xref: /openbmc/linux/fs/nfsd/nfs4xdr.c (revision 32f7eed0)
1 /*
2  *  Server-side XDR for NFSv4
3  *
4  *  Copyright (c) 2002 The Regents of the University of Michigan.
5  *  All rights reserved.
6  *
7  *  Kendrick Smith <kmsmith@umich.edu>
8  *  Andy Adamson   <andros@umich.edu>
9  *
10  *  Redistribution and use in source and binary forms, with or without
11  *  modification, are permitted provided that the following conditions
12  *  are met:
13  *
14  *  1. Redistributions of source code must retain the above copyright
15  *     notice, this list of conditions and the following disclaimer.
16  *  2. Redistributions in binary form must reproduce the above copyright
17  *     notice, this list of conditions and the following disclaimer in the
18  *     documentation and/or other materials provided with the distribution.
19  *  3. Neither the name of the University nor the names of its
20  *     contributors may be used to endorse or promote products derived
21  *     from this software without specific prior written permission.
22  *
23  *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
24  *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
25  *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
26  *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
28  *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
29  *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
30  *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
31  *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
32  *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
33  *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34  */
35 
36 #include <linux/file.h>
37 #include <linux/slab.h>
38 #include <linux/namei.h>
39 #include <linux/statfs.h>
40 #include <linux/utsname.h>
41 #include <linux/pagemap.h>
42 #include <linux/sunrpc/svcauth_gss.h>
43 #include <linux/sunrpc/addr.h>
44 #include <linux/xattr.h>
45 #include <uapi/linux/xattr.h>
46 
47 #include "idmap.h"
48 #include "acl.h"
49 #include "xdr4.h"
50 #include "vfs.h"
51 #include "state.h"
52 #include "cache.h"
53 #include "netns.h"
54 #include "pnfs.h"
55 #include "filecache.h"
56 
57 #include "trace.h"
58 
59 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
60 #include <linux/security.h>
61 #endif
62 
63 
64 #define NFSDDBG_FACILITY		NFSDDBG_XDR
65 
66 const u32 nfsd_suppattrs[3][3] = {
67 	{NFSD4_SUPPORTED_ATTRS_WORD0,
68 	 NFSD4_SUPPORTED_ATTRS_WORD1,
69 	 NFSD4_SUPPORTED_ATTRS_WORD2},
70 
71 	{NFSD4_1_SUPPORTED_ATTRS_WORD0,
72 	 NFSD4_1_SUPPORTED_ATTRS_WORD1,
73 	 NFSD4_1_SUPPORTED_ATTRS_WORD2},
74 
75 	{NFSD4_1_SUPPORTED_ATTRS_WORD0,
76 	 NFSD4_1_SUPPORTED_ATTRS_WORD1,
77 	 NFSD4_2_SUPPORTED_ATTRS_WORD2},
78 };
79 
80 /*
81  * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing
82  * directory in order to indicate to the client that a filesystem boundary is present
83  * We use a fixed fsid for a referral
84  */
85 #define NFS4_REFERRAL_FSID_MAJOR	0x8000000ULL
86 #define NFS4_REFERRAL_FSID_MINOR	0x8000000ULL
87 
88 static __be32
89 check_filename(char *str, int len)
90 {
91 	int i;
92 
93 	if (len == 0)
94 		return nfserr_inval;
95 	if (len > NFS4_MAXNAMLEN)
96 		return nfserr_nametoolong;
97 	if (isdotent(str, len))
98 		return nfserr_badname;
99 	for (i = 0; i < len; i++)
100 		if (str[i] == '/')
101 			return nfserr_badname;
102 	return 0;
103 }
104 
105 static int zero_clientid(clientid_t *clid)
106 {
107 	return (clid->cl_boot == 0) && (clid->cl_id == 0);
108 }
109 
110 /**
111  * svcxdr_tmpalloc - allocate memory to be freed after compound processing
112  * @argp: NFSv4 compound argument structure
113  * @len: length of buffer to allocate
114  *
115  * Allocates a buffer of size @len to be freed when processing the compound
116  * operation described in @argp finishes.
117  */
118 static void *
119 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len)
120 {
121 	struct svcxdr_tmpbuf *tb;
122 
123 	tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL);
124 	if (!tb)
125 		return NULL;
126 	tb->next = argp->to_free;
127 	argp->to_free = tb;
128 	return tb->buf;
129 }
130 
131 /*
132  * For xdr strings that need to be passed to other kernel api's
133  * as null-terminated strings.
134  *
135  * Note null-terminating in place usually isn't safe since the
136  * buffer might end on a page boundary.
