]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - fs/nfsd/nfs4xdr.c
UBUNTU: SAUCE: LSM: Use lsmcontext in security_inode_getsecctx
[mirror_ubuntu-jammy-kernel.git] / fs / nfsd / nfs4xdr.c
1 /*
2 * Server-side XDR for NFSv4
3 *
4 * Copyright (c) 2002 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 *
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 */
35
36 #include <linux/file.h>
37 #include <linux/slab.h>
38 #include <linux/namei.h>
39 #include <linux/statfs.h>
40 #include <linux/utsname.h>
41 #include <linux/pagemap.h>
42 #include <linux/sunrpc/svcauth_gss.h>
43 #include <linux/sunrpc/addr.h>
44 #include <linux/xattr.h>
45 #include <uapi/linux/xattr.h>
46
47 #include "idmap.h"
48 #include "acl.h"
49 #include "xdr4.h"
50 #include "vfs.h"
51 #include "state.h"
52 #include "cache.h"
53 #include "netns.h"
54 #include "pnfs.h"
55 #include "filecache.h"
56
57 #include "trace.h"
58
59 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
60 #include <linux/security.h>
61 #endif
62
63
64 #define NFSDDBG_FACILITY NFSDDBG_XDR
65
66 const u32 nfsd_suppattrs[3][3] = {
67 {NFSD4_SUPPORTED_ATTRS_WORD0,
68 NFSD4_SUPPORTED_ATTRS_WORD1,
69 NFSD4_SUPPORTED_ATTRS_WORD2},
70
71 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
72 NFSD4_1_SUPPORTED_ATTRS_WORD1,
73 NFSD4_1_SUPPORTED_ATTRS_WORD2},
74
75 {NFSD4_1_SUPPORTED_ATTRS_WORD0,
76 NFSD4_1_SUPPORTED_ATTRS_WORD1,
77 NFSD4_2_SUPPORTED_ATTRS_WORD2},
78 };
79
80 /*
81 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
82 * directory in order to indicate to the client that a filesystem boundary is present
83 * We use a fixed fsid for a referral
84 */
85 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
86 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
87
88 static __be32
89 check_filename(char *str, int len)
90 {
91 int i;
92
93 if (len == 0)
94 return nfserr_inval;
95 if (len > NFS4_MAXNAMLEN)
96 return nfserr_nametoolong;
97 if (isdotent(str, len))
98 return nfserr_badname;
99 for (i = 0; i < len; i++)
100 if (str[i] == '/')
101 return nfserr_badname;
102 return 0;
103 }
104
105 static int zero_clientid(clientid_t *clid)
106 {
107 return (clid->cl_boot == 0) && (clid->cl_id == 0);
108 }
109
110 /**
111 * svcxdr_tmpalloc - allocate memory to be freed after compound processing
112 * @argp: NFSv4 compound argument structure
113 * @len: length of buffer to allocate
114 *
115 * Allocates a buffer of size @len to be freed when processing the compound
116 * operation described in @argp finishes.
117 */
118 static void *
119 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
120 {
121 struct svcxdr_tmpbuf *tb;
122
123 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
124 if (!tb)
125 return NULL;
126 tb->next = argp->to_free;
127 argp->to_free = tb;
128 return tb->buf;
129 }
130
131 /*
132 * For xdr strings that need to be passed to other kernel api's
133 * as null-terminated strings.
134 *
135 * Note null-terminating in place usually isn't safe since the
136 * buffer might end on a page boundary.
137 */
138 static char *
139 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
140 {
141 char *p = svcxdr_tmpalloc(argp, len + 1);
142
143 if (!p)
144 return NULL;
145 memcpy(p, buf, len);
146 p[len] = '\0';
147 return p;
148 }
149
150 static void *
151 svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len)
152 {
153 __be32 *tmp;
154
155 /*
156 * The location of the decoded data item is stable,
157 * so @p is OK to use. This is the common case.
158 */
159 if (p != argp->xdr->scratch.iov_base)
160 return p;
161
162 tmp = svcxdr_tmpalloc(argp, len);
163 if (!tmp)
164 return NULL;
165 memcpy(tmp, p, len);
166 return tmp;
167 }
168
169 /*
170 * NFSv4 basic data type decoders
171 */
172
173 /*
174 * This helper handles variable-length opaques which belong to protocol
175 * elements that this implementation does not support.
176 */
177 static __be32
178 nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen)
179 {
180 u32 len;
181
182 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
183 return nfserr_bad_xdr;
184 if (maxlen && len > maxlen)
185 return nfserr_bad_xdr;
186 if (!xdr_inline_decode(argp->xdr, len))
187 return nfserr_bad_xdr;
188
189 return nfs_ok;
190 }
191
192 static __be32
193 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
194 {
195 __be32 *p;
196 u32 len;
197
198 if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
199 return nfserr_bad_xdr;
200 if (len == 0 || len > NFS4_OPAQUE_LIMIT)
201 return nfserr_bad_xdr;
202 p = xdr_inline_decode(argp->xdr, len);
203 if (!p)
204 return nfserr_bad_xdr;
205 o->data = svcxdr_savemem(argp, p, len);
206 if (!o->data)
207 return nfserr_jukebox;
208 o->len = len;
209
210 return nfs_ok;
211 }
212
213 static __be32
214 nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp)
215 {
216 __be32 *p, status;
217
218 if (xdr_stream_decode_u32(argp->xdr, lenp) < 0)
219 return nfserr_bad_xdr;
220 p = xdr_inline_decode(argp->xdr, *lenp);
221 if (!p)
222 return nfserr_bad_xdr;
223 status = check_filename((char *)p, *lenp);
224 if (status)
225 return status;
226 *namp = svcxdr_savemem(argp, p, *lenp);
227 if (!*namp)
228 return nfserr_jukebox;
229
230 return nfs_ok;
231 }
232
233 static __be32
234 nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv)
235 {
236 __be32 *p;
237
238 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3);
239 if (!p)
240 return nfserr_bad_xdr;
241 p = xdr_decode_hyper(p, &tv->tv_sec);
242 tv->tv_nsec = be32_to_cpup(p++);
243 if (tv->tv_nsec >= (u32)1000000000)
244 return nfserr_inval;
245 return nfs_ok;
246 }
247
248 static __be32
249 nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf)
250 {
251 __be32 *p;
252
253 p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE);
254 if (!p)
255 return nfserr_bad_xdr;
256 memcpy(verf->data, p, sizeof(verf->data));
257 return nfs_ok;
258 }
259
260 /**
261 * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4
262 * @argp: NFSv4 compound argument structure
263 * @bmval: pointer to an array of u32's to decode into
264 * @bmlen: size of the @bmval array
265 *
266 * The server needs to return nfs_ok rather than nfserr_bad_xdr when
267 * encountering bitmaps containing bits it does not recognize. This
268 * includes bits in bitmap words past WORDn, where WORDn is the last
269 * bitmap WORD the implementation currently supports. Thus we are
270 * careful here to simply ignore bits in bitmap words that this
271 * implementation has yet to support explicitly.
272 *
273 * Return values:
274 * %nfs_ok: @bmval populated successfully
275 * %nfserr_bad_xdr: the encoded bitmap was invalid
276 */
277 static __be32
278 nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen)
279 {
280 u32 i, count;
281 __be32 *p;
282
283 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
284 return nfserr_bad_xdr;
285 /* request sanity */
286 if (count > 1000)
287 return nfserr_bad_xdr;
288 p = xdr_inline_decode(argp->xdr, count << 2);
289 if (!p)
290 return nfserr_bad_xdr;
291 i = 0;
292 while (i < count)
293 bmval[i++] = be32_to_cpup(p++);
294 while (i < bmlen)
295 bmval[i++] = 0;
296
297 return nfs_ok;
298 }
299
300 static __be32
301 nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace)
302 {
303 __be32 *p, status;
304 u32 length;
305
306 if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0)
307 return nfserr_bad_xdr;
308 if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0)
309 return nfserr_bad_xdr;
310 if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0)
311 return nfserr_bad_xdr;
312
313 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
314 return nfserr_bad_xdr;
315 p = xdr_inline_decode(argp->xdr, length);
316 if (!p)
317 return nfserr_bad_xdr;
318 ace->whotype = nfs4_acl_get_whotype((char *)p, length);
319 if (ace->whotype != NFS4_ACL_WHO_NAMED)
320 status = nfs_ok;
321 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
322 status = nfsd_map_name_to_gid(argp->rqstp,
323 (char *)p, length, &ace->who_gid);
324 else
325 status = nfsd_map_name_to_uid(argp->rqstp,
326 (char *)p, length, &ace->who_uid);
327
328 return status;
329 }
330
331 /* A counted array of nfsace4's */
332 static noinline __be32
333 nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl)
334 {
335 struct nfs4_ace *ace;
336 __be32 status;
337 u32 count;
338
339 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
340 return nfserr_bad_xdr;
341
342 if (count > xdr_stream_remaining(argp->xdr) / 20)
343 /*
344 * Even with 4-byte names there wouldn't be
345 * space for that many aces; something fishy is
346 * going on:
347 */
348 return nfserr_fbig;
349
350 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count));
351 if (*acl == NULL)
352 return nfserr_jukebox;
353
354 (*acl)->naces = count;
355 for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) {
356 status = nfsd4_decode_nfsace4(argp, ace);
357 if (status)
358 return status;
359 }
360
361 return nfs_ok;
362 }
363
364 static noinline __be32
365 nfsd4_decode_security_label(struct nfsd4_compoundargs *argp,
366 struct xdr_netobj *label)
367 {
368 u32 lfs, pi, length;
369 __be32 *p;
370
371 if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0)
372 return nfserr_bad_xdr;
373 if (xdr_stream_decode_u32(argp->xdr, &pi) < 0)
374 return nfserr_bad_xdr;
375
376 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
377 return nfserr_bad_xdr;
378 if (length > NFS4_MAXLABELLEN)
379 return nfserr_badlabel;
380 p = xdr_inline_decode(argp->xdr, length);
381 if (!p)
382 return nfserr_bad_xdr;
383 label->len = length;
384 label->data = svcxdr_dupstr(argp, p, length);
385 if (!label->data)
386 return nfserr_jukebox;
387
388 return nfs_ok;
389 }
390
391 static __be32
392 nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen,
393 struct iattr *iattr, struct nfs4_acl **acl,
394 struct xdr_netobj *label, int *umask)
395 {
396 unsigned int starting_pos;
397 u32 attrlist4_count;
398 __be32 *p, status;
399
400 iattr->ia_valid = 0;
401 status = nfsd4_decode_bitmap4(argp, bmval, bmlen);
402 if (status)
403 return nfserr_bad_xdr;
404
405 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
406 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
407 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) {
408 if (nfsd_attrs_supported(argp->minorversion, bmval))
409 return nfserr_inval;
410 return nfserr_attrnotsupp;
411 }
412
413 if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0)
414 return nfserr_bad_xdr;
415 starting_pos = xdr_stream_pos(argp->xdr);
416
417 if (bmval[0] & FATTR4_WORD0_SIZE) {
418 u64 size;
419
420 if (xdr_stream_decode_u64(argp->xdr, &size) < 0)
421 return nfserr_bad_xdr;
422 iattr->ia_size = size;
423 iattr->ia_valid |= ATTR_SIZE;
424 }
425 if (bmval[0] & FATTR4_WORD0_ACL) {
426 status = nfsd4_decode_acl(argp, acl);
427 if (status)
428 return status;
429 } else
430 *acl = NULL;
431 if (bmval[1] & FATTR4_WORD1_MODE) {
432 u32 mode;
433
434 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
435 return nfserr_bad_xdr;
436 iattr->ia_mode = mode;
437 iattr->ia_mode &= (S_IFMT | S_IALLUGO);
438 iattr->ia_valid |= ATTR_MODE;
439 }
440 if (bmval[1] & FATTR4_WORD1_OWNER) {
441 u32 length;
442
443 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
444 return nfserr_bad_xdr;
445 p = xdr_inline_decode(argp->xdr, length);
446 if (!p)
447 return nfserr_bad_xdr;
448 status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length,
449 &iattr->ia_uid);
450 if (status)
451 return status;
452 iattr->ia_valid |= ATTR_UID;
453 }
454 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
455 u32 length;
456
457 if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
458 return nfserr_bad_xdr;
459 p = xdr_inline_decode(argp->xdr, length);
460 if (!p)
461 return nfserr_bad_xdr;
462 status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length,
463 &iattr->ia_gid);
464 if (status)
465 return status;
466 iattr->ia_valid |= ATTR_GID;
467 }
468 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
469 u32 set_it;
470
471 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
472 return nfserr_bad_xdr;
473 switch (set_it) {
474 case NFS4_SET_TO_CLIENT_TIME:
475 status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime);
476 if (status)
477 return status;
478 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
479 break;
480 case NFS4_SET_TO_SERVER_TIME:
481 iattr->ia_valid |= ATTR_ATIME;
482 break;
483 default:
484 return nfserr_bad_xdr;
485 }
486 }
487 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
488 u32 set_it;
489
490 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
491 return nfserr_bad_xdr;
492 switch (set_it) {
493 case NFS4_SET_TO_CLIENT_TIME:
494 status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime);
495 if (status)
496 return status;
497 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
498 break;
499 case NFS4_SET_TO_SERVER_TIME:
500 iattr->ia_valid |= ATTR_MTIME;
501 break;
502 default:
503 return nfserr_bad_xdr;
504 }
505 }
506 label->len = 0;
507 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) &&
508 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
509 status = nfsd4_decode_security_label(argp, label);
510 if (status)
511 return status;
512 }
513 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) {
514 u32 mode, mask;
515
516 if (!umask)
517 return nfserr_bad_xdr;
518 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
519 return nfserr_bad_xdr;
520 iattr->ia_mode = mode & (S_IFMT | S_IALLUGO);
521 if (xdr_stream_decode_u32(argp->xdr, &mask) < 0)
522 return nfserr_bad_xdr;
523 *umask = mask & S_IRWXUGO;
524 iattr->ia_valid |= ATTR_MODE;
525 }
526
527 /* request sanity: did attrlist4 contain the expected number of words? */
528 if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos)
529 return nfserr_bad_xdr;
530
531 return nfs_ok;
532 }
533
534 static __be32
535 nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid)
536 {
537 __be32 *p;
538
539 p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE);
540 if (!p)
541 return nfserr_bad_xdr;
542 sid->si_generation = be32_to_cpup(p++);
543 memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque));
544 return nfs_ok;
545 }
546
547 static __be32
548 nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid)
549 {
550 __be32 *p;
551
552 p = xdr_inline_decode(argp->xdr, sizeof(__be64));
553 if (!p)
554 return nfserr_bad_xdr;
555 memcpy(clientid, p, sizeof(*clientid));
556 return nfs_ok;
557 }
558
559 static __be32
560 nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp,
561 clientid_t *clientid, struct xdr_netobj *owner)
562 {
563 __be32 status;
564
565 status = nfsd4_decode_clientid4(argp, clientid);
566 if (status)
567 return status;
568 return nfsd4_decode_opaque(argp, owner);
569 }
570
571 #ifdef CONFIG_NFSD_PNFS
572 static __be32
573 nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp,
574 struct nfsd4_deviceid *devid)
575 {
576 __be32 *p;
577
578 p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE);
579 if (!p)
580 return nfserr_bad_xdr;
581 memcpy(devid, p, sizeof(*devid));
582 return nfs_ok;
583 }
584
585 static __be32
586 nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp,
587 struct nfsd4_layoutcommit *lcp)
588 {
589 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0)
590 return nfserr_bad_xdr;
591 if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES)
592 return nfserr_bad_xdr;
593 if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX)
594 return nfserr_bad_xdr;
595
596 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0)
597 return nfserr_bad_xdr;
598 if (lcp->lc_up_len > 0) {
599 lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len);
600 if (!lcp->lc_up_layout)
601 return nfserr_bad_xdr;
602 }
603
604 return nfs_ok;
605 }
606
607 static __be32
608 nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp,
609 struct nfsd4_layoutreturn *lrp)
610 {
611 __be32 status;
612
613 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0)
614 return nfserr_bad_xdr;
615 switch (lrp->lr_return_type) {
616 case RETURN_FILE:
617 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0)
618 return nfserr_bad_xdr;
619 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0)
620 return nfserr_bad_xdr;
621 status = nfsd4_decode_stateid4(argp, &lrp->lr_sid);
622 if (status)
623 return status;
624 if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0)
625 return nfserr_bad_xdr;
626 if (lrp->lrf_body_len > 0) {
627 lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len);
628 if (!lrp->lrf_body)
629 return nfserr_bad_xdr;
630 }
631 break;
632 case RETURN_FSID:
633 case RETURN_ALL:
634 lrp->lr_seg.offset = 0;
635 lrp->lr_seg.length = NFS4_MAX_UINT64;
636 break;
637 default:
638 return nfserr_bad_xdr;
639 }
640
641 return nfs_ok;
642 }
643
644 #endif /* CONFIG_NFSD_PNFS */
645
646 static __be32
647 nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp,
648 struct nfs4_sessionid *sessionid)
649 {
650 __be32 *p;
651
652 p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN);
653 if (!p)
654 return nfserr_bad_xdr;
655 memcpy(sessionid->data, p, sizeof(sessionid->data));
656 return nfs_ok;
657 }
658
659 /* Defined in Appendix A of RFC 5531 */
660 static __be32
661 nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp,
662 struct nfsd4_cb_sec *cbs)
663 {
664 u32 stamp, gidcount, uid, gid;
665 __be32 *p, status;
666
667 if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0)
668 return nfserr_bad_xdr;
669 /* machine name */
670 status = nfsd4_decode_ignored_string(argp, 255);
671 if (status)
672 return status;
673 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0)
674 return nfserr_bad_xdr;
675 if (xdr_stream_decode_u32(argp->xdr, &gid) < 0)
676 return nfserr_bad_xdr;
677 if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0)
678 return nfserr_bad_xdr;
679 if (gidcount > 16)
680 return nfserr_bad_xdr;
681 p = xdr_inline_decode(argp->xdr, gidcount << 2);
682 if (!p)
683 return nfserr_bad_xdr;
684 if (cbs->flavor == (u32)(-1)) {
685 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp);
686
687 kuid_t kuid = make_kuid(userns, uid);
688 kgid_t kgid = make_kgid(userns, gid);
689 if (uid_valid(kuid) && gid_valid(kgid)) {
690 cbs->uid = kuid;
691 cbs->gid = kgid;
692 cbs->flavor = RPC_AUTH_UNIX;
693 } else {
694 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n");
695 }
696 }
697
698 return nfs_ok;
699 }
700
701 static __be32
702 nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp,
703 struct nfsd4_cb_sec *cbs)
704 {
705 __be32 status;
706 u32 service;
707
708 dprintk("RPC_AUTH_GSS callback secflavor not supported!\n");
709
710 if (xdr_stream_decode_u32(argp->xdr, &service) < 0)
711 return nfserr_bad_xdr;
712 if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY)
713 return nfserr_bad_xdr;
714 /* gcbp_handle_from_server */
715 status = nfsd4_decode_ignored_string(argp, 0);
716 if (status)
717 return status;
718 /* gcbp_handle_from_client */
719 status = nfsd4_decode_ignored_string(argp, 0);
720 if (status)
721 return status;
722
723 return nfs_ok;
724 }
725
726 /* a counted array of callback_sec_parms4 items */
727 static __be32
728 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
729 {
730 u32 i, secflavor, nr_secflavs;
731 __be32 status;
732
733 /* callback_sec_params4 */
734 if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0)
735 return nfserr_bad_xdr;
736 if (nr_secflavs)
737 cbs->flavor = (u32)(-1);
738 else
739 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
740 cbs->flavor = 0;
741
742 for (i = 0; i < nr_secflavs; ++i) {
743 if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0)
744 return nfserr_bad_xdr;
745 switch (secflavor) {
746 case RPC_AUTH_NULL:
747 /* void */
748 if (cbs->flavor == (u32)(-1))
749 cbs->flavor = RPC_AUTH_NULL;
750 break;
751 case RPC_AUTH_UNIX:
752 status = nfsd4_decode_authsys_parms(argp, cbs);
753 if (status)
754 return status;
755 break;
756 case RPC_AUTH_GSS:
757 status = nfsd4_decode_gss_cb_handles4(argp, cbs);
758 if (status)
759 return status;
760 break;
761 default:
762 return nfserr_inval;
763 }
764 }
765
766 return nfs_ok;
767 }
768
769
770 /*
771 * NFSv4 operation argument decoders
772 */
773
774 static __be32
