1 /*
2  *  Copyright (c) 2001 The Regents of the University of Michigan.
3  *  All rights reserved.
4  *
5  *  Kendrick Smith <kmsmith@umich.edu>
6  *  Andy Adamson <andros@umich.edu>
7  *
8  *  Redistribution and use in source and binary forms, with or without
9  *  modification, are permitted provided that the following conditions
10  *  are met:
11  *
12  *  1. Redistributions of source code must retain the above copyright
13  *     notice, this list of conditions and the following disclaimer.
14  *  2. Redistributions in binary form must reproduce the above copyright
15  *     notice, this list of conditions and the following disclaimer in the
16  *     documentation and/or other materials provided with the distribution.
17  *  3. Neither the name of the University nor the names of its
18  *     contributors may be used to endorse or promote products derived
19  *     from this software without specific prior written permission.
20  *
21  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
22  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
23  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
29  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
30  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
31  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include <linux/nfs4.h>
35 #include <linux/sunrpc/clnt.h>
36 #include <linux/sunrpc/xprt.h>
37 #include <linux/sunrpc/svc_xprt.h>
38 #include <linux/slab.h>
39 #include "nfsd.h"
40 #include "state.h"
41 #include "netns.h"
42 #include "trace.h"
43 #include "xdr4cb.h"
44 #include "xdr4.h"
45 #include "nfs4xdr_gen.h"
46 
47 #define NFSDDBG_FACILITY                NFSDDBG_PROC
48 
49 #define NFSPROC4_CB_NULL 0
50 #define NFSPROC4_CB_COMPOUND 1
51 
52 /* Index of predefined Linux callback client operations */
53 
54 struct nfs4_cb_compound_hdr {
55 	/* args */
56 	u32		ident;	/* minorversion 0 only */
57 	u32		nops;
58 	__be32		*nops_p;
59 	u32		minorversion;
60 	/* res */
61 	int		status;
62 };
63 
64 static __be32 *xdr_encode_empty_array(__be32 *p)
65 {
66 	*p++ = xdr_zero;
67 	return p;
68 }
69 
70 /*
71  * Encode/decode NFSv4 CB basic data types
72  *
73  * Basic NFSv4 callback data types are defined in section 15 of RFC
74  * 3530: "Network File System (NFS) version 4 Protocol" and section
75  * 20 of RFC 5661: "Network File System (NFS) Version 4 Minor Version
76  * 1 Protocol"
77  */
78 
79 static void encode_uint32(struct xdr_stream *xdr, u32 n)
80 {
81 	WARN_ON_ONCE(xdr_stream_encode_u32(xdr, n) < 0);
82 }
83 
84 static void encode_bitmap4(struct xdr_stream *xdr, const __u32 *bitmap,
85 			   size_t len)
86 {
87 	xdr_stream_encode_uint32_array(xdr, bitmap, len);
88 }
89 
90 static int decode_cb_fattr4(struct xdr_stream *xdr, uint32_t *bitmap,
91 				struct nfs4_cb_fattr *fattr)
92 {
93 	fattr->ncf_cb_change = 0;
94 	fattr->ncf_cb_fsize = 0;
95 	fattr->ncf_cb_atime.tv_sec = 0;
96 	fattr->ncf_cb_atime.tv_nsec = 0;
97 	fattr->ncf_cb_mtime.tv_sec = 0;
98 	fattr->ncf_cb_mtime.tv_nsec = 0;
99 
100 	if (bitmap[0] & FATTR4_WORD0_CHANGE)
101 		if (xdr_stream_decode_u64(xdr, &fattr->ncf_cb_change) < 0)
102 			return -EIO;
103 	if (bitmap[0] & FATTR4_WORD0_SIZE)
104 		if (xdr_stream_decode_u64(xdr, &fattr->ncf_cb_fsize) < 0)
105 			return -EIO;
106 	if (bitmap[2] & FATTR4_WORD2_TIME_DELEG_ACCESS) {
107 		fattr4_time_deleg_access access;
108 
109 		if (!xdrgen_decode_fattr4_time_deleg_access(xdr, &access))
110 			return -EIO;
111 		fattr->ncf_cb_atime.tv_sec = access.seconds;
112 		fattr->ncf_cb_atime.tv_nsec = access.nseconds;
113 
114 	}
115 	if (bitmap[2] & FATTR4_WORD2_TIME_DELEG_MODIFY) {
116 		fattr4_time_deleg_modify modify;
117 
118 		if (!xdrgen_decode_fattr4_time_deleg_modify(xdr, &modify))
119 			return -EIO;
120 		fattr->ncf_cb_mtime.tv_sec = modify.seconds;
121 		fattr->ncf_cb_mtime.tv_nsec = modify.nseconds;
122 
123 	}
124 	return 0;
125 }
126 
127 static void encode_nfs_cb_opnum4(struct xdr_stream *xdr, enum nfs_cb_opnum4 op)
128 {
129 	__be32 *p;
130 
131 	p = xdr_reserve_space(xdr, 4);
132 	*p = cpu_to_be32(op);
133 }
134 
135 /*
136  * nfs_fh4
137  *
138  *	typedef opaque nfs_fh4<NFS4_FHSIZE>;
139  */
140 static void encode_nfs_fh4(struct xdr_stream *xdr, const struct knfsd_fh *fh)
141 {
142 	u32 length = fh->fh_size;
143 	__be32 *p;
144 
145 	BUG_ON(length > NFS4_FHSIZE);
146 	p = xdr_reserve_space(xdr, 4 + length);
147 	xdr_encode_opaque(p, &fh->fh_raw, length);
148 }
149 
150 /*
151  * stateid4
152  *
153  *	struct stateid4 {
154  *		uint32_t	seqid;
155  *		opaque		other[12];
156  *	};
157  */
158 static void encode_stateid4(struct xdr_stream *xdr, const stateid_t *sid)
159 {
160 	__be32 *p;
161 
162 	p = xdr_reserve_space(xdr, NFS4_STATEID_SIZE);
163 	*p++ = cpu_to_be32(sid->si_generation);
164 	xdr_encode_opaque_fixed(p, &sid->si_opaque, NFS4_STATEID_OTHER_SIZE);
165 }
166 
167 /*
168  * sessionid4
169  *
170  *	typedef opaque sessionid4[NFS4_SESSIONID_SIZE];
171  */
172 static void encode_sessionid4(struct xdr_stream *xdr,
173 			      const struct nfsd4_session *session)
174 {
175 	__be32 *p;
176 
177 	p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN);
178 	xdr_encode_opaque_fixed(p, session->se_sessionid.data,
179 					NFS4_MAX_SESSIONID_LEN);
180 }
181 
182 /*
183  * nfsstat4
184  */
185 static const struct {
186 	int stat;
187 	int errno;
188 } nfs_cb_errtbl[] = {
189 	{ NFS4_OK,		0		},
190 	{ NFS4ERR_PERM,		-EPERM		},
191 	{ NFS4ERR_NOENT,	-ENOENT		},
192 	{ NFS4ERR_IO,		-EIO		},
193 	{ NFS4ERR_NXIO,		-ENXIO		},
194 	{ NFS4ERR_ACCESS,	-EACCES		},
195 	{ NFS4ERR_EXIST,	-EEXIST		},
196 	{ NFS4ERR_XDEV,		-EXDEV		},
197 	{ NFS4ERR_NOTDIR,	-ENOTDIR	},
198 	{ NFS4ERR_ISDIR,	-EISDIR		},
199 	{ NFS4ERR_INVAL,	-EINVAL		},
200 	{ NFS4ERR_FBIG,		-EFBIG		},
201 	{ NFS4ERR_NOSPC,	-ENOSPC		},
202 	{ NFS4ERR_ROFS,		-EROFS		},
203 	{ NFS4ERR_MLINK,	-EMLINK		},
204 	{ NFS4ERR_NAMETOOLONG,	-ENAMETOOLONG	},
205 	{ NFS4ERR_NOTEMPTY,	-ENOTEMPTY	},
206 	{ NFS4ERR_DQUOT,	-EDQUOT		},
207 	{ NFS4ERR_STALE,	-ESTALE		},
208 	{ NFS4ERR_BADHANDLE,	-EBADHANDLE	},
209 	{ NFS4ERR_BAD_COOKIE,	-EBADCOOKIE	},
210 	{ NFS4ERR_NOTSUPP,	-ENOTSUPP	},
211 	{ NFS4ERR_TOOSMALL,	-ETOOSMALL	},
212 	{ NFS4ERR_SERVERFAULT,	-ESERVERFAULT	},
213 	{ NFS4ERR_BADTYPE,	-EBADTYPE	},
214 	{ NFS4ERR_LOCKED,	-EAGAIN		},
215 	{ NFS4ERR_RESOURCE,	-EREMOTEIO	},
216 	{ NFS4ERR_SYMLINK,	-ELOOP		},
217 	{ NFS4ERR_OP_ILLEGAL,	-EOPNOTSUPP	},
218 	{ NFS4ERR_DEADLOCK,	-EDEADLK	},
219 	{ -1,			-EIO		}
220 };
221 
222 /*
223  * If we cannot translate the error, the recovery routines should
224  * handle it.
225  *
226  * Note: remaining NFSv4 error codes have values > 10000, so should
227  * not conflict with native Linux error codes.
