1b6756aa013cf993791de489cc48dfd26d8c5d7c
[safe/jmp/linux-2.6] / fs / nfsd / nfs4proc.c
1 /*
2  *  fs/nfsd/nfs4proc.c
3  *
4  *  Server-side procedures for NFSv4.
5  *
6  *  Copyright (c) 2002 The Regents of the University of Michigan.
7  *  All rights reserved.
8  *
9  *  Kendrick Smith <kmsmith@umich.edu>
10  *  Andy Adamson   <andros@umich.edu>
11  *
12  *  Redistribution and use in source and binary forms, with or without
13  *  modification, are permitted provided that the following conditions
14  *  are met:
15  *
16  *  1. Redistributions of source code must retain the above copyright
17  *     notice, this list of conditions and the following disclaimer.
18  *  2. Redistributions in binary form must reproduce the above copyright
19  *     notice, this list of conditions and the following disclaimer in the
20  *     documentation and/or other materials provided with the distribution.
21  *  3. Neither the name of the University nor the names of its
22  *     contributors may be used to endorse or promote products derived
23  *     from this software without specific prior written permission.
24  *
25  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36  *
37  * Note: some routines in this file are just trivial wrappers
38  * (e.g. nfsd4_lookup()) defined solely for the sake of consistent
39  * naming.  Since all such routines have been declared "inline",
40  * there shouldn't be any associated overhead.  At some point in
41  * the future, I might inline these "by hand" to clean up a
42  * little.
43  */
44
45 #include <linux/param.h>
46 #include <linux/major.h>
47 #include <linux/slab.h>
48 #include <linux/file.h>
49
50 #include <linux/sunrpc/svc.h>
51 #include <linux/nfsd/nfsd.h>
52 #include <linux/nfsd/cache.h>
53 #include <linux/nfs4.h>
54 #include <linux/nfsd/state.h>
55 #include <linux/nfsd/xdr4.h>
56 #include <linux/nfs4_acl.h>
57
58 #define NFSDDBG_FACILITY                NFSDDBG_PROC
59
60 static inline void
61 fh_dup2(struct svc_fh *dst, struct svc_fh *src)
62 {
63         fh_put(dst);
64         dget(src->fh_dentry);
65         if (src->fh_export)
66                 cache_get(&src->fh_export->h);
67         *dst = *src;
68 }
69
70 static __be32
71 do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
72 {
73         __be32 status;
74
75         if (open->op_truncate &&
76                 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
77                 return nfserr_inval;
78
79         if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
80                 accmode |= MAY_READ;
81         if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
82                 accmode |= (MAY_WRITE | MAY_TRUNC);
83         if (open->op_share_deny & NFS4_SHARE_DENY_WRITE)
84                 accmode |= MAY_WRITE;
85
86         status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
87
88         return status;
89 }
90
91 static __be32
92 do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
93 {
94         struct svc_fh resfh;
95         __be32 status;
96         int created = 0;
97
98         fh_init(&resfh, NFS4_FHSIZE);
99         open->op_truncate = 0;
100
101         if (open->op_create) {
102                 /*
103                  * Note: create modes (UNCHECKED,GUARDED...) are the same
104                  * in NFSv4 as in v3.
105                  */
106                 status = nfsd_create_v3(rqstp, current_fh, open->op_fname.data,
107                                         open->op_fname.len, &open->op_iattr,
108                                         &resfh, open->op_createmode,
109                                         (u32 *)open->op_verf.data, &open->op_truncate, &created);
110         } else {
111                 status = nfsd_lookup(rqstp, current_fh,
112                                      open->op_fname.data, open->op_fname.len, &resfh);
113                 fh_unlock(current_fh);
114         }
115         if (status)
116                 goto out;
117
118         set_change_info(&open->op_cinfo, current_fh);
119
120         /* set reply cache */
121         fh_dup2(current_fh, &resfh);
122         open->op_stateowner->so_replay.rp_openfh_len = resfh.fh_handle.fh_size;
123         memcpy(open->op_stateowner->so_replay.rp_openfh,
124                         &resfh.fh_handle.fh_base, resfh.fh_handle.fh_size);
125
126         if (!created)
127                 status = do_open_permission(rqstp, current_fh, open, MAY_NOP);
128
129 out:
130         fh_put(&resfh);
131         return status;
132 }
133
134 static __be32
135 do_open_fhandle(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
136 {
137         __be32 status;
138
139         /* Only reclaims from previously confirmed clients are valid */
140         if ((status = nfs4_check_open_reclaim(&open->op_clientid)))
141                 return status;
142
143         /* We don't know the target directory, and therefore can not
144         * set the change info
145         */
146
147         memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
148
149         /* set replay cache */
150         open->op_stateowner->so_replay.rp_openfh_len = current_fh->fh_handle.fh_size;
151         memcpy(open->op_stateowner->so_replay.rp_openfh,
