]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blob - fs/nfsd/nfs4xdr.c
Merge tag 'locks-v3.16-2' of git://git.samba.org/jlayton/linux
[mirror_ubuntu-hirsute-kernel.git] / fs / nfsd / nfs4xdr.c
1 /*
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 *
35 * TODO: Neil Brown made the following observation: We currently
36 * initially reserve NFSD_BUFSIZE space on the transmit queue and
37 * never release any of that until the request is complete.
38 * It would be good to calculate a new maximum response size while
39 * decoding the COMPOUND, and call svc_reserve with this number
40 * at the end of nfs4svc_decode_compoundargs.
41 */
42
43 #include <linux/slab.h>
44 #include <linux/namei.h>
45 #include <linux/statfs.h>
46 #include <linux/utsname.h>
47 #include <linux/pagemap.h>
48 #include <linux/sunrpc/svcauth_gss.h>
49
50 #include "idmap.h"
51 #include "acl.h"
52 #include "xdr4.h"
53 #include "vfs.h"
54 #include "state.h"
55 #include "cache.h"
56 #include "netns.h"
57
58 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
59 #include <linux/security.h>
60 #endif
61
62
63 #define NFSDDBG_FACILITY NFSDDBG_XDR
64
65 /*
66 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
67 * directory in order to indicate to the client that a filesystem boundary is present
68 * We use a fixed fsid for a referral
69 */
70 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
71 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
72
73 static __be32
74 check_filename(char *str, int len)
75 {
76 int i;
77
78 if (len == 0)
79 return nfserr_inval;
80 if (isdotent(str, len))
81 return nfserr_badname;
82 for (i = 0; i < len; i++)
83 if (str[i] == '/')
84 return nfserr_badname;
85 return 0;
86 }
87
88 #define DECODE_HEAD \
89 __be32 *p; \
90 __be32 status
91 #define DECODE_TAIL \
92 status = 0; \
93 out: \
94 return status; \
95 xdr_error: \
96 dprintk("NFSD: xdr error (%s:%d)\n", \
97 __FILE__, __LINE__); \
98 status = nfserr_bad_xdr; \
99 goto out
100
101 #define READMEM(x,nbytes) do { \
102 x = (char *)p; \
103 p += XDR_QUADLEN(nbytes); \
104 } while (0)
105 #define SAVEMEM(x,nbytes) do { \
106 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \
107 savemem(argp, p, nbytes) : \
108 (char *)p)) { \
109 dprintk("NFSD: xdr error (%s:%d)\n", \
110 __FILE__, __LINE__); \
111 goto xdr_error; \
112 } \
113 p += XDR_QUADLEN(nbytes); \
114 } while (0)
115 #define COPYMEM(x,nbytes) do { \
116 memcpy((x), p, nbytes); \
117 p += XDR_QUADLEN(nbytes); \
118 } while (0)
119
120 /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */
121 #define READ_BUF(nbytes) do { \
122 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \
123 p = argp->p; \
124 argp->p += XDR_QUADLEN(nbytes); \
125 } else if (!(p = read_buf(argp, nbytes))) { \
126 dprintk("NFSD: xdr error (%s:%d)\n", \
127 __FILE__, __LINE__); \
128 goto xdr_error; \
129 } \
130 } while (0)
131
132 static void next_decode_page(struct nfsd4_compoundargs *argp)
133 {
134 argp->p = page_address(argp->pagelist[0]);
135 argp->pagelist++;
136 if (argp->pagelen < PAGE_SIZE) {
137 argp->end = argp->p + (argp->pagelen>>2);
138 argp->pagelen = 0;
139 } else {
140 argp->end = argp->p + (PAGE_SIZE>>2);
141 argp->pagelen -= PAGE_SIZE;
142 }
143 }
144
145 static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes)
146 {
147 /* We want more bytes than seem to be available.
148 * Maybe we need a new page, maybe we have just run out
149 */
150 unsigned int avail = (char *)argp->end - (char *)argp->p;
151 __be32 *p;
152 if (avail + argp->pagelen < nbytes)
153 return NULL;
154 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */
155 return NULL;
156 /* ok, we can do it with the current plus the next page */
157 if (nbytes <= sizeof(argp->tmp))
158 p = argp->tmp;
159 else {
160 kfree(argp->tmpp);
161 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL);
162 if (!p)
163 return NULL;
164
165 }
166 /*
167 * The following memcpy is safe because read_buf is always
168 * called with nbytes > avail, and the two cases above both
169 * guarantee p points to at least nbytes bytes.
170 */
171 memcpy(p, argp->p, avail);
172 next_decode_page(argp);
173 memcpy(((char*)p)+avail, argp->p, (nbytes - avail));
174 argp->p += XDR_QUADLEN(nbytes - avail);
175 return p;
176 }
177
178 static int zero_clientid(clientid_t *clid)
179 {
180 return (clid->cl_boot == 0) && (clid->cl_id == 0);
181 }
182
183 /**
184 * defer_free - mark an allocation as deferred freed
185 * @argp: NFSv4 compound argument structure to be freed with
186 * @release: release callback to free @p, typically kfree()
187 * @p: pointer to be freed
188 *
189 * Marks @p to be freed when processing the compound operation
190 * described in @argp finishes.
191 */
192 static int
193 defer_free(struct nfsd4_compoundargs *argp,
194 void (*release)(const void *), void *p)
195 {
196 struct tmpbuf *tb;
197
198 tb = kmalloc(sizeof(*tb), GFP_KERNEL);
199 if (!tb)
200 return -ENOMEM;
201 tb->buf = p;
202 tb->release = release;
203 tb->next = argp->to_free;
204 argp->to_free = tb;
205 return 0;
206 }
207
208 /**
209 * savemem - duplicate a chunk of memory for later processing
210 * @argp: NFSv4 compound argument structure to be freed with
211 * @p: pointer to be duplicated
212 * @nbytes: length to be duplicated
213 *
214 * Returns a pointer to a copy of @nbytes bytes of memory at @p
215 * that are preserved until processing of the NFSv4 compound
216 * operation described by @argp finishes.
217 */
218 static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes)
219 {
220 if (p == argp->tmp) {
221 p = kmemdup(argp->tmp, nbytes, GFP_KERNEL);
222 if (!p)
223 return NULL;
224 } else {
225 BUG_ON(p != argp->tmpp);
226 argp->tmpp = NULL;
227 }
228 if (defer_free(argp, kfree, p)) {
229 kfree(p);
230 return NULL;
231 } else
232 return (char *)p;
233 }
234
235 static __be32
236 nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval)
237 {
238 u32 bmlen;
239 DECODE_HEAD;
240
241 bmval[0] = 0;
242 bmval[1] = 0;
243 bmval[2] = 0;
244
245 READ_BUF(4);
246 bmlen = be32_to_cpup(p++);
247 if (bmlen > 1000)
248 goto xdr_error;
249
250 READ_BUF(bmlen << 2);
251 if (bmlen > 0)
252 bmval[0] = be32_to_cpup(p++);
253 if (bmlen > 1)
254 bmval[1] = be32_to_cpup(p++);
255 if (bmlen > 2)
256 bmval[2] = be32_to_cpup(p++);
257
258 DECODE_TAIL;
259 }
260
261 static __be32
262 nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval,
263 struct iattr *iattr, struct nfs4_acl **acl,
264 struct xdr_netobj *label)
265 {
266 int expected_len, len = 0;
267 u32 dummy32;
268 u64 sec;
269 char *buf;
270
271 DECODE_HEAD;
272 iattr->ia_valid = 0;
273 if ((status = nfsd4_decode_bitmap(argp, bmval)))
274 return status;
275
276 READ_BUF(4);
277 expected_len = be32_to_cpup(p++);
278
279 if (bmval[0] & FATTR4_WORD0_SIZE) {
280 READ_BUF(8);
281 len += 8;
282 p = xdr_decode_hyper(p, &iattr->ia_size);
283 iattr->ia_valid |= ATTR_SIZE;
284 }
285 if (bmval[0] & FATTR4_WORD0_ACL) {
286 u32 nace;
287 struct nfs4_ace *ace;
288
289 READ_BUF(4); len += 4;
290 nace = be32_to_cpup(p++);
291
292 if (nace > NFS4_ACL_MAX)
293 return nfserr_fbig;
294
295 *acl = nfs4_acl_new(nace);
296 if (*acl == NULL)
297 return nfserr_jukebox;
298
299 defer_free(argp, kfree, *acl);
300
301 (*acl)->naces = nace;
302 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) {
303 READ_BUF(16); len += 16;
304 ace->type = be32_to_cpup(p++);
305 ace->flag = be32_to_cpup(p++);
306 ace->access_mask = be32_to_cpup(p++);
307 dummy32 = be32_to_cpup(p++);
308 READ_BUF(dummy32);
309 len += XDR_QUADLEN(dummy32) << 2;
310 READMEM(buf, dummy32);
311 ace->whotype = nfs4_acl_get_whotype(buf, dummy32);
312 status = nfs_ok;
313 if (ace->whotype != NFS4_ACL_WHO_NAMED)
314 ;
315 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
316 status = nfsd_map_name_to_gid(argp->rqstp,
317 buf, dummy32, &ace->who_gid);
318 else
319 status = nfsd_map_name_to_uid(argp->rqstp,
320 buf, dummy32, &ace->who_uid);
321 if (status)
322 return status;
323 }
324 } else
325 *acl = NULL;
326 if (bmval[1] & FATTR4_WORD1_MODE) {
327 READ_BUF(4);
328 len += 4;
329 iattr->ia_mode = be32_to_cpup(p++);
330 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
331 iattr->ia_valid |= ATTR_MODE;
332 }
333 if (bmval[1] & FATTR4_WORD1_OWNER) {
334 READ_BUF(4);
335 len += 4;
336 dummy32 = be32_to_cpup(p++);
337 READ_BUF(dummy32);
338 len += (XDR_QUADLEN(dummy32) << 2);
339 READMEM(buf, dummy32);
340 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid)))
341 return status;
342 iattr->ia_valid |= ATTR_UID;
343 }
344 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
345 READ_BUF(4);
346 len += 4;
347 dummy32 = be32_to_cpup(p++);
348 READ_BUF(dummy32);
349 len += (XDR_QUADLEN(dummy32) << 2);
350 READMEM(buf, dummy32);
351 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid)))
352 return status;
353 iattr->ia_valid |= ATTR_GID;
354 }
355 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
356 READ_BUF(4);
357 len += 4;
358 dummy32 = be32_to_cpup(p++);
359 switch (dummy32) {
360 case NFS4_SET_TO_CLIENT_TIME:
361 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
362 all 32 bits of 'nseconds'. */
363 READ_BUF(12);
364 len += 12;
365 p = xdr_decode_hyper(p, &sec);
366 iattr->ia_atime.tv_sec = (time_t)sec;
367 iattr->ia_atime.tv_nsec = be32_to_cpup(p++);
368 if (iattr->ia_atime.tv_nsec >= (u32)1000000000)
369 return nfserr_inval;
370 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
371 break;
372 case NFS4_SET_TO_SERVER_TIME:
373 iattr->ia_valid |= ATTR_ATIME;
374 break;
375 default:
376 goto xdr_error;
377 }
378 }
379 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
380 READ_BUF(4);
381 len += 4;
382 dummy32 = be32_to_cpup(p++);
383 switch (dummy32) {
384 case NFS4_SET_TO_CLIENT_TIME:
385 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
386 all 32 bits of 'nseconds'. */
387 READ_BUF(12);
388 len += 12;
389 p = xdr_decode_hyper(p, &sec);
390 iattr->ia_mtime.tv_sec = sec;
391 iattr->ia_mtime.tv_nsec = be32_to_cpup(p++);
392 if (iattr->ia_mtime.tv_nsec >= (u32)1000000000)
393 return nfserr_inval;
394 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
395 break;
396 case NFS4_SET_TO_SERVER_TIME:
397 iattr->ia_valid |= ATTR_MTIME;
398 break;
399 default:
400 goto xdr_error;
401 }
402 }
403
404 label->len = 0;
405 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
406 if (bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
407 READ_BUF(4);
408 len += 4;
409 dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */
410 READ_BUF(4);
411 len += 4;
412 dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */
413 READ_BUF(4);
414 len += 4;
415 dummy32 = be32_to_cpup(p++);
416 READ_BUF(dummy32);
417 if (dummy32 > NFSD4_MAX_SEC_LABEL_LEN)
418 return nfserr_badlabel;
419 len += (XDR_QUADLEN(dummy32) << 2);
420 READMEM(buf, dummy32);
421 label->data = kzalloc(dummy32 + 1, GFP_KERNEL);
422 if (!label->data)
423 return nfserr_jukebox;
424 label->len = dummy32;
425 defer_free(argp, kfree, label->data);
426 memcpy(label->data, buf, dummy32);
427 }
428 #endif
429
430 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
431 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
432 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2)
433 READ_BUF(expected_len - len);
434 else if (len != expected_len)
435 goto xdr_error;
436
437 DECODE_TAIL;
438 }
439
440 static __be32
441 nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid)
442 {
443 DECODE_HEAD;
444
445 READ_BUF(sizeof(stateid_t));
446 sid->si_generation = be32_to_cpup(p++);
447 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t));
448
449 DECODE_TAIL;
450 }
451
452 static __be32
453 nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access)
454 {
455 DECODE_HEAD;
456
457 READ_BUF(4);
458 access->ac_req_access = be32_to_cpup(p++);
459
460 DECODE_TAIL;
461 }
462
463 static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
464 {
465 DECODE_HEAD;
466 u32 dummy, uid, gid;
467 char *machine_name;
468 int i;
469 int nr_secflavs;
470
471 /* callback_sec_params4 */
472 READ_BUF(4);
473 nr_secflavs = be32_to_cpup(p++);
474 if (nr_secflavs)
475 cbs->flavor = (u32)(-1);
476 else
477 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
478 cbs->flavor = 0;
479 for (i = 0; i < nr_secflavs; ++i) {
480 READ_BUF(4);
481 dummy = be32_to_cpup(p++);
482 switch (dummy) {
483 case RPC_AUTH_NULL:
484 /* Nothing to read */
485 if (cbs->flavor == (u32)(-1))
486 cbs->flavor = RPC_AUTH_NULL;
487 break;
488 case RPC_AUTH_UNIX:
489 READ_BUF(8);
490 /* stamp */
491 dummy = be32_to_cpup(p++);
492
493 /* machine name */
494 dummy = be32_to_cpup(p++);
495 READ_BUF(dummy);
496 SAVEMEM(machine_name, dummy);
497
498 /* uid, gid */
499 READ_BUF(8);
500 uid = be32_to_cpup(p++);
501 gid = be32_to_cpup(p++);
502
503 /* more gids */
504 READ_BUF(4);
505 dummy = be32_to_cpup(p++);
506 READ_BUF(dummy * 4);
507 if (cbs->flavor == (u32)(-1)) {
508 kuid_t kuid = make_kuid(&init_user_ns, uid);
509 kgid_t kgid = make_kgid(&init_user_ns, gid);
510 if (uid_valid(kuid) && gid_valid(kgid)) {
511 cbs->uid = kuid;
512 cbs->gid = kgid;
513 cbs->flavor = RPC_AUTH_UNIX;
514 } else {
515 dprintk("RPC_AUTH_UNIX with invalid"
516 "uid or gid ignoring!\n");
517 }
518 }
519 break;
520 case RPC_AUTH_GSS:
521 dprintk("RPC_AUTH_GSS callback secflavor "
522 "not supported!\n");
523 READ_BUF(8);
524 /* gcbp_service */
525 dummy = be32_to_cpup(p++);
526 /* gcbp_handle_from_server */
527 dummy = be32_to_cpup(p++);
528 READ_BUF(dummy);
529 p += XDR_QUADLEN(dummy);
530 /* gcbp_handle_from_client */
531 READ_BUF(4);
532 dummy = be32_to_cpup(p++);
