9fcf46a7d95d83bf06b37238dedc8f6122f7ce78
[safe/jmp/linux-2.6] / fs / nfsd / nfs4proc.c
1 /*
2  *  fs/nfsd/nfs4proc.c
3  *
4  *  Server-side procedures for NFSv4.
5  *
6  *  Copyright (c) 2002 The Regents of the University of Michigan.
7  *  All rights reserved.
8  *
9  *  Kendrick Smith <kmsmith@umich.edu>
10  *  Andy Adamson   <andros@umich.edu>
11  *
12  *  Redistribution and use in source and binary forms, with or without
13  *  modification, are permitted provided that the following conditions
14  *  are met:
15  *
16  *  1. Redistributions of source code must retain the above copyright
17  *     notice, this list of conditions and the following disclaimer.
18  *  2. Redistributions in binary form must reproduce the above copyright
19  *     notice, this list of conditions and the following disclaimer in the
20  *     documentation and/or other materials provided with the distribution.
21  *  3. Neither the name of the University nor the names of its
22  *     contributors may be used to endorse or promote products derived
23  *     from this software without specific prior written permission.
24  *
25  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36  */
37
38 #include <linux/param.h>
39 #include <linux/major.h>
40 #include <linux/slab.h>
41 #include <linux/file.h>
42
43 #include <linux/sunrpc/svc.h>
44 #include <linux/nfsd/nfsd.h>
45 #include <linux/nfsd/cache.h>
46 #include <linux/nfs4.h>
47 #include <linux/nfsd/state.h>
48 #include <linux/nfsd/xdr4.h>
49 #include <linux/nfs4_acl.h>
50
51 #define NFSDDBG_FACILITY                NFSDDBG_PROC
52
53 static inline void
54 fh_dup2(struct svc_fh *dst, struct svc_fh *src)
55 {
56         fh_put(dst);
57         dget(src->fh_dentry);
58         if (src->fh_export)
59                 cache_get(&src->fh_export->h);
60         *dst = *src;
61 }
62
63 static __be32
64 do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
65 {
66         __be32 status;
67
68         if (open->op_truncate &&
69                 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
70                 return nfserr_inval;
71
72         if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
73                 accmode |= MAY_READ;
74         if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
75                 accmode |= (MAY_WRITE | MAY_TRUNC);
76         if (open->op_share_deny & NFS4_SHARE_DENY_WRITE)
77                 accmode |= MAY_WRITE;
78
79         status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
80
81         return status;
82 }
83
84 static __be32
85 do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
86 {
87         struct svc_fh resfh;
88         __be32 status;
89         int created = 0;
90
91         fh_init(&resfh, NFS4_FHSIZE);
92         open->op_truncate = 0;
93
94         if (open->op_create) {
95                 /*
96                  * Note: create modes (UNCHECKED,GUARDED...) are the same
97                  * in NFSv4 as in v3.
98                  */
99                 status = nfsd_create_v3(rqstp, current_fh, open->op_fname.data,
100                                         open->op_fname.len, &open->op_iattr,
101                                         &resfh, open->op_createmode,
102                                         (u32 *)open->op_verf.data, &open->op_truncate, &created);
103         } else {
104                 status = nfsd_lookup(rqstp, current_fh,
105                                      open->op_fname.data, open->op_fname.len, &resfh);
106                 fh_unlock(current_fh);
107         }
108         if (status)
109                 goto out;
110
111         set_change_info(&open->op_cinfo, current_fh);
112
113         /* set reply cache */
114         fh_dup2(current_fh, &resfh);
115         open->op_stateowner->so_replay.rp_openfh_len = resfh.fh_handle.fh_size;
116         memcpy(open->op_stateowner->so_replay.rp_openfh,
117                         &resfh.fh_handle.fh_base, resfh.fh_handle.fh_size);
118
119         if (!created)
120                 status = do_open_permission(rqstp, current_fh, open, MAY_NOP);
121
122 out:
123         fh_put(&resfh);
124         return status;
125 }
126
127 static __be32
128 do_open_fhandle(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
129 {
130         __be32 status;
131
132         /* Only reclaims from previously confirmed clients are valid */
133         if ((status = nfs4_check_open_reclaim(&open->op_clientid)))
134                 return status;
135
136         /* We don't know the target directory, and therefore can not
137         * set the change info
138         */
139
140         memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
141
142         /* set replay cache */
143         open->op_stateowner->so_replay.rp_openfh_len = current_fh->fh_handle.fh_size;
144         memcpy(open->op_stateowner->so_replay.rp_openfh,
145                 &current_fh->fh_handle.fh_base,
146                 current_fh->fh_handle.fh_size);
147
148         open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
