]> git.ipfire.org Git - people/ms/linux.git/blame - fs/nfsd/nfs4proc.c
nfsd41: free_session/free_client must be called under the client_lock
[people/ms/linux.git] / fs / nfsd / nfs4proc.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Server-side procedures for NFSv4.
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1da177e4 34 */
7e06b7f9 35#include <linux/file.h>
5a0e3ad6 36#include <linux/slab.h>
1da177e4 37
58e7b33a 38#include "idmap.h"
9a74af21
BH
39#include "cache.h"
40#include "xdr4.h"
0a3adade 41#include "vfs.h"
8b70484c 42#include "current_stateid.h"
1da177e4
LT
43
44#define NFSDDBG_FACILITY NFSDDBG_PROC
45
3c8e0316
YZ
46static u32 nfsd_attrmask[] = {
47 NFSD_WRITEABLE_ATTRS_WORD0,
48 NFSD_WRITEABLE_ATTRS_WORD1,
49 NFSD_WRITEABLE_ATTRS_WORD2
50};
51
52static u32 nfsd41_ex_attrmask[] = {
53 NFSD_SUPPATTR_EXCLCREAT_WORD0,
54 NFSD_SUPPATTR_EXCLCREAT_WORD1,
55 NFSD_SUPPATTR_EXCLCREAT_WORD2
56};
57
58static __be32
59check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
60 u32 *bmval, u32 *writable)
61{
62 struct dentry *dentry = cstate->current_fh.fh_dentry;
3c8e0316
YZ
63
64 /*
65 * Check about attributes are supported by the NFSv4 server or not.
66 * According to spec, unsupported attributes return ERR_ATTRNOTSUPP.
67 */
68 if ((bmval[0] & ~nfsd_suppattrs0(cstate->minorversion)) ||
69 (bmval[1] & ~nfsd_suppattrs1(cstate->minorversion)) ||
70 (bmval[2] & ~nfsd_suppattrs2(cstate->minorversion)))
71 return nfserr_attrnotsupp;
72
73 /*
a06b1261 74 * Check FATTR4_WORD0_ACL can be supported
3c8e0316
YZ
75 * in current environment or not.
76 */
77 if (bmval[0] & FATTR4_WORD0_ACL) {
78 if (!IS_POSIXACL(dentry->d_inode))
79 return nfserr_attrnotsupp;
80 }
3c8e0316
YZ
81
82 /*
83 * According to spec, read-only attributes return ERR_INVAL.
84 */
85 if (writable) {
86 if ((bmval[0] & ~writable[0]) || (bmval[1] & ~writable[1]) ||
87 (bmval[2] & ~writable[2]))
88 return nfserr_inval;
89 }
90
91 return nfs_ok;
92}
93
94static __be32
95nfsd4_check_open_attributes(struct svc_rqst *rqstp,
96 struct nfsd4_compound_state *cstate, struct nfsd4_open *open)
97{
98 __be32 status = nfs_ok;
99
100 if (open->op_create == NFS4_OPEN_CREATE) {
101 if (open->op_createmode == NFS4_CREATE_UNCHECKED
102 || open->op_createmode == NFS4_CREATE_GUARDED)
103 status = check_attr_support(rqstp, cstate,
104 open->op_bmval, nfsd_attrmask);
105 else if (open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1)
106 status = check_attr_support(rqstp, cstate,
107 open->op_bmval, nfsd41_ex_attrmask);
108 }
109
110 return status;
111}
112
9208faf2
YZ
113static int
114is_create_with_attrs(struct nfsd4_open *open)
115{
116 return open->op_create == NFS4_OPEN_CREATE
117 && (open->op_createmode == NFS4_CREATE_UNCHECKED
118 || open->op_createmode == NFS4_CREATE_GUARDED
119 || open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1);
120}
121
122/*
123 * if error occurs when setting the acl, just clear the acl bit
124 * in the returned attr bitmap.
125 */
126static void
127do_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
128 struct nfs4_acl *acl, u32 *bmval)
129{
130 __be32 status;
131
132 status = nfsd4_set_nfs4_acl(rqstp, fhp, acl);
133 if (status)
134 /*
135 * We should probably fail the whole open at this point,
136 * but we've already created the file, so it's too late;
137 * So this seems the least of evils:
138 */
139 bmval[0] &= ~FATTR4_WORD0_ACL;
140}
141
1da177e4
LT
142static inline void
143fh_dup2(struct svc_fh *dst, struct svc_fh *src)
144{
145 fh_put(dst);
146 dget(src->fh_dentry);
147 if (src->fh_export)
148 cache_get(&src->fh_export->h);
149 *dst = *src;
150}
151
b37ad28b 152static __be32
dc730e17 153do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
1da177e4 154{
b37ad28b 155 __be32 status;
1da177e4
LT
156
157 if (open->op_truncate &&
158 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
159 return nfserr_inval;
160
a043226b
BF
161 accmode |= NFSD_MAY_READ_IF_EXEC;
162
1da177e4 163 if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
8837abca 164 accmode |= NFSD_MAY_READ;
9801d8a3 165 if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
8837abca 166 accmode |= (NFSD_MAY_WRITE | NFSD_MAY_TRUNC);
57ecb34f 167 if (open->op_share_deny & NFS4_SHARE_DENY_READ)
8837abca 168 accmode |= NFSD_MAY_WRITE;
1da177e4
LT
169
170 status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
171
172 return status;
173}
174
aadab6c6
BF
175static __be32 nfsd_check_obj_isreg(struct svc_fh *fh)
176{
177 umode_t mode = fh->fh_dentry->d_inode->i_mode;
178
179 if (S_ISREG(mode))
180 return nfs_ok;
181 if (S_ISDIR(mode))
182 return nfserr_isdir;
183 /*
184 * Using err_symlink as our catch-all case may look odd; but
185 * there's no other obvious error for this case in 4.0, and we
186 * happen to know that it will cause the linux v4 client to do
187 * the right thing on attempts to open something other than a
188 * regular file.
189 */
190 return nfserr_symlink;
191}
192
b37ad28b 193static __be32
1da177e4
LT
194do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
195{
196 struct svc_fh resfh;
b37ad28b 197 __be32 status;
1da177e4
LT
198
199 fh_init(&resfh, NFS4_FHSIZE);
200 open->op_truncate = 0;
201
202 if (open->op_create) {
79fb54ab
BH
203 /* FIXME: check session persistence and pnfs flags.
204 * The nfsv4.1 spec requires the following semantics:
205 *
206 * Persistent | pNFS | Server REQUIRED | Client Allowed
207 * Reply Cache | server | |
208 * -------------+--------+-----------------+--------------------
209 * no | no | EXCLUSIVE4_1 | EXCLUSIVE4_1
210 * | | | (SHOULD)
211 * | | and EXCLUSIVE4 | or EXCLUSIVE4
212 * | | | (SHOULD NOT)
213 * no | yes | EXCLUSIVE4_1 | EXCLUSIVE4_1
214 * yes | no | GUARDED4 | GUARDED4
215 * yes | yes | GUARDED4 | GUARDED4
216 */
217
1da177e4
LT
218 /*
219 * Note: create modes (UNCHECKED,GUARDED...) are the same
ac6721a1 220 * in NFSv4 as in v3 except EXCLUSIVE4_1.
