2 * Server-side XDR for NFSv4
4 * Copyright (c) 2002 The Regents of the University of Michigan.
7 * Kendrick Smith <kmsmith@umich.edu>
8 * Andy Adamson <andros@umich.edu>
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the University nor the names of its
20 * contributors may be used to endorse or promote products derived
21 * from this software without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
35 * TODO: Neil Brown made the following observation: We currently
36 * initially reserve NFSD_BUFSIZE space on the transmit queue and
37 * never release any of that until the request is complete.
38 * It would be good to calculate a new maximum response size while
39 * decoding the COMPOUND, and call svc_reserve with this number
40 * at the end of nfs4svc_decode_compoundargs.
43 #include <linux/slab.h>
44 #include <linux/namei.h>
45 #include <linux/statfs.h>
46 #include <linux/utsname.h>
47 #include <linux/pagemap.h>
48 #include <linux/sunrpc/svcauth_gss.h>
58 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
59 #include <linux/security.h>
63 #define NFSDDBG_FACILITY NFSDDBG_XDR
66 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
67 * directory in order to indicate to the client that a filesystem boundary is present
68 * We use a fixed fsid for a referral
70 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL
71 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL
74 check_filename(char *str
, int len
)
80 if (isdotent(str
, len
))
81 return nfserr_badname
;
82 for (i
= 0; i
< len
; i
++)
84 return nfserr_badname
;
96 dprintk("NFSD: xdr error (%s:%d)\n", \
97 __FILE__, __LINE__); \
98 status = nfserr_bad_xdr; \
101 #define READMEM(x,nbytes) do { \
103 p += XDR_QUADLEN(nbytes); \
105 #define SAVEMEM(x,nbytes) do { \
106 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \
107 savemem(argp, p, nbytes) : \
109 dprintk("NFSD: xdr error (%s:%d)\n", \
110 __FILE__, __LINE__); \
113 p += XDR_QUADLEN(nbytes); \
115 #define COPYMEM(x,nbytes) do { \
116 memcpy((x), p, nbytes); \
117 p += XDR_QUADLEN(nbytes); \
120 /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */
121 #define READ_BUF(nbytes) do { \
122 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \
124 argp->p += XDR_QUADLEN(nbytes); \
125 } else if (!(p = read_buf(argp, nbytes))) { \
126 dprintk("NFSD: xdr error (%s:%d)\n", \
127 __FILE__, __LINE__); \
132 static void next_decode_page(struct nfsd4_compoundargs
*argp
)
134 argp
->p
= page_address(argp
->pagelist
[0]);
136 if (argp
->pagelen
< PAGE_SIZE
) {
137 argp
->end
= argp
->p
+ (argp
->pagelen
>>2);
140 argp
->end
= argp
->p
+ (PAGE_SIZE
>>2);
141 argp
->pagelen
-= PAGE_SIZE
;
145 static __be32
*read_buf(struct nfsd4_compoundargs
*argp
, u32 nbytes
)
147 /* We want more bytes than seem to be available.
148 * Maybe we need a new page, maybe we have just run out
150 unsigned int avail
= (char *)argp
->end
- (char *)argp
->p
;
152 if (avail
+ argp
->pagelen
< nbytes
)
154 if (avail
+ PAGE_SIZE
< nbytes
) /* need more than a page !! */
156 /* ok, we can do it with the current plus the next page */
157 if (nbytes
<= sizeof(argp
->tmp
))
161 p
= argp
->tmpp
= kmalloc(nbytes
, GFP_KERNEL
);
167 * The following memcpy is safe because read_buf is always
168 * called with nbytes > avail, and the two cases above both
169 * guarantee p points to at least nbytes bytes.
171 memcpy(p
, argp
->p
, avail
);
172 next_decode_page(argp
);
173 memcpy(((char*)p
)+avail
, argp
->p
, (nbytes
- avail
));
174 argp
->p
+= XDR_QUADLEN(nbytes
- avail
);
178 static int zero_clientid(clientid_t
*clid
)
180 return (clid
->cl_boot
== 0) && (clid
->cl_id
== 0);
184 * defer_free - mark an allocation as deferred freed
185 * @argp: NFSv4 compound argument structure to be freed with
186 * @release: release callback to free @p, typically kfree()
187 * @p: pointer to be freed
189 * Marks @p to be freed when processing the compound operation
190 * described in @argp finishes.
193 defer_free(struct nfsd4_compoundargs
*argp
,
194 void (*release
)(const void *), void *p
)
198 tb
= kmalloc(sizeof(*tb
), GFP_KERNEL
);
202 tb
->release
= release
;
203 tb
->next
= argp
->to_free
;
209 * savemem - duplicate a chunk of memory for later processing
210 * @argp: NFSv4 compound argument structure to be freed with
211 * @p: pointer to be duplicated
212 * @nbytes: length to be duplicated
214 * Returns a pointer to a copy of @nbytes bytes of memory at @p
215 * that are preserved until processing of the NFSv4 compound
216 * operation described by @argp finishes.
218 static char *savemem(struct nfsd4_compoundargs
*argp
, __be32
*p
, int nbytes
)
220 if (p
== argp
->tmp
) {
221 p
= kmemdup(argp
->tmp
, nbytes
, GFP_KERNEL
);
225 BUG_ON(p
!= argp
->tmpp
);
228 if (defer_free(argp
, kfree
, p
)) {
236 nfsd4_decode_bitmap(struct nfsd4_compoundargs
*argp
, u32
*bmval
)
246 bmlen
= be32_to_cpup(p
++);
250 READ_BUF(bmlen
<< 2);
252 bmval
[0] = be32_to_cpup(p
++);
254 bmval
[1] = be32_to_cpup(p
++);
256 bmval
[2] = be32_to_cpup(p
++);
262 nfsd4_decode_fattr(struct nfsd4_compoundargs
*argp
, u32
*bmval
,
263 struct iattr
*iattr
, struct nfs4_acl
**acl
,
264 struct xdr_netobj
*label
)
266 int expected_len
, len
= 0;
273 if ((status
= nfsd4_decode_bitmap(argp
, bmval
)))
277 expected_len
= be32_to_cpup(p
++);
279 if (bmval
[0] & FATTR4_WORD0_SIZE
) {
282 p
= xdr_decode_hyper(p
, &iattr
->ia_size
);
283 iattr
->ia_valid
|= ATTR_SIZE
;
285 if (bmval
[0] & FATTR4_WORD0_ACL
) {
287 struct nfs4_ace
*ace
;
289 READ_BUF(4); len
+= 4;
290 nace
= be32_to_cpup(p
++);
292 if (nace
> NFS4_ACL_MAX
)
295 *acl
= nfs4_acl_new(nace
);
297 return nfserr_jukebox
;
299 defer_free(argp
, kfree
, *acl
);
301 (*acl
)->naces
= nace
;
302 for (ace
= (*acl
)->aces
; ace
< (*acl
)->aces
+ nace
; ace
++) {
303 READ_BUF(16); len
+= 16;
304 ace
->type
= be32_to_cpup(p
++);
305 ace
->flag
= be32_to_cpup(p
++);
306 ace
->access_mask
= be32_to_cpup(p
++);
307 dummy32
= be32_to_cpup(p
++);
309 len
+= XDR_QUADLEN(dummy32
) << 2;
310 READMEM(buf
, dummy32
);
311 ace
->whotype
= nfs4_acl_get_whotype(buf
, dummy32
);
313 if (ace
->whotype
!= NFS4_ACL_WHO_NAMED
)
315 else if (ace
->flag
& NFS4_ACE_IDENTIFIER_GROUP
)
316 status
= nfsd_map_name_to_gid(argp
->rqstp
,
317 buf
, dummy32
, &ace
->who_gid
);
319 status
= nfsd_map_name_to_uid(argp
->rqstp
,
320 buf
, dummy32
, &ace
->who_uid
);
326 if (bmval
[1] & FATTR4_WORD1_MODE
) {
329 iattr
->ia_mode
= be32_to_cpup(p
++);
330 iattr
->ia_mode
&= (S_IFMT
| S_IALLUGO
);
331 iattr
->ia_valid
|= ATTR_MODE
;
333 if (bmval
[1] & FATTR4_WORD1_OWNER
) {
336 dummy32
= be32_to_cpup(p
++);
338 len
+= (XDR_QUADLEN(dummy32
) << 2);
339 READMEM(buf
, dummy32
);
340 if ((status
= nfsd_map_name_to_uid(argp
->rqstp
, buf
, dummy32
, &iattr
->ia_uid
)))
342 iattr
->ia_valid
|= ATTR_UID
;
344 if (bmval
[1] & FATTR4_WORD1_OWNER_GROUP
) {
347 dummy32
= be32_to_cpup(p
++);
349 len
+= (XDR_QUADLEN(dummy32
) << 2);
350 READMEM(buf
, dummy32
);
351 if ((status
= nfsd_map_name_to_gid(argp
->rqstp
, buf
, dummy32
, &iattr
->ia_gid
)))
353 iattr
->ia_valid
|= ATTR_GID
;
355 if (bmval
[1] & FATTR4_WORD1_TIME_ACCESS_SET
) {
358 dummy32
= be32_to_cpup(p
++);
360 case NFS4_SET_TO_CLIENT_TIME
:
361 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
362 all 32 bits of 'nseconds'. */
365 p
= xdr_decode_hyper(p
, &sec
);
366 iattr
->ia_atime
.tv_sec
= (time_t)sec
;
367 iattr
->ia_atime
.tv_nsec
= be32_to_cpup(p
++);
368 if (iattr
->ia_atime
.tv_nsec
>= (u32
)1000000000)
370 iattr
->ia_valid
|= (ATTR_ATIME
| ATTR_ATIME_SET
);
372 case NFS4_SET_TO_SERVER_TIME
:
373 iattr
->ia_valid
|= ATTR_ATIME
;
379 if (bmval
[1] & FATTR4_WORD1_TIME_MODIFY_SET
) {
382 dummy32
= be32_to_cpup(p
++);
384 case NFS4_SET_TO_CLIENT_TIME
:
385 /* We require the high 32 bits of 'seconds' to be 0, and we ignore
386 all 32 bits of 'nseconds'. */
389 p
= xdr_decode_hyper(p
, &sec
);
390 iattr
->ia_mtime
.tv_sec
= sec
;
391 iattr
->ia_mtime
.tv_nsec
= be32_to_cpup(p
++);
392 if (iattr
->ia_mtime
.tv_nsec
>= (u32
)1000000000)
394 iattr
->ia_valid
|= (ATTR_MTIME
| ATTR_MTIME_SET
);
396 case NFS4_SET_TO_SERVER_TIME
:
397 iattr
->ia_valid
|= ATTR_MTIME
;
405 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
406 if (bmval
[2] & FATTR4_WORD2_SECURITY_LABEL
) {
409 dummy32
= be32_to_cpup(p
++); /* lfs: we don't use it */
412 dummy32
= be32_to_cpup(p
++); /* pi: we don't use it either */
415 dummy32
= be32_to_cpup(p
++);
417 if (dummy32
> NFSD4_MAX_SEC_LABEL_LEN
)
418 return nfserr_badlabel
;
419 len
+= (XDR_QUADLEN(dummy32
) << 2);
420 READMEM(buf
, dummy32
);
421 label
->data
= kzalloc(dummy32
+ 1, GFP_KERNEL
);
423 return nfserr_jukebox
;
424 label
->len
= dummy32
;
425 defer_free(argp
, kfree
, label
->data
);
426 memcpy(label
->data
, buf
, dummy32
);
430 if (bmval
[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
431 || bmval
[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
432 || bmval
[2] & ~NFSD_WRITEABLE_ATTRS_WORD2
)
433 READ_BUF(expected_len
- len
);
434 else if (len
!= expected_len
)
441 nfsd4_decode_stateid(struct nfsd4_compoundargs
*argp
, stateid_t
*sid
)
445 READ_BUF(sizeof(stateid_t
));
446 sid
->si_generation
= be32_to_cpup(p
++);
447 COPYMEM(&sid
->si_opaque
, sizeof(stateid_opaque_t
));
453 nfsd4_decode_access(struct nfsd4_compoundargs
*argp
, struct nfsd4_access
*access
)
458 access
->ac_req_access
= be32_to_cpup(p
++);
463 static __be32
nfsd4_decode_cb_sec(struct nfsd4_compoundargs
*argp
, struct nfsd4_cb_sec
*cbs
)
471 /* callback_sec_params4 */
473 nr_secflavs
= be32_to_cpup(p
++);
475 cbs
->flavor
= (u32
)(-1);
477 /* Is this legal? Be generous, take it to mean AUTH_NONE: */
479 for (i
= 0; i
< nr_secflavs
; ++i
) {
481 dummy
= be32_to_cpup(p
++);
484 /* Nothing to read */
485 if (cbs
->flavor
== (u32
)(-1))
486 cbs
->flavor
= RPC_AUTH_NULL
;
491 dummy
= be32_to_cpup(p
++);
494 dummy
= be32_to_cpup(p
++);
496 SAVEMEM(machine_name
, dummy
);
500 uid
= be32_to_cpup(p
++);
501 gid
= be32_to_cpup(p
++);
505 dummy
= be32_to_cpup(p
++);
507 if (cbs
->flavor
== (u32
)(-1)) {
508 kuid_t kuid
= make_kuid(&init_user_ns
, uid
);
509 kgid_t kgid
= make_kgid(&init_user_ns
, gid
);
510 if (uid_valid(kuid
) && gid_valid(kgid
)) {
513 cbs
->flavor
= RPC_AUTH_UNIX
;
515 dprintk("RPC_AUTH_UNIX with invalid"
516 "uid or gid ignoring!\n");
521 dprintk("RPC_AUTH_GSS callback secflavor "
525 dummy
= be32_to_cpup(p
++);
526 /* gcbp_handle_from_server */
527 dummy
= be32_to_cpup(p
++);
529 p
+= XDR_QUADLEN(dummy
);
530 /* gcbp_handle_from_client */
532 dummy
= be32_to_cpup(p
++);
536 dprintk("Illegal callback secflavor\n");
543 static __be32
nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs
*argp
, struct nfsd4_backchannel_ctl
*bc
)
548 bc
->bc_cb_program
= be32_to_cpup(p
++);
549 nfsd4_decode_cb_sec(argp
, &bc
->bc_cb_sec
);
554 static __be32
nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs
*argp
, struct nfsd4_bind_conn_to_session
*bcts
)
558 READ_BUF(NFS4_MAX_SESSIONID_LEN
+ 8);
559 COPYMEM(bcts
->sessionid
.data
, NFS4_MAX_SESSIONID_LEN
);
560 bcts
->dir
= be32_to_cpup(p
++);
561 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker
562 * could help us figure out we should be using it. */
567 nfsd4_decode_close(struct nfsd4_compoundargs
*argp
, struct nfsd4_close
*close
)
572 close
->cl_seqid
= be32_to_cpup(p
++);
573 return nfsd4_decode_stateid(argp
, &close
->cl_stateid
);
580 nfsd4_decode_commit(struct nfsd4_compoundargs
*argp
, struct nfsd4_commit
*commit
)
585 p
= xdr_decode_hyper(p
, &commit
->co_offset
);
586 commit
->co_count
= be32_to_cpup(p
++);
592 nfsd4_decode_create(struct nfsd4_compoundargs
*argp
, struct nfsd4_create
*create
)
597 create
->cr_type
= be32_to_cpup(p
++);
598 switch (create
->cr_type
) {
601 create
->cr_linklen
= be32_to_cpup(p
++);
602 READ_BUF(create
->cr_linklen
);
604 * The VFS will want a null-terminated string, and
605 * null-terminating in place isn't safe since this might
606 * end on a page boundary:
608 create
->cr_linkname
=
609 kmalloc(create
->cr_linklen
+ 1, GFP_KERNEL
);
610 if (!create
->cr_linkname
)
611 return nfserr_jukebox
;
612 memcpy(create
->cr_linkname
, p
, create
->cr_linklen
);
613 create
->cr_linkname
[create
->cr_linklen
] = '\0';
614 defer_free(argp
, kfree
, create
->cr_linkname
);
619 create
->cr_specdata1
= be32_to_cpup(p
++);
620 create
->cr_specdata2
= be32_to_cpup(p
++);
630 create
->cr_namelen
= be32_to_cpup(p
++);
631 READ_BUF(create
->cr_namelen
);
632 SAVEMEM(create
->cr_name
, create
->cr_namelen
);
633 if ((status
= check_filename(create
->cr_name
, create
->cr_namelen
)))
636 status
= nfsd4_decode_fattr(argp
, create
->cr_bmval
, &create
->cr_iattr
,
637 &create
->cr_acl
, &create
->cr_label
);
645 nfsd4_decode_delegreturn(struct nfsd4_compoundargs
*argp
, struct nfsd4_delegreturn
*dr
)