149                 (open->op_iattr.ia_size == 0);
150
151         status = do_open_permission(rqstp, current_fh, open, MAY_OWNER_OVERRIDE);
152
153         return status;
154 }
155
156
157 static __be32
158 nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
159            struct nfsd4_open *open)
160 {
161         __be32 status;
162         dprintk("NFSD: nfsd4_open filename %.*s op_stateowner %p\n",
163                 (int)open->op_fname.len, open->op_fname.data,
164                 open->op_stateowner);
165
166         /* This check required by spec. */
167         if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
168                 return nfserr_inval;
169
170         nfs4_lock_state();
171
172         /* check seqid for replay. set nfs4_owner */
173         status = nfsd4_process_open1(open);
174         if (status == nfserr_replay_me) {
175                 struct nfs4_replay *rp = &open->op_stateowner->so_replay;
176                 fh_put(&cstate->current_fh);
177                 cstate->current_fh.fh_handle.fh_size = rp->rp_openfh_len;
178                 memcpy(&cstate->current_fh.fh_handle.fh_base, rp->rp_openfh,
179                                 rp->rp_openfh_len);
180                 status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
181                 if (status)
182                         dprintk("nfsd4_open: replay failed"
183                                 " restoring previous filehandle\n");
184                 else
185                         status = nfserr_replay_me;
186         }
187         if (status)
188                 goto out;
189
190         /* Openowner is now set, so sequence id will get bumped.  Now we need
191          * these checks before we do any creates: */
192         status = nfserr_grace;
193         if (nfs4_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
194                 goto out;
195         status = nfserr_no_grace;
196         if (!nfs4_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
197                 goto out;
198
199         switch (open->op_claim_type) {
200                 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
201                         status = nfserr_inval;
202                         if (open->op_create)
203                                 goto out;
204                         /* fall through */
205                 case NFS4_OPEN_CLAIM_NULL:
206                         /*
207                          * (1) set CURRENT_FH to the file being opened,
208                          * creating it if necessary, (2) set open->op_cinfo,
209                          * (3) set open->op_truncate if the file is to be
210                          * truncated after opening, (4) do permission checking.
211                          */
212                         status = do_open_lookup(rqstp, &cstate->current_fh,
213                                                 open);
214                         if (status)
215                                 goto out;
216                         break;
217                 case NFS4_OPEN_CLAIM_PREVIOUS:
218                         open->op_stateowner->so_confirmed = 1;
219                         /*
220                          * The CURRENT_FH is already set to the file being
221                          * opened.  (1) set open->op_cinfo, (2) set
222                          * open->op_truncate if the file is to be truncated
223                          * after opening, (3) do permission checking.
224                         */
225                         status = do_open_fhandle(rqstp, &cstate->current_fh,
226                                                  open);
227                         if (status)
228                                 goto out;
229                         break;
230                 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
231                         open->op_stateowner->so_confirmed = 1;
232                         printk("NFSD: unsupported OPEN claim type %d\n",
233                                 open->op_claim_type);
234                         status = nfserr_notsupp;
235                         goto out;
236                 default:
237                         printk("NFSD: Invalid OPEN claim type %d\n",
238                                 open->op_claim_type);
239                         status = nfserr_inval;
240                         goto out;
241         }
242         /*
243          * nfsd4_process_open2() does the actual opening of the file.  If
244          * successful, it (1) truncates the file if open->op_truncate was
245          * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
246          */
247         status = nfsd4_process_open2(rqstp, &cstate->current_fh, open);
248 out:
249         if (open->op_stateowner) {
250                 nfs4_get_stateowner(open->op_stateowner);
251                 cstate->replay_owner = open->op_stateowner;
252         }
253         nfs4_unlock_state();
254         return status;
255 }
256
257 /*
258  * filehandle-manipulating ops.
