock_seqid(int status, struct nfs_seqid *seqid)
1166{
1167 if (seqid != NULL)
1168 nfs_increment_seqid(status, seqid);
1169}
1170
1171int nfs_wait_on_sequence(struct nfs_seqid *seqid, struct rpc_task *task)
1172{
1173 struct nfs_seqid_counter *sequence;
1174 int status = 0;
1175
1176 if (seqid == NULL)
1177 goto out;
1178 sequence = seqid->sequence;
1179 spin_lock(&sequence->lock);
1180 seqid->task = task;
1181 if (list_empty(&seqid->list))
1182 list_add_tail(&seqid->list, &sequence->list);
1183 if (list_first_entry(&sequence->list, struct nfs_seqid, list) == seqid)
1184 goto unlock;
1185 rpc_sleep_on(&sequence->wait, task, NULL);
1186 status = -EAGAIN;
1187unlock:
1188 spin_unlock(&sequence->lock);
1189out:
1190 return status;
1191}
1192
1193static int nfs4_run_state_manager(void *);
1194
1195static void nfs4_clear_state_manager_bit(struct nfs_client *clp)
1196{
1197 smp_mb__before_atomic();
1198 clear_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state);
1199 smp_mb__after_atomic();
1200 wake_up_bit(&clp->cl_state, NFS4CLNT_MANAGER_RUNNING);
1201 rpc_wake_up(&clp->cl_rpcwaitq);
1202}
1203
1204/*
1205 * Schedule the nfs_client asynchronous state management routine
1206 */
1207void nfs4_schedule_state_manager(struct nfs_client *clp)
1208{
1209 struct task_struct *task;
1210 char buf[INET6_ADDRSTRLEN + sizeof("-manager") + 1];
1211
1212 set_bit(NFS4CLNT_RUN_MANAGER, &clp->cl_state);
1213 if (test_and_set_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) != 0)
1214 return;
1215 __module_get(THIS_MODULE);
1216 refcount_inc(&clp->cl_count);
1217
1218 /* The rcu_read_lock() is not strictly necessary, as the state
1219 * manager is the only thread that ever changes the rpc_xprt
1220 * after it's initialized. At this point, we're single threaded. */
1221 rcu_read_lock();
1222 snprintf(buf, sizeof(buf), "%s-manager",
1223 rpc_peeraddr2str(clp->cl_rpcclient, RPC_DISPLAY_ADDR));
1224 rcu_read_unlock();
1225 task = kthread_run(nfs4_run_state_manager, clp, "%s", buf);
1226 if (IS_ERR(task)) {
1227 printk(KERN_ERR "%s: kthread_run: %ld\n",
1228 __func__, PTR_ERR(task));
1229 nfs4_clear_state_manager_bit(clp);
1230 nfs_put_client(clp);
1231 module_put(THIS_MODULE);
1232 }
1233}
1234
1235/*
1236 * Schedule a lease recovery attempt
1237 */
1238void nfs4_schedule_lease_recovery(struct nfs_client *clp)
1239{
1240 if (!clp)
1241 return;
1242 if (!test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
1243 set_bit(NFS4CLNT_CHECK_LEASE, &clp->cl_state);
1244 dprintk("%s: scheduling lease recovery for server %s\n", __func__,
1245 clp->cl_hostname);
1246 nfs4_schedule_state_manager(clp);
1247}
1248EXPORT_SYMBOL_GPL(nfs4_schedule_lease_recovery);
1249
1250/**
1251 * nfs4_schedule_migration_recovery - trigger migration recovery
1252 *
1253 * @server: FSID that is migrating
1254 *
1255 * Returns zero if recovery has started, otherwise a negative NFS4ERR
1256 * value is returned.
1257 */
1258int nfs4_schedule_migration_recovery(const struct nfs_server *server)
1259{
1260 struct nfs_client *clp = server->nfs_client;
1261
1262 if (server->fh_expire_type != NFS4_FH_PERSISTENT) {
1263 pr_err("NFS: volatile file handles not supported (server %s)\n",
1264 clp->cl_hostname);
1265 return -NFS4ERR_IO;
1266 }
1267
1268 if (test_bit(NFS_MIG_FAILED, &server->mig_status))
1269 return -NFS4ERR_IO;
1270
1271 dprintk("%s: scheduling migration recovery for (%llx:%llx) on %s\n",
1272 __func__,
1273 (unsigned long long)server->fsid.major,
1274 (unsigned long long)server->fsid.minor,
1275 clp->cl_hostname);
1276
1277 set_bit(NFS_MIG_IN_TRANSITION,
1278 &((struct nfs_server *)server)->mig_status);
1279 set_bit(NFS4CLNT_MOVED, &clp->cl_state);
1280
1281 nfs4_schedule_state_manager(clp);
1282 return 0;
1283}
1284EXPORT_SYMBOL_GPL(nfs4_schedule_migration_recovery);
1285
1286/**
1287 * nfs4_schedule_lease_moved_recovery - start lease-moved recovery
1288 *
1289 * @clp: server to check for moved leases
1290 *
1291 */
1292void nfs4_schedule_lease_moved_recovery(struct nfs_client *clp)
1293{
1294 dprintk("%s: scheduling lease-moved recovery for client ID %llx on %s\n",
1295 __func__, clp->cl_clientid, clp->cl_hostname);
1296
1297 set_bit(NFS4CLNT_LEASE_MOVED, &clp->cl_state);
1298 nfs4_schedule_state_manager(clp);
1299}
1300EXPORT_SYMBOL_GPL(nfs4_schedule_lease_moved_recovery);
1301
1302int nfs4_wait_clnt_recover(struct nfs_client *clp)
1303{
1304 int res;
1305
1306 might_sleep();
1307
1308 refcount_inc(&clp->cl_count);
1309 res = wait_on_bit_action(&clp->cl_state, NFS4CLNT_MANAGER_RUNNING,
1310 nfs_wait_bit_killable, TASK_KILLABLE);
1311 if (res)
1312 goto out;
1313 if (clp->cl_cons_state < 0)
1314 res = clp->cl_cons_state;
1315out:
1316 nfs_put_client(clp);
1317 return res;
1318}
1319
1320int nfs4_client_recover_expired_lease(struct nfs_client *clp)
1321{
1322 unsigned int loop;
1323 int ret;
1324
1325 for (loop = NFS4_MAX_LOOP_ON_RECOVER; loop != 0; loop--) {
1326 ret = nfs4_wait_clnt_recover(clp);
1327 if (ret != 0)
1328 break;
1329 if (!test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state) &&
1330 !test_bit(NFS4CLNT_CHECK_LEASE,&clp->cl_state))
1331 break;
1332 nfs4_schedule_state_manager(clp);
1333 ret = -EIO;
1334 }
1335 return ret;
1336}
1337
1338/*
1339 * nfs40_handle_cb_pathdown - return all delegations after NFS4ERR_CB_PATH_DOWN
1340 * @clp: client to process
1341 *
1342 * Set the NFS4CLNT_LEASE_EXPIRED state in order to force a
1343 * resend of the SETCLIENTID and hence re-establish the
1344 * callback channel. Then return all existing delegations.