1da177e4 221 */
ac6721a1 222 status = do_nfsd_create(rqstp, current_fh, open->op_fname.data,
1da177e4
LT
223 open->op_fname.len, &open->op_iattr,
224 &resfh, open->op_createmode,
749997e5 225 (u32 *)open->op_verf.data,
856121b2 226 &open->op_truncate, &open->op_created);
749997e5 227
99f88726
BF
228 /*
229 * Following rfc 3530 14.2.16, use the returned bitmask
230 * to indicate which attributes we used to store the
231 * verifier:
749997e5
JL
232 */
233 if (open->op_createmode == NFS4_CREATE_EXCLUSIVE && status == 0)
99f88726 234 open->op_bmval[1] = (FATTR4_WORD1_TIME_ACCESS |
749997e5 235 FATTR4_WORD1_TIME_MODIFY);
af85852d 236 } else {
1da177e4
LT
237 status = nfsd_lookup(rqstp, current_fh,
238 open->op_fname.data, open->op_fname.len, &resfh);
239 fh_unlock(current_fh);
aadab6c6
BF
240 if (status)
241 goto out;
242 status = nfsd_check_obj_isreg(&resfh);
1da177e4 243 }
af85852d
BF
244 if (status)
245 goto out;
1da177e4 246
9208faf2
YZ
247 if (is_create_with_attrs(open) && open->op_acl != NULL)
248 do_set_nfs4_acl(rqstp, &resfh, open->op_acl, open->op_bmval);
249
af85852d 250 set_change_info(&open->op_cinfo, current_fh);
13024b7b 251 fh_dup2(current_fh, &resfh);
1da177e4 252
af85852d 253 /* set reply cache */
fe0750e5 254 fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh,
a4773c08 255 &resfh.fh_handle);
856121b2 256 if (!open->op_created)
8837abca
MS
257 status = do_open_permission(rqstp, current_fh, open,
258 NFSD_MAY_NOP);
1da177e4 259
af85852d 260out:
1da177e4
LT
261 fh_put(&resfh);
262 return status;
263}
264
b37ad28b 265static __be32
1da177e4
LT
266do_open_fhandle(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
267{
b37ad28b 268 __be32 status;
1da177e4 269
1da177e4
LT
270 /* We don't know the target directory, and therefore can not
271 * set the change info
272 */
273
274 memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
275
276 /* set replay cache */
fe0750e5 277 fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh,
a4773c08 278 &current_fh->fh_handle);
1da177e4
LT
279
280 open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
281 (open->op_iattr.ia_size == 0);
282
8837abca
MS
283 status = do_open_permission(rqstp, current_fh, open,
284 NFSD_MAY_OWNER_OVERRIDE);
1da177e4
LT
285
286 return status;
287}
288
60adfc50
AA
289static void
290copy_clientid(clientid_t *clid, struct nfsd4_session *session)
291{
292 struct nfsd4_sessionid *sid =
293 (struct nfsd4_sessionid *)session->se_sessionid.data;
294
295 clid->cl_boot = sid->clientid.cl_boot;
296 clid->cl_id = sid->clientid.cl_id;
297}
1da177e4 298
7191155b 299static __be32
ca364317 300nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
a4f1706a 301 struct nfsd4_open *open)
1da177e4 302{
b37ad28b 303 __be32 status;
6668958f
AA
304 struct nfsd4_compoundres *resp;
305
fe0750e5 306 dprintk("NFSD: nfsd4_open filename %.*s op_openowner %p\n",
1da177e4 307 (int)open->op_fname.len, open->op_fname.data,
fe0750e5 308 open->op_openowner);
1da177e4 309
1da177e4
LT
310 /* This check required by spec. */
311 if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
312 return nfserr_inval;
313
856121b2 314 open->op_created = 0;
ab1350b2
MJ
315 /*
316 * RFC5661 18.51.3
317 * Before RECLAIM_COMPLETE done, server should deny new lock
318 */
319 if (nfsd4_has_session(cstate) &&
320 !cstate->session->se_client->cl_firststate &&
321 open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
322 return nfserr_grace;
323
60adfc50
AA
324 if (nfsd4_has_session(cstate))
325 copy_clientid(&open->op_clientid, cstate->session);
326
1da177e4
LT
327 nfs4_lock_state();
328
329 /* check seqid for replay. set nfs4_owner */
6668958f
AA
330 resp = rqstp->rq_resp;
331 status = nfsd4_process_open1(&resp->cstate, open);
a90b061c 332 if (status == nfserr_replay_me) {
fe0750e5 333 struct nfs4_replay *rp = &open->op_openowner->oo_owner.so_replay;
ca364317 334 fh_put(&cstate->current_fh);
a4773c08
BF
335 fh_copy_shallow(&cstate->current_fh.fh_handle,
336 &rp->rp_openfh);
8837abca 337 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
1da177e4
LT
338 if (status)
339 dprintk("nfsd4_open: replay failed"
340 " restoring previous filehandle\n");
341 else
a90b061c 342 status = nfserr_replay_me;
1da177e4
LT
343 }
344 if (status)
345 goto out;
fb553c0f 346
3c8e0316
YZ
347 status = nfsd4_check_open_attributes(rqstp, cstate, open);
348 if (status)
349 goto out;
350
fb553c0f
BF
351 /* Openowner is now set, so sequence id will get bumped. Now we need
352 * these checks before we do any creates: */
cbd0d51a 353 status = nfserr_grace;
af558e33 354 if (locks_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
cbd0d51a
BF
355 goto out;
356 status = nfserr_no_grace;
af558e33 357 if (!locks_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
cbd0d51a 358 goto out;
fb553c0f 359
1da177e4 360 switch (open->op_claim_type) {
0dd3c192 361 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1da177e4 362 case NFS4_OPEN_CLAIM_NULL:
ca364317
BF
363 status = do_open_lookup(rqstp, &cstate->current_fh,
364 open);
1da177e4
LT
365 if (status)
366 goto out;
367 break;
368 case NFS4_OPEN_CLAIM_PREVIOUS:
dad1c067 369 open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED;
0cf99b91
MJ
370 status = nfs4_check_open_reclaim(&open->op_clientid);
371 if (status)
372 goto out;
8b289b2c
BF
373 case NFS4_OPEN_CLAIM_FH:
374 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
ca364317
BF
375 status = do_open_fhandle(rqstp, &cstate->current_fh,
376 open);
1da177e4
LT
377 if (status)
378 goto out;
379 break;
8b289b2c 380 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1da177e4 381 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
dad1c067 382 open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED;
2fdada03 383 dprintk("NFSD: unsupported OPEN claim type %d\n",
1da177e4
LT
384 open->op_claim_type);
385 status = nfserr_notsupp;
386 goto out;
387 default:
2fdada03 388 dprintk("NFSD: Invalid OPEN claim type %d\n",
1da177e4
LT
389 open->op_claim_type);
390 status = nfserr_inval;
391 goto out;
392 }
393 /*
394 * nfsd4_process_open2() does the actual opening of the file. If
395 * successful, it (1) truncates the file if open->op_truncate was
396 * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
397 */
ca364317 398 status = nfsd4_process_open2(rqstp, &cstate->current_fh, open);
856121b2 399 WARN_ON(status && open->op_created);
1da177e4 400out:
d29b20cd 401 nfsd4_cleanup_open_state(open, status);
fe0750e5
BF
402 if (open->op_openowner)
403 cstate->replay_owner = &open->op_openowner->oo_owner;
7c13f344 404 else
5ec094c1 405 nfs4_unlock_state();
1da177e4
LT
406 return status;
407}
408
409/*
410 * filehandle-manipulating ops.
411 */
7191155b 412static __be32
b591480b
BF
413nfsd4_getfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
414 struct svc_fh **getfh)
1da177e4 415{
ca364317 416 if (!cstate->current_fh.fh_dentry)
1da177e4
LT
417 return nfserr_nofilehandle;
418
ca364317 419 *getfh = &cstate->current_fh;
1da177e4
LT
420 return nfs_ok;
421}
422
7191155b 423static __be32
ca364317
BF
424nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
425 struct nfsd4_putfh *putfh)
1da177e4 426{
ca364317
BF
427 fh_put(&cstate->current_fh);
428 cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
429 memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
430 putfh->pf_fhlen);
68d93184 431 return fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_BYPASS_GSS);
1da177e4
LT
432}
433
7191155b 434static __be32
b591480b
BF
435nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
436 void *arg)
1da177e4 437{
b37ad28b 438 __be32 status;
1da177e4 439
ca364317 440 fh_put(&cstate->current_fh);
df547efb 441 status = exp_pseudoroot(rqstp, &cstate->current_fh);
1da177e4
LT
442 return status;
443}
444
7191155b 445static __be32
b591480b
BF
446nfsd4_restorefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
447 void *arg)
1da177e4 448{
ca364317 449 if (!cstate->save_fh.fh_dentry)
1da177e4
LT
450 return nfserr_restorefh;
451
ca364317 452 fh_dup2(&cstate->current_fh, &cstate->save_fh);
37c593c5
TM
453 if (HAS_STATE_ID(cstate, SAVED_STATE_ID_FLAG)) {
454 memcpy(&cstate->current_stateid, &cstate->save_stateid, sizeof(stateid_t));
455 SET_STATE_ID(cstate, CURRENT_STATE_ID_FLAG);
456 }
1da177e4
LT
457 return nfs_ok;
458}
459
7191155b 460static __be32
b591480b
BF
461nfsd4_savefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
462 void *arg)
1da177e4 463{
ca364317 464 if (!cstate->current_fh.fh_dentry)
1da177e4
LT
465 return nfserr_nofilehandle;
466
ca364317 467 fh_dup2(&cstate->save_fh, &cstate->current_fh);
37c593c5
TM
468 if (HAS_STATE_ID(cstate, CURRENT_STATE_ID_FLAG)) {
469 memcpy(&cstate->save_stateid, &cstate->current_stateid, sizeof(stateid_t));
470 SET_STATE_ID(cstate, SAVED_STATE_ID_FLAG);
471 }
1da177e4
LT
472 return nfs_ok;
473}
474
475/*
476 * misc nfsv4 ops
477 */
7191155b 478static __be32
ca364317
BF
479nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
480 struct nfsd4_access *access)
1da177e4
LT
481{
482 if (access->ac_req_access & ~NFS3_ACCESS_FULL)
483 return nfserr_inval;
484
485 access->ac_resp_access = access->ac_req_access;
ca364317
BF
486 return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
487 &access->ac_supported);
1da177e4
LT
488}
489
7191155b 490static __be32
ca364317
BF
491nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
492 struct nfsd4_commit *commit)
1da177e4 493{
1da177e4
LT
494 u32 *p = (u32 *)commit->co_verf.data;
495 *p++ = nfssvc_boot.tv_sec;
496 *p++ = nfssvc_boot.tv_usec;
497
75c096f7 498 return nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
ca364317 499 commit->co_count);
1da177e4
LT
500}
501
b37ad28b 502static __be32
ca364317
BF
503nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
504 struct nfsd4_create *create)
1da177e4
LT
505{
506 struct svc_fh resfh;
b37ad28b 507 __be32 status;
1da177e4
LT
508 dev_t rdev;
509
510 fh_init(&resfh, NFS4_FHSIZE);
511
8837abca
MS
512 status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR,
513 NFSD_MAY_CREATE);
1da177e4
LT
514 if (status)
515 return status;
516
3c8e0316
YZ
517 status = check_attr_support(rqstp, cstate, create->cr_bmval,
518 nfsd_attrmask);
519 if (status)
520 return status;
521
1da177e4
LT
522 switch (create->cr_type) {
523 case NF4LNK:
524 /* ugh! we have to null-terminate the linktext, or
525 * vfs_symlink() will choke. it is always safe to
526 * null-terminate by brute force, since at worst we
527 * will overwrite the first byte of the create namelen
528 * in the XDR buffer, which has already been extracted
529 * during XDR decode.
