]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - fs/nfsd/nfs4xdr.c
Merge branch 'pm-opp'
[mirror_ubuntu-bionic-kernel.git] / fs / nfsd / nfs4xdr.c
1 /*
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36 #include <linux/file.h>
37 #include <linux/slab.h>
38 #include <linux/namei.h>
39 #include <linux/statfs.h>
40 #include <linux/utsname.h>
41 #include <linux/pagemap.h>
42 #include <linux/sunrpc/svcauth_gss.h>
43
44 #include "idmap.h"
45 #include "acl.h"
46 #include "xdr4.h"
47 #include "vfs.h"
48 #include "state.h"
49 #include "cache.h"
50 #include "netns.h"
51 #include "pnfs.h"
52
53 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
54 #include <linux/security.h>
55 #endif
56
57
58 #define NFSDDBG_FACILITY NFSDDBG_XDR
59
60 /*
61 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
62 * directory in order to indicate to the client that a filesystem boundary is present
63 * We use a fixed fsid for a referral
64 */
65 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
66 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
67
68 static __be32
69 check_filename(char *str, int len)
70 {
71 int i;
72
73 if (len == 0)
74 return nfserr_inval;
75 if (isdotent(str, len))
76 return nfserr_badname;
77 for (i = 0; i < len; i++)
78 if (str[i] == '/')
79 return nfserr_badname;
80 return 0;
81 }
82
83 #define DECODE_HEAD \
84 __be32 *p; \
85 __be32 status
86 #define DECODE_TAIL \
87 status = 0; \
88 out: \
89 return status; \
90 xdr_error: \
91 dprintk("NFSD: xdr error (%s:%d)\n", \
92 __FILE__, __LINE__); \
93 status = nfserr_bad_xdr; \
94 goto out
95
96 #define READMEM(x,nbytes) do { \
97 x = (char *)p; \
98 p += XDR_QUADLEN(nbytes); \
99 } while (0)
100 #define SAVEMEM(x,nbytes) do { \
101 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \
102 savemem(argp, p, nbytes) : \
103 (char *)p)) { \
104 dprintk("NFSD: xdr error (%s:%d)\n", \
105 __FILE__, __LINE__); \
106 goto xdr_error; \
107 } \
108 p += XDR_QUADLEN(nbytes); \
109 } while (0)
110 #define COPYMEM(x,nbytes) do { \
111 memcpy((x), p, nbytes); \
112 p += XDR_QUADLEN(nbytes); \
113 } while (0)
114
115 /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */
116 #define READ_BUF(nbytes) do { \
117 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \
118 p = argp->p; \
119 argp->p += XDR_QUADLEN(nbytes); \
120 } else if (!(p = read_buf(argp, nbytes))) { \
121 dprintk("NFSD: xdr error (%s:%d)\n", \
122 __FILE__, __LINE__); \
123 goto xdr_error; \
124 } \
125 } while (0)
126
127 static void next_decode_page(struct nfsd4_compoundargs *argp)
128 {
129 argp->p = page_address(argp->pagelist[0]);
130 argp->pagelist++;
131 if (argp->pagelen < PAGE_SIZE) {
132 argp->end = argp->p + (argp->pagelen>>2);
133 argp->pagelen = 0;
134 } else {
135 argp->end = argp->p + (PAGE_SIZE>>2);
136 argp->pagelen -= PAGE_SIZE;
137 }
138 }
139
140 static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes)
141 {
142 /* We want more bytes than seem to be available.
143 * Maybe we need a new page, maybe we have just run out
144 */
145 unsigned int avail = (char *)argp->end - (char *)argp->p;
146 __be32 *p;
147 if (avail + argp->pagelen < nbytes)
148 return NULL;
149 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */
150 return NULL;
151 /* ok, we can do it with the current plus the next page */
152 if (nbytes <= sizeof(argp->tmp))
153 p = argp->tmp;
154 else {
155 kfree(argp->tmpp);
156 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL);
157 if (!p)
158 return NULL;
159
160 }
161 /*
162 * The following memcpy is safe because read_buf is always
163 * called with nbytes > avail, and the two cases above both
164 * guarantee p points to at least nbytes bytes.
165 */
166 memcpy(p, argp->p, avail);
167 next_decode_page(argp);
168 memcpy(((char*)p)+avail, argp->p, (nbytes - avail));
169 argp->p += XDR_QUADLEN(nbytes - avail);
170 return p;
171 }
172
173 static int zero_clientid(clientid_t *clid)
174 {
175 return (clid->cl_boot == 0) && (clid->cl_id == 0);
176 }
177
178 /**
179 * svcxdr_tmpalloc - allocate memory to be freed after compound processing
180 * @argp: NFSv4 compound argument structure
181 * @p: pointer to be freed (with kfree())
182 *
183 * Marks @p to be freed when processing the compound operation
184 * described in @argp finishes.
185 */
186 static void *
187 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
188 {
189 struct svcxdr_tmpbuf *tb;
190
191 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
192 if (!tb)
193 return NULL;
194 tb->next = argp->to_free;
195 argp->to_free = tb;
196 return tb->buf;
197 }
198
199 /*
200 * For xdr strings that need to be passed to other kernel api's
201 * as null-terminated strings.
202 *
203 * Note null-terminating in place usually isn't safe since the
204 * buffer might end on a page boundary.
205 */
206 static char *
207 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
208 {
209 char *p = svcxdr_tmpalloc(argp, len + 1);
210
211 if (!p)
212 return NULL;
213 memcpy(p, buf, len);
214 p[len] = '\0';
215 return p;
216 }
217
218 /**
219 * savemem - duplicate a chunk of memory for later processing
220 * @argp: NFSv4 compound argument structure to be freed with
221 * @p: pointer to be duplicated
222 * @nbytes: length to be duplicated
223 *
224 * Returns a pointer to a copy of @nbytes bytes of memory at @p
225 * that are preserved until processing of the NFSv4 compound
226 * operation described by @argp finishes.
227 */
228 static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes)
229 {
230 void *ret;
231
232 ret = svcxdr_tmpalloc(argp, nbytes);
233 if (!ret)
234 return NULL;
235 memcpy(ret, p, nbytes);
236 return ret;
237 }
238
239 /*
240 * We require the high 32 bits of 'seconds' to be 0, and
241 * we ignore all 32 bits of 'nseconds'.
242 */
243 static __be32
244 nfsd4_decode_time(struct nfsd4_compoundargs *argp, struct timespec *tv)
245 {
246 DECODE_HEAD;
247 u64 sec;
248
249 READ_BUF(12);
250 p = xdr_decode_hyper(p, &sec);
251 tv->tv_sec = sec;
252 tv->tv_nsec = be32_to_cpup(p++);
253 if (tv->tv_nsec >= (u32)1000000000)
254 return nfserr_inval;
255
256 DECODE_TAIL;
257 }
258
259 static __be32
260 nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval)
261 {
262 u32 bmlen;
263 DECODE_HEAD;
264
265 bmval[0] = 0;
266 bmval[1] = 0;
267 bmval[2] = 0;
268
269 READ_BUF(4);
270 bmlen = be32_to_cpup(p++);
271 if (bmlen > 1000)
272 goto xdr_error;
273
274 READ_BUF(bmlen << 2);
275 if (bmlen > 0)
276 bmval[0] = be32_to_cpup(p++);
277 if (bmlen > 1)
278 bmval[1] = be32_to_cpup(p++);
279 if (bmlen > 2)
280 bmval[2] = be32_to_cpup(p++);
281
282 DECODE_TAIL;
283 }
284
285 static __be32
286 nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval,
287 struct iattr *iattr, struct nfs4_acl **acl,
288 struct xdr_netobj *label)
289 {
290 int expected_len, len = 0;
291 u32 dummy32;
292 char *buf;
293
294 DECODE_HEAD;
295 iattr->ia_valid = 0;
296 if ((status = nfsd4_decode_bitmap(argp, bmval)))
297 return status;
298
299 READ_BUF(4);
300 expected_len = be32_to_cpup(p++);
301
302 if (bmval[0] & FATTR4_WORD0_SIZE) {
303 READ_BUF(8);
304 len += 8;
305 p = xdr_decode_hyper(p, &iattr->ia_size);
306 iattr->ia_valid |= ATTR_SIZE;
307 }
308 if (bmval[0] & FATTR4_WORD0_ACL) {
309 u32 nace;
310 struct nfs4_ace *ace;
311
312 READ_BUF(4); len += 4;
313 nace = be32_to_cpup(p++);
314
315 if (nace > NFS4_ACL_MAX)
316 return nfserr_fbig;
317
318 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(nace));
319 if (*acl == NULL)
320 return nfserr_jukebox;
321
322 (*acl)->naces = nace;
323 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) {
324 READ_BUF(16); len += 16;
325 ace->type = be32_to_cpup(p++);
326 ace->flag = be32_to_cpup(p++);
327 ace->access_mask = be32_to_cpup(p++);
328 dummy32 = be32_to_cpup(p++);
329 READ_BUF(dummy32);
330 len += XDR_QUADLEN(dummy32) << 2;
331 READMEM(buf, dummy32);
332 ace->whotype = nfs4_acl_get_whotype(buf, dummy32);
333 status = nfs_ok;
334 if (ace->whotype != NFS4_ACL_WHO_NAMED)
335 ;
336 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
337 status = nfsd_map_name_to_gid(argp->rqstp,
338 buf, dummy32, &ace->who_gid);
339 else
340 status = nfsd_map_name_to_uid(argp->rqstp,
341 buf, dummy32, &ace->who_uid);
342 if (status)
343 return status;
344 }
345 } else
346 *acl = NULL;
347 if (bmval[1] & FATTR4_WORD1_MODE) {
348 READ_BUF(4);
349 len += 4;
350 iattr->ia_mode = be32_to_cpup(p++);
351 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
352 iattr->ia_valid |= ATTR_MODE;
353 }
354 if (bmval[1] & FATTR4_WORD1_OWNER) {
355 READ_BUF(4);
356 len += 4;
357 dummy32 = be32_to_cpup(p++);
358 READ_BUF(dummy32);
359 len += (XDR_QUADLEN(dummy32) << 2);
360 READMEM(buf, dummy32);
361 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid)))
362 return status;
363 iattr->ia_valid |= ATTR_UID;
364 }
365 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
366 READ_BUF(4);
367 len += 4;
368 dummy32 = be32_to_cpup(p++);
369 READ_BUF(dummy32);
370 len += (XDR_QUADLEN(dummy32) << 2);
371 READMEM(buf, dummy32);
372 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid)))
373 return status;
374 iattr->ia_valid |= ATTR_GID;
375 }
376 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
377 READ_BUF(4);
378 len += 4;
379 dummy32 = be32_to_cpup(p++);
380 switch (dummy32) {
381 case NFS4_SET_TO_CLIENT_TIME:
382 len += 12;
383 status = nfsd4_decode_time(argp, &iattr->ia_atime);
384 if (status)
385 return status;
386 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
387 break;
388 case NFS4_SET_TO_SERVER_TIME:
389 iattr->ia_valid |= ATTR_ATIME;
390 break;
391 default:
392 goto xdr_error;
393 }
394 }
395 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
396 READ_BUF(4);
397 len += 4;
398 dummy32 = be32_to_cpup(p++);
399 switch (dummy32) {
400 case NFS4_SET_TO_CLIENT_TIME:
401 len += 12;
402 status = nfsd4_decode_time(argp, &iattr->ia_mtime);
403 if (status)
404 return status;
405 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
406 break;
407 case NFS4_SET_TO_SERVER_TIME:
408 iattr->ia_valid |= ATTR_MTIME;
409 break;
410 default:
411 goto xdr_error;
412 }
413 }
414
415 label->len = 0;
416 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
417 if (bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
418 READ_BUF(4);
419 len += 4;
420 dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */
421 READ_BUF(4);
422 len += 4;
423 dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */
424 READ_BUF(4);
425 len += 4;
426 dummy32 = be32_to_cpup(p++);
427 READ_BUF(dummy32);
428 if (dummy32 > NFS4_MAXLABELLEN)
429 return nfserr_badlabel;
430 len += (XDR_QUADLEN(dummy32) << 2);
431 READMEM(buf, dummy32);
432 label->len = dummy32;
433 label->data = svcxdr_dupstr(argp, buf, dummy32);
434 if (!label->data)
435 return nfserr_jukebox;
436 }
437 #endif
438
439 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
440 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
441 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2)
442 READ_BUF(expected_len - len);
443 else if (len != expected_len)
444 goto xdr_error;
445
446 DECODE_TAIL;
447 }
448
449 static __be32
450 nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid)
451 {
452 DECODE_HEAD;
453
454 READ_BUF(sizeof(stateid_t));
455 sid->si_generation = be32_to_cpup(p++);
456 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t));
457
458 DECODE_TAIL;
459 }
460
461 static __be32
462 nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access)
463 {
464 DECODE_HEAD;
465
466 READ_BUF(4);
467 access->ac_req_access = be32_to_cpup(p++);
468
469 DECODE_TAIL;
470 }
471
472 static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
473 {
474 DECODE_HEAD;
475 u32 dummy, uid, gid;
476 char *machine_name;
477 int i;
478 int nr_secflavs;
479
480 /* callback_sec_params4 */
481 READ_BUF(4);
482 nr_secflavs = be32_to_cpup(p++);
483 if (nr_secflavs)
484 cbs->flavor = (u32)(-1);
485 else
486 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
487 cbs->flavor = 0;
488 for (i = 0; i < nr_secflavs; ++i) {
489 READ_BUF(4);
490 dummy = be32_to_cpup(p++);
491 switch (dummy) {
492 case RPC_AUTH_NULL:
493 /* Nothing to read */
494 if (cbs->flavor == (u32)(-1))
495 cbs->flavor = RPC_AUTH_NULL;
496 break;
497 case RPC_AUTH_UNIX:
498 READ_BUF(8);
499 /* stamp */
500 dummy = be32_to_cpup(p++);
501
502 /* machine name */
503 dummy = be32_to_cpup(p++);
504 READ_BUF(dummy);
505 SAVEMEM(machine_name, dummy);
506
507 /* uid, gid */
508 READ_BUF(8);
509 uid = be32_to_cpup(p++);
510 gid = be32_to_cpup(p++);
511
512 /* more gids */
513 READ_BUF(4);
514 dummy = be32_to_cpup(p++);
515 READ_BUF(dummy * 4);
516 if (cbs->flavor == (u32)(-1)) {
517 kuid_t kuid = make_kuid(&init_user_ns, uid);
518 kgid_t kgid = make_kgid(&init_user_ns, gid);
519 if (uid_valid(kuid) && gid_valid(kgid)) {
520 cbs->uid = kuid;
521 cbs->gid = kgid;
522 cbs->flavor = RPC_AUTH_UNIX;
523 } else {
524 dprintk("RPC_AUTH_UNIX with invalid"
525 "uid or gid ignoring!\n");
526 }
527 }
528 break;
529 case RPC_AUTH_GSS:
530 dprintk("RPC_AUTH_GSS callback secflavor "
531 "not supported!\n");
532 READ_BUF(8);
533 /* gcbp_service */
534 dummy = be32_to_cpup(p++);
535 /* gcbp_handle_from_server */
536 dummy = be32_to_cpup(p++);
537 READ_BUF(dummy);
538 p += XDR_QUADLEN(dummy);
539 /* gcbp_handle_from_client */
540 READ_BUF(4);
541 dummy = be32_to_cpup(p++);
542 READ_BUF(dummy);
543 break;
544 default:
545 dprintk("Illegal callback secflavor\n");
546 return nfserr_inval;
547 }
548 }
549 DECODE_TAIL;
550 }
551
552 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc)
553 {
554 DECODE_HEAD;
555
556 READ_BUF(4);
557 bc->bc_cb_program = be32_to_cpup(p++);
558 nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
559
560 DECODE_TAIL;
561 }
562
563 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
564 {
565 DECODE_HEAD;