775 nfsd4_decode_access(struct nfsd4_compoundargs *argp,
776 struct nfsd4_access *access)
777 {
778 if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0)
779 return nfserr_bad_xdr;
780 return nfs_ok;
781 }
782
783 static __be32
784 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
785 {
786 if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0)
787 return nfserr_bad_xdr;
788 return nfsd4_decode_stateid4(argp, &close->cl_stateid);
789 }
790
791
792 static __be32
793 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
794 {
795 if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0)
796 return nfserr_bad_xdr;
797 if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0)
798 return nfserr_bad_xdr;
799 return nfs_ok;
800 }
801
802 static __be32
803 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
804 {
805 __be32 *p, status;
806
807 if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0)
808 return nfserr_bad_xdr;
809 switch (create->cr_type) {
810 case NF4LNK:
811 if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0)
812 return nfserr_bad_xdr;
813 p = xdr_inline_decode(argp->xdr, create->cr_datalen);
814 if (!p)
815 return nfserr_bad_xdr;
816 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
817 if (!create->cr_data)
818 return nfserr_jukebox;
819 break;
820 case NF4BLK:
821 case NF4CHR:
822 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0)
823 return nfserr_bad_xdr;
824 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0)
825 return nfserr_bad_xdr;
826 break;
827 case NF4SOCK:
828 case NF4FIFO:
829 case NF4DIR:
830 default:
831 break;
832 }
833 status = nfsd4_decode_component4(argp, &create->cr_name,
834 &create->cr_namelen);
835 if (status)
836 return status;
837 status = nfsd4_decode_fattr4(argp, create->cr_bmval,
838 ARRAY_SIZE(create->cr_bmval),
839 &create->cr_iattr, &create->cr_acl,
840 &create->cr_label, &create->cr_umask);
841 if (status)
842 return status;
843
844 return nfs_ok;
845 }
846
847 static inline __be32
848 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
849 {
850 return nfsd4_decode_stateid4(argp, &dr->dr_stateid);
851 }
852
853 static inline __be32
854 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
855 {
856 return nfsd4_decode_bitmap4(argp, getattr->ga_bmval,
857 ARRAY_SIZE(getattr->ga_bmval));
858 }
859
860 static __be32
861 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
862 {
863 return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen);
864 }
865
866 static __be32
867 nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp,
868 struct nfsd4_lock *lock)
869 {
870 __be32 status;
871
872 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0)
873 return nfserr_bad_xdr;
874 status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid);
875 if (status)
876 return status;
877 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0)
878 return nfserr_bad_xdr;
879 return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid,
880 &lock->lk_new_owner);
881 }
882
883 static __be32
884 nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp,
885 struct nfsd4_lock *lock)
886 {
887 __be32 status;
888
889 status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid);
890 if (status)
891 return status;
892 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0)
893 return nfserr_bad_xdr;
894
895 return nfs_ok;
896 }
897
898 static __be32
899 nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
900 {
901 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0)
902 return nfserr_bad_xdr;
903 if (lock->lk_is_new)
904 return nfsd4_decode_open_to_lock_owner4(argp, lock);
905 return nfsd4_decode_exist_lock_owner4(argp, lock);
906 }
907
908 static __be32
909 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
910 {
911 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0)
912 return nfserr_bad_xdr;
913 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
914 return nfserr_bad_xdr;
915 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0)
916 return nfserr_bad_xdr;
917 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0)
918 return nfserr_bad_xdr;
919 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0)
920 return nfserr_bad_xdr;
921 return nfsd4_decode_locker4(argp, lock);
922 }
923
924 static __be32
925 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
926 {
927 if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0)
928 return nfserr_bad_xdr;
929 if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
930 return nfserr_bad_xdr;
931 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0)
932 return nfserr_bad_xdr;
933 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0)
934 return nfserr_bad_xdr;
935 return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid,
936 &lockt->lt_owner);
937 }
938
939 static __be32
940 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
941 {
942 __be32 status;
943
944 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0)
945 return nfserr_bad_xdr;
946 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
947 return nfserr_bad_xdr;
948 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0)
949 return nfserr_bad_xdr;
950 status = nfsd4_decode_stateid4(argp, &locku->lu_stateid);
951 if (status)
952 return status;
953 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0)
954 return nfserr_bad_xdr;
955 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0)
956 return nfserr_bad_xdr;
957
958 return nfs_ok;
959 }
960
961 static __be32
962 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
963 {
964 return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len);
965 }
966
967 static __be32
968 nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
969 {
970 __be32 status;
971
972 if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0)
973 return nfserr_bad_xdr;
974 switch (open->op_createmode) {
975 case NFS4_CREATE_UNCHECKED:
976 case NFS4_CREATE_GUARDED:
977 status = nfsd4_decode_fattr4(argp, open->op_bmval,
978 ARRAY_SIZE(open->op_bmval),
979 &open->op_iattr, &open->op_acl,
980 &open->op_label, &open->op_umask);
981 if (status)
982 return status;
983 break;
984 case NFS4_CREATE_EXCLUSIVE:
985 status = nfsd4_decode_verifier4(argp, &open->op_verf);
986 if (status)
987 return status;
988 break;
989 case NFS4_CREATE_EXCLUSIVE4_1:
990 if (argp->minorversion < 1)
991 return nfserr_bad_xdr;
992 status = nfsd4_decode_verifier4(argp, &open->op_verf);
993 if (status)
994 return status;
995 status = nfsd4_decode_fattr4(argp, open->op_bmval,
996 ARRAY_SIZE(open->op_bmval),
997 &open->op_iattr, &open->op_acl,
998 &open->op_label, &open->op_umask);
999 if (status)
1000 return status;
1001 break;
1002 default:
1003 return nfserr_bad_xdr;
1004 }
1005
1006 return nfs_ok;
1007 }
1008
1009 static __be32
1010 nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1011 {
1012 __be32 status;
1013
1014 if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0)
1015 return nfserr_bad_xdr;
1016 switch (open->op_create) {
1017 case NFS4_OPEN_NOCREATE:
1018 break;
1019 case NFS4_OPEN_CREATE:
1020 status = nfsd4_decode_createhow4(argp, open);
1021 if (status)
1022 return status;
1023 break;
1024 default:
1025 return nfserr_bad_xdr;
1026 }
1027
1028 return nfs_ok;
1029 }
1030
1031 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
1032 {
1033 u32 w;
1034
1035 if (xdr_stream_decode_u32(argp->xdr, &w) < 0)
1036 return nfserr_bad_xdr;
1037 *share_access = w & NFS4_SHARE_ACCESS_MASK;
1038 *deleg_want = w & NFS4_SHARE_WANT_MASK;
1039 if (deleg_when)
1040 *deleg_when = w & NFS4_SHARE_WHEN_MASK;
1041
1042 switch (w & NFS4_SHARE_ACCESS_MASK) {
1043 case NFS4_SHARE_ACCESS_READ:
1044 case NFS4_SHARE_ACCESS_WRITE:
1045 case NFS4_SHARE_ACCESS_BOTH:
1046 break;
1047 default:
1048 return nfserr_bad_xdr;
1049 }
1050 w &= ~NFS4_SHARE_ACCESS_MASK;
1051 if (!w)
1052 return nfs_ok;
1053 if (!argp->minorversion)
1054 return nfserr_bad_xdr;
1055 switch (w & NFS4_SHARE_WANT_MASK) {
1056 case NFS4_SHARE_WANT_NO_PREFERENCE:
1057 case NFS4_SHARE_WANT_READ_DELEG:
1058 case NFS4_SHARE_WANT_WRITE_DELEG:
1059 case NFS4_SHARE_WANT_ANY_DELEG:
1060 case NFS4_SHARE_WANT_NO_DELEG:
1061 case NFS4_SHARE_WANT_CANCEL:
1062 break;
1063 default:
1064 return nfserr_bad_xdr;
1065 }
1066 w &= ~NFS4_SHARE_WANT_MASK;
1067 if (!w)
1068 return nfs_ok;
1069
1070 if (!deleg_when) /* open_downgrade */
1071 return nfserr_inval;
1072 switch (w) {
1073 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
1074 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
1075 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
1076 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
1077 return nfs_ok;
1078 }
1079 return nfserr_bad_xdr;
1080 }
1081
1082 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
1083 {
1084 if (xdr_stream_decode_u32(argp->xdr, x) < 0)
1085 return nfserr_bad_xdr;
1086 /* Note: unlike access bits, deny bits may be zero. */
1087 if (*x & ~NFS4_SHARE_DENY_BOTH)
1088 return nfserr_bad_xdr;
1089
1090 return nfs_ok;
1091 }
1092
1093 static __be32
1094 nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp,
1095 struct nfsd4_open *open)
1096 {
1097 __be32 status;
1098
1099 if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0)
1100 return nfserr_bad_xdr;
1101 switch (open->op_claim_type) {
1102 case NFS4_OPEN_CLAIM_NULL:
1103 case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1104 status = nfsd4_decode_component4(argp, &open->op_fname,
1105 &open->op_fnamelen);
1106 if (status)
1107 return status;
1108 break;
1109 case NFS4_OPEN_CLAIM_PREVIOUS:
1110 if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0)
1111 return nfserr_bad_xdr;
1112 break;
1113 case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1114 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1115 if (status)
1116 return status;
1117 status = nfsd4_decode_component4(argp, &open->op_fname,
1118 &open->op_fnamelen);
1119 if (status)
1120 return status;
1121 break;
1122 case NFS4_OPEN_CLAIM_FH:
1123 case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1124 if (argp->minorversion < 1)
1125 return nfserr_bad_xdr;
1126 /* void */
1127 break;
1128 case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1129 if (argp->minorversion < 1)
1130 return nfserr_bad_xdr;
1131 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1132 if (status)
1133 return status;
1134 break;
1135 default:
1136 return nfserr_bad_xdr;
1137 }
1138
1139 return nfs_ok;
1140 }
1141
1142 static __be32
1143 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1144 {
1145 __be32 status;
1146 u32 dummy;
1147
1148 memset(open->op_bmval, 0, sizeof(open->op_bmval));
1149 open->op_iattr.ia_valid = 0;
1150 open->op_openowner = NULL;
1151
1152 open->op_xdr_error = 0;
1153 if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0)
1154 return nfserr_bad_xdr;
1155 /* deleg_want is ignored */
1156 status = nfsd4_decode_share_access(argp, &open->op_share_access,
1157 &open->op_deleg_want, &dummy);
1158 if (status)
1159 return status;
1160 status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
1161 if (status)
1162 return status;
1163 status = nfsd4_decode_state_owner4(argp, &open->op_clientid,
1164 &open->op_owner);
1165 if (status)
1166 return status;
1167 status = nfsd4_decode_openflag4(argp, open);
1168 if (status)
1169 return status;
1170 return nfsd4_decode_open_claim4(argp, open);
1171 }
1172
1173 static __be32
1174 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
1175 {
1176 __be32 status;
1177
1178 if (argp->minorversion >= 1)
1179 return nfserr_notsupp;
1180
1181 status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid);
1182 if (status)
1183 return status;
1184 if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0)
1185 return nfserr_bad_xdr;
1186
1187 return nfs_ok;
1188 }
1189
1190 static __be32
1191 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
1192 {
1193 __be32 status;
1194
1195 status = nfsd4_decode_stateid4(argp, &open_down->od_stateid);
1196 if (status)
1197 return status;
1198 if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0)
1199 return nfserr_bad_xdr;
1200 /* deleg_want is ignored */
1201 status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
1202 &open_down->od_deleg_want, NULL);
1203 if (status)
1204 return status;
1205 return nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
1206 }
1207
1208 static __be32
1209 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
1210 {
1211 __be32 *p;
1212
1213 if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0)
1214 return nfserr_bad_xdr;
1215 if (putfh->pf_fhlen > NFS4_FHSIZE)
1216 return nfserr_bad_xdr;
1217 p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen);
1218 if (!p)
1219 return nfserr_bad_xdr;
1220 putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen);
1221 if (!putfh->pf_fhval)
1222 return nfserr_jukebox;
1223
1224 return nfs_ok;
1225 }
1226
1227 static __be32
1228 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p)
1229 {
1230 if (argp->minorversion == 0)
1231 return nfs_ok;
1232 return nfserr_notsupp;
1233 }
1234
1235 static __be32
1236 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
1237 {
1238 __be32 status;
1239
1240 status = nfsd4_decode_stateid4(argp, &read->rd_stateid);
1241 if (status)
1242 return status;
1243 if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0)
1244 return nfserr_bad_xdr;
1245 if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0)
1246 return nfserr_bad_xdr;
1247
1248 return nfs_ok;
1249 }
1250
1251 static __be32
1252 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
1253 {
1254 __be32 status;
1255
1256 if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0)
1257 return nfserr_bad_xdr;
1258 status = nfsd4_decode_verifier4(argp, &readdir->rd_verf);
1259 if (status)
1260 return status;
1261 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0)
1262 return nfserr_bad_xdr;
1263 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0)
1264 return nfserr_bad_xdr;
1265 if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval,
1266 ARRAY_SIZE(readdir->rd_bmval)) < 0)
1267 return nfserr_bad_xdr;
1268
1269 return nfs_ok;
1270 }
1271
1272 static __be32
1273 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
1274 {
1275 return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen);
1276 }
1277
1278 static __be32
1279 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
1280 {
1281 __be32 status;
1282
1283 status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen);
1284 if (status)
1285 return status;
1286 return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen);
1287 }
1288
1289 static __be32
1290 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
1291 {
1292 return nfsd4_decode_clientid4(argp, clientid);
1293 }
1294
1295 static __be32
1296 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1297 struct nfsd4_secinfo *secinfo)
1298 {
1299 return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen);
1300 }
1301
1302 static __be32
1303 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
1304 {
1305 __be32 status;
1306
1307 status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid);
1308 if (status)
1309 return status;
1310 return nfsd4_decode_fattr4(argp, setattr->sa_bmval,
1311 ARRAY_SIZE(setattr->sa_bmval),
1312 &setattr->sa_iattr, &setattr->sa_acl,
1313 &setattr->sa_label, NULL);
1314 }
1315
1316 static __be32
1317 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
1318 {
1319 __be32 *p, status;
1320
1321 if (argp->minorversion >= 1)
1322 return nfserr_notsupp;
1323
1324 status = nfsd4_decode_verifier4(argp, &setclientid->se_verf);
1325 if (status)
1326 return status;
1327 status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1328 if (status)
1329 return status;
1330 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0)
1331 return nfserr_bad_xdr;
1332 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0)
1333 return nfserr_bad_xdr;
1334 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len);
1335 if (!p)
1336 return nfserr_bad_xdr;
1337 setclientid->se_callback_netid_val = svcxdr_savemem(argp, p,
1338 setclientid->se_callback_netid_len);
1339 if (!setclientid->se_callback_netid_val)
1340 return nfserr_jukebox;
1341
1342 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0)
1343 return nfserr_bad_xdr;
1344 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len);
1345 if (!p)
1346 return nfserr_bad_xdr;
1347 setclientid->se_callback_addr_val = svcxdr_savemem(argp, p,
1348 setclientid->se_callback_addr_len);
1349 if (!setclientid->se_callback_addr_val)
1350 return nfserr_jukebox;
1351 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0)
1352 return nfserr_bad_xdr;
1353
1354 return nfs_ok;
1355 }
1356
1357 static __be32
1358 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1359 {
1360 __be32 status;
1361
1362 if (argp->minorversion >= 1)
1363 return nfserr_notsupp;
1364
1365 status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid);
1366 if (status)
1367 return status;
1368 return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm);
1369 }
1370
1371 /* Also used for NVERIFY */
1372 static __be32
1373 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1374 {
1375 __be32 *p, status;
1376
1377 status = nfsd4_decode_bitmap4(argp, verify->ve_bmval,
1378 ARRAY_SIZE(verify->ve_bmval));
1379 if (status)
1380 return status;
1381
1382 /* For convenience's sake, we compare raw xdr'd attributes in
1383 * nfsd4_proc_verify */
1384
1385 if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0)
1386 return nfserr_bad_xdr;
1387 p = xdr_inline_decode(argp->xdr, verify->ve_attrlen);
1388 if (!p)
1389 return nfserr_bad_xdr;
1390 verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen);
1391 if (!verify->ve_attrval)
1392 return nfserr_jukebox;
1393
1394 return nfs_ok;
1395 }
1396
1397 static __be32
1398 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1399 {
1400 __be32 status;
1401
1402 status = nfsd4_decode_stateid4(argp, &write->wr_stateid);
1403 if (status)
1404 return status;
1405 if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0)
1406 return nfserr_bad_xdr;
1407 if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0)
1408 return nfserr_bad_xdr;
1409 if (write->wr_stable_how > NFS_FILE_SYNC)
1410 return nfserr_bad_xdr;
1411 if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0)
1412 return nfserr_bad_xdr;
1413 if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen))
1414 return nfserr_bad_xdr;
1415
1416 return nfs_ok;
1417 }
1418
1419 static __be32
1420 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1421 {
1422 __be32 status;
1423
1424 if (argp->minorversion >= 1)
1425 return nfserr_notsupp;
1426
1427 status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid,
1428 &rlockowner->rl_owner);
1429 if (status)
1430 return status;
1431
1432 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1433 return nfserr_inval;
1434
1435 return nfs_ok;
1436 }
1437
1438 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc)
1439 {
1440 if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0)
1441 return nfserr_bad_xdr;
1442 return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
1443 }
1444
1445 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
1446 {
1447 u32 use_conn_in_rdma_mode;
1448 __be32 status;
1449
1450 status = nfsd4_decode_sessionid4(argp, &bcts->sessionid);
1451 if (status)
1452 return status;
1453 if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0)
1454 return nfserr_bad_xdr;
1455 if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0)
1456 return nfserr_bad_xdr;
1457
1458 return nfs_ok;
1459 }
1460
1461 static __be32
1462 nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp,
1463 struct nfsd4_exchange_id *exid)
1464 {
1465 __be32 status;
1466
1467 status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce,
1468 ARRAY_SIZE(exid->spo_must_enforce));
1469 if (status)
1470 return nfserr_bad_xdr;
1471 status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow,
1472 ARRAY_SIZE(exid->spo_must_allow));
1473 if (status)
1474 return nfserr_bad_xdr;
1475
1476 return nfs_ok;
1477 }
1478
1479 /*
1480 * This implementation currently does not support SP4_SSV.
1481 * This decoder simply skips over these arguments.
