treewide: Use fallthrough pseudo-keyword
[linux-block.git] / fs / nfsd / nfs4proc.c
1 /*
2  *  Server-side procedures for NFSv4.
3  *
4  *  Copyright (c) 2002 The Regents of the University of Michigan.
5  *  All rights reserved.
6  *
7  *  Kendrick Smith <kmsmith@umich.edu>
8  *  Andy Adamson   <andros@umich.edu>
9  *
10  *  Redistribution and use in source and binary forms, with or without
11  *  modification, are permitted provided that the following conditions
12  *  are met:
13  *
14  *  1. Redistributions of source code must retain the above copyright
15  *     notice, this list of conditions and the following disclaimer.
16  *  2. Redistributions in binary form must reproduce the above copyright
17  *     notice, this list of conditions and the following disclaimer in the
18  *     documentation and/or other materials provided with the distribution.
19  *  3. Neither the name of the University nor the names of its
20  *     contributors may be used to endorse or promote products derived
21  *     from this software without specific prior written permission.
22  *
23  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 #include <linux/fs_struct.h>
36 #include <linux/file.h>
37 #include <linux/falloc.h>
38 #include <linux/slab.h>
39 #include <linux/kthread.h>
40 #include <linux/sunrpc/addr.h>
41
42 #include "idmap.h"
43 #include "cache.h"
44 #include "xdr4.h"
45 #include "vfs.h"
46 #include "current_stateid.h"
47 #include "netns.h"
48 #include "acl.h"
49 #include "pnfs.h"
50 #include "trace.h"
51
52 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
53 #include <linux/security.h>
54
55 static inline void
56 nfsd4_security_inode_setsecctx(struct svc_fh *resfh, struct xdr_netobj *label, u32 *bmval)
57 {
58         struct inode *inode = d_inode(resfh->fh_dentry);
59         int status;
60
61         inode_lock(inode);
62         status = security_inode_setsecctx(resfh->fh_dentry,
63                 label->data, label->len);
64         inode_unlock(inode);
65
66         if (status)
67                 /*
68                  * XXX: We should really fail the whole open, but we may
69                  * already have created a new file, so it may be too
70                  * late.  For now this seems the least of evils:
71                  */
72                 bmval[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
73
74         return;
75 }
76 #else
77 static inline void
78 nfsd4_security_inode_setsecctx(struct svc_fh *resfh, struct xdr_netobj *label, u32 *bmval)
79 { }
80 #endif
81
82 #define NFSDDBG_FACILITY                NFSDDBG_PROC
83
84 static u32 nfsd_attrmask[] = {
85         NFSD_WRITEABLE_ATTRS_WORD0,
86         NFSD_WRITEABLE_ATTRS_WORD1,
87         NFSD_WRITEABLE_ATTRS_WORD2
88 };
89
90 static u32 nfsd41_ex_attrmask[] = {
91         NFSD_SUPPATTR_EXCLCREAT_WORD0,
92         NFSD_SUPPATTR_EXCLCREAT_WORD1,
93         NFSD_SUPPATTR_EXCLCREAT_WORD2
94 };
95
96 static __be32
97 check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
98                    u32 *bmval, u32 *writable)
99 {
100         struct dentry *dentry = cstate->current_fh.fh_dentry;
101         struct svc_export *exp = cstate->current_fh.fh_export;
102
103         if (!nfsd_attrs_supported(cstate->minorversion, bmval))
104                 return nfserr_attrnotsupp;
105         if ((bmval[0] & FATTR4_WORD0_ACL) && !IS_POSIXACL(d_inode(dentry)))
106                 return nfserr_attrnotsupp;
107         if ((bmval[2] & FATTR4_WORD2_SECURITY_LABEL) &&
108                         !(exp->ex_flags & NFSEXP_SECURITY_LABEL))
109                 return nfserr_attrnotsupp;
110         if (writable && !bmval_is_subset(bmval, writable))
111                 return nfserr_inval;
112         if (writable && (bmval[2] & FATTR4_WORD2_MODE_UMASK) &&
113                         (bmval[1] & FATTR4_WORD1_MODE))
114                 return nfserr_inval;
115         return nfs_ok;
116 }
117
118 static __be32
119 nfsd4_check_open_attributes(struct svc_rqst *rqstp,
120         struct nfsd4_compound_state *cstate, struct nfsd4_open *open)
121 {
122         __be32 status = nfs_ok;
123
124         if (open->op_create == NFS4_OPEN_CREATE) {
125                 if (open->op_createmode == NFS4_CREATE_UNCHECKED
126                     || open->op_createmode == NFS4_CREATE_GUARDED)
127                         status = check_attr_support(rqstp, cstate,
128                                         open->op_bmval, nfsd_attrmask);
129                 else if (open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1)
130                         status = check_attr_support(rqstp, cstate,
131                                         open->op_bmval, nfsd41_ex_attrmask);
132         }
133
134         return status;
135 }
136
137 static int
138 is_create_with_attrs(struct nfsd4_open *open)
139 {
140         return open->op_create == NFS4_OPEN_CREATE
141                 && (open->op_createmode == NFS4_CREATE_UNCHECKED
142                     || open->op_createmode == NFS4_CREATE_GUARDED
143                     || open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1);
144 }
145
146 /*
147  * if error occurs when setting the acl, just clear the acl bit
148  * in the returned attr bitmap.
149  */
150 static void
151 do_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
152                 struct nfs4_acl *acl, u32 *bmval)
153 {
154         __be32 status;
155
156         status = nfsd4_set_nfs4_acl(rqstp, fhp, acl);
157         if (status)
158                 /*
159                  * We should probably fail the whole open at this point,
160                  * but we've already created the file, so it's too late;
161                  * So this seems the least of evils:
162                  */
163                 bmval[0] &= ~FATTR4_WORD0_ACL;
164 }
165
166 static inline void
167 fh_dup2(struct svc_fh *dst, struct svc_fh *src)
168 {
169         fh_put(dst);
170         dget(src->fh_dentry);
171         if (src->fh_export)
172                 exp_get(src->fh_export);
173         *dst = *src;
174 }
175
176 static __be32
177 do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
178 {
179         __be32 status;
180
181         if (open->op_truncate &&
182                 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
183                 return nfserr_inval;
184
185         accmode |= NFSD_MAY_READ_IF_EXEC;
186
187         if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
188                 accmode |= NFSD_MAY_READ;
189         if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
190                 accmode |= (NFSD_MAY_WRITE | NFSD_MAY_TRUNC);
191         if (open->op_share_deny & NFS4_SHARE_DENY_READ)
192                 accmode |= NFSD_MAY_WRITE;
193
194         status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
195
196         return status;
197 }
198
199 static __be32 nfsd_check_obj_isreg(struct svc_fh *fh)
200 {
201         umode_t mode = d_inode(fh->fh_dentry)->i_mode;
202
203         if (S_ISREG(mode))
204                 return nfs_ok;
205         if (S_ISDIR(mode))
206                 return nfserr_isdir;
207         /*
208          * Using err_symlink as our catch-all case may look odd; but
209          * there's no other obvious error for this case in 4.0, and we
210          * happen to know that it will cause the linux v4 client to do
211          * the right thing on attempts to open something other than a
212          * regular file.
213          */
214         return nfserr_symlink;
215 }
216
217 static void nfsd4_set_open_owner_reply_cache(struct nfsd4_compound_state *cstate, struct nfsd4_open *open, struct svc_fh *resfh)
218 {
219         if (nfsd4_has_session(cstate))
220                 return;
221         fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh,
222                         &resfh->fh_handle);
223 }
224
225 static __be32
226 do_open_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_open *open, struct svc_fh **resfh)
227 {
228         struct svc_fh *current_fh = &cstate->current_fh;
229         int accmode;
230         __be32 status;
231
232         *resfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
233         if (!*resfh)
234                 return nfserr_jukebox;
235         fh_init(*resfh, NFS4_FHSIZE);
236         open->op_truncate = false;
237
238         if (open->op_create) {
239                 /* FIXME: check session persistence and pnfs flags.
240                  * The nfsv4.1 spec requires the following semantics:
241                  *
242                  * Persistent   | pNFS   | Server REQUIRED | Client Allowed
243                  * Reply Cache  | server |                 |
244                  * -------------+--------+-----------------+--------------------
245                  * no           | no     | EXCLUSIVE4_1    | EXCLUSIVE4_1
246                  *              |        |                 | (SHOULD)
247                  *              |        | and EXCLUSIVE4  | or EXCLUSIVE4
248                  *              |        |                 | (SHOULD NOT)
249                  * no           | yes    | EXCLUSIVE4_1    | EXCLUSIVE4_1
250                  * yes          | no     | GUARDED4        | GUARDED4
251                  * yes          | yes    | GUARDED4        | GUARDED4
252                  */
253
254                 /*
255                  * Note: create modes (UNCHECKED,GUARDED...) are the same
256                  * in NFSv4 as in v3 except EXCLUSIVE4_1.
257                  */
258                 current->fs->umask = open->op_umask;
259                 status = do_nfsd_create(rqstp, current_fh, open->op_fname.data,
260                                         open->op_fname.len, &open->op_iattr,
261                                         *resfh, open->op_createmode,
262                                         (u32 *)open->op_verf.data,
263                                         &open->op_truncate, &open->op_created);
264                 current->fs->umask = 0;
265
266                 if (!status && open->op_label.len)
267                         nfsd4_security_inode_setsecctx(*resfh, &open->op_label, open->op_bmval);
268
269                 /*
270                  * Following rfc 3530 14.2.16, and rfc 5661 18.16.4
271                  * use the returned bitmask to indicate which attributes
272                  * we used to store the verifier:
273                  */
274                 if (nfsd_create_is_exclusive(open->op_createmode) && status == 0)
275                         open->op_bmval[1] |= (FATTR4_WORD1_TIME_ACCESS |
276                                                 FATTR4_WORD1_TIME_MODIFY);
277         } else
278                 /*
279                  * Note this may exit with the parent still locked.
280                  * We will hold the lock until nfsd4_open's final
281                  * lookup, to prevent renames or unlinks until we've had
282                  * a chance to an acquire a delegation if appropriate.
283                  */
284                 status = nfsd_lookup(rqstp, current_fh,
285                                      open->op_fname.data, open->op_fname.len, *resfh);
286         if (status)
287                 goto out;
288         status = nfsd_check_obj_isreg(*resfh);
289         if (status)
290                 goto out;
291
292         if (is_create_with_attrs(open) && open->op_acl != NULL)
293                 do_set_nfs4_acl(rqstp, *resfh, open->op_acl, open->op_bmval);
294
295         nfsd4_set_open_owner_reply_cache(cstate, open, *resfh);
296         accmode = NFSD_MAY_NOP;
297         if (open->op_created ||
298                         open->op_claim_type == NFS4_OPEN_CLAIM_DELEGATE_CUR)
299                 accmode |= NFSD_MAY_OWNER_OVERRIDE;
300         status = do_open_permission(rqstp, *resfh, open, accmode);
301         set_change_info(&open->op_cinfo, current_fh);
302 out:
303         return status;
304 }
305
306 static __be32
307 do_open_fhandle(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_open *open)
308 {
309         struct svc_fh *current_fh = &cstate->current_fh;
310         __be32 status;
311         int accmode = 0;
312
313         /* We don't know the target directory, and therefore can not
314         * set the change info
315         */
316
317         memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
318
319         nfsd4_set_open_owner_reply_cache(cstate, open, current_fh);
320
321         open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
322                 (open->op_iattr.ia_size == 0);
323         /*
324          * In the delegation case, the client is telling us about an
325          * open that it *already* performed locally, some time ago.  We
326          * should let it succeed now if possible.
327          *
328          * In the case of a CLAIM_FH open, on the other hand, the client
329          * may be counting on us to enforce permissions (the Linux 4.1
330          * client uses this for normal opens, for example).
331          */
332         if (open->op_claim_type == NFS4_OPEN_CLAIM_DELEG_CUR_FH)
333                 accmode = NFSD_MAY_OWNER_OVERRIDE;
334
335         status = do_open_permission(rqstp, current_fh, open, accmode);
336
337         return status;
338 }
339
340 static void
341 copy_clientid(clientid_t *clid, struct nfsd4_session *session)
342 {
343         struct nfsd4_sessionid *sid =
344                         (struct nfsd4_sessionid *)session->se_sessionid.data;
345
346         clid->cl_boot = sid->clientid.cl_boot;
347         clid->cl_id = sid->clientid.cl_id;
348 }
349
350 static __be32
351 nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
352            union nfsd4_op_u *u)
353 {
354         struct nfsd4_open *open = &u->open;
355         __be32 status;
356         struct svc_fh *resfh = NULL;
357         struct net *net = SVC_NET(rqstp);
358         struct nfsd_net *nn = net_generic(net, nfsd_net_id);
359         bool reclaim = false;
360
361         dprintk("NFSD: nfsd4_open filename %.*s op_openowner %p\n",
362                 (int)open->op_fname.len, open->op_fname.data,
363                 open->op_openowner);
364
365         /* This check required by spec. */
366         if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
367                 return nfserr_inval;
368
369         open->op_created = false;
370         /*
371          * RFC5661 18.51.3
372          * Before RECLAIM_COMPLETE done, server should deny new lock
373          */
374         if (nfsd4_has_session(cstate) &&
375             !test_bit(NFSD4_CLIENT_RECLAIM_COMPLETE,
376                       &cstate->session->se_client->cl_flags) &&
377             open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
378                 return nfserr_grace;
379
380         if (nfsd4_has_session(cstate))
381                 copy_clientid(&open->op_clientid, cstate->session);
382
383         /* check seqid for replay. set nfs4_owner */
384         status = nfsd4_process_open1(cstate, open, nn);
385         if (status == nfserr_replay_me) {
386                 struct nfs4_replay *rp = &open->op_openowner->oo_owner.so_replay;
387                 fh_put(&cstate->current_fh);
388                 fh_copy_shallow(&cstate->current_fh.fh_handle,
389                                 &rp->rp_openfh);
390                 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
391                 if (status)
392                         dprintk("nfsd4_open: replay failed"
393                                 " restoring previous filehandle\n");
394                 else
395                         status = nfserr_replay_me;
396         }
397         if (status)
398                 goto out;
399         if (open->op_xdr_error) {
400                 status = open->op_xdr_error;
401                 goto out;
402         }
403
404         status = nfsd4_check_open_attributes(rqstp, cstate, open);
405         if (status)
406                 goto out;
407
408         /* Openowner is now set, so sequence id will get bumped.  Now we need
409          * these checks before we do any creates: */
410         status = nfserr_grace;
411         if (opens_in_grace(net) && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
412                 goto out;
413         status = nfserr_no_grace;
414         if (!opens_in_grace(net) && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
415                 goto out;
416
417         switch (open->op_claim_type) {
418                 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
419                 case NFS4_OPEN_CLAIM_NULL:
420                         status = do_open_lookup(rqstp, cstate, open, &resfh);
421                         if (status)
422                                 goto out;
423                         break;
424                 case NFS4_OPEN_CLAIM_PREVIOUS:
425                         status = nfs4_check_open_reclaim(&open->op_clientid,
426                                                          cstate, nn);
427                         if (status)
428                                 goto out;
429                         open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED;
430                         reclaim = true;
431                         fallthrough;
432                 case NFS4_OPEN_CLAIM_FH:
433                 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
434                         status = do_open_fhandle(rqstp, cstate, open);
435                         if (status)
436                                 goto out;
437                         resfh = &cstate->current_fh;
438                         break;
439                 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
440                 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
441                         dprintk("NFSD: unsupported OPEN claim type %d\n",
442                                 open->op_claim_type);
443                         status = nfserr_notsupp;
444                         goto out;
445                 default:
446                         dprintk("NFSD: Invalid OPEN claim type %d\n",
447                                 open->op_claim_type);
448                         status = nfserr_inval;
449                         goto out;
450         }
451         /*
452          * nfsd4_process_open2() does the actual opening of the file.  If
453          * successful, it (1) truncates the file if open->op_truncate was
454          * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
455          */
456         status = nfsd4_process_open2(rqstp, resfh, open);
457         WARN(status && open->op_created,
458              "nfsd4_process_open2 failed to open newly-created file! status=%u\n",
459              be32_to_cpu(status));
460         if (reclaim && !status)
461                 nn->somebody_reclaimed = true;
462 out:
463         if (resfh && resfh != &cstate->current_fh) {
464                 fh_dup2(&cstate->current_fh, resfh);
465                 fh_put(resfh);
466                 kfree(resfh);
467         }
468         nfsd4_cleanup_open_state(cstate, open);
469         nfsd4_bump_seqid(cstate, status);
470         return status;
471 }
472
473 /*
474  * OPEN is the only seqid-mutating operation whose decoding can fail
475  * with a seqid-mutating error (specifically, decoding of user names in
476  * the attributes).  Therefore we have to do some processing to look up
477  * the stateowner so that we can bump the seqid.