152                 &current_fh->fh_handle.fh_base,
153                 current_fh->fh_handle.fh_size);
154
155         open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
156                 (open->op_iattr.ia_size == 0);
157
158         status = do_open_permission(rqstp, current_fh, open, MAY_OWNER_OVERRIDE);
159
160         return status;
161 }
162
163
164 static inline __be32
165 nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
166            struct nfsd4_open *open, struct nfs4_stateowner **replay_owner)
167 {
168         __be32 status;
169         dprintk("NFSD: nfsd4_open filename %.*s op_stateowner %p\n",
170                 (int)open->op_fname.len, open->op_fname.data,
171                 open->op_stateowner);
172
173         /* This check required by spec. */
174         if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
175                 return nfserr_inval;
176
177         nfs4_lock_state();
178
179         /* check seqid for replay. set nfs4_owner */
180         status = nfsd4_process_open1(open);
181         if (status == nfserr_replay_me) {
182                 struct nfs4_replay *rp = &open->op_stateowner->so_replay;
183                 fh_put(&cstate->current_fh);
184                 cstate->current_fh.fh_handle.fh_size = rp->rp_openfh_len;
185                 memcpy(&cstate->current_fh.fh_handle.fh_base, rp->rp_openfh,
186                                 rp->rp_openfh_len);
187                 status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
188                 if (status)
189                         dprintk("nfsd4_open: replay failed"
190                                 " restoring previous filehandle\n");
191                 else
192                         status = nfserr_replay_me;
193         }
194         if (status)
195                 goto out;
196
197         /* Openowner is now set, so sequence id will get bumped.  Now we need
198          * these checks before we do any creates: */
199         status = nfserr_grace;
200         if (nfs4_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
201                 goto out;
202         status = nfserr_no_grace;
203         if (!nfs4_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
204                 goto out;
205
206         switch (open->op_claim_type) {
207                 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
208                         status = nfserr_inval;
209                         if (open->op_create)
210                                 goto out;
211                         /* fall through */
212                 case NFS4_OPEN_CLAIM_NULL:
213                         /*
214                          * (1) set CURRENT_FH to the file being opened,
215                          * creating it if necessary, (2) set open->op_cinfo,
216                          * (3) set open->op_truncate if the file is to be
217                          * truncated after opening, (4) do permission checking.
218                          */
219                         status = do_open_lookup(rqstp, &cstate->current_fh,
220                                                 open);
221                         if (status)
222                                 goto out;
223                         break;
224                 case NFS4_OPEN_CLAIM_PREVIOUS:
225                         open->op_stateowner->so_confirmed = 1;
226                         /*
227                          * The CURRENT_FH is already set to the file being
228                          * opened.  (1) set open->op_cinfo, (2) set
229                          * open->op_truncate if the file is to be truncated
230                          * after opening, (3) do permission checking.
231                         */
232                         status = do_open_fhandle(rqstp, &cstate->current_fh,
233                                                  open);
234                         if (status)
235                                 goto out;
236                         break;
237                 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
238                         open->op_stateowner->so_confirmed = 1;
239                         printk("NFSD: unsupported OPEN claim type %d\n",
240                                 open->op_claim_type);
241                         status = nfserr_notsupp;
242                         goto out;
243                 default:
244                         printk("NFSD: Invalid OPEN claim type %d\n",
245                                 open->op_claim_type);
246                         status = nfserr_inval;
247                         goto out;
248         }
249         /*
250          * nfsd4_process_open2() does the actual opening of the file.  If
251          * successful, it (1) truncates the file if open->op_truncate was
252          * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
253          */
254         status = nfsd4_process_open2(rqstp, &cstate->current_fh, open);
255 out:
256         if (open->op_stateowner) {
257                 nfs4_get_stateowner(open->op_stateowner);
258                 *replay_owner = open->op_stateowner;
259         }
260         nfs4_unlock_state();
261         return status;
262 }
263
264 /*
265  * filehandle-manipulating ops.
