]> git.ipfire.org Git - people/ms/linux.git/blame - fs/nfsd/nfs4proc.c
[PATCH] knfsd: nfsd4: make verify and nverify wrappers
[people/ms/linux.git] / fs / nfsd / nfs4proc.c
CommitLineData
1da177e4
LT
1/*
2 * fs/nfsd/nfs4proc.c
3 *
4 * Server-side procedures for NFSv4.
5 *
6 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * All rights reserved.
8 *
9 * Kendrick Smith <kmsmith@umich.edu>
10 * Andy Adamson <andros@umich.edu>
11 *
12 * Redistribution and use in source and binary forms, with or without
13 * modification, are permitted provided that the following conditions
14 * are met:
15 *
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. Neither the name of the University nor the names of its
22 * contributors may be used to endorse or promote products derived
23 * from this software without specific prior written permission.
24 *
25 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
26 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
27 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
28 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
30 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
31 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
32 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1da177e4
LT
36 */
37
38#include <linux/param.h>
39#include <linux/major.h>
40#include <linux/slab.h>
7e06b7f9 41#include <linux/file.h>
1da177e4
LT
42
43#include <linux/sunrpc/svc.h>
44#include <linux/nfsd/nfsd.h>
45#include <linux/nfsd/cache.h>
46#include <linux/nfs4.h>
47#include <linux/nfsd/state.h>
48#include <linux/nfsd/xdr4.h>
49#include <linux/nfs4_acl.h>
50
51#define NFSDDBG_FACILITY NFSDDBG_PROC
52
53static inline void
54fh_dup2(struct svc_fh *dst, struct svc_fh *src)
55{
56 fh_put(dst);
57 dget(src->fh_dentry);
58 if (src->fh_export)
59 cache_get(&src->fh_export->h);
60 *dst = *src;
61}
62
b37ad28b 63static __be32
dc730e17 64do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
1da177e4 65{
b37ad28b 66 __be32 status;
1da177e4
LT
67
68 if (open->op_truncate &&
69 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
70 return nfserr_inval;
71
1da177e4 72 if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
dc730e17 73 accmode |= MAY_READ;
9801d8a3 74 if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
1da177e4 75 accmode |= (MAY_WRITE | MAY_TRUNC);
9801d8a3
BF
76 if (open->op_share_deny & NFS4_SHARE_DENY_WRITE)
77 accmode |= MAY_WRITE;
1da177e4
LT
78
79 status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
80
81 return status;
82}
83
b37ad28b 84static __be32
1da177e4
LT
85do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
86{
87 struct svc_fh resfh;
b37ad28b 88 __be32 status;
81ac95c5 89 int created = 0;
1da177e4
LT
90
91 fh_init(&resfh, NFS4_FHSIZE);
92 open->op_truncate = 0;
93
94 if (open->op_create) {
95 /*
96 * Note: create modes (UNCHECKED,GUARDED...) are the same
97 * in NFSv4 as in v3.
98 */
99 status = nfsd_create_v3(rqstp, current_fh, open->op_fname.data,
100 open->op_fname.len, &open->op_iattr,
101 &resfh, open->op_createmode,
81ac95c5 102 (u32 *)open->op_verf.data, &open->op_truncate, &created);
af85852d 103 } else {
1da177e4
LT
104 status = nfsd_lookup(rqstp, current_fh,
105 open->op_fname.data, open->op_fname.len, &resfh);
106 fh_unlock(current_fh);
107 }
af85852d
BF
108 if (status)
109 goto out;
1da177e4 110
af85852d 111 set_change_info(&open->op_cinfo, current_fh);
1da177e4 112
af85852d
BF
113 /* set reply cache */
114 fh_dup2(current_fh, &resfh);
115 open->op_stateowner->so_replay.rp_openfh_len = resfh.fh_handle.fh_size;
116 memcpy(open->op_stateowner->so_replay.rp_openfh,
117 &resfh.fh_handle.fh_base, resfh.fh_handle.fh_size);
1da177e4 118
81ac95c5
BF
119 if (!created)
120 status = do_open_permission(rqstp, current_fh, open, MAY_NOP);
1da177e4 121
af85852d 122out:
1da177e4
LT
123 fh_put(&resfh);
124 return status;
125}
126
b37ad28b 127static __be32
1da177e4
LT
128do_open_fhandle(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
129{
b37ad28b 130 __be32 status;
1da177e4
LT
131
132 /* Only reclaims from previously confirmed clients are valid */
133 if ((status = nfs4_check_open_reclaim(&open->op_clientid)))
134 return status;
135
136 /* We don't know the target directory, and therefore can not