478  */
479 static __be32 nfsd4_open_omfg(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate, struct nfsd4_op *op)
480 {
481         struct nfsd4_open *open = &op->u.open;
482
483         if (!seqid_mutating_err(ntohl(op->status)))
484                 return op->status;
485         if (nfsd4_has_session(cstate))
486                 return op->status;
487         open->op_xdr_error = op->status;
488         return nfsd4_open(rqstp, cstate, &op->u);
489 }
490
491 /*
492  * filehandle-manipulating ops.
493  */
494 static __be32
495 nfsd4_getfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
496             union nfsd4_op_u *u)
497 {
498         u->getfh = &cstate->current_fh;
499         return nfs_ok;
500 }
501
502 static __be32
503 nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
504             union nfsd4_op_u *u)
505 {
506         struct nfsd4_putfh *putfh = &u->putfh;
507         __be32 ret;
508
509         fh_put(&cstate->current_fh);
510         cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
511         memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
512                putfh->pf_fhlen);
513         ret = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_BYPASS_GSS);
514 #ifdef CONFIG_NFSD_V4_2_INTER_SSC
515         if (ret == nfserr_stale && putfh->no_verify) {
516                 SET_FH_FLAG(&cstate->current_fh, NFSD4_FH_FOREIGN);
517                 ret = 0;
518         }
519 #endif
520         return ret;
521 }
522
523 static __be32
524 nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
525                 union nfsd4_op_u *u)
526 {
527         __be32 status;
528
529         fh_put(&cstate->current_fh);
530         status = exp_pseudoroot(rqstp, &cstate->current_fh);
531         return status;
532 }
533
534 static __be32
535 nfsd4_restorefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
536                 union nfsd4_op_u *u)
537 {
538         if (!cstate->save_fh.fh_dentry)
539                 return nfserr_restorefh;
540
541         fh_dup2(&cstate->current_fh, &cstate->save_fh);
542         if (HAS_CSTATE_FLAG(cstate, SAVED_STATE_ID_FLAG)) {
543                 memcpy(&cstate->current_stateid, &cstate->save_stateid, sizeof(stateid_t));
544                 SET_CSTATE_FLAG(cstate, CURRENT_STATE_ID_FLAG);
545         }
546         return nfs_ok;
547 }
548
549 static __be32
550 nfsd4_savefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
551              union nfsd4_op_u *u)
552 {
553         fh_dup2(&cstate->save_fh, &cstate->current_fh);
554         if (HAS_CSTATE_FLAG(cstate, CURRENT_STATE_ID_FLAG)) {
555                 memcpy(&cstate->save_stateid, &cstate->current_stateid, sizeof(stateid_t));
556                 SET_CSTATE_FLAG(cstate, SAVED_STATE_ID_FLAG);
557         }
558         return nfs_ok;
559 }
560
561 /*
562  * misc nfsv4 ops
563  */
564 static __be32
565 nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
566              union nfsd4_op_u *u)
567 {
568         struct nfsd4_access *access = &u->access;
569         u32 access_full;
570
571         access_full = NFS3_ACCESS_FULL;
572         if (cstate->minorversion >= 2)
573                 access_full |= NFS4_ACCESS_XALIST | NFS4_ACCESS_XAREAD |
574                                NFS4_ACCESS_XAWRITE;
575
576         if (access->ac_req_access & ~access_full)
577                 return nfserr_inval;
578
579         access->ac_resp_access = access->ac_req_access;
580         return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
581                            &access->ac_supported);
582 }
583
584 static void gen_boot_verifier(nfs4_verifier *verifier, struct net *net)
585 {
586         __be32 *verf = (__be32 *)verifier->data;
587
588         BUILD_BUG_ON(2*sizeof(*verf) != sizeof(verifier->data));
589
590         nfsd_copy_boot_verifier(verf, net_generic(net, nfsd_net_id));
591 }
592
593 static __be32
594 nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
595              union nfsd4_op_u *u)
596 {
597         struct nfsd4_commit *commit = &u->commit;
598
599         return nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
600                              commit->co_count,
601                              (__be32 *)commit->co_verf.data);
602 }
603
604 static __be32
605 nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
606              union nfsd4_op_u *u)
607 {
608         struct nfsd4_create *create = &u->create;
609         struct svc_fh resfh;
610         __be32 status;
611         dev_t rdev;
612
613         fh_init(&resfh, NFS4_FHSIZE);
614
615         status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_NOP);
616         if (status)
617                 return status;
618
619         status = check_attr_support(rqstp, cstate, create->cr_bmval,
620                                     nfsd_attrmask);
621         if (status)
622                 return status;
623
624         current->fs->umask = create->cr_umask;
625         switch (create->cr_type) {
626         case NF4LNK:
627                 status = nfsd_symlink(rqstp, &cstate->current_fh,
628                                       create->cr_name, create->cr_namelen,
629                                       create->cr_data, &resfh);
630                 break;
631
632         case NF4BLK:
633                 status = nfserr_inval;
634                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
635                 if (MAJOR(rdev) != create->cr_specdata1 ||
636                     MINOR(rdev) != create->cr_specdata2)
637                         goto out_umask;
638                 status = nfsd_create(rqstp, &cstate->current_fh,
639                                      create->cr_name, create->cr_namelen,
640                                      &create->cr_iattr, S_IFBLK, rdev, &resfh);
641                 break;
642
643         case NF4CHR:
644                 status = nfserr_inval;
645                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
646                 if (MAJOR(rdev) != create->cr_specdata1 ||
647                     MINOR(rdev) != create->cr_specdata2)
648                         goto out_umask;
649                 status = nfsd_create(rqstp, &cstate->current_fh,
650                                      create->cr_name, create->cr_namelen,
651                                      &create->cr_iattr,S_IFCHR, rdev, &resfh);
652                 break;
653
654         case NF4SOCK:
655                 status = nfsd_create(rqstp, &cstate->current_fh,
656                                      create->cr_name, create->cr_namelen,
657                                      &create->cr_iattr, S_IFSOCK, 0, &resfh);
658                 break;
659
660         case NF4FIFO:
661                 status = nfsd_create(rqstp, &cstate->current_fh,
662                                      create->cr_name, create->cr_namelen,
663                                      &create->cr_iattr, S_IFIFO, 0, &resfh);
664                 break;
665
666         case NF4DIR:
667                 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
668                 status = nfsd_create(rqstp, &cstate->current_fh,
669                                      create->cr_name, create->cr_namelen,
670                                      &create->cr_iattr, S_IFDIR, 0, &resfh);
671                 break;
672
673         default:
674                 status = nfserr_badtype;
675         }
676
677         if (status)
678                 goto out;
679
680         if (create->cr_label.len)
681                 nfsd4_security_inode_setsecctx(&resfh, &create->cr_label, create->cr_bmval);
682
683         if (create->cr_acl != NULL)
684                 do_set_nfs4_acl(rqstp, &resfh, create->cr_acl,
685                                 create->cr_bmval);
686
687         fh_unlock(&cstate->current_fh);
688         set_change_info(&create->cr_cinfo, &cstate->current_fh);
689         fh_dup2(&cstate->current_fh, &resfh);
690 out:
691         fh_put(&resfh);
692 out_umask:
693         current->fs->umask = 0;
694         return status;
695 }
696
697 static __be32
698 nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
699               union nfsd4_op_u *u)
700 {
701         struct nfsd4_getattr *getattr = &u->getattr;
702         __be32 status;
703
704         status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
705         if (status)
706                 return status;
707
708         if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
709                 return nfserr_inval;
710
711         getattr->ga_bmval[0] &= nfsd_suppattrs[cstate->minorversion][0];
712         getattr->ga_bmval[1] &= nfsd_suppattrs[cstate->minorversion][1];
713         getattr->ga_bmval[2] &= nfsd_suppattrs[cstate->minorversion][2];
714
715         getattr->ga_fhp = &cstate->current_fh;
716         return nfs_ok;
717 }
718
719 static __be32
720 nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
721            union nfsd4_op_u *u)
722 {
723         struct nfsd4_link *link = &u->link;
724         __be32 status;
725
726         status = nfsd_link(rqstp, &cstate->current_fh,
727                            link->li_name, link->li_namelen, &cstate->save_fh);
728         if (!status)
729                 set_change_info(&link->li_cinfo, &cstate->current_fh);
730         return status;
731 }
732
733 static __be32 nfsd4_do_lookupp(struct svc_rqst *rqstp, struct svc_fh *fh)
734 {
735         struct svc_fh tmp_fh;
736         __be32 ret;
737
738         fh_init(&tmp_fh, NFS4_FHSIZE);
739         ret = exp_pseudoroot(rqstp, &tmp_fh);
740         if (ret)
741                 return ret;
742         if (tmp_fh.fh_dentry == fh->fh_dentry) {
743                 fh_put(&tmp_fh);
744                 return nfserr_noent;
745         }
746         fh_put(&tmp_fh);
747         return nfsd_lookup(rqstp, fh, "..", 2, fh);
748 }
749
750 static __be32
751 nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
752               union nfsd4_op_u *u)
753 {
754         return nfsd4_do_lookupp(rqstp, &cstate->current_fh);
755 }
756
757 static __be32
758 nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
759              union nfsd4_op_u *u)
760 {
761         return nfsd_lookup(rqstp, &cstate->current_fh,
762                            u->lookup.lo_name, u->lookup.lo_len,
763                            &cstate->current_fh);
764 }
765
766 static __be32
767 nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
768            union nfsd4_op_u *u)
769 {
770         struct nfsd4_read *read = &u->read;
771         __be32 status;
772
773         read->rd_nf = NULL;
774         if (read->rd_offset >= OFFSET_MAX)
775                 return nfserr_inval;
776
777         trace_nfsd_read_start(rqstp, &cstate->current_fh,
778                               read->rd_offset, read->rd_length);
779
780         /*
781          * If we do a zero copy read, then a client will see read data
782          * that reflects the state of the file *after* performing the
783          * following compound.
784          *
785          * To ensure proper ordering, we therefore turn off zero copy if
786          * the client wants us to do more in this compound:
787          */
788         if (!nfsd4_last_compound_op(rqstp))
789                 clear_bit(RQ_SPLICE_OK, &rqstp->rq_flags);
790
791         /* check stateid */
792         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
793                                         &read->rd_stateid, RD_STATE,
794                                         &read->rd_nf, NULL);
795         if (status) {
796                 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
797                 goto out;
798         }
799         status = nfs_ok;
800 out:
801         read->rd_rqstp = rqstp;
802         read->rd_fhp = &cstate->current_fh;
803         return status;
804 }
805
806
807 static void
808 nfsd4_read_release(union nfsd4_op_u *u)
809 {
810         if (u->read.rd_nf)
811                 nfsd_file_put(u->read.rd_nf);
812         trace_nfsd_read_done(u->read.rd_rqstp, u->read.rd_fhp,
813                              u->read.rd_offset, u->read.rd_length);
814 }
815
816 static __be32
817 nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
818               union nfsd4_op_u *u)
819 {
820         struct nfsd4_readdir *readdir = &u->readdir;
821         u64 cookie = readdir->rd_cookie;
822         static const nfs4_verifier zeroverf;
823
824         /* no need to check permission - this will be done in nfsd_readdir() */
825
826         if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
827                 return nfserr_inval;
828
829         readdir->rd_bmval[0] &= nfsd_suppattrs[cstate->minorversion][0];
830         readdir->rd_bmval[1] &= nfsd_suppattrs[cstate->minorversion][1];
831         readdir->rd_bmval[2] &= nfsd_suppattrs[cstate->minorversion][2];
832
833         if ((cookie == 1) || (cookie == 2) ||
834             (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
835                 return nfserr_bad_cookie;
836
837         readdir->rd_rqstp = rqstp;
838         readdir->rd_fhp = &cstate->current_fh;
839         return nfs_ok;
840 }
841
842 static __be32
843 nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
844                union nfsd4_op_u *u)
845 {
846         u->readlink.rl_rqstp = rqstp;
847         u->readlink.rl_fhp = &cstate->current_fh;
848         return nfs_ok;
849 }
850
851 static __be32
852 nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
853              union nfsd4_op_u *u)
854 {
855         struct nfsd4_remove *remove = &u->remove;
856         __be32 status;
857
858         if (opens_in_grace(SVC_NET(rqstp)))
859                 return nfserr_grace;
860         status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
861                              remove->rm_name, remove->rm_namelen);
862         if (!status) {
863                 fh_unlock(&cstate->current_fh);
864                 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
865         }
866         return status;
867 }
868
869 static __be32
870 nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
871              union nfsd4_op_u *u)
872 {
873         struct nfsd4_rename *rename = &u->rename;
874         __be32 status;
875
876         if (opens_in_grace(SVC_NET(rqstp)))
877                 return nfserr_grace;
878         status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
879                              rename->rn_snamelen, &cstate->current_fh,
880                              rename->rn_tname, rename->rn_tnamelen);
881         if (status)
882                 return status;
883         set_change_info(&rename->rn_sinfo, &cstate->current_fh);
884         set_change_info(&rename->rn_tinfo, &cstate->save_fh);
885         return nfs_ok;
886 }
887
888 static __be32
889 nfsd4_secinfo(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
890               union nfsd4_op_u *u)
891 {
892         struct nfsd4_secinfo *secinfo = &u->secinfo;
893         struct svc_export *exp;
894         struct dentry *dentry;
895         __be32 err;
896
897         err = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_EXEC);
898         if (err)
899                 return err;
900         err = nfsd_lookup_dentry(rqstp, &cstate->current_fh,
901                                     secinfo->si_name, secinfo->si_namelen,
902                                     &exp, &dentry);
903         if (err)
904                 return err;
905         fh_unlock(&cstate->current_fh);