533 READ_BUF(dummy);
534 break;
535 default:
536 dprintk("Illegal callback secflavor\n");
537 return nfserr_inval;
538 }
539 }
540 DECODE_TAIL;
541 }
542
543 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc)
544 {
545 DECODE_HEAD;
546
547 READ_BUF(4);
548 bc->bc_cb_program = be32_to_cpup(p++);
549 nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
550
551 DECODE_TAIL;
552 }
553
554 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
555 {
556 DECODE_HEAD;
557
558 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8);
559 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN);
560 bcts->dir = be32_to_cpup(p++);
561 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker
562 * could help us figure out we should be using it. */
563 DECODE_TAIL;
564 }
565
566 static __be32
567 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
568 {
569 DECODE_HEAD;
570
571 READ_BUF(4);
572 close->cl_seqid = be32_to_cpup(p++);
573 return nfsd4_decode_stateid(argp, &close->cl_stateid);
574
575 DECODE_TAIL;
576 }
577
578
579 static __be32
580 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
581 {
582 DECODE_HEAD;
583
584 READ_BUF(12);
585 p = xdr_decode_hyper(p, &commit->co_offset);
586 commit->co_count = be32_to_cpup(p++);
587
588 DECODE_TAIL;
589 }
590
591 static __be32
592 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
593 {
594 DECODE_HEAD;
595
596 READ_BUF(4);
597 create->cr_type = be32_to_cpup(p++);
598 switch (create->cr_type) {
599 case NF4LNK:
600 READ_BUF(4);
601 create->cr_linklen = be32_to_cpup(p++);
602 READ_BUF(create->cr_linklen);
603 SAVEMEM(create->cr_linkname, create->cr_linklen);
604 break;
605 case NF4BLK:
606 case NF4CHR:
607 READ_BUF(8);
608 create->cr_specdata1 = be32_to_cpup(p++);
609 create->cr_specdata2 = be32_to_cpup(p++);
610 break;
611 case NF4SOCK:
612 case NF4FIFO:
613 case NF4DIR:
614 default:
615 break;
616 }
617
618 READ_BUF(4);
619 create->cr_namelen = be32_to_cpup(p++);
620 READ_BUF(create->cr_namelen);
621 SAVEMEM(create->cr_name, create->cr_namelen);
622 if ((status = check_filename(create->cr_name, create->cr_namelen)))
623 return status;
624
625 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr,
626 &create->cr_acl, &create->cr_label);
627 if (status)
628 goto out;
629
630 DECODE_TAIL;
631 }
632
633 static inline __be32
634 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
635 {
636 return nfsd4_decode_stateid(argp, &dr->dr_stateid);
637 }
638
639 static inline __be32
640 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
641 {
642 return nfsd4_decode_bitmap(argp, getattr->ga_bmval);
643 }
644
645 static __be32
646 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
647 {
648 DECODE_HEAD;
649
650 READ_BUF(4);
651 link->li_namelen = be32_to_cpup(p++);
652 READ_BUF(link->li_namelen);
653 SAVEMEM(link->li_name, link->li_namelen);
654 if ((status = check_filename(link->li_name, link->li_namelen)))
655 return status;
656
657 DECODE_TAIL;
658 }
659
660 static __be32
661 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
662 {
663 DECODE_HEAD;
664
665 /*
666 * type, reclaim(boolean), offset, length, new_lock_owner(boolean)
667 */
668 READ_BUF(28);
669 lock->lk_type = be32_to_cpup(p++);
670 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
671 goto xdr_error;
672 lock->lk_reclaim = be32_to_cpup(p++);
673 p = xdr_decode_hyper(p, &lock->lk_offset);
674 p = xdr_decode_hyper(p, &lock->lk_length);
675 lock->lk_is_new = be32_to_cpup(p++);
676
677 if (lock->lk_is_new) {
678 READ_BUF(4);
679 lock->lk_new_open_seqid = be32_to_cpup(p++);
680 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid);
681 if (status)
682 return status;
683 READ_BUF(8 + sizeof(clientid_t));
684 lock->lk_new_lock_seqid = be32_to_cpup(p++);
685 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t));
686 lock->lk_new_owner.len = be32_to_cpup(p++);
687 READ_BUF(lock->lk_new_owner.len);
688 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len);
689 } else {
690 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid);
691 if (status)
692 return status;
693 READ_BUF(4);
694 lock->lk_old_lock_seqid = be32_to_cpup(p++);
695 }
696
697 DECODE_TAIL;
698 }
699
700 static __be32
701 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
702 {
703 DECODE_HEAD;
704
705 READ_BUF(32);
706 lockt->lt_type = be32_to_cpup(p++);
707 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
708 goto xdr_error;
709 p = xdr_decode_hyper(p, &lockt->lt_offset);
710 p = xdr_decode_hyper(p, &lockt->lt_length);
711 COPYMEM(&lockt->lt_clientid, 8);
712 lockt->lt_owner.len = be32_to_cpup(p++);
713 READ_BUF(lockt->lt_owner.len);
714 READMEM(lockt->lt_owner.data, lockt->lt_owner.len);
715
716 DECODE_TAIL;
717 }
718
719 static __be32
720 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
721 {
722 DECODE_HEAD;
723
724 READ_BUF(8);
725 locku->lu_type = be32_to_cpup(p++);
726 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
727 goto xdr_error;
728 locku->lu_seqid = be32_to_cpup(p++);
729 status = nfsd4_decode_stateid(argp, &locku->lu_stateid);
730 if (status)
731 return status;
732 READ_BUF(16);
733 p = xdr_decode_hyper(p, &locku->lu_offset);
734 p = xdr_decode_hyper(p, &locku->lu_length);
735
736 DECODE_TAIL;
737 }
738
739 static __be32
740 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
741 {
742 DECODE_HEAD;
743
744 READ_BUF(4);
745 lookup->lo_len = be32_to_cpup(p++);
746 READ_BUF(lookup->lo_len);
747 SAVEMEM(lookup->lo_name, lookup->lo_len);
748 if ((status = check_filename(lookup->lo_name, lookup->lo_len)))
749 return status;
750
751 DECODE_TAIL;
752 }
753
754 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
755 {
756 __be32 *p;
757 u32 w;
758
759 READ_BUF(4);
760 w = be32_to_cpup(p++);
761 *share_access = w & NFS4_SHARE_ACCESS_MASK;
762 *deleg_want = w & NFS4_SHARE_WANT_MASK;
763 if (deleg_when)
764 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
765
766 switch (w & NFS4_SHARE_ACCESS_MASK) {
767 case NFS4_SHARE_ACCESS_READ:
768 case NFS4_SHARE_ACCESS_WRITE:
769 case NFS4_SHARE_ACCESS_BOTH:
770 break;
771 default:
772 return nfserr_bad_xdr;
773 }
774 w &= ~NFS4_SHARE_ACCESS_MASK;
775 if (!w)
776 return nfs_ok;
777 if (!argp->minorversion)
778 return nfserr_bad_xdr;
779 switch (w & NFS4_SHARE_WANT_MASK) {
780 case NFS4_SHARE_WANT_NO_PREFERENCE:
781 case NFS4_SHARE_WANT_READ_DELEG:
782 case NFS4_SHARE_WANT_WRITE_DELEG:
783 case NFS4_SHARE_WANT_ANY_DELEG:
784 case NFS4_SHARE_WANT_NO_DELEG:
785 case NFS4_SHARE_WANT_CANCEL:
786 break;
787 default:
788 return nfserr_bad_xdr;
789 }
790 w &= ~NFS4_SHARE_WANT_MASK;
791 if (!w)
792 return nfs_ok;
793
794 if (!deleg_when) /* open_downgrade */
795 return nfserr_inval;
796 switch (w) {
797 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
798 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
799 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
800 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
801 return nfs_ok;
802 }
803 xdr_error:
804 return nfserr_bad_xdr;
805 }
806
807 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
808 {
809 __be32 *p;
810
811 READ_BUF(4);
812 *x = be32_to_cpup(p++);
813 /* Note: unlinke access bits, deny bits may be zero. */
814 if (*x & ~NFS4_SHARE_DENY_BOTH)
815 return nfserr_bad_xdr;
816 return nfs_ok;
817 xdr_error:
818 return nfserr_bad_xdr;
819 }
820
821 static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
822 {
823 __be32 *p;
824
825 READ_BUF(4);
826 o->len = be32_to_cpup(p++);
827
828 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT)
829 return nfserr_bad_xdr;
830
831 READ_BUF(o->len);
832 SAVEMEM(o->data, o->len);
833 return nfs_ok;
834 xdr_error:
835 return nfserr_bad_xdr;
836 }
837
838 static __be32
839 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
840 {
841 DECODE_HEAD;
842 u32 dummy;
843
844 memset(open->op_bmval, 0, sizeof(open->op_bmval));
845 open->op_iattr.ia_valid = 0;
846 open->op_openowner = NULL;
847
848 open->op_xdr_error = 0;
849 /* seqid, share_access, share_deny, clientid, ownerlen */
850 READ_BUF(4);
851 open->op_seqid = be32_to_cpup(p++);
852 /* decode, yet ignore deleg_when until supported */
853 status = nfsd4_decode_share_access(argp, &open->op_share_access,
854 &open->op_deleg_want, &dummy);
855 if (status)
856 goto xdr_error;
857 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
858 if (status)
859 goto xdr_error;
860 READ_BUF(sizeof(clientid_t));
861 COPYMEM(&open->op_clientid, sizeof(clientid_t));
862 status = nfsd4_decode_opaque(argp, &open->op_owner);
863 if (status)
864 goto xdr_error;
865 READ_BUF(4);
866 open->op_create = be32_to_cpup(p++);
867 switch (open->op_create) {
868 case NFS4_OPEN_NOCREATE:
869 break;
870 case NFS4_OPEN_CREATE:
871 READ_BUF(4);
872 open->op_createmode = be32_to_cpup(p++);
873 switch (open->op_createmode) {
874 case NFS4_CREATE_UNCHECKED:
875 case NFS4_CREATE_GUARDED:
876 status = nfsd4_decode_fattr(argp, open->op_bmval,
877 &open->op_iattr, &open->op_acl, &open->op_label);
878 if (status)
879 goto out;
880 break;
881 case NFS4_CREATE_EXCLUSIVE:
882 READ_BUF(NFS4_VERIFIER_SIZE);
883 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
884 break;
885 case NFS4_CREATE_EXCLUSIVE4_1:
886 if (argp->minorversion < 1)
887 goto xdr_error;
888 READ_BUF(NFS4_VERIFIER_SIZE);
889 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE);
890 status = nfsd4_decode_fattr(argp, open->op_bmval,
891 &open->op_iattr, &open->op_acl, &open->op_label);
892 if (status)
893 goto out;
894 break;
895 default:
896 goto xdr_error;
897 }
898 break;
899 default:
900 goto xdr_error;
901 }
902
903 /* open_claim */
904 READ_BUF(4);
905 open->op_claim_type = be32_to_cpup(p++);
906 switch (open->op_claim_type) {
907 case NFS4_OPEN_CLAIM_NULL:
908 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
909 READ_BUF(4);
910 open->op_fname.len = be32_to_cpup(p++);
911 READ_BUF(open->op_fname.len);
912 SAVEMEM(open->op_fname.data, open->op_fname.len);
913 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
914 return status;
915 break;
916 case NFS4_OPEN_CLAIM_PREVIOUS:
917 READ_BUF(4);
918 open->op_delegate_type = be32_to_cpup(p++);
919 break;
920 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
921 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
922 if (status)
923 return status;
924 READ_BUF(4);
925 open->op_fname.len = be32_to_cpup(p++);
926 READ_BUF(open->op_fname.len);
927 SAVEMEM(open->op_fname.data, open->op_fname.len);
928 if ((status = check_filename(open->op_fname.data, open->op_fname.len)))
929 return status;
930 break;
931 case NFS4_OPEN_CLAIM_FH:
932 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
933 if (argp->minorversion < 1)
934 goto xdr_error;
935 /* void */
936 break;
937 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
938 if (argp->minorversion < 1)
939 goto xdr_error;
940 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid);
941 if (status)
942 return status;
943 break;
944 default:
945 goto xdr_error;
946 }
947
948 DECODE_TAIL;
949 }
950
951 static __be32
952 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
953 {
954 DECODE_HEAD;
955
956 if (argp->minorversion >= 1)
957 return nfserr_notsupp;
958
959 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid);
960 if (status)
961 return status;
962 READ_BUF(4);
963 open_conf->oc_seqid = be32_to_cpup(p++);
964
965 DECODE_TAIL;
966 }
967
968 static __be32
969 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
970 {
971 DECODE_HEAD;
972
973 status = nfsd4_decode_stateid(argp, &open_down->od_stateid);
974 if (status)
975 return status;
976 READ_BUF(4);
977 open_down->od_seqid = be32_to_cpup(p++);
978 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
979 &open_down->od_deleg_want, NULL);
980 if (status)
981 return status;
982 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
983 if (status)
984 return status;
985 DECODE_TAIL;
986 }
987
988 static __be32
989 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
990 {
991 DECODE_HEAD;
992
993 READ_BUF(4);
994 putfh->pf_fhlen = be32_to_cpup(p++);
995 if (putfh->pf_fhlen > NFS4_FHSIZE)
996 goto xdr_error;
997 READ_BUF(putfh->pf_fhlen);
998 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen);
999
1000 DECODE_TAIL;
1001 }
1002
1003 static __be32
1004 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p)
1005 {
1006 if (argp->minorversion == 0)
1007 return nfs_ok;
1008 return nfserr_notsupp;
1009 }
1010
1011 static __be32
1012 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
1013 {
1014 DECODE_HEAD;
1015
1016 status = nfsd4_decode_stateid(argp, &read->rd_stateid);
1017 if (status)
1018 return status;
1019 READ_BUF(12);
1020 p = xdr_decode_hyper(p, &read->rd_offset);
1021 read->rd_length = be32_to_cpup(p++);
1022
1023 DECODE_TAIL;
1024 }
1025
1026 static __be32
1027 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
1028 {
1029 DECODE_HEAD;
1030
1031 READ_BUF(24);
1032 p = xdr_decode_hyper(p, &readdir->rd_cookie);
1033 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data));
1034 readdir->rd_dircount = be32_to_cpup(p++);
1035 readdir->rd_maxcount = be32_to_cpup(p++);
1036 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval)))
1037 goto out;
1038
1039 DECODE_TAIL;
1040 }
1041
1042 static __be32
1043 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
1044 {
1045 DECODE_HEAD;
1046
1047 READ_BUF(4);
1048 remove->rm_namelen = be32_to_cpup(p++);
1049 READ_BUF(remove->rm_namelen);
1050 SAVEMEM(remove->rm_name, remove->rm_namelen);
1051 if ((status = check_filename(remove->rm_name, remove->rm_namelen)))
1052 return status;
1053
1054 DECODE_TAIL;
1055 }