1345 */
1346static void nfs40_handle_cb_pathdown(struct nfs_client *clp)
1347{
1348 set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
1349 nfs_expire_all_delegations(clp);
1350 dprintk("%s: handling CB_PATHDOWN recovery for server %s\n", __func__,
1351 clp->cl_hostname);
1352}
1353
1354void nfs4_schedule_path_down_recovery(struct nfs_client *clp)
1355{
1356 nfs40_handle_cb_pathdown(clp);
1357 nfs4_schedule_state_manager(clp);
1358}
1359
1360static int nfs4_state_mark_reclaim_reboot(struct nfs_client *clp, struct nfs4_state *state)
1361{
1362
1363 if (!nfs4_valid_open_stateid(state))
1364 return 0;
1365 set_bit(NFS_STATE_RECLAIM_REBOOT, &state->flags);
1366 /* Don't recover state that expired before the reboot */
1367 if (test_bit(NFS_STATE_RECLAIM_NOGRACE, &state->flags)) {
1368 clear_bit(NFS_STATE_RECLAIM_REBOOT, &state->flags);
1369 return 0;
1370 }
1371 set_bit(NFS_OWNER_RECLAIM_REBOOT, &state->owner->so_flags);
1372 set_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state);
1373 return 1;
1374}
1375
1376int nfs4_state_mark_reclaim_nograce(struct nfs_client *clp, struct nfs4_state *state)
1377{
1378 if (!nfs4_valid_open_stateid(state))
1379 return 0;
1380 set_bit(NFS_STATE_RECLAIM_NOGRACE, &state->flags);
1381 clear_bit(NFS_STATE_RECLAIM_REBOOT, &state->flags);
1382 set_bit(NFS_OWNER_RECLAIM_NOGRACE, &state->owner->so_flags);
1383 set_bit(NFS4CLNT_RECLAIM_NOGRACE, &clp->cl_state);
1384 return 1;
1385}
1386
1387int nfs4_schedule_stateid_recovery(const struct nfs_server *server, struct nfs4_state *state)
1388{
1389 struct nfs_client *clp = server->nfs_client;
1390
1391 if (!nfs4_state_mark_reclaim_nograce(clp, state))
1392 return -EBADF;
1393 nfs_inode_find_delegation_state_and_recover(state->inode,
1394 &state->stateid);
1395 dprintk("%s: scheduling stateid recovery for server %s\n", __func__,
1396 clp->cl_hostname);
1397 nfs4_schedule_state_manager(clp);
1398 return 0;
1399}
1400EXPORT_SYMBOL_GPL(nfs4_schedule_stateid_recovery);
1401
1402static struct nfs4_lock_state *
1403nfs_state_find_lock_state_by_stateid(struct nfs4_state *state,
1404 const nfs4_stateid *stateid)
1405{
1406 struct nfs4_lock_state *pos;
1407
1408 list_for_each_entry(pos, &state->lock_states, ls_locks) {
1409 if (!test_bit(NFS_LOCK_INITIALIZED, &pos->ls_flags))
1410 continue;
Olivier Deprez157378f2022-04-04 15:47:50 +02001411 if (nfs4_stateid_match_or_older(&pos->ls_stateid, stateid))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001412 return pos;
1413 }
1414 return NULL;
1415}
1416
1417static bool nfs_state_lock_state_matches_stateid(struct nfs4_state *state,
1418 const nfs4_stateid *stateid)
1419{
1420 bool found = false;
1421
1422 if (test_bit(LK_STATE_IN_USE, &state->flags)) {
1423 spin_lock(&state->state_lock);
1424 if (nfs_state_find_lock_state_by_stateid(state, stateid))
1425 found = true;
1426 spin_unlock(&state->state_lock);
1427 }
1428 return found;
1429}
1430
1431void nfs_inode_find_state_and_recover(struct inode *inode,
1432 const nfs4_stateid *stateid)
1433{
1434 struct nfs_client *clp = NFS_SERVER(inode)->nfs_client;
1435 struct nfs_inode *nfsi = NFS_I(inode);
1436 struct nfs_open_context *ctx;
1437 struct nfs4_state *state;
1438 bool found = false;
1439
David Brazdil0f672f62019-12-10 10:32:29 +00001440 rcu_read_lock();
1441 list_for_each_entry_rcu(ctx, &nfsi->open_files, list) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001442 state = ctx->state;
1443 if (state == NULL)
1444 continue;
Olivier Deprez157378f2022-04-04 15:47:50 +02001445 if (nfs4_stateid_match_or_older(&state->stateid, stateid) &&
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001446 nfs4_state_mark_reclaim_nograce(clp, state)) {
1447 found = true;
1448 continue;
1449 }
Olivier Deprez157378f2022-04-04 15:47:50 +02001450 if (test_bit(NFS_OPEN_STATE, &state->flags) &&
1451 nfs4_stateid_match_or_older(&state->open_stateid, stateid) &&
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001452 nfs4_state_mark_reclaim_nograce(clp, state)) {
1453 found = true;
1454 continue;
1455 }
1456 if (nfs_state_lock_state_matches_stateid(state, stateid) &&
1457 nfs4_state_mark_reclaim_nograce(clp, state))
1458 found = true;
1459 }
David Brazdil0f672f62019-12-10 10:32:29 +00001460 rcu_read_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001461
1462 nfs_inode_find_delegation_state_and_recover(inode, stateid);
1463 if (found)
1464 nfs4_schedule_state_manager(clp);
1465}
1466
David Brazdil0f672f62019-12-10 10:32:29 +00001467static void nfs4_state_mark_open_context_bad(struct nfs4_state *state, int err)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001468{
1469 struct inode *inode = state->inode;
1470 struct nfs_inode *nfsi = NFS_I(inode);
1471 struct nfs_open_context *ctx;
1472
David Brazdil0f672f62019-12-10 10:32:29 +00001473 rcu_read_lock();
1474 list_for_each_entry_rcu(ctx, &nfsi->open_files, list) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001475 if (ctx->state != state)
1476 continue;
1477 set_bit(NFS_CONTEXT_BAD, &ctx->flags);
David Brazdil0f672f62019-12-10 10:32:29 +00001478 pr_warn("NFSv4: state recovery failed for open file %pd2, "
1479 "error = %d\n", ctx->dentry, err);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001480 }
David Brazdil0f672f62019-12-10 10:32:29 +00001481 rcu_read_unlock();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001482}
1483
1484static void nfs4_state_mark_recovery_failed(struct nfs4_state *state, int error)
1485{
1486 set_bit(NFS_STATE_RECOVERY_FAILED, &state->flags);
David Brazdil0f672f62019-12-10 10:32:29 +00001487 nfs4_state_mark_open_context_bad(state, error);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001488}
1489
1490
1491static int nfs4_reclaim_locks(struct nfs4_state *state, const struct nfs4_state_recovery_ops *ops)
1492{
1493 struct inode *inode = state->inode;
1494 struct nfs_inode *nfsi = NFS_I(inode);
1495 struct file_lock *fl;
1496 struct nfs4_lock_state *lsp;
1497 int status = 0;
1498 struct file_lock_context *flctx = inode->i_flctx;
1499 struct list_head *list;
1500
1501 if (flctx == NULL)
1502 return 0;
1503
1504 list = &flctx->flc_posix;
1505
1506 /* Guard against delegation returns and new lock/unlock calls */
1507 down_write(&nfsi->rwsem);
1508 spin_lock(&flctx->flc_lock);
1509restart:
1510 list_for_each_entry(fl, list, fl_list) {
1511 if (nfs_file_open_context(fl->fl_file)->state != state)
1512 continue;
1513 spin_unlock(&flctx->flc_lock);
1514 status = ops->recover_lock(state, fl);
1515 switch (status) {
1516 case 0:
1517 break;
David Brazdil0f672f62019-12-10 10:32:29 +00001518 case -ETIMEDOUT:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001519 case -ESTALE:
1520 case -NFS4ERR_ADMIN_REVOKED:
1521 case -NFS4ERR_STALE_STATEID:
1522 case -NFS4ERR_BAD_STATEID:
1523 case -NFS4ERR_EXPIRED:
1524 case -NFS4ERR_NO_GRACE:
1525 case -NFS4ERR_STALE_CLIENTID:
1526 case -NFS4ERR_BADSESSION:
1527 case -NFS4ERR_BADSLOT:
1528 case -NFS4ERR_BAD_HIGH_SLOT:
1529 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1530 goto out;
1531 default:
1532 pr_err("NFS: %s: unhandled error %d\n",
1533 __func__, status);
Olivier Deprez157378f2022-04-04 15:47:50 +02001534 fallthrough;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001535 case -ENOMEM:
1536 case -NFS4ERR_DENIED:
1537 case -NFS4ERR_RECLAIM_BAD:
1538 case -NFS4ERR_RECLAIM_CONFLICT:
