Loading...
1/*
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36#include <linux/file.h>
37#include <linux/slab.h>
38#include <linux/namei.h>
39#include <linux/statfs.h>
40#include <linux/utsname.h>
41#include <linux/pagemap.h>
42#include <linux/sunrpc/svcauth_gss.h>
43#include <linux/sunrpc/addr.h>
44#include <linux/xattr.h>
45#include <linux/vmalloc.h>
46
47#include <uapi/linux/xattr.h>
48
49#include "idmap.h"
50#include "acl.h"
51#include "xdr4.h"
52#include "vfs.h"
53#include "state.h"
54#include "cache.h"
55#include "netns.h"
56#include "pnfs.h"
57#include "filecache.h"
58
59#include "trace.h"
60
61#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
62#include <linux/security.h>
63#endif
64
65
66#define NFSDDBG_FACILITY NFSDDBG_XDR
67
68const u32 nfsd_suppattrs[3][3] = {
69 {NFSD4_SUPPORTED_ATTRS_WORD0,
70 NFSD4_SUPPORTED_ATTRS_WORD1,
71 NFSD4_SUPPORTED_ATTRS_WORD2},
72
73 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
74 NFSD4_1_SUPPORTED_ATTRS_WORD1,
75 NFSD4_1_SUPPORTED_ATTRS_WORD2},
76
77 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
78 NFSD4_1_SUPPORTED_ATTRS_WORD1,
79 NFSD4_2_SUPPORTED_ATTRS_WORD2},
80};
81
82/*
83 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
84 * directory in order to indicate to the client that a filesystem boundary is present
85 * We use a fixed fsid for a referral
86 */
87#define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
88#define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
89
90static __be32
91check_filename(char *str, int len)
92{
93 int i;
94
95 if (len == 0)
96 return nfserr_inval;
97 if (len > NFS4_MAXNAMLEN)
98 return nfserr_nametoolong;
99 if (isdotent(str, len))
100 return nfserr_badname;
101 for (i = 0; i < len; i++)
102 if (str[i] == '/')
103 return nfserr_badname;
104 return 0;
105}
106
107static int zero_clientid(clientid_t *clid)
108{
109 return (clid->cl_boot == 0) && (clid->cl_id == 0);
110}
111
112/**
113 * svcxdr_tmpalloc - allocate memory to be freed after compound processing
114 * @argp: NFSv4 compound argument structure
115 * @len: length of buffer to allocate
116 *
117 * Allocates a buffer of size @len to be freed when processing the compound
118 * operation described in @argp finishes.
119 */
120static void *
121svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
122{
123 struct svcxdr_tmpbuf *tb;
124
125 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
126 if (!tb)
127 return NULL;
128 tb->next = argp->to_free;
129 argp->to_free = tb;
130 return tb->buf;
131}
132
133/*
134 * For xdr strings that need to be passed to other kernel api's
135 * as null-terminated strings.
136 *
137 * Note null-terminating in place usually isn't safe since the
138 * buffer might end on a page boundary.
139 */
140static char *
141svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
142{
143 char *p = svcxdr_tmpalloc(argp, len + 1);
144
145 if (!p)
146 return NULL;
147 memcpy(p, buf, len);
148 p[len] = '\0';
149 return p;
150}
151
152static void *
153svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len)
154{
155 __be32 *tmp;
156
157 /*
158 * The location of the decoded data item is stable,
159 * so @p is OK to use. This is the common case.
160 */
161 if (p != argp->xdr->scratch.iov_base)
162 return p;
163
164 tmp = svcxdr_tmpalloc(argp, len);
165 if (!tmp)
166 return NULL;
167 memcpy(tmp, p, len);
168 return tmp;
169}
170
171/*
172 * NFSv4 basic data type decoders
173 */
174
175/*
176 * This helper handles variable-length opaques which belong to protocol
177 * elements that this implementation does not support.
178 */
179static __be32
180nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen)
181{
182 u32 len;
183
184 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
185 return nfserr_bad_xdr;
186 if (maxlen && len > maxlen)
187 return nfserr_bad_xdr;
188 if (!xdr_inline_decode(argp->xdr, len))
189 return nfserr_bad_xdr;
190
191 return nfs_ok;
192}
193
194static __be32
195nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
196{
197 __be32 *p;
198 u32 len;
199
200 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
201 return nfserr_bad_xdr;
202 if (len == 0 || len > NFS4_OPAQUE_LIMIT)
203 return nfserr_bad_xdr;
204 p = xdr_inline_decode(argp->xdr, len);
205 if (!p)
206 return nfserr_bad_xdr;
207 o->data = svcxdr_savemem(argp, p, len);
208 if (!o->data)
209 return nfserr_jukebox;
210 o->len = len;
211
212 return nfs_ok;
213}
214
215static __be32
216nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp)
217{
218 __be32 *p, status;
219
220 if (xdr_stream_decode_u32(argp->xdr, lenp) < 0)
221 return nfserr_bad_xdr;
222 p = xdr_inline_decode(argp->xdr, *lenp);
223 if (!p)
224 return nfserr_bad_xdr;
225 status = check_filename((char *)p, *lenp);
226 if (status)
227 return status;
228 *namp = svcxdr_savemem(argp, p, *lenp);
229 if (!*namp)
230 return nfserr_jukebox;
231
232 return nfs_ok;
233}
234
235static __be32
236nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv)
237{
238 __be32 *p;
239
240 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3);
241 if (!p)
242 return nfserr_bad_xdr;
243 p = xdr_decode_hyper(p, &tv->tv_sec);
244 tv->tv_nsec = be32_to_cpup(p++);
245 if (tv->tv_nsec >= (u32)1000000000)
246 return nfserr_inval;
247 return nfs_ok;
248}
249
250static __be32
251nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf)
252{
253 __be32 *p;
254
255 p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE);
256 if (!p)
257 return nfserr_bad_xdr;
258 memcpy(verf->data, p, sizeof(verf->data));
259 return nfs_ok;
260}
261
262/**
263 * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4
264 * @argp: NFSv4 compound argument structure
265 * @bmval: pointer to an array of u32's to decode into
266 * @bmlen: size of the @bmval array
267 *
268 * The server needs to return nfs_ok rather than nfserr_bad_xdr when
269 * encountering bitmaps containing bits it does not recognize. This
270 * includes bits in bitmap words past WORDn, where WORDn is the last
271 * bitmap WORD the implementation currently supports. Thus we are
272 * careful here to simply ignore bits in bitmap words that this
273 * implementation has yet to support explicitly.
274 *
275 * Return values:
276 * %nfs_ok: @bmval populated successfully
277 * %nfserr_bad_xdr: the encoded bitmap was invalid
278 */
279static __be32
280nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen)
281{
282 ssize_t status;
283
284 status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen);
285 return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok;
286}
287
288static __be32
289nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace)
290{
291 __be32 *p, status;
292 u32 length;
293
294 if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0)
295 return nfserr_bad_xdr;
296 if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0)
297 return nfserr_bad_xdr;
298 if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0)
299 return nfserr_bad_xdr;
300
301 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
302 return nfserr_bad_xdr;
303 p = xdr_inline_decode(argp->xdr, length);
304 if (!p)
305 return nfserr_bad_xdr;
306 ace->whotype = nfs4_acl_get_whotype((char *)p, length);
307 if (ace->whotype != NFS4_ACL_WHO_NAMED)
308 status = nfs_ok;
309 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
310 status = nfsd_map_name_to_gid(argp->rqstp,
311 (char *)p, length, &ace->who_gid);
312 else
313 status = nfsd_map_name_to_uid(argp->rqstp,
314 (char *)p, length, &ace->who_uid);
315
316 return status;
317}
318
319/* A counted array of nfsace4's */
320static noinline __be32
321nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl)
322{
323 struct nfs4_ace *ace;
324 __be32 status;
325 u32 count;
326
327 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
328 return nfserr_bad_xdr;
329
330 if (count > xdr_stream_remaining(argp->xdr) / 20)
331 /*
332 * Even with 4-byte names there wouldn't be
333 * space for that many aces; something fishy is
334 * going on:
335 */
336 return nfserr_fbig;
337
338 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count));
339 if (*acl == NULL)
340 return nfserr_jukebox;
341
342 (*acl)->naces = count;
343 for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) {
344 status = nfsd4_decode_nfsace4(argp, ace);
345 if (status)
346 return status;
347 }
348
349 return nfs_ok;
350}
351
352static noinline __be32
353nfsd4_decode_security_label(struct nfsd4_compoundargs *argp,
354 struct xdr_netobj *label)
355{
356 u32 lfs, pi, length;
357 __be32 *p;
358
359 if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0)
360 return nfserr_bad_xdr;
361 if (xdr_stream_decode_u32(argp->xdr, &pi) < 0)
362 return nfserr_bad_xdr;
363
364 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
365 return nfserr_bad_xdr;
366 if (length > NFS4_MAXLABELLEN)
367 return nfserr_badlabel;
368 p = xdr_inline_decode(argp->xdr, length);
369 if (!p)
370 return nfserr_bad_xdr;
371 label->len = length;
372 label->data = svcxdr_dupstr(argp, p, length);
373 if (!label->data)
374 return nfserr_jukebox;
375
376 return nfs_ok;
377}
378
379static __be32
380nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen,
381 struct iattr *iattr, struct nfs4_acl **acl,
382 struct xdr_netobj *label, int *umask)
383{
384 unsigned int starting_pos;
385 u32 attrlist4_count;
386 __be32 *p, status;
387
388 iattr->ia_valid = 0;
389 status = nfsd4_decode_bitmap4(argp, bmval, bmlen);
390 if (status)
391 return nfserr_bad_xdr;
392
393 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
394 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
395 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) {
396 if (nfsd_attrs_supported(argp->minorversion, bmval))
397 return nfserr_inval;
398 return nfserr_attrnotsupp;
399 }
400
401 if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0)
402 return nfserr_bad_xdr;
403 starting_pos = xdr_stream_pos(argp->xdr);
404
405 if (bmval[0] & FATTR4_WORD0_SIZE) {
406 u64 size;
407
408 if (xdr_stream_decode_u64(argp->xdr, &size) < 0)
409 return nfserr_bad_xdr;
410 iattr->ia_size = size;
411 iattr->ia_valid |= ATTR_SIZE;
412 }
413 if (bmval[0] & FATTR4_WORD0_ACL) {
414 status = nfsd4_decode_acl(argp, acl);
415 if (status)
416 return status;
417 } else
418 *acl = NULL;
419 if (bmval[1] & FATTR4_WORD1_MODE) {
420 u32 mode;
421
422 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
423 return nfserr_bad_xdr;
424 iattr->ia_mode = mode;
425 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
426 iattr->ia_valid |= ATTR_MODE;
427 }
428 if (bmval[1] & FATTR4_WORD1_OWNER) {
429 u32 length;
430
431 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
432 return nfserr_bad_xdr;
433 p = xdr_inline_decode(argp->xdr, length);
434 if (!p)
435 return nfserr_bad_xdr;
436 status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length,
437 &iattr->ia_uid);
438 if (status)
439 return status;
440 iattr->ia_valid |= ATTR_UID;
441 }
442 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
443 u32 length;
444
445 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
446 return nfserr_bad_xdr;
447 p = xdr_inline_decode(argp->xdr, length);
448 if (!p)
449 return nfserr_bad_xdr;
450 status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length,
451 &iattr->ia_gid);
452 if (status)
453 return status;
454 iattr->ia_valid |= ATTR_GID;
455 }
456 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
457 u32 set_it;
458
459 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
460 return nfserr_bad_xdr;
461 switch (set_it) {
462 case NFS4_SET_TO_CLIENT_TIME:
463 status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime);
464 if (status)
465 return status;
466 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
467 break;
468 case NFS4_SET_TO_SERVER_TIME:
469 iattr->ia_valid |= ATTR_ATIME;
470 break;
471 default:
472 return nfserr_bad_xdr;
473 }
474 }
475 if (bmval[1] & FATTR4_WORD1_TIME_CREATE) {
476 struct timespec64 ts;
477
478 /* No Linux filesystem supports setting this attribute. */
479 bmval[1] &= ~FATTR4_WORD1_TIME_CREATE;
480 status = nfsd4_decode_nfstime4(argp, &ts);
481 if (status)
482 return status;
483 }
484 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
485 u32 set_it;
486
487 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
488 return nfserr_bad_xdr;
489 switch (set_it) {
490 case NFS4_SET_TO_CLIENT_TIME:
491 status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime);
492 if (status)
493 return status;
494 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
495 break;
496 case NFS4_SET_TO_SERVER_TIME:
497 iattr->ia_valid |= ATTR_MTIME;
498 break;
499 default:
500 return nfserr_bad_xdr;
501 }
502 }
503 label->len = 0;
504 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) &&
505 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
506 status = nfsd4_decode_security_label(argp, label);
507 if (status)
508 return status;
509 }
510 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) {
511 u32 mode, mask;
512
513 if (!umask)
514 return nfserr_bad_xdr;
515 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
516 return nfserr_bad_xdr;
517 iattr->ia_mode = mode & (S_IFMT | S_IALLUGO);
518 if (xdr_stream_decode_u32(argp->xdr, &mask) < 0)
519 return nfserr_bad_xdr;
520 *umask = mask & S_IRWXUGO;
521 iattr->ia_valid |= ATTR_MODE;
522 }
523
524 /* request sanity: did attrlist4 contain the expected number of words? */
525 if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos)
526 return nfserr_bad_xdr;
527
528 return nfs_ok;
529}
530
531static __be32
532nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid)
533{
534 __be32 *p;
535
536 p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE);
537 if (!p)
538 return nfserr_bad_xdr;
539 sid->si_generation = be32_to_cpup(p++);
540 memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque));
541 return nfs_ok;
542}
543
544static __be32
545nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid)
546{
547 __be32 *p;
548
549 p = xdr_inline_decode(argp->xdr, sizeof(__be64));
550 if (!p)
551 return nfserr_bad_xdr;
552 memcpy(clientid, p, sizeof(*clientid));
553 return nfs_ok;
554}
555
556static __be32
557nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp,
558 clientid_t *clientid, struct xdr_netobj *owner)
559{
560 __be32 status;
561
562 status = nfsd4_decode_clientid4(argp, clientid);
563 if (status)
564 return status;
565 return nfsd4_decode_opaque(argp, owner);
566}
567
568#ifdef CONFIG_NFSD_PNFS
569static __be32
570nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp,
571 struct nfsd4_deviceid *devid)
572{
573 __be32 *p;
574
575 p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE);
576 if (!p)
577 return nfserr_bad_xdr;
578 memcpy(devid, p, sizeof(*devid));
579 return nfs_ok;
580}
581
582static __be32
583nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp,
584 struct nfsd4_layoutcommit *lcp)
585{
586 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0)
587 return nfserr_bad_xdr;
588 if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES)
589 return nfserr_bad_xdr;
590 if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX)
591 return nfserr_bad_xdr;
592
593 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0)
594 return nfserr_bad_xdr;
595 if (lcp->lc_up_len > 0) {
596 lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len);
597 if (!lcp->lc_up_layout)
598 return nfserr_bad_xdr;
599 }
600
601 return nfs_ok;
602}
603
604static __be32
605nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp,
606 struct nfsd4_layoutreturn *lrp)
607{
608 __be32 status;
609
610 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0)
611 return nfserr_bad_xdr;
612 switch (lrp->lr_return_type) {
613 case RETURN_FILE:
614 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0)
615 return nfserr_bad_xdr;
616 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0)
617 return nfserr_bad_xdr;
618 status = nfsd4_decode_stateid4(argp, &lrp->lr_sid);
619 if (status)
620 return status;
621 if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0)
622 return nfserr_bad_xdr;
623 if (lrp->lrf_body_len > 0) {
624 lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len);
625 if (!lrp->lrf_body)
626 return nfserr_bad_xdr;
627 }
628 break;
629 case RETURN_FSID:
630 case RETURN_ALL:
631 lrp->lr_seg.offset = 0;
632 lrp->lr_seg.length = NFS4_MAX_UINT64;
633 break;
634 default:
635 return nfserr_bad_xdr;
636 }
637
638 return nfs_ok;
639}
640
641#endif /* CONFIG_NFSD_PNFS */
642
643static __be32
644nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp,
645 struct nfs4_sessionid *sessionid)
646{
647 __be32 *p;
648
649 p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN);
650 if (!p)
651 return nfserr_bad_xdr;
652 memcpy(sessionid->data, p, sizeof(sessionid->data));
653 return nfs_ok;
654}
655
656/* Defined in Appendix A of RFC 5531 */
657static __be32
658nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp,
659 struct nfsd4_cb_sec *cbs)
660{
661 u32 stamp, gidcount, uid, gid;
662 __be32 *p, status;
663
664 if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0)
665 return nfserr_bad_xdr;
666 /* machine name */
667 status = nfsd4_decode_ignored_string(argp, 255);
668 if (status)
669 return status;
670 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0)
671 return nfserr_bad_xdr;
672 if (xdr_stream_decode_u32(argp->xdr, &gid) < 0)
673 return nfserr_bad_xdr;
674 if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0)
675 return nfserr_bad_xdr;
676 if (gidcount > 16)
677 return nfserr_bad_xdr;
678 p = xdr_inline_decode(argp->xdr, gidcount << 2);
679 if (!p)
680 return nfserr_bad_xdr;
681 if (cbs->flavor == (u32)(-1)) {
682 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp);
683
684 kuid_t kuid = make_kuid(userns, uid);
685 kgid_t kgid = make_kgid(userns, gid);
686 if (uid_valid(kuid) && gid_valid(kgid)) {
687 cbs->uid = kuid;
688 cbs->gid = kgid;
689 cbs->flavor = RPC_AUTH_UNIX;
690 } else {
691 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n");
692 }
693 }
694
695 return nfs_ok;
696}
697
698static __be32
699nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp,
700 struct nfsd4_cb_sec *cbs)
701{
702 __be32 status;
703 u32 service;
704
705 dprintk("RPC_AUTH_GSS callback secflavor not supported!\n");
706
707 if (xdr_stream_decode_u32(argp->xdr, &service) < 0)
708 return nfserr_bad_xdr;
709 if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY)
710 return nfserr_bad_xdr;
711 /* gcbp_handle_from_server */
712 status = nfsd4_decode_ignored_string(argp, 0);
713 if (status)
714 return status;
715 /* gcbp_handle_from_client */
716 status = nfsd4_decode_ignored_string(argp, 0);
717 if (status)
718 return status;
719
720 return nfs_ok;
721}
722
723/* a counted array of callback_sec_parms4 items */
724static __be32
725nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
726{
727 u32 i, secflavor, nr_secflavs;
728 __be32 status;
729
730 /* callback_sec_params4 */
731 if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0)
732 return nfserr_bad_xdr;
733 if (nr_secflavs)
734 cbs->flavor = (u32)(-1);
735 else
736 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
737 cbs->flavor = 0;
738
739 for (i = 0; i < nr_secflavs; ++i) {
740 if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0)
741 return nfserr_bad_xdr;
742 switch (secflavor) {
743 case RPC_AUTH_NULL:
744 /* void */
745 if (cbs->flavor == (u32)(-1))
746 cbs->flavor = RPC_AUTH_NULL;
747 break;
748 case RPC_AUTH_UNIX:
749 status = nfsd4_decode_authsys_parms(argp, cbs);
750 if (status)
751 return status;
752 break;
753 case RPC_AUTH_GSS:
754 status = nfsd4_decode_gss_cb_handles4(argp, cbs);
755 if (status)
756 return status;
757 break;
758 default:
759 return nfserr_inval;
760 }
761 }
762
763 return nfs_ok;
764}
765
766
767/*
768 * NFSv4 operation argument decoders
769 */
770
771static __be32
772nfsd4_decode_access(struct nfsd4_compoundargs *argp,
773 union nfsd4_op_u *u)
774{
775 struct nfsd4_access *access = &u->access;
776 if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0)
777 return nfserr_bad_xdr;
778 return nfs_ok;
779}
780
781static __be32
782nfsd4_decode_close(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
783{
784 struct nfsd4_close *close = &u->close;
785 if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0)
786 return nfserr_bad_xdr;
787 return nfsd4_decode_stateid4(argp, &close->cl_stateid);
788}
789
790
791static __be32
792nfsd4_decode_commit(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
793{
794 struct nfsd4_commit *commit = &u->commit;
795 if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0)
796 return nfserr_bad_xdr;
797 if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0)
798 return nfserr_bad_xdr;
799 memset(&commit->co_verf, 0, sizeof(commit->co_verf));
800 return nfs_ok;
801}
802
803static __be32
804nfsd4_decode_create(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
805{
806 struct nfsd4_create *create = &u->create;
807 __be32 *p, status;
808
809 memset(create, 0, sizeof(*create));
810 if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0)
811 return nfserr_bad_xdr;
812 switch (create->cr_type) {
813 case NF4LNK:
814 if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0)
815 return nfserr_bad_xdr;
816 p = xdr_inline_decode(argp->xdr, create->cr_datalen);
817 if (!p)
818 return nfserr_bad_xdr;
819 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
820 if (!create->cr_data)
821 return nfserr_jukebox;
822 break;
823 case NF4BLK:
824 case NF4CHR:
825 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0)
826 return nfserr_bad_xdr;
827 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0)
828 return nfserr_bad_xdr;
829 break;
830 case NF4SOCK:
831 case NF4FIFO:
832 case NF4DIR:
833 default:
834 break;
835 }
836 status = nfsd4_decode_component4(argp, &create->cr_name,
837 &create->cr_namelen);
838 if (status)
839 return status;
840 status = nfsd4_decode_fattr4(argp, create->cr_bmval,
841 ARRAY_SIZE(create->cr_bmval),
842 &create->cr_iattr, &create->cr_acl,
843 &create->cr_label, &create->cr_umask);
844 if (status)
845 return status;
846
847 return nfs_ok;
848}
849
850static inline __be32
851nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
852{
853 struct nfsd4_delegreturn *dr = &u->delegreturn;
854 return nfsd4_decode_stateid4(argp, &dr->dr_stateid);
855}
856
857static inline __be32
858nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
859{
860 struct nfsd4_getattr *getattr = &u->getattr;
861 memset(getattr, 0, sizeof(*getattr));
862 return nfsd4_decode_bitmap4(argp, getattr->ga_bmval,
863 ARRAY_SIZE(getattr->ga_bmval));
864}
865
866static __be32
867nfsd4_decode_link(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
868{
869 struct nfsd4_link *link = &u->link;
870 memset(link, 0, sizeof(*link));
871 return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen);
872}
873
874static __be32
875nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp,
876 struct nfsd4_lock *lock)
877{
878 __be32 status;
879
880 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0)
881 return nfserr_bad_xdr;
882 status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid);
883 if (status)
884 return status;
885 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0)
886 return nfserr_bad_xdr;
887 return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid,
888 &lock->lk_new_owner);
889}
890
891static __be32
892nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp,
893 struct nfsd4_lock *lock)
894{
895 __be32 status;
896
897 status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid);
898 if (status)
899 return status;
900 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0)
901 return nfserr_bad_xdr;
902
903 return nfs_ok;
904}
905
906static __be32
907nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
908{
909 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0)
910 return nfserr_bad_xdr;
911 if (lock->lk_is_new)
912 return nfsd4_decode_open_to_lock_owner4(argp, lock);
913 return nfsd4_decode_exist_lock_owner4(argp, lock);
914}
915
916static __be32
917nfsd4_decode_lock(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
918{
919 struct nfsd4_lock *lock = &u->lock;
920 memset(lock, 0, sizeof(*lock));
921 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0)
922 return nfserr_bad_xdr;
923 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
924 return nfserr_bad_xdr;
925 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0)
926 return nfserr_bad_xdr;
927 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0)
928 return nfserr_bad_xdr;
929 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0)
930 return nfserr_bad_xdr;
931 return nfsd4_decode_locker4(argp, lock);
932}
933
934static __be32
935nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
936{
937 struct nfsd4_lockt *lockt = &u->lockt;
938 memset(lockt, 0, sizeof(*lockt));
939 if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0)
940 return nfserr_bad_xdr;
941 if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
942 return nfserr_bad_xdr;
943 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0)
944 return nfserr_bad_xdr;
945 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0)
946 return nfserr_bad_xdr;
947 return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid,
948 &lockt->lt_owner);
949}
950
951static __be32
952nfsd4_decode_locku(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
953{
954 struct nfsd4_locku *locku = &u->locku;
955 __be32 status;
956
957 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0)
958 return nfserr_bad_xdr;
959 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
960 return nfserr_bad_xdr;
961 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0)
962 return nfserr_bad_xdr;
963 status = nfsd4_decode_stateid4(argp, &locku->lu_stateid);
964 if (status)
965 return status;
966 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0)
967 return nfserr_bad_xdr;
968 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0)
969 return nfserr_bad_xdr;
970
971 return nfs_ok;
972}
973
974static __be32
975nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
976{
977 struct nfsd4_lookup *lookup = &u->lookup;
978 return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len);
979}
980
981static __be32
982nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
983{
984 __be32 status;
985
986 if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0)
987 return nfserr_bad_xdr;
988 switch (open->op_createmode) {
989 case NFS4_CREATE_UNCHECKED:
990 case NFS4_CREATE_GUARDED:
991 status = nfsd4_decode_fattr4(argp, open->op_bmval,
992 ARRAY_SIZE(open->op_bmval),
993 &open->op_iattr, &open->op_acl,
994 &open->op_label, &open->op_umask);
995 if (status)
996 return status;
997 break;
998 case NFS4_CREATE_EXCLUSIVE:
999 status = nfsd4_decode_verifier4(argp, &open->op_verf);
1000 if (status)
1001 return status;
1002 break;
1003 case NFS4_CREATE_EXCLUSIVE4_1:
1004 if (argp->minorversion < 1)
1005 return nfserr_bad_xdr;
1006 status = nfsd4_decode_verifier4(argp, &open->op_verf);
1007 if (status)
1008 return status;
1009 status = nfsd4_decode_fattr4(argp, open->op_bmval,
1010 ARRAY_SIZE(open->op_bmval),
1011 &open->op_iattr, &open->op_acl,
1012 &open->op_label, &open->op_umask);
1013 if (status)
1014 return status;
1015 break;
1016 default:
1017 return nfserr_bad_xdr;
1018 }
1019
1020 return nfs_ok;
1021}
1022
1023static __be32
1024nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1025{
1026 __be32 status;
1027
1028 if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0)
1029 return nfserr_bad_xdr;
1030 switch (open->op_create) {
1031 case NFS4_OPEN_NOCREATE:
1032 break;
1033 case NFS4_OPEN_CREATE:
1034 status = nfsd4_decode_createhow4(argp, open);
1035 if (status)
1036 return status;
1037 break;
1038 default:
1039 return nfserr_bad_xdr;
1040 }
1041
1042 return nfs_ok;
1043}
1044
1045static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
1046{
1047 u32 w;
1048
1049 if (xdr_stream_decode_u32(argp->xdr, &w) < 0)
1050 return nfserr_bad_xdr;
1051 *share_access = w & NFS4_SHARE_ACCESS_MASK;
1052 *deleg_want = w & NFS4_SHARE_WANT_MASK;
1053 if (deleg_when)
1054 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
1055
1056 switch (w & NFS4_SHARE_ACCESS_MASK) {
1057 case NFS4_SHARE_ACCESS_READ:
1058 case NFS4_SHARE_ACCESS_WRITE:
1059 case NFS4_SHARE_ACCESS_BOTH:
1060 break;
1061 default:
1062 return nfserr_bad_xdr;
1063 }
1064 w &= ~NFS4_SHARE_ACCESS_MASK;
1065 if (!w)
1066 return nfs_ok;
1067 if (!argp->minorversion)
1068 return nfserr_bad_xdr;
1069 switch (w & NFS4_SHARE_WANT_MASK) {
1070 case NFS4_SHARE_WANT_NO_PREFERENCE:
1071 case NFS4_SHARE_WANT_READ_DELEG:
1072 case NFS4_SHARE_WANT_WRITE_DELEG:
1073 case NFS4_SHARE_WANT_ANY_DELEG:
1074 case NFS4_SHARE_WANT_NO_DELEG:
1075 case NFS4_SHARE_WANT_CANCEL:
1076 break;
1077 default:
1078 return nfserr_bad_xdr;
1079 }
1080 w &= ~NFS4_SHARE_WANT_MASK;
1081 if (!w)
1082 return nfs_ok;
1083
1084 if (!deleg_when) /* open_downgrade */
1085 return nfserr_inval;
1086 switch (w) {
1087 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
1088 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
1089 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
1090 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
1091 return nfs_ok;
1092 }
1093 return nfserr_bad_xdr;
1094}
1095
1096static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
1097{
1098 if (xdr_stream_decode_u32(argp->xdr, x) < 0)
1099 return nfserr_bad_xdr;
1100 /* Note: unlike access bits, deny bits may be zero. */
1101 if (*x & ~NFS4_SHARE_DENY_BOTH)
1102 return nfserr_bad_xdr;
1103
1104 return nfs_ok;
1105}
1106
1107static __be32
1108nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp,
1109 struct nfsd4_open *open)
1110{
1111 __be32 status;
1112
1113 if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0)
1114 return nfserr_bad_xdr;
1115 switch (open->op_claim_type) {
1116 case NFS4_OPEN_CLAIM_NULL:
1117 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1118 status = nfsd4_decode_component4(argp, &open->op_fname,
1119 &open->op_fnamelen);
1120 if (status)
1121 return status;
1122 break;
1123 case NFS4_OPEN_CLAIM_PREVIOUS:
1124 if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0)
1125 return nfserr_bad_xdr;
1126 break;
1127 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1128 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1129 if (status)
1130 return status;
1131 status = nfsd4_decode_component4(argp, &open->op_fname,
1132 &open->op_fnamelen);
1133 if (status)
1134 return status;
1135 break;
1136 case NFS4_OPEN_CLAIM_FH:
1137 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1138 if (argp->minorversion < 1)
1139 return nfserr_bad_xdr;
1140 /* void */
1141 break;
1142 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1143 if (argp->minorversion < 1)
1144 return nfserr_bad_xdr;
1145 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1146 if (status)
1147 return status;
1148 break;
1149 default:
1150 return nfserr_bad_xdr;
1151 }
1152
1153 return nfs_ok;
1154}
1155
1156static __be32
1157nfsd4_decode_open(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1158{
1159 struct nfsd4_open *open = &u->open;
1160 __be32 status;
1161 u32 dummy;
1162
1163 memset(open, 0, sizeof(*open));
1164
1165 if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0)
1166 return nfserr_bad_xdr;
1167 /* deleg_want is ignored */
1168 status = nfsd4_decode_share_access(argp, &open->op_share_access,
1169 &open->op_deleg_want, &dummy);
1170 if (status)
1171 return status;
1172 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
1173 if (status)
1174 return status;
1175 status = nfsd4_decode_state_owner4(argp, &open->op_clientid,
1176 &open->op_owner);
1177 if (status)
1178 return status;
1179 status = nfsd4_decode_openflag4(argp, open);
1180 if (status)
1181 return status;
1182 return nfsd4_decode_open_claim4(argp, open);
1183}
1184
1185static __be32
1186nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp,
1187 union nfsd4_op_u *u)
1188{
1189 struct nfsd4_open_confirm *open_conf = &u->open_confirm;
1190 __be32 status;
1191
1192 if (argp->minorversion >= 1)
1193 return nfserr_notsupp;
1194
1195 status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid);
1196 if (status)
1197 return status;
1198 if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0)
1199 return nfserr_bad_xdr;
1200
1201 memset(&open_conf->oc_resp_stateid, 0,
1202 sizeof(open_conf->oc_resp_stateid));
1203 return nfs_ok;
1204}
1205
1206static __be32
1207nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp,
1208 union nfsd4_op_u *u)
1209{
1210 struct nfsd4_open_downgrade *open_down = &u->open_downgrade;
1211 __be32 status;
1212
1213 memset(open_down, 0, sizeof(*open_down));
1214 status = nfsd4_decode_stateid4(argp, &open_down->od_stateid);
1215 if (status)
1216 return status;
1217 if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0)
1218 return nfserr_bad_xdr;
1219 /* deleg_want is ignored */
1220 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
1221 &open_down->od_deleg_want, NULL);
1222 if (status)
1223 return status;
1224 return nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
1225}
1226
1227static __be32
1228nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1229{
1230 struct nfsd4_putfh *putfh = &u->putfh;
1231 __be32 *p;
1232
1233 if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0)
1234 return nfserr_bad_xdr;
1235 if (putfh->pf_fhlen > NFS4_FHSIZE)
1236 return nfserr_bad_xdr;
1237 p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen);
1238 if (!p)
1239 return nfserr_bad_xdr;
1240 putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen);
1241 if (!putfh->pf_fhval)
1242 return nfserr_jukebox;
1243
1244 putfh->no_verify = false;
1245 return nfs_ok;
1246}
1247
1248static __be32
1249nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
1250{
1251 if (argp->minorversion == 0)
1252 return nfs_ok;
1253 return nfserr_notsupp;
1254}
1255
1256static __be32
1257nfsd4_decode_read(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1258{
1259 struct nfsd4_read *read = &u->read;
1260 __be32 status;
1261
1262 memset(read, 0, sizeof(*read));
1263 status = nfsd4_decode_stateid4(argp, &read->rd_stateid);
1264 if (status)
1265 return status;
1266 if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0)
1267 return nfserr_bad_xdr;
1268 if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0)
1269 return nfserr_bad_xdr;
1270
1271 return nfs_ok;
1272}
1273
1274static __be32
1275nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1276{
1277 struct nfsd4_readdir *readdir = &u->readdir;
1278 __be32 status;
1279
1280 memset(readdir, 0, sizeof(*readdir));
1281 if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0)
1282 return nfserr_bad_xdr;
1283 status = nfsd4_decode_verifier4(argp, &readdir->rd_verf);
1284 if (status)
1285 return status;
1286 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0)
1287 return nfserr_bad_xdr;
1288 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0)
1289 return nfserr_bad_xdr;
1290 if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval,
1291 ARRAY_SIZE(readdir->rd_bmval)) < 0)
1292 return nfserr_bad_xdr;
1293
1294 return nfs_ok;
1295}
1296
1297static __be32
1298nfsd4_decode_remove(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1299{
1300 struct nfsd4_remove *remove = &u->remove;
1301 memset(&remove->rm_cinfo, 0, sizeof(remove->rm_cinfo));
1302 return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen);
1303}
1304
1305static __be32
1306nfsd4_decode_rename(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1307{
1308 struct nfsd4_rename *rename = &u->rename;
1309 __be32 status;
1310
1311 memset(rename, 0, sizeof(*rename));
1312 status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen);
1313 if (status)
1314 return status;
1315 return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen);
1316}
1317
1318static __be32
1319nfsd4_decode_renew(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1320{
1321 clientid_t *clientid = &u->renew;
1322 return nfsd4_decode_clientid4(argp, clientid);
1323}
1324
1325static __be32
1326nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1327 union nfsd4_op_u *u)
1328{
1329 struct nfsd4_secinfo *secinfo = &u->secinfo;
1330 secinfo->si_exp = NULL;
1331 return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen);
1332}
1333
1334static __be32
1335nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1336{
1337 struct nfsd4_setattr *setattr = &u->setattr;
1338 __be32 status;
1339
1340 memset(setattr, 0, sizeof(*setattr));
1341 status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid);
1342 if (status)
1343 return status;
1344 return nfsd4_decode_fattr4(argp, setattr->sa_bmval,
1345 ARRAY_SIZE(setattr->sa_bmval),
1346 &setattr->sa_iattr, &setattr->sa_acl,
1347 &setattr->sa_label, NULL);
1348}
1349
1350static __be32
1351nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1352{
1353 struct nfsd4_setclientid *setclientid = &u->setclientid;
1354 __be32 *p, status;
1355
1356 memset(setclientid, 0, sizeof(*setclientid));
1357
1358 if (argp->minorversion >= 1)
1359 return nfserr_notsupp;
1360
1361 status = nfsd4_decode_verifier4(argp, &setclientid->se_verf);
1362 if (status)
1363 return status;
1364 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1365 if (status)
1366 return status;
1367 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0)
1368 return nfserr_bad_xdr;
1369 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0)
1370 return nfserr_bad_xdr;
1371 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len);
1372 if (!p)
1373 return nfserr_bad_xdr;
1374 setclientid->se_callback_netid_val = svcxdr_savemem(argp, p,
1375 setclientid->se_callback_netid_len);
1376 if (!setclientid->se_callback_netid_val)
1377 return nfserr_jukebox;
1378
1379 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0)
1380 return nfserr_bad_xdr;
1381 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len);
1382 if (!p)
1383 return nfserr_bad_xdr;
1384 setclientid->se_callback_addr_val = svcxdr_savemem(argp, p,
1385 setclientid->se_callback_addr_len);
1386 if (!setclientid->se_callback_addr_val)
1387 return nfserr_jukebox;
1388 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0)
1389 return nfserr_bad_xdr;
1390
1391 return nfs_ok;
1392}
1393
1394static __be32
1395nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp,
1396 union nfsd4_op_u *u)
1397{
1398 struct nfsd4_setclientid_confirm *scd_c = &u->setclientid_confirm;
1399 __be32 status;
1400
1401 if (argp->minorversion >= 1)
1402 return nfserr_notsupp;
1403
1404 status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid);
1405 if (status)
1406 return status;
1407 return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm);
1408}
1409
1410/* Also used for NVERIFY */
1411static __be32
1412nfsd4_decode_verify(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1413{
1414 struct nfsd4_verify *verify = &u->verify;
1415 __be32 *p, status;
1416
1417 memset(verify, 0, sizeof(*verify));
1418
1419 status = nfsd4_decode_bitmap4(argp, verify->ve_bmval,
1420 ARRAY_SIZE(verify->ve_bmval));
1421 if (status)
1422 return status;
1423
1424 /* For convenience's sake, we compare raw xdr'd attributes in
1425 * nfsd4_proc_verify */
1426
1427 if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0)
1428 return nfserr_bad_xdr;
1429 p = xdr_inline_decode(argp->xdr, verify->ve_attrlen);
1430 if (!p)
1431 return nfserr_bad_xdr;
1432 verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen);
1433 if (!verify->ve_attrval)
1434 return nfserr_jukebox;
1435
1436 return nfs_ok;
1437}
1438
1439static __be32
1440nfsd4_decode_write(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1441{
1442 struct nfsd4_write *write = &u->write;
1443 __be32 status;
1444
1445 status = nfsd4_decode_stateid4(argp, &write->wr_stateid);
1446 if (status)
1447 return status;
1448 if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0)
1449 return nfserr_bad_xdr;
1450 if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0)
1451 return nfserr_bad_xdr;
1452 if (write->wr_stable_how > NFS_FILE_SYNC)
1453 return nfserr_bad_xdr;
1454 if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0)
1455 return nfserr_bad_xdr;
1456 if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen))
1457 return nfserr_bad_xdr;
1458
1459 write->wr_bytes_written = 0;
1460 write->wr_how_written = 0;
1461 memset(&write->wr_verifier, 0, sizeof(write->wr_verifier));
1462 return nfs_ok;
1463}
1464
1465static __be32
1466nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp,
1467 union nfsd4_op_u *u)
1468{
1469 struct nfsd4_release_lockowner *rlockowner = &u->release_lockowner;
1470 __be32 status;
1471
1472 if (argp->minorversion >= 1)
1473 return nfserr_notsupp;
1474
1475 status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid,
1476 &rlockowner->rl_owner);
1477 if (status)
1478 return status;
1479
1480 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1481 return nfserr_inval;
1482
1483 return nfs_ok;
1484}
1485
1486static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp,
1487 union nfsd4_op_u *u)
1488{
1489 struct nfsd4_backchannel_ctl *bc = &u->backchannel_ctl;
1490 memset(bc, 0, sizeof(*bc));
1491 if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0)
1492 return nfserr_bad_xdr;
1493 return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
1494}
1495
1496static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp,
1497 union nfsd4_op_u *u)
1498{
1499 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session;
1500 u32 use_conn_in_rdma_mode;
1501 __be32 status;
1502
1503 memset(bcts, 0, sizeof(*bcts));
1504 status = nfsd4_decode_sessionid4(argp, &bcts->sessionid);
1505 if (status)
1506 return status;
1507 if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0)
1508 return nfserr_bad_xdr;
1509 if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0)
1510 return nfserr_bad_xdr;
1511
1512 return nfs_ok;
1513}
1514
1515static __be32
1516nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp,
1517 struct nfsd4_exchange_id *exid)
1518{
1519 __be32 status;
1520
1521 status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce,
1522 ARRAY_SIZE(exid->spo_must_enforce));
1523 if (status)
1524 return nfserr_bad_xdr;
1525 status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow,
1526 ARRAY_SIZE(exid->spo_must_allow));
1527 if (status)
1528 return nfserr_bad_xdr;
1529
1530 return nfs_ok;
1531}
1532
1533/*
1534 * This implementation currently does not support SP4_SSV.