137 * set the change info
138 */
139
140 memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
141
142 /* set replay cache */
143 open->op_stateowner->so_replay.rp_openfh_len = current_fh->fh_handle.fh_size;
144 memcpy(open->op_stateowner->so_replay.rp_openfh,
145 &current_fh->fh_handle.fh_base,
146 current_fh->fh_handle.fh_size);
147
148 open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
149 (open->op_iattr.ia_size == 0);
150
dc730e17 151 status = do_open_permission(rqstp, current_fh, open, MAY_OWNER_OVERRIDE);
1da177e4
LT
152
153 return status;
154}
155
156
7191155b 157static __be32
ca364317 158nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
a4f1706a 159 struct nfsd4_open *open)
1da177e4 160{
b37ad28b 161 __be32 status;
1da177e4
LT
162 dprintk("NFSD: nfsd4_open filename %.*s op_stateowner %p\n",
163 (int)open->op_fname.len, open->op_fname.data,
164 open->op_stateowner);
165
1da177e4
LT
166 /* This check required by spec. */
167 if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
168 return nfserr_inval;
169
170 nfs4_lock_state();
171
172 /* check seqid for replay. set nfs4_owner */
173 status = nfsd4_process_open1(open);
a90b061c 174 if (status == nfserr_replay_me) {
1da177e4 175 struct nfs4_replay *rp = &open->op_stateowner->so_replay;
ca364317
BF
176 fh_put(&cstate->current_fh);
177 cstate->current_fh.fh_handle.fh_size = rp->rp_openfh_len;
178 memcpy(&cstate->current_fh.fh_handle.fh_base, rp->rp_openfh,
1da177e4 179 rp->rp_openfh_len);
ca364317 180 status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
1da177e4
LT
181 if (status)
182 dprintk("nfsd4_open: replay failed"
183 " restoring previous filehandle\n");
184 else
a90b061c 185 status = nfserr_replay_me;
1da177e4
LT
186 }
187 if (status)
188 goto out;
fb553c0f
BF
189
190 /* Openowner is now set, so sequence id will get bumped. Now we need
191 * these checks before we do any creates: */
cbd0d51a 192 status = nfserr_grace;
fb553c0f 193 if (nfs4_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
cbd0d51a
BF
194 goto out;
195 status = nfserr_no_grace;
fb553c0f 196 if (!nfs4_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
cbd0d51a 197 goto out;
fb553c0f 198
1da177e4 199 switch (open->op_claim_type) {
0dd3c192
N
200 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
201 status = nfserr_inval;
202 if (open->op_create)
203 goto out;
204 /* fall through */
1da177e4
LT
205 case NFS4_OPEN_CLAIM_NULL:
206 /*
207 * (1) set CURRENT_FH to the file being opened,
208 * creating it if necessary, (2) set open->op_cinfo,
209 * (3) set open->op_truncate if the file is to be
210 * truncated after opening, (4) do permission checking.
211 */
ca364317
BF
212 status = do_open_lookup(rqstp, &cstate->current_fh,
213 open);
1da177e4
LT
214 if (status)
215 goto out;
216 break;
217 case NFS4_OPEN_CLAIM_PREVIOUS:
a525825d 218 open->op_stateowner->so_confirmed = 1;
1da177e4
LT
219 /*
220 * The CURRENT_FH is already set to the file being
221 * opened. (1) set open->op_cinfo, (2) set
222 * open->op_truncate if the file is to be truncated
223 * after opening, (3) do permission checking.
224 */
ca364317
BF
225 status = do_open_fhandle(rqstp, &cstate->current_fh,
226 open);
1da177e4
LT
227 if (status)
228 goto out;
229 break;
1da177e4 230 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
a525825d 231 open->op_stateowner->so_confirmed = 1;
1da177e4
LT
232 printk("NFSD: unsupported OPEN claim type %d\n",
233 open->op_claim_type);
234 status = nfserr_notsupp;
235 goto out;
236 default:
237 printk("NFSD: Invalid OPEN claim type %d\n",
238 open->op_claim_type);
239 status = nfserr_inval;
240 goto out;
241 }
242 /*
243 * nfsd4_process_open2() does the actual opening of the file. If
244 * successful, it (1) truncates the file if open->op_truncate was
245 * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
246 */
ca364317 247 status = nfsd4_process_open2(rqstp, &cstate->current_fh, open);
1da177e4 248out:
f2327d9a 249 if (open->op_stateowner) {
1da177e4 250 nfs4_get_stateowner(open->op_stateowner);
a4f1706a 251 cstate->replay_owner = open->op_stateowner;
f2327d9a 252 }
1da177e4
LT
253 nfs4_unlock_state();
254 return status;
255}
256
257/*
258 * filehandle-manipulating ops.