266  */
267 static inline __be32
268 nfsd4_getfh(struct nfsd4_compound_state *cstate, struct svc_fh **getfh)
269 {
270         if (!cstate->current_fh.fh_dentry)
271                 return nfserr_nofilehandle;
272
273         *getfh = &cstate->current_fh;
274         return nfs_ok;
275 }
276
277 static inline __be32
278 nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
279             struct nfsd4_putfh *putfh)
280 {
281         fh_put(&cstate->current_fh);
282         cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
283         memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
284                putfh->pf_fhlen);
285         return fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
286 }
287
288 static inline __be32
289 nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
290 {
291         __be32 status;
292
293         fh_put(&cstate->current_fh);
294         status = exp_pseudoroot(rqstp->rq_client, &cstate->current_fh,
295                               &rqstp->rq_chandle);
296         return status;
297 }
298
299 static inline __be32
300 nfsd4_restorefh(struct nfsd4_compound_state *cstate)
301 {
302         if (!cstate->save_fh.fh_dentry)
303                 return nfserr_restorefh;
304
305         fh_dup2(&cstate->current_fh, &cstate->save_fh);
306         return nfs_ok;
307 }
308
309 static inline __be32
310 nfsd4_savefh(struct nfsd4_compound_state *cstate)
311 {
312         if (!cstate->current_fh.fh_dentry)
313                 return nfserr_nofilehandle;
314
315         fh_dup2(&cstate->save_fh, &cstate->current_fh);
316         return nfs_ok;
317 }
318
319 /*
320  * misc nfsv4 ops
321  */
322 static inline __be32
323 nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
324              struct nfsd4_access *access)
325 {
326         if (access->ac_req_access & ~NFS3_ACCESS_FULL)
327                 return nfserr_inval;
328
329         access->ac_resp_access = access->ac_req_access;
330         return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
331                            &access->ac_supported);
332 }
333
334 static inline __be32
335 nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
336              struct nfsd4_commit *commit)
337 {
338         __be32 status;
339
340         u32 *p = (u32 *)commit->co_verf.data;
341         *p++ = nfssvc_boot.tv_sec;
342         *p++ = nfssvc_boot.tv_usec;
343
344         status = nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
345                              commit->co_count);
346         if (status == nfserr_symlink)
347                 status = nfserr_inval;
348         return status;
349 }
350
351 static __be32
352 nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
353              struct nfsd4_create *create)
354 {
355         struct svc_fh resfh;
356         __be32 status;
357         dev_t rdev;
358
359         fh_init(&resfh, NFS4_FHSIZE);
360
361         status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, MAY_CREATE);
362         if (status == nfserr_symlink)
363                 status = nfserr_notdir;
364         if (status)
365                 return status;
366
367         switch (create->cr_type) {
368         case NF4LNK:
369                 /* ugh! we have to null-terminate the linktext, or
370                  * vfs_symlink() will choke.  it is always safe to
371                  * null-terminate by brute force, since at worst we
372                  * will overwrite the first byte of the create namelen
373                  * in the XDR buffer, which has already been extracted
374                  * during XDR decode.
375                  */
376                 create->cr_linkname[create->cr_linklen] = 0;
377
378                 status = nfsd_symlink(rqstp, &cstate->current_fh,
379                                       create->cr_name, create->cr_namelen,
380                                       create->cr_linkname, create->cr_linklen,
381                                       &resfh, &create->cr_iattr);
382                 break;
383
384         case NF4BLK:
385                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
386                 if (MAJOR(rdev) != create->cr_specdata1 ||
387                     MINOR(rdev) != create->cr_specdata2)
388                         return nfserr_inval;
389                 status = nfsd_create(rqstp, &cstate->current_fh,
390                                      create->cr_name, create->cr_namelen,
391                                      &create->cr_iattr, S_IFBLK, rdev, &resfh);
392                 break;
393
394         case NF4CHR:
395                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
396                 if (MAJOR(rdev) != create->cr_specdata1 ||
397                     MINOR(rdev) != create->cr_specdata2)
398                         return nfserr_inval;
399                 status = nfsd_create(rqstp, &cstate->current_fh,
400                                      create->cr_name, create->cr_namelen,
401                                      &create->cr_iattr,S_IFCHR, rdev, &resfh);
402                 break;
403
404         case NF4SOCK:
405                 status = nfsd_create(rqstp, &cstate->current_fh,
406                                      create->cr_name, create->cr_namelen,
407                                      &create->cr_iattr, S_IFSOCK, 0, &resfh);
408                 break;
409
410         case NF4FIFO:
411                 status = nfsd_create(rqstp, &cstate->current_fh,
412                                      create->cr_name, create->cr_namelen,
413                                      &create->cr_iattr, S_IFIFO, 0, &resfh);
414                 break;
415
416         case NF4DIR:
417                 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
418                 status = nfsd_create(rqstp, &cstate->current_fh,
419                                      create->cr_name, create->cr_namelen,
420                                      &create->cr_iattr, S_IFDIR, 0, &resfh);
