1 /* 2 * Server-side procedures for NFSv4. 3 * 4 * Copyright (c) 2002 The Regents of the University of Michigan. 5 * All rights reserved. 6 * 7 * Kendrick Smith <kmsmith@umich.edu> 8 * Andy Adamson <andros@umich.edu> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. Neither the name of the University nor the names of its 20 * contributors may be used to endorse or promote products derived 21 * from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 #include <linux/file.h> 36 #include <linux/falloc.h> 37 #include <linux/slab.h> 38 39 #include "idmap.h" 40 #include "cache.h" 41 #include "xdr4.h" 42 #include "vfs.h" 43 #include "current_stateid.h" 44 #include "netns.h" 45 #include "acl.h" 46 #include "pnfs.h" 47 #include "trace.h" 48 49 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 50 #include <linux/security.h> 51 52 static inline void 53 nfsd4_security_inode_setsecctx(struct svc_fh *resfh, struct xdr_netobj *label, u32 *bmval) 54 { 55 struct inode *inode = d_inode(resfh->fh_dentry); 56 int status; 57 58 inode_lock(inode); 59 status = security_inode_setsecctx(resfh->fh_dentry, 60 label->data, label->len); 61 inode_unlock(inode); 62 63 if (status) 64 /* 65 * XXX: We should really fail the whole open, but we may 66 * already have created a new file, so it may be too 67 * late. For now this seems the least of evils: 68 */ 69 bmval[2] &= ~FATTR4_WORD2_SECURITY_LABEL; 70 71 return; 72 } 73 #else 74 static inline void 75 nfsd4_security_inode_setsecctx(struct svc_fh *resfh, struct xdr_netobj *label, u32 *bmval) 76 { } 77 #endif 78 79 #define NFSDDBG_FACILITY NFSDDBG_PROC 80 81 static u32 nfsd_attrmask[] = { 82 NFSD_WRITEABLE_ATTRS_WORD0, 83 NFSD_WRITEABLE_ATTRS_WORD1, 84 NFSD_WRITEABLE_ATTRS_WORD2 85 }; 86 87 static u32 nfsd41_ex_attrmask[] = { 88 NFSD_SUPPATTR_EXCLCREAT_WORD0, 89 NFSD_SUPPATTR_EXCLCREAT_WORD1, 90 NFSD_SUPPATTR_EXCLCREAT_WORD2 91 }; 92 93 static __be32 94 check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 95 u32 *bmval, u32 *writable) 96 { 97 struct dentry *dentry = cstate->current_fh.fh_dentry; 98 99 if (!nfsd_attrs_supported(cstate->minorversion, bmval)) 100 return nfserr_attrnotsupp; 101 if ((bmval[0] & FATTR4_WORD0_ACL) && !IS_POSIXACL(d_inode(dentry))) 102 return nfserr_attrnotsupp; 103 if (writable && !bmval_is_subset(bmval, writable)) 104 return nfserr_inval; 105 if (writable && (bmval[2] & FATTR4_WORD2_MODE_UMASK) && 106 (bmval[1] & FATTR4_WORD1_MODE)) 107 return nfserr_inval; 108 return nfs_ok; 109 } 110 111 static __be32 112 nfsd4_check_open_attributes(struct svc_rqst *rqstp, 113 struct nfsd4_compound_state *cstate, struct nfsd4_open *open) 114 { 115 __be32 status = nfs_ok; 116 117 if (open->op_create == NFS4_OPEN_CREATE) { 118 if (open->op_createmode == NFS4_CREATE_UNCHECKED 119 || open->op_createmode == NFS4_CREATE_GUARDED) 120 status = check_attr_support(rqstp, cstate, 121 open->op_bmval, nfsd_attrmask); 122 else if (open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1) 123 status = check_attr_support(rqstp, cstate, 124 open->op_bmval, nfsd41_ex_attrmask); 125 } 126 127 return status; 128 } 129 130 static int 131 is_create_with_attrs(struct nfsd4_open *open) 132 { 133 return open->op_create == NFS4_OPEN_CREATE 134 && (open->op_createmode == NFS4_CREATE_UNCHECKED 135 || open->op_createmode == NFS4_CREATE_GUARDED 136 || open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1); 137 } 138 139 /* 140 * if error occurs when setting the acl, just clear the acl bit 141 * in the returned attr bitmap. 142 */ 143 static void 144 do_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp, 145 struct nfs4_acl *acl, u32 *bmval) 146 { 147 __be32 status; 148 149 status = nfsd4_set_nfs4_acl(rqstp, fhp, acl); 150 if (status) 151 /* 152 * We should probably fail the whole open at this point, 153 * but we've already created the file, so it's too late; 154 * So this seems the least of evils: 155 */ 156 bmval[0] &= ~FATTR4_WORD0_ACL; 157 } 158 159 static inline void 160 fh_dup2(struct svc_fh *dst, struct svc_fh *src) 161 { 162 fh_put(dst); 163 dget(src->fh_dentry); 164 if (src->fh_export) 165 exp_get(src->fh_export); 166 *dst = *src; 167 } 168 169 static __be32 170 do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode) 171 { 172 __be32 status; 173 174 if (open->op_truncate && 175 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE)) 176 return nfserr_inval; 177 178 accmode |= NFSD_MAY_READ_IF_EXEC; 179 180 if (open->op_share_access & NFS4_SHARE_ACCESS_READ) 181 accmode |= NFSD_MAY_READ; 182 if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE) 183 accmode |= (NFSD_MAY_WRITE | NFSD_MAY_TRUNC); 184 if (open->op_share_deny & NFS4_SHARE_DENY_READ) 185 accmode |= NFSD_MAY_WRITE; 186 187 status = fh_verify(rqstp, current_fh, S_IFREG, accmode); 188 189 return status; 190 } 191 192 static __be32 nfsd_check_obj_isreg(struct svc_fh *fh) 193 { 194 umode_t mode = d_inode(fh->fh_dentry)->i_mode; 195 196 if (S_ISREG(mode)) 197 return nfs_ok; 198 if (S_ISDIR(mode)) 199 return nfserr_isdir; 200 /* 201 * Using err_symlink as our catch-all case may look odd; but 202 * there's no other obvious error for this case in 4.0, and we 203 * happen to know that it will cause the linux v4 client to do 204 * the right thing on attempts to open something other than a 205 * regular file. 206 */ 207 return nfserr_symlink; 208 } 209 210 static void nfsd4_set_open_owner_reply_cache(struct nfsd4_compound_state *cstate, struct nfsd4_open *open, struct svc_fh *resfh) 211 { 212 if (nfsd4_has_session(cstate)) 213 return; 214 fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh, 215 &resfh->fh_handle); 216 } 217 218 static __be32 219 do_open_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_open *open, struct svc_fh **resfh) 220 { 221 struct svc_fh *current_fh = &cstate->current_fh; 222 int accmode; 223 __be32 status; 224 225 *resfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); 226 if (!*resfh) 227 return nfserr_jukebox; 228 fh_init(*resfh, NFS4_FHSIZE); 229 open->op_truncate = 0; 230 231 if (open->op_create) { 232 /* FIXME: check session persistence and pnfs flags. 233 * The nfsv4.1 spec requires the following semantics: 234 * 235 * Persistent | pNFS | Server REQUIRED | Client Allowed 236 * Reply Cache | server | | 237 * -------------+--------+-----------------+-------------------- 238 * no | no | EXCLUSIVE4_1 | EXCLUSIVE4_1 239 * | | | (SHOULD) 240 * | | and EXCLUSIVE4 | or EXCLUSIVE4 241 * | | | (SHOULD NOT) 242 * no | yes | EXCLUSIVE4_1 | EXCLUSIVE4_1 243 * yes | no | GUARDED4 | GUARDED4 244 * yes | yes | GUARDED4 | GUARDED4 245 */ 246 247 /* 248 * Note: create modes (UNCHECKED,GUARDED...) are the same 249 * in NFSv4 as in v3 except EXCLUSIVE4_1. 250 */ 251 status = do_nfsd_create(rqstp, current_fh, open->op_fname.data, 252 open->op_fname.len, &open->op_iattr, 253 *resfh, open->op_createmode, 254 (u32 *)open->op_verf.data, 255 &open->op_truncate, &open->op_created); 256 257 if (!status && open->op_label.len) 258 nfsd4_security_inode_setsecctx(*resfh, &open->op_label, open->op_bmval); 259 260 /* 261 * Following rfc 3530 14.2.16, and rfc 5661 18.16.4 262 * use the returned bitmask to indicate which attributes 263 * we used to store the verifier: 264 */ 265 if (nfsd_create_is_exclusive(open->op_createmode) && status == 0) 266 open->op_bmval[1] |= (FATTR4_WORD1_TIME_ACCESS | 267 FATTR4_WORD1_TIME_MODIFY); 268 } else 269 /* 270 * Note this may exit with the parent still locked. 271 * We will hold the lock until nfsd4_open's final 272 * lookup, to prevent renames or unlinks until we've had 273 * a chance to an acquire a delegation if appropriate. 274 */ 275 status = nfsd_lookup(rqstp, current_fh, 276 open->op_fname.data, open->op_fname.len, *resfh); 277 if (status) 278 goto out; 279 status = nfsd_check_obj_isreg(*resfh); 280 if (status) 281 goto out; 282 283 if (is_create_with_attrs(open) && open->op_acl != NULL) 284 do_set_nfs4_acl(rqstp, *resfh, open->op_acl, open->op_bmval); 285 286 nfsd4_set_open_owner_reply_cache(cstate, open, *resfh); 287 accmode = NFSD_MAY_NOP; 288 if (open->op_created || 289 open->op_claim_type == NFS4_OPEN_CLAIM_DELEGATE_CUR) 290 accmode |= NFSD_MAY_OWNER_OVERRIDE; 291 status = do_open_permission(rqstp, *resfh, open, accmode); 292 set_change_info(&open->op_cinfo, current_fh); 293 out: 294 return status; 295 } 296 297 static __be32 298 do_open_fhandle(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_open *open) 299 { 300 struct svc_fh *current_fh = &cstate->current_fh; 301 __be32 status; 302 int accmode = 0; 303 304 /* We don't know the target directory, and therefore can not 305 * set the change info 306 */ 307 308 memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info)); 309 310 nfsd4_set_open_owner_reply_cache(cstate, open, current_fh); 311 312 open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) && 313 (open->op_iattr.ia_size == 0); 314 /* 315 * In the delegation case, the client is telling us about an 316 * open that it *already* performed locally, some time ago. We 317 * should let it succeed now if possible. 318 * 319 * In the case of a CLAIM_FH open, on the other hand, the client 320 * may be counting on us to enforce permissions (the Linux 4.1 321 * client uses this for normal opens, for example). 