1535 * This decoder simply skips over these arguments.
1536 */
1537static noinline __be32
1538nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp,
1539 struct nfsd4_exchange_id *exid)
1540{
1541 u32 count, window, num_gss_handles;
1542 __be32 status;
1543
1544 /* ssp_ops */
1545 status = nfsd4_decode_state_protect_ops(argp, exid);
1546 if (status)
1547 return status;
1548
1549 /* ssp_hash_algs<> */
1550 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1551 return nfserr_bad_xdr;
1552 while (count--) {
1553 status = nfsd4_decode_ignored_string(argp, 0);
1554 if (status)
1555 return status;
1556 }
1557
1558 /* ssp_encr_algs<> */
1559 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1560 return nfserr_bad_xdr;
1561 while (count--) {
1562 status = nfsd4_decode_ignored_string(argp, 0);
1563 if (status)
1564 return status;
1565 }
1566
1567 if (xdr_stream_decode_u32(argp->xdr, &window) < 0)
1568 return nfserr_bad_xdr;
1569 if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0)
1570 return nfserr_bad_xdr;
1571
1572 return nfs_ok;
1573}
1574
1575static __be32
1576nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp,
1577 struct nfsd4_exchange_id *exid)
1578{
1579 __be32 status;
1580
1581 if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0)
1582 return nfserr_bad_xdr;
1583 switch (exid->spa_how) {
1584 case SP4_NONE:
1585 break;
1586 case SP4_MACH_CRED:
1587 status = nfsd4_decode_state_protect_ops(argp, exid);
1588 if (status)
1589 return status;
1590 break;
1591 case SP4_SSV:
1592 status = nfsd4_decode_ssv_sp_parms(argp, exid);
1593 if (status)
1594 return status;
1595 break;
1596 default:
1597 return nfserr_bad_xdr;
1598 }
1599
1600 return nfs_ok;
1601}
1602
1603static __be32
1604nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp,
1605 struct nfsd4_exchange_id *exid)
1606{
1607 __be32 status;
1608 u32 count;
1609
1610 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1611 return nfserr_bad_xdr;
1612 switch (count) {
1613 case 0:
1614 break;
1615 case 1:
1616 /* Note that RFC 8881 places no length limit on
1617 * nii_domain, but this implementation permits no
1618 * more than NFS4_OPAQUE_LIMIT bytes */
1619 status = nfsd4_decode_opaque(argp, &exid->nii_domain);
1620 if (status)
1621 return status;
1622 /* Note that RFC 8881 places no length limit on
1623 * nii_name, but this implementation permits no
1624 * more than NFS4_OPAQUE_LIMIT bytes */
1625 status = nfsd4_decode_opaque(argp, &exid->nii_name);
1626 if (status)
1627 return status;
1628 status = nfsd4_decode_nfstime4(argp, &exid->nii_time);
1629 if (status)
1630 return status;
1631 break;
1632 default:
1633 return nfserr_bad_xdr;
1634 }
1635
1636 return nfs_ok;
1637}
1638
1639static __be32
1640nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1641 union nfsd4_op_u *u)
1642{
1643 struct nfsd4_exchange_id *exid = &u->exchange_id;
1644 __be32 status;
1645
1646 memset(exid, 0, sizeof(*exid));
1647 status = nfsd4_decode_verifier4(argp, &exid->verifier);
1648 if (status)
1649 return status;
1650 status = nfsd4_decode_opaque(argp, &exid->clname);
1651 if (status)
1652 return status;
1653 if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0)
1654 return nfserr_bad_xdr;
1655 status = nfsd4_decode_state_protect4_a(argp, exid);
1656 if (status)
1657 return status;
1658 return nfsd4_decode_nfs_impl_id4(argp, exid);
1659}
1660
1661static __be32
1662nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp,
1663 struct nfsd4_channel_attrs *ca)
1664{
1665 __be32 *p;
1666
1667 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7);
1668 if (!p)
1669 return nfserr_bad_xdr;
1670
1671 /* headerpadsz is ignored */
1672 p++;
1673 ca->maxreq_sz = be32_to_cpup(p++);
1674 ca->maxresp_sz = be32_to_cpup(p++);
1675 ca->maxresp_cached = be32_to_cpup(p++);
1676 ca->maxops = be32_to_cpup(p++);
1677 ca->maxreqs = be32_to_cpup(p++);
1678 ca->nr_rdma_attrs = be32_to_cpup(p);
1679 switch (ca->nr_rdma_attrs) {
1680 case 0:
1681 break;
1682 case 1:
1683 if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0)
1684 return nfserr_bad_xdr;
1685 break;
1686 default:
1687 return nfserr_bad_xdr;
1688 }
1689
1690 return nfs_ok;
1691}
1692
1693static __be32
1694nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1695 union nfsd4_op_u *u)
1696{
1697 struct nfsd4_create_session *sess = &u->create_session;
1698 __be32 status;
1699
1700 memset(sess, 0, sizeof(*sess));
1701 status = nfsd4_decode_clientid4(argp, &sess->clientid);
1702 if (status)
1703 return status;
1704 if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0)
1705 return nfserr_bad_xdr;
1706 if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0)
1707 return nfserr_bad_xdr;
1708 status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel);
1709 if (status)
1710 return status;
1711 status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel);
1712 if (status)
1713 return status;
1714 if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0)
1715 return nfserr_bad_xdr;
1716 return nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1717}
1718
1719static __be32
1720nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1721 union nfsd4_op_u *u)
1722{
1723 struct nfsd4_destroy_session *destroy_session = &u->destroy_session;
1724 return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid);
1725}
1726
1727static __be32
1728nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1729 union nfsd4_op_u *u)
1730{
1731 struct nfsd4_free_stateid *free_stateid = &u->free_stateid;
1732 return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid);
1733}
1734
1735#ifdef CONFIG_NFSD_PNFS
1736static __be32
1737nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp,
1738 union nfsd4_op_u *u)
1739{
1740 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo;
1741 __be32 status;
1742
1743 memset(gdev, 0, sizeof(*gdev));
1744 status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid);
1745 if (status)
1746 return status;
1747 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0)
1748 return nfserr_bad_xdr;
1749 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0)
1750 return nfserr_bad_xdr;
1751 if (xdr_stream_decode_uint32_array(argp->xdr,
1752 &gdev->gd_notify_types, 1) < 0)
1753 return nfserr_bad_xdr;
1754
1755 return nfs_ok;
1756}
1757
1758static __be32
1759nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp,
1760 union nfsd4_op_u *u)
1761{
1762 struct nfsd4_layoutcommit *lcp = &u->layoutcommit;
1763 __be32 *p, status;
1764
1765 memset(lcp, 0, sizeof(*lcp));
1766 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0)
1767 return nfserr_bad_xdr;
1768 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0)
1769 return nfserr_bad_xdr;
1770 if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0)
1771 return nfserr_bad_xdr;
1772 status = nfsd4_decode_stateid4(argp, &lcp->lc_sid);
1773 if (status)
1774 return status;
1775 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0)
1776 return nfserr_bad_xdr;
1777 if (lcp->lc_newoffset) {
1778 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0)
1779 return nfserr_bad_xdr;
1780 } else
1781 lcp->lc_last_wr = 0;
1782 p = xdr_inline_decode(argp->xdr, XDR_UNIT);
1783 if (!p)
1784 return nfserr_bad_xdr;
1785 if (xdr_item_is_present(p)) {
1786 status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime);
1787 if (status)
1788 return status;
1789 } else {
1790 lcp->lc_mtime.tv_nsec = UTIME_NOW;
1791 }
1792 return nfsd4_decode_layoutupdate4(argp, lcp);
1793}
1794
1795static __be32
1796nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp,
1797 union nfsd4_op_u *u)
1798{
1799 struct nfsd4_layoutget *lgp = &u->layoutget;
1800 __be32 status;
1801
1802 memset(lgp, 0, sizeof(*lgp));
1803 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0)
1804 return nfserr_bad_xdr;
1805 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0)
1806 return nfserr_bad_xdr;
1807 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0)
1808 return nfserr_bad_xdr;
1809 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0)
1810 return nfserr_bad_xdr;
1811 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0)
1812 return nfserr_bad_xdr;
1813 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0)
1814 return nfserr_bad_xdr;
1815 status = nfsd4_decode_stateid4(argp, &lgp->lg_sid);
1816 if (status)
1817 return status;
1818 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0)
1819 return nfserr_bad_xdr;
1820
1821 return nfs_ok;
1822}
1823
1824static __be32
1825nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp,
1826 union nfsd4_op_u *u)
1827{
1828 struct nfsd4_layoutreturn *lrp = &u->layoutreturn;
1829 memset(lrp, 0, sizeof(*lrp));
1830 if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0)
1831 return nfserr_bad_xdr;
1832 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0)
1833 return nfserr_bad_xdr;
1834 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0)
1835 return nfserr_bad_xdr;
1836 return nfsd4_decode_layoutreturn4(argp, lrp);
1837}
1838#endif /* CONFIG_NFSD_PNFS */
1839
1840static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1841 union nfsd4_op_u *u)
1842{
1843 struct nfsd4_secinfo_no_name *sin = &u->secinfo_no_name;
1844 if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0)
1845 return nfserr_bad_xdr;
1846
1847 sin->sin_exp = NULL;
1848 return nfs_ok;
1849}
1850
1851static __be32
1852nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1853 union nfsd4_op_u *u)
1854{
1855 struct nfsd4_sequence *seq = &u->sequence;
1856 __be32 *p, status;
1857
1858 status = nfsd4_decode_sessionid4(argp, &seq->sessionid);
1859 if (status)
1860 return status;
1861 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4);
1862 if (!p)
1863 return nfserr_bad_xdr;
1864 seq->seqid = be32_to_cpup(p++);
1865 seq->slotid = be32_to_cpup(p++);
1866 seq->maxslots = be32_to_cpup(p++);
1867 seq->cachethis = be32_to_cpup(p);
1868
1869 seq->status_flags = 0;
1870 return nfs_ok;
1871}
1872
1873static __be32
1874nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp,
1875 union nfsd4_op_u *u)
1876{
1877 struct nfsd4_test_stateid *test_stateid = &u->test_stateid;
1878 struct nfsd4_test_stateid_id *stateid;
1879 __be32 status;
1880 u32 i;
1881
1882 memset(test_stateid, 0, sizeof(*test_stateid));
1883 if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0)
1884 return nfserr_bad_xdr;
1885
1886 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1887 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1888 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
1889 if (!stateid)
1890 return nfserr_jukebox;
1891 INIT_LIST_HEAD(&stateid->ts_id_list);
1892 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1893 status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid);
1894 if (status)
1895 return status;
1896 }
1897
1898 return nfs_ok;
1899}
1900
1901static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp,
1902 union nfsd4_op_u *u)
1903{
1904 struct nfsd4_destroy_clientid *dc = &u->destroy_clientid;
1905 return nfsd4_decode_clientid4(argp, &dc->clientid);
1906}
1907
1908static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp,
1909 union nfsd4_op_u *u)
1910{
1911 struct nfsd4_reclaim_complete *rc = &u->reclaim_complete;
1912 if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0)
1913 return nfserr_bad_xdr;
1914 return nfs_ok;
1915}
1916
1917static __be32
1918nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp,
1919 union nfsd4_op_u *u)
1920{
1921 struct nfsd4_fallocate *fallocate = &u->allocate;
1922 __be32 status;
1923
1924 status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid);
1925 if (status)
1926 return status;
1927 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0)
1928 return nfserr_bad_xdr;
1929 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0)
1930 return nfserr_bad_xdr;
1931
1932 return nfs_ok;
1933}
1934
1935static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp,
1936 struct nl4_server *ns)
1937{
1938 struct nfs42_netaddr *naddr;
1939 __be32 *p;
1940
1941 if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0)
1942 return nfserr_bad_xdr;
1943
1944 /* currently support for 1 inter-server source server */
1945 switch (ns->nl4_type) {
1946 case NL4_NETADDR:
1947 naddr = &ns->u.nl4_addr;
1948
1949 if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0)
1950 return nfserr_bad_xdr;
1951 if (naddr->netid_len > RPCBIND_MAXNETIDLEN)
1952 return nfserr_bad_xdr;
1953
1954 p = xdr_inline_decode(argp->xdr, naddr->netid_len);
1955 if (!p)
1956 return nfserr_bad_xdr;
1957 memcpy(naddr->netid, p, naddr->netid_len);
1958
1959 if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0)
1960 return nfserr_bad_xdr;
1961 if (naddr->addr_len > RPCBIND_MAXUADDRLEN)
1962 return nfserr_bad_xdr;
1963
1964 p = xdr_inline_decode(argp->xdr, naddr->addr_len);
1965 if (!p)
1966 return nfserr_bad_xdr;
1967 memcpy(naddr->addr, p, naddr->addr_len);
1968 break;
1969 default:
1970 return nfserr_bad_xdr;
1971 }
1972
1973 return nfs_ok;
1974}
1975
1976static __be32
1977nfsd4_decode_copy(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
1978{
1979 struct nfsd4_copy *copy = &u->copy;
1980 u32 consecutive, i, count, sync;
1981 struct nl4_server *ns_dummy;
1982 __be32 status;
1983
1984 memset(copy, 0, sizeof(*copy));
1985 status = nfsd4_decode_stateid4(argp, ©->cp_src_stateid);
1986 if (status)
1987 return status;
1988 status = nfsd4_decode_stateid4(argp, ©->cp_dst_stateid);
1989 if (status)
1990 return status;
1991 if (xdr_stream_decode_u64(argp->xdr, ©->cp_src_pos) < 0)
1992 return nfserr_bad_xdr;
1993 if (xdr_stream_decode_u64(argp->xdr, ©->cp_dst_pos) < 0)
1994 return nfserr_bad_xdr;
1995 if (xdr_stream_decode_u64(argp->xdr, ©->cp_count) < 0)
1996 return nfserr_bad_xdr;
1997 /* ca_consecutive: we always do consecutive copies */
1998 if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0)
1999 return nfserr_bad_xdr;
2000 if (xdr_stream_decode_bool(argp->xdr, &sync) < 0)
2001 return nfserr_bad_xdr;
2002 nfsd4_copy_set_sync(copy, sync);
2003
2004 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
2005 return nfserr_bad_xdr;
2006 copy->cp_src = svcxdr_tmpalloc(argp, sizeof(*copy->cp_src));
2007 if (copy->cp_src == NULL)
2008 return nfserr_jukebox;
2009 if (count == 0) { /* intra-server copy */
2010 __set_bit(NFSD4_COPY_F_INTRA, ©->cp_flags);
2011 return nfs_ok;
2012 }
2013
2014 /* decode all the supplied server addresses but use only the first */
2015 status = nfsd4_decode_nl4_server(argp, copy->cp_src);
2016 if (status)
2017 return status;
2018
2019 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL);
2020 if (ns_dummy == NULL)
2021 return nfserr_jukebox;
2022 for (i = 0; i < count - 1; i++) {
2023 status = nfsd4_decode_nl4_server(argp, ns_dummy);
2024 if (status) {
2025 kfree(ns_dummy);
2026 return status;
2027 }
2028 }
2029 kfree(ns_dummy);
2030
2031 return nfs_ok;
2032}
2033
2034static __be32
2035nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp,
2036 union nfsd4_op_u *u)
2037{
2038 struct nfsd4_copy_notify *cn = &u->copy_notify;
2039 __be32 status;
2040
2041 memset(cn, 0, sizeof(*cn));
2042 cn->cpn_src = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_src));
2043 if (cn->cpn_src == NULL)
2044 return nfserr_jukebox;
2045 cn->cpn_dst = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_dst));
2046 if (cn->cpn_dst == NULL)
2047 return nfserr_jukebox;
2048
2049 status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid);
2050 if (status)
2051 return status;
2052 return nfsd4_decode_nl4_server(argp, cn->cpn_dst);
2053}
2054
2055static __be32
2056nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp,
2057 union nfsd4_op_u *u)
2058{
2059 struct nfsd4_offload_status *os = &u->offload_status;
2060 os->count = 0;
2061 os->status = 0;
2062 return nfsd4_decode_stateid4(argp, &os->stateid);
2063}
2064
2065static __be32
2066nfsd4_decode_seek(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
2067{
2068 struct nfsd4_seek *seek = &u->seek;
2069 __be32 status;
2070
2071 status = nfsd4_decode_stateid4(argp, &seek->seek_stateid);
2072 if (status)
2073 return status;
2074 if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0)
2075 return nfserr_bad_xdr;
2076 if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0)
2077 return nfserr_bad_xdr;
2078
2079 seek->seek_eof = 0;
2080 seek->seek_pos = 0;
2081 return nfs_ok;
2082}
2083
2084static __be32
2085nfsd4_decode_clone(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u)
2086{
2087 struct nfsd4_clone *clone = &u->clone;
2088 __be32 status;
2089
2090 status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid);
2091 if (status)
2092 return status;
2093 status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid);
2094 if (status)
2095 return status;
2096 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0)
2097 return nfserr_bad_xdr;
2098 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0)
2099 return nfserr_bad_xdr;
2100 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0)
2101 return nfserr_bad_xdr;
2102
2103 return nfs_ok;
2104}
2105
2106/*
2107 * XDR data that is more than PAGE_SIZE in size is normally part of a
2108 * read or write. However, the size of extended attributes is limited
2109 * by the maximum request size, and then further limited by the underlying
2110 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX
2111 * is 64k). Since there is no kvec- or page-based interface to xattrs,
2112 * and we're not dealing with contiguous pages, we need to do some copying.
2113 */
2114
2115/*
2116 * Decode data into buffer.
2117 */
2118static __be32
2119nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr,
2120 char **bufp, u32 buflen)
2121{
2122 struct page **pages = xdr->pages;
2123 struct kvec *head = xdr->head;
2124 char *tmp, *dp;
2125 u32 len;
2126
2127 if (buflen <= head->iov_len) {
2128 /*
2129 * We're in luck, the head has enough space. Just return
2130 * the head, no need for copying.
2131 */
2132 *bufp = head->iov_base;
2133 return 0;
2134 }
2135
2136 tmp = svcxdr_tmpalloc(argp, buflen);
2137 if (tmp == NULL)
2138 return nfserr_jukebox;
2139
2140 dp = tmp;
2141 memcpy(dp, head->iov_base, head->iov_len);
2142 buflen -= head->iov_len;
2143 dp += head->iov_len;
2144
2145 while (buflen > 0) {
2146 len = min_t(u32, buflen, PAGE_SIZE);
2147 memcpy(dp, page_address(*pages), len);
2148
2149 buflen -= len;
2150 dp += len;
2151 pages++;
2152 }
2153
2154 *bufp = tmp;
2155 return 0;
2156}
2157
2158/*
2159 * Get a user extended attribute name from the XDR buffer.
2160 * It will not have the "user." prefix, so prepend it.
2161 * Lastly, check for nul characters in the name.
2162 */
2163static __be32
2164nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep)
2165{
2166 char *name, *sp, *dp;
2167 u32 namelen, cnt;
2168 __be32 *p;
2169
2170 if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0)
2171 return nfserr_bad_xdr;
2172 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN))
2173 return nfserr_nametoolong;
2174 if (namelen == 0)
2175 return nfserr_bad_xdr;
2176 p = xdr_inline_decode(argp->xdr, namelen);
2177 if (!p)
2178 return nfserr_bad_xdr;
2179 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1);
2180 if (!name)
2181 return nfserr_jukebox;
2182 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
2183
2184 /*
2185 * Copy the extended attribute name over while checking for 0
2186 * characters.
2187 */
2188 sp = (char *)p;
2189 dp = name + XATTR_USER_PREFIX_LEN;
2190 cnt = namelen;
2191
2192 while (cnt-- > 0) {
2193 if (*sp == '\0')
2194 return nfserr_bad_xdr;
2195 *dp++ = *sp++;
2196 }
2197 *dp = '\0';
2198
2199 *namep = name;
2200
2201 return nfs_ok;
2202}
2203
2204/*
2205 * A GETXATTR op request comes without a length specifier. We just set the
2206 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum
2207 * channel reply size. nfsd_getxattr will probe the length of the xattr,
2208 * check it against getxa_len, and allocate + return the value.
2209 */
2210static __be32
2211nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp,
2212 union nfsd4_op_u *u)
2213{
2214 struct nfsd4_getxattr *getxattr = &u->getxattr;
2215 __be32 status;
2216 u32 maxcount;
2217
2218 memset(getxattr, 0, sizeof(*getxattr));
2219 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name);
2220 if (status)
2221 return status;
2222
2223 maxcount = svc_max_payload(argp->rqstp);
2224 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2225
2226 getxattr->getxa_len = maxcount;
2227 return nfs_ok;
2228}
2229
2230static __be32
2231nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp,
2232 union nfsd4_op_u *u)
2233{
2234 struct nfsd4_setxattr *setxattr = &u->setxattr;
2235 u32 flags, maxcount, size;
2236 __be32 status;
2237
2238 memset(setxattr, 0, sizeof(*setxattr));
2239
2240 if (xdr_stream_decode_u32(argp->xdr, &flags) < 0)
2241 return nfserr_bad_xdr;
2242
2243 if (flags > SETXATTR4_REPLACE)
2244 return nfserr_inval;
2245 setxattr->setxa_flags = flags;
2246
2247 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name);
2248 if (status)
2249 return status;
2250
2251 maxcount = svc_max_payload(argp->rqstp);
2252 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2253
2254 if (xdr_stream_decode_u32(argp->xdr, &size) < 0)
2255 return nfserr_bad_xdr;
2256 if (size > maxcount)
2257 return nfserr_xattr2big;
2258
2259 setxattr->setxa_len = size;
2260 if (size > 0) {
2261 struct xdr_buf payload;
2262
2263 if (!xdr_stream_subsegment(argp->xdr, &payload, size))
2264 return nfserr_bad_xdr;
2265 status = nfsd4_vbuf_from_vector(argp, &payload,
2266 &setxattr->setxa_buf, size);
2267 }
2268
2269 return nfs_ok;
2270}
2271
2272static __be32
2273nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp,
2274 union nfsd4_op_u *u)
2275{
2276 struct nfsd4_listxattrs *listxattrs = &u->listxattrs;
2277 u32 maxcount;
2278
2279 memset(listxattrs, 0, sizeof(*listxattrs));
2280
2281 if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0)
2282 return nfserr_bad_xdr;
2283
2284 /*
2285 * If the cookie is too large to have even one user.x attribute
2286 * plus trailing '\0' left in a maximum size buffer, it's invalid.
2287 */
2288 if (listxattrs->lsxa_cookie >=
2289 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2)))
2290 return nfserr_badcookie;
2291
2292 if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0)
2293 return nfserr_bad_xdr;
2294 if (maxcount < 8)
2295 /* Always need at least 2 words (length and one character) */
2296 return nfserr_inval;
2297
2298 maxcount = min(maxcount, svc_max_payload(argp->rqstp));
2299 listxattrs->lsxa_maxcount = maxcount;
2300
2301 return nfs_ok;
2302}
2303
2304static __be32
2305nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp,
2306 union nfsd4_op_u *u)
2307{
2308 struct nfsd4_removexattr *removexattr = &u->removexattr;
2309 memset(removexattr, 0, sizeof(*removexattr));
2310 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name);
2311}
2312
2313static __be32
2314nfsd4_decode_noop(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
2315{
2316 return nfs_ok;
2317}
2318
2319static __be32
2320nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p)
2321{
2322 return nfserr_notsupp;
2323}
2324
2325typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u);
2326
2327static const nfsd4_dec nfsd4_dec_ops[] = {
2328 [OP_ACCESS] = nfsd4_decode_access,
2329 [OP_CLOSE] = nfsd4_decode_close,
2330 [OP_COMMIT] = nfsd4_decode_commit,
2331 [OP_CREATE] = nfsd4_decode_create,
2332 [OP_DELEGPURGE] = nfsd4_decode_notsupp,
2333 [OP_DELEGRETURN] = nfsd4_decode_delegreturn,
2334 [OP_GETATTR] = nfsd4_decode_getattr,
2335 [OP_GETFH] = nfsd4_decode_noop,
2336 [OP_LINK] = nfsd4_decode_link,
2337 [OP_LOCK] = nfsd4_decode_lock,
2338 [OP_LOCKT] = nfsd4_decode_lockt,
2339 [OP_LOCKU] = nfsd4_decode_locku,
2340 [OP_LOOKUP] = nfsd4_decode_lookup,
2341 [OP_LOOKUPP] = nfsd4_decode_noop,
2342 [OP_NVERIFY] = nfsd4_decode_verify,
2343 [OP_OPEN] = nfsd4_decode_open,
2344 [OP_OPENATTR] = nfsd4_decode_notsupp,
2345 [OP_OPEN_CONFIRM] = nfsd4_decode_open_confirm,
2346 [OP_OPEN_DOWNGRADE] = nfsd4_decode_open_downgrade,
2347 [OP_PUTFH] = nfsd4_decode_putfh,
2348 [OP_PUTPUBFH] = nfsd4_decode_putpubfh,
2349 [OP_PUTROOTFH] = nfsd4_decode_noop,
2350 [OP_READ] = nfsd4_decode_read,
2351 [OP_READDIR] = nfsd4_decode_readdir,
2352 [OP_READLINK] = nfsd4_decode_noop,
2353 [OP_REMOVE] = nfsd4_decode_remove,
2354 [OP_RENAME] = nfsd4_decode_rename,
2355 [OP_RENEW] = nfsd4_decode_renew,
2356 [OP_RESTOREFH] = nfsd4_decode_noop,
2357 [OP_SAVEFH] = nfsd4_decode_noop,
2358 [OP_SECINFO] = nfsd4_decode_secinfo,
2359 [OP_SETATTR] = nfsd4_decode_setattr,
2360 [OP_SETCLIENTID] = nfsd4_decode_setclientid,
2361 [OP_SETCLIENTID_CONFIRM] = nfsd4_decode_setclientid_confirm,
2362 [OP_VERIFY] = nfsd4_decode_verify,
2363 [OP_WRITE] = nfsd4_decode_write,
2364 [OP_RELEASE_LOCKOWNER] = nfsd4_decode_release_lockowner,
2365
2366 /* new operations for NFSv4.1 */
2367 [OP_BACKCHANNEL_CTL] = nfsd4_decode_backchannel_ctl,
2368 [OP_BIND_CONN_TO_SESSION] = nfsd4_decode_bind_conn_to_session,
2369 [OP_EXCHANGE_ID] = nfsd4_decode_exchange_id,
2370 [OP_CREATE_SESSION] = nfsd4_decode_create_session,
2371 [OP_DESTROY_SESSION] = nfsd4_decode_destroy_session,
2372 [OP_FREE_STATEID] = nfsd4_decode_free_stateid,
2373 [OP_GET_DIR_DELEGATION] = nfsd4_decode_notsupp,
2374#ifdef CONFIG_NFSD_PNFS
2375 [OP_GETDEVICEINFO] = nfsd4_decode_getdeviceinfo,
2376 [OP_GETDEVICELIST] = nfsd4_decode_notsupp,
2377 [OP_LAYOUTCOMMIT] = nfsd4_decode_layoutcommit,
2378 [OP_LAYOUTGET] = nfsd4_decode_layoutget,
2379 [OP_LAYOUTRETURN] = nfsd4_decode_layoutreturn,
2380#else
2381 [OP_GETDEVICEINFO] = nfsd4_decode_notsupp,
2382 [OP_GETDEVICELIST] = nfsd4_decode_notsupp,
2383 [OP_LAYOUTCOMMIT] = nfsd4_decode_notsupp,
2384 [OP_LAYOUTGET] = nfsd4_decode_notsupp,
2385 [OP_LAYOUTRETURN] = nfsd4_decode_notsupp,
2386#endif
2387 [OP_SECINFO_NO_NAME] = nfsd4_decode_secinfo_no_name,
2388 [OP_SEQUENCE] = nfsd4_decode_sequence,
2389 [OP_SET_SSV] = nfsd4_decode_notsupp,
2390 [OP_TEST_STATEID] = nfsd4_decode_test_stateid,
2391 [OP_WANT_DELEGATION] = nfsd4_decode_notsupp,
2392 [OP_DESTROY_CLIENTID] = nfsd4_decode_destroy_clientid,
2393 [OP_RECLAIM_COMPLETE] = nfsd4_decode_reclaim_complete,
2394
2395 /* new operations for NFSv4.2 */
2396 [OP_ALLOCATE] = nfsd4_decode_fallocate,
2397 [OP_COPY] = nfsd4_decode_copy,
2398 [OP_COPY_NOTIFY] = nfsd4_decode_copy_notify,
2399 [OP_DEALLOCATE] = nfsd4_decode_fallocate,
2400 [OP_IO_ADVISE] = nfsd4_decode_notsupp,
2401 [OP_LAYOUTERROR] = nfsd4_decode_notsupp,
2402 [OP_LAYOUTSTATS] = nfsd4_decode_notsupp,
2403 [OP_OFFLOAD_CANCEL] = nfsd4_decode_offload_status,
2404 [OP_OFFLOAD_STATUS] = nfsd4_decode_offload_status,
2405 [OP_READ_PLUS] = nfsd4_decode_read,
2406 [OP_SEEK] = nfsd4_decode_seek,
2407 [OP_WRITE_SAME] = nfsd4_decode_notsupp,
2408 [OP_CLONE] = nfsd4_decode_clone,
2409 /* RFC 8276 extended atributes operations */
2410 [OP_GETXATTR] = nfsd4_decode_getxattr,
2411 [OP_SETXATTR] = nfsd4_decode_setxattr,
2412 [OP_LISTXATTRS] = nfsd4_decode_listxattrs,
2413 [OP_REMOVEXATTR] = nfsd4_decode_removexattr,
2414};
2415
2416static inline bool
2417nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
2418{
2419 if (op->opnum < FIRST_NFS4_OP)
2420 return false;
2421 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
2422 return false;
2423 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
2424 return false;
2425 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
2426 return false;
2427 return true;
2428}
2429
2430static bool
2431nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
2432{
2433 struct nfsd4_op *op;
2434 bool cachethis = false;
2435 int auth_slack= argp->rqstp->rq_auth_slack;
2436 int max_reply = auth_slack + 8; /* opcnt, status */
2437 int readcount = 0;
2438 int readbytes = 0;
2439 __be32 *p;
2440 int i;
2441
2442 if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0)
2443 return false;
2444 max_reply += XDR_UNIT;
2445 argp->tag = NULL;
2446 if (unlikely(argp->taglen)) {
2447 if (argp->taglen > NFSD4_MAX_TAGLEN)
2448 return false;
2449 p = xdr_inline_decode(argp->xdr, argp->taglen);
2450 if (!p)
2451 return false;
2452 argp->tag = svcxdr_savemem(argp, p, argp->taglen);
2453 if (!argp->tag)
2454 return false;
2455 max_reply += xdr_align_size(argp->taglen);
2456 }
2457
2458 if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0)
2459 return false;
2460 if (xdr_stream_decode_u32(argp->xdr, &argp->client_opcnt) < 0)
2461 return false;
2462 argp->opcnt = min_t(u32, argp->client_opcnt,
2463 NFSD_MAX_OPS_PER_COMPOUND);
2464
2465 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
2466 argp->ops = vcalloc(argp->opcnt, sizeof(*argp->ops));
2467 if (!argp->ops) {
2468 argp->ops = argp->iops;
2469 return false;
2470 }
2471 }
2472
2473 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
2474 argp->opcnt = 0;
2475
2476 for (i = 0; i < argp->opcnt; i++) {
2477 op = &argp->ops[i];
2478 op->replay = NULL;
2479
2480 if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0)
2481 return false;
2482 if (nfsd4_opnum_in_range(argp, op)) {
2483 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
2484 if (op->status != nfs_ok)
2485 trace_nfsd_compound_decode_err(argp->rqstp,
2486 argp->opcnt, i,
2487 op->opnum,
2488 op->status);
2489 } else {
2490 op->opnum = OP_ILLEGAL;
2491 op->status = nfserr_op_illegal;
2492 }
2493 op->opdesc = OPDESC(op);
2494 /*
2495 * We'll try to cache the result in the DRC if any one
2496 * op in the compound wants to be cached:
2497 */
2498 cachethis |= nfsd4_cache_this_op(op);
2499
2500 if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) {
2501 readcount++;
2502 readbytes += nfsd4_max_reply(argp->rqstp, op);
2503 } else
2504 max_reply += nfsd4_max_reply(argp->rqstp, op);
2505 /*
2506 * OP_LOCK and OP_LOCKT may return a conflicting lock.
