]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - fs/nfsd/nfs4xdr.c
svcrdma: advertise the correct max payload
[mirror_ubuntu-bionic-kernel.git] / fs / nfsd / nfs4xdr.c
CommitLineData
1da177e4 1/*
1da177e4
LT
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
1da177e4
LT
34 */
35
5a0e3ad6 36#include <linux/slab.h>
1da177e4 37#include <linux/namei.h>
341eb184 38#include <linux/statfs.h>
0733d213 39#include <linux/utsname.h>
17456804 40#include <linux/pagemap.h>
4796f457 41#include <linux/sunrpc/svcauth_gss.h>
9a74af21 42
2ca72e17
BF
43#include "idmap.h"
44#include "acl.h"
9a74af21 45#include "xdr4.h"
0a3adade 46#include "vfs.h"
17456804 47#include "state.h"
1091006c 48#include "cache.h"
3d733711 49#include "netns.h"
2ca72e17 50
18032ca0
DQ
51#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
52#include <linux/security.h>
53#endif
54
55
1da177e4
LT
56#define NFSDDBG_FACILITY NFSDDBG_XDR
57
42ca0993
BF
58/*
59 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
60 * directory in order to indicate to the client that a filesystem boundary is present
61 * We use a fixed fsid for a referral
62 */
63#define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
64#define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
65
b37ad28b 66static __be32
a36b1725 67check_filename(char *str, int len)
1da177e4
LT
68{
69 int i;
70
71 if (len == 0)
72 return nfserr_inval;
73 if (isdotent(str, len))
a36b1725 74 return nfserr_badname;
1da177e4
LT
75 for (i = 0; i < len; i++)
76 if (str[i] == '/')
a36b1725 77 return nfserr_badname;
1da177e4
LT
78 return 0;
79}
80
1da177e4 81#define DECODE_HEAD \
2ebbc012 82 __be32 *p; \
b37ad28b 83 __be32 status
1da177e4
LT
84#define DECODE_TAIL \
85 status = 0; \
86out: \
87 return status; \
88xdr_error: \
817cb9d4
CL
89 dprintk("NFSD: xdr error (%s:%d)\n", \
90 __FILE__, __LINE__); \
1da177e4
LT
91 status = nfserr_bad_xdr; \
92 goto out
93
1da177e4
LT
94#define READMEM(x,nbytes) do { \
95 x = (char *)p; \
96 p += XDR_QUADLEN(nbytes); \
97} while (0)
98#define SAVEMEM(x,nbytes) do { \
99 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \
100 savemem(argp, p, nbytes) : \
101 (char *)p)) { \
817cb9d4
CL
102 dprintk("NFSD: xdr error (%s:%d)\n", \
103 __FILE__, __LINE__); \
1da177e4
LT
104 goto xdr_error; \
105 } \
106 p += XDR_QUADLEN(nbytes); \
107} while (0)
108#define COPYMEM(x,nbytes) do { \
109 memcpy((x), p, nbytes); \
110 p += XDR_QUADLEN(nbytes); \
111} while (0)
112
113/* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */
114#define READ_BUF(nbytes) do { \
115 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \
116 p = argp->p; \
117 argp->p += XDR_QUADLEN(nbytes); \
118 } else if (!(p = read_buf(argp, nbytes))) { \
817cb9d4
CL
119 dprintk("NFSD: xdr error (%s:%d)\n", \
120 __FILE__, __LINE__); \
1da177e4
LT
121 goto xdr_error; \
122 } \
123} while (0)
124
590b7431
BF
125static void next_decode_page(struct nfsd4_compoundargs *argp)
126{
590b7431 127 argp->p = page_address(argp->pagelist[0]);
365da4ad 128 argp->pagelist++;
590b7431
BF
129 if (argp->pagelen < PAGE_SIZE) {
130 argp->end = argp->p + (argp->pagelen>>2);
131 argp->pagelen = 0;
132 } else {
133 argp->end = argp->p + (PAGE_SIZE>>2);
134 argp->pagelen -= PAGE_SIZE;
135 }
136}
137
ca2a05aa 138static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes)
1da177e4
LT
139{
140 /* We want more bytes than seem to be available.
141 * Maybe we need a new page, maybe we have just run out
142 */
ca2a05aa 143 unsigned int avail = (char *)argp->end - (char *)argp->p;
2ebbc012 144 __be32 *p;
1da177e4
LT
145 if (avail + argp->pagelen < nbytes)
146 return NULL;
147 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */
148 return NULL;
149 /* ok, we can do it with the current plus the next page */
150 if (nbytes <= sizeof(argp->tmp))
151 p = argp->tmp;
152 else {
f99d49ad 153 kfree(argp->tmpp);
1da177e4
LT
154 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL);
155 if (!p)
156 return NULL;
157
158 }
ca2a05aa
BF
159 /*
160 * The following memcpy is safe because read_buf is always
161 * called with nbytes > avail, and the two cases above both
162 * guarantee p points to at least nbytes bytes.
163 */
1da177e4 164 memcpy(p, argp->p, avail);
590b7431 165 next_decode_page(argp);
1da177e4
LT
166 memcpy(((char*)p)+avail, argp->p, (nbytes - avail));
167 argp->p += XDR_QUADLEN(nbytes - avail);
168 return p;
169}
170
60adfc50
AA
171static int zero_clientid(clientid_t *clid)
172{
173 return (clid->cl_boot == 0) && (clid->cl_id == 0);
174}
175
2d8498db 176/**
d5e23383 177 * svcxdr_tmpalloc - allocate memory to be freed after compound processing
ce043ac8
BF
178 * @argp: NFSv4 compound argument structure
179 * @p: pointer to be freed (with kfree())
2d8498db
CH
180 *
181 * Marks @p to be freed when processing the compound operation
182 * described in @argp finishes.
183 */
d5e23383
BF
184static void *
185svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
1da177e4 186{
d5e23383 187 struct svcxdr_tmpbuf *tb;
1da177e4 188
d5e23383 189 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
1da177e4 190 if (!tb)
d5e23383 191 return NULL;
1da177e4
LT
192 tb->next = argp->to_free;
193 argp->to_free = tb;
d5e23383 194 return tb->buf;
1da177e4
LT
195}
196
29c353b3
BF
197/*
198 * For xdr strings that need to be passed to other kernel api's
199 * as null-terminated strings.
200 *
201 * Note null-terminating in place usually isn't safe since the
202 * buffer might end on a page boundary.
203 */
204static char *
205svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
206{
d5e23383 207 char *p = svcxdr_tmpalloc(argp, len + 1);
29c353b3
BF
208
209 if (!p)
210 return NULL;
211 memcpy(p, buf, len);
212 p[len] = '\0';
29c353b3 213 return p;
1da177e4
LT
214}
215
2d8498db
CH
216/**
217 * savemem - duplicate a chunk of memory for later processing
218 * @argp: NFSv4 compound argument structure to be freed with
219 * @p: pointer to be duplicated
220 * @nbytes: length to be duplicated
221 *
222 * Returns a pointer to a copy of @nbytes bytes of memory at @p
223 * that are preserved until processing of the NFSv4 compound
224 * operation described by @argp finishes.
225 */
2ebbc012 226static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes)
1da177e4 227{
d5e23383
BF
228 void *ret;
229
230 ret = svcxdr_tmpalloc(argp, nbytes);
231 if (!ret)
1da177e4 232 return NULL;
d5e23383
BF
233 memcpy(ret, p, nbytes);
234 return ret;
1da177e4
LT
235}
236
b37ad28b 237static __be32
1da177e4
LT
238nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval)
239{
240 u32 bmlen;
241 DECODE_HEAD;
242
243 bmval[0] = 0;
244 bmval[1] = 0;
7e705706 245 bmval[2] = 0;
1da177e4
LT
246
247 READ_BUF(4);
06553991 248 bmlen = be32_to_cpup(p++);
1da177e4
LT
249 if (bmlen > 1000)
250 goto xdr_error;
251
252 READ_BUF(bmlen << 2);
253 if (bmlen > 0)
06553991 254 bmval[0] = be32_to_cpup(p++);
1da177e4 255 if (bmlen > 1)
06553991 256 bmval[1] = be32_to_cpup(p++);
7e705706 257 if (bmlen > 2)
06553991 258 bmval[2] = be32_to_cpup(p++);
1da177e4
LT
259
260 DECODE_TAIL;
261}
262
b37ad28b 263static __be32
3c8e0316 264nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval,
18032ca0
DQ
265 struct iattr *iattr, struct nfs4_acl **acl,
266 struct xdr_netobj *label)
1da177e4
LT
267{
268 int expected_len, len = 0;
269 u32 dummy32;
542d1ab3 270 u64 sec;
1da177e4
LT
271 char *buf;
272
273 DECODE_HEAD;
274 iattr->ia_valid = 0;
275 if ((status = nfsd4_decode_bitmap(argp, bmval)))
276 return status;
277
1da177e4 278 READ_BUF(4);
06553991 279 expected_len = be32_to_cpup(p++);
1da177e4
LT
280
281 if (bmval[0] & FATTR4_WORD0_SIZE) {
282 READ_BUF(8);
283 len += 8;
542d1ab3 284 p = xdr_decode_hyper(p, &iattr->ia_size);
1da177e4
LT
285 iattr->ia_valid |= ATTR_SIZE;
286 }
287 if (bmval[0] & FATTR4_WORD0_ACL) {
64a817cf 288 u32 nace;
28e05dd8 289 struct nfs4_ace *ace;
1da177e4
LT
290
291 READ_BUF(4); len += 4;
06553991 292 nace = be32_to_cpup(p++);
1da177e4 293
28e05dd8 294 if (nace > NFS4_ACL_MAX)
798df338 295 return nfserr_fbig;
28e05dd8 296
d5e23383 297 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(nace));
eba1c99c
KM
298 if (*acl == NULL)
299 return nfserr_jukebox;
300
28e05dd8
BF
301 (*acl)->naces = nace;
302 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) {
1da177e4 303 READ_BUF(16); len += 16;
06553991
BF
304 ace->type = be32_to_cpup(p++);
305 ace->flag = be32_to_cpup(p++);
306 ace->access_mask = be32_to_cpup(p++);
307 dummy32 = be32_to_cpup(p++);
1da177e4
LT
308 READ_BUF(dummy32);
309 len += XDR_QUADLEN(dummy32) << 2;
310 READMEM(buf, dummy32);
28e05dd8 311 ace->whotype = nfs4_acl_get_whotype(buf, dummy32);
3c726023 312 status = nfs_ok;
28e05dd8 313 if (ace->whotype != NFS4_ACL_WHO_NAMED)
ab8e4aee 314 ;
28e05dd8 315 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
3c726023 316 status = nfsd_map_name_to_gid(argp->rqstp,
ab8e4aee 317 buf, dummy32, &ace->who_gid);
1da177e4 318 else
3c726023 319 status = nfsd_map_name_to_uid(argp->rqstp,
ab8e4aee 320 buf, dummy32, &ace->who_uid);
3c726023
BF
321 if (status)
322 return status;
1da177e4
LT
323 }
324 } else
325 *acl = NULL;
326 if (bmval[1] & FATTR4_WORD1_MODE) {
327 READ_BUF(4);
328 len += 4;
06553991 329 iattr->ia_mode = be32_to_cpup(p++);
1da177e4
LT
330 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
331 iattr->ia_valid |= ATTR_MODE;
332 }
333 if (bmval[1] & FATTR4_WORD1_OWNER) {
334 READ_BUF(4);
335 len += 4;
06553991 336 dummy32 = be32_to_cpup(p++);
1da177e4
LT
337 READ_BUF(dummy32);
338 len += (XDR_QUADLEN(dummy32) << 2);
339 READMEM(buf, dummy32);
47c85291
N
340 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid)))
341 return status;
1da177e4
LT
342 iattr->ia_valid |= ATTR_UID;
343 }
344 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
345 READ_BUF(4);
346 len += 4;
06553991 347 dummy32 = be32_to_cpup(p++);
1da177e4
LT
348 READ_BUF(dummy32);
349 len += (XDR_QUADLEN(dummy32) << 2);
350 READMEM(buf, dummy32);
47c85291
N
351 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid)))
352 return status;
1da177e4
LT
353 iattr->ia_valid |= ATTR_GID;
354 }
355 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
356 READ_BUF(4);
357 len += 4;
06553991 358 dummy32 = be32_to_cpup(p++);
1da177e4
LT
359 switch (dummy32) {
360 case NFS4_SET_TO_CLIENT_TIME:
361 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
362 all 32 bits of 'nseconds'. */
363 READ_BUF(12);
364 len += 12;
542d1ab3
BF
365 p = xdr_decode_hyper(p, &sec);
366 iattr->ia_atime.tv_sec = (time_t)sec;
06553991 367 iattr->ia_atime.tv_nsec = be32_to_cpup(p++);
1da177e4
LT
368 if (iattr->ia_atime.tv_nsec >= (u32)1000000000)
369 return nfserr_inval;
370 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
371 break;
372 case NFS4_SET_TO_SERVER_TIME:
373 iattr->ia_valid |= ATTR_ATIME;
374 break;
375 default:
376 goto xdr_error;
377 }
378 }
1da177e4
LT
379 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
380 READ_BUF(4);
381 len += 4;
06553991 382 dummy32 = be32_to_cpup(p++);
1da177e4
LT
383 switch (dummy32) {
384 case NFS4_SET_TO_CLIENT_TIME:
385 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
386 all 32 bits of 'nseconds'. */
387 READ_BUF(12);
388 len += 12;
542d1ab3
BF
389 p = xdr_decode_hyper(p, &sec);
390 iattr->ia_mtime.tv_sec = sec;
06553991 391 iattr->ia_mtime.tv_nsec = be32_to_cpup(p++);
1da177e4
LT
392 if (iattr->ia_mtime.tv_nsec >= (u32)1000000000)
393 return nfserr_inval;
394 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
395 break;
396 case NFS4_SET_TO_SERVER_TIME:
397 iattr->ia_valid |= ATTR_MTIME;
398 break;
399 default:
400 goto xdr_error;
401 }
402 }
18032ca0
DQ
403
404 label->len = 0;
405#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
406 if (bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
407 READ_BUF(4);
408 len += 4;
06553991 409 dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */
18032ca0
DQ
410 READ_BUF(4);
411 len += 4;
06553991 412 dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */
18032ca0
DQ
413 READ_BUF(4);
414 len += 4;
06553991 415 dummy32 = be32_to_cpup(p++);
18032ca0
DQ
416 READ_BUF(dummy32);
417 if (dummy32 > NFSD4_MAX_SEC_LABEL_LEN)
418 return nfserr_badlabel;
419 len += (XDR_QUADLEN(dummy32) << 2);
420 READMEM(buf, dummy32);
29c353b3
BF
421 label->len = dummy32;
422 label->data = svcxdr_dupstr(argp, buf, dummy32);
18032ca0
DQ
423 if (!label->data)
424 return nfserr_jukebox;
18032ca0
DQ
425 }
426#endif
427
3c8e0316
YZ
428 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
429 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
430 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2)
431 READ_BUF(expected_len - len);
432 else if (len != expected_len)
1da177e4
LT
433 goto xdr_error;
434
435 DECODE_TAIL;
1da177e4
LT
436}
437
e31a1b66
BH
438static __be32
439nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid)
440{
441 DECODE_HEAD;
442
443 READ_BUF(sizeof(stateid_t));
06553991 444 sid->si_generation = be32_to_cpup(p++);
e31a1b66
BH
445 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t));
446
447 DECODE_TAIL;
448}
449
b37ad28b 450static __be32
1da177e4
LT
451nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access)
452{
453 DECODE_HEAD;
454
455 READ_BUF(4);
06553991 456 access->ac_req_access = be32_to_cpup(p++);
1da177e4
LT
457
458 DECODE_TAIL;
459}
460
acb2887e
BF
461static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
462{
463 DECODE_HEAD;
12fc3e92 464 u32 dummy, uid, gid;
acb2887e
BF
465 char *machine_name;
466 int i;
467 int nr_secflavs;
468
469 /* callback_sec_params4 */
470 READ_BUF(4);
06553991 471 nr_secflavs = be32_to_cpup(p++);
57569a70
BF
472 if (nr_secflavs)
473 cbs->flavor = (u32)(-1);
474 else
475 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
476 cbs->flavor = 0;
acb2887e
BF
477 for (i = 0; i < nr_secflavs; ++i) {
478 READ_BUF(4);
06553991 479 dummy = be32_to_cpup(p++);
acb2887e
BF
480 switch (dummy) {
481 case RPC_AUTH_NULL:
482 /* Nothing to read */
12fc3e92
BF
483 if (cbs->flavor == (u32)(-1))
484 cbs->flavor = RPC_AUTH_NULL;
acb2887e
BF
485 break;
486 case RPC_AUTH_UNIX:
487 READ_BUF(8);
488 /* stamp */
06553991 489 dummy = be32_to_cpup(p++);
acb2887e
BF
490
491 /* machine name */
06553991 492 dummy = be32_to_cpup(p++);
acb2887e
BF
493 READ_BUF(dummy);
494 SAVEMEM(machine_name, dummy);
495
496 /* uid, gid */
497 READ_BUF(8);
06553991
BF
498 uid = be32_to_cpup(p++);
499 gid = be32_to_cpup(p++);
acb2887e
BF
500
501 /* more gids */
502 READ_BUF(4);
06553991 503 dummy = be32_to_cpup(p++);
acb2887e 504 READ_BUF(dummy * 4);
12fc3e92 505 if (cbs->flavor == (u32)(-1)) {
03bc6d1c
EB
506 kuid_t kuid = make_kuid(&init_user_ns, uid);
507 kgid_t kgid = make_kgid(&init_user_ns, gid);
508 if (uid_valid(kuid) && gid_valid(kgid)) {
509 cbs->uid = kuid;
510 cbs->gid = kgid;
511 cbs->flavor = RPC_AUTH_UNIX;
512 } else {
513 dprintk("RPC_AUTH_UNIX with invalid"
514 "uid or gid ignoring!\n");
515 }
12fc3e92 516 }
acb2887e
BF
517 break;
518 case RPC_AUTH_GSS:
519 dprintk("RPC_AUTH_GSS callback secflavor "
520 "not supported!\n");
521 READ_BUF(8);
522 /* gcbp_service */
06553991 523 dummy = be32_to_cpup(p++);
acb2887e 524 /* gcbp_handle_from_server */
06553991 525 dummy = be32_to_cpup(p++);
acb2887e
BF
526 READ_BUF(dummy);
527 p += XDR_QUADLEN(dummy);
528 /* gcbp_handle_from_client */
529 READ_BUF(4);
06553991 530 dummy = be32_to_cpup(p++);
acb2887e
BF
531 READ_BUF(dummy);
532 break;
533 default:
534 dprintk("Illegal callback secflavor\n");
535 return nfserr_inval;
536 }
537 }
538 DECODE_TAIL;
539}
540
cb73a9f4
BF
541static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc)
542{
543 DECODE_HEAD;
544
545 READ_BUF(4);
06553991 546 bc->bc_cb_program = be32_to_cpup(p++);
cb73a9f4
BF
547 nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
548
549 DECODE_TAIL;
550}
551
1d1bc8f2
BF
552static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
553{
554 DECODE_HEAD;
1d1bc8f2
BF
555
556 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8);
557 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN);
06553991 558 bcts->dir = be32_to_cpup(p++);
6ce2357f
BS
559 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker
560 * could help us figure out we should be using it. */
1d1bc8f2
BF
561 DECODE_TAIL;
562}
563
b37ad28b 564static __be32
1da177e4
LT
565nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
566{
567 DECODE_HEAD;
568
e31a1b66 569 READ_BUF(4);
06553991 570 close->cl_seqid = be32_to_cpup(p++);
e31a1b66 571 return nfsd4_decode_stateid(argp, &close->cl_stateid);
1da177e4
LT
572
573 DECODE_TAIL;
574}
575
576
b37ad28b 577static __be32
1da177e4
LT
578nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
579{
580 DECODE_HEAD;
581
582 READ_BUF(12);
542d1ab3 583 p = xdr_decode_hyper(p, &commit->co_offset);
06553991 584 commit->co_count = be32_to_cpup(p++);
1da177e4
LT
585
586 DECODE_TAIL;
587}
588
b37ad28b 589static __be32
1da177e4
LT
590nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
591{
592 DECODE_HEAD;
593
594 READ_BUF(4);
06553991 595 create->cr_type = be32_to_cpup(p++);
1da177e4
LT
596 switch (create->cr_type) {
597 case NF4LNK:
598 READ_BUF(4);
7fb84306
BF
599 create->cr_datalen = be32_to_cpup(p++);
600 READ_BUF(create->cr_datalen);