906         if (d_really_is_negative(dentry)) {
907                 exp_put(exp);
908                 err = nfserr_noent;
909         } else
910                 secinfo->si_exp = exp;
911         dput(dentry);
912         if (cstate->minorversion)
913                 /* See rfc 5661 section 2.6.3.1.1.8 */
914                 fh_put(&cstate->current_fh);
915         return err;
916 }
917
918 static __be32
919 nfsd4_secinfo_no_name(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
920                 union nfsd4_op_u *u)
921 {
922         __be32 err;
923
924         switch (u->secinfo_no_name.sin_style) {
925         case NFS4_SECINFO_STYLE4_CURRENT_FH:
926                 break;
927         case NFS4_SECINFO_STYLE4_PARENT:
928                 err = nfsd4_do_lookupp(rqstp, &cstate->current_fh);
929                 if (err)
930                         return err;
931                 break;
932         default:
933                 return nfserr_inval;
934         }
935
936         u->secinfo_no_name.sin_exp = exp_get(cstate->current_fh.fh_export);
937         fh_put(&cstate->current_fh);
938         return nfs_ok;
939 }
940
941 static void
942 nfsd4_secinfo_release(union nfsd4_op_u *u)
943 {
944         if (u->secinfo.si_exp)
945                 exp_put(u->secinfo.si_exp);
946 }
947
948 static void
949 nfsd4_secinfo_no_name_release(union nfsd4_op_u *u)
950 {
951         if (u->secinfo_no_name.sin_exp)
952                 exp_put(u->secinfo_no_name.sin_exp);
953 }
954
955 static __be32
956 nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
957               union nfsd4_op_u *u)
958 {
959         struct nfsd4_setattr *setattr = &u->setattr;
960         __be32 status = nfs_ok;
961         int err;
962
963         if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
964                 status = nfs4_preprocess_stateid_op(rqstp, cstate,
965                                 &cstate->current_fh, &setattr->sa_stateid,
966                                 WR_STATE, NULL, NULL);
967                 if (status) {
968                         dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
969                         return status;
970                 }
971         }
972         err = fh_want_write(&cstate->current_fh);
973         if (err)
974                 return nfserrno(err);
975         status = nfs_ok;
976
977         status = check_attr_support(rqstp, cstate, setattr->sa_bmval,
978                                     nfsd_attrmask);
979         if (status)
980                 goto out;
981
982         if (setattr->sa_acl != NULL)
983                 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
984                                             setattr->sa_acl);
985         if (status)
986                 goto out;
987         if (setattr->sa_label.len)
988                 status = nfsd4_set_nfs4_label(rqstp, &cstate->current_fh,
989                                 &setattr->sa_label);
990         if (status)
991                 goto out;
992         status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
993                                 0, (time64_t)0);
994 out:
995         fh_drop_write(&cstate->current_fh);
996         return status;
997 }
998
999 static __be32
1000 nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1001             union nfsd4_op_u *u)
1002 {
1003         struct nfsd4_write *write = &u->write;
1004         stateid_t *stateid = &write->wr_stateid;
1005         struct nfsd_file *nf = NULL;
1006         __be32 status = nfs_ok;
1007         unsigned long cnt;
1008         int nvecs;
1009
1010         if (write->wr_offset >= OFFSET_MAX)
1011                 return nfserr_inval;
1012
1013         cnt = write->wr_buflen;
1014         trace_nfsd_write_start(rqstp, &cstate->current_fh,
1015                                write->wr_offset, cnt);
1016         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1017                                                 stateid, WR_STATE, &nf, NULL);
1018         if (status) {
1019                 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
1020                 return status;
1021         }
1022
1023         write->wr_how_written = write->wr_stable_how;
1024
1025         nvecs = svc_fill_write_vector(rqstp, write->wr_pagelist,
1026                                       &write->wr_head, write->wr_buflen);
1027         WARN_ON_ONCE(nvecs > ARRAY_SIZE(rqstp->rq_vec));
1028
1029         status = nfsd_vfs_write(rqstp, &cstate->current_fh, nf,
1030                                 write->wr_offset, rqstp->rq_vec, nvecs, &cnt,
1031                                 write->wr_how_written,
1032                                 (__be32 *)write->wr_verifier.data);
1033         nfsd_file_put(nf);
1034
1035         write->wr_bytes_written = cnt;
1036         trace_nfsd_write_done(rqstp, &cstate->current_fh,
1037                               write->wr_offset, cnt);
1038         return status;
1039 }
1040
1041 static __be32
1042 nfsd4_verify_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1043                   stateid_t *src_stateid, struct nfsd_file **src,
1044                   stateid_t *dst_stateid, struct nfsd_file **dst)
1045 {
1046         __be32 status;
1047
1048         if (!cstate->save_fh.fh_dentry)
1049                 return nfserr_nofilehandle;
1050
1051         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->save_fh,
1052                                             src_stateid, RD_STATE, src, NULL);
1053         if (status) {
1054                 dprintk("NFSD: %s: couldn't process src stateid!\n", __func__);
1055                 goto out;
1056         }
1057
1058         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1059                                             dst_stateid, WR_STATE, dst, NULL);
1060         if (status) {
1061                 dprintk("NFSD: %s: couldn't process dst stateid!\n", __func__);
1062                 goto out_put_src;
1063         }
1064
1065         /* fix up for NFS-specific error code */
1066         if (!S_ISREG(file_inode((*src)->nf_file)->i_mode) ||
1067             !S_ISREG(file_inode((*dst)->nf_file)->i_mode)) {
1068                 status = nfserr_wrong_type;
1069                 goto out_put_dst;
1070         }
1071
1072 out:
1073         return status;
1074 out_put_dst:
1075         nfsd_file_put(*dst);
1076 out_put_src:
1077         nfsd_file_put(*src);
1078         goto out;
1079 }
1080
1081 static __be32
1082 nfsd4_clone(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1083                 union nfsd4_op_u *u)
1084 {
1085         struct nfsd4_clone *clone = &u->clone;
1086         struct nfsd_file *src, *dst;
1087         __be32 status;
1088
1089         status = nfsd4_verify_copy(rqstp, cstate, &clone->cl_src_stateid, &src,
1090                                    &clone->cl_dst_stateid, &dst);
1091         if (status)
1092                 goto out;
1093
1094         status = nfsd4_clone_file_range(src, clone->cl_src_pos,
1095                         dst, clone->cl_dst_pos, clone->cl_count,
1096                         EX_ISSYNC(cstate->current_fh.fh_export));
1097
1098         nfsd_file_put(dst);
1099         nfsd_file_put(src);
1100 out:
1101         return status;
1102 }
1103
1104 void nfs4_put_copy(struct nfsd4_copy *copy)
1105 {
1106         if (!refcount_dec_and_test(&copy->refcount))
1107                 return;
1108         kfree(copy);
1109 }
1110
1111 static bool
1112 check_and_set_stop_copy(struct nfsd4_copy *copy)
1113 {
1114         bool value;
1115
1116         spin_lock(&copy->cp_clp->async_lock);
1117         value = copy->stopped;
1118         if (!copy->stopped)
1119                 copy->stopped = true;
1120         spin_unlock(&copy->cp_clp->async_lock);
1121         return value;
1122 }
1123
1124 static void nfsd4_stop_copy(struct nfsd4_copy *copy)
1125 {
1126         /* only 1 thread should stop the copy */
1127         if (!check_and_set_stop_copy(copy))
1128                 kthread_stop(copy->copy_task);
1129         nfs4_put_copy(copy);
1130 }
1131
1132 static struct nfsd4_copy *nfsd4_get_copy(struct nfs4_client *clp)
1133 {
1134         struct nfsd4_copy *copy = NULL;
1135
1136         spin_lock(&clp->async_lock);
1137         if (!list_empty(&clp->async_copies)) {
1138                 copy = list_first_entry(&clp->async_copies, struct nfsd4_copy,
1139                                         copies);
1140                 refcount_inc(&copy->refcount);
1141         }
1142         spin_unlock(&clp->async_lock);
1143         return copy;
1144 }
1145
1146 void nfsd4_shutdown_copy(struct nfs4_client *clp)
1147 {
1148         struct nfsd4_copy *copy;
1149
1150         while ((copy = nfsd4_get_copy(clp)) != NULL)
1151                 nfsd4_stop_copy(copy);
1152 }
1153 #ifdef CONFIG_NFSD_V4_2_INTER_SSC
1154
1155 extern struct file *nfs42_ssc_open(struct vfsmount *ss_mnt,
1156                                    struct nfs_fh *src_fh,
1157                                    nfs4_stateid *stateid);
1158 extern void nfs42_ssc_close(struct file *filep);
1159
1160 extern void nfs_sb_deactive(struct super_block *sb);
1161
1162 #define NFSD42_INTERSSC_MOUNTOPS "vers=4.2,addr=%s,sec=sys"
1163
1164 /*
1165  * Support one copy source server for now.
1166  */
1167 static __be32
1168 nfsd4_interssc_connect(struct nl4_server *nss, struct svc_rqst *rqstp,
1169                        struct vfsmount **mount)
1170 {
1171         struct file_system_type *type;
1172         struct vfsmount *ss_mnt;
1173         struct nfs42_netaddr *naddr;
1174         struct sockaddr_storage tmp_addr;
1175         size_t tmp_addrlen, match_netid_len = 3;
1176         char *startsep = "", *endsep = "", *match_netid = "tcp";
1177         char *ipaddr, *dev_name, *raw_data;
1178         int len, raw_len;
1179         __be32 status = nfserr_inval;
1180
1181         naddr = &nss->u.nl4_addr;
1182         tmp_addrlen = rpc_uaddr2sockaddr(SVC_NET(rqstp), naddr->addr,
1183                                          naddr->addr_len,
1184                                          (struct sockaddr *)&tmp_addr,
1185                                          sizeof(tmp_addr));
1186         if (tmp_addrlen == 0)
1187                 goto out_err;
1188
1189         if (tmp_addr.ss_family == AF_INET6) {
1190                 startsep = "[";
1191                 endsep = "]";
1192                 match_netid = "tcp6";
1193                 match_netid_len = 4;
1194         }
1195
1196         if (naddr->netid_len != match_netid_len ||
1197                 strncmp(naddr->netid, match_netid, naddr->netid_len))
1198                 goto out_err;
1199
1200         /* Construct the raw data for the vfs_kern_mount call */
1201         len = RPC_MAX_ADDRBUFLEN + 1;
1202         ipaddr = kzalloc(len, GFP_KERNEL);
1203         if (!ipaddr)
1204                 goto out_err;
1205
1206         rpc_ntop((struct sockaddr *)&tmp_addr, ipaddr, len);
1207
1208         /* 2 for ipv6 endsep and startsep. 3 for ":/" and trailing '/0'*/
1209
1210         raw_len = strlen(NFSD42_INTERSSC_MOUNTOPS) + strlen(ipaddr);
1211         raw_data = kzalloc(raw_len, GFP_KERNEL);
1212         if (!raw_data)
1213                 goto out_free_ipaddr;
1214
1215         snprintf(raw_data, raw_len, NFSD42_INTERSSC_MOUNTOPS, ipaddr);
1216
1217         status = nfserr_nodev;
1218         type = get_fs_type("nfs");
1219         if (!type)
1220                 goto out_free_rawdata;
1221
1222         /* Set the server:<export> for the vfs_kern_mount call */
1223         dev_name = kzalloc(len + 5, GFP_KERNEL);
1224         if (!dev_name)
1225                 goto out_free_rawdata;
1226         snprintf(dev_name, len + 5, "%s%s%s:/", startsep, ipaddr, endsep);
1227
1228         /* Use an 'internal' mount: SB_KERNMOUNT -> MNT_INTERNAL */
1229         ss_mnt = vfs_kern_mount(type, SB_KERNMOUNT, dev_name, raw_data);
1230         module_put(type->owner);
1231         if (IS_ERR(ss_mnt))
1232                 goto out_free_devname;
1233
1234         status = 0;
1235         *mount = ss_mnt;
1236
1237 out_free_devname:
1238         kfree(dev_name);
1239 out_free_rawdata:
1240         kfree(raw_data);
1241 out_free_ipaddr:
1242         kfree(ipaddr);
1243 out_err:
1244         return status;
1245 }
1246
1247 static void
1248 nfsd4_interssc_disconnect(struct vfsmount *ss_mnt)
1249 {
1250         nfs_sb_deactive(ss_mnt->mnt_sb);
1251         mntput(ss_mnt);
1252 }
1253
1254 /*
1255  * Verify COPY destination stateid.
1256  *
1257  * Connect to the source server with NFSv4.1.
1258  * Create the source struct file for nfsd_copy_range.
1259  * Called with COPY cstate:
1260  *    SAVED_FH: source filehandle
1261  *    CURRENT_FH: destination filehandle
1262  */
1263 static __be32
1264 nfsd4_setup_inter_ssc(struct svc_rqst *rqstp,
1265                       struct nfsd4_compound_state *cstate,
1266                       struct nfsd4_copy *copy, struct vfsmount **mount)
1267 {
1268         struct svc_fh *s_fh = NULL;
1269         stateid_t *s_stid = &copy->cp_src_stateid;
1270         __be32 status = nfserr_inval;
1271
1272         /* Verify the destination stateid and set dst struct file*/
1273         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1274                                             &copy->cp_dst_stateid,
1275                                             WR_STATE, &copy->nf_dst, NULL);
1276         if (status)
1277                 goto out;
1278
1279         status = nfsd4_interssc_connect(&copy->cp_src, rqstp, mount);
1280         if (status)
1281                 goto out;
1282
1283         s_fh = &cstate->save_fh;
1284
1285         copy->c_fh.size = s_fh->fh_handle.fh_size;
1286         memcpy(copy->c_fh.data, &s_fh->fh_handle.fh_base, copy->c_fh.size);
1287         copy->stateid.seqid = cpu_to_be32(s_stid->si_generation);
1288         memcpy(copy->stateid.other, (void *)&s_stid->si_opaque,
1289                sizeof(stateid_opaque_t));
1290
1291         status = 0;
1292 out:
1293         return status;
1294 }
1295
1296 static void
1297 nfsd4_cleanup_inter_ssc(struct vfsmount *ss_mnt, struct nfsd_file *src,
1298                         struct nfsd_file *dst)
1299 {
1300         nfs42_ssc_close(src->nf_file);
1301         nfsd_file_put(src);
1302         nfsd_file_put(dst);
1303         mntput(ss_mnt);
1304 }
1305
1306 #else /* CONFIG_NFSD_V4_2_INTER_SSC */
1307
1308 static __be32
1309 nfsd4_setup_inter_ssc(struct svc_rqst *rqstp,
1310                       struct nfsd4_compound_state *cstate,
1311                       struct nfsd4_copy *copy,
1312                       struct vfsmount **mount)
1313 {
1314         *mount = NULL;
1315         return nfserr_inval;
1316 }
1317
1318 static void
1319 nfsd4_cleanup_inter_ssc(struct vfsmount *ss_mnt, struct nfsd_file *src,
1320                         struct nfsd_file *dst)
1321 {
1322 }
1323
1324 static void
1325 nfsd4_interssc_disconnect(struct vfsmount *ss_mnt)
1326 {
1327 }
1328
1329 static struct file *nfs42_ssc_open(struct vfsmount *ss_mnt,
1330                                    struct nfs_fh *src_fh,
1331                                    nfs4_stateid *stateid)
1332 {
1333         return NULL;
1334 }
1335 #endif /* CONFIG_NFSD_V4_2_INTER_SSC */
1336
1337 static __be32
1338 nfsd4_setup_intra_ssc(struct svc_rqst *rqstp,
1339                       struct nfsd4_compound_state *cstate,
1340                       struct nfsd4_copy *copy)
1341 {
1342         return nfsd4_verify_copy(rqstp, cstate, &copy->cp_src_stateid,