322 */ 323 if (open->op_claim_type == NFS4_OPEN_CLAIM_DELEG_CUR_FH) 324 accmode = NFSD_MAY_OWNER_OVERRIDE; 325 326 status = do_open_permission(rqstp, current_fh, open, accmode); 327 328 return status; 329 } 330 331 static void 332 copy_clientid(clientid_t *clid, struct nfsd4_session *session) 333 { 334 struct nfsd4_sessionid *sid = 335 (struct nfsd4_sessionid *)session->se_sessionid.data; 336 337 clid->cl_boot = sid->clientid.cl_boot; 338 clid->cl_id = sid->clientid.cl_id; 339 } 340 341 static __be32 342 nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 343 struct nfsd4_open *open) 344 { 345 __be32 status; 346 struct svc_fh *resfh = NULL; 347 struct net *net = SVC_NET(rqstp); 348 struct nfsd_net *nn = net_generic(net, nfsd_net_id); 349 350 dprintk("NFSD: nfsd4_open filename %.*s op_openowner %p\n", 351 (int)open->op_fname.len, open->op_fname.data, 352 open->op_openowner); 353 354 /* This check required by spec. */ 355 if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL) 356 return nfserr_inval; 357 358 open->op_created = 0; 359 /* 360 * RFC5661 18.51.3 361 * Before RECLAIM_COMPLETE done, server should deny new lock 362 */ 363 if (nfsd4_has_session(cstate) && 364 !test_bit(NFSD4_CLIENT_RECLAIM_COMPLETE, 365 &cstate->session->se_client->cl_flags) && 366 open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS) 367 return nfserr_grace; 368 369 if (nfsd4_has_session(cstate)) 370 copy_clientid(&open->op_clientid, cstate->session); 371 372 /* check seqid for replay. set nfs4_owner */ 373 status = nfsd4_process_open1(cstate, open, nn); 374 if (status == nfserr_replay_me) { 375 struct nfs4_replay *rp = &open->op_openowner->oo_owner.so_replay; 376 fh_put(&cstate->current_fh); 377 fh_copy_shallow(&cstate->current_fh.fh_handle, 378 &rp->rp_openfh); 379 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP); 380 if (status) 381 dprintk("nfsd4_open: replay failed" 382 " restoring previous filehandle\n"); 383 else 384 status = nfserr_replay_me; 385 } 386 if (status) 387 goto out; 388 if (open->op_xdr_error) { 389 status = open->op_xdr_error; 390 goto out; 391 } 392 393 status = nfsd4_check_open_attributes(rqstp, cstate, open); 394 if (status) 395 goto out; 396 397 /* Openowner is now set, so sequence id will get bumped. Now we need 398 * these checks before we do any creates: */ 399 status = nfserr_grace; 400 if (opens_in_grace(net) && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS) 401 goto out; 402 status = nfserr_no_grace; 403 if (!opens_in_grace(net) && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS) 404 goto out; 405 406 switch (open->op_claim_type) { 407 case NFS4_OPEN_CLAIM_DELEGATE_CUR: 408 case NFS4_OPEN_CLAIM_NULL: 409 status = do_open_lookup(rqstp, cstate, open, &resfh); 410 if (status) 411 goto out; 412 break; 413 case NFS4_OPEN_CLAIM_PREVIOUS: 414 status = nfs4_check_open_reclaim(&open->op_clientid, 415 cstate, nn); 416 if (status) 417 goto out; 418 open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED; 419 case NFS4_OPEN_CLAIM_FH: 420 case NFS4_OPEN_CLAIM_DELEG_CUR_FH: 421 status = do_open_fhandle(rqstp, cstate, open); 422 if (status) 423 goto out; 424 resfh = &cstate->current_fh; 425 break; 426 case NFS4_OPEN_CLAIM_DELEG_PREV_FH: 427 case NFS4_OPEN_CLAIM_DELEGATE_PREV: 428 dprintk("NFSD: unsupported OPEN claim type %d\n", 429 open->op_claim_type); 430 status = nfserr_notsupp; 431 goto out; 432 default: 433 dprintk("NFSD: Invalid OPEN claim type %d\n", 434 open->op_claim_type); 435 status = nfserr_inval; 436 goto out; 437 } 438 /* 439 * nfsd4_process_open2() does the actual opening of the file. If 440 * successful, it (1) truncates the file if open->op_truncate was 441 * set, (2) sets open->op_stateid, (3) sets open->op_delegation. 442 */ 443 status = nfsd4_process_open2(rqstp, resfh, open); 444 WARN(status && open->op_created, 445 "nfsd4_process_open2 failed to open newly-created file! status=%u\n", 446 be32_to_cpu(status)); 447 out: 448 if (resfh && resfh != &cstate->current_fh) { 449 fh_dup2(&cstate->current_fh, resfh); 450 fh_put(resfh); 451 kfree(resfh); 452 } 453 nfsd4_cleanup_open_state(cstate, open); 454 nfsd4_bump_seqid(cstate, status); 455 return status; 456 } 457 458 /* 459 * OPEN is the only seqid-mutating operation whose decoding can fail 460 * with a seqid-mutating error (specifically, decoding of user names in 461 * the attributes). Therefore we have to do some processing to look up 462 * the stateowner so that we can bump the seqid. 463 */ 464 static __be32 nfsd4_open_omfg(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_op *op) 465 { 466 struct nfsd4_open *open = (struct nfsd4_open *)&op->u; 467 468 if (!seqid_mutating_err(ntohl(op->status))) 469 return op->status; 470 if (nfsd4_has_session(cstate)) 471 return op->status; 472 open->op_xdr_error = op->status; 473 return nfsd4_open(rqstp, cstate, open); 474 } 475 476 /* 477 * filehandle-manipulating ops. 478 */ 479 static __be32 480 nfsd4_getfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 481 struct svc_fh **getfh) 482 { 483 if (!cstate->current_fh.fh_dentry) 484 return nfserr_nofilehandle; 485 486 *getfh = &cstate->current_fh; 487 return nfs_ok; 488 } 489 490 static __be32 491 nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 492 struct nfsd4_putfh *putfh) 493 { 494 fh_put(&cstate->current_fh); 495 cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen; 496 memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval, 497 putfh->pf_fhlen); 498 return fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_BYPASS_GSS); 499 } 500 501 static __be32 502 nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 503 void *arg) 504 { 505 __be32 status; 506 507 fh_put(&cstate->current_fh); 508 status = exp_pseudoroot(rqstp, &cstate->current_fh); 509 return status; 510 } 511 512 static __be32 513 nfsd4_restorefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 514 void *arg) 515 { 516 if (!cstate->save_fh.fh_dentry) 517 return nfserr_restorefh; 518 519 fh_dup2(&cstate->current_fh, &cstate->save_fh); 520 if (HAS_STATE_ID(cstate, SAVED_STATE_ID_FLAG)) { 521 memcpy(&cstate->current_stateid, &cstate->save_stateid, sizeof(stateid_t)); 522 SET_STATE_ID(cstate, CURRENT_STATE_ID_FLAG); 523 } 524 return nfs_ok; 525 } 526 527 static __be32 528 nfsd4_savefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 529 void *arg) 530 { 531 if (!cstate->current_fh.fh_dentry) 532 return nfserr_nofilehandle; 533 534 fh_dup2(&cstate->save_fh, &cstate->current_fh); 535 if (HAS_STATE_ID(cstate, CURRENT_STATE_ID_FLAG)) { 536 memcpy(&cstate->save_stateid, &cstate->current_stateid, sizeof(stateid_t)); 537 SET_STATE_ID(cstate, SAVED_STATE_ID_FLAG); 538 } 539 return nfs_ok; 540 } 541 542 /* 543 * misc nfsv4 ops 544 */ 545 static __be32 546 nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 547 struct nfsd4_access *access) 548 { 549 if (access->ac_req_access & ~NFS3_ACCESS_FULL) 550 return nfserr_inval; 551 552 access->ac_resp_access = access->ac_req_access; 553 return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access, 554 &access->ac_supported); 555 } 556 557 static void gen_boot_verifier(nfs4_verifier *verifier, struct net *net) 558 { 559 __be32 verf[2]; 560 struct nfsd_net *nn = net_generic(net, nfsd_net_id); 561 562 /* 563 * This is opaque to client, so no need to byte-swap. Use 564 * __force to keep sparse happy 565 */ 566 verf[0] = (__force __be32)nn->nfssvc_boot.tv_sec; 567 verf[1] = (__force __be32)nn->nfssvc_boot.tv_usec; 568 memcpy(verifier->data, verf, sizeof(verifier->data)); 569 } 570 571 static __be32 572 nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 573 struct nfsd4_commit *commit) 574 { 575 gen_boot_verifier(&commit->co_verf, SVC_NET(rqstp)); 576 return nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset, 577 commit->co_count); 578 } 579 580 static __be32 581 nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 582 struct nfsd4_create *create) 583 { 584 struct svc_fh resfh; 585 __be32 status; 586 dev_t rdev; 587 588 fh_init(&resfh, NFS4_FHSIZE); 589 590 status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_NOP); 591 if (status) 592 return status; 593 594 status = check_attr_support(rqstp, cstate, create->cr_bmval, 595 nfsd_attrmask); 596 if (status) 597 return status; 598 599 switch (create->cr_type) { 600 case NF4LNK: 601 status = nfsd_symlink(rqstp, &cstate->current_fh, 602 create->cr_name, create->cr_namelen, 603 create->cr_data, &resfh); 604 break; 605 606 case NF4BLK: 607 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2); 608 if (MAJOR(rdev) != create->cr_specdata1 || 609 MINOR(rdev) != create->cr_specdata2) 610 return nfserr_inval; 611 status = nfsd_create(rqstp, &cstate->current_fh, 612 create->cr_name, create->cr_namelen, 613 &create->cr_iattr, S_IFBLK, rdev, &resfh); 614 break; 615 616 case NF4CHR: 617 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2); 618 if (MAJOR(rdev) != create->cr_specdata1 || 619 MINOR(rdev) != create->cr_specdata2) 620 return nfserr_inval; 621 status = nfsd_create(rqstp, &cstate->current_fh, 622 create->cr_name, create->cr_namelen, 623 &create->cr_iattr,S_IFCHR, rdev, &resfh); 624 break; 625 626 case NF4SOCK: 627 status = nfsd_create(rqstp, &cstate->current_fh, 628 create->cr_name, create->cr_namelen, 629 &create->cr_iattr, S_IFSOCK, 0, &resfh); 630 break; 631 632 case NF4FIFO: 633 status = nfsd_create(rqstp, &cstate->current_fh, 634 create->cr_name, create->cr_namelen, 635 &create->cr_iattr, S_IFIFO, 0, &resfh); 636 break; 637 638 case NF4DIR: 639 create->cr_iattr.ia_valid &= ~ATTR_SIZE; 640 status = nfsd_create(rqstp, &cstate->current_fh, 641 create->cr_name, create->cr_namelen, 642 &create->cr_iattr, S_IFDIR, 0, &resfh); 643 break; 644 645 default: 646 status = nfserr_badtype; 647 } 648 649 if (status) 650 goto out; 651 652 if (create->cr_label.len) 653 nfsd4_security_inode_setsecctx(&resfh, &create->cr_label, create->cr_bmval); 