647 return nfsd4_decode_stateid(argp
, &dr
->dr_stateid
);
651 nfsd4_decode_getattr(struct nfsd4_compoundargs
*argp
, struct nfsd4_getattr
*getattr
)
653 return nfsd4_decode_bitmap(argp
, getattr
->ga_bmval
);
657 nfsd4_decode_link(struct nfsd4_compoundargs
*argp
, struct nfsd4_link
*link
)
662 link
->li_namelen
= be32_to_cpup(p
++);
663 READ_BUF(link
->li_namelen
);
664 SAVEMEM(link
->li_name
, link
->li_namelen
);
665 if ((status
= check_filename(link
->li_name
, link
->li_namelen
)))
672 nfsd4_decode_lock(struct nfsd4_compoundargs
*argp
, struct nfsd4_lock
*lock
)
677 * type, reclaim(boolean), offset, length, new_lock_owner(boolean)
680 lock
->lk_type
= be32_to_cpup(p
++);
681 if ((lock
->lk_type
< NFS4_READ_LT
) || (lock
->lk_type
> NFS4_WRITEW_LT
))
683 lock
->lk_reclaim
= be32_to_cpup(p
++);
684 p
= xdr_decode_hyper(p
, &lock
->lk_offset
);
685 p
= xdr_decode_hyper(p
, &lock
->lk_length
);
686 lock
->lk_is_new
= be32_to_cpup(p
++);
688 if (lock
->lk_is_new
) {
690 lock
->lk_new_open_seqid
= be32_to_cpup(p
++);
691 status
= nfsd4_decode_stateid(argp
, &lock
->lk_new_open_stateid
);
694 READ_BUF(8 + sizeof(clientid_t
));
695 lock
->lk_new_lock_seqid
= be32_to_cpup(p
++);
696 COPYMEM(&lock
->lk_new_clientid
, sizeof(clientid_t
));
697 lock
->lk_new_owner
.len
= be32_to_cpup(p
++);
698 READ_BUF(lock
->lk_new_owner
.len
);
699 READMEM(lock
->lk_new_owner
.data
, lock
->lk_new_owner
.len
);
701 status
= nfsd4_decode_stateid(argp
, &lock
->lk_old_lock_stateid
);
705 lock
->lk_old_lock_seqid
= be32_to_cpup(p
++);
712 nfsd4_decode_lockt(struct nfsd4_compoundargs
*argp
, struct nfsd4_lockt
*lockt
)
717 lockt
->lt_type
= be32_to_cpup(p
++);
718 if((lockt
->lt_type
< NFS4_READ_LT
) || (lockt
->lt_type
> NFS4_WRITEW_LT
))
720 p
= xdr_decode_hyper(p
, &lockt
->lt_offset
);
721 p
= xdr_decode_hyper(p
, &lockt
->lt_length
);
722 COPYMEM(&lockt
->lt_clientid
, 8);
723 lockt
->lt_owner
.len
= be32_to_cpup(p
++);
724 READ_BUF(lockt
->lt_owner
.len
);
725 READMEM(lockt
->lt_owner
.data
, lockt
->lt_owner
.len
);
731 nfsd4_decode_locku(struct nfsd4_compoundargs
*argp
, struct nfsd4_locku
*locku
)
736 locku
->lu_type
= be32_to_cpup(p
++);
737 if ((locku
->lu_type
< NFS4_READ_LT
) || (locku
->lu_type
> NFS4_WRITEW_LT
))
739 locku
->lu_seqid
= be32_to_cpup(p
++);
740 status
= nfsd4_decode_stateid(argp
, &locku
->lu_stateid
);
744 p
= xdr_decode_hyper(p
, &locku
->lu_offset
);
745 p
= xdr_decode_hyper(p
, &locku
->lu_length
);
751 nfsd4_decode_lookup(struct nfsd4_compoundargs
*argp
, struct nfsd4_lookup
*lookup
)
756 lookup
->lo_len
= be32_to_cpup(p
++);
757 READ_BUF(lookup
->lo_len
);
758 SAVEMEM(lookup
->lo_name
, lookup
->lo_len
);
759 if ((status
= check_filename(lookup
->lo_name
, lookup
->lo_len
)))
765 static __be32
nfsd4_decode_share_access(struct nfsd4_compoundargs
*argp
, u32
*share_access
, u32
*deleg_want
, u32
*deleg_when
)
771 w
= be32_to_cpup(p
++);
772 *share_access
= w
& NFS4_SHARE_ACCESS_MASK
;
773 *deleg_want
= w
& NFS4_SHARE_WANT_MASK
;
775 *deleg_when
= w
& NFS4_SHARE_WHEN_MASK
;
777 switch (w
& NFS4_SHARE_ACCESS_MASK
) {
778 case NFS4_SHARE_ACCESS_READ
:
779 case NFS4_SHARE_ACCESS_WRITE
:
780 case NFS4_SHARE_ACCESS_BOTH
:
783 return nfserr_bad_xdr
;
785 w
&= ~NFS4_SHARE_ACCESS_MASK
;
788 if (!argp
->minorversion
)
789 return nfserr_bad_xdr
;
790 switch (w
& NFS4_SHARE_WANT_MASK
) {
791 case NFS4_SHARE_WANT_NO_PREFERENCE
:
792 case NFS4_SHARE_WANT_READ_DELEG
:
793 case NFS4_SHARE_WANT_WRITE_DELEG
:
794 case NFS4_SHARE_WANT_ANY_DELEG
:
795 case NFS4_SHARE_WANT_NO_DELEG
:
796 case NFS4_SHARE_WANT_CANCEL
:
799 return nfserr_bad_xdr
;
801 w
&= ~NFS4_SHARE_WANT_MASK
;
805 if (!deleg_when
) /* open_downgrade */
808 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL
:
809 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED
:
810 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL
|
811 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED
):
815 return nfserr_bad_xdr
;
818 static __be32
nfsd4_decode_share_deny(struct nfsd4_compoundargs
*argp
, u32
*x
)
823 *x
= be32_to_cpup(p
++);
824 /* Note: unlinke access bits, deny bits may be zero. */
825 if (*x
& ~NFS4_SHARE_DENY_BOTH
)
826 return nfserr_bad_xdr
;
829 return nfserr_bad_xdr
;
832 static __be32
nfsd4_decode_opaque(struct nfsd4_compoundargs
*argp
, struct xdr_netobj
*o
)
837 o
->len
= be32_to_cpup(p
++);
839 if (o
->len
== 0 || o
->len
> NFS4_OPAQUE_LIMIT
)
840 return nfserr_bad_xdr
;
843 SAVEMEM(o
->data
, o
->len
);
846 return nfserr_bad_xdr
;
850 nfsd4_decode_open(struct nfsd4_compoundargs
*argp
, struct nfsd4_open
*open
)
855 memset(open
->op_bmval
, 0, sizeof(open
->op_bmval
));
856 open
->op_iattr
.ia_valid
= 0;
857 open
->op_openowner
= NULL
;
859 open
->op_xdr_error
= 0;
860 /* seqid, share_access, share_deny, clientid, ownerlen */
862 open
->op_seqid
= be32_to_cpup(p
++);
863 /* decode, yet ignore deleg_when until supported */
864 status
= nfsd4_decode_share_access(argp
, &open
->op_share_access
,
865 &open
->op_deleg_want
, &dummy
);
868 status
= nfsd4_decode_share_deny(argp
, &open
->op_share_deny
);
871 READ_BUF(sizeof(clientid_t
));
872 COPYMEM(&open
->op_clientid
, sizeof(clientid_t
));
873 status
= nfsd4_decode_opaque(argp
, &open
->op_owner
);
877 open
->op_create
= be32_to_cpup(p
++);
878 switch (open
->op_create
) {
879 case NFS4_OPEN_NOCREATE
:
881 case NFS4_OPEN_CREATE
:
883 open
->op_createmode
= be32_to_cpup(p
++);
884 switch (open
->op_createmode
) {
885 case NFS4_CREATE_UNCHECKED
:
886 case NFS4_CREATE_GUARDED
:
887 status
= nfsd4_decode_fattr(argp
, open
->op_bmval
,
888 &open
->op_iattr
, &open
->op_acl
, &open
->op_label
);
892 case NFS4_CREATE_EXCLUSIVE
:
893 READ_BUF(NFS4_VERIFIER_SIZE
);
894 COPYMEM(open
->op_verf
.data
, NFS4_VERIFIER_SIZE
);
896 case NFS4_CREATE_EXCLUSIVE4_1
:
897 if (argp
->minorversion
< 1)
899 READ_BUF(NFS4_VERIFIER_SIZE
);
900 COPYMEM(open
->op_verf
.data
, NFS4_VERIFIER_SIZE
);
901 status
= nfsd4_decode_fattr(argp
, open
->op_bmval
,
902 &open
->op_iattr
, &open
->op_acl
, &open
->op_label
);
916 open
->op_claim_type
= be32_to_cpup(p
++);
917 switch (open
->op_claim_type
) {
918 case NFS4_OPEN_CLAIM_NULL
:
919 case NFS4_OPEN_CLAIM_DELEGATE_PREV
:
921 open
->op_fname
.len
= be32_to_cpup(p
++);
922 READ_BUF(open
->op_fname
.len
);
923 SAVEMEM(open
->op_fname
.data
, open
->op_fname
.len
);
924 if ((status
= check_filename(open
->op_fname
.data
, open
->op_fname
.len
)))
927 case NFS4_OPEN_CLAIM_PREVIOUS
:
929 open
->op_delegate_type
= be32_to_cpup(p
++);
931 case NFS4_OPEN_CLAIM_DELEGATE_CUR
:
932 status
= nfsd4_decode_stateid(argp
, &open
->op_delegate_stateid
);
936 open
->op_fname
.len
= be32_to_cpup(p
++);
937 READ_BUF(open
->op_fname
.len
);
938 SAVEMEM(open
->op_fname
.data
, open
->op_fname
.len
);
939 if ((status
= check_filename(open
->op_fname
.data
, open
->op_fname
.len
)))
942 case NFS4_OPEN_CLAIM_FH
:
943 case NFS4_OPEN_CLAIM_DELEG_PREV_FH
:
944 if (argp
->minorversion
< 1)
948 case NFS4_OPEN_CLAIM_DELEG_CUR_FH
:
949 if (argp
->minorversion
< 1)
951 status
= nfsd4_decode_stateid(argp
, &open
->op_delegate_stateid
);
963 nfsd4_decode_open_confirm(struct nfsd4_compoundargs
*argp
, struct nfsd4_open_confirm
*open_conf
)
967 if (argp
->minorversion
>= 1)
968 return nfserr_notsupp
;
970 status
= nfsd4_decode_stateid(argp
, &open_conf
->oc_req_stateid
);
974 open_conf
->oc_seqid
= be32_to_cpup(p
++);
980 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs
*argp
, struct nfsd4_open_downgrade
*open_down
)
984 status
= nfsd4_decode_stateid(argp
, &open_down
->od_stateid
);
988 open_down
->od_seqid
= be32_to_cpup(p
++);
989 status
= nfsd4_decode_share_access(argp
, &open_down
->od_share_access
,
990 &open_down
->od_deleg_want
, NULL
);
993 status
= nfsd4_decode_share_deny(argp
, &open_down
->od_share_deny
);
1000 nfsd4_decode_putfh(struct nfsd4_compoundargs
*argp
, struct nfsd4_putfh
*putfh
)
1005 putfh
->pf_fhlen
= be32_to_cpup(p
++);
1006 if (putfh
->pf_fhlen
> NFS4_FHSIZE
)
1008 READ_BUF(putfh
->pf_fhlen
);
1009 SAVEMEM(putfh
->pf_fhval
, putfh
->pf_fhlen
);
1015 nfsd4_decode_putpubfh(struct nfsd4_compoundargs
*argp
, void *p
)
1017 if (argp
->minorversion
== 0)
1019 return nfserr_notsupp
;
1023 nfsd4_decode_read(struct nfsd4_compoundargs
*argp
, struct nfsd4_read
*read
)
1027 status
= nfsd4_decode_stateid(argp
, &read
->rd_stateid
);
1031 p
= xdr_decode_hyper(p
, &read
->rd_offset
);
1032 read
->rd_length
= be32_to_cpup(p
++);
1038 nfsd4_decode_readdir(struct nfsd4_compoundargs
*argp
, struct nfsd4_readdir
*readdir
)
1043 p
= xdr_decode_hyper(p
, &readdir
->rd_cookie
);
1044 COPYMEM(readdir
->rd_verf
.data
, sizeof(readdir
->rd_verf
.data
));
1045 readdir
->rd_dircount
= be32_to_cpup(p
++);
1046 readdir
->rd_maxcount
= be32_to_cpup(p
++);
1047 if ((status
= nfsd4_decode_bitmap(argp
, readdir
->rd_bmval
)))
1054 nfsd4_decode_remove(struct nfsd4_compoundargs
*argp
, struct nfsd4_remove
*remove
)
1059 remove
->rm_namelen
= be32_to_cpup(p
++);
1060 READ_BUF(remove
->rm_namelen
);
1061 SAVEMEM(remove
->rm_name
, remove
->rm_namelen
);
1062 if ((status
= check_filename(remove
->rm_name
, remove
->rm_namelen
)))
1069 nfsd4_decode_rename(struct nfsd4_compoundargs
*argp
, struct nfsd4_rename
*rename
)
1074 rename
->rn_snamelen
= be32_to_cpup(p
++);
1075 READ_BUF(rename
->rn_snamelen
+ 4);
1076 SAVEMEM(rename
->rn_sname
, rename
->rn_snamelen
);
1077 rename
->rn_tnamelen
= be32_to_cpup(p
++);
1078 READ_BUF(rename
->rn_tnamelen
);
1079 SAVEMEM(rename
->rn_tname
, rename
->rn_tnamelen
);
1080 if ((status
= check_filename(rename
->rn_sname
, rename
->rn_snamelen
)))
1082 if ((status
= check_filename(rename
->rn_tname
, rename
->rn_tnamelen
)))
1089 nfsd4_decode_renew(struct nfsd4_compoundargs
*argp
, clientid_t
*clientid
)
1093 if (argp
->minorversion
>= 1)
1094 return nfserr_notsupp
;
1096 READ_BUF(sizeof(clientid_t
));
1097 COPYMEM(clientid
, sizeof(clientid_t
));
1103 nfsd4_decode_secinfo(struct nfsd4_compoundargs
*argp
,
1104 struct nfsd4_secinfo
*secinfo
)
1109 secinfo
->si_namelen
= be32_to_cpup(p
++);
1110 READ_BUF(secinfo
->si_namelen
);
1111 SAVEMEM(secinfo
->si_name
, secinfo
->si_namelen
);
1112 status
= check_filename(secinfo
->si_name
, secinfo
->si_namelen
);
1119 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs
*argp
,
1120 struct nfsd4_secinfo_no_name
*sin
)
1125 sin
->sin_style
= be32_to_cpup(p
++);
1130 nfsd4_decode_setattr(struct nfsd4_compoundargs
*argp
, struct nfsd4_setattr
*setattr
)
1134 status
= nfsd4_decode_stateid(argp
, &setattr
->sa_stateid
);
1137 return nfsd4_decode_fattr(argp
, setattr
->sa_bmval
, &setattr
->sa_iattr
,
1138 &setattr
->sa_acl
, &setattr
->sa_label
);
1142 nfsd4_decode_setclientid(struct nfsd4_compoundargs
*argp
, struct nfsd4_setclientid
*setclientid
)
1146 if (argp
->minorversion
>= 1)
1147 return nfserr_notsupp
;
1149 READ_BUF(NFS4_VERIFIER_SIZE
);
1150 COPYMEM(setclientid
->se_verf
.data
, NFS4_VERIFIER_SIZE
);
1152 status
= nfsd4_decode_opaque(argp
, &setclientid
->se_name
);
1154 return nfserr_bad_xdr
;
1156 setclientid
->se_callback_prog
= be32_to_cpup(p
++);
1157 setclientid
->se_callback_netid_len
= be32_to_cpup(p
++);
1159 READ_BUF(setclientid
->se_callback_netid_len
+ 4);
1160 SAVEMEM(setclientid
->se_callback_netid_val
, setclientid
->se_callback_netid_len
);
1161 setclientid
->se_callback_addr_len
= be32_to_cpup(p
++);
1163 READ_BUF(setclientid
->se_callback_addr_len
+ 4);
1164 SAVEMEM(setclientid
->se_callback_addr_val
, setclientid
->se_callback_addr_len
);
1165 setclientid
->se_callback_ident
= be32_to_cpup(p
++);
1171 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs
*argp
, struct nfsd4_setclientid_confirm
*scd_c
)
1175 if (argp
->minorversion
>= 1)
1176 return nfserr_notsupp
;
1178 READ_BUF(8 + NFS4_VERIFIER_SIZE
);
1179 COPYMEM(&scd_c
->sc_clientid
, 8);
1180 COPYMEM(&scd_c
->sc_confirm
, NFS4_VERIFIER_SIZE
);
1185 /* Also used for NVERIFY */
1187 nfsd4_decode_verify(struct nfsd4_compoundargs
*argp
, struct nfsd4_verify
*verify
)
1191 if ((status
= nfsd4_decode_bitmap(argp
, verify
->ve_bmval
)))
1194 /* For convenience's sake, we compare raw xdr'd attributes in
1195 * nfsd4_proc_verify */
1198 verify
->ve_attrlen
= be32_to_cpup(p
++);
1199 READ_BUF(verify
->ve_attrlen
);
1200 SAVEMEM(verify
->ve_attrval
, verify
->ve_attrlen
);
1206 nfsd4_decode_write(struct nfsd4_compoundargs
*argp
, struct nfsd4_write
*write
)
1212 status
= nfsd4_decode_stateid(argp
, &write
->wr_stateid
);
1216 p
= xdr_decode_hyper(p
, &write
->wr_offset
);
1217 write
->wr_stable_how
= be32_to_cpup(p
++);
1218 if (write
->wr_stable_how
> 2)
1220 write
->wr_buflen
= be32_to_cpup(p
++);
1222 /* Sorry .. no magic macros for this.. *
1223 * READ_BUF(write->wr_buflen);
1224 * SAVEMEM(write->wr_buf, write->wr_buflen);
1226 avail
= (char*)argp
->end
- (char*)argp
->p
;
