]> Pileus Git - ~andy/linux/blob - fs/nfsd/nfs4proc.c
Merge nfs containerization work from Trond's tree
[~andy/linux] / fs / nfsd / nfs4proc.c
1 /*
2  *  Server-side procedures for NFSv4.
3  *
4  *  Copyright (c) 2002 The Regents of the University of Michigan.
5  *  All rights reserved.
6  *
7  *  Kendrick Smith <kmsmith@umich.edu>
8  *  Andy Adamson   <andros@umich.edu>
9  *
10  *  Redistribution and use in source and binary forms, with or without
11  *  modification, are permitted provided that the following conditions
12  *  are met:
13  *
14  *  1. Redistributions of source code must retain the above copyright
15  *     notice, this list of conditions and the following disclaimer.
16  *  2. Redistributions in binary form must reproduce the above copyright
17  *     notice, this list of conditions and the following disclaimer in the
18  *     documentation and/or other materials provided with the distribution.
19  *  3. Neither the name of the University nor the names of its
20  *     contributors may be used to endorse or promote products derived
21  *     from this software without specific prior written permission.
22  *
23  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 #include <linux/file.h>
36 #include <linux/slab.h>
37
38 #include "idmap.h"
39 #include "cache.h"
40 #include "xdr4.h"
41 #include "vfs.h"
42 #include "current_stateid.h"
43
44 #define NFSDDBG_FACILITY                NFSDDBG_PROC
45
46 static u32 nfsd_attrmask[] = {
47         NFSD_WRITEABLE_ATTRS_WORD0,
48         NFSD_WRITEABLE_ATTRS_WORD1,
49         NFSD_WRITEABLE_ATTRS_WORD2
50 };
51
52 static u32 nfsd41_ex_attrmask[] = {
53         NFSD_SUPPATTR_EXCLCREAT_WORD0,
54         NFSD_SUPPATTR_EXCLCREAT_WORD1,
55         NFSD_SUPPATTR_EXCLCREAT_WORD2
56 };
57
58 static __be32
59 check_attr_support(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
60                    u32 *bmval, u32 *writable)
61 {
62         struct dentry *dentry = cstate->current_fh.fh_dentry;
63
64         /*
65          * Check about attributes are supported by the NFSv4 server or not.
66          * According to spec, unsupported attributes return ERR_ATTRNOTSUPP.
67          */
68         if ((bmval[0] & ~nfsd_suppattrs0(cstate->minorversion)) ||
69             (bmval[1] & ~nfsd_suppattrs1(cstate->minorversion)) ||
70             (bmval[2] & ~nfsd_suppattrs2(cstate->minorversion)))
71                 return nfserr_attrnotsupp;
72
73         /*
74          * Check FATTR4_WORD0_ACL can be supported
75          * in current environment or not.
76          */
77         if (bmval[0] & FATTR4_WORD0_ACL) {
78                 if (!IS_POSIXACL(dentry->d_inode))
79                         return nfserr_attrnotsupp;
80         }
81
82         /*
83          * According to spec, read-only attributes return ERR_INVAL.
84          */
85         if (writable) {
86                 if ((bmval[0] & ~writable[0]) || (bmval[1] & ~writable[1]) ||
87                     (bmval[2] & ~writable[2]))
88                         return nfserr_inval;
89         }
90
91         return nfs_ok;
92 }
93
94 static __be32
95 nfsd4_check_open_attributes(struct svc_rqst *rqstp,
96         struct nfsd4_compound_state *cstate, struct nfsd4_open *open)
97 {
98         __be32 status = nfs_ok;
99
100         if (open->op_create == NFS4_OPEN_CREATE) {
101                 if (open->op_createmode == NFS4_CREATE_UNCHECKED
102                     || open->op_createmode == NFS4_CREATE_GUARDED)
103                         status = check_attr_support(rqstp, cstate,
104                                         open->op_bmval, nfsd_attrmask);
105                 else if (open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1)
106                         status = check_attr_support(rqstp, cstate,
107                                         open->op_bmval, nfsd41_ex_attrmask);
108         }
109
110         return status;
111 }
112
113 static int
114 is_create_with_attrs(struct nfsd4_open *open)
115 {
116         return open->op_create == NFS4_OPEN_CREATE
117                 && (open->op_createmode == NFS4_CREATE_UNCHECKED
118                     || open->op_createmode == NFS4_CREATE_GUARDED
119                     || open->op_createmode == NFS4_CREATE_EXCLUSIVE4_1);
120 }
121
122 /*
123  * if error occurs when setting the acl, just clear the acl bit
124  * in the returned attr bitmap.
125  */
126 static void
127 do_set_nfs4_acl(struct svc_rqst *rqstp, struct svc_fh *fhp,
128                 struct nfs4_acl *acl, u32 *bmval)
129 {
130         __be32 status;
131
132         status = nfsd4_set_nfs4_acl(rqstp, fhp, acl);
133         if (status)
134                 /*
135                  * We should probably fail the whole open at this point,
136                  * but we've already created the file, so it's too late;
137                  * So this seems the least of evils:
138                  */
139                 bmval[0] &= ~FATTR4_WORD0_ACL;
140 }
141
142 static inline void
143 fh_dup2(struct svc_fh *dst, struct svc_fh *src)
144 {
145         fh_put(dst);
146         dget(src->fh_dentry);
147         if (src->fh_export)
148                 cache_get(&src->fh_export->h);
149         *dst = *src;
150 }
151
152 static __be32
153 do_open_permission(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open, int accmode)
154 {
155         __be32 status;
156
157         if (open->op_truncate &&
158                 !(open->op_share_access & NFS4_SHARE_ACCESS_WRITE))
159                 return nfserr_inval;
160
161         accmode |= NFSD_MAY_READ_IF_EXEC;
162
163         if (open->op_share_access & NFS4_SHARE_ACCESS_READ)
164                 accmode |= NFSD_MAY_READ;
165         if (open->op_share_access & NFS4_SHARE_ACCESS_WRITE)
166                 accmode |= (NFSD_MAY_WRITE | NFSD_MAY_TRUNC);
167         if (open->op_share_deny & NFS4_SHARE_DENY_READ)
168                 accmode |= NFSD_MAY_WRITE;
169
170         status = fh_verify(rqstp, current_fh, S_IFREG, accmode);
171
172         return status;
173 }
174
175 static __be32 nfsd_check_obj_isreg(struct svc_fh *fh)
176 {
177         umode_t mode = fh->fh_dentry->d_inode->i_mode;
178
179         if (S_ISREG(mode))
180                 return nfs_ok;
181         if (S_ISDIR(mode))
182                 return nfserr_isdir;
183         /*
184          * Using err_symlink as our catch-all case may look odd; but
185          * there's no other obvious error for this case in 4.0, and we
186          * happen to know that it will cause the linux v4 client to do
187          * the right thing on attempts to open something other than a
188          * regular file.
189          */
190         return nfserr_symlink;
191 }
192
193 static __be32
194 do_open_lookup(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
195 {
196         struct svc_fh *resfh;
197         __be32 status;
198
199         resfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
200         if (!resfh)
201                 return nfserr_jukebox;
202         fh_init(resfh, NFS4_FHSIZE);
203         open->op_truncate = 0;
204
205         if (open->op_create) {
206                 /* FIXME: check session persistence and pnfs flags.
207                  * The nfsv4.1 spec requires the following semantics:
208                  *
209                  * Persistent   | pNFS   | Server REQUIRED | Client Allowed
210                  * Reply Cache  | server |                 |
211                  * -------------+--------+-----------------+--------------------
212                  * no           | no     | EXCLUSIVE4_1    | EXCLUSIVE4_1
213                  *              |        |                 | (SHOULD)
214                  *              |        | and EXCLUSIVE4  | or EXCLUSIVE4
215                  *              |        |                 | (SHOULD NOT)
216                  * no           | yes    | EXCLUSIVE4_1    | EXCLUSIVE4_1
217                  * yes          | no     | GUARDED4        | GUARDED4
218                  * yes          | yes    | GUARDED4        | GUARDED4
219                  */
220
221                 /*
222                  * Note: create modes (UNCHECKED,GUARDED...) are the same
223                  * in NFSv4 as in v3 except EXCLUSIVE4_1.