421                 break;
422
423         default:
424                 status = nfserr_badtype;
425         }
426
427         if (!status) {
428                 fh_unlock(&cstate->current_fh);
429                 set_change_info(&create->cr_cinfo, &cstate->current_fh);
430                 fh_dup2(&cstate->current_fh, &resfh);
431         }
432
433         fh_put(&resfh);
434         return status;
435 }
436
437 static inline __be32
438 nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
439               struct nfsd4_getattr *getattr)
440 {
441         __be32 status;
442
443         status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
444         if (status)
445                 return status;
446
447         if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
448                 return nfserr_inval;
449
450         getattr->ga_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
451         getattr->ga_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
452
453         getattr->ga_fhp = &cstate->current_fh;
454         return nfs_ok;
455 }
456
457 static inline __be32
458 nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
459            struct nfsd4_link *link)
460 {
461         __be32 status = nfserr_nofilehandle;
462
463         if (!cstate->save_fh.fh_dentry)
464                 return status;
465         status = nfsd_link(rqstp, &cstate->current_fh,
466                            link->li_name, link->li_namelen, &cstate->save_fh);
467         if (!status)
468                 set_change_info(&link->li_cinfo, &cstate->current_fh);
469         return status;
470 }
471
472 static __be32
473 nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
474 {
475         struct svc_fh tmp_fh;
476         __be32 ret;
477
478         fh_init(&tmp_fh, NFS4_FHSIZE);
479         if((ret = exp_pseudoroot(rqstp->rq_client, &tmp_fh,
480                               &rqstp->rq_chandle)) != 0)
481                 return ret;
482         if (tmp_fh.fh_dentry == cstate->current_fh.fh_dentry) {
483                 fh_put(&tmp_fh);
484                 return nfserr_noent;
485         }
486         fh_put(&tmp_fh);
487         return nfsd_lookup(rqstp, &cstate->current_fh,
488                            "..", 2, &cstate->current_fh);
489 }
490
491 static inline __be32
492 nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
493              struct nfsd4_lookup *lookup)
494 {
495         return nfsd_lookup(rqstp, &cstate->current_fh,
496                            lookup->lo_name, lookup->lo_len,
497                            &cstate->current_fh);
498 }
499
500 static inline __be32
501 nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
502            struct nfsd4_read *read)
503 {
504         __be32 status;
505
506         /* no need to check permission - this will be done in nfsd_read() */
507
508         read->rd_filp = NULL;
509         if (read->rd_offset >= OFFSET_MAX)
510                 return nfserr_inval;
511
512         nfs4_lock_state();
513         /* check stateid */
514         if ((status = nfs4_preprocess_stateid_op(&cstate->current_fh,
515                                 &read->rd_stateid,
516                                 CHECK_FH | RD_STATE, &read->rd_filp))) {
517                 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
518                 goto out;
519         }
520         if (read->rd_filp)
521                 get_file(read->rd_filp);
522         status = nfs_ok;
523 out:
524         nfs4_unlock_state();
525         read->rd_rqstp = rqstp;
526         read->rd_fhp = &cstate->current_fh;
527         return status;
528 }
529
530 static inline __be32
531 nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
532               struct nfsd4_readdir *readdir)
533 {
534         u64 cookie = readdir->rd_cookie;
535         static const nfs4_verifier zeroverf;
536
537         /* no need to check permission - this will be done in nfsd_readdir() */
538
539         if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
540                 return nfserr_inval;
541
542         readdir->rd_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
543         readdir->rd_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
544
545         if ((cookie > ~(u32)0) || (cookie == 1) || (cookie == 2) ||
546             (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
547                 return nfserr_bad_cookie;
548
549         readdir->rd_rqstp = rqstp;
550         readdir->rd_fhp = &cstate->current_fh;
551         return nfs_ok;
552 }
553
554 static inline __be32
555 nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
556                struct nfsd4_readlink *readlink)
557 {
558         readlink->rl_rqstp = rqstp;
559         readlink->rl_fhp = &cstate->current_fh;
560         return nfs_ok;
561 }
562
563 static inline __be32
564 nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
565              struct nfsd4_remove *remove)
566 {
567         __be32 status;
568
569         if (nfs4_in_grace())
570                 return nfserr_grace;
571         status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
572                              remove->rm_name, remove->rm_namelen);
573         if (status == nfserr_symlink)
574                 return nfserr_notdir;
575         if (!status) {
576                 fh_unlock(&cstate->current_fh);
577                 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
578         }
579         return status;
580 }
581
582 static inline __be32
583 nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
584              struct nfsd4_rename *rename)
585 {
586         __be32 status = nfserr_nofilehandle;
587
588         if (!cstate->save_fh.fh_dentry)
589                 return status;
590         if (nfs4_in_grace() && !(cstate->save_fh.fh_export->ex_flags
591                                         & NFSEXP_NOSUBTREECHECK))
592                 return nfserr_grace;