1482 */
1483 static noinline __be32
1484 nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp,
1485 struct nfsd4_exchange_id *exid)
1486 {
1487 u32 count, window, num_gss_handles;
1488 __be32 status;
1489
1490 /* ssp_ops */
1491 status = nfsd4_decode_state_protect_ops(argp, exid);
1492 if (status)
1493 return status;
1494
1495 /* ssp_hash_algs<> */
1496 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1497 return nfserr_bad_xdr;
1498 while (count--) {
1499 status = nfsd4_decode_ignored_string(argp, 0);
1500 if (status)
1501 return status;
1502 }
1503
1504 /* ssp_encr_algs<> */
1505 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1506 return nfserr_bad_xdr;
1507 while (count--) {
1508 status = nfsd4_decode_ignored_string(argp, 0);
1509 if (status)
1510 return status;
1511 }
1512
1513 if (xdr_stream_decode_u32(argp->xdr, &window) < 0)
1514 return nfserr_bad_xdr;
1515 if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0)
1516 return nfserr_bad_xdr;
1517
1518 return nfs_ok;
1519 }
1520
1521 static __be32
1522 nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp,
1523 struct nfsd4_exchange_id *exid)
1524 {
1525 __be32 status;
1526
1527 if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0)
1528 return nfserr_bad_xdr;
1529 switch (exid->spa_how) {
1530 case SP4_NONE:
1531 break;
1532 case SP4_MACH_CRED:
1533 status = nfsd4_decode_state_protect_ops(argp, exid);
1534 if (status)
1535 return status;
1536 break;
1537 case SP4_SSV:
1538 status = nfsd4_decode_ssv_sp_parms(argp, exid);
1539 if (status)
1540 return status;
1541 break;
1542 default:
1543 return nfserr_bad_xdr;
1544 }
1545
1546 return nfs_ok;
1547 }
1548
1549 static __be32
1550 nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp,
1551 struct nfsd4_exchange_id *exid)
1552 {
1553 __be32 status;
1554 u32 count;
1555
1556 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1557 return nfserr_bad_xdr;
1558 switch (count) {
1559 case 0:
1560 break;
1561 case 1:
1562 /* Note that RFC 8881 places no length limit on
1563 * nii_domain, but this implementation permits no
1564 * more than NFS4_OPAQUE_LIMIT bytes */
1565 status = nfsd4_decode_opaque(argp, &exid->nii_domain);
1566 if (status)
1567 return status;
1568 /* Note that RFC 8881 places no length limit on
1569 * nii_name, but this implementation permits no
1570 * more than NFS4_OPAQUE_LIMIT bytes */
1571 status = nfsd4_decode_opaque(argp, &exid->nii_name);
1572 if (status)
1573 return status;
1574 status = nfsd4_decode_nfstime4(argp, &exid->nii_time);
1575 if (status)
1576 return status;
1577 break;
1578 default:
1579 return nfserr_bad_xdr;
1580 }
1581
1582 return nfs_ok;
1583 }
1584
1585 static __be32
1586 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1587 struct nfsd4_exchange_id *exid)
1588 {
1589 __be32 status;
1590
1591 status = nfsd4_decode_verifier4(argp, &exid->verifier);
1592 if (status)
1593 return status;
1594 status = nfsd4_decode_opaque(argp, &exid->clname);
1595 if (status)
1596 return status;
1597 if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0)
1598 return nfserr_bad_xdr;
1599 status = nfsd4_decode_state_protect4_a(argp, exid);
1600 if (status)
1601 return status;
1602 return nfsd4_decode_nfs_impl_id4(argp, exid);
1603 }
1604
1605 static __be32
1606 nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp,
1607 struct nfsd4_channel_attrs *ca)
1608 {
1609 __be32 *p;
1610
1611 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7);
1612 if (!p)
1613 return nfserr_bad_xdr;
1614
1615 /* headerpadsz is ignored */
1616 p++;
1617 ca->maxreq_sz = be32_to_cpup(p++);
1618 ca->maxresp_sz = be32_to_cpup(p++);
1619 ca->maxresp_cached = be32_to_cpup(p++);
1620 ca->maxops = be32_to_cpup(p++);
1621 ca->maxreqs = be32_to_cpup(p++);
1622 ca->nr_rdma_attrs = be32_to_cpup(p);
1623 switch (ca->nr_rdma_attrs) {
1624 case 0:
1625 break;
1626 case 1:
1627 if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0)
1628 return nfserr_bad_xdr;
1629 break;
1630 default:
1631 return nfserr_bad_xdr;
1632 }
1633
1634 return nfs_ok;
1635 }
1636
1637 static __be32
1638 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1639 struct nfsd4_create_session *sess)
1640 {
1641 __be32 status;
1642
1643 status = nfsd4_decode_clientid4(argp, &sess->clientid);
1644 if (status)
1645 return status;
1646 if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0)
1647 return nfserr_bad_xdr;
1648 if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0)
1649 return nfserr_bad_xdr;
1650 status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel);
1651 if (status)
1652 return status;
1653 status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel);
1654 if (status)
1655 return status;
1656 if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0)
1657 return nfserr_bad_xdr;
1658 status = nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1659 if (status)
1660 return status;
1661
1662 return nfs_ok;
1663 }
1664
1665 static __be32
1666 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1667 struct nfsd4_destroy_session *destroy_session)
1668 {
1669 return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid);
1670 }
1671
1672 static __be32
1673 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1674 struct nfsd4_free_stateid *free_stateid)
1675 {
1676 return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid);
1677 }
1678
1679 #ifdef CONFIG_NFSD_PNFS
1680 static __be32
1681 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp,
1682 struct nfsd4_getdeviceinfo *gdev)
1683 {
1684 __be32 status;
1685
1686 status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid);
1687 if (status)
1688 return status;
1689 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0)
1690 return nfserr_bad_xdr;
1691 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0)
1692 return nfserr_bad_xdr;
1693 if (xdr_stream_decode_uint32_array(argp->xdr,
1694 &gdev->gd_notify_types, 1) < 0)
1695 return nfserr_bad_xdr;
1696
1697 return nfs_ok;
1698 }
1699
1700 static __be32
1701 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp,
1702 struct nfsd4_layoutcommit *lcp)
1703 {
1704 __be32 *p, status;
1705
1706 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0)
1707 return nfserr_bad_xdr;
1708 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0)
1709 return nfserr_bad_xdr;
1710 if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0)
1711 return nfserr_bad_xdr;
1712 status = nfsd4_decode_stateid4(argp, &lcp->lc_sid);
1713 if (status)
1714 return status;
1715 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0)
1716 return nfserr_bad_xdr;
1717 if (lcp->lc_newoffset) {
1718 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0)
1719 return nfserr_bad_xdr;
1720 } else
1721 lcp->lc_last_wr = 0;
1722 p = xdr_inline_decode(argp->xdr, XDR_UNIT);
1723 if (!p)
1724 return nfserr_bad_xdr;
1725 if (xdr_item_is_present(p)) {
1726 status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime);
1727 if (status)
1728 return status;
1729 } else {
1730 lcp->lc_mtime.tv_nsec = UTIME_NOW;
1731 }
1732 return nfsd4_decode_layoutupdate4(argp, lcp);
1733 }
1734
1735 static __be32
1736 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp,
1737 struct nfsd4_layoutget *lgp)
1738 {
1739 __be32 status;
1740
1741 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0)
1742 return nfserr_bad_xdr;
1743 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0)
1744 return nfserr_bad_xdr;
1745 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0)
1746 return nfserr_bad_xdr;
1747 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0)
1748 return nfserr_bad_xdr;
1749 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0)
1750 return nfserr_bad_xdr;
1751 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0)
1752 return nfserr_bad_xdr;
1753 status = nfsd4_decode_stateid4(argp, &lgp->lg_sid);
1754 if (status)
1755 return status;
1756 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0)
1757 return nfserr_bad_xdr;
1758
1759 return nfs_ok;
1760 }
1761
1762 static __be32
1763 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp,
1764 struct nfsd4_layoutreturn *lrp)
1765 {
1766 if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0)
1767 return nfserr_bad_xdr;
1768 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0)
1769 return nfserr_bad_xdr;
1770 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0)
1771 return nfserr_bad_xdr;
1772 return nfsd4_decode_layoutreturn4(argp, lrp);
1773 }
1774 #endif /* CONFIG_NFSD_PNFS */
1775
1776 static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1777 struct nfsd4_secinfo_no_name *sin)
1778 {
1779 if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0)
1780 return nfserr_bad_xdr;
1781 return nfs_ok;
1782 }
1783
1784 static __be32
1785 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1786 struct nfsd4_sequence *seq)
1787 {
1788 __be32 *p, status;
1789
1790 status = nfsd4_decode_sessionid4(argp, &seq->sessionid);
1791 if (status)
1792 return status;
1793 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4);
1794 if (!p)
1795 return nfserr_bad_xdr;
1796 seq->seqid = be32_to_cpup(p++);
1797 seq->slotid = be32_to_cpup(p++);
1798 seq->maxslots = be32_to_cpup(p++);
1799 seq->cachethis = be32_to_cpup(p);
1800
1801 return nfs_ok;
1802 }
1803
1804 static __be32
1805 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1806 {
1807 struct nfsd4_test_stateid_id *stateid;
1808 __be32 status;
1809 u32 i;
1810
1811 if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0)
1812 return nfserr_bad_xdr;
1813
1814 INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1815 for (i = 0; i < test_stateid->ts_num_ids; i++) {
1816 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
1817 if (!stateid)
1818 return nfserrno(-ENOMEM); /* XXX: not jukebox? */
1819 INIT_LIST_HEAD(&stateid->ts_id_list);
1820 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1821 status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid);
1822 if (status)
1823 return status;
1824 }
1825
1826 return nfs_ok;
1827 }
1828
1829 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp,
1830 struct nfsd4_destroy_clientid *dc)
1831 {
1832 return nfsd4_decode_clientid4(argp, &dc->clientid);
1833 }
1834
1835 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp,
1836 struct nfsd4_reclaim_complete *rc)
1837 {
1838 if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0)
1839 return nfserr_bad_xdr;
1840 return nfs_ok;
1841 }
1842
1843 static __be32
1844 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp,
1845 struct nfsd4_fallocate *fallocate)
1846 {
1847 __be32 status;
1848
1849 status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid);
1850 if (status)
1851 return status;
1852 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0)
1853 return nfserr_bad_xdr;
1854 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0)
1855 return nfserr_bad_xdr;
1856
1857 return nfs_ok;
1858 }
1859
1860 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp,
1861 struct nl4_server *ns)
1862 {
1863 struct nfs42_netaddr *naddr;
1864 __be32 *p;
1865
1866 if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0)
1867 return nfserr_bad_xdr;
1868
1869 /* currently support for 1 inter-server source server */
1870 switch (ns->nl4_type) {
1871 case NL4_NETADDR:
1872 naddr = &ns->u.nl4_addr;
1873
1874 if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0)
1875 return nfserr_bad_xdr;
1876 if (naddr->netid_len > RPCBIND_MAXNETIDLEN)
1877 return nfserr_bad_xdr;
1878
1879 p = xdr_inline_decode(argp->xdr, naddr->netid_len);
1880 if (!p)
1881 return nfserr_bad_xdr;
1882 memcpy(naddr->netid, p, naddr->netid_len);
1883
1884 if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0)
1885 return nfserr_bad_xdr;
1886 if (naddr->addr_len > RPCBIND_MAXUADDRLEN)
1887 return nfserr_bad_xdr;
1888
1889 p = xdr_inline_decode(argp->xdr, naddr->addr_len);
1890 if (!p)
1891 return nfserr_bad_xdr;
1892 memcpy(naddr->addr, p, naddr->addr_len);
1893 break;
1894 default:
1895 return nfserr_bad_xdr;
1896 }
1897
1898 return nfs_ok;
1899 }
1900
1901 static __be32
1902 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, struct nfsd4_copy *copy)
1903 {
1904 struct nl4_server *ns_dummy;
1905 u32 consecutive, i, count;
1906 __be32 status;
1907
1908 status = nfsd4_decode_stateid4(argp, &copy->cp_src_stateid);
1909 if (status)
1910 return status;
1911 status = nfsd4_decode_stateid4(argp, &copy->cp_dst_stateid);
1912 if (status)
1913 return status;
1914 if (xdr_stream_decode_u64(argp->xdr, &copy->cp_src_pos) < 0)
1915 return nfserr_bad_xdr;
1916 if (xdr_stream_decode_u64(argp->xdr, &copy->cp_dst_pos) < 0)
1917 return nfserr_bad_xdr;
1918 if (xdr_stream_decode_u64(argp->xdr, &copy->cp_count) < 0)
1919 return nfserr_bad_xdr;
1920 /* ca_consecutive: we always do consecutive copies */
1921 if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0)
1922 return nfserr_bad_xdr;
1923 if (xdr_stream_decode_u32(argp->xdr, &copy->cp_synchronous) < 0)
1924 return nfserr_bad_xdr;
1925
1926 if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1927 return nfserr_bad_xdr;
1928 copy->cp_intra = false;
1929 if (count == 0) { /* intra-server copy */
1930 copy->cp_intra = true;
1931 return nfs_ok;
1932 }
1933
1934 /* decode all the supplied server addresses but use only the first */
1935 status = nfsd4_decode_nl4_server(argp, &copy->cp_src);
1936 if (status)
1937 return status;
1938
1939 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL);
1940 if (ns_dummy == NULL)
1941 return nfserrno(-ENOMEM); /* XXX: jukebox? */
1942 for (i = 0; i < count - 1; i++) {
1943 status = nfsd4_decode_nl4_server(argp, ns_dummy);
1944 if (status) {
1945 kfree(ns_dummy);
1946 return status;
1947 }
1948 }
1949 kfree(ns_dummy);
1950
1951 return nfs_ok;
1952 }
1953
1954 static __be32
1955 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp,
1956 struct nfsd4_copy_notify *cn)
1957 {
1958 __be32 status;
1959
1960 status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid);
1961 if (status)
1962 return status;
1963 return nfsd4_decode_nl4_server(argp, &cn->cpn_dst);
1964 }
1965
1966 static __be32
1967 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp,
1968 struct nfsd4_offload_status *os)
1969 {
1970 return nfsd4_decode_stateid4(argp, &os->stateid);
1971 }
1972
1973 static __be32
1974 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, struct nfsd4_seek *seek)
1975 {
1976 __be32 status;
1977
1978 status = nfsd4_decode_stateid4(argp, &seek->seek_stateid);
1979 if (status)
1980 return status;
1981 if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0)
1982 return nfserr_bad_xdr;
1983 if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0)
1984 return nfserr_bad_xdr;
1985
1986 return nfs_ok;
1987 }
1988
1989 static __be32
1990 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, struct nfsd4_clone *clone)
1991 {
1992 __be32 status;
1993
1994 status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid);
1995 if (status)
1996 return status;
1997 status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid);
1998 if (status)
1999 return status;
2000 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0)
2001 return nfserr_bad_xdr;
2002 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0)
2003 return nfserr_bad_xdr;
2004 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0)
2005 return nfserr_bad_xdr;
2006
2007 return nfs_ok;
2008 }
2009
2010 /*
2011 * XDR data that is more than PAGE_SIZE in size is normally part of a
2012 * read or write. However, the size of extended attributes is limited
2013 * by the maximum request size, and then further limited by the underlying
2014 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX
2015 * is 64k). Since there is no kvec- or page-based interface to xattrs,
2016 * and we're not dealing with contiguous pages, we need to do some copying.
2017 */
2018
2019 /*
2020 * Decode data into buffer.
2021 */
2022 static __be32
2023 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr,
2024 char **bufp, u32 buflen)
2025 {
2026 struct page **pages = xdr->pages;
2027 struct kvec *head = xdr->head;
2028 char *tmp, *dp;
2029 u32 len;
2030
2031 if (buflen <= head->iov_len) {
2032 /*
2033 * We're in luck, the head has enough space. Just return
2034 * the head, no need for copying.
2035 */
2036 *bufp = head->iov_base;
2037 return 0;
2038 }
2039
2040 tmp = svcxdr_tmpalloc(argp, buflen);
2041 if (tmp == NULL)
2042 return nfserr_jukebox;
2043
2044 dp = tmp;
2045 memcpy(dp, head->iov_base, head->iov_len);
2046 buflen -= head->iov_len;
2047 dp += head->iov_len;
2048
2049 while (buflen > 0) {
2050 len = min_t(u32, buflen, PAGE_SIZE);
2051 memcpy(dp, page_address(*pages), len);
2052
2053 buflen -= len;
2054 dp += len;
2055 pages++;
2056 }
2057
2058 *bufp = tmp;
2059 return 0;
2060 }
2061
2062 /*
2063 * Get a user extended attribute name from the XDR buffer.
2064 * It will not have the "user." prefix, so prepend it.
2065 * Lastly, check for nul characters in the name.
2066 */
2067 static __be32
2068 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep)
2069 {
2070 char *name, *sp, *dp;
2071 u32 namelen, cnt;
2072 __be32 *p;
2073
2074 if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0)
2075 return nfserr_bad_xdr;
2076 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN))
2077 return nfserr_nametoolong;
2078 if (namelen == 0)
2079 return nfserr_bad_xdr;
2080 p = xdr_inline_decode(argp->xdr, namelen);
2081 if (!p)
2082 return nfserr_bad_xdr;
2083 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1);
2084 if (!name)
2085 return nfserr_jukebox;
2086 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
2087
2088 /*
2089 * Copy the extended attribute name over while checking for 0
2090 * characters.
2091 */
2092 sp = (char *)p;
2093 dp = name + XATTR_USER_PREFIX_LEN;
2094 cnt = namelen;
2095
2096 while (cnt-- > 0) {
2097 if (*sp == '\0')
2098 return nfserr_bad_xdr;
2099 *dp++ = *sp++;
2100 }
2101 *dp = '\0';
2102
2103 *namep = name;
2104
2105 return nfs_ok;
2106 }
2107
2108 /*
2109 * A GETXATTR op request comes without a length specifier. We just set the
2110 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum
2111 * channel reply size. nfsd_getxattr will probe the length of the xattr,
2112 * check it against getxa_len, and allocate + return the value.
2113 */
2114 static __be32
2115 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp,
2116 struct nfsd4_getxattr *getxattr)
2117 {
2118 __be32 status;
2119 u32 maxcount;
2120
2121 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name);
2122 if (status)
2123 return status;
2124
2125 maxcount = svc_max_payload(argp->rqstp);
2126 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2127
2128 getxattr->getxa_len = maxcount;
2129
2130 return status;
2131 }
2132
2133 static __be32
2134 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp,
2135 struct nfsd4_setxattr *setxattr)
2136 {
2137 u32 flags, maxcount, size;
2138 __be32 status;
2139
2140 if (xdr_stream_decode_u32(argp->xdr, &flags) < 0)
2141 return nfserr_bad_xdr;
2142
2143 if (flags > SETXATTR4_REPLACE)
2144 return nfserr_inval;
2145 setxattr->setxa_flags = flags;
2146
2147 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name);
2148 if (status)
2149 return status;
2150
2151 maxcount = svc_max_payload(argp->rqstp);
2152 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2153
2154 if (xdr_stream_decode_u32(argp->xdr, &size) < 0)
2155 return nfserr_bad_xdr;
2156 if (size > maxcount)
2157 return nfserr_xattr2big;
2158
2159 setxattr->setxa_len = size;
2160 if (size > 0) {
2161 struct xdr_buf payload;
2162
2163 if (!xdr_stream_subsegment(argp->xdr, &payload, size))
2164 return nfserr_bad_xdr;
2165 status = nfsd4_vbuf_from_vector(argp, &payload,
2166 &setxattr->setxa_buf, size);
2167 }
2168
2169 return nfs_ok;
2170 }
2171
2172 static __be32
2173 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp,
2174 struct nfsd4_listxattrs *listxattrs)
2175 {
2176 u32 maxcount;
2177
2178 if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0)
2179 return nfserr_bad_xdr;
2180
2181 /*
2182 * If the cookie is too large to have even one user.x attribute
2183 * plus trailing '\0' left in a maximum size buffer, it's invalid.