530 */
531 create->cr_linkname[create->cr_linklen] = 0;
532
ca364317
BF
533 status = nfsd_symlink(rqstp, &cstate->current_fh,
534 create->cr_name, create->cr_namelen,
535 create->cr_linkname, create->cr_linklen,
536 &resfh, &create->cr_iattr);
1da177e4
LT
537 break;
538
539 case NF4BLK:
540 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
541 if (MAJOR(rdev) != create->cr_specdata1 ||
542 MINOR(rdev) != create->cr_specdata2)
543 return nfserr_inval;
ca364317
BF
544 status = nfsd_create(rqstp, &cstate->current_fh,
545 create->cr_name, create->cr_namelen,
546 &create->cr_iattr, S_IFBLK, rdev, &resfh);
1da177e4
LT
547 break;
548
549 case NF4CHR:
550 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
551 if (MAJOR(rdev) != create->cr_specdata1 ||
552 MINOR(rdev) != create->cr_specdata2)
553 return nfserr_inval;
ca364317
BF
554 status = nfsd_create(rqstp, &cstate->current_fh,
555 create->cr_name, create->cr_namelen,
556 &create->cr_iattr,S_IFCHR, rdev, &resfh);
1da177e4
LT
557 break;
558
559 case NF4SOCK:
ca364317
BF
560 status = nfsd_create(rqstp, &cstate->current_fh,
561 create->cr_name, create->cr_namelen,
562 &create->cr_iattr, S_IFSOCK, 0, &resfh);
1da177e4
LT
563 break;
564
565 case NF4FIFO:
ca364317
BF
566 status = nfsd_create(rqstp, &cstate->current_fh,
567 create->cr_name, create->cr_namelen,
568 &create->cr_iattr, S_IFIFO, 0, &resfh);
1da177e4
LT
569 break;
570
571 case NF4DIR:
572 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
ca364317
BF
573 status = nfsd_create(rqstp, &cstate->current_fh,
574 create->cr_name, create->cr_namelen,
575 &create->cr_iattr, S_IFDIR, 0, &resfh);
1da177e4
LT
576 break;
577
578 default:
579 status = nfserr_badtype;
580 }
581
9208faf2
YZ
582 if (status)
583 goto out;
1da177e4 584
9208faf2
YZ
585 if (create->cr_acl != NULL)
586 do_set_nfs4_acl(rqstp, &resfh, create->cr_acl,
587 create->cr_bmval);
588
589 fh_unlock(&cstate->current_fh);
590 set_change_info(&create->cr_cinfo, &cstate->current_fh);
591 fh_dup2(&cstate->current_fh, &resfh);
592out:
1da177e4
LT
593 fh_put(&resfh);
594 return status;
595}
596
7191155b 597static __be32
ca364317
BF
598nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
599 struct nfsd4_getattr *getattr)
1da177e4 600{
b37ad28b 601 __be32 status;
1da177e4 602
8837abca 603 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
1da177e4
LT
604 if (status)
605 return status;
606
607 if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
608 return nfserr_inval;
609
7e705706
AA
610 getattr->ga_bmval[0] &= nfsd_suppattrs0(cstate->minorversion);
611 getattr->ga_bmval[1] &= nfsd_suppattrs1(cstate->minorversion);
612 getattr->ga_bmval[2] &= nfsd_suppattrs2(cstate->minorversion);
1da177e4 613
ca364317 614 getattr->ga_fhp = &cstate->current_fh;
1da177e4
LT
615 return nfs_ok;
616}
617
7191155b 618static __be32
ca364317
BF
619nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
620 struct nfsd4_link *link)
1da177e4 621{
b37ad28b 622 __be32 status = nfserr_nofilehandle;
1da177e4 623
ca364317 624 if (!cstate->save_fh.fh_dentry)
1da177e4 625 return status;
ca364317
BF
626 status = nfsd_link(rqstp, &cstate->current_fh,
627 link->li_name, link->li_namelen, &cstate->save_fh);
1da177e4 628 if (!status)
ca364317 629 set_change_info(&link->li_cinfo, &cstate->current_fh);
1da177e4
LT
630 return status;
631}
632
0ff7ab46 633static __be32 nfsd4_do_lookupp(struct svc_rqst *rqstp, struct svc_fh *fh)
1da177e4
LT
634{
635 struct svc_fh tmp_fh;
b37ad28b 636 __be32 ret;
1da177e4
LT
637
638 fh_init(&tmp_fh, NFS4_FHSIZE);
df547efb
BF
639 ret = exp_pseudoroot(rqstp, &tmp_fh);
640 if (ret)
1da177e4 641 return ret;
0ff7ab46 642 if (tmp_fh.fh_dentry == fh->fh_dentry) {
1da177e4
LT
643 fh_put(&tmp_fh);
644 return nfserr_noent;
645 }
646 fh_put(&tmp_fh);
0ff7ab46
BF
647 return nfsd_lookup(rqstp, fh, "..", 2, fh);
648}
649
650static __be32
651nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
652 void *arg)
653{
654 return nfsd4_do_lookupp(rqstp, &cstate->current_fh);
1da177e4
LT
655}
656
7191155b 657static __be32
ca364317
BF
658nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
659 struct nfsd4_lookup *lookup)
1da177e4 660{
ca364317
BF
661 return nfsd_lookup(rqstp, &cstate->current_fh,
662 lookup->lo_name, lookup->lo_len,
663 &cstate->current_fh);
1da177e4
LT
664}
665
7191155b 666static __be32
ca364317
BF
667nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
668 struct nfsd4_read *read)
1da177e4 669{
b37ad28b 670 __be32 status;
1da177e4
LT
671
672 /* no need to check permission - this will be done in nfsd_read() */
673
7e06b7f9 674 read->rd_filp = NULL;
1da177e4
LT
675 if (read->rd_offset >= OFFSET_MAX)
676 return nfserr_inval;
677
678 nfs4_lock_state();
679 /* check stateid */
dd453dfd
BH
680 if ((status = nfs4_preprocess_stateid_op(cstate, &read->rd_stateid,
681 RD_STATE, &read->rd_filp))) {
1da177e4
LT
682 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
683 goto out;
684 }
7e06b7f9
N
685 if (read->rd_filp)
686 get_file(read->rd_filp);
1da177e4
LT
687 status = nfs_ok;
688out:
689 nfs4_unlock_state();
690 read->rd_rqstp = rqstp;
ca364317 691 read->rd_fhp = &cstate->current_fh;
1da177e4
LT
692 return status;
693}
694
7191155b 695static __be32
ca364317
BF
696nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
697 struct nfsd4_readdir *readdir)
1da177e4
LT
698{
699 u64 cookie = readdir->rd_cookie;
700 static const nfs4_verifier zeroverf;
701
702 /* no need to check permission - this will be done in nfsd_readdir() */
703
704 if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
705 return nfserr_inval;
706
7e705706
AA
707 readdir->rd_bmval[0] &= nfsd_suppattrs0(cstate->minorversion);
708 readdir->rd_bmval[1] &= nfsd_suppattrs1(cstate->minorversion);
709 readdir->rd_bmval[2] &= nfsd_suppattrs2(cstate->minorversion);
1da177e4 710
832023bf 711 if ((cookie == 1) || (cookie == 2) ||
1da177e4
LT
712 (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
713 return nfserr_bad_cookie;
714
715 readdir->rd_rqstp = rqstp;
ca364317 716 readdir->rd_fhp = &cstate->current_fh;
1da177e4
LT
717 return nfs_ok;
718}
719
7191155b 720static __be32
ca364317
BF
721nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
722 struct nfsd4_readlink *readlink)
1da177e4
LT
723{
724 readlink->rl_rqstp = rqstp;
ca364317 725 readlink->rl_fhp = &cstate->current_fh;
1da177e4
LT
726 return nfs_ok;
727}
728
7191155b 729static __be32
ca364317
BF
730nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
731 struct nfsd4_remove *remove)
1da177e4 732{
b37ad28b 733 __be32 status;
1da177e4 734
af558e33 735 if (locks_in_grace())
c815afc7 736 return nfserr_grace;
ca364317
BF
737 status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
738 remove->rm_name, remove->rm_namelen);
1da177e4 739 if (!status) {
ca364317
BF
740 fh_unlock(&cstate->current_fh);
741 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
1da177e4
LT
742 }
743 return status;
744}
745
7191155b 746static __be32
ca364317
BF
747nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
748 struct nfsd4_rename *rename)
1da177e4 749{
b37ad28b 750 __be32 status = nfserr_nofilehandle;
1da177e4 751
ca364317 752 if (!cstate->save_fh.fh_dentry)
1da177e4 753 return status;
af558e33 754 if (locks_in_grace() && !(cstate->save_fh.fh_export->ex_flags
c815afc7
N
755 & NFSEXP_NOSUBTREECHECK))