1227 if (avail
+ argp
->pagelen
< write
->wr_buflen
) {
1228 dprintk("NFSD: xdr error (%s:%d)\n",
1229 __FILE__
, __LINE__
);
1232 write
->wr_head
.iov_base
= p
;
1233 write
->wr_head
.iov_len
= avail
;
1234 write
->wr_pagelist
= argp
->pagelist
;
1236 len
= XDR_QUADLEN(write
->wr_buflen
) << 2;
1242 pages
= len
>> PAGE_SHIFT
;
1243 argp
->pagelist
+= pages
;
1244 argp
->pagelen
-= pages
* PAGE_SIZE
;
1245 len
-= pages
* PAGE_SIZE
;
1247 argp
->p
= (__be32
*)page_address(argp
->pagelist
[0]);
1249 argp
->end
= argp
->p
+ XDR_QUADLEN(PAGE_SIZE
);
1251 argp
->p
+= XDR_QUADLEN(len
);
1257 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs
*argp
, struct nfsd4_release_lockowner
*rlockowner
)
1261 if (argp
->minorversion
>= 1)
1262 return nfserr_notsupp
;
1265 COPYMEM(&rlockowner
->rl_clientid
, sizeof(clientid_t
));
1266 rlockowner
->rl_owner
.len
= be32_to_cpup(p
++);
1267 READ_BUF(rlockowner
->rl_owner
.len
);
1268 READMEM(rlockowner
->rl_owner
.data
, rlockowner
->rl_owner
.len
);
1270 if (argp
->minorversion
&& !zero_clientid(&rlockowner
->rl_clientid
))
1271 return nfserr_inval
;
1276 nfsd4_decode_exchange_id(struct nfsd4_compoundargs
*argp
,
1277 struct nfsd4_exchange_id
*exid
)
1282 READ_BUF(NFS4_VERIFIER_SIZE
);
1283 COPYMEM(exid
->verifier
.data
, NFS4_VERIFIER_SIZE
);
1285 status
= nfsd4_decode_opaque(argp
, &exid
->clname
);
1287 return nfserr_bad_xdr
;
1290 exid
->flags
= be32_to_cpup(p
++);
1292 /* Ignore state_protect4_a */
1294 exid
->spa_how
= be32_to_cpup(p
++);
1295 switch (exid
->spa_how
) {
1299 /* spo_must_enforce */
1301 dummy
= be32_to_cpup(p
++);
1302 READ_BUF(dummy
* 4);
1305 /* spo_must_allow */
1307 dummy
= be32_to_cpup(p
++);
1308 READ_BUF(dummy
* 4);
1314 dummy
= be32_to_cpup(p
++);
1315 READ_BUF(dummy
* 4);
1319 dummy
= be32_to_cpup(p
++);
1320 READ_BUF(dummy
* 4);
1323 /* ssp_hash_algs<> */
1325 tmp
= be32_to_cpup(p
++);
1328 dummy
= be32_to_cpup(p
++);
1330 p
+= XDR_QUADLEN(dummy
);
1333 /* ssp_encr_algs<> */
1335 tmp
= be32_to_cpup(p
++);
1338 dummy
= be32_to_cpup(p
++);
1340 p
+= XDR_QUADLEN(dummy
);
1343 /* ssp_window and ssp_num_gss_handles */
1345 dummy
= be32_to_cpup(p
++);
1346 dummy
= be32_to_cpup(p
++);
1352 /* Ignore Implementation ID */
1353 READ_BUF(4); /* nfs_impl_id4 array length */
1354 dummy
= be32_to_cpup(p
++);
1362 dummy
= be32_to_cpup(p
++);
1364 p
+= XDR_QUADLEN(dummy
);
1368 dummy
= be32_to_cpup(p
++);
1370 p
+= XDR_QUADLEN(dummy
);
1380 nfsd4_decode_create_session(struct nfsd4_compoundargs
*argp
,
1381 struct nfsd4_create_session
*sess
)
1387 COPYMEM(&sess
->clientid
, 8);
1388 sess
->seqid
= be32_to_cpup(p
++);
1389 sess
->flags
= be32_to_cpup(p
++);
1391 /* Fore channel attrs */
1393 dummy
= be32_to_cpup(p
++); /* headerpadsz is always 0 */
1394 sess
->fore_channel
.maxreq_sz
= be32_to_cpup(p
++);
1395 sess
->fore_channel
.maxresp_sz
= be32_to_cpup(p
++);
1396 sess
->fore_channel
.maxresp_cached
= be32_to_cpup(p
++);
1397 sess
->fore_channel
.maxops
= be32_to_cpup(p
++);
1398 sess
->fore_channel
.maxreqs
= be32_to_cpup(p
++);
1399 sess
->fore_channel
.nr_rdma_attrs
= be32_to_cpup(p
++);
1400 if (sess
->fore_channel
.nr_rdma_attrs
== 1) {
1402 sess
->fore_channel
.rdma_attrs
= be32_to_cpup(p
++);
1403 } else if (sess
->fore_channel
.nr_rdma_attrs
> 1) {
1404 dprintk("Too many fore channel attr bitmaps!\n");
1408 /* Back channel attrs */
1410 dummy
= be32_to_cpup(p
++); /* headerpadsz is always 0 */
1411 sess
->back_channel
.maxreq_sz
= be32_to_cpup(p
++);
1412 sess
->back_channel
.maxresp_sz
= be32_to_cpup(p
++);
1413 sess
->back_channel
.maxresp_cached
= be32_to_cpup(p
++);
1414 sess
->back_channel
.maxops
= be32_to_cpup(p
++);
1415 sess
->back_channel
.maxreqs
= be32_to_cpup(p
++);
1416 sess
->back_channel
.nr_rdma_attrs
= be32_to_cpup(p
++);
1417 if (sess
->back_channel
.nr_rdma_attrs
== 1) {
1419 sess
->back_channel
.rdma_attrs
= be32_to_cpup(p
++);
1420 } else if (sess
->back_channel
.nr_rdma_attrs
> 1) {
1421 dprintk("Too many back channel attr bitmaps!\n");
1426 sess
->callback_prog
= be32_to_cpup(p
++);
1427 nfsd4_decode_cb_sec(argp
, &sess
->cb_sec
);
1432 nfsd4_decode_destroy_session(struct nfsd4_compoundargs
*argp
,
1433 struct nfsd4_destroy_session
*destroy_session
)
1436 READ_BUF(NFS4_MAX_SESSIONID_LEN
);
1437 COPYMEM(destroy_session
->sessionid
.data
, NFS4_MAX_SESSIONID_LEN
);
1443 nfsd4_decode_free_stateid(struct nfsd4_compoundargs
*argp
,
1444 struct nfsd4_free_stateid
*free_stateid
)
1448 READ_BUF(sizeof(stateid_t
));
1449 free_stateid
->fr_stateid
.si_generation
= be32_to_cpup(p
++);
1450 COPYMEM(&free_stateid
->fr_stateid
.si_opaque
, sizeof(stateid_opaque_t
));
1456 nfsd4_decode_sequence(struct nfsd4_compoundargs
*argp
,
1457 struct nfsd4_sequence
*seq
)
1461 READ_BUF(NFS4_MAX_SESSIONID_LEN
+ 16);
1462 COPYMEM(seq
->sessionid
.data
, NFS4_MAX_SESSIONID_LEN
);
1463 seq
->seqid
= be32_to_cpup(p
++);
1464 seq
->slotid
= be32_to_cpup(p
++);
1465 seq
->maxslots
= be32_to_cpup(p
++);
1466 seq
->cachethis
= be32_to_cpup(p
++);
1472 nfsd4_decode_test_stateid(struct nfsd4_compoundargs
*argp
, struct nfsd4_test_stateid
*test_stateid
)
1476 struct nfsd4_test_stateid_id
*stateid
;
1479 test_stateid
->ts_num_ids
= ntohl(*p
++);
1481 INIT_LIST_HEAD(&test_stateid
->ts_stateid_list
);
1483 for (i
= 0; i
< test_stateid
->ts_num_ids
; i
++) {
1484 stateid
= kmalloc(sizeof(struct nfsd4_test_stateid_id
), GFP_KERNEL
);
1486 status
= nfserrno(-ENOMEM
);
1490 defer_free(argp
, kfree
, stateid
);
1491 INIT_LIST_HEAD(&stateid
->ts_id_list
);
1492 list_add_tail(&stateid
->ts_id_list
, &test_stateid
->ts_stateid_list
);
1494 status
= nfsd4_decode_stateid(argp
, &stateid
->ts_id_stateid
);
1503 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__
, __LINE__
);
1504 status
= nfserr_bad_xdr
;
1508 static __be32
nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs
*argp
, struct nfsd4_destroy_clientid
*dc
)
1513 COPYMEM(&dc
->clientid
, 8);
1518 static __be32
nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs
*argp
, struct nfsd4_reclaim_complete
*rc
)
1523 rc
->rca_one_fs
= be32_to_cpup(p
++);
1529 nfsd4_decode_noop(struct nfsd4_compoundargs
*argp
, void *p
)
1535 nfsd4_decode_notsupp(struct nfsd4_compoundargs
*argp
, void *p
)
1537 return nfserr_notsupp
;
1540 typedef __be32(*nfsd4_dec
)(struct nfsd4_compoundargs
*argp
, void *);
1542 static nfsd4_dec nfsd4_dec_ops
[] = {
1543 [OP_ACCESS
] = (nfsd4_dec
)nfsd4_decode_access
,
1544 [OP_CLOSE
] = (nfsd4_dec
)nfsd4_decode_close
,
1545 [OP_COMMIT
] = (nfsd4_dec
)nfsd4_decode_commit
,
1546 [OP_CREATE
] = (nfsd4_dec
)nfsd4_decode_create
,
1547 [OP_DELEGPURGE
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1548 [OP_DELEGRETURN
] = (nfsd4_dec
)nfsd4_decode_delegreturn
,
1549 [OP_GETATTR
] = (nfsd4_dec
)nfsd4_decode_getattr
,
1550 [OP_GETFH
] = (nfsd4_dec
)nfsd4_decode_noop
,
1551 [OP_LINK
] = (nfsd4_dec
)nfsd4_decode_link
,
1552 [OP_LOCK
] = (nfsd4_dec
)nfsd4_decode_lock
,
1553 [OP_LOCKT
] = (nfsd4_dec
)nfsd4_decode_lockt
,
1554 [OP_LOCKU
] = (nfsd4_dec
)nfsd4_decode_locku
,
1555 [OP_LOOKUP
] = (nfsd4_dec
)nfsd4_decode_lookup
,
1556 [OP_LOOKUPP
] = (nfsd4_dec
)nfsd4_decode_noop
,
1557 [OP_NVERIFY
] = (nfsd4_dec
)nfsd4_decode_verify
,
1558 [OP_OPEN
] = (nfsd4_dec
)nfsd4_decode_open
,
1559 [OP_OPENATTR
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1560 [OP_OPEN_CONFIRM
] = (nfsd4_dec
)nfsd4_decode_open_confirm
,
1561 [OP_OPEN_DOWNGRADE
] = (nfsd4_dec
)nfsd4_decode_open_downgrade
,
1562 [OP_PUTFH
] = (nfsd4_dec
)nfsd4_decode_putfh
,
1563 [OP_PUTPUBFH
] = (nfsd4_dec
)nfsd4_decode_putpubfh
,
1564 [OP_PUTROOTFH
] = (nfsd4_dec
)nfsd4_decode_noop
,
1565 [OP_READ
] = (nfsd4_dec
)nfsd4_decode_read
,
1566 [OP_READDIR
] = (nfsd4_dec
)nfsd4_decode_readdir
,
1567 [OP_READLINK
] = (nfsd4_dec
)nfsd4_decode_noop
,
1568 [OP_REMOVE
] = (nfsd4_dec
)nfsd4_decode_remove
,
1569 [OP_RENAME
] = (nfsd4_dec
)nfsd4_decode_rename
,
1570 [OP_RENEW
] = (nfsd4_dec
)nfsd4_decode_renew
,
1571 [OP_RESTOREFH
] = (nfsd4_dec
)nfsd4_decode_noop
,
1572 [OP_SAVEFH
] = (nfsd4_dec
)nfsd4_decode_noop
,
1573 [OP_SECINFO
] = (nfsd4_dec
)nfsd4_decode_secinfo
,
1574 [OP_SETATTR
] = (nfsd4_dec
)nfsd4_decode_setattr
,
1575 [OP_SETCLIENTID
] = (nfsd4_dec
)nfsd4_decode_setclientid
,
1576 [OP_SETCLIENTID_CONFIRM
] = (nfsd4_dec
)nfsd4_decode_setclientid_confirm
,
1577 [OP_VERIFY
] = (nfsd4_dec
)nfsd4_decode_verify
,
1578 [OP_WRITE
] = (nfsd4_dec
)nfsd4_decode_write
,
1579 [OP_RELEASE_LOCKOWNER
] = (nfsd4_dec
)nfsd4_decode_release_lockowner
,
1581 /* new operations for NFSv4.1 */
1582 [OP_BACKCHANNEL_CTL
] = (nfsd4_dec
)nfsd4_decode_backchannel_ctl
,
1583 [OP_BIND_CONN_TO_SESSION
]= (nfsd4_dec
)nfsd4_decode_bind_conn_to_session
,
1584 [OP_EXCHANGE_ID
] = (nfsd4_dec
)nfsd4_decode_exchange_id
,
1585 [OP_CREATE_SESSION
] = (nfsd4_dec
)nfsd4_decode_create_session
,
1586 [OP_DESTROY_SESSION
] = (nfsd4_dec
)nfsd4_decode_destroy_session
,
1587 [OP_FREE_STATEID
] = (nfsd4_dec
)nfsd4_decode_free_stateid
,
1588 [OP_GET_DIR_DELEGATION
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1589 [OP_GETDEVICEINFO
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1590 [OP_GETDEVICELIST
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1591 [OP_LAYOUTCOMMIT
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1592 [OP_LAYOUTGET
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1593 [OP_LAYOUTRETURN
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1594 [OP_SECINFO_NO_NAME
] = (nfsd4_dec
)nfsd4_decode_secinfo_no_name
,
1595 [OP_SEQUENCE
] = (nfsd4_dec
)nfsd4_decode_sequence
,
1596 [OP_SET_SSV
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1597 [OP_TEST_STATEID
] = (nfsd4_dec
)nfsd4_decode_test_stateid
,
1598 [OP_WANT_DELEGATION
] = (nfsd4_dec
)nfsd4_decode_notsupp
,
1599 [OP_DESTROY_CLIENTID
] = (nfsd4_dec
)nfsd4_decode_destroy_clientid
,
1600 [OP_RECLAIM_COMPLETE
] = (nfsd4_dec
)nfsd4_decode_reclaim_complete
,
1604 nfsd4_opnum_in_range(struct nfsd4_compoundargs
*argp
, struct nfsd4_op
*op
)
1606 if (op
->opnum
< FIRST_NFS4_OP
)
1608 else if (argp
->minorversion
== 0 && op
->opnum
> LAST_NFS40_OP
)
1610 else if (argp
->minorversion
== 1 && op
->opnum
> LAST_NFS41_OP
)
1612 else if (argp
->minorversion
== 2 && op
->opnum
> LAST_NFS42_OP
)
1618 nfsd4_decode_compound(struct nfsd4_compoundargs
*argp
)
1621 struct nfsd4_op
*op
;
1622 bool cachethis
= false;
1623 int auth_slack
= argp
->rqstp
->rq_auth_slack
;
1624 int max_reply
= auth_slack
+ 8; /* opcnt, status */
1630 argp
->taglen
= be32_to_cpup(p
++);
1631 READ_BUF(argp
->taglen
+ 8);
1632 SAVEMEM(argp
->tag
, argp
->taglen
);
1633 argp
->minorversion
= be32_to_cpup(p
++);
1634 argp
->opcnt
= be32_to_cpup(p
++);
1635 max_reply
+= 4 + (XDR_QUADLEN(argp
->taglen
) << 2);
1637 if (argp
->taglen
> NFSD4_MAX_TAGLEN
)
1639 if (argp
->opcnt
> 100)
1642 if (argp
->opcnt
> ARRAY_SIZE(argp
->iops
)) {
1643 argp
->ops
= kmalloc(argp
->opcnt
* sizeof(*argp
->ops
), GFP_KERNEL
);
1645 argp
->ops
= argp
->iops
;
1646 dprintk("nfsd: couldn't allocate room for COMPOUND\n");
1651 if (argp
->minorversion
> NFSD_SUPPORTED_MINOR_VERSION
)
1654 for (i
= 0; i
< argp
->opcnt
; i
++) {
1659 op
->opnum
= be32_to_cpup(p
++);
1661 if (nfsd4_opnum_in_range(argp
, op
))
1662 op
->status
= nfsd4_dec_ops
[op
->opnum
](argp
, &op
->u
);
1664 op
->opnum
= OP_ILLEGAL
;
1665 op
->status
= nfserr_op_illegal
;
1668 * We'll try to cache the result in the DRC if any one
1669 * op in the compound wants to be cached:
1671 cachethis
|= nfsd4_cache_this_op(op
);
1673 if (op
->opnum
== OP_READ
) {
1675 readbytes
+= nfsd4_max_reply(argp
->rqstp
, op
);
1677 max_reply
+= nfsd4_max_reply(argp
->rqstp
, op
);
1684 /* Sessions make the DRC unnecessary: */
1685 if (argp
->minorversion
)
1687 svc_reserve(argp
->rqstp
, max_reply
+ readbytes
);
1688 argp
->rqstp
->rq_cachetype
= cachethis
? RC_REPLBUFF
: RC_NOCACHE
;
1690 if (readcount
> 1 || max_reply
> PAGE_SIZE
- auth_slack
)
1691 argp
->rqstp
->rq_splice_ok
= false;
1696 static __be32
*encode_change(__be32
*p
, struct kstat
*stat
, struct inode
*inode
)
1698 if (IS_I_VERSION(inode
)) {
1699 p
= xdr_encode_hyper(p
, inode
->i_version
);
1701 *p
++ = cpu_to_be32(stat
->ctime
.tv_sec
);
1702 *p
++ = cpu_to_be32(stat
->ctime
.tv_nsec
);
1707 static __be32
*encode_cinfo(__be32
*p
, struct nfsd4_change_info
*c
)
1709 *p
++ = cpu_to_be32(c
->atomic
);
1710 if (c
->change_supported
) {
1711 p
= xdr_encode_hyper(p
, c
->before_change
);
1712 p
= xdr_encode_hyper(p
, c
->after_change
);
1714 *p
++ = cpu_to_be32(c
->before_ctime_sec
);
1715 *p
++ = cpu_to_be32(c
->before_ctime_nsec
);
1716 *p
++ = cpu_to_be32(c
->after_ctime_sec
);
1717 *p
++ = cpu_to_be32(c
->after_ctime_nsec
);
1722 /* Encode as an array of strings the string given with components
1723 * separated @sep, escaped with esc_enter and esc_exit.