29c353b3 601 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
7fb84306 602 if (!create->cr_data)
76f47128 603 return nfserr_jukebox;
1da177e4
LT
604 break;
605 case NF4BLK:
606 case NF4CHR:
607 READ_BUF(8);
06553991
BF
608 create->cr_specdata1 = be32_to_cpup(p++);
609 create->cr_specdata2 = be32_to_cpup(p++);
1da177e4
LT
610 break;
611 case NF4SOCK:
612 case NF4FIFO:
613 case NF4DIR:
614 default:
615 break;
616 }
617
618 READ_BUF(4);
06553991 619 create->cr_namelen = be32_to_cpup(p++);
1da177e4
LT
620 READ_BUF(create->cr_namelen);
621 SAVEMEM(create->cr_name, create->cr_namelen);
a36b1725 622 if ((status = check_filename(create->cr_name, create->cr_namelen)))
1da177e4
LT
623 return status;
624
3c8e0316 625 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr,
18032ca0 626 &create->cr_acl, &create->cr_label);
c0d6fc8a 627 if (status)
1da177e4
LT
628 goto out;
629
630 DECODE_TAIL;
631}
632
b37ad28b 633static inline __be32
1da177e4
LT
634nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
635{
e31a1b66 636 return nfsd4_decode_stateid(argp, &dr->dr_stateid);
1da177e4
LT
637}
638
b37ad28b 639static inline __be32
1da177e4
LT
640nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
641{
642 return nfsd4_decode_bitmap(argp, getattr->ga_bmval);
643}
644
b37ad28b 645static __be32
1da177e4
LT
646nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
647{
648 DECODE_HEAD;
649
650 READ_BUF(4);
06553991 651 link->li_namelen = be32_to_cpup(p++);
1da177e4
LT
652 READ_BUF(link->li_namelen);
653 SAVEMEM(link->li_name, link->li_namelen);
a36b1725 654 if ((status = check_filename(link->li_name, link->li_namelen)))
1da177e4
LT
655 return status;
656
657 DECODE_TAIL;
658}
659
b37ad28b 660static __be32
1da177e4
LT
661nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
662{
663 DECODE_HEAD;
664
1da177e4
LT
665 /*
666 * type, reclaim(boolean), offset, length, new_lock_owner(boolean)
667 */
668 READ_BUF(28);
06553991 669 lock->lk_type = be32_to_cpup(p++);
1da177e4
LT
670 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
671 goto xdr_error;
06553991 672 lock->lk_reclaim = be32_to_cpup(p++);
542d1ab3
BF
673 p = xdr_decode_hyper(p, &lock->lk_offset);
674 p = xdr_decode_hyper(p, &lock->lk_length);
06553991 675 lock->lk_is_new = be32_to_cpup(p++);
1da177e4
LT
676
677 if (lock->lk_is_new) {
e31a1b66 678 READ_BUF(4);
06553991 679 lock->lk_new_open_seqid = be32_to_cpup(p++);
e31a1b66
BH
680 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid);
681 if (status)
682 return status;
683 READ_BUF(8 + sizeof(clientid_t));
06553991 684 lock->lk_new_lock_seqid = be32_to_cpup(p++);
1da177e4 685 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t));
06553991 686 lock->lk_new_owner.len = be32_to_cpup(p++);
1da177e4
LT
687 READ_BUF(lock->lk_new_owner.len);
688 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len);
689 } else {
e31a1b66
BH
690 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid);
691 if (status)
692 return status;
693 READ_BUF(4);
06553991 694 lock->lk_old_lock_seqid = be32_to_cpup(p++);
1da177e4
LT
695 }
696
697 DECODE_TAIL;
698}
699
b37ad28b 700static __be32
1da177e4
LT
701nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
702{
703 DECODE_HEAD;
704
705 READ_BUF(32);
06553991 706 lockt->lt_type = be32_to_cpup(p++);
1da177e4
LT
707 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
708 goto xdr_error;
542d1ab3
BF
709 p = xdr_decode_hyper(p, &lockt->lt_offset);
710 p = xdr_decode_hyper(p, &lockt->lt_length);
1da177e4 711 COPYMEM(&lockt->lt_clientid, 8);
06553991 712 lockt->lt_owner.len = be32_to_cpup(p++);
1da177e4
LT
713 READ_BUF(lockt->lt_owner.len);
714 READMEM(lockt->lt_owner.data, lockt->lt_owner.len);
715
716 DECODE_TAIL;
717}
718
b37ad28b 719static __be32
1da177e4
LT
720nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
721{
722 DECODE_HEAD;
723
e31a1b66 724 READ_BUF(8);
06553991 725 locku->lu_type = be32_to_cpup(p++);
1da177e4
LT
726 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
727 goto xdr_error;
06553991 728 locku->lu_seqid = be32_to_cpup(p++);
e31a1b66
BH
729 status = nfsd4_decode_stateid(argp, &locku->lu_stateid);
730 if (status)
731 return status;
732 READ_BUF(16);
542d1ab3
BF
733 p = xdr_decode_hyper(p, &locku->lu_offset);
734 p = xdr_decode_hyper(p, &locku->lu_length);
1da177e4
LT
735
736 DECODE_TAIL;
737}
738
b37ad28b 739static __be32
1da177e4
LT
740nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
741{
742 DECODE_HEAD;
743
744 READ_BUF(4);
06553991 745 lookup->lo_len = be32_to_cpup(p++);
1da177e4
LT
746 READ_BUF(lookup->lo_len);
747 SAVEMEM(lookup->lo_name, lookup->lo_len);
a36b1725 748 if ((status = check_filename(lookup->lo_name, lookup->lo_len)))
1da177e4
LT
749 return status;
750
751 DECODE_TAIL;
752}
753
2c8bd7e0 754static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
04f9e664
BF
755{
756 __be32 *p;
757 u32 w;
758
759 READ_BUF(4);
06553991 760 w = be32_to_cpup(p++);
2c8bd7e0
BH
761 *share_access = w & NFS4_SHARE_ACCESS_MASK;
762 *deleg_want = w & NFS4_SHARE_WANT_MASK;
763 if (deleg_when)
764 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
765
04f9e664
BF
766 switch (w & NFS4_SHARE_ACCESS_MASK) {
767 case NFS4_SHARE_ACCESS_READ:
768 case NFS4_SHARE_ACCESS_WRITE:
769 case NFS4_SHARE_ACCESS_BOTH:
770 break;
771 default:
772 return nfserr_bad_xdr;
773 }
fc0d14fe 774 w &= ~NFS4_SHARE_ACCESS_MASK;
04f9e664
BF
775 if (!w)
776 return nfs_ok;
777 if (!argp->minorversion)
778 return nfserr_bad_xdr;
779 switch (w & NFS4_SHARE_WANT_MASK) {
780 case NFS4_SHARE_WANT_NO_PREFERENCE:
781 case NFS4_SHARE_WANT_READ_DELEG:
782 case NFS4_SHARE_WANT_WRITE_DELEG:
783 case NFS4_SHARE_WANT_ANY_DELEG:
784 case NFS4_SHARE_WANT_NO_DELEG:
785 case NFS4_SHARE_WANT_CANCEL:
786 break;
787 default:
788 return nfserr_bad_xdr;
789 }
92bac8c5 790 w &= ~NFS4_SHARE_WANT_MASK;
04f9e664
BF
791 if (!w)
792 return nfs_ok;
2c8bd7e0
BH
793
794 if (!deleg_when) /* open_downgrade */
795 return nfserr_inval;
04f9e664
BF
796 switch (w) {
797 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
798 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
c668fc6d
BH
799 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
800 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
04f9e664
BF
801 return nfs_ok;
802 }
803xdr_error:
804 return nfserr_bad_xdr;
805}
806
807static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
808{
809 __be32 *p;
810
811 READ_BUF(4);
06553991 812 *x = be32_to_cpup(p++);
04f9e664 813 /* Note: unlinke access bits, deny bits may be zero. */
01cd4afa 814 if (*x & ~NFS4_SHARE_DENY_BOTH)
04f9e664
BF
815 return nfserr_bad_xdr;
816 return nfs_ok;
817xdr_error:
818 return nfserr_bad_xdr;
819}
820
a084daf5
BF
821static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
822{
823 __be32 *p;
824
825 READ_BUF(4);
06553991 826 o->len = be32_to_cpup(p++);
a084daf5
BF
827
828 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT)
829 return nfserr_bad_xdr;
830
831 READ_BUF(o->len);
832 SAVEMEM(o->data, o->len);
833 return nfs_ok;
834xdr_error:
835 return nfserr_bad_xdr;
836}
837
b37ad28b 838static __be32
1da177e4
LT
839nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
840{
841 DECODE_HEAD;
2c8bd7e0 842 u32 dummy;
1da177e4
LT
843
844 memset(open->op_bmval, 0, sizeof(open->op_bmval));
845 open->op_iattr.ia_valid = 0;
fe0750e5 846 open->op_openowner = NULL;
1da177e4 847
9d313b17 848 open->op_xdr_error = 0;
1da177e4 849 /* seqid, share_access, share_deny, clientid, ownerlen */
04f9e664 850 READ_BUF(4);
06553991 851 open->op_seqid = be32_to_cpup(p++);
2c8bd7e0
BH
852 /* decode, yet ignore deleg_when until supported */
853 status = nfsd4_decode_share_access(argp, &open->op_share_access,
854 &open->op_deleg_want, &dummy);
04f9e664
BF
855 if (status)
856 goto xdr_error;
857 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
858 if (status)
859 goto xdr_error;
a084daf5 860 READ_BUF(sizeof(clientid_t));
1da177e4 861 COPYMEM(&open->op_clientid, sizeof(clientid_t));
a084daf5
BF
862 status = nfsd4_decode_opaque(argp, &open->op_owner);
863 if (status)
864 goto xdr_error;
865 READ_BUF(4);
06553991 866 open->op_create = be32_to_cpup(p++);
1da177e4
LT
867 switch (open->op_create) {
868 case NFS4_OPEN_NOCREATE:
869 break;
870 case NFS4_OPEN_CREATE:
871 READ_BUF(4);
06553991 872 open->op_createmode = be32_to_cpup(p++);
1da177e4
LT
873 switch (open->op_createmode) {
874 case NFS4_CREATE_UNCHECKED:
875 case NFS4_CREATE_GUARDED:
c0d6fc8a 876 status = nfsd4_decode_fattr(argp, open->op_bmval,
18032ca0 877 &open->op_iattr, &open->op_acl, &open->op_label);
c0d6fc8a 878 if (status)
1da177e4
LT
879 goto out;
880 break;
881 case NFS4_CREATE_EXCLUSIVE:
ab4684d1
CL
882 READ_BUF(NFS4_VERIFIER_SIZE);
883 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
1da177e4 884 break;
79fb54ab
BH
885 case NFS4_CREATE_EXCLUSIVE4_1:
886 if (argp->minorversion < 1)
887 goto xdr_error;
ab4684d1
CL
888 READ_BUF(NFS4_VERIFIER_SIZE);
889 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
79fb54ab 890 status = nfsd4_decode_fattr(argp, open->op_bmval,
18032ca0 891 &open->op_iattr, &open->op_acl, &open->op_label);
79fb54ab
BH
892 if (status)
893 goto out;
894 break;
1da177e4
LT
895 default:
896 goto xdr_error;
897 }
898 break;
899 default:
900 goto xdr_error;
901 }
902
903 /* open_claim */
904 READ_BUF(4);
06553991 905 open->op_claim_type = be32_to_cpup(p++);
1da177e4
LT
906 switch (open->op_claim_type) {
907 case NFS4_OPEN_CLAIM_NULL:
908 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
909 READ_BUF(4);
06553991 910 open->op_fname.len = be32_to_cpup(p++);
1da177e4
LT
911 READ_BUF(open->op_fname.len);
912 SAVEMEM(open->op_fname.data, open->op_fname.len);
a36b1725 913 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
1da177e4
LT
914 return status;
915 break;
916 case NFS4_OPEN_CLAIM_PREVIOUS:
917 READ_BUF(4);
06553991 918 open->op_delegate_type = be32_to_cpup(p++);
1da177e4
LT
919 break;
920 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
e31a1b66
BH
921 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
922 if (status)
923 return status;
924 READ_BUF(4);
06553991 925 open->op_fname.len = be32_to_cpup(p++);
1da177e4
LT
926 READ_BUF(open->op_fname.len);
927 SAVEMEM(open->op_fname.data, open->op_fname.len);
a36b1725 928 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
1da177e4
LT
929 return status;
930 break;
8b289b2c
BF
931 case NFS4_OPEN_CLAIM_FH:
932 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
933 if (argp->minorversion < 1)
934 goto xdr_error;
935 /* void */
936 break;
937 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
938 if (argp->minorversion < 1)
939 goto xdr_error;
940 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
941 if (status)
942 return status;
943 break;
1da177e4
LT
944 default:
945 goto xdr_error;
946 }
947
948 DECODE_TAIL;
949}
950
b37ad28b 951static __be32
1da177e4
LT
952nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
953{
954 DECODE_HEAD;
e1a90ebd
AS
955
956 if (argp->minorversion >= 1)
957 return nfserr_notsupp;
958
e31a1b66
BH
959 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid);
960 if (status)
961 return status;
962 READ_BUF(4);
06553991 963 open_conf->oc_seqid = be32_to_cpup(p++);
e1a90ebd 964
1da177e4
LT
965 DECODE_TAIL;
966}
967
b37ad28b 968static __be32
1da177e4
LT
969nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
970{
971 DECODE_HEAD;
972
e31a1b66
BH
973 status = nfsd4_decode_stateid(argp, &open_down->od_stateid);
974 if (status)
975 return status;
04f9e664 976 READ_BUF(4);
06553991 977 open_down->od_seqid = be32_to_cpup(p++);
2c8bd7e0
BH
978 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
979 &open_down->od_deleg_want, NULL);
04f9e664
BF
980 if (status)
981 return status;
982 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
983 if (status)
984 return status;
1da177e4
LT
985 DECODE_TAIL;
986}
987
b37ad28b 988static __be32
1da177e4
LT
989nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
990{
991 DECODE_HEAD;
992
993 READ_BUF(4);
06553991 994 putfh->pf_fhlen = be32_to_cpup(p++);
1da177e4
LT
995 if (putfh->pf_fhlen > NFS4_FHSIZE)
996 goto xdr_error;
997 READ_BUF(putfh->pf_fhlen);
998 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen);
999
1000 DECODE_TAIL;
1001}
1002
e1a90ebd
AS
1003static __be32
1004nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p)
1005{
1006 if (argp->minorversion == 0)
1007 return nfs_ok;
1008 return nfserr_notsupp;
1009}
1010
b37ad28b 1011static __be32
1da177e4
LT
1012nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
1013{
1014 DECODE_HEAD;
1015
e31a1b66
BH
1016 status = nfsd4_decode_stateid(argp, &read->rd_stateid);
1017 if (status)
1018 return status;
1019 READ_BUF(12);
542d1ab3 1020 p = xdr_decode_hyper(p, &read->rd_offset);
06553991 1021 read->rd_length = be32_to_cpup(p++);
1da177e4
LT
1022
1023 DECODE_TAIL;
1024}
1025
b37ad28b 1026static __be32
1da177e4
LT
1027nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
1028{
1029 DECODE_HEAD;
1030
1031 READ_BUF(24);
542d1ab3 1032 p = xdr_decode_hyper(p, &readdir->rd_cookie);
1da177e4 1033 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data));
06553991
BF
1034 readdir->rd_dircount = be32_to_cpup(p++);
1035 readdir->rd_maxcount = be32_to_cpup(p++);
1da177e4
LT
1036 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval)))
1037 goto out;
1038
1039 DECODE_TAIL;
1040}
1041
b37ad28b 1042static __be32
1da177e4
LT
1043nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
1044{
1045 DECODE_HEAD;
1046
1047 READ_BUF(4);
06553991 1048 remove->rm_namelen = be32_to_cpup(p++);
1da177e4
LT
1049 READ_BUF(remove->rm_namelen);
1050 SAVEMEM(remove->rm_name, remove->rm_namelen);
a36b1725 1051 if ((status = check_filename(remove->rm_name, remove->rm_namelen)))
1da177e4
LT
1052 return status;
1053
1054 DECODE_TAIL;
1055}
1056
b37ad28b 1057static __be32
1da177e4
LT
1058nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
1059{
1060 DECODE_HEAD;
1061
1062 READ_BUF(4);
06553991 1063 rename->rn_snamelen = be32_to_cpup(p++);
1da177e4
LT
1064 READ_BUF(rename->rn_snamelen + 4);
1065 SAVEMEM(rename->rn_sname, rename->rn_snamelen);
06553991 1066 rename->rn_tnamelen = be32_to_cpup(p++);
1da177e4
LT
1067 READ_BUF(rename->rn_tnamelen);
1068 SAVEMEM(rename->rn_tname, rename->rn_tnamelen);
a36b1725 1069 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen)))
1da177e4 1070 return status;
a36b1725 1071 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen)))
1da177e4
LT
1072 return status;
1073
1074 DECODE_TAIL;
1075}
1076
b37ad28b 1077static __be32
1da177e4
LT
1078nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
1079{
1080 DECODE_HEAD;
1081
e1a90ebd
AS
1082 if (argp->minorversion >= 1)
1083 return nfserr_notsupp;
1084
1da177e4
LT
1085 READ_BUF(sizeof(clientid_t));
1086 COPYMEM(clientid, sizeof(clientid_t));
1087
1088 DECODE_TAIL;
1089}
1090
dcb488a3
AA
1091static __be32
1092nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1093 struct nfsd4_secinfo *secinfo)
1094{
1095 DECODE_HEAD;
1096
1097 READ_BUF(4);
06553991 1098 secinfo->si_namelen = be32_to_cpup(p++);
dcb488a3
AA
1099 READ_BUF(secinfo->si_namelen);
1100 SAVEMEM(secinfo->si_name, secinfo->si_namelen);
a36b1725 1101 status = check_filename(secinfo->si_name, secinfo->si_namelen);
dcb488a3
AA
1102 if (status)
1103 return status;
1104 DECODE_TAIL;
1105}
1106
04f4ad16
BF
1107static __be32
1108nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1109 struct nfsd4_secinfo_no_name *sin)
1110{
1111 DECODE_HEAD;
1112
1113 READ_BUF(4);
06553991 1114 sin->sin_style = be32_to_cpup(p++);
04f4ad16
BF
1115 DECODE_TAIL;
1116}
1117
b37ad28b 1118static __be32
1da177e4
LT
1119nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
1120{
e31a1b66 1121 __be32 status;
1da177e4 1122
e31a1b66
BH
1123 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid);
1124 if (status)
1125 return status;
3c8e0316 1126 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr,
18032ca0 1127 &setattr->sa_acl, &setattr->sa_label);
1da177e4
LT
1128}
1129
b37ad28b 1130static __be32
1da177e4
LT
1131nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
1132{
1133 DECODE_HEAD;
1134
e1a90ebd
AS
1135 if (argp->minorversion >= 1)
1136 return nfserr_notsupp;
1137
ab4684d1
CL
1138 READ_BUF(NFS4_VERIFIER_SIZE);
1139 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE);
1da177e4 1140
a084daf5
BF
1141 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1142 if (status)
1143 return nfserr_bad_xdr;
1144 READ_BUF(8);
06553991
BF
1145 setclientid->se_callback_prog = be32_to_cpup(p++);
1146 setclientid->se_callback_netid_len = be32_to_cpup(p++);
1da177e4
LT
1147
1148 READ_BUF(setclientid->se_callback_netid_len + 4);
1149 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len);
06553991 1150 setclientid->se_callback_addr_len = be32_to_cpup(p++);
1da177e4
LT
1151
1152 READ_BUF(setclientid->se_callback_addr_len + 4);
1153 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len);
06553991 1154 setclientid->se_callback_ident = be32_to_cpup(p++);
1da177e4
LT
1155
1156 DECODE_TAIL;
1157}
1158
b37ad28b 1159static __be32
1da177e4
LT
1160nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1161{
1162 DECODE_HEAD;
1163
e1a90ebd
AS
1164 if (argp->minorversion >= 1)