259 */
7191155b 260static __be32
ca364317 261nfsd4_getfh(struct nfsd4_compound_state *cstate, struct svc_fh **getfh)
1da177e4 262{
ca364317 263 if (!cstate->current_fh.fh_dentry)
1da177e4
LT
264 return nfserr_nofilehandle;
265
ca364317 266 *getfh = &cstate->current_fh;
1da177e4
LT
267 return nfs_ok;
268}
269
7191155b 270static __be32
ca364317
BF
271nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
272 struct nfsd4_putfh *putfh)
1da177e4 273{
ca364317
BF
274 fh_put(&cstate->current_fh);
275 cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
276 memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
277 putfh->pf_fhlen);
278 return fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
1da177e4
LT
279}
280
7191155b 281static __be32
ca364317 282nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
1da177e4 283{
b37ad28b 284 __be32 status;
1da177e4 285
ca364317
BF
286 fh_put(&cstate->current_fh);
287 status = exp_pseudoroot(rqstp->rq_client, &cstate->current_fh,
1da177e4 288 &rqstp->rq_chandle);
1da177e4
LT
289 return status;
290}
291
7191155b 292static __be32
ca364317 293nfsd4_restorefh(struct nfsd4_compound_state *cstate)
1da177e4 294{
ca364317 295 if (!cstate->save_fh.fh_dentry)
1da177e4
LT
296 return nfserr_restorefh;
297
ca364317 298 fh_dup2(&cstate->current_fh, &cstate->save_fh);
1da177e4
LT
299 return nfs_ok;
300}
301
7191155b 302static __be32
ca364317 303nfsd4_savefh(struct nfsd4_compound_state *cstate)
1da177e4 304{
ca364317 305 if (!cstate->current_fh.fh_dentry)
1da177e4
LT
306 return nfserr_nofilehandle;
307
ca364317 308 fh_dup2(&cstate->save_fh, &cstate->current_fh);
1da177e4
LT
309 return nfs_ok;
310}
311
312/*
313 * misc nfsv4 ops
314 */
7191155b 315static __be32
ca364317
BF
316nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
317 struct nfsd4_access *access)
1da177e4
LT
318{
319 if (access->ac_req_access & ~NFS3_ACCESS_FULL)
320 return nfserr_inval;
321
322 access->ac_resp_access = access->ac_req_access;
ca364317
BF
323 return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
324 &access->ac_supported);
1da177e4
LT
325}
326
7191155b 327static __be32
ca364317
BF
328nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
329 struct nfsd4_commit *commit)
1da177e4 330{
b37ad28b 331 __be32 status;
1da177e4
LT
332
333 u32 *p = (u32 *)commit->co_verf.data;
334 *p++ = nfssvc_boot.tv_sec;
335 *p++ = nfssvc_boot.tv_usec;
336
ca364317
BF
337 status = nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
338 commit->co_count);
1da177e4
LT
339 if (status == nfserr_symlink)
340 status = nfserr_inval;
341 return status;
342}
343
b37ad28b 344static __be32
ca364317
BF
345nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
346 struct nfsd4_create *create)
1da177e4
LT
347{
348 struct svc_fh resfh;
b37ad28b 349 __be32 status;
1da177e4
LT
350 dev_t rdev;
351
352 fh_init(&resfh, NFS4_FHSIZE);
353
ca364317 354 status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, MAY_CREATE);
1da177e4
LT
355 if (status == nfserr_symlink)
356 status = nfserr_notdir;
357 if (status)
358 return status;
359
360 switch (create->cr_type) {
361 case NF4LNK:
362 /* ugh! we have to null-terminate the linktext, or
363 * vfs_symlink() will choke. it is always safe to
364 * null-terminate by brute force, since at worst we
365 * will overwrite the first byte of the create namelen
366 * in the XDR buffer, which has already been extracted
367 * during XDR decode.
368 */
369 create->cr_linkname[create->cr_linklen] = 0;
370
ca364317
BF
371 status = nfsd_symlink(rqstp, &cstate->current_fh,
372 create->cr_name, create->cr_namelen,
373 create->cr_linkname, create->cr_linklen,
374 &resfh, &create->cr_iattr);
1da177e4
LT
375 break;
376
377 case NF4BLK:
378 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
379 if (MAJOR(rdev) != create->cr_specdata1 ||
380 MINOR(rdev) != create->cr_specdata2)
381 return nfserr_inval;
ca364317
BF
382 status = nfsd_create(rqstp, &cstate->current_fh,
383 create->cr_name, create->cr_namelen,
384 &create->cr_iattr, S_IFBLK, rdev, &resfh);
1da177e4
LT
385 break;
386
387 case NF4CHR:
388 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
389 if (MAJOR(rdev) != create->cr_specdata1 ||
390 MINOR(rdev) != create->cr_specdata2)
391 return nfserr_inval;
ca364317
BF
392 status = nfsd_create(rqstp, &cstate->current_fh,
393 create->cr_name, create->cr_namelen,
394 &create->cr_iattr,S_IFCHR, rdev, &resfh);
1da177e4
LT
395 break;
396
397 case NF4SOCK:
ca364317
BF
398 status = nfsd_create(rqstp, &cstate->current_fh,
399 create->cr_name, create->cr_namelen,
400 &create->cr_iattr, S_IFSOCK, 0, &resfh);
1da177e4
LT
401 break;
402
403 case NF4FIFO:
ca364317
BF
404 status = nfsd_create(rqstp, &cstate->current_fh,
405 create->cr_name, create->cr_namelen,
406 &create->cr_iattr, S_IFIFO, 0, &resfh);
1da177e4
LT
407 break;
408
409 case NF4DIR:
410 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
ca364317
BF
411 status = nfsd_create(rqstp, &cstate->current_fh,
412 create->cr_name, create->cr_namelen,
413 &create->cr_iattr, S_IFDIR, 0, &resfh);
1da177e4
LT
414 break;
415
416 default:
417 status = nfserr_badtype;
418 }
419
420 if (!status) {
ca364317
BF
421 fh_unlock(&cstate->current_fh);
422 set_change_info(&create->cr_cinfo, &cstate->current_fh);
423 fh_dup2(&cstate->current_fh, &resfh);
1da177e4
LT
424 }
425