228  */
229 static int nfs_cb_stat_to_errno(int status)
230 {
231 	int i;
232 
233 	for (i = 0; nfs_cb_errtbl[i].stat != -1; i++) {
234 		if (nfs_cb_errtbl[i].stat == status)
235 			return nfs_cb_errtbl[i].errno;
236 	}
237 
238 	dprintk("NFSD: Unrecognized NFS CB status value: %u\n", status);
239 	return -status;
240 }
241 
242 static int decode_cb_op_status(struct xdr_stream *xdr,
243 			       enum nfs_cb_opnum4 expected, int *status)
244 {
245 	__be32 *p;
246 	u32 op;
247 
248 	p = xdr_inline_decode(xdr, 4 + 4);
249 	if (unlikely(p == NULL))
250 		goto out_overflow;
251 	op = be32_to_cpup(p++);
252 	if (unlikely(op != expected))
253 		goto out_unexpected;
254 	*status = nfs_cb_stat_to_errno(be32_to_cpup(p));
255 	return 0;
256 out_overflow:
257 	return -EIO;
258 out_unexpected:
259 	dprintk("NFSD: Callback server returned operation %d but "
260 		"we issued a request for %d\n", op, expected);
261 	return -EIO;
262 }
263 
264 /*
265  * CB_COMPOUND4args
266  *
267  *	struct CB_COMPOUND4args {
268  *		utf8str_cs	tag;
269  *		uint32_t	minorversion;
270  *		uint32_t	callback_ident;
271  *		nfs_cb_argop4	argarray<>;
272  *	};
273 */
274 static void encode_cb_compound4args(struct xdr_stream *xdr,
275 				    struct nfs4_cb_compound_hdr *hdr)
276 {
277 	__be32 * p;
278 
279 	p = xdr_reserve_space(xdr, 4 + 4 + 4 + 4);
280 	p = xdr_encode_empty_array(p);		/* empty tag */
281 	*p++ = cpu_to_be32(hdr->minorversion);
282 	*p++ = cpu_to_be32(hdr->ident);
283 
284 	hdr->nops_p = p;
285 	*p = cpu_to_be32(hdr->nops);		/* argarray element count */
286 }
287 
288 /*
289  * Update argarray element count
290  */
291 static void encode_cb_nops(struct nfs4_cb_compound_hdr *hdr)
292 {
293 	BUG_ON(hdr->nops > NFS4_MAX_BACK_CHANNEL_OPS);
294 	*hdr->nops_p = cpu_to_be32(hdr->nops);
295 }
296 
297 /*
298  * CB_COMPOUND4res
299  *
300  *	struct CB_COMPOUND4res {
301  *		nfsstat4	status;
302  *		utf8str_cs	tag;
303  *		nfs_cb_resop4	resarray<>;
304  *	};
305  */
306 static int decode_cb_compound4res(struct xdr_stream *xdr,
307 				  struct nfs4_cb_compound_hdr *hdr)
308 {
309 	u32 length;
310 	__be32 *p;
311 
312 	p = xdr_inline_decode(xdr, XDR_UNIT);
313 	if (unlikely(p == NULL))
314 		goto out_overflow;
315 	hdr->status = be32_to_cpup(p);
316 	/* Ignore the tag */
317 	if (xdr_stream_decode_u32(xdr, &length) < 0)
318 		goto out_overflow;
319 	if (xdr_inline_decode(xdr, length) == NULL)
320 		goto out_overflow;
321 	if (xdr_stream_decode_u32(xdr, &hdr->nops) < 0)
322 		goto out_overflow;
323 	return 0;
324 out_overflow:
325 	return -EIO;
326 }
327 
328 /*
329  * CB_RECALL4args
330  *
331  *	struct CB_RECALL4args {
332  *		stateid4	stateid;
333  *		bool		truncate;
334  *		nfs_fh4		fh;
335  *	};
336  */
337 static void encode_cb_recall4args(struct xdr_stream *xdr,
338 				  const struct nfs4_delegation *dp,
339 				  struct nfs4_cb_compound_hdr *hdr)
340 {
341 	__be32 *p;
342 
343 	encode_nfs_cb_opnum4(xdr, OP_CB_RECALL);
344 	encode_stateid4(xdr, &dp->dl_stid.sc_stateid);
345 
346 	p = xdr_reserve_space(xdr, 4);
347 	*p++ = xdr_zero;			/* truncate */
348 
349 	encode_nfs_fh4(xdr, &dp->dl_stid.sc_file->fi_fhandle);
350 
351 	hdr->nops++;
352 }
353 
354 /*
355  * CB_RECALLANY4args
356  *
357  *	struct CB_RECALLANY4args {
358  *		uint32_t	craa_objects_to_keep;
359  *		bitmap4		craa_type_mask;
360  *	};
361  */
362 static void
363 encode_cb_recallany4args(struct xdr_stream *xdr,
364 	struct nfs4_cb_compound_hdr *hdr, struct nfsd4_cb_recall_any *ra)
365 {
366 	encode_nfs_cb_opnum4(xdr, OP_CB_RECALL_ANY);
367 	encode_uint32(xdr, ra->ra_keep);
368 	encode_bitmap4(xdr, ra->ra_bmval, ARRAY_SIZE(ra->ra_bmval));
369 	hdr->nops++;
370 }
371 
372 /*
373  * CB_GETATTR4args
374  *	struct CB_GETATTR4args {
375  *	   nfs_fh4 fh;
376  *	   bitmap4 attr_request;
377  *	};
378  *
379  * The size and change attributes are the only one
380  * guaranteed to be serviced by the client.
381  */
382 static void
383 encode_cb_getattr4args(struct xdr_stream *xdr, struct nfs4_cb_compound_hdr *hdr,
384 			struct nfs4_cb_fattr *fattr)
385 {
386 	struct nfs4_delegation *dp = container_of(fattr, struct nfs4_delegation, dl_cb_fattr);
387 	struct knfsd_fh *fh = &dp->dl_stid.sc_file->fi_fhandle;
388 	struct nfs4_cb_fattr *ncf = &dp->dl_cb_fattr;
389 	u32 bmap_size = 1;
390 	u32 bmap[3];
391 
392 	bmap[0] = FATTR4_WORD0_SIZE;
393 	if (!ncf->ncf_file_modified)
394 		bmap[0] |= FATTR4_WORD0_CHANGE;
395 
396 	if (deleg_attrs_deleg(dp->dl_type)) {
397 		bmap[1] = 0;
398 		bmap[2] = FATTR4_WORD2_TIME_DELEG_ACCESS | FATTR4_WORD2_TIME_DELEG_MODIFY;
399 		bmap_size = 3;
400 	}
401 	encode_nfs_cb_opnum4(xdr, OP_CB_GETATTR);
402 	encode_nfs_fh4(xdr, fh);
403 	encode_bitmap4(xdr, bmap, bmap_size);
404 	hdr->nops++;
405 }
406 
407 static u32 highest_slotid(struct nfsd4_session *ses)
408 {
409 	u32 idx;
410 
411 	spin_lock(&ses->se_lock);
412 	idx = fls(~ses->se_cb_slot_avail);
413 	if (idx > 0)
414 		--idx;
415 	idx = max(idx, ses->se_cb_highest_slot);
416 	spin_unlock(&ses->se_lock);
417 	return idx;
418 }
419 
420 static void
421 encode_referring_call4(struct xdr_stream *xdr,
422 		       const struct nfsd4_referring_call *rc)
423 {
424 	encode_uint32(xdr, rc->rc_sequenceid);
425 	encode_uint32(xdr, rc->rc_slotid);
426 }
427 
428 static void
429 encode_referring_call_list4(struct xdr_stream *xdr,
430 			    const struct nfsd4_referring_call_list *rcl)
431 {
432 	struct nfsd4_referring_call *rc;
433 	__be32 *p;
434 
435 	p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN);
436 	xdr_encode_opaque_fixed(p, rcl->rcl_sessionid.data,
437 					NFS4_MAX_SESSIONID_LEN);
438 	encode_uint32(xdr, rcl->__nr_referring_calls);
439 	list_for_each_entry(rc, &rcl->rcl_referring_calls, __list)
440 		encode_referring_call4(xdr, rc);
441 }
442 
443 /*
444  * CB_SEQUENCE4args
445  *
446  *	struct CB_SEQUENCE4args {
447  *		sessionid4		csa_sessionid;
448  *		sequenceid4		csa_sequenceid;
449  *		slotid4			csa_slotid;
450  *		slotid4			csa_highest_slotid;
451  *		bool			csa_cachethis;
452  *		referring_call_list4	csa_referring_call_lists<>;
453  *	};
454  */
455 static void encode_cb_sequence4args(struct xdr_stream *xdr,
456 				    const struct nfsd4_callback *cb,
457 				    struct nfs4_cb_compound_hdr *hdr)
458 {
459 	struct nfsd4_session *session = cb->cb_clp->cl_cb_session;
460 	struct nfsd4_referring_call_list *rcl;
461 	__be32 *p;
462 
463 	if (hdr->minorversion == 0)
464 		return;
465 
466 	encode_nfs_cb_opnum4(xdr, OP_CB_SEQUENCE);
467 	encode_sessionid4(xdr, session);
468 
469 	p = xdr_reserve_space(xdr, XDR_UNIT * 4);
470 	*p++ = cpu_to_be32(session->se_cb_seq_nr[cb->cb_held_slot]);	/* csa_sequenceid */
471 	*p++ = cpu_to_be32(cb->cb_held_slot);		/* csa_slotid */
472 	*p++ = cpu_to_be32(highest_slotid(session)); /* csa_highest_slotid */
473 	*p++ = xdr_zero;			/* csa_cachethis */
474 
475 	/* csa_referring_call_lists */
476 	encode_uint32(xdr, cb->cb_nr_referring_call_list);
477 	list_for_each_entry(rcl, &cb->cb_referring_call_list, __list)
478 		encode_referring_call_list4(xdr, rcl);
479 
480 	hdr->nops++;
481 }
482 
483 static void update_cb_slot_table(struct nfsd4_session *ses, u32 target)
484 {
485 	/* No need to do anything if nothing changed */
486 	if (likely(target == READ_ONCE(ses->se_cb_highest_slot)))
487 		return;
488 
489 	spin_lock(&ses->se_lock);
490 	if (target > ses->se_cb_highest_slot) {
491 		int i;
492 
493 		target = min(target, NFSD_BC_SLOT_TABLE_SIZE - 1);
494 
495 		/*
496 		 * Growing the slot table. Reset any new sequences to 1.