1165 return nfserr_notsupp;
1166
ab4684d1 1167 READ_BUF(8 + NFS4_VERIFIER_SIZE);
1da177e4 1168 COPYMEM(&scd_c->sc_clientid, 8);
ab4684d1 1169 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE);
1da177e4
LT
1170
1171 DECODE_TAIL;
1172}
1173
1174/* Also used for NVERIFY */
b37ad28b 1175static __be32
1da177e4
LT
1176nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1177{
1da177e4
LT
1178 DECODE_HEAD;
1179
1180 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval)))
1181 goto out;
1182
1183 /* For convenience's sake, we compare raw xdr'd attributes in
e5f95703
BF
1184 * nfsd4_proc_verify */
1185
1da177e4 1186 READ_BUF(4);
06553991 1187 verify->ve_attrlen = be32_to_cpup(p++);
1da177e4
LT
1188 READ_BUF(verify->ve_attrlen);
1189 SAVEMEM(verify->ve_attrval, verify->ve_attrlen);
1190
1191 DECODE_TAIL;
1192}
1193
b37ad28b 1194static __be32
1da177e4
LT
1195nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1196{
1197 int avail;
1da177e4
LT
1198 int len;
1199 DECODE_HEAD;
1200
e31a1b66
BH
1201 status = nfsd4_decode_stateid(argp, &write->wr_stateid);
1202 if (status)
1203 return status;
1204 READ_BUF(16);
542d1ab3 1205 p = xdr_decode_hyper(p, &write->wr_offset);
06553991 1206 write->wr_stable_how = be32_to_cpup(p++);
1da177e4
LT
1207 if (write->wr_stable_how > 2)
1208 goto xdr_error;
06553991 1209 write->wr_buflen = be32_to_cpup(p++);
1da177e4
LT
1210
1211 /* Sorry .. no magic macros for this.. *
1212 * READ_BUF(write->wr_buflen);
1213 * SAVEMEM(write->wr_buf, write->wr_buflen);
1214 */
1215 avail = (char*)argp->end - (char*)argp->p;
1216 if (avail + argp->pagelen < write->wr_buflen) {
817cb9d4
CL
1217 dprintk("NFSD: xdr error (%s:%d)\n",
1218 __FILE__, __LINE__);
1da177e4
LT
1219 goto xdr_error;
1220 }
70cc7f75
BF
1221 write->wr_head.iov_base = p;
1222 write->wr_head.iov_len = avail;
70cc7f75 1223 write->wr_pagelist = argp->pagelist;
5a80a54d
BF
1224
1225 len = XDR_QUADLEN(write->wr_buflen) << 2;
1226 if (len >= avail) {
1227 int pages;
1228
1229 len -= avail;
1230
1231 pages = len >> PAGE_SHIFT;
1232 argp->pagelist += pages;
1233 argp->pagelen -= pages * PAGE_SIZE;
1234 len -= pages * PAGE_SIZE;
1235
1236 argp->p = (__be32 *)page_address(argp->pagelist[0]);
365da4ad 1237 argp->pagelist++;
5a80a54d 1238 argp->end = argp->p + XDR_QUADLEN(PAGE_SIZE);
1da177e4 1239 }
5a80a54d 1240 argp->p += XDR_QUADLEN(len);
1da177e4
LT
1241
1242 DECODE_TAIL;
1243}
1244
b37ad28b 1245static __be32
1da177e4
LT
1246nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1247{
1248 DECODE_HEAD;
1249
e1a90ebd
AS
1250 if (argp->minorversion >= 1)
1251 return nfserr_notsupp;
1252
1da177e4
LT
1253 READ_BUF(12);
1254 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t));
06553991 1255 rlockowner->rl_owner.len = be32_to_cpup(p++);
1da177e4
LT
1256 READ_BUF(rlockowner->rl_owner.len);
1257 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len);
1258
60adfc50
AA
1259 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1260 return nfserr_inval;
1da177e4
LT
1261 DECODE_TAIL;
1262}
1263
2db134eb
AA
1264static __be32
1265nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
0733d213 1266 struct nfsd4_exchange_id *exid)
2db134eb 1267{
5afa040b 1268 int dummy, tmp;
0733d213
AA
1269 DECODE_HEAD;
1270
1271 READ_BUF(NFS4_VERIFIER_SIZE);
1272 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE);
1273
a084daf5
BF
1274 status = nfsd4_decode_opaque(argp, &exid->clname);
1275 if (status)
1276 return nfserr_bad_xdr;
0733d213
AA
1277
1278 READ_BUF(4);
06553991 1279 exid->flags = be32_to_cpup(p++);
0733d213
AA
1280
1281 /* Ignore state_protect4_a */
1282 READ_BUF(4);
06553991 1283 exid->spa_how = be32_to_cpup(p++);
0733d213
AA
1284 switch (exid->spa_how) {
1285 case SP4_NONE:
1286 break;
1287 case SP4_MACH_CRED:
1288 /* spo_must_enforce */
1289 READ_BUF(4);
06553991 1290 dummy = be32_to_cpup(p++);
0733d213
AA
1291 READ_BUF(dummy * 4);
1292 p += dummy;
1293
1294 /* spo_must_allow */
1295 READ_BUF(4);
06553991 1296 dummy = be32_to_cpup(p++);
0733d213
AA
1297 READ_BUF(dummy * 4);
1298 p += dummy;
1299 break;
1300 case SP4_SSV:
1301 /* ssp_ops */
1302 READ_BUF(4);
06553991 1303 dummy = be32_to_cpup(p++);
0733d213
AA
1304 READ_BUF(dummy * 4);
1305 p += dummy;
1306
1307 READ_BUF(4);
06553991 1308 dummy = be32_to_cpup(p++);
0733d213
AA
1309 READ_BUF(dummy * 4);
1310 p += dummy;
1311
1312 /* ssp_hash_algs<> */
1313 READ_BUF(4);
06553991 1314 tmp = be32_to_cpup(p++);
5afa040b
MJ
1315 while (tmp--) {
1316 READ_BUF(4);
06553991 1317 dummy = be32_to_cpup(p++);
5afa040b
MJ
1318 READ_BUF(dummy);
1319 p += XDR_QUADLEN(dummy);
1320 }
0733d213
AA
1321
1322 /* ssp_encr_algs<> */
1323 READ_BUF(4);
06553991 1324 tmp = be32_to_cpup(p++);
5afa040b
MJ
1325 while (tmp--) {
1326 READ_BUF(4);
06553991 1327 dummy = be32_to_cpup(p++);
5afa040b
MJ
1328 READ_BUF(dummy);
1329 p += XDR_QUADLEN(dummy);
1330 }
0733d213
AA
1331
1332 /* ssp_window and ssp_num_gss_handles */
1333 READ_BUF(8);
06553991
BF
1334 dummy = be32_to_cpup(p++);
1335 dummy = be32_to_cpup(p++);
0733d213
AA
1336 break;
1337 default:
1338 goto xdr_error;
1339 }
1340
1341 /* Ignore Implementation ID */
1342 READ_BUF(4); /* nfs_impl_id4 array length */
06553991 1343 dummy = be32_to_cpup(p++);
0733d213
AA
1344
1345 if (dummy > 1)
1346 goto xdr_error;
1347
1348 if (dummy == 1) {
1349 /* nii_domain */
1350 READ_BUF(4);
06553991 1351 dummy = be32_to_cpup(p++);
0733d213
AA
1352 READ_BUF(dummy);
1353 p += XDR_QUADLEN(dummy);
1354
1355 /* nii_name */
1356 READ_BUF(4);
06553991 1357 dummy = be32_to_cpup(p++);
0733d213
AA
1358 READ_BUF(dummy);
1359 p += XDR_QUADLEN(dummy);
1360
1361 /* nii_date */
1362 READ_BUF(12);
1363 p += 3;
1364 }
1365 DECODE_TAIL;
2db134eb
AA
1366}
1367
1368static __be32
1369nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1370 struct nfsd4_create_session *sess)
1371{
ec6b5d7b 1372 DECODE_HEAD;
ec6b5d7b 1373 u32 dummy;
ec6b5d7b
AA
1374
1375 READ_BUF(16);
1376 COPYMEM(&sess->clientid, 8);
06553991
BF
1377 sess->seqid = be32_to_cpup(p++);
1378 sess->flags = be32_to_cpup(p++);
ec6b5d7b
AA
1379
1380 /* Fore channel attrs */
1381 READ_BUF(28);
06553991
BF
1382 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1383 sess->fore_channel.maxreq_sz = be32_to_cpup(p++);
1384 sess->fore_channel.maxresp_sz = be32_to_cpup(p++);
1385 sess->fore_channel.maxresp_cached = be32_to_cpup(p++);
1386 sess->fore_channel.maxops = be32_to_cpup(p++);
1387 sess->fore_channel.maxreqs = be32_to_cpup(p++);
1388 sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++);
ec6b5d7b
AA
1389 if (sess->fore_channel.nr_rdma_attrs == 1) {
1390 READ_BUF(4);
06553991 1391 sess->fore_channel.rdma_attrs = be32_to_cpup(p++);
ec6b5d7b
AA
1392 } else if (sess->fore_channel.nr_rdma_attrs > 1) {
1393 dprintk("Too many fore channel attr bitmaps!\n");
1394 goto xdr_error;
1395 }
1396
1397 /* Back channel attrs */
1398 READ_BUF(28);
06553991
BF
1399 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1400 sess->back_channel.maxreq_sz = be32_to_cpup(p++);
1401 sess->back_channel.maxresp_sz = be32_to_cpup(p++);
1402 sess->back_channel.maxresp_cached = be32_to_cpup(p++);
1403 sess->back_channel.maxops = be32_to_cpup(p++);
1404 sess->back_channel.maxreqs = be32_to_cpup(p++);
1405 sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++);
ec6b5d7b
AA
1406 if (sess->back_channel.nr_rdma_attrs == 1) {
1407 READ_BUF(4);
06553991 1408 sess->back_channel.rdma_attrs = be32_to_cpup(p++);
ec6b5d7b
AA
1409 } else if (sess->back_channel.nr_rdma_attrs > 1) {
1410 dprintk("Too many back channel attr bitmaps!\n");
1411 goto xdr_error;
1412 }
1413
acb2887e 1414 READ_BUF(4);
06553991 1415 sess->callback_prog = be32_to_cpup(p++);
acb2887e 1416 nfsd4_decode_cb_sec(argp, &sess->cb_sec);
ec6b5d7b 1417 DECODE_TAIL;
2db134eb
AA
1418}
1419
1420static __be32
1421nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1422 struct nfsd4_destroy_session *destroy_session)
1423{
e10e0cfc
BH
1424 DECODE_HEAD;
1425 READ_BUF(NFS4_MAX_SESSIONID_LEN);
1426 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1427
1428 DECODE_TAIL;
2db134eb
AA
1429}
1430
e1ca12df
BS
1431static __be32
1432nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1433 struct nfsd4_free_stateid *free_stateid)
1434{
1435 DECODE_HEAD;
1436
1437 READ_BUF(sizeof(stateid_t));
06553991 1438 free_stateid->fr_stateid.si_generation = be32_to_cpup(p++);
e1ca12df
BS
1439 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t));
1440
1441 DECODE_TAIL;
1442}
1443
2db134eb
AA
1444static __be32
1445nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1446 struct nfsd4_sequence *seq)
1447{
b85d4c01
BH
1448 DECODE_HEAD;
1449
1450 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16);
1451 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN);
06553991
BF
1452 seq->seqid = be32_to_cpup(p++);
1453 seq->slotid = be32_to_cpup(p++);
1454 seq->maxslots = be32_to_cpup(p++);
1455 seq->cachethis = be32_to_cpup(p++);
b85d4c01
BH
1456
1457 DECODE_TAIL;
2db134eb
AA
1458}
1459
17456804
BS
1460static __be32
1461nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1462{
17456804 1463 int i;
03cfb420
BS
1464 __be32 *p, status;
1465 struct nfsd4_test_stateid_id *stateid;
17456804
BS
1466
1467 READ_BUF(4);
1468 test_stateid->ts_num_ids = ntohl(*p++);
1469
03cfb420 1470 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
17456804
BS
1471
1472 for (i = 0; i < test_stateid->ts_num_ids; i++) {
d5e23383 1473 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
03cfb420 1474 if (!stateid) {
afcf6792 1475 status = nfserrno(-ENOMEM);
03cfb420
BS
1476 goto out;
1477 }
1478
03cfb420
BS
1479 INIT_LIST_HEAD(&stateid->ts_id_list);
1480 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1481
1482 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid);
17456804 1483 if (status)
03cfb420 1484 goto out;
17456804
BS
1485 }
1486
1487 status = 0;
1488out:
1489 return status;
1490xdr_error:
1491 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__);
1492 status = nfserr_bad_xdr;
1493 goto out;
1494}
1495
345c2842
MJ
1496static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc)
1497{
1498 DECODE_HEAD;
1499
1500 READ_BUF(8);
1501 COPYMEM(&dc->clientid, 8);
1502
1503 DECODE_TAIL;
1504}
1505
4dc6ec00
BF
1506static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc)
1507{
1508 DECODE_HEAD;
1509
1510 READ_BUF(4);
06553991 1511 rc->rca_one_fs = be32_to_cpup(p++);
4dc6ec00
BF
1512
1513 DECODE_TAIL;
1514}
1515
347e0ad9
BH
1516static __be32
1517nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
1518{
1519 return nfs_ok;
1520}
1521
3c375c6f
BH
1522static __be32
1523nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
1524{
1e685ec2 1525 return nfserr_notsupp;
3c375c6f
BH
1526}
1527
347e0ad9
BH
1528typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
1529
1530static nfsd4_dec nfsd4_dec_ops[] = {
ad1060c8
BF
1531 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
1532 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
1533 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
1534 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
1535 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
1536 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
1537 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
1538 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
1539 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
1540 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
1541 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
1542 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
1543 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
1544 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
1545 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1546 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
1547 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
1548 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm,
1549 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
1550 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
e1a90ebd 1551 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh,
ad1060c8
BF
1552 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
1553 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
1554 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
1555 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
1556 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
1557 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
1558 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew,
1559 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
1560 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
1561 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
1562 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
1563 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid,
1564 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
1565 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1566 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
1567 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner,
2db134eb
AA
1568
1569 /* new operations for NFSv4.1 */
cb73a9f4 1570 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl,
1d1bc8f2 1571 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
9064caae
RD
1572 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id,
1573 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session,
1574 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session,
e1ca12df 1575 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid,
9064caae
RD
1576 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1577 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp,
1578 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
1579 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp,
1580 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp,
1581 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp,
04f4ad16 1582 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name,
9064caae
RD
1583 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence,
1584 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp,
17456804 1585 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid,
9064caae 1586 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
345c2842 1587 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid,
4dc6ec00 1588 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete,
2db134eb
AA
1589};
1590
e1a90ebd
AS
1591static inline bool
1592nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
1593{
8217d146 1594 if (op->opnum < FIRST_NFS4_OP)
e1a90ebd 1595 return false;
8217d146 1596 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
e1a90ebd 1597 return false;
8217d146
AS
1598 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
1599 return false;
1600 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
e1a90ebd
AS
1601 return false;
1602 return true;
1603}
f2feb96b 1604
b37ad28b 1605static __be32
1da177e4
LT
1606nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
1607{
1608 DECODE_HEAD;
1609 struct nfsd4_op *op;
1091006c 1610 bool cachethis = false;
a5cddc88
BF
1611 int auth_slack= argp->rqstp->rq_auth_slack;
1612 int max_reply = auth_slack + 8; /* opcnt, status */
b0e35fda
BF
1613 int readcount = 0;
1614 int readbytes = 0;
1da177e4
LT
1615 int i;
1616
1da177e4 1617 READ_BUF(4);
06553991 1618 argp->taglen = be32_to_cpup(p++);
1da177e4
LT
1619 READ_BUF(argp->taglen + 8);
1620 SAVEMEM(argp->tag, argp->taglen);
06553991
BF
1621 argp->minorversion = be32_to_cpup(p++);
1622 argp->opcnt = be32_to_cpup(p++);
4f0cefbf 1623 max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2);
1da177e4
LT
1624
1625 if (argp->taglen > NFSD4_MAX_TAGLEN)
1626 goto xdr_error;
1627 if (argp->opcnt > 100)
1628 goto xdr_error;
1629
e8c96f8c 1630 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
5d6031ca 1631 argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
1da177e4
LT
1632 if (!argp->ops) {
1633 argp->ops = argp->iops;
817cb9d4 1634 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
1da177e4
LT
1635 goto xdr_error;
1636 }
1637 }
1638
e1a90ebd 1639 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
30cff1ff
BH
1640 argp->opcnt = 0;
1641
1da177e4
LT
1642 for (i = 0; i < argp->opcnt; i++) {
1643 op = &argp->ops[i];
1644 op->replay = NULL;
1645
8a61b18c 1646 READ_BUF(4);
06553991 1647 op->opnum = be32_to_cpup(p++);
1da177e4 1648
e1a90ebd
AS
1649 if (nfsd4_opnum_in_range(argp, op))
1650 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
347e0ad9 1651 else {
1da177e4
LT
1652 op->opnum = OP_ILLEGAL;
1653 op->status = nfserr_op_illegal;
1da177e4 1654 }
1091006c
BF
1655 /*
1656 * We'll try to cache the result in the DRC if any one
1657 * op in the compound wants to be cached:
1658 */
1659 cachethis |= nfsd4_cache_this_op(op);
6ff40dec 1660
b0e35fda
BF
1661 if (op->opnum == OP_READ) {
1662 readcount++;
1663 readbytes += nfsd4_max_reply(argp->rqstp, op);
1664 } else
1665 max_reply += nfsd4_max_reply(argp->rqstp, op);
f7b43d0c
BF
1666 /*
1667 * OP_LOCK may return a conflicting lock. (Special case
1668 * because it will just skip encoding this if it runs
1669 * out of xdr buffer space, and it is the only operation
1670 * that behaves this way.)