426 fh_put(&resfh);
427 return status;
428}
429
7191155b 430static __be32
ca364317
BF
431nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
432 struct nfsd4_getattr *getattr)
1da177e4 433{
b37ad28b 434 __be32 status;
1da177e4 435
ca364317 436 status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
1da177e4
LT
437 if (status)
438 return status;
439
440 if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
441 return nfserr_inval;
442
443 getattr->ga_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
444 getattr->ga_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
445
ca364317 446 getattr->ga_fhp = &cstate->current_fh;
1da177e4
LT
447 return nfs_ok;
448}
449
7191155b 450static __be32
ca364317
BF
451nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
452 struct nfsd4_link *link)
1da177e4 453{
b37ad28b 454 __be32 status = nfserr_nofilehandle;
1da177e4 455
ca364317 456 if (!cstate->save_fh.fh_dentry)
1da177e4 457 return status;
ca364317
BF
458 status = nfsd_link(rqstp, &cstate->current_fh,
459 link->li_name, link->li_namelen, &cstate->save_fh);
1da177e4 460 if (!status)
ca364317 461 set_change_info(&link->li_cinfo, &cstate->current_fh);
1da177e4
LT
462 return status;
463}
464
b37ad28b 465static __be32
ca364317 466nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate)
1da177e4
LT
467{
468 struct svc_fh tmp_fh;
b37ad28b 469 __be32 ret;
1da177e4
LT
470
471 fh_init(&tmp_fh, NFS4_FHSIZE);
472 if((ret = exp_pseudoroot(rqstp->rq_client, &tmp_fh,
473 &rqstp->rq_chandle)) != 0)
474 return ret;
ca364317 475 if (tmp_fh.fh_dentry == cstate->current_fh.fh_dentry) {
1da177e4
LT
476 fh_put(&tmp_fh);
477 return nfserr_noent;
478 }
479 fh_put(&tmp_fh);
ca364317
BF
480 return nfsd_lookup(rqstp, &cstate->current_fh,
481 "..", 2, &cstate->current_fh);
1da177e4
LT
482}
483
7191155b 484static __be32
ca364317
BF
485nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
486 struct nfsd4_lookup *lookup)
1da177e4 487{
ca364317
BF
488 return nfsd_lookup(rqstp, &cstate->current_fh,
489 lookup->lo_name, lookup->lo_len,
490 &cstate->current_fh);
1da177e4
LT
491}
492
7191155b 493static __be32
ca364317
BF
494nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
495 struct nfsd4_read *read)
1da177e4 496{
b37ad28b 497 __be32 status;
1da177e4
LT
498
499 /* no need to check permission - this will be done in nfsd_read() */
500
7e06b7f9 501 read->rd_filp = NULL;
1da177e4
LT
502 if (read->rd_offset >= OFFSET_MAX)
503 return nfserr_inval;
504
505 nfs4_lock_state();
506 /* check stateid */
ca364317
BF
507 if ((status = nfs4_preprocess_stateid_op(&cstate->current_fh,
508 &read->rd_stateid,
7e06b7f9 509 CHECK_FH | RD_STATE, &read->rd_filp))) {
1da177e4
LT
510 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
511 goto out;
512 }
7e06b7f9
N
513 if (read->rd_filp)
514 get_file(read->rd_filp);
1da177e4
LT
515 status = nfs_ok;
516out:
517 nfs4_unlock_state();
518 read->rd_rqstp = rqstp;
ca364317 519 read->rd_fhp = &cstate->current_fh;
1da177e4
LT
520 return status;
521}
522
7191155b 523static __be32
ca364317
BF
524nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
525 struct nfsd4_readdir *readdir)
1da177e4
LT
526{
527 u64 cookie = readdir->rd_cookie;
528 static const nfs4_verifier zeroverf;
529
530 /* no need to check permission - this will be done in nfsd_readdir() */
531
532 if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
533 return nfserr_inval;
534
535 readdir->rd_bmval[0] &= NFSD_SUPPORTED_ATTRS_WORD0;
536 readdir->rd_bmval[1] &= NFSD_SUPPORTED_ATTRS_WORD1;
537
538 if ((cookie > ~(u32)0) || (cookie == 1) || (cookie == 2) ||
539 (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
540 return nfserr_bad_cookie;
541
542 readdir->rd_rqstp = rqstp;
ca364317 543 readdir->rd_fhp = &cstate->current_fh;
1da177e4
LT
544 return nfs_ok;
545}
546
7191155b 547static __be32
ca364317
BF
548nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
549 struct nfsd4_readlink *readlink)
1da177e4
LT
550{
551 readlink->rl_rqstp = rqstp;
ca364317 552 readlink->rl_fhp = &cstate->current_fh;
1da177e4
LT
553 return nfs_ok;
554}
555
7191155b 556static __be32
ca364317
BF
557nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
558 struct nfsd4_remove *remove)
1da177e4 559{
b37ad28b 560 __be32 status;
1da177e4 561
c815afc7
N
562 if (nfs4_in_grace())
563 return nfserr_grace;
ca364317
BF
564 status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
565 remove->rm_name, remove->rm_namelen);
1da177e4
LT
566 if (status == nfserr_symlink)
567 return nfserr_notdir;
568 if (!status) {
ca364317
BF
569 fh_unlock(&cstate->current_fh);
570 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
1da177e4
LT
571 }
572 return status;
573}
574
7191155b 575static __be32
ca364317
BF
576nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
577 struct nfsd4_rename *rename)
1da177e4 578{
b37ad28b 579 __be32 status = nfserr_nofilehandle;
1da177e4 580
ca364317 581 if (!cstate->save_fh.fh_dentry)
1da177e4 582 return status;
ca364317 583 if (nfs4_in_grace() && !(cstate->save_fh.fh_export->ex_flags
c815afc7
N
584 & NFSEXP_NOSUBTREECHECK))
585 return nfserr_grace;
ca364317
BF
586 status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
587 rename->rn_snamelen, &cstate->current_fh,
1da177e4
LT
588 rename->rn_tname, rename->rn_tnamelen);
589
590 /* the underlying filesystem returns different error's than required