1539 lsp = fl->fl_u.nfs4_fl.owner;
1540 if (lsp)
1541 set_bit(NFS_LOCK_LOST, &lsp->ls_flags);
1542 status = 0;
1543 }
1544 spin_lock(&flctx->flc_lock);
1545 }
1546 if (list == &flctx->flc_posix) {
1547 list = &flctx->flc_flock;
1548 goto restart;
1549 }
1550 spin_unlock(&flctx->flc_lock);
1551out:
1552 up_write(&nfsi->rwsem);
1553 return status;
1554}
1555
David Brazdil0f672f62019-12-10 10:32:29 +00001556#ifdef CONFIG_NFS_V4_2
1557static void nfs42_complete_copies(struct nfs4_state_owner *sp, struct nfs4_state *state)
1558{
1559 struct nfs4_copy_state *copy;
1560
Olivier Deprez157378f2022-04-04 15:47:50 +02001561 if (!test_bit(NFS_CLNT_DST_SSC_COPY_STATE, &state->flags) &&
1562 !test_bit(NFS_CLNT_SRC_SSC_COPY_STATE, &state->flags))
David Brazdil0f672f62019-12-10 10:32:29 +00001563 return;
1564
1565 spin_lock(&sp->so_server->nfs_client->cl_lock);
1566 list_for_each_entry(copy, &sp->so_server->ss_copies, copies) {
Olivier Deprez157378f2022-04-04 15:47:50 +02001567 if ((test_bit(NFS_CLNT_DST_SSC_COPY_STATE, &state->flags) &&
1568 !nfs4_stateid_match_other(&state->stateid,
1569 &copy->parent_dst_state->stateid)))
1570 continue;
David Brazdil0f672f62019-12-10 10:32:29 +00001571 copy->flags = 1;
Olivier Deprez157378f2022-04-04 15:47:50 +02001572 if (test_and_clear_bit(NFS_CLNT_DST_SSC_COPY_STATE,
1573 &state->flags)) {
1574 clear_bit(NFS_CLNT_SRC_SSC_COPY_STATE, &state->flags);
1575 complete(&copy->completion);
1576 }
1577 }
1578 list_for_each_entry(copy, &sp->so_server->ss_copies, src_copies) {
1579 if ((test_bit(NFS_CLNT_SRC_SSC_COPY_STATE, &state->flags) &&
1580 !nfs4_stateid_match_other(&state->stateid,
1581 &copy->parent_src_state->stateid)))
1582 continue;
1583 copy->flags = 1;
1584 if (test_and_clear_bit(NFS_CLNT_DST_SSC_COPY_STATE,
1585 &state->flags))
1586 complete(&copy->completion);
David Brazdil0f672f62019-12-10 10:32:29 +00001587 }
1588 spin_unlock(&sp->so_server->nfs_client->cl_lock);
1589}
1590#else /* !CONFIG_NFS_V4_2 */
1591static inline void nfs42_complete_copies(struct nfs4_state_owner *sp,
1592 struct nfs4_state *state)
1593{
1594}
1595#endif /* CONFIG_NFS_V4_2 */
1596
1597static int __nfs4_reclaim_open_state(struct nfs4_state_owner *sp, struct nfs4_state *state,
1598 const struct nfs4_state_recovery_ops *ops)
1599{
1600 struct nfs4_lock_state *lock;
1601 int status;
1602
1603 status = ops->recover_open(sp, state);
1604 if (status < 0)
1605 return status;
1606
1607 status = nfs4_reclaim_locks(state, ops);
1608 if (status < 0)
1609 return status;
1610
1611 if (!test_bit(NFS_DELEGATED_STATE, &state->flags)) {
1612 spin_lock(&state->state_lock);
1613 list_for_each_entry(lock, &state->lock_states, ls_locks) {
Olivier Deprez157378f2022-04-04 15:47:50 +02001614 trace_nfs4_state_lock_reclaim(state, lock);
David Brazdil0f672f62019-12-10 10:32:29 +00001615 if (!test_bit(NFS_LOCK_INITIALIZED, &lock->ls_flags))
1616 pr_warn_ratelimited("NFS: %s: Lock reclaim failed!\n", __func__);
1617 }
1618 spin_unlock(&state->state_lock);
1619 }
1620
1621 nfs42_complete_copies(sp, state);
1622 clear_bit(NFS_STATE_RECLAIM_NOGRACE, &state->flags);
1623 return status;
1624}
1625
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001626static int nfs4_reclaim_open_state(struct nfs4_state_owner *sp, const struct nfs4_state_recovery_ops *ops)
1627{
1628 struct nfs4_state *state;
David Brazdil0f672f62019-12-10 10:32:29 +00001629 unsigned int loop = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001630 int status = 0;
Olivier Deprez157378f2022-04-04 15:47:50 +02001631#ifdef CONFIG_NFS_V4_2
1632 bool found_ssc_copy_state = false;
1633#endif /* CONFIG_NFS_V4_2 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001634
1635 /* Note: we rely on the sp->so_states list being ordered
1636 * so that we always reclaim open(O_RDWR) and/or open(O_WRITE)
1637 * states first.
1638 * This is needed to ensure that the server won't give us any
1639 * read delegations that we have to return if, say, we are
1640 * recovering after a network partition or a reboot from a
1641 * server that doesn't support a grace period.
1642 */
1643 spin_lock(&sp->so_lock);
1644 raw_write_seqcount_begin(&sp->so_reclaim_seqcount);
1645restart:
1646 list_for_each_entry(state, &sp->so_states, open_states) {
1647 if (!test_and_clear_bit(ops->state_flag_bit, &state->flags))
1648 continue;
1649 if (!nfs4_valid_open_stateid(state))
1650 continue;
1651 if (state->state == 0)
1652 continue;
Olivier Deprez157378f2022-04-04 15:47:50 +02001653#ifdef CONFIG_NFS_V4_2
1654 if (test_bit(NFS_SRV_SSC_COPY_STATE, &state->flags)) {
1655 nfs4_state_mark_recovery_failed(state, -EIO);
1656 found_ssc_copy_state = true;
1657 continue;
1658 }
1659#endif /* CONFIG_NFS_V4_2 */
David Brazdil0f672f62019-12-10 10:32:29 +00001660 refcount_inc(&state->count);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001661 spin_unlock(&sp->so_lock);
David Brazdil0f672f62019-12-10 10:32:29 +00001662 status = __nfs4_reclaim_open_state(sp, state, ops);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001663
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001664 switch (status) {
David Brazdil0f672f62019-12-10 10:32:29 +00001665 default:
1666 if (status >= 0) {
1667 loop = 0;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001668 break;
David Brazdil0f672f62019-12-10 10:32:29 +00001669 }
1670 printk(KERN_ERR "NFS: %s: unhandled error %d\n", __func__, status);
Olivier Deprez157378f2022-04-04 15:47:50 +02001671 fallthrough;
David Brazdil0f672f62019-12-10 10:32:29 +00001672 case -ENOENT:
1673 case -ENOMEM:
1674 case -EACCES:
1675 case -EROFS:
1676 case -EIO:
1677 case -ESTALE:
1678 /* Open state on this file cannot be recovered */
1679 nfs4_state_mark_recovery_failed(state, status);
1680 break;
1681 case -EAGAIN:
1682 ssleep(1);
1683 if (loop++ < 10) {
1684 set_bit(ops->state_flag_bit, &state->flags);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001685 break;
David Brazdil0f672f62019-12-10 10:32:29 +00001686 }
Olivier Deprez157378f2022-04-04 15:47:50 +02001687 fallthrough;
David Brazdil0f672f62019-12-10 10:32:29 +00001688 case -NFS4ERR_ADMIN_REVOKED:
1689 case -NFS4ERR_STALE_STATEID:
1690 case -NFS4ERR_OLD_STATEID:
1691 case -NFS4ERR_BAD_STATEID:
1692 case -NFS4ERR_RECLAIM_BAD:
1693 case -NFS4ERR_RECLAIM_CONFLICT:
1694 nfs4_state_mark_reclaim_nograce(sp->so_server->nfs_client, state);
1695 break;
1696 case -NFS4ERR_EXPIRED:
1697 case -NFS4ERR_NO_GRACE:
1698 nfs4_state_mark_reclaim_nograce(sp->so_server->nfs_client, state);
Olivier Deprez157378f2022-04-04 15:47:50 +02001699 fallthrough;
David Brazdil0f672f62019-12-10 10:32:29 +00001700 case -NFS4ERR_STALE_CLIENTID:
1701 case -NFS4ERR_BADSESSION:
1702 case -NFS4ERR_BADSLOT:
1703 case -NFS4ERR_BAD_HIGH_SLOT:
1704 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1705 case -ETIMEDOUT:
1706 goto out_err;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001707 }
1708 nfs4_put_open_state(state);
1709 spin_lock(&sp->so_lock);
1710 goto restart;
1711 }
1712 raw_write_seqcount_end(&sp->so_reclaim_seqcount);
1713 spin_unlock(&sp->so_lock);
Olivier Deprez157378f2022-04-04 15:47:50 +02001714#ifdef CONFIG_NFS_V4_2
1715 if (found_ssc_copy_state)
1716 return -EIO;
1717#endif /* CONFIG_NFS_V4_2 */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001718 return 0;
1719out_err:
1720 nfs4_put_open_state(state);
1721 spin_lock(&sp->so_lock);