2184 */
2185 if (listxattrs->lsxa_cookie >=
2186 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2)))
2187 return nfserr_badcookie;
2188
2189 if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0)
2190 return nfserr_bad_xdr;
2191 if (maxcount < 8)
2192 /* Always need at least 2 words (length and one character) */
2193 return nfserr_inval;
2194
2195 maxcount = min(maxcount, svc_max_payload(argp->rqstp));
2196 listxattrs->lsxa_maxcount = maxcount;
2197
2198 return nfs_ok;
2199 }
2200
2201 static __be32
2202 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp,
2203 struct nfsd4_removexattr *removexattr)
2204 {
2205 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name);
2206 }
2207
2208 static __be32
2209 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
2210 {
2211 return nfs_ok;
2212 }
2213
2214 static __be32
2215 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
2216 {
2217 return nfserr_notsupp;
2218 }
2219
2220 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
2221
2222 static const nfsd4_dec nfsd4_dec_ops[] = {
2223 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access,
2224 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close,
2225 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit,
2226 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create,
2227 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp,
2228 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn,
2229 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr,
2230 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop,
2231 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link,
2232 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock,
2233 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt,
2234 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku,
2235 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup,
2236 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop,
2237 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify,
2238 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open,
2239 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp,
2240 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm,
2241 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade,
2242 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh,
2243 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh,
2244 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop,
2245 [OP_READ] = (nfsd4_dec)nfsd4_decode_read,
2246 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir,
2247 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop,
2248 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove,
2249 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename,
2250 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew,
2251 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop,
2252 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop,
2253 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo,
2254 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr,
2255 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid,
2256 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
2257 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify,
2258 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write,
2259 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner,
2260
2261 /* new operations for NFSv4.1 */
2262 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl,
2263 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
2264 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id,
2265 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session,
2266 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session,
2267 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid,
2268 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
2269 #ifdef CONFIG_NFSD_PNFS
2270 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_getdeviceinfo,
2271 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
2272 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_layoutcommit,
2273 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_layoutget,
2274 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_layoutreturn,
2275 #else
2276 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp,
2277 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp,
2278 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp,
2279 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp,
2280 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp,
2281 #endif
2282 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name,
2283 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence,
2284 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp,
2285 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid,
2286 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp,
2287 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid,
2288 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete,
2289
2290 /* new operations for NFSv4.2 */
2291 [OP_ALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate,
2292 [OP_COPY] = (nfsd4_dec)nfsd4_decode_copy,
2293 [OP_COPY_NOTIFY] = (nfsd4_dec)nfsd4_decode_copy_notify,
2294 [OP_DEALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate,
2295 [OP_IO_ADVISE] = (nfsd4_dec)nfsd4_decode_notsupp,
2296 [OP_LAYOUTERROR] = (nfsd4_dec)nfsd4_decode_notsupp,
2297 [OP_LAYOUTSTATS] = (nfsd4_dec)nfsd4_decode_notsupp,
2298 [OP_OFFLOAD_CANCEL] = (nfsd4_dec)nfsd4_decode_offload_status,
2299 [OP_OFFLOAD_STATUS] = (nfsd4_dec)nfsd4_decode_offload_status,
2300 [OP_READ_PLUS] = (nfsd4_dec)nfsd4_decode_read,
2301 [OP_SEEK] = (nfsd4_dec)nfsd4_decode_seek,
2302 [OP_WRITE_SAME] = (nfsd4_dec)nfsd4_decode_notsupp,
2303 [OP_CLONE] = (nfsd4_dec)nfsd4_decode_clone,
2304 /* RFC 8276 extended atributes operations */
2305 [OP_GETXATTR] = (nfsd4_dec)nfsd4_decode_getxattr,
2306 [OP_SETXATTR] = (nfsd4_dec)nfsd4_decode_setxattr,
2307 [OP_LISTXATTRS] = (nfsd4_dec)nfsd4_decode_listxattrs,
2308 [OP_REMOVEXATTR] = (nfsd4_dec)nfsd4_decode_removexattr,
2309 };
2310
2311 static inline bool
2312 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
2313 {
2314 if (op->opnum < FIRST_NFS4_OP)
2315 return false;
2316 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
2317 return false;
2318 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
2319 return false;
2320 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
2321 return false;
2322 return true;
2323 }
2324
2325 static int
2326 nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
2327 {
2328 struct nfsd4_op *op;
2329 bool cachethis = false;
2330 int auth_slack= argp->rqstp->rq_auth_slack;
2331 int max_reply = auth_slack + 8; /* opcnt, status */
2332 int readcount = 0;
2333 int readbytes = 0;
2334 __be32 *p;
2335 int i;
2336
2337 if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0)
2338 return 0;
2339 max_reply += XDR_UNIT;
2340 argp->tag = NULL;
2341 if (unlikely(argp->taglen)) {
2342 if (argp->taglen > NFSD4_MAX_TAGLEN)
2343 return 0;
2344 p = xdr_inline_decode(argp->xdr, argp->taglen);
2345 if (!p)
2346 return 0;
2347 argp->tag = svcxdr_savemem(argp, p, argp->taglen);
2348 if (!argp->tag)
2349 return 0;
2350 max_reply += xdr_align_size(argp->taglen);
2351 }
2352
2353 if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0)
2354 return 0;
2355 if (xdr_stream_decode_u32(argp->xdr, &argp->opcnt) < 0)
2356 return 0;
2357
2358 /*
2359 * NFS4ERR_RESOURCE is a more helpful error than GARBAGE_ARGS
2360 * here, so we return success at the xdr level so that
2361 * nfsd4_proc can handle this is an NFS-level error.
2362 */
2363 if (argp->opcnt > NFSD_MAX_OPS_PER_COMPOUND)
2364 return 1;
2365
2366 if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
2367 argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
2368 if (!argp->ops) {
2369 argp->ops = argp->iops;
2370 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
2371 return 0;
2372 }
2373 }
2374
2375 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
2376 argp->opcnt = 0;
2377
2378 for (i = 0; i < argp->opcnt; i++) {
2379 op = &argp->ops[i];
2380 op->replay = NULL;
2381
2382 if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0)
2383 return 0;
2384 if (nfsd4_opnum_in_range(argp, op)) {
2385 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
2386 if (op->status != nfs_ok)
2387 trace_nfsd_compound_decode_err(argp->rqstp,
2388 argp->opcnt, i,
2389 op->opnum,
2390 op->status);
2391 } else {
2392 op->opnum = OP_ILLEGAL;
2393 op->status = nfserr_op_illegal;
2394 }
2395 op->opdesc = OPDESC(op);
2396 /*
2397 * We'll try to cache the result in the DRC if any one
2398 * op in the compound wants to be cached:
2399 */
2400 cachethis |= nfsd4_cache_this_op(op);
2401
2402 if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) {
2403 readcount++;
2404 readbytes += nfsd4_max_reply(argp->rqstp, op);
2405 } else
2406 max_reply += nfsd4_max_reply(argp->rqstp, op);
2407 /*
2408 * OP_LOCK and OP_LOCKT may return a conflicting lock.
2409 * (Special case because it will just skip encoding this
2410 * if it runs out of xdr buffer space, and it is the only
2411 * operation that behaves this way.)
2412 */
2413 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT)
2414 max_reply += NFS4_OPAQUE_LIMIT;
2415
2416 if (op->status) {
2417 argp->opcnt = i+1;
2418 break;
2419 }
2420 }
2421 /* Sessions make the DRC unnecessary: */
2422 if (argp->minorversion)
2423 cachethis = false;
2424 svc_reserve(argp->rqstp, max_reply + readbytes);
2425 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
2426
2427 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
2428 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags);
2429
2430 return 1;
2431 }
2432
2433 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode,
2434 struct svc_export *exp)
2435 {
2436 if (exp->ex_flags & NFSEXP_V4ROOT) {
2437 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time));
2438 *p++ = 0;
2439 } else
2440 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode));
2441 return p;
2442 }
2443
2444 /*
2445 * ctime (in NFSv4, time_metadata) is not writeable, and the client
2446 * doesn't really care what resolution could theoretically be stored by
2447 * the filesystem.
2448 *
2449 * The client cares how close together changes can be while still
2450 * guaranteeing ctime changes. For most filesystems (which have
2451 * timestamps with nanosecond fields) that is limited by the resolution
2452 * of the time returned from current_time() (which I'm assuming to be
2453 * 1/HZ).
2454 */
2455 static __be32 *encode_time_delta(__be32 *p, struct inode *inode)
2456 {
2457 struct timespec64 ts;
2458 u32 ns;
2459
2460 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran);
2461 ts = ns_to_timespec64(ns);
2462
2463 p = xdr_encode_hyper(p, ts.tv_sec);
2464 *p++ = cpu_to_be32(ts.tv_nsec);
2465
2466 return p;
2467 }
2468
2469 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
2470 {
2471 *p++ = cpu_to_be32(c->atomic);
2472 p = xdr_encode_hyper(p, c->before_change);
2473 p = xdr_encode_hyper(p, c->after_change);
2474 return p;
2475 }
2476
2477 /* Encode as an array of strings the string given with components
2478 * separated @sep, escaped with esc_enter and esc_exit.
2479 */
2480 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
2481 char *components, char esc_enter,
2482 char esc_exit)
2483 {
2484 __be32 *p;
2485 __be32 pathlen;
2486 int pathlen_offset;
2487 int strlen, count=0;
2488 char *str, *end, *next;
2489
2490 dprintk("nfsd4_encode_components(%s)\n", components);
2491
2492 pathlen_offset = xdr->buf->len;
2493 p = xdr_reserve_space(xdr, 4);
2494 if (!p)
2495 return nfserr_resource;
2496 p++; /* We will fill this in with @count later */
2497
2498 end = str = components;
2499 while (*end) {
2500 bool found_esc = false;
2501
2502 /* try to parse as esc_start, ..., esc_end, sep */
2503 if (*str == esc_enter) {
2504 for (; *end && (*end != esc_exit); end++)
2505 /* find esc_exit or end of string */;
2506 next = end + 1;
2507 if (*end && (!*next || *next == sep)) {
2508 str++;
2509 found_esc = true;
2510 }
2511 }
2512
2513 if (!found_esc)
2514 for (; *end && (*end != sep); end++)
2515 /* find sep or end of string */;
2516
2517 strlen = end - str;
2518 if (strlen) {
2519 p = xdr_reserve_space(xdr, strlen + 4);
2520 if (!p)
2521 return nfserr_resource;
2522 p = xdr_encode_opaque(p, str, strlen);
2523 count++;
2524 }
2525 else
2526 end++;
2527 if (found_esc)
2528 end = next;
2529
2530 str = end;
2531 }
2532 pathlen = htonl(count);
2533 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
2534 return 0;
2535 }
2536
2537 /* Encode as an array of strings the string given with components
2538 * separated @sep.
2539 */
2540 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
2541 char *components)
2542 {
2543 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
2544 }
2545
2546 /*
2547 * encode a location element of a fs_locations structure
2548 */
2549 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
2550 struct nfsd4_fs_location *location)
2551 {
2552 __be32 status;
2553
2554 status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
2555 '[', ']');
2556 if (status)
2557 return status;
2558 status = nfsd4_encode_components(xdr, '/', location->path);
2559 if (status)
2560 return status;
2561 return 0;
2562 }
2563
2564 /*
2565 * Encode a path in RFC3530 'pathname4' format
2566 */
2567 static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
2568 const struct path *root,
2569 const struct path *path)
2570 {
2571 struct path cur = *path;
2572 __be32 *p;
2573 struct dentry **components = NULL;
2574 unsigned int ncomponents = 0;
2575 __be32 err = nfserr_jukebox;
2576
2577 dprintk("nfsd4_encode_components(");
2578
2579 path_get(&cur);
2580 /* First walk the path up to the nfsd root, and store the
2581 * dentries/path components in an array.
2582 */
2583 for (;;) {
2584 if (path_equal(&cur, root))
2585 break;
2586 if (cur.dentry == cur.mnt->mnt_root) {
2587 if (follow_up(&cur))
2588 continue;
2589 goto out_free;
2590 }
2591 if ((ncomponents & 15) == 0) {
2592 struct dentry **new;
2593 new = krealloc(components,
2594 sizeof(*new) * (ncomponents + 16),
2595 GFP_KERNEL);
2596 if (!new)
2597 goto out_free;
2598 components = new;
2599 }
2600 components[ncomponents++] = cur.dentry;
2601 cur.dentry = dget_parent(cur.dentry);
2602 }
2603 err = nfserr_resource;
2604 p = xdr_reserve_space(xdr, 4);
2605 if (!p)
2606 goto out_free;
2607 *p++ = cpu_to_be32(ncomponents);
2608
2609 while (ncomponents) {
2610 struct dentry *dentry = components[ncomponents - 1];
2611 unsigned int len;
2612
2613 spin_lock(&dentry->d_lock);
2614 len = dentry->d_name.len;
2615 p = xdr_reserve_space(xdr, len + 4);
2616 if (!p) {
2617 spin_unlock(&dentry->d_lock);
2618 goto out_free;
2619 }
2620 p = xdr_encode_opaque(p, dentry->d_name.name, len);
2621 dprintk("/%pd", dentry);
2622 spin_unlock(&dentry->d_lock);
2623 dput(dentry);
2624 ncomponents--;
2625 }
2626
2627 err = 0;
2628 out_free:
2629 dprintk(")\n");
2630 while (ncomponents)
2631 dput(components[--ncomponents]);
2632 kfree(components);
2633 path_put(&cur);
2634 return err;
2635 }
2636
2637 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
2638 struct svc_rqst *rqstp, const struct path *path)
2639 {
2640 struct svc_export *exp_ps;
2641 __be32 res;
2642
2643 exp_ps = rqst_find_fsidzero_export(rqstp);
2644 if (IS_ERR(exp_ps))
2645 return nfserrno(PTR_ERR(exp_ps));
2646 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
2647 exp_put(exp_ps);
2648 return res;
2649 }
2650
2651 /*
2652 * encode a fs_locations structure
2653 */
2654 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
2655 struct svc_rqst *rqstp, struct svc_export *exp)
2656 {
2657 __be32 status;
2658 int i;
2659 __be32 *p;
2660 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
2661
2662 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
2663 if (status)
2664 return status;
2665 p = xdr_reserve_space(xdr, 4);
2666 if (!p)
2667 return nfserr_resource;
2668 *p++ = cpu_to_be32(fslocs->locations_count);
2669 for (i=0; i<fslocs->locations_count; i++) {
2670 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
2671 if (status)
2672 return status;
2673 }
2674 return 0;
2675 }
2676
2677 static u32 nfs4_file_type(umode_t mode)
2678 {
2679 switch (mode & S_IFMT) {
2680 case S_IFIFO: return NF4FIFO;
2681 case S_IFCHR: return NF4CHR;
2682 case S_IFDIR: return NF4DIR;
2683 case S_IFBLK: return NF4BLK;
2684 case S_IFLNK: return NF4LNK;
2685 case S_IFREG: return NF4REG;
2686 case S_IFSOCK: return NF4SOCK;
2687 default: return NF4BAD;
2688 }
2689 }
2690
2691 static inline __be32
2692 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2693 struct nfs4_ace *ace)
2694 {
2695 if (ace->whotype != NFS4_ACL_WHO_NAMED)
2696 return nfs4_acl_write_who(xdr, ace->whotype);
2697 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
2698 return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
2699 else
2700 return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
2701 }
2702
2703 static inline __be32
2704 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types)
2705 {
2706 __be32 *p;
2707 unsigned long i = hweight_long(layout_types);
2708
2709 p = xdr_reserve_space(xdr, 4 + 4 * i);
2710 if (!p)
2711 return nfserr_resource;
2712
2713 *p++ = cpu_to_be32(i);
2714
2715 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i)
2716 if (layout_types & (1 << i))
2717 *p++ = cpu_to_be32(i);
2718
2719 return 0;
2720 }
2721
2722 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
2723 FATTR4_WORD0_RDATTR_ERROR)
2724 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2725 #define WORD2_ABSENT_FS_ATTRS 0
2726
2727 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2728 static inline __be32
2729 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2730 struct lsmcontext *context)
2731 {
2732 __be32 *p;
2733
2734 p = xdr_reserve_space(xdr, context->len + 4 + 4 + 4);
2735 if (!p)
2736 return nfserr_resource;
2737
2738 /*
2739 * For now we use a 0 here to indicate the null translation; in
2740 * the future we may place a call to translation code here.
2741 */
2742 *p++ = cpu_to_be32(0); /* lfs */
2743 *p++ = cpu_to_be32(0); /* pi */
2744 p = xdr_encode_opaque(p, context->context, context->len);
2745 return 0;
2746 }
2747 #else
2748 static inline __be32
2749 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2750 struct lsmcontext *context)
2751 { return 0; }
2752 #endif
2753
2754 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err)
2755 {
2756 /* As per referral draft: */
2757 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2758 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2759 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2760 *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2761 *rdattr_err = NFSERR_MOVED;
2762 else
2763 return nfserr_moved;
2764 }
2765 *bmval0 &= WORD0_ABSENT_FS_ATTRS;
2766 *bmval1 &= WORD1_ABSENT_FS_ATTRS;
2767 *bmval2 &= WORD2_ABSENT_FS_ATTRS;
2768 return 0;
2769 }
2770
2771
2772 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat)
2773 {
2774 struct path path = exp->ex_path;
2775 int err;
2776
2777 path_get(&path);
2778 while (follow_up(&path)) {
2779 if (path.dentry != path.mnt->mnt_root)
2780 break;
2781 }
2782 err = vfs_getattr(&path, stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
2783 path_put(&path);
2784 return err;
2785 }
2786
2787 static __be32
2788 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2)
2789 {
2790 __be32 *p;
2791
2792 if (bmval2) {
2793 p = xdr_reserve_space(xdr, 16);
2794 if (!p)
2795 goto out_resource;
2796 *p++ = cpu_to_be32(3);
2797 *p++ = cpu_to_be32(bmval0);
2798 *p++ = cpu_to_be32(bmval1);
2799 *p++ = cpu_to_be32(bmval2);
2800 } else if (bmval1) {
2801 p = xdr_reserve_space(xdr, 12);
2802 if (!p)
2803 goto out_resource;
2804 *p++ = cpu_to_be32(2);
2805 *p++ = cpu_to_be32(bmval0);
2806 *p++ = cpu_to_be32(bmval1);
2807 } else {
2808 p = xdr_reserve_space(xdr, 8);
2809 if (!p)
2810 goto out_resource;
2811 *p++ = cpu_to_be32(1);
2812 *p++ = cpu_to_be32(bmval0);
2813 }
2814
2815 return 0;
2816 out_resource:
2817 return nfserr_resource;
2818 }
2819
2820 /*
2821 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2822 * ourselves.