593         status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
594                              rename->rn_snamelen, &cstate->current_fh,
595                              rename->rn_tname, rename->rn_tnamelen);
596
597         /* the underlying filesystem returns different error's than required
598          * by NFSv4. both save_fh and current_fh have been verified.. */
599         if (status == nfserr_isdir)
600                 status = nfserr_exist;
601         else if ((status == nfserr_notdir) &&
602                   (S_ISDIR(cstate->save_fh.fh_dentry->d_inode->i_mode) &&
603                    S_ISDIR(cstate->current_fh.fh_dentry->d_inode->i_mode)))
604                 status = nfserr_exist;
605         else if (status == nfserr_symlink)
606                 status = nfserr_notdir;
607
608         if (!status) {
609                 set_change_info(&rename->rn_sinfo, &cstate->current_fh);
610                 set_change_info(&rename->rn_tinfo, &cstate->save_fh);
611         }
612         return status;
613 }
614
615 static inline __be32
616 nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
617               struct nfsd4_setattr *setattr)
618 {
619         __be32 status = nfs_ok;
620
621         if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
622                 nfs4_lock_state();
623                 status = nfs4_preprocess_stateid_op(&cstate->current_fh,
624                         &setattr->sa_stateid, CHECK_FH | WR_STATE, NULL);
625                 nfs4_unlock_state();
626                 if (status) {
627                         dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
628                         return status;
629                 }
630         }
631         status = nfs_ok;
632         if (setattr->sa_acl != NULL)
633                 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
634                                             setattr->sa_acl);
635         if (status)
636                 return status;
637         status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
638                                 0, (time_t)0);
639         return status;
640 }
641
642 static inline __be32
643 nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
644             struct nfsd4_write *write)
645 {
646         stateid_t *stateid = &write->wr_stateid;
647         struct file *filp = NULL;
648         u32 *p;
649         __be32 status = nfs_ok;
650
651         /* no need to check permission - this will be done in nfsd_write() */
652
653         if (write->wr_offset >= OFFSET_MAX)
654                 return nfserr_inval;
655
656         nfs4_lock_state();
657         status = nfs4_preprocess_stateid_op(&cstate->current_fh, stateid,
658                                         CHECK_FH | WR_STATE, &filp);
659         if (filp)
660                 get_file(filp);
661         nfs4_unlock_state();
662
663         if (status) {
664                 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
665                 return status;
666         }
667
668         write->wr_bytes_written = write->wr_buflen;
669         write->wr_how_written = write->wr_stable_how;
670         p = (u32 *)write->wr_verifier.data;
671         *p++ = nfssvc_boot.tv_sec;
672         *p++ = nfssvc_boot.tv_usec;
673
674         status =  nfsd_write(rqstp, &cstate->current_fh, filp,
675                              write->wr_offset, rqstp->rq_vec, write->wr_vlen,
676                              write->wr_buflen, &write->wr_how_written);
677         if (filp)
678                 fput(filp);
679
680         if (status == nfserr_symlink)
681                 status = nfserr_inval;
682         return status;
683 }
684
685 /* This routine never returns NFS_OK!  If there are no other errors, it
686  * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
687  * attributes matched.  VERIFY is implemented by mapping NFSERR_SAME
688  * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
689  */
690 static __be32
691 nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
692              struct nfsd4_verify *verify)
693 {
694         __be32 *buf, *p;
695         int count;
696         __be32 status;
697
698         status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
699         if (status)
700                 return status;
701
702         if ((verify->ve_bmval[0] & ~NFSD_SUPPORTED_ATTRS_WORD0)
703             || (verify->ve_bmval[1] & ~NFSD_SUPPORTED_ATTRS_WORD1))
704                 return nfserr_attrnotsupp;
705         if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
706             || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
707                 return nfserr_inval;
708         if (verify->ve_attrlen & 3)
709                 return nfserr_inval;
710
711         /* count in words:
712          *   bitmap_len(1) + bitmap(2) + attr_len(1) = 4
713          */
714         count = 4 + (verify->ve_attrlen >> 2);
715         buf = kmalloc(count << 2, GFP_KERNEL);
716         if (!buf)
717                 return nfserr_resource;
718
719         status = nfsd4_encode_fattr(&cstate->current_fh,
720                                     cstate->current_fh.fh_export,
721                                     cstate->current_fh.fh_dentry, buf,
722                                     &count, verify->ve_bmval,
723                                     rqstp);
724
725         /* this means that nfsd4_encode_fattr() ran out of space */
726         if (status == nfserr_resource && count == 0)
727                 status = nfserr_not_same;
728         if (status)
729                 goto out_kfree;
730
731         p = buf + 3;
732         status = nfserr_not_same;
733         if (ntohl(*p++) != verify->ve_attrlen)
734                 goto out_kfree;
735         if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
736                 status = nfserr_same;
737
738 out_kfree:
739         kfree(buf);
740         return status;
741 }
742
743 /*
744  * NULL call.