654 655 if (create->cr_acl != NULL) 656 do_set_nfs4_acl(rqstp, &resfh, create->cr_acl, 657 create->cr_bmval); 658 659 fh_unlock(&cstate->current_fh); 660 set_change_info(&create->cr_cinfo, &cstate->current_fh); 661 fh_dup2(&cstate->current_fh, &resfh); 662 out: 663 fh_put(&resfh); 664 return status; 665 } 666 667 static __be32 668 nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 669 struct nfsd4_getattr *getattr) 670 { 671 __be32 status; 672 673 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP); 674 if (status) 675 return status; 676 677 if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1) 678 return nfserr_inval; 679 680 getattr->ga_bmval[0] &= nfsd_suppattrs[cstate->minorversion][0]; 681 getattr->ga_bmval[1] &= nfsd_suppattrs[cstate->minorversion][1]; 682 getattr->ga_bmval[2] &= nfsd_suppattrs[cstate->minorversion][2]; 683 684 getattr->ga_fhp = &cstate->current_fh; 685 return nfs_ok; 686 } 687 688 static __be32 689 nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 690 struct nfsd4_link *link) 691 { 692 __be32 status = nfserr_nofilehandle; 693 694 if (!cstate->save_fh.fh_dentry) 695 return status; 696 status = nfsd_link(rqstp, &cstate->current_fh, 697 link->li_name, link->li_namelen, &cstate->save_fh); 698 if (!status) 699 set_change_info(&link->li_cinfo, &cstate->current_fh); 700 return status; 701 } 702 703 static __be32 nfsd4_do_lookupp(struct svc_rqst *rqstp, struct svc_fh *fh) 704 { 705 struct svc_fh tmp_fh; 706 __be32 ret; 707 708 fh_init(&tmp_fh, NFS4_FHSIZE); 709 ret = exp_pseudoroot(rqstp, &tmp_fh); 710 if (ret) 711 return ret; 712 if (tmp_fh.fh_dentry == fh->fh_dentry) { 713 fh_put(&tmp_fh); 714 return nfserr_noent; 715 } 716 fh_put(&tmp_fh); 717 return nfsd_lookup(rqstp, fh, "..", 2, fh); 718 } 719 720 static __be32 721 nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 722 void *arg) 723 { 724 return nfsd4_do_lookupp(rqstp, &cstate->current_fh); 725 } 726 727 static __be32 728 nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 729 struct nfsd4_lookup *lookup) 730 { 731 return nfsd_lookup(rqstp, &cstate->current_fh, 732 lookup->lo_name, lookup->lo_len, 733 &cstate->current_fh); 734 } 735 736 static __be32 737 nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 738 struct nfsd4_read *read) 739 { 740 __be32 status; 741 742 read->rd_filp = NULL; 743 if (read->rd_offset >= OFFSET_MAX) 744 return nfserr_inval; 745 746 /* 747 * If we do a zero copy read, then a client will see read data 748 * that reflects the state of the file *after* performing the 749 * following compound. 750 * 751 * To ensure proper ordering, we therefore turn off zero copy if 752 * the client wants us to do more in this compound: 753 */ 754 if (!nfsd4_last_compound_op(rqstp)) 755 clear_bit(RQ_SPLICE_OK, &rqstp->rq_flags); 756 757 /* check stateid */ 758 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh, 759 &read->rd_stateid, RD_STATE, 760 &read->rd_filp, &read->rd_tmp_file); 761 if (status) { 762 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n"); 763 goto out; 764 } 765 status = nfs_ok; 766 out: 767 read->rd_rqstp = rqstp; 768 read->rd_fhp = &cstate->current_fh; 769 return status; 770 } 771 772 static __be32 773 nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 774 struct nfsd4_readdir *readdir) 775 { 776 u64 cookie = readdir->rd_cookie; 777 static const nfs4_verifier zeroverf; 778 779 /* no need to check permission - this will be done in nfsd_readdir() */ 780 781 if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1) 782 return nfserr_inval; 783 784 readdir->rd_bmval[0] &= nfsd_suppattrs[cstate->minorversion][0]; 785 readdir->rd_bmval[1] &= nfsd_suppattrs[cstate->minorversion][1]; 786 readdir->rd_bmval[2] &= nfsd_suppattrs[cstate->minorversion][2]; 787 788 if ((cookie == 1) || (cookie == 2) || 789 (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE))) 790 return nfserr_bad_cookie; 791 792 readdir->rd_rqstp = rqstp; 793 readdir->rd_fhp = &cstate->current_fh; 794 return nfs_ok; 795 } 796 797 static __be32 798 nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 799 struct nfsd4_readlink *readlink) 800 { 801 readlink->rl_rqstp = rqstp; 802 readlink->rl_fhp = &cstate->current_fh; 803 return nfs_ok; 804 } 805 806 static __be32 807 nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 808 struct nfsd4_remove *remove) 809 { 810 __be32 status; 811 812 if (opens_in_grace(SVC_NET(rqstp))) 813 return nfserr_grace; 814 status = nfsd_unlink(rqstp, &cstate->current_fh, 0, 815 remove->rm_name, remove->rm_namelen); 816 if (!status) { 817 fh_unlock(&cstate->current_fh); 818 set_change_info(&remove->rm_cinfo, &cstate->current_fh); 819 } 820 return status; 821 } 822 823 static __be32 824 nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 825 struct nfsd4_rename *rename) 826 { 827 __be32 status = nfserr_nofilehandle; 828 829 if (!cstate->save_fh.fh_dentry) 830 return status; 831 if (opens_in_grace(SVC_NET(rqstp)) && 832 !(cstate->save_fh.fh_export->ex_flags & NFSEXP_NOSUBTREECHECK)) 833 return nfserr_grace; 834 status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname, 835 rename->rn_snamelen, &cstate->current_fh, 836 rename->rn_tname, rename->rn_tnamelen); 837 if (status) 838 return status; 839 set_change_info(&rename->rn_sinfo, &cstate->current_fh); 840 set_change_info(&rename->rn_tinfo, &cstate->save_fh); 841 return nfs_ok; 842 } 843 844 static __be32 845 nfsd4_secinfo(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 846 struct nfsd4_secinfo *secinfo) 847 { 848 struct svc_export *exp; 849 struct dentry *dentry; 850 __be32 err; 851 852 err = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_EXEC); 853 if (err) 854 return err; 855 err = nfsd_lookup_dentry(rqstp, &cstate->current_fh, 856 secinfo->si_name, secinfo->si_namelen, 857 &exp, &dentry); 858 if (err) 859 return err; 860 fh_unlock(&cstate->current_fh); 861 if (d_really_is_negative(dentry)) { 862 exp_put(exp); 863 err = nfserr_noent; 864 } else 865 secinfo->si_exp = exp; 866 dput(dentry); 867 if (cstate->minorversion) 868 /* See rfc 5661 section 2.6.3.1.1.8 */ 869 fh_put(&cstate->current_fh); 870 return err; 871 } 872 873 static __be32 874 nfsd4_secinfo_no_name(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 875 struct nfsd4_secinfo_no_name *sin) 876 { 877 __be32 err; 878 879 switch (sin->sin_style) { 880 case NFS4_SECINFO_STYLE4_CURRENT_FH: 881 break; 882 case NFS4_SECINFO_STYLE4_PARENT: 883 err = nfsd4_do_lookupp(rqstp, &cstate->current_fh); 884 if (err) 885 return err; 886 break; 887 default: 888 return nfserr_inval; 889 } 890 891 sin->sin_exp = exp_get(cstate->current_fh.fh_export); 892 fh_put(&cstate->current_fh); 893 return nfs_ok; 894 } 895 896 static __be32 897 nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 898 struct nfsd4_setattr *setattr) 899 { 900 __be32 status = nfs_ok; 901 int err; 902 903 if (setattr->sa_iattr.ia_valid & ATTR_SIZE) { 904 status = nfs4_preprocess_stateid_op(rqstp, cstate, 905 &cstate->current_fh, &setattr->sa_stateid, 906 WR_STATE, NULL, NULL); 907 if (status) { 908 dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n"); 909 return status; 910 } 911 } 912 err = fh_want_write(&cstate->current_fh); 913 if (err) 914 return nfserrno(err); 915 status = nfs_ok; 916 917 status = check_attr_support(rqstp, cstate, setattr->sa_bmval, 918 nfsd_attrmask); 919 if (status) 920 goto out; 921 922 if (setattr->sa_acl != NULL) 923 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh, 924 setattr->sa_acl); 925 if (status) 926 goto out; 927 if (setattr->sa_label.len) 928 status = nfsd4_set_nfs4_label(rqstp, &cstate->current_fh, 929 &setattr->sa_label); 930 if (status) 931 goto out; 932 status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr, 933 0, (time_t)0); 934 out: 935 fh_drop_write(&cstate->current_fh); 936 return status; 937 } 938 939 static int fill_in_write_vector(struct kvec *vec, struct nfsd4_write *write) 940 { 941 int i = 1; 942 int buflen = write->wr_buflen; 943 944 vec[0].iov_base = write->wr_head.iov_base; 945 vec[0].iov_len = min_t(int, buflen, write->wr_head.iov_len); 946 buflen -= vec[0].iov_len; 947 948 while (buflen) { 949 vec[i].iov_base = page_address(write->wr_pagelist[i - 1]); 950 vec[i].iov_len = min_t(int, PAGE_SIZE, buflen); 951 buflen -= vec[i].iov_len; 952 i++; 953 } 954 return i; 955 } 956 957 static __be32 958 nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 959 struct nfsd4_write *write) 960 { 961 stateid_t *stateid = &write->wr_stateid; 962 struct file *filp = NULL; 963 __be32 status = nfs_ok; 964 unsigned long cnt; 965 int nvecs; 966 967 if (write->wr_offset >= OFFSET_MAX) 968 return nfserr_inval; 969 970 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh, 971 stateid, WR_STATE, &filp, NULL); 972 if (status) { 973 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n"); 974 return status; 975 } 976 977 cnt = write->wr_buflen; 978 write->wr_how_written = write->wr_stable_how; 979 gen_boot_verifier(&write->wr_verifier, SVC_NET(rqstp)); 980 981 nvecs = fill_in_write_vector(rqstp->rq_vec, write); 982 WARN_ON_ONCE(nvecs > ARRAY_SIZE(rqstp->rq_vec)); 983 984 status = nfsd_vfs_write(rqstp, &cstate->current_fh, filp, 985 write->wr_offset, rqstp->rq_vec, nvecs, &cnt, 986 &write->wr_how_written); 987 fput(filp); 988 989 write->wr_bytes_written = cnt; 990 991 return status; 992 } 993 994 static __be32 995 nfsd4_verify_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 996 stateid_t *src_stateid, struct file **src, 997 stateid_t *dst_stateid, struct file **dst) 998 { 999 __be32 status; 1000 1001 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->save_fh, 1002 src_stateid, RD_STATE, src, NULL); 1003 if (status) { 1004 dprintk("NFSD: %s: couldn't process src stateid!