1725 static __be32
nfsd4_encode_components_esc(struct xdr_stream
*xdr
, char sep
,
1726 char *components
, char esc_enter
,
1732 int strlen
, count
=0;
1733 char *str
, *end
, *next
;
1735 dprintk("nfsd4_encode_components(%s)\n", components
);
1737 pathlen_offset
= xdr
->buf
->len
;
1738 p
= xdr_reserve_space(xdr
, 4);
1740 return nfserr_resource
;
1741 p
++; /* We will fill this in with @count later */
1743 end
= str
= components
;
1745 bool found_esc
= false;
1747 /* try to parse as esc_start, ..., esc_end, sep */
1748 if (*str
== esc_enter
) {
1749 for (; *end
&& (*end
!= esc_exit
); end
++)
1750 /* find esc_exit or end of string */;
1752 if (*end
&& (!*next
|| *next
== sep
)) {
1759 for (; *end
&& (*end
!= sep
); end
++)
1760 /* find sep or end of string */;
1764 p
= xdr_reserve_space(xdr
, strlen
+ 4);
1766 return nfserr_resource
;
1767 p
= xdr_encode_opaque(p
, str
, strlen
);
1774 pathlen
= htonl(xdr
->buf
->len
- pathlen_offset
);
1775 write_bytes_to_xdr_buf(xdr
->buf
, pathlen_offset
, &pathlen
, 4);
1779 /* Encode as an array of strings the string given with components
1782 static __be32
nfsd4_encode_components(struct xdr_stream
*xdr
, char sep
,
1785 return nfsd4_encode_components_esc(xdr
, sep
, components
, 0, 0);
1789 * encode a location element of a fs_locations structure
1791 static __be32
nfsd4_encode_fs_location4(struct xdr_stream
*xdr
,
1792 struct nfsd4_fs_location
*location
)
1796 status
= nfsd4_encode_components_esc(xdr
, ':', location
->hosts
,
1800 status
= nfsd4_encode_components(xdr
, '/', location
->path
);
1807 * Encode a path in RFC3530 'pathname4' format
1809 static __be32
nfsd4_encode_path(struct xdr_stream
*xdr
,
1810 const struct path
*root
,
1811 const struct path
*path
)
1813 struct path cur
= *path
;
1815 struct dentry
**components
= NULL
;
1816 unsigned int ncomponents
= 0;
1817 __be32 err
= nfserr_jukebox
;
1819 dprintk("nfsd4_encode_components(");
1822 /* First walk the path up to the nfsd root, and store the
1823 * dentries/path components in an array.
1826 if (cur
.dentry
== root
->dentry
&& cur
.mnt
== root
->mnt
)
1828 if (cur
.dentry
== cur
.mnt
->mnt_root
) {
1829 if (follow_up(&cur
))
1833 if ((ncomponents
& 15) == 0) {
1834 struct dentry
**new;
1835 new = krealloc(components
,
1836 sizeof(*new) * (ncomponents
+ 16),
1842 components
[ncomponents
++] = cur
.dentry
;
1843 cur
.dentry
= dget_parent(cur
.dentry
);
1845 err
= nfserr_resource
;
1846 p
= xdr_reserve_space(xdr
, 4);
1849 *p
++ = cpu_to_be32(ncomponents
);
1851 while (ncomponents
) {
1852 struct dentry
*dentry
= components
[ncomponents
- 1];
1855 spin_lock(&dentry
->d_lock
);
1856 len
= dentry
->d_name
.len
;
1857 p
= xdr_reserve_space(xdr
, len
+ 4);
1859 spin_unlock(&dentry
->d_lock
);
1862 p
= xdr_encode_opaque(p
, dentry
->d_name
.name
, len
);
1863 dprintk("/%s", dentry
->d_name
.name
);
1864 spin_unlock(&dentry
->d_lock
);
1873 dput(components
[--ncomponents
]);
1879 static __be32
nfsd4_encode_fsloc_fsroot(struct xdr_stream
*xdr
,
1880 struct svc_rqst
*rqstp
, const struct path
*path
)
1882 struct svc_export
*exp_ps
;
1885 exp_ps
= rqst_find_fsidzero_export(rqstp
);
1887 return nfserrno(PTR_ERR(exp_ps
));
1888 res
= nfsd4_encode_path(xdr
, &exp_ps
->ex_path
, path
);
1894 * encode a fs_locations structure
1896 static __be32
nfsd4_encode_fs_locations(struct xdr_stream
*xdr
,
1897 struct svc_rqst
*rqstp
, struct svc_export
*exp
)
1902 struct nfsd4_fs_locations
*fslocs
= &exp
->ex_fslocs
;
1904 status
= nfsd4_encode_fsloc_fsroot(xdr
, rqstp
, &exp
->ex_path
);
1907 p
= xdr_reserve_space(xdr
, 4);
1909 return nfserr_resource
;
1910 *p
++ = cpu_to_be32(fslocs
->locations_count
);
1911 for (i
=0; i
<fslocs
->locations_count
; i
++) {
1912 status
= nfsd4_encode_fs_location4(xdr
, &fslocs
->locations
[i
]);
1919 static u32
nfs4_file_type(umode_t mode
)
1921 switch (mode
& S_IFMT
) {
1922 case S_IFIFO
: return NF4FIFO
;
1923 case S_IFCHR
: return NF4CHR
;
1924 case S_IFDIR
: return NF4DIR
;
1925 case S_IFBLK
: return NF4BLK
;
1926 case S_IFLNK
: return NF4LNK
;
1927 case S_IFREG
: return NF4REG
;
1928 case S_IFSOCK
: return NF4SOCK
;
1929 default: return NF4BAD
;
1933 static inline __be32
1934 nfsd4_encode_aclname(struct xdr_stream
*xdr
, struct svc_rqst
*rqstp
,
1935 struct nfs4_ace
*ace
)
1937 if (ace
->whotype
!= NFS4_ACL_WHO_NAMED
)
1938 return nfs4_acl_write_who(xdr
, ace
->whotype
);
1939 else if (ace
->flag
& NFS4_ACE_IDENTIFIER_GROUP
)
1940 return nfsd4_encode_group(xdr
, rqstp
, ace
->who_gid
);
1942 return nfsd4_encode_user(xdr
, rqstp
, ace
->who_uid
);
1945 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
1946 FATTR4_WORD0_RDATTR_ERROR)
1947 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
1949 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
1950 static inline __be32
1951 nfsd4_encode_security_label(struct xdr_stream
*xdr
, struct svc_rqst
*rqstp
,
1952 void *context
, int len
)
1956 p
= xdr_reserve_space(xdr
, len
+ 4 + 4 + 4);
1958 return nfserr_resource
;
1961 * For now we use a 0 here to indicate the null translation; in
1962 * the future we may place a call to translation code here.
1964 *p
++ = cpu_to_be32(0); /* lfs */
1965 *p
++ = cpu_to_be32(0); /* pi */
1966 p
= xdr_encode_opaque(p
, context
, len
);
1970 static inline __be32
1971 nfsd4_encode_security_label(struct xdr_stream
*xdr
, struct svc_rqst
*rqstp
,
1972 void *context
, int len
)
1976 static __be32
fattr_handle_absent_fs(u32
*bmval0
, u32
*bmval1
, u32
*rdattr_err
)
1978 /* As per referral draft: */
1979 if (*bmval0
& ~WORD0_ABSENT_FS_ATTRS
||
1980 *bmval1
& ~WORD1_ABSENT_FS_ATTRS
) {
1981 if (*bmval0
& FATTR4_WORD0_RDATTR_ERROR
||
1982 *bmval0
& FATTR4_WORD0_FS_LOCATIONS
)
1983 *rdattr_err
= NFSERR_MOVED
;
1985 return nfserr_moved
;
1987 *bmval0
&= WORD0_ABSENT_FS_ATTRS
;
1988 *bmval1
&= WORD1_ABSENT_FS_ATTRS
;
1993 static int get_parent_attributes(struct svc_export
*exp
, struct kstat
*stat
)
1995 struct path path
= exp
->ex_path
;
1999 while (follow_up(&path
)) {
2000 if (path
.dentry
!= path
.mnt
->mnt_root
)
2003 err
= vfs_getattr(&path
, stat
);
2009 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2013 nfsd4_encode_fattr(struct xdr_stream
*xdr
, struct svc_fh
*fhp
,
2014 struct svc_export
*exp
,
2015 struct dentry
*dentry
, u32
*bmval
,
2016 struct svc_rqst
*rqstp
, int ignore_crossmnt
)
2018 u32 bmval0
= bmval
[0];
2019 u32 bmval1
= bmval
[1];
2020 u32 bmval2
= bmval
[2];
2022 struct svc_fh
*tempfh
= NULL
;
2023 struct kstatfs statfs
;
2025 int starting_len
= xdr
->buf
->len
;
2034 struct nfs4_acl
*acl
= NULL
;
2035 void *context
= NULL
;
2037 bool contextsupport
= false;
2038 struct nfsd4_compoundres
*resp
= rqstp
->rq_resp
;
2039 u32 minorversion
= resp
->cstate
.minorversion
;
2040 struct path path
= {
2041 .mnt
= exp
->ex_path
.mnt
,
2044 struct nfsd_net
*nn
= net_generic(SVC_NET(rqstp
), nfsd_net_id
);
2046 BUG_ON(bmval1
& NFSD_WRITEONLY_ATTRS_WORD1
);
2047 BUG_ON(bmval0
& ~nfsd_suppattrs0(minorversion
));
2048 BUG_ON(bmval1
& ~nfsd_suppattrs1(minorversion
));
2049 BUG_ON(bmval2
& ~nfsd_suppattrs2(minorversion
));
2051 if (exp
->ex_fslocs
.migrated
) {
2053 status
= fattr_handle_absent_fs(&bmval0
, &bmval1
, &rdattr_err
);
2058 err
= vfs_getattr(&path
, &stat
);
2061 if ((bmval0
& (FATTR4_WORD0_FILES_AVAIL
| FATTR4_WORD0_FILES_FREE
|
2062 FATTR4_WORD0_FILES_TOTAL
| FATTR4_WORD0_MAXNAME
)) ||
2063 (bmval1
& (FATTR4_WORD1_SPACE_AVAIL
| FATTR4_WORD1_SPACE_FREE
|
2064 FATTR4_WORD1_SPACE_TOTAL
))) {
2065 err
= vfs_statfs(&path
, &statfs
);
2069 if ((bmval0
& (FATTR4_WORD0_FILEHANDLE
| FATTR4_WORD0_FSID
)) && !fhp
) {
2070 tempfh
= kmalloc(sizeof(struct svc_fh
), GFP_KERNEL
);
2071 status
= nfserr_jukebox
;
2074 fh_init(tempfh
, NFS4_FHSIZE
);
2075 status
= fh_compose(tempfh
, exp
, dentry
, NULL
);
2080 if (bmval0
& (FATTR4_WORD0_ACL
| FATTR4_WORD0_ACLSUPPORT
2081 | FATTR4_WORD0_SUPPORTED_ATTRS
)) {
2082 err
= nfsd4_get_nfs4_acl(rqstp
, dentry
, &acl
);
2083 aclsupport
= (err
== 0);
2084 if (bmval0
& FATTR4_WORD0_ACL
) {
2085 if (err
== -EOPNOTSUPP
)
2086 bmval0
&= ~FATTR4_WORD0_ACL
;
2087 else if (err
== -EINVAL
) {
2088 status
= nfserr_attrnotsupp
;
2090 } else if (err
!= 0)
2095 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2096 if ((bmval
[2] & FATTR4_WORD2_SECURITY_LABEL
) ||
2097 bmval
[0] & FATTR4_WORD0_SUPPORTED_ATTRS
) {
2098 err
= security_inode_getsecctx(dentry
->d_inode
,
2099 &context
, &contextlen
);
2100 contextsupport
= (err
== 0);
2101 if (bmval2
& FATTR4_WORD2_SECURITY_LABEL
) {
2102 if (err
== -EOPNOTSUPP
)
2103 bmval2
&= ~FATTR4_WORD2_SECURITY_LABEL
;
2108 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2111 p
= xdr_reserve_space(xdr
, 16);
2114 *p
++ = cpu_to_be32(3);
2115 *p
++ = cpu_to_be32(bmval0
);
2116 *p
++ = cpu_to_be32(bmval1
);
2117 *p
++ = cpu_to_be32(bmval2
);
2118 } else if (bmval1
) {
2119 p
= xdr_reserve_space(xdr
, 12);
2122 *p
++ = cpu_to_be32(2);
2123 *p
++ = cpu_to_be32(bmval0
);
2124 *p
++ = cpu_to_be32(bmval1
);
2126 p
= xdr_reserve_space(xdr
, 8);
2129 *p
++ = cpu_to_be32(1);
2130 *p
++ = cpu_to_be32(bmval0
);
2133 attrlen_offset
= xdr
->buf
->len
;
2134 p
= xdr_reserve_space(xdr
, 4);
2137 p
++; /* to be backfilled later */
2139 if (bmval0
& FATTR4_WORD0_SUPPORTED_ATTRS
) {
2140 u32 word0
= nfsd_suppattrs0(minorversion
);
2141 u32 word1
= nfsd_suppattrs1(minorversion
);
2142 u32 word2
= nfsd_suppattrs2(minorversion
);
2145 word0
&= ~FATTR4_WORD0_ACL
;
2146 if (!contextsupport
)
2147 word2
&= ~FATTR4_WORD2_SECURITY_LABEL
;
2149 p
= xdr_reserve_space(xdr
, 12);
2152 *p
++ = cpu_to_be32(2);
2153 *p
++ = cpu_to_be32(word0
);
2154 *p
++ = cpu_to_be32(word1
);
2156 p
= xdr_reserve_space(xdr
, 16);
2159 *p
++ = cpu_to_be32(3);
2160 *p
++ = cpu_to_be32(word0
);
2161 *p
++ = cpu_to_be32(word1
);
2162 *p
++ = cpu_to_be32(word2
);
2165 if (bmval0
& FATTR4_WORD0_TYPE
) {
2166 p