1343                                  &copy->nf_src, &copy->cp_dst_stateid,
1344                                  &copy->nf_dst);
1345 }
1346
1347 static void
1348 nfsd4_cleanup_intra_ssc(struct nfsd_file *src, struct nfsd_file *dst)
1349 {
1350         nfsd_file_put(src);
1351         nfsd_file_put(dst);
1352 }
1353
1354 static void nfsd4_cb_offload_release(struct nfsd4_callback *cb)
1355 {
1356         struct nfsd4_copy *copy = container_of(cb, struct nfsd4_copy, cp_cb);
1357
1358         nfs4_put_copy(copy);
1359 }
1360
1361 static int nfsd4_cb_offload_done(struct nfsd4_callback *cb,
1362                                  struct rpc_task *task)
1363 {
1364         return 1;
1365 }
1366
1367 static const struct nfsd4_callback_ops nfsd4_cb_offload_ops = {
1368         .release = nfsd4_cb_offload_release,
1369         .done = nfsd4_cb_offload_done
1370 };
1371
1372 static void nfsd4_init_copy_res(struct nfsd4_copy *copy, bool sync)
1373 {
1374         copy->cp_res.wr_stable_how = NFS_UNSTABLE;
1375         copy->cp_synchronous = sync;
1376         gen_boot_verifier(&copy->cp_res.wr_verifier, copy->cp_clp->net);
1377 }
1378
1379 static ssize_t _nfsd_copy_file_range(struct nfsd4_copy *copy)
1380 {
1381         ssize_t bytes_copied = 0;
1382         size_t bytes_total = copy->cp_count;
1383         u64 src_pos = copy->cp_src_pos;
1384         u64 dst_pos = copy->cp_dst_pos;
1385
1386         do {
1387                 if (kthread_should_stop())
1388                         break;
1389                 bytes_copied = nfsd_copy_file_range(copy->nf_src->nf_file,
1390                                 src_pos, copy->nf_dst->nf_file, dst_pos,
1391                                 bytes_total);
1392                 if (bytes_copied <= 0)
1393                         break;
1394                 bytes_total -= bytes_copied;
1395                 copy->cp_res.wr_bytes_written += bytes_copied;
1396                 src_pos += bytes_copied;
1397                 dst_pos += bytes_copied;
1398         } while (bytes_total > 0 && !copy->cp_synchronous);
1399         return bytes_copied;
1400 }
1401
1402 static __be32 nfsd4_do_copy(struct nfsd4_copy *copy, bool sync)
1403 {
1404         __be32 status;
1405         ssize_t bytes;
1406
1407         bytes = _nfsd_copy_file_range(copy);
1408         /* for async copy, we ignore the error, client can always retry
1409          * to get the error
1410          */
1411         if (bytes < 0 && !copy->cp_res.wr_bytes_written)
1412                 status = nfserrno(bytes);
1413         else {
1414                 nfsd4_init_copy_res(copy, sync);
1415                 status = nfs_ok;
1416         }
1417
1418         if (!copy->cp_intra) /* Inter server SSC */
1419                 nfsd4_cleanup_inter_ssc(copy->ss_mnt, copy->nf_src,
1420                                         copy->nf_dst);
1421         else
1422                 nfsd4_cleanup_intra_ssc(copy->nf_src, copy->nf_dst);
1423
1424         return status;
1425 }
1426
1427 static int dup_copy_fields(struct nfsd4_copy *src, struct nfsd4_copy *dst)
1428 {
1429         dst->cp_src_pos = src->cp_src_pos;
1430         dst->cp_dst_pos = src->cp_dst_pos;
1431         dst->cp_count = src->cp_count;
1432         dst->cp_synchronous = src->cp_synchronous;
1433         memcpy(&dst->cp_res, &src->cp_res, sizeof(src->cp_res));
1434         memcpy(&dst->fh, &src->fh, sizeof(src->fh));
1435         dst->cp_clp = src->cp_clp;
1436         dst->nf_dst = nfsd_file_get(src->nf_dst);
1437         dst->cp_intra = src->cp_intra;
1438         if (src->cp_intra) /* for inter, file_src doesn't exist yet */
1439                 dst->nf_src = nfsd_file_get(src->nf_src);
1440
1441         memcpy(&dst->cp_stateid, &src->cp_stateid, sizeof(src->cp_stateid));
1442         memcpy(&dst->cp_src, &src->cp_src, sizeof(struct nl4_server));
1443         memcpy(&dst->stateid, &src->stateid, sizeof(src->stateid));
1444         memcpy(&dst->c_fh, &src->c_fh, sizeof(src->c_fh));
1445         dst->ss_mnt = src->ss_mnt;
1446
1447         return 0;
1448 }
1449
1450 static void cleanup_async_copy(struct nfsd4_copy *copy)
1451 {
1452         nfs4_free_copy_state(copy);
1453         nfsd_file_put(copy->nf_dst);
1454         if (copy->cp_intra)
1455                 nfsd_file_put(copy->nf_src);
1456         spin_lock(&copy->cp_clp->async_lock);
1457         list_del(&copy->copies);
1458         spin_unlock(&copy->cp_clp->async_lock);
1459         nfs4_put_copy(copy);
1460 }
1461
1462 static int nfsd4_do_async_copy(void *data)
1463 {
1464         struct nfsd4_copy *copy = (struct nfsd4_copy *)data;
1465         struct nfsd4_copy *cb_copy;
1466
1467         if (!copy->cp_intra) { /* Inter server SSC */
1468                 copy->nf_src = kzalloc(sizeof(struct nfsd_file), GFP_KERNEL);
1469                 if (!copy->nf_src) {
1470                         copy->nfserr = nfserr_serverfault;
1471                         nfsd4_interssc_disconnect(copy->ss_mnt);
1472                         goto do_callback;
1473                 }
1474                 copy->nf_src->nf_file = nfs42_ssc_open(copy->ss_mnt, &copy->c_fh,
1475                                               &copy->stateid);
1476                 if (IS_ERR(copy->nf_src->nf_file)) {
1477                         copy->nfserr = nfserr_offload_denied;
1478                         nfsd4_interssc_disconnect(copy->ss_mnt);
1479                         goto do_callback;
1480                 }
1481         }
1482
1483         copy->nfserr = nfsd4_do_copy(copy, 0);
1484 do_callback:
1485         cb_copy = kzalloc(sizeof(struct nfsd4_copy), GFP_KERNEL);
1486         if (!cb_copy)
1487                 goto out;
1488         memcpy(&cb_copy->cp_res, &copy->cp_res, sizeof(copy->cp_res));
1489         cb_copy->cp_clp = copy->cp_clp;
1490         cb_copy->nfserr = copy->nfserr;
1491         memcpy(&cb_copy->fh, &copy->fh, sizeof(copy->fh));
1492         nfsd4_init_cb(&cb_copy->cp_cb, cb_copy->cp_clp,
1493                         &nfsd4_cb_offload_ops, NFSPROC4_CLNT_CB_OFFLOAD);
1494         nfsd4_run_cb(&cb_copy->cp_cb);
1495 out:
1496         if (!copy->cp_intra)
1497                 kfree(copy->nf_src);
1498         cleanup_async_copy(copy);
1499         return 0;
1500 }
1501
1502 static __be32
1503 nfsd4_copy(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1504                 union nfsd4_op_u *u)
1505 {
1506         struct nfsd4_copy *copy = &u->copy;
1507         __be32 status;
1508         struct nfsd4_copy *async_copy = NULL;
1509
1510         if (!copy->cp_intra) { /* Inter server SSC */
1511                 if (!inter_copy_offload_enable || copy->cp_synchronous) {
1512                         status = nfserr_notsupp;
1513                         goto out;
1514                 }
1515                 status = nfsd4_setup_inter_ssc(rqstp, cstate, copy,
1516                                 &copy->ss_mnt);
1517                 if (status)
1518                         return nfserr_offload_denied;
1519         } else {
1520                 status = nfsd4_setup_intra_ssc(rqstp, cstate, copy);
1521                 if (status)
1522                         return status;
1523         }
1524
1525         copy->cp_clp = cstate->clp;
1526         memcpy(&copy->fh, &cstate->current_fh.fh_handle,
1527                 sizeof(struct knfsd_fh));
1528         if (!copy->cp_synchronous) {
1529                 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
1530
1531                 status = nfserrno(-ENOMEM);
1532                 async_copy = kzalloc(sizeof(struct nfsd4_copy), GFP_KERNEL);
1533                 if (!async_copy)
1534                         goto out_err;
1535                 if (!nfs4_init_copy_state(nn, copy))
1536                         goto out_err;
1537                 refcount_set(&async_copy->refcount, 1);
1538                 memcpy(&copy->cp_res.cb_stateid, &copy->cp_stateid,
1539                         sizeof(copy->cp_stateid));
1540                 status = dup_copy_fields(copy, async_copy);
1541                 if (status)
1542                         goto out_err;
1543                 async_copy->copy_task = kthread_create(nfsd4_do_async_copy,
1544                                 async_copy, "%s", "copy thread");
1545                 if (IS_ERR(async_copy->copy_task))
1546                         goto out_err;
1547                 spin_lock(&async_copy->cp_clp->async_lock);
1548                 list_add(&async_copy->copies,
1549                                 &async_copy->cp_clp->async_copies);
1550                 spin_unlock(&async_copy->cp_clp->async_lock);
1551                 wake_up_process(async_copy->copy_task);
1552                 status = nfs_ok;
1553         } else {
1554                 status = nfsd4_do_copy(copy, 1);
1555         }
1556 out:
1557         return status;
1558 out_err:
1559         if (async_copy)
1560                 cleanup_async_copy(async_copy);
1561         status = nfserrno(-ENOMEM);
1562         if (!copy->cp_intra)
1563                 nfsd4_interssc_disconnect(copy->ss_mnt);
1564         goto out;
1565 }
1566
1567 struct nfsd4_copy *
1568 find_async_copy(struct nfs4_client *clp, stateid_t *stateid)
1569 {
1570         struct nfsd4_copy *copy;
1571
1572         spin_lock(&clp->async_lock);
1573         list_for_each_entry(copy, &clp->async_copies, copies) {
1574                 if (memcmp(&copy->cp_stateid.stid, stateid, NFS4_STATEID_SIZE))
1575                         continue;
1576                 refcount_inc(&copy->refcount);
1577                 spin_unlock(&clp->async_lock);
1578                 return copy;
1579         }
1580         spin_unlock(&clp->async_lock);
1581         return NULL;
1582 }
1583
1584 static __be32
1585 nfsd4_offload_cancel(struct svc_rqst *rqstp,
1586                      struct nfsd4_compound_state *cstate,
1587                      union nfsd4_op_u *u)
1588 {
1589         struct nfsd4_offload_status *os = &u->offload_status;
1590         struct nfsd4_copy *copy;
1591         struct nfs4_client *clp = cstate->clp;
1592
1593         copy = find_async_copy(clp, &os->stateid);
1594         if (!copy) {
1595                 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
1596
1597                 return manage_cpntf_state(nn, &os->stateid, clp, NULL);
1598         } else
1599                 nfsd4_stop_copy(copy);
1600
1601         return nfs_ok;
1602 }
1603
1604 static __be32
1605 nfsd4_copy_notify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1606                   union nfsd4_op_u *u)
1607 {
1608         struct nfsd4_copy_notify *cn = &u->copy_notify;
1609         __be32 status;
1610         struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
1611         struct nfs4_stid *stid;
1612         struct nfs4_cpntf_state *cps;
1613         struct nfs4_client *clp = cstate->clp;
1614
1615         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1616                                         &cn->cpn_src_stateid, RD_STATE, NULL,
1617                                         &stid);
1618         if (status)
1619                 return status;
1620
1621         cn->cpn_sec = nn->nfsd4_lease;
1622         cn->cpn_nsec = 0;
1623
1624         status = nfserrno(-ENOMEM);
1625         cps = nfs4_alloc_init_cpntf_state(nn, stid);
1626         if (!cps)
1627                 goto out;
1628         memcpy(&cn->cpn_cnr_stateid, &cps->cp_stateid.stid, sizeof(stateid_t));
1629         memcpy(&cps->cp_p_stateid, &stid->sc_stateid, sizeof(stateid_t));
1630         memcpy(&cps->cp_p_clid, &clp->cl_clientid, sizeof(clientid_t));
1631
1632         /* For now, only return one server address in cpn_src, the
1633          * address used by the client to connect to this server.
1634          */
1635         cn->cpn_src.nl4_type = NL4_NETADDR;
1636         status = nfsd4_set_netaddr((struct sockaddr *)&rqstp->rq_daddr,
1637                                  &cn->cpn_src.u.nl4_addr);
1638         WARN_ON_ONCE(status);
1639         if (status) {
1640                 nfs4_put_cpntf_state(nn, cps);
1641                 goto out;
1642         }
1643 out:
1644         nfs4_put_stid(stid);
1645         return status;
1646 }
1647
1648 static __be32
1649 nfsd4_fallocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1650                 struct nfsd4_fallocate *fallocate, int flags)
1651 {
1652         __be32 status;
1653         struct nfsd_file *nf;
1654
1655         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1656                                             &fallocate->falloc_stateid,
1657                                             WR_STATE, &nf, NULL);
1658         if (status != nfs_ok) {
1659                 dprintk("NFSD: nfsd4_fallocate: couldn't process stateid!\n");
1660                 return status;
1661         }
1662
1663         status = nfsd4_vfs_fallocate(rqstp, &cstate->current_fh, nf->nf_file,
1664                                      fallocate->falloc_offset,
1665                                      fallocate->falloc_length,
1666                                      flags);
1667         nfsd_file_put(nf);
1668         return status;
1669 }
1670 static __be32
1671 nfsd4_offload_status(struct svc_rqst *rqstp,
1672                      struct nfsd4_compound_state *cstate,
1673                      union nfsd4_op_u *u)
1674 {
1675         struct nfsd4_offload_status *os = &u->offload_status;
1676         __be32 status = 0;
1677         struct nfsd4_copy *copy;
1678         struct nfs4_client *clp = cstate->clp;
1679
1680         copy = find_async_copy(clp, &os->stateid);
1681         if (copy) {
1682                 os->count = copy->cp_res.wr_bytes_written;
1683                 nfs4_put_copy(copy);
1684         } else
1685                 status = nfserr_bad_stateid;
1686
1687         return status;
1688 }
1689
1690 static __be32
1691 nfsd4_allocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1692                union nfsd4_op_u *u)
1693 {
1694         return nfsd4_fallocate(rqstp, cstate, &u->allocate, 0);
1695 }
1696
1697 static __be32
1698 nfsd4_deallocate(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1699                  union nfsd4_op_u *u)
1700 {
1701         return nfsd4_fallocate(rqstp, cstate, &u->deallocate,
1702                                FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE);
1703 }
1704
1705 static __be32
1706 nfsd4_seek(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1707            union nfsd4_op_u *u)
1708 {
1709         struct nfsd4_seek *seek = &u->seek;
1710         int whence;
1711         __be32 status;
1712         struct nfsd_file *nf;
1713
1714         status = nfs4_preprocess_stateid_op(rqstp, cstate, &cstate->current_fh,
1715                                             &seek->seek_stateid,
1716                                             RD_STATE, &nf, NULL);
1717         if (status) {
1718                 dprintk("NFSD: nfsd4_seek: couldn't process stateid!\n");
1719                 return status;
1720         }
1721
1722         switch (seek->seek_whence) {
1723         case NFS4_CONTENT_DATA:
1724                 whence = SEEK_DATA;
1725                 break;
1726         case NFS4_CONTENT_HOLE:
1727                 whence = SEEK_HOLE;
1728                 break;
1729         default:
1730                 status = nfserr_union_notsupp;
1731                 goto out;
1732         }
1733
1734         /*
1735          * Note:  This call does change file->f_pos, but nothing in NFSD
1736          *        should ever file->f_pos.