224                  */
225                 status = do_nfsd_create(rqstp, current_fh, open->op_fname.data,
226                                         open->op_fname.len, &open->op_iattr,
227                                         resfh, open->op_createmode,
228                                         (u32 *)open->op_verf.data,
229                                         &open->op_truncate, &open->op_created);
230
231                 /*
232                  * Following rfc 3530 14.2.16, use the returned bitmask
233                  * to indicate which attributes we used to store the
234                  * verifier:
235                  */
236                 if (open->op_createmode == NFS4_CREATE_EXCLUSIVE && status == 0)
237                         open->op_bmval[1] = (FATTR4_WORD1_TIME_ACCESS |
238                                                 FATTR4_WORD1_TIME_MODIFY);
239         } else {
240                 status = nfsd_lookup(rqstp, current_fh,
241                                      open->op_fname.data, open->op_fname.len, resfh);
242                 fh_unlock(current_fh);
243                 if (status)
244                         goto out;
245                 status = nfsd_check_obj_isreg(resfh);
246         }
247         if (status)
248                 goto out;
249
250         if (is_create_with_attrs(open) && open->op_acl != NULL)
251                 do_set_nfs4_acl(rqstp, resfh, open->op_acl, open->op_bmval);
252
253         /* set reply cache */
254         fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh,
255                         &resfh->fh_handle);
256         if (!open->op_created)
257                 status = do_open_permission(rqstp, resfh, open,
258                                             NFSD_MAY_NOP);
259         set_change_info(&open->op_cinfo, current_fh);
260         fh_dup2(current_fh, resfh);
261 out:
262         fh_put(resfh);
263         kfree(resfh);
264         return status;
265 }
266
267 static __be32
268 do_open_fhandle(struct svc_rqst *rqstp, struct svc_fh *current_fh, struct nfsd4_open *open)
269 {
270         __be32 status;
271
272         /* We don't know the target directory, and therefore can not
273         * set the change info
274         */
275
276         memset(&open->op_cinfo, 0, sizeof(struct nfsd4_change_info));
277
278         /* set replay cache */
279         fh_copy_shallow(&open->op_openowner->oo_owner.so_replay.rp_openfh,
280                         &current_fh->fh_handle);
281
282         open->op_truncate = (open->op_iattr.ia_valid & ATTR_SIZE) &&
283                 (open->op_iattr.ia_size == 0);
284
285         status = do_open_permission(rqstp, current_fh, open,
286                                     NFSD_MAY_OWNER_OVERRIDE);
287
288         return status;
289 }
290
291 static void
292 copy_clientid(clientid_t *clid, struct nfsd4_session *session)
293 {
294         struct nfsd4_sessionid *sid =
295                         (struct nfsd4_sessionid *)session->se_sessionid.data;
296
297         clid->cl_boot = sid->clientid.cl_boot;
298         clid->cl_id = sid->clientid.cl_id;
299 }
300
301 static __be32
302 nfsd4_open(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
303            struct nfsd4_open *open)
304 {
305         __be32 status;
306         struct nfsd4_compoundres *resp;
307
308         dprintk("NFSD: nfsd4_open filename %.*s op_openowner %p\n",
309                 (int)open->op_fname.len, open->op_fname.data,
310                 open->op_openowner);
311
312         /* This check required by spec. */
313         if (open->op_create && open->op_claim_type != NFS4_OPEN_CLAIM_NULL)
314                 return nfserr_inval;
315
316         open->op_created = 0;
317         /*
318          * RFC5661 18.51.3
319          * Before RECLAIM_COMPLETE done, server should deny new lock
320          */
321         if (nfsd4_has_session(cstate) &&
322             !cstate->session->se_client->cl_firststate &&
323             open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
324                 return nfserr_grace;
325
326         if (nfsd4_has_session(cstate))
327                 copy_clientid(&open->op_clientid, cstate->session);
328
329         nfs4_lock_state();
330
331         /* check seqid for replay. set nfs4_owner */
332         resp = rqstp->rq_resp;
333         status = nfsd4_process_open1(&resp->cstate, open);
334         if (status == nfserr_replay_me) {
335                 struct nfs4_replay *rp = &open->op_openowner->oo_owner.so_replay;
336                 fh_put(&cstate->current_fh);
337                 fh_copy_shallow(&cstate->current_fh.fh_handle,
338                                 &rp->rp_openfh);
339                 status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
340                 if (status)
341                         dprintk("nfsd4_open: replay failed"
342                                 " restoring previous filehandle\n");
343                 else
344                         status = nfserr_replay_me;
345         }
346         if (status)
347                 goto out;
348
349         status = nfsd4_check_open_attributes(rqstp, cstate, open);
350         if (status)
351                 goto out;
352
353         /* Openowner is now set, so sequence id will get bumped.  Now we need
354          * these checks before we do any creates: */
355         status = nfserr_grace;
356         if (locks_in_grace() && open->op_claim_type != NFS4_OPEN_CLAIM_PREVIOUS)
357                 goto out;
358         status = nfserr_no_grace;
359         if (!locks_in_grace() && open->op_claim_type == NFS4_OPEN_CLAIM_PREVIOUS)
360                 goto out;
361
362         switch (open->op_claim_type) {
363                 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
364                 case NFS4_OPEN_CLAIM_NULL:
365                         status = do_open_lookup(rqstp, &cstate->current_fh,
366                                                 open);
367                         if (status)
368                                 goto out;
369                         break;
370                 case NFS4_OPEN_CLAIM_PREVIOUS:
371                         open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED;
372                         status = nfs4_check_open_reclaim(&open->op_clientid);
373                         if (status)
374                                 goto out;
375                 case NFS4_OPEN_CLAIM_FH:
376                 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
377                         status = do_open_fhandle(rqstp, &cstate->current_fh,
378                                                  open);
379                         if (status)
380                                 goto out;
381                         break;
382                 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
383                 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
384                         open->op_openowner->oo_flags |= NFS4_OO_CONFIRMED;
385                         dprintk("NFSD: unsupported OPEN claim type %d\n",
386                                 open->op_claim_type);
387                         status = nfserr_notsupp;
388                         goto out;
389                 default:
390                         dprintk("NFSD: Invalid OPEN claim type %d\n",
391                                 open->op_claim_type);
392                         status = nfserr_inval;
393                         goto out;
394         }
395         /*
396          * nfsd4_process_open2() does the actual opening of the file.  If
397          * successful, it (1) truncates the file if open->op_truncate was
398          * set, (2) sets open->op_stateid, (3) sets open->op_delegation.
399          */
400         status = nfsd4_process_open2(rqstp, &cstate->current_fh, open);
401         WARN_ON(status && open->op_created);
402 out:
403         nfsd4_cleanup_open_state(open, status);
404         if (open->op_openowner)
405                 cstate->replay_owner = &open->op_openowner->oo_owner;
406         else
407                 nfs4_unlock_state();
408         return status;
409 }
410
411 /*
412  * filehandle-manipulating ops.
413  */
414 static __be32
415 nfsd4_getfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
416             struct svc_fh **getfh)
417 {
418         if (!cstate->current_fh.fh_dentry)
419                 return nfserr_nofilehandle;
420
421         *getfh = &cstate->current_fh;
422         return nfs_ok;
423 }
424
425 static __be32
426 nfsd4_putfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
427             struct nfsd4_putfh *putfh)
428 {
429         fh_put(&cstate->current_fh);
430         cstate->current_fh.fh_handle.fh_size = putfh->pf_fhlen;
431         memcpy(&cstate->current_fh.fh_handle.fh_base, putfh->pf_fhval,
432                putfh->pf_fhlen);
433         return fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_BYPASS_GSS);
434 }
435
436 static __be32
437 nfsd4_putrootfh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
438                 void *arg)
439 {
440         __be32 status;
441
442         fh_put(&cstate->current_fh);
443         status = exp_pseudoroot(rqstp, &cstate->current_fh);
444         return status;
445 }
446
447 static __be32
448 nfsd4_restorefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
449                 void *arg)
450 {
451         if (!cstate->save_fh.fh_dentry)
452                 return nfserr_restorefh;
453
454         fh_dup2(&cstate->current_fh, &cstate->save_fh);
455         if (HAS_STATE_ID(cstate, SAVED_STATE_ID_FLAG)) {
456                 memcpy(&cstate->current_stateid, &cstate->save_stateid, sizeof(stateid_t));
457                 SET_STATE_ID(cstate, CURRENT_STATE_ID_FLAG);
458         }
459         return nfs_ok;
460 }
461
462 static __be32
463 nfsd4_savefh(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
464              void *arg)
465 {
466         if (!cstate->current_fh.fh_dentry)
467                 return nfserr_nofilehandle;
468
469         fh_dup2(&cstate->save_fh, &cstate->current_fh);
470         if (HAS_STATE_ID(cstate, CURRENT_STATE_ID_FLAG)) {
471                 memcpy(&cstate->save_stateid, &cstate->current_stateid, sizeof(stateid_t));
472                 SET_STATE_ID(cstate, SAVED_STATE_ID_FLAG);
473         }
474         return nfs_ok;
475 }
476
477 /*
478  * misc nfsv4 ops
479  */
480 static __be32
481 nfsd4_access(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
482              struct nfsd4_access *access)
483 {
484         if (access->ac_req_access & ~NFS3_ACCESS_FULL)
485                 return nfserr_inval;
486
487         access->ac_resp_access = access->ac_req_access;
488         return nfsd_access(rqstp, &cstate->current_fh, &access->ac_resp_access,
489                            &access->ac_supported);
490 }
491
492 static void gen_boot_verifier(nfs4_verifier *verifier)
493 {
494         __be32 verf[2];
495
496         verf[0] = (__be32)nfssvc_boot.tv_sec;
497         verf[1] = (__be32)nfssvc_boot.tv_usec;
498         memcpy(verifier->data, verf, sizeof(verifier->data));
499 }
500
501 static __be32
502 nfsd4_commit(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
503              struct nfsd4_commit *commit)
504 {
505         gen_boot_verifier(&commit->co_verf);
506         return nfsd_commit(rqstp, &cstate->current_fh, commit->co_offset,
507                              commit->co_count);
508 }
509
510 static __be32
511 nfsd4_create(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
512              struct nfsd4_create *create)
513 {
514         struct svc_fh resfh;
515         __be32 status;
516         dev_t rdev;
517
518         fh_init(&resfh, NFS4_FHSIZE);
519
520         status = fh_verify(rqstp, &cstate->current_fh, S_IFDIR,
521                            NFSD_MAY_CREATE);
522         if (status)
523                 return status;
524
525         status = check_attr_support(rqstp, cstate, create->cr_bmval,
526                                     nfsd_attrmask);
527         if (status)
528                 return status;
529
530         switch (create->cr_type) {
531         case NF4LNK:
532                 /* ugh! we have to null-terminate the linktext, or
533                  * vfs_symlink() will choke.  it is always safe to
534                  * null-terminate by brute force, since at worst we
535                  * will overwrite the first byte of the create namelen
536                  * in the XDR buffer, which has already been extracted
537                  * during XDR decode.