2507 * (Special case because it will just skip encoding this
2508 * if it runs out of xdr buffer space, and it is the only
2509 * operation that behaves this way.)
2510 */
2511 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT)
2512 max_reply += NFS4_OPAQUE_LIMIT;
2513
2514 if (op->status) {
2515 argp->opcnt = i+1;
2516 break;
2517 }
2518 }
2519 /* Sessions make the DRC unnecessary: */
2520 if (argp->minorversion)
2521 cachethis = false;
2522 svc_reserve(argp->rqstp, max_reply + readbytes);
2523 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
2524
2525 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
2526 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags);
2527
2528 return true;
2529}
2530
2531static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode,
2532 struct svc_export *exp)
2533{
2534 if (exp->ex_flags & NFSEXP_V4ROOT) {
2535 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time));
2536 *p++ = 0;
2537 } else
2538 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode));
2539 return p;
2540}
2541
2542/*
2543 * ctime (in NFSv4, time_metadata) is not writeable, and the client
2544 * doesn't really care what resolution could theoretically be stored by
2545 * the filesystem.
2546 *
2547 * The client cares how close together changes can be while still
2548 * guaranteeing ctime changes. For most filesystems (which have
2549 * timestamps with nanosecond fields) that is limited by the resolution
2550 * of the time returned from current_time() (which I'm assuming to be
2551 * 1/HZ).
2552 */
2553static __be32 *encode_time_delta(__be32 *p, struct inode *inode)
2554{
2555 struct timespec64 ts;
2556 u32 ns;
2557
2558 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran);
2559 ts = ns_to_timespec64(ns);
2560
2561 p = xdr_encode_hyper(p, ts.tv_sec);
2562 *p++ = cpu_to_be32(ts.tv_nsec);
2563
2564 return p;
2565}
2566
2567static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
2568{
2569 *p++ = cpu_to_be32(c->atomic);
2570 p = xdr_encode_hyper(p, c->before_change);
2571 p = xdr_encode_hyper(p, c->after_change);
2572 return p;
2573}
2574
2575/* Encode as an array of strings the string given with components
2576 * separated @sep, escaped with esc_enter and esc_exit.
2577 */
2578static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
2579 char *components, char esc_enter,
2580 char esc_exit)
2581{
2582 __be32 *p;
2583 __be32 pathlen;
2584 int pathlen_offset;
2585 int strlen, count=0;
2586 char *str, *end, *next;
2587
2588 dprintk("nfsd4_encode_components(%s)\n", components);
2589
2590 pathlen_offset = xdr->buf->len;
2591 p = xdr_reserve_space(xdr, 4);
2592 if (!p)
2593 return nfserr_resource;
2594 p++; /* We will fill this in with @count later */
2595
2596 end = str = components;
2597 while (*end) {
2598 bool found_esc = false;
2599
2600 /* try to parse as esc_start, ..., esc_end, sep */
2601 if (*str == esc_enter) {
2602 for (; *end && (*end != esc_exit); end++)
2603 /* find esc_exit or end of string */;
2604 next = end + 1;
2605 if (*end && (!*next || *next == sep)) {
2606 str++;
2607 found_esc = true;
2608 }
2609 }
2610
2611 if (!found_esc)
2612 for (; *end && (*end != sep); end++)
2613 /* find sep or end of string */;
2614
2615 strlen = end - str;
2616 if (strlen) {
2617 p = xdr_reserve_space(xdr, strlen + 4);
2618 if (!p)
2619 return nfserr_resource;
2620 p = xdr_encode_opaque(p, str, strlen);
2621 count++;
2622 }
2623 else
2624 end++;
2625 if (found_esc)
2626 end = next;
2627
2628 str = end;
2629 }
2630 pathlen = htonl(count);
2631 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
2632 return 0;
2633}
2634
2635/* Encode as an array of strings the string given with components
2636 * separated @sep.
2637 */
2638static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
2639 char *components)
2640{
2641 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
2642}
2643
2644/*
2645 * encode a location element of a fs_locations structure
2646 */
2647static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
2648 struct nfsd4_fs_location *location)
2649{
2650 __be32 status;
2651
2652 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
2653 '[', ']');
2654 if (status)
2655 return status;
2656 status = nfsd4_encode_components(xdr, '/', location->path);
2657 if (status)
2658 return status;
2659 return 0;
2660}
2661
2662/*
2663 * Encode a path in RFC3530 'pathname4' format
2664 */
2665static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
2666 const struct path *root,
2667 const struct path *path)
2668{
2669 struct path cur = *path;
2670 __be32 *p;
2671 struct dentry **components = NULL;
2672 unsigned int ncomponents = 0;
2673 __be32 err = nfserr_jukebox;
2674
2675 dprintk("nfsd4_encode_components(");
2676
2677 path_get(&cur);
2678 /* First walk the path up to the nfsd root, and store the
2679 * dentries/path components in an array.
2680 */
2681 for (;;) {
2682 if (path_equal(&cur, root))
2683 break;
2684 if (cur.dentry == cur.mnt->mnt_root) {
2685 if (follow_up(&cur))
2686 continue;
2687 goto out_free;
2688 }
2689 if ((ncomponents & 15) == 0) {
2690 struct dentry **new;
2691 new = krealloc(components,
2692 sizeof(*new) * (ncomponents + 16),
2693 GFP_KERNEL);
2694 if (!new)
2695 goto out_free;
2696 components = new;
2697 }
2698 components[ncomponents++] = cur.dentry;
2699 cur.dentry = dget_parent(cur.dentry);
2700 }
2701 err = nfserr_resource;
2702 p = xdr_reserve_space(xdr, 4);
2703 if (!p)
2704 goto out_free;
2705 *p++ = cpu_to_be32(ncomponents);
2706
2707 while (ncomponents) {
2708 struct dentry *dentry = components[ncomponents - 1];
2709 unsigned int len;
2710
2711 spin_lock(&dentry->d_lock);
2712 len = dentry->d_name.len;
2713 p = xdr_reserve_space(xdr, len + 4);
2714 if (!p) {
2715 spin_unlock(&dentry->d_lock);
2716 goto out_free;
2717 }
2718 p = xdr_encode_opaque(p, dentry->d_name.name, len);
2719 dprintk("/%pd", dentry);
2720 spin_unlock(&dentry->d_lock);
2721 dput(dentry);
2722 ncomponents--;
2723 }
2724
2725 err = 0;
2726out_free:
2727 dprintk(")\n");
2728 while (ncomponents)
2729 dput(components[--ncomponents]);
2730 kfree(components);
2731 path_put(&cur);
2732 return err;
2733}
2734
2735static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
2736 struct svc_rqst *rqstp, const struct path *path)
2737{
2738 struct svc_export *exp_ps;
2739 __be32 res;
2740
2741 exp_ps = rqst_find_fsidzero_export(rqstp);
2742 if (IS_ERR(exp_ps))
2743 return nfserrno(PTR_ERR(exp_ps));
2744 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
2745 exp_put(exp_ps);
2746 return res;
2747}
2748
2749/*
2750 * encode a fs_locations structure
2751 */
2752static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
2753 struct svc_rqst *rqstp, struct svc_export *exp)
2754{
2755 __be32 status;
2756 int i;
2757 __be32 *p;
2758 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
2759
2760 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
2761 if (status)
2762 return status;
2763 p = xdr_reserve_space(xdr, 4);
2764 if (!p)
2765 return nfserr_resource;
2766 *p++ = cpu_to_be32(fslocs->locations_count);
2767 for (i=0; i<fslocs->locations_count; i++) {
2768 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
2769 if (status)
2770 return status;
2771 }
2772 return 0;
2773}
2774
2775static u32 nfs4_file_type(umode_t mode)
2776{
2777 switch (mode & S_IFMT) {
2778 case S_IFIFO: return NF4FIFO;
2779 case S_IFCHR: return NF4CHR;
2780 case S_IFDIR: return NF4DIR;
2781 case S_IFBLK: return NF4BLK;
2782 case S_IFLNK: return NF4LNK;
2783 case S_IFREG: return NF4REG;
2784 case S_IFSOCK: return NF4SOCK;
2785 default: return NF4BAD;
2786 }
2787}
2788
2789static inline __be32
2790nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2791 struct nfs4_ace *ace)
2792{
2793 if (ace->whotype != NFS4_ACL_WHO_NAMED)
2794 return nfs4_acl_write_who(xdr, ace->whotype);
2795 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
2796 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
2797 else
2798 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
2799}
2800
2801static inline __be32
2802nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types)
2803{
2804 __be32 *p;
2805 unsigned long i = hweight_long(layout_types);
2806
2807 p = xdr_reserve_space(xdr, 4 + 4 * i);
2808 if (!p)
2809 return nfserr_resource;
2810
2811 *p++ = cpu_to_be32(i);
2812
2813 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i)
2814 if (layout_types & (1 << i))
2815 *p++ = cpu_to_be32(i);
2816
2817 return 0;
2818}
2819
2820#define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
2821 FATTR4_WORD0_RDATTR_ERROR)
2822#define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2823#define WORD2_ABSENT_FS_ATTRS 0
2824
2825#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2826static inline __be32
2827nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2828 void *context, int len)
2829{
2830 __be32 *p;
2831
2832 p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
2833 if (!p)
2834 return nfserr_resource;
2835
2836 /*
2837 * For now we use a 0 here to indicate the null translation; in
2838 * the future we may place a call to translation code here.
2839 */
2840 *p++ = cpu_to_be32(0); /* lfs */
2841 *p++ = cpu_to_be32(0); /* pi */
2842 p = xdr_encode_opaque(p, context, len);
2843 return 0;
2844}
2845#else
2846static inline __be32
2847nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2848 void *context, int len)
2849{ return 0; }
2850#endif
2851
2852static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err)
2853{
2854 /* As per referral draft: */
2855 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2856 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2857 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2858 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2859 *rdattr_err = NFSERR_MOVED;
2860 else
2861 return nfserr_moved;
2862 }
2863 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
2864 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
2865 *bmval2 &= WORD2_ABSENT_FS_ATTRS;
2866 return 0;
2867}
2868
2869
2870static int nfsd4_get_mounted_on_ino(struct svc_export *exp, u64 *pino)
2871{
2872 struct path path = exp->ex_path;
2873 struct kstat stat;
2874 int err;
2875
2876 path_get(&path);
2877 while (follow_up(&path)) {
2878 if (path.dentry != path.mnt->mnt_root)
2879 break;
2880 }
2881 err = vfs_getattr(&path, &stat, STATX_INO, AT_STATX_SYNC_AS_STAT);
2882 path_put(&path);
2883 if (!err)
2884 *pino = stat.ino;
2885 return err;
2886}
2887
2888static __be32
2889nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2)
2890{
2891 __be32 *p;
2892
2893 if (bmval2) {
2894 p = xdr_reserve_space(xdr, 16);
2895 if (!p)
2896 goto out_resource;
2897 *p++ = cpu_to_be32(3);
2898 *p++ = cpu_to_be32(bmval0);
2899 *p++ = cpu_to_be32(bmval1);
2900 *p++ = cpu_to_be32(bmval2);
2901 } else if (bmval1) {
2902 p = xdr_reserve_space(xdr, 12);
2903 if (!p)
2904 goto out_resource;
2905 *p++ = cpu_to_be32(2);
2906 *p++ = cpu_to_be32(bmval0);
2907 *p++ = cpu_to_be32(bmval1);
2908 } else {
2909 p = xdr_reserve_space(xdr, 8);
2910 if (!p)
2911 goto out_resource;
2912 *p++ = cpu_to_be32(1);
2913 *p++ = cpu_to_be32(bmval0);
2914 }
2915
2916 return 0;
2917out_resource:
2918 return nfserr_resource;
2919}
2920
2921/*
2922 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2923 * ourselves.
2924 */
2925static __be32
2926nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2927 struct svc_export *exp,
2928 struct dentry *dentry, u32 *bmval,
2929 struct svc_rqst *rqstp, int ignore_crossmnt)
2930{
2931 u32 bmval0 = bmval[0];
2932 u32 bmval1 = bmval[1];
2933 u32 bmval2 = bmval[2];
2934 struct kstat stat;
2935 struct svc_fh *tempfh = NULL;
2936 struct kstatfs statfs;
2937 __be32 *p, *attrlen_p;
2938 int starting_len = xdr->buf->len;
2939 int attrlen_offset;
2940 u32 dummy;
2941 u64 dummy64;
2942 u32 rdattr_err = 0;
2943 __be32 status;
2944 int err;
2945 struct nfs4_acl *acl = NULL;
2946#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2947 void *context = NULL;
2948 int contextlen;
2949#endif
2950 bool contextsupport = false;
2951 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2952 u32 minorversion = resp->cstate.minorversion;
2953 struct path path = {
2954 .mnt = exp->ex_path.mnt,
2955 .dentry = dentry,
2956 };
2957 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2958
2959 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2960 BUG_ON(!nfsd_attrs_supported(minorversion, bmval));
2961
2962 if (exp->ex_fslocs.migrated) {
2963 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err);
2964 if (status)
2965 goto out;
2966 }
2967
2968 err = vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
2969 if (err)
2970 goto out_nfserr;
2971 if (!(stat.result_mask & STATX_BTIME))
2972 /* underlying FS does not offer btime so we can't share it */
2973 bmval1 &= ~FATTR4_WORD1_TIME_CREATE;
2974 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2975 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2976 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2977 FATTR4_WORD1_SPACE_TOTAL))) {
2978 err = vfs_statfs(&path, &statfs);
2979 if (err)
2980 goto out_nfserr;
2981 }
2982 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2983 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2984 status = nfserr_jukebox;
2985 if (!tempfh)
2986 goto out;
2987 fh_init(tempfh, NFS4_FHSIZE);
2988 status = fh_compose(tempfh, exp, dentry, NULL);
2989 if (status)
2990 goto out;
2991 fhp = tempfh;
2992 }
2993 if (bmval0 & FATTR4_WORD0_ACL) {
2994 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2995 if (err == -EOPNOTSUPP)
2996 bmval0 &= ~FATTR4_WORD0_ACL;
2997 else if (err == -EINVAL) {
2998 status = nfserr_attrnotsupp;
2999 goto out;
3000 } else if (err != 0)
3001 goto out_nfserr;
3002 }
3003
3004#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3005 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) ||
3006 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
3007 if (exp->ex_flags & NFSEXP_SECURITY_LABEL)
3008 err = security_inode_getsecctx(d_inode(dentry),
3009 &context, &contextlen);
3010 else
3011 err = -EOPNOTSUPP;
3012 contextsupport = (err == 0);
3013 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3014 if (err == -EOPNOTSUPP)
3015 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
3016 else if (err)
3017 goto out_nfserr;
3018 }
3019 }
3020#endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3021
3022 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2);
3023 if (status)
3024 goto out;
3025
3026 attrlen_offset = xdr->buf->len;
3027 attrlen_p = xdr_reserve_space(xdr, XDR_UNIT);
3028 if (!attrlen_p)
3029 goto out_resource;
3030
3031 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
3032 u32 supp[3];
3033
3034 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3035
3036 if (!IS_POSIXACL(dentry->d_inode))
3037 supp[0] &= ~FATTR4_WORD0_ACL;
3038 if (!contextsupport)
3039 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
3040 if (!supp[2]) {
3041 p = xdr_reserve_space(xdr, 12);
3042 if (!p)
3043 goto out_resource;
3044 *p++ = cpu_to_be32(2);
3045 *p++ = cpu_to_be32(supp[0]);
3046 *p++ = cpu_to_be32(supp[1]);
3047 } else {
3048 p = xdr_reserve_space(xdr, 16);
3049 if (!p)
3050 goto out_resource;
3051 *p++ = cpu_to_be32(3);
3052 *p++ = cpu_to_be32(supp[0]);
3053 *p++ = cpu_to_be32(supp[1]);
3054 *p++ = cpu_to_be32(supp[2]);
3055 }
3056 }
3057 if (bmval0 & FATTR4_WORD0_TYPE) {
3058 p = xdr_reserve_space(xdr, 4);
3059 if (!p)
3060 goto out_resource;
3061 dummy = nfs4_file_type(stat.mode);
3062 if (dummy == NF4BAD) {
3063 status = nfserr_serverfault;
3064 goto out;
3065 }
3066 *p++ = cpu_to_be32(dummy);
3067 }
3068 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
3069 p = xdr_reserve_space(xdr, 4);
3070 if (!p)
3071 goto out_resource;
3072 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
3073 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
3074 else
3075 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
3076 NFS4_FH_VOL_RENAME);
3077 }
3078 if (bmval0 & FATTR4_WORD0_CHANGE) {
3079 p = xdr_reserve_space(xdr, 8);
3080 if (!p)
3081 goto out_resource;
3082 p = encode_change(p, &stat, d_inode(dentry), exp);
3083 }
3084 if (bmval0 & FATTR4_WORD0_SIZE) {
3085 p = xdr_reserve_space(xdr, 8);
3086 if (!p)
3087 goto out_resource;
3088 p = xdr_encode_hyper(p, stat.size);
3089 }
3090 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
3091 p = xdr_reserve_space(xdr, 4);
3092 if (!p)
3093 goto out_resource;
3094 *p++ = cpu_to_be32(1);
3095 }
3096 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
3097 p = xdr_reserve_space(xdr, 4);
3098 if (!p)
3099 goto out_resource;
3100 *p++ = cpu_to_be32(1);
3101 }
3102 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
3103 p = xdr_reserve_space(xdr, 4);
3104 if (!p)
3105 goto out_resource;
3106 *p++ = cpu_to_be32(0);
3107 }
3108 if (bmval0 & FATTR4_WORD0_FSID) {
3109 p = xdr_reserve_space(xdr, 16);
3110 if (!p)
3111 goto out_resource;
3112 if (exp->ex_fslocs.migrated) {
3113 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
3114 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
3115 } else switch(fsid_source(fhp)) {
3116 case FSIDSOURCE_FSID:
3117 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
3118 p = xdr_encode_hyper(p, (u64)0);
3119 break;
3120 case FSIDSOURCE_DEV:
3121 *p++ = cpu_to_be32(0);
3122 *p++ = cpu_to_be32(MAJOR(stat.dev));
3123 *p++ = cpu_to_be32(0);
3124 *p++ = cpu_to_be32(MINOR(stat.dev));
3125 break;
3126 case FSIDSOURCE_UUID:
3127 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
3128 EX_UUID_LEN);
3129 break;
3130 }
3131 }
3132 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
3133 p = xdr_reserve_space(xdr, 4);
3134 if (!p)
3135 goto out_resource;
3136 *p++ = cpu_to_be32(0);
3137 }
3138 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
3139 p = xdr_reserve_space(xdr, 4);
3140 if (!p)
3141 goto out_resource;
3142 *p++ = cpu_to_be32(nn->nfsd4_lease);
3143 }
3144 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
3145 p = xdr_reserve_space(xdr, 4);
3146 if (!p)
3147 goto out_resource;
3148 *p++ = cpu_to_be32(rdattr_err);
3149 }
3150 if (bmval0 & FATTR4_WORD0_ACL) {
3151 struct nfs4_ace *ace;
3152
3153 if (acl == NULL) {
3154 p = xdr_reserve_space(xdr, 4);
3155 if (!p)
3156 goto out_resource;
3157
3158 *p++ = cpu_to_be32(0);
3159 goto out_acl;
3160 }
3161 p = xdr_reserve_space(xdr, 4);
3162 if (!p)
3163 goto out_resource;
3164 *p++ = cpu_to_be32(acl->naces);
3165
3166 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
3167 p = xdr_reserve_space(xdr, 4*3);
3168 if (!p)
3169 goto out_resource;
3170 *p++ = cpu_to_be32(ace->type);
3171 *p++ = cpu_to_be32(ace->flag);
3172 *p++ = cpu_to_be32(ace->access_mask &
3173 NFS4_ACE_MASK_ALL);
3174 status = nfsd4_encode_aclname(xdr, rqstp, ace);
3175 if (status)
3176 goto out;
3177 }
3178 }
3179out_acl:
3180 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
3181 p = xdr_reserve_space(xdr, 4);
3182 if (!p)
3183 goto out_resource;
3184 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ?
3185 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
3186 }
3187 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
3188 p = xdr_reserve_space(xdr, 4);
3189 if (!p)
3190 goto out_resource;
3191 *p++ = cpu_to_be32(1);
3192 }
3193 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
3194 p = xdr_reserve_space(xdr, 4);
3195 if (!p)
3196 goto out_resource;
3197 *p++ = cpu_to_be32(0);
3198 }
3199 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
3200 p = xdr_reserve_space(xdr, 4);
3201 if (!p)
3202 goto out_resource;
3203 *p++ = cpu_to_be32(1);
3204 }
3205 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
3206 p = xdr_reserve_space(xdr, 4);
3207 if (!p)
3208 goto out_resource;
3209 *p++ = cpu_to_be32(1);
3210 }
3211 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
3212 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
3213 if (!p)
3214 goto out_resource;
3215 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw,
3216 fhp->fh_handle.fh_size);
3217 }
3218 if (bmval0 & FATTR4_WORD0_FILEID) {
3219 p = xdr_reserve_space(xdr, 8);
3220 if (!p)
3221 goto out_resource;
3222 p = xdr_encode_hyper(p, stat.ino);
3223 }
3224 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
3225 p = xdr_reserve_space(xdr, 8);
3226 if (!p)
3227 goto out_resource;
3228 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3229 }
3230 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
3231 p = xdr_reserve_space(xdr, 8);
3232 if (!p)
3233 goto out_resource;
3234 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3235 }
3236 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
3237 p = xdr_reserve_space(xdr, 8);
3238 if (!p)
3239 goto out_resource;
3240 p = xdr_encode_hyper(p, (u64) statfs.f_files);
3241 }
3242 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
3243 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
3244 if (status)
3245 goto out;
3246 }
3247 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
3248 p = xdr_reserve_space(xdr, 4);
3249 if (!p)
3250 goto out_resource;
3251 *p++ = cpu_to_be32(1);
3252 }
3253 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
3254 p = xdr_reserve_space(xdr, 8);
3255 if (!p)
3256 goto out_resource;
3257 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
3258 }
3259 if (bmval0 & FATTR4_WORD0_MAXLINK) {
3260 p = xdr_reserve_space(xdr, 4);
3261 if (!p)
3262 goto out_resource;
3263 *p++ = cpu_to_be32(255);
3264 }
3265 if (bmval0 & FATTR4_WORD0_MAXNAME) {
3266 p = xdr_reserve_space(xdr, 4);
3267 if (!p)
3268 goto out_resource;
3269 *p++ = cpu_to_be32(statfs.f_namelen);
3270 }
3271 if (bmval0 & FATTR4_WORD0_MAXREAD) {
3272 p = xdr_reserve_space(xdr, 8);
3273 if (!p)
3274 goto out_resource;
3275 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3276 }
3277 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
3278 p = xdr_reserve_space(xdr, 8);
3279 if (!p)
3280 goto out_resource;
3281 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3282 }
3283 if (bmval1 & FATTR4_WORD1_MODE) {
3284 p = xdr_reserve_space(xdr, 4);
3285 if (!p)
3286 goto out_resource;
3287 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
3288 }
3289 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
3290 p = xdr_reserve_space(xdr, 4);
3291 if (!p)
3292 goto out_resource;
3293 *p++ = cpu_to_be32(1);
3294 }
3295 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
3296 p = xdr_reserve_space(xdr, 4);
3297 if (!p)
3298 goto out_resource;
3299 *p++ = cpu_to_be32(stat.nlink);
3300 }
3301 if (bmval1 & FATTR4_WORD1_OWNER) {
3302 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
3303 if (status)
3304 goto out;
3305 }
3306 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
3307 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
3308 if (status)
3309 goto out;
3310 }
3311 if (bmval1 & FATTR4_WORD1_RAWDEV) {
3312 p = xdr_reserve_space(xdr, 8);
3313 if (!p)
3314 goto out_resource;
3315 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
3316 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
3317 }
3318 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
3319 p = xdr_reserve_space(xdr, 8);
3320 if (!p)
3321 goto out_resource;
3322 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
3323 p = xdr_encode_hyper(p, dummy64);
3324 }
3325 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
3326 p = xdr_reserve_space(xdr, 8);
3327 if (!p)
3328 goto out_resource;
3329 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
3330 p = xdr_encode_hyper(p, dummy64);
3331 }
3332 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
3333 p = xdr_reserve_space(xdr, 8);
3334 if (!p)
3335 goto out_resource;
3336 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
3337 p = xdr_encode_hyper(p, dummy64);
3338 }
3339 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
3340 p = xdr_reserve_space(xdr, 8);
3341 if (!p)
3342 goto out_resource;
3343 dummy64 = (u64)stat.blocks << 9;
3344 p = xdr_encode_hyper(p, dummy64);
3345 }
3346 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
3347 p = xdr_reserve_space(xdr, 12);
3348 if (!p)
3349 goto out_resource;
3350 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
3351 *p++ = cpu_to_be32(stat.atime.tv_nsec);
3352 }
3353 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
3354 p = xdr_reserve_space(xdr, 12);
3355 if (!p)
3356 goto out_resource;
3357 p = encode_time_delta(p, d_inode(dentry));
3358 }
3359 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
3360 p = xdr_reserve_space(xdr, 12);
3361 if (!p)
3362 goto out_resource;
3363 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
3364 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
3365 }
3366 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
3367 p = xdr_reserve_space(xdr, 12);
3368 if (!p)
3369 goto out_resource;
3370 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
3371 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
3372 }
3373 if (bmval1 & FATTR4_WORD1_TIME_CREATE) {
3374 p = xdr_reserve_space(xdr, 12);
3375 if (!p)
3376 goto out_resource;
3377 p = xdr_encode_hyper(p, (s64)stat.btime.tv_sec);
3378 *p++ = cpu_to_be32(stat.btime.tv_nsec);
3379 }
3380 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
3381 u64 ino = stat.ino;
3382
3383 p = xdr_reserve_space(xdr, 8);
3384 if (!p)
3385 goto out_resource;
3386 /*
3387 * Get ino of mountpoint in parent filesystem, if not ignoring
3388 * crossmount and this is the root of a cross-mounted
3389 * filesystem.
3390 */
3391 if (ignore_crossmnt == 0 &&
3392 dentry == exp->ex_path.mnt->mnt_root) {
3393 err = nfsd4_get_mounted_on_ino(exp, &ino);
3394 if (err)
3395 goto out_nfserr;
3396 }
3397 p = xdr_encode_hyper(p, ino);
3398 }
3399#ifdef CONFIG_NFSD_PNFS
3400 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) {
3401 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3402 if (status)
3403 goto out;
3404 }
3405
3406 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) {
3407 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3408 if (status)
3409 goto out;
3410 }
3411
3412 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) {
3413 p = xdr_reserve_space(xdr, 4);
3414 if (!p)
3415 goto out_resource;
3416 *p++ = cpu_to_be32(stat.blksize);
3417 }
3418#endif /* CONFIG_NFSD_PNFS */
3419 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
3420 u32 supp[3];
3421
3422 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3423 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0;
3424 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1;
3425 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2;
3426
3427 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]);
3428 if (status)
3429 goto out;
3430 }
3431
3432#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3433 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3434 status = nfsd4_encode_security_label(xdr, rqstp, context,
3435 contextlen);
3436 if (status)
3437 goto out;
3438 }
3439#endif
3440
3441 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) {
3442 p = xdr_reserve_space(xdr, 4);
3443 if (!p)
3444 goto out_resource;
3445 err = xattr_supported_namespace(d_inode(dentry),
3446 XATTR_USER_PREFIX);
3447 *p++ = cpu_to_be32(err == 0);
3448 }
3449
3450 *attrlen_p = cpu_to_be32(xdr->buf->len - attrlen_offset - XDR_UNIT);
3451 status = nfs_ok;
3452
3453out:
3454#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3455 if (context)
3456 security_release_secctx(context, contextlen);
3457#endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3458 kfree(acl);
3459 if (tempfh) {
3460 fh_put(tempfh);
3461 kfree(tempfh);
3462 }
3463 if (status)
3464 xdr_truncate_encode(xdr, starting_len);
3465 return status;
3466out_nfserr:
3467 status = nfserrno(err);
3468 goto out;
3469out_resource:
3470 status = nfserr_resource;
3471 goto out;
3472}
3473
3474static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
3475 struct xdr_buf *buf, __be32 *p, int bytes)
3476{
3477 xdr->scratch.iov_len = 0;
3478 memset(buf, 0, sizeof(struct xdr_buf));
3479 buf->head[0].iov_base = p;
3480 buf->head[0].iov_len = 0;
3481 buf->len = 0;
3482 xdr->buf = buf;
3483 xdr->iov = buf->head;
3484 xdr->p = p;
3485 xdr->end = (void *)p + bytes;
3486 buf->buflen = bytes;
3487}
3488
3489__be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
3490 struct svc_fh *fhp, struct svc_export *exp,
3491 struct dentry *dentry, u32 *bmval,
3492 struct svc_rqst *rqstp, int ignore_crossmnt)
3493{
3494 struct xdr_buf dummy;
3495 struct xdr_stream xdr;
3496 __be32 ret;
3497
3498 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
3499 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
3500 ignore_crossmnt);
3501 *p = xdr.p;
3502 return ret;
3503}
3504
3505static inline int attributes_need_mount(u32 *bmval)
3506{
3507 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
3508 return 1;
3509 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
3510 return 1;
3511 return 0;
3512}
3513
3514static __be32
3515nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
3516 const char *name, int namlen)
3517{
3518 struct svc_export *exp = cd->rd_fhp->fh_export;
3519 struct dentry *dentry;
3520 __be32 nfserr;
3521 int ignore_crossmnt = 0;
3522
3523 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen);
3524 if (IS_ERR(dentry))
3525 return nfserrno(PTR_ERR(dentry));
3526
3527 exp_get(exp);
3528 /*
3529 * In the case of a mountpoint, the client may be asking for
3530 * attributes that are only properties of the underlying filesystem
3531 * as opposed to the cross-mounted file system. In such a case,
3532 * we will not follow the cross mount and will fill the attribtutes
3533 * directly from the mountpoint dentry.
3534 */
3535 if (nfsd_mountpoint(dentry, exp)) {
3536 int err;
3537
3538 if (!(exp->ex_flags & NFSEXP_V4ROOT)
3539 && !attributes_need_mount(cd->rd_bmval)) {
3540 ignore_crossmnt = 1;
3541 goto out_encode;
3542 }
3543 /*
3544 * Why the heck aren't we just using nfsd_lookup??
3545 * Different "."/".." handling? Something else?
3546 * At least, add a comment here to explain....
3547 */
3548 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
3549 if (err) {
3550 nfserr = nfserrno(err);
3551 goto out_put;
3552 }
3553 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
3554 if (nfserr)
3555 goto out_put;
3556
3557 }
3558out_encode:
3559 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
3560 cd->rd_rqstp, ignore_crossmnt);
3561out_put:
3562 dput(dentry);
3563 exp_put(exp);
3564 return nfserr;
3565}
3566
3567static __be32 *
3568nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
3569{
3570 __be32 *p;
3571
3572 p = xdr_reserve_space(xdr, 20);
3573 if (!p)
3574 return NULL;
3575 *p++ = htonl(2);
3576 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
3577 *p++ = htonl(0); /* bmval1 */
3578
3579 *p++ = htonl(4); /* attribute length */
3580 *p++ = nfserr; /* no htonl */
3581 return p;
3582}
3583
3584static int
3585nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
3586 loff_t offset, u64 ino, unsigned int d_type)
3587{
3588 struct readdir_cd *ccd = ccdv;
3589 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
3590 struct xdr_stream *xdr = cd->xdr;
3591 int start_offset = xdr->buf->len;
3592 int cookie_offset;
3593 u32 name_and_cookie;
3594 int entry_bytes;
3595 __be32 nfserr = nfserr_toosmall;
3596 __be64 wire_offset;
3597 __be32 *p;
3598
3599 /* In nfsv4, "." and ".." never make it onto the wire.. */
3600 if (name && isdotent(name, namlen)) {
3601 cd->common.err = nfs_ok;
3602 return 0;
3603 }
3604
3605 if (cd->cookie_offset) {
3606 wire_offset = cpu_to_be64(offset);
3607 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
3608 &wire_offset, 8);
3609 }
3610
3611 p = xdr_reserve_space(xdr, 4);
3612 if (!p)
3613 goto fail;
3614 *p++ = xdr_one; /* mark entry present */
3615 cookie_offset = xdr->buf->len;
3616 p = xdr_reserve_space(xdr, 3*4 + namlen);
3617 if (!p)
3618 goto fail;
3619 p = xdr_encode_hyper(p, OFFSET_MAX); /* offset of next entry */
3620 p = xdr_encode_array(p, name, namlen); /* name length & name */
3621
3622 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
3623 switch (nfserr) {
3624 case nfs_ok:
3625 break;
3626 case nfserr_resource:
3627 nfserr = nfserr_toosmall;
3628 goto fail;
3629 case nfserr_noent:
3630 xdr_truncate_encode(xdr, start_offset);
3631 goto skip_entry;
3632 case nfserr_jukebox:
3633 /*
3634 * The pseudoroot should only display dentries that lead to
3635 * exports. If we get EJUKEBOX here, then we can't tell whether
3636 * this entry should be included. Just fail the whole READDIR
3637 * with NFS4ERR_DELAY in that case, and hope that the situation
3638 * will resolve itself by the client's next attempt.