497 		 *
498 		 * NB: There is some debate about whether the RFC requires this,
499 		 *     but the Linux client expects it.
500 		 */
501 		for (i = ses->se_cb_highest_slot + 1; i <= target; ++i)
502 			ses->se_cb_seq_nr[i] = 1;
503 	}
504 	ses->se_cb_highest_slot = target;
505 	spin_unlock(&ses->se_lock);
506 }
507 
508 /*
509  * CB_SEQUENCE4resok
510  *
511  *	struct CB_SEQUENCE4resok {
512  *		sessionid4	csr_sessionid;
513  *		sequenceid4	csr_sequenceid;
514  *		slotid4		csr_slotid;
515  *		slotid4		csr_highest_slotid;
516  *		slotid4		csr_target_highest_slotid;
517  *	};
518  *
519  *	union CB_SEQUENCE4res switch (nfsstat4 csr_status) {
520  *	case NFS4_OK:
521  *		CB_SEQUENCE4resok	csr_resok4;
522  *	default:
523  *		void;
524  *	};
525  *
526  * Our current back channel implmentation supports a single backchannel
527  * with a single slot.
528  */
529 static int decode_cb_sequence4resok(struct xdr_stream *xdr,
530 				    struct nfsd4_callback *cb)
531 {
532 	struct nfsd4_session *session = cb->cb_clp->cl_cb_session;
533 	int status = -ESERVERFAULT;
534 	__be32 *p;
535 	u32 seqid, slotid, target;
536 
537 	/*
538 	 * If the server returns different values for sessionID, slotID or
539 	 * sequence number, the server is looney tunes.
540 	 */
541 	p = xdr_inline_decode(xdr, NFS4_MAX_SESSIONID_LEN + 4 + 4 + 4 + 4);
542 	if (unlikely(p == NULL))
543 		goto out_overflow;
544 
545 	if (memcmp(p, session->se_sessionid.data, NFS4_MAX_SESSIONID_LEN)) {
546 		dprintk("NFS: %s Invalid session id\n", __func__);
547 		goto out;
548 	}
549 	p += XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN);
550 
551 	seqid = be32_to_cpup(p++);
552 	if (seqid != session->se_cb_seq_nr[cb->cb_held_slot]) {
553 		dprintk("NFS: %s Invalid sequence number\n", __func__);
554 		goto out;
555 	}
556 
557 	slotid = be32_to_cpup(p++);
558 	if (slotid != cb->cb_held_slot) {
559 		dprintk("NFS: %s Invalid slotid\n", __func__);
560 		goto out;
561 	}
562 
563 	p++; // ignore current highest slot value
564 
565 	target = be32_to_cpup(p++);
566 	update_cb_slot_table(session, target);
567 	status = 0;
568 out:
569 	cb->cb_seq_status = status;
570 	return status;
571 out_overflow:
572 	status = -EIO;
573 	goto out;
574 }
575 
576 static int decode_cb_sequence4res(struct xdr_stream *xdr,
577 				  struct nfsd4_callback *cb)
578 {
579 	int status;
580 
581 	if (cb->cb_clp->cl_minorversion == 0)
582 		return 0;
583 
584 	status = decode_cb_op_status(xdr, OP_CB_SEQUENCE, &cb->cb_seq_status);
585 	if (unlikely(status || cb->cb_seq_status))
586 		return status;
587 
588 	return decode_cb_sequence4resok(xdr, cb);
589 }
590 
591 /*
592  * NFSv4.0 and NFSv4.1 XDR encode functions
593  *
594  * NFSv4.0 callback argument types are defined in section 15 of RFC
595  * 3530: "Network File System (NFS) version 4 Protocol" and section 20
596  * of RFC 5661:  "Network File System (NFS) Version 4 Minor Version 1
597  * Protocol".
598  */
599 
600 /*
601  * NB: Without this zero space reservation, callbacks over krb5p fail
602  */
603 static void nfs4_xdr_enc_cb_null(struct rpc_rqst *req, struct xdr_stream *xdr,
604 				 const void *__unused)
605 {
606 	xdr_reserve_space(xdr, 0);
607 }
608 
609 /*
610  * 20.1.  Operation 3: CB_GETATTR - Get Attributes
611  */
612 static void nfs4_xdr_enc_cb_getattr(struct rpc_rqst *req,
613 		struct xdr_stream *xdr, const void *data)
614 {
615 	const struct nfsd4_callback *cb = data;
616 	struct nfs4_cb_fattr *ncf =
617 		container_of(cb, struct nfs4_cb_fattr, ncf_getattr);
618 	struct nfs4_cb_compound_hdr hdr = {
619 		.ident = cb->cb_clp->cl_cb_ident,
620 		.minorversion = cb->cb_clp->cl_minorversion,
621 	};
622 
623 	encode_cb_compound4args(xdr, &hdr);
624 	encode_cb_sequence4args(xdr, cb, &hdr);
625 	encode_cb_getattr4args(xdr, &hdr, ncf);
626 	encode_cb_nops(&hdr);
627 }
628 
629 /*
630  * 20.2. Operation 4: CB_RECALL - Recall a Delegation
631  */
632 static void nfs4_xdr_enc_cb_recall(struct rpc_rqst *req, struct xdr_stream *xdr,
633 				   const void *data)
634 {
635 	const struct nfsd4_callback *cb = data;
636 	const struct nfs4_delegation *dp = cb_to_delegation(cb);
637 	struct nfs4_cb_compound_hdr hdr = {
638 		.ident = cb->cb_clp->cl_cb_ident,
639 		.minorversion = cb->cb_clp->cl_minorversion,
640 	};
641 
642 	encode_cb_compound4args(xdr, &hdr);
643 	encode_cb_sequence4args(xdr, cb, &hdr);
644 	encode_cb_recall4args(xdr, dp, &hdr);
645 	encode_cb_nops(&hdr);
646 }
647 
648 /*
649  * 20.6. Operation 8: CB_RECALL_ANY - Keep Any N Recallable Objects
650  */
651 static void
652 nfs4_xdr_enc_cb_recall_any(struct rpc_rqst *req,
653 		struct xdr_stream *xdr, const void *data)
654 {
655 	const struct nfsd4_callback *cb = data;
656 	struct nfsd4_cb_recall_any *ra;
657 	struct nfs4_cb_compound_hdr hdr = {
658 		.ident = cb->cb_clp->cl_cb_ident,
659 		.minorversion = cb->cb_clp->cl_minorversion,
660 	};
661 
662 	ra = container_of(cb, struct nfsd4_cb_recall_any, ra_cb);
663 	encode_cb_compound4args(xdr, &hdr);
664 	encode_cb_sequence4args(xdr, cb, &hdr);
665 	encode_cb_recallany4args(xdr, &hdr, ra);
666 	encode_cb_nops(&hdr);
667 }
668 
669 /*
670  * NFSv4.0 and NFSv4.1 XDR decode functions
671  *
672  * NFSv4.0 callback result types are defined in section 15 of RFC
673  * 3530: "Network File System (NFS) version 4 Protocol" and section 20
674  * of RFC 5661:  "Network File System (NFS) Version 4 Minor Version 1
675  * Protocol".