566
567 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8);
568 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN);
569 bcts->dir = be32_to_cpup(p++);
570 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker
571 * could help us figure out we should be using it. */
572 DECODE_TAIL;
573 }
574
575 static __be32
576 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
577 {
578 DECODE_HEAD;
579
580 READ_BUF(4);
581 close->cl_seqid = be32_to_cpup(p++);
582 return nfsd4_decode_stateid(argp, &close->cl_stateid);
583
584 DECODE_TAIL;
585 }
586
587
588 static __be32
589 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
590 {
591 DECODE_HEAD;
592
593 READ_BUF(12);
594 p = xdr_decode_hyper(p, &commit->co_offset);
595 commit->co_count = be32_to_cpup(p++);
596
597 DECODE_TAIL;
598 }
599
600 static __be32
601 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
602 {
603 DECODE_HEAD;
604
605 READ_BUF(4);
606 create->cr_type = be32_to_cpup(p++);
607 switch (create->cr_type) {
608 case NF4LNK:
609 READ_BUF(4);
610 create->cr_datalen = be32_to_cpup(p++);
611 READ_BUF(create->cr_datalen);
612 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
613 if (!create->cr_data)
614 return nfserr_jukebox;
615 break;
616 case NF4BLK:
617 case NF4CHR:
618 READ_BUF(8);
619 create->cr_specdata1 = be32_to_cpup(p++);
620 create->cr_specdata2 = be32_to_cpup(p++);
621 break;
622 case NF4SOCK:
623 case NF4FIFO:
624 case NF4DIR:
625 default:
626 break;
627 }
628
629 READ_BUF(4);
630 create->cr_namelen = be32_to_cpup(p++);
631 READ_BUF(create->cr_namelen);
632 SAVEMEM(create->cr_name, create->cr_namelen);
633 if ((status = check_filename(create->cr_name, create->cr_namelen)))
634 return status;
635
636 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr,
637 &create->cr_acl, &create->cr_label);
638 if (status)
639 goto out;
640
641 DECODE_TAIL;
642 }
643
644 static inline __be32
645 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
646 {
647 return nfsd4_decode_stateid(argp, &dr->dr_stateid);
648 }
649
650 static inline __be32
651 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
652 {
653 return nfsd4_decode_bitmap(argp, getattr->ga_bmval);
654 }
655
656 static __be32
657 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
658 {
659 DECODE_HEAD;
660
661 READ_BUF(4);
662 link->li_namelen = be32_to_cpup(p++);
663 READ_BUF(link->li_namelen);
664 SAVEMEM(link->li_name, link->li_namelen);
665 if ((status = check_filename(link->li_name, link->li_namelen)))
666 return status;
667
668 DECODE_TAIL;
669 }
670
671 static __be32
672 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
673 {
674 DECODE_HEAD;
675
676 /*
677 * type, reclaim(boolean), offset, length, new_lock_owner(boolean)
678 */
679 READ_BUF(28);
680 lock->lk_type = be32_to_cpup(p++);
681 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
682 goto xdr_error;
683 lock->lk_reclaim = be32_to_cpup(p++);
684 p = xdr_decode_hyper(p, &lock->lk_offset);
685 p = xdr_decode_hyper(p, &lock->lk_length);
686 lock->lk_is_new = be32_to_cpup(p++);
687
688 if (lock->lk_is_new) {
689 READ_BUF(4);
690 lock->lk_new_open_seqid = be32_to_cpup(p++);
691 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid);
692 if (status)
693 return status;
694 READ_BUF(8 + sizeof(clientid_t));
695 lock->lk_new_lock_seqid = be32_to_cpup(p++);
696 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t));
697 lock->lk_new_owner.len = be32_to_cpup(p++);
698 READ_BUF(lock->lk_new_owner.len);
699 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len);
700 } else {
701 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid);
702 if (status)
703 return status;
704 READ_BUF(4);
705 lock->lk_old_lock_seqid = be32_to_cpup(p++);
706 }
707
708 DECODE_TAIL;
709 }
710
711 static __be32
712 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
713 {
714 DECODE_HEAD;
715
716 READ_BUF(32);
717 lockt->lt_type = be32_to_cpup(p++);
718 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
719 goto xdr_error;
720 p = xdr_decode_hyper(p, &lockt->lt_offset);
721 p = xdr_decode_hyper(p, &lockt->lt_length);
722 COPYMEM(&lockt->lt_clientid, 8);
723 lockt->lt_owner.len = be32_to_cpup(p++);
724 READ_BUF(lockt->lt_owner.len);
725 READMEM(lockt->lt_owner.data, lockt->lt_owner.len);
726
727 DECODE_TAIL;
728 }
729
730 static __be32
731 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
732 {
733 DECODE_HEAD;
734
735 READ_BUF(8);
736 locku->lu_type = be32_to_cpup(p++);
737 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
738 goto xdr_error;
739 locku->lu_seqid = be32_to_cpup(p++);
740 status = nfsd4_decode_stateid(argp, &locku->lu_stateid);
741 if (status)
742 return status;
743 READ_BUF(16);
744 p = xdr_decode_hyper(p, &locku->lu_offset);
745 p = xdr_decode_hyper(p, &locku->lu_length);
746
747 DECODE_TAIL;
748 }
749
750 static __be32
751 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
752 {
753 DECODE_HEAD;
754
755 READ_BUF(4);
756 lookup->lo_len = be32_to_cpup(p++);
757 READ_BUF(lookup->lo_len);
758 SAVEMEM(lookup->lo_name, lookup->lo_len);
759 if ((status = check_filename(lookup->lo_name, lookup->lo_len)))
760 return status;
761
762 DECODE_TAIL;
763 }
764
765 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
766 {
767 __be32 *p;
768 u32 w;
769
770 READ_BUF(4);
771 w = be32_to_cpup(p++);
772 *share_access = w & NFS4_SHARE_ACCESS_MASK;
773 *deleg_want = w & NFS4_SHARE_WANT_MASK;
774 if (deleg_when)
775 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
776
777 switch (w & NFS4_SHARE_ACCESS_MASK) {
778 case NFS4_SHARE_ACCESS_READ:
779 case NFS4_SHARE_ACCESS_WRITE:
780 case NFS4_SHARE_ACCESS_BOTH:
781 break;
782 default:
783 return nfserr_bad_xdr;
784 }
785 w &= ~NFS4_SHARE_ACCESS_MASK;
786 if (!w)
787 return nfs_ok;
788 if (!argp->minorversion)
789 return nfserr_bad_xdr;
790 switch (w & NFS4_SHARE_WANT_MASK) {
791 case NFS4_SHARE_WANT_NO_PREFERENCE:
792 case NFS4_SHARE_WANT_READ_DELEG:
793 case NFS4_SHARE_WANT_WRITE_DELEG:
794 case NFS4_SHARE_WANT_ANY_DELEG:
795 case NFS4_SHARE_WANT_NO_DELEG:
796 case NFS4_SHARE_WANT_CANCEL:
797 break;
798 default:
799 return nfserr_bad_xdr;
800 }
801 w &= ~NFS4_SHARE_WANT_MASK;
802 if (!w)
803 return nfs_ok;
804
805 if (!deleg_when) /* open_downgrade */
806 return nfserr_inval;
807 switch (w) {
808 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
809 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
810 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
811 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
812 return nfs_ok;
813 }
814 xdr_error:
815 return nfserr_bad_xdr;
816 }
817
818 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
819 {
820 __be32 *p;
821
822 READ_BUF(4);
823 *x = be32_to_cpup(p++);
824 /* Note: unlinke access bits, deny bits may be zero. */
825 if (*x & ~NFS4_SHARE_DENY_BOTH)
826 return nfserr_bad_xdr;
827 return nfs_ok;
828 xdr_error:
829 return nfserr_bad_xdr;
830 }
831
832 static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
833 {
834 __be32 *p;
835
836 READ_BUF(4);
837 o->len = be32_to_cpup(p++);
838
839 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT)
840 return nfserr_bad_xdr;
841
842 READ_BUF(o->len);
843 SAVEMEM(o->data, o->len);
844 return nfs_ok;
845 xdr_error:
846 return nfserr_bad_xdr;
847 }
848
849 static __be32
850 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
851 {
852 DECODE_HEAD;
853 u32 dummy;
854
855 memset(open->op_bmval, 0, sizeof(open->op_bmval));
856 open->op_iattr.ia_valid = 0;
857 open->op_openowner = NULL;
858
859 open->op_xdr_error = 0;
860 /* seqid, share_access, share_deny, clientid, ownerlen */
861 READ_BUF(4);
862 open->op_seqid = be32_to_cpup(p++);
863 /* decode, yet ignore deleg_when until supported */
864 status = nfsd4_decode_share_access(argp, &open->op_share_access,
865 &open->op_deleg_want, &dummy);
866 if (status)
867 goto xdr_error;
868 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
869 if (status)
870 goto xdr_error;
871 READ_BUF(sizeof(clientid_t));
872 COPYMEM(&open->op_clientid, sizeof(clientid_t));
873 status = nfsd4_decode_opaque(argp, &open->op_owner);
874 if (status)
875 goto xdr_error;
876 READ_BUF(4);
877 open->op_create = be32_to_cpup(p++);
878 switch (open->op_create) {
879 case NFS4_OPEN_NOCREATE:
880 break;
881 case NFS4_OPEN_CREATE:
882 READ_BUF(4);
883 open->op_createmode = be32_to_cpup(p++);
884 switch (open->op_createmode) {
885 case NFS4_CREATE_UNCHECKED:
886 case NFS4_CREATE_GUARDED:
887 status = nfsd4_decode_fattr(argp, open->op_bmval,
888 &open->op_iattr, &open->op_acl, &open->op_label);
889 if (status)
890 goto out;
891 break;
892 case NFS4_CREATE_EXCLUSIVE:
893 READ_BUF(NFS4_VERIFIER_SIZE);
894 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
895 break;
896 case NFS4_CREATE_EXCLUSIVE4_1:
897 if (argp->minorversion < 1)
898 goto xdr_error;
899 READ_BUF(NFS4_VERIFIER_SIZE);
900 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
901 status = nfsd4_decode_fattr(argp, open->op_bmval,
902 &open->op_iattr, &open->op_acl, &open->op_label);
903 if (status)
904 goto out;
905 break;
906 default:
907 goto xdr_error;
908 }
909 break;
910 default:
911 goto xdr_error;
912 }
913
914 /* open_claim */
915 READ_BUF(4);
916 open->op_claim_type = be32_to_cpup(p++);
917 switch (open->op_claim_type) {
918 case NFS4_OPEN_CLAIM_NULL:
919 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
920 READ_BUF(4);
921 open->op_fname.len = be32_to_cpup(p++);
922 READ_BUF(open->op_fname.len);
923 SAVEMEM(open->op_fname.data, open->op_fname.len);
924 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
925 return status;
926 break;
927 case NFS4_OPEN_CLAIM_PREVIOUS:
928 READ_BUF(4);
929 open->op_delegate_type = be32_to_cpup(p++);
930 break;
931 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
932 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
933 if (status)
934 return status;
935 READ_BUF(4);
936 open->op_fname.len = be32_to_cpup(p++);
937 READ_BUF(open->op_fname.len);
938 SAVEMEM(open->op_fname.data, open->op_fname.len);
939 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
940 return status;
941 break;
942 case NFS4_OPEN_CLAIM_FH:
943 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
944 if (argp->minorversion < 1)
945 goto xdr_error;
946 /* void */
947 break;
948 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
949 if (argp->minorversion < 1)
950 goto xdr_error;
951 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
952 if (status)
953 return status;
954 break;
955 default:
956 goto xdr_error;
957 }
958
959 DECODE_TAIL;
960 }
961
962 static __be32
963 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
964 {
965 DECODE_HEAD;
966
967 if (argp->minorversion >= 1)
968 return nfserr_notsupp;
969
970 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid);
971 if (status)
972 return status;
973 READ_BUF(4);
974 open_conf->oc_seqid = be32_to_cpup(p++);
975
976 DECODE_TAIL;
977 }
978
979 static __be32
980 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
981 {
982 DECODE_HEAD;
983
984 status = nfsd4_decode_stateid(argp, &open_down->od_stateid);
985 if (status)
986 return status;
987 READ_BUF(4);
988 open_down->od_seqid = be32_to_cpup(p++);
989 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
990 &open_down->od_deleg_want, NULL);
991 if (status)
992 return status;
993 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
994 if (status)
995 return status;
996 DECODE_TAIL;
997 }
998
999 static __be32
1000 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
1001 {
1002 DECODE_HEAD;
1003
1004 READ_BUF(4);
1005 putfh->pf_fhlen = be32_to_cpup(p++);
1006 if (putfh->pf_fhlen > NFS4_FHSIZE)
1007 goto xdr_error;
1008 READ_BUF(putfh->pf_fhlen);
1009 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen);
1010
1011 DECODE_TAIL;
1012 }
1013
1014 static __be32
1015 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p)
1016 {
1017 if (argp->minorversion == 0)
1018 return nfs_ok;
1019 return nfserr_notsupp;
1020 }
1021
1022 static __be32
1023 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
1024 {
1025 DECODE_HEAD;
1026
1027 status = nfsd4_decode_stateid(argp, &read->rd_stateid);
1028 if (status)
1029 return status;
1030 READ_BUF(12);
1031 p = xdr_decode_hyper(p, &read->rd_offset);
1032 read->rd_length = be32_to_cpup(p++);
1033
1034 DECODE_TAIL;
1035 }
1036
1037 static __be32
1038 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
1039 {
1040 DECODE_HEAD;
1041
1042 READ_BUF(24);
1043 p = xdr_decode_hyper(p, &readdir->rd_cookie);
1044 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data));
1045 readdir->rd_dircount = be32_to_cpup(p++);
1046 readdir->rd_maxcount = be32_to_cpup(p++);
1047 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval)))
1048 goto out;
1049
1050 DECODE_TAIL;
1051 }
1052
1053 static __be32
1054 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
1055 {
1056 DECODE_HEAD;
1057
1058 READ_BUF(4);
1059 remove->rm_namelen = be32_to_cpup(p++);
1060 READ_BUF(remove->rm_namelen);
1061 SAVEMEM(remove->rm_name, remove->rm_namelen);
1062 if ((status = check_filename(remove->rm_name, remove->rm_namelen)))
1063 return status;
1064
1065 DECODE_TAIL;
1066 }
1067
1068 static __be32
1069 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
1070 {
1071 DECODE_HEAD;
1072
1073 READ_BUF(4);
1074 rename->rn_snamelen = be32_to_cpup(p++);
1075 READ_BUF(rename->rn_snamelen + 4);
1076 SAVEMEM(rename->rn_sname, rename->rn_snamelen);
1077 rename->rn_tnamelen = be32_to_cpup(p++);
1078 READ_BUF(rename->rn_tnamelen);
1079 SAVEMEM(rename->rn_tname, rename->rn_tnamelen);
1080 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen)))
1081 return status;
1082 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen)))
1083 return status;
1084
1085 DECODE_TAIL;
1086 }
1087
1088 static __be32