259  */
260 static __be32
261 nfsd4_getfh(struct nfsd4_compound_state *cstate, struct svc_fh **getfh)
262 {
263         if (!cstate->current_fh.fh_dentry)
264                 return nfserr_nofilehandle;
265
266         *getfh = &cstate->current_fh;
267         return nfs_ok;
268 }
269
270 static __be32
271 nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
272             struct nfsd4_putfh *putfh)
273 {
274         fh_put(&cstate->current_fh);
275         cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
276         memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
277                putfh->pf_fhlen);
278         return fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
279 }
280
281 static __be32
282 nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
283 {
284         __be32 status;
285
286         fh_put(&cstate->current_fh);
287         status = exp_pseudoroot(rqstp->rq_client, &cstate->current_fh,
288                               &rqstp->rq_chandle);
289         return status;
290 }
291
292 static __be32
293 nfsd4_restorefh(struct nfsd4_compound_state *cstate)
294 {
295         if (!cstate->save_fh.fh_dentry)
296                 return nfserr_restorefh;
297
298         fh_dup2(&cstate->current_fh, &cstate->save_fh);
299         return nfs_ok;
300 }
301
302 static __be32
303 nfsd4_savefh(struct nfsd4_compound_state *cstate)
304 {
305         if (!cstate->current_fh.fh_dentry)
306                 return nfserr_nofilehandle;
307
308         fh_dup2(&cstate->save_fh, &cstate->current_fh);
309         return nfs_ok;
310 }
311
312 /*
313  * misc nfsv4 ops
314  */
315 static __be32
316 nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
317              struct nfsd4_access *access)
318 {
319         if (access->ac_req_access & ~NFS3_ACCESS_FULL)
320                 return nfserr_inval;
321
322         access->ac_resp_access = access->ac_req_access;
323         return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
324                            &access->ac_supported);
325 }
326
327 static __be32
328 nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
329              struct nfsd4_commit *commit)
330 {
331         __be32 status;
332
333         u32 *p = (u32 *)commit->co_verf.data;
334         *p++ = nfssvc_boot.tv_sec;
335         *p++ = nfssvc_boot.tv_usec;
336
337         status = nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
338                              commit->co_count);
339         if (status == nfserr_symlink)
340                 status = nfserr_inval;
341         return status;
342 }
343
344 static __be32
345 nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
346              struct nfsd4_create *create)
347 {
348         struct svc_fh resfh;
349         __be32 status;
350         dev_t rdev;
351
352         fh_init(&resfh, NFS4_FHSIZE);
353
354         status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, MAY_CREATE);
355         if (status == nfserr_symlink)
356                 status = nfserr_notdir;
357         if (status)
358                 return status;
359
360         switch (create->cr_type) {
361         case NF4LNK:
362                 /* ugh! we have to null-terminate the linktext, or
363                  * vfs_symlink() will choke.  it is always safe to
364                  * null-terminate by brute force, since at worst we
365                  * will overwrite the first byte of the create namelen
366                  * in the XDR buffer, which has already been extracted
367                  * during XDR decode.
368                  */
369                 create->cr_linkname[create->cr_linklen] = 0;
370
371                 status = nfsd_symlink(rqstp, &cstate->current_fh,
372                                       create->cr_name, create->cr_namelen,
373                                       create->cr_linkname, create->cr_linklen,
374                                       &resfh, &create->cr_iattr);
375                 break;
376
377         case NF4BLK:
378                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
379                 if (MAJOR(rdev) != create->cr_specdata1 ||
380                     MINOR(rdev) != create->cr_specdata2)
381                         return nfserr_inval;
382                 status = nfsd_create(rqstp, &cstate->current_fh,
383                                      create->cr_name, create->cr_namelen,
384                                      &create->cr_iattr, S_IFBLK, rdev, &resfh);
385                 break;
386
387         case NF4CHR:
388                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
389                 if (MAJOR(rdev) != create->cr_specdata1 ||
390                     MINOR(rdev) != create->cr_specdata2)
391                         return nfserr_inval;
392                 status = nfsd_create(rqstp, &cstate->current_fh,
393                                      create->cr_name, create->cr_namelen,
394                                      &create->cr_iattr,S_IFCHR, rdev, &resfh);
395                 break;
396
397         case NF4SOCK:
398                 status = nfsd_create(rqstp, &cstate->current_fh,
399                                      create->cr_name, create->cr_namelen,
400                                      &create->cr_iattr, S_IFSOCK, 0, &resfh);
401                 break;
402
403         case NF4FIFO:
404                 status = nfsd_create(rqstp, &cstate->current_fh,
405                                      create->cr_name, create->cr_namelen,
406                                      &create->cr_iattr, S_IFIFO, 0, &resfh);
407                 break;
408
409         case NF4DIR:
410                 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
411                 status = nfsd_create(rqstp, &cstate->current_fh,
412                                      create->cr_name, create->cr_namelen,
413                                      &create->cr_iattr, S_IFDIR, 0, &resfh);