1056
1057 static __be32
1058 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
1059 {
1060 DECODE_HEAD;
1061
1062 READ_BUF(4);
1063 rename->rn_snamelen = be32_to_cpup(p++);
1064 READ_BUF(rename->rn_snamelen + 4);
1065 SAVEMEM(rename->rn_sname, rename->rn_snamelen);
1066 rename->rn_tnamelen = be32_to_cpup(p++);
1067 READ_BUF(rename->rn_tnamelen);
1068 SAVEMEM(rename->rn_tname, rename->rn_tnamelen);
1069 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen)))
1070 return status;
1071 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen)))
1072 return status;
1073
1074 DECODE_TAIL;
1075 }
1076
1077 static __be32
1078 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
1079 {
1080 DECODE_HEAD;
1081
1082 if (argp->minorversion >= 1)
1083 return nfserr_notsupp;
1084
1085 READ_BUF(sizeof(clientid_t));
1086 COPYMEM(clientid, sizeof(clientid_t));
1087
1088 DECODE_TAIL;
1089 }
1090
1091 static __be32
1092 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1093 struct nfsd4_secinfo *secinfo)
1094 {
1095 DECODE_HEAD;
1096
1097 READ_BUF(4);
1098 secinfo->si_namelen = be32_to_cpup(p++);
1099 READ_BUF(secinfo->si_namelen);
1100 SAVEMEM(secinfo->si_name, secinfo->si_namelen);
1101 status = check_filename(secinfo->si_name, secinfo->si_namelen);
1102 if (status)
1103 return status;
1104 DECODE_TAIL;
1105 }
1106
1107 static __be32
1108 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1109 struct nfsd4_secinfo_no_name *sin)
1110 {
1111 DECODE_HEAD;
1112
1113 READ_BUF(4);
1114 sin->sin_style = be32_to_cpup(p++);
1115 DECODE_TAIL;
1116 }
1117
1118 static __be32
1119 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
1120 {
1121 __be32 status;
1122
1123 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid);
1124 if (status)
1125 return status;
1126 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr,
1127 &setattr->sa_acl, &setattr->sa_label);
1128 }
1129
1130 static __be32
1131 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
1132 {
1133 DECODE_HEAD;
1134
1135 if (argp->minorversion >= 1)
1136 return nfserr_notsupp;
1137
1138 READ_BUF(NFS4_VERIFIER_SIZE);
1139 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE);
1140
1141 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1142 if (status)
1143 return nfserr_bad_xdr;
1144 READ_BUF(8);
1145 setclientid->se_callback_prog = be32_to_cpup(p++);
1146 setclientid->se_callback_netid_len = be32_to_cpup(p++);
1147
1148 READ_BUF(setclientid->se_callback_netid_len + 4);
1149 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len);
1150 setclientid->se_callback_addr_len = be32_to_cpup(p++);
1151
1152 READ_BUF(setclientid->se_callback_addr_len + 4);
1153 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len);
1154 setclientid->se_callback_ident = be32_to_cpup(p++);
1155
1156 DECODE_TAIL;
1157 }
1158
1159 static __be32
1160 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1161 {
1162 DECODE_HEAD;
1163
1164 if (argp->minorversion >= 1)
1165 return nfserr_notsupp;
1166
1167 READ_BUF(8 + NFS4_VERIFIER_SIZE);
1168 COPYMEM(&scd_c->sc_clientid, 8);
1169 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE);
1170
1171 DECODE_TAIL;
1172 }
1173
1174 /* Also used for NVERIFY */
1175 static __be32
1176 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1177 {
1178 DECODE_HEAD;
1179
1180 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval)))
1181 goto out;
1182
1183 /* For convenience's sake, we compare raw xdr'd attributes in
1184 * nfsd4_proc_verify */
1185
1186 READ_BUF(4);
1187 verify->ve_attrlen = be32_to_cpup(p++);
1188 READ_BUF(verify->ve_attrlen);
1189 SAVEMEM(verify->ve_attrval, verify->ve_attrlen);
1190
1191 DECODE_TAIL;
1192 }
1193
1194 static __be32
1195 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1196 {
1197 int avail;
1198 int len;
1199 DECODE_HEAD;
1200
1201 status = nfsd4_decode_stateid(argp, &write->wr_stateid);
1202 if (status)
1203 return status;
1204 READ_BUF(16);
1205 p = xdr_decode_hyper(p, &write->wr_offset);
1206 write->wr_stable_how = be32_to_cpup(p++);
1207 if (write->wr_stable_how > 2)
1208 goto xdr_error;
1209 write->wr_buflen = be32_to_cpup(p++);
1210
1211 /* Sorry .. no magic macros for this.. *
1212 * READ_BUF(write->wr_buflen);
1213 * SAVEMEM(write->wr_buf, write->wr_buflen);
1214 */
1215 avail = (char*)argp->end - (char*)argp->p;
1216 if (avail + argp->pagelen < write->wr_buflen) {
1217 dprintk("NFSD: xdr error (%s:%d)\n",
1218 __FILE__, __LINE__);
1219 goto xdr_error;
1220 }
1221 write->wr_head.iov_base = p;
1222 write->wr_head.iov_len = avail;
1223 write->wr_pagelist = argp->pagelist;
1224
1225 len = XDR_QUADLEN(write->wr_buflen) << 2;
1226 if (len >= avail) {
1227 int pages;
1228
1229 len -= avail;
1230
1231 pages = len >> PAGE_SHIFT;
1232 argp->pagelist += pages;
1233 argp->pagelen -= pages * PAGE_SIZE;
1234 len -= pages * PAGE_SIZE;
1235
1236 argp->p = (__be32 *)page_address(argp->pagelist[0]);
1237 argp->pagelist++;
1238 argp->end = argp->p + XDR_QUADLEN(PAGE_SIZE);
1239 }
1240 argp->p += XDR_QUADLEN(len);
1241
1242 DECODE_TAIL;
1243 }
1244
1245 static __be32
1246 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1247 {
1248 DECODE_HEAD;
1249
1250 if (argp->minorversion >= 1)
1251 return nfserr_notsupp;
1252
1253 READ_BUF(12);
1254 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t));
1255 rlockowner->rl_owner.len = be32_to_cpup(p++);
1256 READ_BUF(rlockowner->rl_owner.len);
1257 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len);
1258
1259 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1260 return nfserr_inval;
1261 DECODE_TAIL;
1262 }
1263
1264 static __be32
1265 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1266 struct nfsd4_exchange_id *exid)
1267 {
1268 int dummy, tmp;
1269 DECODE_HEAD;
1270
1271 READ_BUF(NFS4_VERIFIER_SIZE);
1272 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE);
1273
1274 status = nfsd4_decode_opaque(argp, &exid->clname);
1275 if (status)
1276 return nfserr_bad_xdr;
1277
1278 READ_BUF(4);
1279 exid->flags = be32_to_cpup(p++);
1280
1281 /* Ignore state_protect4_a */
1282 READ_BUF(4);
1283 exid->spa_how = be32_to_cpup(p++);
1284 switch (exid->spa_how) {
1285 case SP4_NONE:
1286 break;
1287 case SP4_MACH_CRED:
1288 /* spo_must_enforce */
1289 READ_BUF(4);
1290 dummy = be32_to_cpup(p++);
1291 READ_BUF(dummy * 4);
1292 p += dummy;
1293
1294 /* spo_must_allow */
1295 READ_BUF(4);
1296 dummy = be32_to_cpup(p++);
1297 READ_BUF(dummy * 4);
1298 p += dummy;
1299 break;
1300 case SP4_SSV:
1301 /* ssp_ops */
1302 READ_BUF(4);
1303 dummy = be32_to_cpup(p++);
1304 READ_BUF(dummy * 4);
1305 p += dummy;
1306
1307 READ_BUF(4);
1308 dummy = be32_to_cpup(p++);
1309 READ_BUF(dummy * 4);
1310 p += dummy;
1311
1312 /* ssp_hash_algs<> */
1313 READ_BUF(4);
1314 tmp = be32_to_cpup(p++);
1315 while (tmp--) {
1316 READ_BUF(4);
1317 dummy = be32_to_cpup(p++);
1318 READ_BUF(dummy);
1319 p += XDR_QUADLEN(dummy);
1320 }
1321
1322 /* ssp_encr_algs<> */
1323 READ_BUF(4);
1324 tmp = be32_to_cpup(p++);
1325 while (tmp--) {
1326 READ_BUF(4);
1327 dummy = be32_to_cpup(p++);
1328 READ_BUF(dummy);
1329 p += XDR_QUADLEN(dummy);
1330 }
1331
1332 /* ssp_window and ssp_num_gss_handles */
1333 READ_BUF(8);
1334 dummy = be32_to_cpup(p++);
1335 dummy = be32_to_cpup(p++);
1336 break;
1337 default:
1338 goto xdr_error;
1339 }
1340
1341 /* Ignore Implementation ID */
1342 READ_BUF(4); /* nfs_impl_id4 array length */
1343 dummy = be32_to_cpup(p++);
1344
1345 if (dummy > 1)
1346 goto xdr_error;
1347
1348 if (dummy == 1) {
1349 /* nii_domain */
1350 READ_BUF(4);
1351 dummy = be32_to_cpup(p++);
1352 READ_BUF(dummy);
1353 p += XDR_QUADLEN(dummy);
1354
1355 /* nii_name */
1356 READ_BUF(4);
1357 dummy = be32_to_cpup(p++);
1358 READ_BUF(dummy);
1359 p += XDR_QUADLEN(dummy);
1360
1361 /* nii_date */
1362 READ_BUF(12);
1363 p += 3;
1364 }
1365 DECODE_TAIL;
1366 }
1367
1368 static __be32
1369 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1370 struct nfsd4_create_session *sess)
1371 {
1372 DECODE_HEAD;
1373 u32 dummy;
1374
1375 READ_BUF(16);
1376 COPYMEM(&sess->clientid, 8);
1377 sess->seqid = be32_to_cpup(p++);
1378 sess->flags = be32_to_cpup(p++);
1379
1380 /* Fore channel attrs */
1381 READ_BUF(28);
1382 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1383 sess->fore_channel.maxreq_sz = be32_to_cpup(p++);
1384 sess->fore_channel.maxresp_sz = be32_to_cpup(p++);
1385 sess->fore_channel.maxresp_cached = be32_to_cpup(p++);
1386 sess->fore_channel.maxops = be32_to_cpup(p++);
1387 sess->fore_channel.maxreqs = be32_to_cpup(p++);
1388 sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++);
1389 if (sess->fore_channel.nr_rdma_attrs == 1) {
1390 READ_BUF(4);
1391 sess->fore_channel.rdma_attrs = be32_to_cpup(p++);
1392 } else if (sess->fore_channel.nr_rdma_attrs > 1) {
1393 dprintk("Too many fore channel attr bitmaps!\n");
1394 goto xdr_error;
1395 }
1396
1397 /* Back channel attrs */
1398 READ_BUF(28);
1399 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */
1400 sess->back_channel.maxreq_sz = be32_to_cpup(p++);
1401 sess->back_channel.maxresp_sz = be32_to_cpup(p++);
1402 sess->back_channel.maxresp_cached = be32_to_cpup(p++);
1403 sess->back_channel.maxops = be32_to_cpup(p++);
1404 sess->back_channel.maxreqs = be32_to_cpup(p++);
1405 sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++);
1406 if (sess->back_channel.nr_rdma_attrs == 1) {
1407 READ_BUF(4);
1408 sess->back_channel.rdma_attrs = be32_to_cpup(p++);
1409 } else if (sess->back_channel.nr_rdma_attrs > 1) {
1410 dprintk("Too many back channel attr bitmaps!\n");
1411 goto xdr_error;
1412 }
1413
1414 READ_BUF(4);
1415 sess->callback_prog = be32_to_cpup(p++);
1416 nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1417 DECODE_TAIL;
1418 }
1419
1420 static __be32
1421 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1422 struct nfsd4_destroy_session *destroy_session)
1423 {
1424 DECODE_HEAD;
1425 READ_BUF(NFS4_MAX_SESSIONID_LEN);
1426 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1427
1428 DECODE_TAIL;
1429 }
1430
1431 static __be32
1432 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1433 struct nfsd4_free_stateid *free_stateid)
1434 {
1435 DECODE_HEAD;
1436
1437 READ_BUF(sizeof(stateid_t));
1438 free_stateid->fr_stateid.si_generation = be32_to_cpup(p++);
1439 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t));
1440
1441 DECODE_TAIL;
1442 }
1443
1444 static __be32
1445 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1446 struct nfsd4_sequence *seq)
1447 {
1448 DECODE_HEAD;
1449
1450 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16);
1451 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN);
1452 seq->seqid = be32_to_cpup(p++);
1453 seq->slotid = be32_to_cpup(p++);
1454 seq->maxslots = be32_to_cpup(p++);
1455 seq->cachethis = be32_to_cpup(p++);
1456
1457 DECODE_TAIL;
1458 }
1459
1460 static __be32
1461 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1462 {
1463 int i;
1464 __be32 *p, status;
1465 struct nfsd4_test_stateid_id *stateid;
1466
1467 READ_BUF(4);
1468 test_stateid->ts_num_ids = ntohl(*p++);
1469
1470 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1471
1472 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1473 stateid = kmalloc(sizeof(struct nfsd4_test_stateid_id), GFP_KERNEL);
1474 if (!stateid) {
1475 status = nfserrno(-ENOMEM);
1476 goto out;
1477 }
1478
1479 defer_free(argp, kfree, stateid);
1480 INIT_LIST_HEAD(&stateid->ts_id_list);
1481 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1482
1483 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid);
1484 if (status)
1485 goto out;
1486 }
1487
1488 status = 0;
1489 out:
1490 return status;
1491 xdr_error:
1492 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__);
1493 status = nfserr_bad_xdr;
1494 goto out;
1495 }
1496
1497 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc)
1498 {
1499 DECODE_HEAD;
1500
1501 READ_BUF(8);
1502 COPYMEM(&dc->clientid, 8);
1503
1504 DECODE_TAIL;
1505 }
1506
1507 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc)
1508 {
1509 DECODE_HEAD;
1510
1511 READ_BUF(4);
1512 rc->rca_one_fs = be32_to_cpup(p++);
1513
1514 DECODE_TAIL;
1515 }
1516
1517 static __be32
1518 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
1519 {
1520 return nfs_ok;
1521 }
1522
1523 static __be32
1524 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
1525 {
1526 return nfserr_notsupp;
1527 }
1528
1529 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
1530
1531 static nfsd4_dec nfsd4_dec_ops[] = {
1532 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
1533 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
1534 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
1535 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
1536 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
1537 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
1538 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
1539 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
1540 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
1541 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
1542 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
1543 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
1544 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
1545 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
1546 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1547 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
1548 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
1549 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm,