591 * by NFSv4. both save_fh and current_fh have been verified.. */
592 if (status == nfserr_isdir)
593 status = nfserr_exist;
594 else if ((status == nfserr_notdir) &&
ca364317
BF
595 (S_ISDIR(cstate->save_fh.fh_dentry->d_inode->i_mode) &&
596 S_ISDIR(cstate->current_fh.fh_dentry->d_inode->i_mode)))
1da177e4
LT
597 status = nfserr_exist;
598 else if (status == nfserr_symlink)
599 status = nfserr_notdir;
600
601 if (!status) {
ca364317
BF
602 set_change_info(&rename->rn_sinfo, &cstate->current_fh);
603 set_change_info(&rename->rn_tinfo, &cstate->save_fh);
1da177e4
LT
604 }
605 return status;
606}
607
7191155b 608static __be32
ca364317
BF
609nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
610 struct nfsd4_setattr *setattr)
1da177e4 611{
b37ad28b 612 __be32 status = nfs_ok;
1da177e4 613
1da177e4
LT
614 if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
615 nfs4_lock_state();
ca364317 616 status = nfs4_preprocess_stateid_op(&cstate->current_fh,
375c5547 617 &setattr->sa_stateid, CHECK_FH | WR_STATE, NULL);
1da177e4 618 nfs4_unlock_state();
375c5547 619 if (status) {
3e3b4800 620 dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
375c5547
BF
621 return status;
622 }
1da177e4
LT
623 }
624 status = nfs_ok;
625 if (setattr->sa_acl != NULL)
ca364317
BF
626 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
627 setattr->sa_acl);
1da177e4 628 if (status)
375c5547 629 return status;
ca364317 630 status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
1da177e4 631 0, (time_t)0);
1da177e4
LT
632 return status;
633}
634
7191155b 635static __be32
ca364317
BF
636nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
637 struct nfsd4_write *write)
1da177e4
LT
638{
639 stateid_t *stateid = &write->wr_stateid;
640 struct file *filp = NULL;
641 u32 *p;
b37ad28b 642 __be32 status = nfs_ok;
1da177e4
LT
643
644 /* no need to check permission - this will be done in nfsd_write() */
645
646 if (write->wr_offset >= OFFSET_MAX)
647 return nfserr_inval;
648
649 nfs4_lock_state();
ca364317 650 status = nfs4_preprocess_stateid_op(&cstate->current_fh, stateid,
375c5547 651 CHECK_FH | WR_STATE, &filp);
7e06b7f9
N
652 if (filp)
653 get_file(filp);
1da177e4
LT
654 nfs4_unlock_state();
655
375c5547
BF
656 if (status) {
657 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
658 return status;
659 }
660
1da177e4
LT
661 write->wr_bytes_written = write->wr_buflen;
662 write->wr_how_written = write->wr_stable_how;
663 p = (u32 *)write->wr_verifier.data;
664 *p++ = nfssvc_boot.tv_sec;
665 *p++ = nfssvc_boot.tv_usec;
666
ca364317
BF
667 status = nfsd_write(rqstp, &cstate->current_fh, filp,
668 write->wr_offset, rqstp->rq_vec, write->wr_vlen,
669 write->wr_buflen, &write->wr_how_written);
7e06b7f9
N
670 if (filp)
671 fput(filp);
1da177e4
LT
672
673 if (status == nfserr_symlink)
674 status = nfserr_inval;
675 return status;
1da177e4
LT
676}
677
678/* This routine never returns NFS_OK! If there are no other errors, it
679 * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
680 * attributes matched. VERIFY is implemented by mapping NFSERR_SAME
681 * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
682 */
b37ad28b 683static __be32
c954e2a5 684_nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
ca364317 685 struct nfsd4_verify *verify)
1da177e4 686{
2ebbc012 687 __be32 *buf, *p;
1da177e4 688 int count;
b37ad28b 689 __be32 status;
1da177e4 690
ca364317 691 status = fh_verify(rqstp, &cstate->current_fh, 0, MAY_NOP);
1da177e4
LT
692 if (status)
693 return status;
694
695 if ((verify->ve_bmval[0] & ~NFSD_SUPPORTED_ATTRS_WORD0)
696 || (verify->ve_bmval[1] & ~NFSD_SUPPORTED_ATTRS_WORD1))
697 return nfserr_attrnotsupp;
698 if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
699 || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
700 return nfserr_inval;
701 if (verify->ve_attrlen & 3)
702 return nfserr_inval;
703
704 /* count in words:
705 * bitmap_len(1) + bitmap(2) + attr_len(1) = 4
706 */
707 count = 4 + (verify->ve_attrlen >> 2);
708 buf = kmalloc(count << 2, GFP_KERNEL);
709 if (!buf)
710 return nfserr_resource;
711
ca364317
BF
712 status = nfsd4_encode_fattr(&cstate->current_fh,
713 cstate->current_fh.fh_export,
714 cstate->current_fh.fh_dentry, buf,
1da177e4
LT
715 &count, verify->ve_bmval,
716 rqstp);
717
718 /* this means that nfsd4_encode_fattr() ran out of space */
719 if (status == nfserr_resource && count == 0)
720 status = nfserr_not_same;
721 if (status)
722 goto out_kfree;
723
724 p = buf + 3;
725 status = nfserr_not_same;
726 if (ntohl(*p++) != verify->ve_attrlen)
727 goto out_kfree;
728 if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
729 status = nfserr_same;
730
731out_kfree:
732 kfree(buf);
733 return status;
734}
735
c954e2a5
BF
736static __be32
737nfsd4_nverify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
738 struct nfsd4_verify *verify)
739{
740 __be32 status;
741
742 status = _nfsd4_verify(rqstp, cstate, verify);
743 return status == nfserr_not_same ? nfs_ok : status;
744}
745
746static __be32
747nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
748 struct nfsd4_verify *verify)
749{
750 __be32 status;
751
752 status = _nfsd4_verify(rqstp, cstate, verify);
753 return status == nfserr_same ? nfs_ok : status;
754}
755
1da177e4
LT
756/*
757 * NULL call.