676  */
677 
678 static int nfs4_xdr_dec_cb_null(struct rpc_rqst *req, struct xdr_stream *xdr,
679 				void *__unused)
680 {
681 	return 0;
682 }
683 
684 /*
685  * 20.1.  Operation 3: CB_GETATTR - Get Attributes
686  */
687 static int nfs4_xdr_dec_cb_getattr(struct rpc_rqst *rqstp,
688 				  struct xdr_stream *xdr,
689 				  void *data)
690 {
691 	struct nfsd4_callback *cb = data;
692 	struct nfs4_cb_compound_hdr hdr;
693 	int status;
694 	u32 bitmap[3] = {0};
695 	u32 attrlen, maxlen;
696 	struct nfs4_cb_fattr *ncf =
697 		container_of(cb, struct nfs4_cb_fattr, ncf_getattr);
698 
699 	status = decode_cb_compound4res(xdr, &hdr);
700 	if (unlikely(status))
701 		return status;
702 
703 	status = decode_cb_sequence4res(xdr, cb);
704 	if (unlikely(status || cb->cb_seq_status))
705 		return status;
706 
707 	status = decode_cb_op_status(xdr, OP_CB_GETATTR, &cb->cb_status);
708 	if (unlikely(status || cb->cb_status))
709 		return status;
710 	if (xdr_stream_decode_uint32_array(xdr, bitmap, 3) < 0)
711 		return -EIO;
712 	if (xdr_stream_decode_u32(xdr, &attrlen) < 0)
713 		return -EIO;
714 	maxlen = sizeof(ncf->ncf_cb_change) + sizeof(ncf->ncf_cb_fsize);
715 	if (bitmap[2] != 0)
716 		maxlen += (sizeof(ncf->ncf_cb_mtime.tv_sec) +
717 			   sizeof(ncf->ncf_cb_mtime.tv_nsec)) * 2;
718 	if (attrlen > maxlen)
719 		return -EIO;
720 	status = decode_cb_fattr4(xdr, bitmap, ncf);
721 	return status;
722 }
723 
724 /*
725  * 20.2. Operation 4: CB_RECALL - Recall a Delegation
726  */
727 static int nfs4_xdr_dec_cb_recall(struct rpc_rqst *rqstp,
728 				  struct xdr_stream *xdr,
729 				  void *data)
730 {
731 	struct nfsd4_callback *cb = data;
732 	struct nfs4_cb_compound_hdr hdr;
733 	int status;
734 
735 	status = decode_cb_compound4res(xdr, &hdr);
736 	if (unlikely(status))
737 		return status;
738 
739 	status = decode_cb_sequence4res(xdr, cb);
740 	if (unlikely(status || cb->cb_seq_status))
741 		return status;
742 
743 	return decode_cb_op_status(xdr, OP_CB_RECALL, &cb->cb_status);
744 }
745 
746 /*
747  * 20.6. Operation 8: CB_RECALL_ANY - Keep Any N Recallable Objects
748  */
749 static int
750 nfs4_xdr_dec_cb_recall_any(struct rpc_rqst *rqstp,
751 				  struct xdr_stream *xdr,
752 				  void *data)
753 {
754 	struct nfsd4_callback *cb = data;
755 	struct nfs4_cb_compound_hdr hdr;
756 	int status;
757 
758 	status = decode_cb_compound4res(xdr, &hdr);
759 	if (unlikely(status))
760 		return status;
761 	status = decode_cb_sequence4res(xdr, cb);
762 	if (unlikely(status || cb->cb_seq_status))
763 		return status;
764 	status =  decode_cb_op_status(xdr, OP_CB_RECALL_ANY, &cb->cb_status);
765 	return status;
766 }
767 
768 #ifdef CONFIG_NFSD_PNFS
769 /*
770  * CB_LAYOUTRECALL4args
771  *
772  *	struct layoutrecall_file4 {
773  *		nfs_fh4         lor_fh;
774  *		offset4         lor_offset;
775  *		length4         lor_length;
776  *		stateid4        lor_stateid;
777  *	};
778  *
779  *	union layoutrecall4 switch(layoutrecall_type4 lor_recalltype) {
780  *	case LAYOUTRECALL4_FILE:
781  *		layoutrecall_file4 lor_layout;
782  *	case LAYOUTRECALL4_FSID:
783  *		fsid4              lor_fsid;
784  *	case LAYOUTRECALL4_ALL:
785  *		void;
786  *	};
787  *
788  *	struct CB_LAYOUTRECALL4args {
789  *		layouttype4             clora_type;
790  *		layoutiomode4           clora_iomode;
791  *		bool                    clora_changed;
792  *		layoutrecall4           clora_recall;
793  *	};
794  */
795 static void encode_cb_layout4args(struct xdr_stream *xdr,
796 				  const struct nfs4_layout_stateid *ls,
797 				  struct nfs4_cb_compound_hdr *hdr)
798 {
799 	__be32 *p;
800 
801 	BUG_ON(hdr->minorversion == 0);
802 
803 	p = xdr_reserve_space(xdr, 5 * 4);
804 	*p++ = cpu_to_be32(OP_CB_LAYOUTRECALL);
805 	*p++ = cpu_to_be32(ls->ls_layout_type);
806 	*p++ = cpu_to_be32(IOMODE_ANY);
807 	*p++ = cpu_to_be32(1);
808 	*p = cpu_to_be32(RETURN_FILE);
809 
810 	encode_nfs_fh4(xdr, &ls->ls_stid.sc_file->fi_fhandle);
811 
812 	p = xdr_reserve_space(xdr, 2 * 8);
813 	p = xdr_encode_hyper(p, 0);
814 	xdr_encode_hyper(p, NFS4_MAX_UINT64);
815 
816 	encode_stateid4(xdr, &ls->ls_recall_sid);
817 
818 	hdr->nops++;
819 }
820 
821 static void nfs4_xdr_enc_cb_layout(struct rpc_rqst *req,
822 				   struct xdr_stream *xdr,
823 				   const void *data)
824 {
825 	const struct nfsd4_callback *cb = data;
826 	const struct nfs4_layout_stateid *ls =
827 		container_of(cb, struct nfs4_layout_stateid, ls_recall);
828 	struct nfs4_cb_compound_hdr hdr = {
829 		.ident = 0,
830 		.minorversion = cb->cb_clp->cl_minorversion,
831 	};
832 
833 	encode_cb_compound4args(xdr, &hdr);
834 	encode_cb_sequence4args(xdr, cb, &hdr);
835 	encode_cb_layout4args(xdr, ls, &hdr);
836 	encode_cb_nops(&hdr);
837 }
838 
839 static int nfs4_xdr_dec_cb_layout(struct rpc_rqst *rqstp,
840 				  struct xdr_stream *xdr,
841 				  void *data)
842 {
843 	struct nfsd4_callback *cb = data;
844 	struct nfs4_cb_compound_hdr hdr;
845 	int status;
846 
847 	status = decode_cb_compound4res(xdr, &hdr);
848 	if (unlikely(status))
849 		return status;
850 
851 	status = decode_cb_sequence4res(xdr, cb);
852 	if (unlikely(status || cb->cb_seq_status))
853 		return status;
854 
855 	return decode_cb_op_status(xdr, OP_CB_LAYOUTRECALL, &cb->cb_status);
856 }
857 #endif /* CONFIG_NFSD_PNFS */
858 
859 static void encode_stateowner(struct xdr_stream *xdr, struct nfs4_stateowner *so)
860 {
861 	__be32	*p;
862 
863 	p = xdr_reserve_space(xdr, 8 + 4 + so->so_owner.len);
864 	p = xdr_encode_opaque_fixed(p, &so->so_client->cl_clientid, 8);
865 	xdr_encode_opaque(p, so->so_owner.data, so->so_owner.len);
866 }
867 
868 static void nfs4_xdr_enc_cb_notify_lock(struct rpc_rqst *req,
869 					struct xdr_stream *xdr,
870 					const void *data)
871 {
872 	const struct nfsd4_callback *cb = data;
873 	const struct nfsd4_blocked_lock *nbl =
874 		container_of(cb, struct nfsd4_blocked_lock, nbl_cb);
875 	struct nfs4_lockowner *lo = (struct nfs4_lockowner *)nbl->nbl_lock.c.flc_owner;
876 	struct nfs4_cb_compound_hdr hdr = {
877 		.ident = 0,
878 		.minorversion = cb->cb_clp->cl_minorversion,
879 	};
880 
881 	__be32 *p;
882 
883 	BUG_ON(hdr.minorversion == 0);
884 
885 	encode_cb_compound4args(xdr, &hdr);
886 	encode_cb_sequence4args(xdr, cb, &hdr);
887 
888 	p = xdr_reserve_space(xdr, 4);
889 	*p = cpu_to_be32(OP_CB_NOTIFY_LOCK);
890 	encode_nfs_fh4(xdr, &nbl->nbl_fh);
891 	encode_stateowner(xdr, &lo->lo_owner);
892 	hdr.nops++;
893 
894 	encode_cb_nops(&hdr);
895 }
896 
897 static int nfs4_xdr_dec_cb_notify_lock(struct rpc_rqst *rqstp,
898 					struct xdr_stream *xdr,
899 					void *data)
900 {
901 	struct nfsd4_callback *cb = data;
902 	struct nfs4_cb_compound_hdr hdr;
903 	int status;
904 
905 	status = decode_cb_compound4res(xdr, &hdr);
906 	if (unlikely(status))
907 		return status;
908 
909 	status = decode_cb_sequence4res(xdr, cb);