756 return nfserr_grace;
ca364317
BF
757 status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
758 rename->rn_snamelen, &cstate->current_fh,
1da177e4
LT
759 rename->rn_tname, rename->rn_tnamelen);
760
761 /* the underlying filesystem returns different error's than required
762 * by NFSv4. both save_fh and current_fh have been verified.. */
763 if (status == nfserr_isdir)
764 status = nfserr_exist;
765 else if ((status == nfserr_notdir) &&
ca364317
BF
766 (S_ISDIR(cstate->save_fh.fh_dentry->d_inode->i_mode) &&
767 S_ISDIR(cstate->current_fh.fh_dentry->d_inode->i_mode)))
1da177e4 768 status = nfserr_exist;
1da177e4
LT
769
770 if (!status) {
ca364317
BF
771 set_change_info(&rename->rn_sinfo, &cstate->current_fh);
772 set_change_info(&rename->rn_tinfo, &cstate->save_fh);
1da177e4
LT
773 }
774 return status;
775}
776
dcb488a3
AA
777static __be32
778nfsd4_secinfo(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
779 struct nfsd4_secinfo *secinfo)
780{
781 struct svc_fh resfh;
782 struct svc_export *exp;
783 struct dentry *dentry;
784 __be32 err;
785
786 fh_init(&resfh, NFS4_FHSIZE);
29a78a3e
BF
787 err = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_EXEC);
788 if (err)
789 return err;
dcb488a3
AA
790 err = nfsd_lookup_dentry(rqstp, &cstate->current_fh,
791 secinfo->si_name, secinfo->si_namelen,
792 &exp, &dentry);
793 if (err)
794 return err;
795 if (dentry->d_inode == NULL) {
796 exp_put(exp);
797 err = nfserr_noent;
798 } else
799 secinfo->si_exp = exp;
800 dput(dentry);
56560b9a
BF
801 if (cstate->minorversion)
802 /* See rfc 5661 section 2.6.3.1.1.8 */
803 fh_put(&cstate->current_fh);
dcb488a3
AA
804 return err;
805}
806
04f4ad16
BF
807static __be32
808nfsd4_secinfo_no_name(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
809 struct nfsd4_secinfo_no_name *sin)
810{
811 __be32 err;
812
813 switch (sin->sin_style) {
814 case NFS4_SECINFO_STYLE4_CURRENT_FH:
815 break;
816 case NFS4_SECINFO_STYLE4_PARENT:
817 err = nfsd4_do_lookupp(rqstp, &cstate->current_fh);
818 if (err)
819 return err;
820 break;
821 default:
822 return nfserr_inval;
823 }
824 exp_get(cstate->current_fh.fh_export);
825 sin->sin_exp = cstate->current_fh.fh_export;
826 fh_put(&cstate->current_fh);
827 return nfs_ok;
828}
829
7191155b 830static __be32
ca364317
BF
831nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
832 struct nfsd4_setattr *setattr)
1da177e4 833{
b37ad28b 834 __be32 status = nfs_ok;
1da177e4 835
1da177e4
LT
836 if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
837 nfs4_lock_state();
dd453dfd 838 status = nfs4_preprocess_stateid_op(cstate,
6150ef0d 839 &setattr->sa_stateid, WR_STATE, NULL);
1da177e4 840 nfs4_unlock_state();
375c5547 841 if (status) {
3e3b4800 842 dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
375c5547
BF
843 return status;
844 }
1da177e4 845 }
bad0dcff 846 status = fh_want_write(&cstate->current_fh);
18f335af
DH
847 if (status)
848 return status;
1da177e4 849 status = nfs_ok;
3c8e0316
YZ
850
851 status = check_attr_support(rqstp, cstate, setattr->sa_bmval,
852 nfsd_attrmask);
853 if (status)
854 goto out;
855
1da177e4 856 if (setattr->sa_acl != NULL)
ca364317
BF
857 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
858 setattr->sa_acl);
1da177e4 859 if (status)
18f335af 860 goto out;
ca364317 861 status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
1da177e4 862 0, (time_t)0);
18f335af 863out:
bad0dcff 864 fh_drop_write(&cstate->current_fh);
1da177e4
LT
865 return status;
866}
867
7191155b 868static __be32
ca364317
BF
869nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
870 struct nfsd4_write *write)
1da177e4
LT
871{
872 stateid_t *stateid = &write->wr_stateid;
873 struct file *filp = NULL;
874 u32 *p;
b37ad28b 875 __be32 status = nfs_ok;
31dec253 876 unsigned long cnt;
1da177e4
LT
877
878 /* no need to check permission - this will be done in nfsd_write() */
879
880 if (write->wr_offset >= OFFSET_MAX)
881 return nfserr_inval;
882
883 nfs4_lock_state();
dd453dfd 884 status = nfs4_preprocess_stateid_op(cstate, stateid, WR_STATE, &filp);
7e06b7f9
N
885 if (filp)
886 get_file(filp);
1da177e4
LT
887 nfs4_unlock_state();
888
375c5547
BF
889 if (status) {
890 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
891 return status;
892 }
893
31dec253 894 cnt = write->wr_buflen;
1da177e4
LT
895 write->wr_how_written = write->wr_stable_how;
896 p = (u32 *)write->wr_verifier.data;
897 *p++ = nfssvc_boot.tv_sec;
898 *p++ = nfssvc_boot.tv_usec;
899
ca364317
BF
900 status = nfsd_write(rqstp, &cstate->current_fh, filp,
901 write->wr_offset, rqstp->rq_vec, write->wr_vlen,
31dec253 902 &cnt, &write->wr_how_written);
7e06b7f9
N
903 if (filp)
904 fput(filp);
1da177e4 905
31dec253
DS
906 write->wr_bytes_written = cnt;
907
1da177e4 908 return status;
1da177e4
LT
909}
910
911/* This routine never returns NFS_OK! If there are no other errors, it
912 * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
913 * attributes matched. VERIFY is implemented by mapping NFSERR_SAME
914 * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
915 */
b37ad28b 916static __be32
c954e2a5 917_nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
ca364317 918 struct nfsd4_verify *verify)
1da177e4 919{
2ebbc012 920 __be32 *buf, *p;
1da177e4 921 int count;
b37ad28b 922 __be32 status;
1da177e4 923
8837abca 924 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
1da177e4
LT
925 if (status)
926 return status;
927
3c8e0316
YZ
928 status = check_attr_support(rqstp, cstate, verify->ve_bmval, NULL);
929 if (status)
930 return status;
931
1da177e4
LT
932 if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
933 || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
934 return nfserr_inval;
935 if (verify->ve_attrlen & 3)
936 return nfserr_inval;
937
938 /* count in words:
939 * bitmap_len(1) + bitmap(2) + attr_len(1) = 4
940 */
941 count = 4 + (verify->ve_attrlen >> 2);
942 buf = kmalloc(count << 2, GFP_KERNEL);
943 if (!buf)
3e772463 944 return nfserr_jukebox;
1da177e4 945
ca364317
BF
946 status = nfsd4_encode_fattr(&cstate->current_fh,
947 cstate->current_fh.fh_export,
948 cstate->current_fh.fh_dentry, buf,
1da177e4 949 &count, verify->ve_bmval,
406a7ea9 950 rqstp, 0);
1da177e4
LT
951
952 /* this means that nfsd4_encode_fattr() ran out of space */
953 if (status == nfserr_resource && count == 0)
954 status = nfserr_not_same;
955 if (status)
956 goto out_kfree;
957
95ec28cd
BH
958 /* skip bitmap */
959 p = buf + 1 + ntohl(buf[0]);
1da177e4
LT
960 status = nfserr_not_same;
961 if (ntohl(*p++) != verify->ve_attrlen)
962 goto out_kfree;
963 if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
964 status = nfserr_same;
965
966out_kfree:
967 kfree(buf);
968 return status;
969}
970
c954e2a5
BF
971static __be32
972nfsd4_nverify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
973 struct nfsd4_verify *verify)
974{
975 __be32 status;
976
977 status = _nfsd4_verify(rqstp, cstate, verify);
978 return status == nfserr_not_same ? nfs_ok : status;
979}
980
981static __be32
982nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
983 struct nfsd4_verify *verify)
984{
985 __be32 status;
986
987 status = _nfsd4_verify(rqstp, cstate, verify);
988 return status == nfserr_same ? nfs_ok : status;
989}
990
1da177e4
LT
991/*
992 * NULL call.