414                 break;
415
416         default:
417                 status = nfserr_badtype;
418         }
419
420         if (!status) {
421                 fh_unlock(&cstate->current_fh);
422                 set_change_info(&create->cr_cinfo, &cstate->current_fh);
423                 fh_dup2(&cstate->current_fh, &resfh);
424         }
425
426         fh_put(&resfh);
427         return status;
428 }
429
430 static __be32
431 nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
432               struct nfsd4_getattr *getattr)
433 {
434         __be32 status;
435
436         status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
437         if (status)
438                 return status;
439
440         if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
441                 return nfserr_inval;
442
443         getattr->ga_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
444         getattr->ga_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
445
446         getattr->ga_fhp = &cstate->current_fh;
447         return nfs_ok;
448 }
449
450 static __be32
451 nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
452            struct nfsd4_link *link)
453 {
454         __be32 status = nfserr_nofilehandle;
455
456         if (!cstate->save_fh.fh_dentry)
457                 return status;
458         status = nfsd_link(rqstp, &cstate->current_fh,
459                            link->li_name, link->li_namelen, &cstate->save_fh);
460         if (!status)
461                 set_change_info(&link->li_cinfo, &cstate->current_fh);
462         return status;
463 }
464
465 static __be32
466 nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
467 {
468         struct svc_fh tmp_fh;
469         __be32 ret;
470
471         fh_init(&tmp_fh, NFS4_FHSIZE);
472         if((ret = exp_pseudoroot(rqstp->rq_client, &tmp_fh,
473                               &rqstp->rq_chandle)) != 0)
474                 return ret;
475         if (tmp_fh.fh_dentry == cstate->current_fh.fh_dentry) {
476                 fh_put(&tmp_fh);
477                 return nfserr_noent;
478         }
479         fh_put(&tmp_fh);
480         return nfsd_lookup(rqstp, &cstate->current_fh,
481                            "..", 2, &cstate->current_fh);
482 }
483
484 static __be32
485 nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
486              struct nfsd4_lookup *lookup)
487 {
488         return nfsd_lookup(rqstp, &cstate->current_fh,
489                            lookup->lo_name, lookup->lo_len,
490                            &cstate->current_fh);
491 }
492
493 static __be32
494 nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
495            struct nfsd4_read *read)
496 {
497         __be32 status;
498
499         /* no need to check permission - this will be done in nfsd_read() */
500
501         read->rd_filp = NULL;
502         if (read->rd_offset >= OFFSET_MAX)
503                 return nfserr_inval;
504
505         nfs4_lock_state();
506         /* check stateid */
507         if ((status = nfs4_preprocess_stateid_op(&cstate->current_fh,
508                                 &read->rd_stateid,
509                                 CHECK_FH | RD_STATE, &read->rd_filp))) {
510                 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
511                 goto out;
512         }
513         if (read->rd_filp)
514                 get_file(read->rd_filp);
515         status = nfs_ok;
516 out:
517         nfs4_unlock_state();
518         read->rd_rqstp = rqstp;
519         read->rd_fhp = &cstate->current_fh;
520         return status;
521 }
522
523 static __be32
524 nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
525               struct nfsd4_readdir *readdir)
526 {
527         u64 cookie = readdir->rd_cookie;
528         static const nfs4_verifier zeroverf;
529
530         /* no need to check permission - this will be done in nfsd_readdir() */
531
532         if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
533                 return nfserr_inval;
534
535         readdir->rd_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
536         readdir->rd_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
537
538         if ((cookie > ~(u32)0) || (cookie == 1) || (cookie == 2) ||
539             (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
540                 return nfserr_bad_cookie;
541
542         readdir->rd_rqstp = rqstp;
543         readdir->rd_fhp = &cstate->current_fh;
544         return nfs_ok;
545 }
546
547 static __be32
548 nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
549                struct nfsd4_readlink *readlink)
550 {
551         readlink->rl_rqstp = rqstp;
552         readlink->rl_fhp = &cstate->current_fh;
553         return nfs_ok;
554 }
555
556 static __be32
557 nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
558              struct nfsd4_remove *remove)
559 {
560         __be32 status;
561
562         if (nfs4_in_grace())
563                 return nfserr_grace;
564         status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
565                              remove->rm_name, remove->rm_namelen);
566         if (status == nfserr_symlink)
567                 return nfserr_notdir;
568         if (!status) {
569                 fh_unlock(&cstate->current_fh);
570                 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
571         }
572         return status;
573 }
574
575 static __be32
576 nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
577              struct nfsd4_rename *rename)
578 {
579         __be32 status = nfserr_nofilehandle;
580
581         if (!cstate->save_fh.fh_dentry)
582                 return status;
583         if (nfs4_in_grace() && !(cstate->save_fh.fh_export->ex_flags
584                                         & NFSEXP_NOSUBTREECHECK))
585                 return nfserr_grace;