1737          */
1738         seek->seek_pos = vfs_llseek(nf->nf_file, seek->seek_offset, whence);
1739         if (seek->seek_pos < 0)
1740                 status = nfserrno(seek->seek_pos);
1741         else if (seek->seek_pos >= i_size_read(file_inode(nf->nf_file)))
1742                 seek->seek_eof = true;
1743
1744 out:
1745         nfsd_file_put(nf);
1746         return status;
1747 }
1748
1749 /* This routine never returns NFS_OK!  If there are no other errors, it
1750  * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
1751  * attributes matched.  VERIFY is implemented by mapping NFSERR_SAME
1752  * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
1753  */
1754 static __be32
1755 _nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1756              struct nfsd4_verify *verify)
1757 {
1758         __be32 *buf, *p;
1759         int count;
1760         __be32 status;
1761
1762         status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
1763         if (status)
1764                 return status;
1765
1766         status = check_attr_support(rqstp, cstate, verify->ve_bmval, NULL);
1767         if (status)
1768                 return status;
1769
1770         if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
1771             || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
1772                 return nfserr_inval;
1773         if (verify->ve_attrlen & 3)
1774                 return nfserr_inval;
1775
1776         /* count in words:
1777          *   bitmap_len(1) + bitmap(2) + attr_len(1) = 4
1778          */
1779         count = 4 + (verify->ve_attrlen >> 2);
1780         buf = kmalloc(count << 2, GFP_KERNEL);
1781         if (!buf)
1782                 return nfserr_jukebox;
1783
1784         p = buf;
1785         status = nfsd4_encode_fattr_to_buf(&p, count, &cstate->current_fh,
1786                                     cstate->current_fh.fh_export,
1787                                     cstate->current_fh.fh_dentry,
1788                                     verify->ve_bmval,
1789                                     rqstp, 0);
1790         /*
1791          * If nfsd4_encode_fattr() ran out of space, assume that's because
1792          * the attributes are longer (hence different) than those given:
1793          */
1794         if (status == nfserr_resource)
1795                 status = nfserr_not_same;
1796         if (status)
1797                 goto out_kfree;
1798
1799         /* skip bitmap */
1800         p = buf + 1 + ntohl(buf[0]);
1801         status = nfserr_not_same;
1802         if (ntohl(*p++) != verify->ve_attrlen)
1803                 goto out_kfree;
1804         if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
1805                 status = nfserr_same;
1806
1807 out_kfree:
1808         kfree(buf);
1809         return status;
1810 }
1811
1812 static __be32
1813 nfsd4_nverify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1814               union nfsd4_op_u *u)
1815 {
1816         __be32 status;
1817
1818         status = _nfsd4_verify(rqstp, cstate, &u->verify);
1819         return status == nfserr_not_same ? nfs_ok : status;
1820 }
1821
1822 static __be32
1823 nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
1824              union nfsd4_op_u *u)
1825 {
1826         __be32 status;
1827
1828         status = _nfsd4_verify(rqstp, cstate, &u->nverify);
1829         return status == nfserr_same ? nfs_ok : status;
1830 }
1831
1832 #ifdef CONFIG_NFSD_PNFS
1833 static const struct nfsd4_layout_ops *
1834 nfsd4_layout_verify(struct svc_export *exp, unsigned int layout_type)
1835 {
1836         if (!exp->ex_layout_types) {
1837                 dprintk("%s: export does not support pNFS\n", __func__);
1838                 return NULL;
1839         }
1840
1841         if (layout_type >= LAYOUT_TYPE_MAX ||
1842             !(exp->ex_layout_types & (1 << layout_type))) {
1843                 dprintk("%s: layout type %d not supported\n",
1844                         __func__, layout_type);
1845                 return NULL;
1846         }
1847
1848         return nfsd4_layout_ops[layout_type];
1849 }
1850
1851 static __be32
1852 nfsd4_getdeviceinfo(struct svc_rqst *rqstp,
1853                 struct nfsd4_compound_state *cstate, union nfsd4_op_u *u)
1854 {
1855         struct nfsd4_getdeviceinfo *gdp = &u->getdeviceinfo;
1856         const struct nfsd4_layout_ops *ops;
1857         struct nfsd4_deviceid_map *map;
1858         struct svc_export *exp;
1859         __be32 nfserr;
1860
1861         dprintk("%s: layout_type %u dev_id [0x%llx:0x%x] maxcnt %u\n",
1862                __func__,
1863                gdp->gd_layout_type,
1864                gdp->gd_devid.fsid_idx, gdp->gd_devid.generation,
1865                gdp->gd_maxcount);
1866
1867         map = nfsd4_find_devid_map(gdp->gd_devid.fsid_idx);
1868         if (!map) {
1869                 dprintk("%s: couldn't find device ID to export mapping!\n",
1870                         __func__);
1871                 return nfserr_noent;
1872         }
1873
1874         exp = rqst_exp_find(rqstp, map->fsid_type, map->fsid);
1875         if (IS_ERR(exp)) {
1876                 dprintk("%s: could not find device id\n", __func__);
1877                 return nfserr_noent;
1878         }
1879
1880         nfserr = nfserr_layoutunavailable;
1881         ops = nfsd4_layout_verify(exp, gdp->gd_layout_type);
1882         if (!ops)
1883                 goto out;
1884
1885         nfserr = nfs_ok;
1886         if (gdp->gd_maxcount != 0) {
1887                 nfserr = ops->proc_getdeviceinfo(exp->ex_path.mnt->mnt_sb,
1888                                 rqstp, cstate->session->se_client, gdp);
1889         }
1890
1891         gdp->gd_notify_types &= ops->notify_types;
1892 out:
1893         exp_put(exp);
1894         return nfserr;
1895 }
1896
1897 static void
1898 nfsd4_getdeviceinfo_release(union nfsd4_op_u *u)
1899 {
1900         kfree(u->getdeviceinfo.gd_device);
1901 }
1902
1903 static __be32
1904 nfsd4_layoutget(struct svc_rqst *rqstp,
1905                 struct nfsd4_compound_state *cstate, union nfsd4_op_u *u)
1906 {
1907         struct nfsd4_layoutget *lgp = &u->layoutget;
1908         struct svc_fh *current_fh = &cstate->current_fh;
1909         const struct nfsd4_layout_ops *ops;
1910         struct nfs4_layout_stateid *ls;
1911         __be32 nfserr;
1912         int accmode = NFSD_MAY_READ_IF_EXEC;
1913
1914         switch (lgp->lg_seg.iomode) {
1915         case IOMODE_READ:
1916                 accmode |= NFSD_MAY_READ;
1917                 break;
1918         case IOMODE_RW:
1919                 accmode |= NFSD_MAY_READ | NFSD_MAY_WRITE;
1920                 break;
1921         default:
1922                 dprintk("%s: invalid iomode %d\n",
1923                         __func__, lgp->lg_seg.iomode);
1924                 nfserr = nfserr_badiomode;
1925                 goto out;
1926         }
1927
1928         nfserr = fh_verify(rqstp, current_fh, 0, accmode);
1929         if (nfserr)
1930                 goto out;
1931
1932         nfserr = nfserr_layoutunavailable;
1933         ops = nfsd4_layout_verify(current_fh->fh_export, lgp->lg_layout_type);
1934         if (!ops)
1935                 goto out;
1936
1937         /*
1938          * Verify minlength and range as per RFC5661:
1939          *  o  If loga_length is less than loga_minlength,
1940          *     the metadata server MUST return NFS4ERR_INVAL.
1941          *  o  If the sum of loga_offset and loga_minlength exceeds
1942          *     NFS4_UINT64_MAX, and loga_minlength is not
1943          *     NFS4_UINT64_MAX, the error NFS4ERR_INVAL MUST result.
1944          *  o  If the sum of loga_offset and loga_length exceeds
1945          *     NFS4_UINT64_MAX, and loga_length is not NFS4_UINT64_MAX,
1946          *     the error NFS4ERR_INVAL MUST result.
1947          */
1948         nfserr = nfserr_inval;
1949         if (lgp->lg_seg.length < lgp->lg_minlength ||
1950             (lgp->lg_minlength != NFS4_MAX_UINT64 &&
1951              lgp->lg_minlength > NFS4_MAX_UINT64 - lgp->lg_seg.offset) ||
1952             (lgp->lg_seg.length != NFS4_MAX_UINT64 &&
1953              lgp->lg_seg.length > NFS4_MAX_UINT64 - lgp->lg_seg.offset))
1954                 goto out;
1955         if (lgp->lg_seg.length == 0)
1956                 goto out;
1957
1958         nfserr = nfsd4_preprocess_layout_stateid(rqstp, cstate, &lgp->lg_sid,
1959                                                 true, lgp->lg_layout_type, &ls);
1960         if (nfserr) {
1961                 trace_nfsd_layout_get_lookup_fail(&lgp->lg_sid);
1962                 goto out;
1963         }
1964
1965         nfserr = nfserr_recallconflict;
1966         if (atomic_read(&ls->ls_stid.sc_file->fi_lo_recalls))
1967                 goto out_put_stid;
1968
1969         nfserr = ops->proc_layoutget(d_inode(current_fh->fh_dentry),
1970                                      current_fh, lgp);
1971         if (nfserr)
1972                 goto out_put_stid;
1973
1974         nfserr = nfsd4_insert_layout(lgp, ls);
1975
1976 out_put_stid:
1977         mutex_unlock(&ls->ls_mutex);
1978         nfs4_put_stid(&ls->ls_stid);
1979 out:
1980         return nfserr;
1981 }
1982
1983 static void
1984 nfsd4_layoutget_release(union nfsd4_op_u *u)
1985 {
1986         kfree(u->layoutget.lg_content);
1987 }
1988
1989 static __be32
1990 nfsd4_layoutcommit(struct svc_rqst *rqstp,
1991                 struct nfsd4_compound_state *cstate, union nfsd4_op_u *u)
1992 {
1993         struct nfsd4_layoutcommit *lcp = &u->layoutcommit;
1994         const struct nfsd4_layout_seg *seg = &lcp->lc_seg;
1995         struct svc_fh *current_fh = &cstate->current_fh;
1996         const struct nfsd4_layout_ops *ops;
1997         loff_t new_size = lcp->lc_last_wr + 1;
1998         struct inode *inode;
1999         struct nfs4_layout_stateid *ls;
2000         __be32 nfserr;
2001
2002         nfserr = fh_verify(rqstp, current_fh, 0, NFSD_MAY_WRITE);
2003         if (nfserr)
2004                 goto out;
2005
2006         nfserr = nfserr_layoutunavailable;
2007         ops = nfsd4_layout_verify(current_fh->fh_export, lcp->lc_layout_type);
2008         if (!ops)
2009                 goto out;
2010         inode = d_inode(current_fh->fh_dentry);
2011
2012         nfserr = nfserr_inval;
2013         if (new_size <= seg->offset) {
2014                 dprintk("pnfsd: last write before layout segment\n");
2015                 goto out;
2016         }
2017         if (new_size > seg->offset + seg->length) {
2018                 dprintk("pnfsd: last write beyond layout segment\n");
2019                 goto out;
2020         }
2021         if (!lcp->lc_newoffset && new_size > i_size_read(inode)) {
2022                 dprintk("pnfsd: layoutcommit beyond EOF\n");
2023                 goto out;
2024         }
2025
2026         nfserr = nfsd4_preprocess_layout_stateid(rqstp, cstate, &lcp->lc_sid,
2027                                                 false, lcp->lc_layout_type,
2028                                                 &ls);
2029         if (nfserr) {
2030                 trace_nfsd_layout_commit_lookup_fail(&lcp->lc_sid);
2031                 /* fixup error code as per RFC5661 */
2032                 if (nfserr == nfserr_bad_stateid)
2033                         nfserr = nfserr_badlayout;
2034                 goto out;
2035         }
2036
2037         /* LAYOUTCOMMIT does not require any serialization */
2038         mutex_unlock(&ls->ls_mutex);
2039
2040         if (new_size > i_size_read(inode)) {
2041                 lcp->lc_size_chg = 1;
2042                 lcp->lc_newsize = new_size;
2043         } else {
2044                 lcp->lc_size_chg = 0;
2045         }
2046
2047         nfserr = ops->proc_layoutcommit(inode, lcp);
2048         nfs4_put_stid(&ls->ls_stid);
2049 out:
2050         return nfserr;
2051 }
2052
2053 static __be32
2054 nfsd4_layoutreturn(struct svc_rqst *rqstp,
2055                 struct nfsd4_compound_state *cstate, union nfsd4_op_u *u)
2056 {
2057         struct nfsd4_layoutreturn *lrp = &u->layoutreturn;
2058         struct svc_fh *current_fh = &cstate->current_fh;
2059         __be32 nfserr;
2060
2061         nfserr = fh_verify(rqstp, current_fh, 0, NFSD_MAY_NOP);
2062         if (nfserr)
2063                 goto out;
2064
2065         nfserr = nfserr_layoutunavailable;
2066         if (!nfsd4_layout_verify(current_fh->fh_export, lrp->lr_layout_type))
2067                 goto out;
2068
2069         switch (lrp->lr_seg.iomode) {
2070         case IOMODE_READ:
2071         case IOMODE_RW:
2072         case IOMODE_ANY:
2073                 break;
2074         default:
2075                 dprintk("%s: invalid iomode %d\n", __func__,
2076                         lrp->lr_seg.iomode);
2077                 nfserr = nfserr_inval;
2078                 goto out;
2079         }
2080
2081         switch (lrp->lr_return_type) {
2082         case RETURN_FILE:
2083                 nfserr = nfsd4_return_file_layouts(rqstp, cstate, lrp);
2084                 break;
2085         case RETURN_FSID:
2086         case RETURN_ALL:
2087                 nfserr = nfsd4_return_client_layouts(rqstp, cstate, lrp);
2088                 break;
2089         default:
2090                 dprintk("%s: invalid return_type %d\n", __func__,
2091                         lrp->lr_return_type);
2092                 nfserr = nfserr_inval;
2093                 break;
2094         }
2095 out:
2096         return nfserr;
2097 }
2098 #endif /* CONFIG_NFSD_PNFS */
2099
2100 static __be32
2101 nfsd4_getxattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
2102                union nfsd4_op_u *u)
2103 {
2104         struct nfsd4_getxattr *getxattr = &u->getxattr;
2105
2106         return nfsd_getxattr(rqstp, &cstate->current_fh,
2107                              getxattr->getxa_name, &getxattr->getxa_buf,
2108                              &getxattr->getxa_len);
2109 }
2110
2111 static __be32
2112 nfsd4_setxattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
2113            union nfsd4_op_u *u)
2114 {
2115         struct nfsd4_setxattr *setxattr = &u->setxattr;
2116         __be32 ret;
2117
2118         if (opens_in_grace(SVC_NET(rqstp)))
2119                 return nfserr_grace;
2120
2121         ret = nfsd_setxattr(rqstp, &cstate->current_fh, setxattr->setxa_name,
2122                             setxattr->setxa_buf, setxattr->setxa_len,
2123                             setxattr->setxa_flags);
2124
2125         if (!ret)
2126                 set_change_info(&setxattr->setxa_cinfo, &cstate->current_fh);
2127
2128         return ret;
2129 }
2130
2131 static __be32
2132 nfsd4_listxattrs(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
2133            union nfsd4_op_u *u)
2134 {
2135         /*
2136          * Get the entire list, then copy out only the user attributes
2137          * in the encode function.
2138          */
2139         return nfsd_listxattr(rqstp, &cstate->current_fh,
2140                              &u->listxattrs.lsxa_buf, &u->listxattrs.lsxa_len);
2141 }
2142
2143 static __be32
2144 nfsd4_removexattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
2145            union nfsd4_op_u *u)
2146 {
2147         struct nfsd4_removexattr *removexattr = &u->removexattr;
2148         __be32 ret;
2149
2150         if (opens_in_grace(SVC_NET(rqstp)))
2151                 return nfserr_grace;
2152
2153         ret = nfsd_removexattr(rqstp, &cstate->current_fh,
2154             removexattr->rmxa_name);
2155
2156         if (!ret)
2157                 set_change_info(&removexattr->rmxa_cinfo, &cstate->current_fh);
2158
2159         return ret;
2160 }
2161
2162 /*
2163  * NULL call.
2164  */
2165 static __be32
2166 nfsd4_proc_null(struct svc_rqst *rqstp)
2167 {
2168         return nfs_ok;
2169 }
2170
2171 static inline void nfsd4_increment_op_stats(u32 opnum)
2172 {
2173         if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
2174                 nfsdstats.nfs4_opcount[opnum]++;
2175 }
2176
2177 static const struct nfsd4_operation nfsd4_ops[];
2178
2179 static const char *nfsd4_op_name(unsigned opnum);
2180
2181 /*
2182  * Enforce NFSv4.1 COMPOUND ordering rules:
2183  *
2184  * Also note, enforced elsewhere:
2185  *      - SEQUENCE other than as first op results in
2186  *        NFS4ERR_SEQUENCE_POS. (Enforced in nfsd4_sequence().)
2187  *      - BIND_CONN_TO_SESSION must be the only op in its compound.
2188  *        (Enforced in nfsd4_bind_conn_to_session().)
2189  *      - DESTROY_SESSION must be the final operation in a compound, if
2190  *        sessionid's in SEQUENCE and DESTROY_SESSION are the same.
2191  *        (Enforced in nfsd4_destroy_session().)