993 */
7111c66e 994static __be32
1da177e4
LT
995nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
996{
997 return nfs_ok;
998}
999
e2b20950
SA
1000static inline void nfsd4_increment_op_stats(u32 opnum)
1001{
1002 if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
1003 nfsdstats.nfs4_opcount[opnum]++;
1004}
1005
b591480b
BF
1006typedef __be32(*nfsd4op_func)(struct svc_rqst *, struct nfsd4_compound_state *,
1007 void *);
58e7b33a 1008typedef u32(*nfsd4op_rsize)(struct svc_rqst *, struct nfsd4_op *op);
8b70484c
TM
1009typedef void(*stateid_setter)(struct nfsd4_compound_state *, void *);
1010typedef void(*stateid_getter)(struct nfsd4_compound_state *, void *);
58e7b33a 1011
f9bb94c4
AA
1012enum nfsd4_op_flags {
1013 ALLOWED_WITHOUT_FH = 1 << 0, /* No current filehandle required */
5ece3caf
MJ
1014 ALLOWED_ON_ABSENT_FS = 1 << 1, /* ops processed on absent fs */
1015 ALLOWED_AS_FIRST_OP = 1 << 2, /* ops reqired first in compound */
68d93184
BF
1016 /* For rfc 5661 section 2.6.3.1.1: */
1017 OP_HANDLES_WRONGSEC = 1 << 3,
1018 OP_IS_PUTFH_LIKE = 1 << 4,
1091006c 1019 /*
c856694e
BF
1020 * These are the ops whose result size we estimate before
1021 * encoding, to avoid performing an op then not being able to
1022 * respond or cache a response. This includes writes and setattrs
1023 * as well as the operations usually called "nonidempotent":
1024 */
1025 OP_MODIFIES_SOMETHING = 1 << 5,
1026 /*
1027 * Cache compounds containing these ops in the xid-based drc:
1091006c
BF
1028 * We use the DRC for compounds containing non-idempotent
1029 * operations, *except* those that are 4.1-specific (since
1030 * sessions provide their own EOS), and except for stateful
1031 * operations other than setclientid and setclientid_confirm
1032 * (since sequence numbers provide EOS for open, lock, etc in
1033 * the v4.0 case).
1034 */
c856694e 1035 OP_CACHEME = 1 << 6,
8b70484c
TM
1036 /*
1037 * These are ops which clear current state id.
1038 */
1039 OP_CLEAR_STATEID = 1 << 7,
c856694e
BF
1040};
1041
1042struct nfsd4_operation {
1043 nfsd4op_func op_func;
1044 u32 op_flags;
1045 char *op_name;
58e7b33a
MJ
1046 /* Try to get response size before operation */
1047 nfsd4op_rsize op_rsize_bop;
8b70484c
TM
1048 stateid_setter op_get_currentstateid;
1049 stateid_getter op_set_currentstateid;
b591480b
BF
1050};
1051
1052static struct nfsd4_operation nfsd4_ops[];
1053
f1c7f79b 1054static const char *nfsd4_op_name(unsigned opnum);
b001a1b6 1055
f9bb94c4 1056/*
57716355 1057 * Enforce NFSv4.1 COMPOUND ordering rules:
f9bb94c4 1058 *
57716355
BF
1059 * Also note, enforced elsewhere:
1060 * - SEQUENCE other than as first op results in
1061 * NFS4ERR_SEQUENCE_POS. (Enforced in nfsd4_sequence().)
1d1bc8f2
BF
1062 * - BIND_CONN_TO_SESSION must be the only op in its compound.
1063 * (Enforced in nfsd4_bind_conn_to_session().)
57716355
BF
1064 * - DESTROY_SESSION must be the final operation in a compound, if
1065 * sessionid's in SEQUENCE and DESTROY_SESSION are the same.
1066 * (Enforced in nfsd4_destroy_session().)
f9bb94c4 1067 */
57716355 1068static __be32 nfs41_check_op_ordering(struct nfsd4_compoundargs *args)
f9bb94c4 1069{
57716355
BF
1070 struct nfsd4_op *op = &args->ops[0];
1071
1072 /* These ordering requirements don't apply to NFSv4.0: */
1073 if (args->minorversion == 0)
1074 return nfs_ok;
1075 /* This is weird, but OK, not our problem: */
1076 if (args->opcnt == 0)
1077 return nfs_ok;
1078 if (op->status == nfserr_op_illegal)
1079 return nfs_ok;
1080 if (!(nfsd4_ops[op->opnum].op_flags & ALLOWED_AS_FIRST_OP))
1081 return nfserr_op_not_in_session;
1082 if (op->opnum == OP_SEQUENCE)
1083 return nfs_ok;
1084 if (args->opcnt != 1)
1085 return nfserr_not_only_op;
1086 return nfs_ok;
f9bb94c4
AA
1087}
1088
22b03214
BF
1089static inline struct nfsd4_operation *OPDESC(struct nfsd4_op *op)
1090{
1091 return &nfsd4_ops[op->opnum];
1092}
1093
1091006c
BF
1094bool nfsd4_cache_this_op(struct nfsd4_op *op)
1095{
c856694e 1096 return OPDESC(op)->op_flags & OP_CACHEME;
1091006c
BF
1097}
1098
68d93184
BF
1099static bool need_wrongsec_check(struct svc_rqst *rqstp)
1100{
1101 struct nfsd4_compoundres *resp = rqstp->rq_resp;
1102 struct nfsd4_compoundargs *argp = rqstp->rq_argp;
1103 struct nfsd4_op *this = &argp->ops[resp->opcnt - 1];
1104 struct nfsd4_op *next = &argp->ops[resp->opcnt];
1105 struct nfsd4_operation *thisd;
1106 struct nfsd4_operation *nextd;
1107
1108 thisd = OPDESC(this);
1109 /*
1110 * Most ops check wronsec on our own; only the putfh-like ops
1111 * have special rules.
1112 */
1113 if (!(thisd->op_flags & OP_IS_PUTFH_LIKE))
1114 return false;
1115 /*
1116 * rfc 5661 2.6.3.1.1.6: don't bother erroring out a
1117 * put-filehandle operation if we're not going to use the
1118 * result:
1119 */
1120 if (argp->opcnt == resp->opcnt)
1121 return false;
1122
1123 nextd = OPDESC(next);
1124 /*
1125 * Rest of 2.6.3.1.1: certain operations will return WRONGSEC
1126 * errors themselves as necessary; others should check for them
1127 * now:
1128 */
1129 return !(nextd->op_flags & OP_HANDLES_WRONGSEC);
1130}
1131
1da177e4
LT
1132/*
1133 * COMPOUND call.
1134 */
7111c66e 1135static __be32
1da177e4
LT
1136nfsd4_proc_compound(struct svc_rqst *rqstp,
1137 struct nfsd4_compoundargs *args,
1138 struct nfsd4_compoundres *resp)
1139{
1140 struct nfsd4_op *op;
b591480b 1141 struct nfsd4_operation *opdesc;
e354d571 1142 struct nfsd4_compound_state *cstate = &resp->cstate;
e5710199 1143 int slack_bytes;
58e7b33a 1144 u32 plen = 0;
b37ad28b 1145 __be32 status;
1da177e4 1146
1da177e4 1147 resp->xbuf = &rqstp->rq_res;
e354d571
AA
1148 resp->p = rqstp->rq_res.head[0].iov_base +
1149 rqstp->rq_res.head[0].iov_len;
1da177e4
LT
1150 resp->tagp = resp->p;
1151 /* reserve space for: taglen, tag, and opcnt */
1152 resp->p += 2 + XDR_QUADLEN(args->taglen);
1153 resp->end = rqstp->rq_res.head[0].iov_base + PAGE_SIZE;
1154 resp->taglen = args->taglen;
1155 resp->tag = args->tag;
1156 resp->opcnt = 0;
1157 resp->rqstp = rqstp;
d87a8ade 1158 resp->cstate.minorversion = args->minorversion;
e354d571 1159 resp->cstate.replay_owner = NULL;
26c0c75e 1160 resp->cstate.session = NULL;
e354d571
AA
1161 fh_init(&resp->cstate.current_fh, NFS4_FHSIZE);
1162 fh_init(&resp->cstate.save_fh, NFS4_FHSIZE);
8ff30fa4
N
1163 /*
1164 * Don't use the deferral mechanism for NFSv4; compounds make it
1165 * too hard to avoid non-idempotency problems.
1166 */
1167 rqstp->rq_usedeferral = 0;
1da177e4
LT
1168
1169 /*
1170 * According to RFC3010, this takes precedence over all other errors.
1171 */
1172 status = nfserr_minor_vers_mismatch;
8daf220a 1173 if (args->minorversion > nfsd_supported_minorversion)
1da177e4
LT
1174 goto out;
1175
57716355
BF
1176 status = nfs41_check_op_ordering(args);
1177 if (status) {
f9bb94c4 1178 op = &args->ops[0];
57716355 1179 op->status = status;
f9bb94c4
AA
1180 goto encode_op;
1181 }
1182
1da177e4
LT
1183 while (!status && resp->opcnt < args->opcnt) {
1184 op = &args->ops[resp->opcnt++];
1185
b001a1b6
BH
1186 dprintk("nfsv4 compound op #%d/%d: %d (%s)\n",
1187 resp->opcnt, args->opcnt, op->opnum,
1188 nfsd4_op_name(op->opnum));
1da177e4
LT
1189 /*
1190 * The XDR decode routines may have pre-set op->status;
1191 * for example, if there is a miscellaneous XDR error
1192 * it will be set to nfserr_bad_xdr.