538                  */
539                 create->cr_linkname[create->cr_linklen] = 0;
540
541                 status = nfsd_symlink(rqstp, &cstate->current_fh,
542                                       create->cr_name, create->cr_namelen,
543                                       create->cr_linkname, create->cr_linklen,
544                                       &resfh, &create->cr_iattr);
545                 break;
546
547         case NF4BLK:
548                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
549                 if (MAJOR(rdev) != create->cr_specdata1 ||
550                     MINOR(rdev) != create->cr_specdata2)
551                         return nfserr_inval;
552                 status = nfsd_create(rqstp, &cstate->current_fh,
553                                      create->cr_name, create->cr_namelen,
554                                      &create->cr_iattr, S_IFBLK, rdev, &resfh);
555                 break;
556
557         case NF4CHR:
558                 rdev = MKDEV(create->cr_specdata1, create->cr_specdata2);
559                 if (MAJOR(rdev) != create->cr_specdata1 ||
560                     MINOR(rdev) != create->cr_specdata2)
561                         return nfserr_inval;
562                 status = nfsd_create(rqstp, &cstate->current_fh,
563                                      create->cr_name, create->cr_namelen,
564                                      &create->cr_iattr,S_IFCHR, rdev, &resfh);
565                 break;
566
567         case NF4SOCK:
568                 status = nfsd_create(rqstp, &cstate->current_fh,
569                                      create->cr_name, create->cr_namelen,
570                                      &create->cr_iattr, S_IFSOCK, 0, &resfh);
571                 break;
572
573         case NF4FIFO:
574                 status = nfsd_create(rqstp, &cstate->current_fh,
575                                      create->cr_name, create->cr_namelen,
576                                      &create->cr_iattr, S_IFIFO, 0, &resfh);
577                 break;
578
579         case NF4DIR:
580                 create->cr_iattr.ia_valid &= ~ATTR_SIZE;
581                 status = nfsd_create(rqstp, &cstate->current_fh,
582                                      create->cr_name, create->cr_namelen,
583                                      &create->cr_iattr, S_IFDIR, 0, &resfh);
584                 break;
585
586         default:
587                 status = nfserr_badtype;
588         }
589
590         if (status)
591                 goto out;
592
593         if (create->cr_acl != NULL)
594                 do_set_nfs4_acl(rqstp, &resfh, create->cr_acl,
595                                 create->cr_bmval);
596
597         fh_unlock(&cstate->current_fh);
598         set_change_info(&create->cr_cinfo, &cstate->current_fh);
599         fh_dup2(&cstate->current_fh, &resfh);
600 out:
601         fh_put(&resfh);
602         return status;
603 }
604
605 static __be32
606 nfsd4_getattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
607               struct nfsd4_getattr *getattr)
608 {
609         __be32 status;
610
611         status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
612         if (status)
613                 return status;
614
615         if (getattr->ga_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
616                 return nfserr_inval;
617
618         getattr->ga_bmval[0] &= nfsd_suppattrs0(cstate->minorversion);
619         getattr->ga_bmval[1] &= nfsd_suppattrs1(cstate->minorversion);
620         getattr->ga_bmval[2] &= nfsd_suppattrs2(cstate->minorversion);
621
622         getattr->ga_fhp = &cstate->current_fh;
623         return nfs_ok;
624 }
625
626 static __be32
627 nfsd4_link(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
628            struct nfsd4_link *link)
629 {
630         __be32 status = nfserr_nofilehandle;
631
632         if (!cstate->save_fh.fh_dentry)
633                 return status;
634         status = nfsd_link(rqstp, &cstate->current_fh,
635                            link->li_name, link->li_namelen, &cstate->save_fh);
636         if (!status)
637                 set_change_info(&link->li_cinfo, &cstate->current_fh);
638         return status;
639 }
640
641 static __be32 nfsd4_do_lookupp(struct svc_rqst *rqstp, struct svc_fh *fh)
642 {
643         struct svc_fh tmp_fh;
644         __be32 ret;
645
646         fh_init(&tmp_fh, NFS4_FHSIZE);
647         ret = exp_pseudoroot(rqstp, &tmp_fh);
648         if (ret)
649                 return ret;
650         if (tmp_fh.fh_dentry == fh->fh_dentry) {
651                 fh_put(&tmp_fh);
652                 return nfserr_noent;
653         }
654         fh_put(&tmp_fh);
655         return nfsd_lookup(rqstp, fh, "..", 2, fh);
656 }
657
658 static __be32
659 nfsd4_lookupp(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
660               void *arg)
661 {
662         return nfsd4_do_lookupp(rqstp, &cstate->current_fh);
663 }
664
665 static __be32
666 nfsd4_lookup(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
667              struct nfsd4_lookup *lookup)
668 {
669         return nfsd_lookup(rqstp, &cstate->current_fh,
670                            lookup->lo_name, lookup->lo_len,
671                            &cstate->current_fh);
672 }
673
674 static __be32
675 nfsd4_read(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
676            struct nfsd4_read *read)
677 {
678         __be32 status;
679
680         /* no need to check permission - this will be done in nfsd_read() */
681
682         read->rd_filp = NULL;
683         if (read->rd_offset >= OFFSET_MAX)
684                 return nfserr_inval;
685
686         nfs4_lock_state();
687         /* check stateid */
688         if ((status = nfs4_preprocess_stateid_op(cstate, &read->rd_stateid,
689                                                  RD_STATE, &read->rd_filp))) {
690                 dprintk("NFSD: nfsd4_read: couldn't process stateid!\n");
691                 goto out;
692         }
693         if (read->rd_filp)
694                 get_file(read->rd_filp);
695         status = nfs_ok;
696 out:
697         nfs4_unlock_state();
698         read->rd_rqstp = rqstp;
699         read->rd_fhp = &cstate->current_fh;
700         return status;
701 }
702
703 static __be32
704 nfsd4_readdir(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
705               struct nfsd4_readdir *readdir)
706 {
707         u64 cookie = readdir->rd_cookie;
708         static const nfs4_verifier zeroverf;
709
710         /* no need to check permission - this will be done in nfsd_readdir() */
711
712         if (readdir->rd_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1)
713                 return nfserr_inval;
714
715         readdir->rd_bmval[0] &= nfsd_suppattrs0(cstate->minorversion);
716         readdir->rd_bmval[1] &= nfsd_suppattrs1(cstate->minorversion);
717         readdir->rd_bmval[2] &= nfsd_suppattrs2(cstate->minorversion);
718
719         if ((cookie == 1) || (cookie == 2) ||
720             (cookie == 0 && memcmp(readdir->rd_verf.data, zeroverf.data, NFS4_VERIFIER_SIZE)))
721                 return nfserr_bad_cookie;
722
723         readdir->rd_rqstp = rqstp;
724         readdir->rd_fhp = &cstate->current_fh;
725         return nfs_ok;
726 }
727
728 static __be32
729 nfsd4_readlink(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
730                struct nfsd4_readlink *readlink)
731 {
732         readlink->rl_rqstp = rqstp;
733         readlink->rl_fhp = &cstate->current_fh;
734         return nfs_ok;
735 }
736
737 static __be32
738 nfsd4_remove(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
739              struct nfsd4_remove *remove)
740 {
741         __be32 status;
742
743         if (locks_in_grace())
744                 return nfserr_grace;
745         status = nfsd_unlink(rqstp, &cstate->current_fh, 0,
746                              remove->rm_name, remove->rm_namelen);
747         if (!status) {
748                 fh_unlock(&cstate->current_fh);
749                 set_change_info(&remove->rm_cinfo, &cstate->current_fh);
750         }
751         return status;
752 }
753
754 static __be32
755 nfsd4_rename(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
756              struct nfsd4_rename *rename)
757 {
758         __be32 status = nfserr_nofilehandle;
759
760         if (!cstate->save_fh.fh_dentry)
761                 return status;
762         if (locks_in_grace() && !(cstate->save_fh.fh_export->ex_flags
763                                         & NFSEXP_NOSUBTREECHECK))