910 	if (unlikely(status || cb->cb_seq_status))
911 		return status;
912 
913 	return decode_cb_op_status(xdr, OP_CB_NOTIFY_LOCK, &cb->cb_status);
914 }
915 
916 /*
917  * struct write_response4 {
918  *	stateid4	wr_callback_id<1>;
919  *	length4		wr_count;
920  *	stable_how4	wr_committed;
921  *	verifier4	wr_writeverf;
922  * };
923  * union offload_info4 switch (nfsstat4 coa_status) {
924  *	case NFS4_OK:
925  *		write_response4	coa_resok4;
926  *	default:
927  *		length4		coa_bytes_copied;
928  * };
929  * struct CB_OFFLOAD4args {
930  *	nfs_fh4		coa_fh;
931  *	stateid4	coa_stateid;
932  *	offload_info4	coa_offload_info;
933  * };
934  */
935 static void encode_offload_info4(struct xdr_stream *xdr,
936 				 const struct nfsd4_cb_offload *cbo)
937 {
938 	__be32 *p;
939 
940 	p = xdr_reserve_space(xdr, 4);
941 	*p = cbo->co_nfserr;
942 	switch (cbo->co_nfserr) {
943 	case nfs_ok:
944 		p = xdr_reserve_space(xdr, 4 + 8 + 4 + NFS4_VERIFIER_SIZE);
945 		p = xdr_encode_empty_array(p);
946 		p = xdr_encode_hyper(p, cbo->co_res.wr_bytes_written);
947 		*p++ = cpu_to_be32(cbo->co_res.wr_stable_how);
948 		p = xdr_encode_opaque_fixed(p, cbo->co_res.wr_verifier.data,
949 					    NFS4_VERIFIER_SIZE);
950 		break;
951 	default:
952 		p = xdr_reserve_space(xdr, 8);
953 		/* We always return success if bytes were written */
954 		p = xdr_encode_hyper(p, 0);
955 	}
956 }
957 
958 static void encode_cb_offload4args(struct xdr_stream *xdr,
959 				   const struct nfsd4_cb_offload *cbo,
960 				   struct nfs4_cb_compound_hdr *hdr)
961 {
962 	__be32 *p;
963 
964 	p = xdr_reserve_space(xdr, 4);
965 	*p = cpu_to_be32(OP_CB_OFFLOAD);
966 	encode_nfs_fh4(xdr, &cbo->co_fh);
967 	encode_stateid4(xdr, &cbo->co_res.cb_stateid);
968 	encode_offload_info4(xdr, cbo);
969 
970 	hdr->nops++;
971 }
972 
973 static void nfs4_xdr_enc_cb_offload(struct rpc_rqst *req,
974 				    struct xdr_stream *xdr,
975 				    const void *data)
976 {
977 	const struct nfsd4_callback *cb = data;
978 	const struct nfsd4_cb_offload *cbo =
979 		container_of(cb, struct nfsd4_cb_offload, co_cb);
980 	struct nfs4_cb_compound_hdr hdr = {
981 		.ident = 0,
982 		.minorversion = cb->cb_clp->cl_minorversion,
983 	};
984 
985 	encode_cb_compound4args(xdr, &hdr);
986 	encode_cb_sequence4args(xdr, cb, &hdr);
987 	encode_cb_offload4args(xdr, cbo, &hdr);
988 	encode_cb_nops(&hdr);
989 }
990 
991 static int nfs4_xdr_dec_cb_offload(struct rpc_rqst *rqstp,
992 				   struct xdr_stream *xdr,
993 				   void *data)
994 {
995 	struct nfsd4_callback *cb = data;
996 	struct nfs4_cb_compound_hdr hdr;
997 	int status;
998 
999 	status = decode_cb_compound4res(xdr, &hdr);
1000 	if (unlikely(status))
1001 		return status;
1002 
1003 	status = decode_cb_sequence4res(xdr, cb);
1004 	if (unlikely(status || cb->cb_seq_status))
1005 		return status;
1006 
1007 	return decode_cb_op_status(xdr, OP_CB_OFFLOAD, &cb->cb_status);
1008 }
1009 /*
1010  * RPC procedure tables
1011  */
1012 #define PROC(proc, call, argtype, restype)				\
1013 [NFSPROC4_CLNT_##proc] = {						\
1014 	.p_proc    = NFSPROC4_CB_##call,				\
1015 	.p_encode  = nfs4_xdr_enc_##argtype,		\
1016 	.p_decode  = nfs4_xdr_dec_##restype,				\
1017 	.p_arglen  = NFS4_enc_##argtype##_sz,				\
1018 	.p_replen  = NFS4_dec_##restype##_sz,				\
1019 	.p_statidx = NFSPROC4_CB_##call,				\
1020 	.p_name    = #proc,						\
1021 }
1022 
1023 static const struct rpc_procinfo nfs4_cb_procedures[] = {
1024 	PROC(CB_NULL,	NULL,		cb_null,	cb_null),
1025 	PROC(CB_RECALL,	COMPOUND,	cb_recall,	cb_recall),
1026 #ifdef CONFIG_NFSD_PNFS
1027 	PROC(CB_LAYOUT,	COMPOUND,	cb_layout,	cb_layout),
1028 #endif
1029 	PROC(CB_NOTIFY_LOCK,	COMPOUND,	cb_notify_lock,	cb_notify_lock),
1030 	PROC(CB_OFFLOAD,	COMPOUND,	cb_offload,	cb_offload),
1031 	PROC(CB_RECALL_ANY,	COMPOUND,	cb_recall_any,	cb_recall_any),
1032 	PROC(CB_GETATTR,	COMPOUND,	cb_getattr,	cb_getattr),
1033 };
1034 
1035 static unsigned int nfs4_cb_counts[ARRAY_SIZE(nfs4_cb_procedures)];
1036 static const struct rpc_version nfs_cb_version4 = {
1037 /*
1038  * Note on the callback rpc program version number: despite language in rfc
1039  * 5661 section 18.36.3 requiring servers to use 4 in this field, the
1040  * official xdr descriptions for both 4.0 and 4.1 specify version 1, and
1041  * in practice that appears to be what implementations use.  The section
1042  * 18.36.3 language is expected to be fixed in an erratum.
1043  */
1044 	.number			= 1,
1045 	.nrprocs		= ARRAY_SIZE(nfs4_cb_procedures),
1046 	.procs			= nfs4_cb_procedures,
1047 	.counts			= nfs4_cb_counts,
1048 };
1049 
1050 static const struct rpc_version *nfs_cb_version[2] = {
1051 	[1] = &nfs_cb_version4,
1052 };
1053 
1054 static const struct rpc_program cb_program;
1055 
1056 static struct rpc_stat cb_stats = {
1057 	.program		= &cb_program
1058 };
1059 
1060 #define NFS4_CALLBACK 0x40000000
1061 static const struct rpc_program cb_program = {
1062 	.name			= "nfs4_cb",
1063 	.number			= NFS4_CALLBACK,
1064 	.nrvers			= ARRAY_SIZE(nfs_cb_version),
1065 	.version		= nfs_cb_version,
1066 	.stats			= &cb_stats,
1067 	.pipe_dir_name		= "nfsd4_cb",
1068 };
1069 
1070 static int max_cb_time(struct net *net)
1071 {
1072 	struct nfsd_net *nn = net_generic(net, nfsd_net_id);
1073 
1074 	/*
1075 	 * nfsd4_lease is set to at most one hour in __nfsd4_write_time,
1076 	 * so we can use 32-bit math on it. Warn if that assumption
1077 	 * ever stops being true.
1078 	 */
1079 	if (WARN_ON_ONCE(nn->nfsd4_lease > 3600))
1080 		return 360 * HZ;
1081 
1082 	return max(((u32)nn->nfsd4_lease)/10, 1u) * HZ;
1083 }
1084 
1085 static bool nfsd4_queue_cb(struct nfsd4_callback *cb)
1086 {
1087 	struct nfs4_client *clp = cb->cb_clp;
1088 
1089 	trace_nfsd_cb_queue(clp, cb);
1090 	return queue_work(clp->cl_callback_wq, &cb->cb_work);
1091 }
1092 
1093 static void nfsd4_requeue_cb(struct rpc_task *task, struct nfsd4_callback *cb)
1094 {
1095 	struct nfs4_client *clp = cb->cb_clp;
1096 
1097 	if (!test_bit(NFSD4_CLIENT_CB_KILL, &clp->cl_flags)) {
1098 		trace_nfsd_cb_restart(clp, cb);
1099 		task->tk_status = 0;
1100 		set_bit(NFSD4_CALLBACK_REQUEUE, &cb->cb_flags);
1101 	}
1102 }
1103 
1104 static void nfsd41_cb_inflight_begin(struct nfs4_client *clp)
1105 {
1106 	atomic_inc(&clp->cl_cb_inflight);
1107 }
1108 
1109 static void nfsd41_cb_inflight_end(struct nfs4_client *clp)
1110 {
1111 
1112 	atomic_dec_and_wake_up(&clp->cl_cb_inflight);
1113 }
1114 
1115 static void nfsd41_cb_inflight_wait_complete(struct nfs4_client *clp)
1116 {
1117 	wait_var_event(&clp->cl_cb_inflight,
1118 			!atomic_read(&clp->cl_cb_inflight));
1119 }
1120 
1121 static const struct cred *get_backchannel_cred(struct nfs4_client *clp, struct rpc_clnt *client, struct nfsd4_session *ses)
1122 {
1123 	if (clp->cl_minorversion == 0) {
1124 		client->cl_principal = clp->cl_cred.cr_targ_princ ?