= xdr_reserve_space(xdr
, 4);
2169 dummy
= nfs4_file_type(stat
.mode
);
2170 if (dummy
== NF4BAD
) {
2171 status
= nfserr_serverfault
;
2174 *p
++ = cpu_to_be32(dummy
);
2176 if (bmval0
& FATTR4_WORD0_FH_EXPIRE_TYPE
) {
2177 p
= xdr_reserve_space(xdr
, 4);
2180 if (exp
->ex_flags
& NFSEXP_NOSUBTREECHECK
)
2181 *p
++ = cpu_to_be32(NFS4_FH_PERSISTENT
);
2183 *p
++ = cpu_to_be32(NFS4_FH_PERSISTENT
|
2184 NFS4_FH_VOL_RENAME
);
2186 if (bmval0
& FATTR4_WORD0_CHANGE
) {
2187 p
= xdr_reserve_space(xdr
, 8);
2190 p
= encode_change(p
, &stat
, dentry
->d_inode
);
2192 if (bmval0
& FATTR4_WORD0_SIZE
) {
2193 p
= xdr_reserve_space(xdr
, 8);
2196 p
= xdr_encode_hyper(p
, stat
.size
);
2198 if (bmval0
& FATTR4_WORD0_LINK_SUPPORT
) {
2199 p
= xdr_reserve_space(xdr
, 4);
2202 *p
++ = cpu_to_be32(1);
2204 if (bmval0
& FATTR4_WORD0_SYMLINK_SUPPORT
) {
2205 p
= xdr_reserve_space(xdr
, 4);
2208 *p
++ = cpu_to_be32(1);
2210 if (bmval0
& FATTR4_WORD0_NAMED_ATTR
) {
2211 p
= xdr_reserve_space(xdr
, 4);
2214 *p
++ = cpu_to_be32(0);
2216 if (bmval0
& FATTR4_WORD0_FSID
) {
2217 p
= xdr_reserve_space(xdr
, 16);
2220 if (exp
->ex_fslocs
.migrated
) {
2221 p
= xdr_encode_hyper(p
, NFS4_REFERRAL_FSID_MAJOR
);
2222 p
= xdr_encode_hyper(p
, NFS4_REFERRAL_FSID_MINOR
);
2223 } else switch(fsid_source(fhp
)) {
2224 case FSIDSOURCE_FSID
:
2225 p
= xdr_encode_hyper(p
, (u64
)exp
->ex_fsid
);
2226 p
= xdr_encode_hyper(p
, (u64
)0);
2228 case FSIDSOURCE_DEV
:
2229 *p
++ = cpu_to_be32(0);
2230 *p
++ = cpu_to_be32(MAJOR(stat
.dev
));
2231 *p
++ = cpu_to_be32(0);
2232 *p
++ = cpu_to_be32(MINOR(stat
.dev
));
2234 case FSIDSOURCE_UUID
:
2235 p
= xdr_encode_opaque_fixed(p
, exp
->ex_uuid
,
2240 if (bmval0
& FATTR4_WORD0_UNIQUE_HANDLES
) {
2241 p
= xdr_reserve_space(xdr
, 4);
2244 *p
++ = cpu_to_be32(0);
2246 if (bmval0
& FATTR4_WORD0_LEASE_TIME
) {
2247 p
= xdr_reserve_space(xdr
, 4);
2250 *p
++ = cpu_to_be32(nn
->nfsd4_lease
);
2252 if (bmval0
& FATTR4_WORD0_RDATTR_ERROR
) {
2253 p
= xdr_reserve_space(xdr
, 4);
2256 *p
++ = cpu_to_be32(rdattr_err
);
2258 if (bmval0
& FATTR4_WORD0_ACL
) {
2259 struct nfs4_ace
*ace
;
2262 p
= xdr_reserve_space(xdr
, 4);
2266 *p
++ = cpu_to_be32(0);
2269 p
= xdr_reserve_space(xdr
, 4);
2272 *p
++ = cpu_to_be32(acl
->naces
);
2274 for (ace
= acl
->aces
; ace
< acl
->aces
+ acl
->naces
; ace
++) {
2275 p
= xdr_reserve_space(xdr
, 4*3);
2278 *p
++ = cpu_to_be32(ace
->type
);
2279 *p
++ = cpu_to_be32(ace
->flag
);
2280 *p
++ = cpu_to_be32(ace
->access_mask
&
2282 status
= nfsd4_encode_aclname(xdr
, rqstp
, ace
);
2288 if (bmval0
& FATTR4_WORD0_ACLSUPPORT
) {
2289 p
= xdr_reserve_space(xdr
, 4);
2292 *p
++ = cpu_to_be32(aclsupport
?
2293 ACL4_SUPPORT_ALLOW_ACL
|ACL4_SUPPORT_DENY_ACL
: 0);
2295 if (bmval0
& FATTR4_WORD0_CANSETTIME
) {
2296 p
= xdr_reserve_space(xdr
, 4);
2299 *p
++ = cpu_to_be32(1);
2301 if (bmval0
& FATTR4_WORD0_CASE_INSENSITIVE
) {
2302 p
= xdr_reserve_space(xdr
, 4);
2305 *p
++ = cpu_to_be32(0);
2307 if (bmval0
& FATTR4_WORD0_CASE_PRESERVING
) {
2308 p
= xdr_reserve_space(xdr
, 4);
2311 *p
++ = cpu_to_be32(1);
2313 if (bmval0
& FATTR4_WORD0_CHOWN_RESTRICTED
) {
2314 p
= xdr_reserve_space(xdr
, 4);
2317 *p
++ = cpu_to_be32(1);
2319 if (bmval0
& FATTR4_WORD0_FILEHANDLE
) {
2320 p
= xdr_reserve_space(xdr
, fhp
->fh_handle
.fh_size
+ 4);
2323 p
= xdr_encode_opaque(p
, &fhp
->fh_handle
.fh_base
,
2324 fhp
->fh_handle
.fh_size
);
2326 if (bmval0
& FATTR4_WORD0_FILEID
) {
2327 p
= xdr_reserve_space(xdr
, 8);
2330 p
= xdr_encode_hyper(p
, stat
.ino
);
2332 if (bmval0
& FATTR4_WORD0_FILES_AVAIL
) {
2333 p
= xdr_reserve_space(xdr
, 8);
2336 p
= xdr_encode_hyper(p
, (u64
) statfs
.f_ffree
);
2338 if (bmval0
& FATTR4_WORD0_FILES_FREE
) {
2339 p
= xdr_reserve_space(xdr
, 8);
2342 p
= xdr_encode_hyper(p
, (u64
) statfs
.f_ffree
);
2344 if (bmval0
& FATTR4_WORD0_FILES_TOTAL
) {
2345 p
= xdr_reserve_space(xdr
, 8);
2348 p
= xdr_encode_hyper(p
, (u64
) statfs
.f_files
);
2350 if (bmval0
& FATTR4_WORD0_FS_LOCATIONS
) {
2351 status
= nfsd4_encode_fs_locations(xdr
, rqstp
, exp
);
2355 if (bmval0
& FATTR4_WORD0_HOMOGENEOUS
) {
2356 p
= xdr_reserve_space(xdr
, 4);
2359 *p
++ = cpu_to_be32(1);
2361 if (bmval0
& FATTR4_WORD0_MAXFILESIZE
) {
2362 p
= xdr_reserve_space(xdr
, 8);
2365 p
= xdr_encode_hyper(p
, exp
->ex_path
.mnt
->mnt_sb
->s_maxbytes
);
2367 if (bmval0
& FATTR4_WORD0_MAXLINK
) {
2368 p
= xdr_reserve_space(xdr
, 4);
2371 *p
++ = cpu_to_be32(255);
2373 if (bmval0
& FATTR4_WORD0_MAXNAME
) {
2374 p
= xdr_reserve_space(xdr
, 4);
2377 *p
++ = cpu_to_be32(statfs
.f_namelen
);
2379 if (bmval0
& FATTR4_WORD0_MAXREAD
) {
2380 p
= xdr_reserve_space(xdr
, 8);
2383 p
= xdr_encode_hyper(p
, (u64
) svc_max_payload(rqstp
));
2385 if (bmval0
& FATTR4_WORD0_MAXWRITE
) {
2386 p
= xdr_reserve_space(xdr
, 8);
2389 p
= xdr_encode_hyper(p
, (u64
) svc_max_payload(rqstp
));
2391 if (bmval1
& FATTR4_WORD1_MODE
) {
2392 p
= xdr_reserve_space(xdr
, 4);
2395 *p
++ = cpu_to_be32(stat
.mode
& S_IALLUGO
);
2397 if (bmval1
& FATTR4_WORD1_NO_TRUNC
) {
2398 p
= xdr_reserve_space(xdr
, 4);
2401 *p
++ = cpu_to_be32(1);
2403 if (bmval1
& FATTR4_WORD1_NUMLINKS
) {
2404 p
= xdr_reserve_space(xdr
, 4);
2407 *p
++ = cpu_to_be32(stat
.nlink
);
2409 if (bmval1
& FATTR4_WORD1_OWNER
) {
2410 status
= nfsd4_encode_user(xdr
, rqstp
, stat
.uid
);
2414 if (bmval1
& FATTR4_WORD1_OWNER_GROUP
) {
2415 status
= nfsd4_encode_group(xdr
, rqstp
, stat
.gid
);
2419 if (bmval1
& FATTR4_WORD1_RAWDEV
) {
2420 p
= xdr_reserve_space(xdr
, 8);
2423 *p
++ = cpu_to_be32((u32
) MAJOR(stat
.rdev
));
2424 *p
++ = cpu_to_be32((u32
) MINOR(stat
.rdev
));
2426 if (bmval1
& FATTR4_WORD1_SPACE_AVAIL
) {
2427 p
= xdr_reserve_space(xdr
, 8);
2430 dummy64
= (u64
)statfs
.f_bavail
* (u64
)statfs
.f_bsize
;
2431 p
= xdr_encode_hyper(p
, dummy64
);
2433 if (bmval1
& FATTR4_WORD1_SPACE_FREE
) {
2434 p
= xdr_reserve_space(xdr
, 8);
2437 dummy64
= (u64
)statfs
.f_bfree
* (u64
)statfs
.f_bsize
;
2438 p
= xdr_encode_hyper(p
, dummy64
);
2440 if (bmval1
& FATTR4_WORD1_SPACE_TOTAL
) {
2441 p
= xdr_reserve_space(xdr
, 8);
2444 dummy64
= (u64
)statfs
.f_blocks
* (u64
)statfs
.f_bsize
;
2445 p
= xdr_encode_hyper(p
, dummy64
);
2447 if (bmval1
& FATTR4_WORD1_SPACE_USED
) {
2448 p
= xdr_reserve_space(xdr
, 8);
2451 dummy64
= (u64
)stat
.blocks
<< 9;
2452 p
= xdr_encode_hyper(p
, dummy64
);
2454 if (bmval1
& FATTR4_WORD1_TIME_ACCESS
) {
2455 p
= xdr_reserve_space(xdr
, 12);
2458 p
= xdr_encode_hyper(p
, (s64
)stat
.atime
.tv_sec
);
2459 *p
++ = cpu_to_be32(stat
.atime
.tv_nsec
);
2461 if (bmval1
& FATTR4_WORD1_TIME_DELTA
) {
2462 p
= xdr_reserve_space(xdr
, 12);
2465 *p
++ = cpu_to_be32(0);
2466 *p
++ = cpu_to_be32(1);
2467 *p
++ = cpu_to_be32(0);
2469 if (bmval1
& FATTR4_WORD1_TIME_METADATA
) {
2470 p
= xdr_reserve_space(xdr
, 12);
2473 p
= xdr_encode_hyper(p
, (s64
)stat
.ctime
.tv_sec
);
2474 *p
++ = cpu_to_be32(stat
.ctime
.tv_nsec
);
2476 if (bmval1
& FATTR4_WORD1_TIME_MODIFY
) {
2477 p
= xdr_reserve_space(xdr
, 12);
2480 p
= xdr_encode_hyper(p
, (s64
)stat
.mtime
.tv_sec
);
2481 *p
++ = cpu_to_be32(stat
.mtime
.tv_nsec
);
2483 if (bmval1
& FATTR4_WORD1_MOUNTED_ON_FILEID
) {
2484 p
= xdr_reserve_space(xdr
, 8);
2488 * Get parent's attributes if not ignoring crossmount
2489 * and this is the root of a cross-mounted filesystem.
2491 if (ignore_crossmnt
== 0 &&
2492 dentry
== exp
->ex_path
.mnt
->mnt_root
)
2493 get_parent_attributes(exp
, &stat
);
2494 p
= xdr_encode_hyper(p
, stat
.ino
);
2496 if (bmval2
& FATTR4_WORD2_SECURITY_LABEL
) {
2497 status
= nfsd4_encode_security_label(xdr
, rqstp
, context
,
2502 if (bmval2
& FATTR4_WORD2_SUPPATTR_EXCLCREAT
) {
2503 p
= xdr_reserve_space(xdr
, 16);
2506 *p
++ = cpu_to_be32(3);
2507 *p
++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0
);
2508 *p
++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1
);
2509 *p
++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2
);
2512 attrlen
= htonl(xdr
->buf
->len
- attrlen_offset
- 4);
2513 write_bytes_to_xdr_buf(xdr
->buf
, attrlen_offset
, &attrlen
, 4);
2517 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2519 security_release_secctx(context
, contextlen
);
2520 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2527 xdr_truncate_encode(xdr
, starting_len
);
2530 status
= nfserrno(err
);
2533 status
= nfserr_resource
;
2537 static void svcxdr_init_encode_from_buffer(struct xdr_stream
*xdr
,
2538 struct xdr_buf
*buf
, __be32
*p
, int bytes
)
2540 xdr
->scratch
.iov_len
= 0;
2541 memset(buf
, 0, sizeof(struct xdr_buf
));
2542 buf
->head
[0].iov_base
= p
;
2543 buf
->head
[0].iov_len
= 0;
2546 xdr
->iov
= buf
->head
;
2548 xdr
->end
= (void *)p
+ bytes
;
2549 buf
->buflen
= bytes
;
2552 __be32
nfsd4_encode_fattr_to_buf(__be32
**p
, int words
,
2553 struct svc_fh
*fhp
, struct svc_export
*exp
,
2554 struct dentry
*dentry
, u32
*bmval
,
2555 struct svc_rqst
*rqstp
, int ignore_crossmnt
)
2557 struct xdr_buf dummy
;
2558 struct xdr_stream xdr
;
2561 svcxdr_init_encode_from_buffer(&xdr
, &dummy
, *p
, words
<< 2);
2562 ret
= nfsd4_encode_fattr(&xdr
, fhp
, exp
, dentry
, bmval
, rqstp
,
2568 static inline int attributes_need_mount(u32
*bmval
)
2570 if (bmval
[0] & ~(FATTR4_WORD0_RDATTR_ERROR
| FATTR4_WORD0_LEASE_TIME
))
2572 if (bmval
[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID
)
2578 nfsd4_encode_dirent_fattr(struct xdr_stream
*xdr
, struct nfsd4_readdir
*cd
,
2579 const char *name
, int namlen
)
2581 struct svc_export
*exp
= cd
->rd_fhp
->fh_export
;
2582 struct dentry
*dentry
;
2584 int ignore_crossmnt
= 0;
2586 dentry
= lookup_one_len(name
, cd
->rd_fhp
->fh_dentry
, namlen
);
2588 return nfserrno(PTR_ERR(dentry
));
2589 if (!dentry
->d_inode
) {
2591 * nfsd_buffered_readdir drops the i_mutex between
2592 * readdir and calling this callback, leaving a window
2593 * where this directory entry could have gone away.