586         status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
587                              rename->rn_snamelen, &cstate->current_fh,
588                              rename->rn_tname, rename->rn_tnamelen);
589
590         /* the underlying filesystem returns different error's than required
591          * by NFSv4. both save_fh and current_fh have been verified.. */
592         if (status == nfserr_isdir)
593                 status = nfserr_exist;
594         else if ((status == nfserr_notdir) &&
595                   (S_ISDIR(cstate->save_fh.fh_dentry->d_inode->i_mode) &&
596                    S_ISDIR(cstate->current_fh.fh_dentry->d_inode->i_mode)))
597                 status = nfserr_exist;
598         else if (status == nfserr_symlink)
599                 status = nfserr_notdir;
600
601         if (!status) {
602                 set_change_info(&rename->rn_sinfo, &cstate->current_fh);
603                 set_change_info(&rename->rn_tinfo, &cstate->save_fh);
604         }
605         return status;
606 }
607
608 static __be32
609 nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
610               struct nfsd4_setattr *setattr)
611 {
612         __be32 status = nfs_ok;
613
614         if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
615                 nfs4_lock_state();
616                 status = nfs4_preprocess_stateid_op(&cstate->current_fh,
617                         &setattr->sa_stateid, CHECK_FH | WR_STATE, NULL);
618                 nfs4_unlock_state();
619                 if (status) {
620                         dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
621                         return status;
622                 }
623         }
624         status = nfs_ok;
625         if (setattr->sa_acl != NULL)
626                 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
627                                             setattr->sa_acl);
628         if (status)
629                 return status;
630         status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
631                                 0, (time_t)0);
632         return status;
633 }
634
635 static __be32
636 nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
637             struct nfsd4_write *write)
638 {
639         stateid_t *stateid = &write->wr_stateid;
640         struct file *filp = NULL;
641         u32 *p;
642         __be32 status = nfs_ok;
643
644         /* no need to check permission - this will be done in nfsd_write() */
645
646         if (write->wr_offset >= OFFSET_MAX)
647                 return nfserr_inval;
648
649         nfs4_lock_state();
650         status = nfs4_preprocess_stateid_op(&cstate->current_fh, stateid,
651                                         CHECK_FH | WR_STATE, &filp);
652         if (filp)
653                 get_file(filp);
654         nfs4_unlock_state();
655
656         if (status) {
657                 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
658                 return status;
659         }
660
661         write->wr_bytes_written = write->wr_buflen;
662         write->wr_how_written = write->wr_stable_how;
663         p = (u32 *)write->wr_verifier.data;
664         *p++ = nfssvc_boot.tv_sec;
665         *p++ = nfssvc_boot.tv_usec;
666
667         status =  nfsd_write(rqstp, &cstate->current_fh, filp,
668                              write->wr_offset, rqstp->rq_vec, write->wr_vlen,
669                              write->wr_buflen, &write->wr_how_written);
670         if (filp)
671                 fput(filp);
672
673         if (status == nfserr_symlink)
674                 status = nfserr_inval;
675         return status;
676 }
677
678 /* This routine never returns NFS_OK!  If there are no other errors, it
679  * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
680  * attributes matched.  VERIFY is implemented by mapping NFSERR_SAME
681  * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
682  */
683 static __be32
684 nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
685              struct nfsd4_verify *verify)
686 {
687         __be32 *buf, *p;
688         int count;
689         __be32 status;
690
691         status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
692         if (status)
693                 return status;
694
695         if ((verify->ve_bmval[0] & ~NFSD_SUPPORTED_ATTRS_WORD0)
696             || (verify->ve_bmval[1] & ~NFSD_SUPPORTED_ATTRS_WORD1))
697                 return nfserr_attrnotsupp;
698         if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
699             || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
700                 return nfserr_inval;
701         if (verify->ve_attrlen & 3)
702                 return nfserr_inval;
703
704         /* count in words:
705          *   bitmap_len(1) + bitmap(2) + attr_len(1) = 4
706          */
707         count = 4 + (verify->ve_attrlen >> 2);
708         buf = kmalloc(count << 2, GFP_KERNEL);
709         if (!buf)
710                 return nfserr_resource;
711
712         status = nfsd4_encode_fattr(&cstate->current_fh,
713                                     cstate->current_fh.fh_export,
714                                     cstate->current_fh.fh_dentry, buf,
715                                     &count, verify->ve_bmval,
716                                     rqstp);
717
718         /* this means that nfsd4_encode_fattr() ran out of space */
719         if (status == nfserr_resource && count == 0)
720                 status = nfserr_not_same;
721         if (status)
722                 goto out_kfree;
723
724         p = buf + 3;
725         status = nfserr_not_same;
726         if (ntohl(*p++) != verify->ve_attrlen)
727                 goto out_kfree;
728         if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
729                 status = nfserr_same;
730
731 out_kfree:
732         kfree(buf);
733         return status;
734 }
735
736 /*
737  * NULL call.