1671 */
1672 if (op->opnum == OP_LOCK)
1673 max_reply += NFS4_OPAQUE_LIMIT;
e372ba60
BF
1674
1675 if (op->status) {
1676 argp->opcnt = i+1;
1677 break;
1678 }
1da177e4 1679 }
1091006c
BF
1680 /* Sessions make the DRC unnecessary: */
1681 if (argp->minorversion)
1682 cachethis = false;
b0e35fda 1683 svc_reserve(argp->rqstp, max_reply + readbytes);
1091006c 1684 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
1da177e4 1685
a5cddc88 1686 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
b0e35fda
BF
1687 argp->rqstp->rq_splice_ok = false;
1688
1da177e4
LT
1689 DECODE_TAIL;
1690}
1da177e4 1691
d05d5744 1692static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode)
c654b8a9
BF
1693{
1694 if (IS_I_VERSION(inode)) {
d05d5744 1695 p = xdr_encode_hyper(p, inode->i_version);
c654b8a9 1696 } else {
d05d5744
BF
1697 *p++ = cpu_to_be32(stat->ctime.tv_sec);
1698 *p++ = cpu_to_be32(stat->ctime.tv_nsec);
c654b8a9 1699 }
d05d5744 1700 return p;
c654b8a9
BF
1701}
1702
d05d5744 1703static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
c654b8a9 1704{
d05d5744 1705 *p++ = cpu_to_be32(c->atomic);
c654b8a9 1706 if (c->change_supported) {
d05d5744
BF
1707 p = xdr_encode_hyper(p, c->before_change);
1708 p = xdr_encode_hyper(p, c->after_change);
c654b8a9 1709 } else {
d05d5744
BF
1710 *p++ = cpu_to_be32(c->before_ctime_sec);
1711 *p++ = cpu_to_be32(c->before_ctime_nsec);
1712 *p++ = cpu_to_be32(c->after_ctime_sec);
1713 *p++ = cpu_to_be32(c->after_ctime_nsec);
c654b8a9 1714 }
d05d5744 1715 return p;
c654b8a9 1716}
1da177e4 1717
81c3f413 1718/* Encode as an array of strings the string given with components
e7a0444a 1719 * separated @sep, escaped with esc_enter and esc_exit.
81c3f413 1720 */
ddd1ea56
BF
1721static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
1722 char *components, char esc_enter,
1723 char esc_exit)
81c3f413 1724{
ddd1ea56 1725 __be32 *p;
082d4bd7
BF
1726 __be32 pathlen;
1727 int pathlen_offset;
81c3f413 1728 int strlen, count=0;
e7a0444a 1729 char *str, *end, *next;
81c3f413
BF
1730
1731 dprintk("nfsd4_encode_components(%s)\n", components);
082d4bd7
BF
1732
1733 pathlen_offset = xdr->buf->len;
ddd1ea56
BF
1734 p = xdr_reserve_space(xdr, 4);
1735 if (!p)
81c3f413 1736 return nfserr_resource;
082d4bd7
BF
1737 p++; /* We will fill this in with @count later */
1738
81c3f413
BF
1739 end = str = components;
1740 while (*end) {
e7a0444a
WAA
1741 bool found_esc = false;
1742
1743 /* try to parse as esc_start, ..., esc_end, sep */
1744 if (*str == esc_enter) {
1745 for (; *end && (*end != esc_exit); end++)
1746 /* find esc_exit or end of string */;
1747 next = end + 1;
1748 if (*end && (!*next || *next == sep)) {
1749 str++;
1750 found_esc = true;
1751 }
1752 }
1753
1754 if (!found_esc)
1755 for (; *end && (*end != sep); end++)
1756 /* find sep or end of string */;
1757
81c3f413
BF
1758 strlen = end - str;
1759 if (strlen) {
ddd1ea56
BF
1760 p = xdr_reserve_space(xdr, strlen + 4);
1761 if (!p)
81c3f413 1762 return nfserr_resource;
0c0c267b 1763 p = xdr_encode_opaque(p, str, strlen);
81c3f413
BF
1764 count++;
1765 }
1766 else
1767 end++;
1768 str = end;
1769 }
082d4bd7
BF
1770 pathlen = htonl(xdr->buf->len - pathlen_offset);
1771 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
81c3f413
BF
1772 return 0;
1773}
1774
e7a0444a
WAA
1775/* Encode as an array of strings the string given with components
1776 * separated @sep.
1777 */
ddd1ea56
BF
1778static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
1779 char *components)
e7a0444a 1780{
ddd1ea56 1781 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
e7a0444a
WAA
1782}
1783
81c3f413
BF
1784/*
1785 * encode a location element of a fs_locations structure
1786 */
ddd1ea56
BF
1787static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
1788 struct nfsd4_fs_location *location)
81c3f413 1789{
b37ad28b 1790 __be32 status;
81c3f413 1791
ddd1ea56 1792 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
e7a0444a 1793 '[', ']');
81c3f413
BF
1794 if (status)
1795 return status;
ddd1ea56 1796 status = nfsd4_encode_components(xdr, '/', location->path);
81c3f413
BF
1797 if (status)
1798 return status;
81c3f413
BF
1799 return 0;
1800}
1801
1802/*
ed748aac 1803 * Encode a path in RFC3530 'pathname4' format
81c3f413 1804 */
ddd1ea56
BF
1805static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
1806 const struct path *root,
1807 const struct path *path)
81c3f413 1808{
301f0268 1809 struct path cur = *path;
ddd1ea56 1810 __be32 *p;
ed748aac
TM
1811 struct dentry **components = NULL;
1812 unsigned int ncomponents = 0;
1813 __be32 err = nfserr_jukebox;
81c3f413 1814
ed748aac 1815 dprintk("nfsd4_encode_components(");
81c3f413 1816
ed748aac
TM
1817 path_get(&cur);
1818 /* First walk the path up to the nfsd root, and store the
1819 * dentries/path components in an array.
1820 */
1821 for (;;) {
1822 if (cur.dentry == root->dentry && cur.mnt == root->mnt)
1823 break;
1824 if (cur.dentry == cur.mnt->mnt_root) {
1825 if (follow_up(&cur))
1826 continue;
1827 goto out_free;
1828 }
1829 if ((ncomponents & 15) == 0) {
1830 struct dentry **new;
1831 new = krealloc(components,
1832 sizeof(*new) * (ncomponents + 16),
1833 GFP_KERNEL);
1834 if (!new)
1835 goto out_free;
1836 components = new;
1837 }
1838 components[ncomponents++] = cur.dentry;
1839 cur.dentry = dget_parent(cur.dentry);
1840 }
ddd1ea56
BF
1841 err = nfserr_resource;
1842 p = xdr_reserve_space(xdr, 4);
1843 if (!p)
ed748aac 1844 goto out_free;
c373b0a4 1845 *p++ = cpu_to_be32(ncomponents);
ed748aac
TM
1846
1847 while (ncomponents) {
1848 struct dentry *dentry = components[ncomponents - 1];
301f0268 1849 unsigned int len;
ed748aac 1850
301f0268
AV
1851 spin_lock(&dentry->d_lock);
1852 len = dentry->d_name.len;
ddd1ea56
BF
1853 p = xdr_reserve_space(xdr, len + 4);
1854 if (!p) {
301f0268 1855 spin_unlock(&dentry->d_lock);
ed748aac 1856 goto out_free;
301f0268 1857 }
0c0c267b 1858 p = xdr_encode_opaque(p, dentry->d_name.name, len);
ed748aac 1859 dprintk("/%s", dentry->d_name.name);
301f0268 1860 spin_unlock(&dentry->d_lock);
ed748aac
TM
1861 dput(dentry);
1862 ncomponents--;
81c3f413 1863 }
ed748aac 1864
ed748aac
TM
1865 err = 0;
1866out_free:
1867 dprintk(")\n");
1868 while (ncomponents)
1869 dput(components[--ncomponents]);
1870 kfree(components);
1871 path_put(&cur);
1872 return err;
1873}
1874
ddd1ea56
BF
1875static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
1876 struct svc_rqst *rqstp, const struct path *path)
ed748aac
TM
1877{
1878 struct svc_export *exp_ps;
1879 __be32 res;
1880
1881 exp_ps = rqst_find_fsidzero_export(rqstp);
1882 if (IS_ERR(exp_ps))
1883 return nfserrno(PTR_ERR(exp_ps));
ddd1ea56 1884 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
ed748aac
TM
1885 exp_put(exp_ps);
1886 return res;
81c3f413
BF
1887}
1888
1889/*
1890 * encode a fs_locations structure
1891 */
ddd1ea56
BF
1892static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
1893 struct svc_rqst *rqstp, struct svc_export *exp)
81c3f413 1894{
b37ad28b 1895 __be32 status;
cc45f017 1896 int i;
ddd1ea56 1897 __be32 *p;
81c3f413 1898 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
81c3f413 1899
ddd1ea56 1900 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
81c3f413
BF
1901 if (status)
1902 return status;
ddd1ea56
BF
1903 p = xdr_reserve_space(xdr, 4);
1904 if (!p)
81c3f413 1905 return nfserr_resource;
c373b0a4 1906 *p++ = cpu_to_be32(fslocs->locations_count);
81c3f413 1907 for (i=0; i<fslocs->locations_count; i++) {
ddd1ea56 1908 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
81c3f413
BF
1909 if (status)
1910 return status;
1911 }
81c3f413
BF
1912 return 0;
1913}
1da177e4 1914
3d2544b1
BF
1915static u32 nfs4_file_type(umode_t mode)
1916{
1917 switch (mode & S_IFMT) {
1918 case S_IFIFO: return NF4FIFO;
1919 case S_IFCHR: return NF4CHR;
1920 case S_IFDIR: return NF4DIR;
1921 case S_IFBLK: return NF4BLK;
1922 case S_IFLNK: return NF4LNK;
1923 case S_IFREG: return NF4REG;
1924 case S_IFSOCK: return NF4SOCK;
1925 default: return NF4BAD;
1926 };
1927}
1da177e4 1928
b37ad28b 1929static inline __be32
ddd1ea56
BF
1930nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1931 struct nfs4_ace *ace)
1da177e4 1932{
3554116d 1933 if (ace->whotype != NFS4_ACL_WHO_NAMED)
ddd1ea56 1934 return nfs4_acl_write_who(xdr, ace->whotype);
3554116d 1935 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
ddd1ea56 1936 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
3554116d 1937 else
ddd1ea56 1938 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
1da177e4
LT
1939}
1940
42ca0993
BF
1941#define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
1942 FATTR4_WORD0_RDATTR_ERROR)
1943#define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
1944
18032ca0
DQ
1945#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
1946static inline __be32
ddd1ea56
BF
1947nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1948 void *context, int len)
18032ca0 1949{
ddd1ea56 1950 __be32 *p;
18032ca0 1951
ddd1ea56
BF
1952 p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
1953 if (!p)
18032ca0
DQ
1954 return nfserr_resource;
1955
1956 /*
1957 * For now we use a 0 here to indicate the null translation; in
1958 * the future we may place a call to translation code here.
1959 */
c373b0a4
BF
1960 *p++ = cpu_to_be32(0); /* lfs */
1961 *p++ = cpu_to_be32(0); /* pi */
18032ca0 1962 p = xdr_encode_opaque(p, context, len);
18032ca0
DQ
1963 return 0;
1964}
1965#else
1966static inline __be32
ddd1ea56
BF
1967nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1968 void *context, int len)
18032ca0
DQ
1969{ return 0; }
1970#endif
1971
b37ad28b 1972static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *rdattr_err)
42ca0993
BF
1973{
1974 /* As per referral draft: */
1975 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
1976 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
1977 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
1978 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
1979 *rdattr_err = NFSERR_MOVED;
1980 else
1981 return nfserr_moved;
1982 }
1983 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
1984 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
1985 return 0;
1986}
1da177e4 1987
ae7095a7
BF
1988
1989static int get_parent_attributes(struct svc_export *exp, struct kstat *stat)
1990{
1991 struct path path = exp->ex_path;
1992 int err;
1993
1994 path_get(&path);
1995 while (follow_up(&path)) {
1996 if (path.dentry != path.mnt->mnt_root)
1997 break;
1998 }
3dadecce 1999 err = vfs_getattr(&path, stat);
ae7095a7
BF
2000 path_put(&path);
2001 return err;
2002}
2003
1da177e4
LT
2004/*
2005 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2006 * ourselves.