\n", __func__); 1005 goto out; 1006 } 1007 1008 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh, 1009 dst_stateid, WR_STATE, dst, NULL); 1010 if (status) { 1011 dprintk("NFSD: %s: couldn't process dst stateid!\n", __func__); 1012 goto out_put_src; 1013 } 1014 1015 /* fix up for NFS-specific error code */ 1016 if (!S_ISREG(file_inode(*src)->i_mode) || 1017 !S_ISREG(file_inode(*dst)->i_mode)) { 1018 status = nfserr_wrong_type; 1019 goto out_put_dst; 1020 } 1021 1022 out: 1023 return status; 1024 out_put_dst: 1025 fput(*dst); 1026 out_put_src: 1027 fput(*src); 1028 goto out; 1029 } 1030 1031 static __be32 1032 nfsd4_clone(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1033 struct nfsd4_clone *clone) 1034 { 1035 struct file *src, *dst; 1036 __be32 status; 1037 1038 status = nfsd4_verify_copy(rqstp, cstate, &clone->cl_src_stateid, &src, 1039 &clone->cl_dst_stateid, &dst); 1040 if (status) 1041 goto out; 1042 1043 status = nfsd4_clone_file_range(src, clone->cl_src_pos, 1044 dst, clone->cl_dst_pos, clone->cl_count); 1045 1046 fput(dst); 1047 fput(src); 1048 out: 1049 return status; 1050 } 1051 1052 static __be32 1053 nfsd4_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1054 struct nfsd4_copy *copy) 1055 { 1056 struct file *src, *dst; 1057 __be32 status; 1058 ssize_t bytes; 1059 1060 status = nfsd4_verify_copy(rqstp, cstate, ©->cp_src_stateid, &src, 1061 ©->cp_dst_stateid, &dst); 1062 if (status) 1063 goto out; 1064 1065 bytes = nfsd_copy_file_range(src, copy->cp_src_pos, 1066 dst, copy->cp_dst_pos, copy->cp_count); 1067 1068 if (bytes < 0) 1069 status = nfserrno(bytes); 1070 else { 1071 copy->cp_res.wr_bytes_written = bytes; 1072 copy->cp_res.wr_stable_how = NFS_UNSTABLE; 1073 copy->cp_consecutive = 1; 1074 copy->cp_synchronous = 1; 1075 gen_boot_verifier(©->cp_res.wr_verifier, SVC_NET(rqstp)); 1076 status = nfs_ok; 1077 } 1078 1079 fput(src); 1080 fput(dst); 1081 out: 1082 return status; 1083 } 1084 1085 static __be32 1086 nfsd4_fallocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1087 struct nfsd4_fallocate *fallocate, int flags) 1088 { 1089 __be32 status = nfserr_notsupp; 1090 struct file *file; 1091 1092 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh, 1093 &fallocate->falloc_stateid, 1094 WR_STATE, &file, NULL); 1095 if (status != nfs_ok) { 1096 dprintk("NFSD: nfsd4_fallocate: couldn't process stateid!\n"); 1097 return status; 1098 } 1099 1100 status = nfsd4_vfs_fallocate(rqstp, &cstate->current_fh, file, 1101 fallocate->falloc_offset, 1102 fallocate->falloc_length, 1103 flags); 1104 fput(file); 1105 return status; 1106 } 1107 1108 static __be32 1109 nfsd4_allocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1110 struct nfsd4_fallocate *fallocate) 1111 { 1112 return nfsd4_fallocate(rqstp, cstate, fallocate, 0); 1113 } 1114 1115 static __be32 1116 nfsd4_deallocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1117 struct nfsd4_fallocate *fallocate) 1118 { 1119 return nfsd4_fallocate(rqstp, cstate, fallocate, 1120 FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE); 1121 } 1122 1123 static __be32 1124 nfsd4_seek(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1125 struct nfsd4_seek *seek) 1126 { 1127 int whence; 1128 __be32 status; 1129 struct file *file; 1130 1131 status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh, 1132 &seek->seek_stateid, 1133 RD_STATE, &file, NULL); 1134 if (status) { 1135 dprintk("NFSD: nfsd4_seek: couldn't process stateid!\n"); 1136 return status; 1137 } 1138 1139 switch (seek->seek_whence) { 1140 case NFS4_CONTENT_DATA: 1141 whence = SEEK_DATA; 1142 break; 1143 case NFS4_CONTENT_HOLE: 1144 whence = SEEK_HOLE; 1145 break; 1146 default: 1147 status = nfserr_union_notsupp; 1148 goto out; 1149 } 1150 1151 /* 1152 * Note: This call does change file->f_pos, but nothing in NFSD 1153 * should ever file->f_pos. 1154 */ 1155 seek->seek_pos = vfs_llseek(file, seek->seek_offset, whence); 1156 if (seek->seek_pos < 0) 1157 status = nfserrno(seek->seek_pos); 1158 else if (seek->seek_pos >= i_size_read(file_inode(file))) 1159 seek->seek_eof = true; 1160 1161 out: 1162 fput(file); 1163 return status; 1164 } 1165 1166 /* This routine never returns NFS_OK! If there are no other errors, it 1167 * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the 1168 * attributes matched. VERIFY is implemented by mapping NFSERR_SAME 1169 * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK. 1170 */ 1171 static __be32 1172 _nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1173 struct nfsd4_verify *verify) 1174 { 1175 __be32 *buf, *p; 1176 int count; 1177 __be32 status; 1178 1179 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP); 1180 if (status) 1181 return status; 1182 1183 status = check_attr_support(rqstp, cstate, verify->ve_bmval, NULL); 1184 if (status) 1185 return status; 1186 1187 if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR) 1188 || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)) 1189 return nfserr_inval; 1190 if (verify->ve_attrlen & 3) 1191 return nfserr_inval; 1192 1193 /* count in words: 1194 * bitmap_len(1) + bitmap(2) + attr_len(1) = 4 1195 */ 1196 count = 4 + (verify->ve_attrlen >> 2); 1197 buf = kmalloc(count << 2, GFP_KERNEL); 1198 if (!buf) 1199 return nfserr_jukebox; 1200 1201 p = buf; 1202 status = nfsd4_encode_fattr_to_buf(&p, count, &cstate->current_fh, 1203 cstate->current_fh.fh_export, 1204 cstate->current_fh.fh_dentry, 1205 verify->ve_bmval, 1206 rqstp, 0); 1207 /* 1208 * If nfsd4_encode_fattr() ran out of space, assume that's because 1209 * the attributes are longer (hence different) than those given: 1210 */ 1211 if (status == nfserr_resource) 1212 status = nfserr_not_same; 1213 if (status) 1214 goto out_kfree; 1215 1216 /* skip bitmap */ 1217 p = buf + 1 + ntohl(buf[0]); 1218 status = nfserr_not_same; 1219 if (ntohl(*p++) != verify->ve_attrlen) 1220 goto out_kfree; 1221 if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen)) 1222 status = nfserr_same; 1223 1224 out_kfree: 1225 kfree(buf); 1226 return status; 1227 } 1228 1229 static __be32 1230 nfsd4_nverify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1231 struct nfsd4_verify *verify) 1232 { 1233 __be32 status; 1234 1235 status = _nfsd4_verify(rqstp, cstate, verify); 1236 return status == nfserr_not_same ? nfs_ok : status; 1237 } 1238 1239 static __be32 1240 nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, 1241 struct nfsd4_verify *verify) 1242 { 1243 __be32 status; 1244 1245 status = _nfsd4_verify(rqstp, cstate, verify); 1246 return status == nfserr_same ? nfs_ok : status; 1247 } 1248 1249 #ifdef CONFIG_NFSD_PNFS 1250 static const struct nfsd4_layout_ops * 1251 nfsd4_layout_verify(struct svc_export *exp, unsigned int layout_type) 1252 { 1253 if (!exp->ex_layout_types) { 1254 dprintk("%s: export does not support pNFS\n", __func__); 1255 return NULL; 1256 } 1257 1258 if (!(exp->ex_layout_types & (1 << layout_type))) { 1259 dprintk("%s: layout type %d not supported\n", 1260 __func__, layout_type); 1261 return NULL; 1262 } 1263 1264 return nfsd4_layout_ops[layout_type]; 1265 } 1266 1267 static __be32 1268 nfsd4_getdeviceinfo(struct svc_rqst *rqstp, 1269 struct nfsd4_compound_state *cstate, 1270 struct nfsd4_getdeviceinfo *gdp) 1271 { 1272 const struct nfsd4_layout_ops *ops; 1273 struct nfsd4_deviceid_map *map; 1274 struct svc_export *exp; 1275 __be32 nfserr; 1276 1277 dprintk("%s: layout_type %u dev_id [0x%llx:0x%x] maxcnt %u\n", 1278 __func__, 1279 gdp->gd_layout_type, 1280 gdp->gd_devid.fsid_idx, gdp->gd_devid.generation, 1281 gdp->gd_maxcount); 1282 1283 map = nfsd4_find_devid_map(gdp->gd_devid.fsid_idx); 1284 if (!map) { 1285 dprintk("%s: couldn't find device ID to export mapping!\n", 1286 __func__); 1287 return nfserr_noent; 1288 } 1289 1290 exp = rqst_exp_find(rqstp, map->fsid_type, map->fsid); 1291 if (IS_ERR(exp)) { 1292 dprintk("%s: could not find device id\n", __func__); 1293 return nfserr_noent; 1294 } 1295 1296 nfserr = nfserr_layoutunavailable; 1297 ops = nfsd4_layout_verify(exp, gdp->gd_layout_type); 1298 if (!ops) 1299 goto out; 1300 1301 nfserr = nfs_ok; 1302 if (gdp->gd_maxcount != 0) { 1303 nfserr = ops->proc_getdeviceinfo(exp->ex_path.mnt->mnt_sb, 1304 rqstp, cstate->session->se_client, gdp); 1305 } 1306 1307 gdp->gd_notify_types &= ops->notify_types; 1308 out: 1309 exp_put(exp); 1310 return nfserr; 1311 } 1312 1313 static __be32 1314 nfsd4_layoutget(struct svc_rqst *rqstp, 1315 struct nfsd4_compound_state *cstate, 1316 struct nfsd4_layoutget *lgp) 1317 { 1318 struct svc_fh *current_fh = &cstate->current_fh; 1319 const struct nfsd4_layout_ops *ops; 1320 struct nfs4_layout_stateid *ls; 1321 __be32 nfserr; 1322 int accmode; 1323 1324 switch (lgp->lg_seg.iomode) { 1325 case IOMODE_READ: 1326 accmode = NFSD_MAY_READ; 1327 break; 1328 case IOMODE_RW: 1329 accmode = NFSD_MAY_READ | NFSD_MAY_WRITE; 1330 break; 1331 default: 1332 dprintk("%s: invalid iomode %d\n", 1333 __func__, lgp->lg_seg.iomode); 1334 nfserr = nfserr_badiomode; 1335 goto out; 1336 } 1337 1338 nfserr = fh_verify(rqstp, current_fh, 0, accmode); 1339 if (nfserr) 1340 goto out; 1341 1342 nfserr = nfserr_layoutunavailable; 1343 ops = nfsd4_layout_verify(current_fh->fh_export, lgp->lg_layout_type); 1344 if (!ops) 1345 goto out; 1346 1347 /* 1348 * Verify minlength and range as per RFC5661: 1349 * o If loga_length is less than loga_minlength, 1350 * the metadata server MUST return NFS4ERR_INVAL. 