1193 */
1194 if (op->status)
1195 goto encode_op;
1196
1197 /* We must be able to encode a successful response to
1198 * this operation, with enough room left over to encode a
1199 * failed response to the next operation. If we don't
1200 * have enough room, fail with ERR_RESOURCE.
1201 */
e5710199
BF
1202 slack_bytes = (char *)resp->end - (char *)resp->p;
1203 if (slack_bytes < COMPOUND_SLACK_SPACE
1204 + COMPOUND_ERR_SLACK_SPACE) {
1205 BUG_ON(slack_bytes < COMPOUND_ERR_SLACK_SPACE);
1da177e4
LT
1206 op->status = nfserr_resource;
1207 goto encode_op;
1208 }
1209
22b03214 1210 opdesc = OPDESC(op);
b591480b 1211
ca364317 1212 if (!cstate->current_fh.fh_dentry) {
27d630ec 1213 if (!(opdesc->op_flags & ALLOWED_WITHOUT_FH)) {
42ca0993
BF
1214 op->status = nfserr_nofilehandle;
1215 goto encode_op;
1216 }
eeac294e
BF
1217 } else if (cstate->current_fh.fh_export->ex_fslocs.migrated &&
1218 !(opdesc->op_flags & ALLOWED_ON_ABSENT_FS)) {
42ca0993 1219 op->status = nfserr_moved;
1da177e4
LT
1220 goto encode_op;
1221 }
b591480b 1222
58e7b33a
MJ
1223 /* If op is non-idempotent */
1224 if (opdesc->op_flags & OP_MODIFIES_SOMETHING) {
1225 plen = opdesc->op_rsize_bop(rqstp, op);
1226 op->status = nfsd4_check_resp_size(resp, plen);
1227 }
1228
1229 if (op->status)
1230 goto encode_op;
1231
8b70484c
TM
1232 if (opdesc->op_func) {
1233 if (opdesc->op_get_currentstateid)
1234 opdesc->op_get_currentstateid(cstate, &op->u);
b591480b 1235 op->status = opdesc->op_func(rqstp, cstate, &op->u);
8b70484c 1236 } else
1da177e4 1237 BUG_ON(op->status == nfs_ok);
1da177e4 1238
8b70484c
TM
1239 if (!op->status) {
1240 if (opdesc->op_set_currentstateid)
1241 opdesc->op_set_currentstateid(cstate, &op->u);
1242
1243 if (opdesc->op_flags & OP_CLEAR_STATEID)
37c593c5 1244 clear_current_stateid(cstate);
8b70484c
TM
1245
1246 if (need_wrongsec_check(rqstp))
1247 op->status = check_nfsd_access(cstate->current_fh.fh_export, rqstp);
1248 }
68d93184 1249
1da177e4 1250encode_op:
49557cc7 1251 /* Only from SEQUENCE */
da3846a2
AA
1252 if (resp->cstate.status == nfserr_replay_cache) {
1253 dprintk("%s NFS4.1 replay from cache\n", __func__);
abfabf8c 1254 status = op->status;
da3846a2
AA
1255 goto out;
1256 }
a90b061c 1257 if (op->status == nfserr_replay_me) {
a4f1706a 1258 op->replay = &cstate->replay_owner->so_replay;
1da177e4
LT
1259 nfsd4_encode_replay(resp, op);
1260 status = op->status = op->replay->rp_status;
1261 } else {
1262 nfsd4_encode_operation(resp, op);
1263 status = op->status;
1264 }
0407717d
BH
1265
1266 dprintk("nfsv4 compound op %p opcnt %d #%d: %d: status %d\n",
1267 args->ops, args->opcnt, resp->opcnt, op->opnum,
1268 be32_to_cpu(status));
1269
a4f1706a 1270 if (cstate->replay_owner) {
5ec094c1 1271 nfs4_unlock_state();
a4f1706a 1272 cstate->replay_owner = NULL;
1da177e4 1273 }
7e06b7f9
N
1274 /* XXX Ugh, we need to get rid of this kind of special case: */
1275 if (op->opnum == OP_READ && op->u.read.rd_filp)
1276 fput(op->u.read.rd_filp);
e2b20950
SA
1277
1278 nfsd4_increment_op_stats(op->opnum);
1da177e4
LT
1279 }
1280
da3846a2 1281 resp->cstate.status = status;
e354d571
AA
1282 fh_put(&resp->cstate.current_fh);
1283 fh_put(&resp->cstate.save_fh);
1284 BUG_ON(resp->cstate.replay_owner);
1da177e4 1285out:
2f425878
AA
1286 /* Reset deferral mechanism for RPC deferrals */
1287 rqstp->rq_usedeferral = 1;
3b12cd98 1288 dprintk("nfsv4 compound returned %d\n", ntohl(status));
1da177e4
LT
1289 return status;
1290}
1291
58e7b33a
MJ
1292#define op_encode_hdr_size (2)
1293#define op_encode_stateid_maxsz (XDR_QUADLEN(NFS4_STATEID_SIZE))
1294#define op_encode_verifier_maxsz (XDR_QUADLEN(NFS4_VERIFIER_SIZE))
1295#define op_encode_change_info_maxsz (5)
1296#define nfs4_fattr_bitmap_maxsz (4)
1297
1298#define op_encode_lockowner_maxsz (1 + XDR_QUADLEN(IDMAP_NAMESZ))
1299#define op_encode_lock_denied_maxsz (8 + op_encode_lockowner_maxsz)
1300
1301#define nfs4_owner_maxsz (1 + XDR_QUADLEN(IDMAP_NAMESZ))
1302
1303#define op_encode_ace_maxsz (3 + nfs4_owner_maxsz)
1304#define op_encode_delegation_maxsz (1 + op_encode_stateid_maxsz + 1 + \
1305 op_encode_ace_maxsz)
1306
1307#define op_encode_channel_attrs_maxsz (6 + 1 + 1)
1308
1309static inline u32 nfsd4_only_status_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1310{
1311 return (op_encode_hdr_size) * sizeof(__be32);
1312}
1313
1314static inline u32 nfsd4_status_stateid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1315{
1316 return (op_encode_hdr_size + op_encode_stateid_maxsz)* sizeof(__be32);
1317}
1318
1319static inline u32 nfsd4_commit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1320{
1321 return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32);
1322}
1323
1324static inline u32 nfsd4_create_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1325{
1326 return (op_encode_hdr_size + op_encode_change_info_maxsz
1327 + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
1328}
1329
1330static inline u32 nfsd4_link_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1331{
1332 return (op_encode_hdr_size + op_encode_change_info_maxsz)
1333 * sizeof(__be32);
1334}
1335
1336static inline u32 nfsd4_lock_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1337{
1338 return (op_encode_hdr_size + op_encode_lock_denied_maxsz)
1339 * sizeof(__be32);
1340}
1341
1342static inline u32 nfsd4_open_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1343{
1344 return (op_encode_hdr_size + op_encode_stateid_maxsz
1345 + op_encode_change_info_maxsz + 1
1346 + nfs4_fattr_bitmap_maxsz
1347 + op_encode_delegation_maxsz) * sizeof(__be32);
1348}
1349
1350static inline u32 nfsd4_read_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1351{
1352 u32 maxcount = 0, rlen = 0;
1353
1354 maxcount = svc_max_payload(rqstp);
1355 rlen = op->u.read.rd_length;
1356
1357 if (rlen > maxcount)
1358 rlen = maxcount;
1359
1360 return (op_encode_hdr_size + 2) * sizeof(__be32) + rlen;
1361}
1362
1363static inline u32 nfsd4_readdir_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1364{
1365 u32 rlen = op->u.readdir.rd_maxcount;
1366
1367 if (rlen > PAGE_SIZE)
1368 rlen = PAGE_SIZE;
1369
1370 return (op_encode_hdr_size + op_encode_verifier_maxsz)
1371 * sizeof(__be32) + rlen;
1372}
1373
1374static inline u32 nfsd4_remove_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1375{
1376 return (op_encode_hdr_size + op_encode_change_info_maxsz)
1377 * sizeof(__be32);
1378}
1379
1380static inline u32 nfsd4_rename_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1381{
1382 return (op_encode_hdr_size + op_encode_change_info_maxsz
1383 + op_encode_change_info_maxsz) * sizeof(__be32);
1384}
1385
1386static inline u32 nfsd4_setattr_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1387{
1388 return (op_encode_hdr_size + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
1389}
1390
1391static inline u32 nfsd4_setclientid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1392{
1393 return (op_encode_hdr_size + 2 + 1024) * sizeof(__be32);
1394}
1395
1396static inline u32 nfsd4_write_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1397{
1398 return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32);
1399}
1400
1401static inline u32 nfsd4_exchange_id_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1402{
1403 return (op_encode_hdr_size + 2 + 1 + /* eir_clientid, eir_sequenceid */\
1404 1 + 1 + 0 + /* eir_flags, spr_how, SP4_NONE (for now) */\