1da177e4 2007 */
da2ebce6 2008static __be32
d5184658
BF
2009nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2010 struct svc_export *exp,
2011 struct dentry *dentry, u32 *bmval,
406a7ea9 2012 struct svc_rqst *rqstp, int ignore_crossmnt)
1da177e4
LT
2013{
2014 u32 bmval0 = bmval[0];
2015 u32 bmval1 = bmval[1];
7e705706 2016 u32 bmval2 = bmval[2];
1da177e4 2017 struct kstat stat;
d50e6136 2018 struct svc_fh *tempfh = NULL;
1da177e4 2019 struct kstatfs statfs;
ddd1ea56 2020 __be32 *p;
1fcea5b2 2021 int starting_len = xdr->buf->len;
082d4bd7
BF
2022 int attrlen_offset;
2023 __be32 attrlen;
1da177e4
LT
2024 u32 dummy;
2025 u64 dummy64;
42ca0993 2026 u32 rdattr_err = 0;
b37ad28b 2027 __be32 status;
b8dd7b9a 2028 int err;
1da177e4
LT
2029 int aclsupport = 0;
2030 struct nfs4_acl *acl = NULL;
18032ca0
DQ
2031 void *context = NULL;
2032 int contextlen;
2033 bool contextsupport = false;
7e705706
AA
2034 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2035 u32 minorversion = resp->cstate.minorversion;
ebabe9a9
CH
2036 struct path path = {
2037 .mnt = exp->ex_path.mnt,
2038 .dentry = dentry,
2039 };
3d733711 2040 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
1da177e4
LT
2041
2042 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
7e705706
AA
2043 BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion));
2044 BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion));
2045 BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion));
1da177e4 2046
42ca0993 2047 if (exp->ex_fslocs.migrated) {
7e705706 2048 BUG_ON(bmval[2]);
42ca0993
BF
2049 status = fattr_handle_absent_fs(&bmval0, &bmval1, &rdattr_err);
2050 if (status)
2051 goto out;
2052 }
2053
3dadecce 2054 err = vfs_getattr(&path, &stat);
b8dd7b9a 2055 if (err)
1da177e4 2056 goto out_nfserr;
12337901
CH
2057 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2058 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
1da177e4
LT
2059 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2060 FATTR4_WORD1_SPACE_TOTAL))) {
ebabe9a9 2061 err = vfs_statfs(&path, &statfs);
b8dd7b9a 2062 if (err)
1da177e4
LT
2063 goto out_nfserr;
2064 }
2065 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
d50e6136
BF
2066 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2067 status = nfserr_jukebox;
2068 if (!tempfh)
2069 goto out;
2070 fh_init(tempfh, NFS4_FHSIZE);
2071 status = fh_compose(tempfh, exp, dentry, NULL);
1da177e4
LT
2072 if (status)
2073 goto out;
d50e6136 2074 fhp = tempfh;
1da177e4
LT
2075 }
2076 if (bmval0 & (FATTR4_WORD0_ACL | FATTR4_WORD0_ACLSUPPORT
2077 | FATTR4_WORD0_SUPPORTED_ATTRS)) {
b8dd7b9a
AV
2078 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2079 aclsupport = (err == 0);
1da177e4 2080 if (bmval0 & FATTR4_WORD0_ACL) {
b8dd7b9a 2081 if (err == -EOPNOTSUPP)
1da177e4 2082 bmval0 &= ~FATTR4_WORD0_ACL;
b8dd7b9a 2083 else if (err == -EINVAL) {
1da177e4
LT
2084 status = nfserr_attrnotsupp;
2085 goto out;
b8dd7b9a 2086 } else if (err != 0)
1da177e4
LT
2087 goto out_nfserr;
2088 }
2089 }
1da177e4 2090
18032ca0
DQ
2091#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2092 if ((bmval[2] & FATTR4_WORD2_SECURITY_LABEL) ||
2093 bmval[0] & FATTR4_WORD0_SUPPORTED_ATTRS) {
2094 err = security_inode_getsecctx(dentry->d_inode,
2095 &context, &contextlen);
2096 contextsupport = (err == 0);
2097 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2098 if (err == -EOPNOTSUPP)
2099 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2100 else if (err)
2101 goto out_nfserr;
2102 }
2103 }
2104#endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2105
2b44f1ba 2106 if (bmval2) {
ddd1ea56
BF
2107 p = xdr_reserve_space(xdr, 16);
2108 if (!p)
2b44f1ba 2109 goto out_resource;
c373b0a4
BF
2110 *p++ = cpu_to_be32(3);
2111 *p++ = cpu_to_be32(bmval0);
2112 *p++ = cpu_to_be32(bmval1);
2113 *p++ = cpu_to_be32(bmval2);
2b44f1ba 2114 } else if (bmval1) {
ddd1ea56
BF
2115 p = xdr_reserve_space(xdr, 12);
2116 if (!p)
2b44f1ba 2117 goto out_resource;
c373b0a4
BF
2118 *p++ = cpu_to_be32(2);
2119 *p++ = cpu_to_be32(bmval0);
2120 *p++ = cpu_to_be32(bmval1);
7e705706 2121 } else {
ddd1ea56
BF
2122 p = xdr_reserve_space(xdr, 8);
2123 if (!p)
2b44f1ba 2124 goto out_resource;
c373b0a4
BF
2125 *p++ = cpu_to_be32(1);
2126 *p++ = cpu_to_be32(bmval0);
7e705706 2127 }
082d4bd7
BF
2128
2129 attrlen_offset = xdr->buf->len;
ddd1ea56
BF
2130 p = xdr_reserve_space(xdr, 4);
2131 if (!p)
2132 goto out_resource;
082d4bd7 2133 p++; /* to be backfilled later */
1da177e4
LT
2134
2135 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
7e705706
AA
2136 u32 word0 = nfsd_suppattrs0(minorversion);
2137 u32 word1 = nfsd_suppattrs1(minorversion);
2138 u32 word2 = nfsd_suppattrs2(minorversion);
2139
42ca0993
BF
2140 if (!aclsupport)
2141 word0 &= ~FATTR4_WORD0_ACL;
18032ca0
DQ
2142 if (!contextsupport)
2143 word2 &= ~FATTR4_WORD2_SECURITY_LABEL;
7e705706 2144 if (!word2) {
ddd1ea56
BF
2145 p = xdr_reserve_space(xdr, 12);
2146 if (!p)
2b44f1ba 2147 goto out_resource;
c373b0a4
BF
2148 *p++ = cpu_to_be32(2);
2149 *p++ = cpu_to_be32(word0);
2150 *p++ = cpu_to_be32(word1);
7e705706 2151 } else {
ddd1ea56
BF
2152 p = xdr_reserve_space(xdr, 16);
2153 if (!p)
2b44f1ba 2154 goto out_resource;
c373b0a4
BF
2155 *p++ = cpu_to_be32(3);
2156 *p++ = cpu_to_be32(word0);
2157 *p++ = cpu_to_be32(word1);
2158 *p++ = cpu_to_be32(word2);
7e705706 2159 }
1da177e4
LT
2160 }
2161 if (bmval0 & FATTR4_WORD0_TYPE) {
ddd1ea56
BF
2162 p = xdr_reserve_space(xdr, 4);
2163 if (!p)
1da177e4 2164 goto out_resource;
3d2544b1 2165 dummy = nfs4_file_type(stat.mode);
6b6d8137
BF
2166 if (dummy == NF4BAD) {
2167 status = nfserr_serverfault;
2168 goto out;
2169 }
c373b0a4 2170 *p++ = cpu_to_be32(dummy);
1da177e4
LT
2171 }
2172 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
ddd1ea56
BF
2173 p = xdr_reserve_space(xdr, 4);
2174 if (!p)
1da177e4 2175 goto out_resource;
49640001 2176 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
c373b0a4 2177 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
49640001 2178 else
c373b0a4
BF
2179 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
2180 NFS4_FH_VOL_RENAME);
1da177e4
LT
2181 }
2182 if (bmval0 & FATTR4_WORD0_CHANGE) {
ddd1ea56
BF
2183 p = xdr_reserve_space(xdr, 8);
2184 if (!p)
1da177e4 2185 goto out_resource;
d05d5744 2186 p = encode_change(p, &stat, dentry->d_inode);
1da177e4
LT
2187 }
2188 if (bmval0 & FATTR4_WORD0_SIZE) {
ddd1ea56
BF
2189 p = xdr_reserve_space(xdr, 8);
2190 if (!p)
1da177e4 2191 goto out_resource;
b64c7f3b 2192 p = xdr_encode_hyper(p, stat.size);
1da177e4
LT
2193 }
2194 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
ddd1ea56
BF
2195 p = xdr_reserve_space(xdr, 4);
2196 if (!p)
1da177e4 2197 goto out_resource;
c373b0a4 2198 *p++ = cpu_to_be32(1);
1da177e4
LT
2199 }
2200 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
ddd1ea56
BF
2201 p = xdr_reserve_space(xdr, 4);
2202 if (!p)
1da177e4 2203 goto out_resource;
c373b0a4 2204 *p++ = cpu_to_be32(1);
1da177e4
LT
2205 }
2206 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
ddd1ea56
BF
2207 p = xdr_reserve_space(xdr, 4);
2208 if (!p)
1da177e4 2209 goto out_resource;
c373b0a4 2210 *p++ = cpu_to_be32(0);
1da177e4
LT
2211 }
2212 if (bmval0 & FATTR4_WORD0_FSID) {
ddd1ea56
BF
2213 p = xdr_reserve_space(xdr, 16);
2214 if (!p)
1da177e4 2215 goto out_resource;
42ca0993 2216 if (exp->ex_fslocs.migrated) {
b64c7f3b
BF
2217 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
2218 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
af6a4e28
N
2219 } else switch(fsid_source(fhp)) {
2220 case FSIDSOURCE_FSID:
b64c7f3b
BF
2221 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
2222 p = xdr_encode_hyper(p, (u64)0);
af6a4e28
N
2223 break;
2224 case FSIDSOURCE_DEV:
c373b0a4
BF
2225 *p++ = cpu_to_be32(0);
2226 *p++ = cpu_to_be32(MAJOR(stat.dev));
2227 *p++ = cpu_to_be32(0);
2228 *p++ = cpu_to_be32(MINOR(stat.dev));
af6a4e28
N
2229 break;
2230 case FSIDSOURCE_UUID:
94eb3689
KM
2231 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
2232 EX_UUID_LEN);
af6a4e28 2233 break;
1da177e4
LT
2234 }
2235 }
2236 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
ddd1ea56
BF
2237 p = xdr_reserve_space(xdr, 4);
2238 if (!p)
1da177e4 2239 goto out_resource;
c373b0a4 2240 *p++ = cpu_to_be32(0);
1da177e4
LT
2241 }
2242 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
ddd1ea56
BF
2243 p = xdr_reserve_space(xdr, 4);
2244 if (!p)
1da177e4 2245 goto out_resource;
c373b0a4 2246 *p++ = cpu_to_be32(nn->nfsd4_lease);
1da177e4
LT
2247 }
2248 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
ddd1ea56
BF
2249 p = xdr_reserve_space(xdr, 4);
2250 if (!p)
1da177e4 2251 goto out_resource;
c373b0a4 2252 *p++ = cpu_to_be32(rdattr_err);
1da177e4
LT
2253 }
2254 if (bmval0 & FATTR4_WORD0_ACL) {
2255 struct nfs4_ace *ace;
1da177e4
LT
2256
2257 if (acl == NULL) {
ddd1ea56
BF
2258 p = xdr_reserve_space(xdr, 4);
2259 if (!p)
1da177e4
LT
2260 goto out_resource;
2261
c373b0a4 2262 *p++ = cpu_to_be32(0);
1da177e4
LT
2263 goto out_acl;
2264 }
ddd1ea56
BF
2265 p = xdr_reserve_space(xdr, 4);
2266 if (!p)
1da177e4 2267 goto out_resource;
c373b0a4 2268 *p++ = cpu_to_be32(acl->naces);
1da177e4 2269
28e05dd8 2270 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
ddd1ea56
BF
2271 p = xdr_reserve_space(xdr, 4*3);
2272 if (!p)
1da177e4 2273 goto out_resource;
c373b0a4
BF
2274 *p++ = cpu_to_be32(ace->type);
2275 *p++ = cpu_to_be32(ace->flag);
2276 *p++ = cpu_to_be32(ace->access_mask &
2277 NFS4_ACE_MASK_ALL);
ddd1ea56 2278 status = nfsd4_encode_aclname(xdr, rqstp, ace);
1da177e4
LT
2279 if (status)
2280 goto out;
2281 }
2282 }
2283out_acl:
2284 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
ddd1ea56
BF
2285 p = xdr_reserve_space(xdr, 4);
2286 if (!p)
1da177e4 2287 goto out_resource;
c373b0a4 2288 *p++ = cpu_to_be32(aclsupport ?
1da177e4
LT
2289 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
2290 }
2291 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
ddd1ea56
BF
2292 p = xdr_reserve_space(xdr, 4);
2293 if (!p)
1da177e4 2294 goto out_resource;
c373b0a4 2295 *p++ = cpu_to_be32(1);
1da177e4
LT
2296 }
2297 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
ddd1ea56
BF
2298 p = xdr_reserve_space(xdr, 4);
2299 if (!p)
1da177e4 2300 goto out_resource;
c373b0a4 2301 *p++ = cpu_to_be32(0);
1da177e4
LT
2302 }
2303 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
ddd1ea56
BF
2304 p = xdr_reserve_space(xdr, 4);
2305 if (!p)
1da177e4 2306 goto out_resource;
c373b0a4 2307 *p++ = cpu_to_be32(1);
1da177e4
LT
2308 }
2309 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
ddd1ea56
BF
2310 p = xdr_reserve_space(xdr, 4);
2311 if (!p)
1da177e4 2312 goto out_resource;
c373b0a4 2313 *p++ = cpu_to_be32(1);
1da177e4
LT
2314 }
2315 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
ddd1ea56
BF
2316 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
2317 if (!p)
1da177e4 2318 goto out_resource;
0c0c267b
BF
2319 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base,
2320 fhp->fh_handle.fh_size);
1da177e4
LT
2321 }
2322 if (bmval0 & FATTR4_WORD0_FILEID) {
ddd1ea56
BF
2323 p = xdr_reserve_space(xdr, 8);
2324 if (!p)
1da177e4 2325 goto out_resource;
b64c7f3b 2326 p = xdr_encode_hyper(p, stat.ino);
1da177e4
LT
2327 }
2328 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
ddd1ea56
BF
2329 p = xdr_reserve_space(xdr, 8);
2330 if (!p)
1da177e4 2331 goto out_resource;
b64c7f3b 2332 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
1da177e4
LT
2333 }
2334 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
ddd1ea56
BF
2335 p = xdr_reserve_space(xdr, 8);
2336 if (!p)
1da177e4 2337 goto out_resource;
b64c7f3b 2338 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
1da177e4
LT
2339 }
2340 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
ddd1ea56
BF
2341 p = xdr_reserve_space(xdr, 8);
2342 if (!p)
1da177e4 2343 goto out_resource;
b64c7f3b 2344 p = xdr_encode_hyper(p, (u64) statfs.f_files);
1da177e4 2345 }
81c3f413 2346 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
ddd1ea56 2347 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
81c3f413
BF
2348 if (status)
2349 goto out;
2350 }
1da177e4 2351 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
ddd1ea56
BF
2352 p = xdr_reserve_space(xdr, 4);
2353 if (!p)
1da177e4 2354 goto out_resource;
c373b0a4 2355 *p++ = cpu_to_be32(1);
1da177e4
LT
2356 }
2357 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
ddd1ea56
BF
2358 p = xdr_reserve_space(xdr, 8);
2359 if (!p)
1da177e4 2360 goto out_resource;
b64c7f3b 2361 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
1da177e4
LT
2362 }
2363 if (bmval0 & FATTR4_WORD0_MAXLINK) {
ddd1ea56
BF
2364 p = xdr_reserve_space(xdr, 4);
2365 if (!p)
1da177e4 2366 goto out_resource;
c373b0a4 2367 *p++ = cpu_to_be32(255);
1da177e4
LT
2368 }
2369 if (bmval0 & FATTR4_WORD0_MAXNAME) {
ddd1ea56
BF
2370 p = xdr_reserve_space(xdr, 4);
2371 if (!p)
1da177e4 2372 goto out_resource;
c373b0a4 2373 *p++ = cpu_to_be32(statfs.f_namelen);
1da177e4
LT
2374 }
2375 if (bmval0 & FATTR4_WORD0_MAXREAD) {
ddd1ea56
BF
2376 p = xdr_reserve_space(xdr, 8);
2377 if (!p)
1da177e4 2378 goto out_resource;
b64c7f3b 2379 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
1da177e4
LT
2380 }
2381 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
ddd1ea56
BF
2382 p = xdr_reserve_space(xdr, 8);
2383 if (!p)
1da177e4 2384 goto out_resource;
b64c7f3b 2385 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
1da177e4
LT
2386 }
2387 if (bmval1 & FATTR4_WORD1_MODE) {
ddd1ea56
BF
2388 p = xdr_reserve_space(xdr, 4);
2389 if (!p)
1da177e4 2390 goto out_resource;
c373b0a4 2391 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
1da177e4
LT
2392 }
2393 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
ddd1ea56
BF
2394 p = xdr_reserve_space(xdr, 4);
2395 if (!p)
1da177e4 2396 goto out_resource;
c373b0a4 2397 *p++ = cpu_to_be32(1);
1da177e4
LT
2398 }
2399 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
ddd1ea56
BF
2400 p = xdr_reserve_space(xdr, 4);
2401 if (!p)
1da177e4 2402 goto out_resource;
c373b0a4 2403 *p++ = cpu_to_be32(stat.nlink);
1da177e4
LT
2404 }
2405 if (bmval1 & FATTR4_WORD1_OWNER) {
ddd1ea56 2406 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
1da177e4
LT
2407 if (status)
2408 goto out;
2409 }
2410 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
ddd1ea56 2411 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
1da177e4
LT
2412 if (status)
2413 goto out;
2414 }
2415 if (bmval1 & FATTR4_WORD1_RAWDEV) {
ddd1ea56
BF
2416 p = xdr_reserve_space(xdr, 8);
2417 if (!p)
1da177e4 2418 goto out_resource;
c373b0a4
BF
2419 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
2420 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
1da177e4
LT
2421 }
2422 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
ddd1ea56
BF
2423 p = xdr_reserve_space(xdr, 8);
2424 if (!p)
1da177e4
LT
2425 goto out_resource;
2426 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
b64c7f3b 2427 p = xdr_encode_hyper(p, dummy64);
1da177e4
LT
2428 }
2429 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
ddd1ea56
BF
2430 p = xdr_reserve_space(xdr, 8);
2431 if (!p)
1da177e4
LT
2432 goto out_resource;
2433 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
b64c7f3b 2434 p = xdr_encode_hyper(p, dummy64);
1da177e4
LT
2435 }
2436 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
ddd1ea56
BF
2437 p = xdr_reserve_space(xdr, 8);
2438 if (!p)
1da177e4
LT
2439 goto out_resource;
2440 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
b64c7f3b 2441 p = xdr_encode_hyper(p, dummy64);
1da177e4
LT
2442 }
2443 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
ddd1ea56
BF
2444 p = xdr_reserve_space(xdr, 8);
2445 if (!p)
1da177e4
LT
2446 goto out_resource;
2447 dummy64 = (u64)stat.blocks << 9;
b64c7f3b 2448 p = xdr_encode_hyper(p, dummy64);
1da177e4
LT
2449 }
2450 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
ddd1ea56
BF
2451 p = xdr_reserve_space(xdr, 12);
2452 if (!p)
1da177e4 2453 goto out_resource;
b64c7f3b 2454 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
c373b0a4 2455 *p++ = cpu_to_be32(stat.atime.tv_nsec);
1da177e4
LT
2456 }
2457 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
ddd1ea56
BF
2458 p = xdr_reserve_space(xdr, 12);
2459 if (!p)
1da177e4 2460 goto out_resource;
c373b0a4
BF
2461 *p++ = cpu_to_be32(0);
2462 *p++ = cpu_to_be32(1);
2463 *p++ = cpu_to_be32(0);
1da177e4
LT
2464 }
2465 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
ddd1ea56
BF
2466 p = xdr_reserve_space(xdr, 12);
2467 if (!p)
1da177e4 2468 goto out_resource;
b64c7f3b 2469 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
c373b0a4 2470 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
1da177e4
LT
2471 }
2472 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
ddd1ea56
BF
2473 p = xdr_reserve_space(xdr, 12);
2474 if (!p)
1da177e4 2475 goto out_resource;
b64c7f3b 2476 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
c373b0a4 2477 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
1da177e4
LT
2478 }
2479 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
ddd1ea56
BF
2480 p = xdr_reserve_space(xdr, 8);
2481 if (!p)
1da177e4 2482 goto out_resource;
406a7ea9
FF
2483 /*
2484 * Get parent's attributes if not ignoring crossmount
2485 * and this is the root of a cross-mounted filesystem.
2486 */
2487 if (ignore_crossmnt == 0 &&
ae7095a7
BF
2488 dentry == exp->ex_path.mnt->mnt_root)
2489 get_parent_attributes(exp, &stat);
b64c7f3b 2490 p = xdr_encode_hyper(p, stat.ino);
1da177e4 2491 }
18032ca0 2492 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
ddd1ea56
BF
2493 status = nfsd4_encode_security_label(xdr, rqstp, context,
2494 contextlen);
18032ca0
DQ
2495 if (status)
2496 goto out;
2497 }
8c18f205 2498 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
ddd1ea56
BF
2499 p = xdr_reserve_space(xdr, 16);
2500 if (!p)
de3997a7 2501 goto out_resource;
c373b0a4
BF
2502 *p++ = cpu_to_be32(3);
2503 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0);
2504 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1);
2505 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2);
8c18f205 2506 }
7e705706 2507
082d4bd7
BF
2508 attrlen = htonl(xdr->buf->len - attrlen_offset - 4);
2509 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4);
1da177e4
LT
2510 status = nfs_ok;
2511
2512out:
ba4e55bb 2513#ifdef CONFIG_NFSD_V4_SECURITY_LABEL
18032ca0
DQ
2514 if (context)
2515 security_release_secctx(context, contextlen);
ba4e55bb 2516#endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
28e05dd8 2517 kfree(acl);
18df11d0 2518 if (tempfh) {
d50e6136 2519 fh_put(tempfh);
18df11d0
YZ
2520 kfree(tempfh);
2521 }
1fcea5b2
BF
2522 if (status)
2523 xdr_truncate_encode(xdr, starting_len);
1da177e4
LT
2524 return status;
2525out_nfserr:
b8dd7b9a 2526 status = nfserrno(err);
1da177e4
LT
2527 goto out;
2528out_resource:
1da177e4
LT
2529 status = nfserr_resource;
2530 goto out;
1da177e4
LT
2531}
2532
2825a7f9
BF
2533static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
2534 struct xdr_buf *buf, __be32 *p, int bytes)
2535{
2536 xdr->scratch.iov_len = 0;
2537 memset(buf, 0, sizeof(struct xdr_buf));
2538 buf->head[0].iov_base = p;
2539 buf->head[0].iov_len = 0;
2540 buf->len = 0;
2541 xdr->buf = buf;
2542 xdr->iov = buf->head;
2543 xdr->p = p;
2544 xdr->end = (void *)p + bytes;
2545 buf->buflen = bytes;
2546}
2547
d5184658
BF
2548__be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
2549 struct svc_fh *fhp, struct svc_export *exp,
2550 struct dentry *dentry, u32 *bmval,
2551 struct svc_rqst *rqstp, int ignore_crossmnt)
2552{
2825a7f9 2553 struct xdr_buf dummy;
d5184658
BF
2554 struct xdr_stream xdr;
2555 __be32 ret;
2556
2825a7f9 2557 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
d5184658
BF
2558 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
2559 ignore_crossmnt);
2560 *p = xdr.p;
2561 return ret;
2562}
2563
c0ce6ec8
BF
2564static inline int attributes_need_mount(u32 *bmval)
2565{
2566 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
2567 return 1;
2568 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
2569 return 1;
2570 return 0;
2571}
2572
b37ad28b 2573static __be32
561f0ed4
BF
2574nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
2575 const char *name, int namlen)
1da177e4
LT
2576{
2577 struct svc_export *exp = cd->rd_fhp->fh_export;
2578 struct dentry *dentry;
b37ad28b 2579 __be32 nfserr;
406a7ea9 2580 int ignore_crossmnt = 0;
1da177e4
LT
2581
2582 dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen);
2583 if (IS_ERR(dentry))
2584 return nfserrno(PTR_ERR(dentry));
b2c0cea6
BF
2585 if (!dentry->d_inode) {
2586 /*
2587 * nfsd_buffered_readdir drops the i_mutex between
2588 * readdir and calling this callback, leaving a window
2589 * where this directory entry could have gone away.