1351 * o If the sum of loga_offset and loga_minlength exceeds 1352 * NFS4_UINT64_MAX, and loga_minlength is not 1353 * NFS4_UINT64_MAX, the error NFS4ERR_INVAL MUST result. 1354 * o If the sum of loga_offset and loga_length exceeds 1355 * NFS4_UINT64_MAX, and loga_length is not NFS4_UINT64_MAX, 1356 * the error NFS4ERR_INVAL MUST result. 1357 */ 1358 nfserr = nfserr_inval; 1359 if (lgp->lg_seg.length < lgp->lg_minlength || 1360 (lgp->lg_minlength != NFS4_MAX_UINT64 && 1361 lgp->lg_minlength > NFS4_MAX_UINT64 - lgp->lg_seg.offset) || 1362 (lgp->lg_seg.length != NFS4_MAX_UINT64 && 1363 lgp->lg_seg.length > NFS4_MAX_UINT64 - lgp->lg_seg.offset)) 1364 goto out; 1365 if (lgp->lg_seg.length == 0) 1366 goto out; 1367 1368 nfserr = nfsd4_preprocess_layout_stateid(rqstp, cstate, &lgp->lg_sid, 1369 true, lgp->lg_layout_type, &ls); 1370 if (nfserr) { 1371 trace_layout_get_lookup_fail(&lgp->lg_sid); 1372 goto out; 1373 } 1374 1375 nfserr = nfserr_recallconflict; 1376 if (atomic_read(&ls->ls_stid.sc_file->fi_lo_recalls)) 1377 goto out_put_stid; 1378 1379 nfserr = ops->proc_layoutget(d_inode(current_fh->fh_dentry), 1380 current_fh, lgp); 1381 if (nfserr) 1382 goto out_put_stid; 1383 1384 nfserr = nfsd4_insert_layout(lgp, ls); 1385 1386 out_put_stid: 1387 mutex_unlock(&ls->ls_mutex); 1388 nfs4_put_stid(&ls->ls_stid); 1389 out: 1390 return nfserr; 1391 } 1392 1393 static __be32 1394 nfsd4_layoutcommit(struct svc_rqst *rqstp, 1395 struct nfsd4_compound_state *cstate, 1396 struct nfsd4_layoutcommit *lcp) 1397 { 1398 const struct nfsd4_layout_seg *seg = &lcp->lc_seg; 1399 struct svc_fh *current_fh = &cstate->current_fh; 1400 const struct nfsd4_layout_ops *ops; 1401 loff_t new_size = lcp->lc_last_wr + 1; 1402 struct inode *inode; 1403 struct nfs4_layout_stateid *ls; 1404 __be32 nfserr; 1405 1406 nfserr = fh_verify(rqstp, current_fh, 0, NFSD_MAY_WRITE); 1407 if (nfserr) 1408 goto out; 1409 1410 nfserr = nfserr_layoutunavailable; 1411 ops = nfsd4_layout_verify(current_fh->fh_export, lcp->lc_layout_type); 1412 if (!ops) 1413 goto out; 1414 inode = d_inode(current_fh->fh_dentry); 1415 1416 nfserr = nfserr_inval; 1417 if (new_size <= seg->offset) { 1418 dprintk("pnfsd: last write before layout segment\n"); 1419 goto out; 1420 } 1421 if (new_size > seg->offset + seg->length) { 1422 dprintk("pnfsd: last write beyond layout segment\n"); 1423 goto out; 1424 } 1425 if (!lcp->lc_newoffset && new_size > i_size_read(inode)) { 1426 dprintk("pnfsd: layoutcommit beyond EOF\n"); 1427 goto out; 1428 } 1429 1430 nfserr = nfsd4_preprocess_layout_stateid(rqstp, cstate, &lcp->lc_sid, 1431 false, lcp->lc_layout_type, 1432 &ls); 1433 if (nfserr) { 1434 trace_layout_commit_lookup_fail(&lcp->lc_sid); 1435 /* fixup error code as per RFC5661 */ 1436 if (nfserr == nfserr_bad_stateid) 1437 nfserr = nfserr_badlayout; 1438 goto out; 1439 } 1440 1441 /* LAYOUTCOMMIT does not require any serialization */ 1442 mutex_unlock(&ls->ls_mutex); 1443 1444 if (new_size > i_size_read(inode)) { 1445 lcp->lc_size_chg = 1; 1446 lcp->lc_newsize = new_size; 1447 } else { 1448 lcp->lc_size_chg = 0; 1449 } 1450 1451 nfserr = ops->proc_layoutcommit(inode, lcp); 1452 nfs4_put_stid(&ls->ls_stid); 1453 out: 1454 return nfserr; 1455 } 1456 1457 static __be32 1458 nfsd4_layoutreturn(struct svc_rqst *rqstp, 1459 struct nfsd4_compound_state *cstate, 1460 struct nfsd4_layoutreturn *lrp) 1461 { 1462 struct svc_fh *current_fh = &cstate->current_fh; 1463 __be32 nfserr; 1464 1465 nfserr = fh_verify(rqstp, current_fh, 0, NFSD_MAY_NOP); 1466 if (nfserr) 1467 goto out; 1468 1469 nfserr = nfserr_layoutunavailable; 1470 if (!nfsd4_layout_verify(current_fh->fh_export, lrp->lr_layout_type)) 1471 goto out; 1472 1473 switch (lrp->lr_seg.iomode) { 1474 case IOMODE_READ: 1475 case IOMODE_RW: 1476 case IOMODE_ANY: 1477 break; 1478 default: 1479 dprintk("%s: invalid iomode %d\n", __func__, 1480 lrp->lr_seg.iomode); 1481 nfserr = nfserr_inval; 1482 goto out; 1483 } 1484 1485 switch (lrp->lr_return_type) { 1486 case RETURN_FILE: 1487 nfserr = nfsd4_return_file_layouts(rqstp, cstate, lrp); 1488 break; 1489 case RETURN_FSID: 1490 case RETURN_ALL: 1491 nfserr = nfsd4_return_client_layouts(rqstp, cstate, lrp); 1492 break; 1493 default: 1494 dprintk("%s: invalid return_type %d\n", __func__, 1495 lrp->lr_return_type); 1496 nfserr = nfserr_inval; 1497 break; 1498 } 1499 out: 1500 return nfserr; 1501 } 1502 #endif /* CONFIG_NFSD_PNFS */ 1503 1504 /* 1505 * NULL call. 1506 */ 1507 static __be32 1508 nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp) 1509 { 1510 return nfs_ok; 1511 } 1512 1513 static inline void nfsd4_increment_op_stats(u32 opnum) 1514 { 1515 if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP) 1516 nfsdstats.nfs4_opcount[opnum]++; 1517 } 1518 1519 typedef __be32(*nfsd4op_func)(struct svc_rqst *, struct nfsd4_compound_state *, 1520 void *); 1521 typedef u32(*nfsd4op_rsize)(struct svc_rqst *, struct nfsd4_op *op); 1522 typedef void(*stateid_setter)(struct nfsd4_compound_state *, void *); 1523 typedef void(*stateid_getter)(struct nfsd4_compound_state *, void *); 1524 1525 enum nfsd4_op_flags { 1526 ALLOWED_WITHOUT_FH = 1 << 0, /* No current filehandle required */ 1527 ALLOWED_ON_ABSENT_FS = 1 << 1, /* ops processed on absent fs */ 1528 ALLOWED_AS_FIRST_OP = 1 << 2, /* ops reqired first in compound */ 1529 /* For rfc 5661 section 2.6.3.1.1: */ 1530 OP_HANDLES_WRONGSEC = 1 << 3, 1531 OP_IS_PUTFH_LIKE = 1 << 4, 1532 /* 1533 * These are the ops whose result size we estimate before 1534 * encoding, to avoid performing an op then not being able to 1535 * respond or cache a response. This includes writes and setattrs 1536 * as well as the operations usually called "nonidempotent": 1537 */ 1538 OP_MODIFIES_SOMETHING = 1 << 5, 1539 /* 1540 * Cache compounds containing these ops in the xid-based drc: 1541 * We use the DRC for compounds containing non-idempotent 1542 * operations, *except* those that are 4.1-specific (since 1543 * sessions provide their own EOS), and except for stateful 1544 * operations other than setclientid and setclientid_confirm 1545 * (since sequence numbers provide EOS for open, lock, etc in 1546 * the v4.0 case). 1547 */ 1548 OP_CACHEME = 1 << 6, 1549 /* 1550 * These are ops which clear current state id. 1551 */ 1552 OP_CLEAR_STATEID = 1 << 7, 1553 }; 1554 1555 struct nfsd4_operation { 1556 nfsd4op_func op_func; 1557 u32 op_flags; 1558 char *op_name; 1559 /* Try to get response size before operation */ 1560 nfsd4op_rsize op_rsize_bop; 1561 stateid_getter op_get_currentstateid; 1562 stateid_setter op_set_currentstateid; 1563 }; 1564 1565 static struct nfsd4_operation nfsd4_ops[]; 1566 1567 static const char *nfsd4_op_name(unsigned opnum); 1568 1569 /* 1570 * Enforce NFSv4.1 COMPOUND ordering rules: 1571 * 1572 * Also note, enforced elsewhere: 1573 * - SEQUENCE other than as first op results in 1574 * NFS4ERR_SEQUENCE_POS. (Enforced in nfsd4_sequence().) 1575 * - BIND_CONN_TO_SESSION must be the only op in its compound. 1576 * (Enforced in nfsd4_bind_conn_to_session().) 1577 * - DESTROY_SESSION must be the final operation in a compound, if 1578 * sessionid's in SEQUENCE and DESTROY_SESSION are the same. 1579 * (Enforced in nfsd4_destroy_session().) 1580 */ 1581 static __be32 nfs41_check_op_ordering(struct nfsd4_compoundargs *args) 1582 { 1583 struct nfsd4_op *op = &args->ops[0]; 1584 1585 /* These ordering requirements don't apply to NFSv4.0: */ 1586 if (args->minorversion == 0) 1587 return nfs_ok; 1588 /* This is weird, but OK, not our problem: */ 1589 if (args->opcnt == 0) 1590 return nfs_ok; 1591 if (op->status == nfserr_op_illegal) 1592 return nfs_ok; 1593 if (!(nfsd4_ops[op->opnum].op_flags & ALLOWED_AS_FIRST_OP)) 1594 return nfserr_op_not_in_session; 1595 if (op->opnum == OP_SEQUENCE) 1596 return nfs_ok; 1597 if (args->opcnt != 1) 1598 return nfserr_not_only_op; 1599 return nfs_ok; 1600 } 1601 1602 static inline struct nfsd4_operation *OPDESC(struct nfsd4_op *op) 1603 { 1604 return &nfsd4_ops[op->opnum]; 1605 } 1606 1607 bool nfsd4_cache_this_op(struct nfsd4_op *op) 1608 { 1609 if (op->opnum == OP_ILLEGAL) 1610 return false; 1611 return OPDESC(op)->op_flags & OP_CACHEME; 1612 } 1613 1614 static bool need_wrongsec_check(struct svc_rqst *rqstp) 1615 { 1616 struct nfsd4_compoundres *resp = rqstp->rq_resp; 1617 struct nfsd4_compoundargs *argp = rqstp->rq_argp; 1618 struct nfsd4_op *this = &argp->ops[resp->opcnt - 1]; 1619 struct nfsd4_op *next = &argp->ops[resp->opcnt]; 1620 struct nfsd4_operation *thisd; 1621 struct nfsd4_operation *nextd; 1622 1623 thisd = OPDESC(this); 1624 /* 1625 * Most ops check wronsec on our own; only the putfh-like ops 1626 * have special rules. 1627 */ 1628 if (!(thisd->op_flags & OP_IS_PUTFH_LIKE)) 1629 return false; 1630 /* 1631 * rfc 5661 2.6.3.1.1.6: don't bother erroring out a 1632 * put-filehandle operation if we're not going to use the 1633 * result: 1634 */ 1635 if (argp->opcnt == resp->opcnt) 1636 return false; 1637 if (next->opnum == OP_ILLEGAL) 1638 return false; 1639 nextd = OPDESC(next); 1640 /* 1641 * Rest of 2.6.3.1.1: certain operations will return WRONGSEC 1642 * errors themselves as necessary; others should check for them 1643 * now: 1644 */ 1645 return !