2823 */
2824 static __be32
2825 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2826 struct svc_export *exp,
2827 struct dentry *dentry, u32 *bmval,
2828 struct svc_rqst *rqstp, int ignore_crossmnt)
2829 {
2830 u32 bmval0 = bmval[0];
2831 u32 bmval1 = bmval[1];
2832 u32 bmval2 = bmval[2];
2833 struct kstat stat;
2834 struct svc_fh *tempfh = NULL;
2835 struct kstatfs statfs;
2836 __be32 *p;
2837 int starting_len = xdr->buf->len;
2838 int attrlen_offset;
2839 __be32 attrlen;
2840 u32 dummy;
2841 u64 dummy64;
2842 u32 rdattr_err = 0;
2843 __be32 status;
2844 int err;
2845 struct nfs4_acl *acl = NULL;
2846 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2847 struct lsmcontext context = { };
2848 #endif
2849 bool contextsupport = false;
2850 struct nfsd4_compoundres *resp = rqstp->rq_resp;
2851 u32 minorversion = resp->cstate.minorversion;
2852 struct path path = {
2853 .mnt = exp->ex_path.mnt,
2854 .dentry = dentry,
2855 };
2856 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2857
2858 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2859 BUG_ON(!nfsd_attrs_supported(minorversion, bmval));
2860
2861 if (exp->ex_fslocs.migrated) {
2862 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err);
2863 if (status)
2864 goto out;
2865 }
2866
2867 err = vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
2868 if (err)
2869 goto out_nfserr;
2870 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2871 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2872 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2873 FATTR4_WORD1_SPACE_TOTAL))) {
2874 err = vfs_statfs(&path, &statfs);
2875 if (err)
2876 goto out_nfserr;
2877 }
2878 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2879 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2880 status = nfserr_jukebox;
2881 if (!tempfh)
2882 goto out;
2883 fh_init(tempfh, NFS4_FHSIZE);
2884 status = fh_compose(tempfh, exp, dentry, NULL);
2885 if (status)
2886 goto out;
2887 fhp = tempfh;
2888 }
2889 if (bmval0 & FATTR4_WORD0_ACL) {
2890 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2891 if (err == -EOPNOTSUPP)
2892 bmval0 &= ~FATTR4_WORD0_ACL;
2893 else if (err == -EINVAL) {
2894 status = nfserr_attrnotsupp;
2895 goto out;
2896 } else if (err != 0)
2897 goto out_nfserr;
2898 }
2899
2900 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2901 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) ||
2902 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2903 if (exp->ex_flags & NFSEXP_SECURITY_LABEL)
2904 err = security_inode_getsecctx(d_inode(dentry),
2905 &context);
2906 else
2907 err = -EOPNOTSUPP;
2908 contextsupport = (err == 0);
2909 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2910 if (err == -EOPNOTSUPP)
2911 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2912 else if (err)
2913 goto out_nfserr;
2914 }
2915 }
2916 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2917
2918 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2);
2919 if (status)
2920 goto out;
2921
2922 attrlen_offset = xdr->buf->len;
2923 p = xdr_reserve_space(xdr, 4);
2924 if (!p)
2925 goto out_resource;
2926 p++; /* to be backfilled later */
2927
2928 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2929 u32 supp[3];
2930
2931 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
2932
2933 if (!IS_POSIXACL(dentry->d_inode))
2934 supp[0] &= ~FATTR4_WORD0_ACL;
2935 if (!contextsupport)
2936 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2937 if (!supp[2]) {
2938 p = xdr_reserve_space(xdr, 12);
2939 if (!p)
2940 goto out_resource;
2941 *p++ = cpu_to_be32(2);
2942 *p++ = cpu_to_be32(supp[0]);
2943 *p++ = cpu_to_be32(supp[1]);
2944 } else {
2945 p = xdr_reserve_space(xdr, 16);
2946 if (!p)
2947 goto out_resource;
2948 *p++ = cpu_to_be32(3);
2949 *p++ = cpu_to_be32(supp[0]);
2950 *p++ = cpu_to_be32(supp[1]);
2951 *p++ = cpu_to_be32(supp[2]);
2952 }
2953 }
2954 if (bmval0 & FATTR4_WORD0_TYPE) {
2955 p = xdr_reserve_space(xdr, 4);
2956 if (!p)
2957 goto out_resource;
2958 dummy = nfs4_file_type(stat.mode);
2959 if (dummy == NF4BAD) {
2960 status = nfserr_serverfault;
2961 goto out;
2962 }
2963 *p++ = cpu_to_be32(dummy);
2964 }
2965 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
2966 p = xdr_reserve_space(xdr, 4);
2967 if (!p)
2968 goto out_resource;
2969 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
2970 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
2971 else
2972 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
2973 NFS4_FH_VOL_RENAME);
2974 }
2975 if (bmval0 & FATTR4_WORD0_CHANGE) {
2976 p = xdr_reserve_space(xdr, 8);
2977 if (!p)
2978 goto out_resource;
2979 p = encode_change(p, &stat, d_inode(dentry), exp);
2980 }
2981 if (bmval0 & FATTR4_WORD0_SIZE) {
2982 p = xdr_reserve_space(xdr, 8);
2983 if (!p)
2984 goto out_resource;
2985 p = xdr_encode_hyper(p, stat.size);
2986 }
2987 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
2988 p = xdr_reserve_space(xdr, 4);
2989 if (!p)
2990 goto out_resource;
2991 *p++ = cpu_to_be32(1);
2992 }
2993 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
2994 p = xdr_reserve_space(xdr, 4);
2995 if (!p)
2996 goto out_resource;
2997 *p++ = cpu_to_be32(1);
2998 }
2999 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
3000 p = xdr_reserve_space(xdr, 4);
3001 if (!p)
3002 goto out_resource;
3003 *p++ = cpu_to_be32(0);
3004 }
3005 if (bmval0 & FATTR4_WORD0_FSID) {
3006 p = xdr_reserve_space(xdr, 16);
3007 if (!p)
3008 goto out_resource;
3009 if (exp->ex_fslocs.migrated) {
3010 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
3011 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
3012 } else switch(fsid_source(fhp)) {
3013 case FSIDSOURCE_FSID:
3014 p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
3015 p = xdr_encode_hyper(p, (u64)0);
3016 break;
3017 case FSIDSOURCE_DEV:
3018 *p++ = cpu_to_be32(0);
3019 *p++ = cpu_to_be32(MAJOR(stat.dev));
3020 *p++ = cpu_to_be32(0);
3021 *p++ = cpu_to_be32(MINOR(stat.dev));
3022 break;
3023 case FSIDSOURCE_UUID:
3024 p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
3025 EX_UUID_LEN);
3026 break;
3027 }
3028 }
3029 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
3030 p = xdr_reserve_space(xdr, 4);
3031 if (!p)
3032 goto out_resource;
3033 *p++ = cpu_to_be32(0);
3034 }
3035 if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
3036 p = xdr_reserve_space(xdr, 4);
3037 if (!p)
3038 goto out_resource;
3039 *p++ = cpu_to_be32(nn->nfsd4_lease);
3040 }
3041 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
3042 p = xdr_reserve_space(xdr, 4);
3043 if (!p)
3044 goto out_resource;
3045 *p++ = cpu_to_be32(rdattr_err);
3046 }
3047 if (bmval0 & FATTR4_WORD0_ACL) {
3048 struct nfs4_ace *ace;
3049
3050 if (acl == NULL) {
3051 p = xdr_reserve_space(xdr, 4);
3052 if (!p)
3053 goto out_resource;
3054
3055 *p++ = cpu_to_be32(0);
3056 goto out_acl;
3057 }
3058 p = xdr_reserve_space(xdr, 4);
3059 if (!p)
3060 goto out_resource;
3061 *p++ = cpu_to_be32(acl->naces);
3062
3063 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
3064 p = xdr_reserve_space(xdr, 4*3);
3065 if (!p)
3066 goto out_resource;
3067 *p++ = cpu_to_be32(ace->type);
3068 *p++ = cpu_to_be32(ace->flag);
3069 *p++ = cpu_to_be32(ace->access_mask &
3070 NFS4_ACE_MASK_ALL);
3071 status = nfsd4_encode_aclname(xdr, rqstp, ace);
3072 if (status)
3073 goto out;
3074 }
3075 }
3076 out_acl:
3077 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
3078 p = xdr_reserve_space(xdr, 4);
3079 if (!p)
3080 goto out_resource;
3081 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ?
3082 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
3083 }
3084 if (bmval0 & FATTR4_WORD0_CANSETTIME) {
3085 p = xdr_reserve_space(xdr, 4);
3086 if (!p)
3087 goto out_resource;
3088 *p++ = cpu_to_be32(1);
3089 }
3090 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
3091 p = xdr_reserve_space(xdr, 4);
3092 if (!p)
3093 goto out_resource;
3094 *p++ = cpu_to_be32(0);
3095 }
3096 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
3097 p = xdr_reserve_space(xdr, 4);
3098 if (!p)
3099 goto out_resource;
3100 *p++ = cpu_to_be32(1);
3101 }
3102 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
3103 p = xdr_reserve_space(xdr, 4);
3104 if (!p)
3105 goto out_resource;
3106 *p++ = cpu_to_be32(1);
3107 }
3108 if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
3109 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
3110 if (!p)
3111 goto out_resource;
3112 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base,
3113 fhp->fh_handle.fh_size);
3114 }
3115 if (bmval0 & FATTR4_WORD0_FILEID) {
3116 p = xdr_reserve_space(xdr, 8);
3117 if (!p)
3118 goto out_resource;
3119 p = xdr_encode_hyper(p, stat.ino);
3120 }
3121 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
3122 p = xdr_reserve_space(xdr, 8);
3123 if (!p)
3124 goto out_resource;
3125 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3126 }
3127 if (bmval0 & FATTR4_WORD0_FILES_FREE) {
3128 p = xdr_reserve_space(xdr, 8);
3129 if (!p)
3130 goto out_resource;
3131 p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3132 }
3133 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
3134 p = xdr_reserve_space(xdr, 8);
3135 if (!p)
3136 goto out_resource;
3137 p = xdr_encode_hyper(p, (u64) statfs.f_files);
3138 }
3139 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
3140 status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
3141 if (status)
3142 goto out;
3143 }
3144 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
3145 p = xdr_reserve_space(xdr, 4);
3146 if (!p)
3147 goto out_resource;
3148 *p++ = cpu_to_be32(1);
3149 }
3150 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
3151 p = xdr_reserve_space(xdr, 8);
3152 if (!p)
3153 goto out_resource;
3154 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
3155 }
3156 if (bmval0 & FATTR4_WORD0_MAXLINK) {
3157 p = xdr_reserve_space(xdr, 4);
3158 if (!p)
3159 goto out_resource;
3160 *p++ = cpu_to_be32(255);
3161 }
3162 if (bmval0 & FATTR4_WORD0_MAXNAME) {
3163 p = xdr_reserve_space(xdr, 4);
3164 if (!p)
3165 goto out_resource;
3166 *p++ = cpu_to_be32(statfs.f_namelen);
3167 }
3168 if (bmval0 & FATTR4_WORD0_MAXREAD) {
3169 p = xdr_reserve_space(xdr, 8);
3170 if (!p)
3171 goto out_resource;
3172 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3173 }
3174 if (bmval0 & FATTR4_WORD0_MAXWRITE) {
3175 p = xdr_reserve_space(xdr, 8);
3176 if (!p)
3177 goto out_resource;
3178 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3179 }
3180 if (bmval1 & FATTR4_WORD1_MODE) {
3181 p = xdr_reserve_space(xdr, 4);
3182 if (!p)
3183 goto out_resource;
3184 *p++ = cpu_to_be32(stat.mode & S_IALLUGO);
3185 }
3186 if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
3187 p = xdr_reserve_space(xdr, 4);
3188 if (!p)
3189 goto out_resource;
3190 *p++ = cpu_to_be32(1);
3191 }
3192 if (bmval1 & FATTR4_WORD1_NUMLINKS) {
3193 p = xdr_reserve_space(xdr, 4);
3194 if (!p)
3195 goto out_resource;
3196 *p++ = cpu_to_be32(stat.nlink);
3197 }
3198 if (bmval1 & FATTR4_WORD1_OWNER) {
3199 status = nfsd4_encode_user(xdr, rqstp, stat.uid);
3200 if (status)
3201 goto out;
3202 }
3203 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
3204 status = nfsd4_encode_group(xdr, rqstp, stat.gid);
3205 if (status)
3206 goto out;
3207 }
3208 if (bmval1 & FATTR4_WORD1_RAWDEV) {
3209 p = xdr_reserve_space(xdr, 8);
3210 if (!p)
3211 goto out_resource;
3212 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
3213 *p++ = cpu_to_be32((u32) MINOR(stat.rdev));
3214 }
3215 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
3216 p = xdr_reserve_space(xdr, 8);
3217 if (!p)
3218 goto out_resource;
3219 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
3220 p = xdr_encode_hyper(p, dummy64);
3221 }
3222 if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
3223 p = xdr_reserve_space(xdr, 8);
3224 if (!p)
3225 goto out_resource;
3226 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
3227 p = xdr_encode_hyper(p, dummy64);
3228 }
3229 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
3230 p = xdr_reserve_space(xdr, 8);
3231 if (!p)
3232 goto out_resource;
3233 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
3234 p = xdr_encode_hyper(p, dummy64);
3235 }
3236 if (bmval1 & FATTR4_WORD1_SPACE_USED) {
3237 p = xdr_reserve_space(xdr, 8);
3238 if (!p)
3239 goto out_resource;
3240 dummy64 = (u64)stat.blocks << 9;
3241 p = xdr_encode_hyper(p, dummy64);
3242 }
3243 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
3244 p = xdr_reserve_space(xdr, 12);
3245 if (!p)
3246 goto out_resource;
3247 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
3248 *p++ = cpu_to_be32(stat.atime.tv_nsec);
3249 }
3250 if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
3251 p = xdr_reserve_space(xdr, 12);
3252 if (!p)
3253 goto out_resource;
3254 p = encode_time_delta(p, d_inode(dentry));
3255 }
3256 if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
3257 p = xdr_reserve_space(xdr, 12);
3258 if (!p)
3259 goto out_resource;
3260 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
3261 *p++ = cpu_to_be32(stat.ctime.tv_nsec);
3262 }
3263 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
3264 p = xdr_reserve_space(xdr, 12);
3265 if (!p)
3266 goto out_resource;
3267 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
3268 *p++ = cpu_to_be32(stat.mtime.tv_nsec);
3269 }
3270 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
3271 struct kstat parent_stat;
3272 u64 ino = stat.ino;
3273
3274 p = xdr_reserve_space(xdr, 8);
3275 if (!p)
3276 goto out_resource;
3277 /*
3278 * Get parent's attributes if not ignoring crossmount
3279 * and this is the root of a cross-mounted filesystem.
3280 */
3281 if (ignore_crossmnt == 0 &&
3282 dentry == exp->ex_path.mnt->mnt_root) {
3283 err = get_parent_attributes(exp, &parent_stat);
3284 if (err)
3285 goto out_nfserr;
3286 ino = parent_stat.ino;
3287 }
3288 p = xdr_encode_hyper(p, ino);
3289 }
3290 #ifdef CONFIG_NFSD_PNFS
3291 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) {
3292 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3293 if (status)
3294 goto out;
3295 }
3296
3297 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) {
3298 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3299 if (status)
3300 goto out;
3301 }
3302
3303 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) {
3304 p = xdr_reserve_space(xdr, 4);
3305 if (!p)
3306 goto out_resource;
3307 *p++ = cpu_to_be32(stat.blksize);
3308 }
3309 #endif /* CONFIG_NFSD_PNFS */
3310 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
3311 u32 supp[3];
3312
3313 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3314 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0;
3315 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1;
3316 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2;
3317
3318 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]);
3319 if (status)
3320 goto out;
3321 }
3322
3323 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3324 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3325 status = nfsd4_encode_security_label(xdr, rqstp, &context);
3326 if (status)
3327 goto out;
3328 }
3329 #endif
3330
3331 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) {
3332 p = xdr_reserve_space(xdr, 4);
3333 if (!p)
3334 goto out_resource;
3335 err = xattr_supported_namespace(d_inode(dentry),
3336 XATTR_USER_PREFIX);
3337 *p++ = cpu_to_be32(err == 0);
3338 }
3339
3340 attrlen = htonl(xdr->buf->len - attrlen_offset - 4);
3341 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4);
3342 status = nfs_ok;
3343
3344 out:
3345 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3346 if (context.context)
3347 security_release_secctx(&context);
3348 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3349 kfree(acl);
3350 if (tempfh) {
3351 fh_put(tempfh);
3352 kfree(tempfh);
3353 }
3354 if (status)
3355 xdr_truncate_encode(xdr, starting_len);
3356 return status;
3357 out_nfserr:
3358 status = nfserrno(err);
3359 goto out;
3360 out_resource:
3361 status = nfserr_resource;
3362 goto out;
3363 }
3364
3365 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
3366 struct xdr_buf *buf, __be32 *p, int bytes)
3367 {
3368 xdr->scratch.iov_len = 0;
3369 memset(buf, 0, sizeof(struct xdr_buf));
3370 buf->head[0].iov_base = p;
3371 buf->head[0].iov_len = 0;
3372 buf->len = 0;
3373 xdr->buf = buf;
3374 xdr->iov = buf->head;
3375 xdr->p = p;
3376 xdr->end = (void *)p + bytes;
3377 buf->buflen = bytes;
3378 }
3379
3380 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
3381 struct svc_fh *fhp, struct svc_export *exp,
3382 struct dentry *dentry, u32 *bmval,
3383 struct svc_rqst *rqstp, int ignore_crossmnt)
3384 {
3385 struct xdr_buf dummy;
3386 struct xdr_stream xdr;
3387 __be32 ret;
3388
3389 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
3390 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
3391 ignore_crossmnt);
3392 *p = xdr.p;
3393 return ret;
3394 }
3395
3396 static inline int attributes_need_mount(u32 *bmval)
3397 {
3398 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
3399 return 1;
3400 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
3401 return 1;
3402 return 0;
3403 }
3404
3405 static __be32
3406 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
3407 const char *name, int namlen)
3408 {
3409 struct svc_export *exp = cd->rd_fhp->fh_export;
3410 struct dentry *dentry;
3411 __be32 nfserr;
3412 int ignore_crossmnt = 0;
3413
3414 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen);
3415 if (IS_ERR(dentry))
3416 return nfserrno(PTR_ERR(dentry));
3417
3418 exp_get(exp);
3419 /*
3420 * In the case of a mountpoint, the client may be asking for
3421 * attributes that are only properties of the underlying filesystem
3422 * as opposed to the cross-mounted file system. In such a case,
3423 * we will not follow the cross mount and will fill the attribtutes
3424 * directly from the mountpoint dentry.
3425 */
3426 if (nfsd_mountpoint(dentry, exp)) {
3427 int err;
3428
3429 if (!(exp->ex_flags & NFSEXP_V4ROOT)
3430 && !attributes_need_mount(cd->rd_bmval)) {
3431 ignore_crossmnt = 1;
3432 goto out_encode;
3433 }
3434 /*
3435 * Why the heck aren't we just using nfsd_lookup??
3436 * Different "."/".." handling? Something else?
3437 * At least, add a comment here to explain....
3438 */
3439 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
3440 if (err) {
3441 nfserr = nfserrno(err);
3442 goto out_put;
3443 }
3444 nfserr = check_nfsd_access(exp, cd->rd_rqstp);
3445 if (nfserr)
3446 goto out_put;
3447
3448 }
3449 out_encode:
3450 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
3451 cd->rd_rqstp, ignore_crossmnt);
3452 out_put:
3453 dput(dentry);
3454 exp_put(exp);
3455 return nfserr;
3456 }
3457
3458 static __be32 *
3459 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
3460 {
3461 __be32 *p;
3462
3463 p = xdr_reserve_space(xdr, 20);
3464 if (!p)
3465 return NULL;
3466 *p++ = htonl(2);
3467 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
3468 *p++ = htonl(0); /* bmval1 */
3469
3470 *p++ = htonl(4); /* attribute length */
3471 *p++ = nfserr; /* no htonl */
3472 return p;
3473 }
3474
3475 static int
3476 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
3477 loff_t offset, u64 ino, unsigned int d_type)
3478 {
3479 struct readdir_cd *ccd = ccdv;
3480 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
3481 struct xdr_stream *xdr = cd->xdr;
3482 int start_offset = xdr->buf->len;
3483 int cookie_offset;
3484 u32 name_and_cookie;
3485 int entry_bytes;
3486 __be32 nfserr = nfserr_toosmall;
3487 __be64 wire_offset;
3488 __be32 *p;
3489
3490 /* In nfsv4, "." and ".." never make it onto the wire.. */
3491 if (name && isdotent(name, namlen)) {
3492 cd->common.err = nfs_ok;
3493 return 0;
3494 }
3495
3496 if (cd->cookie_offset) {
3497 wire_offset = cpu_to_be64(offset);
3498 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
3499 &wire_offset, 8);
3500 }
3501
3502 p = xdr_reserve_space(xdr, 4);
3503 if (!p)
3504 goto fail;
3505 *p++ = xdr_one; /* mark entry present */
3506 cookie_offset = xdr->buf->len;
3507 p = xdr_reserve_space(xdr, 3*4 + namlen);
3508 if (!p)
3509 goto fail;
3510 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */
3511 p = xdr_encode_array(p, name, namlen); /* name length & name */
3512
3513 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
3514 switch (nfserr) {
3515 case nfs_ok:
3516 break;
3517 case nfserr_resource:
3518 nfserr = nfserr_toosmall;
3519 goto fail;
3520 case nfserr_noent:
3521 xdr_truncate_encode(xdr, start_offset);
3522 goto skip_entry;
3523 default:
3524 /*
3525 * If the client requested the RDATTR_ERROR attribute,
3526 * we stuff the error code into this attribute
3527 * and continue. If this attribute was not requested,
3528 * then in accordance with the spec, we fail the
3529 * entire READDIR operation(!)
3530 */
3531 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
3532 goto fail;
3533 p = nfsd4_encode_rdattr_error(xdr, nfserr);
3534 if (p == NULL) {
3535 nfserr = nfserr_toosmall;
3536 goto fail;
3537 }
3538 }
3539 nfserr = nfserr_toosmall;
3540 entry_bytes = xdr->buf->len - start_offset;
3541 if (entry_bytes > cd->rd_maxcount)
3542 goto fail;
3543 cd->rd_maxcount -= entry_bytes;
3544 /*
3545 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and
3546 * notes that it could be zero. If it is zero, then the server
3547 * should enforce only the rd_maxcount value.