1550 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
1551 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
1552 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh,
1553 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
1554 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
1555 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
1556 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
1557 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
1558 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
1559 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew,
1560 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
1561 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
1562 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
1563 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
1564 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid,
1565 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
1566 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
1567 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
1568 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner,
1569
1570 /* new operations for NFSv4.1 */
1571 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl,
1572 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
1573 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id,
1574 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session,
1575 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session,
1576 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid,
1577 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1578 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp,
1579 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
1580 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp,
1581 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp,
1582 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp,
1583 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name,
1584 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence,
1585 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp,
1586 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid,
1587 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
1588 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid,
1589 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete,
1590 };
1591
1592 static inline bool
1593 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
1594 {
1595 if (op->opnum < FIRST_NFS4_OP)
1596 return false;
1597 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
1598 return false;
1599 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
1600 return false;
1601 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
1602 return false;
1603 return true;
1604 }
1605
1606 static __be32
1607 nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
1608 {
1609 DECODE_HEAD;
1610 struct nfsd4_op *op;
1611 bool cachethis = false;
1612 int auth_slack= argp->rqstp->rq_auth_slack;
1613 int max_reply = auth_slack + 8; /* opcnt, status */
1614 int readcount = 0;
1615 int readbytes = 0;
1616 int i;
1617
1618 READ_BUF(4);
1619 argp->taglen = be32_to_cpup(p++);
1620 READ_BUF(argp->taglen + 8);
1621 SAVEMEM(argp->tag, argp->taglen);
1622 argp->minorversion = be32_to_cpup(p++);
1623 argp->opcnt = be32_to_cpup(p++);
1624 max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2);
1625
1626 if (argp->taglen > NFSD4_MAX_TAGLEN)
1627 goto xdr_error;
1628 if (argp->opcnt > 100)
1629 goto xdr_error;
1630
1631 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
1632 argp->ops = kmalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
1633 if (!argp->ops) {
1634 argp->ops = argp->iops;
1635 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
1636 goto xdr_error;
1637 }
1638 }
1639
1640 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
1641 argp->opcnt = 0;
1642
1643 for (i = 0; i < argp->opcnt; i++) {
1644 op = &argp->ops[i];
1645 op->replay = NULL;
1646
1647 READ_BUF(4);
1648 op->opnum = be32_to_cpup(p++);
1649
1650 if (nfsd4_opnum_in_range(argp, op))
1651 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
1652 else {
1653 op->opnum = OP_ILLEGAL;
1654 op->status = nfserr_op_illegal;
1655 }
1656 /*
1657 * We'll try to cache the result in the DRC if any one
1658 * op in the compound wants to be cached:
1659 */
1660 cachethis |= nfsd4_cache_this_op(op);
1661
1662 if (op->opnum == OP_READ) {
1663 readcount++;
1664 readbytes += nfsd4_max_reply(argp->rqstp, op);
1665 } else
1666 max_reply += nfsd4_max_reply(argp->rqstp, op);
1667
1668 if (op->status) {
1669 argp->opcnt = i+1;
1670 break;
1671 }
1672 }
1673 /* Sessions make the DRC unnecessary: */
1674 if (argp->minorversion)
1675 cachethis = false;
1676 svc_reserve(argp->rqstp, max_reply + readbytes);
1677 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
1678
1679 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
1680 argp->rqstp->rq_splice_ok = false;
1681
1682 DECODE_TAIL;
1683 }
1684
1685 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode)
1686 {
1687 if (IS_I_VERSION(inode)) {
1688 p = xdr_encode_hyper(p, inode->i_version);
1689 } else {
1690 *p++ = cpu_to_be32(stat->ctime.tv_sec);
1691 *p++ = cpu_to_be32(stat->ctime.tv_nsec);
1692 }
1693 return p;
1694 }
1695
1696 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
1697 {
1698 *p++ = cpu_to_be32(c->atomic);
1699 if (c->change_supported) {
1700 p = xdr_encode_hyper(p, c->before_change);
1701 p = xdr_encode_hyper(p, c->after_change);
1702 } else {
1703 *p++ = cpu_to_be32(c->before_ctime_sec);
1704 *p++ = cpu_to_be32(c->before_ctime_nsec);
1705 *p++ = cpu_to_be32(c->after_ctime_sec);
1706 *p++ = cpu_to_be32(c->after_ctime_nsec);
1707 }
1708 return p;
1709 }
1710
1711 /* Encode as an array of strings the string given with components
1712 * separated @sep, escaped with esc_enter and esc_exit.
1713 */
1714 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
1715 char *components, char esc_enter,
1716 char esc_exit)
1717 {
1718 __be32 *p;
1719 __be32 pathlen;
1720 int pathlen_offset;
1721 int strlen, count=0;
1722 char *str, *end, *next;
1723
1724 dprintk("nfsd4_encode_components(%s)\n", components);
1725
1726 pathlen_offset = xdr->buf->len;
1727 p = xdr_reserve_space(xdr, 4);
1728 if (!p)
1729 return nfserr_resource;
1730 p++; /* We will fill this in with @count later */
1731
1732 end = str = components;
1733 while (*end) {
1734 bool found_esc = false;
1735
1736 /* try to parse as esc_start, ..., esc_end, sep */
1737 if (*str == esc_enter) {
1738 for (; *end && (*end != esc_exit); end++)
1739 /* find esc_exit or end of string */;
1740 next = end + 1;
1741 if (*end && (!*next || *next == sep)) {
1742 str++;
1743 found_esc = true;
1744 }
1745 }
1746
1747 if (!found_esc)
1748 for (; *end && (*end != sep); end++)
1749 /* find sep or end of string */;
1750
1751 strlen = end - str;
1752 if (strlen) {
1753 p = xdr_reserve_space(xdr, strlen + 4);
1754 if (!p)
1755 return nfserr_resource;
1756 p = xdr_encode_opaque(p, str, strlen);
1757 count++;
1758 }
1759 else
1760 end++;
1761 str = end;
1762 }
1763 pathlen = htonl(xdr->buf->len - pathlen_offset);
1764 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
1765 return 0;
1766 }
1767
1768 /* Encode as an array of strings the string given with components
1769 * separated @sep.
1770 */
1771 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
1772 char *components)
1773 {
1774 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
1775 }
1776
1777 /*
1778 * encode a location element of a fs_locations structure
1779 */
1780 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
1781 struct nfsd4_fs_location *location)
1782 {
1783 __be32 status;
1784
1785 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
1786 '[', ']');
1787 if (status)
1788 return status;
1789 status = nfsd4_encode_components(xdr, '/', location->path);
1790 if (status)
1791 return status;
1792 return 0;
1793 }
1794
1795 /*
1796 * Encode a path in RFC3530 'pathname4' format
1797 */
1798 static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
1799 const struct path *root,
1800 const struct path *path)
1801 {
1802 struct path cur = *path;
1803 __be32 *p;
1804 struct dentry **components = NULL;
1805 unsigned int ncomponents = 0;
1806 __be32 err = nfserr_jukebox;
1807
1808 dprintk("nfsd4_encode_components(");
1809
1810 path_get(&cur);
1811 /* First walk the path up to the nfsd root, and store the
1812 * dentries/path components in an array.
1813 */
1814 for (;;) {
1815 if (cur.dentry == root->dentry && cur.mnt == root->mnt)
1816 break;
1817 if (cur.dentry == cur.mnt->mnt_root) {
1818 if (follow_up(&cur))
1819 continue;
1820 goto out_free;
1821 }
1822 if ((ncomponents & 15) == 0) {
1823 struct dentry **new;
1824 new = krealloc(components,
1825 sizeof(*new) * (ncomponents + 16),
1826 GFP_KERNEL);
1827 if (!new)
1828 goto out_free;
1829 components = new;
1830 }
1831 components[ncomponents++] = cur.dentry;
1832 cur.dentry = dget_parent(cur.dentry);
1833 }
1834 err = nfserr_resource;
1835 p = xdr_reserve_space(xdr, 4);
1836 if (!p)
1837 goto out_free;
1838 *p++ = cpu_to_be32(ncomponents);
1839
1840 while (ncomponents) {
1841 struct dentry *dentry = components[ncomponents - 1];
1842 unsigned int len;
1843
1844 spin_lock(&dentry->d_lock);
1845 len = dentry->d_name.len;
1846 p = xdr_reserve_space(xdr, len + 4);
1847 if (!p) {
1848 spin_unlock(&dentry->d_lock);
1849 goto out_free;
1850 }
1851 p = xdr_encode_opaque(p, dentry->d_name.name, len);
1852 dprintk("/%s", dentry->d_name.name);
1853 spin_unlock(&dentry->d_lock);
1854 dput(dentry);
1855 ncomponents--;
1856 }
1857
1858 err = 0;
1859 out_free:
1860 dprintk(")\n");
1861 while (ncomponents)
1862 dput(components[--ncomponents]);
1863 kfree(components);
1864 path_put(&cur);
1865 return err;
1866 }
1867
1868 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
1869 struct svc_rqst *rqstp, const struct path *path)
1870 {
1871 struct svc_export *exp_ps;
1872 __be32 res;
1873
1874 exp_ps = rqst_find_fsidzero_export(rqstp);
1875 if (IS_ERR(exp_ps))
1876 return nfserrno(PTR_ERR(exp_ps));
1877 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
1878 exp_put(exp_ps);
1879 return res;
1880 }
1881
1882 /*
1883 * encode a fs_locations structure
1884 */
1885 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
1886 struct svc_rqst *rqstp, struct svc_export *exp)
1887 {
1888 __be32 status;
1889 int i;
1890 __be32 *p;
1891 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
1892
1893 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
1894 if (status)
1895 return status;
1896 p = xdr_reserve_space(xdr, 4);
1897 if (!p)
1898 return nfserr_resource;
1899 *p++ = cpu_to_be32(fslocs->locations_count);
1900 for (i=0; i<fslocs->locations_count; i++) {
1901 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
1902 if (status)
1903 return status;
1904 }
1905 return 0;
1906 }
1907
1908 static u32 nfs4_file_type(umode_t mode)
1909 {
1910 switch (mode & S_IFMT) {
1911 case S_IFIFO: return NF4FIFO;
1912 case S_IFCHR: return NF4CHR;
1913 case S_IFDIR: return NF4DIR;
1914 case S_IFBLK: return NF4BLK;
1915 case S_IFLNK: return NF4LNK;
1916 case S_IFREG: return NF4REG;
1917 case S_IFSOCK: return NF4SOCK;
1918 default: return NF4BAD;
1919 };
1920 }
1921
1922 static inline __be32
1923 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1924 struct nfs4_ace *ace)
1925 {
1926 if (ace->whotype != NFS4_ACL_WHO_NAMED)
1927 return nfs4_acl_write_who(xdr, ace->whotype);
1928 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
1929 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
1930 else
1931 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
1932 }
1933
1934 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
1935 FATTR4_WORD0_RDATTR_ERROR)
1936 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
1937
1938 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
1939 static inline __be32
1940 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1941 void *context, int len)
1942 {
1943 __be32 *p;
1944
1945 p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
1946 if (!p)
1947 return nfserr_resource;
1948
1949 /*
1950 * For now we use a 0 here to indicate the null translation; in
1951 * the future we may place a call to translation code here.
1952 */
1953 *p++ = cpu_to_be32(0); /* lfs */
1954 *p++ = cpu_to_be32(0); /* pi */
1955 p = xdr_encode_opaque(p, context, len);
1956 return 0;
1957 }
1958 #else
1959 static inline __be32
1960 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
1961 void *context, int len)
1962 { return 0; }
1963 #endif
1964
1965 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *rdattr_err)
1966 {
1967 /* As per referral draft: */
1968 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
1969 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
1970 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
1971 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
1972 *rdattr_err = NFSERR_MOVED;
1973 else
1974 return nfserr_moved;
1975 }
1976 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
1977 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
1978 return 0;
1979 }
1980
1981
1982 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat)
1983 {
1984 struct path path = exp->ex_path;
1985 int err;
1986
1987 path_get(&path);
1988 while (follow_up(&path)) {
1989 if (path.dentry != path.mnt->mnt_root)
1990 break;
1991 }
1992 err = vfs_getattr(&path, stat);
1993 path_put(&path);
1994 return err;
1995 }
1996
1997 /*
1998 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
1999 * ourselves.