1722 raw_write_seqcount_end(&sp->so_reclaim_seqcount);
1723 spin_unlock(&sp->so_lock);
1724 return status;
1725}
1726
1727static void nfs4_clear_open_state(struct nfs4_state *state)
1728{
1729 struct nfs4_lock_state *lock;
1730
1731 clear_bit(NFS_DELEGATED_STATE, &state->flags);
1732 clear_bit(NFS_O_RDONLY_STATE, &state->flags);
1733 clear_bit(NFS_O_WRONLY_STATE, &state->flags);
1734 clear_bit(NFS_O_RDWR_STATE, &state->flags);
1735 spin_lock(&state->state_lock);
1736 list_for_each_entry(lock, &state->lock_states, ls_locks) {
1737 lock->ls_seqid.flags = 0;
1738 clear_bit(NFS_LOCK_INITIALIZED, &lock->ls_flags);
1739 }
1740 spin_unlock(&state->state_lock);
1741}
1742
1743static void nfs4_reset_seqids(struct nfs_server *server,
1744 int (*mark_reclaim)(struct nfs_client *clp, struct nfs4_state *state))
1745{
1746 struct nfs_client *clp = server->nfs_client;
1747 struct nfs4_state_owner *sp;
1748 struct rb_node *pos;
1749 struct nfs4_state *state;
1750
1751 spin_lock(&clp->cl_lock);
1752 for (pos = rb_first(&server->state_owners);
1753 pos != NULL;
1754 pos = rb_next(pos)) {
1755 sp = rb_entry(pos, struct nfs4_state_owner, so_server_node);
1756 sp->so_seqid.flags = 0;
1757 spin_lock(&sp->so_lock);
1758 list_for_each_entry(state, &sp->so_states, open_states) {
1759 if (mark_reclaim(clp, state))
1760 nfs4_clear_open_state(state);
1761 }
1762 spin_unlock(&sp->so_lock);
1763 }
1764 spin_unlock(&clp->cl_lock);
1765}
1766
1767static void nfs4_state_mark_reclaim_helper(struct nfs_client *clp,
1768 int (*mark_reclaim)(struct nfs_client *clp, struct nfs4_state *state))
1769{
1770 struct nfs_server *server;
1771
1772 rcu_read_lock();
1773 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link)
1774 nfs4_reset_seqids(server, mark_reclaim);
1775 rcu_read_unlock();
1776}
1777
1778static void nfs4_state_start_reclaim_reboot(struct nfs_client *clp)
1779{
Olivier Deprez92d4c212022-12-06 15:05:30 +01001780 set_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001781 /* Mark all delegations for reclaim */
1782 nfs_delegation_mark_reclaim(clp);
1783 nfs4_state_mark_reclaim_helper(clp, nfs4_state_mark_reclaim_reboot);
1784}
1785
1786static int nfs4_reclaim_complete(struct nfs_client *clp,
1787 const struct nfs4_state_recovery_ops *ops,
David Brazdil0f672f62019-12-10 10:32:29 +00001788 const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001789{
1790 /* Notify the server we're done reclaiming our state */
1791 if (ops->reclaim_complete)
1792 return ops->reclaim_complete(clp, cred);
1793 return 0;
1794}
1795
1796static void nfs4_clear_reclaim_server(struct nfs_server *server)
1797{
1798 struct nfs_client *clp = server->nfs_client;
1799 struct nfs4_state_owner *sp;
1800 struct rb_node *pos;
1801 struct nfs4_state *state;
1802
1803 spin_lock(&clp->cl_lock);
1804 for (pos = rb_first(&server->state_owners);
1805 pos != NULL;
1806 pos = rb_next(pos)) {
1807 sp = rb_entry(pos, struct nfs4_state_owner, so_server_node);
1808 spin_lock(&sp->so_lock);
1809 list_for_each_entry(state, &sp->so_states, open_states) {
1810 if (!test_and_clear_bit(NFS_STATE_RECLAIM_REBOOT,
1811 &state->flags))
1812 continue;
1813 nfs4_state_mark_reclaim_nograce(clp, state);
1814 }
1815 spin_unlock(&sp->so_lock);
1816 }
1817 spin_unlock(&clp->cl_lock);
1818}
1819
1820static int nfs4_state_clear_reclaim_reboot(struct nfs_client *clp)
1821{
1822 struct nfs_server *server;
1823
1824 if (!test_and_clear_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state))
1825 return 0;
1826
1827 rcu_read_lock();
1828 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link)
1829 nfs4_clear_reclaim_server(server);
1830 rcu_read_unlock();
1831
1832 nfs_delegation_reap_unclaimed(clp);
1833 return 1;
1834}
1835
1836static void nfs4_state_end_reclaim_reboot(struct nfs_client *clp)
1837{
1838 const struct nfs4_state_recovery_ops *ops;
David Brazdil0f672f62019-12-10 10:32:29 +00001839 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001840 int err;
1841
1842 if (!nfs4_state_clear_reclaim_reboot(clp))
1843 return;
1844 ops = clp->cl_mvops->reboot_recovery_ops;
1845 cred = nfs4_get_clid_cred(clp);
1846 err = nfs4_reclaim_complete(clp, ops, cred);
David Brazdil0f672f62019-12-10 10:32:29 +00001847 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001848 if (err == -NFS4ERR_CONN_NOT_BOUND_TO_SESSION)
1849 set_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state);
1850}
1851
1852static void nfs4_state_start_reclaim_nograce(struct nfs_client *clp)
1853{
1854 nfs_mark_test_expired_all_delegations(clp);
1855 nfs4_state_mark_reclaim_helper(clp, nfs4_state_mark_reclaim_nograce);
1856}
1857
1858static int nfs4_recovery_handle_error(struct nfs_client *clp, int error)
1859{
1860 switch (error) {
David Brazdil0f672f62019-12-10 10:32:29 +00001861 case 0:
1862 break;
1863 case -NFS4ERR_CB_PATH_DOWN:
1864 nfs40_handle_cb_pathdown(clp);
1865 break;
1866 case -NFS4ERR_NO_GRACE:
1867 nfs4_state_end_reclaim_reboot(clp);
1868 break;
1869 case -NFS4ERR_STALE_CLIENTID:
1870 set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
1871 nfs4_state_start_reclaim_reboot(clp);
1872 break;
1873 case -NFS4ERR_EXPIRED:
1874 set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
1875 nfs4_state_start_reclaim_nograce(clp);
1876 break;
1877 case -NFS4ERR_BADSESSION:
1878 case -NFS4ERR_BADSLOT:
1879 case -NFS4ERR_BAD_HIGH_SLOT:
1880 case -NFS4ERR_DEADSESSION:
1881 case -NFS4ERR_SEQ_FALSE_RETRY:
1882 case -NFS4ERR_SEQ_MISORDERED:
1883 set_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state);
1884 /* Zero session reset errors */
1885 break;
1886 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
1887 set_bit(NFS4CLNT_BIND_CONN_TO_SESSION, &clp->cl_state);
1888 break;
1889 default:
1890 dprintk("%s: failed to handle error %d for server %s\n",
1891 __func__, error, clp->cl_hostname);
1892 return error;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001893 }
1894 dprintk("%s: handled error %d for server %s\n", __func__, error,
1895 clp->cl_hostname);
1896 return 0;
1897}
1898
1899static int nfs4_do_reclaim(struct nfs_client *clp, const struct nfs4_state_recovery_ops *ops)
1900{
1901 struct nfs4_state_owner *sp;
1902 struct nfs_server *server;
1903 struct rb_node *pos;
David Brazdil0f672f62019-12-10 10:32:29 +00001904 LIST_HEAD(freeme);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001905 int status = 0;
1906
1907restart:
1908 rcu_read_lock();
1909 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link) {
David Brazdil0f672f62019-12-10 10:32:29 +00001910 nfs4_purge_state_owners(server, &freeme);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001911 spin_lock(&clp->cl_lock);
1912 for (pos = rb_first(&server->state_owners);
1913 pos != NULL;
1914 pos = rb_next(pos)) {
1915 sp = rb_entry(pos,
1916 struct nfs4_state_owner, so_server_node);
1917 if (!test_and_clear_bit(ops->owner_flag_bit,
1918 &sp->so_flags))
1919 continue;
1920 if (!atomic_inc_not_zero(&sp->so_count))
1921 continue;
1922 spin_unlock(&clp->cl_lock);
1923 rcu_read_unlock();
1924
1925 status = nfs4_reclaim_open_state(sp, ops);
1926 if (status < 0) {
1927 set_bit(ops->owner_flag_bit, &sp->so_flags);
1928 nfs4_put_state_owner(sp);
1929 status = nfs4_recovery_handle_error(clp, status);
1930 return (status != 0) ? status : -EAGAIN;
1931 }
1932
1933 nfs4_put_state_owner(sp);
1934 goto restart;
1935 }