(nextd->op_flags & OP_HANDLES_WRONGSEC); 1646 } 1647 1648 static void svcxdr_init_encode(struct svc_rqst *rqstp, 1649 struct nfsd4_compoundres *resp) 1650 { 1651 struct xdr_stream *xdr = &resp->xdr; 1652 struct xdr_buf *buf = &rqstp->rq_res; 1653 struct kvec *head = buf->head; 1654 1655 xdr->buf = buf; 1656 xdr->iov = head; 1657 xdr->p = head->iov_base + head->iov_len; 1658 xdr->end = head->iov_base + PAGE_SIZE - rqstp->rq_auth_slack; 1659 /* Tail and page_len should be zero at this point: */ 1660 buf->len = buf->head[0].iov_len; 1661 xdr->scratch.iov_len = 0; 1662 xdr->page_ptr = buf->pages - 1; 1663 buf->buflen = PAGE_SIZE * (1 + rqstp->rq_page_end - buf->pages) 1664 - rqstp->rq_auth_slack; 1665 } 1666 1667 /* 1668 * COMPOUND call. 1669 */ 1670 static __be32 1671 nfsd4_proc_compound(struct svc_rqst *rqstp, 1672 struct nfsd4_compoundargs *args, 1673 struct nfsd4_compoundres *resp) 1674 { 1675 struct nfsd4_op *op; 1676 struct nfsd4_operation *opdesc; 1677 struct nfsd4_compound_state *cstate = &resp->cstate; 1678 struct svc_fh *current_fh = &cstate->current_fh; 1679 struct svc_fh *save_fh = &cstate->save_fh; 1680 __be32 status; 1681 1682 svcxdr_init_encode(rqstp, resp); 1683 resp->tagp = resp->xdr.p; 1684 /* reserve space for: taglen, tag, and opcnt */ 1685 xdr_reserve_space(&resp->xdr, 8 + args->taglen); 1686 resp->taglen = args->taglen; 1687 resp->tag = args->tag; 1688 resp->rqstp = rqstp; 1689 cstate->minorversion = args->minorversion; 1690 fh_init(current_fh, NFS4_FHSIZE); 1691 fh_init(save_fh, NFS4_FHSIZE); 1692 /* 1693 * Don't use the deferral mechanism for NFSv4; compounds make it 1694 * too hard to avoid non-idempotency problems. 1695 */ 1696 clear_bit(RQ_USEDEFERRAL, &rqstp->rq_flags); 1697 1698 /* 1699 * According to RFC3010, this takes precedence over all other errors. 1700 */ 1701 status = nfserr_minor_vers_mismatch; 1702 if (nfsd_minorversion(args->minorversion, NFSD_TEST) <= 0) 1703 goto out; 1704 1705 status = nfs41_check_op_ordering(args); 1706 if (status) { 1707 op = &args->ops[0]; 1708 op->status = status; 1709 goto encode_op; 1710 } 1711 1712 while (!status && resp->opcnt < args->opcnt) { 1713 op = &args->ops[resp->opcnt++]; 1714 1715 dprintk("nfsv4 compound op #%d/%d: %d (%s)\n", 1716 resp->opcnt, args->opcnt, op->opnum, 1717 nfsd4_op_name(op->opnum)); 1718 /* 1719 * The XDR decode routines may have pre-set op->status; 1720 * for example, if there is a miscellaneous XDR error 1721 * it will be set to nfserr_bad_xdr. 1722 */ 1723 if (op->status) { 1724 if (op->opnum == OP_OPEN) 1725 op->status = nfsd4_open_omfg(rqstp, cstate, op); 1726 goto encode_op; 1727 } 1728 1729 opdesc = OPDESC(op); 1730 1731 if (!current_fh->fh_dentry) { 1732 if (!(opdesc->op_flags & ALLOWED_WITHOUT_FH)) { 1733 op->status = nfserr_nofilehandle; 1734 goto encode_op; 1735 } 1736 } else if (current_fh->fh_export->ex_fslocs.migrated && 1737 !(opdesc->op_flags & ALLOWED_ON_ABSENT_FS)) { 1738 op->status = nfserr_moved; 1739 goto encode_op; 1740 } 1741 1742 fh_clear_wcc(current_fh); 1743 1744 /* If op is non-idempotent */ 1745 if (opdesc->op_flags & OP_MODIFIES_SOMETHING) { 1746 /* 1747 * Don't execute this op if we couldn't encode a 1748 * succesful reply: 1749 */ 1750 u32 plen = opdesc->op_rsize_bop(rqstp, op); 1751 /* 1752 * Plus if there's another operation, make sure 1753 * we'll have space to at least encode an error: 1754 */ 1755 if (resp->opcnt < args->opcnt) 1756 plen += COMPOUND_ERR_SLACK_SPACE; 1757 op->status = nfsd4_check_resp_size(resp, plen); 1758 } 1759 1760 if (op->status) 1761 goto encode_op; 1762 1763 if (opdesc->op_get_currentstateid) 1764 opdesc->op_get_currentstateid(cstate, &op->u); 1765 op->status = opdesc->op_func(rqstp, cstate, &op->u); 1766 1767 if (!op->status) { 1768 if (opdesc->op_set_currentstateid) 1769 opdesc->op_set_currentstateid(cstate, &op->u); 1770 1771 if (opdesc->op_flags & OP_CLEAR_STATEID) 1772 clear_current_stateid(cstate); 1773 1774 if (need_wrongsec_check(rqstp)) 1775 op->status = check_nfsd_access(current_fh->fh_export, rqstp); 1776 } 1777 1778 encode_op: 1779 /* Only from SEQUENCE */ 1780 if (cstate->status == nfserr_replay_cache) { 1781 dprintk("%s NFS4.1 replay from cache\n", __func__); 1782 status = op->status; 1783 goto out; 1784 } 1785 if (op->status == nfserr_replay_me) { 1786 op->replay = &cstate->replay_owner->so_replay; 1787 nfsd4_encode_replay(&resp->xdr, op); 1788 status = op->status = op->replay->rp_status; 1789 } else { 1790 nfsd4_encode_operation(resp, op); 1791 status = op->status; 1792 } 1793 1794 dprintk("nfsv4 compound op %p opcnt %d #%d: %d: status %d\n", 1795 args->ops, args->opcnt, resp->opcnt, op->opnum, 1796 be32_to_cpu(status)); 1797 1798 nfsd4_cstate_clear_replay(cstate); 1799 nfsd4_increment_op_stats(op->opnum); 1800 } 1801 1802 cstate->status = status; 1803 fh_put(current_fh); 1804 fh_put(save_fh); 1805 BUG_ON(cstate->replay_owner); 1806 out: 1807 /* Reset deferral mechanism for RPC deferrals */ 1808 set_bit(RQ_USEDEFERRAL, &rqstp->rq_flags); 1809 dprintk("nfsv4 compound returned %d\n", ntohl(status)); 1810 return status; 1811 } 1812 1813 #define op_encode_hdr_size (2) 1814 #define op_encode_stateid_maxsz (XDR_QUADLEN(NFS4_STATEID_SIZE)) 1815 #define op_encode_verifier_maxsz (XDR_QUADLEN(NFS4_VERIFIER_SIZE)) 1816 #define op_encode_change_info_maxsz (5) 1817 #define nfs4_fattr_bitmap_maxsz (4) 1818 1819 /* We'll fall back on returning no lockowner if run out of space: */ 1820 #define op_encode_lockowner_maxsz (0) 1821 #define op_encode_lock_denied_maxsz (8 + op_encode_lockowner_maxsz) 1822 1823 #define nfs4_owner_maxsz (1 + XDR_QUADLEN(IDMAP_NAMESZ)) 1824 1825 #define op_encode_ace_maxsz (3 + nfs4_owner_maxsz) 1826 #define op_encode_delegation_maxsz (1 + op_encode_stateid_maxsz + 1 + \ 1827 op_encode_ace_maxsz) 1828 1829 #define op_encode_channel_attrs_maxsz (6 + 1 + 1) 1830 1831 static inline u32 nfsd4_only_status_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1832 { 1833 return (op_encode_hdr_size) * sizeof(__be32); 1834 } 1835 1836 static inline u32 nfsd4_status_stateid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1837 { 1838 return (op_encode_hdr_size + op_encode_stateid_maxsz)* sizeof(__be32); 1839 } 1840 1841 static inline u32 nfsd4_commit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1842 { 1843 return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32); 1844 } 1845 1846 static inline u32 nfsd4_create_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1847 { 1848 return (op_encode_hdr_size + op_encode_change_info_maxsz 1849 + nfs4_fattr_bitmap_maxsz) * sizeof(__be32); 1850 } 1851 1852 /* 1853 * Note since this is an idempotent operation we won't insist on failing 1854 * the op prematurely if the estimate is too large. We may turn off splice 1855 * reads unnecessarily. 1856 */ 1857 static inline u32 nfsd4_getattr_rsize(struct svc_rqst *rqstp, 1858 struct nfsd4_op *op) 1859 { 1860 u32 *bmap = op->u.getattr.ga_bmval; 1861 u32 bmap0 = bmap[0], bmap1 = bmap[1], bmap2 = bmap[2]; 1862 u32 ret = 0; 1863 1864 if (bmap0 & FATTR4_WORD0_ACL) 1865 return svc_max_payload(rqstp); 1866 if (bmap0 & FATTR4_WORD0_FS_LOCATIONS) 1867 return svc_max_payload(rqstp); 1868 1869 if (bmap1 & FATTR4_WORD1_OWNER) { 1870 ret += IDMAP_NAMESZ + 4; 1871 bmap1 &= ~FATTR4_WORD1_OWNER; 1872 } 1873 if (bmap1 & FATTR4_WORD1_OWNER_GROUP) { 1874 ret += IDMAP_NAMESZ + 4; 1875 bmap1 &= ~FATTR4_WORD1_OWNER_GROUP; 1876 } 1877 if (bmap0 & FATTR4_WORD0_FILEHANDLE) { 1878 ret += NFS4_FHSIZE + 4; 1879 bmap0 &= ~FATTR4_WORD0_FILEHANDLE; 1880 } 1881 if (bmap2 & FATTR4_WORD2_SECURITY_LABEL) { 1882 ret += NFS4_MAXLABELLEN + 12; 1883 bmap2 &= ~FATTR4_WORD2_SECURITY_LABEL; 1884 } 1885 /* 1886 * Largest of remaining attributes are 16 bytes (e.g., 1887 * supported_attributes) 1888 */ 1889 ret += 16 * (hweight32(bmap0) + hweight32(bmap1) + hweight32(bmap2)); 1890 /* bitmask, length */ 1891 ret += 20; 1892 return ret; 1893 } 1894 1895 static inline u32 nfsd4_link_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1896 { 1897 return (op_encode_hdr_size + op_encode_change_info_maxsz) 1898 * sizeof(__be32); 1899 } 1900 1901 static inline u32 nfsd4_lock_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1902 { 1903 return (op_encode_hdr_size + op_encode_lock_denied_maxsz) 1904 * sizeof(__be32); 1905 } 1906 1907 static inline u32 nfsd4_open_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1908 { 1909 return (op_encode_hdr_size + op_encode_stateid_maxsz 1910 + op_encode_change_info_maxsz + 1 1911 + nfs4_fattr_bitmap_maxsz 1912 + op_encode_delegation_maxsz) * sizeof(__be32); 1913 } 1914 1915 static inline u32 nfsd4_read_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1916 { 1917 u32 maxcount = 0, rlen = 0; 1918 1919 maxcount = svc_max_payload(rqstp); 1920 rlen = min(op->u.read.rd_length, maxcount); 1921 1922 return (op_encode_hdr_size + 2 + XDR_QUADLEN(rlen)) * sizeof(__be32); 1923 } 1924 1925 static inline u32 nfsd4_readdir_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1926 { 1927 u32 maxcount = 0, rlen = 0; 1928 1929 maxcount = svc_max_payload(rqstp); 1930 rlen = min(op->u.readdir.rd_maxcount, maxcount); 1931 1932 return (op_encode_hdr_size + op_encode_verifier_maxsz + 1933 XDR_QUADLEN(rlen)) * sizeof(__be32); 1934 } 1935 1936 static inline u32 nfsd4_remove_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1937 { 1938 return (op_encode_hdr_size + op_encode_change_info_maxsz) 1939 * sizeof(__be32); 1940 } 1941 1942 static inline u32 nfsd4_rename_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1943 { 1944 return (op_encode_hdr_size + op_encode_change_info_maxsz 1945 + op_encode_change_info_maxsz) * sizeof(__be32); 1946 } 1947 1948 static inline u32 nfsd4_sequence_rsize(struct svc_rqst *rqstp, 1949 struct nfsd4_op *op) 1950 { 1951 return (op_encode_hdr_size 1952 + XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + 5) * sizeof(__be32); 1953 } 1954 1955 static