1089 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
1090 {
1091 DECODE_HEAD;
1092
1093 if (argp->minorversion >= 1)
1094 return nfserr_notsupp;
1095
1096 READ_BUF(sizeof(clientid_t));
1097 COPYMEM(clientid, sizeof(clientid_t));
1098
1099 DECODE_TAIL;
1100 }
1101
1102 static __be32
1103 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1104 struct nfsd4_secinfo *secinfo)
1105 {
1106 DECODE_HEAD;
1107
1108 READ_BUF(4);
1109 secinfo->si_namelen = be32_to_cpup(p++);
1110 READ_BUF(secinfo->si_namelen);
1111 SAVEMEM(secinfo->si_name, secinfo->si_namelen);
1112 status = check_filename(secinfo->si_name, secinfo->si_namelen);
1113 if (status)
1114 return status;
1115 DECODE_TAIL;
1116 }
1117
1118 static __be32
1119 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1120 struct nfsd4_secinfo_no_name *sin)
1121 {
1122 DECODE_HEAD;
1123
1124 READ_BUF(4);
1125 sin->sin_style = be32_to_cpup(p++);
1126 DECODE_TAIL;
1127 }
1128
1129 static __be32
1130 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
1131 {
1132 __be32 status;
1133
1134 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid);
1135 if (status)
1136 return status;
1137 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr,
1138 &setattr->sa_acl, &setattr->sa_label);
1139 }
1140
1141 static __be32
1142 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
1143 {
1144 DECODE_HEAD;
1145
1146 if (argp->minorversion >= 1)
1147 return nfserr_notsupp;
1148
1149 READ_BUF(NFS4_VERIFIER_SIZE);
1150 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE);
1151
1152 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1153 if (status)
1154 return nfserr_bad_xdr;
1155 READ_BUF(8);
1156 setclientid->se_callback_prog = be32_to_cpup(p++);
1157 setclientid->se_callback_netid_len = be32_to_cpup(p++);
1158
1159 READ_BUF(setclientid->se_callback_netid_len + 4);
1160 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len);
1161 setclientid->se_callback_addr_len = be32_to_cpup(p++);
1162
1163 READ_BUF(setclientid->se_callback_addr_len + 4);
1164 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len);
1165 setclientid->se_callback_ident = be32_to_cpup(p++);
1166
1167 DECODE_TAIL;
1168 }
1169
1170 static __be32
1171 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1172 {
1173 DECODE_HEAD;
1174
1175 if (argp->minorversion >= 1)
1176 return nfserr_notsupp;
1177
1178 READ_BUF(8 + NFS4_VERIFIER_SIZE);
1179 COPYMEM(&scd_c->sc_clientid, 8);
1180 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE);
1181
1182 DECODE_TAIL;
1183 }
1184
1185 /* Also used for NVERIFY */
1186 static __be32
1187 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1188 {
1189 DECODE_HEAD;
1190
1191 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval)))
1192 goto out;
1193
1194 /* For convenience's sake, we compare raw xdr'd attributes in
1195 * nfsd4_proc_verify */
1196
1197 READ_BUF(4);
1198 verify->ve_attrlen = be32_to_cpup(p++);
1199 READ_BUF(verify->ve_attrlen);
1200 SAVEMEM(verify->ve_attrval, verify->ve_attrlen);
1201
1202 DECODE_TAIL;
1203 }
1204
1205 static __be32
1206 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1207 {
1208 int avail;
1209 int len;
1210 DECODE_HEAD;
1211
1212 status = nfsd4_decode_stateid(argp, &write->wr_stateid);
1213 if (status)
1214 return status;
1215 READ_BUF(16);
1216 p = xdr_decode_hyper(p, &write->wr_offset);
1217 write->wr_stable_how = be32_to_cpup(p++);
1218 if (write->wr_stable_how > 2)
1219 goto xdr_error;
1220 write->wr_buflen = be32_to_cpup(p++);
1221
1222 /* Sorry .. no magic macros for this.. *
1223 * READ_BUF(write->wr_buflen);
1224 * SAVEMEM(write->wr_buf, write->wr_buflen);
1225 */
1226 avail = (char*)argp->end - (char*)argp->p;
1227 if (avail + argp->pagelen < write->wr_buflen) {
1228 dprintk("NFSD: xdr error (%s:%d)\n",
1229 __FILE__, __LINE__);
1230 goto xdr_error;
1231 }
1232 write->wr_head.iov_base = p;
1233 write->wr_head.iov_len = avail;
1234 write->wr_pagelist = argp->pagelist;
1235
1236 len = XDR_QUADLEN(write->wr_buflen) << 2;
1237 if (len >= avail) {
1238 int pages;
1239
1240 len -= avail;
1241
1242 pages = len >> PAGE_SHIFT;
1243 argp->pagelist += pages;
1244 argp->pagelen -= pages * PAGE_SIZE;
1245 len -= pages * PAGE_SIZE;
1246
1247 argp->p = (__be32 *)page_address(argp->pagelist[0]);
1248 argp->pagelist++;
1249 argp->end = argp->p + XDR_QUADLEN(PAGE_SIZE);
1250 }
1251 argp->p += XDR_QUADLEN(len);
1252
1253 DECODE_TAIL;
1254 }
1255
1256 static __be32
1257 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1258 {
1259 DECODE_HEAD;
1260
1261 if (argp->minorversion >= 1)
1262 return nfserr_notsupp;
1263
1264 READ_BUF(12);
1265 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t));
1266 rlockowner->rl_owner.len = be32_to_cpup(p++);
1267 READ_BUF(rlockowner->rl_owner.len);
1268 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len);
1269
1270 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1271 return nfserr_inval;
1272 DECODE_TAIL;
1273 }
1274
1275 static __be32
1276 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1277 struct nfsd4_exchange_id *exid)
1278 {
1279 int dummy, tmp;
1280 DECODE_HEAD;
1281
1282 READ_BUF(NFS4_VERIFIER_SIZE);
1283 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE);
1284
1285 status = nfsd4_decode_opaque(argp, &exid->clname);
1286 if (status)
1287 return nfserr_bad_xdr;
1288
1289 READ_BUF(4);
1290 exid->flags = be32_to_cpup(p++);
1291
1292 /* Ignore state_protect4_a */
1293 READ_BUF(4);
1294 exid->spa_how = be32_to_cpup(p++);
1295 switch (exid->spa_how) {
1296 case SP4_NONE:
1297 break;
1298 case SP4_MACH_CRED:
1299 /* spo_must_enforce */
1300 READ_BUF(4);
1301 dummy = be32_to_cpup(p++);
1302 READ_BUF(dummy * 4);
1303 p += dummy;
1304
1305 /* spo_must_allow */
1306 READ_BUF(4);
1307 dummy = be32_to_cpup(p++);
1308 READ_BUF(dummy * 4);
1309 p += dummy;
1310 break;
1311 case SP4_SSV:
1312 /* ssp_ops */
1313 READ_BUF(4);
1314 dummy = be32_to_cpup(p++);
1315 READ_BUF(dummy * 4);
1316 p += dummy;
1317
1318 READ_BUF(4);
1319 dummy = be32_to_cpup(p++);
1320 READ_BUF(dummy * 4);
1321 p += dummy;
1322
1323 /* ssp_hash_algs<> */
1324 READ_BUF(4);
1325 tmp = be32_to_cpup(p++);
1326 while (tmp--) {
1327 READ_BUF(4);
1328 dummy = be32_to_cpup(p++);
1329 READ_BUF(dummy);
1330 p += XDR_QUADLEN(dummy);
1331 }
1332
1333 /* ssp_encr_algs<> */
1334 READ_BUF(4);
1335 tmp = be32_to_cpup(p++);
1336 while (tmp--) {
1337 READ_BUF(4);
1338 dummy = be32_to_cpup(p++);
1339 READ_BUF(dummy);
1340 p += XDR_QUADLEN(dummy);
1341 }
1342
1343 /* ssp_window and ssp_num_gss_handles */
1344 READ_BUF(8);
1345 dummy = be32_to_cpup(p++);
1346 dummy = be32_to_cpup(p++);
1347 break;
1348 default:
1349 goto xdr_error;
1350 }
1351
1352 /* Ignore Implementation ID */
1353 READ_BUF(4); /* nfs_impl_id4 array length */
1354 dummy = be32_to_cpup(p++);
1355
1356 if (dummy > 1)
1357 goto xdr_error;
1358
1359 if (dummy == 1) {
1360 /* nii_domain */
1361 READ_BUF(4);
1362 dummy = be32_to_cpup(p++);
1363 READ_BUF(dummy);
1364 p += XDR_QUADLEN(dummy);
1365
1366 /* nii_name */
1367 READ_BUF(4);
1368 dummy = be32_to_cpup(p++);
1369 READ_BUF(dummy);
1370 p += XDR_QUADLEN(dummy);
1371
1372 /* nii_date */
1373 READ_BUF(12);
1374 p += 3;
1375 }
1376 DECODE_TAIL;
1377 }
1378
1379 static __be32
1380 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1381 struct nfsd4_create_session *sess)
1382 {
1383 DECODE_HEAD;
1384 u32 dummy;
1385
1386 READ_BUF(16);
1387 COPYMEM(&sess->clientid, 8);
1388 sess->seqid = be32_to_cpup(p++);
1389 sess->flags = be32_to_cpup(p++);
1390
1391 /* Fore channel attrs */
1392 READ_BUF(28);
1393 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1394 sess->fore_channel.maxreq_sz = be32_to_cpup(p++);
1395 sess->fore_channel.maxresp_sz = be32_to_cpup(p++);
1396 sess->fore_channel.maxresp_cached = be32_to_cpup(p++);
1397 sess->fore_channel.maxops = be32_to_cpup(p++);
1398 sess->fore_channel.maxreqs = be32_to_cpup(p++);
1399 sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++);
1400 if (sess->fore_channel.nr_rdma_attrs == 1) {
1401 READ_BUF(4);
1402 sess->fore_channel.rdma_attrs = be32_to_cpup(p++);
1403 } else if (sess->fore_channel.nr_rdma_attrs > 1) {
1404 dprintk("Too many fore channel attr bitmaps!\n");
1405 goto xdr_error;
1406 }
1407
1408 /* Back channel attrs */
1409 READ_BUF(28);
1410 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1411 sess->back_channel.maxreq_sz = be32_to_cpup(p++);
1412 sess->back_channel.maxresp_sz = be32_to_cpup(p++);
1413 sess->back_channel.maxresp_cached = be32_to_cpup(p++);
1414 sess->back_channel.maxops = be32_to_cpup(p++);
1415 sess->back_channel.maxreqs = be32_to_cpup(p++);
1416 sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++);
1417 if (sess->back_channel.nr_rdma_attrs == 1) {
1418 READ_BUF(4);
1419 sess->back_channel.rdma_attrs = be32_to_cpup(p++);
1420 } else if (sess->back_channel.nr_rdma_attrs > 1) {
1421 dprintk("Too many back channel attr bitmaps!\n");
1422 goto xdr_error;
1423 }
1424
1425 READ_BUF(4);
1426 sess->callback_prog = be32_to_cpup(p++);
1427 nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1428 DECODE_TAIL;
1429 }
1430
1431 static __be32
1432 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1433 struct nfsd4_destroy_session *destroy_session)
1434 {
1435 DECODE_HEAD;
1436 READ_BUF(NFS4_MAX_SESSIONID_LEN);
1437 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1438
1439 DECODE_TAIL;
1440 }
1441
1442 static __be32
1443 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1444 struct nfsd4_free_stateid *free_stateid)
1445 {
1446 DECODE_HEAD;
1447
1448 READ_BUF(sizeof(stateid_t));
1449 free_stateid->fr_stateid.si_generation = be32_to_cpup(p++);
1450 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t));
1451
1452 DECODE_TAIL;
1453 }
1454
1455 static __be32
1456 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1457 struct nfsd4_sequence *seq)
1458 {
1459 DECODE_HEAD;
1460
1461 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16);
1462 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1463 seq->seqid = be32_to_cpup(p++);
1464 seq->slotid = be32_to_cpup(p++);
1465 seq->maxslots = be32_to_cpup(p++);
1466 seq->cachethis = be32_to_cpup(p++);
1467
1468 DECODE_TAIL;
1469 }
1470
1471 static __be32
1472 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1473 {
1474 int i;
1475 __be32 *p, status;
1476 struct nfsd4_test_stateid_id *stateid;
1477
1478 READ_BUF(4);
1479 test_stateid->ts_num_ids = ntohl(*p++);
1480
1481 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1482
1483 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1484 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
1485 if (!stateid) {
1486 status = nfserrno(-ENOMEM);
1487 goto out;
1488 }
1489
1490 INIT_LIST_HEAD(&stateid->ts_id_list);
1491 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1492
1493 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid);
1494 if (status)
1495 goto out;
1496 }
1497
1498 status = 0;
1499 out:
1500 return status;
1501 xdr_error:
1502 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__);
1503 status = nfserr_bad_xdr;
1504 goto out;
1505 }
1506
1507 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc)
1508 {
1509 DECODE_HEAD;
1510
1511 READ_BUF(8);
1512 COPYMEM(&dc->clientid, 8);
1513
1514 DECODE_TAIL;
1515 }
1516
1517 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc)
1518 {
1519 DECODE_HEAD;
1520
1521 READ_BUF(4);
1522 rc->rca_one_fs = be32_to_cpup(p++);
1523
1524 DECODE_TAIL;
1525 }
1526
1527 #ifdef CONFIG_NFSD_PNFS
1528 static __be32
1529 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp,
1530 struct nfsd4_getdeviceinfo *gdev)
1531 {
1532 DECODE_HEAD;
1533 u32 num, i;
1534
1535 READ_BUF(sizeof(struct nfsd4_deviceid) + 3 * 4);
1536 COPYMEM(&gdev->gd_devid, sizeof(struct nfsd4_deviceid));
1537 gdev->gd_layout_type = be32_to_cpup(p++);
1538 gdev->gd_maxcount = be32_to_cpup(p++);
1539 num = be32_to_cpup(p++);
1540 if (num) {
1541 READ_BUF(4 * num);
1542 gdev->gd_notify_types = be32_to_cpup(p++);
1543 for (i = 1; i < num; i++) {
1544 if (be32_to_cpup(p++)) {
1545 status = nfserr_inval;
1546 goto out;
1547 }
1548 }
1549 }
1550 DECODE_TAIL;
1551 }
1552
1553 static __be32
1554 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp,
1555 struct nfsd4_layoutget *lgp)
1556 {
1557 DECODE_HEAD;
1558
1559 READ_BUF(36);
1560 lgp->lg_signal = be32_to_cpup(p++);
1561 lgp->lg_layout_type = be32_to_cpup(p++);
1562 lgp->lg_seg.iomode = be32_to_cpup(p++);
1563 p = xdr_decode_hyper(p, &lgp->lg_seg.offset);
1564 p = xdr_decode_hyper(p, &lgp->lg_seg.length);
1565 p = xdr_decode_hyper(p, &lgp->lg_minlength);
1566
1567 status = nfsd4_decode_stateid(argp, &lgp->lg_sid);
1568 if (status)
1569 return status;
1570
1571 READ_BUF(4);
1572 lgp->lg_maxcount = be32_to_cpup(p++);
1573
1574 DECODE_TAIL;
1575 }
1576
1577 static __be32
1578 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp,
1579 struct nfsd4_layoutcommit *lcp)
1580 {
1581 DECODE_HEAD;
1582 u32 timechange;
1583
1584 READ_BUF(20);
1585 p = xdr_decode_hyper(p, &lcp->lc_seg.offset);
1586 p = xdr_decode_hyper(p, &lcp->lc_seg.length);
1587 lcp->lc_reclaim = be32_to_cpup(p++);
1588
1589 status = nfsd4_decode_stateid(argp, &lcp->lc_sid);
1590 if (status)
1591 return status;
1592
1593 READ_BUF(4);
1594 lcp->lc_newoffset = be32_to_cpup(p++);
1595 if (lcp->lc_newoffset) {
1596 READ_BUF(8);
1597 p = xdr_decode_hyper(p, &lcp->lc_last_wr);
1598 } else
1599 lcp->lc_last_wr = 0;
1600 READ_BUF(4);
1601 timechange = be32_to_cpup(p++);
1602 if (timechange) {
1603 status = nfsd4_decode_time(argp, &lcp->lc_mtime);
1604 if (status)
1605 return status;
1606 } else {
1607 lcp->lc_mtime.tv_nsec = UTIME_NOW;
1608 }
1609 READ_BUF(8);
1610 lcp->lc_layout_type = be32_to_cpup(p++);
1611
1612 /*
1613 * Save the layout update in XDR format and let the layout driver deal
1614 * with it later.