745  */
746 static __be32
747 nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
748 {
749         return nfs_ok;
750 }
751
752 static inline void nfsd4_increment_op_stats(u32 opnum)
753 {
754         if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
755                 nfsdstats.nfs4_opcount[opnum]++;
756 }
757
758 static void cstate_free(struct nfsd4_compound_state *cstate)
759 {
760         if (cstate == NULL)
761                 return;
762         fh_put(&cstate->current_fh);
763         fh_put(&cstate->save_fh);
764         kfree(cstate);
765 }
766
767 static struct nfsd4_compound_state *cstate_alloc(void)
768 {
769         struct nfsd4_compound_state *cstate;
770
771         cstate = kmalloc(sizeof(struct nfsd4_compound_state), GFP_KERNEL);
772         if (cstate == NULL)
773                 return NULL;
774         fh_init(&cstate->current_fh, NFS4_FHSIZE);
775         fh_init(&cstate->save_fh, NFS4_FHSIZE);
776         return cstate;
777 }
778
779 /*
780  * COMPOUND call.
781  */
782 static __be32
783 nfsd4_proc_compound(struct svc_rqst *rqstp,
784                     struct nfsd4_compoundargs *args,
785                     struct nfsd4_compoundres *resp)
786 {
787         struct nfsd4_op *op;
788         struct nfsd4_compound_state *cstate = NULL;
789         struct nfs4_stateowner *replay_owner = NULL;
790         int             slack_bytes;
791         __be32          status;
792
793         status = nfserr_resource;
794         cstate = cstate_alloc();
795         if (cstate == NULL)
796                 goto out;
797
798         resp->xbuf = &rqstp->rq_res;
799         resp->p = rqstp->rq_res.head[0].iov_base + rqstp->rq_res.head[0].iov_len;
800         resp->tagp = resp->p;
801         /* reserve space for: taglen, tag, and opcnt */
802         resp->p += 2 + XDR_QUADLEN(args->taglen);
803         resp->end = rqstp->rq_res.head[0].iov_base + PAGE_SIZE;
804         resp->taglen = args->taglen;
805         resp->tag = args->tag;
806         resp->opcnt = 0;
807         resp->rqstp = rqstp;
808
809         /*
810          * According to RFC3010, this takes precedence over all other errors.
811          */
812         status = nfserr_minor_vers_mismatch;
813         if (args->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
814                 goto out;
815
816         status = nfs_ok;
817         while (!status && resp->opcnt < args->opcnt) {
818                 op = &args->ops[resp->opcnt++];
819
820                 dprintk("nfsv4 compound op #%d: %d\n", resp->opcnt, op->opnum);
821
822                 /*
823                  * The XDR decode routines may have pre-set op->status;
824                  * for example, if there is a miscellaneous XDR error
825                  * it will be set to nfserr_bad_xdr.
826                  */
827                 if (op->status)
828                         goto encode_op;
829
830                 /* We must be able to encode a successful response to
831                  * this operation, with enough room left over to encode a
832                  * failed response to the next operation.  If we don't
833                  * have enough room, fail with ERR_RESOURCE.