3548 */
3549 if (cd->rd_dircount) {
3550 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
3551 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
3552 goto fail;
3553 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
3554 if (!cd->rd_dircount)
3555 cd->rd_maxcount = 0;
3556 }
3557
3558 cd->cookie_offset = cookie_offset;
3559 skip_entry:
3560 cd->common.err = nfs_ok;
3561 return 0;
3562 fail:
3563 xdr_truncate_encode(xdr, start_offset);
3564 cd->common.err = nfserr;
3565 return -EINVAL;
3566 }
3567
3568 static __be32
3569 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
3570 {
3571 __be32 *p;
3572
3573 p = xdr_reserve_space(xdr, sizeof(stateid_t));
3574 if (!p)
3575 return nfserr_resource;
3576 *p++ = cpu_to_be32(sid->si_generation);
3577 p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
3578 sizeof(stateid_opaque_t));
3579 return 0;
3580 }
3581
3582 static __be32
3583 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
3584 {
3585 struct xdr_stream *xdr = resp->xdr;
3586 __be32 *p;
3587
3588 p = xdr_reserve_space(xdr, 8);
3589 if (!p)
3590 return nfserr_resource;
3591 *p++ = cpu_to_be32(access->ac_supported);
3592 *p++ = cpu_to_be32(access->ac_resp_access);
3593 return 0;
3594 }
3595
3596 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
3597 {
3598 struct xdr_stream *xdr = resp->xdr;
3599 __be32 *p;
3600
3601 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
3602 if (!p)
3603 return nfserr_resource;
3604 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
3605 NFS4_MAX_SESSIONID_LEN);
3606 *p++ = cpu_to_be32(bcts->dir);
3607 /* Upshifting from TCP to RDMA is not supported */
3608 *p++ = cpu_to_be32(0);
3609 return 0;
3610 }
3611
3612 static __be32
3613 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
3614 {
3615 struct xdr_stream *xdr = resp->xdr;
3616
3617 return nfsd4_encode_stateid(xdr, &close->cl_stateid);
3618 }
3619
3620
3621 static __be32
3622 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
3623 {
3624 struct xdr_stream *xdr = resp->xdr;
3625 __be32 *p;
3626
3627 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3628 if (!p)
3629 return nfserr_resource;
3630 p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
3631 NFS4_VERIFIER_SIZE);
3632 return 0;
3633 }
3634
3635 static __be32
3636 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
3637 {
3638 struct xdr_stream *xdr = resp->xdr;
3639 __be32 *p;
3640
3641 p = xdr_reserve_space(xdr, 20);
3642 if (!p)
3643 return nfserr_resource;
3644 encode_cinfo(p, &create->cr_cinfo);
3645 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0],
3646 create->cr_bmval[1], create->cr_bmval[2]);
3647 }
3648
3649 static __be32
3650 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
3651 {
3652 struct svc_fh *fhp = getattr->ga_fhp;
3653 struct xdr_stream *xdr = resp->xdr;
3654
3655 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
3656 getattr->ga_bmval, resp->rqstp, 0);
3657 }
3658
3659 static __be32
3660 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
3661 {
3662 struct xdr_stream *xdr = resp->xdr;
3663 struct svc_fh *fhp = *fhpp;
3664 unsigned int len;
3665 __be32 *p;
3666
3667 len = fhp->fh_handle.fh_size;
3668 p = xdr_reserve_space(xdr, len + 4);
3669 if (!p)
3670 return nfserr_resource;
3671 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len);
3672 return 0;
3673 }
3674
3675 /*
3676 * Including all fields other than the name, a LOCK4denied structure requires
3677 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
3678 */
3679 static __be32
3680 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
3681 {
3682 struct xdr_netobj *conf = &ld->ld_owner;
3683 __be32 *p;
3684
3685 again:
3686 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
3687 if (!p) {
3688 /*
3689 * Don't fail to return the result just because we can't
3690 * return the conflicting open:
3691 */
3692 if (conf->len) {
3693 kfree(conf->data);
3694 conf->len = 0;
3695 conf->data = NULL;
3696 goto again;
3697 }
3698 return nfserr_resource;
3699 }
3700 p = xdr_encode_hyper(p, ld->ld_start);
3701 p = xdr_encode_hyper(p, ld->ld_length);
3702 *p++ = cpu_to_be32(ld->ld_type);
3703 if (conf->len) {
3704 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
3705 p = xdr_encode_opaque(p, conf->data, conf->len);
3706 kfree(conf->data);
3707 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
3708 p = xdr_encode_hyper(p, (u64)0); /* clientid */
3709 *p++ = cpu_to_be32(0); /* length of owner name */
3710 }
3711 return nfserr_denied;
3712 }
3713
3714 static __be32
3715 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
3716 {
3717 struct xdr_stream *xdr = resp->xdr;
3718
3719 if (!nfserr)
3720 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
3721 else if (nfserr == nfserr_denied)
3722 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
3723
3724 return nfserr;
3725 }
3726
3727 static __be32
3728 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
3729 {
3730 struct xdr_stream *xdr = resp->xdr;
3731
3732 if (nfserr == nfserr_denied)
3733 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
3734 return nfserr;
3735 }
3736
3737 static __be32
3738 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
3739 {
3740 struct xdr_stream *xdr = resp->xdr;
3741
3742 return nfsd4_encode_stateid(xdr, &locku->lu_stateid);
3743 }
3744
3745
3746 static __be32
3747 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
3748 {
3749 struct xdr_stream *xdr = resp->xdr;
3750 __be32 *p;
3751
3752 p = xdr_reserve_space(xdr, 20);
3753 if (!p)
3754 return nfserr_resource;
3755 p = encode_cinfo(p, &link->li_cinfo);
3756 return 0;
3757 }
3758
3759
3760 static __be32
3761 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
3762 {
3763 struct xdr_stream *xdr = resp->xdr;
3764 __be32 *p;
3765
3766 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
3767 if (nfserr)
3768 return nfserr;
3769 p = xdr_reserve_space(xdr, 24);
3770 if (!p)
3771 return nfserr_resource;
3772 p = encode_cinfo(p, &open->op_cinfo);
3773 *p++ = cpu_to_be32(open->op_rflags);
3774
3775 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1],
3776 open->op_bmval[2]);
3777 if (nfserr)
3778 return nfserr;
3779
3780 p = xdr_reserve_space(xdr, 4);
3781 if (!p)
3782 return nfserr_resource;
3783
3784 *p++ = cpu_to_be32(open->op_delegate_type);
3785 switch (open->op_delegate_type) {
3786 case NFS4_OPEN_DELEGATE_NONE:
3787 break;
3788 case NFS4_OPEN_DELEGATE_READ:
3789 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3790 if (nfserr)
3791 return nfserr;
3792 p = xdr_reserve_space(xdr, 20);
3793 if (!p)
3794 return nfserr_resource;
3795 *p++ = cpu_to_be32(open->op_recall);
3796
3797 /*
3798 * TODO: ACE's in delegations
3799 */
3800 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3801 *p++ = cpu_to_be32(0);
3802 *p++ = cpu_to_be32(0);
3803 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3804 break;
3805 case NFS4_OPEN_DELEGATE_WRITE:
3806 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3807 if (nfserr)
3808 return nfserr;
3809 p = xdr_reserve_space(xdr, 32);
3810 if (!p)
3811 return nfserr_resource;
3812 *p++ = cpu_to_be32(0);
3813
3814 /*
3815 * TODO: space_limit's in delegations
3816 */
3817 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3818 *p++ = cpu_to_be32(~(u32)0);
3819 *p++ = cpu_to_be32(~(u32)0);
3820
3821 /*
3822 * TODO: ACE's in delegations
3823 */
3824 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3825 *p++ = cpu_to_be32(0);
3826 *p++ = cpu_to_be32(0);
3827 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3828 break;
3829 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3830 switch (open->op_why_no_deleg) {
3831 case WND4_CONTENTION:
3832 case WND4_RESOURCE:
3833 p = xdr_reserve_space(xdr, 8);
3834 if (!p)
3835 return nfserr_resource;
3836 *p++ = cpu_to_be32(open->op_why_no_deleg);
3837 /* deleg signaling not supported yet: */
3838 *p++ = cpu_to_be32(0);
3839 break;
3840 default:
3841 p = xdr_reserve_space(xdr, 4);
3842 if (!p)
3843 return nfserr_resource;
3844 *p++ = cpu_to_be32(open->op_why_no_deleg);
3845 }
3846 break;
3847 default:
3848 BUG();
3849 }
3850 /* XXX save filehandle here */
3851 return 0;
3852 }
3853
3854 static __be32
3855 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
3856 {
3857 struct xdr_stream *xdr = resp->xdr;
3858
3859 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
3860 }
3861
3862 static __be32
3863 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
3864 {
3865 struct xdr_stream *xdr = resp->xdr;
3866
3867 return nfsd4_encode_stateid(xdr, &od->od_stateid);
3868 }
3869
3870 static __be32 nfsd4_encode_splice_read(
3871 struct nfsd4_compoundres *resp,
3872 struct nfsd4_read *read,
3873 struct file *file, unsigned long maxcount)
3874 {
3875 struct xdr_stream *xdr = resp->xdr;
3876 struct xdr_buf *buf = xdr->buf;
3877 int status, space_left;
3878 u32 eof;
3879 __be32 nfserr;
3880 __be32 *p = xdr->p - 2;
3881
3882 /* Make sure there will be room for padding if needed */
3883 if (xdr->end - xdr->p < 1)
3884 return nfserr_resource;
3885
3886 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp,
3887 file, read->rd_offset, &maxcount, &eof);
3888 read->rd_length = maxcount;
3889 if (nfserr)
3890 goto out_err;
3891 status = svc_encode_result_payload(read->rd_rqstp,
3892 buf->head[0].iov_len, maxcount);
3893 if (status) {
3894 nfserr = nfserrno(status);
3895 goto out_err;
3896 }
3897
3898 *(p++) = htonl(eof);
3899 *(p++) = htonl(maxcount);
3900
3901 buf->page_len = maxcount;
3902 buf->len += maxcount;
3903 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1)
3904 / PAGE_SIZE;
3905
3906 /* Use rest of head for padding and remaining ops: */
3907 buf->tail[0].iov_base = xdr->p;
3908 buf->tail[0].iov_len = 0;
3909 xdr->iov = buf->tail;
3910 if (maxcount&3) {
3911 int pad = 4 - (maxcount&3);
3912
3913 *(xdr->p++) = 0;
3914
3915 buf->tail[0].iov_base += maxcount&3;
3916 buf->tail[0].iov_len = pad;
3917 buf->len += pad;
3918 }
3919
3920 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
3921 buf->buflen - buf->len);
3922 buf->buflen = buf->len + space_left;
3923 xdr->end = (__be32 *)((void *)xdr->end + space_left);
3924
3925 return 0;
3926
3927 out_err:
3928 /*
3929 * nfsd_splice_actor may have already messed with the
3930 * page length; reset it so as not to confuse
3931 * xdr_truncate_encode in our caller.
3932 */
3933 buf->page_len = 0;
3934 return nfserr;
3935 }
3936
3937 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
3938 struct nfsd4_read *read,
3939 struct file *file, unsigned long maxcount)
3940 {
3941 struct xdr_stream *xdr = resp->xdr;
3942 u32 eof;
3943 int starting_len = xdr->buf->len - 8;
3944 __be32 nfserr;
3945 __be32 tmp;
3946 int pad;
3947
3948 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount);
3949 if (read->rd_vlen < 0)
3950 return nfserr_resource;
3951
3952 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
3953 resp->rqstp->rq_vec, read->rd_vlen, &maxcount,
3954 &eof);
3955 read->rd_length = maxcount;
3956 if (nfserr)
3957 return nfserr;
3958 if (svc_encode_result_payload(resp->rqstp, starting_len + 8, maxcount))
3959 return nfserr_io;
3960 xdr_truncate_encode(xdr, starting_len + 8 + xdr_align_size(maxcount));
3961
3962 tmp = htonl(eof);
3963 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4);
3964 tmp = htonl(maxcount);
3965 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
3966
3967 tmp = xdr_zero;
3968 pad = (maxcount&3) ? 4 - (maxcount&3) : 0;
3969 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount,
3970 &tmp, pad);
3971 return 0;
3972
3973 }
3974
3975 static __be32
3976 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
3977 struct nfsd4_read *read)
3978 {
3979 unsigned long maxcount;
3980 struct xdr_stream *xdr = resp->xdr;
3981 struct file *file;
3982 int starting_len = xdr->buf->len;
3983 __be32 *p;
3984
3985 if (nfserr)
3986 return nfserr;
3987 file = read->rd_nf->nf_file;
3988
3989 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
3990 if (!p) {
3991 WARN_ON_ONCE(test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags));
3992 return nfserr_resource;
3993 }
3994 if (resp->xdr->buf->page_len &&
3995 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) {
3996 WARN_ON_ONCE(1);
3997 return nfserr_resource;
3998 }
3999 xdr_commit_encode(xdr);
4000
4001 maxcount = svc_max_payload(resp->rqstp);
4002 maxcount = min_t(unsigned long, maxcount,
4003 (xdr->buf->buflen - xdr->buf->len));
4004 maxcount = min_t(unsigned long, maxcount, read->rd_length);
4005
4006 if (file->f_op->splice_read &&
4007 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags))
4008 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4009 else
4010 nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4011
4012 if (nfserr)
4013 xdr_truncate_encode(xdr, starting_len);
4014
4015 return nfserr;
4016 }
4017
4018 static __be32
4019 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
4020 {
4021 int maxcount;
4022 __be32 wire_count;
4023 int zero = 0;
4024 struct xdr_stream *xdr = resp->xdr;
4025 int length_offset = xdr->buf->len;
4026 int status;
4027 __be32 *p;
4028
4029 p = xdr_reserve_space(xdr, 4);
4030 if (!p)
4031 return nfserr_resource;
4032 maxcount = PAGE_SIZE;
4033
4034 p = xdr_reserve_space(xdr, maxcount);
4035 if (!p)
4036 return nfserr_resource;
4037 /*
4038 * XXX: By default, vfs_readlink() will truncate symlinks if they
4039 * would overflow the buffer. Is this kosher in NFSv4? If not, one
4040 * easy fix is: if vfs_readlink() precisely fills the buffer, assume
4041 * that truncation occurred, and return NFS4ERR_RESOURCE.
4042 */
4043 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
4044 (char *)p, &maxcount);
4045 if (nfserr == nfserr_isdir)
4046 nfserr = nfserr_inval;
4047 if (nfserr)
4048 goto out_err;
4049 status = svc_encode_result_payload(readlink->rl_rqstp, length_offset,
4050 maxcount);
4051 if (status) {
4052 nfserr = nfserrno(status);
4053 goto out_err;
4054 }
4055
4056 wire_count = htonl(maxcount);
4057 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4);
4058 xdr_truncate_encode(xdr, length_offset + 4 + ALIGN(maxcount, 4));
4059 if (maxcount & 3)
4060 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount,
4061 &zero, 4 - (maxcount&3));
4062 return 0;
4063
4064 out_err:
4065 xdr_truncate_encode(xdr, length_offset);
4066 return nfserr;
4067 }
4068
4069 static __be32
4070 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
4071 {
4072 int maxcount;
4073 int bytes_left;
4074 loff_t offset;
4075 __be64 wire_offset;
4076 struct xdr_stream *xdr = resp->xdr;
4077 int starting_len = xdr->buf->len;
4078 __be32 *p;
4079
4080 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
4081 if (!p)
4082 return nfserr_resource;
4083
4084 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
4085 *p++ = cpu_to_be32(0);
4086 *p++ = cpu_to_be32(0);
4087 xdr->buf->head[0].iov_len = (char *)xdr->p -
4088 (char *)xdr->buf->head[0].iov_base;
4089
4090 /*
4091 * Number of bytes left for directory entries allowing for the
4092 * final 8 bytes of the readdir and a following failed op:
4093 */
4094 bytes_left = xdr->buf->buflen - xdr->buf->len
4095 - COMPOUND_ERR_SLACK_SPACE - 8;
4096 if (bytes_left < 0) {
4097 nfserr = nfserr_resource;
4098 goto err_no_verf;
4099 }
4100 maxcount = svc_max_payload(resp->rqstp);
4101 maxcount = min_t(u32, readdir->rd_maxcount, maxcount);
4102 /*
4103 * Note the rfc defines rd_maxcount as the size of the
4104 * READDIR4resok structure, which includes the verifier above
4105 * and the 8 bytes encoded at the end of this function:
4106 */
4107 if (maxcount < 16) {
4108 nfserr = nfserr_toosmall;
4109 goto err_no_verf;
4110 }
4111 maxcount = min_t(int, maxcount-16, bytes_left);
4112
4113 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */
4114 if (!readdir->rd_dircount)
4115 readdir->rd_dircount = svc_max_payload(resp->rqstp);
4116
4117 readdir->xdr = xdr;
4118 readdir->rd_maxcount = maxcount;
4119 readdir->common.err = 0;
4120 readdir->cookie_offset = 0;
4121
4122 offset = readdir->rd_cookie;
4123 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
4124 &offset,
4125 &readdir->common, nfsd4_encode_dirent);
4126 if (nfserr == nfs_ok &&
4127 readdir->common.err == nfserr_toosmall &&
4128 xdr->buf->len == starting_len + 8) {
4129 /* nothing encoded; which limit did we hit?: */
4130 if (maxcount - 16 < bytes_left)
4131 /* It was the fault of rd_maxcount: */
4132 nfserr = nfserr_toosmall;
4133 else
4134 /* We ran out of buffer space: */
4135 nfserr = nfserr_resource;
4136 }
4137 if (nfserr)
4138 goto err_no_verf;
4139
4140 if (readdir->cookie_offset) {
4141 wire_offset = cpu_to_be64(offset);
4142 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
4143 &wire_offset, 8);
4144 }
4145
4146 p = xdr_reserve_space(xdr, 8);
4147 if (!p) {
4148 WARN_ON_ONCE(1);
4149 goto err_no_verf;
4150 }
4151 *p++ = 0; /* no more entries */
4152 *p++ = htonl(readdir->common.err == nfserr_eof);
4153
4154 return 0;
4155 err_no_verf:
4156 xdr_truncate_encode(xdr, starting_len);
4157 return nfserr;
4158 }
4159
4160 static __be32
4161 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
4162 {
4163 struct xdr_stream *xdr = resp->xdr;
4164 __be32 *p;
4165
4166 p = xdr_reserve_space(xdr, 20);
4167 if (!p)
4168 return nfserr_resource;
4169 p = encode_cinfo(p, &remove->rm_cinfo);
4170 return 0;
4171 }
4172
4173 static __be32
4174 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
4175 {
4176 struct xdr_stream *xdr = resp->xdr;
4177 __be32 *p;
4178
4179 p = xdr_reserve_space(xdr, 40);
4180 if (!p)
4181 return nfserr_resource;
4182 p = encode_cinfo(p, &rename->rn_sinfo);
4183 p = encode_cinfo(p, &rename->rn_tinfo);
4184 return 0;
4185 }
4186
4187 static __be32
4188 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp)
4189 {
4190 u32 i, nflavs, supported;
4191 struct exp_flavor_info *flavs;
4192 struct exp_flavor_info def_flavs[2];
4193 __be32 *p, *flavorsp;
4194 static bool report = true;
4195
4196 if (exp->ex_nflavors) {
4197 flavs = exp->ex_flavors;
4198 nflavs = exp->ex_nflavors;
4199 } else { /* Handling of some defaults in absence of real secinfo: */
4200 flavs = def_flavs;
4201 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
4202 nflavs = 2;
4203 flavs[0].pseudoflavor = RPC_AUTH_UNIX;
4204 flavs[1].pseudoflavor = RPC_AUTH_NULL;
4205 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
4206 nflavs = 1;
4207 flavs[0].pseudoflavor
4208 = svcauth_gss_flavor(exp->ex_client);
4209 } else {
4210 nflavs = 1;
4211 flavs[0].pseudoflavor
4212 = exp->ex_client->flavour->flavour;
4213 }
4214 }
4215
4216 supported = 0;
4217 p = xdr_reserve_space(xdr, 4);
4218 if (!p)
4219 return nfserr_resource;
4220 flavorsp = p++; /* to be backfilled later */
4221
4222 for (i = 0; i < nflavs; i++) {
4223 rpc_authflavor_t pf = flavs[i].pseudoflavor;
4224 struct rpcsec_gss_info info;
4225
4226 if (rpcauth_get_gssinfo(pf, &info) == 0) {
4227 supported++;
4228 p = xdr_reserve_space(xdr, 4 + 4 +
4229 XDR_LEN(info.oid.len) + 4 + 4);
4230 if (!p)
4231 return nfserr_resource;
4232 *p++ = cpu_to_be32(RPC_AUTH_GSS);
4233 p = xdr_encode_opaque(p, info.oid.data, info.oid.len);
4234 *p++ = cpu_to_be32(info.qop);
4235 *p++ = cpu_to_be32(info.service);
4236 } else if (pf < RPC_AUTH_MAXFLAVOR) {
4237 supported++;
4238 p = xdr_reserve_space(xdr, 4);
4239 if (!p)
4240 return nfserr_resource;
4241 *p++ = cpu_to_be32(pf);
4242 } else {
4243 if (report)
4244 pr_warn("NFS: SECINFO: security flavor %u "
4245 "is not supported\n", pf);
4246 }
4247 }
4248
4249 if (nflavs != supported)
4250 report = false;
4251 *flavorsp = htonl(supported);
4252 return 0;
4253 }
4254
4255 static __be32
4256 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4257 struct nfsd4_secinfo *secinfo)
4258 {
4259 struct xdr_stream *xdr = resp->xdr;
4260
4261 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp);
4262 }
4263
4264 static __be32
4265 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
4266 struct nfsd4_secinfo_no_name *secinfo)
4267 {
4268 struct xdr_stream *xdr = resp->xdr;
4269
4270 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp);
4271 }
4272
4273 /*
4274 * The SETATTR encode routine is special -- it always encodes a bitmap,
4275 * regardless of the error status.