1936 spin_unlock(&clp->cl_lock);
1937 }
1938 rcu_read_unlock();
David Brazdil0f672f62019-12-10 10:32:29 +00001939 nfs4_free_state_owners(&freeme);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001940 return 0;
1941}
1942
1943static int nfs4_check_lease(struct nfs_client *clp)
1944{
David Brazdil0f672f62019-12-10 10:32:29 +00001945 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001946 const struct nfs4_state_maintenance_ops *ops =
1947 clp->cl_mvops->state_renewal_ops;
1948 int status;
1949
1950 /* Is the client already known to have an expired lease? */
1951 if (test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
1952 return 0;
David Brazdil0f672f62019-12-10 10:32:29 +00001953 cred = ops->get_state_renewal_cred(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001954 if (cred == NULL) {
1955 cred = nfs4_get_clid_cred(clp);
1956 status = -ENOKEY;
1957 if (cred == NULL)
1958 goto out;
1959 }
1960 status = ops->renew_lease(clp, cred);
David Brazdil0f672f62019-12-10 10:32:29 +00001961 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001962 if (status == -ETIMEDOUT) {
1963 set_bit(NFS4CLNT_CHECK_LEASE, &clp->cl_state);
1964 return 0;
1965 }
1966out:
1967 return nfs4_recovery_handle_error(clp, status);
1968}
1969
1970/* Set NFS4CLNT_LEASE_EXPIRED and reclaim reboot state for all v4.0 errors
1971 * and for recoverable errors on EXCHANGE_ID for v4.1
1972 */
1973static int nfs4_handle_reclaim_lease_error(struct nfs_client *clp, int status)
1974{
1975 switch (status) {
1976 case -NFS4ERR_SEQ_MISORDERED:
1977 if (test_and_set_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state))
1978 return -ESERVERFAULT;
1979 /* Lease confirmation error: retry after purging the lease */
1980 ssleep(1);
1981 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
1982 break;
1983 case -NFS4ERR_STALE_CLIENTID:
1984 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
1985 nfs4_state_start_reclaim_reboot(clp);
1986 break;
1987 case -NFS4ERR_CLID_INUSE:
1988 pr_err("NFS: Server %s reports our clientid is in use\n",
1989 clp->cl_hostname);
1990 nfs_mark_client_ready(clp, -EPERM);
1991 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
1992 return -EPERM;
1993 case -EACCES:
1994 case -NFS4ERR_DELAY:
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00001995 case -EAGAIN:
1996 ssleep(1);
1997 break;
1998
1999 case -NFS4ERR_MINOR_VERS_MISMATCH:
2000 if (clp->cl_cons_state == NFS_CS_SESSION_INITING)
2001 nfs_mark_client_ready(clp, -EPROTONOSUPPORT);
2002 dprintk("%s: exit with error %d for server %s\n",
2003 __func__, -EPROTONOSUPPORT, clp->cl_hostname);
2004 return -EPROTONOSUPPORT;
2005 case -NFS4ERR_NOT_SAME: /* FixMe: implement recovery
2006 * in nfs4_exchange_id */
2007 default:
2008 dprintk("%s: exit with error %d for server %s\n", __func__,
2009 status, clp->cl_hostname);
2010 return status;
2011 }
2012 set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
2013 dprintk("%s: handled error %d for server %s\n", __func__, status,
2014 clp->cl_hostname);
2015 return 0;
2016}
2017
2018static int nfs4_establish_lease(struct nfs_client *clp)
2019{
David Brazdil0f672f62019-12-10 10:32:29 +00002020 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002021 const struct nfs4_state_recovery_ops *ops =
2022 clp->cl_mvops->reboot_recovery_ops;
2023 int status;
2024
2025 status = nfs4_begin_drain_session(clp);
2026 if (status != 0)
2027 return status;
2028 cred = nfs4_get_clid_cred(clp);
2029 if (cred == NULL)
2030 return -ENOENT;
2031 status = ops->establish_clid(clp, cred);
David Brazdil0f672f62019-12-10 10:32:29 +00002032 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002033 if (status != 0)
2034 return status;
2035 pnfs_destroy_all_layouts(clp);
2036 return 0;
2037}
2038
2039/*
2040 * Returns zero or a negative errno. NFS4ERR values are converted
2041 * to local errno values.
2042 */
2043static int nfs4_reclaim_lease(struct nfs_client *clp)
2044{
2045 int status;
2046
2047 status = nfs4_establish_lease(clp);
2048 if (status < 0)
2049 return nfs4_handle_reclaim_lease_error(clp, status);
2050 if (test_and_clear_bit(NFS4CLNT_SERVER_SCOPE_MISMATCH, &clp->cl_state))
2051 nfs4_state_start_reclaim_nograce(clp);
2052 if (!test_bit(NFS4CLNT_RECLAIM_NOGRACE, &clp->cl_state))
2053 set_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state);
2054 clear_bit(NFS4CLNT_CHECK_LEASE, &clp->cl_state);
2055 clear_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
2056 return 0;
2057}
2058
2059static int nfs4_purge_lease(struct nfs_client *clp)
2060{
2061 int status;
2062
2063 status = nfs4_establish_lease(clp);
2064 if (status < 0)
2065 return nfs4_handle_reclaim_lease_error(clp, status);
2066 clear_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state);
2067 set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state);
2068 nfs4_state_start_reclaim_nograce(clp);
2069 return 0;
2070}
2071
2072/*
2073 * Try remote migration of one FSID from a source server to a
2074 * destination server. The source server provides a list of
2075 * potential destinations.
2076 *
2077 * Returns zero or a negative NFS4ERR status code.
2078 */
David Brazdil0f672f62019-12-10 10:32:29 +00002079static int nfs4_try_migration(struct nfs_server *server, const struct cred *cred)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002080{
2081 struct nfs_client *clp = server->nfs_client;
2082 struct nfs4_fs_locations *locations = NULL;
2083 struct inode *inode;
2084 struct page *page;
2085 int status, result;
2086
2087 dprintk("--> %s: FSID %llx:%llx on \"%s\"\n", __func__,
2088 (unsigned long long)server->fsid.major,
2089 (unsigned long long)server->fsid.minor,
2090 clp->cl_hostname);
2091
2092 result = 0;
2093 page = alloc_page(GFP_KERNEL);
2094 locations = kmalloc(sizeof(struct nfs4_fs_locations), GFP_KERNEL);
2095 if (page == NULL || locations == NULL) {
2096 dprintk("<-- %s: no memory\n", __func__);
2097 goto out;
2098 }
2099
2100 inode = d_inode(server->super->s_root);
2101 result = nfs4_proc_get_locations(inode, locations, page, cred);
2102 if (result) {
2103 dprintk("<-- %s: failed to retrieve fs_locations: %d\n",
2104 __func__, result);
2105 goto out;
2106 }
2107
2108 result = -NFS4ERR_NXIO;
Olivier Deprez157378f2022-04-04 15:47:50 +02002109 if (!locations->nlocations)
2110 goto out;
2111
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002112 if (!(locations->fattr.valid & NFS_ATTR_FATTR_V4_LOCATIONS)) {
2113 dprintk("<-- %s: No fs_locations data, migration skipped\n",
2114 __func__);
2115 goto out;
2116 }
2117
2118 status = nfs4_begin_drain_session(clp);
David Brazdil0f672f62019-12-10 10:32:29 +00002119 if (status != 0) {
2120 result = status;
2121 goto out;
2122 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002123
2124 status = nfs4_replace_transport(server, locations);
2125 if (status != 0) {
2126 dprintk("<-- %s: failed to replace transport: %d\n",
2127 __func__, status);
2128 goto out;
2129 }
2130
2131 result = 0;
2132 dprintk("<-- %s: migration succeeded\n", __func__);
2133
2134out:
2135 if (page != NULL)
2136 __free_page(page);
2137 kfree(locations);
2138 if (result) {
2139 pr_err("NFS: migration recovery failed (server %s)\n",
2140 clp->cl_hostname);
2141 set_bit(NFS_MIG_FAILED, &server->mig_status);
2142 }
2143 return result;
2144}
2145
2146/*
2147 * Returns zero or a negative NFS4ERR status code.