2596 return nfserr_noent
;
2601 * In the case of a mountpoint, the client may be asking for
2602 * attributes that are only properties of the underlying filesystem
2603 * as opposed to the cross-mounted file system. In such a case,
2604 * we will not follow the cross mount and will fill the attribtutes
2605 * directly from the mountpoint dentry.
2607 if (nfsd_mountpoint(dentry
, exp
)) {
2610 if (!(exp
->ex_flags
& NFSEXP_V4ROOT
)
2611 && !attributes_need_mount(cd
->rd_bmval
)) {
2612 ignore_crossmnt
= 1;
2616 * Why the heck aren't we just using nfsd_lookup??
2617 * Different "."/".." handling? Something else?
2618 * At least, add a comment here to explain....
2620 err
= nfsd_cross_mnt(cd
->rd_rqstp
, &dentry
, &exp
);
2622 nfserr
= nfserrno(err
);
2625 nfserr
= check_nfsd_access(exp
, cd
->rd_rqstp
);
2631 nfserr
= nfsd4_encode_fattr(xdr
, NULL
, exp
, dentry
, cd
->rd_bmval
,
2632 cd
->rd_rqstp
, ignore_crossmnt
);
2640 nfsd4_encode_rdattr_error(struct xdr_stream
*xdr
, __be32 nfserr
)
2644 p
= xdr_reserve_space(xdr
, 20);
2648 *p
++ = htonl(FATTR4_WORD0_RDATTR_ERROR
); /* bmval0 */
2649 *p
++ = htonl(0); /* bmval1 */
2651 *p
++ = htonl(4); /* attribute length */
2652 *p
++ = nfserr
; /* no htonl */
2657 nfsd4_encode_dirent(void *ccdv
, const char *name
, int namlen
,
2658 loff_t offset
, u64 ino
, unsigned int d_type
)
2660 struct readdir_cd
*ccd
= ccdv
;
2661 struct nfsd4_readdir
*cd
= container_of(ccd
, struct nfsd4_readdir
, common
);
2662 struct xdr_stream
*xdr
= cd
->xdr
;
2663 int start_offset
= xdr
->buf
->len
;
2666 __be32 nfserr
= nfserr_toosmall
;
2670 /* In nfsv4, "." and ".." never make it onto the wire.. */
2671 if (name
&& isdotent(name
, namlen
)) {
2672 cd
->common
.err
= nfs_ok
;
2676 if (cd
->cookie_offset
) {
2677 wire_offset
= cpu_to_be64(offset
);
2678 write_bytes_to_xdr_buf(xdr
->buf
, cd
->cookie_offset
,
2682 p
= xdr_reserve_space(xdr
, 4);
2685 *p
++ = xdr_one
; /* mark entry present */
2686 cookie_offset
= xdr
->buf
->len
;
2687 p
= xdr_reserve_space(xdr
, 3*4 + namlen
);
2690 p
= xdr_encode_hyper(p
, NFS_OFFSET_MAX
); /* offset of next entry */
2691 p
= xdr_encode_array(p
, name
, namlen
); /* name length & name */
2693 nfserr
= nfsd4_encode_dirent_fattr(xdr
, cd
, name
, namlen
);
2697 case nfserr_resource
:
2698 nfserr
= nfserr_toosmall
;
2701 xdr_truncate_encode(xdr
, start_offset
);
2705 * If the client requested the RDATTR_ERROR attribute,
2706 * we stuff the error code into this attribute
2707 * and continue. If this attribute was not requested,
2708 * then in accordance with the spec, we fail the
2709 * entire READDIR operation(!)
2711 if (!(cd
->rd_bmval
[0] & FATTR4_WORD0_RDATTR_ERROR
))
2713 p
= nfsd4_encode_rdattr_error(xdr
, nfserr
);
2715 nfserr
= nfserr_toosmall
;
2719 nfserr
= nfserr_toosmall
;
2720 entry_bytes
= xdr
->buf
->len
- start_offset
;
2721 if (entry_bytes
> cd
->rd_maxcount
)
2723 cd
->rd_maxcount
-= entry_bytes
;
2724 if (!cd
->rd_dircount
)
2727 cd
->cookie_offset
= cookie_offset
;
2729 cd
->common
.err
= nfs_ok
;
2732 xdr_truncate_encode(xdr
, start_offset
);
2733 cd
->common
.err
= nfserr
;
2738 nfsd4_encode_stateid(struct xdr_stream
*xdr
, stateid_t
*sid
)
2742 p
= xdr_reserve_space(xdr
, sizeof(stateid_t
));
2744 return nfserr_resource
;
2745 *p
++ = cpu_to_be32(sid
->si_generation
);
2746 p
= xdr_encode_opaque_fixed(p
, &sid
->si_opaque
,
2747 sizeof(stateid_opaque_t
));
2752 nfsd4_encode_access(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_access
*access
)
2754 struct xdr_stream
*xdr
= &resp
->xdr
;
2758 p
= xdr_reserve_space(xdr
, 8);
2760 return nfserr_resource
;
2761 *p
++ = cpu_to_be32(access
->ac_supported
);
2762 *p
++ = cpu_to_be32(access
->ac_resp_access
);
2767 static __be32
nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_bind_conn_to_session
*bcts
)
2769 struct xdr_stream
*xdr
= &resp
->xdr
;
2773 p
= xdr_reserve_space(xdr
, NFS4_MAX_SESSIONID_LEN
+ 8);
2775 return nfserr_resource
;
2776 p
= xdr_encode_opaque_fixed(p
, bcts
->sessionid
.data
,
2777 NFS4_MAX_SESSIONID_LEN
);
2778 *p
++ = cpu_to_be32(bcts
->dir
);
2779 /* Sorry, we do not yet support RDMA over 4.1: */
2780 *p
++ = cpu_to_be32(0);
2786 nfsd4_encode_close(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_close
*close
)
2788 struct xdr_stream
*xdr
= &resp
->xdr
;
2791 nfserr
= nfsd4_encode_stateid(xdr
, &close
->cl_stateid
);
2798 nfsd4_encode_commit(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_commit
*commit
)
2800 struct xdr_stream
*xdr
= &resp
->xdr
;
2804 p
= xdr_reserve_space(xdr
, NFS4_VERIFIER_SIZE
);
2806 return nfserr_resource
;
2807 p
= xdr_encode_opaque_fixed(p
, commit
->co_verf
.data
,
2808 NFS4_VERIFIER_SIZE
);
2814 nfsd4_encode_create(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_create
*create
)
2816 struct xdr_stream
*xdr
= &resp
->xdr
;
2820 p
= xdr_reserve_space(xdr
, 32);
2822 return nfserr_resource
;
2823 p
= encode_cinfo(p
, &create
->cr_cinfo
);
2824 *p
++ = cpu_to_be32(2);
2825 *p
++ = cpu_to_be32(create
->cr_bmval
[0]);
2826 *p
++ = cpu_to_be32(create
->cr_bmval
[1]);
2832 nfsd4_encode_getattr(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_getattr
*getattr
)
2834 struct svc_fh
*fhp
= getattr
->ga_fhp
;
2835 struct xdr_stream
*xdr
= &resp
->xdr
;
2840 nfserr
= nfsd4_encode_fattr(xdr
, fhp
, fhp
->fh_export
, fhp
->fh_dentry
,
2847 nfsd4_encode_getfh(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct svc_fh
**fhpp
)
2849 struct xdr_stream
*xdr
= &resp
->xdr
;
2850 struct svc_fh
*fhp
= *fhpp
;
2855 len
= fhp
->fh_handle
.fh_size
;
2856 p
= xdr_reserve_space(xdr
, len
+ 4);
2858 return nfserr_resource
;
2859 p
= xdr_encode_opaque(p
, &fhp
->fh_handle
.fh_base
, len
);
2865 * Including all fields other than the name, a LOCK4denied structure requires
2866 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
2869 nfsd4_encode_lock_denied(struct xdr_stream
*xdr
, struct nfsd4_lock_denied
*ld
)
2871 struct xdr_netobj
*conf
= &ld
->ld_owner
;
2875 p
= xdr_reserve_space(xdr
, 32 + XDR_LEN(conf
->len
));
2878 * Don't fail to return the result just because we can't
2879 * return the conflicting open:
2887 return nfserr_resource
;
2889 p
= xdr_encode_hyper(p
, ld
->ld_start
);
2890 p
= xdr_encode_hyper(p
, ld
->ld_length
);
2891 *p
++ = cpu_to_be32(ld
->ld_type
);
2893 p
= xdr_encode_opaque_fixed(p
, &ld
->ld_clientid
, 8);
2894 p
= xdr_encode_opaque(p
, conf
->data
, conf
->len
);
2896 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */
2897 p
= xdr_encode_hyper(p
, (u64
)0); /* clientid */
2898 *p
++ = cpu_to_be32(0); /* length of owner name */
2900 return nfserr_denied
;
2904 nfsd4_encode_lock(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_lock
*lock
)
2906 struct xdr_stream
*xdr
= &resp
->xdr
;
2909 nfserr
= nfsd4_encode_stateid(xdr
, &lock
->lk_resp_stateid
);
2910 else if (nfserr
== nfserr_denied
)
2911 nfserr
= nfsd4_encode_lock_denied(xdr
, &lock
->lk_denied
);
2917 nfsd4_encode_lockt(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_lockt
*lockt
)
2919 struct xdr_stream
*xdr
= &resp
->xdr
;
2921 if (nfserr
== nfserr_denied
)
2922 nfsd4_encode_lock_denied(xdr
, &lockt
->lt_denied
);
2927 nfsd4_encode_locku(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_locku
*locku
)
2929 struct xdr_stream
*xdr
= &resp
->xdr
;
2932 nfserr
= nfsd4_encode_stateid(xdr
, &locku
->lu_stateid
);
2939 nfsd4_encode_link(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_link
*link
)
2941 struct xdr_stream
*xdr
= &resp
->xdr
;
2945 p
= xdr_reserve_space(xdr
, 20);
2947 return nfserr_resource
;
2948 p
= encode_cinfo(p
, &link
->li_cinfo
);
2955 nfsd4_encode_open(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_open
*open
)
2957 struct xdr_stream
*xdr
= &resp
->xdr
;
2963 nfserr
= nfsd4_encode_stateid(xdr
, &open
->op_stateid
);
2966 p
= xdr_reserve_space(xdr
, 40);
2968 return nfserr_resource
;
2969 p
= encode_cinfo(p
, &open
->op_cinfo
);
2970 *p
++ = cpu_to_be32(open
->op_rflags
);
2971 *p
++ = cpu_to_be32(2);
2972 *p
++ = cpu_to_be32(open
->op_bmval
[0]);
2973 *p
++ = cpu_to_be32(open
->op_bmval
[1]);
2974 *p
++ = cpu_to_be32(open
->op_delegate_type
);
2976 switch (open
->op_delegate_type
) {
2977 case NFS4_OPEN_DELEGATE_NONE
:
2979 case NFS4_OPEN_DELEGATE_READ
:
2980 nfserr
= nfsd4_encode_stateid(xdr
, &open
->op_delegate_stateid
);
2983 p
= xdr_reserve_space(xdr
, 20);
2985 return nfserr_resource
;
2986 *p
++ = cpu_to_be32(open
->op_recall
);
2989 * TODO: ACE's in delegations
2991 *p
++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE
);
2992 *p
++ = cpu_to_be32(0);
2993 *p
++ = cpu_to_be32(0);
2994 *p
++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
2996 case NFS4_OPEN_DELEGATE_WRITE
:
2997 nfserr
= nfsd4_encode_stateid(xdr
, &open
->op_delegate_stateid
);
3000 p
= xdr_reserve_space(xdr
, 32);
3002 return nfserr_resource
;
3003 *p
++ = cpu_to_be32(0);
3006 * TODO: space_limit's in delegations
3008 *p
++ = cpu_to_be32(NFS4_LIMIT_SIZE
);
3009 *p
++ = cpu_to_be32(~(u32
)0);
3010 *p
++ = cpu_to_be32(~(u32
)0);
3013 * TODO: ACE's in delegations
3015 *p
++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE
);
3016 *p
++ = cpu_to_be32(0);
3017 *p
++ = cpu_to_be32(0);
3018 *p
++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */
3020 case NFS4_OPEN_DELEGATE_NONE_EXT
: /* 4.1 */
3021 switch (open
->op_why_no_deleg
) {
3022 case WND4_CONTENTION
:
3024 p
= xdr_reserve_space(xdr
, 8);
3026 return nfserr_resource
;
3027 *p
++ = cpu_to_be32(open
->op_why_no_deleg
);
3028 /* deleg signaling not supported yet: */
3029 *p
++ = cpu_to_be32(0);
3032 p
= xdr_reserve_space(xdr
, 4);
3034 return nfserr_resource
;
3035 *p
++ = cpu_to_be32(open
->op_why_no_deleg
);
3041 /* XXX save filehandle here */
3047 nfsd4_encode_open_confirm(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_open_confirm
*oc
)
3049 struct xdr_stream
*xdr
= &resp
->xdr
;
3052 nfserr
= nfsd4_encode_stateid(xdr
, &oc
->oc_resp_stateid
);
3058 nfsd4_encode_open_downgrade(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_open_downgrade
*od
)
3060 struct xdr_stream
*xdr
= &resp
->xdr
;
3063 nfserr
= nfsd4_encode_stateid(xdr
, &od
->od_stateid
);
3068 static __be32
nfsd4_encode_splice_read(
3069 struct nfsd4_compoundres
*resp
,
3070 struct nfsd4_read
*read
,
3071 struct file
*file
, unsigned long maxcount
)
3073 struct xdr_stream
*xdr
= &resp
->xdr
;
3074 struct xdr_buf
*buf
= xdr
->buf
;
3078 __be32
*p
= xdr
->p
- 2;
3081 * Don't inline pages unless we know there's room for eof,
3082 * count, and possible padding:
3084 if (xdr
->end
- xdr
->p
< 3)
3085 return nfserr_resource
;
3087 nfserr
= nfsd_splice_read(read
->rd_rqstp
, file
,
3088 read
->rd_offset
, &maxcount
);
3091 * nfsd_splice_actor may have already messed with the
3092 * page length; reset it so as not to confuse
3093 * xdr_truncate_encode:
3099 eof
= (read
->rd_offset
+ maxcount
>=
3100 read
->rd_fhp
->fh_dentry
->d_inode
->i_size
);
3102 *(p
++) = htonl(eof
);
3103 *(p
++) = htonl(maxcount
);
3105 buf
->page_len
= maxcount
;
3106 buf
->len
+= maxcount
;
3107 xdr
->page_ptr
+= (maxcount
+ PAGE_SIZE
- 1) / PAGE_SIZE
;
3109 /* Use rest of head for padding and remaining ops: */
3110 buf
->tail
[0].iov_base
= xdr
->p
;
3111 buf
->tail
[0].iov_len
= 0;
3112 xdr
->iov
= buf
->tail
;
3114 int pad
= 4 - (maxcount
&3);
3118 buf
->tail
[0].iov_base
+= maxcount
&3;
3119 buf
->tail
[0].iov_len
= pad
;
3123 space_left
= min_t(int, (void *)xdr
->end
- (void *)xdr
->p
,
3124 buf
->buflen
- buf
->len
);
3125 buf
->buflen
= buf
->len
+ space_left
;
3126 xdr
->end
= (__be32
*)((void *)xdr
->end
+ space_left
);
3131 static __be32
nfsd4_encode_readv(struct nfsd4_compoundres
*resp
,
3132 struct nfsd4_read
*read
,
3133 struct file
*file
, unsigned long maxcount
)
3135 struct xdr_stream
*xdr
= &resp
->xdr
;
3138 int starting_len
= xdr
->buf
->len
- 8;
3150 thislen
= (void *)xdr
->end
- (void *)xdr
->p
;
3153 p
= xdr_reserve_space(xdr
, (thislen
+3)&~3);
3155 resp
->rqstp
->rq_vec
[v
].iov_base
= p
;
3156 resp
->rqstp
->rq_vec
[v
].iov_len
= thislen
;
3161 thislen
= min_t(long, len
, PAGE_SIZE
);
3162 p
= xdr_reserve_space(xdr
, (thislen
+3)&~3);
3164 resp
->rqstp
->rq_vec
[v
].iov_base
= p
;
3165 resp
->rqstp
->rq_vec
[v
].iov_len
= thislen
;
3171 nfserr
= nfsd_readv(file
, read
->rd_offset
, resp
->rqstp
->rq_vec
,
3172 read
->rd_vlen
, &maxcount
);
3175 xdr_truncate_encode(xdr
, starting_len
+ 8 + ((maxcount
+3)&~3));
3177 eof
= (read
->rd_offset
+ maxcount
>=
3178 read
->rd_fhp
->fh_dentry
->d_inode
->i_size
);
3181 write_bytes_to_xdr_buf(xdr
->buf
, starting_len
, &tmp
, 4);
3182 tmp
= htonl(maxcount
);
3183 write_bytes_to_xdr_buf(xdr
->buf
, starting_len
+ 4, &tmp
, 4);
3185 pad
= (maxcount
&3) ? 4 - (maxcount
&3) : 0;
3186 write_bytes_to_xdr_buf(xdr
->buf
, starting_len
+ 8 + maxcount
,
3193 nfsd4_encode_read(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3194 struct nfsd4_read
*read
)
3196 unsigned long maxcount
;
3197 struct xdr_stream
*xdr
= &resp
->xdr
;
3198 struct file
*file
= read
->rd_filp
;
3199 int starting_len
= xdr
->buf
->len
;
3207 p
= xdr_reserve_space(xdr
, 8); /* eof flag and byte count */
3209 WARN_ON_ONCE(resp
->rqstp
->rq_splice_ok
);
3210 return nfserr_resource
;
3212 if (resp
->xdr
.buf
->page_len
&& resp
->rqstp
->rq_splice_ok
) {
3214 return nfserr_resource
;
3216 xdr_commit_encode(xdr
);
3218 maxcount
= svc_max_payload(resp
->rqstp
);
3219 if (maxcount
> xdr
->buf
->buflen
- xdr
->buf
->len
)
3220 maxcount
= xdr
->buf
->buflen
- xdr
->buf
->len
;
3221 if (maxcount
> read
->rd_length
)
3222 maxcount
= read
->rd_length
;
3224 if (!read
->rd_filp
) {
3225 err
= nfsd_get_tmp_read_open(resp
->rqstp
, read
->rd_fhp
,
3231 if (file
->f_op
->splice_read
&& resp
->rqstp
->rq_splice_ok
)
3232 err
= nfsd4_encode_splice_read(resp
, read
, file
, maxcount
);
3234 err
= nfsd4_encode_readv(resp
, read
, file
, maxcount
);
3237 nfsd_put_tmp_read_open(file
, ra
);
3241 xdr_truncate_encode(xdr
, starting_len
);
3246 nfsd4_encode_readlink(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_readlink
*readlink
)
3251 struct xdr_stream
*xdr
= &resp
->xdr
;
3252 int length_offset
= xdr
->buf
->len
;
3258 p
= xdr_reserve_space(xdr
, 4);
3260 return nfserr_resource
;
3261 maxcount
= PAGE_SIZE
;
3263 p
= xdr_reserve_space(xdr
, maxcount
);
3265 return nfserr_resource
;
3267 * XXX: By default, the ->readlink() VFS op will truncate symlinks
3268 * if they would overflow the buffer. Is this kosher in NFSv4? If
3269 * not, one easy fix is: if ->readlink() precisely fills the buffer,
3270 * assume that truncation occurred, and return NFS4ERR_RESOURCE.