4276 */
4277 static __be32
4278 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
4279 {
4280 struct xdr_stream *xdr = resp->xdr;
4281 __be32 *p;
4282
4283 p = xdr_reserve_space(xdr, 16);
4284 if (!p)
4285 return nfserr_resource;
4286 if (nfserr) {
4287 *p++ = cpu_to_be32(3);
4288 *p++ = cpu_to_be32(0);
4289 *p++ = cpu_to_be32(0);
4290 *p++ = cpu_to_be32(0);
4291 }
4292 else {
4293 *p++ = cpu_to_be32(3);
4294 *p++ = cpu_to_be32(setattr->sa_bmval[0]);
4295 *p++ = cpu_to_be32(setattr->sa_bmval[1]);
4296 *p++ = cpu_to_be32(setattr->sa_bmval[2]);
4297 }
4298 return nfserr;
4299 }
4300
4301 static __be32
4302 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
4303 {
4304 struct xdr_stream *xdr = resp->xdr;
4305 __be32 *p;
4306
4307 if (!nfserr) {
4308 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
4309 if (!p)
4310 return nfserr_resource;
4311 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
4312 p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
4313 NFS4_VERIFIER_SIZE);
4314 }
4315 else if (nfserr == nfserr_clid_inuse) {
4316 p = xdr_reserve_space(xdr, 8);
4317 if (!p)
4318 return nfserr_resource;
4319 *p++ = cpu_to_be32(0);
4320 *p++ = cpu_to_be32(0);
4321 }
4322 return nfserr;
4323 }
4324
4325 static __be32
4326 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
4327 {
4328 struct xdr_stream *xdr = resp->xdr;
4329 __be32 *p;
4330
4331 p = xdr_reserve_space(xdr, 16);
4332 if (!p)
4333 return nfserr_resource;
4334 *p++ = cpu_to_be32(write->wr_bytes_written);
4335 *p++ = cpu_to_be32(write->wr_how_written);
4336 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4337 NFS4_VERIFIER_SIZE);
4338 return 0;
4339 }
4340
4341 static __be32
4342 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
4343 struct nfsd4_exchange_id *exid)
4344 {
4345 struct xdr_stream *xdr = resp->xdr;
4346 __be32 *p;
4347 char *major_id;
4348 char *server_scope;
4349 int major_id_sz;
4350 int server_scope_sz;
4351 uint64_t minor_id = 0;
4352 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id);
4353
4354 major_id = nn->nfsd_name;
4355 major_id_sz = strlen(nn->nfsd_name);
4356 server_scope = nn->nfsd_name;
4357 server_scope_sz = strlen(nn->nfsd_name);
4358
4359 p = xdr_reserve_space(xdr,
4360 8 /* eir_clientid */ +
4361 4 /* eir_sequenceid */ +
4362 4 /* eir_flags */ +
4363 4 /* spr_how */);
4364 if (!p)
4365 return nfserr_resource;
4366
4367 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
4368 *p++ = cpu_to_be32(exid->seqid);
4369 *p++ = cpu_to_be32(exid->flags);
4370
4371 *p++ = cpu_to_be32(exid->spa_how);
4372
4373 switch (exid->spa_how) {
4374 case SP4_NONE:
4375 break;
4376 case SP4_MACH_CRED:
4377 /* spo_must_enforce bitmap: */
4378 nfserr = nfsd4_encode_bitmap(xdr,
4379 exid->spo_must_enforce[0],
4380 exid->spo_must_enforce[1],
4381 exid->spo_must_enforce[2]);
4382 if (nfserr)
4383 return nfserr;
4384 /* spo_must_allow bitmap: */
4385 nfserr = nfsd4_encode_bitmap(xdr,
4386 exid->spo_must_allow[0],
4387 exid->spo_must_allow[1],
4388 exid->spo_must_allow[2]);
4389 if (nfserr)
4390 return nfserr;
4391 break;
4392 default:
4393 WARN_ON_ONCE(1);
4394 }
4395
4396 p = xdr_reserve_space(xdr,
4397 8 /* so_minor_id */ +
4398 4 /* so_major_id.len */ +
4399 (XDR_QUADLEN(major_id_sz) * 4) +
4400 4 /* eir_server_scope.len */ +
4401 (XDR_QUADLEN(server_scope_sz) * 4) +
4402 4 /* eir_server_impl_id.count (0) */);
4403 if (!p)
4404 return nfserr_resource;
4405
4406 /* The server_owner struct */
4407 p = xdr_encode_hyper(p, minor_id); /* Minor id */
4408 /* major id */
4409 p = xdr_encode_opaque(p, major_id, major_id_sz);
4410
4411 /* Server scope */
4412 p = xdr_encode_opaque(p, server_scope, server_scope_sz);
4413
4414 /* Implementation id */
4415 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
4416 return 0;
4417 }
4418
4419 static __be32
4420 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
4421 struct nfsd4_create_session *sess)
4422 {
4423 struct xdr_stream *xdr = resp->xdr;
4424 __be32 *p;
4425
4426 p = xdr_reserve_space(xdr, 24);
4427 if (!p)
4428 return nfserr_resource;
4429 p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
4430 NFS4_MAX_SESSIONID_LEN);
4431 *p++ = cpu_to_be32(sess->seqid);
4432 *p++ = cpu_to_be32(sess->flags);
4433
4434 p = xdr_reserve_space(xdr, 28);
4435 if (!p)
4436 return nfserr_resource;
4437 *p++ = cpu_to_be32(0); /* headerpadsz */
4438 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
4439 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
4440 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
4441 *p++ = cpu_to_be32(sess->fore_channel.maxops);
4442 *p++ = cpu_to_be32(sess->fore_channel.maxreqs);
4443 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
4444
4445 if (sess->fore_channel.nr_rdma_attrs) {
4446 p = xdr_reserve_space(xdr, 4);
4447 if (!p)
4448 return nfserr_resource;
4449 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
4450 }
4451
4452 p = xdr_reserve_space(xdr, 28);
4453 if (!p)
4454 return nfserr_resource;
4455 *p++ = cpu_to_be32(0); /* headerpadsz */
4456 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
4457 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
4458 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
4459 *p++ = cpu_to_be32(sess->back_channel.maxops);
4460 *p++ = cpu_to_be32(sess->back_channel.maxreqs);
4461 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
4462
4463 if (sess->back_channel.nr_rdma_attrs) {
4464 p = xdr_reserve_space(xdr, 4);
4465 if (!p)
4466 return nfserr_resource;
4467 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
4468 }
4469 return 0;
4470 }
4471
4472 static __be32
4473 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
4474 struct nfsd4_sequence *seq)
4475 {
4476 struct xdr_stream *xdr = resp->xdr;
4477 __be32 *p;
4478
4479 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
4480 if (!p)
4481 return nfserr_resource;
4482 p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
4483 NFS4_MAX_SESSIONID_LEN);
4484 *p++ = cpu_to_be32(seq->seqid);
4485 *p++ = cpu_to_be32(seq->slotid);
4486 /* Note slotid's are numbered from zero: */
4487 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
4488 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
4489 *p++ = cpu_to_be32(seq->status_flags);
4490
4491 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
4492 return 0;
4493 }
4494
4495 static __be32
4496 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
4497 struct nfsd4_test_stateid *test_stateid)
4498 {
4499 struct xdr_stream *xdr = resp->xdr;
4500 struct nfsd4_test_stateid_id *stateid, *next;
4501 __be32 *p;
4502
4503 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
4504 if (!p)
4505 return nfserr_resource;
4506 *p++ = htonl(test_stateid->ts_num_ids);
4507
4508 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
4509 *p++ = stateid->ts_id_status;
4510 }
4511
4512 return 0;
4513 }
4514
4515 #ifdef CONFIG_NFSD_PNFS
4516 static __be32
4517 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4518 struct nfsd4_getdeviceinfo *gdev)
4519 {
4520 struct xdr_stream *xdr = resp->xdr;
4521 const struct nfsd4_layout_ops *ops;
4522 u32 starting_len = xdr->buf->len, needed_len;
4523 __be32 *p;
4524
4525 p = xdr_reserve_space(xdr, 4);
4526 if (!p)
4527 return nfserr_resource;
4528
4529 *p++ = cpu_to_be32(gdev->gd_layout_type);
4530
4531 /* If maxcount is 0 then just update notifications */
4532 if (gdev->gd_maxcount != 0) {
4533 ops = nfsd4_layout_ops[gdev->gd_layout_type];
4534 nfserr = ops->encode_getdeviceinfo(xdr, gdev);
4535 if (nfserr) {
4536 /*
4537 * We don't bother to burden the layout drivers with
4538 * enforcing gd_maxcount, just tell the client to
4539 * come back with a bigger buffer if it's not enough.
4540 */
4541 if (xdr->buf->len + 4 > gdev->gd_maxcount)
4542 goto toosmall;
4543 return nfserr;
4544 }
4545 }
4546
4547 if (gdev->gd_notify_types) {
4548 p = xdr_reserve_space(xdr, 4 + 4);
4549 if (!p)
4550 return nfserr_resource;
4551 *p++ = cpu_to_be32(1); /* bitmap length */
4552 *p++ = cpu_to_be32(gdev->gd_notify_types);
4553 } else {
4554 p = xdr_reserve_space(xdr, 4);
4555 if (!p)
4556 return nfserr_resource;
4557 *p++ = 0;
4558 }
4559
4560 return 0;
4561 toosmall:
4562 dprintk("%s: maxcount too small\n", __func__);
4563 needed_len = xdr->buf->len + 4 /* notifications */;
4564 xdr_truncate_encode(xdr, starting_len);
4565 p = xdr_reserve_space(xdr, 4);
4566 if (!p)
4567 return nfserr_resource;
4568 *p++ = cpu_to_be32(needed_len);
4569 return nfserr_toosmall;
4570 }
4571
4572 static __be32
4573 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr,
4574 struct nfsd4_layoutget *lgp)
4575 {
4576 struct xdr_stream *xdr = resp->xdr;
4577 const struct nfsd4_layout_ops *ops;
4578 __be32 *p;
4579
4580 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t));
4581 if (!p)
4582 return nfserr_resource;
4583
4584 *p++ = cpu_to_be32(1); /* we always set return-on-close */
4585 *p++ = cpu_to_be32(lgp->lg_sid.si_generation);
4586 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque,
4587 sizeof(stateid_opaque_t));
4588
4589 *p++ = cpu_to_be32(1); /* we always return a single layout */
4590 p = xdr_encode_hyper(p, lgp->lg_seg.offset);
4591 p = xdr_encode_hyper(p, lgp->lg_seg.length);
4592 *p++ = cpu_to_be32(lgp->lg_seg.iomode);
4593 *p++ = cpu_to_be32(lgp->lg_layout_type);
4594
4595 ops = nfsd4_layout_ops[lgp->lg_layout_type];
4596 return ops->encode_layoutget(xdr, lgp);
4597 }
4598
4599 static __be32
4600 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr,
4601 struct nfsd4_layoutcommit *lcp)
4602 {
4603 struct xdr_stream *xdr = resp->xdr;
4604 __be32 *p;
4605
4606 p = xdr_reserve_space(xdr, 4);
4607 if (!p)
4608 return nfserr_resource;
4609 *p++ = cpu_to_be32(lcp->lc_size_chg);
4610 if (lcp->lc_size_chg) {
4611 p = xdr_reserve_space(xdr, 8);
4612 if (!p)
4613 return nfserr_resource;
4614 p = xdr_encode_hyper(p, lcp->lc_newsize);
4615 }
4616
4617 return 0;
4618 }
4619
4620 static __be32
4621 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr,
4622 struct nfsd4_layoutreturn *lrp)
4623 {
4624 struct xdr_stream *xdr = resp->xdr;
4625 __be32 *p;
4626
4627 p = xdr_reserve_space(xdr, 4);
4628 if (!p)
4629 return nfserr_resource;
4630 *p++ = cpu_to_be32(lrp->lrs_present);
4631 if (lrp->lrs_present)
4632 return nfsd4_encode_stateid(xdr, &lrp->lr_sid);
4633 return 0;
4634 }
4635 #endif /* CONFIG_NFSD_PNFS */
4636
4637 static __be32
4638 nfsd42_encode_write_res(struct nfsd4_compoundres *resp,
4639 struct nfsd42_write_res *write, bool sync)
4640 {
4641 __be32 *p;
4642 p = xdr_reserve_space(resp->xdr, 4);
4643 if (!p)
4644 return nfserr_resource;
4645
4646 if (sync)
4647 *p++ = cpu_to_be32(0);
4648 else {
4649 __be32 nfserr;
4650 *p++ = cpu_to_be32(1);
4651 nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid);
4652 if (nfserr)
4653 return nfserr;
4654 }
4655 p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE);
4656 if (!p)
4657 return nfserr_resource;
4658
4659 p = xdr_encode_hyper(p, write->wr_bytes_written);
4660 *p++ = cpu_to_be32(write->wr_stable_how);
4661 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4662 NFS4_VERIFIER_SIZE);
4663 return nfs_ok;
4664 }
4665
4666 static __be32
4667 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns)
4668 {
4669 struct xdr_stream *xdr = resp->xdr;
4670 struct nfs42_netaddr *addr;
4671 __be32 *p;
4672
4673 p = xdr_reserve_space(xdr, 4);
4674 *p++ = cpu_to_be32(ns->nl4_type);
4675
4676 switch (ns->nl4_type) {
4677 case NL4_NETADDR:
4678 addr = &ns->u.nl4_addr;
4679
4680 /* netid_len, netid, uaddr_len, uaddr (port included
4681 * in RPCBIND_MAXUADDRLEN)
4682 */
4683 p = xdr_reserve_space(xdr,
4684 4 /* netid len */ +
4685 (XDR_QUADLEN(addr->netid_len) * 4) +
4686 4 /* uaddr len */ +
4687 (XDR_QUADLEN(addr->addr_len) * 4));
4688 if (!p)
4689 return nfserr_resource;
4690
4691 *p++ = cpu_to_be32(addr->netid_len);
4692 p = xdr_encode_opaque_fixed(p, addr->netid,
4693 addr->netid_len);
4694 *p++ = cpu_to_be32(addr->addr_len);
4695 p = xdr_encode_opaque_fixed(p, addr->addr,
4696 addr->addr_len);
4697 break;
4698 default:
4699 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR);
4700 return nfserr_inval;
4701 }
4702
4703 return 0;
4704 }
4705
4706 static __be32
4707 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr,
4708 struct nfsd4_copy *copy)
4709 {
4710 __be32 *p;
4711
4712 nfserr = nfsd42_encode_write_res(resp, &copy->cp_res,
4713 !!copy->cp_synchronous);
4714 if (nfserr)
4715 return nfserr;
4716
4717 p = xdr_reserve_space(resp->xdr, 4 + 4);
4718 *p++ = xdr_one; /* cr_consecutive */
4719 *p++ = cpu_to_be32(copy->cp_synchronous);
4720 return 0;
4721 }
4722
4723 static __be32
4724 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr,
4725 struct nfsd4_offload_status *os)
4726 {
4727 struct xdr_stream *xdr = resp->xdr;
4728 __be32 *p;
4729
4730 p = xdr_reserve_space(xdr, 8 + 4);
4731 if (!p)
4732 return nfserr_resource;
4733 p = xdr_encode_hyper(p, os->count);
4734 *p++ = cpu_to_be32(0);
4735 return nfserr;
4736 }
4737
4738 static __be32
4739 nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp,
4740 struct nfsd4_read *read,
4741 unsigned long *maxcount, u32 *eof,
4742 loff_t *pos)
4743 {
4744 struct xdr_stream *xdr = resp->xdr;
4745 struct file *file = read->rd_nf->nf_file;
4746 int starting_len = xdr->buf->len;
4747 loff_t hole_pos;
4748 __be32 nfserr;
4749 __be32 *p, tmp;
4750 __be64 tmp64;
4751
4752 hole_pos = pos ? *pos : vfs_llseek(file, read->rd_offset, SEEK_HOLE);
4753 if (hole_pos > read->rd_offset)
4754 *maxcount = min_t(unsigned long, *maxcount, hole_pos - read->rd_offset);
4755 *maxcount = min_t(unsigned long, *maxcount, (xdr->buf->buflen - xdr->buf->len));
4756
4757 /* Content type, offset, byte count */
4758 p = xdr_reserve_space(xdr, 4 + 8 + 4);
4759 if (!p)
4760 return nfserr_resource;
4761
4762 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, *maxcount);
4763 if (read->rd_vlen < 0)
4764 return nfserr_resource;
4765
4766 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
4767 resp->rqstp->rq_vec, read->rd_vlen, maxcount, eof);
4768 if (nfserr)
4769 return nfserr;
4770 xdr_truncate_encode(xdr, starting_len + 16 + xdr_align_size(*maxcount));
4771
4772 tmp = htonl(NFS4_CONTENT_DATA);
4773 write_bytes_to_xdr_buf(xdr->buf, starting_len, &tmp, 4);
4774 tmp64 = cpu_to_be64(read->rd_offset);
4775 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp64, 8);
4776 tmp = htonl(*maxcount);
4777 write_bytes_to_xdr_buf(xdr->buf, starting_len + 12, &tmp, 4);
4778
4779 tmp = xdr_zero;
4780 write_bytes_to_xdr_buf(xdr->buf, starting_len + 16 + *maxcount, &tmp,
4781 xdr_pad_size(*maxcount));
4782 return nfs_ok;
4783 }
4784
4785 static __be32
4786 nfsd4_encode_read_plus_hole(struct nfsd4_compoundres *resp,
4787 struct nfsd4_read *read,
4788 unsigned long *maxcount, u32 *eof)
4789 {
4790 struct file *file = read->rd_nf->nf_file;
4791 loff_t data_pos = vfs_llseek(file, read->rd_offset, SEEK_DATA);
4792 loff_t f_size = i_size_read(file_inode(file));
4793 unsigned long count;
4794 __be32 *p;
4795
4796 if (data_pos == -ENXIO)
4797 data_pos = f_size;
4798 else if (data_pos <= read->rd_offset || (data_pos < f_size && data_pos % PAGE_SIZE))
4799 return nfsd4_encode_read_plus_data(resp, read, maxcount, eof, &f_size);
4800 count = data_pos - read->rd_offset;
4801
4802 /* Content type, offset, byte count */
4803 p = xdr_reserve_space(resp->xdr, 4 + 8 + 8);
4804 if (!p)
4805 return nfserr_resource;
4806
4807 *p++ = htonl(NFS4_CONTENT_HOLE);
4808 p = xdr_encode_hyper(p, read->rd_offset);
4809 p = xdr_encode_hyper(p, count);
4810
4811 *eof = (read->rd_offset + count) >= f_size;
4812 *maxcount = min_t(unsigned long, count, *maxcount);
4813 return nfs_ok;
4814 }
4815
4816 static __be32
4817 nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr,
4818 struct nfsd4_read *read)
4819 {
4820 unsigned long maxcount, count;
4821 struct xdr_stream *xdr = resp->xdr;
4822 struct file *file;
4823 int starting_len = xdr->buf->len;
4824 int last_segment = xdr->buf->len;
4825 int segments = 0;
4826 __be32 *p, tmp;
4827 bool is_data;
4828 loff_t pos;
4829 u32 eof;
4830
4831 if (nfserr)
4832 return nfserr;
4833 file = read->rd_nf->nf_file;
4834
4835 /* eof flag, segment count */
4836 p = xdr_reserve_space(xdr, 4 + 4);
4837 if (!p)
4838 return nfserr_resource;
4839 xdr_commit_encode(xdr);
4840
4841 maxcount = svc_max_payload(resp->rqstp);
4842 maxcount = min_t(unsigned long, maxcount,
4843 (xdr->buf->buflen - xdr->buf->len));
4844 maxcount = min_t(unsigned long, maxcount, read->rd_length);
4845 count = maxcount;
4846
4847 eof = read->rd_offset >= i_size_read(file_inode(file));
4848 if (eof)
4849 goto out;
4850
4851 pos = vfs_llseek(file, read->rd_offset, SEEK_HOLE);
4852 is_data = pos > read->rd_offset;
4853
4854 while (count > 0 && !eof) {
4855 maxcount = count;
4856 if (is_data)
4857 nfserr = nfsd4_encode_read_plus_data(resp, read, &maxcount, &eof,
4858 segments == 0 ? &pos : NULL);
4859 else
4860 nfserr = nfsd4_encode_read_plus_hole(resp, read, &maxcount, &eof);
4861 if (nfserr)
4862 goto out;
4863 count -= maxcount;
4864 read->rd_offset += maxcount;
4865 is_data = !is_data;
4866 last_segment = xdr->buf->len;
4867 segments++;
4868 }
4869
4870 out:
4871 if (nfserr && segments == 0)
4872 xdr_truncate_encode(xdr, starting_len);
4873 else {
4874 if (nfserr) {
4875 xdr_truncate_encode(xdr, last_segment);
4876 nfserr = nfs_ok;
4877 eof = 0;
4878 }
4879 tmp = htonl(eof);
4880 write_bytes_to_xdr_buf(xdr->buf, starting_len, &tmp, 4);
4881 tmp = htonl(segments);
4882 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
4883 }
4884
4885 return nfserr;
4886 }
4887
4888 static __be32
4889 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr,
4890 struct nfsd4_copy_notify *cn)
4891 {
4892 struct xdr_stream *xdr = resp->xdr;
4893 __be32 *p;
4894
4895 if (nfserr)
4896 return nfserr;
4897
4898 /* 8 sec, 4 nsec */
4899 p = xdr_reserve_space(xdr, 12);
4900 if (!p)
4901 return nfserr_resource;
4902
4903 /* cnr_lease_time */
4904 p = xdr_encode_hyper(p, cn->cpn_sec);
4905 *p++ = cpu_to_be32(cn->cpn_nsec);
4906
4907 /* cnr_stateid */
4908 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid);
4909 if (nfserr)
4910 return nfserr;
4911
4912 /* cnr_src.nl_nsvr */
4913 p = xdr_reserve_space(xdr, 4);
4914 if (!p)
4915 return nfserr_resource;
4916
4917 *p++ = cpu_to_be32(1);
4918
4919 return nfsd42_encode_nl4_server(resp, &cn->cpn_src);
4920 }
4921
4922 static __be32
4923 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr,
4924 struct nfsd4_seek *seek)
4925 {
4926 __be32 *p;
4927
4928 p = xdr_reserve_space(resp->xdr, 4 + 8);
4929 *p++ = cpu_to_be32(seek->seek_eof);
4930 p = xdr_encode_hyper(p, seek->seek_pos);
4931
4932 return 0;
4933 }
4934
4935 static __be32
4936 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
4937 {
4938 return nfserr;
4939 }
4940
4941 /*
4942 * Encode kmalloc-ed buffer in to XDR stream.