1615 */
1616 lcp->lc_up_len = be32_to_cpup(p++);
1617 if (lcp->lc_up_len > 0) {
1618 READ_BUF(lcp->lc_up_len);
1619 READMEM(lcp->lc_up_layout, lcp->lc_up_len);
1620 }
1621
1622 DECODE_TAIL;
1623 }
1624
1625 static __be32
1626 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp,
1627 struct nfsd4_layoutreturn *lrp)
1628 {
1629 DECODE_HEAD;
1630
1631 READ_BUF(16);
1632 lrp->lr_reclaim = be32_to_cpup(p++);
1633 lrp->lr_layout_type = be32_to_cpup(p++);
1634 lrp->lr_seg.iomode = be32_to_cpup(p++);
1635 lrp->lr_return_type = be32_to_cpup(p++);
1636 if (lrp->lr_return_type == RETURN_FILE) {
1637 READ_BUF(16);
1638 p = xdr_decode_hyper(p, &lrp->lr_seg.offset);
1639 p = xdr_decode_hyper(p, &lrp->lr_seg.length);
1640
1641 status = nfsd4_decode_stateid(argp, &lrp->lr_sid);
1642 if (status)
1643 return status;
1644
1645 READ_BUF(4);
1646 lrp->lrf_body_len = be32_to_cpup(p++);
1647 if (lrp->lrf_body_len > 0) {
1648 READ_BUF(lrp->lrf_body_len);
1649 READMEM(lrp->lrf_body, lrp->lrf_body_len);
1650 }
1651 } else {
1652 lrp->lr_seg.offset = 0;
1653 lrp->lr_seg.length = NFS4_MAX_UINT64;
1654 }
1655
1656 DECODE_TAIL;
1657 }
1658 #endif /* CONFIG_NFSD_PNFS */
1659
1660 static __be32
1661 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp,
1662 struct nfsd4_fallocate *fallocate)
1663 {
1664 DECODE_HEAD;
1665
1666 status = nfsd4_decode_stateid(argp, &fallocate->falloc_stateid);
1667 if (status)
1668 return status;
1669
1670 READ_BUF(16);
1671 p = xdr_decode_hyper(p, &fallocate->falloc_offset);
1672 xdr_decode_hyper(p, &fallocate->falloc_length);
1673
1674 DECODE_TAIL;
1675 }
1676
1677 static __be32
1678 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, struct nfsd4_seek *seek)
1679 {
1680 DECODE_HEAD;
1681
1682 status = nfsd4_decode_stateid(argp, &seek->seek_stateid);
1683 if (status)
1684 return status;
1685
1686 READ_BUF(8 + 4);
1687 p = xdr_decode_hyper(p, &seek->seek_offset);
1688 seek->seek_whence = be32_to_cpup(p);
1689
1690 DECODE_TAIL;
1691 }
1692
1693 static __be32
1694 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
1695 {
1696 return nfs_ok;
1697 }
1698
1699 static __be32
1700 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
1701 {
1702 return nfserr_notsupp;
1703 }
1704
1705 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
1706
1707 static nfsd4_dec nfsd4_dec_ops[] = {
1708 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
1709 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
1710 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
1711 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
1712 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
1713 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
1714 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
1715 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
1716 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
1717 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
1718 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
1719 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
1720 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
1721 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
1722 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1723 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
1724 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
1725 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm,
1726 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
1727 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
1728 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh,
1729 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
1730 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
1731 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
1732 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
1733 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
1734 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
1735 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew,
1736 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
1737 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
1738 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
1739 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
1740 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid,
1741 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
1742 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1743 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
1744 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner,
1745
1746 /* new operations for NFSv4.1 */
1747 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl,
1748 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
1749 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id,
1750 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session,
1751 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session,
1752 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid,
1753 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1754 #ifdef CONFIG_NFSD_PNFS
1755 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_getdeviceinfo,
1756 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
1757 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_layoutcommit,
1758 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_layoutget,
1759 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_layoutreturn,
1760 #else
1761 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp,
1762 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
1763 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp,
1764 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp,
1765 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp,
1766 #endif
1767 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name,
1768 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence,
1769 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp,
1770 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid,
1771 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1772 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid,
1773 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete,
1774
1775 /* new operations for NFSv4.2 */
1776 [OP_ALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate,
1777 [OP_COPY] = (nfsd4_dec)nfsd4_decode_notsupp,
1778 [OP_COPY_NOTIFY] = (nfsd4_dec)nfsd4_decode_notsupp,
1779 [OP_DEALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate,
1780 [OP_IO_ADVISE] = (nfsd4_dec)nfsd4_decode_notsupp,
1781 [OP_LAYOUTERROR] = (nfsd4_dec)nfsd4_decode_notsupp,
1782 [OP_LAYOUTSTATS] = (nfsd4_dec)nfsd4_decode_notsupp,
1783 [OP_OFFLOAD_CANCEL] = (nfsd4_dec)nfsd4_decode_notsupp,
1784 [OP_OFFLOAD_STATUS] = (nfsd4_dec)nfsd4_decode_notsupp,
1785 [OP_READ_PLUS] = (nfsd4_dec)nfsd4_decode_notsupp,
1786 [OP_SEEK] = (nfsd4_dec)nfsd4_decode_seek,
1787 [OP_WRITE_SAME] = (nfsd4_dec)nfsd4_decode_notsupp,
1788 };
1789
1790 static inline bool
1791 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
1792 {
1793 if (op->opnum < FIRST_NFS4_OP)
1794 return false;
1795 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
1796 return false;
1797 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
1798 return false;
1799 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
1800 return false;
1801 return true;
1802 }
1803
1804 static __be32
1805 nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
1806 {
1807 DECODE_HEAD;
1808 struct nfsd4_op *op;
1809 bool cachethis = false;
1810 int auth_slack= argp->rqstp->rq_auth_slack;
1811 int max_reply = auth_slack + 8; /* opcnt, status */
1812 int readcount = 0;
1813 int readbytes = 0;
1814 int i;
1815
1816 READ_BUF(4);
1817 argp->taglen = be32_to_cpup(p++);
1818 READ_BUF(argp->taglen + 8);
1819 SAVEMEM(argp->tag, argp->taglen);
1820 argp->minorversion = be32_to_cpup(p++);
1821 argp->opcnt = be32_to_cpup(p++);
1822 max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2);
1823
1824 if (argp->taglen > NFSD4_MAX_TAGLEN)
1825 goto xdr_error;
1826 if (argp->opcnt > 100)
1827 goto xdr_error;
1828
1829 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
1830 argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
1831 if (!argp->ops) {
1832 argp->ops = argp->iops;
1833 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
1834 goto xdr_error;
1835 }
1836 }
1837
1838 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
1839 argp->opcnt = 0;
1840
1841 for (i = 0; i < argp->opcnt; i++) {
1842 op = &argp->ops[i];
1843 op->replay = NULL;
1844
1845 READ_BUF(4);
1846 op->opnum = be32_to_cpup(p++);
1847
1848 if (nfsd4_opnum_in_range(argp, op))
1849 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
1850 else {
1851 op->opnum = OP_ILLEGAL;
1852 op->status = nfserr_op_illegal;
1853 }
1854 /*
1855 * We'll try to cache the result in the DRC if any one
1856 * op in the compound wants to be cached:
1857 */
1858 cachethis |= nfsd4_cache_this_op(op);
1859
1860 if (op->opnum == OP_READ) {
1861 readcount++;
1862 readbytes += nfsd4_max_reply(argp->rqstp, op);
1863 } else
1864 max_reply += nfsd4_max_reply(argp->rqstp, op);
1865 /*
1866 * OP_LOCK may return a conflicting lock. (Special case
1867 * because it will just skip encoding this if it runs
1868 * out of xdr buffer space, and it is the only operation
1869 * that behaves this way.)
1870 */
1871 if (op->opnum == OP_LOCK)
1872 max_reply += NFS4_OPAQUE_LIMIT;
1873
1874 if (op->status) {
1875 argp->opcnt = i+1;
1876 break;
1877 }
1878 }
1879 /* Sessions make the DRC unnecessary: */
1880 if (argp->minorversion)
1881 cachethis = false;
1882 svc_reserve(argp->rqstp, max_reply + readbytes);
1883 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
1884
1885 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
1886 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags);
1887
1888 DECODE_TAIL;
1889 }
1890
1891 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode)
1892 {
1893 if (IS_I_VERSION(inode)) {
1894 p = xdr_encode_hyper(p, inode->i_version);
1895 } else {
1896 *p++ = cpu_to_be32(stat->ctime.tv_sec);
1897 *p++ = cpu_to_be32(stat->ctime.tv_nsec);
1898 }
1899 return p;
1900 }
1901
1902 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
1903 {
1904 *p++ = cpu_to_be32(c->atomic);
1905 if (c->change_supported) {
1906 p = xdr_encode_hyper(p, c->before_change);
1907 p = xdr_encode_hyper(p, c->after_change);
1908 } else {
1909 *p++ = cpu_to_be32(c->before_ctime_sec);
1910 *p++ = cpu_to_be32(c->before_ctime_nsec);
1911 *p++ = cpu_to_be32(c->after_ctime_sec);
1912 *p++ = cpu_to_be32(c->after_ctime_nsec);
1913 }
1914 return p;
1915 }
1916
1917 /* Encode as an array of strings the string given with components
1918 * separated @sep, escaped with esc_enter and esc_exit.
1919 */
1920 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
1921 char *components, char esc_enter,
1922 char esc_exit)
1923 {
1924 __be32 *p;
1925 __be32 pathlen;
1926 int pathlen_offset;
1927 int strlen, count=0;
1928 char *str, *end, *next;
1929
1930 dprintk("nfsd4_encode_components(%s)\n", components);
1931
1932 pathlen_offset = xdr->buf->len;
1933 p = xdr_reserve_space(xdr, 4);
1934 if (!p)
1935 return nfserr_resource;
1936 p++; /* We will fill this in with @count later */
1937
1938 end = str = components;
1939 while (*end) {
1940 bool found_esc = false;
1941
1942 /* try to parse as esc_start, ..., esc_end, sep */
1943 if (*str == esc_enter) {
1944 for (; *end && (*end != esc_exit); end++)
1945 /* find esc_exit or end of string */;
1946 next = end + 1;
1947 if (*end && (!*next || *next == sep)) {
1948 str++;
1949 found_esc = true;
1950 }
1951 }
1952
1953 if (!found_esc)
1954 for (; *end && (*end != sep); end++)
1955 /* find sep or end of string */;
1956
1957 strlen = end - str;
1958 if (strlen) {
1959 p = xdr_reserve_space(xdr, strlen + 4);
1960 if (!p)
1961 return nfserr_resource;
1962 p = xdr_encode_opaque(p, str, strlen);
1963 count++;
1964 }
1965 else
1966 end++;
1967 if (found_esc)
1968 end = next;
1969
1970 str = end;
1971 }
1972 pathlen = htonl(count);
1973 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
1974 return 0;
1975 }
1976
1977 /* Encode as an array of strings the string given with components
1978 * separated @sep.
1979 */
1980 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
1981 char *components)
1982 {
1983 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
1984 }
1985
1986 /*
1987 * encode a location element of a fs_locations structure
1988 */
1989 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
1990 struct nfsd4_fs_location *location)
1991 {
1992 __be32 status;
1993
1994 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
1995 '[', ']');
1996 if (status)
1997 return status;
1998 status = nfsd4_encode_components(xdr, '/', location->path);
1999 if (status)
2000 return status;
2001 return 0;
2002 }
2003
2004 /*
2005 * Encode a path in RFC3530 'pathname4' format
2006 */
2007 static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
2008 const struct path *root,
2009 const struct path *path)
2010 {
2011 struct path cur = *path;
2012 __be32 *p;
2013 struct dentry **components = NULL;
2014 unsigned int ncomponents = 0;
2015 __be32 err = nfserr_jukebox;
2016
2017 dprintk("nfsd4_encode_components(");
2018
2019 path_get(&cur);
2020 /* First walk the path up to the nfsd root, and store the
2021 * dentries/path components in an array.
2022 */
2023 for (;;) {
2024 if (path_equal(&cur, root))
2025 break;
2026 if (cur.dentry == cur.mnt->mnt_root) {
2027 if (follow_up(&cur))
2028 continue;
2029 goto out_free;
2030 }
2031 if ((ncomponents & 15) == 0) {
2032 struct dentry **new;
2033 new = krealloc(components,
2034 sizeof(*new) * (ncomponents + 16),
2035 GFP_KERNEL);
2036 if (!new)
2037 goto out_free;
2038 components = new;
2039 }
2040 components[ncomponents++] = cur.dentry;
2041 cur.dentry = dget_parent(cur.dentry);
2042 }
2043 err = nfserr_resource;
2044 p = xdr_reserve_space(xdr, 4);
2045 if (!p)
2046 goto out_free;
2047 *p++ = cpu_to_be32(ncomponents);
2048
2049 while (ncomponents) {
2050 struct dentry *dentry = components[ncomponents - 1];
2051 unsigned int len;
2052
2053 spin_lock(&dentry->d_lock);
2054 len = dentry->d_name.len;
2055 p = xdr_reserve_space(xdr, len + 4);
2056 if (!p) {
2057 spin_unlock(&dentry->d_lock);
2058 goto out_free;
2059 }
2060 p = xdr_encode_opaque(p, dentry->d_name.name, len);
2061 dprintk("/%pd", dentry);
2062 spin_unlock(&dentry->d_lock);
2063 dput(dentry);
2064 ncomponents--;
2065 }
2066
2067 err = 0;
2068 out_free:
2069 dprintk(")\n");
2070 while (ncomponents)
2071 dput(components[--ncomponents]);
2072 kfree(components);
2073 path_put(&cur);
2074 return err;
2075 }
2076
2077 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
2078 struct svc_rqst *rqstp, const struct path *path)
2079 {
2080 struct svc_export *exp_ps;
2081 __be32 res;
2082
2083 exp_ps = rqst_find_fsidzero_export(rqstp);
2084 if (IS_ERR(exp_ps))
2085 return nfserrno(PTR_ERR(exp_ps));
2086 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
2087 exp_put(exp_ps);
2088 return res;
2089 }
2090
2091 /*
2092 * encode a fs_locations structure
2093 */
2094 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
2095 struct svc_rqst *rqstp, struct svc_export *exp)
2096 {
2097 __be32 status;
2098 int i;
2099 __be32 *p;
2100 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
2101
2102 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
2103 if (status)
2104 return status;
2105 p = xdr_reserve_space(xdr, 4);
2106 if (!p)
2107 return nfserr_resource;
2108 *p++ = cpu_to_be32(fslocs->locations_count);
2109 for (i=0; i<fslocs->locations_count; i++) {
2110 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
2111 if (status)
2112 return status;
2113 }
2114 return 0;
2115 }
2116
2117 static u32 nfs4_file_type(umode_t mode)
2118 {
2119 switch (mode & S_IFMT) {
2120 case S_IFIFO: return NF4FIFO;
2121 case S_IFCHR: return NF4CHR;
2122 case S_IFDIR: return NF4DIR;
2123 case S_IFBLK: return NF4BLK;
2124 case S_IFLNK: return NF4LNK;
2125 case S_IFREG: return NF4REG;
2126 case S_IFSOCK: return NF4SOCK;
2127 default: return NF4BAD;
2128 };
2129 }
2130
2131 static inline __be32
2132 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2133 struct nfs4_ace *ace)
2134 {
2135 if (ace->whotype != NFS4_ACL_WHO_NAMED)
2136 return nfs4_acl_write_who(xdr, ace->whotype);
2137 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
2138 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
2139 else
2140 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
2141 }
2142
2143 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
2144 FATTR4_WORD0_RDATTR_ERROR)
2145 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2146 #define WORD2_ABSENT_FS_ATTRS 0
2147
2148 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2149 static inline __be32
2150 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2151 void *context, int len)
2152 {
2153 __be32 *p;
2154
2155 p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
2156 if (!p)
2157 return nfserr_resource;
2158
2159 /*
2160 * For now we use a 0 here to indicate the null translation; in
2161 * the future we may place a call to translation code here.
2162 */
2163 *p++ = cpu_to_be32(0); /* lfs */
2164 *p++ = cpu_to_be32(0); /* pi */
2165 p = xdr_encode_opaque(p, context, len);
2166 return 0;
2167 }
2168 #else
2169 static inline __be32
2170 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2171 void *context, int len)
2172 { return 0; }
2173 #endif
2174
2175 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err)
2176 {
2177 /* As per referral draft: */
2178 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2179 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2180 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2181 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2182 *rdattr_err = NFSERR_MOVED;
2183 else
2184 return nfserr_moved;
2185 }
2186 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
2187 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
2188 *bmval2 &= WORD2_ABSENT_FS_ATTRS;
2189 return 0;
2190 }
2191
2192
2193 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat)
2194 {
2195 struct path path = exp->ex_path;
2196 int err;
2197
2198 path_get(&path);
2199 while (follow_up(&path)) {
2200 if (path.dentry != path.mnt->mnt_root)
2201 break;
2202 }
2203 err = vfs_getattr(&path, stat);
2204 path_put(&path);
2205 return err;
2206 }
2207
2208 /*
2209 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2210 * ourselves.