2192  */
2193 static __be32 nfs41_check_op_ordering(struct nfsd4_compoundargs *args)
2194 {
2195         struct nfsd4_op *first_op = &args->ops[0];
2196
2197         /* These ordering requirements don't apply to NFSv4.0: */
2198         if (args->minorversion == 0)
2199                 return nfs_ok;
2200         /* This is weird, but OK, not our problem: */
2201         if (args->opcnt == 0)
2202                 return nfs_ok;
2203         if (first_op->status == nfserr_op_illegal)
2204                 return nfs_ok;
2205         if (!(nfsd4_ops[first_op->opnum].op_flags & ALLOWED_AS_FIRST_OP))
2206                 return nfserr_op_not_in_session;
2207         if (first_op->opnum == OP_SEQUENCE)
2208                 return nfs_ok;
2209         /*
2210          * So first_op is something allowed outside a session, like
2211          * EXCHANGE_ID; but then it has to be the only op in the
2212          * compound:
2213          */
2214         if (args->opcnt != 1)
2215                 return nfserr_not_only_op;
2216         return nfs_ok;
2217 }
2218
2219 const struct nfsd4_operation *OPDESC(struct nfsd4_op *op)
2220 {
2221         return &nfsd4_ops[op->opnum];
2222 }
2223
2224 bool nfsd4_cache_this_op(struct nfsd4_op *op)
2225 {
2226         if (op->opnum == OP_ILLEGAL)
2227                 return false;
2228         return OPDESC(op)->op_flags & OP_CACHEME;
2229 }
2230
2231 static bool need_wrongsec_check(struct svc_rqst *rqstp)
2232 {
2233         struct nfsd4_compoundres *resp = rqstp->rq_resp;
2234         struct nfsd4_compoundargs *argp = rqstp->rq_argp;
2235         struct nfsd4_op *this = &argp->ops[resp->opcnt - 1];
2236         struct nfsd4_op *next = &argp->ops[resp->opcnt];
2237         const struct nfsd4_operation *thisd = OPDESC(this);
2238         const struct nfsd4_operation *nextd;
2239
2240         /*
2241          * Most ops check wronsec on our own; only the putfh-like ops
2242          * have special rules.
2243          */
2244         if (!(thisd->op_flags & OP_IS_PUTFH_LIKE))
2245                 return false;
2246         /*
2247          * rfc 5661 2.6.3.1.1.6: don't bother erroring out a
2248          * put-filehandle operation if we're not going to use the
2249          * result:
2250          */
2251         if (argp->opcnt == resp->opcnt)
2252                 return false;
2253         if (next->opnum == OP_ILLEGAL)
2254                 return false;
2255         nextd = OPDESC(next);
2256         /*
2257          * Rest of 2.6.3.1.1: certain operations will return WRONGSEC
2258          * errors themselves as necessary; others should check for them
2259          * now:
2260          */
2261         return !(nextd->op_flags & OP_HANDLES_WRONGSEC);
2262 }
2263
2264 static void svcxdr_init_encode(struct svc_rqst *rqstp,
2265                                struct nfsd4_compoundres *resp)
2266 {
2267         struct xdr_stream *xdr = &resp->xdr;
2268         struct xdr_buf *buf = &rqstp->rq_res;
2269         struct kvec *head = buf->head;
2270
2271         xdr->buf = buf;
2272         xdr->iov = head;
2273         xdr->p   = head->iov_base + head->iov_len;
2274         xdr->end = head->iov_base + PAGE_SIZE - rqstp->rq_auth_slack;
2275         /* Tail and page_len should be zero at this point: */
2276         buf->len = buf->head[0].iov_len;
2277         xdr->scratch.iov_len = 0;
2278         xdr->page_ptr = buf->pages - 1;
2279         buf->buflen = PAGE_SIZE * (1 + rqstp->rq_page_end - buf->pages)
2280                 - rqstp->rq_auth_slack;
2281 }
2282
2283 #ifdef CONFIG_NFSD_V4_2_INTER_SSC
2284 static void
2285 check_if_stalefh_allowed(struct nfsd4_compoundargs *args)
2286 {
2287         struct nfsd4_op *op, *current_op = NULL, *saved_op = NULL;
2288         struct nfsd4_copy *copy;
2289         struct nfsd4_putfh *putfh;
2290         int i;
2291
2292         /* traverse all operation and if it's a COPY compound, mark the
2293          * source filehandle to skip verification
2294          */
2295         for (i = 0; i < args->opcnt; i++) {
2296                 op = &args->ops[i];
2297                 if (op->opnum == OP_PUTFH)
2298                         current_op = op;
2299                 else if (op->opnum == OP_SAVEFH)
2300                         saved_op = current_op;
2301                 else if (op->opnum == OP_RESTOREFH)
2302                         current_op = saved_op;
2303                 else if (op->opnum == OP_COPY) {
2304                         copy = (struct nfsd4_copy *)&op->u;
2305                         if (!saved_op) {
2306                                 op->status = nfserr_nofilehandle;
2307                                 return;
2308                         }
2309                         putfh = (struct nfsd4_putfh *)&saved_op->u;
2310                         if (!copy->cp_intra)
2311                                 putfh->no_verify = true;
2312                 }
2313         }
2314 }
2315 #else
2316 static void
2317 check_if_stalefh_allowed(struct nfsd4_compoundargs *args)
2318 {
2319 }
2320 #endif
2321
2322 /*
2323  * COMPOUND call.
2324  */
2325 static __be32
2326 nfsd4_proc_compound(struct svc_rqst *rqstp)
2327 {
2328         struct nfsd4_compoundargs *args = rqstp->rq_argp;
2329         struct nfsd4_compoundres *resp = rqstp->rq_resp;
2330         struct nfsd4_op *op;
2331         struct nfsd4_compound_state *cstate = &resp->cstate;
2332         struct svc_fh *current_fh = &cstate->current_fh;
2333         struct svc_fh *save_fh = &cstate->save_fh;
2334         struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2335         __be32          status;
2336
2337         svcxdr_init_encode(rqstp, resp);
2338         resp->tagp = resp->xdr.p;
2339         /* reserve space for: taglen, tag, and opcnt */
2340         xdr_reserve_space(&resp->xdr, 8 + args->taglen);
2341         resp->taglen = args->taglen;
2342         resp->tag = args->tag;
2343         resp->rqstp = rqstp;
2344         cstate->minorversion = args->minorversion;
2345         fh_init(current_fh, NFS4_FHSIZE);
2346         fh_init(save_fh, NFS4_FHSIZE);
2347         /*
2348          * Don't use the deferral mechanism for NFSv4; compounds make it
2349          * too hard to avoid non-idempotency problems.
2350          */
2351         clear_bit(RQ_USEDEFERRAL, &rqstp->rq_flags);
2352
2353         /*
2354          * According to RFC3010, this takes precedence over all other errors.
2355          */
2356         status = nfserr_minor_vers_mismatch;
2357         if (nfsd_minorversion(nn, args->minorversion, NFSD_TEST) <= 0)
2358                 goto out;
2359         status = nfserr_resource;
2360         if (args->opcnt > NFSD_MAX_OPS_PER_COMPOUND)
2361                 goto out;
2362
2363         status = nfs41_check_op_ordering(args);
2364         if (status) {
2365                 op = &args->ops[0];
2366                 op->status = status;
2367                 resp->opcnt = 1;
2368                 goto encode_op;
2369         }
2370         check_if_stalefh_allowed(args);
2371
2372         rqstp->rq_lease_breaker = (void **)&cstate->clp;
2373
2374         trace_nfsd_compound(rqstp, args->opcnt);
2375         while (!status && resp->opcnt < args->opcnt) {
2376                 op = &args->ops[resp->opcnt++];
2377
2378                 /*
2379                  * The XDR decode routines may have pre-set op->status;
2380                  * for example, if there is a miscellaneous XDR error
2381                  * it will be set to nfserr_bad_xdr.
2382                  */
2383                 if (op->status) {
2384                         if (op->opnum == OP_OPEN)
2385                                 op->status = nfsd4_open_omfg(rqstp, cstate, op);
2386                         goto encode_op;
2387                 }
2388                 if (!current_fh->fh_dentry &&
2389                                 !HAS_FH_FLAG(current_fh, NFSD4_FH_FOREIGN)) {
2390                         if (!(op->opdesc->op_flags & ALLOWED_WITHOUT_FH)) {
2391                                 op->status = nfserr_nofilehandle;
2392                                 goto encode_op;
2393                         }
2394                 } else if (current_fh->fh_export &&
2395                            current_fh->fh_export->ex_fslocs.migrated &&
2396                           !(op->opdesc->op_flags & ALLOWED_ON_ABSENT_FS)) {
2397                         op->status = nfserr_moved;
2398                         goto encode_op;
2399                 }
2400
2401                 fh_clear_wcc(current_fh);
2402
2403                 /* If op is non-idempotent */
2404                 if (op->opdesc->op_flags & OP_MODIFIES_SOMETHING) {
2405                         /*
2406                          * Don't execute this op if we couldn't encode a
2407                          * succesful reply:
2408                          */
2409                         u32 plen = op->opdesc->op_rsize_bop(rqstp, op);
2410                         /*
2411                          * Plus if there's another operation, make sure
2412                          * we'll have space to at least encode an error:
2413                          */
2414                         if (resp->opcnt < args->opcnt)
2415                                 plen += COMPOUND_ERR_SLACK_SPACE;
2416                         op->status = nfsd4_check_resp_size(resp, plen);
2417                 }
2418
2419                 if (op->status)
2420                         goto encode_op;
2421
2422                 if (op->opdesc->op_get_currentstateid)
2423                         op->opdesc->op_get_currentstateid(cstate, &op->u);
2424                 op->status = op->opdesc->op_func(rqstp, cstate, &op->u);
2425
2426                 /* Only from SEQUENCE */
2427                 if (cstate->status == nfserr_replay_cache) {
2428                         dprintk("%s NFS4.1 replay from cache\n", __func__);
2429                         status = op->status;
2430                         goto out;
2431                 }
2432                 if (!op->status) {
2433                         if (op->opdesc->op_set_currentstateid)
2434                                 op->opdesc->op_set_currentstateid(cstate, &op->u);
2435
2436                         if (op->opdesc->op_flags & OP_CLEAR_STATEID)
2437                                 clear_current_stateid(cstate);
2438
2439                         if (current_fh->fh_export &&
2440                                         need_wrongsec_check(rqstp))
2441                                 op->status = check_nfsd_access(current_fh->fh_export, rqstp);
2442                 }
2443 encode_op:
2444                 if (op->status == nfserr_replay_me) {
2445                         op->replay = &cstate->replay_owner->so_replay;
2446                         nfsd4_encode_replay(&resp->xdr, op);
2447                         status = op->status = op->replay->rp_status;
2448                 } else {
2449                         nfsd4_encode_operation(resp, op);
2450                         status = op->status;
2451                 }
2452
2453                 trace_nfsd_compound_status(args->opcnt, resp->opcnt, status,
2454                                            nfsd4_op_name(op->opnum));
2455
2456                 nfsd4_cstate_clear_replay(cstate);
2457                 nfsd4_increment_op_stats(op->opnum);
2458         }
2459
2460         cstate->status = status;
2461         fh_put(current_fh);
2462         fh_put(save_fh);
2463         BUG_ON(cstate->replay_owner);
2464 out:
2465         /* Reset deferral mechanism for RPC deferrals */
2466         set_bit(RQ_USEDEFERRAL, &rqstp->rq_flags);
2467         dprintk("nfsv4 compound returned %d\n", ntohl(status));
2468         return status;
2469 }
2470
2471 #define op_encode_hdr_size              (2)
2472 #define op_encode_stateid_maxsz         (XDR_QUADLEN(NFS4_STATEID_SIZE))
2473 #define op_encode_verifier_maxsz        (XDR_QUADLEN(NFS4_VERIFIER_SIZE))
2474 #define op_encode_change_info_maxsz     (5)
2475 #define nfs4_fattr_bitmap_maxsz         (4)
2476
2477 /* We'll fall back on returning no lockowner if run out of space: */
2478 #define op_encode_lockowner_maxsz       (0)
2479 #define op_encode_lock_denied_maxsz     (8 + op_encode_lockowner_maxsz)
2480
2481 #define nfs4_owner_maxsz                (1 + XDR_QUADLEN(IDMAP_NAMESZ))
2482
2483 #define op_encode_ace_maxsz             (3 + nfs4_owner_maxsz)
2484 #define op_encode_delegation_maxsz      (1 + op_encode_stateid_maxsz + 1 + \
2485                                          op_encode_ace_maxsz)
2486
2487 #define op_encode_channel_attrs_maxsz   (6 + 1 + 1)
2488
2489 static inline u32 nfsd4_only_status_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2490 {
2491         return (op_encode_hdr_size) * sizeof(__be32);
2492 }
2493
2494 static inline u32 nfsd4_status_stateid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2495 {
2496         return (op_encode_hdr_size + op_encode_stateid_maxsz)* sizeof(__be32);
2497 }
2498
2499 static inline u32 nfsd4_access_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2500 {
2501         /* ac_supported, ac_resp_access */
2502         return (op_encode_hdr_size + 2)* sizeof(__be32);
2503 }
2504
2505 static inline u32 nfsd4_commit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2506 {
2507         return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32);
2508 }
2509
2510 static inline u32 nfsd4_create_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2511 {
2512         return (op_encode_hdr_size + op_encode_change_info_maxsz
2513                 + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
2514 }
2515
2516 /*
2517  * Note since this is an idempotent operation we won't insist on failing
2518  * the op prematurely if the estimate is too large.  We may turn off splice
2519  * reads unnecessarily.