738  */
739 static __be32
740 nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
741 {
742         return nfs_ok;
743 }
744
745 static inline void nfsd4_increment_op_stats(u32 opnum)
746 {
747         if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
748                 nfsdstats.nfs4_opcount[opnum]++;
749 }
750
751 static void cstate_free(struct nfsd4_compound_state *cstate)
752 {
753         if (cstate == NULL)
754                 return;
755         fh_put(&cstate->current_fh);
756         fh_put(&cstate->save_fh);
757         BUG_ON(cstate->replay_owner);
758         kfree(cstate);
759 }
760
761 static struct nfsd4_compound_state *cstate_alloc(void)
762 {
763         struct nfsd4_compound_state *cstate;
764
765         cstate = kmalloc(sizeof(struct nfsd4_compound_state), GFP_KERNEL);
766         if (cstate == NULL)
767                 return NULL;
768         fh_init(&cstate->current_fh, NFS4_FHSIZE);
769         fh_init(&cstate->save_fh, NFS4_FHSIZE);
770         cstate->replay_owner = NULL;
771         return cstate;
772 }
773
774 /*
775  * COMPOUND call.
776  */
777 static __be32
778 nfsd4_proc_compound(struct svc_rqst *rqstp,
779                     struct nfsd4_compoundargs *args,
780                     struct nfsd4_compoundres *resp)
781 {
782         struct nfsd4_op *op;
783         struct nfsd4_compound_state *cstate = NULL;
784         int             slack_bytes;
785         __be32          status;
786
787         status = nfserr_resource;
788         cstate = cstate_alloc();
789         if (cstate == NULL)
790                 goto out;
791
792         resp->xbuf = &rqstp->rq_res;
793         resp->p = rqstp->rq_res.head[0].iov_base + rqstp->rq_res.head[0].iov_len;
794         resp->tagp = resp->p;
795         /* reserve space for: taglen, tag, and opcnt */
796         resp->p += 2 + XDR_QUADLEN(args->taglen);
797         resp->end = rqstp->rq_res.head[0].iov_base + PAGE_SIZE;
798         resp->taglen = args->taglen;
799         resp->tag = args->tag;
800         resp->opcnt = 0;
801         resp->rqstp = rqstp;
802
803         /*
804          * According to RFC3010, this takes precedence over all other errors.
805          */
806         status = nfserr_minor_vers_mismatch;
807         if (args->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
808                 goto out;
809
810         status = nfs_ok;
811         while (!status && resp->opcnt < args->opcnt) {
812                 op = &args->ops[resp->opcnt++];
813
814                 dprintk("nfsv4 compound op #%d: %d\n", resp->opcnt, op->opnum);
815
816                 /*
817                  * The XDR decode routines may have pre-set op->status;
818                  * for example, if there is a miscellaneous XDR error
819                  * it will be set to nfserr_bad_xdr.
820                  */
821                 if (op->status)
822                         goto encode_op;
823
824                 /* We must be able to encode a successful response to
825                  * this operation, with enough room left over to encode a
826                  * failed response to the next operation.  If we don't
827                  * have enough room, fail with ERR_RESOURCE.