2211 */
2212 static __be32
2213 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2214 struct svc_export *exp,
2215 struct dentry *dentry, u32 *bmval,
2216 struct svc_rqst *rqstp, int ignore_crossmnt)
2217 {
2218 u32 bmval0 = bmval[0];
2219 u32 bmval1 = bmval[1];
2220 u32 bmval2 = bmval[2];
2221 struct kstat stat;
2222 struct svc_fh *tempfh = NULL;
2223 struct kstatfs statfs;
2224 __be32 *p;
2225 int starting_len = xdr->buf->len;
2226 int attrlen_offset;
2227 __be32 attrlen;
2228 u32 dummy;
2229 u64 dummy64;
2230 u32 rdattr_err = 0;
2231 __be32 status;
2232 int err;
2233 struct nfs4_acl *acl = NULL;
2234 void *context = NULL;
2235 int contextlen;
2236 bool contextsupport = false;
2237 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2238 u32 minorversion = resp->cstate.minorversion;
2239 struct path path = {
2240 .mnt = exp->ex_path.mnt,
2241 .dentry = dentry,
2242 };
2243 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2244
2245 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2246 BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion));
2247 BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion));
2248 BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion));
2249
2250 if (exp->ex_fslocs.migrated) {
2251 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err);
2252 if (status)
2253 goto out;
2254 }
2255
2256 err = vfs_getattr(&path, &stat);
2257 if (err)
2258 goto out_nfserr;
2259 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2260 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2261 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2262 FATTR4_WORD1_SPACE_TOTAL))) {
2263 err = vfs_statfs(&path, &statfs);
2264 if (err)
2265 goto out_nfserr;
2266 }
2267 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2268 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2269 status = nfserr_jukebox;
2270 if (!tempfh)
2271 goto out;
2272 fh_init(tempfh, NFS4_FHSIZE);
2273 status = fh_compose(tempfh, exp, dentry, NULL);
2274 if (status)
2275 goto out;
2276 fhp = tempfh;
2277 }
2278 if (bmval0 & FATTR4_WORD0_ACL) {
2279 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2280 if (err == -EOPNOTSUPP)
2281 bmval0 &= ~FATTR4_WORD0_ACL;
2282 else if (err == -EINVAL) {
2283 status = nfserr_attrnotsupp;
2284 goto out;
2285 } else if (err != 0)
2286 goto out_nfserr;
2287 }
2288
2289 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2290 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) ||
2291 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2292 err = security_inode_getsecctx(d_inode(dentry),
2293 &context, &contextlen);
2294 contextsupport = (err == 0);
2295 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2296 if (err == -EOPNOTSUPP)
2297 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2298 else if (err)
2299 goto out_nfserr;
2300 }
2301 }
2302 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2303
2304 if (bmval2) {
2305 p = xdr_reserve_space(xdr, 16);
2306 if (!p)
2307 goto out_resource;
2308 *p++ = cpu_to_be32(3);
2309 *p++ = cpu_to_be32(bmval0);
2310 *p++ = cpu_to_be32(bmval1);
2311 *p++ = cpu_to_be32(bmval2);
2312 } else if (bmval1) {
2313 p = xdr_reserve_space(xdr, 12);
2314 if (!p)
2315 goto out_resource;
2316 *p++ = cpu_to_be32(2);
2317 *p++ = cpu_to_be32(bmval0);
2318 *p++ = cpu_to_be32(bmval1);
2319 } else {
2320 p = xdr_reserve_space(xdr, 8);
2321 if (!p)
2322 goto out_resource;
2323 *p++ = cpu_to_be32(1);
2324 *p++ = cpu_to_be32(bmval0);
2325 }
2326
2327 attrlen_offset = xdr->buf->len;
2328 p = xdr_reserve_space(xdr, 4);
2329 if (!p)
2330 goto out_resource;
2331 p++; /* to be backfilled later */
2332
2333 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2334 u32 word0 = nfsd_suppattrs0(minorversion);
2335 u32 word1 = nfsd_suppattrs1(minorversion);
2336 u32 word2 = nfsd_suppattrs2(minorversion);
2337
2338 if (!IS_POSIXACL(dentry->d_inode))
2339 word0 &= ~FATTR4_WORD0_ACL;
2340 if (!contextsupport)
2341 word2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2342 if (!word2) {
2343 p = xdr_reserve_space(xdr, 12);
2344 if (!p)
2345 goto out_resource;
2346 *p++ = cpu_to_be32(2);
2347 *p++ = cpu_to_be32(word0);
2348 *p++ = cpu_to_be32(word1);
2349 } else {
2350 p = xdr_reserve_space(xdr, 16);
2351 if (!p)
2352 goto out_resource;
2353 *p++ = cpu_to_be32(3);
2354 *p++ = cpu_to_be32(word0);
2355 *p++ = cpu_to_be32(word1);
2356 *p++ = cpu_to_be32(word2);
2357 }
2358 }
2359 if (bmval0 & FATTR4_WORD0_TYPE) {
2360 p = xdr_reserve_space(xdr, 4);
2361 if (!p)
2362 goto out_resource;
2363 dummy = nfs4_file_type(stat.mode);
2364 if (dummy == NF4BAD) {
2365 status = nfserr_serverfault;
2366 goto out;
2367 }
2368 *p++ = cpu_to_be32(dummy);
2369 }
2370 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
2371 p = xdr_reserve_space(xdr, 4);
2372 if (!p)
2373 goto out_resource;
2374 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
2375 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
2376 else
2377 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
2378 NFS4_FH_VOL_RENAME);
2379 }
2380 if (bmval0 & FATTR4_WORD0_CHANGE) {
2381 p = xdr_reserve_space(xdr, 8);
2382 if (!p)
2383 goto out_resource;
2384 p = encode_change(p, &stat, d_inode(dentry));
2385 }
2386 if (bmval0 & FATTR4_WORD0_SIZE) {
2387 p = xdr_reserve_space(xdr, 8);
2388 if (!p)
2389 goto out_resource;
2390 p = xdr_encode_hyper(p, stat.size);
2391 }
2392 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
2393 p = xdr_reserve_space(xdr, 4);
2394 if (!p)
2395 goto out_resource;
2396 *p++ = cpu_to_be32(1);
2397 }
2398 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
2399 p = xdr_reserve_space(xdr, 4);
2400 if (!p)
2401 goto out_resource;
2402 *p++ = cpu_to_be32(1);
2403 }
2404 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
2405 p = xdr_reserve_space(xdr, 4);
2406 if (!p)
2407 goto out_resource;
2408 *p++ = cpu_to_be32(0);
2409 }
2410 if (bmval0 & FATTR4_WORD0_FSID) {
2411 p = xdr_reserve_space(xdr, 16);
2412 if (!p)
2413 goto out_resource;
2414 if (exp->ex_fslocs.migrated) {
2415 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
2416 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
2417 } else switch(fsid_source(fhp)) {
2418 case FSIDSOURCE_FSID:
2419 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
2420 p = xdr_encode_hyper(p, (u64)0);
2421 break;
2422 case FSIDSOURCE_DEV:
2423 *p++ = cpu_to_be32(0);
2424 *p++ = cpu_to_be32(MAJOR(stat.dev));
2425 *p++ = cpu_to_be32(0);
2426 *p++ = cpu_to_be32(MINOR(stat.dev));
2427 break;
2428 case FSIDSOURCE_UUID:
2429 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
2430 EX_UUID_LEN);
2431 break;
2432 }
2433 }
2434 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
2435 p = xdr_reserve_space(xdr, 4);
2436 if (!p)
2437 goto out_resource;
2438 *p++ = cpu_to_be32(0);
2439 }
2440 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
2441 p = xdr_reserve_space(xdr, 4);
2442 if (!p)
2443 goto out_resource;
2444 *p++ = cpu_to_be32(nn->nfsd4_lease);
2445 }
2446 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
2447 p = xdr_reserve_space(xdr, 4);
2448 if (!p)
2449 goto out_resource;
2450 *p++ = cpu_to_be32(rdattr_err);
2451 }
2452 if (bmval0 & FATTR4_WORD0_ACL) {
2453 struct nfs4_ace *ace;
2454
2455 if (acl == NULL) {
2456 p = xdr_reserve_space(xdr, 4);
2457 if (!p)
2458 goto out_resource;
2459
2460 *p++ = cpu_to_be32(0);
2461 goto out_acl;
2462 }
2463 p = xdr_reserve_space(xdr, 4);
2464 if (!p)
2465 goto out_resource;
2466 *p++ = cpu_to_be32(acl->naces);
2467
2468 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
2469 p = xdr_reserve_space(xdr, 4*3);
2470 if (!p)
2471 goto out_resource;
2472 *p++ = cpu_to_be32(ace->type);
2473 *p++ = cpu_to_be32(ace->flag);
2474 *p++ = cpu_to_be32(ace->access_mask &
2475 NFS4_ACE_MASK_ALL);
2476 status = nfsd4_encode_aclname(xdr, rqstp, ace);
2477 if (status)
2478 goto out;
2479 }
2480 }
2481 out_acl:
2482 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
2483 p = xdr_reserve_space(xdr, 4);
2484 if (!p)
2485 goto out_resource;
2486 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ?
2487 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
2488 }
2489 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
2490 p = xdr_reserve_space(xdr, 4);
2491 if (!p)
2492 goto out_resource;
2493 *p++ = cpu_to_be32(1);
2494 }
2495 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
2496 p = xdr_reserve_space(xdr, 4);
2497 if (!p)
2498 goto out_resource;
2499 *p++ = cpu_to_be32(0);
2500 }
2501 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
2502 p = xdr_reserve_space(xdr, 4);
2503 if (!p)
2504 goto out_resource;
2505 *p++ = cpu_to_be32(1);
2506 }
2507 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
2508 p = xdr_reserve_space(xdr, 4);
2509 if (!p)
2510 goto out_resource;
2511 *p++ = cpu_to_be32(1);
2512 }
2513 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
2514 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
2515 if (!p)
2516 goto out_resource;
2517 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base,
2518 fhp->fh_handle.fh_size);
2519 }
2520 if (bmval0 & FATTR4_WORD0_FILEID) {
2521 p = xdr_reserve_space(xdr, 8);
2522 if (!p)
2523 goto out_resource;
2524 p = xdr_encode_hyper(p, stat.ino);
2525 }
2526 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
2527 p = xdr_reserve_space(xdr, 8);
2528 if (!p)
2529 goto out_resource;
2530 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
2531 }
2532 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
2533 p = xdr_reserve_space(xdr, 8);
2534 if (!p)
2535 goto out_resource;
2536 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
2537 }
2538 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
2539 p = xdr_reserve_space(xdr, 8);
2540 if (!p)
2541 goto out_resource;
2542 p = xdr_encode_hyper(p, (u64) statfs.f_files);
2543 }
2544 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
2545 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
2546 if (status)
2547 goto out;
2548 }
2549 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
2550 p = xdr_reserve_space(xdr, 4);
2551 if (!p)
2552 goto out_resource;
2553 *p++ = cpu_to_be32(1);
2554 }
2555 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
2556 p = xdr_reserve_space(xdr, 8);
2557 if (!p)
2558 goto out_resource;
2559 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
2560 }
2561 if (bmval0 & FATTR4_WORD0_MAXLINK) {
2562 p = xdr_reserve_space(xdr, 4);
2563 if (!p)
2564 goto out_resource;
2565 *p++ = cpu_to_be32(255);
2566 }
2567 if (bmval0 & FATTR4_WORD0_MAXNAME) {
2568 p = xdr_reserve_space(xdr, 4);
2569 if (!p)
2570 goto out_resource;
2571 *p++ = cpu_to_be32(statfs.f_namelen);
2572 }
2573 if (bmval0 & FATTR4_WORD0_MAXREAD) {
2574 p = xdr_reserve_space(xdr, 8);
2575 if (!p)
2576 goto out_resource;
2577 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
2578 }
2579 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
2580 p = xdr_reserve_space(xdr, 8);
2581 if (!p)
2582 goto out_resource;
2583 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
2584 }
2585 if (bmval1 & FATTR4_WORD1_MODE) {
2586 p = xdr_reserve_space(xdr, 4);
2587 if (!p)
2588 goto out_resource;
2589 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
2590 }
2591 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
2592 p = xdr_reserve_space(xdr, 4);
2593 if (!p)
2594 goto out_resource;
2595 *p++ = cpu_to_be32(1);
2596 }
2597 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
2598 p = xdr_reserve_space(xdr, 4);
2599 if (!p)
2600 goto out_resource;
2601 *p++ = cpu_to_be32(stat.nlink);
2602 }
2603 if (bmval1 & FATTR4_WORD1_OWNER) {
2604 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
2605 if (status)
2606 goto out;
2607 }
2608 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
2609 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
2610 if (status)
2611 goto out;
2612 }
2613 if (bmval1 & FATTR4_WORD1_RAWDEV) {
2614 p = xdr_reserve_space(xdr, 8);
2615 if (!p)
2616 goto out_resource;
2617 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
2618 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
2619 }
2620 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
2621 p = xdr_reserve_space(xdr, 8);
2622 if (!p)
2623 goto out_resource;
2624 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
2625 p = xdr_encode_hyper(p, dummy64);
2626 }
2627 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
2628 p = xdr_reserve_space(xdr, 8);
2629 if (!p)
2630 goto out_resource;
2631 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
2632 p = xdr_encode_hyper(p, dummy64);
2633 }
2634 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
2635 p = xdr_reserve_space(xdr, 8);
2636 if (!p)
2637 goto out_resource;
2638 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
2639 p = xdr_encode_hyper(p, dummy64);
2640 }
2641 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
2642 p = xdr_reserve_space(xdr, 8);
2643 if (!p)
2644 goto out_resource;
2645 dummy64 = (u64)stat.blocks << 9;
2646 p = xdr_encode_hyper(p, dummy64);
2647 }
2648 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
2649 p = xdr_reserve_space(xdr, 12);
2650 if (!p)
2651 goto out_resource;
2652 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
2653 *p++ = cpu_to_be32(stat.atime.tv_nsec);
2654 }
2655 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
2656 p = xdr_reserve_space(xdr, 12);
2657 if (!p)
2658 goto out_resource;
2659 *p++ = cpu_to_be32(0);
2660 *p++ = cpu_to_be32(1);
2661 *p++ = cpu_to_be32(0);
2662 }
2663 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
2664 p = xdr_reserve_space(xdr, 12);
2665 if (!p)
2666 goto out_resource;
2667 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
2668 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
2669 }
2670 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
2671 p = xdr_reserve_space(xdr, 12);
2672 if (!p)
2673 goto out_resource;
2674 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
2675 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
2676 }
2677 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
2678 p = xdr_reserve_space(xdr, 8);
2679 if (!p)
2680 goto out_resource;
2681 /*
2682 * Get parent's attributes if not ignoring crossmount
2683 * and this is the root of a cross-mounted filesystem.
2684 */
2685 if (ignore_crossmnt == 0 &&
2686 dentry == exp->ex_path.mnt->mnt_root)
2687 get_parent_attributes(exp, &stat);
2688 p = xdr_encode_hyper(p, stat.ino);
2689 }
2690 #ifdef CONFIG_NFSD_PNFS
2691 if ((bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) ||
2692 (bmval2 & FATTR4_WORD2_LAYOUT_TYPES)) {
2693 if (exp->ex_layout_type) {
2694 p = xdr_reserve_space(xdr, 8);
2695 if (!p)
2696 goto out_resource;
2697 *p++ = cpu_to_be32(1);
2698 *p++ = cpu_to_be32(exp->ex_layout_type);
2699 } else {
2700 p = xdr_reserve_space(xdr, 4);
2701 if (!p)
2702 goto out_resource;
2703 *p++ = cpu_to_be32(0);
2704 }
2705 }
2706
2707 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) {
2708 p = xdr_reserve_space(xdr, 4);
2709 if (!p)
2710 goto out_resource;
2711 *p++ = cpu_to_be32(stat.blksize);
2712 }
2713 #endif /* CONFIG_NFSD_PNFS */
2714 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2715 status = nfsd4_encode_security_label(xdr, rqstp, context,
2716 contextlen);
2717 if (status)
2718 goto out;
2719 }
2720 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
2721 p = xdr_reserve_space(xdr, 16);
2722 if (!p)
2723 goto out_resource;
2724 *p++ = cpu_to_be32(3);
2725 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0);
2726 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1);
2727 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2);
2728 }
2729
2730 attrlen = htonl(xdr->buf->len - attrlen_offset - 4);
2731 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4);
2732 status = nfs_ok;
2733
2734 out:
2735 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2736 if (context)
2737 security_release_secctx(context, contextlen);
2738 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2739 kfree(acl);
2740 if (tempfh) {
2741 fh_put(tempfh);
2742 kfree(tempfh);
2743 }
2744 if (status)
2745 xdr_truncate_encode(xdr, starting_len);
2746 return status;
2747 out_nfserr:
2748 status = nfserrno(err);
2749 goto out;
2750 out_resource:
2751 status = nfserr_resource;
2752 goto out;
2753 }
2754
2755 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
2756 struct xdr_buf *buf, __be32 *p, int bytes)
2757 {
2758 xdr->scratch.iov_len = 0;
2759 memset(buf, 0, sizeof(struct xdr_buf));
2760 buf->head[0].iov_base = p;
2761 buf->head[0].iov_len = 0;
2762 buf->len = 0;
2763 xdr->buf = buf;
2764 xdr->iov = buf->head;
2765 xdr->p = p;
2766 xdr->end = (void *)p + bytes;
2767 buf->buflen = bytes;
2768 }
2769
2770 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
2771 struct svc_fh *fhp, struct svc_export *exp,
2772 struct dentry *dentry, u32 *bmval,
2773 struct svc_rqst *rqstp, int ignore_crossmnt)
2774 {
2775 struct xdr_buf dummy;
2776 struct xdr_stream xdr;
2777 __be32 ret;
2778
2779 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
2780 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
2781 ignore_crossmnt);
2782 *p = xdr.p;
2783 return ret;
2784 }
2785
2786 static inline int attributes_need_mount(u32 *bmval)
2787 {
2788 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
2789 return 1;
2790 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
2791 return 1;
2792 return 0;
2793 }
2794
2795 static __be32
2796 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
2797 const char *name, int namlen)
2798 {
2799 struct svc_export *exp = cd->rd_fhp->fh_export;
2800 struct dentry *dentry;
2801 __be32 nfserr;
2802 int ignore_crossmnt = 0;
2803
2804 dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen);
2805 if (IS_ERR(dentry))
2806 return nfserrno(PTR_ERR(dentry));
2807 if (d_really_is_negative(dentry)) {
2808 /*
2809 * nfsd_buffered_readdir drops the i_mutex between
2810 * readdir and calling this callback, leaving a window
2811 * where this directory entry could have gone away.