2520  */
2521 static inline u32 nfsd4_getattr_rsize(struct svc_rqst *rqstp,
2522                                       struct nfsd4_op *op)
2523 {
2524         u32 *bmap = op->u.getattr.ga_bmval;
2525         u32 bmap0 = bmap[0], bmap1 = bmap[1], bmap2 = bmap[2];
2526         u32 ret = 0;
2527
2528         if (bmap0 & FATTR4_WORD0_ACL)
2529                 return svc_max_payload(rqstp);
2530         if (bmap0 & FATTR4_WORD0_FS_LOCATIONS)
2531                 return svc_max_payload(rqstp);
2532
2533         if (bmap1 & FATTR4_WORD1_OWNER) {
2534                 ret += IDMAP_NAMESZ + 4;
2535                 bmap1 &= ~FATTR4_WORD1_OWNER;
2536         }
2537         if (bmap1 & FATTR4_WORD1_OWNER_GROUP) {
2538                 ret += IDMAP_NAMESZ + 4;
2539                 bmap1 &= ~FATTR4_WORD1_OWNER_GROUP;
2540         }
2541         if (bmap0 & FATTR4_WORD0_FILEHANDLE) {
2542                 ret += NFS4_FHSIZE + 4;
2543                 bmap0 &= ~FATTR4_WORD0_FILEHANDLE;
2544         }
2545         if (bmap2 & FATTR4_WORD2_SECURITY_LABEL) {
2546                 ret += NFS4_MAXLABELLEN + 12;
2547                 bmap2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2548         }
2549         /*
2550          * Largest of remaining attributes are 16 bytes (e.g.,
2551          * supported_attributes)
2552          */
2553         ret += 16 * (hweight32(bmap0) + hweight32(bmap1) + hweight32(bmap2));
2554         /* bitmask, length */
2555         ret += 20;
2556         return ret;
2557 }
2558
2559 static inline u32 nfsd4_getfh_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2560 {
2561         return (op_encode_hdr_size + 1) * sizeof(__be32) + NFS4_FHSIZE;
2562 }
2563
2564 static inline u32 nfsd4_link_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2565 {
2566         return (op_encode_hdr_size + op_encode_change_info_maxsz)
2567                 * sizeof(__be32);
2568 }
2569
2570 static inline u32 nfsd4_lock_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2571 {
2572         return (op_encode_hdr_size + op_encode_lock_denied_maxsz)
2573                 * sizeof(__be32);
2574 }
2575
2576 static inline u32 nfsd4_open_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2577 {
2578         return (op_encode_hdr_size + op_encode_stateid_maxsz
2579                 + op_encode_change_info_maxsz + 1
2580                 + nfs4_fattr_bitmap_maxsz
2581                 + op_encode_delegation_maxsz) * sizeof(__be32);
2582 }
2583
2584 static inline u32 nfsd4_read_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2585 {
2586         u32 maxcount = 0, rlen = 0;
2587
2588         maxcount = svc_max_payload(rqstp);
2589         rlen = min(op->u.read.rd_length, maxcount);
2590
2591         return (op_encode_hdr_size + 2 + XDR_QUADLEN(rlen)) * sizeof(__be32);
2592 }
2593
2594 static inline u32 nfsd4_readdir_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2595 {
2596         u32 maxcount = 0, rlen = 0;
2597
2598         maxcount = svc_max_payload(rqstp);
2599         rlen = min(op->u.readdir.rd_maxcount, maxcount);
2600
2601         return (op_encode_hdr_size + op_encode_verifier_maxsz +
2602                 XDR_QUADLEN(rlen)) * sizeof(__be32);
2603 }
2604
2605 static inline u32 nfsd4_readlink_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2606 {
2607         return (op_encode_hdr_size + 1) * sizeof(__be32) + PAGE_SIZE;
2608 }
2609
2610 static inline u32 nfsd4_remove_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2611 {
2612         return (op_encode_hdr_size + op_encode_change_info_maxsz)
2613                 * sizeof(__be32);
2614 }
2615
2616 static inline u32 nfsd4_rename_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2617 {
2618         return (op_encode_hdr_size + op_encode_change_info_maxsz
2619                 + op_encode_change_info_maxsz) * sizeof(__be32);
2620 }
2621
2622 static inline u32 nfsd4_sequence_rsize(struct svc_rqst *rqstp,
2623                                        struct nfsd4_op *op)
2624 {
2625         return (op_encode_hdr_size
2626                 + XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + 5) * sizeof(__be32);
2627 }
2628
2629 static inline u32 nfsd4_test_stateid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2630 {
2631         return (op_encode_hdr_size + 1 + op->u.test_stateid.ts_num_ids)
2632                 * sizeof(__be32);
2633 }
2634
2635 static inline u32 nfsd4_setattr_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2636 {
2637         return (op_encode_hdr_size + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
2638 }
2639
2640 static inline u32 nfsd4_secinfo_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2641 {
2642         return (op_encode_hdr_size + RPC_AUTH_MAXFLAVOR *
2643                 (4 + XDR_QUADLEN(GSS_OID_MAX_LEN))) * sizeof(__be32);
2644 }
2645
2646 static inline u32 nfsd4_setclientid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2647 {
2648         return (op_encode_hdr_size + 2 + XDR_QUADLEN(NFS4_VERIFIER_SIZE)) *
2649                                                                 sizeof(__be32);
2650 }
2651
2652 static inline u32 nfsd4_write_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2653 {
2654         return (op_encode_hdr_size + 2 + op_encode_verifier_maxsz) * sizeof(__be32);
2655 }
2656
2657 static inline u32 nfsd4_exchange_id_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2658 {
2659         return (op_encode_hdr_size + 2 + 1 + /* eir_clientid, eir_sequenceid */\
2660                 1 + 1 + /* eir_flags, spr_how */\
2661                 4 + /* spo_must_enforce & _allow with bitmap */\
2662                 2 + /*eir_server_owner.so_minor_id */\
2663                 /* eir_server_owner.so_major_id<> */\
2664                 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
2665                 /* eir_server_scope<> */\
2666                 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
2667                 1 + /* eir_server_impl_id array length */\
2668                 0 /* ignored eir_server_impl_id contents */) * sizeof(__be32);
2669 }
2670
2671 static inline u32 nfsd4_bind_conn_to_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2672 {
2673         return (op_encode_hdr_size + \
2674                 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* bctsr_sessid */\
2675                 2 /* bctsr_dir, use_conn_in_rdma_mode */) * sizeof(__be32);
2676 }
2677
2678 static inline u32 nfsd4_create_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2679 {
2680         return (op_encode_hdr_size + \
2681                 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* sessionid */\
2682                 2 + /* csr_sequence, csr_flags */\
2683                 op_encode_channel_attrs_maxsz + \
2684                 op_encode_channel_attrs_maxsz) * sizeof(__be32);
2685 }
2686
2687 static inline u32 nfsd4_copy_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2688 {
2689         return (op_encode_hdr_size +
2690                 1 /* wr_callback */ +
2691                 op_encode_stateid_maxsz /* wr_callback */ +
2692                 2 /* wr_count */ +
2693                 1 /* wr_committed */ +
2694                 op_encode_verifier_maxsz +
2695                 1 /* cr_consecutive */ +
2696                 1 /* cr_synchronous */) * sizeof(__be32);
2697 }
2698
2699 static inline u32 nfsd4_offload_status_rsize(struct svc_rqst *rqstp,
2700                                              struct nfsd4_op *op)
2701 {
2702         return (op_encode_hdr_size +
2703                 2 /* osr_count */ +
2704                 1 /* osr_complete<1> optional 0 for now */) * sizeof(__be32);
2705 }
2706
2707 static inline u32 nfsd4_copy_notify_rsize(struct svc_rqst *rqstp,
2708                                         struct nfsd4_op *op)
2709 {
2710         return (op_encode_hdr_size +
2711                 3 /* cnr_lease_time */ +
2712                 1 /* We support one cnr_source_server */ +
2713                 1 /* cnr_stateid seq */ +
2714                 op_encode_stateid_maxsz /* cnr_stateid */ +
2715                 1 /* num cnr_source_server*/ +
2716                 1 /* nl4_type */ +
2717                 1 /* nl4 size */ +
2718                 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) /*nl4_loc + nl4_loc_sz */)
2719                 * sizeof(__be32);
2720 }
2721
2722 #ifdef CONFIG_NFSD_PNFS
2723 static inline u32 nfsd4_getdeviceinfo_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2724 {
2725         u32 maxcount = 0, rlen = 0;
2726
2727         maxcount = svc_max_payload(rqstp);
2728         rlen = min(op->u.getdeviceinfo.gd_maxcount, maxcount);
2729
2730         return (op_encode_hdr_size +
2731                 1 /* gd_layout_type*/ +
2732                 XDR_QUADLEN(rlen) +
2733                 2 /* gd_notify_types */) * sizeof(__be32);
2734 }
2735
2736 /*
2737  * At this stage we don't really know what layout driver will handle the request,
2738  * so we need to define an arbitrary upper bound here.
2739  */
2740 #define MAX_LAYOUT_SIZE         128
2741 static inline u32 nfsd4_layoutget_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2742 {
2743         return (op_encode_hdr_size +
2744                 1 /* logr_return_on_close */ +
2745                 op_encode_stateid_maxsz +
2746                 1 /* nr of layouts */ +
2747                 MAX_LAYOUT_SIZE) * sizeof(__be32);
2748 }
2749
2750 static inline u32 nfsd4_layoutcommit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2751 {
2752         return (op_encode_hdr_size +
2753                 1 /* locr_newsize */ +
2754                 2 /* ns_size */) * sizeof(__be32);
2755 }
2756
2757 static inline u32 nfsd4_layoutreturn_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2758 {
2759         return (op_encode_hdr_size +
2760                 1 /* lrs_stateid */ +
2761                 op_encode_stateid_maxsz) * sizeof(__be32);
2762 }
2763 #endif /* CONFIG_NFSD_PNFS */
2764
2765
2766 static inline u32 nfsd4_seek_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
2767 {
2768         return (op_encode_hdr_size + 3) * sizeof(__be32);
2769 }
2770
2771 static inline u32 nfsd4_getxattr_rsize(struct svc_rqst *rqstp,
2772                                        struct nfsd4_op *op)
2773 {
2774         u32 maxcount, rlen;
2775
2776         maxcount = svc_max_payload(rqstp);
2777         rlen = min_t(u32, XATTR_SIZE_MAX, maxcount);
2778
2779         return (op_encode_hdr_size + 1 + XDR_QUADLEN(rlen)) * sizeof(__be32);
2780 }
2781
2782 static inline u32 nfsd4_setxattr_rsize(struct svc_rqst *rqstp,
2783                                        struct nfsd4_op *op)
2784 {
2785         return (op_encode_hdr_size + op_encode_change_info_maxsz)
2786                 * sizeof(__be32);
2787 }
2788 static inline u32 nfsd4_listxattrs_rsize(struct svc_rqst *rqstp,
2789                                          struct nfsd4_op *op)
2790 {
2791         u32 maxcount, rlen;
2792
2793         maxcount = svc_max_payload(rqstp);
2794         rlen = min(op->u.listxattrs.lsxa_maxcount, maxcount);
2795
2796         return (op_encode_hdr_size + 4 + XDR_QUADLEN(rlen)) * sizeof(__be32);
2797 }
2798
2799 static inline u32 nfsd4_removexattr_rsize(struct svc_rqst *rqstp,
2800                                           struct nfsd4_op *op)
2801 {
2802         return (op_encode_hdr_size + op_encode_change_info_maxsz)
2803                 * sizeof(__be32);
2804 }
2805
2806
2807 static const struct nfsd4_operation nfsd4_ops[] = {
2808         [OP_ACCESS] = {
2809                 .op_func = nfsd4_access,
2810                 .op_name = "OP_ACCESS",
2811                 .op_rsize_bop = nfsd4_access_rsize,
2812         },
2813         [OP_CLOSE] = {
2814                 .op_func = nfsd4_close,
2815                 .op_flags = OP_MODIFIES_SOMETHING,
2816                 .op_name = "OP_CLOSE",
2817                 .op_rsize_bop = nfsd4_status_stateid_rsize,
2818                 .op_get_currentstateid = nfsd4_get_closestateid,
2819                 .op_set_currentstateid = nfsd4_set_closestateid,
2820         },
2821         [OP_COMMIT] = {
2822                 .op_func = nfsd4_commit,
2823                 .op_flags = OP_MODIFIES_SOMETHING,
2824                 .op_name = "OP_COMMIT",
2825                 .op_rsize_bop = nfsd4_commit_rsize,
2826         },
2827         [OP_CREATE] = {
2828                 .op_func = nfsd4_create,
2829                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME | OP_CLEAR_STATEID,
2830                 .op_name = "OP_CREATE",
2831                 .op_rsize_bop = nfsd4_create_rsize,
2832         },
2833         [OP_DELEGRETURN] = {
2834                 .op_func = nfsd4_delegreturn,
2835                 .op_flags = OP_MODIFIES_SOMETHING,
2836                 .op_name = "OP_DELEGRETURN",
2837                 .op_rsize_bop = nfsd4_only_status_rsize,
2838                 .op_get_currentstateid = nfsd4_get_delegreturnstateid,
2839         },
2840         [OP_GETATTR] = {
2841                 .op_func = nfsd4_getattr,
2842                 .op_flags = ALLOWED_ON_ABSENT_FS,
2843                 .op_rsize_bop = nfsd4_getattr_rsize,
2844                 .op_name = "OP_GETATTR",
2845         },
2846         [OP_GETFH] = {
2847                 .op_func = nfsd4_getfh,
2848                 .op_name = "OP_GETFH",
2849                 .op_rsize_bop = nfsd4_getfh_rsize,
2850         },
2851         [OP_LINK] = {
2852                 .op_func = nfsd4_link,
2853                 .op_flags = ALLOWED_ON_ABSENT_FS | OP_MODIFIES_SOMETHING
2854                                 | OP_CACHEME,
2855                 .op_name = "OP_LINK",
2856                 .op_rsize_bop = nfsd4_link_rsize,
2857         },
2858         [OP_LOCK] = {
2859                 .op_func = nfsd4_lock,
2860                 .op_flags = OP_MODIFIES_SOMETHING |
2861                                 OP_NONTRIVIAL_ERROR_ENCODE,
2862                 .op_name = "OP_LOCK",
2863                 .op_rsize_bop = nfsd4_lock_rsize,
2864                 .op_set_currentstateid = nfsd4_set_lockstateid,
2865         },
2866         [OP_LOCKT] = {
2867                 .op_func = nfsd4_lockt,
2868                 .op_flags = OP_NONTRIVIAL_ERROR_ENCODE,
2869                 .op_name = "OP_LOCKT",
2870                 .op_rsize_bop = nfsd4_lock_rsize,
2871         },
2872         [OP_LOCKU] = {
2873                 .op_func = nfsd4_locku,
2874                 .op_flags = OP_MODIFIES_SOMETHING,
2875                 .op_name = "OP_LOCKU",
2876                 .op_rsize_bop = nfsd4_status_stateid_rsize,
2877                 .op_get_currentstateid = nfsd4_get_lockustateid,
2878         },
2879         [OP_LOOKUP] = {
2880                 .op_func = nfsd4_lookup,
2881                 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
2882                 .op_name = "OP_LOOKUP",
2883                 .op_rsize_bop = nfsd4_only_status_rsize,
2884         },
2885         [OP_LOOKUPP] = {
2886                 .op_func = nfsd4_lookupp,
2887                 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
2888                 .op_name = "OP_LOOKUPP",
2889                 .op_rsize_bop = nfsd4_only_status_rsize,
2890         },
2891         [OP_NVERIFY] = {
2892                 .op_func = nfsd4_nverify,
2893                 .op_name = "OP_NVERIFY",
2894                 .op_rsize_bop = nfsd4_only_status_rsize,
2895         },
2896         [OP_OPEN] = {
2897                 .op_func = nfsd4_open,
2898                 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
2899                 .op_name = "OP_OPEN",
2900                 .op_rsize_bop = nfsd4_open_rsize,
2901                 .op_set_currentstateid = nfsd4_set_openstateid,
2902         },
2903         [OP_OPEN_CONFIRM] = {
2904                 .op_func = nfsd4_open_confirm,
2905                 .op_flags = OP_MODIFIES_SOMETHING,
2906                 .op_name = "OP_OPEN_CONFIRM",
2907                 .op_rsize_bop = nfsd4_status_stateid_rsize,
2908         },
2909         [OP_OPEN_DOWNGRADE] = {
2910                 .op_func = nfsd4_open_downgrade,
2911                 .op_flags = OP_MODIFIES_SOMETHING,
2912                 .op_name = "OP_OPEN_DOWNGRADE",
2913                 .op_rsize_bop = nfsd4_status_stateid_rsize,
2914                 .op_get_currentstateid = nfsd4_get_opendowngradestateid,
2915                 .op_set_currentstateid = nfsd4_set_opendowngradestateid,
2916         },
2917         [OP_PUTFH] = {
2918                 .op_func = nfsd4_putfh,
2919                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
2920                                 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID,
2921                 .op_name = "OP_PUTFH",
2922                 .op_rsize_bop = nfsd4_only_status_rsize,
2923         },
2924         [OP_PUTPUBFH] = {
2925                 .op_func = nfsd4_putrootfh,
2926                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
2927                                 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID,
2928                 .op_name = "OP_PUTPUBFH",