1405 2 + /*eir_server_owner.so_minor_id */\
1406 /* eir_server_owner.so_major_id<> */\
1407 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
1408 /* eir_server_scope<> */\
1409 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
1410 1 + /* eir_server_impl_id array length */\
1411 0 /* ignored eir_server_impl_id contents */) * sizeof(__be32);
1412}
1413
1414static inline u32 nfsd4_bind_conn_to_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1415{
1416 return (op_encode_hdr_size + \
1417 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* bctsr_sessid */\
1418 2 /* bctsr_dir, use_conn_in_rdma_mode */) * sizeof(__be32);
1419}
1420
1421static inline u32 nfsd4_create_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1422{
1423 return (op_encode_hdr_size + \
1424 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* sessionid */\
1425 2 + /* csr_sequence, csr_flags */\
1426 op_encode_channel_attrs_maxsz + \
1427 op_encode_channel_attrs_maxsz) * sizeof(__be32);
1428}
1429
20766016 1430static struct nfsd4_operation nfsd4_ops[] = {
b591480b
BF
1431 [OP_ACCESS] = {
1432 .op_func = (nfsd4op_func)nfsd4_access,
b001a1b6 1433 .op_name = "OP_ACCESS",
b591480b
BF
1434 },
1435 [OP_CLOSE] = {
1436 .op_func = (nfsd4op_func)nfsd4_close,
58e7b33a 1437 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1438 .op_name = "OP_CLOSE",
58e7b33a 1439 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
8b70484c
TM
1440 .op_get_currentstateid = (stateid_getter)nfsd4_get_closestateid,
1441 .op_set_currentstateid = (stateid_setter)nfsd4_set_closestateid,
b591480b
BF
1442 },
1443 [OP_COMMIT] = {
1444 .op_func = (nfsd4op_func)nfsd4_commit,
58e7b33a 1445 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1446 .op_name = "OP_COMMIT",
58e7b33a 1447 .op_rsize_bop = (nfsd4op_rsize)nfsd4_commit_rsize,
b591480b
BF
1448 },
1449 [OP_CREATE] = {
1450 .op_func = (nfsd4op_func)nfsd4_create,
d1471053 1451 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME | OP_CLEAR_STATEID,
b001a1b6 1452 .op_name = "OP_CREATE",
58e7b33a 1453 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_rsize,
b591480b
BF
1454 },
1455 [OP_DELEGRETURN] = {
1456 .op_func = (nfsd4op_func)nfsd4_delegreturn,
58e7b33a 1457 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1458 .op_name = "OP_DELEGRETURN",
58e7b33a 1459 .op_rsize_bop = nfsd4_only_status_rsize,
9428fe1a 1460 .op_get_currentstateid = (stateid_getter)nfsd4_get_delegreturnstateid,
b591480b
BF
1461 },
1462 [OP_GETATTR] = {
1463 .op_func = (nfsd4op_func)nfsd4_getattr,
eeac294e 1464 .op_flags = ALLOWED_ON_ABSENT_FS,
b001a1b6 1465 .op_name = "OP_GETATTR",
b591480b
BF
1466 },
1467 [OP_GETFH] = {
1468 .op_func = (nfsd4op_func)nfsd4_getfh,
b001a1b6 1469 .op_name = "OP_GETFH",
b591480b
BF
1470 },
1471 [OP_LINK] = {
1472 .op_func = (nfsd4op_func)nfsd4_link,
c856694e
BF
1473 .op_flags = ALLOWED_ON_ABSENT_FS | OP_MODIFIES_SOMETHING
1474 | OP_CACHEME,
b001a1b6 1475 .op_name = "OP_LINK",
58e7b33a 1476 .op_rsize_bop = (nfsd4op_rsize)nfsd4_link_rsize,
b591480b
BF
1477 },
1478 [OP_LOCK] = {
1479 .op_func = (nfsd4op_func)nfsd4_lock,
58e7b33a 1480 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1481 .op_name = "OP_LOCK",
58e7b33a 1482 .op_rsize_bop = (nfsd4op_rsize)nfsd4_lock_rsize,
62cd4a59 1483 .op_set_currentstateid = (stateid_setter)nfsd4_set_lockstateid,
b591480b
BF
1484 },
1485 [OP_LOCKT] = {
1486 .op_func = (nfsd4op_func)nfsd4_lockt,
b001a1b6 1487 .op_name = "OP_LOCKT",
b591480b
BF
1488 },
1489 [OP_LOCKU] = {
1490 .op_func = (nfsd4op_func)nfsd4_locku,
58e7b33a 1491 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1492 .op_name = "OP_LOCKU",
58e7b33a 1493 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
62cd4a59 1494 .op_get_currentstateid = (stateid_getter)nfsd4_get_lockustateid,
b591480b
BF
1495 },
1496 [OP_LOOKUP] = {
1497 .op_func = (nfsd4op_func)nfsd4_lookup,
d1471053 1498 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
b001a1b6 1499 .op_name = "OP_LOOKUP",
b591480b
BF
1500 },
1501 [OP_LOOKUPP] = {
1502 .op_func = (nfsd4op_func)nfsd4_lookupp,
d1471053 1503 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
b001a1b6 1504 .op_name = "OP_LOOKUPP",
b591480b
BF
1505 },
1506 [OP_NVERIFY] = {
1507 .op_func = (nfsd4op_func)nfsd4_nverify,
b001a1b6 1508 .op_name = "OP_NVERIFY",
b591480b
BF
1509 },
1510 [OP_OPEN] = {
1511 .op_func = (nfsd4op_func)nfsd4_open,
58e7b33a 1512 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
b001a1b6 1513 .op_name = "OP_OPEN",
58e7b33a 1514 .op_rsize_bop = (nfsd4op_rsize)nfsd4_open_rsize,
8b70484c 1515 .op_set_currentstateid = (stateid_setter)nfsd4_set_openstateid,
b591480b
BF
1516 },
1517 [OP_OPEN_CONFIRM] = {
1518 .op_func = (nfsd4op_func)nfsd4_open_confirm,
58e7b33a 1519 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1520 .op_name = "OP_OPEN_CONFIRM",
58e7b33a 1521 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
b591480b
BF
1522 },
1523 [OP_OPEN_DOWNGRADE] = {
1524 .op_func = (nfsd4op_func)nfsd4_open_downgrade,
58e7b33a 1525 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1526 .op_name = "OP_OPEN_DOWNGRADE",
58e7b33a 1527 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
9428fe1a
TM
1528 .op_get_currentstateid = (stateid_getter)nfsd4_get_opendowngradestateid,
1529 .op_set_currentstateid = (stateid_setter)nfsd4_set_opendowngradestateid,
b591480b
BF
1530 },
1531 [OP_PUTFH] = {
1532 .op_func = (nfsd4op_func)nfsd4_putfh,
68d93184 1533 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
80e01cc1
TM
1534 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1535 | OP_CLEAR_STATEID,
b001a1b6 1536 .op_name = "OP_PUTFH",
58e7b33a 1537 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b 1538 },
eeac294e 1539 [OP_PUTPUBFH] = {
a1c8c4d1 1540 .op_func = (nfsd4op_func)nfsd4_putrootfh,
68d93184 1541 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
80e01cc1
TM
1542 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1543 | OP_CLEAR_STATEID,
b001a1b6 1544 .op_name = "OP_PUTPUBFH",
58e7b33a 1545 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
eeac294e 1546 },
b591480b
BF
1547 [OP_PUTROOTFH] = {
1548 .op_func = (nfsd4op_func)nfsd4_putrootfh,
68d93184 1549 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
80e01cc1
TM
1550 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1551 | OP_CLEAR_STATEID,
b001a1b6 1552 .op_name = "OP_PUTROOTFH",
58e7b33a 1553 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b
BF
1554 },
1555 [OP_READ] = {
1556 .op_func = (nfsd4op_func)nfsd4_read,
58e7b33a 1557 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1558 .op_name = "OP_READ",
58e7b33a 1559 .op_rsize_bop = (nfsd4op_rsize)nfsd4_read_rsize,
30813e27 1560 .op_get_currentstateid = (stateid_getter)nfsd4_get_readstateid,
b591480b
BF
1561 },
1562 [OP_READDIR] = {
1563 .op_func = (nfsd4op_func)nfsd4_readdir,
58e7b33a 1564 .op_flags = OP_MODIFIES_SOMETHING,
b001a1b6 1565 .op_name = "OP_READDIR",
58e7b33a 1566 .op_rsize_bop = (nfsd4op_rsize)nfsd4_readdir_rsize,
b591480b
BF
1567 },
1568 [OP_READLINK] = {
1569 .op_func = (nfsd4op_func)nfsd4_readlink,
b001a1b6 1570 .op_name = "OP_READLINK",
b591480b
BF
1571 },
1572 [OP_REMOVE] = {
1573 .op_func = (nfsd4op_func)nfsd4_remove,
c856694e 1574 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
b001a1b6 1575 .op_name = "OP_REMOVE",
58e7b33a 1576 .op_rsize_bop = (nfsd4op_rsize)nfsd4_remove_rsize,
b591480b
BF
1577 },
1578 [OP_RENAME] = {
1579 .op_func = (nfsd4op_func)nfsd4_rename,