3272 nfserr
= nfsd_readlink(readlink
->rl_rqstp
, readlink
->rl_fhp
,
3273 (char *)p
, &maxcount
);
3274 if (nfserr
== nfserr_isdir
)
3275 nfserr
= nfserr_inval
;
3277 xdr_truncate_encode(xdr
, length_offset
);
3281 wire_count
= htonl(maxcount
);
3282 write_bytes_to_xdr_buf(xdr
->buf
, length_offset
, &wire_count
, 4);
3283 xdr_truncate_encode(xdr
, length_offset
+ 4 + ALIGN(maxcount
, 4));
3285 write_bytes_to_xdr_buf(xdr
->buf
, length_offset
+ 4 + maxcount
,
3286 &zero
, 4 - (maxcount
&3));
3291 nfsd4_encode_readdir(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_readdir
*readdir
)
3297 struct xdr_stream
*xdr
= &resp
->xdr
;
3298 int starting_len
= xdr
->buf
->len
;
3304 p
= xdr_reserve_space(xdr
, NFS4_VERIFIER_SIZE
);
3306 return nfserr_resource
;
3308 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
3309 *p
++ = cpu_to_be32(0);
3310 *p
++ = cpu_to_be32(0);
3311 resp
->xdr
.buf
->head
[0].iov_len
= ((char *)resp
->xdr
.p
)
3312 - (char *)resp
->xdr
.buf
->head
[0].iov_base
;
3315 * Number of bytes left for directory entries allowing for the
3316 * final 8 bytes of the readdir and a following failed op:
3318 bytes_left
= xdr
->buf
->buflen
- xdr
->buf
->len
3319 - COMPOUND_ERR_SLACK_SPACE
- 8;
3320 if (bytes_left
< 0) {
3321 nfserr
= nfserr_resource
;
3324 maxcount
= min_t(u32
, readdir
->rd_maxcount
, INT_MAX
);
3326 * Note the rfc defines rd_maxcount as the size of the
3327 * READDIR4resok structure, which includes the verifier above
3328 * and the 8 bytes encoded at the end of this function:
3330 if (maxcount
< 16) {
3331 nfserr
= nfserr_toosmall
;
3334 maxcount
= min_t(int, maxcount
-16, bytes_left
);
3337 readdir
->rd_maxcount
= maxcount
;
3338 readdir
->common
.err
= 0;
3339 readdir
->cookie_offset
= 0;
3341 offset
= readdir
->rd_cookie
;
3342 nfserr
= nfsd_readdir(readdir
->rd_rqstp
, readdir
->rd_fhp
,
3344 &readdir
->common
, nfsd4_encode_dirent
);
3345 if (nfserr
== nfs_ok
&&
3346 readdir
->common
.err
== nfserr_toosmall
&&
3347 xdr
->buf
->len
== starting_len
+ 8) {
3348 /* nothing encoded; which limit did we hit?: */
3349 if (maxcount
- 16 < bytes_left
)
3350 /* It was the fault of rd_maxcount: */
3351 nfserr
= nfserr_toosmall
;
3353 /* We ran out of buffer space: */
3354 nfserr
= nfserr_resource
;
3359 if (readdir
->cookie_offset
) {
3360 wire_offset
= cpu_to_be64(offset
);
3361 write_bytes_to_xdr_buf(xdr
->buf
, readdir
->cookie_offset
,
3365 p
= xdr_reserve_space(xdr
, 8);
3370 *p
++ = 0; /* no more entries */
3371 *p
++ = htonl(readdir
->common
.err
== nfserr_eof
);
3375 xdr_truncate_encode(xdr
, starting_len
);
3380 nfsd4_encode_remove(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_remove
*remove
)
3382 struct xdr_stream
*xdr
= &resp
->xdr
;
3386 p
= xdr_reserve_space(xdr
, 20);
3388 return nfserr_resource
;
3389 p
= encode_cinfo(p
, &remove
->rm_cinfo
);
3395 nfsd4_encode_rename(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_rename
*rename
)
3397 struct xdr_stream
*xdr
= &resp
->xdr
;
3401 p
= xdr_reserve_space(xdr
, 40);
3403 return nfserr_resource
;
3404 p
= encode_cinfo(p
, &rename
->rn_sinfo
);
3405 p
= encode_cinfo(p
, &rename
->rn_tinfo
);
3411 nfsd4_do_encode_secinfo(struct xdr_stream
*xdr
,
3412 __be32 nfserr
, struct svc_export
*exp
)
3414 u32 i
, nflavs
, supported
;
3415 struct exp_flavor_info
*flavs
;
3416 struct exp_flavor_info def_flavs
[2];
3417 __be32
*p
, *flavorsp
;
3418 static bool report
= true;
3422 nfserr
= nfserr_resource
;
3423 if (exp
->ex_nflavors
) {
3424 flavs
= exp
->ex_flavors
;
3425 nflavs
= exp
->ex_nflavors
;
3426 } else { /* Handling of some defaults in absence of real secinfo: */
3428 if (exp
->ex_client
->flavour
->flavour
== RPC_AUTH_UNIX
) {
3430 flavs
[0].pseudoflavor
= RPC_AUTH_UNIX
;
3431 flavs
[1].pseudoflavor
= RPC_AUTH_NULL
;
3432 } else if (exp
->ex_client
->flavour
->flavour
== RPC_AUTH_GSS
) {
3434 flavs
[0].pseudoflavor
3435 = svcauth_gss_flavor(exp
->ex_client
);
3438 flavs
[0].pseudoflavor
3439 = exp
->ex_client
->flavour
->flavour
;
3444 p
= xdr_reserve_space(xdr
, 4);
3447 flavorsp
= p
++; /* to be backfilled later */
3449 for (i
= 0; i
< nflavs
; i
++) {
3450 rpc_authflavor_t pf
= flavs
[i
].pseudoflavor
;
3451 struct rpcsec_gss_info info
;
3453 if (rpcauth_get_gssinfo(pf
, &info
) == 0) {
3455 p
= xdr_reserve_space(xdr
, 4 + 4 +
3456 XDR_LEN(info
.oid
.len
) + 4 + 4);
3459 *p
++ = cpu_to_be32(RPC_AUTH_GSS
);
3460 p
= xdr_encode_opaque(p
, info
.oid
.data
, info
.oid
.len
);
3461 *p
++ = cpu_to_be32(info
.qop
);
3462 *p
++ = cpu_to_be32(info
.service
);
3463 } else if (pf
< RPC_AUTH_MAXFLAVOR
) {
3465 p
= xdr_reserve_space(xdr
, 4);
3468 *p
++ = cpu_to_be32(pf
);
3471 pr_warn("NFS: SECINFO: security flavor %u "
3472 "is not supported\n", pf
);
3476 if (nflavs
!= supported
)
3478 *flavorsp
= htonl(supported
);
3487 nfsd4_encode_secinfo(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3488 struct nfsd4_secinfo
*secinfo
)
3490 struct xdr_stream
*xdr
= &resp
->xdr
;
3492 return nfsd4_do_encode_secinfo(xdr
, nfserr
, secinfo
->si_exp
);
3496 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3497 struct nfsd4_secinfo_no_name
*secinfo
)
3499 struct xdr_stream
*xdr
= &resp
->xdr
;
3501 return nfsd4_do_encode_secinfo(xdr
, nfserr
, secinfo
->sin_exp
);
3505 * The SETATTR encode routine is special -- it always encodes a bitmap,
3506 * regardless of the error status.
3509 nfsd4_encode_setattr(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_setattr
*setattr
)
3511 struct xdr_stream
*xdr
= &resp
->xdr
;
3514 p
= xdr_reserve_space(xdr
, 16);
3516 return nfserr_resource
;
3518 *p
++ = cpu_to_be32(3);
3519 *p
++ = cpu_to_be32(0);
3520 *p
++ = cpu_to_be32(0);
3521 *p
++ = cpu_to_be32(0);
3524 *p
++ = cpu_to_be32(3);
3525 *p
++ = cpu_to_be32(setattr
->sa_bmval
[0]);
3526 *p
++ = cpu_to_be32(setattr
->sa_bmval
[1]);
3527 *p
++ = cpu_to_be32(setattr
->sa_bmval
[2]);
3533 nfsd4_encode_setclientid(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_setclientid
*scd
)
3535 struct xdr_stream
*xdr
= &resp
->xdr
;
3539 p
= xdr_reserve_space(xdr
, 8 + NFS4_VERIFIER_SIZE
);
3541 return nfserr_resource
;
3542 p
= xdr_encode_opaque_fixed(p
, &scd
->se_clientid
, 8);
3543 p
= xdr_encode_opaque_fixed(p
, &scd
->se_confirm
,
3544 NFS4_VERIFIER_SIZE
);
3546 else if (nfserr
== nfserr_clid_inuse
) {
3547 p
= xdr_reserve_space(xdr
, 8);
3549 return nfserr_resource
;
3550 *p
++ = cpu_to_be32(0);
3551 *p
++ = cpu_to_be32(0);
3557 nfsd4_encode_write(struct nfsd4_compoundres
*resp
, __be32 nfserr
, struct nfsd4_write
*write
)
3559 struct xdr_stream
*xdr
= &resp
->xdr
;
3563 p
= xdr_reserve_space(xdr
, 16);
3565 return nfserr_resource
;
3566 *p
++ = cpu_to_be32(write
->wr_bytes_written
);
3567 *p
++ = cpu_to_be32(write
->wr_how_written
);
3568 p
= xdr_encode_opaque_fixed(p
, write
->wr_verifier
.data
,
3569 NFS4_VERIFIER_SIZE
);
3574 static const u32 nfs4_minimal_spo_must_enforce
[2] = {
3575 [1] = 1 << (OP_BIND_CONN_TO_SESSION
- 32) |
3576 1 << (OP_EXCHANGE_ID
- 32) |
3577 1 << (OP_CREATE_SESSION
- 32) |
3578 1 << (OP_DESTROY_SESSION
- 32) |
3579 1 << (OP_DESTROY_CLIENTID
- 32)
3583 nfsd4_encode_exchange_id(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3584 struct nfsd4_exchange_id
*exid
)
3586 struct xdr_stream
*xdr
= &resp
->xdr
;
3591 int server_scope_sz
;
3592 uint64_t minor_id
= 0;
3597 major_id
= utsname()->nodename
;
3598 major_id_sz
= strlen(major_id
);
3599 server_scope
= utsname()->nodename
;
3600 server_scope_sz
= strlen(server_scope
);
3602 p
= xdr_reserve_space(xdr
,
3603 8 /* eir_clientid */ +
3604 4 /* eir_sequenceid */ +
3608 return nfserr_resource
;
3610 p
= xdr_encode_opaque_fixed(p
, &exid
->clientid
, 8);
3611 *p
++ = cpu_to_be32(exid
->seqid
);
3612 *p
++ = cpu_to_be32(exid
->flags
);
3614 *p
++ = cpu_to_be32(exid
->spa_how
);
3616 switch (exid
->spa_how
) {
3620 /* spo_must_enforce, spo_must_allow */
3621 p
= xdr_reserve_space(xdr
, 16);
3623 return nfserr_resource
;
3625 /* spo_must_enforce bitmap: */
3626 *p
++ = cpu_to_be32(2);
3627 *p
++ = cpu_to_be32(nfs4_minimal_spo_must_enforce
[0]);
3628 *p
++ = cpu_to_be32(nfs4_minimal_spo_must_enforce
[1]);
3629 /* empty spo_must_allow bitmap: */
3630 *p
++ = cpu_to_be32(0);
3637 p
= xdr_reserve_space(xdr
,
3638 8 /* so_minor_id */ +
3639 4 /* so_major_id.len */ +
3640 (XDR_QUADLEN(major_id_sz
) * 4) +
3641 4 /* eir_server_scope.len */ +
3642 (XDR_QUADLEN(server_scope_sz
) * 4) +
3643 4 /* eir_server_impl_id.count (0) */);
3645 return nfserr_resource
;
3647 /* The server_owner struct */
3648 p
= xdr_encode_hyper(p
, minor_id
); /* Minor id */
3650 p
= xdr_encode_opaque(p
, major_id
, major_id_sz
);
3653 p
= xdr_encode_opaque(p
, server_scope
, server_scope_sz
);
3655 /* Implementation id */
3656 *p
++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */
3661 nfsd4_encode_create_session(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3662 struct nfsd4_create_session
*sess
)
3664 struct xdr_stream
*xdr
= &resp
->xdr
;
3670 p
= xdr_reserve_space(xdr
, 24);
3672 return nfserr_resource
;
3673 p
= xdr_encode_opaque_fixed(p
, sess
->sessionid
.data
,
3674 NFS4_MAX_SESSIONID_LEN
);
3675 *p
++ = cpu_to_be32(sess
->seqid
);
3676 *p
++ = cpu_to_be32(sess
->flags
);
3678 p
= xdr_reserve_space(xdr
, 28);
3680 return nfserr_resource
;
3681 *p
++ = cpu_to_be32(0); /* headerpadsz */
3682 *p
++ = cpu_to_be32(sess
->fore_channel
.maxreq_sz
);
3683 *p
++ = cpu_to_be32(sess
->fore_channel
.maxresp_sz
);
3684 *p
++ = cpu_to_be32(sess
->fore_channel
.maxresp_cached
);
3685 *p
++ = cpu_to_be32(sess
->fore_channel
.maxops
);
3686 *p
++ = cpu_to_be32(sess
->fore_channel
.maxreqs
);
3687 *p
++ = cpu_to_be32(sess
->fore_channel
.nr_rdma_attrs
);
3689 if (sess
->fore_channel
.nr_rdma_attrs
) {
3690 p
= xdr_reserve_space(xdr
, 4);
3692 return nfserr_resource
;
3693 *p
++ = cpu_to_be32(sess
->fore_channel
.rdma_attrs
);
3696 p
= xdr_reserve_space(xdr
, 28);
3698 return nfserr_resource
;
3699 *p
++ = cpu_to_be32(0); /* headerpadsz */
3700 *p
++ = cpu_to_be32(sess
->back_channel
.maxreq_sz
);
3701 *p
++ = cpu_to_be32(sess
->back_channel
.maxresp_sz
);
3702 *p
++ = cpu_to_be32(sess
->back_channel
.maxresp_cached
);
3703 *p
++ = cpu_to_be32(sess
->back_channel
.maxops
);
3704 *p
++ = cpu_to_be32(sess
->back_channel
.maxreqs
);
3705 *p
++ = cpu_to_be32(sess
->back_channel
.nr_rdma_attrs
);
3707 if (sess
->back_channel
.nr_rdma_attrs
) {
3708 p
= xdr_reserve_space(xdr
, 4);
3710 return nfserr_resource
;
3711 *p
++ = cpu_to_be32(sess
->back_channel
.rdma_attrs
);
3717 nfsd4_encode_sequence(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3718 struct nfsd4_sequence
*seq
)
3720 struct xdr_stream
*xdr
= &resp
->xdr
;
3726 p
= xdr_reserve_space(xdr
, NFS4_MAX_SESSIONID_LEN
+ 20);
3728 return nfserr_resource
;
3729 p
= xdr_encode_opaque_fixed(p
, seq
->sessionid
.data
,
3730 NFS4_MAX_SESSIONID_LEN
);
3731 *p
++ = cpu_to_be32(seq
->seqid
);
3732 *p
++ = cpu_to_be32(seq
->slotid
);
3733 /* Note slotid's are numbered from zero: */
3734 *p
++ = cpu_to_be32(seq
->maxslots
- 1); /* sr_highest_slotid */
3735 *p
++ = cpu_to_be32(seq
->maxslots
- 1); /* sr_target_highest_slotid */
3736 *p
++ = cpu_to_be32(seq
->status_flags
);
3738 resp
->cstate
.data_offset
= xdr
->buf
->len
; /* DRC cache data pointer */
3743 nfsd4_encode_test_stateid(struct nfsd4_compoundres
*resp
, __be32 nfserr
,
3744 struct nfsd4_test_stateid
*test_stateid
)
3746 struct xdr_stream
*xdr
= &resp
->xdr
;
3747 struct nfsd4_test_stateid_id
*stateid
, *next
;
3753 p
= xdr_reserve_space(xdr
, 4 + (4 * test_stateid
->ts_num_ids
));
3755 return nfserr_resource
;
3756 *p
++ = htonl(test_stateid
->ts_num_ids
);
3758 list_for_each_entry_safe(stateid
, next
, &test_stateid
->ts_stateid_list
, ts_id_list
) {
3759 *p
++ = stateid
->ts_id_status
;
3766 nfsd4_encode_noop(struct nfsd4_compoundres
*resp
, __be32 nfserr
, void *p
)
3771 typedef __be32(* nfsd4_enc
)(struct nfsd4_compoundres
*, __be32
, void *);
3774 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
3775 * since we don't need to filter out obsolete ops as this is
3776 * done in the decoding phase.