834                  */
835                 slack_bytes = (char *)resp->end - (char *)resp->p;
836                 if (slack_bytes < COMPOUND_SLACK_SPACE
837                                 + COMPOUND_ERR_SLACK_SPACE) {
838                         BUG_ON(slack_bytes < COMPOUND_ERR_SLACK_SPACE);
839                         op->status = nfserr_resource;
840                         goto encode_op;
841                 }
842
843                 /* All operations except RENEW, SETCLIENTID, RESTOREFH
844                 * SETCLIENTID_CONFIRM, PUTFH and PUTROOTFH
845                 * require a valid current filehandle
846                 */
847                 if (!cstate->current_fh.fh_dentry) {
848                         if (!((op->opnum == OP_PUTFH) ||
849                               (op->opnum == OP_PUTROOTFH) ||
850                               (op->opnum == OP_SETCLIENTID) ||
851                               (op->opnum == OP_SETCLIENTID_CONFIRM) ||
852                               (op->opnum == OP_RENEW) ||
853                               (op->opnum == OP_RESTOREFH) ||
854                               (op->opnum == OP_RELEASE_LOCKOWNER))) {
855                                 op->status = nfserr_nofilehandle;
856                                 goto encode_op;
857                         }
858                 }
859                 /* Check must be done at start of each operation, except
860                  * for GETATTR and ops not listed as returning NFS4ERR_MOVED
861                  */
862                 else if (cstate->current_fh.fh_export->ex_fslocs.migrated &&
863                          !((op->opnum == OP_GETATTR) ||
864                            (op->opnum == OP_PUTROOTFH) ||
865                            (op->opnum == OP_PUTPUBFH) ||
866                            (op->opnum == OP_RENEW) ||
867                            (op->opnum == OP_SETCLIENTID) ||
868                            (op->opnum == OP_RELEASE_LOCKOWNER))) {
869                         op->status = nfserr_moved;
870                         goto encode_op;
871                 }
872                 switch (op->opnum) {
873                 case OP_ACCESS:
874                         op->status = nfsd4_access(rqstp, cstate,
875                                                   &op->u.access);
876                         break;
877                 case OP_CLOSE:
878                         op->status = nfsd4_close(rqstp, cstate,
879                                                  &op->u.close, &replay_owner);
880                         break;
881                 case OP_COMMIT:
882                         op->status = nfsd4_commit(rqstp, cstate,
883                                                   &op->u.commit);
884                         break;
885                 case OP_CREATE:
886                         op->status = nfsd4_create(rqstp, cstate,
887                                                   &op->u.create);
888                         break;
889                 case OP_DELEGRETURN:
890                         op->status = nfsd4_delegreturn(rqstp, cstate,
891                                                        &op->u.delegreturn);
892                         break;
893                 case OP_GETATTR:
894                         op->status = nfsd4_getattr(rqstp, cstate,
895                                                    &op->u.getattr);
896                         break;
897                 case OP_GETFH:
898                         op->status = nfsd4_getfh(cstate, &op->u.getfh);
899                         break;
900                 case OP_LINK:
901                         op->status = nfsd4_link(rqstp, cstate, &op->u.link);
902                         break;
903                 case OP_LOCK:
904                         op->status = nfsd4_lock(rqstp, cstate, &op->u.lock,
905                                                 &replay_owner);
906                         break;
907                 case OP_LOCKT:
908                         op->status = nfsd4_lockt(rqstp, cstate, &op->u.lockt);
909                         break;
910                 case OP_LOCKU:
911                         op->status = nfsd4_locku(rqstp, cstate, &op->u.locku,
912                                                  &replay_owner);
913                         break;
914                 case OP_LOOKUP:
915                         op->status = nfsd4_lookup(rqstp, cstate,
916                                                   &op->u.lookup);
917                         break;
918                 case OP_LOOKUPP:
919                         op->status = nfsd4_lookupp(rqstp, cstate);
920                         break;
921                 case OP_NVERIFY:
922                         op->status = nfsd4_verify(rqstp, cstate,
923                                                   &op->u.nverify);
924                         if (op->status == nfserr_not_same)
925                                 op->status = nfs_ok;
926                         break;
927                 case OP_OPEN:
928                         op->status = nfsd4_open(rqstp, cstate,
929                                                 &op->u.open, &replay_owner);
930                         break;
931                 case OP_OPEN_CONFIRM:
932                         op->status = nfsd4_open_confirm(rqstp, cstate,
933                                                         &op->u.open_confirm,
934                                                         &replay_owner);
935                         break;
936                 case OP_OPEN_DOWNGRADE:
937                         op->status = nfsd4_open_downgrade(rqstp, cstate,
938                                                          &op->u.open_downgrade,
939                                                          &replay_owner);
940                         break;
941                 case OP_PUTFH:
942                         op->status = nfsd4_putfh(rqstp, cstate, &op->u.putfh);
943                         break;
944                 case OP_PUTROOTFH:
945                         op->status = nfsd4_putrootfh(rqstp, cstate);
946                         break;
947                 case OP_READ:
948                         op->status = nfsd4_read(rqstp, cstate, &op->u.read);
949                         break;
950                 case OP_READDIR:
951                         op->status = nfsd4_readdir(rqstp, cstate,
952                                                    &op->u.readdir);
953                         break;
954                 case OP_READLINK:
955                         op->status = nfsd4_readlink(rqstp, cstate,
956                                                     &op->u.readlink);
957                         break;
958                 case OP_REMOVE:
959                         op->status = nfsd4_remove(rqstp, cstate,
960                                                   &op->u.remove);
961                         break;
962                 case OP_RENAME:
963                         op->status = nfsd4_rename(rqstp, cstate,
964                                                   &op->u.rename);
965                         break;
966                 case OP_RENEW:
967                         op->status = nfsd4_renew(&op->u.renew);
968                         break;
969                 case OP_RESTOREFH:
970                         op->status = nfsd4_restorefh(cstate);
971                         break;
972                 case OP_SAVEFH:
973                         op->status = nfsd4_savefh(cstate);
974                         break;
975                 case OP_SETATTR:
976                         op->status = nfsd4_setattr(rqstp, cstate,
977                                                    &op->u.setattr);
978                         break;
979                 case OP_SETCLIENTID:
980                         op->status = nfsd4_setclientid(rqstp, &op->u.setclientid);
981                         break;
982                 case OP_SETCLIENTID_CONFIRM:
983                         op->status = nfsd4_setclientid_confirm(rqstp, &op->u.setclientid_confirm);
984                         break;
985                 case OP_VERIFY:
986                         op->status = nfsd4_verify(rqstp, cstate,
987                                                   &op->u.verify);
988                         if (op->status == nfserr_same)
989                                 op->status = nfs_ok;
990                         break;
991                 case OP_WRITE:
992                         op->status = nfsd4_write(rqstp, cstate, &op->u.write);
993                         break;
994                 case OP_RELEASE_LOCKOWNER:
995                         op->status = nfsd4_release_lockowner(rqstp, &op->u.release_lockowner);
996                         break;
997                 default:
998                         BUG_ON(op->status == nfs_ok);
999                         break;
1000                 }
1001
1002 encode_op:
1003                 if (op->status == nfserr_replay_me) {
1004                         op->replay = &replay_owner->so_replay;
1005                         nfsd4_encode_replay(resp, op);
1006                         status = op->status = op->replay->rp_status;
1007                 } else {
1008                         nfsd4_encode_operation(resp, op);
1009                         status = op->status;
1010                 }
1011                 if (replay_owner && (replay_owner != (void *)(-1))) {
1012                         nfs4_put_stateowner(replay_owner);
1013                         replay_owner = NULL;
1014                 }
1015                 /* XXX Ugh, we need to get rid of this kind of special case: */
1016                 if (op->opnum == OP_READ && op->u.read.rd_filp)
1017                         fput(op->u.read.rd_filp);
1018
1019                 nfsd4_increment_op_stats(op->opnum);
1020         }
1021
1022 out:
1023         nfsd4_release_compoundargs(args);
1024         cstate_free(cstate);
1025         return status;
1026 }
1027
1028 #define nfs4svc_decode_voidargs         NULL
1029 #define nfs4svc_release_void            NULL
1030 #define nfsd4_voidres                   nfsd4_voidargs
1031 #define nfs4svc_release_compound        NULL
1032 struct nfsd4_voidargs { int dummy; };
1033
1034 #define PROC(name, argt, rest, relt, cache, respsize)   \
1035  { (svc_procfunc) nfsd4_proc_##name,            \
1036    (kxdrproc_t) nfs4svc_decode_##argt##args,    \
1037    (kxdrproc_t) nfs4svc_encode_##rest##res,     \
1038    (kxdrproc_t) nfs4svc_release_##relt,         \
1039    sizeof(struct nfsd4_##argt##args),           \
1040    sizeof(struct nfsd4_##rest##res),            \
1041    0,                                           \
1042    cache,                                       \
1043    respsize,                                    \
1044  }
1045
1046 /*
1047  * TODO: At the present time, the NFSv4 server does not do XID caching
1048  * of requests.  Implementing XID caching would not be a serious problem,
1049  * although it would require a mild change in interfaces since one
1050  * doesn't know whether an NFSv4 request is idempotent until after the
1051  * XDR decode.  However, XID caching totally confuses pynfs (Peter
1052  * Astrand's regression testsuite for NFSv4 servers), which reuses
1053  * XID's liberally, so I've left it unimplemented until pynfs generates
1054  * better XID's.
1055  */
1056 static struct svc_procedure             nfsd_procedures4[2] = {
1057   PROC(null,     void,          void,           void,     RC_NOCACHE, 1),
1058   PROC(compound, compound,      compound,       compound, RC_NOCACHE, NFSD_BUFSIZE/4)
1059 };
1060
1061 struct svc_version      nfsd_version4 = {
1062                 .vs_vers        = 4,
1063                 .vs_nproc       = 2,
1064                 .vs_proc        = nfsd_procedures4,
1065                 .vs_dispatch    = nfsd_dispatch,
1066                 .vs_xdrsize     = NFS4_SVC_XDRSIZE,
1067 };
1068
1069 /*
1070  * Local variables:
1071  *  c-basic-offset: 8
1072  * End:
1073  */