2000 */
2001 static __be32
2002 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2003 struct svc_export *exp,
2004 struct dentry *dentry, u32 *bmval,
2005 struct svc_rqst *rqstp, int ignore_crossmnt)
2006 {
2007 u32 bmval0 = bmval[0];
2008 u32 bmval1 = bmval[1];
2009 u32 bmval2 = bmval[2];
2010 struct kstat stat;
2011 struct svc_fh *tempfh = NULL;
2012 struct kstatfs statfs;
2013 __be32 *p;
2014 int starting_len = xdr->buf->len;
2015 int attrlen_offset;
2016 __be32 attrlen;
2017 u32 dummy;
2018 u64 dummy64;
2019 u32 rdattr_err = 0;
2020 __be32 status;
2021 int err;
2022 int aclsupport = 0;
2023 struct nfs4_acl *acl = NULL;
2024 void *context = NULL;
2025 int contextlen;
2026 bool contextsupport = false;
2027 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2028 u32 minorversion = resp->cstate.minorversion;
2029 struct path path = {
2030 .mnt = exp->ex_path.mnt,
2031 .dentry = dentry,
2032 };
2033 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2034
2035 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2036 BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion));
2037 BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion));
2038 BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion));
2039
2040 if (exp->ex_fslocs.migrated) {
2041 BUG_ON(bmval[2]);
2042 status = fattr_handle_absent_fs(&bmval0, &bmval1, &rdattr_err);
2043 if (status)
2044 goto out;
2045 }
2046
2047 err = vfs_getattr(&path, &stat);
2048 if (err)
2049 goto out_nfserr;
2050 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2051 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2052 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2053 FATTR4_WORD1_SPACE_TOTAL))) {
2054 err = vfs_statfs(&path, &statfs);
2055 if (err)
2056 goto out_nfserr;
2057 }
2058 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2059 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2060 status = nfserr_jukebox;
2061 if (!tempfh)
2062 goto out;
2063 fh_init(tempfh, NFS4_FHSIZE);
2064 status = fh_compose(tempfh, exp, dentry, NULL);
2065 if (status)
2066 goto out;
2067 fhp = tempfh;
2068 }
2069 if (bmval0 & (FATTR4_WORD0_ACL | FATTR4_WORD0_ACLSUPPORT
2070 | FATTR4_WORD0_SUPPORTED_ATTRS)) {
2071 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2072 aclsupport = (err == 0);
2073 if (bmval0 & FATTR4_WORD0_ACL) {
2074 if (err == -EOPNOTSUPP)
2075 bmval0 &= ~FATTR4_WORD0_ACL;
2076 else if (err == -EINVAL) {
2077 status = nfserr_attrnotsupp;
2078 goto out;
2079 } else if (err != 0)
2080 goto out_nfserr;
2081 }
2082 }
2083
2084 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2085 if ((bmval[2] & FATTR4_WORD2_SECURITY_LABEL) ||
2086 bmval[0] & FATTR4_WORD0_SUPPORTED_ATTRS) {
2087 err = security_inode_getsecctx(dentry->d_inode,
2088 &context, &contextlen);
2089 contextsupport = (err == 0);
2090 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2091 if (err == -EOPNOTSUPP)
2092 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2093 else if (err)
2094 goto out_nfserr;
2095 }
2096 }
2097 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2098
2099 if (bmval2) {
2100 p = xdr_reserve_space(xdr, 16);
2101 if (!p)
2102 goto out_resource;
2103 *p++ = cpu_to_be32(3);
2104 *p++ = cpu_to_be32(bmval0);
2105 *p++ = cpu_to_be32(bmval1);
2106 *p++ = cpu_to_be32(bmval2);
2107 } else if (bmval1) {
2108 p = xdr_reserve_space(xdr, 12);
2109 if (!p)
2110 goto out_resource;
2111 *p++ = cpu_to_be32(2);
2112 *p++ = cpu_to_be32(bmval0);
2113 *p++ = cpu_to_be32(bmval1);
2114 } else {
2115 p = xdr_reserve_space(xdr, 8);
2116 if (!p)
2117 goto out_resource;
2118 *p++ = cpu_to_be32(1);
2119 *p++ = cpu_to_be32(bmval0);
2120 }
2121
2122 attrlen_offset = xdr->buf->len;
2123 p = xdr_reserve_space(xdr, 4);
2124 if (!p)
2125 goto out_resource;
2126 p++; /* to be backfilled later */
2127
2128 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2129 u32 word0 = nfsd_suppattrs0(minorversion);
2130 u32 word1 = nfsd_suppattrs1(minorversion);
2131 u32 word2 = nfsd_suppattrs2(minorversion);
2132
2133 if (!aclsupport)
2134 word0 &= ~FATTR4_WORD0_ACL;
2135 if (!contextsupport)
2136 word2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2137 if (!word2) {
2138 p = xdr_reserve_space(xdr, 12);
2139 if (!p)
2140 goto out_resource;
2141 *p++ = cpu_to_be32(2);
2142 *p++ = cpu_to_be32(word0);
2143 *p++ = cpu_to_be32(word1);
2144 } else {
2145 p = xdr_reserve_space(xdr, 16);
2146 if (!p)
2147 goto out_resource;
2148 *p++ = cpu_to_be32(3);
2149 *p++ = cpu_to_be32(word0);
2150 *p++ = cpu_to_be32(word1);
2151 *p++ = cpu_to_be32(word2);
2152 }
2153 }
2154 if (bmval0 & FATTR4_WORD0_TYPE) {
2155 p = xdr_reserve_space(xdr, 4);
2156 if (!p)
2157 goto out_resource;
2158 dummy = nfs4_file_type(stat.mode);
2159 if (dummy == NF4BAD) {
2160 status = nfserr_serverfault;
2161 goto out;
2162 }
2163 *p++ = cpu_to_be32(dummy);
2164 }
2165 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
2166 p = xdr_reserve_space(xdr, 4);
2167 if (!p)
2168 goto out_resource;
2169 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
2170 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
2171 else
2172 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
2173 NFS4_FH_VOL_RENAME);
2174 }
2175 if (bmval0 & FATTR4_WORD0_CHANGE) {
2176 p = xdr_reserve_space(xdr, 8);
2177 if (!p)
2178 goto out_resource;
2179 p = encode_change(p, &stat, dentry->d_inode);
2180 }
2181 if (bmval0 & FATTR4_WORD0_SIZE) {
2182 p = xdr_reserve_space(xdr, 8);
2183 if (!p)
2184 goto out_resource;
2185 p = xdr_encode_hyper(p, stat.size);
2186 }
2187 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
2188 p = xdr_reserve_space(xdr, 4);
2189 if (!p)
2190 goto out_resource;
2191 *p++ = cpu_to_be32(1);
2192 }
2193 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
2194 p = xdr_reserve_space(xdr, 4);
2195 if (!p)
2196 goto out_resource;
2197 *p++ = cpu_to_be32(1);
2198 }
2199 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
2200 p = xdr_reserve_space(xdr, 4);
2201 if (!p)
2202 goto out_resource;
2203 *p++ = cpu_to_be32(0);
2204 }
2205 if (bmval0 & FATTR4_WORD0_FSID) {
2206 p = xdr_reserve_space(xdr, 16);
2207 if (!p)
2208 goto out_resource;
2209 if (exp->ex_fslocs.migrated) {
2210 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
2211 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
2212 } else switch(fsid_source(fhp)) {
2213 case FSIDSOURCE_FSID:
2214 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
2215 p = xdr_encode_hyper(p, (u64)0);
2216 break;
2217 case FSIDSOURCE_DEV:
2218 *p++ = cpu_to_be32(0);
2219 *p++ = cpu_to_be32(MAJOR(stat.dev));
2220 *p++ = cpu_to_be32(0);
2221 *p++ = cpu_to_be32(MINOR(stat.dev));
2222 break;
2223 case FSIDSOURCE_UUID:
2224 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
2225 EX_UUID_LEN);
2226 break;
2227 }
2228 }
2229 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
2230 p = xdr_reserve_space(xdr, 4);
2231 if (!p)
2232 goto out_resource;
2233 *p++ = cpu_to_be32(0);
2234 }
2235 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
2236 p = xdr_reserve_space(xdr, 4);
2237 if (!p)
2238 goto out_resource;
2239 *p++ = cpu_to_be32(nn->nfsd4_lease);
2240 }
2241 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
2242 p = xdr_reserve_space(xdr, 4);
2243 if (!p)
2244 goto out_resource;
2245 *p++ = cpu_to_be32(rdattr_err);
2246 }
2247 if (bmval0 & FATTR4_WORD0_ACL) {
2248 struct nfs4_ace *ace;
2249
2250 if (acl == NULL) {
2251 p = xdr_reserve_space(xdr, 4);
2252 if (!p)
2253 goto out_resource;
2254
2255 *p++ = cpu_to_be32(0);
2256 goto out_acl;
2257 }
2258 p = xdr_reserve_space(xdr, 4);
2259 if (!p)
2260 goto out_resource;
2261 *p++ = cpu_to_be32(acl->naces);
2262
2263 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
2264 p = xdr_reserve_space(xdr, 4*3);
2265 if (!p)
2266 goto out_resource;
2267 *p++ = cpu_to_be32(ace->type);
2268 *p++ = cpu_to_be32(ace->flag);
2269 *p++ = cpu_to_be32(ace->access_mask &
2270 NFS4_ACE_MASK_ALL);
2271 status = nfsd4_encode_aclname(xdr, rqstp, ace);
2272 if (status)
2273 goto out;
2274 }
2275 }
2276 out_acl:
2277 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
2278 p = xdr_reserve_space(xdr, 4);
2279 if (!p)
2280 goto out_resource;
2281 *p++ = cpu_to_be32(aclsupport ?
2282 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
2283 }
2284 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
2285 p = xdr_reserve_space(xdr, 4);
2286 if (!p)
2287 goto out_resource;
2288 *p++ = cpu_to_be32(1);
2289 }
2290 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
2291 p = xdr_reserve_space(xdr, 4);
2292 if (!p)
2293 goto out_resource;
2294 *p++ = cpu_to_be32(0);
2295 }
2296 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
2297 p = xdr_reserve_space(xdr, 4);
2298 if (!p)
2299 goto out_resource;
2300 *p++ = cpu_to_be32(1);
2301 }
2302 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
2303 p = xdr_reserve_space(xdr, 4);
2304 if (!p)
2305 goto out_resource;
2306 *p++ = cpu_to_be32(1);
2307 }
2308 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
2309 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
2310 if (!p)
2311 goto out_resource;
2312 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base,
2313 fhp->fh_handle.fh_size);
2314 }
2315 if (bmval0 & FATTR4_WORD0_FILEID) {
2316 p = xdr_reserve_space(xdr, 8);
2317 if (!p)
2318 goto out_resource;
2319 p = xdr_encode_hyper(p, stat.ino);
2320 }
2321 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
2322 p = xdr_reserve_space(xdr, 8);
2323 if (!p)
2324 goto out_resource;
2325 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
2326 }
2327 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
2328 p = xdr_reserve_space(xdr, 8);
2329 if (!p)
2330 goto out_resource;
2331 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
2332 }
2333 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
2334 p = xdr_reserve_space(xdr, 8);
2335 if (!p)
2336 goto out_resource;
2337 p = xdr_encode_hyper(p, (u64) statfs.f_files);
2338 }
2339 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
2340 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
2341 if (status)
2342 goto out;
2343 }
2344 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
2345 p = xdr_reserve_space(xdr, 4);
2346 if (!p)
2347 goto out_resource;
2348 *p++ = cpu_to_be32(1);
2349 }
2350 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
2351 p = xdr_reserve_space(xdr, 8);
2352 if (!p)
2353 goto out_resource;
2354 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
2355 }
2356 if (bmval0 & FATTR4_WORD0_MAXLINK) {
2357 p = xdr_reserve_space(xdr, 4);
2358 if (!p)
2359 goto out_resource;
2360 *p++ = cpu_to_be32(255);
2361 }
2362 if (bmval0 & FATTR4_WORD0_MAXNAME) {
2363 p = xdr_reserve_space(xdr, 4);
2364 if (!p)
2365 goto out_resource;
2366 *p++ = cpu_to_be32(statfs.f_namelen);
2367 }
2368 if (bmval0 & FATTR4_WORD0_MAXREAD) {
2369 p = xdr_reserve_space(xdr, 8);
2370 if (!p)
2371 goto out_resource;
2372 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
2373 }
2374 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
2375 p = xdr_reserve_space(xdr, 8);
2376 if (!p)
2377 goto out_resource;
2378 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
2379 }
2380 if (bmval1 & FATTR4_WORD1_MODE) {
2381 p = xdr_reserve_space(xdr, 4);
2382 if (!p)
2383 goto out_resource;
2384 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
2385 }
2386 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
2387 p = xdr_reserve_space(xdr, 4);
2388 if (!p)
2389 goto out_resource;
2390 *p++ = cpu_to_be32(1);
2391 }
2392 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
2393 p = xdr_reserve_space(xdr, 4);
2394 if (!p)
2395 goto out_resource;
2396 *p++ = cpu_to_be32(stat.nlink);
2397 }
2398 if (bmval1 & FATTR4_WORD1_OWNER) {
2399 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
2400 if (status)
2401 goto out;
2402 }
2403 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
2404 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
2405 if (status)
2406 goto out;
2407 }
2408 if (bmval1 & FATTR4_WORD1_RAWDEV) {
2409 p = xdr_reserve_space(xdr, 8);
2410 if (!p)
2411 goto out_resource;
2412 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
2413 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
2414 }
2415 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
2416 p = xdr_reserve_space(xdr, 8);
2417 if (!p)
2418 goto out_resource;
2419 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
2420 p = xdr_encode_hyper(p, dummy64);
2421 }
2422 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
2423 p = xdr_reserve_space(xdr, 8);
2424 if (!p)
2425 goto out_resource;
2426 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
2427 p = xdr_encode_hyper(p, dummy64);
2428 }
2429 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
2430 p = xdr_reserve_space(xdr, 8);
2431 if (!p)
2432 goto out_resource;
2433 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
2434 p = xdr_encode_hyper(p, dummy64);
2435 }
2436 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
2437 p = xdr_reserve_space(xdr, 8);
2438 if (!p)
2439 goto out_resource;
2440 dummy64 = (u64)stat.blocks << 9;
2441 p = xdr_encode_hyper(p, dummy64);
2442 }
2443 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
2444 p = xdr_reserve_space(xdr, 12);
2445 if (!p)
2446 goto out_resource;
2447 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
2448 *p++ = cpu_to_be32(stat.atime.tv_nsec);
2449 }
2450 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
2451 p = xdr_reserve_space(xdr, 12);
2452 if (!p)
2453 goto out_resource;
2454 *p++ = cpu_to_be32(0);
2455 *p++ = cpu_to_be32(1);
2456 *p++ = cpu_to_be32(0);
2457 }
2458 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
2459 p = xdr_reserve_space(xdr, 12);
2460 if (!p)
2461 goto out_resource;
2462 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
2463 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
2464 }
2465 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
2466 p = xdr_reserve_space(xdr, 12);
2467 if (!p)
2468 goto out_resource;
2469 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
2470 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
2471 }
2472 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
2473 p = xdr_reserve_space(xdr, 8);
2474 if (!p)
2475 goto out_resource;
2476 /*
2477 * Get parent's attributes if not ignoring crossmount
2478 * and this is the root of a cross-mounted filesystem.
2479 */
2480 if (ignore_crossmnt == 0 &&
2481 dentry == exp->ex_path.mnt->mnt_root)
2482 get_parent_attributes(exp, &stat);
2483 p = xdr_encode_hyper(p, stat.ino);
2484 }
2485 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2486 status = nfsd4_encode_security_label(xdr, rqstp, context,
2487 contextlen);
2488 if (status)
2489 goto out;
2490 }
2491 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
2492 p = xdr_reserve_space(xdr, 16);
2493 if (!p)
2494 goto out_resource;
2495 *p++ = cpu_to_be32(3);
2496 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0);
2497 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1);
2498 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2);
2499 }
2500
2501 attrlen = htonl(xdr->buf->len - attrlen_offset - 4);
2502 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4);
2503 status = nfs_ok;
2504
2505 out:
2506 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2507 if (context)
2508 security_release_secctx(context, contextlen);
2509 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2510 kfree(acl);
2511 if (tempfh) {
2512 fh_put(tempfh);
2513 kfree(tempfh);
2514 }
2515 if (status)
2516 xdr_truncate_encode(xdr, starting_len);
2517 return status;
2518 out_nfserr:
2519 status = nfserrno(err);
2520 goto out;
2521 out_resource:
2522 status = nfserr_resource;
2523 goto out;
2524 }
2525
2526 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
2527 struct xdr_buf *buf, __be32 *p, int bytes)
2528 {
2529 xdr->scratch.iov_len = 0;
2530 memset(buf, 0, sizeof(struct xdr_buf));
2531 buf->head[0].iov_base = p;
2532 buf->head[0].iov_len = 0;
2533 buf->len = 0;
2534 xdr->buf = buf;
2535 xdr->iov = buf->head;
2536 xdr->p = p;
2537 xdr->end = (void *)p + bytes;
2538 buf->buflen = bytes;
2539 }
2540
2541 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
2542 struct svc_fh *fhp, struct svc_export *exp,
2543 struct dentry *dentry, u32 *bmval,
2544 struct svc_rqst *rqstp, int ignore_crossmnt)
2545 {
2546 struct xdr_buf dummy;
2547 struct xdr_stream xdr;
2548 __be32 ret;
2549
2550 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
2551 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
2552 ignore_crossmnt);
2553 *p = xdr.p;
2554 return ret;
2555 }
2556
2557 static inline int attributes_need_mount(u32 *bmval)
2558 {
2559 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
2560 return 1;
2561 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
2562 return 1;
2563 return 0;
2564 }
2565
2566 static __be32
2567 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
2568 const char *name, int namlen)
2569 {
2570 struct svc_export *exp = cd->rd_fhp->fh_export;
2571 struct dentry *dentry;
2572 __be32 nfserr;
2573 int ignore_crossmnt = 0;
2574
2575 dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen);
2576 if (IS_ERR(dentry))
2577 return nfserrno(PTR_ERR(dentry));
2578 if (!dentry->d_inode) {
2579 /*
2580 * nfsd_buffered_readdir drops the i_mutex between
2581 * readdir and calling this callback, leaving a window
2582 * where this directory entry could have gone away.