2812 */
2813 dput(dentry);
2814 return nfserr_noent;
2815 }
2816
2817 exp_get(exp);
2818 /*
2819 * In the case of a mountpoint, the client may be asking for
2820 * attributes that are only properties of the underlying filesystem
2821 * as opposed to the cross-mounted file system. In such a case,
2822 * we will not follow the cross mount and will fill the attribtutes
2823 * directly from the mountpoint dentry.
2824 */
2825 if (nfsd_mountpoint(dentry, exp)) {
2826 int err;
2827
2828 if (!(exp->ex_flags & NFSEXP_V4ROOT)
2829 && !attributes_need_mount(cd->rd_bmval)) {
2830 ignore_crossmnt = 1;
2831 goto out_encode;
2832 }
2833 /*
2834 * Why the heck aren't we just using nfsd_lookup??
2835 * Different "."/".." handling? Something else?
2836 * At least, add a comment here to explain....
2837 */
2838 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
2839 if (err) {
2840 nfserr = nfserrno(err);
2841 goto out_put;
2842 }
2843 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
2844 if (nfserr)
2845 goto out_put;
2846
2847 }
2848 out_encode:
2849 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
2850 cd->rd_rqstp, ignore_crossmnt);
2851 out_put:
2852 dput(dentry);
2853 exp_put(exp);
2854 return nfserr;
2855 }
2856
2857 static __be32 *
2858 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
2859 {
2860 __be32 *p;
2861
2862 p = xdr_reserve_space(xdr, 20);
2863 if (!p)
2864 return NULL;
2865 *p++ = htonl(2);
2866 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
2867 *p++ = htonl(0); /* bmval1 */
2868
2869 *p++ = htonl(4); /* attribute length */
2870 *p++ = nfserr; /* no htonl */
2871 return p;
2872 }
2873
2874 static int
2875 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
2876 loff_t offset, u64 ino, unsigned int d_type)
2877 {
2878 struct readdir_cd *ccd = ccdv;
2879 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
2880 struct xdr_stream *xdr = cd->xdr;
2881 int start_offset = xdr->buf->len;
2882 int cookie_offset;
2883 u32 name_and_cookie;
2884 int entry_bytes;
2885 __be32 nfserr = nfserr_toosmall;
2886 __be64 wire_offset;
2887 __be32 *p;
2888
2889 /* In nfsv4, "." and ".." never make it onto the wire.. */
2890 if (name && isdotent(name, namlen)) {
2891 cd->common.err = nfs_ok;
2892 return 0;
2893 }
2894
2895 if (cd->cookie_offset) {
2896 wire_offset = cpu_to_be64(offset);
2897 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
2898 &wire_offset, 8);
2899 }
2900
2901 p = xdr_reserve_space(xdr, 4);
2902 if (!p)
2903 goto fail;
2904 *p++ = xdr_one; /* mark entry present */
2905 cookie_offset = xdr->buf->len;
2906 p = xdr_reserve_space(xdr, 3*4 + namlen);
2907 if (!p)
2908 goto fail;
2909 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */
2910 p = xdr_encode_array(p, name, namlen); /* name length & name */
2911
2912 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
2913 switch (nfserr) {
2914 case nfs_ok:
2915 break;
2916 case nfserr_resource:
2917 nfserr = nfserr_toosmall;
2918 goto fail;
2919 case nfserr_noent:
2920 xdr_truncate_encode(xdr, start_offset);
2921 goto skip_entry;
2922 default:
2923 /*
2924 * If the client requested the RDATTR_ERROR attribute,
2925 * we stuff the error code into this attribute
2926 * and continue. If this attribute was not requested,
2927 * then in accordance with the spec, we fail the
2928 * entire READDIR operation(!)
2929 */
2930 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
2931 goto fail;
2932 p = nfsd4_encode_rdattr_error(xdr, nfserr);
2933 if (p == NULL) {
2934 nfserr = nfserr_toosmall;
2935 goto fail;
2936 }
2937 }
2938 nfserr = nfserr_toosmall;
2939 entry_bytes = xdr->buf->len - start_offset;
2940 if (entry_bytes > cd->rd_maxcount)
2941 goto fail;
2942 cd->rd_maxcount -= entry_bytes;
2943 /*
2944 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", so
2945 * let's always let through the first entry, at least:
2946 */
2947 if (!cd->rd_dircount)
2948 goto fail;
2949 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
2950 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
2951 goto fail;
2952 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
2953
2954 cd->cookie_offset = cookie_offset;
2955 skip_entry:
2956 cd->common.err = nfs_ok;
2957 return 0;
2958 fail:
2959 xdr_truncate_encode(xdr, start_offset);
2960 cd->common.err = nfserr;
2961 return -EINVAL;
2962 }
2963
2964 static __be32
2965 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
2966 {
2967 __be32 *p;
2968
2969 p = xdr_reserve_space(xdr, sizeof(stateid_t));
2970 if (!p)
2971 return nfserr_resource;
2972 *p++ = cpu_to_be32(sid->si_generation);
2973 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
2974 sizeof(stateid_opaque_t));
2975 return 0;
2976 }
2977
2978 static __be32
2979 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
2980 {
2981 struct xdr_stream *xdr = &resp->xdr;
2982 __be32 *p;
2983
2984 if (!nfserr) {
2985 p = xdr_reserve_space(xdr, 8);
2986 if (!p)
2987 return nfserr_resource;
2988 *p++ = cpu_to_be32(access->ac_supported);
2989 *p++ = cpu_to_be32(access->ac_resp_access);
2990 }
2991 return nfserr;
2992 }
2993
2994 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
2995 {
2996 struct xdr_stream *xdr = &resp->xdr;
2997 __be32 *p;
2998
2999 if (!nfserr) {
3000 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
3001 if (!p)
3002 return nfserr_resource;
3003 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
3004 NFS4_MAX_SESSIONID_LEN);
3005 *p++ = cpu_to_be32(bcts->dir);
3006 /* Sorry, we do not yet support RDMA over 4.1: */
3007 *p++ = cpu_to_be32(0);
3008 }
3009 return nfserr;
3010 }
3011
3012 static __be32
3013 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
3014 {
3015 struct xdr_stream *xdr = &resp->xdr;
3016
3017 if (!nfserr)
3018 nfserr = nfsd4_encode_stateid(xdr, &close->cl_stateid);
3019
3020 return nfserr;
3021 }
3022
3023
3024 static __be32
3025 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
3026 {
3027 struct xdr_stream *xdr = &resp->xdr;
3028 __be32 *p;
3029
3030 if (!nfserr) {
3031 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3032 if (!p)
3033 return nfserr_resource;
3034 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
3035 NFS4_VERIFIER_SIZE);
3036 }
3037 return nfserr;
3038 }
3039
3040 static __be32
3041 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
3042 {
3043 struct xdr_stream *xdr = &resp->xdr;
3044 __be32 *p;
3045
3046 if (!nfserr) {
3047 p = xdr_reserve_space(xdr, 32);
3048 if (!p)
3049 return nfserr_resource;
3050 p = encode_cinfo(p, &create->cr_cinfo);
3051 *p++ = cpu_to_be32(2);
3052 *p++ = cpu_to_be32(create->cr_bmval[0]);
3053 *p++ = cpu_to_be32(create->cr_bmval[1]);
3054 }
3055 return nfserr;
3056 }
3057
3058 static __be32
3059 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
3060 {
3061 struct svc_fh *fhp = getattr->ga_fhp;
3062 struct xdr_stream *xdr = &resp->xdr;
3063
3064 if (nfserr)
3065 return nfserr;
3066
3067 nfserr = nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
3068 getattr->ga_bmval,
3069 resp->rqstp, 0);
3070 return nfserr;
3071 }
3072
3073 static __be32
3074 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
3075 {
3076 struct xdr_stream *xdr = &resp->xdr;
3077 struct svc_fh *fhp = *fhpp;
3078 unsigned int len;
3079 __be32 *p;
3080
3081 if (!nfserr) {
3082 len = fhp->fh_handle.fh_size;
3083 p = xdr_reserve_space(xdr, len + 4);
3084 if (!p)
3085 return nfserr_resource;
3086 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len);
3087 }
3088 return nfserr;
3089 }
3090
3091 /*
3092 * Including all fields other than the name, a LOCK4denied structure requires
3093 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
3094 */
3095 static __be32
3096 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
3097 {
3098 struct xdr_netobj *conf = &ld->ld_owner;
3099 __be32 *p;
3100
3101 again:
3102 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
3103 if (!p) {
3104 /*
3105 * Don't fail to return the result just because we can't
3106 * return the conflicting open:
3107 */
3108 if (conf->len) {
3109 kfree(conf->data);
3110 conf->len = 0;
3111 conf->data = NULL;
3112 goto again;
3113 }
3114 return nfserr_resource;
3115 }
3116 p = xdr_encode_hyper(p, ld->ld_start);
3117 p = xdr_encode_hyper(p, ld->ld_length);
3118 *p++ = cpu_to_be32(ld->ld_type);
3119 if (conf->len) {
3120 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
3121 p = xdr_encode_opaque(p, conf->data, conf->len);
3122 kfree(conf->data);
3123 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
3124 p = xdr_encode_hyper(p, (u64)0); /* clientid */
3125 *p++ = cpu_to_be32(0); /* length of owner name */
3126 }
3127 return nfserr_denied;
3128 }
3129
3130 static __be32
3131 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
3132 {
3133 struct xdr_stream *xdr = &resp->xdr;
3134
3135 if (!nfserr)
3136 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
3137 else if (nfserr == nfserr_denied)
3138 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
3139
3140 return nfserr;
3141 }
3142
3143 static __be32
3144 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
3145 {
3146 struct xdr_stream *xdr = &resp->xdr;
3147
3148 if (nfserr == nfserr_denied)
3149 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
3150 return nfserr;
3151 }
3152
3153 static __be32
3154 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
3155 {
3156 struct xdr_stream *xdr = &resp->xdr;
3157
3158 if (!nfserr)
3159 nfserr = nfsd4_encode_stateid(xdr, &locku->lu_stateid);
3160
3161 return nfserr;
3162 }
3163
3164
3165 static __be32
3166 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
3167 {
3168 struct xdr_stream *xdr = &resp->xdr;
3169 __be32 *p;
3170
3171 if (!nfserr) {
3172 p = xdr_reserve_space(xdr, 20);
3173 if (!p)
3174 return nfserr_resource;
3175 p = encode_cinfo(p, &link->li_cinfo);
3176 }
3177 return nfserr;
3178 }
3179
3180
3181 static __be32
3182 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
3183 {
3184 struct xdr_stream *xdr = &resp->xdr;
3185 __be32 *p;
3186
3187 if (nfserr)
3188 goto out;
3189
3190 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
3191 if (nfserr)
3192 goto out;
3193 p = xdr_reserve_space(xdr, 40);
3194 if (!p)
3195 return nfserr_resource;
3196 p = encode_cinfo(p, &open->op_cinfo);
3197 *p++ = cpu_to_be32(open->op_rflags);
3198 *p++ = cpu_to_be32(2);
3199 *p++ = cpu_to_be32(open->op_bmval[0]);
3200 *p++ = cpu_to_be32(open->op_bmval[1]);
3201 *p++ = cpu_to_be32(open->op_delegate_type);
3202
3203 switch (open->op_delegate_type) {
3204 case NFS4_OPEN_DELEGATE_NONE:
3205 break;
3206 case NFS4_OPEN_DELEGATE_READ:
3207 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3208 if (nfserr)
3209 return nfserr;
3210 p = xdr_reserve_space(xdr, 20);
3211 if (!p)
3212 return nfserr_resource;
3213 *p++ = cpu_to_be32(open->op_recall);
3214
3215 /*
3216 * TODO: ACE's in delegations
3217 */
3218 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3219 *p++ = cpu_to_be32(0);
3220 *p++ = cpu_to_be32(0);
3221 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3222 break;
3223 case NFS4_OPEN_DELEGATE_WRITE:
3224 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3225 if (nfserr)
3226 return nfserr;
3227 p = xdr_reserve_space(xdr, 32);
3228 if (!p)
3229 return nfserr_resource;
3230 *p++ = cpu_to_be32(0);
3231
3232 /*
3233 * TODO: space_limit's in delegations
3234 */
3235 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3236 *p++ = cpu_to_be32(~(u32)0);
3237 *p++ = cpu_to_be32(~(u32)0);
3238
3239 /*
3240 * TODO: ACE's in delegations
3241 */
3242 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3243 *p++ = cpu_to_be32(0);
3244 *p++ = cpu_to_be32(0);
3245 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3246 break;
3247 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3248 switch (open->op_why_no_deleg) {
3249 case WND4_CONTENTION:
3250 case WND4_RESOURCE:
3251 p = xdr_reserve_space(xdr, 8);
3252 if (!p)
3253 return nfserr_resource;
3254 *p++ = cpu_to_be32(open->op_why_no_deleg);
3255 /* deleg signaling not supported yet: */
3256 *p++ = cpu_to_be32(0);
3257 break;
3258 default:
3259 p = xdr_reserve_space(xdr, 4);
3260 if (!p)
3261 return nfserr_resource;
3262 *p++ = cpu_to_be32(open->op_why_no_deleg);
3263 }
3264 break;
3265 default:
3266 BUG();
3267 }
3268 /* XXX save filehandle here */
3269 out:
3270 return nfserr;
3271 }
3272
3273 static __be32
3274 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
3275 {
3276 struct xdr_stream *xdr = &resp->xdr;
3277
3278 if (!nfserr)
3279 nfserr = nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
3280
3281 return nfserr;
3282 }
3283
3284 static __be32
3285 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
3286 {
3287 struct xdr_stream *xdr = &resp->xdr;
3288
3289 if (!nfserr)
3290 nfserr = nfsd4_encode_stateid(xdr, &od->od_stateid);
3291
3292 return nfserr;
3293 }
3294
3295 static __be32 nfsd4_encode_splice_read(
3296 struct nfsd4_compoundres *resp,
3297 struct nfsd4_read *read,
3298 struct file *file, unsigned long maxcount)
3299 {
3300 struct xdr_stream *xdr = &resp->xdr;
3301 struct xdr_buf *buf = xdr->buf;
3302 u32 eof;
3303 int space_left;
3304 __be32 nfserr;
3305 __be32 *p = xdr->p - 2;
3306
3307 /* Make sure there will be room for padding if needed */
3308 if (xdr->end - xdr->p < 1)
3309 return nfserr_resource;
3310
3311 nfserr = nfsd_splice_read(read->rd_rqstp, file,
3312 read->rd_offset, &maxcount);
3313 if (nfserr) {
3314 /*
3315 * nfsd_splice_actor may have already messed with the
3316 * page length; reset it so as not to confuse
3317 * xdr_truncate_encode:
3318 */
3319 buf->page_len = 0;
3320 return nfserr;
3321 }
3322
3323 eof = (read->rd_offset + maxcount >=
3324 d_inode(read->rd_fhp->fh_dentry)->i_size);
3325
3326 *(p++) = htonl(eof);
3327 *(p++) = htonl(maxcount);
3328
3329 buf->page_len = maxcount;
3330 buf->len += maxcount;
3331 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1)
3332 / PAGE_SIZE;
3333
3334 /* Use rest of head for padding and remaining ops: */
3335 buf->tail[0].iov_base = xdr->p;
3336 buf->tail[0].iov_len = 0;
3337 xdr->iov = buf->tail;
3338 if (maxcount&3) {
3339 int pad = 4 - (maxcount&3);
3340
3341 *(xdr->p++) = 0;
3342
3343 buf->tail[0].iov_base += maxcount&3;
3344 buf->tail[0].iov_len = pad;
3345 buf->len += pad;
3346 }
3347
3348 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
3349 buf->buflen - buf->len);
3350 buf->buflen = buf->len + space_left;
3351 xdr->end = (__be32 *)((void *)xdr->end + space_left);
3352
3353 return 0;
3354 }
3355
3356 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
3357 struct nfsd4_read *read,
3358 struct file *file, unsigned long maxcount)
3359 {
3360 struct xdr_stream *xdr = &resp->xdr;
3361 u32 eof;
3362 int v;
3363 int starting_len = xdr->buf->len - 8;
3364 long len;
3365 int thislen;
3366 __be32 nfserr;
3367 __be32 tmp;
3368 __be32 *p;
3369 u32 zzz = 0;
3370 int pad;
3371
3372 len = maxcount;
3373 v = 0;
3374
3375 thislen = min_t(long, len, ((void *)xdr->end - (void *)xdr->p));
3376 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3377 WARN_ON_ONCE(!p);
3378 resp->rqstp->rq_vec[v].iov_base = p;
3379 resp->rqstp->rq_vec[v].iov_len = thislen;
3380 v++;
3381 len -= thislen;
3382
3383 while (len) {
3384 thislen = min_t(long, len, PAGE_SIZE);
3385 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3386 WARN_ON_ONCE(!p);
3387 resp->rqstp->rq_vec[v].iov_base = p;
3388 resp->rqstp->rq_vec[v].iov_len = thislen;
3389 v++;
3390 len -= thislen;
3391 }
3392 read->rd_vlen = v;
3393
3394 nfserr = nfsd_readv(file, read->rd_offset, resp->rqstp->rq_vec,
3395 read->rd_vlen, &maxcount);
3396 if (nfserr)
3397 return nfserr;
3398 xdr_truncate_encode(xdr, starting_len + 8 + ((maxcount+3)&~3));
3399
3400 eof = (read->rd_offset + maxcount >=
3401 d_inode(read->rd_fhp->fh_dentry)->i_size);
3402
3403 tmp = htonl(eof);
3404 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4);
3405 tmp = htonl(maxcount);
3406 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
3407
3408 pad = (maxcount&3) ? 4 - (maxcount&3) : 0;
3409 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount,
3410 &zzz, pad);
3411 return 0;
3412
3413 }
3414
3415 static __be32
3416 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
3417 struct nfsd4_read *read)
3418 {
3419 unsigned long maxcount;
3420 struct xdr_stream *xdr = &resp->xdr;
3421 struct file *file = read->rd_filp;
3422 int starting_len = xdr->buf->len;
3423 struct raparms *ra = NULL;
3424 __be32 *p;
3425
3426 if (nfserr)
3427 goto out;
3428
3429 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
3430 if (!p) {
3431 WARN_ON_ONCE(test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags));
3432 nfserr = nfserr_resource;
3433 goto out;
3434 }
3435 if (resp->xdr.buf->page_len &&
3436 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) {
3437 WARN_ON_ONCE(1);
3438 nfserr = nfserr_resource;
3439 goto out;
3440 }
3441 xdr_commit_encode(xdr);
3442
3443 maxcount = svc_max_payload(resp->rqstp);
3444 maxcount = min_t(unsigned long, maxcount,
3445 (xdr->buf->buflen - xdr->buf->len));
3446 maxcount = min_t(unsigned long, maxcount, read->rd_length);
3447
3448 if (read->rd_tmp_file)
3449 ra = nfsd_init_raparms(file);
3450
3451 if (file->f_op->splice_read &&
3452 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags))
3453 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
3454 else
3455 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
3456
3457 if (ra)
3458 nfsd_put_raparams(file, ra);
3459
3460 if (nfserr)
3461 xdr_truncate_encode(xdr, starting_len);
3462
3463 out:
3464 if (file)
3465 fput(file);
3466 return nfserr;
3467 }
3468
3469 static __be32
3470 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
3471 {
3472 int maxcount;
3473 __be32 wire_count;
3474 int zero = 0;
3475 struct xdr_stream *xdr = &resp->xdr;
3476 int length_offset = xdr->buf->len;
3477 __be32 *p;
3478
3479 if (nfserr)
3480 return nfserr;
3481
3482 p = xdr_reserve_space(xdr, 4);
3483 if (!p)
3484 return nfserr_resource;
3485 maxcount = PAGE_SIZE;
3486
3487 p = xdr_reserve_space(xdr, maxcount);
3488 if (!p)
3489 return nfserr_resource;
3490 /*
3491 * XXX: By default, the ->readlink() VFS op will truncate symlinks
3492 * if they would overflow the buffer. Is this kosher in NFSv4? If
3493 * not, one easy fix is: if ->readlink() precisely fills the buffer,
3494 * assume that truncation occurred, and return NFS4ERR_RESOURCE.