3639 */
3640 if (cd->rd_fhp->fh_export->ex_flags & NFSEXP_V4ROOT)
3641 goto fail;
3642 fallthrough;
3643 default:
3644 /*
3645 * If the client requested the RDATTR_ERROR attribute,
3646 * we stuff the error code into this attribute
3647 * and continue. If this attribute was not requested,
3648 * then in accordance with the spec, we fail the
3649 * entire READDIR operation(!)
3650 */
3651 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
3652 goto fail;
3653 p = nfsd4_encode_rdattr_error(xdr, nfserr);
3654 if (p == NULL) {
3655 nfserr = nfserr_toosmall;
3656 goto fail;
3657 }
3658 }
3659 nfserr = nfserr_toosmall;
3660 entry_bytes = xdr->buf->len - start_offset;
3661 if (entry_bytes > cd->rd_maxcount)
3662 goto fail;
3663 cd->rd_maxcount -= entry_bytes;
3664 /*
3665 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and
3666 * notes that it could be zero. If it is zero, then the server
3667 * should enforce only the rd_maxcount value.
3668 */
3669 if (cd->rd_dircount) {
3670 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
3671 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
3672 goto fail;
3673 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
3674 if (!cd->rd_dircount)
3675 cd->rd_maxcount = 0;
3676 }
3677
3678 cd->cookie_offset = cookie_offset;
3679skip_entry:
3680 cd->common.err = nfs_ok;
3681 return 0;
3682fail:
3683 xdr_truncate_encode(xdr, start_offset);
3684 cd->common.err = nfserr;
3685 return -EINVAL;
3686}
3687
3688static __be32
3689nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
3690{
3691 __be32 *p;
3692
3693 p = xdr_reserve_space(xdr, sizeof(stateid_t));
3694 if (!p)
3695 return nfserr_resource;
3696 *p++ = cpu_to_be32(sid->si_generation);
3697 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
3698 sizeof(stateid_opaque_t));
3699 return 0;
3700}
3701
3702static __be32
3703nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr,
3704 union nfsd4_op_u *u)
3705{
3706 struct nfsd4_access *access = &u->access;
3707 struct xdr_stream *xdr = resp->xdr;
3708 __be32 *p;
3709
3710 p = xdr_reserve_space(xdr, 8);
3711 if (!p)
3712 return nfserr_resource;
3713 *p++ = cpu_to_be32(access->ac_supported);
3714 *p++ = cpu_to_be32(access->ac_resp_access);
3715 return 0;
3716}
3717
3718static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3719 union nfsd4_op_u *u)
3720{
3721 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session;
3722 struct xdr_stream *xdr = resp->xdr;
3723 __be32 *p;
3724
3725 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
3726 if (!p)
3727 return nfserr_resource;
3728 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
3729 NFS4_MAX_SESSIONID_LEN);
3730 *p++ = cpu_to_be32(bcts->dir);
3731 /* Upshifting from TCP to RDMA is not supported */
3732 *p++ = cpu_to_be32(0);
3733 return 0;
3734}
3735
3736static __be32
3737nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr,
3738 union nfsd4_op_u *u)
3739{
3740 struct nfsd4_close *close = &u->close;
3741 struct xdr_stream *xdr = resp->xdr;
3742
3743 return nfsd4_encode_stateid(xdr, &close->cl_stateid);
3744}
3745
3746
3747static __be32
3748nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr,
3749 union nfsd4_op_u *u)
3750{
3751 struct nfsd4_commit *commit = &u->commit;
3752 struct xdr_stream *xdr = resp->xdr;
3753 __be32 *p;
3754
3755 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3756 if (!p)
3757 return nfserr_resource;
3758 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
3759 NFS4_VERIFIER_SIZE);
3760 return 0;
3761}
3762
3763static __be32
3764nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr,
3765 union nfsd4_op_u *u)
3766{
3767 struct nfsd4_create *create = &u->create;
3768 struct xdr_stream *xdr = resp->xdr;
3769 __be32 *p;
3770
3771 p = xdr_reserve_space(xdr, 20);
3772 if (!p)
3773 return nfserr_resource;
3774 encode_cinfo(p, &create->cr_cinfo);
3775 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0],
3776 create->cr_bmval[1], create->cr_bmval[2]);
3777}
3778
3779static __be32
3780nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr,
3781 union nfsd4_op_u *u)
3782{
3783 struct nfsd4_getattr *getattr = &u->getattr;
3784 struct svc_fh *fhp = getattr->ga_fhp;
3785 struct xdr_stream *xdr = resp->xdr;
3786
3787 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
3788 getattr->ga_bmval, resp->rqstp, 0);
3789}
3790
3791static __be32
3792nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr,
3793 union nfsd4_op_u *u)
3794{
3795 struct svc_fh **fhpp = &u->getfh;
3796 struct xdr_stream *xdr = resp->xdr;
3797 struct svc_fh *fhp = *fhpp;
3798 unsigned int len;
3799 __be32 *p;
3800
3801 len = fhp->fh_handle.fh_size;
3802 p = xdr_reserve_space(xdr, len + 4);
3803 if (!p)
3804 return nfserr_resource;
3805 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, len);
3806 return 0;
3807}
3808
3809/*
3810* Including all fields other than the name, a LOCK4denied structure requires
3811* 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
3812*/
3813static __be32
3814nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
3815{
3816 struct xdr_netobj *conf = &ld->ld_owner;
3817 __be32 *p;
3818
3819again:
3820 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
3821 if (!p) {
3822 /*
3823 * Don't fail to return the result just because we can't
3824 * return the conflicting open:
3825 */
3826 if (conf->len) {
3827 kfree(conf->data);
3828 conf->len = 0;
3829 conf->data = NULL;
3830 goto again;
3831 }
3832 return nfserr_resource;
3833 }
3834 p = xdr_encode_hyper(p, ld->ld_start);
3835 p = xdr_encode_hyper(p, ld->ld_length);
3836 *p++ = cpu_to_be32(ld->ld_type);
3837 if (conf->len) {
3838 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
3839 p = xdr_encode_opaque(p, conf->data, conf->len);
3840 kfree(conf->data);
3841 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
3842 p = xdr_encode_hyper(p, (u64)0); /* clientid */
3843 *p++ = cpu_to_be32(0); /* length of owner name */
3844 }
3845 return nfserr_denied;
3846}
3847
3848static __be32
3849nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr,
3850 union nfsd4_op_u *u)
3851{
3852 struct nfsd4_lock *lock = &u->lock;
3853 struct xdr_stream *xdr = resp->xdr;
3854
3855 if (!nfserr)
3856 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
3857 else if (nfserr == nfserr_denied)
3858 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
3859
3860 return nfserr;
3861}
3862
3863static __be32
3864nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr,
3865 union nfsd4_op_u *u)
3866{
3867 struct nfsd4_lockt *lockt = &u->lockt;
3868 struct xdr_stream *xdr = resp->xdr;
3869
3870 if (nfserr == nfserr_denied)
3871 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
3872 return nfserr;
3873}
3874
3875static __be32
3876nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr,
3877 union nfsd4_op_u *u)
3878{
3879 struct nfsd4_locku *locku = &u->locku;
3880 struct xdr_stream *xdr = resp->xdr;
3881
3882 return nfsd4_encode_stateid(xdr, &locku->lu_stateid);
3883}
3884
3885
3886static __be32
3887nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr,
3888 union nfsd4_op_u *u)
3889{
3890 struct nfsd4_link *link = &u->link;
3891 struct xdr_stream *xdr = resp->xdr;
3892 __be32 *p;
3893
3894 p = xdr_reserve_space(xdr, 20);
3895 if (!p)
3896 return nfserr_resource;
3897 p = encode_cinfo(p, &link->li_cinfo);
3898 return 0;
3899}
3900
3901
3902static __be32
3903nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr,
3904 union nfsd4_op_u *u)
3905{
3906 struct nfsd4_open *open = &u->open;
3907 struct xdr_stream *xdr = resp->xdr;
3908 __be32 *p;
3909
3910 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
3911 if (nfserr)
3912 return nfserr;
3913 p = xdr_reserve_space(xdr, 24);
3914 if (!p)
3915 return nfserr_resource;
3916 p = encode_cinfo(p, &open->op_cinfo);
3917 *p++ = cpu_to_be32(open->op_rflags);
3918
3919 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1],
3920 open->op_bmval[2]);
3921 if (nfserr)
3922 return nfserr;
3923
3924 p = xdr_reserve_space(xdr, 4);
3925 if (!p)
3926 return nfserr_resource;
3927
3928 *p++ = cpu_to_be32(open->op_delegate_type);
3929 switch (open->op_delegate_type) {
3930 case NFS4_OPEN_DELEGATE_NONE:
3931 break;
3932 case NFS4_OPEN_DELEGATE_READ:
3933 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3934 if (nfserr)
3935 return nfserr;
3936 p = xdr_reserve_space(xdr, 20);
3937 if (!p)
3938 return nfserr_resource;
3939 *p++ = cpu_to_be32(open->op_recall);
3940
3941 /*
3942 * TODO: ACE's in delegations
3943 */
3944 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3945 *p++ = cpu_to_be32(0);
3946 *p++ = cpu_to_be32(0);
3947 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3948 break;
3949 case NFS4_OPEN_DELEGATE_WRITE:
3950 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3951 if (nfserr)
3952 return nfserr;
3953 p = xdr_reserve_space(xdr, 32);
3954 if (!p)
3955 return nfserr_resource;
3956 *p++ = cpu_to_be32(0);
3957
3958 /*
3959 * TODO: space_limit's in delegations
3960 */
3961 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3962 *p++ = cpu_to_be32(~(u32)0);
3963 *p++ = cpu_to_be32(~(u32)0);
3964
3965 /*
3966 * TODO: ACE's in delegations
3967 */
3968 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3969 *p++ = cpu_to_be32(0);
3970 *p++ = cpu_to_be32(0);
3971 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3972 break;
3973 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3974 switch (open->op_why_no_deleg) {
3975 case WND4_CONTENTION:
3976 case WND4_RESOURCE:
3977 p = xdr_reserve_space(xdr, 8);
3978 if (!p)
3979 return nfserr_resource;
3980 *p++ = cpu_to_be32(open->op_why_no_deleg);
3981 /* deleg signaling not supported yet: */
3982 *p++ = cpu_to_be32(0);
3983 break;
3984 default:
3985 p = xdr_reserve_space(xdr, 4);
3986 if (!p)
3987 return nfserr_resource;
3988 *p++ = cpu_to_be32(open->op_why_no_deleg);
3989 }
3990 break;
3991 default:
3992 BUG();
3993 }
3994 /* XXX save filehandle here */
3995 return 0;
3996}
3997
3998static __be32
3999nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr,
4000 union nfsd4_op_u *u)
4001{
4002 struct nfsd4_open_confirm *oc = &u->open_confirm;
4003 struct xdr_stream *xdr = resp->xdr;
4004
4005 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
4006}
4007
4008static __be32
4009nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr,
4010 union nfsd4_op_u *u)
4011{
4012 struct nfsd4_open_downgrade *od = &u->open_downgrade;
4013 struct xdr_stream *xdr = resp->xdr;
4014
4015 return nfsd4_encode_stateid(xdr, &od->od_stateid);
4016}
4017
4018static __be32 nfsd4_encode_splice_read(
4019 struct nfsd4_compoundres *resp,
4020 struct nfsd4_read *read,
4021 struct file *file, unsigned long maxcount)
4022{
4023 struct xdr_stream *xdr = resp->xdr;
4024 struct xdr_buf *buf = xdr->buf;
4025 int status, space_left;
4026 __be32 nfserr;
4027
4028 /* Make sure there will be room for padding if needed */
4029 if (xdr->end - xdr->p < 1)
4030 return nfserr_resource;
4031
4032 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp,
4033 file, read->rd_offset, &maxcount,
4034 &read->rd_eof);
4035 read->rd_length = maxcount;
4036 if (nfserr)
4037 goto out_err;
4038 status = svc_encode_result_payload(read->rd_rqstp,
4039 buf->head[0].iov_len, maxcount);
4040 if (status) {
4041 nfserr = nfserrno(status);
4042 goto out_err;
4043 }
4044
4045 buf->page_len = maxcount;
4046 buf->len += maxcount;
4047 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1)
4048 / PAGE_SIZE;
4049
4050 /* Use rest of head for padding and remaining ops: */
4051 buf->tail[0].iov_base = xdr->p;
4052 buf->tail[0].iov_len = 0;
4053 xdr->iov = buf->tail;
4054 if (maxcount&3) {
4055 int pad = 4 - (maxcount&3);
4056
4057 *(xdr->p++) = 0;
4058
4059 buf->tail[0].iov_base += maxcount&3;
4060 buf->tail[0].iov_len = pad;
4061 buf->len += pad;
4062 }
4063
4064 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
4065 buf->buflen - buf->len);
4066 buf->buflen = buf->len + space_left;
4067 xdr->end = (__be32 *)((void *)xdr->end + space_left);
4068
4069 return 0;
4070
4071out_err:
4072 /*
4073 * nfsd_splice_actor may have already messed with the
4074 * page length; reset it so as not to confuse
4075 * xdr_truncate_encode in our caller.
4076 */
4077 buf->page_len = 0;
4078 return nfserr;
4079}
4080
4081static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
4082 struct nfsd4_read *read,
4083 struct file *file, unsigned long maxcount)
4084{
4085 struct xdr_stream *xdr = resp->xdr;
4086 unsigned int starting_len = xdr->buf->len;
4087 __be32 zero = xdr_zero;
4088 __be32 nfserr;
4089
4090 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount);
4091 if (read->rd_vlen < 0)
4092 return nfserr_resource;
4093
4094 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
4095 resp->rqstp->rq_vec, read->rd_vlen, &maxcount,
4096 &read->rd_eof);
4097 read->rd_length = maxcount;
4098 if (nfserr)
4099 return nfserr;
4100 if (svc_encode_result_payload(resp->rqstp, starting_len, maxcount))
4101 return nfserr_io;
4102 xdr_truncate_encode(xdr, starting_len + xdr_align_size(maxcount));
4103
4104 write_bytes_to_xdr_buf(xdr->buf, starting_len + maxcount, &zero,
4105 xdr_pad_size(maxcount));
4106 return nfs_ok;
4107}
4108
4109static __be32
4110nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
4111 union nfsd4_op_u *u)
4112{
4113 struct nfsd4_read *read = &u->read;
4114 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags);
4115 unsigned long maxcount;
4116 struct xdr_stream *xdr = resp->xdr;
4117 struct file *file;
4118 int starting_len = xdr->buf->len;
4119 __be32 *p;
4120
4121 if (nfserr)
4122 return nfserr;
4123 file = read->rd_nf->nf_file;
4124
4125 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
4126 if (!p) {
4127 WARN_ON_ONCE(splice_ok);
4128 return nfserr_resource;
4129 }
4130 if (resp->xdr->buf->page_len && splice_ok) {
4131 WARN_ON_ONCE(1);
4132 return nfserr_serverfault;
4133 }
4134 xdr_commit_encode(xdr);
4135
4136 maxcount = min_t(unsigned long, read->rd_length,
4137 (xdr->buf->buflen - xdr->buf->len));
4138
4139 if (file->f_op->splice_read && splice_ok)
4140 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4141 else
4142 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4143 if (nfserr) {
4144 xdr_truncate_encode(xdr, starting_len);
4145 return nfserr;
4146 }
4147
4148 p = xdr_encode_bool(p, read->rd_eof);
4149 *p = cpu_to_be32(read->rd_length);
4150 return nfs_ok;
4151}
4152
4153static __be32
4154nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr,
4155 union nfsd4_op_u *u)
4156{
4157 struct nfsd4_readlink *readlink = &u->readlink;
4158 __be32 *p, *maxcount_p, zero = xdr_zero;
4159 struct xdr_stream *xdr = resp->xdr;
4160 int length_offset = xdr->buf->len;
4161 int maxcount, status;
4162
4163 maxcount_p = xdr_reserve_space(xdr, XDR_UNIT);
4164 if (!maxcount_p)
4165 return nfserr_resource;
4166 maxcount = PAGE_SIZE;
4167
4168 p = xdr_reserve_space(xdr, maxcount);
4169 if (!p)
4170 return nfserr_resource;
4171 /*
4172 * XXX: By default, vfs_readlink() will truncate symlinks if they
4173 * would overflow the buffer. Is this kosher in NFSv4? If not, one
4174 * easy fix is: if vfs_readlink() precisely fills the buffer, assume
4175 * that truncation occurred, and return NFS4ERR_RESOURCE.
4176 */
4177 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
4178 (char *)p, &maxcount);
4179 if (nfserr == nfserr_isdir)
4180 nfserr = nfserr_inval;
4181 if (nfserr)
4182 goto out_err;
4183 status = svc_encode_result_payload(readlink->rl_rqstp, length_offset,
4184 maxcount);
4185 if (status) {
4186 nfserr = nfserrno(status);
4187 goto out_err;
4188 }
4189 *maxcount_p = cpu_to_be32(maxcount);
4190 xdr_truncate_encode(xdr, length_offset + 4 + xdr_align_size(maxcount));
4191 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, &zero,
4192 xdr_pad_size(maxcount));
4193 return nfs_ok;
4194
4195out_err:
4196 xdr_truncate_encode(xdr, length_offset);
4197 return nfserr;
4198}
4199
4200static __be32
4201nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr,
4202 union nfsd4_op_u *u)
4203{
4204 struct nfsd4_readdir *readdir = &u->readdir;
4205 int maxcount;
4206 int bytes_left;
4207 loff_t offset;
4208 __be64 wire_offset;
4209 struct xdr_stream *xdr = resp->xdr;
4210 int starting_len = xdr->buf->len;
4211 __be32 *p;
4212
4213 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
4214 if (!p)
4215 return nfserr_resource;
4216
4217 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
4218 *p++ = cpu_to_be32(0);
4219 *p++ = cpu_to_be32(0);
4220 xdr->buf->head[0].iov_len = (char *)xdr->p -
4221 (char *)xdr->buf->head[0].iov_base;
4222
4223 /*
4224 * Number of bytes left for directory entries allowing for the
4225 * final 8 bytes of the readdir and a following failed op:
4226 */
4227 bytes_left = xdr->buf->buflen - xdr->buf->len
4228 - COMPOUND_ERR_SLACK_SPACE - 8;
4229 if (bytes_left < 0) {
4230 nfserr = nfserr_resource;
4231 goto err_no_verf;
4232 }
4233 maxcount = svc_max_payload(resp->rqstp);
4234 maxcount = min_t(u32, readdir->rd_maxcount, maxcount);
4235 /*
4236 * Note the rfc defines rd_maxcount as the size of the
4237 * READDIR4resok structure, which includes the verifier above
4238 * and the 8 bytes encoded at the end of this function:
4239 */
4240 if (maxcount < 16) {
4241 nfserr = nfserr_toosmall;
4242 goto err_no_verf;
4243 }
4244 maxcount = min_t(int, maxcount-16, bytes_left);
4245
4246 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */
4247 if (!readdir->rd_dircount)
4248 readdir->rd_dircount = svc_max_payload(resp->rqstp);
4249
4250 readdir->xdr = xdr;
4251 readdir->rd_maxcount = maxcount;
4252 readdir->common.err = 0;
4253 readdir->cookie_offset = 0;
4254
4255 offset = readdir->rd_cookie;
4256 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
4257 &offset,
4258 &readdir->common, nfsd4_encode_dirent);
4259 if (nfserr == nfs_ok &&
4260 readdir->common.err == nfserr_toosmall &&
4261 xdr->buf->len == starting_len + 8) {
4262 /* nothing encoded; which limit did we hit?: */
4263 if (maxcount - 16 < bytes_left)
4264 /* It was the fault of rd_maxcount: */
4265 nfserr = nfserr_toosmall;
4266 else
4267 /* We ran out of buffer space: */
4268 nfserr = nfserr_resource;
4269 }
4270 if (nfserr)
4271 goto err_no_verf;
4272
4273 if (readdir->cookie_offset) {
4274 wire_offset = cpu_to_be64(offset);
4275 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
4276 &wire_offset, 8);
4277 }
4278
4279 p = xdr_reserve_space(xdr, 8);
4280 if (!p) {
4281 WARN_ON_ONCE(1);
4282 goto err_no_verf;
4283 }
4284 *p++ = 0; /* no more entries */
4285 *p++ = htonl(readdir->common.err == nfserr_eof);
4286
4287 return 0;
4288err_no_verf:
4289 xdr_truncate_encode(xdr, starting_len);
4290 return nfserr;
4291}
4292
4293static __be32
4294nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr,
4295 union nfsd4_op_u *u)
4296{
4297 struct nfsd4_remove *remove = &u->remove;
4298 struct xdr_stream *xdr = resp->xdr;
4299 __be32 *p;
4300
4301 p = xdr_reserve_space(xdr, 20);
4302 if (!p)
4303 return nfserr_resource;
4304 p = encode_cinfo(p, &remove->rm_cinfo);
4305 return 0;
4306}
4307
4308static __be32
4309nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr,
4310 union nfsd4_op_u *u)
4311{
4312 struct nfsd4_rename *rename = &u->rename;
4313 struct xdr_stream *xdr = resp->xdr;
4314 __be32 *p;
4315
4316 p = xdr_reserve_space(xdr, 40);
4317 if (!p)
4318 return nfserr_resource;
4319 p = encode_cinfo(p, &rename->rn_sinfo);
4320 p = encode_cinfo(p, &rename->rn_tinfo);
4321 return 0;
4322}
4323
4324static __be32
4325nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp)
4326{
4327 u32 i, nflavs, supported;
4328 struct exp_flavor_info *flavs;
4329 struct exp_flavor_info def_flavs[2];
4330 __be32 *p, *flavorsp;
4331 static bool report = true;
4332
4333 if (exp->ex_nflavors) {
4334 flavs = exp->ex_flavors;
4335 nflavs = exp->ex_nflavors;
4336 } else { /* Handling of some defaults in absence of real secinfo: */
4337 flavs = def_flavs;
4338 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
4339 nflavs = 2;
4340 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
4341 flavs[1].pseudoflavor = RPC_AUTH_NULL;
4342 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
4343 nflavs = 1;
4344 flavs[0].pseudoflavor
4345 = svcauth_gss_flavor(exp->ex_client);
4346 } else {
4347 nflavs = 1;
4348 flavs[0].pseudoflavor
4349 = exp->ex_client->flavour->flavour;
4350 }
4351 }
4352
4353 supported = 0;
4354 p = xdr_reserve_space(xdr, 4);
4355 if (!p)
4356 return nfserr_resource;
4357 flavorsp = p++; /* to be backfilled later */
4358
4359 for (i = 0; i < nflavs; i++) {
4360 rpc_authflavor_t pf = flavs[i].pseudoflavor;
4361 struct rpcsec_gss_info info;
4362
4363 if (rpcauth_get_gssinfo(pf, &info) == 0) {
4364 supported++;
4365 p = xdr_reserve_space(xdr, 4 + 4 +
4366 XDR_LEN(info.oid.len) + 4 + 4);
4367 if (!p)
4368 return nfserr_resource;
4369 *p++ = cpu_to_be32(RPC_AUTH_GSS);
4370 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
4371 *p++ = cpu_to_be32(info.qop);
4372 *p++ = cpu_to_be32(info.service);
4373 } else if (pf < RPC_AUTH_MAXFLAVOR) {
4374 supported++;
4375 p = xdr_reserve_space(xdr, 4);
4376 if (!p)
4377 return nfserr_resource;
4378 *p++ = cpu_to_be32(pf);
4379 } else {
4380 if (report)
4381 pr_warn("NFS: SECINFO: security flavor %u "
4382 "is not supported\n", pf);
4383 }
4384 }
4385
4386 if (nflavs != supported)
4387 report = false;
4388 *flavorsp = htonl(supported);
4389 return 0;
4390}
4391
4392static __be32
4393nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4394 union nfsd4_op_u *u)
4395{
4396 struct nfsd4_secinfo *secinfo = &u->secinfo;
4397 struct xdr_stream *xdr = resp->xdr;
4398
4399 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp);
4400}
4401
4402static __be32
4403nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
4404 union nfsd4_op_u *u)
4405{
4406 struct nfsd4_secinfo_no_name *secinfo = &u->secinfo_no_name;
4407 struct xdr_stream *xdr = resp->xdr;
4408
4409 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp);
4410}
4411
4412/*
4413 * The SETATTR encode routine is special -- it always encodes a bitmap,
4414 * regardless of the error status.
4415 */
4416static __be32
4417nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr,
4418 union nfsd4_op_u *u)
4419{
4420 struct nfsd4_setattr *setattr = &u->setattr;
4421 struct xdr_stream *xdr = resp->xdr;
4422 __be32 *p;
4423
4424 p = xdr_reserve_space(xdr, 16);
4425 if (!p)
4426 return nfserr_resource;
4427 if (nfserr) {
4428 *p++ = cpu_to_be32(3);
4429 *p++ = cpu_to_be32(0);
4430 *p++ = cpu_to_be32(0);
4431 *p++ = cpu_to_be32(0);
4432 }
4433 else {
4434 *p++ = cpu_to_be32(3);
4435 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
4436 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
4437 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
4438 }
4439 return nfserr;
4440}
4441
4442static __be32
4443nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr,
4444 union nfsd4_op_u *u)
4445{
4446 struct nfsd4_setclientid *scd = &u->setclientid;
4447 struct xdr_stream *xdr = resp->xdr;
4448 __be32 *p;
4449
4450 if (!nfserr) {
4451 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
4452 if (!p)
4453 return nfserr_resource;
4454 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
4455 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
4456 NFS4_VERIFIER_SIZE);
4457 }
4458 else if (nfserr == nfserr_clid_inuse) {
4459 p = xdr_reserve_space(xdr, 8);
4460 if (!p)
4461 return nfserr_resource;
4462 *p++ = cpu_to_be32(0);
4463 *p++ = cpu_to_be32(0);
4464 }
4465 return nfserr;
4466}
4467
4468static __be32
4469nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr,
4470 union nfsd4_op_u *u)
4471{
4472 struct nfsd4_write *write = &u->write;
4473 struct xdr_stream *xdr = resp->xdr;
4474 __be32 *p;
4475
4476 p = xdr_reserve_space(xdr, 16);
4477 if (!p)
4478 return nfserr_resource;
4479 *p++ = cpu_to_be32(write->wr_bytes_written);
4480 *p++ = cpu_to_be32(write->wr_how_written);
4481 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4482 NFS4_VERIFIER_SIZE);
4483 return 0;
4484}
4485
4486static __be32
4487nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
4488 union nfsd4_op_u *u)
4489{
4490 struct nfsd4_exchange_id *exid = &u->exchange_id;
4491 struct xdr_stream *xdr = resp->xdr;
4492 __be32 *p;
4493 char *major_id;
4494 char *server_scope;
4495 int major_id_sz;
4496 int server_scope_sz;
4497 uint64_t minor_id = 0;
4498 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id);
4499
4500 major_id = nn->nfsd_name;
4501 major_id_sz = strlen(nn->nfsd_name);
4502 server_scope = nn->nfsd_name;
4503 server_scope_sz = strlen(nn->nfsd_name);
4504
4505 p = xdr_reserve_space(xdr,
4506 8 /* eir_clientid */ +
4507 4 /* eir_sequenceid */ +
4508 4 /* eir_flags */ +
4509 4 /* spr_how */);
4510 if (!p)
4511 return nfserr_resource;
4512
4513 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
4514 *p++ = cpu_to_be32(exid->seqid);
4515 *p++ = cpu_to_be32(exid->flags);
4516
4517 *p++ = cpu_to_be32(exid->spa_how);
4518
4519 switch (exid->spa_how) {
4520 case SP4_NONE:
4521 break;
4522 case SP4_MACH_CRED:
4523 /* spo_must_enforce bitmap: */
4524 nfserr = nfsd4_encode_bitmap(xdr,
4525 exid->spo_must_enforce[0],
4526 exid->spo_must_enforce[1],
4527 exid->spo_must_enforce[2]);
4528 if (nfserr)
4529 return nfserr;
4530 /* spo_must_allow bitmap: */
4531 nfserr = nfsd4_encode_bitmap(xdr,
4532 exid->spo_must_allow[0],
4533 exid->spo_must_allow[1],
4534 exid->spo_must_allow[2]);
4535 if (nfserr)
4536 return nfserr;
4537 break;
4538 default:
4539 WARN_ON_ONCE(1);
4540 }
4541
4542 p = xdr_reserve_space(xdr,
4543 8 /* so_minor_id */ +
4544 4 /* so_major_id.len */ +
4545 (XDR_QUADLEN(major_id_sz) * 4) +
4546 4 /* eir_server_scope.len */ +
4547 (XDR_QUADLEN(server_scope_sz) * 4) +
4548 4 /* eir_server_impl_id.count (0) */);
4549 if (!p)
4550 return nfserr_resource;
4551
4552 /* The server_owner struct */
4553 p = xdr_encode_hyper(p, minor_id); /* Minor id */
4554 /* major id */
4555 p = xdr_encode_opaque(p, major_id, major_id_sz);
4556
4557 /* Server scope */
4558 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
4559
4560 /* Implementation id */
4561 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
4562 return 0;
4563}
4564
4565static __be32
4566nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
4567 union nfsd4_op_u *u)
4568{
4569 struct nfsd4_create_session *sess = &u->create_session;
4570 struct xdr_stream *xdr = resp->xdr;
4571 __be32 *p;
4572
4573 p = xdr_reserve_space(xdr, 24);
4574 if (!p)
4575 return nfserr_resource;
4576 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
4577 NFS4_MAX_SESSIONID_LEN);
4578 *p++ = cpu_to_be32(sess->seqid);
4579 *p++ = cpu_to_be32(sess->flags);
4580
4581 p = xdr_reserve_space(xdr, 28);
4582 if (!p)
4583 return nfserr_resource;
4584 *p++ = cpu_to_be32(0); /* headerpadsz */
4585 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
4586 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
4587 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
4588 *p++ = cpu_to_be32(sess->fore_channel.maxops);
4589 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
4590 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
4591
4592 if (sess->fore_channel.nr_rdma_attrs) {
4593 p = xdr_reserve_space(xdr, 4);
4594 if (!p)
4595 return nfserr_resource;
4596 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
4597 }
4598
4599 p = xdr_reserve_space(xdr, 28);
4600 if (!p)
4601 return nfserr_resource;
4602 *p++ = cpu_to_be32(0); /* headerpadsz */
4603 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
4604 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
4605 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
4606 *p++ = cpu_to_be32(sess->back_channel.maxops);
4607 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
4608 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
4609
4610 if (sess->back_channel.nr_rdma_attrs) {
4611 p = xdr_reserve_space(xdr, 4);
4612 if (!p)
4613 return nfserr_resource;
4614 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
4615 }
4616 return 0;
4617}
4618
4619static __be32
4620nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
4621 union nfsd4_op_u *u)
4622{
4623 struct nfsd4_sequence *seq = &u->sequence;
4624 struct xdr_stream *xdr = resp->xdr;
4625 __be32 *p;
4626
4627 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
4628 if (!p)
4629 return nfserr_resource;
4630 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
4631 NFS4_MAX_SESSIONID_LEN);
4632 *p++ = cpu_to_be32(seq->seqid);
4633 *p++ = cpu_to_be32(seq->slotid);
4634 /* Note slotid's are numbered from zero: */
4635 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
4636 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
4637 *p++ = cpu_to_be32(seq->status_flags);
4638
4639 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
4640 return 0;
4641}
4642
4643static __be32
4644nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
4645 union nfsd4_op_u *u)
4646{
4647 struct nfsd4_test_stateid *test_stateid = &u->test_stateid;
4648 struct xdr_stream *xdr = resp->xdr;
4649 struct nfsd4_test_stateid_id *stateid, *next;
4650 __be32 *p;
4651
4652 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
4653 if (!p)
4654 return nfserr_resource;
4655 *p++ = htonl(test_stateid->ts_num_ids);
4656
4657 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
4658 *p++ = stateid->ts_id_status;
4659 }
4660
4661 return 0;
4662}
4663
4664#ifdef CONFIG_NFSD_PNFS
4665static __be32
4666nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4667 union nfsd4_op_u *u)
4668{
4669 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo;
4670 struct xdr_stream *xdr = resp->xdr;
4671 const struct nfsd4_layout_ops *ops;
4672 u32 starting_len = xdr->buf->len, needed_len;
4673 __be32 *p;
4674
4675 p = xdr_reserve_space(xdr, 4);
4676 if (!p)
4677 return nfserr_resource;
4678
4679 *p++ = cpu_to_be32(gdev->gd_layout_type);
4680
4681 /* If maxcount is 0 then just update notifications */
4682 if (gdev->gd_maxcount != 0) {
4683 ops = nfsd4_layout_ops[gdev->gd_layout_type];
4684 nfserr = ops->encode_getdeviceinfo(xdr, gdev);
4685 if (nfserr) {
4686 /*
4687 * We don't bother to burden the layout drivers with
4688 * enforcing gd_maxcount, just tell the client to
4689 * come back with a bigger buffer if it's not enough.