1125 			clp->cl_cred.cr_targ_princ : "nfs";
1126 
1127 		return get_cred(rpc_machine_cred());
1128 	} else {
1129 		struct cred *kcred;
1130 
1131 		kcred = prepare_kernel_cred(&init_task);
1132 		if (!kcred)
1133 			return NULL;
1134 
1135 		kcred->fsuid = ses->se_cb_sec.uid;
1136 		kcred->fsgid = ses->se_cb_sec.gid;
1137 		return kcred;
1138 	}
1139 }
1140 
1141 static int setup_callback_client(struct nfs4_client *clp, struct nfs4_cb_conn *conn, struct nfsd4_session *ses)
1142 {
1143 	int maxtime = max_cb_time(clp->net);
1144 	struct rpc_timeout	timeparms = {
1145 		.to_initval	= maxtime,
1146 		.to_retries	= 0,
1147 		.to_maxval	= maxtime,
1148 	};
1149 	struct rpc_create_args args = {
1150 		.net		= clp->net,
1151 		.address	= (struct sockaddr *) &conn->cb_addr,
1152 		.addrsize	= conn->cb_addrlen,
1153 		.saddress	= (struct sockaddr *) &conn->cb_saddr,
1154 		.timeout	= &timeparms,
1155 		.program	= &cb_program,
1156 		.version	= 1,
1157 		.flags		= (RPC_CLNT_CREATE_NOPING | RPC_CLNT_CREATE_QUIET),
1158 		.cred		= current_cred(),
1159 	};
1160 	struct rpc_clnt *client;
1161 	const struct cred *cred;
1162 
1163 	if (clp->cl_minorversion == 0) {
1164 		if (!clp->cl_cred.cr_principal &&
1165 		    (clp->cl_cred.cr_flavor >= RPC_AUTH_GSS_KRB5)) {
1166 			trace_nfsd_cb_setup_err(clp, -EINVAL);
1167 			return -EINVAL;
1168 		}
1169 		args.client_name = clp->cl_cred.cr_principal;
1170 		args.prognumber	= conn->cb_prog;
1171 		args.protocol = XPRT_TRANSPORT_TCP;
1172 		args.authflavor = clp->cl_cred.cr_flavor;
1173 		clp->cl_cb_ident = conn->cb_ident;
1174 	} else {
1175 		if (!conn->cb_xprt || !ses)
1176 			return -EINVAL;
1177 		clp->cl_cb_session = ses;
1178 		args.bc_xprt = conn->cb_xprt;
1179 		args.prognumber = clp->cl_cb_session->se_cb_prog;
1180 		args.protocol = conn->cb_xprt->xpt_class->xcl_ident |
1181 				XPRT_TRANSPORT_BC;
1182 		args.authflavor = ses->se_cb_sec.flavor;
1183 	}
1184 	/* Create RPC client */
1185 	client = rpc_create(&args);
1186 	if (IS_ERR(client)) {
1187 		trace_nfsd_cb_setup_err(clp, PTR_ERR(client));
1188 		return PTR_ERR(client);
1189 	}
1190 	cred = get_backchannel_cred(clp, client, ses);
1191 	if (!cred) {
1192 		trace_nfsd_cb_setup_err(clp, -ENOMEM);
1193 		rpc_shutdown_client(client);
1194 		return -ENOMEM;
1195 	}
1196 
1197 	if (clp->cl_minorversion != 0)
1198 		clp->cl_cb_conn.cb_xprt = conn->cb_xprt;
1199 	clp->cl_cb_client = client;
1200 	clp->cl_cb_cred = cred;
1201 	rcu_read_lock();
1202 	trace_nfsd_cb_setup(clp, rpc_peeraddr2str(client, RPC_DISPLAY_NETID),
1203 			    args.authflavor);
1204 	rcu_read_unlock();
1205 	return 0;
1206 }
1207 
1208 static void nfsd4_mark_cb_state(struct nfs4_client *clp, int newstate)
1209 {
1210 	if (clp->cl_cb_state != newstate) {
1211 		clp->cl_cb_state = newstate;
1212 		trace_nfsd_cb_new_state(clp);
1213 	}
1214 }
1215 
1216 static void nfsd4_mark_cb_down(struct nfs4_client *clp)
1217 {
1218 	if (test_bit(NFSD4_CLIENT_CB_UPDATE, &clp->cl_flags))
1219 		return;
1220 	nfsd4_mark_cb_state(clp, NFSD4_CB_DOWN);
1221 }
1222 
1223 static void nfsd4_mark_cb_fault(struct nfs4_client *clp)
1224 {
1225 	if (test_bit(NFSD4_CLIENT_CB_UPDATE, &clp->cl_flags))
1226 		return;
1227 	nfsd4_mark_cb_state(clp, NFSD4_CB_FAULT);
1228 }
1229 
1230 static void nfsd4_cb_probe_done(struct rpc_task *task, void *calldata)
1231 {
1232 	struct nfs4_client *clp = container_of(calldata, struct nfs4_client, cl_cb_null);
1233 
1234 	if (task->tk_status)
1235 		nfsd4_mark_cb_down(clp);
1236 	else
1237 		nfsd4_mark_cb_state(clp, NFSD4_CB_UP);
1238 }
1239 
1240 static void nfsd4_cb_probe_release(void *calldata)
1241 {
1242 	struct nfs4_client *clp = container_of(calldata, struct nfs4_client, cl_cb_null);
1243 
1244 	nfsd41_cb_inflight_end(clp);
1245 
1246 }
1247 
1248 static const struct rpc_call_ops nfsd4_cb_probe_ops = {
1249 	/* XXX: release method to ensure we set the cb channel down if
1250 	 * necessary on early failure? */
1251 	.rpc_call_done = nfsd4_cb_probe_done,
1252 	.rpc_release = nfsd4_cb_probe_release,
1253 };
1254 
1255 /*
1256  * Poke the callback thread to process any updates to the callback
1257  * parameters, and send a null probe.
1258  */
1259 void nfsd4_probe_callback(struct nfs4_client *clp)
1260 {
1261 	trace_nfsd_cb_probe(clp);
1262 	nfsd4_mark_cb_state(clp, NFSD4_CB_UNKNOWN);
1263 	set_bit(NFSD4_CLIENT_CB_UPDATE, &clp->cl_flags);
1264 	nfsd4_run_cb(&clp->cl_cb_null);
1265 }
1266 
1267 void nfsd4_probe_callback_sync(struct nfs4_client *clp)
1268 {
1269 	nfsd4_probe_callback(clp);
1270 	flush_workqueue(clp->cl_callback_wq);
1271 }
1272 
1273 void nfsd4_change_callback(struct nfs4_client *clp, struct nfs4_cb_conn *conn)
1274 {
1275 	nfsd4_mark_cb_state(clp, NFSD4_CB_UNKNOWN);
1276 	spin_lock(&clp->cl_lock);
1277 	memcpy(&clp->cl_cb_conn, conn, sizeof(struct nfs4_cb_conn));
1278 	spin_unlock(&clp->cl_lock);
1279 }
1280 
1281 static int grab_slot(struct nfsd4_session *ses)
1282 {
1283 	int idx;
1284 
1285 	spin_lock(&ses->se_lock);
1286 	idx = ffs(ses->se_cb_slot_avail) - 1;
1287 	if (idx < 0 || idx > ses->se_cb_highest_slot) {
1288 		spin_unlock(&ses->se_lock);
1289 		return -1;
1290 	}
1291 	/* clear the bit for the slot */
1292 	ses->se_cb_slot_avail &= ~BIT(idx);
1293 	spin_unlock(&ses->se_lock);
1294 	return idx;
1295 }
1296 
1297 /*
1298  * There's currently a single callback channel slot.
1299  * If the slot is available, then mark it busy.  Otherwise, set the
1300  * thread for sleeping on the callback RPC wait queue.
1301  */
1302 static bool nfsd41_cb_get_slot(struct nfsd4_callback *cb, struct rpc_task *task)
1303 {
1304 	struct nfs4_client *clp = cb->cb_clp;
1305 	struct nfsd4_session *ses = clp->cl_cb_session;
1306 
1307 	if (cb->cb_held_slot >= 0)
1308 		return true;
1309 	cb->cb_held_slot = grab_slot(ses);
1310 	if (cb->cb_held_slot < 0) {
1311 		rpc_sleep_on(&clp->cl_cb_waitq, task, NULL);
1312 		/* Race breaker */
1313 		cb->cb_held_slot = grab_slot(ses);
1314 		if (cb->cb_held_slot < 0)
1315 			return false;
1316 		rpc_wake_up_queued_task(&clp->cl_cb_waitq, task);
1317 	}
1318 	return true;
1319 }
1320 
1321 static void nfsd41_cb_release_slot(struct nfsd4_callback *cb)
1322 {
1323 	struct nfs4_client *clp = cb->cb_clp;
1324 	struct nfsd4_session *ses = clp->cl_cb_session;
1325 
1326 	if (cb->cb_held_slot >= 0) {
1327 		spin_lock(&ses->se_lock);
1328 		ses->se_cb_slot_avail |= BIT(cb->cb_held_slot);
1329 		spin_unlock(&ses->se_lock);
1330 		cb->cb_held_slot = -1;
1331 		rpc_wake_up_next(&clp->cl_cb_waitq);
1332 	}
1333 }
1334 
1335 static void nfsd41_destroy_cb(struct nfsd4_callback *cb)
1336 {
1337 	struct nfs4_client *clp = cb->cb_clp;
1338 
1339 	trace_nfsd_cb_destroy(clp, cb);
1340 	nfsd41_cb_release_slot(cb);
1341 	if (test_bit(NFSD4_CALLBACK_WAKE, &cb->cb_flags))
1342 		clear_and_wake_up_bit(NFSD4_CALLBACK_RUNNING, &cb->cb_flags);
1343 	else
1344 		clear_bit(NFSD4_CALLBACK_RUNNING, &cb->cb_flags);
1345 
1346 	if (cb->cb_ops && cb->cb_ops->release)
1347 		cb->cb_ops->release(cb);
1348 	nfsd41_cb_inflight_end(clp);
1349 }
1350 
1351 /**
1352  * nfsd41_cb_referring_call - add a referring call to a callback operation
1353  * @cb: context of callback to add the rc to
1354  * @sessionid: referring call's session ID
1355  * @slotid: referring call's session slot index
1356  * @seqno: referring call's slot sequence number
1357  *
1358  * Caller serializes access to @cb.