764                 return nfserr_grace;
765         status = nfsd_rename(rqstp, &cstate->save_fh, rename->rn_sname,
766                              rename->rn_snamelen, &cstate->current_fh,
767                              rename->rn_tname, rename->rn_tnamelen);
768
769         /* the underlying filesystem returns different error's than required
770          * by NFSv4. both save_fh and current_fh have been verified.. */
771         if (status == nfserr_isdir)
772                 status = nfserr_exist;
773         else if ((status == nfserr_notdir) &&
774                   (S_ISDIR(cstate->save_fh.fh_dentry->d_inode->i_mode) &&
775                    S_ISDIR(cstate->current_fh.fh_dentry->d_inode->i_mode)))
776                 status = nfserr_exist;
777
778         if (!status) {
779                 set_change_info(&rename->rn_sinfo, &cstate->current_fh);
780                 set_change_info(&rename->rn_tinfo, &cstate->save_fh);
781         }
782         return status;
783 }
784
785 static __be32
786 nfsd4_secinfo(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
787               struct nfsd4_secinfo *secinfo)
788 {
789         struct svc_fh resfh;
790         struct svc_export *exp;
791         struct dentry *dentry;
792         __be32 err;
793
794         fh_init(&resfh, NFS4_FHSIZE);
795         err = fh_verify(rqstp, &cstate->current_fh, S_IFDIR, NFSD_MAY_EXEC);
796         if (err)
797                 return err;
798         err = nfsd_lookup_dentry(rqstp, &cstate->current_fh,
799                                     secinfo->si_name, secinfo->si_namelen,
800                                     &exp, &dentry);
801         if (err)
802                 return err;
803         if (dentry->d_inode == NULL) {
804                 exp_put(exp);
805                 err = nfserr_noent;
806         } else
807                 secinfo->si_exp = exp;
808         dput(dentry);
809         if (cstate->minorversion)
810                 /* See rfc 5661 section 2.6.3.1.1.8 */
811                 fh_put(&cstate->current_fh);
812         return err;
813 }
814
815 static __be32
816 nfsd4_secinfo_no_name(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
817               struct nfsd4_secinfo_no_name *sin)
818 {
819         __be32 err;
820
821         switch (sin->sin_style) {
822         case NFS4_SECINFO_STYLE4_CURRENT_FH:
823                 break;
824         case NFS4_SECINFO_STYLE4_PARENT:
825                 err = nfsd4_do_lookupp(rqstp, &cstate->current_fh);
826                 if (err)
827                         return err;
828                 break;
829         default:
830                 return nfserr_inval;
831         }
832         exp_get(cstate->current_fh.fh_export);
833         sin->sin_exp = cstate->current_fh.fh_export;
834         fh_put(&cstate->current_fh);
835         return nfs_ok;
836 }
837
838 static __be32
839 nfsd4_setattr(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
840               struct nfsd4_setattr *setattr)
841 {
842         __be32 status = nfs_ok;
843
844         if (setattr->sa_iattr.ia_valid & ATTR_SIZE) {
845                 nfs4_lock_state();
846                 status = nfs4_preprocess_stateid_op(cstate,
847                         &setattr->sa_stateid, WR_STATE, NULL);
848                 nfs4_unlock_state();
849                 if (status) {
850                         dprintk("NFSD: nfsd4_setattr: couldn't process stateid!\n");
851                         return status;
852                 }
853         }
854         status = fh_want_write(&cstate->current_fh);
855         if (status)
856                 return status;
857         status = nfs_ok;
858
859         status = check_attr_support(rqstp, cstate, setattr->sa_bmval,
860                                     nfsd_attrmask);
861         if (status)
862                 goto out;
863
864         if (setattr->sa_acl != NULL)
865                 status = nfsd4_set_nfs4_acl(rqstp, &cstate->current_fh,
866                                             setattr->sa_acl);
867         if (status)
868                 goto out;
869         status = nfsd_setattr(rqstp, &cstate->current_fh, &setattr->sa_iattr,
870                                 0, (time_t)0);
871 out:
872         fh_drop_write(&cstate->current_fh);
873         return status;
874 }
875
876 static __be32
877 nfsd4_write(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
878             struct nfsd4_write *write)
879 {
880         stateid_t *stateid = &write->wr_stateid;
881         struct file *filp = NULL;
882         __be32 status = nfs_ok;
883         unsigned long cnt;
884
885         /* no need to check permission - this will be done in nfsd_write() */
886
887         if (write->wr_offset >= OFFSET_MAX)
888                 return nfserr_inval;
889
890         nfs4_lock_state();
891         status = nfs4_preprocess_stateid_op(cstate, stateid, WR_STATE, &filp);
892         if (filp)
893                 get_file(filp);
894         nfs4_unlock_state();
895
896         if (status) {
897                 dprintk("NFSD: nfsd4_write: couldn't process stateid!\n");
898                 return status;
899         }
900
901         cnt = write->wr_buflen;
902         write->wr_how_written = write->wr_stable_how;
903         gen_boot_verifier(&write->wr_verifier);
904
905         status =  nfsd_write(rqstp, &cstate->current_fh, filp,
906                              write->wr_offset, rqstp->rq_vec, write->wr_vlen,
907                              &cnt, &write->wr_how_written);
908         if (filp)
909                 fput(filp);
910
911         write->wr_bytes_written = cnt;
912
913         return status;
914 }
915
916 /* This routine never returns NFS_OK!  If there are no other errors, it
917  * will return NFSERR_SAME or NFSERR_NOT_SAME depending on whether the
918  * attributes matched.  VERIFY is implemented by mapping NFSERR_SAME
919  * to NFS_OK after the call; NVERIFY by mapping NFSERR_NOT_SAME to NFS_OK.
920  */
921 static __be32
922 _nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
923              struct nfsd4_verify *verify)
924 {
925         __be32 *buf, *p;
926         int count;
927         __be32 status;
928
929         status = fh_verify(rqstp, &cstate->current_fh, 0, NFSD_MAY_NOP);
930         if (status)
931                 return status;
932
933         status = check_attr_support(rqstp, cstate, verify->ve_bmval, NULL);
934         if (status)
935                 return status;
936
937         if ((verify->ve_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)
938             || (verify->ve_bmval[1] & NFSD_WRITEONLY_ATTRS_WORD1))
939                 return nfserr_inval;
940         if (verify->ve_attrlen & 3)
941                 return nfserr_inval;
942
943         /* count in words:
944          *   bitmap_len(1) + bitmap(2) + attr_len(1) = 4
945          */
946         count = 4 + (verify->ve_attrlen >> 2);
947         buf = kmalloc(count << 2, GFP_KERNEL);
948         if (!buf)
949                 return nfserr_jukebox;
950
951         status = nfsd4_encode_fattr(&cstate->current_fh,
952                                     cstate->current_fh.fh_export,
953                                     cstate->current_fh.fh_dentry, buf,
954                                     &count, verify->ve_bmval,
955                                     rqstp, 0);
956
957         /* this means that nfsd4_encode_fattr() ran out of space */
958         if (status == nfserr_resource && count == 0)
959                 status = nfserr_not_same;
960         if (status)
961                 goto out_kfree;
962
963         /* skip bitmap */
964         p = buf + 1 + ntohl(buf[0]);
965         status = nfserr_not_same;
966         if (ntohl(*p++) != verify->ve_attrlen)
967                 goto out_kfree;
968         if (!memcmp(p, verify->ve_attrval, verify->ve_attrlen))
969                 status = nfserr_same;
970
971 out_kfree:
972         kfree(buf);
973         return status;
974 }
975
976 static __be32
977 nfsd4_nverify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
978               struct nfsd4_verify *verify)
979 {
980         __be32 status;
981
982         status = _nfsd4_verify(rqstp, cstate, verify);
983         return status == nfserr_not_same ? nfs_ok : status;
984 }
985
986 static __be32
987 nfsd4_verify(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
988              struct nfsd4_verify *verify)
989 {
990         __be32 status;
991
992         status = _nfsd4_verify(rqstp, cstate, verify);
993         return status == nfserr_same ? nfs_ok : status;
994 }
995
996 /*
997  * NULL call.