758 */
7111c66e 759static __be32
1da177e4
LT
760nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
761{
762 return nfs_ok;
763}
764
e2b20950
SA
765static inline void nfsd4_increment_op_stats(u32 opnum)
766{
767 if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
768 nfsdstats.nfs4_opcount[opnum]++;
769}
770
ca364317
BF
771static void cstate_free(struct nfsd4_compound_state *cstate)
772{
773 if (cstate == NULL)
774 return;
775 fh_put(&cstate->current_fh);
776 fh_put(&cstate->save_fh);
a4f1706a 777 BUG_ON(cstate->replay_owner);
ca364317
BF
778 kfree(cstate);
779}
780
781static struct nfsd4_compound_state *cstate_alloc(void)
782{
783 struct nfsd4_compound_state *cstate;
784
785 cstate = kmalloc(sizeof(struct nfsd4_compound_state), GFP_KERNEL);
786 if (cstate == NULL)
787 return NULL;
788 fh_init(&cstate->current_fh, NFS4_FHSIZE);
789 fh_init(&cstate->save_fh, NFS4_FHSIZE);
a4f1706a 790 cstate->replay_owner = NULL;
ca364317
BF
791 return cstate;
792}
1da177e4
LT
793
794/*
795 * COMPOUND call.
796 */
7111c66e 797static __be32
1da177e4
LT
798nfsd4_proc_compound(struct svc_rqst *rqstp,
799 struct nfsd4_compoundargs *args,
800 struct nfsd4_compoundres *resp)
801{
802 struct nfsd4_op *op;
ca364317 803 struct nfsd4_compound_state *cstate = NULL;
e5710199 804 int slack_bytes;
b37ad28b 805 __be32 status;
1da177e4
LT
806
807 status = nfserr_resource;
ca364317
BF
808 cstate = cstate_alloc();
809 if (cstate == NULL)
1da177e4 810 goto out;
1da177e4
LT
811
812 resp->xbuf = &rqstp->rq_res;
813 resp->p = rqstp->rq_res.head[0].iov_base + rqstp->rq_res.head[0].iov_len;
814 resp->tagp = resp->p;
815 /* reserve space for: taglen, tag, and opcnt */
816 resp->p += 2 + XDR_QUADLEN(args->taglen);
817 resp->end = rqstp->rq_res.head[0].iov_base + PAGE_SIZE;
818 resp->taglen = args->taglen;
819 resp->tag = args->tag;
820 resp->opcnt = 0;
821 resp->rqstp = rqstp;
822
823 /*
824 * According to RFC3010, this takes precedence over all other errors.
825 */
826 status = nfserr_minor_vers_mismatch;
827 if (args->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
828 goto out;
829
830 status = nfs_ok;
831 while (!status && resp->opcnt < args->opcnt) {
832 op = &args->ops[resp->opcnt++];
833
fd445277
BF
834 dprintk("nfsv4 compound op #%d: %d\n", resp->opcnt, op->opnum);
835
1da177e4
LT
836 /*
837 * The XDR decode routines may have pre-set op->status;
838 * for example, if there is a miscellaneous XDR error
839 * it will be set to nfserr_bad_xdr.
840 */
841 if (op->status)
842 goto encode_op;
843
844 /* We must be able to encode a successful response to
845 * this operation, with enough room left over to encode a
846 * failed response to the next operation. If we don't
847 * have enough room, fail with ERR_RESOURCE.