2583 */
2584 dput(dentry);
2585 return nfserr_noent;
2586 }
2587
2588 exp_get(exp);
2589 /*
2590 * In the case of a mountpoint, the client may be asking for
2591 * attributes that are only properties of the underlying filesystem
2592 * as opposed to the cross-mounted file system. In such a case,
2593 * we will not follow the cross mount and will fill the attribtutes
2594 * directly from the mountpoint dentry.
2595 */
2596 if (nfsd_mountpoint(dentry, exp)) {
2597 int err;
2598
2599 if (!(exp->ex_flags & NFSEXP_V4ROOT)
2600 && !attributes_need_mount(cd->rd_bmval)) {
2601 ignore_crossmnt = 1;
2602 goto out_encode;
2603 }
2604 /*
2605 * Why the heck aren't we just using nfsd_lookup??
2606 * Different "."/".." handling? Something else?
2607 * At least, add a comment here to explain....
2608 */
2609 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
2610 if (err) {
2611 nfserr = nfserrno(err);
2612 goto out_put;
2613 }
2614 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
2615 if (nfserr)
2616 goto out_put;
2617
2618 }
2619 out_encode:
2620 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
2621 cd->rd_rqstp, ignore_crossmnt);
2622 out_put:
2623 dput(dentry);
2624 exp_put(exp);
2625 return nfserr;
2626 }
2627
2628 static __be32 *
2629 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
2630 {
2631 __be32 *p;
2632
2633 p = xdr_reserve_space(xdr, 6);
2634 if (!p)
2635 return NULL;
2636 *p++ = htonl(2);
2637 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
2638 *p++ = htonl(0); /* bmval1 */
2639
2640 *p++ = htonl(4); /* attribute length */
2641 *p++ = nfserr; /* no htonl */
2642 return p;
2643 }
2644
2645 static int
2646 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
2647 loff_t offset, u64 ino, unsigned int d_type)
2648 {
2649 struct readdir_cd *ccd = ccdv;
2650 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
2651 struct xdr_stream *xdr = cd->xdr;
2652 int start_offset = xdr->buf->len;
2653 int cookie_offset;
2654 int entry_bytes;
2655 __be32 nfserr = nfserr_toosmall;
2656 __be64 wire_offset;
2657 __be32 *p;
2658
2659 /* In nfsv4, "." and ".." never make it onto the wire.. */
2660 if (name && isdotent(name, namlen)) {
2661 cd->common.err = nfs_ok;
2662 return 0;
2663 }
2664
2665 if (cd->cookie_offset) {
2666 wire_offset = cpu_to_be64(offset);
2667 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
2668 &wire_offset, 8);
2669 }
2670
2671 p = xdr_reserve_space(xdr, 4);
2672 if (!p)
2673 goto fail;
2674 *p++ = xdr_one; /* mark entry present */
2675 cookie_offset = xdr->buf->len;
2676 p = xdr_reserve_space(xdr, 3*4 + namlen);
2677 if (!p)
2678 goto fail;
2679 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */
2680 p = xdr_encode_array(p, name, namlen); /* name length & name */
2681
2682 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
2683 switch (nfserr) {
2684 case nfs_ok:
2685 break;
2686 case nfserr_resource:
2687 nfserr = nfserr_toosmall;
2688 goto fail;
2689 case nfserr_noent:
2690 xdr_truncate_encode(xdr, start_offset);
2691 goto skip_entry;
2692 default:
2693 /*
2694 * If the client requested the RDATTR_ERROR attribute,
2695 * we stuff the error code into this attribute
2696 * and continue. If this attribute was not requested,
2697 * then in accordance with the spec, we fail the
2698 * entire READDIR operation(!)
2699 */
2700 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
2701 goto fail;
2702 p = nfsd4_encode_rdattr_error(xdr, nfserr);
2703 if (p == NULL) {
2704 nfserr = nfserr_toosmall;
2705 goto fail;
2706 }
2707 }
2708 nfserr = nfserr_toosmall;
2709 entry_bytes = xdr->buf->len - start_offset;
2710 if (entry_bytes > cd->rd_maxcount)
2711 goto fail;
2712 cd->rd_maxcount -= entry_bytes;
2713 if (!cd->rd_dircount)
2714 goto fail;
2715 cd->rd_dircount--;
2716 cd->cookie_offset = cookie_offset;
2717 skip_entry:
2718 cd->common.err = nfs_ok;
2719 return 0;
2720 fail:
2721 xdr_truncate_encode(xdr, start_offset);
2722 cd->common.err = nfserr;
2723 return -EINVAL;
2724 }
2725
2726 static __be32
2727 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
2728 {
2729 __be32 *p;
2730
2731 p = xdr_reserve_space(xdr, sizeof(stateid_t));
2732 if (!p)
2733 return nfserr_resource;
2734 *p++ = cpu_to_be32(sid->si_generation);
2735 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
2736 sizeof(stateid_opaque_t));
2737 return 0;
2738 }
2739
2740 static __be32
2741 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
2742 {
2743 struct xdr_stream *xdr = &resp->xdr;
2744 __be32 *p;
2745
2746 if (!nfserr) {
2747 p = xdr_reserve_space(xdr, 8);
2748 if (!p)
2749 return nfserr_resource;
2750 *p++ = cpu_to_be32(access->ac_supported);
2751 *p++ = cpu_to_be32(access->ac_resp_access);
2752 }
2753 return nfserr;
2754 }
2755
2756 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
2757 {
2758 struct xdr_stream *xdr = &resp->xdr;
2759 __be32 *p;
2760
2761 if (!nfserr) {
2762 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
2763 if (!p)
2764 return nfserr_resource;
2765 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
2766 NFS4_MAX_SESSIONID_LEN);
2767 *p++ = cpu_to_be32(bcts->dir);
2768 /* Sorry, we do not yet support RDMA over 4.1: */
2769 *p++ = cpu_to_be32(0);
2770 }
2771 return nfserr;
2772 }
2773
2774 static __be32
2775 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
2776 {
2777 struct xdr_stream *xdr = &resp->xdr;
2778
2779 if (!nfserr)
2780 nfserr = nfsd4_encode_stateid(xdr, &close->cl_stateid);
2781
2782 return nfserr;
2783 }
2784
2785
2786 static __be32
2787 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
2788 {
2789 struct xdr_stream *xdr = &resp->xdr;
2790 __be32 *p;
2791
2792 if (!nfserr) {
2793 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
2794 if (!p)
2795 return nfserr_resource;
2796 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
2797 NFS4_VERIFIER_SIZE);
2798 }
2799 return nfserr;
2800 }
2801
2802 static __be32
2803 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
2804 {
2805 struct xdr_stream *xdr = &resp->xdr;
2806 __be32 *p;
2807
2808 if (!nfserr) {
2809 p = xdr_reserve_space(xdr, 32);
2810 if (!p)
2811 return nfserr_resource;
2812 p = encode_cinfo(p, &create->cr_cinfo);
2813 *p++ = cpu_to_be32(2);
2814 *p++ = cpu_to_be32(create->cr_bmval[0]);
2815 *p++ = cpu_to_be32(create->cr_bmval[1]);
2816 }
2817 return nfserr;
2818 }
2819
2820 static __be32
2821 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
2822 {
2823 struct svc_fh *fhp = getattr->ga_fhp;
2824 struct xdr_stream *xdr = &resp->xdr;
2825
2826 if (nfserr)
2827 return nfserr;
2828
2829 nfserr = nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
2830 getattr->ga_bmval,
2831 resp->rqstp, 0);
2832 return nfserr;
2833 }
2834
2835 static __be32
2836 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
2837 {
2838 struct xdr_stream *xdr = &resp->xdr;
2839 struct svc_fh *fhp = *fhpp;
2840 unsigned int len;
2841 __be32 *p;
2842
2843 if (!nfserr) {
2844 len = fhp->fh_handle.fh_size;
2845 p = xdr_reserve_space(xdr, len + 4);
2846 if (!p)
2847 return nfserr_resource;
2848 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len);
2849 }
2850 return nfserr;
2851 }
2852
2853 /*
2854 * Including all fields other than the name, a LOCK4denied structure requires
2855 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
2856 */
2857 static __be32
2858 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
2859 {
2860 struct xdr_netobj *conf = &ld->ld_owner;
2861 __be32 *p;
2862
2863 again:
2864 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
2865 if (!p) {
2866 /*
2867 * Don't fail to return the result just because we can't
2868 * return the conflicting open:
2869 */
2870 if (conf->len) {
2871 conf->len = 0;
2872 conf->data = NULL;
2873 goto again;
2874 }
2875 return nfserr_resource;
2876 }
2877 p = xdr_encode_hyper(p, ld->ld_start);
2878 p = xdr_encode_hyper(p, ld->ld_length);
2879 *p++ = cpu_to_be32(ld->ld_type);
2880 if (conf->len) {
2881 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
2882 p = xdr_encode_opaque(p, conf->data, conf->len);
2883 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
2884 p = xdr_encode_hyper(p, (u64)0); /* clientid */
2885 *p++ = cpu_to_be32(0); /* length of owner name */
2886 }
2887 return nfserr_denied;
2888 }
2889
2890 static __be32
2891 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
2892 {
2893 struct xdr_stream *xdr = &resp->xdr;
2894
2895 if (!nfserr)
2896 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
2897 else if (nfserr == nfserr_denied)
2898 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
2899 kfree(lock->lk_denied.ld_owner.data);
2900 return nfserr;
2901 }
2902
2903 static __be32
2904 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
2905 {
2906 struct xdr_stream *xdr = &resp->xdr;
2907
2908 if (nfserr == nfserr_denied)
2909 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
2910 return nfserr;
2911 }
2912
2913 static __be32
2914 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
2915 {
2916 struct xdr_stream *xdr = &resp->xdr;
2917
2918 if (!nfserr)
2919 nfserr = nfsd4_encode_stateid(xdr, &locku->lu_stateid);
2920
2921 return nfserr;
2922 }
2923
2924
2925 static __be32
2926 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
2927 {
2928 struct xdr_stream *xdr = &resp->xdr;
2929 __be32 *p;
2930
2931 if (!nfserr) {
2932 p = xdr_reserve_space(xdr, 20);
2933 if (!p)
2934 return nfserr_resource;
2935 p = encode_cinfo(p, &link->li_cinfo);
2936 }
2937 return nfserr;
2938 }
2939
2940
2941 static __be32
2942 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
2943 {
2944 struct xdr_stream *xdr = &resp->xdr;
2945 __be32 *p;
2946
2947 if (nfserr)
2948 goto out;
2949
2950 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
2951 if (nfserr)
2952 goto out;
2953 p = xdr_reserve_space(xdr, 40);
2954 if (!p)
2955 return nfserr_resource;
2956 p = encode_cinfo(p, &open->op_cinfo);
2957 *p++ = cpu_to_be32(open->op_rflags);
2958 *p++ = cpu_to_be32(2);
2959 *p++ = cpu_to_be32(open->op_bmval[0]);
2960 *p++ = cpu_to_be32(open->op_bmval[1]);
2961 *p++ = cpu_to_be32(open->op_delegate_type);
2962
2963 switch (open->op_delegate_type) {
2964 case NFS4_OPEN_DELEGATE_NONE:
2965 break;
2966 case NFS4_OPEN_DELEGATE_READ:
2967 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
2968 if (nfserr)
2969 return nfserr;
2970 p = xdr_reserve_space(xdr, 20);
2971 if (!p)
2972 return nfserr_resource;
2973 *p++ = cpu_to_be32(open->op_recall);
2974
2975 /*
2976 * TODO: ACE's in delegations
2977 */
2978 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
2979 *p++ = cpu_to_be32(0);
2980 *p++ = cpu_to_be32(0);
2981 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
2982 break;
2983 case NFS4_OPEN_DELEGATE_WRITE:
2984 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
2985 if (nfserr)
2986 return nfserr;
2987 p = xdr_reserve_space(xdr, 32);
2988 if (!p)
2989 return nfserr_resource;
2990 *p++ = cpu_to_be32(0);
2991
2992 /*
2993 * TODO: space_limit's in delegations
2994 */
2995 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
2996 *p++ = cpu_to_be32(~(u32)0);
2997 *p++ = cpu_to_be32(~(u32)0);
2998
2999 /*
3000 * TODO: ACE's in delegations
3001 */
3002 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3003 *p++ = cpu_to_be32(0);
3004 *p++ = cpu_to_be32(0);
3005 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3006 break;
3007 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3008 switch (open->op_why_no_deleg) {
3009 case WND4_CONTENTION:
3010 case WND4_RESOURCE:
3011 p = xdr_reserve_space(xdr, 8);
3012 if (!p)
3013 return nfserr_resource;
3014 *p++ = cpu_to_be32(open->op_why_no_deleg);
3015 /* deleg signaling not supported yet: */
3016 *p++ = cpu_to_be32(0);
3017 break;
3018 default:
3019 p = xdr_reserve_space(xdr, 4);
3020 if (!p)
3021 return nfserr_resource;
3022 *p++ = cpu_to_be32(open->op_why_no_deleg);
3023 }
3024 break;
3025 default:
3026 BUG();
3027 }
3028 /* XXX save filehandle here */
3029 out:
3030 return nfserr;
3031 }
3032
3033 static __be32
3034 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
3035 {
3036 struct xdr_stream *xdr = &resp->xdr;
3037
3038 if (!nfserr)
3039 nfserr = nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
3040
3041 return nfserr;
3042 }
3043
3044 static __be32