2148 */
2149static int nfs4_handle_migration(struct nfs_client *clp)
2150{
2151 const struct nfs4_state_maintenance_ops *ops =
2152 clp->cl_mvops->state_renewal_ops;
2153 struct nfs_server *server;
David Brazdil0f672f62019-12-10 10:32:29 +00002154 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002155
2156 dprintk("%s: migration reported on \"%s\"\n", __func__,
2157 clp->cl_hostname);
2158
David Brazdil0f672f62019-12-10 10:32:29 +00002159 cred = ops->get_state_renewal_cred(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002160 if (cred == NULL)
2161 return -NFS4ERR_NOENT;
2162
2163 clp->cl_mig_gen++;
2164restart:
2165 rcu_read_lock();
2166 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link) {
2167 int status;
2168
2169 if (server->mig_gen == clp->cl_mig_gen)
2170 continue;
2171 server->mig_gen = clp->cl_mig_gen;
2172
2173 if (!test_and_clear_bit(NFS_MIG_IN_TRANSITION,
2174 &server->mig_status))
2175 continue;
2176
2177 rcu_read_unlock();
2178 status = nfs4_try_migration(server, cred);
2179 if (status < 0) {
David Brazdil0f672f62019-12-10 10:32:29 +00002180 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002181 return status;
2182 }
2183 goto restart;
2184 }
2185 rcu_read_unlock();
David Brazdil0f672f62019-12-10 10:32:29 +00002186 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002187 return 0;
2188}
2189
2190/*
2191 * Test each nfs_server on the clp's cl_superblocks list to see
2192 * if it's moved to another server. Stop when the server no longer
2193 * returns NFS4ERR_LEASE_MOVED.
2194 */
2195static int nfs4_handle_lease_moved(struct nfs_client *clp)
2196{
2197 const struct nfs4_state_maintenance_ops *ops =
2198 clp->cl_mvops->state_renewal_ops;
2199 struct nfs_server *server;
David Brazdil0f672f62019-12-10 10:32:29 +00002200 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002201
2202 dprintk("%s: lease moved reported on \"%s\"\n", __func__,
2203 clp->cl_hostname);
2204
David Brazdil0f672f62019-12-10 10:32:29 +00002205 cred = ops->get_state_renewal_cred(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002206 if (cred == NULL)
2207 return -NFS4ERR_NOENT;
2208
2209 clp->cl_mig_gen++;
2210restart:
2211 rcu_read_lock();
2212 list_for_each_entry_rcu(server, &clp->cl_superblocks, client_link) {
2213 struct inode *inode;
2214 int status;
2215
2216 if (server->mig_gen == clp->cl_mig_gen)
2217 continue;
2218 server->mig_gen = clp->cl_mig_gen;
2219
2220 rcu_read_unlock();
2221
2222 inode = d_inode(server->super->s_root);
2223 status = nfs4_proc_fsid_present(inode, cred);
2224 if (status != -NFS4ERR_MOVED)
2225 goto restart; /* wasn't this one */
2226 if (nfs4_try_migration(server, cred) == -NFS4ERR_LEASE_MOVED)
2227 goto restart; /* there are more */
2228 goto out;
2229 }
2230 rcu_read_unlock();
2231
2232out:
David Brazdil0f672f62019-12-10 10:32:29 +00002233 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002234 return 0;
2235}
2236
2237/**
2238 * nfs4_discover_server_trunking - Detect server IP address trunking
2239 *
2240 * @clp: nfs_client under test
2241 * @result: OUT: found nfs_client, or clp
2242 *
2243 * Returns zero or a negative errno. If zero is returned,
2244 * an nfs_client pointer is planted in "result".
2245 *
2246 * Note: since we are invoked in process context, and
2247 * not from inside the state manager, we cannot use
2248 * nfs4_handle_reclaim_lease_error().
2249 */
2250int nfs4_discover_server_trunking(struct nfs_client *clp,
2251 struct nfs_client **result)
2252{
2253 const struct nfs4_state_recovery_ops *ops =
2254 clp->cl_mvops->reboot_recovery_ops;
2255 struct rpc_clnt *clnt;
David Brazdil0f672f62019-12-10 10:32:29 +00002256 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002257 int i, status;
2258
2259 dprintk("NFS: %s: testing '%s'\n", __func__, clp->cl_hostname);
2260
2261 clnt = clp->cl_rpcclient;
2262 i = 0;
2263
2264 mutex_lock(&nfs_clid_init_mutex);
2265again:
2266 status = -ENOENT;
2267 cred = nfs4_get_clid_cred(clp);
2268 if (cred == NULL)
2269 goto out_unlock;
2270
2271 status = ops->detect_trunking(clp, result, cred);
David Brazdil0f672f62019-12-10 10:32:29 +00002272 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002273 switch (status) {
2274 case 0:
2275 case -EINTR:
2276 case -ERESTARTSYS:
2277 break;
2278 case -ETIMEDOUT:
2279 if (clnt->cl_softrtry)
2280 break;
Olivier Deprez157378f2022-04-04 15:47:50 +02002281 fallthrough;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002282 case -NFS4ERR_DELAY:
2283 case -EAGAIN:
2284 ssleep(1);
Olivier Deprez157378f2022-04-04 15:47:50 +02002285 fallthrough;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002286 case -NFS4ERR_STALE_CLIENTID:
2287 dprintk("NFS: %s after status %d, retrying\n",
2288 __func__, status);
2289 goto again;
2290 case -EACCES:
2291 if (i++ == 0) {
2292 nfs4_root_machine_cred(clp);
2293 goto again;
2294 }
2295 if (clnt->cl_auth->au_flavor == RPC_AUTH_UNIX)
2296 break;
Olivier Deprez157378f2022-04-04 15:47:50 +02002297 fallthrough;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002298 case -NFS4ERR_CLID_INUSE:
2299 case -NFS4ERR_WRONGSEC:
2300 /* No point in retrying if we already used RPC_AUTH_UNIX */
2301 if (clnt->cl_auth->au_flavor == RPC_AUTH_UNIX) {
2302 status = -EPERM;
2303 break;
2304 }
2305 clnt = rpc_clone_client_set_auth(clnt, RPC_AUTH_UNIX);
2306 if (IS_ERR(clnt)) {
2307 status = PTR_ERR(clnt);
2308 break;
2309 }
2310 /* Note: this is safe because we haven't yet marked the
2311 * client as ready, so we are the only user of
2312 * clp->cl_rpcclient
2313 */
2314 clnt = xchg(&clp->cl_rpcclient, clnt);
2315 rpc_shutdown_client(clnt);
2316 clnt = clp->cl_rpcclient;
2317 goto again;
2318
2319 case -NFS4ERR_MINOR_VERS_MISMATCH:
2320 status = -EPROTONOSUPPORT;
2321 break;
2322
2323 case -EKEYEXPIRED:
2324 case -NFS4ERR_NOT_SAME: /* FixMe: implement recovery
2325 * in nfs4_exchange_id */
2326 status = -EKEYEXPIRED;
2327 break;
2328 default:
2329 pr_warn("NFS: %s unhandled error %d. Exiting with error EIO\n",
2330 __func__, status);
2331 status = -EIO;
2332 }
2333
2334out_unlock:
2335 mutex_unlock(&nfs_clid_init_mutex);
2336 dprintk("NFS: %s: status = %d\n", __func__, status);
2337 return status;
2338}
2339
2340#ifdef CONFIG_NFS_V4_1
2341void nfs4_schedule_session_recovery(struct nfs4_session *session, int err)
2342{
2343 struct nfs_client *clp = session->clp;
2344
2345 switch (err) {
2346 default:
2347 set_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state);
2348 break;
2349 case -NFS4ERR_CONN_NOT_BOUND_TO_SESSION:
2350 set_bit(NFS4CLNT_BIND_CONN_TO_SESSION, &clp->cl_state);
2351 }
2352 nfs4_schedule_state_manager(clp);
2353}
2354EXPORT_SYMBOL_GPL(nfs4_schedule_session_recovery);
2355
2356void nfs41_notify_server(struct nfs_client *clp)
2357{
2358 /* Use CHECK_LEASE to ping the server with a SEQUENCE */
2359 set_bit(NFS4CLNT_CHECK_LEASE, &clp->cl_state);
2360 nfs4_schedule_state_manager(clp);
2361}
2362
2363static void nfs4_reset_all_state(struct nfs_client *clp)
2364{
2365 if (test_and_set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state) == 0) {
2366 set_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state);
2367 clear_bit(NFS4CLNT_LEASE_CONFIRM, &clp->cl_state);