848 */
e5710199
BF
849 slack_bytes = (char *)resp->end - (char *)resp->p;
850 if (slack_bytes < COMPOUND_SLACK_SPACE
851 + COMPOUND_ERR_SLACK_SPACE) {
852 BUG_ON(slack_bytes < COMPOUND_ERR_SLACK_SPACE);
1da177e4
LT
853 op->status = nfserr_resource;
854 goto encode_op;
855 }
856
857 /* All operations except RENEW, SETCLIENTID, RESTOREFH
858 * SETCLIENTID_CONFIRM, PUTFH and PUTROOTFH
859 * require a valid current filehandle
1da177e4 860 */
ca364317 861 if (!cstate->current_fh.fh_dentry) {
42ca0993
BF
862 if (!((op->opnum == OP_PUTFH) ||
863 (op->opnum == OP_PUTROOTFH) ||
864 (op->opnum == OP_SETCLIENTID) ||
865 (op->opnum == OP_SETCLIENTID_CONFIRM) ||
866 (op->opnum == OP_RENEW) ||
867 (op->opnum == OP_RESTOREFH) ||
868 (op->opnum == OP_RELEASE_LOCKOWNER))) {
869 op->status = nfserr_nofilehandle;
870 goto encode_op;
871 }
872 }
873 /* Check must be done at start of each operation, except
874 * for GETATTR and ops not listed as returning NFS4ERR_MOVED
875 */
ca364317 876 else if (cstate->current_fh.fh_export->ex_fslocs.migrated &&
42ca0993
BF
877 !((op->opnum == OP_GETATTR) ||
878 (op->opnum == OP_PUTROOTFH) ||
879 (op->opnum == OP_PUTPUBFH) ||
880 (op->opnum == OP_RENEW) ||
881 (op->opnum == OP_SETCLIENTID) ||
882 (op->opnum == OP_RELEASE_LOCKOWNER))) {
883 op->status = nfserr_moved;
1da177e4
LT
884 goto encode_op;
885 }
886 switch (op->opnum) {
887 case OP_ACCESS:
ca364317
BF
888 op->status = nfsd4_access(rqstp, cstate,
889 &op->u.access);
1da177e4
LT
890 break;
891 case OP_CLOSE:
ca364317 892 op->status = nfsd4_close(rqstp, cstate,
a4f1706a 893 &op->u.close);
1da177e4
LT
894 break;
895 case OP_COMMIT:
ca364317
BF
896 op->status = nfsd4_commit(rqstp, cstate,
897 &op->u.commit);
1da177e4
LT
898 break;
899 case OP_CREATE:
ca364317
BF
900 op->status = nfsd4_create(rqstp, cstate,
901 &op->u.create);
1da177e4
LT
902 break;
903 case OP_DELEGRETURN:
ca364317
BF
904 op->status = nfsd4_delegreturn(rqstp, cstate,
905 &op->u.delegreturn);
1da177e4
LT
906 break;
907 case OP_GETATTR:
ca364317
BF
908 op->status = nfsd4_getattr(rqstp, cstate,
909 &op->u.getattr);
1da177e4
LT
910 break;
911 case OP_GETFH:
ca364317 912 op->status = nfsd4_getfh(cstate, &op->u.getfh);
1da177e4
LT
913 break;
914 case OP_LINK:
ca364317 915 op->status = nfsd4_link(rqstp, cstate, &op->u.link);
1da177e4
LT
916 break;
917 case OP_LOCK:
a4f1706a 918 op->status = nfsd4_lock(rqstp, cstate, &op->u.lock);
1da177e4
LT
919 break;
920 case OP_LOCKT:
ca364317 921 op->status = nfsd4_lockt(rqstp, cstate, &op->u.lockt);
1da177e4
LT
922 break;
923 case OP_LOCKU:
a4f1706a 924 op->status = nfsd4_locku(rqstp, cstate, &op->u.locku);
1da177e4
LT
925 break;
926 case OP_LOOKUP:
ca364317
BF
927 op->status = nfsd4_lookup(rqstp, cstate,
928 &op->u.lookup);
1da177e4
LT
929 break;
930 case OP_LOOKUPP:
ca364317 931 op->status = nfsd4_lookupp(rqstp, cstate);
1da177e4
LT
932 break;
933 case OP_NVERIFY:
c954e2a5 934 op->status = nfsd4_nverify(rqstp, cstate,
ca364317 935 &op->u.nverify);
1da177e4
LT
936 break;
937 case OP_OPEN:
ca364317 938 op->status = nfsd4_open(rqstp, cstate,
a4f1706a 939 &op->u.open);
1da177e4
LT
940 break;
941 case OP_OPEN_CONFIRM:
ca364317 942 op->status = nfsd4_open_confirm(rqstp, cstate,
a4f1706a 943 &op->u.open_confirm);
1da177e4
LT
944 break;
945 case OP_OPEN_DOWNGRADE:
ca364317 946 op->status = nfsd4_open_downgrade(rqstp, cstate,
a4f1706a 947 &op->u.open_downgrade);
1da177e4
LT
948 break;
949 case OP_PUTFH:
ca364317 950 op->status = nfsd4_putfh(rqstp, cstate, &op->u.putfh);
1da177e4
LT
951 break;
952 case OP_PUTROOTFH:
ca364317 953 op->status = nfsd4_putrootfh(rqstp, cstate);
1da177e4
LT
954 break;
955 case OP_READ:
ca364317 956 op->status = nfsd4_read(rqstp, cstate, &op->u.read);
1da177e4
LT
957 break;
958 case OP_READDIR:
ca364317
BF
959 op->status = nfsd4_readdir(rqstp, cstate,
960 &op->u.readdir);
1da177e4
LT
961 break;