3045 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
3046 {
3047 struct xdr_stream *xdr = &resp->xdr;
3048
3049 if (!nfserr)
3050 nfserr = nfsd4_encode_stateid(xdr, &od->od_stateid);
3051
3052 return nfserr;
3053 }
3054
3055 static __be32 nfsd4_encode_splice_read(
3056 struct nfsd4_compoundres *resp,
3057 struct nfsd4_read *read,
3058 struct file *file, unsigned long maxcount)
3059 {
3060 struct xdr_stream *xdr = &resp->xdr;
3061 struct xdr_buf *buf = xdr->buf;
3062 u32 eof;
3063 int space_left;
3064 __be32 nfserr;
3065 __be32 *p = xdr->p - 2;
3066
3067 /*
3068 * Don't inline pages unless we know there's room for eof,
3069 * count, and possible padding:
3070 */
3071 if (xdr->end - xdr->p < 3)
3072 return nfserr_resource;
3073
3074 nfserr = nfsd_splice_read(read->rd_rqstp, file,
3075 read->rd_offset, &maxcount);
3076 if (nfserr) {
3077 /*
3078 * nfsd_splice_actor may have already messed with the
3079 * page length; reset it so as not to confuse
3080 * xdr_truncate_encode:
3081 */
3082 buf->page_len = 0;
3083 return nfserr;
3084 }
3085
3086 eof = (read->rd_offset + maxcount >=
3087 read->rd_fhp->fh_dentry->d_inode->i_size);
3088
3089 *(p++) = htonl(eof);
3090 *(p++) = htonl(maxcount);
3091
3092 buf->page_len = maxcount;
3093 buf->len += maxcount;
3094 xdr->page_ptr += (maxcount + PAGE_SIZE - 1) / PAGE_SIZE;
3095
3096 /* Use rest of head for padding and remaining ops: */
3097 buf->tail[0].iov_base = xdr->p;
3098 buf->tail[0].iov_len = 0;
3099 xdr->iov = buf->tail;
3100 if (maxcount&3) {
3101 int pad = 4 - (maxcount&3);
3102
3103 *(xdr->p++) = 0;
3104
3105 buf->tail[0].iov_base += maxcount&3;
3106 buf->tail[0].iov_len = pad;
3107 buf->len += pad;
3108 }
3109
3110 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
3111 buf->buflen - buf->len);
3112 buf->buflen = buf->len + space_left;
3113 xdr->end = (__be32 *)((void *)xdr->end + space_left);
3114
3115 return 0;
3116 }
3117
3118 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
3119 struct nfsd4_read *read,
3120 struct file *file, unsigned long maxcount)
3121 {
3122 struct xdr_stream *xdr = &resp->xdr;
3123 u32 eof;
3124 int v;
3125 int starting_len = xdr->buf->len - 8;
3126 long len;
3127 int thislen;
3128 __be32 nfserr;
3129 __be32 tmp;
3130 __be32 *p;
3131 u32 zzz = 0;
3132 int pad;
3133
3134 len = maxcount;
3135 v = 0;
3136
3137 thislen = (void *)xdr->end - (void *)xdr->p;
3138 if (len < thislen)
3139 thislen = len;
3140 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3141 WARN_ON_ONCE(!p);
3142 resp->rqstp->rq_vec[v].iov_base = p;
3143 resp->rqstp->rq_vec[v].iov_len = thislen;
3144 v++;
3145 len -= thislen;
3146
3147 while (len) {
3148 thislen = min_t(long, len, PAGE_SIZE);
3149 p = xdr_reserve_space(xdr, (thislen+3)&~3);
3150 WARN_ON_ONCE(!p);
3151 resp->rqstp->rq_vec[v].iov_base = p;
3152 resp->rqstp->rq_vec[v].iov_len = thislen;
3153 v++;
3154 len -= thislen;
3155 }
3156 read->rd_vlen = v;
3157
3158 nfserr = nfsd_readv(file, read->rd_offset, resp->rqstp->rq_vec,
3159 read->rd_vlen, &maxcount);
3160 if (nfserr)
3161 return nfserr;
3162 xdr_truncate_encode(xdr, starting_len + 8 + ((maxcount+3)&~3));
3163
3164 eof = (read->rd_offset + maxcount >=
3165 read->rd_fhp->fh_dentry->d_inode->i_size);
3166
3167 tmp = htonl(eof);
3168 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4);
3169 tmp = htonl(maxcount);
3170 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
3171
3172 pad = (maxcount&3) ? 4 - (maxcount&3) : 0;
3173 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount,
3174 &zzz, pad);
3175 return 0;
3176
3177 }
3178
3179 static __be32
3180 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
3181 struct nfsd4_read *read)
3182 {
3183 unsigned long maxcount;
3184 struct xdr_stream *xdr = &resp->xdr;
3185 struct file *file = read->rd_filp;
3186 int starting_len = xdr->buf->len;
3187 struct raparms *ra;
3188 __be32 *p;
3189 __be32 err;
3190
3191 if (nfserr)
3192 return nfserr;
3193
3194 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
3195 if (!p) {
3196 WARN_ON_ONCE(resp->rqstp->rq_splice_ok);
3197 return nfserr_resource;
3198 }
3199 if (resp->xdr.buf->page_len && resp->rqstp->rq_splice_ok) {
3200 WARN_ON_ONCE(1);
3201 return nfserr_resource;
3202 }
3203 xdr_commit_encode(xdr);
3204
3205 maxcount = svc_max_payload(resp->rqstp);
3206 if (maxcount > xdr->buf->buflen - xdr->buf->len)
3207 maxcount = xdr->buf->buflen - xdr->buf->len;
3208 if (maxcount > read->rd_length)
3209 maxcount = read->rd_length;
3210
3211 if (!read->rd_filp) {
3212 err = nfsd_get_tmp_read_open(resp->rqstp, read->rd_fhp,
3213 &file, &ra);
3214 if (err)
3215 goto err_truncate;
3216 }
3217
3218 if (file->f_op->splice_read && resp->rqstp->rq_splice_ok)
3219 err = nfsd4_encode_splice_read(resp, read, file, maxcount);
3220 else
3221 err = nfsd4_encode_readv(resp, read, file, maxcount);
3222
3223 if (!read->rd_filp)
3224 nfsd_put_tmp_read_open(file, ra);
3225
3226 err_truncate:
3227 if (err)
3228 xdr_truncate_encode(xdr, starting_len);
3229 return err;
3230 }
3231
3232 static __be32
3233 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
3234 {
3235 int maxcount;
3236 __be32 wire_count;
3237 int zero = 0;
3238 struct xdr_stream *xdr = &resp->xdr;
3239 int length_offset = xdr->buf->len;
3240 __be32 *p;
3241
3242 if (nfserr)
3243 return nfserr;
3244
3245 p = xdr_reserve_space(xdr, 4);
3246 if (!p)
3247 return nfserr_resource;
3248 maxcount = PAGE_SIZE;
3249
3250 p = xdr_reserve_space(xdr, maxcount);
3251 if (!p)
3252 return nfserr_resource;
3253 /*
3254 * XXX: By default, the ->readlink() VFS op will truncate symlinks
3255 * if they would overflow the buffer. Is this kosher in NFSv4? If
3256 * not, one easy fix is: if ->readlink() precisely fills the buffer,
3257 * assume that truncation occurred, and return NFS4ERR_RESOURCE.
3258 */
3259 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
3260 (char *)p, &maxcount);
3261 if (nfserr == nfserr_isdir)
3262 nfserr = nfserr_inval;
3263 if (nfserr) {
3264 xdr_truncate_encode(xdr, length_offset);
3265 return nfserr;
3266 }
3267
3268 wire_count = htonl(maxcount);
3269 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4);
3270 xdr_truncate_encode(xdr, length_offset + 4 + maxcount);
3271 if (maxcount & 3)
3272 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount,
3273 &zero, 4 - (maxcount&3));
3274 return 0;
3275 }
3276
3277 static __be32
3278 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
3279 {
3280 int maxcount;
3281 int bytes_left;
3282 loff_t offset;
3283 __be64 wire_offset;
3284 struct xdr_stream *xdr = &resp->xdr;
3285 int starting_len = xdr->buf->len;
3286 __be32 *p;
3287
3288 if (nfserr)
3289 return nfserr;
3290
3291 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3292 if (!p)
3293 return nfserr_resource;
3294
3295 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
3296 *p++ = cpu_to_be32(0);
3297 *p++ = cpu_to_be32(0);
3298 resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p)
3299 - (char *)resp->xdr.buf->head[0].iov_base;
3300
3301 /*
3302 * Number of bytes left for directory entries allowing for the
3303 * final 8 bytes of the readdir and a following failed op:
3304 */
3305 bytes_left = xdr->buf->buflen - xdr->buf->len
3306 - COMPOUND_ERR_SLACK_SPACE - 8;
3307 if (bytes_left < 0) {
3308 nfserr = nfserr_resource;
3309 goto err_no_verf;
3310 }
3311 maxcount = min_t(u32, readdir->rd_maxcount, INT_MAX);
3312 /*
3313 * Note the rfc defines rd_maxcount as the size of the
3314 * READDIR4resok structure, which includes the verifier above
3315 * and the 8 bytes encoded at the end of this function:
3316 */
3317 if (maxcount < 16) {
3318 nfserr = nfserr_toosmall;
3319 goto err_no_verf;
3320 }
3321 maxcount = min_t(int, maxcount-16, bytes_left);
3322
3323 readdir->xdr = xdr;
3324 readdir->rd_maxcount = maxcount;
3325 readdir->common.err = 0;
3326 readdir->cookie_offset = 0;
3327
3328 offset = readdir->rd_cookie;
3329 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
3330 &offset,
3331 &readdir->common, nfsd4_encode_dirent);
3332 if (nfserr == nfs_ok &&
3333 readdir->common.err == nfserr_toosmall &&
3334 xdr->buf->len == starting_len + 8) {
3335 /* nothing encoded; which limit did we hit?: */
3336 if (maxcount - 16 < bytes_left)
3337 /* It was the fault of rd_maxcount: */
3338 nfserr = nfserr_toosmall;
3339 else
3340 /* We ran out of buffer space: */
3341 nfserr = nfserr_resource;
3342 }
3343 if (nfserr)
3344 goto err_no_verf;
3345
3346 if (readdir->cookie_offset) {
3347 wire_offset = cpu_to_be64(offset);
3348 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
3349 &wire_offset, 8);
3350 }
3351
3352 p = xdr_reserve_space(xdr, 8);
3353 if (!p) {
3354 WARN_ON_ONCE(1);
3355 goto err_no_verf;
3356 }
3357 *p++ = 0; /* no more entries */
3358 *p++ = htonl(readdir->common.err == nfserr_eof);
3359
3360 return 0;
3361 err_no_verf:
3362 xdr_truncate_encode(xdr, starting_len);
3363 return nfserr;
3364 }
3365
3366 static __be32
3367 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
3368 {
3369 struct xdr_stream *xdr = &resp->xdr;
3370 __be32 *p;
3371
3372 if (!nfserr) {
3373 p = xdr_reserve_space(xdr, 20);
3374 if (!p)
3375 return nfserr_resource;
3376 p = encode_cinfo(p, &remove->rm_cinfo);
3377 }
3378 return nfserr;
3379 }
3380
3381 static __be32
3382 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
3383 {
3384 struct xdr_stream *xdr = &resp->xdr;
3385 __be32 *p;
3386
3387 if (!nfserr) {
3388 p = xdr_reserve_space(xdr, 40);
3389 if (!p)
3390 return nfserr_resource;
3391 p = encode_cinfo(p, &rename->rn_sinfo);
3392 p = encode_cinfo(p, &rename->rn_tinfo);
3393 }
3394 return nfserr;
3395 }
3396
3397 static __be32
3398 nfsd4_do_encode_secinfo(struct xdr_stream *xdr,
3399 __be32 nfserr, struct svc_export *exp)
3400 {
3401 u32 i, nflavs, supported;
3402 struct exp_flavor_info *flavs;
3403 struct exp_flavor_info def_flavs[2];
3404 __be32 *p, *flavorsp;
3405 static bool report = true;
3406
3407 if (nfserr)
3408 goto out;
3409 nfserr = nfserr_resource;
3410 if (exp->ex_nflavors) {
3411 flavs = exp->ex_flavors;
3412 nflavs = exp->ex_nflavors;
3413 } else { /* Handling of some defaults in absence of real secinfo: */
3414 flavs = def_flavs;
3415 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
3416 nflavs = 2;
3417 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
3418 flavs[1].pseudoflavor = RPC_AUTH_NULL;
3419 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
3420 nflavs = 1;
3421 flavs[0].pseudoflavor
3422 = svcauth_gss_flavor(exp->ex_client);
3423 } else {
3424 nflavs = 1;
3425 flavs[0].pseudoflavor
3426 = exp->ex_client->flavour->flavour;
3427 }
3428 }
3429
3430 supported = 0;
3431 p = xdr_reserve_space(xdr, 4);
3432 if (!p)
3433 goto out;
3434 flavorsp = p++; /* to be backfilled later */
3435
3436 for (i = 0; i < nflavs; i++) {
3437 rpc_authflavor_t pf = flavs[i].pseudoflavor;
3438 struct rpcsec_gss_info info;
3439
3440 if (rpcauth_get_gssinfo(pf, &info) == 0) {
3441 supported++;
3442 p = xdr_reserve_space(xdr, 4 + 4 +
3443 XDR_LEN(info.oid.len) + 4 + 4);
3444 if (!p)
3445 goto out;
3446 *p++ = cpu_to_be32(RPC_AUTH_GSS);
3447 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
3448 *p++ = cpu_to_be32(info.qop);
3449 *p++ = cpu_to_be32(info.service);
3450 } else if (pf < RPC_AUTH_MAXFLAVOR) {
3451 supported++;
3452 p = xdr_reserve_space(xdr, 4);
3453 if (!p)
3454 goto out;
3455 *p++ = cpu_to_be32(pf);
3456 } else {
3457 if (report)
3458 pr_warn("NFS: SECINFO: security flavor %u "
3459 "is not supported\n", pf);
3460 }
3461 }
3462
3463 if (nflavs != supported)
3464 report = false;
3465 *flavorsp = htonl(supported);
3466 nfserr = 0;
3467 out:
3468 if (exp)
3469 exp_put(exp);
3470 return nfserr;
3471 }
3472
3473 static __be32
3474 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
3475 struct nfsd4_secinfo *secinfo)
3476 {
3477 struct xdr_stream *xdr = &resp->xdr;
3478
3479 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->si_exp);
3480 }
3481
3482 static __be32
3483 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
3484 struct nfsd4_secinfo_no_name *secinfo)
3485 {
3486 struct xdr_stream *xdr = &resp->xdr;
3487
3488 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->sin_exp);
3489 }
3490
3491 /*
3492 * The SETATTR encode routine is special -- it always encodes a bitmap,
3493 * regardless of the error status.