c856694e 1580 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
58e7b33a 1581 .op_name = "OP_RENAME",
58e7b33a 1582 .op_rsize_bop = (nfsd4op_rsize)nfsd4_rename_rsize,
b591480b
BF
1583 },
1584 [OP_RENEW] = {
1585 .op_func = (nfsd4op_func)nfsd4_renew,
58e7b33a
MJ
1586 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1587 | OP_MODIFIES_SOMETHING,
b001a1b6 1588 .op_name = "OP_RENEW",
58e7b33a
MJ
1589 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1590
b591480b
BF
1591 },
1592 [OP_RESTOREFH] = {
1593 .op_func = (nfsd4op_func)nfsd4_restorefh,
68d93184 1594 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
58e7b33a 1595 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING,
b001a1b6 1596 .op_name = "OP_RESTOREFH",
58e7b33a 1597 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b
BF
1598 },
1599 [OP_SAVEFH] = {
1600 .op_func = (nfsd4op_func)nfsd4_savefh,
58e7b33a 1601 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
b001a1b6 1602 .op_name = "OP_SAVEFH",
58e7b33a 1603 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b 1604 },
dcb488a3
AA
1605 [OP_SECINFO] = {
1606 .op_func = (nfsd4op_func)nfsd4_secinfo,
68d93184 1607 .op_flags = OP_HANDLES_WRONGSEC,
b001a1b6 1608 .op_name = "OP_SECINFO",
dcb488a3 1609 },
b591480b
BF
1610 [OP_SETATTR] = {
1611 .op_func = (nfsd4op_func)nfsd4_setattr,
b001a1b6 1612 .op_name = "OP_SETATTR",
c856694e 1613 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
58e7b33a 1614 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setattr_rsize,
1e97b519 1615 .op_get_currentstateid = (stateid_getter)nfsd4_get_setattrstateid,
b591480b
BF
1616 },
1617 [OP_SETCLIENTID] = {
1618 .op_func = (nfsd4op_func)nfsd4_setclientid,
58e7b33a 1619 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
c856694e 1620 | OP_MODIFIES_SOMETHING | OP_CACHEME,
b001a1b6 1621 .op_name = "OP_SETCLIENTID",
58e7b33a 1622 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setclientid_rsize,
b591480b
BF
1623 },
1624 [OP_SETCLIENTID_CONFIRM] = {
1625 .op_func = (nfsd4op_func)nfsd4_setclientid_confirm,
58e7b33a 1626 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
c856694e 1627 | OP_MODIFIES_SOMETHING | OP_CACHEME,
b001a1b6 1628 .op_name = "OP_SETCLIENTID_CONFIRM",
58e7b33a 1629 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b
BF
1630 },
1631 [OP_VERIFY] = {
1632 .op_func = (nfsd4op_func)nfsd4_verify,
b001a1b6 1633 .op_name = "OP_VERIFY",
b591480b
BF
1634 },
1635 [OP_WRITE] = {
1636 .op_func = (nfsd4op_func)nfsd4_write,
c856694e 1637 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
b001a1b6 1638 .op_name = "OP_WRITE",
58e7b33a 1639 .op_rsize_bop = (nfsd4op_rsize)nfsd4_write_rsize,
30813e27 1640 .op_get_currentstateid = (stateid_getter)nfsd4_get_writestateid,
b591480b
BF
1641 },
1642 [OP_RELEASE_LOCKOWNER] = {
1643 .op_func = (nfsd4op_func)nfsd4_release_lockowner,
58e7b33a
MJ
1644 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1645 | OP_MODIFIES_SOMETHING,
b001a1b6 1646 .op_name = "OP_RELEASE_LOCKOWNER",
58e7b33a 1647 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
b591480b 1648 },
069b6ad4
AA
1649
1650 /* NFSv4.1 operations */
1651 [OP_EXCHANGE_ID] = {
1652 .op_func = (nfsd4op_func)nfsd4_exchange_id,
58e7b33a
MJ
1653 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1654 | OP_MODIFIES_SOMETHING,
069b6ad4 1655 .op_name = "OP_EXCHANGE_ID",
58e7b33a 1656 .op_rsize_bop = (nfsd4op_rsize)nfsd4_exchange_id_rsize,
069b6ad4 1657 },
1d1bc8f2
BF
1658 [OP_BIND_CONN_TO_SESSION] = {
1659 .op_func = (nfsd4op_func)nfsd4_bind_conn_to_session,
58e7b33a
MJ
1660 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1661 | OP_MODIFIES_SOMETHING,
1d1bc8f2 1662 .op_name = "OP_BIND_CONN_TO_SESSION",
58e7b33a 1663 .op_rsize_bop = (nfsd4op_rsize)nfsd4_bind_conn_to_session_rsize,
1d1bc8f2 1664 },
069b6ad4
AA
1665 [OP_CREATE_SESSION] = {
1666 .op_func = (nfsd4op_func)nfsd4_create_session,
58e7b33a
MJ
1667 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1668 | OP_MODIFIES_SOMETHING,
069b6ad4 1669 .op_name = "OP_CREATE_SESSION",
58e7b33a 1670 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_session_rsize,
069b6ad4
AA
1671 },
1672 [OP_DESTROY_SESSION] = {
1673 .op_func = (nfsd4op_func)nfsd4_destroy_session,
58e7b33a
MJ
1674 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1675 | OP_MODIFIES_SOMETHING,
069b6ad4 1676 .op_name = "OP_DESTROY_SESSION",
58e7b33a 1677 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
069b6ad4
AA
1678 },
1679 [OP_SEQUENCE] = {
1680 .op_func = (nfsd4op_func)nfsd4_sequence,
f9bb94c4 1681 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP,
069b6ad4
AA
1682 .op_name = "OP_SEQUENCE",
1683 },
094b5d74 1684 [OP_DESTROY_CLIENTID] = {
345c2842 1685 .op_func = (nfsd4op_func)nfsd4_destroy_clientid,
58e7b33a
MJ
1686 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1687 | OP_MODIFIES_SOMETHING,
094b5d74 1688 .op_name = "OP_DESTROY_CLIENTID",
58e7b33a 1689 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
094b5d74 1690 },
4dc6ec00
BF
1691 [OP_RECLAIM_COMPLETE] = {
1692 .op_func = (nfsd4op_func)nfsd4_reclaim_complete,
58e7b33a 1693 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
4dc6ec00 1694 .op_name = "OP_RECLAIM_COMPLETE",
58e7b33a 1695 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
4dc6ec00 1696 },
04f4ad16
BF
1697 [OP_SECINFO_NO_NAME] = {
1698 .op_func = (nfsd4op_func)nfsd4_secinfo_no_name,
68d93184 1699 .op_flags = OP_HANDLES_WRONGSEC,
04f4ad16
BF
1700 .op_name = "OP_SECINFO_NO_NAME",
1701 },
17456804
BS
1702 [OP_TEST_STATEID] = {
1703 .op_func = (nfsd4op_func)nfsd4_test_stateid,
1704 .op_flags = ALLOWED_WITHOUT_FH,
1705 .op_name = "OP_TEST_STATEID",
1706 },
e1ca12df
BS
1707 [OP_FREE_STATEID] = {
1708 .op_func = (nfsd4op_func)nfsd4_free_stateid,
58e7b33a 1709 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
e1ca12df 1710 .op_name = "OP_FREE_STATEID",
58e7b33a 1711 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
e1ca12df 1712 },
b591480b
BF
1713};
1714
f1c7f79b 1715static const char *nfsd4_op_name(unsigned opnum)
b001a1b6
BH
1716{
1717 if (opnum < ARRAY_SIZE(nfsd4_ops))
1718 return nfsd4_ops[opnum].op_name;
1719 return "unknown_operation";
1720}
1721
1da177e4 1722#define nfsd4_voidres nfsd4_voidargs
1da177e4
LT
1723struct nfsd4_voidargs { int dummy; };
1724
1da177e4 1725static struct svc_procedure nfsd_procedures4[2] = {
0a93a47f
YZ
1726 [NFSPROC4_NULL] = {
1727 .pc_func = (svc_procfunc) nfsd4_proc_null,
1728 .pc_encode = (kxdrproc_t) nfs4svc_encode_voidres,
1729 .pc_argsize = sizeof(struct nfsd4_voidargs),
1730 .pc_ressize = sizeof(struct nfsd4_voidres),
1731 .pc_cachetype = RC_NOCACHE,
1732 .pc_xdrressize = 1,
1733 },
1734 [NFSPROC4_COMPOUND] = {
1735 .pc_func = (svc_procfunc) nfsd4_proc_compound,
1736 .pc_decode = (kxdrproc_t) nfs4svc_decode_compoundargs,
1737 .pc_encode = (kxdrproc_t) nfs4svc_encode_compoundres,
1738 .pc_argsize = sizeof(struct nfsd4_compoundargs),
1739 .pc_ressize = sizeof(struct nfsd4_compoundres),
3e98abff 1740 .pc_release = nfsd4_release_compoundargs,
0a93a47f
YZ
1741 .pc_cachetype = RC_NOCACHE,
1742 .pc_xdrressize = NFSD_BUFSIZE/4,
1743 },
1da177e4
LT
1744};
1745
1746struct svc_version nfsd_version4 = {
1747 .vs_vers = 4,
1748 .vs_nproc = 2,
1749 .vs_proc = nfsd_procedures4,
1750 .vs_dispatch = nfsd_dispatch,
1751 .vs_xdrsize = NFS4_SVC_XDRSIZE,
1752};
1753
1754/*
1755 * Local variables:
1756 * c-basic-offset: 8
1757 * End:
1758 */