962 case OP_READLINK:
ca364317
BF
963 op->status = nfsd4_readlink(rqstp, cstate,
964 &op->u.readlink);
1da177e4
LT
965 break;
966 case OP_REMOVE:
ca364317
BF
967 op->status = nfsd4_remove(rqstp, cstate,
968 &op->u.remove);
1da177e4
LT
969 break;
970 case OP_RENAME:
ca364317
BF
971 op->status = nfsd4_rename(rqstp, cstate,
972 &op->u.rename);
1da177e4
LT
973 break;
974 case OP_RENEW:
975 op->status = nfsd4_renew(&op->u.renew);
976 break;
977 case OP_RESTOREFH:
ca364317 978 op->status = nfsd4_restorefh(cstate);
1da177e4
LT
979 break;
980 case OP_SAVEFH:
ca364317 981 op->status = nfsd4_savefh(cstate);
1da177e4
LT
982 break;
983 case OP_SETATTR:
ca364317
BF
984 op->status = nfsd4_setattr(rqstp, cstate,
985 &op->u.setattr);
1da177e4
LT
986 break;
987 case OP_SETCLIENTID:
988 op->status = nfsd4_setclientid(rqstp, &op->u.setclientid);
989 break;
990 case OP_SETCLIENTID_CONFIRM:
991 op->status = nfsd4_setclientid_confirm(rqstp, &op->u.setclientid_confirm);
992 break;
993 case OP_VERIFY:
ca364317
BF
994 op->status = nfsd4_verify(rqstp, cstate,
995 &op->u.verify);
1da177e4
LT
996 break;
997 case OP_WRITE:
ca364317 998 op->status = nfsd4_write(rqstp, cstate, &op->u.write);
1da177e4
LT
999 break;
1000 case OP_RELEASE_LOCKOWNER:
1001 op->status = nfsd4_release_lockowner(rqstp, &op->u.release_lockowner);
1002 break;
1003 default:
1004 BUG_ON(op->status == nfs_ok);
1005 break;
1006 }
1007
1008encode_op:
a90b061c 1009 if (op->status == nfserr_replay_me) {
a4f1706a 1010 op->replay = &cstate->replay_owner->so_replay;
1da177e4
LT
1011 nfsd4_encode_replay(resp, op);
1012 status = op->status = op->replay->rp_status;
1013 } else {
1014 nfsd4_encode_operation(resp, op);
1015 status = op->status;
1016 }
a4f1706a
BF
1017 if (cstate->replay_owner) {
1018 nfs4_put_stateowner(cstate->replay_owner);
1019 cstate->replay_owner = NULL;
1da177e4 1020 }
7e06b7f9
N
1021 /* XXX Ugh, we need to get rid of this kind of special case: */
1022 if (op->opnum == OP_READ && op->u.read.rd_filp)
1023 fput(op->u.read.rd_filp);
e2b20950
SA
1024
1025 nfsd4_increment_op_stats(op->opnum);
1da177e4
LT
1026 }
1027
1028out:
1029 nfsd4_release_compoundargs(args);
ca364317 1030 cstate_free(cstate);
1da177e4
LT
1031 return status;
1032}
1033
1034#define nfs4svc_decode_voidargs NULL
1035#define nfs4svc_release_void NULL
1036#define nfsd4_voidres nfsd4_voidargs
1037#define nfs4svc_release_compound NULL
1038struct nfsd4_voidargs { int dummy; };
1039
1040#define PROC(name, argt, rest, relt, cache, respsize) \
1041 { (svc_procfunc) nfsd4_proc_##name, \
1042 (kxdrproc_t) nfs4svc_decode_##argt##args, \
1043 (kxdrproc_t) nfs4svc_encode_##rest##res, \
1044 (kxdrproc_t) nfs4svc_release_##relt, \
1045 sizeof(struct nfsd4_##argt##args), \
1046 sizeof(struct nfsd4_##rest##res), \
1047 0, \
1048 cache, \
1049 respsize, \
1050 }
1051
1052/*
1053 * TODO: At the present time, the NFSv4 server does not do XID caching
1054 * of requests. Implementing XID caching would not be a serious problem,
1055 * although it would require a mild change in interfaces since one
1056 * doesn't know whether an NFSv4 request is idempotent until after the
1057 * XDR decode. However, XID caching totally confuses pynfs (Peter
1058 * Astrand's regression testsuite for NFSv4 servers), which reuses
1059 * XID's liberally, so I've left it unimplemented until pynfs generates
1060 * better XID's.
1061 */
1062static struct svc_procedure nfsd_procedures4[2] = {
1063 PROC(null, void, void, void, RC_NOCACHE, 1),
7775f4c8 1064 PROC(compound, compound, compound, compound, RC_NOCACHE, NFSD_BUFSIZE/4)
1da177e4
LT
1065};
1066
1067struct svc_version nfsd_version4 = {
1068 .vs_vers = 4,
1069 .vs_nproc = 2,
1070 .vs_proc = nfsd_procedures4,
1071 .vs_dispatch = nfsd_dispatch,
1072 .vs_xdrsize = NFS4_SVC_XDRSIZE,
1073};
1074
1075/*
1076 * Local variables:
1077 * c-basic-offset: 8
1078 * End:
1079 */