4943 */
4944 static __be32
4945 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen)
4946 {
4947 u32 cplen;
4948 __be32 *p;
4949
4950 cplen = min_t(unsigned long, buflen,
4951 ((void *)xdr->end - (void *)xdr->p));
4952 p = xdr_reserve_space(xdr, cplen);
4953 if (!p)
4954 return nfserr_resource;
4955
4956 memcpy(p, buf, cplen);
4957 buf += cplen;
4958 buflen -= cplen;
4959
4960 while (buflen) {
4961 cplen = min_t(u32, buflen, PAGE_SIZE);
4962 p = xdr_reserve_space(xdr, cplen);
4963 if (!p)
4964 return nfserr_resource;
4965
4966 memcpy(p, buf, cplen);
4967
4968 if (cplen < PAGE_SIZE) {
4969 /*
4970 * We're done, with a length that wasn't page
4971 * aligned, so possibly not word aligned. Pad
4972 * any trailing bytes with 0.
4973 */
4974 xdr_encode_opaque_fixed(p, NULL, cplen);
4975 break;
4976 }
4977
4978 buflen -= PAGE_SIZE;
4979 buf += PAGE_SIZE;
4980 }
4981
4982 return 0;
4983 }
4984
4985 static __be32
4986 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
4987 struct nfsd4_getxattr *getxattr)
4988 {
4989 struct xdr_stream *xdr = resp->xdr;
4990 __be32 *p, err;
4991
4992 p = xdr_reserve_space(xdr, 4);
4993 if (!p)
4994 return nfserr_resource;
4995
4996 *p = cpu_to_be32(getxattr->getxa_len);
4997
4998 if (getxattr->getxa_len == 0)
4999 return 0;
5000
5001 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf,
5002 getxattr->getxa_len);
5003
5004 kvfree(getxattr->getxa_buf);
5005
5006 return err;
5007 }
5008
5009 static __be32
5010 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5011 struct nfsd4_setxattr *setxattr)
5012 {
5013 struct xdr_stream *xdr = resp->xdr;
5014 __be32 *p;
5015
5016 p = xdr_reserve_space(xdr, 20);
5017 if (!p)
5018 return nfserr_resource;
5019
5020 encode_cinfo(p, &setxattr->setxa_cinfo);
5021
5022 return 0;
5023 }
5024
5025 /*
5026 * See if there are cookie values that can be rejected outright.
5027 */
5028 static __be32
5029 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs,
5030 u32 *offsetp)
5031 {
5032 u64 cookie = listxattrs->lsxa_cookie;
5033
5034 /*
5035 * If the cookie is larger than the maximum number we can fit
5036 * in either the buffer we just got back from vfs_listxattr, or,
5037 * XDR-encoded, in the return buffer, it's invalid.
5038 */
5039 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2))
5040 return nfserr_badcookie;
5041
5042 if (cookie > (listxattrs->lsxa_maxcount /
5043 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4)))
5044 return nfserr_badcookie;
5045
5046 *offsetp = (u32)cookie;
5047 return 0;
5048 }
5049
5050 static __be32
5051 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr,
5052 struct nfsd4_listxattrs *listxattrs)
5053 {
5054 struct xdr_stream *xdr = resp->xdr;
5055 u32 cookie_offset, count_offset, eof;
5056 u32 left, xdrleft, slen, count;
5057 u32 xdrlen, offset;
5058 u64 cookie;
5059 char *sp;
5060 __be32 status, tmp;
5061 __be32 *p;
5062 u32 nuser;
5063
5064 eof = 1;
5065
5066 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset);
5067 if (status)
5068 goto out;
5069
5070 /*
5071 * Reserve space for the cookie and the name array count. Record
5072 * the offsets to save them later.
5073 */
5074 cookie_offset = xdr->buf->len;
5075 count_offset = cookie_offset + 8;
5076 p = xdr_reserve_space(xdr, 12);
5077 if (!p) {
5078 status = nfserr_resource;
5079 goto out;
5080 }
5081
5082 count = 0;
5083 left = listxattrs->lsxa_len;
5084 sp = listxattrs->lsxa_buf;
5085 nuser = 0;
5086
5087 xdrleft = listxattrs->lsxa_maxcount;
5088
5089 while (left > 0 && xdrleft > 0) {
5090 slen = strlen(sp);
5091
5092 /*
5093 * Check if this is a "user." attribute, skip it if not.
5094 */
5095 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN))
5096 goto contloop;
5097
5098 slen -= XATTR_USER_PREFIX_LEN;
5099 xdrlen = 4 + ((slen + 3) & ~3);
5100 if (xdrlen > xdrleft) {
5101 if (count == 0) {
5102 /*
5103 * Can't even fit the first attribute name.
5104 */
5105 status = nfserr_toosmall;
5106 goto out;
5107 }
5108 eof = 0;
5109 goto wreof;
5110 }
5111
5112 left -= XATTR_USER_PREFIX_LEN;
5113 sp += XATTR_USER_PREFIX_LEN;
5114 if (nuser++ < offset)
5115 goto contloop;
5116
5117
5118 p = xdr_reserve_space(xdr, xdrlen);
5119 if (!p) {
5120 status = nfserr_resource;
5121 goto out;
5122 }
5123
5124 xdr_encode_opaque(p, sp, slen);
5125
5126 xdrleft -= xdrlen;
5127 count++;
5128 contloop:
5129 sp += slen + 1;
5130 left -= slen + 1;
5131 }
5132
5133 /*
5134 * If there were user attributes to copy, but we didn't copy
5135 * any, the offset was too large (e.g. the cookie was invalid).
5136 */
5137 if (nuser > 0 && count == 0) {
5138 status = nfserr_badcookie;
5139 goto out;
5140 }
5141
5142 wreof:
5143 p = xdr_reserve_space(xdr, 4);
5144 if (!p) {
5145 status = nfserr_resource;
5146 goto out;
5147 }
5148 *p = cpu_to_be32(eof);
5149
5150 cookie = offset + count;
5151
5152 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8);
5153 tmp = cpu_to_be32(count);
5154 write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4);
5155 out:
5156 if (listxattrs->lsxa_len)
5157 kvfree(listxattrs->lsxa_buf);
5158 return status;
5159 }
5160
5161 static __be32
5162 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5163 struct nfsd4_removexattr *removexattr)
5164 {
5165 struct xdr_stream *xdr = resp->xdr;
5166 __be32 *p;
5167
5168 p = xdr_reserve_space(xdr, 20);
5169 if (!p)
5170 return nfserr_resource;
5171
5172 p = encode_cinfo(p, &removexattr->rmxa_cinfo);
5173 return 0;
5174 }
5175
5176 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
5177
5178 /*
5179 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
5180 * since we don't need to filter out obsolete ops as this is
5181 * done in the decoding phase.
5182 */
5183 static const nfsd4_enc nfsd4_enc_ops[] = {
5184 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access,
5185 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close,
5186 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit,
5187 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create,
5188 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop,
5189 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop,
5190 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr,
5191 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh,
5192 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link,
5193 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock,
5194 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt,
5195 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku,
5196 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop,
5197 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop,
5198 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop,
5199 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open,
5200 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop,
5201 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm,
5202 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade,
5203 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop,
5204 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop,
5205 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop,
5206 [OP_READ] = (nfsd4_enc)nfsd4_encode_read,
5207 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir,
5208 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink,
5209 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove,
5210 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename,
5211 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop,
5212 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop,
5213 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop,
5214 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo,
5215 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr,
5216 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid,
5217 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
5218 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop,
5219 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write,
5220 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop,
5221
5222 /* NFSv4.1 operations */
5223 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop,
5224 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
5225 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id,
5226 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session,
5227 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop,
5228 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop,
5229 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
5230 #ifdef CONFIG_NFSD_PNFS
5231 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_getdeviceinfo,
5232 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
5233 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_layoutcommit,
5234 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_layoutget,
5235 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_layoutreturn,
5236 #else
5237 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop,
5238 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop,
5239 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop,
5240 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop,
5241 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop,
5242 #endif
5243 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name,
5244 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence,
5245 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop,
5246 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid,
5247 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop,
5248 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop,
5249 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop,
5250
5251 /* NFSv4.2 operations */
5252 [OP_ALLOCATE] = (nfsd4_enc)nfsd4_encode_noop,
5253 [OP_COPY] = (nfsd4_enc)nfsd4_encode_copy,
5254 [OP_COPY_NOTIFY] = (nfsd4_enc)nfsd4_encode_copy_notify,
5255 [OP_DEALLOCATE] = (nfsd4_enc)nfsd4_encode_noop,
5256 [OP_IO_ADVISE] = (nfsd4_enc)nfsd4_encode_noop,
5257 [OP_LAYOUTERROR] = (nfsd4_enc)nfsd4_encode_noop,
5258 [OP_LAYOUTSTATS] = (nfsd4_enc)nfsd4_encode_noop,
5259 [OP_OFFLOAD_CANCEL] = (nfsd4_enc)nfsd4_encode_noop,
5260 [OP_OFFLOAD_STATUS] = (nfsd4_enc)nfsd4_encode_offload_status,
5261 [OP_READ_PLUS] = (nfsd4_enc)nfsd4_encode_read_plus,
5262 [OP_SEEK] = (nfsd4_enc)nfsd4_encode_seek,
5263 [OP_WRITE_SAME] = (nfsd4_enc)nfsd4_encode_noop,
5264 [OP_CLONE] = (nfsd4_enc)nfsd4_encode_noop,
5265
5266 /* RFC 8276 extended atributes operations */
5267 [OP_GETXATTR] = (nfsd4_enc)nfsd4_encode_getxattr,
5268 [OP_SETXATTR] = (nfsd4_enc)nfsd4_encode_setxattr,
5269 [OP_LISTXATTRS] = (nfsd4_enc)nfsd4_encode_listxattrs,
5270 [OP_REMOVEXATTR] = (nfsd4_enc)nfsd4_encode_removexattr,
5271 };
5272
5273 /*
5274 * Calculate whether we still have space to encode repsize bytes.
5275 * There are two considerations:
5276 * - For NFS versions >=4.1, the size of the reply must stay within
5277 * session limits
5278 * - For all NFS versions, we must stay within limited preallocated
5279 * buffer space.
5280 *
5281 * This is called before the operation is processed, so can only provide
5282 * an upper estimate. For some nonidempotent operations (such as
5283 * getattr), it's not necessarily a problem if that estimate is wrong,
5284 * as we can fail it after processing without significant side effects.
5285 */
5286 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
5287 {
5288 struct xdr_buf *buf = &resp->rqstp->rq_res;
5289 struct nfsd4_slot *slot = resp->cstate.slot;
5290
5291 if (buf->len + respsize <= buf->buflen)
5292 return nfs_ok;
5293 if (!nfsd4_has_session(&resp->cstate))
5294 return nfserr_resource;
5295 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
5296 WARN_ON_ONCE(1);
5297 return nfserr_rep_too_big_to_cache;
5298 }
5299 return nfserr_rep_too_big;
5300 }
5301
5302 void
5303 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
5304 {
5305 struct xdr_stream *xdr = resp->xdr;
5306 struct nfs4_stateowner *so = resp->cstate.replay_owner;
5307 struct svc_rqst *rqstp = resp->rqstp;
5308 const struct nfsd4_operation *opdesc = op->opdesc;
5309 int post_err_offset;
5310 nfsd4_enc encoder;
5311 __be32 *p;
5312
5313 p = xdr_reserve_space(xdr, 8);
5314 if (!p) {
5315 WARN_ON_ONCE(1);
5316 return;
5317 }
5318 *p++ = cpu_to_be32(op->opnum);
5319 post_err_offset = xdr->buf->len;
5320
5321 if (op->opnum == OP_ILLEGAL)
5322 goto status;
5323 if (op->status && opdesc &&
5324 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE))
5325 goto status;
5326 BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
5327 !nfsd4_enc_ops[op->opnum]);
5328 encoder = nfsd4_enc_ops[op->opnum];
5329 op->status = encoder(resp, op->status, &op->u);
5330 if (op->status)
5331 trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status);
5332 if (opdesc && opdesc->op_release)
5333 opdesc->op_release(&op->u);
5334 xdr_commit_encode(xdr);
5335
5336 /* nfsd4_check_resp_size guarantees enough room for error status */
5337 if (!op->status) {
5338 int space_needed = 0;
5339 if (!nfsd4_last_compound_op(rqstp))
5340 space_needed = COMPOUND_ERR_SLACK_SPACE;
5341 op->status = nfsd4_check_resp_size(resp, space_needed);
5342 }
5343 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
5344 struct nfsd4_slot *slot = resp->cstate.slot;
5345
5346 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
5347 op->status = nfserr_rep_too_big_to_cache;
5348 else
5349 op->status = nfserr_rep_too_big;
5350 }
5351 if (op->status == nfserr_resource ||
5352 op->status == nfserr_rep_too_big ||
5353 op->status == nfserr_rep_too_big_to_cache) {
5354 /*
5355 * The operation may have already been encoded or
5356 * partially encoded. No op returns anything additional
5357 * in the case of one of these three errors, so we can
5358 * just truncate back to after the status. But it's a
5359 * bug if we had to do this on a non-idempotent op:
5360 */
5361 warn_on_nonidempotent_op(op);
5362 xdr_truncate_encode(xdr, post_err_offset);
5363 }
5364 if (so) {
5365 int len = xdr->buf->len - post_err_offset;
5366
5367 so->so_replay.rp_status = op->status;
5368 so->so_replay.rp_buflen = len;
5369 read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
5370 so->so_replay.rp_buf, len);
5371 }
5372 status:
5373 /* Note that op->status is already in network byte order: */
5374 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4);
5375 }
5376
5377 /*
5378 * Encode the reply stored in the stateowner reply cache
5379 *
5380 * XDR note: do not encode rp->rp_buflen: the buffer contains the
5381 * previously sent already encoded operation.
5382 */
5383 void
5384 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
5385 {
5386 __be32 *p;
5387 struct nfs4_replay *rp = op->replay;
5388
5389 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
5390 if (!p) {
5391 WARN_ON_ONCE(1);
5392 return;
5393 }
5394 *p++ = cpu_to_be32(op->opnum);
5395 *p++ = rp->rp_status; /* already xdr'ed */
5396
5397 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
5398 }
5399
5400 void nfsd4_release_compoundargs(struct svc_rqst *rqstp)
5401 {
5402 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5403
5404 if (args->ops != args->iops) {
5405 kfree(args->ops);
5406 args->ops = args->iops;
5407 }
5408 while (args->to_free) {
5409 struct svcxdr_tmpbuf *tb = args->to_free;
5410 args->to_free = tb->next;
5411 kfree(tb);
5412 }
5413 }
5414
5415 int
5416 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p)
5417 {
5418 struct nfsd4_compoundargs *args = rqstp->rq_argp;
5419
5420 /* svcxdr_tmp_alloc */
5421 args->to_free = NULL;
5422
5423 args->xdr = &rqstp->rq_arg_stream;
5424 args->ops = args->iops;
5425 args->rqstp = rqstp;
5426
5427 return nfsd4_decode_compound(args);
5428 }
5429
5430 int
5431 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p)
5432 {
5433 struct nfsd4_compoundres *resp = rqstp->rq_resp;
5434 struct xdr_buf *buf = resp->xdr->buf;
5435
5436 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len +
5437 buf->tail[0].iov_len);
5438
5439 *p = resp->cstate.status;
5440
5441 rqstp->rq_next_page = resp->xdr->page_ptr + 1;
5442
5443 p = resp->tagp;
5444 *p++ = htonl(resp->taglen);
5445 memcpy(p, resp->tag, resp->taglen);
5446 p += XDR_QUADLEN(resp->taglen);
5447 *p++ = htonl(resp->opcnt);
5448
5449 nfsd4_sequence_done(resp);
5450 return 1;
5451 }