998  */
999 static __be32
1000 nfsd4_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
1001 {
1002         return nfs_ok;
1003 }
1004
1005 static inline void nfsd4_increment_op_stats(u32 opnum)
1006 {
1007         if (opnum >= FIRST_NFS4_OP && opnum <= LAST_NFS4_OP)
1008                 nfsdstats.nfs4_opcount[opnum]++;
1009 }
1010
1011 typedef __be32(*nfsd4op_func)(struct svc_rqst *, struct nfsd4_compound_state *,
1012                               void *);
1013 typedef u32(*nfsd4op_rsize)(struct svc_rqst *, struct nfsd4_op *op);
1014 typedef void(*stateid_setter)(struct nfsd4_compound_state *, void *);
1015 typedef void(*stateid_getter)(struct nfsd4_compound_state *, void *);
1016
1017 enum nfsd4_op_flags {
1018         ALLOWED_WITHOUT_FH = 1 << 0,    /* No current filehandle required */
1019         ALLOWED_ON_ABSENT_FS = 1 << 1,  /* ops processed on absent fs */
1020         ALLOWED_AS_FIRST_OP = 1 << 2,   /* ops reqired first in compound */
1021         /* For rfc 5661 section 2.6.3.1.1: */
1022         OP_HANDLES_WRONGSEC = 1 << 3,
1023         OP_IS_PUTFH_LIKE = 1 << 4,
1024         /*
1025          * These are the ops whose result size we estimate before
1026          * encoding, to avoid performing an op then not being able to
1027          * respond or cache a response.  This includes writes and setattrs
1028          * as well as the operations usually called "nonidempotent":
1029          */
1030         OP_MODIFIES_SOMETHING = 1 << 5,
1031         /*
1032          * Cache compounds containing these ops in the xid-based drc:
1033          * We use the DRC for compounds containing non-idempotent
1034          * operations, *except* those that are 4.1-specific (since
1035          * sessions provide their own EOS), and except for stateful
1036          * operations other than setclientid and setclientid_confirm
1037          * (since sequence numbers provide EOS for open, lock, etc in
1038          * the v4.0 case).
1039          */
1040         OP_CACHEME = 1 << 6,
1041         /*
1042          * These are ops which clear current state id.
1043          */
1044         OP_CLEAR_STATEID = 1 << 7,
1045 };
1046
1047 struct nfsd4_operation {
1048         nfsd4op_func op_func;
1049         u32 op_flags;
1050         char *op_name;
1051         /* Try to get response size before operation */
1052         nfsd4op_rsize op_rsize_bop;
1053         stateid_setter op_get_currentstateid;
1054         stateid_getter op_set_currentstateid;
1055 };
1056
1057 static struct nfsd4_operation nfsd4_ops[];
1058
1059 #ifdef NFSD_DEBUG
1060 static const char *nfsd4_op_name(unsigned opnum);
1061 #endif
1062
1063 /*
1064  * Enforce NFSv4.1 COMPOUND ordering rules:
1065  *
1066  * Also note, enforced elsewhere:
1067  *      - SEQUENCE other than as first op results in
1068  *        NFS4ERR_SEQUENCE_POS. (Enforced in nfsd4_sequence().)
1069  *      - BIND_CONN_TO_SESSION must be the only op in its compound.
1070  *        (Enforced in nfsd4_bind_conn_to_session().)
1071  *      - DESTROY_SESSION must be the final operation in a compound, if
1072  *        sessionid's in SEQUENCE and DESTROY_SESSION are the same.
1073  *        (Enforced in nfsd4_destroy_session().)
1074  */
1075 static __be32 nfs41_check_op_ordering(struct nfsd4_compoundargs *args)
1076 {
1077         struct nfsd4_op *op = &args->ops[0];
1078
1079         /* These ordering requirements don't apply to NFSv4.0: */
1080         if (args->minorversion == 0)
1081                 return nfs_ok;
1082         /* This is weird, but OK, not our problem: */
1083         if (args->opcnt == 0)
1084                 return nfs_ok;
1085         if (op->status == nfserr_op_illegal)
1086                 return nfs_ok;
1087         if (!(nfsd4_ops[op->opnum].op_flags & ALLOWED_AS_FIRST_OP))
1088                 return nfserr_op_not_in_session;
1089         if (op->opnum == OP_SEQUENCE)
1090                 return nfs_ok;
1091         if (args->opcnt != 1)
1092                 return nfserr_not_only_op;
1093         return nfs_ok;
1094 }
1095
1096 static inline struct nfsd4_operation *OPDESC(struct nfsd4_op *op)
1097 {
1098         return &nfsd4_ops[op->opnum];
1099 }
1100
1101 bool nfsd4_cache_this_op(struct nfsd4_op *op)
1102 {
1103         return OPDESC(op)->op_flags & OP_CACHEME;
1104 }
1105
1106 static bool need_wrongsec_check(struct svc_rqst *rqstp)
1107 {
1108         struct nfsd4_compoundres *resp = rqstp->rq_resp;
1109         struct nfsd4_compoundargs *argp = rqstp->rq_argp;
1110         struct nfsd4_op *this = &argp->ops[resp->opcnt - 1];
1111         struct nfsd4_op *next = &argp->ops[resp->opcnt];
1112         struct nfsd4_operation *thisd;
1113         struct nfsd4_operation *nextd;
1114
1115         thisd = OPDESC(this);
1116         /*
1117          * Most ops check wronsec on our own; only the putfh-like ops
1118          * have special rules.
1119          */
1120         if (!(thisd->op_flags & OP_IS_PUTFH_LIKE))
1121                 return false;
1122         /*
1123          * rfc 5661 2.6.3.1.1.6: don't bother erroring out a
1124          * put-filehandle operation if we're not going to use the
1125          * result:
1126          */
1127         if (argp->opcnt == resp->opcnt)
1128                 return false;
1129
1130         nextd = OPDESC(next);
1131         /*
1132          * Rest of 2.6.3.1.1: certain operations will return WRONGSEC
1133          * errors themselves as necessary; others should check for them
1134          * now:
1135          */
1136         return !(nextd->op_flags & OP_HANDLES_WRONGSEC);
1137 }
1138
1139 /*
1140  * COMPOUND call.
1141  */
1142 static __be32
1143 nfsd4_proc_compound(struct svc_rqst *rqstp,
1144                     struct nfsd4_compoundargs *args,
1145                     struct nfsd4_compoundres *resp)
1146 {
1147         struct nfsd4_op *op;
1148         struct nfsd4_operation *opdesc;
1149         struct nfsd4_compound_state *cstate = &resp->cstate;
1150         int             slack_bytes;
1151         u32             plen = 0;
1152         __be32          status;
1153
1154         resp->xbuf = &rqstp->rq_res;
1155         resp->p = rqstp->rq_res.head[0].iov_base +
1156                                                 rqstp->rq_res.head[0].iov_len;
1157         resp->tagp = resp->p;
1158         /* reserve space for: taglen, tag, and opcnt */
1159         resp->p += 2 + XDR_QUADLEN(args->taglen);
1160         resp->end = rqstp->rq_res.head[0].iov_base + PAGE_SIZE;
1161         resp->taglen = args->taglen;
1162         resp->tag = args->tag;
1163         resp->opcnt = 0;
1164         resp->rqstp = rqstp;
1165         resp->cstate.minorversion = args->minorversion;
1166         resp->cstate.replay_owner = NULL;
1167         resp->cstate.session = NULL;
1168         fh_init(&resp->cstate.current_fh, NFS4_FHSIZE);
1169         fh_init(&resp->cstate.save_fh, NFS4_FHSIZE);
1170         /*
1171          * Don't use the deferral mechanism for NFSv4; compounds make it
1172          * too hard to avoid non-idempotency problems.
1173          */
1174         rqstp->rq_usedeferral = 0;
1175
1176         /*
1177          * According to RFC3010, this takes precedence over all other errors.