3778 static nfsd4_enc nfsd4_enc_ops
[] = {
3779 [OP_ACCESS
] = (nfsd4_enc
)nfsd4_encode_access
,
3780 [OP_CLOSE
] = (nfsd4_enc
)nfsd4_encode_close
,
3781 [OP_COMMIT
] = (nfsd4_enc
)nfsd4_encode_commit
,
3782 [OP_CREATE
] = (nfsd4_enc
)nfsd4_encode_create
,
3783 [OP_DELEGPURGE
] = (nfsd4_enc
)nfsd4_encode_noop
,
3784 [OP_DELEGRETURN
] = (nfsd4_enc
)nfsd4_encode_noop
,
3785 [OP_GETATTR
] = (nfsd4_enc
)nfsd4_encode_getattr
,
3786 [OP_GETFH
] = (nfsd4_enc
)nfsd4_encode_getfh
,
3787 [OP_LINK
] = (nfsd4_enc
)nfsd4_encode_link
,
3788 [OP_LOCK
] = (nfsd4_enc
)nfsd4_encode_lock
,
3789 [OP_LOCKT
] = (nfsd4_enc
)nfsd4_encode_lockt
,
3790 [OP_LOCKU
] = (nfsd4_enc
)nfsd4_encode_locku
,
3791 [OP_LOOKUP
] = (nfsd4_enc
)nfsd4_encode_noop
,
3792 [OP_LOOKUPP
] = (nfsd4_enc
)nfsd4_encode_noop
,
3793 [OP_NVERIFY
] = (nfsd4_enc
)nfsd4_encode_noop
,
3794 [OP_OPEN
] = (nfsd4_enc
)nfsd4_encode_open
,
3795 [OP_OPENATTR
] = (nfsd4_enc
)nfsd4_encode_noop
,
3796 [OP_OPEN_CONFIRM
] = (nfsd4_enc
)nfsd4_encode_open_confirm
,
3797 [OP_OPEN_DOWNGRADE
] = (nfsd4_enc
)nfsd4_encode_open_downgrade
,
3798 [OP_PUTFH
] = (nfsd4_enc
)nfsd4_encode_noop
,
3799 [OP_PUTPUBFH
] = (nfsd4_enc
)nfsd4_encode_noop
,
3800 [OP_PUTROOTFH
] = (nfsd4_enc
)nfsd4_encode_noop
,
3801 [OP_READ
] = (nfsd4_enc
)nfsd4_encode_read
,
3802 [OP_READDIR
] = (nfsd4_enc
)nfsd4_encode_readdir
,
3803 [OP_READLINK
] = (nfsd4_enc
)nfsd4_encode_readlink
,
3804 [OP_REMOVE
] = (nfsd4_enc
)nfsd4_encode_remove
,
3805 [OP_RENAME
] = (nfsd4_enc
)nfsd4_encode_rename
,
3806 [OP_RENEW
] = (nfsd4_enc
)nfsd4_encode_noop
,
3807 [OP_RESTOREFH
] = (nfsd4_enc
)nfsd4_encode_noop
,
3808 [OP_SAVEFH
] = (nfsd4_enc
)nfsd4_encode_noop
,
3809 [OP_SECINFO
] = (nfsd4_enc
)nfsd4_encode_secinfo
,
3810 [OP_SETATTR
] = (nfsd4_enc
)nfsd4_encode_setattr
,
3811 [OP_SETCLIENTID
] = (nfsd4_enc
)nfsd4_encode_setclientid
,
3812 [OP_SETCLIENTID_CONFIRM
] = (nfsd4_enc
)nfsd4_encode_noop
,
3813 [OP_VERIFY
] = (nfsd4_enc
)nfsd4_encode_noop
,
3814 [OP_WRITE
] = (nfsd4_enc
)nfsd4_encode_write
,
3815 [OP_RELEASE_LOCKOWNER
] = (nfsd4_enc
)nfsd4_encode_noop
,
3817 /* NFSv4.1 operations */
3818 [OP_BACKCHANNEL_CTL
] = (nfsd4_enc
)nfsd4_encode_noop
,
3819 [OP_BIND_CONN_TO_SESSION
] = (nfsd4_enc
)nfsd4_encode_bind_conn_to_session
,
3820 [OP_EXCHANGE_ID
] = (nfsd4_enc
)nfsd4_encode_exchange_id
,
3821 [OP_CREATE_SESSION
] = (nfsd4_enc
)nfsd4_encode_create_session
,
3822 [OP_DESTROY_SESSION
] = (nfsd4_enc
)nfsd4_encode_noop
,
3823 [OP_FREE_STATEID
] = (nfsd4_enc
)nfsd4_encode_noop
,
3824 [OP_GET_DIR_DELEGATION
] = (nfsd4_enc
)nfsd4_encode_noop
,
3825 [OP_GETDEVICEINFO
] = (nfsd4_enc
)nfsd4_encode_noop
,
3826 [OP_GETDEVICELIST
] = (nfsd4_enc
)nfsd4_encode_noop
,
3827 [OP_LAYOUTCOMMIT
] = (nfsd4_enc
)nfsd4_encode_noop
,
3828 [OP_LAYOUTGET
] = (nfsd4_enc
)nfsd4_encode_noop
,
3829 [OP_LAYOUTRETURN
] = (nfsd4_enc
)nfsd4_encode_noop
,
3830 [OP_SECINFO_NO_NAME
] = (nfsd4_enc
)nfsd4_encode_secinfo_no_name
,
3831 [OP_SEQUENCE
] = (nfsd4_enc
)nfsd4_encode_sequence
,
3832 [OP_SET_SSV
] = (nfsd4_enc
)nfsd4_encode_noop
,
3833 [OP_TEST_STATEID
] = (nfsd4_enc
)nfsd4_encode_test_stateid
,
3834 [OP_WANT_DELEGATION
] = (nfsd4_enc
)nfsd4_encode_noop
,
3835 [OP_DESTROY_CLIENTID
] = (nfsd4_enc
)nfsd4_encode_noop
,
3836 [OP_RECLAIM_COMPLETE
] = (nfsd4_enc
)nfsd4_encode_noop
,
3840 * Calculate whether we still have space to encode repsize bytes.
3841 * There are two considerations:
3842 * - For NFS versions >=4.1, the size of the reply must stay within
3844 * - For all NFS versions, we must stay within limited preallocated
3847 * This is called before the operation is processed, so can only provide
3848 * an upper estimate. For some nonidempotent operations (such as
3849 * getattr), it's not necessarily a problem if that estimate is wrong,
3850 * as we can fail it after processing without significant side effects.
3852 __be32
nfsd4_check_resp_size(struct nfsd4_compoundres
*resp
, u32 respsize
)
3854 struct xdr_buf
*buf
= &resp
->rqstp
->rq_res
;
3855 struct nfsd4_slot
*slot
= resp
->cstate
.slot
;
3857 if (buf
->len
+ respsize
<= buf
->buflen
)
3859 if (!nfsd4_has_session(&resp
->cstate
))
3860 return nfserr_resource
;
3861 if (slot
->sl_flags
& NFSD4_SLOT_CACHETHIS
) {
3863 return nfserr_rep_too_big_to_cache
;
3865 return nfserr_rep_too_big
;
3869 nfsd4_encode_operation(struct nfsd4_compoundres
*resp
, struct nfsd4_op
*op
)
3871 struct xdr_stream
*xdr
= &resp
->xdr
;
3872 struct nfs4_stateowner
*so
= resp
->cstate
.replay_owner
;
3873 struct svc_rqst
*rqstp
= resp
->rqstp
;
3874 int post_err_offset
;
3878 p
= xdr_reserve_space(xdr
, 8);
3883 *p
++ = cpu_to_be32(op
->opnum
);
3884 post_err_offset
= xdr
->buf
->len
;
3886 if (op
->opnum
== OP_ILLEGAL
)
3888 BUG_ON(op
->opnum
< 0 || op
->opnum
>= ARRAY_SIZE(nfsd4_enc_ops
) ||
3889 !nfsd4_enc_ops
[op
->opnum
]);
3890 encoder
= nfsd4_enc_ops
[op
->opnum
];
3891 op
->status
= encoder(resp
, op
->status
, &op
->u
);
3892 xdr_commit_encode(xdr
);
3894 /* nfsd4_check_resp_size guarantees enough room for error status */
3896 int space_needed
= 0;
3897 if (!nfsd4_last_compound_op(rqstp
))
3898 space_needed
= COMPOUND_ERR_SLACK_SPACE
;
3899 op
->status
= nfsd4_check_resp_size(resp
, space_needed
);
3901 if (op
->status
== nfserr_resource
&& nfsd4_has_session(&resp
->cstate
)) {
3902 struct nfsd4_slot
*slot
= resp
->cstate
.slot
;
3904 if (slot
->sl_flags
& NFSD4_SLOT_CACHETHIS
)
3905 op
->status
= nfserr_rep_too_big_to_cache
;
3907 op
->status
= nfserr_rep_too_big
;
3909 if (op
->status
== nfserr_resource
||
3910 op
->status
== nfserr_rep_too_big
||
3911 op
->status
== nfserr_rep_too_big_to_cache
) {
3913 * The operation may have already been encoded or
3914 * partially encoded. No op returns anything additional
3915 * in the case of one of these three errors, so we can
3916 * just truncate back to after the status. But it's a
3917 * bug if we had to do this on a non-idempotent op:
3919 warn_on_nonidempotent_op(op
);
3920 xdr_truncate_encode(xdr
, post_err_offset
);
3923 int len
= xdr
->buf
->len
- post_err_offset
;
3925 so
->so_replay
.rp_status
= op
->status
;
3926 so
->so_replay
.rp_buflen
= len
;
3927 read_bytes_from_xdr_buf(xdr
->buf
, post_err_offset
,
3928 so
->so_replay
.rp_buf
, len
);
3931 /* Note that op->status is already in network byte order: */
3932 write_bytes_to_xdr_buf(xdr
->buf
, post_err_offset
- 4, &op
->status
, 4);
3936 * Encode the reply stored in the stateowner reply cache
3938 * XDR note: do not encode rp->rp_buflen: the buffer contains the
3939 * previously sent already encoded operation.
3941 * called with nfs4_lock_state() held
3944 nfsd4_encode_replay(struct xdr_stream
*xdr
, struct nfsd4_op
*op
)
3947 struct nfs4_replay
*rp
= op
->replay
;
3951 p
= xdr_reserve_space(xdr
, 8 + rp
->rp_buflen
);
3956 *p
++ = cpu_to_be32(op
->opnum
);
3957 *p
++ = rp
->rp_status
; /* already xdr'ed */
3959 p
= xdr_encode_opaque_fixed(p
, rp
->rp_buf
, rp
->rp_buflen
);
3963 nfs4svc_encode_voidres(struct svc_rqst
*rqstp
, __be32
*p
, void *dummy
)
3965 return xdr_ressize_check(rqstp
, p
);
3968 int nfsd4_release_compoundargs(void *rq
, __be32
*p
, void *resp
)
3970 struct svc_rqst
*rqstp
= rq
;
3971 struct nfsd4_compoundargs
*args
= rqstp
->rq_argp
;
3973 if (args
->ops
!= args
->iops
) {
3975 args
->ops
= args
->iops
;
3979 while (args
->to_free
) {
3980 struct tmpbuf
*tb
= args
->to_free
;
3981 args
->to_free
= tb
->next
;
3982 tb
->release(tb
->buf
);
3989 nfs4svc_decode_compoundargs(struct svc_rqst
*rqstp
, __be32
*p
, struct nfsd4_compoundargs
*args
)
3991 if (rqstp
->rq_arg
.head
[0].iov_len
% 4) {
3992 /* client is nuts */
3993 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)",
3994 __func__
, svc_addr(rqstp
), be32_to_cpu(rqstp
->rq_xid
));
3998 args
->end
= rqstp
->rq_arg
.head
[0].iov_base
+ rqstp
->rq_arg
.head
[0].iov_len
;
3999 args
->pagelist
= rqstp
->rq_arg
.pages
;
4000 args
->pagelen
= rqstp
->rq_arg
.page_len
;
4002 args
->to_free
= NULL
;
4003 args
->ops
= args
->iops
;
4004 args
->rqstp
= rqstp
;
4006 return !nfsd4_decode_compound(args
);
4010 nfs4svc_encode_compoundres(struct svc_rqst
*rqstp
, __be32
*p
, struct nfsd4_compoundres
*resp
)
4013 * All that remains is to write the tag and operation count...
4015 struct nfsd4_compound_state
*cs
= &resp
->cstate
;
4016 struct xdr_buf
*buf
= resp
->xdr
.buf
;
4018 WARN_ON_ONCE(buf
->len
!= buf
->head
[0].iov_len
+ buf
->page_len
+
4019 buf
->tail
[0].iov_len
);
4021 rqstp
->rq_next_page
= resp
->xdr
.page_ptr
+ 1;
4024 *p
++ = htonl(resp
->taglen
);
4025 memcpy(p
, resp
->tag
, resp
->taglen
);
4026 p
+= XDR_QUADLEN(resp
->taglen
);
4027 *p
++ = htonl(resp
->opcnt
);
4029 if (nfsd4_has_session(cs
)) {
4030 struct nfsd_net
*nn
= net_generic(SVC_NET(rqstp
), nfsd_net_id
);
4031 struct nfs4_client
*clp
= cs
->session
->se_client
;
4032 if (cs
->status
!= nfserr_replay_cache
) {
4033 nfsd4_store_cache_entry(resp
);
4034 cs
->slot
->sl_flags
&= ~NFSD4_SLOT_INUSE
;
4036 /* Renew the clientid on success and on replay */
4037 spin_lock(&nn
->client_lock
);
4038 nfsd4_put_session(cs
->session
);
4039 spin_unlock(&nn
->client_lock
);
4040 put_client_renew(clp
);