4690 */
4691 if (xdr->buf->len + 4 > gdev->gd_maxcount)
4692 goto toosmall;
4693 return nfserr;
4694 }
4695 }
4696
4697 if (gdev->gd_notify_types) {
4698 p = xdr_reserve_space(xdr, 4 + 4);
4699 if (!p)
4700 return nfserr_resource;
4701 *p++ = cpu_to_be32(1); /* bitmap length */
4702 *p++ = cpu_to_be32(gdev->gd_notify_types);
4703 } else {
4704 p = xdr_reserve_space(xdr, 4);
4705 if (!p)
4706 return nfserr_resource;
4707 *p++ = 0;
4708 }
4709
4710 return 0;
4711toosmall:
4712 dprintk("%s: maxcount too small\n", __func__);
4713 needed_len = xdr->buf->len + 4 /* notifications */;
4714 xdr_truncate_encode(xdr, starting_len);
4715 p = xdr_reserve_space(xdr, 4);
4716 if (!p)
4717 return nfserr_resource;
4718 *p++ = cpu_to_be32(needed_len);
4719 return nfserr_toosmall;
4720}
4721
4722static __be32
4723nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr,
4724 union nfsd4_op_u *u)
4725{
4726 struct nfsd4_layoutget *lgp = &u->layoutget;
4727 struct xdr_stream *xdr = resp->xdr;
4728 const struct nfsd4_layout_ops *ops;
4729 __be32 *p;
4730
4731 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t));
4732 if (!p)
4733 return nfserr_resource;
4734
4735 *p++ = cpu_to_be32(1); /* we always set return-on-close */
4736 *p++ = cpu_to_be32(lgp->lg_sid.si_generation);
4737 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque,
4738 sizeof(stateid_opaque_t));
4739
4740 *p++ = cpu_to_be32(1); /* we always return a single layout */
4741 p = xdr_encode_hyper(p, lgp->lg_seg.offset);
4742 p = xdr_encode_hyper(p, lgp->lg_seg.length);
4743 *p++ = cpu_to_be32(lgp->lg_seg.iomode);
4744 *p++ = cpu_to_be32(lgp->lg_layout_type);
4745
4746 ops = nfsd4_layout_ops[lgp->lg_layout_type];
4747 return ops->encode_layoutget(xdr, lgp);
4748}
4749
4750static __be32
4751nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr,
4752 union nfsd4_op_u *u)
4753{
4754 struct nfsd4_layoutcommit *lcp = &u->layoutcommit;
4755 struct xdr_stream *xdr = resp->xdr;
4756 __be32 *p;
4757
4758 p = xdr_reserve_space(xdr, 4);
4759 if (!p)
4760 return nfserr_resource;
4761 *p++ = cpu_to_be32(lcp->lc_size_chg);
4762 if (lcp->lc_size_chg) {
4763 p = xdr_reserve_space(xdr, 8);
4764 if (!p)
4765 return nfserr_resource;
4766 p = xdr_encode_hyper(p, lcp->lc_newsize);
4767 }
4768
4769 return 0;
4770}
4771
4772static __be32
4773nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr,
4774 union nfsd4_op_u *u)
4775{
4776 struct nfsd4_layoutreturn *lrp = &u->layoutreturn;
4777 struct xdr_stream *xdr = resp->xdr;
4778 __be32 *p;
4779
4780 p = xdr_reserve_space(xdr, 4);
4781 if (!p)
4782 return nfserr_resource;
4783 *p++ = cpu_to_be32(lrp->lrs_present);
4784 if (lrp->lrs_present)
4785 return nfsd4_encode_stateid(xdr, &lrp->lr_sid);
4786 return 0;
4787}
4788#endif /* CONFIG_NFSD_PNFS */
4789
4790static __be32
4791nfsd42_encode_write_res(struct nfsd4_compoundres *resp,
4792 struct nfsd42_write_res *write, bool sync)
4793{
4794 __be32 *p;
4795 p = xdr_reserve_space(resp->xdr, 4);
4796 if (!p)
4797 return nfserr_resource;
4798
4799 if (sync)
4800 *p++ = cpu_to_be32(0);
4801 else {
4802 __be32 nfserr;
4803 *p++ = cpu_to_be32(1);
4804 nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid);
4805 if (nfserr)
4806 return nfserr;
4807 }
4808 p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE);
4809 if (!p)
4810 return nfserr_resource;
4811
4812 p = xdr_encode_hyper(p, write->wr_bytes_written);
4813 *p++ = cpu_to_be32(write->wr_stable_how);
4814 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4815 NFS4_VERIFIER_SIZE);
4816 return nfs_ok;
4817}
4818
4819static __be32
4820nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns)
4821{
4822 struct xdr_stream *xdr = resp->xdr;
4823 struct nfs42_netaddr *addr;
4824 __be32 *p;
4825
4826 p = xdr_reserve_space(xdr, 4);
4827 *p++ = cpu_to_be32(ns->nl4_type);
4828
4829 switch (ns->nl4_type) {
4830 case NL4_NETADDR:
4831 addr = &ns->u.nl4_addr;
4832
4833 /* netid_len, netid, uaddr_len, uaddr (port included
4834 * in RPCBIND_MAXUADDRLEN)
4835 */
4836 p = xdr_reserve_space(xdr,
4837 4 /* netid len */ +
4838 (XDR_QUADLEN(addr->netid_len) * 4) +
4839 4 /* uaddr len */ +
4840 (XDR_QUADLEN(addr->addr_len) * 4));
4841 if (!p)
4842 return nfserr_resource;
4843
4844 *p++ = cpu_to_be32(addr->netid_len);
4845 p = xdr_encode_opaque_fixed(p, addr->netid,
4846 addr->netid_len);
4847 *p++ = cpu_to_be32(addr->addr_len);
4848 p = xdr_encode_opaque_fixed(p, addr->addr,
4849 addr->addr_len);
4850 break;
4851 default:
4852 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR);
4853 return nfserr_inval;
4854 }
4855
4856 return 0;
4857}
4858
4859static __be32
4860nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr,
4861 union nfsd4_op_u *u)
4862{
4863 struct nfsd4_copy *copy = &u->copy;
4864 __be32 *p;
4865
4866 nfserr = nfsd42_encode_write_res(resp, ©->cp_res,
4867 nfsd4_copy_is_sync(copy));
4868 if (nfserr)
4869 return nfserr;
4870
4871 p = xdr_reserve_space(resp->xdr, 4 + 4);
4872 *p++ = xdr_one; /* cr_consecutive */
4873 *p = nfsd4_copy_is_sync(copy) ? xdr_one : xdr_zero;
4874 return 0;
4875}
4876
4877static __be32
4878nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr,
4879 union nfsd4_op_u *u)
4880{
4881 struct nfsd4_offload_status *os = &u->offload_status;
4882 struct xdr_stream *xdr = resp->xdr;
4883 __be32 *p;
4884
4885 p = xdr_reserve_space(xdr, 8 + 4);
4886 if (!p)
4887 return nfserr_resource;
4888 p = xdr_encode_hyper(p, os->count);
4889 *p++ = cpu_to_be32(0);
4890 return nfserr;
4891}
4892
4893static __be32
4894nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp,
4895 struct nfsd4_read *read)
4896{
4897 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags);
4898 struct file *file = read->rd_nf->nf_file;
4899 struct xdr_stream *xdr = resp->xdr;
4900 unsigned long maxcount;
4901 __be32 nfserr, *p;
4902
4903 /* Content type, offset, byte count */
4904 p = xdr_reserve_space(xdr, 4 + 8 + 4);
4905 if (!p)
4906 return nfserr_io;
4907 if (resp->xdr->buf->page_len && splice_ok) {
4908 WARN_ON_ONCE(splice_ok);
4909 return nfserr_serverfault;
4910 }
4911
4912 maxcount = min_t(unsigned long, read->rd_length,
4913 (xdr->buf->buflen - xdr->buf->len));
4914
4915 if (file->f_op->splice_read && splice_ok)
4916 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4917 else
4918 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4919 if (nfserr)
4920 return nfserr;
4921
4922 *p++ = cpu_to_be32(NFS4_CONTENT_DATA);
4923 p = xdr_encode_hyper(p, read->rd_offset);
4924 *p = cpu_to_be32(read->rd_length);
4925
4926 return nfs_ok;
4927}
4928
4929static __be32
4930nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr,
4931 union nfsd4_op_u *u)
4932{
4933 struct nfsd4_read *read = &u->read;
4934 struct file *file = read->rd_nf->nf_file;
4935 struct xdr_stream *xdr = resp->xdr;
4936 int starting_len = xdr->buf->len;
4937 u32 segments = 0;
4938 __be32 *p;
4939
4940 if (nfserr)
4941 return nfserr;
4942
4943 /* eof flag, segment count */
4944 p = xdr_reserve_space(xdr, 4 + 4);
4945 if (!p)
4946 return nfserr_io;
4947 xdr_commit_encode(xdr);
4948
4949 read->rd_eof = read->rd_offset >= i_size_read(file_inode(file));
4950 if (read->rd_eof)
4951 goto out;
4952
4953 nfserr = nfsd4_encode_read_plus_data(resp, read);
4954 if (nfserr) {
4955 xdr_truncate_encode(xdr, starting_len);
4956 return nfserr;
4957 }
4958
4959 segments++;
4960
4961out:
4962 p = xdr_encode_bool(p, read->rd_eof);
4963 *p = cpu_to_be32(segments);
4964 return nfserr;
4965}
4966
4967static __be32
4968nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr,
4969 union nfsd4_op_u *u)
4970{
4971 struct nfsd4_copy_notify *cn = &u->copy_notify;
4972 struct xdr_stream *xdr = resp->xdr;
4973 __be32 *p;
4974
4975 if (nfserr)
4976 return nfserr;
4977
4978 /* 8 sec, 4 nsec */
4979 p = xdr_reserve_space(xdr, 12);
4980 if (!p)
4981 return nfserr_resource;
4982
4983 /* cnr_lease_time */
4984 p = xdr_encode_hyper(p, cn->cpn_sec);
4985 *p++ = cpu_to_be32(cn->cpn_nsec);
4986
4987 /* cnr_stateid */
4988 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid);
4989 if (nfserr)
4990 return nfserr;
4991
4992 /* cnr_src.nl_nsvr */
4993 p = xdr_reserve_space(xdr, 4);
4994 if (!p)
4995 return nfserr_resource;
4996
4997 *p++ = cpu_to_be32(1);
4998
4999 nfserr = nfsd42_encode_nl4_server(resp, cn->cpn_src);
5000 return nfserr;
5001}
5002
5003static __be32
5004nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr,
5005 union nfsd4_op_u *u)
5006{
5007 struct nfsd4_seek *seek = &u->seek;
5008 __be32 *p;
5009
5010 p = xdr_reserve_space(resp->xdr, 4 + 8);
5011 *p++ = cpu_to_be32(seek->seek_eof);
5012 p = xdr_encode_hyper(p, seek->seek_pos);
5013
5014 return 0;
5015}
5016
5017static __be32
5018nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr,
5019 union nfsd4_op_u *p)
5020{
5021 return nfserr;
5022}
5023
5024/*
5025 * Encode kmalloc-ed buffer in to XDR stream.
5026 */
5027static __be32
5028nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen)
5029{
5030 u32 cplen;
5031 __be32 *p;
5032
5033 cplen = min_t(unsigned long, buflen,
5034 ((void *)xdr->end - (void *)xdr->p));
5035 p = xdr_reserve_space(xdr, cplen);
5036 if (!p)
5037 return nfserr_resource;
5038
5039 memcpy(p, buf, cplen);
5040 buf += cplen;
5041 buflen -= cplen;
5042
5043 while (buflen) {
5044 cplen = min_t(u32, buflen, PAGE_SIZE);
5045 p = xdr_reserve_space(xdr, cplen);
5046 if (!p)
5047 return nfserr_resource;
5048
5049 memcpy(p, buf, cplen);
5050
5051 if (cplen < PAGE_SIZE) {
5052 /*
5053 * We're done, with a length that wasn't page
5054 * aligned, so possibly not word aligned. Pad
5055 * any trailing bytes with 0.
5056 */
5057 xdr_encode_opaque_fixed(p, NULL, cplen);
5058 break;
5059 }
5060
5061 buflen -= PAGE_SIZE;
5062 buf += PAGE_SIZE;
5063 }
5064
5065 return 0;
5066}
5067
5068static __be32
5069nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5070 union nfsd4_op_u *u)
5071{
5072 struct nfsd4_getxattr *getxattr = &u->getxattr;
5073 struct xdr_stream *xdr = resp->xdr;
5074 __be32 *p, err;
5075
5076 p = xdr_reserve_space(xdr, 4);
5077 if (!p)
5078 return nfserr_resource;
5079
5080 *p = cpu_to_be32(getxattr->getxa_len);
5081
5082 if (getxattr->getxa_len == 0)
5083 return 0;
5084
5085 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf,
5086 getxattr->getxa_len);
5087
5088 kvfree(getxattr->getxa_buf);
5089
5090 return err;
5091}
5092
5093static __be32
5094nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5095 union nfsd4_op_u *u)
5096{
5097 struct nfsd4_setxattr *setxattr = &u->setxattr;
5098 struct xdr_stream *xdr = resp->xdr;
5099 __be32 *p;
5100
5101 p = xdr_reserve_space(xdr, 20);
5102 if (!p)
5103 return nfserr_resource;
5104
5105 encode_cinfo(p, &setxattr->setxa_cinfo);
5106
5107 return 0;
5108}
5109
5110/*
5111 * See if there are cookie values that can be rejected outright.
5112 */
5113static __be32
5114nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs,
5115 u32 *offsetp)
5116{
5117 u64 cookie = listxattrs->lsxa_cookie;
5118
5119 /*
5120 * If the cookie is larger than the maximum number we can fit
5121 * in either the buffer we just got back from vfs_listxattr, or,
5122 * XDR-encoded, in the return buffer, it's invalid.
5123 */
5124 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2))
5125 return nfserr_badcookie;
5126
5127 if (cookie > (listxattrs->lsxa_maxcount /
5128 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4)))
5129 return nfserr_badcookie;
5130
5131 *offsetp = (u32)cookie;
5132 return 0;
5133}
5134
5135static __be32
5136nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr,
5137 union nfsd4_op_u *u)
5138{
5139 struct nfsd4_listxattrs *listxattrs = &u->listxattrs;
5140 struct xdr_stream *xdr = resp->xdr;
5141 u32 cookie_offset, count_offset, eof;
5142 u32 left, xdrleft, slen, count;
5143 u32 xdrlen, offset;
5144 u64 cookie;
5145 char *sp;
5146 __be32 status, tmp;
5147 __be32 *p;
5148 u32 nuser;
5149
5150 eof = 1;
5151
5152 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset);
5153 if (status)
5154 goto out;
5155
5156 /*
5157 * Reserve space for the cookie and the name array count. Record
5158 * the offsets to save them later.
5159 */
5160 cookie_offset = xdr->buf->len;
5161 count_offset = cookie_offset + 8;
5162 p = xdr_reserve_space(xdr, 12);
5163 if (!p) {
5164 status = nfserr_resource;
5165 goto out;
5166 }
5167
5168 count = 0;
5169 left = listxattrs->lsxa_len;
5170 sp = listxattrs->lsxa_buf;
5171 nuser = 0;
5172
5173 xdrleft = listxattrs->lsxa_maxcount;
5174
5175 while (left > 0 && xdrleft > 0) {
5176 slen = strlen(sp);
5177
5178 /*
5179 * Check if this is a "user." attribute, skip it if not.
5180 */
5181 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN))
5182 goto contloop;
5183
5184 slen -= XATTR_USER_PREFIX_LEN;
5185 xdrlen = 4 + ((slen + 3) & ~3);
5186 if (xdrlen > xdrleft) {
5187 if (count == 0) {
5188 /*
5189 * Can't even fit the first attribute name.
5190 */
5191 status = nfserr_toosmall;
5192 goto out;
5193 }
5194 eof = 0;
5195 goto wreof;
5196 }
5197
5198 left -= XATTR_USER_PREFIX_LEN;
5199 sp += XATTR_USER_PREFIX_LEN;
5200 if (nuser++ < offset)
5201 goto contloop;
5202
5203
5204 p = xdr_reserve_space(xdr, xdrlen);
5205 if (!p) {
5206 status = nfserr_resource;
5207 goto out;
5208 }
5209
5210 xdr_encode_opaque(p, sp, slen);
5211
5212 xdrleft -= xdrlen;
5213 count++;
5214contloop:
5215 sp += slen + 1;
5216 left -= slen + 1;
5217 }
5218
5219 /*
5220 * If there were user attributes to copy, but we didn't copy
5221 * any, the offset was too large (e.g. the cookie was invalid).
5222 */
5223 if (nuser > 0 && count == 0) {
5224 status = nfserr_badcookie;
5225 goto out;
5226 }
5227
5228wreof:
5229 p = xdr_reserve_space(xdr, 4);
5230 if (!p) {
5231 status = nfserr_resource;
5232 goto out;
5233 }
5234 *p = cpu_to_be32(eof);
5235
5236 cookie = offset + count;
5237
5238 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8);
5239 tmp = cpu_to_be32(count);
5240 write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4);
5241out:
5242 if (listxattrs->lsxa_len)
5243 kvfree(listxattrs->lsxa_buf);
5244 return status;
5245}
5246
5247static __be32
5248nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5249 union nfsd4_op_u *u)
5250{
5251 struct nfsd4_removexattr *removexattr = &u->removexattr;
5252 struct xdr_stream *xdr = resp->xdr;
5253 __be32 *p;
5254
5255 p = xdr_reserve_space(xdr, 20);
5256 if (!p)
5257 return nfserr_resource;
5258
5259 p = encode_cinfo(p, &removexattr->rmxa_cinfo);
5260 return 0;
5261}
5262
5263typedef __be32(*nfsd4_enc)(struct nfsd4_compoundres *, __be32, union nfsd4_op_u *u);
5264
5265/*
5266 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
5267 * since we don't need to filter out obsolete ops as this is
5268 * done in the decoding phase.
5269 */
5270static const nfsd4_enc nfsd4_enc_ops[] = {
5271 [OP_ACCESS] = nfsd4_encode_access,
5272 [OP_CLOSE] = nfsd4_encode_close,
5273 [OP_COMMIT] = nfsd4_encode_commit,
5274 [OP_CREATE] = nfsd4_encode_create,
5275 [OP_DELEGPURGE] = nfsd4_encode_noop,
5276 [OP_DELEGRETURN] = nfsd4_encode_noop,
5277 [OP_GETATTR] = nfsd4_encode_getattr,
5278 [OP_GETFH] = nfsd4_encode_getfh,
5279 [OP_LINK] = nfsd4_encode_link,
5280 [OP_LOCK] = nfsd4_encode_lock,
5281 [OP_LOCKT] = nfsd4_encode_lockt,
5282 [OP_LOCKU] = nfsd4_encode_locku,
5283 [OP_LOOKUP] = nfsd4_encode_noop,
5284 [OP_LOOKUPP] = nfsd4_encode_noop,
5285 [OP_NVERIFY] = nfsd4_encode_noop,
5286 [OP_OPEN] = nfsd4_encode_open,
5287 [OP_OPENATTR] = nfsd4_encode_noop,
5288 [OP_OPEN_CONFIRM] = nfsd4_encode_open_confirm,
5289 [OP_OPEN_DOWNGRADE] = nfsd4_encode_open_downgrade,
5290 [OP_PUTFH] = nfsd4_encode_noop,
5291 [OP_PUTPUBFH] = nfsd4_encode_noop,
5292 [OP_PUTROOTFH] = nfsd4_encode_noop,
5293 [OP_READ] = nfsd4_encode_read,
5294 [OP_READDIR] = nfsd4_encode_readdir,
5295 [OP_READLINK] = nfsd4_encode_readlink,
5296 [OP_REMOVE] = nfsd4_encode_remove,
5297 [OP_RENAME] = nfsd4_encode_rename,
5298 [OP_RENEW] = nfsd4_encode_noop,
5299 [OP_RESTOREFH] = nfsd4_encode_noop,
5300 [OP_SAVEFH] = nfsd4_encode_noop,
5301 [OP_SECINFO] = nfsd4_encode_secinfo,
5302 [OP_SETATTR] = nfsd4_encode_setattr,
5303 [OP_SETCLIENTID] = nfsd4_encode_setclientid,
5304 [OP_SETCLIENTID_CONFIRM] = nfsd4_encode_noop,
5305 [OP_VERIFY] = nfsd4_encode_noop,
5306 [OP_WRITE] = nfsd4_encode_write,
5307 [OP_RELEASE_LOCKOWNER] = nfsd4_encode_noop,
5308
5309 /* NFSv4.1 operations */
5310 [OP_BACKCHANNEL_CTL] = nfsd4_encode_noop,
5311 [OP_BIND_CONN_TO_SESSION] = nfsd4_encode_bind_conn_to_session,
5312 [OP_EXCHANGE_ID] = nfsd4_encode_exchange_id,
5313 [OP_CREATE_SESSION] = nfsd4_encode_create_session,
5314 [OP_DESTROY_SESSION] = nfsd4_encode_noop,
5315 [OP_FREE_STATEID] = nfsd4_encode_noop,
5316 [OP_GET_DIR_DELEGATION] = nfsd4_encode_noop,
5317#ifdef CONFIG_NFSD_PNFS
5318 [OP_GETDEVICEINFO] = nfsd4_encode_getdeviceinfo,
5319 [OP_GETDEVICELIST] = nfsd4_encode_noop,
5320 [OP_LAYOUTCOMMIT] = nfsd4_encode_layoutcommit,
5321 [OP_LAYOUTGET] = nfsd4_encode_layoutget,
5322 [OP_LAYOUTRETURN] = nfsd4_encode_layoutreturn,
5323#else
5324 [OP_GETDEVICEINFO] = nfsd4_encode_noop,
5325 [OP_GETDEVICELIST] = nfsd4_encode_noop,
5326 [OP_LAYOUTCOMMIT] = nfsd4_encode_noop,
5327 [OP_LAYOUTGET] = nfsd4_encode_noop,
5328 [OP_LAYOUTRETURN] = nfsd4_encode_noop,
5329#endif
5330 [OP_SECINFO_NO_NAME] = nfsd4_encode_secinfo_no_name,
5331 [OP_SEQUENCE] = nfsd4_encode_sequence,
5332 [OP_SET_SSV] = nfsd4_encode_noop,
5333 [OP_TEST_STATEID] = nfsd4_encode_test_stateid,
5334 [OP_WANT_DELEGATION] = nfsd4_encode_noop,
5335 [OP_DESTROY_CLIENTID] = nfsd4_encode_noop,
5336 [OP_RECLAIM_COMPLETE] = nfsd4_encode_noop,
5337
5338 /* NFSv4.2 operations */
5339 [OP_ALLOCATE] = nfsd4_encode_noop,
5340 [OP_COPY] = nfsd4_encode_copy,
5341 [OP_COPY_NOTIFY] = nfsd4_encode_copy_notify,
5342 [OP_DEALLOCATE] = nfsd4_encode_noop,
5343 [OP_IO_ADVISE] = nfsd4_encode_noop,
5344 [OP_LAYOUTERROR] = nfsd4_encode_noop,
5345 [OP_LAYOUTSTATS] = nfsd4_encode_noop,
5346 [OP_OFFLOAD_CANCEL] = nfsd4_encode_noop,
5347 [OP_OFFLOAD_STATUS] = nfsd4_encode_offload_status,
5348 [OP_READ_PLUS] = nfsd4_encode_read_plus,
5349 [OP_SEEK] = nfsd4_encode_seek,
5350 [OP_WRITE_SAME] = nfsd4_encode_noop,
5351 [OP_CLONE] = nfsd4_encode_noop,
5352
5353 /* RFC 8276 extended atributes operations */
5354 [OP_GETXATTR] = nfsd4_encode_getxattr,
5355 [OP_SETXATTR] = nfsd4_encode_setxattr,
5356 [OP_LISTXATTRS] = nfsd4_encode_listxattrs,
5357 [OP_REMOVEXATTR] = nfsd4_encode_removexattr,
5358};
5359
5360/*
5361 * Calculate whether we still have space to encode repsize bytes.
5362 * There are two considerations:
5363 * - For NFS versions >=4.1, the size of the reply must stay within
5364 * session limits
5365 * - For all NFS versions, we must stay within limited preallocated
5366 * buffer space.
5367 *
5368 * This is called before the operation is processed, so can only provide
5369 * an upper estimate. For some nonidempotent operations (such as
5370 * getattr), it's not necessarily a problem if that estimate is wrong,
5371 * as we can fail it after processing without significant side effects.
5372 */
5373__be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
5374{
5375 struct xdr_buf *buf = &resp->rqstp->rq_res;
5376 struct nfsd4_slot *slot = resp->cstate.slot;
5377
5378 if (buf->len + respsize <= buf->buflen)
5379 return nfs_ok;
5380 if (!nfsd4_has_session(&resp->cstate))
5381 return nfserr_resource;
5382 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
5383 WARN_ON_ONCE(1);
5384 return nfserr_rep_too_big_to_cache;
5385 }
5386 return nfserr_rep_too_big;
5387}
5388
5389void
5390nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
5391{
5392 struct xdr_stream *xdr = resp->xdr;
5393 struct nfs4_stateowner *so = resp->cstate.replay_owner;
5394 struct svc_rqst *rqstp = resp->rqstp;
5395 const struct nfsd4_operation *opdesc = op->opdesc;
5396 int post_err_offset;
5397 nfsd4_enc encoder;
5398 __be32 *p;
5399
5400 p = xdr_reserve_space(xdr, 8);
5401 if (!p) {
5402 WARN_ON_ONCE(1);
5403 return;
5404 }
5405 *p++ = cpu_to_be32(op->opnum);
5406 post_err_offset = xdr->buf->len;
5407
5408 if (op->opnum == OP_ILLEGAL)
5409 goto status;
5410 if (op->status && opdesc &&
5411 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE))
5412 goto status;
5413 BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
5414 !nfsd4_enc_ops[op->opnum]);
5415 encoder = nfsd4_enc_ops[op->opnum];
5416 op->status = encoder(resp, op->status, &op->u);
5417 if (op->status)
5418 trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status);
5419 if (opdesc && opdesc->op_release)
5420 opdesc->op_release(&op->u);
5421 xdr_commit_encode(xdr);
5422
5423 /* nfsd4_check_resp_size guarantees enough room for error status */
5424 if (!op->status) {
5425 int space_needed = 0;
5426 if (!nfsd4_last_compound_op(rqstp))
5427 space_needed = COMPOUND_ERR_SLACK_SPACE;
5428 op->status = nfsd4_check_resp_size(resp, space_needed);
5429 }
5430 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
5431 struct nfsd4_slot *slot = resp->cstate.slot;
5432
5433 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
5434 op->status = nfserr_rep_too_big_to_cache;
5435 else
5436 op->status = nfserr_rep_too_big;
5437 }
5438 if (op->status == nfserr_resource ||
5439 op->status == nfserr_rep_too_big ||
5440 op->status == nfserr_rep_too_big_to_cache) {
5441 /*
5442 * The operation may have already been encoded or
5443 * partially encoded. No op returns anything additional
5444 * in the case of one of these three errors, so we can
5445 * just truncate back to after the status. But it's a
5446 * bug if we had to do this on a non-idempotent op:
5447 */
5448 warn_on_nonidempotent_op(op);
5449 xdr_truncate_encode(xdr, post_err_offset);
5450 }
5451 if (so) {
5452 int len = xdr->buf->len - post_err_offset;
5453
5454 so->so_replay.rp_status = op->status;
5455 so->so_replay.rp_buflen = len;
5456 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
5457 so->so_replay.rp_buf, len);
5458 }
5459status:
5460 *p = op->status;
5461}
5462
5463/*
5464 * Encode the reply stored in the stateowner reply cache
5465 *
5466 * XDR note: do not encode rp->rp_buflen: the buffer contains the
5467 * previously sent already encoded operation.
5468 */
5469void
5470nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
5471{
5472 __be32 *p;
5473 struct nfs4_replay *rp = op->replay;
5474
5475 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
5476 if (!p) {
5477 WARN_ON_ONCE(1);
5478 return;
5479 }
5480 *p++ = cpu_to_be32(op->opnum);
5481 *p++ = rp->rp_status; /* already xdr'ed */
5482
5483 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
5484}
5485
5486void nfsd4_release_compoundargs(struct svc_rqst *rqstp)
5487{
5488 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5489
5490 if (args->ops != args->iops) {
5491 vfree(args->ops);
5492 args->ops = args->iops;
5493 }
5494 while (args->to_free) {
5495 struct svcxdr_tmpbuf *tb = args->to_free;
5496 args->to_free = tb->next;
5497 kfree(tb);
5498 }
5499}
5500
5501bool
5502nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5503{
5504 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5505
5506 /* svcxdr_tmp_alloc */
5507 args->to_free = NULL;
5508
5509 args->xdr = xdr;
5510 args->ops = args->iops;
5511 args->rqstp = rqstp;
5512
5513 return nfsd4_decode_compound(args);
5514}
5515
5516bool
5517nfs4svc_encode_compoundres(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5518{
5519 struct nfsd4_compoundres *resp = rqstp->rq_resp;
5520 __be32 *p;
5521
5522 /*
5523 * Send buffer space for the following items is reserved
5524 * at the top of nfsd4_proc_compound().
5525 */
5526 p = resp->statusp;
5527
5528 *p++ = resp->cstate.status;
5529
5530 rqstp->rq_next_page = xdr->page_ptr + 1;
5531
5532 *p++ = htonl(resp->taglen);
5533 memcpy(p, resp->tag, resp->taglen);
5534 p += XDR_QUADLEN(resp->taglen);
5535 *p++ = htonl(resp->opcnt);
5536
5537 nfsd4_sequence_done(resp);
5538 return true;
5539}
1/*
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 *
35 * TODO: Neil Brown made the following observation: We currently
36 * initially reserve NFSD_BUFSIZE space on the transmit queue and
37 * never release any of that until the request is complete.
38 * It would be good to calculate a new maximum response size while
39 * decoding the COMPOUND, and call svc_reserve with this number
40 * at the end of nfs4svc_decode_compoundargs.
41 */
42
43#include <linux/slab.h>
44#include <linux/namei.h>
45#include <linux/statfs.h>
46#include <linux/utsname.h>
47#include <linux/pagemap.h>
48#include <linux/sunrpc/svcauth_gss.h>
49
50#include "idmap.h"
51#include "acl.h"
52#include "xdr4.h"
53#include "vfs.h"
54#include "state.h"
55#include "cache.h"
56
57#define NFSDDBG_FACILITY NFSDDBG_XDR
58
59/*
60 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
61 * directory in order to indicate to the client that a filesystem boundary is present
62 * We use a fixed fsid for a referral
63 */
64#define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
65#define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
66
67static __be32
68check_filename(char *str, int len, __be32 err)
69{
70 int i;
71
72 if (len == 0)
73 return nfserr_inval;
74 if (isdotent(str, len))
75 return err;
76 for (i = 0; i < len; i++)
77 if (str[i] == '/')
78 return err;
79 return 0;
80}
81
82#define DECODE_HEAD \
83 __be32 *p; \
84 __be32 status
85#define DECODE_TAIL \
86 status = 0; \
87out: \
88 return status; \
89xdr_error: \
90 dprintk("NFSD: xdr error (%s:%d)\n", \
91 __FILE__, __LINE__); \
92 status = nfserr_bad_xdr; \
93 goto out
94
95#define READ32(x) (x) = ntohl(*p++)
96#define READ64(x) do { \
97 (x) = (u64)ntohl(*p++) << 32; \
98 (x) |= ntohl(*p++); \
99} while (0)
100#define READTIME(x) do { \
101 p++; \
102 (x) = ntohl(*p++); \
103 p++; \
104} while (0)
105#define READMEM(x,nbytes) do { \
106 x = (char *)p; \
107 p += XDR_QUADLEN(nbytes); \
108} while (0)
109#define SAVEMEM(x,nbytes) do { \
110 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \
111 savemem(argp, p, nbytes) : \
112 (char *)p)) { \
113 dprintk("NFSD: xdr error (%s:%d)\n", \
114 __FILE__, __LINE__); \
115 goto xdr_error; \
116 } \
117 p += XDR_QUADLEN(nbytes); \
118} while (0)
119#define COPYMEM(x,nbytes) do { \
120 memcpy((x), p, nbytes); \
121 p += XDR_QUADLEN(nbytes); \
122} while (0)
123
124/* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */
125#define READ_BUF(nbytes) do { \
126 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \
127 p = argp->p; \
128 argp->p += XDR_QUADLEN(nbytes); \
129 } else if (!(p = read_buf(argp, nbytes))) { \
130 dprintk("NFSD: xdr error (%s:%d)\n", \
131 __FILE__, __LINE__); \
132 goto xdr_error; \
133 } \
134} while (0)
135
136static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes)
137{
138 /* We want more bytes than seem to be available.
139 * Maybe we need a new page, maybe we have just run out
140 */
141 unsigned int avail = (char *)argp->end - (char *)argp->p;
142 __be32 *p;
143 if (avail + argp->pagelen < nbytes)
144 return NULL;
145 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */
146 return NULL;
147 /* ok, we can do it with the current plus the next page */
148 if (nbytes <= sizeof(argp->tmp))
149 p = argp->tmp;
150 else {
151 kfree(argp->tmpp);
152 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL);
153 if (!p)
154 return NULL;
155
156 }
157 /*
158 * The following memcpy is safe because read_buf is always
159 * called with nbytes > avail, and the two cases above both
160 * guarantee p points to at least nbytes bytes.