3494 */
3495 static __be32
3496 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
3497 {
3498 struct xdr_stream *xdr = &resp->xdr;
3499 __be32 *p;
3500
3501 p = xdr_reserve_space(xdr, 16);
3502 if (!p)
3503 return nfserr_resource;
3504 if (nfserr) {
3505 *p++ = cpu_to_be32(3);
3506 *p++ = cpu_to_be32(0);
3507 *p++ = cpu_to_be32(0);
3508 *p++ = cpu_to_be32(0);
3509 }
3510 else {
3511 *p++ = cpu_to_be32(3);
3512 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
3513 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
3514 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
3515 }
3516 return nfserr;
3517 }
3518
3519 static __be32
3520 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
3521 {
3522 struct xdr_stream *xdr = &resp->xdr;
3523 __be32 *p;
3524
3525 if (!nfserr) {
3526 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
3527 if (!p)
3528 return nfserr_resource;
3529 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
3530 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
3531 NFS4_VERIFIER_SIZE);
3532 }
3533 else if (nfserr == nfserr_clid_inuse) {
3534 p = xdr_reserve_space(xdr, 8);
3535 if (!p)
3536 return nfserr_resource;
3537 *p++ = cpu_to_be32(0);
3538 *p++ = cpu_to_be32(0);
3539 }
3540 return nfserr;
3541 }
3542
3543 static __be32
3544 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
3545 {
3546 struct xdr_stream *xdr = &resp->xdr;
3547 __be32 *p;
3548
3549 if (!nfserr) {
3550 p = xdr_reserve_space(xdr, 16);
3551 if (!p)
3552 return nfserr_resource;
3553 *p++ = cpu_to_be32(write->wr_bytes_written);
3554 *p++ = cpu_to_be32(write->wr_how_written);
3555 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
3556 NFS4_VERIFIER_SIZE);
3557 }
3558 return nfserr;
3559 }
3560
3561 static const u32 nfs4_minimal_spo_must_enforce[2] = {
3562 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) |
3563 1 << (OP_EXCHANGE_ID - 32) |
3564 1 << (OP_CREATE_SESSION - 32) |
3565 1 << (OP_DESTROY_SESSION - 32) |
3566 1 << (OP_DESTROY_CLIENTID - 32)
3567 };
3568
3569 static __be32
3570 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
3571 struct nfsd4_exchange_id *exid)
3572 {
3573 struct xdr_stream *xdr = &resp->xdr;
3574 __be32 *p;
3575 char *major_id;
3576 char *server_scope;
3577 int major_id_sz;
3578 int server_scope_sz;
3579 uint64_t minor_id = 0;
3580
3581 if (nfserr)
3582 return nfserr;
3583
3584 major_id = utsname()->nodename;
3585 major_id_sz = strlen(major_id);
3586 server_scope = utsname()->nodename;
3587 server_scope_sz = strlen(server_scope);
3588
3589 p = xdr_reserve_space(xdr,
3590 8 /* eir_clientid */ +
3591 4 /* eir_sequenceid */ +
3592 4 /* eir_flags */ +
3593 4 /* spr_how */);
3594 if (!p)
3595 return nfserr_resource;
3596
3597 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
3598 *p++ = cpu_to_be32(exid->seqid);
3599 *p++ = cpu_to_be32(exid->flags);
3600
3601 *p++ = cpu_to_be32(exid->spa_how);
3602
3603 switch (exid->spa_how) {
3604 case SP4_NONE:
3605 break;
3606 case SP4_MACH_CRED:
3607 /* spo_must_enforce, spo_must_allow */
3608 p = xdr_reserve_space(xdr, 16);
3609 if (!p)
3610 return nfserr_resource;
3611
3612 /* spo_must_enforce bitmap: */
3613 *p++ = cpu_to_be32(2);
3614 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[0]);
3615 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[1]);
3616 /* empty spo_must_allow bitmap: */
3617 *p++ = cpu_to_be32(0);
3618
3619 break;
3620 default:
3621 WARN_ON_ONCE(1);
3622 }
3623
3624 p = xdr_reserve_space(xdr,
3625 8 /* so_minor_id */ +
3626 4 /* so_major_id.len */ +
3627 (XDR_QUADLEN(major_id_sz) * 4) +
3628 4 /* eir_server_scope.len */ +
3629 (XDR_QUADLEN(server_scope_sz) * 4) +
3630 4 /* eir_server_impl_id.count (0) */);
3631 if (!p)
3632 return nfserr_resource;
3633
3634 /* The server_owner struct */
3635 p = xdr_encode_hyper(p, minor_id); /* Minor id */
3636 /* major id */
3637 p = xdr_encode_opaque(p, major_id, major_id_sz);
3638
3639 /* Server scope */
3640 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
3641
3642 /* Implementation id */
3643 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
3644 return 0;
3645 }
3646
3647 static __be32
3648 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
3649 struct nfsd4_create_session *sess)
3650 {
3651 struct xdr_stream *xdr = &resp->xdr;
3652 __be32 *p;
3653
3654 if (nfserr)
3655 return nfserr;
3656
3657 p = xdr_reserve_space(xdr, 24);
3658 if (!p)
3659 return nfserr_resource;
3660 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
3661 NFS4_MAX_SESSIONID_LEN);
3662 *p++ = cpu_to_be32(sess->seqid);
3663 *p++ = cpu_to_be32(sess->flags);
3664
3665 p = xdr_reserve_space(xdr, 28);
3666 if (!p)
3667 return nfserr_resource;
3668 *p++ = cpu_to_be32(0); /* headerpadsz */
3669 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
3670 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
3671 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
3672 *p++ = cpu_to_be32(sess->fore_channel.maxops);
3673 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
3674 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
3675
3676 if (sess->fore_channel.nr_rdma_attrs) {
3677 p = xdr_reserve_space(xdr, 4);
3678 if (!p)
3679 return nfserr_resource;
3680 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
3681 }
3682
3683 p = xdr_reserve_space(xdr, 28);
3684 if (!p)
3685 return nfserr_resource;
3686 *p++ = cpu_to_be32(0); /* headerpadsz */
3687 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
3688 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
3689 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
3690 *p++ = cpu_to_be32(sess->back_channel.maxops);
3691 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
3692 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
3693
3694 if (sess->back_channel.nr_rdma_attrs) {
3695 p = xdr_reserve_space(xdr, 4);
3696 if (!p)
3697 return nfserr_resource;
3698 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
3699 }
3700 return 0;
3701 }
3702
3703 static __be32
3704 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
3705 struct nfsd4_sequence *seq)
3706 {
3707 struct xdr_stream *xdr = &resp->xdr;
3708 __be32 *p;
3709
3710 if (nfserr)
3711 return nfserr;
3712
3713 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
3714 if (!p)
3715 return nfserr_resource;
3716 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
3717 NFS4_MAX_SESSIONID_LEN);
3718 *p++ = cpu_to_be32(seq->seqid);
3719 *p++ = cpu_to_be32(seq->slotid);
3720 /* Note slotid's are numbered from zero: */
3721 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
3722 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
3723 *p++ = cpu_to_be32(seq->status_flags);
3724
3725 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
3726 return 0;
3727 }
3728
3729 static __be32
3730 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
3731 struct nfsd4_test_stateid *test_stateid)
3732 {
3733 struct xdr_stream *xdr = &resp->xdr;
3734 struct nfsd4_test_stateid_id *stateid, *next;
3735 __be32 *p;
3736
3737 if (nfserr)
3738 return nfserr;
3739
3740 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
3741 if (!p)
3742 return nfserr_resource;
3743 *p++ = htonl(test_stateid->ts_num_ids);
3744
3745 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
3746 *p++ = stateid->ts_id_status;
3747 }
3748
3749 return nfserr;
3750 }
3751
3752 static __be32
3753 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
3754 {
3755 return nfserr;
3756 }
3757
3758 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
3759
3760 /*
3761 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
3762 * since we don't need to filter out obsolete ops as this is
3763 * done in the decoding phase.
3764 */
3765 static nfsd4_enc nfsd4_enc_ops[] = {
3766 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access,
3767 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close,
3768 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit,
3769 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create,
3770 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop,
3771 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop,
3772 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr,
3773 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh,
3774 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link,
3775 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock,
3776 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt,
3777 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku,
3778 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop,
3779 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop,
3780 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3781 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open,
3782 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop,
3783 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm,
3784 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade,
3785 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop,
3786 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop,
3787 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop,
3788 [OP_READ] = (nfsd4_enc)nfsd4_encode_read,
3789 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir,
3790 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink,
3791 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove,
3792 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename,
3793 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop,
3794 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop,
3795 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop,
3796 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo,
3797 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr,
3798 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid,
3799 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
3800 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop,
3801 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write,
3802 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop,
3803
3804 /* NFSv4.1 operations */
3805 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop,
3806 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
3807 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id,
3808 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session,
3809 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop,
3810 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop,
3811 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3812 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop,
3813 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
3814 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop,
3815 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop,
3816 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop,
3817 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name,
3818 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence,
3819 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop,
3820 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid,
3821 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
3822 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop,
3823 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop,
3824 };
3825
3826 /*
3827 * Calculate whether we still have space to encode repsize bytes.
3828 * There are two considerations:
3829 * - For NFS versions >=4.1, the size of the reply must stay within
3830 * session limits
3831 * - For all NFS versions, we must stay within limited preallocated
3832 * buffer space.
3833 *
3834 * This is called before the operation is processed, so can only provide
3835 * an upper estimate. For some nonidempotent operations (such as
3836 * getattr), it's not necessarily a problem if that estimate is wrong,
3837 * as we can fail it after processing without significant side effects.
3838 */
3839 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
3840 {
3841 struct xdr_buf *buf = &resp->rqstp->rq_res;
3842 struct nfsd4_slot *slot = resp->cstate.slot;
3843
3844 if (buf->len + respsize <= buf->buflen)
3845 return nfs_ok;
3846 if (!nfsd4_has_session(&resp->cstate))
3847 return nfserr_resource;
3848 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
3849 WARN_ON_ONCE(1);
3850 return nfserr_rep_too_big_to_cache;
3851 }
3852 return nfserr_rep_too_big;
3853 }
3854
3855 void
3856 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
3857 {
3858 struct xdr_stream *xdr = &resp->xdr;
3859 struct nfs4_stateowner *so = resp->cstate.replay_owner;
3860 struct svc_rqst *rqstp = resp->rqstp;
3861 int post_err_offset;
3862 nfsd4_enc encoder;
3863 __be32 *p;
3864
3865 p = xdr_reserve_space(xdr, 8);
3866 if (!p) {
3867 WARN_ON_ONCE(1);
3868 return;
3869 }
3870 *p++ = cpu_to_be32(op->opnum);
3871 post_err_offset = xdr->buf->len;
3872
3873 if (op->opnum == OP_ILLEGAL)
3874 goto status;
3875 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
3876 !nfsd4_enc_ops[op->opnum]);
3877 encoder = nfsd4_enc_ops[op->opnum];
3878 op->status = encoder(resp, op->status, &op->u);
3879 xdr_commit_encode(xdr);
3880
3881 /* nfsd4_check_resp_size guarantees enough room for error status */
3882 if (!op->status) {
3883 int space_needed = 0;
3884 if (!nfsd4_last_compound_op(rqstp))
3885 space_needed = COMPOUND_ERR_SLACK_SPACE;
3886 op->status = nfsd4_check_resp_size(resp, space_needed);
3887 }
3888 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
3889 struct nfsd4_slot *slot = resp->cstate.slot;
3890
3891 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
3892 op->status = nfserr_rep_too_big_to_cache;
3893 else
3894 op->status = nfserr_rep_too_big;
3895 }
3896 if (op->status == nfserr_resource ||
3897 op->status == nfserr_rep_too_big ||
3898 op->status == nfserr_rep_too_big_to_cache) {
3899 /*
3900 * The operation may have already been encoded or
3901 * partially encoded. No op returns anything additional
3902 * in the case of one of these three errors, so we can
3903 * just truncate back to after the status. But it's a
3904 * bug if we had to do this on a non-idempotent op:
3905 */
3906 warn_on_nonidempotent_op(op);
3907 xdr_truncate_encode(xdr, post_err_offset);
3908 }
3909 if (so) {
3910 int len = xdr->buf->len - post_err_offset;
3911
3912 so->so_replay.rp_status = op->status;
3913 so->so_replay.rp_buflen = len;
3914 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
3915 so->so_replay.rp_buf, len);
3916 }
3917 status:
3918 /* Note that op->status is already in network byte order: */
3919 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4);
3920 }
3921
3922 /*
3923 * Encode the reply stored in the stateowner reply cache
3924 *
3925 * XDR note: do not encode rp->rp_buflen: the buffer contains the
3926 * previously sent already encoded operation.
3927 *
3928 * called with nfs4_lock_state() held
3929 */
3930 void
3931 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
3932 {
3933 __be32 *p;
3934 struct nfs4_replay *rp = op->replay;
3935
3936 BUG_ON(!rp);
3937
3938 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
3939 if (!p) {
3940 WARN_ON_ONCE(1);
3941 return;
3942 }
3943 *p++ = cpu_to_be32(op->opnum);
3944 *p++ = rp->rp_status; /* already xdr'ed */
3945
3946 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
3947 }
3948
3949 int
3950 nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy)
3951 {
3952 return xdr_ressize_check(rqstp, p);
3953 }
3954
3955 int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp)
3956 {
3957 struct svc_rqst *rqstp = rq;
3958 struct nfsd4_compoundargs *args = rqstp->rq_argp;
3959
3960 if (args->ops != args->iops) {
3961 kfree(args->ops);
3962 args->ops = args->iops;
3963 }
3964 kfree(args->tmpp);
3965 args->tmpp = NULL;
3966 while (args->to_free) {
3967 struct tmpbuf *tb = args->to_free;
3968 args->to_free = tb->next;
3969 tb->release(tb->buf);
3970 kfree(tb);
3971 }
3972 return 1;
3973 }
3974
3975 int
3976 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args)
3977 {
3978 if (rqstp->rq_arg.head[0].iov_len % 4) {
3979 /* client is nuts */
3980 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)",
3981 __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid));
3982 return 0;
3983 }
3984 args->p = p;
3985 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len;
3986 args->pagelist = rqstp->rq_arg.pages;
3987 args->pagelen = rqstp->rq_arg.page_len;
3988 args->tmpp = NULL;
3989 args->to_free = NULL;
3990 args->ops = args->iops;
3991 args->rqstp = rqstp;
3992
3993 return !nfsd4_decode_compound(args);
3994 }
3995
3996 int
3997 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp)
3998 {
3999 /*
4000 * All that remains is to write the tag and operation count...
4001 */
4002 struct nfsd4_compound_state *cs = &resp->cstate;
4003 struct xdr_buf *buf = resp->xdr.buf;
4004
4005 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len +
4006 buf->tail[0].iov_len);
4007
4008 rqstp->rq_next_page = resp->xdr.page_ptr + 1;
4009
4010 p = resp->tagp;
4011 *p++ = htonl(resp->taglen);
4012 memcpy(p, resp->tag, resp->taglen);
4013 p += XDR_QUADLEN(resp->taglen);
4014 *p++ = htonl(resp->opcnt);
4015
4016 if (nfsd4_has_session(cs)) {
4017 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
4018 struct nfs4_client *clp = cs->session->se_client;
4019 if (cs->status != nfserr_replay_cache) {
4020 nfsd4_store_cache_entry(resp);
4021 cs->slot->sl_flags &= ~NFSD4_SLOT_INUSE;
4022 }
4023 /* Renew the clientid on success and on replay */
4024 spin_lock(&nn->client_lock);
4025 nfsd4_put_session(cs->session);
4026 spin_unlock(&nn->client_lock);
4027 put_client_renew(clp);
4028 }
4029 return 1;
4030 }
4031
4032 /*
4033 * Local variables:
4034 * c-basic-offset: 8
4035 * End:
4036 */