2368 nfs4_state_start_reclaim_nograce(clp);
2369 dprintk("%s: scheduling reset of all state for server %s!\n",
2370 __func__, clp->cl_hostname);
2371 nfs4_schedule_state_manager(clp);
2372 }
2373}
2374
2375static void nfs41_handle_server_reboot(struct nfs_client *clp)
2376{
2377 if (test_and_set_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state) == 0) {
2378 nfs4_state_start_reclaim_reboot(clp);
2379 dprintk("%s: server %s rebooted!\n", __func__,
2380 clp->cl_hostname);
2381 nfs4_schedule_state_manager(clp);
2382 }
2383}
2384
2385static void nfs41_handle_all_state_revoked(struct nfs_client *clp)
2386{
2387 nfs4_reset_all_state(clp);
2388 dprintk("%s: state revoked on server %s\n", __func__, clp->cl_hostname);
2389}
2390
2391static void nfs41_handle_some_state_revoked(struct nfs_client *clp)
2392{
2393 nfs4_state_start_reclaim_nograce(clp);
2394 nfs4_schedule_state_manager(clp);
2395
2396 dprintk("%s: state revoked on server %s\n", __func__, clp->cl_hostname);
2397}
2398
2399static void nfs41_handle_recallable_state_revoked(struct nfs_client *clp)
2400{
2401 /* FIXME: For now, we destroy all layouts. */
2402 pnfs_destroy_all_layouts(clp);
David Brazdil0f672f62019-12-10 10:32:29 +00002403 nfs_test_expired_all_delegations(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002404 dprintk("%s: Recallable state revoked on server %s!\n", __func__,
2405 clp->cl_hostname);
2406}
2407
2408static void nfs41_handle_backchannel_fault(struct nfs_client *clp)
2409{
2410 set_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state);
2411 nfs4_schedule_state_manager(clp);
2412
2413 dprintk("%s: server %s declared a backchannel fault\n", __func__,
2414 clp->cl_hostname);
2415}
2416
2417static void nfs41_handle_cb_path_down(struct nfs_client *clp)
2418{
2419 if (test_and_set_bit(NFS4CLNT_BIND_CONN_TO_SESSION,
2420 &clp->cl_state) == 0)
2421 nfs4_schedule_state_manager(clp);
2422}
2423
2424void nfs41_handle_sequence_flag_errors(struct nfs_client *clp, u32 flags,
2425 bool recovery)
2426{
2427 if (!flags)
2428 return;
2429
2430 dprintk("%s: \"%s\" (client ID %llx) flags=0x%08x\n",
2431 __func__, clp->cl_hostname, clp->cl_clientid, flags);
2432 /*
2433 * If we're called from the state manager thread, then assume we're
2434 * already handling the RECLAIM_NEEDED and/or STATE_REVOKED.
2435 * Those flags are expected to remain set until we're done
2436 * recovering (see RFC5661, section 18.46.3).
2437 */
2438 if (recovery)
2439 goto out_recovery;
2440
2441 if (flags & SEQ4_STATUS_RESTART_RECLAIM_NEEDED)
2442 nfs41_handle_server_reboot(clp);
2443 if (flags & (SEQ4_STATUS_EXPIRED_ALL_STATE_REVOKED))
2444 nfs41_handle_all_state_revoked(clp);
2445 if (flags & (SEQ4_STATUS_EXPIRED_SOME_STATE_REVOKED |
2446 SEQ4_STATUS_ADMIN_STATE_REVOKED))
2447 nfs41_handle_some_state_revoked(clp);
2448 if (flags & SEQ4_STATUS_LEASE_MOVED)
2449 nfs4_schedule_lease_moved_recovery(clp);
2450 if (flags & SEQ4_STATUS_RECALLABLE_STATE_REVOKED)
2451 nfs41_handle_recallable_state_revoked(clp);
2452out_recovery:
2453 if (flags & SEQ4_STATUS_BACKCHANNEL_FAULT)
2454 nfs41_handle_backchannel_fault(clp);
2455 else if (flags & (SEQ4_STATUS_CB_PATH_DOWN |
2456 SEQ4_STATUS_CB_PATH_DOWN_SESSION))
2457 nfs41_handle_cb_path_down(clp);
2458}
2459
2460static int nfs4_reset_session(struct nfs_client *clp)
2461{
David Brazdil0f672f62019-12-10 10:32:29 +00002462 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002463 int status;
2464
2465 if (!nfs4_has_session(clp))
2466 return 0;
2467 status = nfs4_begin_drain_session(clp);
2468 if (status != 0)
2469 return status;
2470 cred = nfs4_get_clid_cred(clp);
2471 status = nfs4_proc_destroy_session(clp->cl_session, cred);
2472 switch (status) {
2473 case 0:
2474 case -NFS4ERR_BADSESSION:
2475 case -NFS4ERR_DEADSESSION:
2476 break;
2477 case -NFS4ERR_BACK_CHAN_BUSY:
2478 case -NFS4ERR_DELAY:
2479 set_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state);
2480 status = 0;
2481 ssleep(1);
2482 goto out;
2483 default:
2484 status = nfs4_recovery_handle_error(clp, status);
2485 goto out;
2486 }
2487
2488 memset(clp->cl_session->sess_id.data, 0, NFS4_MAX_SESSIONID_LEN);
2489 status = nfs4_proc_create_session(clp, cred);
2490 if (status) {
2491 dprintk("%s: session reset failed with status %d for server %s!\n",
2492 __func__, status, clp->cl_hostname);
2493 status = nfs4_handle_reclaim_lease_error(clp, status);
2494 goto out;
2495 }
2496 nfs41_finish_session_reset(clp);
2497 dprintk("%s: session reset was successful for server %s!\n",
2498 __func__, clp->cl_hostname);
2499out:
David Brazdil0f672f62019-12-10 10:32:29 +00002500 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002501 return status;
2502}
2503
2504static int nfs4_bind_conn_to_session(struct nfs_client *clp)
2505{
David Brazdil0f672f62019-12-10 10:32:29 +00002506 const struct cred *cred;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002507 int ret;
2508
2509 if (!nfs4_has_session(clp))
2510 return 0;
2511 ret = nfs4_begin_drain_session(clp);
2512 if (ret != 0)
2513 return ret;
2514 cred = nfs4_get_clid_cred(clp);
2515 ret = nfs4_proc_bind_conn_to_session(clp, cred);
David Brazdil0f672f62019-12-10 10:32:29 +00002516 put_cred(cred);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002517 clear_bit(NFS4CLNT_BIND_CONN_TO_SESSION, &clp->cl_state);
2518 switch (ret) {
2519 case 0:
2520 dprintk("%s: bind_conn_to_session was successful for server %s!\n",
2521 __func__, clp->cl_hostname);
2522 break;
2523 case -NFS4ERR_DELAY:
2524 ssleep(1);
2525 set_bit(NFS4CLNT_BIND_CONN_TO_SESSION, &clp->cl_state);
2526 break;
2527 default:
2528 return nfs4_recovery_handle_error(clp, ret);
2529 }
2530 return 0;
2531}
Olivier Deprez157378f2022-04-04 15:47:50 +02002532
2533static void nfs4_layoutreturn_any_run(struct nfs_client *clp)
2534{
2535 int iomode = 0;
2536
2537 if (test_and_clear_bit(NFS4CLNT_RECALL_ANY_LAYOUT_READ, &clp->cl_state))
2538 iomode += IOMODE_READ;
2539 if (test_and_clear_bit(NFS4CLNT_RECALL_ANY_LAYOUT_RW, &clp->cl_state))
2540 iomode += IOMODE_RW;
2541 /* Note: IOMODE_READ + IOMODE_RW == IOMODE_ANY */
2542 if (iomode) {
2543 pnfs_layout_return_unused_byclid(clp, iomode);
2544 set_bit(NFS4CLNT_RUN_MANAGER, &clp->cl_state);
2545 }
2546}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002547#else /* CONFIG_NFS_V4_1 */
2548static int nfs4_reset_session(struct nfs_client *clp) { return 0; }
2549
2550static int nfs4_bind_conn_to_session(struct nfs_client *clp)
2551{
2552 return 0;
2553}
Olivier Deprez157378f2022-04-04 15:47:50 +02002554
2555static void nfs4_layoutreturn_any_run(struct nfs_client *clp)
2556{
2557}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002558#endif /* CONFIG_NFS_V4_1 */
2559
2560static void nfs4_state_manager(struct nfs_client *clp)
2561{
Olivier Deprez92d4c212022-12-06 15:05:30 +01002562 unsigned int memflags;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002563 int status = 0;
2564 const char *section = "", *section_sep = "";
2565
Olivier Deprez92d4c212022-12-06 15:05:30 +01002566 /*
2567 * State recovery can deadlock if the direct reclaim code tries
2568 * start NFS writeback. So ensure memory allocations are all
2569 * GFP_NOFS.