2590 */
2591 dput(dentry);
2592 return nfserr_noent;
2593 }
1da177e4
LT
2594
2595 exp_get(exp);
406a7ea9
FF
2596 /*
2597 * In the case of a mountpoint, the client may be asking for
2598 * attributes that are only properties of the underlying filesystem
2599 * as opposed to the cross-mounted file system. In such a case,
2600 * we will not follow the cross mount and will fill the attribtutes
2601 * directly from the mountpoint dentry.
2602 */
3227fa41 2603 if (nfsd_mountpoint(dentry, exp)) {
021d3a72
BF
2604 int err;
2605
3227fa41
BF
2606 if (!(exp->ex_flags & NFSEXP_V4ROOT)
2607 && !attributes_need_mount(cd->rd_bmval)) {
2608 ignore_crossmnt = 1;
2609 goto out_encode;
2610 }
dcb488a3
AA
2611 /*
2612 * Why the heck aren't we just using nfsd_lookup??
2613 * Different "."/".." handling? Something else?
2614 * At least, add a comment here to explain....
2615 */
021d3a72
BF
2616 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
2617 if (err) {
2618 nfserr = nfserrno(err);
1da177e4
LT
2619 goto out_put;
2620 }
dcb488a3
AA
2621 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
2622 if (nfserr)
2623 goto out_put;
1da177e4
LT
2624
2625 }
3227fa41 2626out_encode:
561f0ed4 2627 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
406a7ea9 2628 cd->rd_rqstp, ignore_crossmnt);
1da177e4
LT
2629out_put:
2630 dput(dentry);
2631 exp_put(exp);
2632 return nfserr;
2633}
2634
2ebbc012 2635static __be32 *
561f0ed4 2636nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
1da177e4 2637{
561f0ed4
BF
2638 __be32 *p;
2639
c3a45617 2640 p = xdr_reserve_space(xdr, 20);
561f0ed4 2641 if (!p)
1da177e4
LT
2642 return NULL;
2643 *p++ = htonl(2);
2644 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
2645 *p++ = htonl(0); /* bmval1 */
2646
87915c64 2647 *p++ = htonl(4); /* attribute length */
1da177e4 2648 *p++ = nfserr; /* no htonl */
1da177e4
LT
2649 return p;
2650}
2651
2652static int
a0ad13ef
N
2653nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
2654 loff_t offset, u64 ino, unsigned int d_type)
1da177e4 2655{
a0ad13ef 2656 struct readdir_cd *ccd = ccdv;
1da177e4 2657 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
561f0ed4
BF
2658 struct xdr_stream *xdr = cd->xdr;
2659 int start_offset = xdr->buf->len;
2660 int cookie_offset;
2661 int entry_bytes;
b37ad28b 2662 __be32 nfserr = nfserr_toosmall;
561f0ed4
BF
2663 __be64 wire_offset;
2664 __be32 *p;
1da177e4
LT
2665
2666 /* In nfsv4, "." and ".." never make it onto the wire.. */
2667 if (name && isdotent(name, namlen)) {
2668 cd->common.err = nfs_ok;
2669 return 0;
2670 }
2671
561f0ed4
BF
2672 if (cd->cookie_offset) {
2673 wire_offset = cpu_to_be64(offset);
2674 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
2675 &wire_offset, 8);
2676 }
1da177e4 2677
561f0ed4
BF
2678 p = xdr_reserve_space(xdr, 4);
2679 if (!p)
1da177e4 2680 goto fail;
1da177e4 2681 *p++ = xdr_one; /* mark entry present */
561f0ed4
BF
2682 cookie_offset = xdr->buf->len;
2683 p = xdr_reserve_space(xdr, 3*4 + namlen);
2684 if (!p)
2685 goto fail;
1da177e4
LT
2686 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */
2687 p = xdr_encode_array(p, name, namlen); /* name length & name */
2688
561f0ed4 2689 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
1da177e4
LT
2690 switch (nfserr) {
2691 case nfs_ok:
1da177e4
LT
2692 break;
2693 case nfserr_resource:
2694 nfserr = nfserr_toosmall;
2695 goto fail;
b2c0cea6 2696 case nfserr_noent:
f41c5ad2 2697 xdr_truncate_encode(xdr, start_offset);
b2c0cea6 2698 goto skip_entry;
1da177e4
LT
2699 default:
2700 /*
2701 * If the client requested the RDATTR_ERROR attribute,
2702 * we stuff the error code into this attribute
2703 * and continue. If this attribute was not requested,
2704 * then in accordance with the spec, we fail the
2705 * entire READDIR operation(!)
2706 */
2707 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
2708 goto fail;
561f0ed4 2709 p = nfsd4_encode_rdattr_error(xdr, nfserr);
34081efc
FI
2710 if (p == NULL) {
2711 nfserr = nfserr_toosmall;
1da177e4 2712 goto fail;
34081efc 2713 }
1da177e4 2714 }
561f0ed4
BF
2715 nfserr = nfserr_toosmall;
2716 entry_bytes = xdr->buf->len - start_offset;
2717 if (entry_bytes > cd->rd_maxcount)
2718 goto fail;
2719 cd->rd_maxcount -= entry_bytes;
3b299709
BF
2720 if (!cd->rd_dircount)
2721 goto fail;
2722 cd->rd_dircount--;
561f0ed4 2723 cd->cookie_offset = cookie_offset;
b2c0cea6 2724skip_entry:
1da177e4
LT
2725 cd->common.err = nfs_ok;
2726 return 0;
2727fail:
561f0ed4 2728 xdr_truncate_encode(xdr, start_offset);
1da177e4
LT
2729 cd->common.err = nfserr;
2730 return -EINVAL;
2731}
2732
d0a381dd
BF
2733static __be32
2734nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
e2f282b9 2735{
bc749ca4 2736 __be32 *p;
e2f282b9 2737
d0a381dd
BF
2738 p = xdr_reserve_space(xdr, sizeof(stateid_t));
2739 if (!p)
2740 return nfserr_resource;
c373b0a4 2741 *p++ = cpu_to_be32(sid->si_generation);
0c0c267b
BF
2742 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
2743 sizeof(stateid_opaque_t));
d0a381dd 2744 return 0;
e2f282b9
BH
2745}
2746
695e12f8 2747static __be32
b37ad28b 2748nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
1da177e4 2749{
d0a381dd 2750 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 2751 __be32 *p;
1da177e4
LT
2752
2753 if (!nfserr) {
d0a381dd
BF
2754 p = xdr_reserve_space(xdr, 8);
2755 if (!p)
2756 return nfserr_resource;
c373b0a4
BF
2757 *p++ = cpu_to_be32(access->ac_supported);
2758 *p++ = cpu_to_be32(access->ac_resp_access);
1da177e4 2759 }
695e12f8 2760 return nfserr;
1da177e4
LT
2761}
2762
1d1bc8f2
BF
2763static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
2764{
d0a381dd 2765 struct xdr_stream *xdr = &resp->xdr;
1d1bc8f2
BF
2766 __be32 *p;
2767
2768 if (!nfserr) {
d0a381dd
BF
2769 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
2770 if (!p)
2771 return nfserr_resource;
0c0c267b
BF
2772 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
2773 NFS4_MAX_SESSIONID_LEN);
c373b0a4 2774 *p++ = cpu_to_be32(bcts->dir);
6e67b5d1 2775 /* Sorry, we do not yet support RDMA over 4.1: */
c373b0a4 2776 *p++ = cpu_to_be32(0);
1d1bc8f2
BF
2777 }
2778 return nfserr;
2779}
2780
695e12f8 2781static __be32
b37ad28b 2782nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
1da177e4 2783{
d0a381dd
BF
2784 struct xdr_stream *xdr = &resp->xdr;
2785
e2f282b9 2786 if (!nfserr)
d0a381dd 2787 nfserr = nfsd4_encode_stateid(xdr, &close->cl_stateid);
e2f282b9 2788
695e12f8 2789 return nfserr;
1da177e4
LT
2790}
2791
2792
695e12f8 2793static __be32
b37ad28b 2794nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
1da177e4 2795{
d0a381dd 2796 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 2797 __be32 *p;
1da177e4
LT
2798
2799 if (!nfserr) {
d0a381dd
BF
2800 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
2801 if (!p)
2802 return nfserr_resource;
0c0c267b
BF
2803 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
2804 NFS4_VERIFIER_SIZE);
1da177e4 2805 }
695e12f8 2806 return nfserr;
1da177e4
LT
2807}
2808
695e12f8 2809static __be32
b37ad28b 2810nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
1da177e4 2811{
d0a381dd 2812 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 2813 __be32 *p;
1da177e4
LT
2814
2815 if (!nfserr) {
d0a381dd
BF
2816 p = xdr_reserve_space(xdr, 32);
2817 if (!p)
2818 return nfserr_resource;
d05d5744 2819 p = encode_cinfo(p, &create->cr_cinfo);
c373b0a4
BF
2820 *p++ = cpu_to_be32(2);
2821 *p++ = cpu_to_be32(create->cr_bmval[0]);
2822 *p++ = cpu_to_be32(create->cr_bmval[1]);
1da177e4 2823 }
695e12f8 2824 return nfserr;
1da177e4
LT
2825}
2826
b37ad28b
AV
2827static __be32
2828nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
1da177e4
LT
2829{
2830 struct svc_fh *fhp = getattr->ga_fhp;
d5184658 2831 struct xdr_stream *xdr = &resp->xdr;
1da177e4
LT
2832
2833 if (nfserr)
2834 return nfserr;
2835
d5184658
BF
2836 nfserr = nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
2837 getattr->ga_bmval,
406a7ea9 2838 resp->rqstp, 0);
1da177e4
LT
2839 return nfserr;
2840}
2841
695e12f8
BH
2842static __be32
2843nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
1da177e4 2844{
d0a381dd 2845 struct xdr_stream *xdr = &resp->xdr;
695e12f8 2846 struct svc_fh *fhp = *fhpp;
1da177e4 2847 unsigned int len;
bc749ca4 2848 __be32 *p;
1da177e4
LT
2849
2850 if (!nfserr) {
2851 len = fhp->fh_handle.fh_size;
d0a381dd
BF
2852 p = xdr_reserve_space(xdr, len + 4);
2853 if (!p)
2854 return nfserr_resource;
0c0c267b 2855 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len);
1da177e4 2856 }
695e12f8 2857 return nfserr;
1da177e4
LT
2858}
2859
2860/*
2861* Including all fields other than the name, a LOCK4denied structure requires
2862* 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
2863*/
d0a381dd
BF
2864static __be32
2865nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
1da177e4 2866{
7c13f344 2867 struct xdr_netobj *conf = &ld->ld_owner;
bc749ca4 2868 __be32 *p;
1da177e4 2869
8c7424cf 2870again:
d0a381dd 2871 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
8c7424cf
BF
2872 if (!p) {
2873 /*
2874 * Don't fail to return the result just because we can't
2875 * return the conflicting open:
2876 */
2877 if (conf->len) {
f98bac5a 2878 kfree(conf->data);
8c7424cf
BF
2879 conf->len = 0;
2880 conf->data = NULL;
2881 goto again;
2882 }
d0a381dd 2883 return nfserr_resource;
8c7424cf 2884 }
b64c7f3b
BF
2885 p = xdr_encode_hyper(p, ld->ld_start);
2886 p = xdr_encode_hyper(p, ld->ld_length);
c373b0a4 2887 *p++ = cpu_to_be32(ld->ld_type);
7c13f344 2888 if (conf->len) {
0c0c267b
BF
2889 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
2890 p = xdr_encode_opaque(p, conf->data, conf->len);
f98bac5a 2891 kfree(conf->data);
1da177e4 2892 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
b64c7f3b 2893 p = xdr_encode_hyper(p, (u64)0); /* clientid */
c373b0a4 2894 *p++ = cpu_to_be32(0); /* length of owner name */
1da177e4 2895 }
d0a381dd 2896 return nfserr_denied;
1da177e4
LT
2897}
2898
695e12f8 2899static __be32
b37ad28b 2900nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
1da177e4 2901{
d0a381dd
BF
2902 struct xdr_stream *xdr = &resp->xdr;
2903
e2f282b9 2904 if (!nfserr)
d0a381dd 2905 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
e2f282b9 2906 else if (nfserr == nfserr_denied)
d0a381dd 2907 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
f98bac5a 2908
695e12f8 2909 return nfserr;
1da177e4
LT
2910}
2911
695e12f8 2912static __be32
b37ad28b 2913nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
1da177e4 2914{
d0a381dd
BF
2915 struct xdr_stream *xdr = &resp->xdr;
2916
1da177e4 2917 if (nfserr == nfserr_denied)
d0a381dd 2918 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
695e12f8 2919 return nfserr;
1da177e4
LT
2920}
2921
695e12f8 2922static __be32
b37ad28b 2923nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
1da177e4 2924{
d0a381dd
BF
2925 struct xdr_stream *xdr = &resp->xdr;
2926
e2f282b9 2927 if (!nfserr)
d0a381dd 2928 nfserr = nfsd4_encode_stateid(xdr, &locku->lu_stateid);
e2f282b9 2929
695e12f8 2930 return nfserr;
1da177e4
LT
2931}
2932
2933
695e12f8 2934static __be32
b37ad28b 2935nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
1da177e4 2936{
d0a381dd 2937 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 2938 __be32 *p;
1da177e4
LT
2939
2940 if (!nfserr) {
d0a381dd
BF
2941 p = xdr_reserve_space(xdr, 20);
2942 if (!p)
2943 return nfserr_resource;
d05d5744 2944 p = encode_cinfo(p, &link->li_cinfo);
1da177e4 2945 }
695e12f8 2946 return nfserr;
1da177e4
LT
2947}
2948
2949
695e12f8 2950static __be32
b37ad28b 2951nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
1da177e4 2952{
d0a381dd 2953 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 2954 __be32 *p;
1da177e4
LT
2955
2956 if (nfserr)
2957 goto out;
2958
d0a381dd
BF
2959 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
2960 if (nfserr)
2961 goto out;
2962 p = xdr_reserve_space(xdr, 40);
2963 if (!p)
2964 return nfserr_resource;
d05d5744 2965 p = encode_cinfo(p, &open->op_cinfo);
c373b0a4
BF
2966 *p++ = cpu_to_be32(open->op_rflags);
2967 *p++ = cpu_to_be32(2);
2968 *p++ = cpu_to_be32(open->op_bmval[0]);
2969 *p++ = cpu_to_be32(open->op_bmval[1]);
2970 *p++ = cpu_to_be32(open->op_delegate_type);
1da177e4
LT
2971
2972 switch (open->op_delegate_type) {
2973 case NFS4_OPEN_DELEGATE_NONE:
2974 break;
2975 case NFS4_OPEN_DELEGATE_READ:
d0a381dd
BF
2976 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
2977 if (nfserr)
2978 return nfserr;
2979 p = xdr_reserve_space(xdr, 20);
2980 if (!p)
2981 return nfserr_resource;
c373b0a4 2982 *p++ = cpu_to_be32(open->op_recall);
1da177e4
LT
2983
2984 /*
2985 * TODO: ACE's in delegations
2986 */
c373b0a4
BF
2987 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
2988 *p++ = cpu_to_be32(0);
2989 *p++ = cpu_to_be32(0);
2990 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
1da177e4
LT
2991 break;
2992 case NFS4_OPEN_DELEGATE_WRITE:
d0a381dd
BF
2993 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
2994 if (nfserr)
2995 return nfserr;
2996 p = xdr_reserve_space(xdr, 32);
2997 if (!p)
2998 return nfserr_resource;
c373b0a4 2999 *p++ = cpu_to_be32(0);
1da177e4
LT
3000
3001 /*
3002 * TODO: space_limit's in delegations
3003 */
c373b0a4
BF
3004 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3005 *p++ = cpu_to_be32(~(u32)0);
3006 *p++ = cpu_to_be32(~(u32)0);
1da177e4
LT
3007
3008 /*
3009 * TODO: ACE's in delegations
3010 */
c373b0a4
BF
3011 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3012 *p++ = cpu_to_be32(0);
3013 *p++ = cpu_to_be32(0);
3014 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
1da177e4 3015 break;
d24433cd
BH
3016 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3017 switch (open->op_why_no_deleg) {
3018 case WND4_CONTENTION:
3019 case WND4_RESOURCE:
d0a381dd
BF
3020 p = xdr_reserve_space(xdr, 8);
3021 if (!p)
3022 return nfserr_resource;
c373b0a4
BF
3023 *p++ = cpu_to_be32(open->op_why_no_deleg);
3024 /* deleg signaling not supported yet: */
3025 *p++ = cpu_to_be32(0);
d24433cd
BH
3026 break;
3027 default:
d0a381dd
BF
3028 p = xdr_reserve_space(xdr, 4);
3029 if (!p)
3030 return nfserr_resource;
c373b0a4 3031 *p++ = cpu_to_be32(open->op_why_no_deleg);
d24433cd 3032 }
d24433cd 3033 break;
1da177e4
LT
3034 default:
3035 BUG();
3036 }
3037 /* XXX save filehandle here */
3038out:
695e12f8 3039 return nfserr;
1da177e4
LT
3040}
3041
695e12f8 3042static __be32
b37ad28b 3043nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
1da177e4 3044{