1359  *
1360  * NB: If memory allocation fails, the referring call is not added.
1361  */
1362 void nfsd41_cb_referring_call(struct nfsd4_callback *cb,
1363 			      struct nfs4_sessionid *sessionid,
1364 			      u32 slotid, u32 seqno)
1365 {
1366 	struct nfsd4_referring_call_list *rcl;
1367 	struct nfsd4_referring_call *rc;
1368 	bool found;
1369 
1370 	might_sleep();
1371 
1372 	found = false;
1373 	list_for_each_entry(rcl, &cb->cb_referring_call_list, __list) {
1374 		if (!memcmp(rcl->rcl_sessionid.data, sessionid->data,
1375 			   NFS4_MAX_SESSIONID_LEN)) {
1376 			found = true;
1377 			break;
1378 		}
1379 	}
1380 	if (!found) {
1381 		rcl = kmalloc(sizeof(*rcl), GFP_KERNEL);
1382 		if (!rcl)
1383 			return;
1384 		memcpy(rcl->rcl_sessionid.data, sessionid->data,
1385 		       NFS4_MAX_SESSIONID_LEN);
1386 		rcl->__nr_referring_calls = 0;
1387 		INIT_LIST_HEAD(&rcl->rcl_referring_calls);
1388 		list_add(&rcl->__list, &cb->cb_referring_call_list);
1389 		cb->cb_nr_referring_call_list++;
1390 	}
1391 
1392 	found = false;
1393 	list_for_each_entry(rc, &rcl->rcl_referring_calls, __list) {
1394 		if (rc->rc_sequenceid == seqno && rc->rc_slotid == slotid) {
1395 			found = true;
1396 			break;
1397 		}
1398 	}
1399 	if (!found) {
1400 		rc = kmalloc(sizeof(*rc), GFP_KERNEL);
1401 		if (!rc)
1402 			goto out;
1403 		rc->rc_sequenceid = seqno;
1404 		rc->rc_slotid = slotid;
1405 		rcl->__nr_referring_calls++;
1406 		list_add(&rc->__list, &rcl->rcl_referring_calls);
1407 	}
1408 
1409 out:
1410 	if (!rcl->__nr_referring_calls) {
1411 		cb->cb_nr_referring_call_list--;
1412 		list_del(&rcl->__list);
1413 		kfree(rcl);
1414 	}
1415 }
1416 
1417 /**
1418  * nfsd41_cb_destroy_referring_call_list - release referring call info
1419  * @cb: context of a callback that has completed
1420  *
1421  * Callers who allocate referring calls using nfsd41_cb_referring_call() must
1422  * release those resources by calling nfsd41_cb_destroy_referring_call_list.
1423  *
1424  * Caller serializes access to @cb.
1425  */
1426 void nfsd41_cb_destroy_referring_call_list(struct nfsd4_callback *cb)
1427 {
1428 	struct nfsd4_referring_call_list *rcl;
1429 	struct nfsd4_referring_call *rc;
1430 
1431 	while (!list_empty(&cb->cb_referring_call_list)) {
1432 		rcl = list_first_entry(&cb->cb_referring_call_list,
1433 				       struct nfsd4_referring_call_list,
1434 				       __list);
1435 
1436 		while (!list_empty(&rcl->rcl_referring_calls)) {
1437 			rc = list_first_entry(&rcl->rcl_referring_calls,
1438 					      struct nfsd4_referring_call,
1439 					      __list);
1440 			list_del(&rc->__list);
1441 			kfree(rc);
1442 		}
1443 		list_del(&rcl->__list);
1444 		kfree(rcl);
1445 	}
1446 }
1447 
1448 static void nfsd4_cb_prepare(struct rpc_task *task, void *calldata)
1449 {
1450 	struct nfsd4_callback *cb = calldata;
1451 	struct nfs4_client *clp = cb->cb_clp;
1452 	u32 minorversion = clp->cl_minorversion;
1453 
1454 	/*
1455 	 * cb_seq_status is only set in decode_cb_sequence4res,
1456 	 * and so will remain 1 if an rpc level failure occurs.
1457 	 */
1458 	trace_nfsd_cb_rpc_prepare(clp);
1459 	cb->cb_seq_status = 1;
1460 	cb->cb_status = 0;
1461 	if (minorversion && !nfsd41_cb_get_slot(cb, task))
1462 		return;
1463 	rpc_call_start(task);
1464 }
1465 
1466 /* Returns true if CB_COMPOUND processing should continue */
1467 static bool nfsd4_cb_sequence_done(struct rpc_task *task, struct nfsd4_callback *cb)
1468 {
1469 	struct nfsd4_session *session = cb->cb_clp->cl_cb_session;
1470 	bool ret = false;
1471 
1472 	if (cb->cb_held_slot < 0)
1473 		goto requeue;
1474 
1475 	/* This is the operation status code for CB_SEQUENCE */
1476 	trace_nfsd_cb_seq_status(task, cb);
1477 	switch (cb->cb_seq_status) {
1478 	case 0:
1479 		/*
1480 		 * No need for lock, access serialized in nfsd4_cb_prepare
1481 		 *
1482 		 * RFC5661 20.9.3
1483 		 * If CB_SEQUENCE returns an error, then the state of the slot
1484 		 * (sequence ID, cached reply) MUST NOT change.
1485 		 */
1486 		++session->se_cb_seq_nr[cb->cb_held_slot];
1487 		ret = true;
1488 		break;
1489 	case -ESERVERFAULT:
1490 		/*
1491 		 * Call succeeded, but the session, slot index, or slot
1492 		 * sequence number in the response do not match the same
1493 		 * in the server's call. The sequence information is thus
1494 		 * untrustworthy.
1495 		 */
1496 		nfsd4_mark_cb_fault(cb->cb_clp);
1497 		break;
1498 	case 1:
1499 		/*
1500 		 * cb_seq_status remains 1 if an RPC Reply was never
1501 		 * received. NFSD can't know if the client processed
1502 		 * the CB_SEQUENCE operation. Ask the client to send a
1503 		 * DESTROY_SESSION to recover.
1504 		 */
1505 		fallthrough;
1506 	case -NFS4ERR_BADSESSION:
1507 		nfsd4_mark_cb_fault(cb->cb_clp);
1508 		goto requeue;
1509 	case -NFS4ERR_DELAY:
1510 		cb->cb_seq_status = 1;
1511 		if (RPC_SIGNALLED(task) || !rpc_restart_call(task))
1512 			goto requeue;
1513 		rpc_delay(task, 2 * HZ);
1514 		return false;
1515 	case -NFS4ERR_SEQ_MISORDERED:
1516 	case -NFS4ERR_BADSLOT:
1517 		/*
1518 		 * A SEQ_MISORDERED or BADSLOT error means that the client and
1519 		 * server are out of sync as to the backchannel parameters. Mark
1520 		 * the backchannel faulty and restart the RPC, but leak the slot
1521 		 * so that it's no longer used.
1522 		 */
1523 		nfsd4_mark_cb_fault(cb->cb_clp);
1524 		cb->cb_held_slot = -1;
1525 		goto retry_nowait;
1526 	default:
1527 		nfsd4_mark_cb_fault(cb->cb_clp);
1528 	}
1529 	trace_nfsd_cb_free_slot(task, cb);
1530 	nfsd41_cb_release_slot(cb);
1531 	return ret;
1532 retry_nowait:
1533 	/*
1534 	 * RPC_SIGNALLED() means that the rpc_client is being torn down and
1535 	 * (possibly) recreated. Requeue the call in that case.
1536 	 */
1537 	if (!RPC_SIGNALLED(task)) {
1538 		if (rpc_restart_call_prepare(task))
1539 			return false;
1540 	}
1541 requeue:
1542 	nfsd41_cb_release_slot(cb);
1543 	nfsd4_requeue_cb(task, cb);
1544 	return false;
1545 }
1546 
1547 static void nfsd4_cb_done(struct rpc_task *task, void *calldata)
1548 {
1549 	struct nfsd4_callback *cb = calldata;
1550 	struct nfs4_client *clp = cb->cb_clp;
1551 
1552 	trace_nfsd_cb_rpc_done(clp);
1553 
1554 	if (!clp->cl_minorversion) {
1555 		/*
1556 		 * If the backchannel connection was shut down while this
1557 		 * task was queued, we need to resubmit it after setting up
1558 		 * a new backchannel connection.
1559 		 *
1560 		 * Note that if we lost our callback connection permanently
1561 		 * the submission code will error out, so we don't need to
1562 		 * handle that case here.