3495 */
3496 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
3497 (char *)p, &maxcount);
3498 if (nfserr == nfserr_isdir)
3499 nfserr = nfserr_inval;
3500 if (nfserr) {
3501 xdr_truncate_encode(xdr, length_offset);
3502 return nfserr;
3503 }
3504
3505 wire_count = htonl(maxcount);
3506 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4);
3507 xdr_truncate_encode(xdr, length_offset + 4 + ALIGN(maxcount, 4));
3508 if (maxcount & 3)
3509 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount,
3510 &zero, 4 - (maxcount&3));
3511 return 0;
3512 }
3513
3514 static __be32
3515 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
3516 {
3517 int maxcount;
3518 int bytes_left;
3519 loff_t offset;
3520 __be64 wire_offset;
3521 struct xdr_stream *xdr = &resp->xdr;
3522 int starting_len = xdr->buf->len;
3523 __be32 *p;
3524
3525 if (nfserr)
3526 return nfserr;
3527
3528 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3529 if (!p)
3530 return nfserr_resource;
3531
3532 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
3533 *p++ = cpu_to_be32(0);
3534 *p++ = cpu_to_be32(0);
3535 resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p)
3536 - (char *)resp->xdr.buf->head[0].iov_base;
3537
3538 /*
3539 * Number of bytes left for directory entries allowing for the
3540 * final 8 bytes of the readdir and a following failed op:
3541 */
3542 bytes_left = xdr->buf->buflen - xdr->buf->len
3543 - COMPOUND_ERR_SLACK_SPACE - 8;
3544 if (bytes_left < 0) {
3545 nfserr = nfserr_resource;
3546 goto err_no_verf;
3547 }
3548 maxcount = min_t(u32, readdir->rd_maxcount, INT_MAX);
3549 /*
3550 * Note the rfc defines rd_maxcount as the size of the
3551 * READDIR4resok structure, which includes the verifier above
3552 * and the 8 bytes encoded at the end of this function:
3553 */
3554 if (maxcount < 16) {
3555 nfserr = nfserr_toosmall;
3556 goto err_no_verf;
3557 }
3558 maxcount = min_t(int, maxcount-16, bytes_left);
3559
3560 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */
3561 if (!readdir->rd_dircount)
3562 readdir->rd_dircount = INT_MAX;
3563
3564 readdir->xdr = xdr;
3565 readdir->rd_maxcount = maxcount;
3566 readdir->common.err = 0;
3567 readdir->cookie_offset = 0;
3568
3569 offset = readdir->rd_cookie;
3570 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
3571 &offset,
3572 &readdir->common, nfsd4_encode_dirent);
3573 if (nfserr == nfs_ok &&
3574 readdir->common.err == nfserr_toosmall &&
3575 xdr->buf->len == starting_len + 8) {
3576 /* nothing encoded; which limit did we hit?: */
3577 if (maxcount - 16 < bytes_left)
3578 /* It was the fault of rd_maxcount: */
3579 nfserr = nfserr_toosmall;
3580 else
3581 /* We ran out of buffer space: */
3582 nfserr = nfserr_resource;
3583 }
3584 if (nfserr)
3585 goto err_no_verf;
3586
3587 if (readdir->cookie_offset) {
3588 wire_offset = cpu_to_be64(offset);
3589 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
3590 &wire_offset, 8);
3591 }
3592
3593 p = xdr_reserve_space(xdr, 8);
3594 if (!p) {
3595 WARN_ON_ONCE(1);
3596 goto err_no_verf;
3597 }
3598 *p++ = 0; /* no more entries */
3599 *p++ = htonl(readdir->common.err == nfserr_eof);
3600
3601 return 0;
3602 err_no_verf:
3603 xdr_truncate_encode(xdr, starting_len);
3604 return nfserr;
3605 }
3606
3607 static __be32
3608 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
3609 {
3610 struct xdr_stream *xdr = &resp->xdr;
3611 __be32 *p;
3612
3613 if (!nfserr) {
3614 p = xdr_reserve_space(xdr, 20);
3615 if (!p)
3616 return nfserr_resource;
3617 p = encode_cinfo(p, &remove->rm_cinfo);
3618 }
3619 return nfserr;
3620 }
3621
3622 static __be32
3623 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
3624 {
3625 struct xdr_stream *xdr = &resp->xdr;
3626 __be32 *p;
3627
3628 if (!nfserr) {
3629 p = xdr_reserve_space(xdr, 40);
3630 if (!p)
3631 return nfserr_resource;
3632 p = encode_cinfo(p, &rename->rn_sinfo);
3633 p = encode_cinfo(p, &rename->rn_tinfo);
3634 }
3635 return nfserr;
3636 }
3637
3638 static __be32
3639 nfsd4_do_encode_secinfo(struct xdr_stream *xdr,
3640 __be32 nfserr, struct svc_export *exp)
3641 {
3642 u32 i, nflavs, supported;
3643 struct exp_flavor_info *flavs;
3644 struct exp_flavor_info def_flavs[2];
3645 __be32 *p, *flavorsp;
3646 static bool report = true;
3647
3648 if (nfserr)
3649 goto out;
3650 nfserr = nfserr_resource;
3651 if (exp->ex_nflavors) {
3652 flavs = exp->ex_flavors;
3653 nflavs = exp->ex_nflavors;
3654 } else { /* Handling of some defaults in absence of real secinfo: */
3655 flavs = def_flavs;
3656 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
3657 nflavs = 2;
3658 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
3659 flavs[1].pseudoflavor = RPC_AUTH_NULL;
3660 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
3661 nflavs = 1;
3662 flavs[0].pseudoflavor
3663 = svcauth_gss_flavor(exp->ex_client);
3664 } else {
3665 nflavs = 1;
3666 flavs[0].pseudoflavor
3667 = exp->ex_client->flavour->flavour;
3668 }
3669 }
3670
3671 supported = 0;
3672 p = xdr_reserve_space(xdr, 4);
3673 if (!p)
3674 goto out;
3675 flavorsp = p++; /* to be backfilled later */
3676
3677 for (i = 0; i < nflavs; i++) {
3678 rpc_authflavor_t pf = flavs[i].pseudoflavor;
3679 struct rpcsec_gss_info info;
3680
3681 if (rpcauth_get_gssinfo(pf, &info) == 0) {
3682 supported++;
3683 p = xdr_reserve_space(xdr, 4 + 4 +
3684 XDR_LEN(info.oid.len) + 4 + 4);
3685 if (!p)
3686 goto out;
3687 *p++ = cpu_to_be32(RPC_AUTH_GSS);
3688 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
3689 *p++ = cpu_to_be32(info.qop);
3690 *p++ = cpu_to_be32(info.service);
3691 } else if (pf < RPC_AUTH_MAXFLAVOR) {
3692 supported++;
3693 p = xdr_reserve_space(xdr, 4);
3694 if (!p)
3695 goto out;
3696 *p++ = cpu_to_be32(pf);
3697 } else {
3698 if (report)
3699 pr_warn("NFS: SECINFO: security flavor %u "
3700 "is not supported\n", pf);
3701 }
3702 }
3703
3704 if (nflavs != supported)
3705 report = false;
3706 *flavorsp = htonl(supported);
3707 nfserr = 0;
3708 out:
3709 if (exp)
3710 exp_put(exp);
3711 return nfserr;
3712 }
3713
3714 static __be32
3715 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
3716 struct nfsd4_secinfo *secinfo)
3717 {
3718 struct xdr_stream *xdr = &resp->xdr;
3719
3720 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->si_exp);
3721 }
3722
3723 static __be32
3724 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
3725 struct nfsd4_secinfo_no_name *secinfo)
3726 {
3727 struct xdr_stream *xdr = &resp->xdr;
3728
3729 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->sin_exp);
3730 }
3731
3732 /*
3733 * The SETATTR encode routine is special -- it always encodes a bitmap,
3734 * regardless of the error status.
3735 */
3736 static __be32
3737 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
3738 {
3739 struct xdr_stream *xdr = &resp->xdr;
3740 __be32 *p;
3741
3742 p = xdr_reserve_space(xdr, 16);
3743 if (!p)
3744 return nfserr_resource;
3745 if (nfserr) {
3746 *p++ = cpu_to_be32(3);
3747 *p++ = cpu_to_be32(0);
3748 *p++ = cpu_to_be32(0);
3749 *p++ = cpu_to_be32(0);
3750 }
3751 else {
3752 *p++ = cpu_to_be32(3);
3753 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
3754 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
3755 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
3756 }
3757 return nfserr;
3758 }
3759
3760 static __be32
3761 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
3762 {
3763 struct xdr_stream *xdr = &resp->xdr;
3764 __be32 *p;
3765
3766 if (!nfserr) {
3767 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
3768 if (!p)
3769 return nfserr_resource;
3770 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
3771 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
3772 NFS4_VERIFIER_SIZE);
3773 }
3774 else if (nfserr == nfserr_clid_inuse) {
3775 p = xdr_reserve_space(xdr, 8);
3776 if (!p)
3777 return nfserr_resource;
3778 *p++ = cpu_to_be32(0);
3779 *p++ = cpu_to_be32(0);
3780 }
3781 return nfserr;
3782 }
3783
3784 static __be32
3785 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
3786 {
3787 struct xdr_stream *xdr = &resp->xdr;
3788 __be32 *p;
3789
3790 if (!nfserr) {
3791 p = xdr_reserve_space(xdr, 16);
3792 if (!p)
3793 return nfserr_resource;
3794 *p++ = cpu_to_be32(write->wr_bytes_written);
3795 *p++ = cpu_to_be32(write->wr_how_written);
3796 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
3797 NFS4_VERIFIER_SIZE);
3798 }
3799 return nfserr;
3800 }
3801
3802 static const u32 nfs4_minimal_spo_must_enforce[2] = {
3803 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
3804 1 << (OP_EXCHANGE_ID - 32) |
3805 1 << (OP_CREATE_SESSION - 32) |
3806 1 << (OP_DESTROY_SESSION - 32) |
3807 1 << (OP_DESTROY_CLIENTID - 32)
3808 };
3809
3810 static __be32
3811 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
3812 struct nfsd4_exchange_id *exid)
3813 {
3814 struct xdr_stream *xdr = &resp->xdr;
3815 __be32 *p;
3816 char *major_id;
3817 char *server_scope;
3818 int major_id_sz;
3819 int server_scope_sz;
3820 uint64_t minor_id = 0;
3821
3822 if (nfserr)
3823 return nfserr;
3824
3825 major_id = utsname()->nodename;
3826 major_id_sz = strlen(major_id);
3827 server_scope = utsname()->nodename;
3828 server_scope_sz = strlen(server_scope);
3829
3830 p = xdr_reserve_space(xdr,
3831 8 /* eir_clientid */ +
3832 4 /* eir_sequenceid */ +
3833 4 /* eir_flags */ +
3834 4 /* spr_how */);
3835 if (!p)
3836 return nfserr_resource;
3837
3838 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
3839 *p++ = cpu_to_be32(exid->seqid);
3840 *p++ = cpu_to_be32(exid->flags);
3841
3842 *p++ = cpu_to_be32(exid->spa_how);
3843
3844 switch (exid->spa_how) {
3845 case SP4_NONE:
3846 break;
3847 case SP4_MACH_CRED:
3848 /* spo_must_enforce, spo_must_allow */
3849 p = xdr_reserve_space(xdr, 16);
3850 if (!p)
3851 return nfserr_resource;
3852
3853 /* spo_must_enforce bitmap: */
3854 *p++ = cpu_to_be32(2);
3855 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[0]);
3856 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[1]);
3857 /* empty spo_must_allow bitmap: */
3858 *p++ = cpu_to_be32(0);
3859
3860 break;
3861 default:
3862 WARN_ON_ONCE(1);
3863 }
3864
3865 p = xdr_reserve_space(xdr,
3866 8 /* so_minor_id */ +
3867 4 /* so_major_id.len */ +
3868 (XDR_QUADLEN(major_id_sz) * 4) +
3869 4 /* eir_server_scope.len */ +
3870 (XDR_QUADLEN(server_scope_sz) * 4) +
3871 4 /* eir_server_impl_id.count (0) */);
3872 if (!p)
3873 return nfserr_resource;
3874
3875 /* The server_owner struct */
3876 p = xdr_encode_hyper(p, minor_id); /* Minor id */
3877 /* major id */
3878 p = xdr_encode_opaque(p, major_id, major_id_sz);
3879
3880 /* Server scope */
3881 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
3882
3883 /* Implementation id */
3884 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
3885 return 0;
3886 }
3887
3888 static __be32
3889 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3890 struct nfsd4_create_session *sess)
3891 {
3892 struct xdr_stream *xdr = &resp->xdr;
3893 __be32 *p;
3894
3895 if (nfserr)
3896 return nfserr;
3897
3898 p = xdr_reserve_space(xdr, 24);
3899 if (!p)
3900 return nfserr_resource;
3901 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
3902 NFS4_MAX_SESSIONID_LEN);
3903 *p++ = cpu_to_be32(sess->seqid);
3904 *p++ = cpu_to_be32(sess->flags);
3905
3906 p = xdr_reserve_space(xdr, 28);
3907 if (!p)
3908 return nfserr_resource;
3909 *p++ = cpu_to_be32(0); /* headerpadsz */
3910 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
3911 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
3912 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
3913 *p++ = cpu_to_be32(sess->fore_channel.maxops);
3914 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
3915 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
3916
3917 if (sess->fore_channel.nr_rdma_attrs) {
3918 p = xdr_reserve_space(xdr, 4);
3919 if (!p)
3920 return nfserr_resource;
3921 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
3922 }
3923
3924 p = xdr_reserve_space(xdr, 28);
3925 if (!p)
3926 return nfserr_resource;
3927 *p++ = cpu_to_be32(0); /* headerpadsz */
3928 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
3929 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
3930 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
3931 *p++ = cpu_to_be32(sess->back_channel.maxops);
3932 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
3933 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
3934
3935 if (sess->back_channel.nr_rdma_attrs) {
3936 p = xdr_reserve_space(xdr, 4);
3937 if (!p)
3938 return nfserr_resource;
3939 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
3940 }
3941 return 0;
3942 }
3943
3944 static __be32
3945 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
3946 struct nfsd4_sequence *seq)
3947 {
3948 struct xdr_stream *xdr = &resp->xdr;
3949 __be32 *p;
3950
3951 if (nfserr)
3952 return nfserr;
3953
3954 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
3955 if (!p)
3956 return nfserr_resource;
3957 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
3958 NFS4_MAX_SESSIONID_LEN);
3959 *p++ = cpu_to_be32(seq->seqid);
3960 *p++ = cpu_to_be32(seq->slotid);
3961 /* Note slotid's are numbered from zero: */
3962 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
3963 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
3964 *p++ = cpu_to_be32(seq->status_flags);
3965
3966 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
3967 return 0;
3968 }
3969
3970 static __be32
3971 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
3972 struct nfsd4_test_stateid *test_stateid)
3973 {
3974 struct xdr_stream *xdr = &resp->xdr;
3975 struct nfsd4_test_stateid_id *stateid, *next;
3976 __be32 *p;
3977
3978 if (nfserr)
3979 return nfserr;
3980
3981 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
3982 if (!p)
3983 return nfserr_resource;
3984 *p++ = htonl(test_stateid->ts_num_ids);
3985
3986 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
3987 *p++ = stateid->ts_id_status;
3988 }
3989
3990 return nfserr;
3991 }
3992
3993 #ifdef CONFIG_NFSD_PNFS
3994 static __be32
3995 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
3996 struct nfsd4_getdeviceinfo *gdev)
3997 {
3998 struct xdr_stream *xdr = &resp->xdr;
3999 const struct nfsd4_layout_ops *ops =
4000 nfsd4_layout_ops[gdev->gd_layout_type];
4001 u32 starting_len = xdr->buf->len, needed_len;
4002 __be32 *p;
4003
4004 dprintk("%s: err %d\n", __func__, nfserr);
4005 if (nfserr)
4006 goto out;
4007
4008 nfserr = nfserr_resource;
4009 p = xdr_reserve_space(xdr, 4);
4010 if (!p)
4011 goto out;
4012
4013 *p++ = cpu_to_be32(gdev->gd_layout_type);
4014
4015 /* If maxcount is 0 then just update notifications */
4016 if (gdev->gd_maxcount != 0) {
4017 nfserr = ops->encode_getdeviceinfo(xdr, gdev);
4018 if (nfserr) {
4019 /*
4020 * We don't bother to burden the layout drivers with
4021 * enforcing gd_maxcount, just tell the client to
4022 * come back with a bigger buffer if it's not enough.