1178          */
1179         status = nfserr_minor_vers_mismatch;
1180         if (args->minorversion > nfsd_supported_minorversion)
1181                 goto out;
1182
1183         status = nfs41_check_op_ordering(args);
1184         if (status) {
1185                 op = &args->ops[0];
1186                 op->status = status;
1187                 goto encode_op;
1188         }
1189
1190         while (!status && resp->opcnt < args->opcnt) {
1191                 op = &args->ops[resp->opcnt++];
1192
1193                 dprintk("nfsv4 compound op #%d/%d: %d (%s)\n",
1194                         resp->opcnt, args->opcnt, op->opnum,
1195                         nfsd4_op_name(op->opnum));
1196                 /*
1197                  * The XDR decode routines may have pre-set op->status;
1198                  * for example, if there is a miscellaneous XDR error
1199                  * it will be set to nfserr_bad_xdr.
1200                  */
1201                 if (op->status)
1202                         goto encode_op;
1203
1204                 /* We must be able to encode a successful response to
1205                  * this operation, with enough room left over to encode a
1206                  * failed response to the next operation.  If we don't
1207                  * have enough room, fail with ERR_RESOURCE.
1208                  */
1209                 slack_bytes = (char *)resp->end - (char *)resp->p;
1210                 if (slack_bytes < COMPOUND_SLACK_SPACE
1211                                 + COMPOUND_ERR_SLACK_SPACE) {
1212                         BUG_ON(slack_bytes < COMPOUND_ERR_SLACK_SPACE);
1213                         op->status = nfserr_resource;
1214                         goto encode_op;
1215                 }
1216
1217                 opdesc = OPDESC(op);
1218
1219                 if (!cstate->current_fh.fh_dentry) {
1220                         if (!(opdesc->op_flags & ALLOWED_WITHOUT_FH)) {
1221                                 op->status = nfserr_nofilehandle;
1222                                 goto encode_op;
1223                         }
1224                 } else if (cstate->current_fh.fh_export->ex_fslocs.migrated &&
1225                           !(opdesc->op_flags & ALLOWED_ON_ABSENT_FS)) {
1226                         op->status = nfserr_moved;
1227                         goto encode_op;
1228                 }
1229
1230                 /* If op is non-idempotent */
1231                 if (opdesc->op_flags & OP_MODIFIES_SOMETHING) {
1232                         plen = opdesc->op_rsize_bop(rqstp, op);
1233                         op->status = nfsd4_check_resp_size(resp, plen);
1234                 }
1235
1236                 if (op->status)
1237                         goto encode_op;
1238
1239                 if (opdesc->op_func) {
1240                         if (opdesc->op_get_currentstateid)
1241                                 opdesc->op_get_currentstateid(cstate, &op->u);
1242                         op->status = opdesc->op_func(rqstp, cstate, &op->u);
1243                 } else
1244                         BUG_ON(op->status == nfs_ok);
1245
1246                 if (!op->status) {
1247                         if (opdesc->op_set_currentstateid)
1248                                 opdesc->op_set_currentstateid(cstate, &op->u);
1249
1250                         if (opdesc->op_flags & OP_CLEAR_STATEID)
1251                                 clear_current_stateid(cstate);
1252
1253                         if (need_wrongsec_check(rqstp))
1254                                 op->status = check_nfsd_access(cstate->current_fh.fh_export, rqstp);
1255                 }
1256
1257 encode_op:
1258                 /* Only from SEQUENCE */
1259                 if (resp->cstate.status == nfserr_replay_cache) {
1260                         dprintk("%s NFS4.1 replay from cache\n", __func__);
1261                         status = op->status;
1262                         goto out;
1263                 }
1264                 if (op->status == nfserr_replay_me) {
1265                         op->replay = &cstate->replay_owner->so_replay;
1266                         nfsd4_encode_replay(resp, op);
1267                         status = op->status = op->replay->rp_status;
1268                 } else {
1269                         nfsd4_encode_operation(resp, op);
1270                         status = op->status;
1271                 }
1272
1273                 dprintk("nfsv4 compound op %p opcnt %d #%d: %d: status %d\n",
1274                         args->ops, args->opcnt, resp->opcnt, op->opnum,
1275                         be32_to_cpu(status));
1276
1277                 if (cstate->replay_owner) {
1278                         nfs4_unlock_state();
1279                         cstate->replay_owner = NULL;
1280                 }
1281                 /* XXX Ugh, we need to get rid of this kind of special case: */
1282                 if (op->opnum == OP_READ && op->u.read.rd_filp)
1283                         fput(op->u.read.rd_filp);
1284
1285                 nfsd4_increment_op_stats(op->opnum);
1286         }
1287
1288         resp->cstate.status = status;
1289         fh_put(&resp->cstate.current_fh);
1290         fh_put(&resp->cstate.save_fh);
1291         BUG_ON(resp->cstate.replay_owner);
1292 out:
1293         /* Reset deferral mechanism for RPC deferrals */
1294         rqstp->rq_usedeferral = 1;
1295         dprintk("nfsv4 compound returned %d\n", ntohl(status));
1296         return status;
1297 }
1298
1299 #define op_encode_hdr_size              (2)
1300 #define op_encode_stateid_maxsz         (XDR_QUADLEN(NFS4_STATEID_SIZE))
1301 #define op_encode_verifier_maxsz        (XDR_QUADLEN(NFS4_VERIFIER_SIZE))
1302 #define op_encode_change_info_maxsz     (5)
1303 #define nfs4_fattr_bitmap_maxsz         (4)
1304
1305 #define op_encode_lockowner_maxsz       (1 + XDR_QUADLEN(IDMAP_NAMESZ))
1306 #define op_encode_lock_denied_maxsz     (8 + op_encode_lockowner_maxsz)
1307
1308 #define nfs4_owner_maxsz                (1 + XDR_QUADLEN(IDMAP_NAMESZ))
1309
1310 #define op_encode_ace_maxsz             (3 + nfs4_owner_maxsz)
1311 #define op_encode_delegation_maxsz      (1 + op_encode_stateid_maxsz + 1 + \
1312                                          op_encode_ace_maxsz)
1313
1314 #define op_encode_channel_attrs_maxsz   (6 + 1 + 1)
1315
1316 static inline u32 nfsd4_only_status_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1317 {
1318         return (op_encode_hdr_size) * sizeof(__be32);
1319 }
1320
1321 static inline u32 nfsd4_status_stateid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1322 {
1323         return (op_encode_hdr_size + op_encode_stateid_maxsz)* sizeof(__be32);
1324 }
1325
1326 static inline u32 nfsd4_commit_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1327 {
1328         return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32);
1329 }
1330
1331 static inline u32 nfsd4_create_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1332 {
1333         return (op_encode_hdr_size + op_encode_change_info_maxsz
1334                 + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
1335 }
1336
1337 static inline u32 nfsd4_link_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1338 {
1339         return (op_encode_hdr_size + op_encode_change_info_maxsz)
1340                 * sizeof(__be32);
1341 }
1342
1343 static inline u32 nfsd4_lock_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1344 {
1345         return (op_encode_hdr_size + op_encode_lock_denied_maxsz)
1346                 * sizeof(__be32);
1347 }
1348
1349 static inline u32 nfsd4_open_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1350 {
1351         return (op_encode_hdr_size + op_encode_stateid_maxsz
1352                 + op_encode_change_info_maxsz + 1
1353                 + nfs4_fattr_bitmap_maxsz
1354                 + op_encode_delegation_maxsz) * sizeof(__be32);
1355 }
1356
1357 static inline u32 nfsd4_read_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1358 {
1359         u32 maxcount = 0, rlen = 0;
1360
1361         maxcount = svc_max_payload(rqstp);
1362         rlen = op->u.read.rd_length;
1363
1364         if (rlen > maxcount)
1365                 rlen = maxcount;
1366
1367         return (op_encode_hdr_size + 2) * sizeof(__be32) + rlen;
1368 }
1369
1370 static inline u32 nfsd4_readdir_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1371 {
1372         u32 rlen = op->u.readdir.rd_maxcount;
1373
1374         if (rlen > PAGE_SIZE)
1375                 rlen = PAGE_SIZE;
1376
1377         return (op_encode_hdr_size + op_encode_verifier_maxsz)
1378                  * sizeof(__be32) + rlen;
1379 }
1380
1381 static inline u32 nfsd4_remove_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1382 {
1383         return (op_encode_hdr_size + op_encode_change_info_maxsz)
1384                 * sizeof(__be32);
1385 }
1386
1387 static inline u32 nfsd4_rename_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1388 {
1389         return (op_encode_hdr_size + op_encode_change_info_maxsz
1390                 + op_encode_change_info_maxsz) * sizeof(__be32);
1391 }
1392
1393 static inline u32 nfsd4_setattr_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1394 {