2929                 .op_rsize_bop = nfsd4_only_status_rsize,
2930         },
2931         [OP_PUTROOTFH] = {
2932                 .op_func = nfsd4_putrootfh,
2933                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
2934                                 | OP_IS_PUTFH_LIKE | OP_CLEAR_STATEID,
2935                 .op_name = "OP_PUTROOTFH",
2936                 .op_rsize_bop = nfsd4_only_status_rsize,
2937         },
2938         [OP_READ] = {
2939                 .op_func = nfsd4_read,
2940                 .op_release = nfsd4_read_release,
2941                 .op_name = "OP_READ",
2942                 .op_rsize_bop = nfsd4_read_rsize,
2943                 .op_get_currentstateid = nfsd4_get_readstateid,
2944         },
2945         [OP_READDIR] = {
2946                 .op_func = nfsd4_readdir,
2947                 .op_name = "OP_READDIR",
2948                 .op_rsize_bop = nfsd4_readdir_rsize,
2949         },
2950         [OP_READLINK] = {
2951                 .op_func = nfsd4_readlink,
2952                 .op_name = "OP_READLINK",
2953                 .op_rsize_bop = nfsd4_readlink_rsize,
2954         },
2955         [OP_REMOVE] = {
2956                 .op_func = nfsd4_remove,
2957                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
2958                 .op_name = "OP_REMOVE",
2959                 .op_rsize_bop = nfsd4_remove_rsize,
2960         },
2961         [OP_RENAME] = {
2962                 .op_func = nfsd4_rename,
2963                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
2964                 .op_name = "OP_RENAME",
2965                 .op_rsize_bop = nfsd4_rename_rsize,
2966         },
2967         [OP_RENEW] = {
2968                 .op_func = nfsd4_renew,
2969                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
2970                                 | OP_MODIFIES_SOMETHING,
2971                 .op_name = "OP_RENEW",
2972                 .op_rsize_bop = nfsd4_only_status_rsize,
2973
2974         },
2975         [OP_RESTOREFH] = {
2976                 .op_func = nfsd4_restorefh,
2977                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
2978                                 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING,
2979                 .op_name = "OP_RESTOREFH",
2980                 .op_rsize_bop = nfsd4_only_status_rsize,
2981         },
2982         [OP_SAVEFH] = {
2983                 .op_func = nfsd4_savefh,
2984                 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
2985                 .op_name = "OP_SAVEFH",
2986                 .op_rsize_bop = nfsd4_only_status_rsize,
2987         },
2988         [OP_SECINFO] = {
2989                 .op_func = nfsd4_secinfo,
2990                 .op_release = nfsd4_secinfo_release,
2991                 .op_flags = OP_HANDLES_WRONGSEC,
2992                 .op_name = "OP_SECINFO",
2993                 .op_rsize_bop = nfsd4_secinfo_rsize,
2994         },
2995         [OP_SETATTR] = {
2996                 .op_func = nfsd4_setattr,
2997                 .op_name = "OP_SETATTR",
2998                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME
2999                                 | OP_NONTRIVIAL_ERROR_ENCODE,
3000                 .op_rsize_bop = nfsd4_setattr_rsize,
3001                 .op_get_currentstateid = nfsd4_get_setattrstateid,
3002         },
3003         [OP_SETCLIENTID] = {
3004                 .op_func = nfsd4_setclientid,
3005                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
3006                                 | OP_MODIFIES_SOMETHING | OP_CACHEME
3007                                 | OP_NONTRIVIAL_ERROR_ENCODE,
3008                 .op_name = "OP_SETCLIENTID",
3009                 .op_rsize_bop = nfsd4_setclientid_rsize,
3010         },
3011         [OP_SETCLIENTID_CONFIRM] = {
3012                 .op_func = nfsd4_setclientid_confirm,
3013                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
3014                                 | OP_MODIFIES_SOMETHING | OP_CACHEME,
3015                 .op_name = "OP_SETCLIENTID_CONFIRM",
3016                 .op_rsize_bop = nfsd4_only_status_rsize,
3017         },
3018         [OP_VERIFY] = {
3019                 .op_func = nfsd4_verify,
3020                 .op_name = "OP_VERIFY",
3021                 .op_rsize_bop = nfsd4_only_status_rsize,
3022         },
3023         [OP_WRITE] = {
3024                 .op_func = nfsd4_write,
3025                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
3026                 .op_name = "OP_WRITE",
3027                 .op_rsize_bop = nfsd4_write_rsize,
3028                 .op_get_currentstateid = nfsd4_get_writestateid,
3029         },
3030         [OP_RELEASE_LOCKOWNER] = {
3031                 .op_func = nfsd4_release_lockowner,
3032                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
3033                                 | OP_MODIFIES_SOMETHING,
3034                 .op_name = "OP_RELEASE_LOCKOWNER",
3035                 .op_rsize_bop = nfsd4_only_status_rsize,
3036         },
3037
3038         /* NFSv4.1 operations */
3039         [OP_EXCHANGE_ID] = {
3040                 .op_func = nfsd4_exchange_id,
3041                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
3042                                 | OP_MODIFIES_SOMETHING,
3043                 .op_name = "OP_EXCHANGE_ID",
3044                 .op_rsize_bop = nfsd4_exchange_id_rsize,
3045         },
3046         [OP_BACKCHANNEL_CTL] = {
3047                 .op_func = nfsd4_backchannel_ctl,
3048                 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
3049                 .op_name = "OP_BACKCHANNEL_CTL",
3050                 .op_rsize_bop = nfsd4_only_status_rsize,
3051         },
3052         [OP_BIND_CONN_TO_SESSION] = {
3053                 .op_func = nfsd4_bind_conn_to_session,
3054                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
3055                                 | OP_MODIFIES_SOMETHING,
3056                 .op_name = "OP_BIND_CONN_TO_SESSION",
3057                 .op_rsize_bop = nfsd4_bind_conn_to_session_rsize,
3058         },
3059         [OP_CREATE_SESSION] = {
3060                 .op_func = nfsd4_create_session,
3061                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
3062                                 | OP_MODIFIES_SOMETHING,
3063                 .op_name = "OP_CREATE_SESSION",
3064                 .op_rsize_bop = nfsd4_create_session_rsize,
3065         },
3066         [OP_DESTROY_SESSION] = {
3067                 .op_func = nfsd4_destroy_session,
3068                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
3069                                 | OP_MODIFIES_SOMETHING,
3070                 .op_name = "OP_DESTROY_SESSION",
3071                 .op_rsize_bop = nfsd4_only_status_rsize,
3072         },
3073         [OP_SEQUENCE] = {
3074                 .op_func = nfsd4_sequence,
3075                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP,
3076                 .op_name = "OP_SEQUENCE",
3077                 .op_rsize_bop = nfsd4_sequence_rsize,
3078         },
3079         [OP_DESTROY_CLIENTID] = {
3080                 .op_func = nfsd4_destroy_clientid,
3081                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
3082                                 | OP_MODIFIES_SOMETHING,
3083                 .op_name = "OP_DESTROY_CLIENTID",
3084                 .op_rsize_bop = nfsd4_only_status_rsize,
3085         },
3086         [OP_RECLAIM_COMPLETE] = {
3087                 .op_func = nfsd4_reclaim_complete,
3088                 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
3089                 .op_name = "OP_RECLAIM_COMPLETE",
3090                 .op_rsize_bop = nfsd4_only_status_rsize,
3091         },
3092         [OP_SECINFO_NO_NAME] = {
3093                 .op_func = nfsd4_secinfo_no_name,
3094                 .op_release = nfsd4_secinfo_no_name_release,
3095                 .op_flags = OP_HANDLES_WRONGSEC,
3096                 .op_name = "OP_SECINFO_NO_NAME",
3097                 .op_rsize_bop = nfsd4_secinfo_rsize,
3098         },
3099         [OP_TEST_STATEID] = {
3100                 .op_func = nfsd4_test_stateid,
3101                 .op_flags = ALLOWED_WITHOUT_FH,
3102                 .op_name = "OP_TEST_STATEID",
3103                 .op_rsize_bop = nfsd4_test_stateid_rsize,
3104         },
3105         [OP_FREE_STATEID] = {
3106                 .op_func = nfsd4_free_stateid,
3107                 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
3108                 .op_name = "OP_FREE_STATEID",
3109                 .op_get_currentstateid = nfsd4_get_freestateid,
3110                 .op_rsize_bop = nfsd4_only_status_rsize,
3111         },
3112 #ifdef CONFIG_NFSD_PNFS
3113         [OP_GETDEVICEINFO] = {
3114                 .op_func = nfsd4_getdeviceinfo,
3115                 .op_release = nfsd4_getdeviceinfo_release,
3116                 .op_flags = ALLOWED_WITHOUT_FH,
3117                 .op_name = "OP_GETDEVICEINFO",
3118                 .op_rsize_bop = nfsd4_getdeviceinfo_rsize,
3119         },
3120         [OP_LAYOUTGET] = {
3121                 .op_func = nfsd4_layoutget,
3122                 .op_release = nfsd4_layoutget_release,
3123                 .op_flags = OP_MODIFIES_SOMETHING,
3124                 .op_name = "OP_LAYOUTGET",
3125                 .op_rsize_bop = nfsd4_layoutget_rsize,
3126         },
3127         [OP_LAYOUTCOMMIT] = {
3128                 .op_func = nfsd4_layoutcommit,
3129                 .op_flags = OP_MODIFIES_SOMETHING,
3130                 .op_name = "OP_LAYOUTCOMMIT",
3131                 .op_rsize_bop = nfsd4_layoutcommit_rsize,
3132         },
3133         [OP_LAYOUTRETURN] = {
3134                 .op_func = nfsd4_layoutreturn,
3135                 .op_flags = OP_MODIFIES_SOMETHING,
3136                 .op_name = "OP_LAYOUTRETURN",
3137                 .op_rsize_bop = nfsd4_layoutreturn_rsize,
3138         },
3139 #endif /* CONFIG_NFSD_PNFS */
3140
3141         /* NFSv4.2 operations */
3142         [OP_ALLOCATE] = {
3143                 .op_func = nfsd4_allocate,
3144                 .op_flags = OP_MODIFIES_SOMETHING,
3145                 .op_name = "OP_ALLOCATE",
3146                 .op_rsize_bop = nfsd4_only_status_rsize,
3147         },
3148         [OP_DEALLOCATE] = {
3149                 .op_func = nfsd4_deallocate,
3150                 .op_flags = OP_MODIFIES_SOMETHING,
3151                 .op_name = "OP_DEALLOCATE",
3152                 .op_rsize_bop = nfsd4_only_status_rsize,
3153         },
3154         [OP_CLONE] = {
3155                 .op_func = nfsd4_clone,
3156                 .op_flags = OP_MODIFIES_SOMETHING,
3157                 .op_name = "OP_CLONE",
3158                 .op_rsize_bop = nfsd4_only_status_rsize,
3159         },
3160         [OP_COPY] = {
3161                 .op_func = nfsd4_copy,
3162                 .op_flags = OP_MODIFIES_SOMETHING,
3163                 .op_name = "OP_COPY",
3164                 .op_rsize_bop = nfsd4_copy_rsize,
3165         },
3166         [OP_SEEK] = {
3167                 .op_func = nfsd4_seek,
3168                 .op_name = "OP_SEEK",
3169                 .op_rsize_bop = nfsd4_seek_rsize,
3170         },
3171         [OP_OFFLOAD_STATUS] = {
3172                 .op_func = nfsd4_offload_status,
3173                 .op_name = "OP_OFFLOAD_STATUS",
3174                 .op_rsize_bop = nfsd4_offload_status_rsize,
3175         },
3176         [OP_OFFLOAD_CANCEL] = {
3177                 .op_func = nfsd4_offload_cancel,
3178                 .op_flags = OP_MODIFIES_SOMETHING,
3179                 .op_name = "OP_OFFLOAD_CANCEL",
3180                 .op_rsize_bop = nfsd4_only_status_rsize,
3181         },
3182         [OP_COPY_NOTIFY] = {
3183                 .op_func = nfsd4_copy_notify,
3184                 .op_flags = OP_MODIFIES_SOMETHING,
3185                 .op_name = "OP_COPY_NOTIFY",
3186                 .op_rsize_bop = nfsd4_copy_notify_rsize,
3187         },
3188         [OP_GETXATTR] = {
3189                 .op_func = nfsd4_getxattr,
3190                 .op_name = "OP_GETXATTR",
3191                 .op_rsize_bop = nfsd4_getxattr_rsize,
3192         },
3193         [OP_SETXATTR] = {
3194                 .op_func = nfsd4_setxattr,
3195                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
3196                 .op_name = "OP_SETXATTR",
3197                 .op_rsize_bop = nfsd4_setxattr_rsize,
3198         },
3199         [OP_LISTXATTRS] = {
3200                 .op_func = nfsd4_listxattrs,
3201                 .op_name = "OP_LISTXATTRS",
3202                 .op_rsize_bop = nfsd4_listxattrs_rsize,
3203         },
3204         [OP_REMOVEXATTR] = {
3205                 .op_func = nfsd4_removexattr,
3206                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
3207                 .op_name = "OP_REMOVEXATTR",
3208                 .op_rsize_bop = nfsd4_removexattr_rsize,
3209         },
3210 };
3211
3212 /**
3213  * nfsd4_spo_must_allow - Determine if the compound op contains an
3214  * operation that is allowed to be sent with machine credentials
3215  *
3216  * @rqstp: a pointer to the struct svc_rqst
3217  *
3218  * Checks to see if the compound contains a spo_must_allow op
3219  * and confirms that it was sent with the proper machine creds.
3220  */
3221
3222 bool nfsd4_spo_must_allow(struct svc_rqst *rqstp)
3223 {
3224         struct nfsd4_compoundres *resp = rqstp->rq_resp;
3225         struct nfsd4_compoundargs *argp = rqstp->rq_argp;
3226         struct nfsd4_op *this = &argp->ops[resp->opcnt - 1];
3227         struct nfsd4_compound_state *cstate = &resp->cstate;
3228         struct nfs4_op_map *allow = &cstate->clp->cl_spo_must_allow;
3229         u32 opiter;
3230
3231         if (!cstate->minorversion)
3232                 return false;
3233
3234         if (cstate->spo_must_allowed == true)
3235                 return true;
3236
3237         opiter = resp->opcnt;
3238         while (opiter < argp->opcnt) {
3239                 this = &argp->ops[opiter++];
3240                 if (test_bit(this->opnum, allow->u.longs) &&
3241                         cstate->clp->cl_mach_cred &&
3242                         nfsd4_mach_creds_match(cstate->clp, rqstp)) {
3243                         cstate->spo_must_allowed = true;
3244                         return true;
3245                 }
3246         }
3247         cstate->spo_must_allowed = false;
3248         return false;
3249 }
3250
3251 int nfsd4_max_reply(struct svc_rqst *rqstp, struct nfsd4_op *op)
3252 {
3253         if (op->opnum == OP_ILLEGAL || op->status == nfserr_notsupp)
3254                 return op_encode_hdr_size * sizeof(__be32);
3255
3256         BUG_ON(OPDESC(op)->op_rsize_bop == NULL);
3257         return OPDESC(op)->op_rsize_bop(rqstp, op);
3258 }
3259
3260 void warn_on_nonidempotent_op(struct nfsd4_op *op)
3261 {
3262         if (OPDESC(op)->op_flags & OP_MODIFIES_SOMETHING) {
3263                 pr_err("unable to encode reply to nonidempotent op %d (%s)\n",
3264                         op->opnum, nfsd4_op_name(op->opnum));
3265                 WARN_ON_ONCE(1);
3266         }
3267 }
3268
3269 static const char *nfsd4_op_name(unsigned opnum)
3270 {
3271         if (opnum < ARRAY_SIZE(nfsd4_ops))
3272                 return nfsd4_ops[opnum].op_name;
3273         return "unknown_operation";
3274 }
3275
3276 #define nfsd4_voidres                   nfsd4_voidargs
3277 struct nfsd4_voidargs { int dummy; };
3278
3279 static const struct svc_procedure nfsd_procedures4[2] = {
3280         [NFSPROC4_NULL] = {
3281                 .pc_func = nfsd4_proc_null,
3282                 .pc_encode = nfs4svc_encode_voidres,
3283                 .pc_argsize = sizeof(struct nfsd4_voidargs),
3284                 .pc_ressize = sizeof(struct nfsd4_voidres),
3285                 .pc_cachetype = RC_NOCACHE,
3286                 .pc_xdrressize = 1,
3287         },
3288         [NFSPROC4_COMPOUND] = {
3289                 .pc_func = nfsd4_proc_compound,
3290                 .pc_decode = nfs4svc_decode_compoundargs,
3291                 .pc_encode = nfs4svc_encode_compoundres,
3292                 .pc_argsize = sizeof(struct nfsd4_compoundargs),
3293                 .pc_ressize = sizeof(struct nfsd4_compoundres),
3294                 .pc_release = nfsd4_release_compoundargs,
3295                 .pc_cachetype = RC_NOCACHE,
3296                 .pc_xdrressize = NFSD_BUFSIZE/4,
3297         },
3298 };
3299
3300 static unsigned int nfsd_count3[ARRAY_SIZE(nfsd_procedures4)];
3301 const struct svc_version nfsd_version4 = {
3302         .vs_vers                = 4,
3303         .vs_nproc               = 2,
3304         .vs_proc                = nfsd_procedures4,
3305         .vs_count               = nfsd_count3,
3306         .vs_dispatch            = nfsd_dispatch,
3307         .vs_xdrsize             = NFS4_SVC_XDRSIZE,
3308         .vs_rpcb_optnl          = true,
3309         .vs_need_cong_ctrl      = true,
3310 };
3311
3312 /*
3313  * Local variables:
3314  *  c-basic-offset: 8
3315  * End:
3316  */