161 */
162 memcpy(p, argp->p, avail);
163 /* step to next page */
164 argp->p = page_address(argp->pagelist[0]);
165 argp->pagelist++;
166 if (argp->pagelen < PAGE_SIZE) {
167 argp->end = argp->p + (argp->pagelen>>2);
168 argp->pagelen = 0;
169 } else {
170 argp->end = argp->p + (PAGE_SIZE>>2);
171 argp->pagelen -= PAGE_SIZE;
172 }
173 memcpy(((char*)p)+avail, argp->p, (nbytes - avail));
174 argp->p += XDR_QUADLEN(nbytes - avail);
175 return p;
176}
177
178static int zero_clientid(clientid_t *clid)
179{
180 return (clid->cl_boot == 0) && (clid->cl_id == 0);
181}
182
183static int
184defer_free(struct nfsd4_compoundargs *argp,
185 void (*release)(const void *), void *p)
186{
187 struct tmpbuf *tb;
188
189 tb = kmalloc(sizeof(*tb), GFP_KERNEL);
190 if (!tb)
191 return -ENOMEM;
192 tb->buf = p;
193 tb->release = release;
194 tb->next = argp->to_free;
195 argp->to_free = tb;
196 return 0;
197}
198
199static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes)
200{
201 if (p == argp->tmp) {
202 p = kmemdup(argp->tmp, nbytes, GFP_KERNEL);
203 if (!p)
204 return NULL;
205 } else {
206 BUG_ON(p != argp->tmpp);
207 argp->tmpp = NULL;
208 }
209 if (defer_free(argp, kfree, p)) {
210 kfree(p);
211 return NULL;
212 } else
213 return (char *)p;
214}
215
216static __be32
217nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval)
218{
219 u32 bmlen;
220 DECODE_HEAD;
221
222 bmval[0] = 0;
223 bmval[1] = 0;
224 bmval[2] = 0;
225
226 READ_BUF(4);
227 READ32(bmlen);
228 if (bmlen > 1000)
229 goto xdr_error;
230
231 READ_BUF(bmlen << 2);
232 if (bmlen > 0)
233 READ32(bmval[0]);
234 if (bmlen > 1)
235 READ32(bmval[1]);
236 if (bmlen > 2)
237 READ32(bmval[2]);
238
239 DECODE_TAIL;
240}
241
242static __be32
243nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval,
244 struct iattr *iattr, struct nfs4_acl **acl)
245{
246 int expected_len, len = 0;
247 u32 dummy32;
248 char *buf;
249 int host_err;
250
251 DECODE_HEAD;
252 iattr->ia_valid = 0;
253 if ((status = nfsd4_decode_bitmap(argp, bmval)))
254 return status;
255
256 READ_BUF(4);
257 READ32(expected_len);
258
259 if (bmval[0] & FATTR4_WORD0_SIZE) {
260 READ_BUF(8);
261 len += 8;
262 READ64(iattr->ia_size);
263 iattr->ia_valid |= ATTR_SIZE;
264 }
265 if (bmval[0] & FATTR4_WORD0_ACL) {
266 int nace;
267 struct nfs4_ace *ace;
268
269 READ_BUF(4); len += 4;
270 READ32(nace);
271
272 if (nace > NFS4_ACL_MAX)
273 return nfserr_resource;
274
275 *acl = nfs4_acl_new(nace);
276 if (*acl == NULL) {
277 host_err = -ENOMEM;
278 goto out_nfserr;
279 }
280 defer_free(argp, kfree, *acl);
281
282 (*acl)->naces = nace;
283 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) {
284 READ_BUF(16); len += 16;
285 READ32(ace->type);
286 READ32(ace->flag);
287 READ32(ace->access_mask);
288 READ32(dummy32);
289 READ_BUF(dummy32);
290 len += XDR_QUADLEN(dummy32) << 2;
291 READMEM(buf, dummy32);
292 ace->whotype = nfs4_acl_get_whotype(buf, dummy32);
293 status = nfs_ok;
294 if (ace->whotype != NFS4_ACL_WHO_NAMED)
295 ace->who = 0;
296 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
297 status = nfsd_map_name_to_gid(argp->rqstp,
298 buf, dummy32, &ace->who);
299 else
300 status = nfsd_map_name_to_uid(argp->rqstp,
301 buf, dummy32, &ace->who);
302 if (status)
303 return status;
304 }
305 } else
306 *acl = NULL;
307 if (bmval[1] & FATTR4_WORD1_MODE) {
308 READ_BUF(4);
309 len += 4;
310 READ32(iattr->ia_mode);
311 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
312 iattr->ia_valid |= ATTR_MODE;
313 }
314 if (bmval[1] & FATTR4_WORD1_OWNER) {
315 READ_BUF(4);
316 len += 4;
317 READ32(dummy32);
318 READ_BUF(dummy32);
319 len += (XDR_QUADLEN(dummy32) << 2);
320 READMEM(buf, dummy32);
321 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid)))
322 return status;
323 iattr->ia_valid |= ATTR_UID;
324 }
325 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
326 READ_BUF(4);
327 len += 4;
328 READ32(dummy32);
329 READ_BUF(dummy32);
330 len += (XDR_QUADLEN(dummy32) << 2);
331 READMEM(buf, dummy32);
332 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid)))
333 return status;
334 iattr->ia_valid |= ATTR_GID;
335 }
336 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
337 READ_BUF(4);
338 len += 4;
339 READ32(dummy32);
340 switch (dummy32) {
341 case NFS4_SET_TO_CLIENT_TIME:
342 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
343 all 32 bits of 'nseconds'. */
344 READ_BUF(12);
345 len += 12;
346 READ32(dummy32);
347 if (dummy32)
348 return nfserr_inval;
349 READ32(iattr->ia_atime.tv_sec);
350 READ32(iattr->ia_atime.tv_nsec);
351 if (iattr->ia_atime.tv_nsec >= (u32)1000000000)
352 return nfserr_inval;
353 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
354 break;
355 case NFS4_SET_TO_SERVER_TIME:
356 iattr->ia_valid |= ATTR_ATIME;
357 break;
358 default:
359 goto xdr_error;
360 }
361 }
362 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
363 READ_BUF(4);
364 len += 4;
365 READ32(dummy32);
366 switch (dummy32) {
367 case NFS4_SET_TO_CLIENT_TIME:
368 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
369 all 32 bits of 'nseconds'. */
370 READ_BUF(12);
371 len += 12;
372 READ32(dummy32);
373 if (dummy32)
374 return nfserr_inval;
375 READ32(iattr->ia_mtime.tv_sec);
376 READ32(iattr->ia_mtime.tv_nsec);
377 if (iattr->ia_mtime.tv_nsec >= (u32)1000000000)
378 return nfserr_inval;
379 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
380 break;
381 case NFS4_SET_TO_SERVER_TIME:
382 iattr->ia_valid |= ATTR_MTIME;
383 break;
384 default:
385 goto xdr_error;
386 }
387 }
388 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
389 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
390 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2)
391 READ_BUF(expected_len - len);
392 else if (len != expected_len)
393 goto xdr_error;
394
395 DECODE_TAIL;
396
397out_nfserr:
398 status = nfserrno(host_err);
399 goto out;
400}
401
402static __be32
403nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid)
404{
405 DECODE_HEAD;
406
407 READ_BUF(sizeof(stateid_t));
408 READ32(sid->si_generation);
409 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t));
410
411 DECODE_TAIL;
412}
413
414static __be32
415nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access)
416{
417 DECODE_HEAD;
418
419 READ_BUF(4);
420 READ32(access->ac_req_access);
421
422 DECODE_TAIL;
423}
424
425static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
426{
427 DECODE_HEAD;
428
429 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8);
430 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN);
431 READ32(bcts->dir);
432 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker
433 * could help us figure out we should be using it. */
434 DECODE_TAIL;
435}
436
437static __be32
438nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
439{
440 DECODE_HEAD;
441
442 READ_BUF(4);
443 READ32(close->cl_seqid);
444 return nfsd4_decode_stateid(argp, &close->cl_stateid);
445
446 DECODE_TAIL;
447}
448
449
450static __be32
451nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
452{
453 DECODE_HEAD;
454
455 READ_BUF(12);
456 READ64(commit->co_offset);
457 READ32(commit->co_count);
458
459 DECODE_TAIL;
460}
461
462static __be32
463nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
464{
465 DECODE_HEAD;
466
467 READ_BUF(4);
468 READ32(create->cr_type);
469 switch (create->cr_type) {
470 case NF4LNK:
471 READ_BUF(4);
472 READ32(create->cr_linklen);
473 READ_BUF(create->cr_linklen);
474 SAVEMEM(create->cr_linkname, create->cr_linklen);
475 break;
476 case NF4BLK:
477 case NF4CHR:
478 READ_BUF(8);
479 READ32(create->cr_specdata1);
480 READ32(create->cr_specdata2);
481 break;
482 case NF4SOCK:
483 case NF4FIFO:
484 case NF4DIR:
485 default:
486 break;
487 }
488
489 READ_BUF(4);
490 READ32(create->cr_namelen);
491 READ_BUF(create->cr_namelen);
492 SAVEMEM(create->cr_name, create->cr_namelen);
493 if ((status = check_filename(create->cr_name, create->cr_namelen, nfserr_inval)))
494 return status;
495
496 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr,
497 &create->cr_acl);
498 if (status)
499 goto out;
500
501 DECODE_TAIL;
502}
503
504static inline __be32
505nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
506{
507 return nfsd4_decode_stateid(argp, &dr->dr_stateid);
508}
509
510static inline __be32
511nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
512{
513 return nfsd4_decode_bitmap(argp, getattr->ga_bmval);
514}
515
516static __be32
517nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
518{
519 DECODE_HEAD;
520
521 READ_BUF(4);
522 READ32(link->li_namelen);
523 READ_BUF(link->li_namelen);
524 SAVEMEM(link->li_name, link->li_namelen);
525 if ((status = check_filename(link->li_name, link->li_namelen, nfserr_inval)))
526 return status;
527
528 DECODE_TAIL;
529}
530
531static __be32
532nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
533{
534 DECODE_HEAD;
535
536 /*
537 * type, reclaim(boolean), offset, length, new_lock_owner(boolean)
538 */
539 READ_BUF(28);
540 READ32(lock->lk_type);
541 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
542 goto xdr_error;
543 READ32(lock->lk_reclaim);
544 READ64(lock->lk_offset);
545 READ64(lock->lk_length);
546 READ32(lock->lk_is_new);
547
548 if (lock->lk_is_new) {
549 READ_BUF(4);
550 READ32(lock->lk_new_open_seqid);
551 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid);
552 if (status)
553 return status;
554 READ_BUF(8 + sizeof(clientid_t));
555 READ32(lock->lk_new_lock_seqid);
556 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t));
557 READ32(lock->lk_new_owner.len);
558 READ_BUF(lock->lk_new_owner.len);
559 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len);
560 } else {
561 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid);
562 if (status)
563 return status;
564 READ_BUF(4);
565 READ32(lock->lk_old_lock_seqid);
566 }
567
568 DECODE_TAIL;
569}
570
571static __be32
572nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
573{
574 DECODE_HEAD;
575
576 READ_BUF(32);
577 READ32(lockt->lt_type);
578 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
579 goto xdr_error;
580 READ64(lockt->lt_offset);
581 READ64(lockt->lt_length);
582 COPYMEM(&lockt->lt_clientid, 8);
583 READ32(lockt->lt_owner.len);
584 READ_BUF(lockt->lt_owner.len);
585 READMEM(lockt->lt_owner.data, lockt->lt_owner.len);
586
587 DECODE_TAIL;
588}
589
590static __be32
591nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
592{
593 DECODE_HEAD;
594
595 READ_BUF(8);
596 READ32(locku->lu_type);
597 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
598 goto xdr_error;
599 READ32(locku->lu_seqid);
600 status = nfsd4_decode_stateid(argp, &locku->lu_stateid);
601 if (status)
602 return status;
603 READ_BUF(16);
604 READ64(locku->lu_offset);
605 READ64(locku->lu_length);
606
607 DECODE_TAIL;
608}
609
610static __be32
611nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
612{
613 DECODE_HEAD;
614
615 READ_BUF(4);
616 READ32(lookup->lo_len);
617 READ_BUF(lookup->lo_len);
618 SAVEMEM(lookup->lo_name, lookup->lo_len);
619 if ((status = check_filename(lookup->lo_name, lookup->lo_len, nfserr_noent)))
620 return status;
621
622 DECODE_TAIL;
623}
624
625static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
626{
627 __be32 *p;
628 u32 w;
629
630 READ_BUF(4);
631 READ32(w);
632 *share_access = w & NFS4_SHARE_ACCESS_MASK;
633 *deleg_want = w & NFS4_SHARE_WANT_MASK;
634 if (deleg_when)
635 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
636
637 switch (w & NFS4_SHARE_ACCESS_MASK) {
638 case NFS4_SHARE_ACCESS_READ:
639 case NFS4_SHARE_ACCESS_WRITE:
640 case NFS4_SHARE_ACCESS_BOTH:
641 break;
642 default:
643 return nfserr_bad_xdr;
644 }
645 w &= ~NFS4_SHARE_ACCESS_MASK;
646 if (!w)
647 return nfs_ok;
648 if (!argp->minorversion)
649 return nfserr_bad_xdr;
650 switch (w & NFS4_SHARE_WANT_MASK) {
651 case NFS4_SHARE_WANT_NO_PREFERENCE:
652 case NFS4_SHARE_WANT_READ_DELEG:
653 case NFS4_SHARE_WANT_WRITE_DELEG:
654 case NFS4_SHARE_WANT_ANY_DELEG:
655 case NFS4_SHARE_WANT_NO_DELEG:
656 case NFS4_SHARE_WANT_CANCEL:
657 break;
658 default:
659 return nfserr_bad_xdr;
660 }
661 w &= ~NFS4_SHARE_WANT_MASK;
662 if (!w)
663 return nfs_ok;
664
665 if (!deleg_when) /* open_downgrade */
666 return nfserr_inval;
667 switch (w) {
668 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
669 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
670 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
671 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
672 return nfs_ok;
673 }
674xdr_error:
675 return nfserr_bad_xdr;
676}
677
678static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
679{
680 __be32 *p;
681
682 READ_BUF(4);
683 READ32(*x);
684 /* Note: unlinke access bits, deny bits may be zero. */
685 if (*x & ~NFS4_SHARE_DENY_BOTH)
686 return nfserr_bad_xdr;
687 return nfs_ok;
688xdr_error:
689 return nfserr_bad_xdr;
690}
691
692static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
693{
694 __be32 *p;
695
696 READ_BUF(4);
697 READ32(o->len);
698
699 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT)
700 return nfserr_bad_xdr;
701
702 READ_BUF(o->len);
703 SAVEMEM(o->data, o->len);
704 return nfs_ok;
705xdr_error:
706 return nfserr_bad_xdr;
707}
708
709static __be32
710nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
711{
712 DECODE_HEAD;
713 u32 dummy;
714
715 memset(open->op_bmval, 0, sizeof(open->op_bmval));
716 open->op_iattr.ia_valid = 0;
717 open->op_openowner = NULL;
718
719 /* seqid, share_access, share_deny, clientid, ownerlen */
720 READ_BUF(4);
721 READ32(open->op_seqid);
722 /* decode, yet ignore deleg_when until supported */
723 status = nfsd4_decode_share_access(argp, &open->op_share_access,
724 &open->op_deleg_want, &dummy);
725 if (status)
726 goto xdr_error;
727 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
728 if (status)
729 goto xdr_error;
730 READ_BUF(sizeof(clientid_t));
731 COPYMEM(&open->op_clientid, sizeof(clientid_t));
732 status = nfsd4_decode_opaque(argp, &open->op_owner);
733 if (status)
734 goto xdr_error;
735 READ_BUF(4);
736 READ32(open->op_create);
737 switch (open->op_create) {
738 case NFS4_OPEN_NOCREATE:
739 break;
740 case NFS4_OPEN_CREATE:
741 READ_BUF(4);
742 READ32(open->op_createmode);
743 switch (open->op_createmode) {
744 case NFS4_CREATE_UNCHECKED:
745 case NFS4_CREATE_GUARDED:
746 status = nfsd4_decode_fattr(argp, open->op_bmval,
747 &open->op_iattr, &open->op_acl);
748 if (status)
749 goto out;
750 break;
751 case NFS4_CREATE_EXCLUSIVE:
752 READ_BUF(NFS4_VERIFIER_SIZE);
753 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
754 break;
755 case NFS4_CREATE_EXCLUSIVE4_1:
756 if (argp->minorversion < 1)
757 goto xdr_error;
758 READ_BUF(NFS4_VERIFIER_SIZE);
759 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
760 status = nfsd4_decode_fattr(argp, open->op_bmval,
761 &open->op_iattr, &open->op_acl);
762 if (status)
763 goto out;
764 break;
765 default:
766 goto xdr_error;
767 }
768 break;
769 default:
770 goto xdr_error;
771 }
772
773 /* open_claim */
774 READ_BUF(4);
775 READ32(open->op_claim_type);
776 switch (open->op_claim_type) {
777 case NFS4_OPEN_CLAIM_NULL:
778 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
779 READ_BUF(4);
780 READ32(open->op_fname.len);
781 READ_BUF(open->op_fname.len);
782 SAVEMEM(open->op_fname.data, open->op_fname.len);
783 if ((status = check_filename(open->op_fname.data, open->op_fname.len, nfserr_inval)))
784 return status;
785 break;
786 case NFS4_OPEN_CLAIM_PREVIOUS:
787 READ_BUF(4);
788 READ32(open->op_delegate_type);
789 break;
790 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
791 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
792 if (status)
793 return status;
794 READ_BUF(4);
795 READ32(open->op_fname.len);
796 READ_BUF(open->op_fname.len);
797 SAVEMEM(open->op_fname.data, open->op_fname.len);
798 if ((status = check_filename(open->op_fname.data, open->op_fname.len, nfserr_inval)))
799 return status;
800 break;
801 case NFS4_OPEN_CLAIM_FH:
802 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
803 if (argp->minorversion < 1)
804 goto xdr_error;
805 /* void */
806 break;
807 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
808 if (argp->minorversion < 1)
809 goto xdr_error;
810 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
811 if (status)
812 return status;
813 break;
814 default:
815 goto xdr_error;
816 }
817
818 DECODE_TAIL;
819}
820
821static __be32
822nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
823{
824 DECODE_HEAD;
825
826 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid);
827 if (status)
828 return status;
829 READ_BUF(4);
830 READ32(open_conf->oc_seqid);
831
832 DECODE_TAIL;
833}
834
835static __be32
836nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
837{
838 DECODE_HEAD;
839
840 status = nfsd4_decode_stateid(argp, &open_down->od_stateid);
841 if (status)
842 return status;
843 READ_BUF(4);
844 READ32(open_down->od_seqid);
845 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
846 &open_down->od_deleg_want, NULL);
847 if (status)
848 return status;
849 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
850 if (status)
851 return status;
852 DECODE_TAIL;
853}
854
855static __be32
856nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
857{
858 DECODE_HEAD;
859
860 READ_BUF(4);
861 READ32(putfh->pf_fhlen);
862 if (putfh->pf_fhlen > NFS4_FHSIZE)
863 goto xdr_error;
864 READ_BUF(putfh->pf_fhlen);
865 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen);
866
867 DECODE_TAIL;
868}
869
870static __be32
871nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
872{
873 DECODE_HEAD;
874
875 status = nfsd4_decode_stateid(argp, &read->rd_stateid);
876 if (status)
877 return status;
878 READ_BUF(12);
879 READ64(read->rd_offset);
880 READ32(read->rd_length);
881
882 DECODE_TAIL;
883}
884
885static __be32
886nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
887{
888 DECODE_HEAD;
889
890 READ_BUF(24);
891 READ64(readdir->rd_cookie);
892 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data));
893 READ32(readdir->rd_dircount); /* just in case you needed a useless field... */
894 READ32(readdir->rd_maxcount);
895 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval)))
896 goto out;
897
898 DECODE_TAIL;
899}
900
901static __be32
902nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
903{
904 DECODE_HEAD;
905
906 READ_BUF(4);
907 READ32(remove->rm_namelen);
908 READ_BUF(remove->rm_namelen);
909 SAVEMEM(remove->rm_name, remove->rm_namelen);
910 if ((status = check_filename(remove->rm_name, remove->rm_namelen, nfserr_noent)))
911 return status;
912
913 DECODE_TAIL;
914}
915
916static __be32
917nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
918{
919 DECODE_HEAD;
920
921 READ_BUF(4);
922 READ32(rename->rn_snamelen);
923 READ_BUF(rename->rn_snamelen + 4);
924 SAVEMEM(rename->rn_sname, rename->rn_snamelen);
925 READ32(rename->rn_tnamelen);
926 READ_BUF(rename->rn_tnamelen);
927 SAVEMEM(rename->rn_tname, rename->rn_tnamelen);
928 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen, nfserr_noent)))
929 return status;
930 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen, nfserr_inval)))
931 return status;
932
933 DECODE_TAIL;
934}
935
936static __be32
937nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
938{
939 DECODE_HEAD;
940
941 READ_BUF(sizeof(clientid_t));
942 COPYMEM(clientid, sizeof(clientid_t));
943
944 DECODE_TAIL;
945}
946
947static __be32
948nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
949 struct nfsd4_secinfo *secinfo)
950{
951 DECODE_HEAD;
952
953 READ_BUF(4);
954 READ32(secinfo->si_namelen);
955 READ_BUF(secinfo->si_namelen);
956 SAVEMEM(secinfo->si_name, secinfo->si_namelen);
957 status = check_filename(secinfo->si_name, secinfo->si_namelen,
958 nfserr_noent);
959 if (status)
960 return status;
961 DECODE_TAIL;
962}
963
964static __be32
965nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
966 struct nfsd4_secinfo_no_name *sin)
967{
968 DECODE_HEAD;
969
970 READ_BUF(4);
971 READ32(sin->sin_style);
972 DECODE_TAIL;
973}
974
975static __be32
976nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
977{
978 __be32 status;
979
980 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid);
981 if (status)
982 return status;
983 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr,
984 &setattr->sa_acl);
985}
986
987static __be32
988nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
989{
990 DECODE_HEAD;
991
992 READ_BUF(NFS4_VERIFIER_SIZE);
993 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE);
994
995 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
996 if (status)
997 return nfserr_bad_xdr;
998 READ_BUF(8);
999 READ32(setclientid->se_callback_prog);
1000 READ32(setclientid->se_callback_netid_len);
1001
1002 READ_BUF(setclientid->se_callback_netid_len + 4);
1003 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len);
1004 READ32(setclientid->se_callback_addr_len);
1005
1006 READ_BUF(setclientid->se_callback_addr_len + 4);
1007 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len);
1008 READ32(setclientid->se_callback_ident);
1009
1010 DECODE_TAIL;
1011}
1012
1013static __be32
1014nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1015{
1016 DECODE_HEAD;
1017
1018 READ_BUF(8 + NFS4_VERIFIER_SIZE);
1019 COPYMEM(&scd_c->sc_clientid, 8);
1020 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE);
1021
1022 DECODE_TAIL;
1023}
1024
1025/* Also used for NVERIFY */
1026static __be32
1027nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1028{
1029#if 0
1030 struct nfsd4_compoundargs save = {
1031 .p = argp->p,
1032 .end = argp->end,
1033 .rqstp = argp->rqstp,
1034 };
1035 u32 ve_bmval[2];
1036 struct iattr ve_iattr; /* request */
1037 struct nfs4_acl *ve_acl; /* request */
1038#endif
1039 DECODE_HEAD;
1040
1041 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval)))
1042 goto out;
1043
1044 /* For convenience's sake, we compare raw xdr'd attributes in
1045 * nfsd4_proc_verify; however we still decode here just to return
1046 * correct error in case of bad xdr. */
1047#if 0
1048 status = nfsd4_decode_fattr(ve_bmval, &ve_iattr, &ve_acl);
1049 if (status == nfserr_inval) {
1050 status = nfserrno(status);
1051 goto out;
1052 }
1053#endif
1054 READ_BUF(4);
1055 READ32(verify->ve_attrlen);
1056 READ_BUF(verify->ve_attrlen);
1057 SAVEMEM(verify->ve_attrval, verify->ve_attrlen);
1058
1059 DECODE_TAIL;
1060}
1061
1062static __be32
1063nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1064{
1065 int avail;
1066 int v;
1067 int len;
1068 DECODE_HEAD;
1069
1070 status = nfsd4_decode_stateid(argp, &write->wr_stateid);
1071 if (status)
1072 return status;
1073 READ_BUF(16);
1074 READ64(write->wr_offset);
1075 READ32(write->wr_stable_how);
1076 if (write->wr_stable_how > 2)
1077 goto xdr_error;
1078 READ32(write->wr_buflen);
1079
1080 /* Sorry .. no magic macros for this.. *
1081 * READ_BUF(write->wr_buflen);
1082 * SAVEMEM(write->wr_buf, write->wr_buflen);
1083 */
1084 avail = (char*)argp->end - (char*)argp->p;
1085 if (avail + argp->pagelen < write->wr_buflen) {
1086 dprintk("NFSD: xdr error (%s:%d)\n",
1087 __FILE__, __LINE__);
1088 goto xdr_error;
1089 }
1090 argp->rqstp->rq_vec[0].iov_base = p;
1091 argp->rqstp->rq_vec[0].iov_len = avail;
1092 v = 0;
1093 len = write->wr_buflen;
1094 while (len > argp->rqstp->rq_vec[v].iov_len) {
1095 len -= argp->rqstp->rq_vec[v].iov_len;
1096 v++;
1097 argp->rqstp->rq_vec[v].iov_base = page_address(argp->pagelist[0]);
1098 argp->pagelist++;
1099 if (argp->pagelen >= PAGE_SIZE) {
1100 argp->rqstp->rq_vec[v].iov_len = PAGE_SIZE;
1101 argp->pagelen -= PAGE_SIZE;
1102 } else {
1103 argp->rqstp->rq_vec[v].iov_len = argp->pagelen;
1104 argp->pagelen -= len;
1105 }
1106 }
1107 argp->end = (__be32*) (argp->rqstp->rq_vec[v].iov_base + argp->rqstp->rq_vec[v].iov_len);
1108 argp->p = (__be32*) (argp->rqstp->rq_vec[v].iov_base + (XDR_QUADLEN(len) << 2));
1109 argp->rqstp->rq_vec[v].iov_len = len;
1110 write->wr_vlen = v+1;
1111
1112 DECODE_TAIL;
1113}
1114
1115static __be32
1116nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1117{
1118 DECODE_HEAD;
1119
1120 READ_BUF(12);
1121 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t));
1122 READ32(rlockowner->rl_owner.len);
1123 READ_BUF(rlockowner->rl_owner.len);
1124 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len);
1125
1126 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1127 return nfserr_inval;
1128 DECODE_TAIL;
1129}
1130
1131static __be32
1132nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1133 struct nfsd4_exchange_id *exid)
1134{
1135 int dummy, tmp;
1136 DECODE_HEAD;
1137
1138 READ_BUF(NFS4_VERIFIER_SIZE);
1139 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE);
1140
1141 status = nfsd4_decode_opaque(argp, &exid->clname);
1142 if (status)
1143 return nfserr_bad_xdr;
1144
1145 READ_BUF(4);
1146 READ32(exid->flags);
1147
1148 /* Ignore state_protect4_a */
1149 READ_BUF(4);
1150 READ32(exid->spa_how);
1151 switch (exid->spa_how) {
1152 case SP4_NONE:
1153 break;
1154 case SP4_MACH_CRED:
1155 /* spo_must_enforce */
1156 READ_BUF(4);
1157 READ32(dummy);
1158 READ_BUF(dummy * 4);
1159 p += dummy;
1160
1161 /* spo_must_allow */
1162 READ_BUF(4);
1163 READ32(dummy);
1164 READ_BUF(dummy * 4);
1165 p += dummy;
1166 break;
1167 case SP4_SSV:
1168 /* ssp_ops */
1169 READ_BUF(4);
1170 READ32(dummy);
1171 READ_BUF(dummy * 4);
1172 p += dummy;
1173
1174 READ_BUF(4);
1175 READ32(dummy);
1176 READ_BUF(dummy * 4);
1177 p += dummy;
1178
1179 /* ssp_hash_algs<> */
1180 READ_BUF(4);
1181 READ32(tmp);
1182 while (tmp--) {
1183 READ_BUF(4);
1184 READ32(dummy);
1185 READ_BUF(dummy);
1186 p += XDR_QUADLEN(dummy);
1187 }
1188
1189 /* ssp_encr_algs<> */
1190 READ_BUF(4);
1191 READ32(tmp);
1192 while (tmp--) {
1193 READ_BUF(4);
1194 READ32(dummy);
1195 READ_BUF(dummy);
1196 p += XDR_QUADLEN(dummy);
1197 }
1198
1199 /* ssp_window and ssp_num_gss_handles */
1200 READ_BUF(8);
1201 READ32(dummy);
1202 READ32(dummy);
1203 break;
1204 default:
1205 goto xdr_error;
1206 }
1207
1208 /* Ignore Implementation ID */
1209 READ_BUF(4); /* nfs_impl_id4 array length */
1210 READ32(dummy);
1211
1212 if (dummy > 1)
1213 goto xdr_error;
1214
1215 if (dummy == 1) {
1216 /* nii_domain */
1217 READ_BUF(4);
1218 READ32(dummy);
1219 READ_BUF(dummy);
1220 p += XDR_QUADLEN(dummy);
1221
1222 /* nii_name */
1223 READ_BUF(4);
1224 READ32(dummy);
1225 READ_BUF(dummy);
1226 p += XDR_QUADLEN(dummy);
1227
1228 /* nii_date */
1229 READ_BUF(12);
1230 p += 3;
1231 }
1232 DECODE_TAIL;
1233}
1234
1235static __be32
1236nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1237 struct nfsd4_create_session *sess)
1238{
1239 DECODE_HEAD;
1240
1241 u32 dummy;
1242 char *machine_name;
1243 int i;
1244 int nr_secflavs;
1245
1246 READ_BUF(16);
1247 COPYMEM(&sess->clientid, 8);
1248 READ32(sess->seqid);
1249 READ32(sess->flags);
1250
1251 /* Fore channel attrs */
1252 READ_BUF(28);
1253 READ32(dummy); /* headerpadsz is always 0 */
1254 READ32(sess->fore_channel.maxreq_sz);
1255 READ32(sess->fore_channel.maxresp_sz);
1256 READ32(sess->fore_channel.maxresp_cached);
1257 READ32(sess->fore_channel.maxops);
1258 READ32(sess->fore_channel.maxreqs);
1259 READ32(sess->fore_channel.nr_rdma_attrs);
1260 if (sess->fore_channel.nr_rdma_attrs == 1) {
1261 READ_BUF(4);
1262 READ32(sess->fore_channel.rdma_attrs);
1263 } else if (sess->fore_channel.nr_rdma_attrs > 1) {
1264 dprintk("Too many fore channel attr bitmaps!\n");
1265 goto xdr_error;
1266 }
1267
1268 /* Back channel attrs */
1269 READ_BUF(28);
1270 READ32(dummy); /* headerpadsz is always 0 */
1271 READ32(sess->back_channel.maxreq_sz);
1272 READ32(sess->back_channel.maxresp_sz);
1273 READ32(sess->back_channel.maxresp_cached);
1274 READ32(sess->back_channel.maxops);
1275 READ32(sess->back_channel.maxreqs);
1276 READ32(sess->back_channel.nr_rdma_attrs);
1277 if (sess->back_channel.nr_rdma_attrs == 1) {
1278 READ_BUF(4);
1279 READ32(sess->back_channel.rdma_attrs);
1280 } else if (sess->back_channel.nr_rdma_attrs > 1) {
1281 dprintk("Too many back channel attr bitmaps!\n");
1282 goto xdr_error;
1283 }
1284
1285 READ_BUF(8);
1286 READ32(sess->callback_prog);
1287
1288 /* callback_sec_params4 */
1289 READ32(nr_secflavs);
1290 for (i = 0; i < nr_secflavs; ++i) {
1291 READ_BUF(4);
1292 READ32(dummy);
1293 switch (dummy) {
1294 case RPC_AUTH_NULL:
1295 /* Nothing to read */
1296 break;
1297 case RPC_AUTH_UNIX:
1298 READ_BUF(8);
1299 /* stamp */
1300 READ32(dummy);
1301
1302 /* machine name */
1303 READ32(dummy);
1304 READ_BUF(dummy);
1305 SAVEMEM(machine_name, dummy);
1306
1307 /* uid, gid */
1308 READ_BUF(8);
1309 READ32(sess->uid);
1310 READ32(sess->gid);
1311
1312 /* more gids */
1313 READ_BUF(4);
1314 READ32(dummy);
1315 READ_BUF(dummy * 4);
1316 break;
1317 case RPC_AUTH_GSS:
1318 dprintk("RPC_AUTH_GSS callback secflavor "
1319 "not supported!\n");
1320 READ_BUF(8);
1321 /* gcbp_service */
1322 READ32(dummy);
1323 /* gcbp_handle_from_server */
1324 READ32(dummy);
1325 READ_BUF(dummy);
1326 p += XDR_QUADLEN(dummy);
1327 /* gcbp_handle_from_client */
1328 READ_BUF(4);
1329 READ32(dummy);
1330 READ_BUF(dummy);
1331 break;
1332 default:
1333 dprintk("Illegal callback secflavor\n");
1334 return nfserr_inval;
1335 }
1336 }
1337 DECODE_TAIL;
1338}
1339
1340static __be32
1341nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1342 struct nfsd4_destroy_session *destroy_session)
1343{
1344 DECODE_HEAD;
1345 READ_BUF(NFS4_MAX_SESSIONID_LEN);
1346 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1347
1348 DECODE_TAIL;
1349}
1350
1351static __be32
1352nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1353 struct nfsd4_free_stateid *free_stateid)
1354{
1355 DECODE_HEAD;
1356
1357 READ_BUF(sizeof(stateid_t));
1358 READ32(free_stateid->fr_stateid.si_generation);
1359 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t));
1360
1361 DECODE_TAIL;
1362}
1363
1364static __be32
1365nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1366 struct nfsd4_sequence *seq)
1367{
1368 DECODE_HEAD;
1369
1370 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16);
1371 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1372 READ32(seq->seqid);
1373 READ32(seq->slotid);
1374 READ32(seq->maxslots);
1375 READ32(seq->cachethis);
1376
1377 DECODE_TAIL;
1378}
1379
1380static __be32
1381nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1382{
1383 int i;
1384 __be32 *p, status;
1385 struct nfsd4_test_stateid_id *stateid;
1386
1387 READ_BUF(4);
1388 test_stateid->ts_num_ids = ntohl(*p++);
1389
1390 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1391
1392 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1393 stateid = kmalloc(sizeof(struct nfsd4_test_stateid_id), GFP_KERNEL);
1394 if (!stateid) {
1395 status = nfserrno(-ENOMEM);
1396 goto out;
1397 }
1398
1399 defer_free(argp, kfree, stateid);
1400 INIT_LIST_HEAD(&stateid->ts_id_list);
1401 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1402
1403 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid);
1404 if (status)
1405 goto out;
1406 }
1407
1408 status = 0;
1409out:
1410 return status;
1411xdr_error:
1412 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__);
1413 status = nfserr_bad_xdr;
1414 goto out;
1415}
1416
1417static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc)
1418{
1419 DECODE_HEAD;
1420
1421 READ_BUF(8);
1422 COPYMEM(&dc->clientid, 8);
1423
1424 DECODE_TAIL;
1425}
1426
1427static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc)
1428{
1429 DECODE_HEAD;
1430
1431 READ_BUF(4);
1432 READ32(rc->rca_one_fs);
1433
1434 DECODE_TAIL;
1435}
1436
1437static __be32
1438nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
1439{
1440 return nfs_ok;
1441}
1442
1443static __be32
1444nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
1445{
1446 return nfserr_notsupp;
1447}
1448
1449typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
1450
1451static nfsd4_dec nfsd4_dec_ops[] = {
1452 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
1453 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
1454 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
1455 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
1456 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
1457 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
1458 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
1459 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
1460 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
1461 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
1462 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
1463 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
1464 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
1465 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
1466 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1467 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
1468 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
1469 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm,
1470 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
1471 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
1472 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_noop,
1473 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
1474 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
1475 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
1476 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
1477 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
1478 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
1479 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew,
1480 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
1481 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
1482 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
1483 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
1484 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid,
1485 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
1486 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1487 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
1488 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner,
1489};
1490
1491static nfsd4_dec nfsd41_dec_ops[] = {
1492 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
1493 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
1494 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
1495 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
1496 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
1497 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
1498 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
1499 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
1500 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
1501 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
1502 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
1503 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
1504 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
1505 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
1506 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1507 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
1508 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
1509 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_notsupp,
1510 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
1511 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
1512 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_notsupp,
1513 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
1514 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
1515 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
1516 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
1517 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
1518 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
1519 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_notsupp,
1520 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
1521 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
1522 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
1523 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
1524 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_notsupp,
1525 [OP_SETCLIENTID_CONFIRM]= (nfsd4_dec)nfsd4_decode_notsupp,
1526 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1527 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
1528 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_notsupp,
1529
1530 /* new operations for NFSv4.1 */
1531 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_notsupp,
1532 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
1533 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id,
1534 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session,
1535 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session,
1536 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid,
1537 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1538 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp,
1539 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
1540 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp,
1541 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp,
1542 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp,
1543 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name,
1544 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence,
1545 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp,
1546 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid,
1547 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1548 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid,
1549 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete,
1550};
1551
1552struct nfsd4_minorversion_ops {
1553 nfsd4_dec *decoders;
1554 int nops;
1555};
1556
1557static struct nfsd4_minorversion_ops nfsd4_minorversion[] = {
1558 [0] = { nfsd4_dec_ops, ARRAY_SIZE(nfsd4_dec_ops) },
1559 [1] = { nfsd41_dec_ops, ARRAY_SIZE(nfsd41_dec_ops) },
1560};
1561
1562static __be32
1563nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
1564{
1565 DECODE_HEAD;
1566 struct nfsd4_op *op;
1567 struct nfsd4_minorversion_ops *ops;
1568 bool cachethis = false;
1569 int i;
1570
1571 /*
1572 * XXX: According to spec, we should check the tag
1573 * for UTF-8 compliance. I'm postponing this for
1574 * now because it seems that some clients do use
1575 * binary tags.