d0a381dd
BF
3045 struct xdr_stream *xdr = &resp->xdr;
3046
e2f282b9 3047 if (!nfserr)
d0a381dd 3048 nfserr = nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
1da177e4 3049
695e12f8 3050 return nfserr;
1da177e4
LT
3051}
3052
695e12f8 3053static __be32
b37ad28b 3054nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
1da177e4 3055{
d0a381dd
BF
3056 struct xdr_stream *xdr = &resp->xdr;
3057
e2f282b9 3058 if (!nfserr)
d0a381dd 3059 nfserr = nfsd4_encode_stateid(xdr, &od->od_stateid);
1da177e4 3060
695e12f8 3061 return nfserr;
1da177e4
LT
3062}
3063
dc97618d
BF
3064static __be32 nfsd4_encode_splice_read(
3065 struct nfsd4_compoundres *resp,
3066 struct nfsd4_read *read,
3067 struct file *file, unsigned long maxcount)
1da177e4 3068{
ddd1ea56 3069 struct xdr_stream *xdr = &resp->xdr;
34a78b48 3070 struct xdr_buf *buf = xdr->buf;
dc97618d 3071 u32 eof;
30596768 3072 int space_left;
dc97618d 3073 __be32 nfserr;
fec25fa4 3074 __be32 *p = xdr->p - 2;
1da177e4 3075
d5d5c304
KM
3076 /* Make sure there will be room for padding if needed */
3077 if (xdr->end - xdr->p < 1)
d0a381dd 3078 return nfserr_resource;
dc97618d
BF
3079
3080 nfserr = nfsd_splice_read(read->rd_rqstp, file,
3081 read->rd_offset, &maxcount);
3082 if (nfserr) {
3083 /*
3084 * nfsd_splice_actor may have already messed with the
3085 * page length; reset it so as not to confuse
3086 * xdr_truncate_encode:
3087 */
34a78b48 3088 buf->page_len = 0;
dc97618d 3089 return nfserr;
b0e35fda 3090 }
1da177e4 3091
dc97618d
BF
3092 eof = (read->rd_offset + maxcount >=
3093 read->rd_fhp->fh_dentry->d_inode->i_size);
4e21ac4b 3094
fec25fa4
BF
3095 *(p++) = htonl(eof);
3096 *(p++) = htonl(maxcount);
dc97618d 3097
34a78b48
BF
3098 buf->page_len = maxcount;
3099 buf->len += maxcount;
dc97618d 3100 xdr->page_ptr += (maxcount + PAGE_SIZE - 1) / PAGE_SIZE;
dc97618d
BF
3101
3102 /* Use rest of head for padding and remaining ops: */
34a78b48
BF
3103 buf->tail[0].iov_base = xdr->p;
3104 buf->tail[0].iov_len = 0;
fec25fa4 3105 xdr->iov = buf->tail;
dc97618d 3106 if (maxcount&3) {
fec25fa4
BF
3107 int pad = 4 - (maxcount&3);
3108
3109 *(xdr->p++) = 0;
3110
34a78b48 3111 buf->tail[0].iov_base += maxcount&3;
fec25fa4
BF
3112 buf->tail[0].iov_len = pad;
3113 buf->len += pad;
b0e35fda 3114 }
2825a7f9 3115
dc97618d 3116 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
34a78b48
BF
3117 buf->buflen - buf->len);
3118 buf->buflen = buf->len + space_left;
dc97618d
BF
3119 xdr->end = (__be32 *)((void *)xdr->end + space_left);
3120
3121 return 0;
3122}
3123
3124static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
3125 struct nfsd4_read *read,
3126 struct file *file, unsigned long maxcount)
3127{
3128 struct xdr_stream *xdr = &resp->xdr;
3129 u32 eof;
3130 int v;
dc97618d 3131 int starting_len = xdr->buf->len - 8;
dc97618d 3132 long len;
b0420980 3133 int thislen;
dc97618d
BF
3134 __be32 nfserr;
3135 __be32 tmp;
3136 __be32 *p;
b0420980
BF
3137 u32 zzz = 0;
3138 int pad;
1da177e4
LT
3139
3140 len = maxcount;
3141 v = 0;
6ff9897d 3142
1055414f 3143 thislen = min_t(long, len, ((void *)xdr->end - (void *)xdr->p));
b0420980
BF
3144 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3145 WARN_ON_ONCE(!p);
3146 resp->rqstp->rq_vec[v].iov_base = p;
3147 resp->rqstp->rq_vec[v].iov_len = thislen;
3148 v++;
3149 len -= thislen;
3150
3151 while (len) {
6ff9897d 3152 thislen = min_t(long, len, PAGE_SIZE);
b0420980
BF
3153 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3154 WARN_ON_ONCE(!p);
3155 resp->rqstp->rq_vec[v].iov_base = p;
6ff9897d 3156 resp->rqstp->rq_vec[v].iov_len = thislen;
1da177e4 3157 v++;
6ff9897d 3158 len -= thislen;
1da177e4
LT
3159 }
3160 read->rd_vlen = v;
3161
dc97618d
BF
3162 nfserr = nfsd_readv(file, read->rd_offset, resp->rqstp->rq_vec,
3163 read->rd_vlen, &maxcount);
3164 if (nfserr)
1da177e4 3165 return nfserr;
b0420980 3166 xdr_truncate_encode(xdr, starting_len + 8 + ((maxcount+3)&~3));
dc97618d 3167
44524359
N
3168 eof = (read->rd_offset + maxcount >=
3169 read->rd_fhp->fh_dentry->d_inode->i_size);
1da177e4 3170
dc97618d
BF
3171 tmp = htonl(eof);
3172 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4);
3173 tmp = htonl(maxcount);
3174 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
3175
b0420980
BF
3176 pad = (maxcount&3) ? 4 - (maxcount&3) : 0;
3177 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount,
3178 &zzz, pad);
1da177e4 3179 return 0;
dc97618d
BF
3180
3181}
3182
3183static __be32
3184nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
3185 struct nfsd4_read *read)
3186{
3187 unsigned long maxcount;
3188 struct xdr_stream *xdr = &resp->xdr;
3189 struct file *file = read->rd_filp;
3190 int starting_len = xdr->buf->len;
3191 struct raparms *ra;
3192 __be32 *p;
3193 __be32 err;
3194
3195 if (nfserr)
3196 return nfserr;
3197
3198 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
3199 if (!p) {
3200 WARN_ON_ONCE(resp->rqstp->rq_splice_ok);
3201 return nfserr_resource;
3202 }
b0420980
BF
3203 if (resp->xdr.buf->page_len && resp->rqstp->rq_splice_ok) {
3204 WARN_ON_ONCE(1);
dc97618d
BF
3205 return nfserr_resource;
3206 }
dc97618d
BF
3207 xdr_commit_encode(xdr);
3208
3209 maxcount = svc_max_payload(resp->rqstp);
3c7aa15d
KM
3210 maxcount = min_t(unsigned long, maxcount, (xdr->buf->buflen - xdr->buf->len));
3211 maxcount = min_t(unsigned long, maxcount, read->rd_length);
dc97618d
BF
3212
3213 if (!read->rd_filp) {
3214 err = nfsd_get_tmp_read_open(resp->rqstp, read->rd_fhp,
3215 &file, &ra);
3216 if (err)
3217 goto err_truncate;
3218 }
3219
3220 if (file->f_op->splice_read && resp->rqstp->rq_splice_ok)
3221 err = nfsd4_encode_splice_read(resp, read, file, maxcount);
3222 else
3223 err = nfsd4_encode_readv(resp, read, file, maxcount);
3224
3225 if (!read->rd_filp)
3226 nfsd_put_tmp_read_open(file, ra);
3227
3228err_truncate:
3229 if (err)
3230 xdr_truncate_encode(xdr, starting_len);
3231 return err;
1da177e4
LT
3232}
3233
b37ad28b
AV
3234static __be32
3235nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
1da177e4
LT
3236{
3237 int maxcount;
476a7b1f
BF
3238 __be32 wire_count;
3239 int zero = 0;
ddd1ea56 3240 struct xdr_stream *xdr = &resp->xdr;
1fcea5b2 3241 int length_offset = xdr->buf->len;
bc749ca4 3242 __be32 *p;
1da177e4
LT
3243
3244 if (nfserr)
3245 return nfserr;
2825a7f9
BF
3246
3247 p = xdr_reserve_space(xdr, 4);
3248 if (!p)
3249 return nfserr_resource;
1da177e4 3250 maxcount = PAGE_SIZE;
d0a381dd 3251
476a7b1f
BF
3252 p = xdr_reserve_space(xdr, maxcount);
3253 if (!p)
4e21ac4b 3254 return nfserr_resource;
1da177e4
LT
3255 /*
3256 * XXX: By default, the ->readlink() VFS op will truncate symlinks
3257 * if they would overflow the buffer. Is this kosher in NFSv4? If
3258 * not, one easy fix is: if ->readlink() precisely fills the buffer,
3259 * assume that truncation occurred, and return NFS4ERR_RESOURCE.
3260 */
476a7b1f
BF
3261 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
3262 (char *)p, &maxcount);
1da177e4 3263 if (nfserr == nfserr_isdir)
d3f627c8
BF
3264 nfserr = nfserr_inval;
3265 if (nfserr) {
1fcea5b2 3266 xdr_truncate_encode(xdr, length_offset);
1da177e4 3267 return nfserr;
d3f627c8 3268 }
1da177e4 3269
476a7b1f
BF
3270 wire_count = htonl(maxcount);
3271 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4);
69bbd9c7 3272 xdr_truncate_encode(xdr, length_offset + 4 + ALIGN(maxcount, 4));
476a7b1f
BF
3273 if (maxcount & 3)
3274 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount,
3275 &zero, 4 - (maxcount&3));
1da177e4
LT
3276 return 0;
3277}
3278
b37ad28b
AV
3279static __be32
3280nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
1da177e4
LT
3281{
3282 int maxcount;
561f0ed4 3283 int bytes_left;
1da177e4 3284 loff_t offset;
561f0ed4 3285 __be64 wire_offset;
ddd1ea56 3286 struct xdr_stream *xdr = &resp->xdr;
1fcea5b2 3287 int starting_len = xdr->buf->len;
bc749ca4 3288 __be32 *p;
1da177e4
LT
3289
3290 if (nfserr)
3291 return nfserr;
1da177e4 3292
d0a381dd
BF
3293 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3294 if (!p)
3295 return nfserr_resource;
1da177e4
LT
3296
3297 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
c373b0a4
BF
3298 *p++ = cpu_to_be32(0);
3299 *p++ = cpu_to_be32(0);
4aea24b2
BF
3300 resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p)
3301 - (char *)resp->xdr.buf->head[0].iov_base;
1da177e4
LT
3302
3303 /*
561f0ed4
BF
3304 * Number of bytes left for directory entries allowing for the
3305 * final 8 bytes of the readdir and a following failed op:
3306 */
3307 bytes_left = xdr->buf->buflen - xdr->buf->len
3308 - COMPOUND_ERR_SLACK_SPACE - 8;
3309 if (bytes_left < 0) {
3310 nfserr = nfserr_resource;
3311 goto err_no_verf;
3312 }
3313 maxcount = min_t(u32, readdir->rd_maxcount, INT_MAX);
3314 /*
3315 * Note the rfc defines rd_maxcount as the size of the
3316 * READDIR4resok structure, which includes the verifier above
3317 * and the 8 bytes encoded at the end of this function:
1da177e4 3318 */
561f0ed4
BF
3319 if (maxcount < 16) {
3320 nfserr = nfserr_toosmall;
1da177e4
LT
3321 goto err_no_verf;
3322 }
561f0ed4 3323 maxcount = min_t(int, maxcount-16, bytes_left);
1da177e4 3324
561f0ed4
BF
3325 readdir->xdr = xdr;
3326 readdir->rd_maxcount = maxcount;
1da177e4 3327 readdir->common.err = 0;
561f0ed4 3328 readdir->cookie_offset = 0;
1da177e4
LT
3329
3330 offset = readdir->rd_cookie;
3331 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
3332 &offset,
3333 &readdir->common, nfsd4_encode_dirent);
3334 if (nfserr == nfs_ok &&
3335 readdir->common.err == nfserr_toosmall &&
561f0ed4
BF
3336 xdr->buf->len == starting_len + 8) {
3337 /* nothing encoded; which limit did we hit?: */
3338 if (maxcount - 16 < bytes_left)
3339 /* It was the fault of rd_maxcount: */
3340 nfserr = nfserr_toosmall;
3341 else
3342 /* We ran out of buffer space: */
3343 nfserr = nfserr_resource;
3344 }
1da177e4
LT
3345 if (nfserr)
3346 goto err_no_verf;
3347
561f0ed4
BF
3348 if (readdir->cookie_offset) {
3349 wire_offset = cpu_to_be64(offset);
3350 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
3351 &wire_offset, 8);
3352 }
1da177e4 3353
561f0ed4
BF
3354 p = xdr_reserve_space(xdr, 8);
3355 if (!p) {
3356 WARN_ON_ONCE(1);
3357 goto err_no_verf;
3358 }
1da177e4
LT
3359 *p++ = 0; /* no more entries */
3360 *p++ = htonl(readdir->common.err == nfserr_eof);
1da177e4
LT
3361
3362 return 0;
3363err_no_verf:
1fcea5b2 3364 xdr_truncate_encode(xdr, starting_len);
1da177e4
LT
3365 return nfserr;
3366}
3367
695e12f8 3368static __be32
b37ad28b 3369nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
1da177e4 3370{
d0a381dd 3371 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3372 __be32 *p;
1da177e4
LT
3373
3374 if (!nfserr) {
d0a381dd
BF
3375 p = xdr_reserve_space(xdr, 20);
3376 if (!p)
3377 return nfserr_resource;
d05d5744 3378 p = encode_cinfo(p, &remove->rm_cinfo);
1da177e4 3379 }
695e12f8 3380 return nfserr;
1da177e4
LT
3381}
3382
695e12f8 3383static __be32
b37ad28b 3384nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
1da177e4 3385{
d0a381dd 3386 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3387 __be32 *p;
1da177e4
LT
3388
3389 if (!nfserr) {
d0a381dd
BF
3390 p = xdr_reserve_space(xdr, 40);
3391 if (!p)
3392 return nfserr_resource;
d05d5744
BF
3393 p = encode_cinfo(p, &rename->rn_sinfo);
3394 p = encode_cinfo(p, &rename->rn_tinfo);
1da177e4 3395 }
695e12f8 3396 return nfserr;
1da177e4
LT
3397}
3398
695e12f8 3399static __be32
d0a381dd 3400nfsd4_do_encode_secinfo(struct xdr_stream *xdr,
a77c806f 3401 __be32 nfserr, struct svc_export *exp)
dcb488a3 3402{
676e4ebd 3403 u32 i, nflavs, supported;
4796f457
BF
3404 struct exp_flavor_info *flavs;
3405 struct exp_flavor_info def_flavs[2];
676e4ebd
CL
3406 __be32 *p, *flavorsp;
3407 static bool report = true;
dcb488a3
AA
3408
3409 if (nfserr)
3410 goto out;
d0a381dd 3411 nfserr = nfserr_resource;
4796f457
BF
3412 if (exp->ex_nflavors) {
3413 flavs = exp->ex_flavors;
3414 nflavs = exp->ex_nflavors;
3415 } else { /* Handling of some defaults in absence of real secinfo: */
3416 flavs = def_flavs;
3417 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
3418 nflavs = 2;
3419 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
3420 flavs[1].pseudoflavor = RPC_AUTH_NULL;
3421 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
3422 nflavs = 1;
3423 flavs[0].pseudoflavor
3424 = svcauth_gss_flavor(exp->ex_client);
3425 } else {
3426 nflavs = 1;
3427 flavs[0].pseudoflavor
3428 = exp->ex_client->flavour->flavour;
3429 }
3430 }
3431
676e4ebd 3432 supported = 0;
d0a381dd
BF
3433 p = xdr_reserve_space(xdr, 4);
3434 if (!p)
3435 goto out;
676e4ebd 3436 flavorsp = p++; /* to be backfilled later */
676e4ebd 3437
4796f457 3438 for (i = 0; i < nflavs; i++) {
676e4ebd 3439 rpc_authflavor_t pf = flavs[i].pseudoflavor;
a77c806f 3440 struct rpcsec_gss_info info;
dcb488a3 3441
676e4ebd
CL
3442 if (rpcauth_get_gssinfo(pf, &info) == 0) {
3443 supported++;
d0a381dd
BF
3444 p = xdr_reserve_space(xdr, 4 + 4 +
3445 XDR_LEN(info.oid.len) + 4 + 4);
3446 if (!p)
3447 goto out;
c373b0a4 3448 *p++ = cpu_to_be32(RPC_AUTH_GSS);
0c0c267b 3449 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
c373b0a4
BF
3450 *p++ = cpu_to_be32(info.qop);
3451 *p++ = cpu_to_be32(info.service);
676e4ebd
CL
3452 } else if (pf < RPC_AUTH_MAXFLAVOR) {
3453 supported++;
d0a381dd
BF
3454 p = xdr_reserve_space(xdr, 4);
3455 if (!p)
3456 goto out;
c373b0a4 3457 *p++ = cpu_to_be32(pf);
676e4ebd
CL
3458 } else {
3459 if (report)
3460 pr_warn("NFS: SECINFO: security flavor %u "
3461 "is not supported\n", pf);
dcb488a3
AA
3462 }
3463 }
a77c806f 3464
676e4ebd
CL
3465 if (nflavs != supported)
3466 report = false;
3467 *flavorsp = htonl(supported);
d0a381dd 3468 nfserr = 0;
dcb488a3
AA
3469out:
3470 if (exp)
3471 exp_put(exp);
695e12f8 3472 return nfserr;
dcb488a3
AA
3473}
3474
22b6dee8
MJ
3475static __be32
3476nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
3477 struct nfsd4_secinfo *secinfo)
3478{
d0a381dd
BF
3479 struct xdr_stream *xdr = &resp->xdr;
3480
3481 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->si_exp);
22b6dee8
MJ
3482}
3483
3484static __be32
3485nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
3486 struct nfsd4_secinfo_no_name *secinfo)
3487{
d0a381dd
BF
3488 struct xdr_stream *xdr = &resp->xdr;
3489
3490 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->sin_exp);
22b6dee8
MJ
3491}
3492
1da177e4
LT
3493/*
3494 * The SETATTR encode routine is special -- it always encodes a bitmap,
3495 * regardless of the error status.