1395         return (op_encode_hdr_size + nfs4_fattr_bitmap_maxsz) * sizeof(__be32);
1396 }
1397
1398 static inline u32 nfsd4_setclientid_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1399 {
1400         return (op_encode_hdr_size + 2 + 1024) * sizeof(__be32);
1401 }
1402
1403 static inline u32 nfsd4_write_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1404 {
1405         return (op_encode_hdr_size + op_encode_verifier_maxsz) * sizeof(__be32);
1406 }
1407
1408 static inline u32 nfsd4_exchange_id_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1409 {
1410         return (op_encode_hdr_size + 2 + 1 + /* eir_clientid, eir_sequenceid */\
1411                 1 + 1 + 0 + /* eir_flags, spr_how, SP4_NONE (for now) */\
1412                 2 + /*eir_server_owner.so_minor_id */\
1413                 /* eir_server_owner.so_major_id<> */\
1414                 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
1415                 /* eir_server_scope<> */\
1416                 XDR_QUADLEN(NFS4_OPAQUE_LIMIT) + 1 +\
1417                 1 + /* eir_server_impl_id array length */\
1418                 0 /* ignored eir_server_impl_id contents */) * sizeof(__be32);
1419 }
1420
1421 static inline u32 nfsd4_bind_conn_to_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1422 {
1423         return (op_encode_hdr_size + \
1424                 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* bctsr_sessid */\
1425                 2 /* bctsr_dir, use_conn_in_rdma_mode */) * sizeof(__be32);
1426 }
1427
1428 static inline u32 nfsd4_create_session_rsize(struct svc_rqst *rqstp, struct nfsd4_op *op)
1429 {
1430         return (op_encode_hdr_size + \
1431                 XDR_QUADLEN(NFS4_MAX_SESSIONID_LEN) + /* sessionid */\
1432                 2 + /* csr_sequence, csr_flags */\
1433                 op_encode_channel_attrs_maxsz + \
1434                 op_encode_channel_attrs_maxsz) * sizeof(__be32);
1435 }
1436
1437 static struct nfsd4_operation nfsd4_ops[] = {
1438         [OP_ACCESS] = {
1439                 .op_func = (nfsd4op_func)nfsd4_access,
1440                 .op_name = "OP_ACCESS",
1441         },
1442         [OP_CLOSE] = {
1443                 .op_func = (nfsd4op_func)nfsd4_close,
1444                 .op_flags = OP_MODIFIES_SOMETHING,
1445                 .op_name = "OP_CLOSE",
1446                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
1447                 .op_get_currentstateid = (stateid_getter)nfsd4_get_closestateid,
1448                 .op_set_currentstateid = (stateid_setter)nfsd4_set_closestateid,
1449         },
1450         [OP_COMMIT] = {
1451                 .op_func = (nfsd4op_func)nfsd4_commit,
1452                 .op_flags = OP_MODIFIES_SOMETHING,
1453                 .op_name = "OP_COMMIT",
1454                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_commit_rsize,
1455         },
1456         [OP_CREATE] = {
1457                 .op_func = (nfsd4op_func)nfsd4_create,
1458                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME | OP_CLEAR_STATEID,
1459                 .op_name = "OP_CREATE",
1460                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_rsize,
1461         },
1462         [OP_DELEGRETURN] = {
1463                 .op_func = (nfsd4op_func)nfsd4_delegreturn,
1464                 .op_flags = OP_MODIFIES_SOMETHING,
1465                 .op_name = "OP_DELEGRETURN",
1466                 .op_rsize_bop = nfsd4_only_status_rsize,
1467                 .op_get_currentstateid = (stateid_getter)nfsd4_get_delegreturnstateid,
1468         },
1469         [OP_GETATTR] = {
1470                 .op_func = (nfsd4op_func)nfsd4_getattr,
1471                 .op_flags = ALLOWED_ON_ABSENT_FS,
1472                 .op_name = "OP_GETATTR",
1473         },
1474         [OP_GETFH] = {
1475                 .op_func = (nfsd4op_func)nfsd4_getfh,
1476                 .op_name = "OP_GETFH",
1477         },
1478         [OP_LINK] = {
1479                 .op_func = (nfsd4op_func)nfsd4_link,
1480                 .op_flags = ALLOWED_ON_ABSENT_FS | OP_MODIFIES_SOMETHING
1481                                 | OP_CACHEME,
1482                 .op_name = "OP_LINK",
1483                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_link_rsize,
1484         },
1485         [OP_LOCK] = {
1486                 .op_func = (nfsd4op_func)nfsd4_lock,
1487                 .op_flags = OP_MODIFIES_SOMETHING,
1488                 .op_name = "OP_LOCK",
1489                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_lock_rsize,
1490                 .op_set_currentstateid = (stateid_setter)nfsd4_set_lockstateid,
1491         },
1492         [OP_LOCKT] = {
1493                 .op_func = (nfsd4op_func)nfsd4_lockt,
1494                 .op_name = "OP_LOCKT",
1495         },
1496         [OP_LOCKU] = {
1497                 .op_func = (nfsd4op_func)nfsd4_locku,
1498                 .op_flags = OP_MODIFIES_SOMETHING,
1499                 .op_name = "OP_LOCKU",
1500                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
1501                 .op_get_currentstateid = (stateid_getter)nfsd4_get_lockustateid,
1502         },
1503         [OP_LOOKUP] = {
1504                 .op_func = (nfsd4op_func)nfsd4_lookup,
1505                 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
1506                 .op_name = "OP_LOOKUP",
1507         },
1508         [OP_LOOKUPP] = {
1509                 .op_func = (nfsd4op_func)nfsd4_lookupp,
1510                 .op_flags = OP_HANDLES_WRONGSEC | OP_CLEAR_STATEID,
1511                 .op_name = "OP_LOOKUPP",
1512         },
1513         [OP_NVERIFY] = {
1514                 .op_func = (nfsd4op_func)nfsd4_nverify,
1515                 .op_name = "OP_NVERIFY",
1516         },
1517         [OP_OPEN] = {
1518                 .op_func = (nfsd4op_func)nfsd4_open,
1519                 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
1520                 .op_name = "OP_OPEN",
1521                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_open_rsize,
1522                 .op_set_currentstateid = (stateid_setter)nfsd4_set_openstateid,
1523         },
1524         [OP_OPEN_CONFIRM] = {
1525                 .op_func = (nfsd4op_func)nfsd4_open_confirm,
1526                 .op_flags = OP_MODIFIES_SOMETHING,
1527                 .op_name = "OP_OPEN_CONFIRM",
1528                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
1529         },
1530         [OP_OPEN_DOWNGRADE] = {
1531                 .op_func = (nfsd4op_func)nfsd4_open_downgrade,
1532                 .op_flags = OP_MODIFIES_SOMETHING,
1533                 .op_name = "OP_OPEN_DOWNGRADE",
1534                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_status_stateid_rsize,
1535                 .op_get_currentstateid = (stateid_getter)nfsd4_get_opendowngradestateid,
1536                 .op_set_currentstateid = (stateid_setter)nfsd4_set_opendowngradestateid,
1537         },
1538         [OP_PUTFH] = {
1539                 .op_func = (nfsd4op_func)nfsd4_putfh,
1540                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1541                                 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1542                                 | OP_CLEAR_STATEID,
1543                 .op_name = "OP_PUTFH",
1544                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1545         },
1546         [OP_PUTPUBFH] = {
1547                 .op_func = (nfsd4op_func)nfsd4_putrootfh,
1548                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1549                                 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1550                                 | OP_CLEAR_STATEID,
1551                 .op_name = "OP_PUTPUBFH",
1552                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1553         },
1554         [OP_PUTROOTFH] = {
1555                 .op_func = (nfsd4op_func)nfsd4_putrootfh,
1556                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1557                                 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING
1558                                 | OP_CLEAR_STATEID,
1559                 .op_name = "OP_PUTROOTFH",
1560                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1561         },
1562         [OP_READ] = {
1563                 .op_func = (nfsd4op_func)nfsd4_read,
1564                 .op_flags = OP_MODIFIES_SOMETHING,
1565                 .op_name = "OP_READ",
1566                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_read_rsize,
1567                 .op_get_currentstateid = (stateid_getter)nfsd4_get_readstateid,
1568         },
1569         [OP_READDIR] = {
1570                 .op_func = (nfsd4op_func)nfsd4_readdir,
1571                 .op_flags = OP_MODIFIES_SOMETHING,
1572                 .op_name = "OP_READDIR",
1573                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_readdir_rsize,
1574         },
1575         [OP_READLINK] = {
1576                 .op_func = (nfsd4op_func)nfsd4_readlink,
1577                 .op_name = "OP_READLINK",
1578         },
1579         [OP_REMOVE] = {