2570 */
2571 memflags = memalloc_nofs_save();
2572
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002573 /* Ensure exclusive access to NFSv4 state */
2574 do {
Olivier Deprez157378f2022-04-04 15:47:50 +02002575 trace_nfs4_state_mgr(clp);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002576 clear_bit(NFS4CLNT_RUN_MANAGER, &clp->cl_state);
2577 if (test_bit(NFS4CLNT_PURGE_STATE, &clp->cl_state)) {
2578 section = "purge state";
2579 status = nfs4_purge_lease(clp);
2580 if (status < 0)
2581 goto out_error;
2582 continue;
2583 }
2584
2585 if (test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state)) {
2586 section = "lease expired";
2587 /* We're going to have to re-establish a clientid */
2588 status = nfs4_reclaim_lease(clp);
2589 if (status < 0)
2590 goto out_error;
2591 continue;
2592 }
2593
2594 /* Initialize or reset the session */
2595 if (test_and_clear_bit(NFS4CLNT_SESSION_RESET, &clp->cl_state)) {
2596 section = "reset session";
2597 status = nfs4_reset_session(clp);
2598 if (test_bit(NFS4CLNT_LEASE_EXPIRED, &clp->cl_state))
2599 continue;
2600 if (status < 0)
2601 goto out_error;
2602 }
2603
2604 /* Send BIND_CONN_TO_SESSION */
2605 if (test_and_clear_bit(NFS4CLNT_BIND_CONN_TO_SESSION,
2606 &clp->cl_state)) {
2607 section = "bind conn to session";
2608 status = nfs4_bind_conn_to_session(clp);
2609 if (status < 0)
2610 goto out_error;
2611 continue;
2612 }
2613
2614 if (test_and_clear_bit(NFS4CLNT_CHECK_LEASE, &clp->cl_state)) {
2615 section = "check lease";
2616 status = nfs4_check_lease(clp);
2617 if (status < 0)
2618 goto out_error;
2619 continue;
2620 }
2621
2622 if (test_and_clear_bit(NFS4CLNT_MOVED, &clp->cl_state)) {
2623 section = "migration";
2624 status = nfs4_handle_migration(clp);
2625 if (status < 0)
2626 goto out_error;
2627 }
2628
2629 if (test_and_clear_bit(NFS4CLNT_LEASE_MOVED, &clp->cl_state)) {
2630 section = "lease moved";
2631 status = nfs4_handle_lease_moved(clp);
2632 if (status < 0)
2633 goto out_error;
2634 }
2635
2636 /* First recover reboot state... */
2637 if (test_bit(NFS4CLNT_RECLAIM_REBOOT, &clp->cl_state)) {
2638 section = "reclaim reboot";
2639 status = nfs4_do_reclaim(clp,
2640 clp->cl_mvops->reboot_recovery_ops);
2641 if (status == -EAGAIN)
2642 continue;
2643 if (status < 0)
2644 goto out_error;
2645 nfs4_state_end_reclaim_reboot(clp);
Olivier Deprez92d4c212022-12-06 15:05:30 +01002646 continue;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002647 }
2648
2649 /* Detect expired delegations... */
2650 if (test_and_clear_bit(NFS4CLNT_DELEGATION_EXPIRED, &clp->cl_state)) {
2651 section = "detect expired delegations";
2652 nfs_reap_expired_delegations(clp);
2653 continue;
2654 }
2655
2656 /* Now recover expired state... */
David Brazdil0f672f62019-12-10 10:32:29 +00002657 if (test_bit(NFS4CLNT_RECLAIM_NOGRACE, &clp->cl_state)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002658 section = "reclaim nograce";
2659 status = nfs4_do_reclaim(clp,
2660 clp->cl_mvops->nograce_recovery_ops);
2661 if (status == -EAGAIN)
2662 continue;
2663 if (status < 0)
2664 goto out_error;
David Brazdil0f672f62019-12-10 10:32:29 +00002665 clear_bit(NFS4CLNT_RECLAIM_NOGRACE, &clp->cl_state);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002666 }
2667
Olivier Deprez92d4c212022-12-06 15:05:30 +01002668 memalloc_nofs_restore(memflags);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002669 nfs4_end_drain_session(clp);
2670 nfs4_clear_state_manager_bit(clp);
2671
Olivier Deprez157378f2022-04-04 15:47:50 +02002672 if (!test_and_set_bit(NFS4CLNT_RECALL_RUNNING, &clp->cl_state)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002673 if (test_and_clear_bit(NFS4CLNT_DELEGRETURN, &clp->cl_state)) {
2674 nfs_client_return_marked_delegations(clp);
2675 set_bit(NFS4CLNT_RUN_MANAGER, &clp->cl_state);
2676 }
Olivier Deprez157378f2022-04-04 15:47:50 +02002677 nfs4_layoutreturn_any_run(clp);
2678 clear_bit(NFS4CLNT_RECALL_RUNNING, &clp->cl_state);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002679 }
2680
2681 /* Did we race with an attempt to give us more work? */
2682 if (!test_bit(NFS4CLNT_RUN_MANAGER, &clp->cl_state))
2683 return;
2684 if (test_and_set_bit(NFS4CLNT_MANAGER_RUNNING, &clp->cl_state) != 0)
2685 return;
Olivier Deprez92d4c212022-12-06 15:05:30 +01002686 memflags = memalloc_nofs_save();
David Brazdil0f672f62019-12-10 10:32:29 +00002687 } while (refcount_read(&clp->cl_count) > 1 && !signalled());
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002688 goto out_drain;
2689
2690out_error:
2691 if (strlen(section))
2692 section_sep = ": ";
Olivier Deprez157378f2022-04-04 15:47:50 +02002693 trace_nfs4_state_mgr_failed(clp, section, status);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002694 pr_warn_ratelimited("NFS: state manager%s%s failed on NFSv4 server %s"
2695 " with error %d\n", section_sep, section,
2696 clp->cl_hostname, -status);
2697 ssleep(1);
2698out_drain:
Olivier Deprez92d4c212022-12-06 15:05:30 +01002699 memalloc_nofs_restore(memflags);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002700 nfs4_end_drain_session(clp);
2701 nfs4_clear_state_manager_bit(clp);
2702}
2703
2704static int nfs4_run_state_manager(void *ptr)
2705{
2706 struct nfs_client *clp = ptr;
2707
2708 allow_signal(SIGKILL);
2709 nfs4_state_manager(clp);
2710 nfs_put_client(clp);
2711 module_put_and_exit(0);
2712 return 0;
2713}
2714
2715/*
2716 * Local variables:
2717 * c-basic-offset: 8
2718 * End:
2719 */