4023 */
4024 if (xdr->buf->len + 4 > gdev->gd_maxcount)
4025 goto toosmall;
4026 goto out;
4027 }
4028 }
4029
4030 nfserr = nfserr_resource;
4031 if (gdev->gd_notify_types) {
4032 p = xdr_reserve_space(xdr, 4 + 4);
4033 if (!p)
4034 goto out;
4035 *p++ = cpu_to_be32(1); /* bitmap length */
4036 *p++ = cpu_to_be32(gdev->gd_notify_types);
4037 } else {
4038 p = xdr_reserve_space(xdr, 4);
4039 if (!p)
4040 goto out;
4041 *p++ = 0;
4042 }
4043
4044 nfserr = 0;
4045 out:
4046 kfree(gdev->gd_device);
4047 dprintk("%s: done: %d\n", __func__, be32_to_cpu(nfserr));
4048 return nfserr;
4049
4050 toosmall:
4051 dprintk("%s: maxcount too small\n", __func__);
4052 needed_len = xdr->buf->len + 4 /* notifications */;
4053 xdr_truncate_encode(xdr, starting_len);
4054 p = xdr_reserve_space(xdr, 4);
4055 if (!p) {
4056 nfserr = nfserr_resource;
4057 } else {
4058 *p++ = cpu_to_be32(needed_len);
4059 nfserr = nfserr_toosmall;
4060 }
4061 goto out;
4062 }
4063
4064 static __be32
4065 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr,
4066 struct nfsd4_layoutget *lgp)
4067 {
4068 struct xdr_stream *xdr = &resp->xdr;
4069 const struct nfsd4_layout_ops *ops =
4070 nfsd4_layout_ops[lgp->lg_layout_type];
4071 __be32 *p;
4072
4073 dprintk("%s: err %d\n", __func__, nfserr);
4074 if (nfserr)
4075 goto out;
4076
4077 nfserr = nfserr_resource;
4078 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t));
4079 if (!p)
4080 goto out;
4081
4082 *p++ = cpu_to_be32(1); /* we always set return-on-close */
4083 *p++ = cpu_to_be32(lgp->lg_sid.si_generation);
4084 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque,
4085 sizeof(stateid_opaque_t));
4086
4087 *p++ = cpu_to_be32(1); /* we always return a single layout */
4088 p = xdr_encode_hyper(p, lgp->lg_seg.offset);
4089 p = xdr_encode_hyper(p, lgp->lg_seg.length);
4090 *p++ = cpu_to_be32(lgp->lg_seg.iomode);
4091 *p++ = cpu_to_be32(lgp->lg_layout_type);
4092
4093 nfserr = ops->encode_layoutget(xdr, lgp);
4094 out:
4095 kfree(lgp->lg_content);
4096 return nfserr;
4097 }
4098
4099 static __be32
4100 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr,
4101 struct nfsd4_layoutcommit *lcp)
4102 {
4103 struct xdr_stream *xdr = &resp->xdr;
4104 __be32 *p;
4105
4106 if (nfserr)
4107 return nfserr;
4108
4109 p = xdr_reserve_space(xdr, 4);
4110 if (!p)
4111 return nfserr_resource;
4112 *p++ = cpu_to_be32(lcp->lc_size_chg);
4113 if (lcp->lc_size_chg) {
4114 p = xdr_reserve_space(xdr, 8);
4115 if (!p)
4116 return nfserr_resource;
4117 p = xdr_encode_hyper(p, lcp->lc_newsize);
4118 }
4119
4120 return nfs_ok;
4121 }
4122
4123 static __be32
4124 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr,
4125 struct nfsd4_layoutreturn *lrp)
4126 {
4127 struct xdr_stream *xdr = &resp->xdr;
4128 __be32 *p;
4129
4130 if (nfserr)
4131 return nfserr;
4132
4133 p = xdr_reserve_space(xdr, 4);
4134 if (!p)
4135 return nfserr_resource;
4136 *p++ = cpu_to_be32(lrp->lrs_present);
4137 if (lrp->lrs_present)
4138 return nfsd4_encode_stateid(xdr, &lrp->lr_sid);
4139 return nfs_ok;
4140 }
4141 #endif /* CONFIG_NFSD_PNFS */
4142
4143 static __be32
4144 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr,
4145 struct nfsd4_seek *seek)
4146 {
4147 __be32 *p;
4148
4149 if (nfserr)
4150 return nfserr;
4151
4152 p = xdr_reserve_space(&resp->xdr, 4 + 8);
4153 *p++ = cpu_to_be32(seek->seek_eof);
4154 p = xdr_encode_hyper(p, seek->seek_pos);
4155
4156 return nfserr;
4157 }
4158
4159 static __be32
4160 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
4161 {
4162 return nfserr;
4163 }
4164
4165 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
4166
4167 /*
4168 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
4169 * since we don't need to filter out obsolete ops as this is
4170 * done in the decoding phase.
4171 */
4172 static nfsd4_enc nfsd4_enc_ops[] = {
4173 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access,
4174 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close,
4175 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit,
4176 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create,
4177 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop,
4178 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop,
4179 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr,
4180 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh,
4181 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link,
4182 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock,
4183 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt,
4184 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku,
4185 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop,
4186 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop,
4187 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop,
4188 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open,
4189 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop,
4190 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm,
4191 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade,
4192 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop,
4193 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop,
4194 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop,
4195 [OP_READ] = (nfsd4_enc)nfsd4_encode_read,
4196 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir,
4197 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink,
4198 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove,
4199 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename,
4200 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop,
4201 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop,
4202 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop,
4203 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo,
4204 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr,
4205 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid,
4206 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
4207 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop,
4208 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write,
4209 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop,
4210
4211 /* NFSv4.1 operations */
4212 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop,
4213 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
4214 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id,
4215 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session,
4216 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop,
4217 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop,
4218 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
4219 #ifdef CONFIG_NFSD_PNFS
4220 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_getdeviceinfo,
4221 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
4222 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_layoutcommit,
4223 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_layoutget,
4224 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_layoutreturn,
4225 #else
4226 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop,
4227 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
4228 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop,
4229 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop,
4230 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop,
4231 #endif
4232 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name,
4233 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence,
4234 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop,
4235 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid,
4236 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
4237 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop,
4238 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop,
4239
4240 /* NFSv4.2 operations */
4241 [OP_ALLOCATE] = (nfsd4_enc)nfsd4_encode_noop,
4242 [OP_COPY] = (nfsd4_enc)nfsd4_encode_noop,
4243 [OP_COPY_NOTIFY] = (nfsd4_enc)nfsd4_encode_noop,
4244 [OP_DEALLOCATE] = (nfsd4_enc)nfsd4_encode_noop,
4245 [OP_IO_ADVISE] = (nfsd4_enc)nfsd4_encode_noop,
4246 [OP_LAYOUTERROR] = (nfsd4_enc)nfsd4_encode_noop,
4247 [OP_LAYOUTSTATS] = (nfsd4_enc)nfsd4_encode_noop,
4248 [OP_OFFLOAD_CANCEL] = (nfsd4_enc)nfsd4_encode_noop,
4249 [OP_OFFLOAD_STATUS] = (nfsd4_enc)nfsd4_encode_noop,
4250 [OP_READ_PLUS] = (nfsd4_enc)nfsd4_encode_noop,
4251 [OP_SEEK] = (nfsd4_enc)nfsd4_encode_seek,
4252 [OP_WRITE_SAME] = (nfsd4_enc)nfsd4_encode_noop,
4253 };
4254
4255 /*
4256 * Calculate whether we still have space to encode repsize bytes.
4257 * There are two considerations:
4258 * - For NFS versions >=4.1, the size of the reply must stay within
4259 * session limits
4260 * - For all NFS versions, we must stay within limited preallocated
4261 * buffer space.
4262 *
4263 * This is called before the operation is processed, so can only provide
4264 * an upper estimate. For some nonidempotent operations (such as
4265 * getattr), it's not necessarily a problem if that estimate is wrong,
4266 * as we can fail it after processing without significant side effects.
4267 */
4268 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
4269 {
4270 struct xdr_buf *buf = &resp->rqstp->rq_res;
4271 struct nfsd4_slot *slot = resp->cstate.slot;
4272
4273 if (buf->len + respsize <= buf->buflen)
4274 return nfs_ok;
4275 if (!nfsd4_has_session(&resp->cstate))
4276 return nfserr_resource;
4277 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
4278 WARN_ON_ONCE(1);
4279 return nfserr_rep_too_big_to_cache;
4280 }
4281 return nfserr_rep_too_big;
4282 }
4283
4284 void
4285 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
4286 {
4287 struct xdr_stream *xdr = &resp->xdr;
4288 struct nfs4_stateowner *so = resp->cstate.replay_owner;
4289 struct svc_rqst *rqstp = resp->rqstp;
4290 int post_err_offset;
4291 nfsd4_enc encoder;
4292 __be32 *p;
4293
4294 p = xdr_reserve_space(xdr, 8);
4295 if (!p) {
4296 WARN_ON_ONCE(1);
4297 return;
4298 }
4299 *p++ = cpu_to_be32(op->opnum);
4300 post_err_offset = xdr->buf->len;
4301
4302 if (op->opnum == OP_ILLEGAL)
4303 goto status;
4304 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
4305 !nfsd4_enc_ops[op->opnum]);
4306 encoder = nfsd4_enc_ops[op->opnum];
4307 op->status = encoder(resp, op->status, &op->u);
4308 xdr_commit_encode(xdr);
4309
4310 /* nfsd4_check_resp_size guarantees enough room for error status */
4311 if (!op->status) {
4312 int space_needed = 0;
4313 if (!nfsd4_last_compound_op(rqstp))
4314 space_needed = COMPOUND_ERR_SLACK_SPACE;
4315 op->status = nfsd4_check_resp_size(resp, space_needed);
4316 }
4317 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
4318 struct nfsd4_slot *slot = resp->cstate.slot;
4319
4320 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
4321 op->status = nfserr_rep_too_big_to_cache;
4322 else
4323 op->status = nfserr_rep_too_big;
4324 }
4325 if (op->status == nfserr_resource ||
4326 op->status == nfserr_rep_too_big ||
4327 op->status == nfserr_rep_too_big_to_cache) {
4328 /*
4329 * The operation may have already been encoded or
4330 * partially encoded. No op returns anything additional
4331 * in the case of one of these three errors, so we can
4332 * just truncate back to after the status. But it's a
4333 * bug if we had to do this on a non-idempotent op:
4334 */
4335 warn_on_nonidempotent_op(op);
4336 xdr_truncate_encode(xdr, post_err_offset);
4337 }
4338 if (so) {
4339 int len = xdr->buf->len - post_err_offset;
4340
4341 so->so_replay.rp_status = op->status;
4342 so->so_replay.rp_buflen = len;
4343 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
4344 so->so_replay.rp_buf, len);
4345 }
4346 status:
4347 /* Note that op->status is already in network byte order: */
4348 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4);
4349 }
4350
4351 /*
4352 * Encode the reply stored in the stateowner reply cache
4353 *
4354 * XDR note: do not encode rp->rp_buflen: the buffer contains the
4355 * previously sent already encoded operation.
4356 */
4357 void
4358 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
4359 {
4360 __be32 *p;
4361 struct nfs4_replay *rp = op->replay;
4362
4363 BUG_ON(!rp);
4364
4365 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
4366 if (!p) {
4367 WARN_ON_ONCE(1);
4368 return;
4369 }
4370 *p++ = cpu_to_be32(op->opnum);
4371 *p++ = rp->rp_status; /* already xdr'ed */
4372
4373 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
4374 }
4375
4376 int
4377 nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy)
4378 {
4379 return xdr_ressize_check(rqstp, p);
4380 }
4381
4382 int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp)
4383 {
4384 struct svc_rqst *rqstp = rq;
4385 struct nfsd4_compoundargs *args = rqstp->rq_argp;
4386
4387 if (args->ops != args->iops) {
4388 kfree(args->ops);
4389 args->ops = args->iops;
4390 }
4391 kfree(args->tmpp);
4392 args->tmpp = NULL;
4393 while (args->to_free) {
4394 struct svcxdr_tmpbuf *tb = args->to_free;
4395 args->to_free = tb->next;
4396 kfree(tb);
4397 }
4398 return 1;
4399 }
4400
4401 int
4402 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args)
4403 {
4404 if (rqstp->rq_arg.head[0].iov_len % 4) {
4405 /* client is nuts */
4406 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)",
4407 __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid));
4408 return 0;
4409 }
4410 args->p = p;
4411 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len;
4412 args->pagelist = rqstp->rq_arg.pages;
4413 args->pagelen = rqstp->rq_arg.page_len;
4414 args->tmpp = NULL;
4415 args->to_free = NULL;
4416 args->ops = args->iops;
4417 args->rqstp = rqstp;
4418
4419 return !nfsd4_decode_compound(args);
4420 }
4421
4422 int
4423 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp)
4424 {
4425 /*
4426 * All that remains is to write the tag and operation count...
4427 */
4428 struct xdr_buf *buf = resp->xdr.buf;
4429
4430 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len +
4431 buf->tail[0].iov_len);
4432
4433 rqstp->rq_next_page = resp->xdr.page_ptr + 1;
4434
4435 p = resp->tagp;
4436 *p++ = htonl(resp->taglen);
4437 memcpy(p, resp->tag, resp->taglen);
4438 p += XDR_QUADLEN(resp->taglen);
4439 *p++ = htonl(resp->opcnt);
4440
4441 nfsd4_sequence_done(resp);
4442 return 1;
4443 }
4444
4445 /*
4446 * Local variables:
4447 * c-basic-offset: 8
4448 * End:
4449 */