1580                 .op_func = (nfsd4op_func)nfsd4_remove,
1581                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
1582                 .op_name = "OP_REMOVE",
1583                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_remove_rsize,
1584         },
1585         [OP_RENAME] = {
1586                 .op_func = (nfsd4op_func)nfsd4_rename,
1587                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
1588                 .op_name = "OP_RENAME",
1589                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_rename_rsize,
1590         },
1591         [OP_RENEW] = {
1592                 .op_func = (nfsd4op_func)nfsd4_renew,
1593                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1594                                 | OP_MODIFIES_SOMETHING,
1595                 .op_name = "OP_RENEW",
1596                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1597
1598         },
1599         [OP_RESTOREFH] = {
1600                 .op_func = (nfsd4op_func)nfsd4_restorefh,
1601                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1602                                 | OP_IS_PUTFH_LIKE | OP_MODIFIES_SOMETHING,
1603                 .op_name = "OP_RESTOREFH",
1604                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1605         },
1606         [OP_SAVEFH] = {
1607                 .op_func = (nfsd4op_func)nfsd4_savefh,
1608                 .op_flags = OP_HANDLES_WRONGSEC | OP_MODIFIES_SOMETHING,
1609                 .op_name = "OP_SAVEFH",
1610                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1611         },
1612         [OP_SECINFO] = {
1613                 .op_func = (nfsd4op_func)nfsd4_secinfo,
1614                 .op_flags = OP_HANDLES_WRONGSEC,
1615                 .op_name = "OP_SECINFO",
1616         },
1617         [OP_SETATTR] = {
1618                 .op_func = (nfsd4op_func)nfsd4_setattr,
1619                 .op_name = "OP_SETATTR",
1620                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
1621                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setattr_rsize,
1622                 .op_get_currentstateid = (stateid_getter)nfsd4_get_setattrstateid,
1623         },
1624         [OP_SETCLIENTID] = {
1625                 .op_func = (nfsd4op_func)nfsd4_setclientid,
1626                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1627                                 | OP_MODIFIES_SOMETHING | OP_CACHEME,
1628                 .op_name = "OP_SETCLIENTID",
1629                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_setclientid_rsize,
1630         },
1631         [OP_SETCLIENTID_CONFIRM] = {
1632                 .op_func = (nfsd4op_func)nfsd4_setclientid_confirm,
1633                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1634                                 | OP_MODIFIES_SOMETHING | OP_CACHEME,
1635                 .op_name = "OP_SETCLIENTID_CONFIRM",
1636                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1637         },
1638         [OP_VERIFY] = {
1639                 .op_func = (nfsd4op_func)nfsd4_verify,
1640                 .op_name = "OP_VERIFY",
1641         },
1642         [OP_WRITE] = {
1643                 .op_func = (nfsd4op_func)nfsd4_write,
1644                 .op_flags = OP_MODIFIES_SOMETHING | OP_CACHEME,
1645                 .op_name = "OP_WRITE",
1646                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_write_rsize,
1647                 .op_get_currentstateid = (stateid_getter)nfsd4_get_writestateid,
1648         },
1649         [OP_RELEASE_LOCKOWNER] = {
1650                 .op_func = (nfsd4op_func)nfsd4_release_lockowner,
1651                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_ON_ABSENT_FS
1652                                 | OP_MODIFIES_SOMETHING,
1653                 .op_name = "OP_RELEASE_LOCKOWNER",
1654                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1655         },
1656
1657         /* NFSv4.1 operations */
1658         [OP_EXCHANGE_ID] = {
1659                 .op_func = (nfsd4op_func)nfsd4_exchange_id,
1660                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1661                                 | OP_MODIFIES_SOMETHING,
1662                 .op_name = "OP_EXCHANGE_ID",
1663                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_exchange_id_rsize,
1664         },
1665         [OP_BIND_CONN_TO_SESSION] = {
1666                 .op_func = (nfsd4op_func)nfsd4_bind_conn_to_session,
1667                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1668                                 | OP_MODIFIES_SOMETHING,
1669                 .op_name = "OP_BIND_CONN_TO_SESSION",
1670                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_bind_conn_to_session_rsize,
1671         },
1672         [OP_CREATE_SESSION] = {
1673                 .op_func = (nfsd4op_func)nfsd4_create_session,
1674                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1675                                 | OP_MODIFIES_SOMETHING,
1676                 .op_name = "OP_CREATE_SESSION",
1677                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_create_session_rsize,
1678         },
1679         [OP_DESTROY_SESSION] = {
1680                 .op_func = (nfsd4op_func)nfsd4_destroy_session,
1681                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1682                                 | OP_MODIFIES_SOMETHING,
1683                 .op_name = "OP_DESTROY_SESSION",
1684                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1685         },
1686         [OP_SEQUENCE] = {
1687                 .op_func = (nfsd4op_func)nfsd4_sequence,
1688                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP,
1689                 .op_name = "OP_SEQUENCE",
1690         },
1691         [OP_DESTROY_CLIENTID] = {
1692                 .op_func = (nfsd4op_func)nfsd4_destroy_clientid,
1693                 .op_flags = ALLOWED_WITHOUT_FH | ALLOWED_AS_FIRST_OP
1694                                 | OP_MODIFIES_SOMETHING,
1695                 .op_name = "OP_DESTROY_CLIENTID",
1696                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1697         },
1698         [OP_RECLAIM_COMPLETE] = {
1699                 .op_func = (nfsd4op_func)nfsd4_reclaim_complete,
1700                 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
1701                 .op_name = "OP_RECLAIM_COMPLETE",
1702                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1703         },
1704         [OP_SECINFO_NO_NAME] = {
1705                 .op_func = (nfsd4op_func)nfsd4_secinfo_no_name,
1706                 .op_flags = OP_HANDLES_WRONGSEC,
1707                 .op_name = "OP_SECINFO_NO_NAME",
1708         },
1709         [OP_TEST_STATEID] = {
1710                 .op_func = (nfsd4op_func)nfsd4_test_stateid,
1711                 .op_flags = ALLOWED_WITHOUT_FH,
1712                 .op_name = "OP_TEST_STATEID",
1713         },
1714         [OP_FREE_STATEID] = {
1715                 .op_func = (nfsd4op_func)nfsd4_free_stateid,
1716                 .op_flags = ALLOWED_WITHOUT_FH | OP_MODIFIES_SOMETHING,
1717                 .op_name = "OP_FREE_STATEID",
1718                 .op_rsize_bop = (nfsd4op_rsize)nfsd4_only_status_rsize,
1719         },
1720 };
1721
1722 #ifdef NFSD_DEBUG
1723 static const char *nfsd4_op_name(unsigned opnum)
1724 {
1725         if (opnum < ARRAY_SIZE(nfsd4_ops))
1726                 return nfsd4_ops[opnum].op_name;
1727         return "unknown_operation";
1728 }
1729 #endif
1730
1731 #define nfsd4_voidres                   nfsd4_voidargs
1732 struct nfsd4_voidargs { int dummy; };
1733
1734 static struct svc_procedure             nfsd_procedures4[2] = {
1735         [NFSPROC4_NULL] = {
1736                 .pc_func = (svc_procfunc) nfsd4_proc_null,
1737                 .pc_encode = (kxdrproc_t) nfs4svc_encode_voidres,
1738                 .pc_argsize = sizeof(struct nfsd4_voidargs),
1739                 .pc_ressize = sizeof(struct nfsd4_voidres),
1740                 .pc_cachetype = RC_NOCACHE,
1741                 .pc_xdrressize = 1,
1742         },
1743         [NFSPROC4_COMPOUND] = {
1744                 .pc_func = (svc_procfunc) nfsd4_proc_compound,
1745                 .pc_decode = (kxdrproc_t) nfs4svc_decode_compoundargs,
1746                 .pc_encode = (kxdrproc_t) nfs4svc_encode_compoundres,
1747                 .pc_argsize = sizeof(struct nfsd4_compoundargs),
1748                 .pc_ressize = sizeof(struct nfsd4_compoundres),
1749                 .pc_release = nfsd4_release_compoundargs,
1750                 .pc_cachetype = RC_NOCACHE,
1751                 .pc_xdrressize = NFSD_BUFSIZE/4,
1752         },
1753 };
1754
1755 struct svc_version      nfsd_version4 = {
1756                 .vs_vers        = 4,
1757                 .vs_nproc       = 2,
1758                 .vs_proc        = nfsd_procedures4,
1759                 .vs_dispatch    = nfsd_dispatch,
1760                 .vs_xdrsize     = NFS4_SVC_XDRSIZE,
1761 };
1762
1763 /*
1764  * Local variables:
1765  *  c-basic-offset: 8
1766  * End:
1767  */