828                  */
829                 slack_bytes = (char *)resp->end - (char *)resp->p;
830                 if (slack_bytes < COMPOUND_SLACK_SPACE
831                                 + COMPOUND_ERR_SLACK_SPACE) {
832                         BUG_ON(slack_bytes < COMPOUND_ERR_SLACK_SPACE);
833                         op->status = nfserr_resource;
834                         goto encode_op;
835                 }
836
837                 /* All operations except RENEW, SETCLIENTID, RESTOREFH
838                 * SETCLIENTID_CONFIRM, PUTFH and PUTROOTFH
839                 * require a valid current filehandle
840                 */
841                 if (!cstate->current_fh.fh_dentry) {
842                         if (!((op->opnum == OP_PUTFH) ||
843                               (op->opnum == OP_PUTROOTFH) ||
844                               (op->opnum == OP_SETCLIENTID) ||
845                               (op->opnum == OP_SETCLIENTID_CONFIRM) ||
846                               (op->opnum == OP_RENEW) ||
847                               (op->opnum == OP_RESTOREFH) ||
848                               (op->opnum == OP_RELEASE_LOCKOWNER))) {
849                                 op->status = nfserr_nofilehandle;
850                                 goto encode_op;
851                         }
852                 }
853                 /* Check must be done at start of each operation, except
854                  * for GETATTR and ops not listed as returning NFS4ERR_MOVED
855                  */
856                 else if (cstate->current_fh.fh_export->ex_fslocs.migrated &&
857                          !((op->opnum == OP_GETATTR) ||
858                            (op->opnum == OP_PUTROOTFH) ||
859                            (op->opnum == OP_PUTPUBFH) ||
860                            (op->opnum == OP_RENEW) ||
861                            (op->opnum == OP_SETCLIENTID) ||
862                            (op->opnum == OP_RELEASE_LOCKOWNER))) {
863                         op->status = nfserr_moved;
864                         goto encode_op;
865                 }
866                 switch (op->opnum) {
867                 case OP_ACCESS:
868                         op->status = nfsd4_access(rqstp, cstate,
869                                                   &op->u.access);
870                         break;
871                 case OP_CLOSE:
872                         op->status = nfsd4_close(rqstp, cstate,
873                                                  &op->u.close);
874                         break;
875                 case OP_COMMIT:
876                         op->status = nfsd4_commit(rqstp, cstate,
877                                                   &op->u.commit);
878                         break;
879                 case OP_CREATE:
880                         op->status = nfsd4_create(rqstp, cstate,
881                                                   &op->u.create);
882                         break;
883                 case OP_DELEGRETURN:
884                         op->status = nfsd4_delegreturn(rqstp, cstate,
885                                                        &op->u.delegreturn);
886                         break;
887                 case OP_GETATTR:
888                         op->status = nfsd4_getattr(rqstp, cstate,
889                                                    &op->u.getattr);
890                         break;
891                 case OP_GETFH:
892                         op->status = nfsd4_getfh(cstate, &op->u.getfh);
893                         break;
894                 case OP_LINK:
895                         op->status = nfsd4_link(rqstp, cstate, &op->u.link);
896                         break;
897                 case OP_LOCK:
898                         op->status = nfsd4_lock(rqstp, cstate, &op->u.lock);
899                         break;
900                 case OP_LOCKT:
901                         op->status = nfsd4_lockt(rqstp, cstate, &op->u.lockt);
902                         break;
903                 case OP_LOCKU:
904                         op->status = nfsd4_locku(rqstp, cstate, &op->u.locku);
905                         break;
906                 case OP_LOOKUP:
907                         op->status = nfsd4_lookup(rqstp, cstate,
908                                                   &op->u.lookup);
909                         break;
910                 case OP_LOOKUPP:
911                         op->status = nfsd4_lookupp(rqstp, cstate);
912                         break;
913                 case OP_NVERIFY:
914                         op->status = nfsd4_verify(rqstp, cstate,
915                                                   &op->u.nverify);
916                         if (op->status == nfserr_not_same)
917                                 op->status = nfs_ok;
918                         break;
919                 case OP_OPEN:
920                         op->status = nfsd4_open(rqstp, cstate,
921                                                 &op->u.open);
922                         break;
923                 case OP_OPEN_CONFIRM:
924                         op->status = nfsd4_open_confirm(rqstp, cstate,
925                                                         &op->u.open_confirm);
926                         break;
927                 case OP_OPEN_DOWNGRADE:
928                         op->status = nfsd4_open_downgrade(rqstp, cstate,
929                                                         &op->u.open_downgrade);
930                         break;
931                 case OP_PUTFH:
932                         op->status = nfsd4_putfh(rqstp, cstate, &op->u.putfh);
933                         break;
934                 case OP_PUTROOTFH:
935                         op->status = nfsd4_putrootfh(rqstp, cstate);
936                         break;
937                 case OP_READ:
938                         op->status = nfsd4_read(rqstp, cstate, &op->u.read);
939                         break;
940                 case OP_READDIR:
941                         op->status = nfsd4_readdir(rqstp, cstate,
942                                                    &op->u.readdir);
943                         break;
944                 case OP_READLINK:
945                         op->status = nfsd4_readlink(rqstp, cstate,
946                                                     &op->u.readlink);
947                         break;
948                 case OP_REMOVE:
949                         op->status = nfsd4_remove(rqstp, cstate,
950                                                   &op->u.remove);
951                         break;
952                 case OP_RENAME:
953                         op->status = nfsd4_rename(rqstp, cstate,
954                                                   &op->u.rename);
955                         break;
956                 case OP_RENEW:
957                         op->status = nfsd4_renew(&op->u.renew);
958                         break;
959                 case OP_RESTOREFH:
960                         op->status = nfsd4_restorefh(cstate);
961                         break;
962                 case OP_SAVEFH:
963                         op->status = nfsd4_savefh(cstate);
964                         break;
965                 case OP_SETATTR:
966                         op->status = nfsd4_setattr(rqstp, cstate,
967                                                    &op->u.setattr);
968                         break;
969                 case OP_SETCLIENTID:
970                         op->status = nfsd4_setclientid(rqstp, &op->u.setclientid);
971                         break;
972                 case OP_SETCLIENTID_CONFIRM:
973                         op->status = nfsd4_setclientid_confirm(rqstp, &op->u.setclientid_confirm);
974                         break;
975                 case OP_VERIFY:
976                         op->status = nfsd4_verify(rqstp, cstate,
977                                                   &op->u.verify);
978                         if (op->status == nfserr_same)
979                                 op->status = nfs_ok;
980                         break;
981                 case OP_WRITE:
982                         op->status = nfsd4_write(rqstp, cstate, &op->u.write);
983                         break;
984                 case OP_RELEASE_LOCKOWNER:
985                         op->status = nfsd4_release_lockowner(rqstp, &op->u.release_lockowner);
986                         break;
987                 default:
988                         BUG_ON(op->status == nfs_ok);
989                         break;
990                 }
991
992 encode_op:
993                 if (op->status == nfserr_replay_me) {
994                         op->replay = &cstate->replay_owner->so_replay;
995                         nfsd4_encode_replay(resp, op);
996                         status = op->status = op->replay->rp_status;
997                 } else {
998                         nfsd4_encode_operation(resp, op);
999                         status = op->status;
1000                 }
1001                 if (cstate->replay_owner) {
1002                         nfs4_put_stateowner(cstate->replay_owner);
1003                         cstate->replay_owner = NULL;
1004                 }
1005                 /* XXX Ugh, we need to get rid of this kind of special case: */
1006                 if (op->opnum == OP_READ && op->u.read.rd_filp)
1007                         fput(op->u.read.rd_filp);
1008
1009                 nfsd4_increment_op_stats(op->opnum);
1010         }
1011
1012 out:
1013         nfsd4_release_compoundargs(args);
1014         cstate_free(cstate);
1015         return status;
1016 }
1017
1018 #define nfs4svc_decode_voidargs         NULL
1019 #define nfs4svc_release_void            NULL
1020 #define nfsd4_voidres                   nfsd4_voidargs
1021 #define nfs4svc_release_compound        NULL
1022 struct nfsd4_voidargs { int dummy; };
1023
1024 #define PROC(name, argt, rest, relt, cache, respsize)   \
1025  { (svc_procfunc) nfsd4_proc_##name,            \
1026    (kxdrproc_t) nfs4svc_decode_##argt##args,    \
1027    (kxdrproc_t) nfs4svc_encode_##rest##res,     \
1028    (kxdrproc_t) nfs4svc_release_##relt,         \
1029    sizeof(struct nfsd4_##argt##args),           \
1030    sizeof(struct nfsd4_##rest##res),            \
1031    0,                                           \
1032    cache,                                       \
1033    respsize,                                    \
1034  }
1035
1036 /*
1037  * TODO: At the present time, the NFSv4 server does not do XID caching
1038  * of requests.  Implementing XID caching would not be a serious problem,
1039  * although it would require a mild change in interfaces since one
1040  * doesn't know whether an NFSv4 request is idempotent until after the
1041  * XDR decode.  However, XID caching totally confuses pynfs (Peter
1042  * Astrand's regression testsuite for NFSv4 servers), which reuses
1043  * XID's liberally, so I've left it unimplemented until pynfs generates
1044  * better XID's.
1045  */
1046 static struct svc_procedure             nfsd_procedures4[2] = {
1047   PROC(null,     void,          void,           void,     RC_NOCACHE, 1),
1048   PROC(compound, compound,      compound,       compound, RC_NOCACHE, NFSD_BUFSIZE/4)
1049 };
1050
1051 struct svc_version      nfsd_version4 = {
1052                 .vs_vers        = 4,
1053                 .vs_nproc       = 2,
1054                 .vs_proc        = nfsd_procedures4,
1055                 .vs_dispatch    = nfsd_dispatch,
1056                 .vs_xdrsize     = NFS4_SVC_XDRSIZE,
1057 };
1058
1059 /*
1060  * Local variables:
1061  *  c-basic-offset: 8
1062  * End:
1063  */