1576 */
1577 READ_BUF(4);
1578 READ32(argp->taglen);
1579 READ_BUF(argp->taglen + 8);
1580 SAVEMEM(argp->tag, argp->taglen);
1581 READ32(argp->minorversion);
1582 READ32(argp->opcnt);
1583
1584 if (argp->taglen > NFSD4_MAX_TAGLEN)
1585 goto xdr_error;
1586 if (argp->opcnt > 100)
1587 goto xdr_error;
1588
1589 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
1590 argp->ops = kmalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
1591 if (!argp->ops) {
1592 argp->ops = argp->iops;
1593 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
1594 goto xdr_error;
1595 }
1596 }
1597
1598 if (argp->minorversion >= ARRAY_SIZE(nfsd4_minorversion))
1599 argp->opcnt = 0;
1600
1601 ops = &nfsd4_minorversion[argp->minorversion];
1602 for (i = 0; i < argp->opcnt; i++) {
1603 op = &argp->ops[i];
1604 op->replay = NULL;
1605
1606 /*
1607 * We can't use READ_BUF() here because we need to handle
1608 * a missing opcode as an OP_WRITE + 1. So we need to check
1609 * to see if we're truly at the end of our buffer or if there
1610 * is another page we need to flip to.
1611 */
1612
1613 if (argp->p == argp->end) {
1614 if (argp->pagelen < 4) {
1615 /* There isn't an opcode still on the wire */
1616 op->opnum = OP_WRITE + 1;
1617 op->status = nfserr_bad_xdr;
1618 argp->opcnt = i+1;
1619 break;
1620 }
1621
1622 /*
1623 * False alarm. We just hit a page boundary, but there
1624 * is still data available. Move pointer across page
1625 * boundary. *snip from READ_BUF*
1626 */
1627 argp->p = page_address(argp->pagelist[0]);
1628 argp->pagelist++;
1629 if (argp->pagelen < PAGE_SIZE) {
1630 argp->end = argp->p + (argp->pagelen>>2);
1631 argp->pagelen = 0;
1632 } else {
1633 argp->end = argp->p + (PAGE_SIZE>>2);
1634 argp->pagelen -= PAGE_SIZE;
1635 }
1636 }
1637 op->opnum = ntohl(*argp->p++);
1638
1639 if (op->opnum >= FIRST_NFS4_OP && op->opnum <= LAST_NFS4_OP)
1640 op->status = ops->decoders[op->opnum](argp, &op->u);
1641 else {
1642 op->opnum = OP_ILLEGAL;
1643 op->status = nfserr_op_illegal;
1644 }
1645
1646 if (op->status) {
1647 argp->opcnt = i+1;
1648 break;
1649 }
1650 /*
1651 * We'll try to cache the result in the DRC if any one
1652 * op in the compound wants to be cached:
1653 */
1654 cachethis |= nfsd4_cache_this_op(op);
1655 }
1656 /* Sessions make the DRC unnecessary: */
1657 if (argp->minorversion)
1658 cachethis = false;
1659 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
1660
1661 DECODE_TAIL;
1662}
1663
1664#define WRITE32(n) *p++ = htonl(n)
1665#define WRITE64(n) do { \
1666 *p++ = htonl((u32)((n) >> 32)); \
1667 *p++ = htonl((u32)(n)); \
1668} while (0)
1669#define WRITEMEM(ptr,nbytes) do { if (nbytes > 0) { \
1670 *(p + XDR_QUADLEN(nbytes) -1) = 0; \
1671 memcpy(p, ptr, nbytes); \
1672 p += XDR_QUADLEN(nbytes); \
1673}} while (0)
1674
1675static void write32(__be32 **p, u32 n)
1676{
1677 *(*p)++ = htonl(n);
1678}
1679
1680static void write64(__be32 **p, u64 n)
1681{
1682 write32(p, (n >> 32));
1683 write32(p, (u32)n);
1684}
1685
1686static void write_change(__be32 **p, struct kstat *stat, struct inode *inode)
1687{
1688 if (IS_I_VERSION(inode)) {
1689 write64(p, inode->i_version);
1690 } else {
1691 write32(p, stat->ctime.tv_sec);
1692 write32(p, stat->ctime.tv_nsec);
1693 }
1694}
1695
1696static void write_cinfo(__be32 **p, struct nfsd4_change_info *c)
1697{
1698 write32(p, c->atomic);
1699 if (c->change_supported) {
1700 write64(p, c->before_change);
1701 write64(p, c->after_change);
1702 } else {
1703 write32(p, c->before_ctime_sec);
1704 write32(p, c->before_ctime_nsec);
1705 write32(p, c->after_ctime_sec);
1706 write32(p, c->after_ctime_nsec);
1707 }
1708}
1709
1710#define RESERVE_SPACE(nbytes) do { \
1711 p = resp->p; \
1712 BUG_ON(p + XDR_QUADLEN(nbytes) > resp->end); \
1713} while (0)
1714#define ADJUST_ARGS() resp->p = p
1715
1716/*
1717 * Header routine to setup seqid operation replay cache
1718 */
1719#define ENCODE_SEQID_OP_HEAD \
1720 __be32 *save; \
1721 \
1722 save = resp->p;
1723
1724/*
1725 * Routine for encoding the result of a "seqid-mutating" NFSv4 operation. This
1726 * is where sequence id's are incremented, and the replay cache is filled.
1727 * Note that we increment sequence id's here, at the last moment, so we're sure
1728 * we know whether the error to be returned is a sequence id mutating error.
1729 */
1730
1731static void encode_seqid_op_tail(struct nfsd4_compoundres *resp, __be32 *save, __be32 nfserr)
1732{
1733 struct nfs4_stateowner *stateowner = resp->cstate.replay_owner;
1734
1735 if (seqid_mutating_err(ntohl(nfserr)) && stateowner) {
1736 stateowner->so_seqid++;
1737 stateowner->so_replay.rp_status = nfserr;
1738 stateowner->so_replay.rp_buflen =
1739 (char *)resp->p - (char *)save;
1740 memcpy(stateowner->so_replay.rp_buf, save,
1741 stateowner->so_replay.rp_buflen);
1742 nfsd4_purge_closed_stateid(stateowner);
1743 }
1744}
1745
1746/* Encode as an array of strings the string given with components
1747 * separated @sep, escaped with esc_enter and esc_exit.
1748 */
1749static __be32 nfsd4_encode_components_esc(char sep, char *components,
1750 __be32 **pp, int *buflen,
1751 char esc_enter, char esc_exit)
1752{
1753 __be32 *p = *pp;
1754 __be32 *countp = p;
1755 int strlen, count=0;
1756 char *str, *end, *next;
1757
1758 dprintk("nfsd4_encode_components(%s)\n", components);
1759 if ((*buflen -= 4) < 0)
1760 return nfserr_resource;
1761 WRITE32(0); /* We will fill this in with @count later */
1762 end = str = components;
1763 while (*end) {
1764 bool found_esc = false;
1765
1766 /* try to parse as esc_start, ..., esc_end, sep */
1767 if (*str == esc_enter) {
1768 for (; *end && (*end != esc_exit); end++)
1769 /* find esc_exit or end of string */;
1770 next = end + 1;
1771 if (*end && (!*next || *next == sep)) {
1772 str++;
1773 found_esc = true;
1774 }
1775 }
1776
1777 if (!found_esc)
1778 for (; *end && (*end != sep); end++)
1779 /* find sep or end of string */;
1780
1781 strlen = end - str;
1782 if (strlen) {
1783 if ((*buflen -= ((XDR_QUADLEN(strlen) << 2) + 4)) < 0)
1784 return nfserr_resource;
1785 WRITE32(strlen);
1786 WRITEMEM(str, strlen);
1787 count++;
1788 }
1789 else
1790 end++;
1791 str = end;
1792 }
1793 *pp = p;
1794 p = countp;
1795 WRITE32(count);
1796 return 0;
1797}
1798
1799/* Encode as an array of strings the string given with components
1800 * separated @sep.
1801 */
1802static __be32 nfsd4_encode_components(char sep, char *components,
1803 __be32 **pp, int *buflen)
1804{
1805 return nfsd4_encode_components_esc(sep, components, pp, buflen, 0, 0);
1806}
1807
1808/*
1809 * encode a location element of a fs_locations structure
1810 */
1811static __be32 nfsd4_encode_fs_location4(struct nfsd4_fs_location *location,
1812 __be32 **pp, int *buflen)
1813{
1814 __be32 status;
1815 __be32 *p = *pp;
1816
1817 status = nfsd4_encode_components_esc(':', location->hosts, &p, buflen,
1818 '[', ']');
1819 if (status)
1820 return status;
1821 status = nfsd4_encode_components('/', location->path, &p, buflen);
1822 if (status)
1823 return status;
1824 *pp = p;
1825 return 0;
1826}
1827
1828/*
1829 * Encode a path in RFC3530 'pathname4' format
1830 */
1831static __be32 nfsd4_encode_path(const struct path *root,
1832 const struct path *path, __be32 **pp, int *buflen)
1833{
1834 struct path cur = {
1835 .mnt = path->mnt,
1836 .dentry = path->dentry,
1837 };
1838 __be32 *p = *pp;
1839 struct dentry **components = NULL;
1840 unsigned int ncomponents = 0;
1841 __be32 err = nfserr_jukebox;
1842
1843 dprintk("nfsd4_encode_components(");
1844
1845 path_get(&cur);
1846 /* First walk the path up to the nfsd root, and store the
1847 * dentries/path components in an array.
1848 */
1849 for (;;) {
1850 if (cur.dentry == root->dentry && cur.mnt == root->mnt)
1851 break;
1852 if (cur.dentry == cur.mnt->mnt_root) {
1853 if (follow_up(&cur))
1854 continue;
1855 goto out_free;
1856 }
1857 if ((ncomponents & 15) == 0) {
1858 struct dentry **new;
1859 new = krealloc(components,
1860 sizeof(*new) * (ncomponents + 16),
1861 GFP_KERNEL);
1862 if (!new)
1863 goto out_free;
1864 components = new;
1865 }
1866 components[ncomponents++] = cur.dentry;
1867 cur.dentry = dget_parent(cur.dentry);
1868 }
1869
1870 *buflen -= 4;
1871 if (*buflen < 0)
1872 goto out_free;
1873 WRITE32(ncomponents);
1874
1875 while (ncomponents) {
1876 struct dentry *dentry = components[ncomponents - 1];
1877 unsigned int len = dentry->d_name.len;
1878
1879 *buflen -= 4 + (XDR_QUADLEN(len) << 2);
1880 if (*buflen < 0)
1881 goto out_free;
1882 WRITE32(len);
1883 WRITEMEM(dentry->d_name.name, len);
1884 dprintk("/%s", dentry->d_name.name);
1885 dput(dentry);
1886 ncomponents--;
1887 }
1888
1889 *pp = p;
1890 err = 0;
1891out_free:
1892 dprintk(")\n");
1893 while (ncomponents)
1894 dput(components[--ncomponents]);
1895 kfree(components);
1896 path_put(&cur);
1897 return err;
1898}
1899
1900static __be32 nfsd4_encode_fsloc_fsroot(struct svc_rqst *rqstp,
1901 const struct path *path, __be32 **pp, int *buflen)
1902{
1903 struct svc_export *exp_ps;
1904 __be32 res;
1905
1906 exp_ps = rqst_find_fsidzero_export(rqstp);
1907 if (IS_ERR(exp_ps))
1908 return nfserrno(PTR_ERR(exp_ps));
1909 res = nfsd4_encode_path(&exp_ps->ex_path, path, pp, buflen);
1910 exp_put(exp_ps);
1911 return res;
1912}
1913
1914/*
1915 * encode a fs_locations structure
1916 */
1917static __be32 nfsd4_encode_fs_locations(struct svc_rqst *rqstp,
1918 struct svc_export *exp,
1919 __be32 **pp, int *buflen)
1920{
1921 __be32 status;
1922 int i;
1923 __be32 *p = *pp;
1924 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
1925
1926 status = nfsd4_encode_fsloc_fsroot(rqstp, &exp->ex_path, &p, buflen);
1927 if (status)
1928 return status;
1929 if ((*buflen -= 4) < 0)
1930 return nfserr_resource;
1931 WRITE32(fslocs->locations_count);
1932 for (i=0; i<fslocs->locations_count; i++) {
1933 status = nfsd4_encode_fs_location4(&fslocs->locations[i],
1934 &p, buflen);
1935 if (status)
1936 return status;
1937 }
1938 *pp = p;
1939 return 0;
1940}
1941
1942static u32 nfs4_file_type(umode_t mode)
1943{
1944 switch (mode & S_IFMT) {
1945 case S_IFIFO: return NF4FIFO;
1946 case S_IFCHR: return NF4CHR;
1947 case S_IFDIR: return NF4DIR;
1948 case S_IFBLK: return NF4BLK;
1949 case S_IFLNK: return NF4LNK;
1950 case S_IFREG: return NF4REG;
1951 case S_IFSOCK: return NF4SOCK;
1952 default: return NF4BAD;
1953 };
1954}
1955
1956static __be32
1957nfsd4_encode_name(struct svc_rqst *rqstp, int whotype, uid_t id, int group,
1958 __be32 **p, int *buflen)
1959{
1960 int status;
1961
1962 if (*buflen < (XDR_QUADLEN(IDMAP_NAMESZ) << 2) + 4)
1963 return nfserr_resource;
1964 if (whotype != NFS4_ACL_WHO_NAMED)
1965 status = nfs4_acl_write_who(whotype, (u8 *)(*p + 1));
1966 else if (group)
1967 status = nfsd_map_gid_to_name(rqstp, id, (u8 *)(*p + 1));
1968 else
1969 status = nfsd_map_uid_to_name(rqstp, id, (u8 *)(*p + 1));
1970 if (status < 0)
1971 return nfserrno(status);
1972 *p = xdr_encode_opaque(*p, NULL, status);
1973 *buflen -= (XDR_QUADLEN(status) << 2) + 4;
1974 BUG_ON(*buflen < 0);
1975 return 0;
1976}
1977
1978static inline __be32
1979nfsd4_encode_user(struct svc_rqst *rqstp, uid_t uid, __be32 **p, int *buflen)
1980{
1981 return nfsd4_encode_name(rqstp, NFS4_ACL_WHO_NAMED, uid, 0, p, buflen);
1982}
1983
1984static inline __be32
1985nfsd4_encode_group(struct svc_rqst *rqstp, uid_t gid, __be32 **p, int *buflen)
1986{
1987 return nfsd4_encode_name(rqstp, NFS4_ACL_WHO_NAMED, gid, 1, p, buflen);
1988}
1989
1990static inline __be32
1991nfsd4_encode_aclname(struct svc_rqst *rqstp, int whotype, uid_t id, int group,
1992 __be32 **p, int *buflen)
1993{
1994 return nfsd4_encode_name(rqstp, whotype, id, group, p, buflen);
1995}
1996
1997#define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
1998 FATTR4_WORD0_RDATTR_ERROR)
1999#define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2000
2001static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *rdattr_err)
2002{
2003 /* As per referral draft: */
2004 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2005 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2006 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2007 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2008 *rdattr_err = NFSERR_MOVED;
2009 else
2010 return nfserr_moved;
2011 }
2012 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
2013 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
2014 return 0;
2015}
2016
2017/*
2018 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2019 * ourselves.
2020 *
2021 * @countp is the buffer size in _words_; upon successful return this becomes
2022 * replaced with the number of words written.
2023 */
2024__be32
2025nfsd4_encode_fattr(struct svc_fh *fhp, struct svc_export *exp,
2026 struct dentry *dentry, __be32 *buffer, int *countp, u32 *bmval,
2027 struct svc_rqst *rqstp, int ignore_crossmnt)
2028{
2029 u32 bmval0 = bmval[0];
2030 u32 bmval1 = bmval[1];
2031 u32 bmval2 = bmval[2];
2032 struct kstat stat;
2033 struct svc_fh tempfh;
2034 struct kstatfs statfs;
2035 int buflen = *countp << 2;
2036 __be32 *attrlenp;
2037 u32 dummy;
2038 u64 dummy64;
2039 u32 rdattr_err = 0;
2040 __be32 *p = buffer;
2041 __be32 status;
2042 int err;
2043 int aclsupport = 0;
2044 struct nfs4_acl *acl = NULL;
2045 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2046 u32 minorversion = resp->cstate.minorversion;
2047 struct path path = {
2048 .mnt = exp->ex_path.mnt,
2049 .dentry = dentry,
2050 };
2051
2052 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2053 BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion));
2054 BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion));
2055 BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion));
2056
2057 if (exp->ex_fslocs.migrated) {
2058 BUG_ON(bmval[2]);
2059 status = fattr_handle_absent_fs(&bmval0, &bmval1, &rdattr_err);
2060 if (status)
2061 goto out;
2062 }
2063
2064 err = vfs_getattr(exp->ex_path.mnt, dentry, &stat);
2065 if (err)
2066 goto out_nfserr;
2067 if ((bmval0 & (FATTR4_WORD0_FILES_FREE | FATTR4_WORD0_FILES_TOTAL |
2068 FATTR4_WORD0_MAXNAME)) ||
2069 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2070 FATTR4_WORD1_SPACE_TOTAL))) {
2071 err = vfs_statfs(&path, &statfs);
2072 if (err)
2073 goto out_nfserr;
2074 }
2075 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2076 fh_init(&tempfh, NFS4_FHSIZE);
2077 status = fh_compose(&tempfh, exp, dentry, NULL);
2078 if (status)
2079 goto out;
2080 fhp = &tempfh;
2081 }
2082 if (bmval0 & (FATTR4_WORD0_ACL | FATTR4_WORD0_ACLSUPPORT
2083 | FATTR4_WORD0_SUPPORTED_ATTRS)) {
2084 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2085 aclsupport = (err == 0);
2086 if (bmval0 & FATTR4_WORD0_ACL) {
2087 if (err == -EOPNOTSUPP)
2088 bmval0 &= ~FATTR4_WORD0_ACL;
2089 else if (err == -EINVAL) {
2090 status = nfserr_attrnotsupp;
2091 goto out;
2092 } else if (err != 0)
2093 goto out_nfserr;
2094 }
2095 }
2096
2097 if (bmval2) {
2098 if ((buflen -= 16) < 0)
2099 goto out_resource;
2100 WRITE32(3);
2101 WRITE32(bmval0);
2102 WRITE32(bmval1);
2103 WRITE32(bmval2);
2104 } else if (bmval1) {
2105 if ((buflen -= 12) < 0)
2106 goto out_resource;
2107 WRITE32(2);
2108 WRITE32(bmval0);
2109 WRITE32(bmval1);
2110 } else {
2111 if ((buflen -= 8) < 0)
2112 goto out_resource;
2113 WRITE32(1);
2114 WRITE32(bmval0);
2115 }
2116 attrlenp = p++; /* to be backfilled later */
2117
2118 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2119 u32 word0 = nfsd_suppattrs0(minorversion);
2120 u32 word1 = nfsd_suppattrs1(minorversion);
2121 u32 word2 = nfsd_suppattrs2(minorversion);
2122
2123 if (!aclsupport)
2124 word0 &= ~FATTR4_WORD0_ACL;
2125 if (!word2) {
2126 if ((buflen -= 12) < 0)
2127 goto out_resource;
2128 WRITE32(2);
2129 WRITE32(word0);
2130 WRITE32(word1);
2131 } else {
2132 if ((buflen -= 16) < 0)
2133 goto out_resource;
2134 WRITE32(3);
2135 WRITE32(word0);
2136 WRITE32(word1);
2137 WRITE32(word2);
2138 }
2139 }
2140 if (bmval0 & FATTR4_WORD0_TYPE) {
2141 if ((buflen -= 4) < 0)
2142 goto out_resource;
2143 dummy = nfs4_file_type(stat.mode);
2144 if (dummy == NF4BAD)
2145 goto out_serverfault;
2146 WRITE32(dummy);
2147 }
2148 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
2149 if ((buflen -= 4) < 0)
2150 goto out_resource;
2151 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
2152 WRITE32(NFS4_FH_PERSISTENT);
2153 else
2154 WRITE32(NFS4_FH_PERSISTENT|NFS4_FH_VOL_RENAME);
2155 }
2156 if (bmval0 & FATTR4_WORD0_CHANGE) {
2157 if ((buflen -= 8) < 0)
2158 goto out_resource;
2159 write_change(&p, &stat, dentry->d_inode);
2160 }
2161 if (bmval0 & FATTR4_WORD0_SIZE) {
2162 if ((buflen -= 8) < 0)
2163 goto out_resource;
2164 WRITE64(stat.size);
2165 }
2166 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
2167 if ((buflen -= 4) < 0)
2168 goto out_resource;
2169 WRITE32(1);
2170 }
2171 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
2172 if ((buflen -= 4) < 0)
2173 goto out_resource;
2174 WRITE32(1);
2175 }
2176 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
2177 if ((buflen -= 4) < 0)
2178 goto out_resource;
2179 WRITE32(0);
2180 }
2181 if (bmval0 & FATTR4_WORD0_FSID) {
2182 if ((buflen -= 16) < 0)
2183 goto out_resource;
2184 if (exp->ex_fslocs.migrated) {
2185 WRITE64(NFS4_REFERRAL_FSID_MAJOR);
2186 WRITE64(NFS4_REFERRAL_FSID_MINOR);
2187 } else switch(fsid_source(fhp)) {
2188 case FSIDSOURCE_FSID:
2189 WRITE64((u64)exp->ex_fsid);
2190 WRITE64((u64)0);
2191 break;
2192 case FSIDSOURCE_DEV:
2193 WRITE32(0);
2194 WRITE32(MAJOR(stat.dev));
2195 WRITE32(0);
2196 WRITE32(MINOR(stat.dev));
2197 break;
2198 case FSIDSOURCE_UUID:
2199 WRITEMEM(exp->ex_uuid, 16);
2200 break;
2201 }
2202 }
2203 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
2204 if ((buflen -= 4) < 0)
2205 goto out_resource;
2206 WRITE32(0);
2207 }
2208 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
2209 if ((buflen -= 4) < 0)
2210 goto out_resource;
2211 WRITE32(nfsd4_lease);
2212 }
2213 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
2214 if ((buflen -= 4) < 0)
2215 goto out_resource;
2216 WRITE32(rdattr_err);
2217 }
2218 if (bmval0 & FATTR4_WORD0_ACL) {
2219 struct nfs4_ace *ace;
2220
2221 if (acl == NULL) {
2222 if ((buflen -= 4) < 0)
2223 goto out_resource;
2224
2225 WRITE32(0);
2226 goto out_acl;
2227 }
2228 if ((buflen -= 4) < 0)
2229 goto out_resource;
2230 WRITE32(acl->naces);
2231
2232 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
2233 if ((buflen -= 4*3) < 0)
2234 goto out_resource;
2235 WRITE32(ace->type);
2236 WRITE32(ace->flag);
2237 WRITE32(ace->access_mask & NFS4_ACE_MASK_ALL);
2238 status = nfsd4_encode_aclname(rqstp, ace->whotype,
2239 ace->who, ace->flag & NFS4_ACE_IDENTIFIER_GROUP,
2240 &p, &buflen);
2241 if (status == nfserr_resource)
2242 goto out_resource;
2243 if (status)
2244 goto out;
2245 }
2246 }
2247out_acl:
2248 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
2249 if ((buflen -= 4) < 0)
2250 goto out_resource;
2251 WRITE32(aclsupport ?
2252 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
2253 }
2254 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
2255 if ((buflen -= 4) < 0)
2256 goto out_resource;
2257 WRITE32(1);
2258 }
2259 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
2260 if ((buflen -= 4) < 0)
2261 goto out_resource;
2262 WRITE32(0);
2263 }
2264 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
2265 if ((buflen -= 4) < 0)
2266 goto out_resource;
2267 WRITE32(1);
2268 }
2269 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
2270 if ((buflen -= 4) < 0)
2271 goto out_resource;
2272 WRITE32(1);
2273 }
2274 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
2275 buflen -= (XDR_QUADLEN(fhp->fh_handle.fh_size) << 2) + 4;
2276 if (buflen < 0)
2277 goto out_resource;
2278 WRITE32(fhp->fh_handle.fh_size);
2279 WRITEMEM(&fhp->fh_handle.fh_base, fhp->fh_handle.fh_size);
2280 }
2281 if (bmval0 & FATTR4_WORD0_FILEID) {
2282 if ((buflen -= 8) < 0)
2283 goto out_resource;
2284 WRITE64(stat.ino);
2285 }
2286 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
2287 if ((buflen -= 8) < 0)
2288 goto out_resource;
2289 WRITE64((u64) statfs.f_ffree);
2290 }
2291 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
2292 if ((buflen -= 8) < 0)
2293 goto out_resource;
2294 WRITE64((u64) statfs.f_ffree);
2295 }
2296 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
2297 if ((buflen -= 8) < 0)
2298 goto out_resource;
2299 WRITE64((u64) statfs.f_files);
2300 }
2301 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
2302 status = nfsd4_encode_fs_locations(rqstp, exp, &p, &buflen);
2303 if (status == nfserr_resource)
2304 goto out_resource;
2305 if (status)
2306 goto out;
2307 }
2308 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
2309 if ((buflen -= 4) < 0)
2310 goto out_resource;
2311 WRITE32(1);
2312 }
2313 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
2314 if ((buflen -= 8) < 0)
2315 goto out_resource;
2316 WRITE64(~(u64)0);
2317 }
2318 if (bmval0 & FATTR4_WORD0_MAXLINK) {
2319 if ((buflen -= 4) < 0)
2320 goto out_resource;
2321 WRITE32(255);
2322 }
2323 if (bmval0 & FATTR4_WORD0_MAXNAME) {
2324 if ((buflen -= 4) < 0)
2325 goto out_resource;
2326 WRITE32(statfs.f_namelen);
2327 }
2328 if (bmval0 & FATTR4_WORD0_MAXREAD) {
2329 if ((buflen -= 8) < 0)
2330 goto out_resource;
2331 WRITE64((u64) svc_max_payload(rqstp));
2332 }
2333 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
2334 if ((buflen -= 8) < 0)
2335 goto out_resource;
2336 WRITE64((u64) svc_max_payload(rqstp));
2337 }
2338 if (bmval1 & FATTR4_WORD1_MODE) {
2339 if ((buflen -= 4) < 0)
2340 goto out_resource;
2341 WRITE32(stat.mode & S_IALLUGO);
2342 }
2343 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
2344 if ((buflen -= 4) < 0)
2345 goto out_resource;
2346 WRITE32(1);
2347 }
2348 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
2349 if ((buflen -= 4) < 0)
2350 goto out_resource;
2351 WRITE32(stat.nlink);
2352 }
2353 if (bmval1 & FATTR4_WORD1_OWNER) {
2354 status = nfsd4_encode_user(rqstp, stat.uid, &p, &buflen);
2355 if (status == nfserr_resource)
2356 goto out_resource;
2357 if (status)
2358 goto out;
2359 }
2360 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
2361 status = nfsd4_encode_group(rqstp, stat.gid, &p, &buflen);
2362 if (status == nfserr_resource)
2363 goto out_resource;
2364 if (status)
2365 goto out;
2366 }
2367 if (bmval1 & FATTR4_WORD1_RAWDEV) {
2368 if ((buflen -= 8) < 0)
2369 goto out_resource;
2370 WRITE32((u32) MAJOR(stat.rdev));
2371 WRITE32((u32) MINOR(stat.rdev));
2372 }
2373 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
2374 if ((buflen -= 8) < 0)
2375 goto out_resource;
2376 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
2377 WRITE64(dummy64);
2378 }
2379 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
2380 if ((buflen -= 8) < 0)
2381 goto out_resource;
2382 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
2383 WRITE64(dummy64);
2384 }
2385 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
2386 if ((buflen -= 8) < 0)
2387 goto out_resource;
2388 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
2389 WRITE64(dummy64);
2390 }
2391 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
2392 if ((buflen -= 8) < 0)
2393 goto out_resource;
2394 dummy64 = (u64)stat.blocks << 9;
2395 WRITE64(dummy64);
2396 }
2397 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
2398 if ((buflen -= 12) < 0)
2399 goto out_resource;
2400 WRITE32(0);
2401 WRITE32(stat.atime.tv_sec);
2402 WRITE32(stat.atime.tv_nsec);
2403 }
2404 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
2405 if ((buflen -= 12) < 0)
2406 goto out_resource;
2407 WRITE32(0);
2408 WRITE32(1);
2409 WRITE32(0);
2410 }
2411 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
2412 if ((buflen -= 12) < 0)
2413 goto out_resource;
2414 WRITE32(0);
2415 WRITE32(stat.ctime.tv_sec);
2416 WRITE32(stat.ctime.tv_nsec);
2417 }
2418 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
2419 if ((buflen -= 12) < 0)
2420 goto out_resource;
2421 WRITE32(0);
2422 WRITE32(stat.mtime.tv_sec);
2423 WRITE32(stat.mtime.tv_nsec);
2424 }
2425 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
2426 if ((buflen -= 8) < 0)
2427 goto out_resource;
2428 /*
2429 * Get parent's attributes if not ignoring crossmount
2430 * and this is the root of a cross-mounted filesystem.
2431 */
2432 if (ignore_crossmnt == 0 &&
2433 dentry == exp->ex_path.mnt->mnt_root) {
2434 struct path path = exp->ex_path;
2435 path_get(&path);
2436 while (follow_up(&path)) {
2437 if (path.dentry != path.mnt->mnt_root)
2438 break;
2439 }
2440 err = vfs_getattr(path.mnt, path.dentry, &stat);
2441 path_put(&path);
2442 if (err)
2443 goto out_nfserr;
2444 }
2445 WRITE64(stat.ino);
2446 }
2447 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
2448 WRITE32(3);
2449 WRITE32(NFSD_SUPPATTR_EXCLCREAT_WORD0);
2450 WRITE32(NFSD_SUPPATTR_EXCLCREAT_WORD1);
2451 WRITE32(NFSD_SUPPATTR_EXCLCREAT_WORD2);
2452 }
2453
2454 *attrlenp = htonl((char *)p - (char *)attrlenp - 4);
2455 *countp = p - buffer;
2456 status = nfs_ok;
2457
2458out:
2459 kfree(acl);
2460 if (fhp == &tempfh)
2461 fh_put(&tempfh);
2462 return status;
2463out_nfserr:
2464 status = nfserrno(err);
2465 goto out;
2466out_resource:
2467 *countp = 0;
2468 status = nfserr_resource;
2469 goto out;
2470out_serverfault:
2471 status = nfserr_serverfault;
2472 goto out;
2473}
2474
2475static inline int attributes_need_mount(u32 *bmval)
2476{
2477 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
2478 return 1;
2479 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
2480 return 1;
2481 return 0;
2482}
2483
2484static __be32
2485nfsd4_encode_dirent_fattr(struct nfsd4_readdir *cd,
2486 const char *name, int namlen, __be32 *p, int *buflen)
2487{
2488 struct svc_export *exp = cd->rd_fhp->fh_export;
2489 struct dentry *dentry;
2490 __be32 nfserr;
2491 int ignore_crossmnt = 0;
2492
2493 dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen);
2494 if (IS_ERR(dentry))
2495 return nfserrno(PTR_ERR(dentry));
2496 if (!dentry->d_inode) {
2497 /*
2498 * nfsd_buffered_readdir drops the i_mutex between
2499 * readdir and calling this callback, leaving a window
2500 * where this directory entry could have gone away.
2501 */
2502 dput(dentry);
2503 return nfserr_noent;
2504 }
2505
2506 exp_get(exp);
2507 /*
2508 * In the case of a mountpoint, the client may be asking for
2509 * attributes that are only properties of the underlying filesystem
2510 * as opposed to the cross-mounted file system. In such a case,
2511 * we will not follow the cross mount and will fill the attribtutes
2512 * directly from the mountpoint dentry.
2513 */
2514 if (nfsd_mountpoint(dentry, exp)) {
2515 int err;
2516
2517 if (!(exp->ex_flags & NFSEXP_V4ROOT)
2518 && !attributes_need_mount(cd->rd_bmval)) {
2519 ignore_crossmnt = 1;
2520 goto out_encode;
2521 }
2522 /*
2523 * Why the heck aren't we just using nfsd_lookup??
2524 * Different "."/".." handling? Something else?
2525 * At least, add a comment here to explain....
2526 */
2527 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
2528 if (err) {
2529 nfserr = nfserrno(err);
2530 goto out_put;
2531 }
2532 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
2533 if (nfserr)
2534 goto out_put;
2535
2536 }
2537out_encode:
2538 nfserr = nfsd4_encode_fattr(NULL, exp, dentry, p, buflen, cd->rd_bmval,
2539 cd->rd_rqstp, ignore_crossmnt);
2540out_put:
2541 dput(dentry);
2542 exp_put(exp);
2543 return nfserr;
2544}
2545
2546static __be32 *
2547nfsd4_encode_rdattr_error(__be32 *p, int buflen, __be32 nfserr)
2548{
2549 __be32 *attrlenp;
2550
2551 if (buflen < 6)
2552 return NULL;
2553 *p++ = htonl(2);
2554 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
2555 *p++ = htonl(0); /* bmval1 */
2556
2557 attrlenp = p++;
2558 *p++ = nfserr; /* no htonl */
2559 *attrlenp = htonl((char *)p - (char *)attrlenp - 4);
2560 return p;
2561}
2562
2563static int
2564nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
2565 loff_t offset, u64 ino, unsigned int d_type)
2566{
2567 struct readdir_cd *ccd = ccdv;
2568 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
2569 int buflen;
2570 __be32 *p = cd->buffer;
2571 __be32 *cookiep;
2572 __be32 nfserr = nfserr_toosmall;
2573
2574 /* In nfsv4, "." and ".." never make it onto the wire.. */
2575 if (name && isdotent(name, namlen)) {
2576 cd->common.err = nfs_ok;
2577 return 0;
2578 }
2579
2580 if (cd->offset)
2581 xdr_encode_hyper(cd->offset, (u64) offset);
2582
2583 buflen = cd->buflen - 4 - XDR_QUADLEN(namlen);
2584 if (buflen < 0)
2585 goto fail;
2586
2587 *p++ = xdr_one; /* mark entry present */
2588 cookiep = p;
2589 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */
2590 p = xdr_encode_array(p, name, namlen); /* name length & name */
2591
2592 nfserr = nfsd4_encode_dirent_fattr(cd, name, namlen, p, &buflen);
2593 switch (nfserr) {
2594 case nfs_ok:
2595 p += buflen;
2596 break;
2597 case nfserr_resource:
2598 nfserr = nfserr_toosmall;
2599 goto fail;
2600 case nfserr_noent:
2601 goto skip_entry;
2602 default:
2603 /*
2604 * If the client requested the RDATTR_ERROR attribute,
2605 * we stuff the error code into this attribute
2606 * and continue. If this attribute was not requested,
2607 * then in accordance with the spec, we fail the
2608 * entire READDIR operation(!)