3496 */
695e12f8 3497static __be32
b37ad28b 3498nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
1da177e4 3499{
d0a381dd 3500 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3501 __be32 *p;
1da177e4 3502
d0a381dd
BF
3503 p = xdr_reserve_space(xdr, 16);
3504 if (!p)
3505 return nfserr_resource;
1da177e4 3506 if (nfserr) {
c373b0a4
BF
3507 *p++ = cpu_to_be32(3);
3508 *p++ = cpu_to_be32(0);
3509 *p++ = cpu_to_be32(0);
3510 *p++ = cpu_to_be32(0);
1da177e4
LT
3511 }
3512 else {
c373b0a4
BF
3513 *p++ = cpu_to_be32(3);
3514 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
3515 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
3516 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
1da177e4 3517 }
695e12f8 3518 return nfserr;
1da177e4
LT
3519}
3520
695e12f8 3521static __be32
b37ad28b 3522nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
1da177e4 3523{
d0a381dd 3524 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3525 __be32 *p;
1da177e4
LT
3526
3527 if (!nfserr) {
d0a381dd
BF
3528 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
3529 if (!p)
3530 return nfserr_resource;
0c0c267b
BF
3531 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
3532 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
3533 NFS4_VERIFIER_SIZE);
1da177e4
LT
3534 }
3535 else if (nfserr == nfserr_clid_inuse) {
d0a381dd
BF
3536 p = xdr_reserve_space(xdr, 8);
3537 if (!p)
3538 return nfserr_resource;
c373b0a4
BF
3539 *p++ = cpu_to_be32(0);
3540 *p++ = cpu_to_be32(0);
1da177e4 3541 }
695e12f8 3542 return nfserr;
1da177e4
LT
3543}
3544
695e12f8 3545static __be32
b37ad28b 3546nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
1da177e4 3547{
d0a381dd 3548 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3549 __be32 *p;
1da177e4
LT
3550
3551 if (!nfserr) {
d0a381dd
BF
3552 p = xdr_reserve_space(xdr, 16);
3553 if (!p)
3554 return nfserr_resource;
c373b0a4
BF
3555 *p++ = cpu_to_be32(write->wr_bytes_written);
3556 *p++ = cpu_to_be32(write->wr_how_written);
0c0c267b
BF
3557 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
3558 NFS4_VERIFIER_SIZE);
1da177e4 3559 }
695e12f8 3560 return nfserr;
1da177e4
LT
3561}
3562
57266a6e
BF
3563static const u32 nfs4_minimal_spo_must_enforce[2] = {
3564 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
3565 1 << (OP_EXCHANGE_ID - 32) |
3566 1 << (OP_CREATE_SESSION - 32) |
3567 1 << (OP_DESTROY_SESSION - 32) |
3568 1 << (OP_DESTROY_CLIENTID - 32)
3569};
3570
2db134eb 3571static __be32
57b7b43b 3572nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
2db134eb
AA
3573 struct nfsd4_exchange_id *exid)
3574{
d0a381dd 3575 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3576 __be32 *p;
0733d213
AA
3577 char *major_id;
3578 char *server_scope;
3579 int major_id_sz;
3580 int server_scope_sz;
3581 uint64_t minor_id = 0;
3582
3583 if (nfserr)
3584 return nfserr;
3585
3586 major_id = utsname()->nodename;
3587 major_id_sz = strlen(major_id);
3588 server_scope = utsname()->nodename;
3589 server_scope_sz = strlen(server_scope);
3590
d0a381dd 3591 p = xdr_reserve_space(xdr,
0733d213
AA
3592 8 /* eir_clientid */ +
3593 4 /* eir_sequenceid */ +
3594 4 /* eir_flags */ +
a8bb84bc 3595 4 /* spr_how */);
d0a381dd
BF
3596 if (!p)
3597 return nfserr_resource;
0733d213 3598
0c0c267b 3599 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
c373b0a4
BF
3600 *p++ = cpu_to_be32(exid->seqid);
3601 *p++ = cpu_to_be32(exid->flags);
0733d213 3602
c373b0a4 3603 *p++ = cpu_to_be32(exid->spa_how);
a8bb84bc 3604
57266a6e
BF
3605 switch (exid->spa_how) {
3606 case SP4_NONE:
3607 break;
3608 case SP4_MACH_CRED:
a8bb84bc 3609 /* spo_must_enforce, spo_must_allow */
d0a381dd
BF
3610 p = xdr_reserve_space(xdr, 16);
3611 if (!p)
3612 return nfserr_resource;
a8bb84bc 3613
57266a6e 3614 /* spo_must_enforce bitmap: */
c373b0a4
BF
3615 *p++ = cpu_to_be32(2);
3616 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[0]);
3617 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[1]);
57266a6e 3618 /* empty spo_must_allow bitmap: */
c373b0a4 3619 *p++ = cpu_to_be32(0);
a8bb84bc 3620
57266a6e
BF
3621 break;
3622 default:
3623 WARN_ON_ONCE(1);
3624 }
0733d213 3625
d0a381dd 3626 p = xdr_reserve_space(xdr,
a8bb84bc
KM
3627 8 /* so_minor_id */ +
3628 4 /* so_major_id.len */ +
3629 (XDR_QUADLEN(major_id_sz) * 4) +
3630 4 /* eir_server_scope.len */ +
3631 (XDR_QUADLEN(server_scope_sz) * 4) +
3632 4 /* eir_server_impl_id.count (0) */);
d0a381dd
BF
3633 if (!p)
3634 return nfserr_resource;
a8bb84bc 3635
0733d213 3636 /* The server_owner struct */
b64c7f3b 3637 p = xdr_encode_hyper(p, minor_id); /* Minor id */
0733d213 3638 /* major id */
0c0c267b 3639 p = xdr_encode_opaque(p, major_id, major_id_sz);
0733d213
AA
3640
3641 /* Server scope */
0c0c267b 3642 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
0733d213
AA
3643
3644 /* Implementation id */
c373b0a4 3645 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
0733d213 3646 return 0;
2db134eb
AA
3647}
3648
3649static __be32
57b7b43b 3650nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
2db134eb
AA
3651 struct nfsd4_create_session *sess)
3652{
d0a381dd 3653 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3654 __be32 *p;
ec6b5d7b
AA
3655
3656 if (nfserr)
3657 return nfserr;
3658
d0a381dd
BF
3659 p = xdr_reserve_space(xdr, 24);
3660 if (!p)
3661 return nfserr_resource;
0c0c267b
BF
3662 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
3663 NFS4_MAX_SESSIONID_LEN);
c373b0a4
BF
3664 *p++ = cpu_to_be32(sess->seqid);
3665 *p++ = cpu_to_be32(sess->flags);
ec6b5d7b 3666
d0a381dd
BF
3667 p = xdr_reserve_space(xdr, 28);
3668 if (!p)
3669 return nfserr_resource;
c373b0a4
BF
3670 *p++ = cpu_to_be32(0); /* headerpadsz */
3671 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
3672 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
3673 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
3674 *p++ = cpu_to_be32(sess->fore_channel.maxops);
3675 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
3676 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
ec6b5d7b
AA
3677
3678 if (sess->fore_channel.nr_rdma_attrs) {
d0a381dd
BF
3679 p = xdr_reserve_space(xdr, 4);
3680 if (!p)
3681 return nfserr_resource;
c373b0a4 3682 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
ec6b5d7b
AA
3683 }
3684
d0a381dd
BF
3685 p = xdr_reserve_space(xdr, 28);
3686 if (!p)
3687 return nfserr_resource;
c373b0a4
BF
3688 *p++ = cpu_to_be32(0); /* headerpadsz */
3689 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
3690 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
3691 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
3692 *p++ = cpu_to_be32(sess->back_channel.maxops);
3693 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
3694 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
ec6b5d7b
AA
3695
3696 if (sess->back_channel.nr_rdma_attrs) {
d0a381dd
BF
3697 p = xdr_reserve_space(xdr, 4);
3698 if (!p)
3699 return nfserr_resource;
c373b0a4 3700 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
ec6b5d7b
AA
3701 }
3702 return 0;
2db134eb
AA
3703}
3704
c47d832b 3705static __be32
57b7b43b 3706nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
2db134eb
AA
3707 struct nfsd4_sequence *seq)
3708{
d0a381dd 3709 struct xdr_stream *xdr = &resp->xdr;
bc749ca4 3710 __be32 *p;
b85d4c01
BH
3711
3712 if (nfserr)
3713 return nfserr;
3714
d0a381dd
BF
3715 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
3716 if (!p)
3717 return nfserr_resource;
0c0c267b
BF
3718 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
3719 NFS4_MAX_SESSIONID_LEN);
c373b0a4
BF
3720 *p++ = cpu_to_be32(seq->seqid);
3721 *p++ = cpu_to_be32(seq->slotid);
b7d7ca35 3722 /* Note slotid's are numbered from zero: */
c373b0a4
BF
3723 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
3724 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
3725 *p++ = cpu_to_be32(seq->status_flags);
b85d4c01 3726
f5236013 3727 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
b85d4c01 3728 return 0;
2db134eb
AA
3729}
3730
2355c596 3731static __be32
57b7b43b 3732nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
17456804
BS
3733 struct nfsd4_test_stateid *test_stateid)
3734{
d0a381dd 3735 struct xdr_stream *xdr = &resp->xdr;
03cfb420 3736 struct nfsd4_test_stateid_id *stateid, *next;
17456804 3737 __be32 *p;
17456804 3738
a11fcce1
BF
3739 if (nfserr)
3740 return nfserr;
3741
d0a381dd
BF
3742 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
3743 if (!p)
3744 return nfserr_resource;
17456804 3745 *p++ = htonl(test_stateid->ts_num_ids);
17456804 3746
03cfb420 3747 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
02f5fde5 3748 *p++ = stateid->ts_id_status;
17456804 3749 }
17456804
BS
3750
3751 return nfserr;
3752}
3753
695e12f8
BH
3754static __be32
3755nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
3756{
3757 return nfserr;
3758}
3759
3760typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
3761
2db134eb
AA
3762/*
3763 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
3764 * since we don't need to filter out obsolete ops as this is
3765 * done in the decoding phase.
3766 */
695e12f8 3767static nfsd4_enc nfsd4_enc_ops[] = {
ad1060c8
BF
3768 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access,
3769 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close,
3770 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit,
3771 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create,
3772 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop,
3773 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop,
3774 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr,
3775 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh,
3776 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link,
3777 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock,
3778 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt,
3779 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku,
3780 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop,
3781 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop,
3782 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3783 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open,
84f09f46 3784 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop,
ad1060c8
BF
3785 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm,
3786 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade,
3787 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop,
3788 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop,
3789 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop,
3790 [OP_READ] = (nfsd4_enc)nfsd4_encode_read,
3791 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir,
3792 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink,
3793 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove,
3794 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename,
3795 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop,
3796 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop,
3797 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop,
3798 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo,
3799 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr,
3800 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid,
3801 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
3802 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3803 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write,
3804 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop,
2db134eb
AA
3805
3806 /* NFSv4.1 operations */
3807 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop,
1d1bc8f2 3808 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
2db134eb
AA
3809 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id,
3810 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session,
43212cc7
KM
3811 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop,
3812 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop,
2db134eb
AA
3813 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3814 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop,
3815 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
3816 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop,
3817 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop,
3818 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop,
22b6dee8 3819 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name,
2db134eb
AA
3820 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence,
3821 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop,
17456804 3822 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid,
2db134eb
AA
3823 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3824 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop,
3825 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop,
695e12f8
BH
3826};
3827
496c262c 3828/*
a8095f7e
BF
3829 * Calculate whether we still have space to encode repsize bytes.
3830 * There are two considerations:
3831 * - For NFS versions >=4.1, the size of the reply must stay within
3832 * session limits
3833 * - For all NFS versions, we must stay within limited preallocated
3834 * buffer space.
496c262c 3835 *
a8095f7e
BF
3836 * This is called before the operation is processed, so can only provide
3837 * an upper estimate. For some nonidempotent operations (such as
3838 * getattr), it's not necessarily a problem if that estimate is wrong,
3839 * as we can fail it after processing without significant side effects.
496c262c 3840 */
a8095f7e 3841__be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
496c262c 3842{
67492c99 3843 struct xdr_buf *buf = &resp->rqstp->rq_res;
47ee5298 3844 struct nfsd4_slot *slot = resp->cstate.slot;
496c262c 3845
47ee5298
BF
3846 if (buf->len + respsize <= buf->buflen)
3847 return nfs_ok;
3848 if (!nfsd4_has_session(&resp->cstate))
ea8d7720 3849 return nfserr_resource;
47ee5298
BF
3850 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
3851 WARN_ON_ONCE(1);
3852 return nfserr_rep_too_big_to_cache;
ea8d7720 3853 }
47ee5298 3854 return nfserr_rep_too_big;
496c262c
AA
3855}
3856
1da177e4
LT
3857void
3858nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
3859{
082d4bd7 3860 struct xdr_stream *xdr = &resp->xdr;
9411b1d4 3861 struct nfs4_stateowner *so = resp->cstate.replay_owner;
5f4ab945 3862 struct svc_rqst *rqstp = resp->rqstp;
082d4bd7 3863 int post_err_offset;
07d1f802 3864 nfsd4_enc encoder;
bc749ca4 3865 __be32 *p;
1da177e4 3866
d0a381dd
BF
3867 p = xdr_reserve_space(xdr, 8);
3868 if (!p) {
3869 WARN_ON_ONCE(1);
3870 return;
3871 }
c373b0a4 3872 *p++ = cpu_to_be32(op->opnum);
082d4bd7 3873 post_err_offset = xdr->buf->len;
1da177e4 3874
695e12f8
BH
3875 if (op->opnum == OP_ILLEGAL)
3876 goto status;
3877 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
3878 !nfsd4_enc_ops[op->opnum]);
07d1f802
BF
3879 encoder = nfsd4_enc_ops[op->opnum];
3880 op->status = encoder(resp, op->status, &op->u);
2825a7f9
BF
3881 xdr_commit_encode(xdr);
3882
067e1ace 3883 /* nfsd4_check_resp_size guarantees enough room for error status */
5f4ab945
BF
3884 if (!op->status) {
3885 int space_needed = 0;
3886 if (!nfsd4_last_compound_op(rqstp))
3887 space_needed = COMPOUND_ERR_SLACK_SPACE;
3888 op->status = nfsd4_check_resp_size(resp, space_needed);
3889 }
c8f13d97
BF
3890 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
3891 struct nfsd4_slot *slot = resp->cstate.slot;
3892
3893 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
3894 op->status = nfserr_rep_too_big_to_cache;
3895 else
3896 op->status = nfserr_rep_too_big;
3897 }
07d1f802
BF
3898 if (op->status == nfserr_resource ||
3899 op->status == nfserr_rep_too_big ||
3900 op->status == nfserr_rep_too_big_to_cache) {
3901 /*
3902 * The operation may have already been encoded or
3903 * partially encoded. No op returns anything additional
3904 * in the case of one of these three errors, so we can
3905 * just truncate back to after the status. But it's a
3906 * bug if we had to do this on a non-idempotent op:
3907 */
3908 warn_on_nonidempotent_op(op);
082d4bd7 3909 xdr_truncate_encode(xdr, post_err_offset);
07d1f802 3910 }
9411b1d4 3911 if (so) {
082d4bd7
BF
3912 int len = xdr->buf->len - post_err_offset;
3913
9411b1d4 3914 so->so_replay.rp_status = op->status;
082d4bd7
BF
3915 so->so_replay.rp_buflen = len;
3916 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
3917 so->so_replay.rp_buf, len);
9411b1d4 3918 }
695e12f8 3919status:
082d4bd7
BF
3920 /* Note that op->status is already in network byte order: */
3921 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4);
1da177e4
LT
3922}
3923
3924/*
3925 * Encode the reply stored in the stateowner reply cache
3926 *
3927 * XDR note: do not encode rp->rp_buflen: the buffer contains the
3928 * previously sent already encoded operation.
1da177e4
LT
3929 */
3930void
d0a381dd 3931nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
1da177e4 3932{
bc749ca4 3933 __be32 *p;
1da177e4
LT
3934 struct nfs4_replay *rp = op->replay;
3935
3936 BUG_ON(!rp);
3937
d0a381dd
BF
3938 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
3939 if (!p) {
3940 WARN_ON_ONCE(1);
3941 return;
3942 }
c373b0a4 3943 *p++ = cpu_to_be32(op->opnum);
1da177e4 3944 *p++ = rp->rp_status; /* already xdr'ed */
1da177e4 3945
0c0c267b 3946 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
1da177e4
LT
3947}
3948
1da177e4 3949int
2ebbc012 3950nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy)
1da177e4
LT
3951{
3952 return xdr_ressize_check(rqstp, p);
3953}
3954
3e98abff 3955int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp)
1da177e4 3956{
3e98abff
BF
3957 struct svc_rqst *rqstp = rq;
3958 struct nfsd4_compoundargs *args = rqstp->rq_argp;
3959
1da177e4
LT
3960 if (args->ops != args->iops) {
3961 kfree(args->ops);
3962 args->ops = args->iops;
3963 }
f99d49ad
JJ
3964 kfree(args->tmpp);
3965 args->tmpp = NULL;
1da177e4 3966 while (args->to_free) {
d5e23383 3967 struct svcxdr_tmpbuf *tb = args->to_free;
1da177e4 3968 args->to_free = tb->next;
1da177e4
LT
3969 kfree(tb);
3970 }
3e98abff 3971 return 1;
1da177e4
LT
3972}
3973
3974int
2ebbc012 3975nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args)
1da177e4 3976{
e874f9f8
JL
3977 if (rqstp->rq_arg.head[0].iov_len % 4) {
3978 /* client is nuts */
3979 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)",
3980 __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid));
3981 return 0;
3982 }
1da177e4
LT
3983 args->p = p;
3984 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len;
3985 args->pagelist = rqstp->rq_arg.pages;
3986 args->pagelen = rqstp->rq_arg.page_len;
3987 args->tmpp = NULL;
3988 args->to_free = NULL;
3989 args->ops = args->iops;
3990 args->rqstp = rqstp;
3991
3e98abff 3992 return !nfsd4_decode_compound(args);
1da177e4
LT
3993}
3994
3995int
2ebbc012 3996nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp)
1da177e4
LT
3997{
3998 /*
3999 * All that remains is to write the tag and operation count...
4000 */
6ac90391
BF
4001 struct xdr_buf *buf = resp->xdr.buf;
4002
4003 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len +
4004 buf->tail[0].iov_len);
dd97fdde 4005
2825a7f9
BF
4006 rqstp->rq_next_page = resp->xdr.page_ptr + 1;
4007
1da177e4
LT
4008 p = resp->tagp;
4009 *p++ = htonl(resp->taglen);
4010 memcpy(p, resp->tag, resp->taglen);
4011 p += XDR_QUADLEN(resp->taglen);
4012 *p++ = htonl(resp->opcnt);
4013
b607664e 4014 nfsd4_sequence_done(resp);
1da177e4
LT
4015 return 1;
4016}
4017
4018/*
4019 * Local variables:
4020 * c-basic-offset: 8
4021 * End:
4022 */