1563 		 */
1564 		if (RPC_SIGNALLED(task))
1565 			nfsd4_requeue_cb(task, cb);
1566 	} else if (!nfsd4_cb_sequence_done(task, cb)) {
1567 		return;
1568 	}
1569 
1570 	if (cb->cb_status) {
1571 		WARN_ONCE(task->tk_status,
1572 			  "cb_status=%d tk_status=%d cb_opcode=%d",
1573 			  cb->cb_status, task->tk_status, cb->cb_ops->opcode);
1574 		task->tk_status = cb->cb_status;
1575 	}
1576 
1577 	switch (cb->cb_ops->done(cb, task)) {
1578 	case 0:
1579 		task->tk_status = 0;
1580 		rpc_restart_call_prepare(task);
1581 		return;
1582 	case 1:
1583 		switch (task->tk_status) {
1584 		case -EIO:
1585 		case -ETIMEDOUT:
1586 		case -EACCES:
1587 			nfsd4_mark_cb_down(clp);
1588 		}
1589 		break;
1590 	default:
1591 		BUG();
1592 	}
1593 }
1594 
1595 static void nfsd4_cb_release(void *calldata)
1596 {
1597 	struct nfsd4_callback *cb = calldata;
1598 
1599 	trace_nfsd_cb_rpc_release(cb->cb_clp);
1600 
1601 	if (test_bit(NFSD4_CALLBACK_REQUEUE, &cb->cb_flags))
1602 		nfsd4_queue_cb(cb);
1603 	else
1604 		nfsd41_destroy_cb(cb);
1605 
1606 }
1607 
1608 static const struct rpc_call_ops nfsd4_cb_ops = {
1609 	.rpc_call_prepare = nfsd4_cb_prepare,
1610 	.rpc_call_done = nfsd4_cb_done,
1611 	.rpc_release = nfsd4_cb_release,
1612 };
1613 
1614 /* must be called under the state lock */
1615 void nfsd4_shutdown_callback(struct nfs4_client *clp)
1616 {
1617 	if (clp->cl_cb_state != NFSD4_CB_UNKNOWN)
1618 		trace_nfsd_cb_shutdown(clp);
1619 
1620 	set_bit(NFSD4_CLIENT_CB_KILL, &clp->cl_flags);
1621 	/*
1622 	 * Note this won't actually result in a null callback;
1623 	 * instead, nfsd4_run_cb_null() will detect the killed
1624 	 * client, destroy the rpc client, and stop:
1625 	 */
1626 	nfsd4_run_cb(&clp->cl_cb_null);
1627 	flush_workqueue(clp->cl_callback_wq);
1628 	nfsd41_cb_inflight_wait_complete(clp);
1629 }
1630 
1631 static struct nfsd4_conn * __nfsd4_find_backchannel(struct nfs4_client *clp)
1632 {
1633 	struct nfsd4_session *s;
1634 	struct nfsd4_conn *c;
1635 
1636 	lockdep_assert_held(&clp->cl_lock);
1637 
1638 	list_for_each_entry(s, &clp->cl_sessions, se_perclnt) {
1639 		list_for_each_entry(c, &s->se_conns, cn_persession) {
1640 			if (c->cn_flags & NFS4_CDFC4_BACK)
1641 				return c;
1642 		}
1643 	}
1644 	return NULL;
1645 }
1646 
1647 /*
1648  * Note there isn't a lot of locking in this code; instead we depend on
1649  * the fact that it is run from clp->cl_callback_wq, which won't run two
1650  * work items at once.  So, for example, clp->cl_callback_wq handles all
1651  * access of cl_cb_client and all calls to rpc_create or rpc_shutdown_client.
1652  */
1653 static void nfsd4_process_cb_update(struct nfsd4_callback *cb)
1654 {
1655 	struct nfs4_cb_conn conn;
1656 	struct nfs4_client *clp = cb->cb_clp;
1657 	struct nfsd4_session *ses = NULL;
1658 	struct nfsd4_conn *c;
1659 	int err;
1660 
1661 	trace_nfsd_cb_bc_update(clp, cb);
1662 
1663 	/*
1664 	 * This is either an update, or the client dying; in either case,
1665 	 * kill the old client:
1666 	 */
1667 	if (clp->cl_cb_client) {
1668 		trace_nfsd_cb_bc_shutdown(clp, cb);
1669 		rpc_shutdown_client(clp->cl_cb_client);
1670 		clp->cl_cb_client = NULL;
1671 		put_cred(clp->cl_cb_cred);
1672 		clp->cl_cb_cred = NULL;
1673 	}
1674 	if (clp->cl_cb_conn.cb_xprt) {
1675 		svc_xprt_put(clp->cl_cb_conn.cb_xprt);
1676 		clp->cl_cb_conn.cb_xprt = NULL;
1677 	}
1678 	if (test_bit(NFSD4_CLIENT_CB_KILL, &clp->cl_flags))
1679 		return;
1680 
1681 	spin_lock(&clp->cl_lock);
1682 	/*
1683 	 * Only serialized callback code is allowed to clear these
1684 	 * flags; main nfsd code can only set them:
1685 	 */
1686 	WARN_ON(!(clp->cl_flags & NFSD4_CLIENT_CB_FLAG_MASK));
1687 	clear_bit(NFSD4_CLIENT_CB_UPDATE, &clp->cl_flags);
1688 
1689 	memcpy(&conn, &cb->cb_clp->cl_cb_conn, sizeof(struct nfs4_cb_conn));
1690 	c = __nfsd4_find_backchannel(clp);
1691 	if (c) {
1692 		svc_xprt_get(c->cn_xprt);
1693 		conn.cb_xprt = c->cn_xprt;
1694 		ses = c->cn_session;
1695 	}
1696 	spin_unlock(&clp->cl_lock);
1697 
1698 	err = setup_callback_client(clp, &conn, ses);
1699 	if (err) {
1700 		nfsd4_mark_cb_down(clp);
1701 		if (c)
1702 			svc_xprt_put(c->cn_xprt);
1703 		return;
1704 	}
1705 }
1706 
1707 static void
1708 nfsd4_run_cb_work(struct work_struct *work)
1709 {
1710 	struct nfsd4_callback *cb =
1711 		container_of(work, struct nfsd4_callback, cb_work);
1712 	struct nfs4_client *clp = cb->cb_clp;
1713 	struct rpc_clnt *clnt;
1714 	int flags, ret;
1715 
1716 	trace_nfsd_cb_start(clp);
1717 
1718 	if (clp->cl_flags & NFSD4_CLIENT_CB_FLAG_MASK)
1719 		nfsd4_process_cb_update(cb);
1720 
1721 	clnt = clp->cl_cb_client;
1722 	if (!clnt || clp->cl_state == NFSD4_COURTESY) {
1723 		/*
1724 		 * Callback channel broken, client killed or
1725 		 * nfs4_client in courtesy state; give up.
1726 		 */
1727 		nfsd41_destroy_cb(cb);
1728 		return;
1729 	}
1730 
1731 	/*
1732 	 * Don't send probe messages for 4.1 or later.
1733 	 */
1734 	if (!cb->cb_ops && clp->cl_minorversion) {
1735 		nfsd4_mark_cb_state(clp, NFSD4_CB_UP);
1736 		nfsd41_destroy_cb(cb);
1737 		return;
1738 	}
1739 
1740 	if (!test_and_clear_bit(NFSD4_CALLBACK_REQUEUE, &cb->cb_flags)) {
1741 		if (cb->cb_ops && cb->cb_ops->prepare)
1742 			cb->cb_ops->prepare(cb);
1743 	}
1744 
1745 	cb->cb_msg.rpc_cred = clp->cl_cb_cred;
1746 	flags = clp->cl_minorversion ? RPC_TASK_NOCONNECT : RPC_TASK_SOFTCONN;
1747 	ret = rpc_call_async(clnt, &cb->cb_msg, RPC_TASK_SOFT | flags,
1748 			     cb->cb_ops ? &nfsd4_cb_ops : &nfsd4_cb_probe_ops, cb);
1749 	if (ret != 0) {
1750 		set_bit(NFSD4_CALLBACK_REQUEUE, &cb->cb_flags);
1751 		nfsd4_queue_cb(cb);
1752 	}
1753 }
1754 
1755 void nfsd4_init_cb(struct nfsd4_callback *cb, struct nfs4_client *clp,
1756 		const struct nfsd4_callback_ops *ops, enum nfsd4_cb_op op)
1757 {
1758 	cb->cb_clp = clp;
1759 	cb->cb_msg.rpc_proc = &nfs4_cb_procedures[op];
1760 	cb->cb_msg.rpc_argp = cb;
1761 	cb->cb_msg.rpc_resp = cb;
1762 	cb->cb_flags = 0;
1763 	cb->cb_ops = ops;
1764 	INIT_WORK(&cb->cb_work, nfsd4_run_cb_work);
1765 	cb->cb_status = 0;
1766 	cb->cb_held_slot = -1;
1767 	cb->cb_nr_referring_call_list = 0;
1768 	INIT_LIST_HEAD(&cb->cb_referring_call_list);
1769 }
1770 
1771 /**
1772  * nfsd4_run_cb - queue up a callback job to run
1773  * @cb: callback to queue
1774  *
1775  * Kick off a callback to do its thing. Returns false if it was already
1776  * on a queue, true otherwise.
1777  */
1778 bool nfsd4_run_cb(struct nfsd4_callback *cb)
1779 {
1780 	struct nfs4_client *clp = cb->cb_clp;
1781 	bool queued;
1782 
1783 	nfsd41_cb_inflight_begin(clp);
1784 	queued = nfsd4_queue_cb(cb);
1785 	if (!queued)
1786 		nfsd41_cb_inflight_end(clp);
1787 	return queued;
1788 }
1789