2609 */
2610 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
2611 goto fail;
2612 p = nfsd4_encode_rdattr_error(p, buflen, nfserr);
2613 if (p == NULL) {
2614 nfserr = nfserr_toosmall;
2615 goto fail;
2616 }
2617 }
2618 cd->buflen -= (p - cd->buffer);
2619 cd->buffer = p;
2620 cd->offset = cookiep;
2621skip_entry:
2622 cd->common.err = nfs_ok;
2623 return 0;
2624fail:
2625 cd->common.err = nfserr;
2626 return -EINVAL;
2627}
2628
2629static void
2630nfsd4_encode_stateid(struct nfsd4_compoundres *resp, stateid_t *sid)
2631{
2632 __be32 *p;
2633
2634 RESERVE_SPACE(sizeof(stateid_t));
2635 WRITE32(sid->si_generation);
2636 WRITEMEM(&sid->si_opaque, sizeof(stateid_opaque_t));
2637 ADJUST_ARGS();
2638}
2639
2640static __be32
2641nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
2642{
2643 __be32 *p;
2644
2645 if (!nfserr) {
2646 RESERVE_SPACE(8);
2647 WRITE32(access->ac_supported);
2648 WRITE32(access->ac_resp_access);
2649 ADJUST_ARGS();
2650 }
2651 return nfserr;
2652}
2653
2654static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
2655{
2656 __be32 *p;
2657
2658 if (!nfserr) {
2659 RESERVE_SPACE(NFS4_MAX_SESSIONID_LEN + 8);
2660 WRITEMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN);
2661 WRITE32(bcts->dir);
2662 /* XXX: ? */
2663 WRITE32(0);
2664 ADJUST_ARGS();
2665 }
2666 return nfserr;
2667}
2668
2669static __be32
2670nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
2671{
2672 ENCODE_SEQID_OP_HEAD;
2673
2674 if (!nfserr)
2675 nfsd4_encode_stateid(resp, &close->cl_stateid);
2676
2677 encode_seqid_op_tail(resp, save, nfserr);
2678 return nfserr;
2679}
2680
2681
2682static __be32
2683nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
2684{
2685 __be32 *p;
2686
2687 if (!nfserr) {
2688 RESERVE_SPACE(NFS4_VERIFIER_SIZE);
2689 WRITEMEM(commit->co_verf.data, NFS4_VERIFIER_SIZE);
2690 ADJUST_ARGS();
2691 }
2692 return nfserr;
2693}
2694
2695static __be32
2696nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
2697{
2698 __be32 *p;
2699
2700 if (!nfserr) {
2701 RESERVE_SPACE(32);
2702 write_cinfo(&p, &create->cr_cinfo);
2703 WRITE32(2);
2704 WRITE32(create->cr_bmval[0]);
2705 WRITE32(create->cr_bmval[1]);
2706 ADJUST_ARGS();
2707 }
2708 return nfserr;
2709}
2710
2711static __be32
2712nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
2713{
2714 struct svc_fh *fhp = getattr->ga_fhp;
2715 int buflen;
2716
2717 if (nfserr)
2718 return nfserr;
2719
2720 buflen = resp->end - resp->p - (COMPOUND_ERR_SLACK_SPACE >> 2);
2721 nfserr = nfsd4_encode_fattr(fhp, fhp->fh_export, fhp->fh_dentry,
2722 resp->p, &buflen, getattr->ga_bmval,
2723 resp->rqstp, 0);
2724 if (!nfserr)
2725 resp->p += buflen;
2726 return nfserr;
2727}
2728
2729static __be32
2730nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
2731{
2732 struct svc_fh *fhp = *fhpp;
2733 unsigned int len;
2734 __be32 *p;
2735
2736 if (!nfserr) {
2737 len = fhp->fh_handle.fh_size;
2738 RESERVE_SPACE(len + 4);
2739 WRITE32(len);
2740 WRITEMEM(&fhp->fh_handle.fh_base, len);
2741 ADJUST_ARGS();
2742 }
2743 return nfserr;
2744}
2745
2746/*
2747* Including all fields other than the name, a LOCK4denied structure requires
2748* 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
2749*/
2750static void
2751nfsd4_encode_lock_denied(struct nfsd4_compoundres *resp, struct nfsd4_lock_denied *ld)
2752{
2753 struct xdr_netobj *conf = &ld->ld_owner;
2754 __be32 *p;
2755
2756 RESERVE_SPACE(32 + XDR_LEN(conf->len));
2757 WRITE64(ld->ld_start);
2758 WRITE64(ld->ld_length);
2759 WRITE32(ld->ld_type);
2760 if (conf->len) {
2761 WRITEMEM(&ld->ld_clientid, 8);
2762 WRITE32(conf->len);
2763 WRITEMEM(conf->data, conf->len);
2764 kfree(conf->data);
2765 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
2766 WRITE64((u64)0); /* clientid */
2767 WRITE32(0); /* length of owner name */
2768 }
2769 ADJUST_ARGS();
2770}
2771
2772static __be32
2773nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
2774{
2775 ENCODE_SEQID_OP_HEAD;
2776
2777 if (!nfserr)
2778 nfsd4_encode_stateid(resp, &lock->lk_resp_stateid);
2779 else if (nfserr == nfserr_denied)
2780 nfsd4_encode_lock_denied(resp, &lock->lk_denied);
2781
2782 encode_seqid_op_tail(resp, save, nfserr);
2783 return nfserr;
2784}
2785
2786static __be32
2787nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
2788{
2789 if (nfserr == nfserr_denied)
2790 nfsd4_encode_lock_denied(resp, &lockt->lt_denied);
2791 return nfserr;
2792}
2793
2794static __be32
2795nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
2796{
2797 ENCODE_SEQID_OP_HEAD;
2798
2799 if (!nfserr)
2800 nfsd4_encode_stateid(resp, &locku->lu_stateid);
2801
2802 encode_seqid_op_tail(resp, save, nfserr);
2803 return nfserr;
2804}
2805
2806
2807static __be32
2808nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
2809{
2810 __be32 *p;
2811
2812 if (!nfserr) {
2813 RESERVE_SPACE(20);
2814 write_cinfo(&p, &link->li_cinfo);
2815 ADJUST_ARGS();
2816 }
2817 return nfserr;
2818}
2819
2820
2821static __be32
2822nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
2823{
2824 __be32 *p;
2825 ENCODE_SEQID_OP_HEAD;
2826
2827 if (nfserr)
2828 goto out;
2829
2830 nfsd4_encode_stateid(resp, &open->op_stateid);
2831 RESERVE_SPACE(40);
2832 write_cinfo(&p, &open->op_cinfo);
2833 WRITE32(open->op_rflags);
2834 WRITE32(2);
2835 WRITE32(open->op_bmval[0]);
2836 WRITE32(open->op_bmval[1]);
2837 WRITE32(open->op_delegate_type);
2838 ADJUST_ARGS();
2839
2840 switch (open->op_delegate_type) {
2841 case NFS4_OPEN_DELEGATE_NONE:
2842 break;
2843 case NFS4_OPEN_DELEGATE_READ:
2844 nfsd4_encode_stateid(resp, &open->op_delegate_stateid);
2845 RESERVE_SPACE(20);
2846 WRITE32(open->op_recall);
2847
2848 /*
2849 * TODO: ACE's in delegations
2850 */
2851 WRITE32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
2852 WRITE32(0);
2853 WRITE32(0);
2854 WRITE32(0); /* XXX: is NULL principal ok? */
2855 ADJUST_ARGS();
2856 break;
2857 case NFS4_OPEN_DELEGATE_WRITE:
2858 nfsd4_encode_stateid(resp, &open->op_delegate_stateid);
2859 RESERVE_SPACE(32);
2860 WRITE32(0);
2861
2862 /*
2863 * TODO: space_limit's in delegations
2864 */
2865 WRITE32(NFS4_LIMIT_SIZE);
2866 WRITE32(~(u32)0);
2867 WRITE32(~(u32)0);
2868
2869 /*
2870 * TODO: ACE's in delegations
2871 */
2872 WRITE32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
2873 WRITE32(0);
2874 WRITE32(0);
2875 WRITE32(0); /* XXX: is NULL principal ok? */
2876 ADJUST_ARGS();
2877 break;
2878 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
2879 switch (open->op_why_no_deleg) {
2880 case WND4_CONTENTION:
2881 case WND4_RESOURCE:
2882 RESERVE_SPACE(8);
2883 WRITE32(open->op_why_no_deleg);
2884 WRITE32(0); /* deleg signaling not supported yet */
2885 break;
2886 default:
2887 RESERVE_SPACE(4);
2888 WRITE32(open->op_why_no_deleg);
2889 }
2890 ADJUST_ARGS();
2891 break;
2892 default:
2893 BUG();
2894 }
2895 /* XXX save filehandle here */
2896out:
2897 encode_seqid_op_tail(resp, save, nfserr);
2898 return nfserr;
2899}
2900
2901static __be32
2902nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
2903{
2904 ENCODE_SEQID_OP_HEAD;
2905
2906 if (!nfserr)
2907 nfsd4_encode_stateid(resp, &oc->oc_resp_stateid);
2908
2909 encode_seqid_op_tail(resp, save, nfserr);
2910 return nfserr;
2911}
2912
2913static __be32
2914nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
2915{
2916 ENCODE_SEQID_OP_HEAD;
2917
2918 if (!nfserr)
2919 nfsd4_encode_stateid(resp, &od->od_stateid);
2920
2921 encode_seqid_op_tail(resp, save, nfserr);
2922 return nfserr;
2923}
2924
2925static __be32
2926nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
2927 struct nfsd4_read *read)
2928{
2929 u32 eof;
2930 int v, pn;
2931 unsigned long maxcount;
2932 long len;
2933 __be32 *p;
2934
2935 if (nfserr)
2936 return nfserr;
2937 if (resp->xbuf->page_len)
2938 return nfserr_resource;
2939
2940 RESERVE_SPACE(8); /* eof flag and byte count */
2941
2942 maxcount = svc_max_payload(resp->rqstp);
2943 if (maxcount > read->rd_length)
2944 maxcount = read->rd_length;
2945
2946 len = maxcount;
2947 v = 0;
2948 while (len > 0) {
2949 pn = resp->rqstp->rq_resused++;
2950 resp->rqstp->rq_vec[v].iov_base =
2951 page_address(resp->rqstp->rq_respages[pn]);
2952 resp->rqstp->rq_vec[v].iov_len =
2953 len < PAGE_SIZE ? len : PAGE_SIZE;
2954 v++;
2955 len -= PAGE_SIZE;
2956 }
2957 read->rd_vlen = v;
2958
2959 nfserr = nfsd_read_file(read->rd_rqstp, read->rd_fhp, read->rd_filp,
2960 read->rd_offset, resp->rqstp->rq_vec, read->rd_vlen,
2961 &maxcount);
2962
2963 if (nfserr)
2964 return nfserr;
2965 eof = (read->rd_offset + maxcount >=
2966 read->rd_fhp->fh_dentry->d_inode->i_size);
2967
2968 WRITE32(eof);
2969 WRITE32(maxcount);
2970 ADJUST_ARGS();
2971 resp->xbuf->head[0].iov_len = (char*)p
2972 - (char*)resp->xbuf->head[0].iov_base;
2973 resp->xbuf->page_len = maxcount;
2974
2975 /* Use rest of head for padding and remaining ops: */
2976 resp->xbuf->tail[0].iov_base = p;
2977 resp->xbuf->tail[0].iov_len = 0;
2978 if (maxcount&3) {
2979 RESERVE_SPACE(4);
2980 WRITE32(0);
2981 resp->xbuf->tail[0].iov_base += maxcount&3;
2982 resp->xbuf->tail[0].iov_len = 4 - (maxcount&3);
2983 ADJUST_ARGS();
2984 }
2985 return 0;
2986}
2987
2988static __be32
2989nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
2990{
2991 int maxcount;
2992 char *page;
2993 __be32 *p;
2994
2995 if (nfserr)
2996 return nfserr;
2997 if (resp->xbuf->page_len)
2998 return nfserr_resource;
2999
3000 page = page_address(resp->rqstp->rq_respages[resp->rqstp->rq_resused++]);
3001
3002 maxcount = PAGE_SIZE;
3003 RESERVE_SPACE(4);
3004
3005 /*
3006 * XXX: By default, the ->readlink() VFS op will truncate symlinks
3007 * if they would overflow the buffer. Is this kosher in NFSv4? If
3008 * not, one easy fix is: if ->readlink() precisely fills the buffer,
3009 * assume that truncation occurred, and return NFS4ERR_RESOURCE.
3010 */
3011 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, page, &maxcount);
3012 if (nfserr == nfserr_isdir)
3013 return nfserr_inval;
3014 if (nfserr)
3015 return nfserr;
3016
3017 WRITE32(maxcount);
3018 ADJUST_ARGS();
3019 resp->xbuf->head[0].iov_len = (char*)p
3020 - (char*)resp->xbuf->head[0].iov_base;
3021 resp->xbuf->page_len = maxcount;
3022
3023 /* Use rest of head for padding and remaining ops: */
3024 resp->xbuf->tail[0].iov_base = p;
3025 resp->xbuf->tail[0].iov_len = 0;
3026 if (maxcount&3) {
3027 RESERVE_SPACE(4);
3028 WRITE32(0);
3029 resp->xbuf->tail[0].iov_base += maxcount&3;
3030 resp->xbuf->tail[0].iov_len = 4 - (maxcount&3);
3031 ADJUST_ARGS();
3032 }
3033 return 0;
3034}
3035
3036static __be32
3037nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
3038{
3039 int maxcount;
3040 loff_t offset;
3041 __be32 *page, *savep, *tailbase;
3042 __be32 *p;
3043
3044 if (nfserr)
3045 return nfserr;
3046 if (resp->xbuf->page_len)
3047 return nfserr_resource;
3048
3049 RESERVE_SPACE(NFS4_VERIFIER_SIZE);
3050 savep = p;
3051
3052 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
3053 WRITE32(0);
3054 WRITE32(0);
3055 ADJUST_ARGS();
3056 resp->xbuf->head[0].iov_len = ((char*)resp->p) - (char*)resp->xbuf->head[0].iov_base;
3057 tailbase = p;
3058
3059 maxcount = PAGE_SIZE;
3060 if (maxcount > readdir->rd_maxcount)
3061 maxcount = readdir->rd_maxcount;
3062
3063 /*
3064 * Convert from bytes to words, account for the two words already
3065 * written, make sure to leave two words at the end for the next
3066 * pointer and eof field.
3067 */
3068 maxcount = (maxcount >> 2) - 4;
3069 if (maxcount < 0) {
3070 nfserr = nfserr_toosmall;
3071 goto err_no_verf;
3072 }
3073
3074 page = page_address(resp->rqstp->rq_respages[resp->rqstp->rq_resused++]);
3075 readdir->common.err = 0;
3076 readdir->buflen = maxcount;
3077 readdir->buffer = page;
3078 readdir->offset = NULL;
3079
3080 offset = readdir->rd_cookie;
3081 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
3082 &offset,
3083 &readdir->common, nfsd4_encode_dirent);
3084 if (nfserr == nfs_ok &&
3085 readdir->common.err == nfserr_toosmall &&
3086 readdir->buffer == page)
3087 nfserr = nfserr_toosmall;
3088 if (nfserr)
3089 goto err_no_verf;
3090
3091 if (readdir->offset)
3092 xdr_encode_hyper(readdir->offset, offset);
3093
3094 p = readdir->buffer;
3095 *p++ = 0; /* no more entries */
3096 *p++ = htonl(readdir->common.err == nfserr_eof);
3097 resp->xbuf->page_len = ((char*)p) - (char*)page_address(
3098 resp->rqstp->rq_respages[resp->rqstp->rq_resused-1]);
3099
3100 /* Use rest of head for padding and remaining ops: */
3101 resp->xbuf->tail[0].iov_base = tailbase;
3102 resp->xbuf->tail[0].iov_len = 0;
3103 resp->p = resp->xbuf->tail[0].iov_base;
3104 resp->end = resp->p + (PAGE_SIZE - resp->xbuf->head[0].iov_len)/4;
3105
3106 return 0;
3107err_no_verf:
3108 p = savep;
3109 ADJUST_ARGS();
3110 return nfserr;
3111}
3112
3113static __be32
3114nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
3115{
3116 __be32 *p;
3117
3118 if (!nfserr) {
3119 RESERVE_SPACE(20);
3120 write_cinfo(&p, &remove->rm_cinfo);
3121 ADJUST_ARGS();
3122 }
3123 return nfserr;
3124}
3125
3126static __be32
3127nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
3128{
3129 __be32 *p;
3130
3131 if (!nfserr) {
3132 RESERVE_SPACE(40);
3133 write_cinfo(&p, &rename->rn_sinfo);
3134 write_cinfo(&p, &rename->rn_tinfo);
3135 ADJUST_ARGS();
3136 }
3137 return nfserr;
3138}
3139
3140static __be32
3141nfsd4_do_encode_secinfo(struct nfsd4_compoundres *resp,
3142 __be32 nfserr,struct svc_export *exp)
3143{
3144 int i = 0;
3145 u32 nflavs;
3146 struct exp_flavor_info *flavs;
3147 struct exp_flavor_info def_flavs[2];
3148 __be32 *p;
3149
3150 if (nfserr)
3151 goto out;
3152 if (exp->ex_nflavors) {
3153 flavs = exp->ex_flavors;
3154 nflavs = exp->ex_nflavors;
3155 } else { /* Handling of some defaults in absence of real secinfo: */
3156 flavs = def_flavs;
3157 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
3158 nflavs = 2;
3159 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
3160 flavs[1].pseudoflavor = RPC_AUTH_NULL;
3161 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
3162 nflavs = 1;
3163 flavs[0].pseudoflavor
3164 = svcauth_gss_flavor(exp->ex_client);
3165 } else {
3166 nflavs = 1;
3167 flavs[0].pseudoflavor
3168 = exp->ex_client->flavour->flavour;
3169 }
3170 }
3171
3172 RESERVE_SPACE(4);
3173 WRITE32(nflavs);
3174 ADJUST_ARGS();
3175 for (i = 0; i < nflavs; i++) {
3176 u32 flav = flavs[i].pseudoflavor;
3177 struct gss_api_mech *gm = gss_mech_get_by_pseudoflavor(flav);
3178
3179 if (gm) {
3180 RESERVE_SPACE(4);
3181 WRITE32(RPC_AUTH_GSS);
3182 ADJUST_ARGS();
3183 RESERVE_SPACE(4 + gm->gm_oid.len);
3184 WRITE32(gm->gm_oid.len);
3185 WRITEMEM(gm->gm_oid.data, gm->gm_oid.len);
3186 ADJUST_ARGS();
3187 RESERVE_SPACE(4);
3188 WRITE32(0); /* qop */
3189 ADJUST_ARGS();
3190 RESERVE_SPACE(4);
3191 WRITE32(gss_pseudoflavor_to_service(gm, flav));
3192 ADJUST_ARGS();
3193 gss_mech_put(gm);
3194 } else {
3195 RESERVE_SPACE(4);
3196 WRITE32(flav);
3197 ADJUST_ARGS();
3198 }
3199 }
3200out:
3201 if (exp)
3202 exp_put(exp);
3203 return nfserr;
3204}
3205
3206static __be32
3207nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
3208 struct nfsd4_secinfo *secinfo)
3209{
3210 return nfsd4_do_encode_secinfo(resp, nfserr, secinfo->si_exp);
3211}
3212
3213static __be32
3214nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
3215 struct nfsd4_secinfo_no_name *secinfo)
3216{
3217 return nfsd4_do_encode_secinfo(resp, nfserr, secinfo->sin_exp);
3218}
3219
3220/*
3221 * The SETATTR encode routine is special -- it always encodes a bitmap,
3222 * regardless of the error status.
3223 */
3224static __be32
3225nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
3226{
3227 __be32 *p;
3228
3229 RESERVE_SPACE(12);
3230 if (nfserr) {
3231 WRITE32(2);
3232 WRITE32(0);
3233 WRITE32(0);
3234 }
3235 else {
3236 WRITE32(2);
3237 WRITE32(setattr->sa_bmval[0]);
3238 WRITE32(setattr->sa_bmval[1]);
3239 }
3240 ADJUST_ARGS();
3241 return nfserr;
3242}
3243
3244static __be32
3245nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
3246{
3247 __be32 *p;
3248
3249 if (!nfserr) {
3250 RESERVE_SPACE(8 + NFS4_VERIFIER_SIZE);
3251 WRITEMEM(&scd->se_clientid, 8);
3252 WRITEMEM(&scd->se_confirm, NFS4_VERIFIER_SIZE);
3253 ADJUST_ARGS();
3254 }
3255 else if (nfserr == nfserr_clid_inuse) {
3256 RESERVE_SPACE(8);
3257 WRITE32(0);
3258 WRITE32(0);
3259 ADJUST_ARGS();
3260 }
3261 return nfserr;
3262}
3263
3264static __be32
3265nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
3266{
3267 __be32 *p;
3268
3269 if (!nfserr) {
3270 RESERVE_SPACE(16);
3271 WRITE32(write->wr_bytes_written);
3272 WRITE32(write->wr_how_written);
3273 WRITEMEM(write->wr_verifier.data, NFS4_VERIFIER_SIZE);
3274 ADJUST_ARGS();
3275 }
3276 return nfserr;
3277}
3278
3279static __be32
3280nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
3281 struct nfsd4_exchange_id *exid)
3282{
3283 __be32 *p;
3284 char *major_id;
3285 char *server_scope;
3286 int major_id_sz;
3287 int server_scope_sz;
3288 uint64_t minor_id = 0;
3289
3290 if (nfserr)
3291 return nfserr;
3292
3293 major_id = utsname()->nodename;
3294 major_id_sz = strlen(major_id);
3295 server_scope = utsname()->nodename;
3296 server_scope_sz = strlen(server_scope);
3297
3298 RESERVE_SPACE(
3299 8 /* eir_clientid */ +
3300 4 /* eir_sequenceid */ +
3301 4 /* eir_flags */ +
3302 4 /* spr_how (SP4_NONE) */ +
3303 8 /* so_minor_id */ +
3304 4 /* so_major_id.len */ +
3305 (XDR_QUADLEN(major_id_sz) * 4) +
3306 4 /* eir_server_scope.len */ +
3307 (XDR_QUADLEN(server_scope_sz) * 4) +
3308 4 /* eir_server_impl_id.count (0) */);
3309
3310 WRITEMEM(&exid->clientid, 8);
3311 WRITE32(exid->seqid);
3312 WRITE32(exid->flags);
3313
3314 /* state_protect4_r. Currently only support SP4_NONE */
3315 BUG_ON(exid->spa_how != SP4_NONE);
3316 WRITE32(exid->spa_how);
3317
3318 /* The server_owner struct */
3319 WRITE64(minor_id); /* Minor id */
3320 /* major id */
3321 WRITE32(major_id_sz);
3322 WRITEMEM(major_id, major_id_sz);
3323
3324 /* Server scope */
3325 WRITE32(server_scope_sz);
3326 WRITEMEM(server_scope, server_scope_sz);
3327
3328 /* Implementation id */
3329 WRITE32(0); /* zero length nfs_impl_id4 array */
3330 ADJUST_ARGS();
3331 return 0;
3332}
3333
3334static __be32
3335nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3336 struct nfsd4_create_session *sess)
3337{
3338 __be32 *p;
3339
3340 if (nfserr)
3341 return nfserr;
3342
3343 RESERVE_SPACE(24);
3344 WRITEMEM(sess->sessionid.data, NFS4_MAX_SESSIONID_LEN);
3345 WRITE32(sess->seqid);
3346 WRITE32(sess->flags);
3347 ADJUST_ARGS();
3348
3349 RESERVE_SPACE(28);
3350 WRITE32(0); /* headerpadsz */
3351 WRITE32(sess->fore_channel.maxreq_sz);
3352 WRITE32(sess->fore_channel.maxresp_sz);
3353 WRITE32(sess->fore_channel.maxresp_cached);
3354 WRITE32(sess->fore_channel.maxops);
3355 WRITE32(sess->fore_channel.maxreqs);
3356 WRITE32(sess->fore_channel.nr_rdma_attrs);
3357 ADJUST_ARGS();
3358
3359 if (sess->fore_channel.nr_rdma_attrs) {
3360 RESERVE_SPACE(4);
3361 WRITE32(sess->fore_channel.rdma_attrs);
3362 ADJUST_ARGS();
3363 }
3364
3365 RESERVE_SPACE(28);
3366 WRITE32(0); /* headerpadsz */
3367 WRITE32(sess->back_channel.maxreq_sz);
3368 WRITE32(sess->back_channel.maxresp_sz);
3369 WRITE32(sess->back_channel.maxresp_cached);
3370 WRITE32(sess->back_channel.maxops);
3371 WRITE32(sess->back_channel.maxreqs);
3372 WRITE32(sess->back_channel.nr_rdma_attrs);
3373 ADJUST_ARGS();
3374
3375 if (sess->back_channel.nr_rdma_attrs) {
3376 RESERVE_SPACE(4);
3377 WRITE32(sess->back_channel.rdma_attrs);
3378 ADJUST_ARGS();
3379 }
3380 return 0;
3381}
3382
3383static __be32
3384nfsd4_encode_destroy_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3385 struct nfsd4_destroy_session *destroy_session)
3386{
3387 return nfserr;
3388}
3389
3390static __be32
3391nfsd4_encode_free_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
3392 struct nfsd4_free_stateid *free_stateid)
3393{
3394 __be32 *p;
3395
3396 if (nfserr)
3397 return nfserr;
3398
3399 RESERVE_SPACE(4);
3400 *p++ = nfserr;
3401 ADJUST_ARGS();
3402 return nfserr;
3403}
3404
3405static __be32
3406nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
3407 struct nfsd4_sequence *seq)
3408{
3409 __be32 *p;
3410
3411 if (nfserr)
3412 return nfserr;
3413
3414 RESERVE_SPACE(NFS4_MAX_SESSIONID_LEN + 20);
3415 WRITEMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN);
3416 WRITE32(seq->seqid);
3417 WRITE32(seq->slotid);
3418 /* Note slotid's are numbered from zero: */
3419 WRITE32(seq->maxslots - 1); /* sr_highest_slotid */
3420 WRITE32(seq->maxslots - 1); /* sr_target_highest_slotid */
3421 WRITE32(seq->status_flags);
3422
3423 ADJUST_ARGS();
3424 resp->cstate.datap = p; /* DRC cache data pointer */
3425 return 0;
3426}
3427
3428static __be32
3429nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
3430 struct nfsd4_test_stateid *test_stateid)
3431{
3432 struct nfsd4_test_stateid_id *stateid, *next;
3433 __be32 *p;
3434
3435 RESERVE_SPACE(4 + (4 * test_stateid->ts_num_ids));
3436 *p++ = htonl(test_stateid->ts_num_ids);
3437
3438 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
3439 *p++ = stateid->ts_id_status;
3440 }
3441
3442 ADJUST_ARGS();
3443 return nfserr;
3444}
3445
3446static __be32
3447nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
3448{
3449 return nfserr;
3450}
3451
3452typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
3453
3454/*
3455 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
3456 * since we don't need to filter out obsolete ops as this is
3457 * done in the decoding phase.
3458 */
3459static nfsd4_enc nfsd4_enc_ops[] = {
3460 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access,
3461 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close,
3462 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit,
3463 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create,
3464 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop,
3465 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop,
3466 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr,
3467 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh,
3468 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link,
3469 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock,
3470 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt,
3471 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku,
3472 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop,
3473 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop,
3474 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3475 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open,
3476 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop,
3477 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm,
3478 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade,
3479 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop,
3480 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop,
3481 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop,
3482 [OP_READ] = (nfsd4_enc)nfsd4_encode_read,
3483 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir,
3484 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink,
3485 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove,
3486 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename,
3487 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop,
3488 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop,
3489 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop,
3490 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo,
3491 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr,
3492 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid,
3493 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
3494 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3495 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write,
3496 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop,
3497
3498 /* NFSv4.1 operations */
3499 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop,
3500 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
3501 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id,
3502 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session,
3503 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_destroy_session,
3504 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_free_stateid,
3505 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3506 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop,
3507 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
3508 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop,
3509 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop,
3510 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop,
3511 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name,
3512 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence,
3513 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop,
3514 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid,
3515 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3516 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop,
3517 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop,
3518};
3519
3520/*
3521 * Calculate the total amount of memory that the compound response has taken
3522 * after encoding the current operation with pad.
3523 *
3524 * pad: if operation is non-idempotent, pad was calculate by op_rsize_bop()
3525 * which was specified at nfsd4_operation, else pad is zero.
3526 *
3527 * Compare this length to the session se_fmaxresp_sz and se_fmaxresp_cached.
3528 *
3529 * Our se_fmaxresp_cached will always be a multiple of PAGE_SIZE, and so
3530 * will be at least a page and will therefore hold the xdr_buf head.
3531 */
3532__be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 pad)
3533{
3534 struct xdr_buf *xb = &resp->rqstp->rq_res;
3535 struct nfsd4_session *session = NULL;
3536 struct nfsd4_slot *slot = resp->cstate.slot;
3537 u32 length, tlen = 0;
3538
3539 if (!nfsd4_has_session(&resp->cstate))
3540 return 0;
3541
3542 session = resp->cstate.session;
3543 if (session == NULL)
3544 return 0;
3545
3546 if (xb->page_len == 0) {
3547 length = (char *)resp->p - (char *)xb->head[0].iov_base + pad;
3548 } else {
3549 if (xb->tail[0].iov_base && xb->tail[0].iov_len > 0)
3550 tlen = (char *)resp->p - (char *)xb->tail[0].iov_base;
3551
3552 length = xb->head[0].iov_len + xb->page_len + tlen + pad;
3553 }
3554 dprintk("%s length %u, xb->page_len %u tlen %u pad %u\n", __func__,
3555 length, xb->page_len, tlen, pad);
3556
3557 if (length > session->se_fchannel.maxresp_sz)
3558 return nfserr_rep_too_big;
3559
3560 if ((slot->sl_flags & NFSD4_SLOT_CACHETHIS) &&
3561 length > session->se_fchannel.maxresp_cached)
3562 return nfserr_rep_too_big_to_cache;
3563
3564 return 0;
3565}
3566
3567void
3568nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
3569{
3570 __be32 *statp;
3571 __be32 *p;
3572
3573 RESERVE_SPACE(8);
3574 WRITE32(op->opnum);
3575 statp = p++; /* to be backfilled at the end */
3576 ADJUST_ARGS();
3577
3578 if (op->opnum == OP_ILLEGAL)
3579 goto status;
3580 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
3581 !nfsd4_enc_ops[op->opnum]);
3582 op->status = nfsd4_enc_ops[op->opnum](resp, op->status, &op->u);
3583 /* nfsd4_check_drc_limit guarantees enough room for error status */
3584 if (!op->status)
3585 op->status = nfsd4_check_resp_size(resp, 0);
3586status:
3587 /*
3588 * Note: We write the status directly, instead of using WRITE32(),
3589 * since it is already in network byte order.
3590 */
3591 *statp = op->status;
3592}
3593
3594/*
3595 * Encode the reply stored in the stateowner reply cache
3596 *
3597 * XDR note: do not encode rp->rp_buflen: the buffer contains the
3598 * previously sent already encoded operation.
3599 *
3600 * called with nfs4_lock_state() held
3601 */
3602void
3603nfsd4_encode_replay(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
3604{
3605 __be32 *p;
3606 struct nfs4_replay *rp = op->replay;
3607
3608 BUG_ON(!rp);
3609
3610 RESERVE_SPACE(8);
3611 WRITE32(op->opnum);
3612 *p++ = rp->rp_status; /* already xdr'ed */
3613 ADJUST_ARGS();
3614
3615 RESERVE_SPACE(rp->rp_buflen);
3616 WRITEMEM(rp->rp_buf, rp->rp_buflen);
3617 ADJUST_ARGS();
3618}
3619
3620int
3621nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy)
3622{
3623 return xdr_ressize_check(rqstp, p);
3624}
3625
3626int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp)
3627{
3628 struct svc_rqst *rqstp = rq;
3629 struct nfsd4_compoundargs *args = rqstp->rq_argp;
3630
3631 if (args->ops != args->iops) {
3632 kfree(args->ops);
3633 args->ops = args->iops;
3634 }
3635 kfree(args->tmpp);
3636 args->tmpp = NULL;
3637 while (args->to_free) {
3638 struct tmpbuf *tb = args->to_free;
3639 args->to_free = tb->next;
3640 tb->release(tb->buf);
3641 kfree(tb);
3642 }
3643 return 1;
3644}
3645
3646int
3647nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args)
3648{
3649 args->p = p;
3650 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len;
3651 args->pagelist = rqstp->rq_arg.pages;
3652 args->pagelen = rqstp->rq_arg.page_len;
3653 args->tmpp = NULL;
3654 args->to_free = NULL;
3655 args->ops = args->iops;
3656 args->rqstp = rqstp;
3657
3658 return !nfsd4_decode_compound(args);
3659}
3660
3661int
3662nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp)
3663{
3664 /*
3665 * All that remains is to write the tag and operation count...
3666 */
3667 struct nfsd4_compound_state *cs = &resp->cstate;
3668 struct kvec *iov;
3669 p = resp->tagp;
3670 *p++ = htonl(resp->taglen);
3671 memcpy(p, resp->tag, resp->taglen);
3672 p += XDR_QUADLEN(resp->taglen);
3673 *p++ = htonl(resp->opcnt);
3674
3675 if (rqstp->rq_res.page_len)
3676 iov = &rqstp->rq_res.tail[0];
3677 else
3678 iov = &rqstp->rq_res.head[0];
3679 iov->iov_len = ((char*)resp->p) - (char*)iov->iov_base;
3680 BUG_ON(iov->iov_len > PAGE_SIZE);
3681 if (nfsd4_has_session(cs)) {
3682 if (cs->status != nfserr_replay_cache) {
3683 nfsd4_store_cache_entry(resp);
3684 cs->slot->sl_flags &= ~NFSD4_SLOT_INUSE;
3685 }
3686 /* Renew the clientid on success and on replay */
3687 release_session_client(cs->session);
3688 nfsd4_put_session(cs->session);
3689 }
3690 return 1;
3691}
3692
3693/*
3694 * Local variables:
3695 * c-basic-offset: 8
3696 * End:
3697 */