inline u32 nfsd4_setattr_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1956 { 1957 return (op_encode_hdr_size + nfs4_fattr_bitmap_maxsz) * sizeof(__be32); 1958 } 1959 1960 static inline u32 nfsd4_setclientid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1961 { 1962 return (op_encode_hdr_size + 2 + XDR_QUADLEN(NFS4_VERIFIER_SIZE)) * 1963 sizeof(__be32); 1964 } 1965 1966 static inline u32 nfsd4_write_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1967 { 1968 return (op_encode_hdr_size + 2 + op_encode_verifier_maxsz) * sizeof(__be32); 1969 } 1970 1971 static inline u32 nfsd4_exchange_id_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1972 { 1973 return (op_encode_hdr_size + 2 + 1 + /* eir_clientid, eir_sequenceid */\ 1974 1 + 1 + /* eir_flags, spr_how */\ 1975 4 + /* spo_must_enforce & _allow with bitmap */\ 1976 2 + /*eir_server_owner.so_minor_id */\ 1977 /* eir_server_owner.so_major_id<> */\ 1978 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\ 1979 /* eir_server_scope<> */\ 1980 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\ 1981 1 + /* eir_server_impl_id array length */\ 1982 0 /* ignored eir_server_impl_id contents */) * sizeof(__be32); 1983 } 1984 1985 static inline u32 nfsd4_bind_conn_to_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1986 { 1987 return (op_encode_hdr_size + \ 1988 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* bctsr_sessid */\ 1989 2 /* bctsr_dir, use_conn_in_rdma_mode */) * sizeof(__be32); 1990 } 1991 1992 static inline u32 nfsd4_create_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 1993 { 1994 return (op_encode_hdr_size + \ 1995 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* sessionid */\ 1996 2 + /* csr_sequence, csr_flags */\ 1997 op_encode_channel_attrs_maxsz + \ 1998 op_encode_channel_attrs_maxsz) * sizeof(__be32); 1999 } 2000 2001 static inline u32 nfsd4_copy_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 2002 { 2003 return (op_encode_hdr_size + 2004 1 /* wr_callback */ + 2005 op_encode_stateid_maxsz /* wr_callback */ + 2006 2 /* wr_count */ + 2007 1 /* wr_committed */ + 2008 op_encode_verifier_maxsz + 2009 1 /* cr_consecutive */ + 2010 1 /* cr_synchronous */) * sizeof(__be32); 2011 } 2012 2013 #ifdef CONFIG_NFSD_PNFS 2014 /* 2015 * At this stage we don't really know what layout driver will handle the request, 2016 * so we need to define an arbitrary upper bound here. 2017 */ 2018 #define MAX_LAYOUT_SIZE 128 2019 static inline u32 nfsd4_layoutget_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 2020 { 2021 return (op_encode_hdr_size + 2022 1 /* logr_return_on_close */ + 2023 op_encode_stateid_maxsz + 2024 1 /* nr of layouts */ + 2025 MAX_LAYOUT_SIZE) * sizeof(__be32); 2026 } 2027 2028 static inline u32 nfsd4_layoutcommit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 2029 { 2030 return (op_encode_hdr_size + 2031 1 /* locr_newsize */ + 2032 2 /* ns_size */) * sizeof(__be32); 2033 } 2034 2035 static inline u32 nfsd4_layoutreturn_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op) 2036 { 2037 return (op_encode_hdr_size + 2038 1 /* lrs_stateid */ + 2039 op_encode_stateid_maxsz) * sizeof(__be32); 2040 } 2041 #endif /* CONFIG_NFSD_PNFS */ 2042 2043 static struct nfsd4_operation nfsd4_ops[] = { 2044 [OP_ACCESS] = { 2045 .op_func = (nfsd4op_func)nfsd4_access, 2046 .op_name = "OP_ACCESS", 2047 }, 2048 [OP_CLOSE] = { 2049 .op_func = (nfsd4op_func)nfsd4_close, 2050 .op_flags = OP_MODIFIES_SOMETHING, 2051 .op_name = "OP_CLOSE", 2052 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize, 2053 .op_get_currentstateid = (stateid_getter)nfsd4_get_closestateid, 2054 .op_set_currentstateid = (stateid_setter)nfsd4_set_closestateid, 2055 }, 2056 [OP_COMMIT] = { 2057 .op_func = (nfsd4op_func)nfsd4_commit, 2058 .op_flags = OP_MODIFIES_SOMETHING, 2059 .op_name = "OP_COMMIT", 2060 .op_rsize_bop = (nfsd4op_rsize)nfsd4_commit_rsize, 2061 }, 2062 [OP_CREATE] = { 2063 .op_func = (nfsd4op_func)nfsd4_create, 2064 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME | OP_CLEAR_STATEID, 2065 .op_name = "OP_CREATE", 2066 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_rsize, 2067 }, 2068 [OP_DELEGRETURN] = { 2069 .op_func = (nfsd4op_func)nfsd4_delegreturn, 2070 .op_flags = OP_MODIFIES_SOMETHING, 2071 .op_name = "OP_DELEGRETURN", 2072 .op_rsize_bop = nfsd4_only_status_rsize, 2073 .op_get_currentstateid = (stateid_getter)nfsd4_get_delegreturnstateid, 2074 }, 2075 [OP_GETATTR] = { 2076 .op_func = (nfsd4op_func)nfsd4_getattr, 2077 .op_flags = ALLOWED_ON_ABSENT_FS, 2078 .op_rsize_bop = nfsd4_getattr_rsize, 2079 .op_name = "OP_GETATTR", 2080 }, 2081 [OP_GETFH] = { 2082 .op_func = (nfsd4op_func)nfsd4_getfh, 2083 .op_name = "OP_GETFH", 2084 }, 2085 [OP_LINK] = { 2086 .op_func = (nfsd4op_func)nfsd4_link, 2087 .op_flags = ALLOWED_ON_ABSENT_FS | OP_MODIFIES_SOMETHING 2088 | OP_CACHEME, 2089 .op_name = "OP_LINK", 2090 .op_rsize_bop = (nfsd4op_rsize)nfsd4_link_rsize, 2091 }, 2092 [OP_LOCK] = { 2093 .op_func = (nfsd4op_func)nfsd4_lock, 2094 .op_flags = OP_MODIFIES_SOMETHING, 2095 .op_name = "OP_LOCK", 2096 .op_rsize_bop = (nfsd4op_rsize)nfsd4_lock_rsize, 2097 .op_set_currentstateid = (stateid_setter)nfsd4_set_lockstateid, 2098 }, 2099 [OP_LOCKT] = { 2100 .op_func = (nfsd4op_func)nfsd4_lockt, 2101 .op_name = "OP_LOCKT", 2102 }, 2103 [OP_LOCKU] = { 2104 .op_func = (nfsd4op_func)nfsd4_locku, 2105 .op_flags = OP_MODIFIES_SOMETHING, 2106 .op_name = "OP_LOCKU", 2107 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize, 2108 .op_get_currentstateid = (stateid_getter)nfsd4_get_lockustateid, 2109 }, 2110 [OP_LOOKUP] = { 2111 .op_func = (nfsd4op_func)nfsd4_lookup, 2112 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID, 2113 .op_name = "OP_LOOKUP", 2114 }, 2115 [OP_LOOKUPP] = { 2116 .op_func = (nfsd4op_func)nfsd4_lookupp, 2117 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID, 2118 .op_name = "OP_LOOKUPP", 2119 }, 2120 [OP_NVERIFY] = { 2121 .op_func = (nfsd4op_func)nfsd4_nverify, 2122 .op_name = "OP_NVERIFY", 2123 }, 2124 [OP_OPEN] = { 2125 .op_func = (nfsd4op_func)nfsd4_open, 2126 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING, 2127 .op_name = "OP_OPEN", 2128 .op_rsize_bop = (nfsd4op_rsize)nfsd4_open_rsize, 2129 .op_set_currentstateid = (stateid_setter)nfsd4_set_openstateid, 2130 }, 2131 [OP_OPEN_CONFIRM] = { 2132 .op_func = (nfsd4op_func)nfsd4_open_confirm, 2133 .op_flags = OP_MODIFIES_SOMETHING, 2134 .op_name = "OP_OPEN_CONFIRM", 2135 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize, 2136 }, 2137 [OP_OPEN_DOWNGRADE] = { 2138 .op_func = (nfsd4op_func)nfsd4_open_downgrade, 2139 .op_flags = OP_MODIFIES_SOMETHING, 2140 .op_name = "OP_OPEN_DOWNGRADE", 2141 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize, 2142 .op_get_currentstateid = (stateid_getter)nfsd4_get_opendowngradestateid, 2143 .op_set_currentstateid = (stateid_setter)nfsd4_set_opendowngradestateid, 2144 }, 2145 [OP_PUTFH] = { 2146 .op_func = (nfsd4op_func)nfsd4_putfh, 2147 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2148 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID, 2149 .op_name = "OP_PUTFH", 2150 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2151 }, 2152 [OP_PUTPUBFH] = { 2153 .op_func = (nfsd4op_func)nfsd4_putrootfh, 2154 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2155 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID, 2156 .op_name = "OP_PUTPUBFH", 2157 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2158 }, 2159 [OP_PUTROOTFH] = { 2160 .op_func = (nfsd4op_func)nfsd4_putrootfh, 2161 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2162 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID, 2163 .op_name = "OP_PUTROOTFH", 2164 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2165 }, 2166 [OP_READ] = { 2167 .op_func = (nfsd4op_func)nfsd4_read, 2168 .op_name = "OP_READ", 2169 .op_rsize_bop = (nfsd4op_rsize)nfsd4_read_rsize, 2170 .op_get_currentstateid = (stateid_getter)nfsd4_get_readstateid, 2171 }, 2172 [OP_READDIR] = { 2173 .op_func = (nfsd4op_func)nfsd4_readdir, 2174 .op_name = "OP_READDIR", 2175 .op_rsize_bop = (nfsd4op_rsize)nfsd4_readdir_rsize, 2176 }, 2177 [OP_READLINK] = { 2178 .op_func = (nfsd4op_func)nfsd4_readlink, 2179 .op_name = "OP_READLINK", 2180 }, 2181 [OP_REMOVE] = { 2182 .op_func = (nfsd4op_func)nfsd4_remove, 2183 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2184 .op_name = "OP_REMOVE", 2185 .op_rsize_bop = (nfsd4op_rsize)nfsd4_remove_rsize, 2186 }, 2187 [OP_RENAME] = { 2188 .op_func = (nfsd4op_func)nfsd4_rename, 2189 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2190 .op_name = "OP_RENAME", 2191 .op_rsize_bop = (nfsd4op_rsize)nfsd4_rename_rsize, 2192 }, 2193 [OP_RENEW] = { 2194 .op_func = (nfsd4op_func)nfsd4_renew, 2195 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2196 | OP_MODIFIES_SOMETHING, 2197 .op_name = "OP_RENEW", 2198 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2199 2200 }, 2201 [OP_RESTOREFH] = { 2202 .op_func = (nfsd4op_func)nfsd4_restorefh, 2203 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2204 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING, 2205 .op_name = "OP_RESTOREFH", 2206 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2207 }, 2208 [OP_SAVEFH] = { 2209 .op_func = (nfsd4op_func)nfsd4_savefh, 2210 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING, 2211 .op_name = "OP_SAVEFH", 2212 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2213 }, 2214 [OP_SECINFO] = { 2215 .op_func = (nfsd4op_func)nfsd4_secinfo, 2216 .op_flags = OP_HANDLES_WRONGSEC, 2217 .op_name = "OP_SECINFO", 2218 }, 2219 [OP_SETATTR] = { 2220 .op_func = (nfsd4op_func)nfsd4_setattr, 2221 .op_name = "OP_SETATTR", 2222 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2223 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setattr_rsize, 2224 .op_get_currentstateid = (stateid_getter)nfsd4_get_setattrstateid, 2225 }, 2226 [OP_SETCLIENTID] = { 2227 .op_func = (nfsd4op_func)nfsd4_setclientid, 2228 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2229 | OP_MODIFIES_SOMETHING | OP_CACHEME, 2230 .op_name = "OP_SETCLIENTID", 2231 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setclientid_rsize, 2232 }, 2233 [OP_SETCLIENTID_CONFIRM] = { 2234 .op_func = (nfsd4op_func)nfsd4_setclientid_confirm, 2235 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2236 | OP_MODIFIES_SOMETHING | OP_CACHEME, 2237 .op_name = "OP_SETCLIENTID_CONFIRM", 2238 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2239 }, 2240 [OP_VERIFY] = { 2241 .op_func = (nfsd4op_func)nfsd4_verify, 2242 .op_name = "OP_VERIFY", 2243 }, 2244 [OP_WRITE] = { 2245 .op_func = (nfsd4op_func)nfsd4_write, 2246 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2247 .op_name = "OP_WRITE", 2248 .op_rsize_bop = (nfsd4op_rsize)nfsd4_write_rsize, 2249 .op_get_currentstateid = (stateid_getter)nfsd4_get_writestateid, 2250 }, 2251 [OP_RELEASE_LOCKOWNER] = { 2252 .op_func = (nfsd4op_func)nfsd4_release_lockowner, 2253 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS 2254 | OP_MODIFIES_SOMETHING, 2255 .op_name = "OP_RELEASE_LOCKOWNER", 2256 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2257 }, 2258 2259 /* NFSv4.1 operations */ 2260 [OP_EXCHANGE_ID] = { 2261 .op_func = (nfsd4op_func)nfsd4_exchange_id, 2262 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP 2263 | OP_MODIFIES_SOMETHING, 2264 .op_name = "OP_EXCHANGE_ID", 2265 .op_rsize_bop = (nfsd4op_rsize)nfsd4_exchange_id_rsize, 2266 }, 2267 [OP_BACKCHANNEL_CTL] = { 2268 .op_func = (nfsd4op_func)nfsd4_backchannel_ctl, 2269 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING, 2270 .op_name = "OP_BACKCHANNEL_CTL", 2271 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2272 }, 2273 [OP_BIND_CONN_TO_SESSION] = { 2274 .op_func = (nfsd4op_func)nfsd4_bind_conn_to_session, 2275 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP 2276 | OP_MODIFIES_SOMETHING, 2277 .op_name = "OP_BIND_CONN_TO_SESSION", 2278 .op_rsize_bop = (nfsd4op_rsize)nfsd4_bind_conn_to_session_rsize, 2279 }, 2280 [OP_CREATE_SESSION] = { 2281 .op_func = (nfsd4op_func)nfsd4_create_session, 2282 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP 2283 | OP_MODIFIES_SOMETHING, 2284 .op_name = "OP_CREATE_SESSION", 2285 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_session_rsize, 2286 }, 2287 [OP_DESTROY_SESSION] = { 2288 .op_func = (nfsd4op_func)nfsd4_destroy_session, 2289 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP 2290 | OP_MODIFIES_SOMETHING, 2291 .op_name = "OP_DESTROY_SESSION", 2292 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2293 }, 2294 [OP_SEQUENCE] = { 2295 .op_func = (nfsd4op_func)nfsd4_sequence, 2296 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP, 2297 .op_name = "OP_SEQUENCE", 2298 .op_rsize_bop = (nfsd4op_rsize)nfsd4_sequence_rsize, 2299 }, 2300 [OP_DESTROY_CLIENTID] = { 2301 .op_func = (nfsd4op_func)nfsd4_destroy_clientid, 2302 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP 2303 | OP_MODIFIES_SOMETHING, 2304 .op_name = "OP_DESTROY_CLIENTID", 2305 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2306 }, 2307 [OP_RECLAIM_COMPLETE] = { 2308 .op_func = (nfsd4op_func)nfsd4_reclaim_complete, 2309 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING, 2310 .op_name = "OP_RECLAIM_COMPLETE", 2311 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2312 }, 2313 [OP_SECINFO_NO_NAME] = { 2314 .op_func = (nfsd4op_func)nfsd4_secinfo_no_name, 2315 .op_flags = OP_HANDLES_WRONGSEC, 2316 .op_name = "OP_SECINFO_NO_NAME", 2317 }, 2318 [OP_TEST_STATEID] = { 2319 .op_func = (nfsd4op_func)nfsd4_test_stateid, 2320 .op_flags = ALLOWED_WITHOUT_FH, 2321 .op_name = "OP_TEST_STATEID", 2322 }, 2323 [OP_FREE_STATEID] = { 2324 .op_func = (nfsd4op_func)nfsd4_free_stateid, 2325 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING, 2326 .op_name = "OP_FREE_STATEID", 2327 .op_get_currentstateid = (stateid_getter)nfsd4_get_freestateid, 2328 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2329 }, 2330 #ifdef CONFIG_NFSD_PNFS 2331 [OP_GETDEVICEINFO] = { 2332 .op_func = (nfsd4op_func)nfsd4_getdeviceinfo, 2333 .op_flags = ALLOWED_WITHOUT_FH, 2334 .op_name = "OP_GETDEVICEINFO", 2335 }, 2336 [OP_LAYOUTGET] = { 2337 .op_func = (nfsd4op_func)nfsd4_layoutget, 2338 .op_flags = OP_MODIFIES_SOMETHING, 2339 .op_name = "OP_LAYOUTGET", 2340 .op_rsize_bop = (nfsd4op_rsize)nfsd4_layoutget_rsize, 2341 }, 2342 [OP_LAYOUTCOMMIT] = { 2343 .op_func = (nfsd4op_func)nfsd4_layoutcommit, 2344 .op_flags = OP_MODIFIES_SOMETHING, 2345 .op_name = "OP_LAYOUTCOMMIT", 2346 .op_rsize_bop = (nfsd4op_rsize)nfsd4_layoutcommit_rsize, 2347 }, 2348 [OP_LAYOUTRETURN] = { 2349 .op_func = (nfsd4op_func)nfsd4_layoutreturn, 2350 .op_flags = OP_MODIFIES_SOMETHING, 2351 .op_name = "OP_LAYOUTRETURN", 2352 .op_rsize_bop = (nfsd4op_rsize)nfsd4_layoutreturn_rsize, 2353 }, 2354 #endif /* CONFIG_NFSD_PNFS */ 2355 2356 /* NFSv4.2 operations */ 2357 [OP_ALLOCATE] = { 2358 .op_func = (nfsd4op_func)nfsd4_allocate, 2359 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2360 .op_name = "OP_ALLOCATE", 2361 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2362 }, 2363 [OP_DEALLOCATE] = { 2364 .op_func = (nfsd4op_func)nfsd4_deallocate, 2365 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2366 .op_name = "OP_DEALLOCATE", 2367 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2368 }, 2369 [OP_CLONE] = { 2370 .op_func = (nfsd4op_func)nfsd4_clone, 2371 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2372 .op_name = "OP_CLONE", 2373 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize, 2374 }, 2375 [OP_COPY] = { 2376 .op_func = (nfsd4op_func)nfsd4_copy, 2377 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME, 2378 .op_name = "OP_COPY", 2379 .op_rsize_bop = (nfsd4op_rsize)nfsd4_copy_rsize, 2380 }, 2381 [OP_SEEK] = { 2382 .op_func = (nfsd4op_func)nfsd4_seek, 2383 .op_name = "OP_SEEK", 2384 }, 2385 }; 2386 2387 /** 2388 * nfsd4_spo_must_allow - Determine if the compound op contains an 2389 * operation that is allowed to be sent with machine credentials 2390 * 2391 * @rqstp: a pointer to the struct svc_rqst 2392 * 2393 * Checks to see if the compound contains a spo_must_allow op 2394 * and confirms that it was sent with the proper machine creds. 2395 */ 2396 2397 bool nfsd4_spo_must_allow(struct svc_rqst *rqstp) 2398 { 2399 struct nfsd4_compoundres *resp = rqstp->rq_resp; 2400 struct nfsd4_compoundargs *argp = rqstp->rq_argp; 2401 struct nfsd4_op *this = &argp->ops[resp->opcnt - 1]; 2402 struct nfsd4_compound_state *cstate = &resp->cstate; 2403 struct nfs4_op_map *allow = &cstate->clp->cl_spo_must_allow; 2404 u32 opiter; 2405 2406 if (!cstate->minorversion) 2407 return false; 2408 2409 if (cstate->spo_must_allowed == true) 2410 return true; 2411 2412 opiter = resp->opcnt; 2413 while (opiter < argp->opcnt) { 2414 this = &argp->ops[opiter++]; 2415 if (test_bit(this->opnum, allow->u.longs) && 2416 cstate->clp->cl_mach_cred && 2417 nfsd4_mach_creds_match(cstate->clp, rqstp)) { 2418 cstate->spo_must_allowed = true; 2419 return true; 2420 } 2421 } 2422 cstate->spo_must_allowed = false; 2423 return false; 2424 } 2425 2426 int nfsd4_max_reply(struct svc_rqst *rqstp, struct nfsd4_op *op) 2427 { 2428 struct nfsd4_operation *opdesc; 2429 nfsd4op_rsize estimator; 2430 2431 if (op->opnum == OP_ILLEGAL) 2432 return op_encode_hdr_size * sizeof(__be32); 2433 opdesc = OPDESC(op); 2434 estimator = opdesc->op_rsize_bop; 2435 return estimator ? estimator(rqstp, op) : PAGE_SIZE; 2436 } 2437 2438 void warn_on_nonidempotent_op(struct nfsd4_op *op) 2439 { 2440 if (OPDESC(op)->op_flags & OP_MODIFIES_SOMETHING) { 2441 pr_err("unable to encode reply to nonidempotent op %d (%s)\n", 2442 op->opnum, nfsd4_op_name(op->opnum)); 2443 WARN_ON_ONCE(1); 2444 } 2445 } 2446 2447 static const char *nfsd4_op_name(unsigned opnum) 2448 { 2449 if (opnum < ARRAY_SIZE(nfsd4_ops)) 2450 return nfsd4_ops[opnum].op_name; 2451 return "unknown_operation"; 2452 } 2453 2454 #define nfsd4_voidres nfsd4_voidargs 2455 struct nfsd4_voidargs { int dummy; }; 2456 2457 static struct svc_procedure nfsd_procedures4[2] = { 2458 [NFSPROC4_NULL] = { 2459 .pc_func = (svc_procfunc) nfsd4_proc_null, 2460 .pc_encode = (kxdrproc_t) nfs4svc_encode_voidres, 2461 .pc_argsize = sizeof(struct nfsd4_voidargs), 2462 .pc_ressize = sizeof(struct nfsd4_voidres), 2463 .pc_cachetype = RC_NOCACHE, 2464 .pc_xdrressize = 1, 2465 }, 2466 [NFSPROC4_COMPOUND] = { 2467 .pc_func = (svc_procfunc) nfsd4_proc_compound, 2468 .pc_decode = (kxdrproc_t) nfs4svc_decode_compoundargs, 2469 .pc_encode = (kxdrproc_t) nfs4svc_encode_compoundres, 2470 .pc_argsize = sizeof(struct nfsd4_compoundargs), 2471 .pc_ressize = sizeof(struct nfsd4_compoundres), 2472 .pc_release = nfsd4_release_compoundargs, 2473 .pc_cachetype = RC_NOCACHE, 2474 .pc_xdrressize = NFSD_BUFSIZE/4, 2475 }, 2476 }; 2477 2478 struct svc_version nfsd_version4 = { 2479 .vs_vers = 4, 2480 .vs_nproc = 2, 2481 .vs_proc = nfsd_procedures4, 2482 .vs_dispatch = nfsd_dispatch, 2483 .vs_xdrsize = NFS4_SVC_XDRSIZE, 2484 .vs_rpcb_optnl = 1, 2485 }; 2486 2487 /* 2488 * Local variables: 2489 * c-basic-offset: 8 2490 * End: 2491 */ 2492