137  */
138 static char *
139 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len)
140 {
141 	char *p = svcxdr_tmpalloc(argp, len + 1);
142 
143 	if (!p)
144 		return NULL;
145 	memcpy(p, buf, len);
146 	p[len] = '\0';
147 	return p;
148 }
149 
150 static void *
151 svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len)
152 {
153 	__be32 *tmp;
154 
155 	/*
156 	 * The location of the decoded data item is stable,
157 	 * so @p is OK to use. This is the common case.
158 	 */
159 	if (p != argp->xdr->scratch.iov_base)
160 		return p;
161 
162 	tmp = svcxdr_tmpalloc(argp, len);
163 	if (!tmp)
164 		return NULL;
165 	memcpy(tmp, p, len);
166 	return tmp;
167 }
168 
169 /*
170  * NFSv4 basic data type decoders
171  */
172 
173 /*
174  * This helper handles variable-length opaques which belong to protocol
175  * elements that this implementation does not support.
176  */
177 static __be32
178 nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen)
179 {
180 	u32 len;
181 
182 	if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
183 		return nfserr_bad_xdr;
184 	if (maxlen && len > maxlen)
185 		return nfserr_bad_xdr;
186 	if (!xdr_inline_decode(argp->xdr, len))
187 		return nfserr_bad_xdr;
188 
189 	return nfs_ok;
190 }
191 
192 static __be32
193 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o)
194 {
195 	__be32 *p;
196 	u32 len;
197 
198 	if (xdr_stream_decode_u32(argp->xdr, &len) < 0)
199 		return nfserr_bad_xdr;
200 	if (len == 0 || len > NFS4_OPAQUE_LIMIT)
201 		return nfserr_bad_xdr;
202 	p = xdr_inline_decode(argp->xdr, len);
203 	if (!p)
204 		return nfserr_bad_xdr;
205 	o->data = svcxdr_savemem(argp, p, len);
206 	if (!o->data)
207 		return nfserr_jukebox;
208 	o->len = len;
209 
210 	return nfs_ok;
211 }
212 
213 static __be32
214 nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp)
215 {
216 	__be32 *p, status;
217 
218 	if (xdr_stream_decode_u32(argp->xdr, lenp) < 0)
219 		return nfserr_bad_xdr;
220 	p = xdr_inline_decode(argp->xdr, *lenp);
221 	if (!p)
222 		return nfserr_bad_xdr;
223 	status = check_filename((char *)p, *lenp);
224 	if (status)
225 		return status;
226 	*namp = svcxdr_savemem(argp, p, *lenp);
227 	if (!*namp)
228 		return nfserr_jukebox;
229 
230 	return nfs_ok;
231 }
232 
233 static __be32
234 nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv)
235 {
236 	__be32 *p;
237 
238 	p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3);
239 	if (!p)
240 		return nfserr_bad_xdr;
241 	p = xdr_decode_hyper(p, &tv->tv_sec);
242 	tv->tv_nsec = be32_to_cpup(p++);
243 	if (tv->tv_nsec >= (u32)1000000000)
244 		return nfserr_inval;
245 	return nfs_ok;
246 }
247 
248 static __be32
249 nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf)
250 {
251 	__be32 *p;
252 
253 	p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE);
254 	if (!p)
255 		return nfserr_bad_xdr;
256 	memcpy(verf->data, p, sizeof(verf->data));
257 	return nfs_ok;
258 }
259 
260 /**
261  * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4
262  * @argp: NFSv4 compound argument structure
263  * @bmval: pointer to an array of u32's to decode into
264  * @bmlen: size of the @bmval array
265  *
266  * The server needs to return nfs_ok rather than nfserr_bad_xdr when
267  * encountering bitmaps containing bits it does not recognize. This
268  * includes bits in bitmap words past WORDn, where WORDn is the last
269  * bitmap WORD the implementation currently supports. Thus we are
270  * careful here to simply ignore bits in bitmap words that this
271  * implementation has yet to support explicitly.
272  *
273  * Return values:
274  *   %nfs_ok: @bmval populated successfully
275  *   %nfserr_bad_xdr: the encoded bitmap was invalid
276  */
277 static __be32
278 nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen)
279 {
280 	ssize_t status;
281 
282 	status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen);
283 	return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok;
284 }
285 
286 static __be32
287 nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace)
288 {
289 	__be32 *p, status;
290 	u32 length;
291 
292 	if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0)
293 		return nfserr_bad_xdr;
294 	if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0)
295 		return nfserr_bad_xdr;
296 	if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0)
297 		return nfserr_bad_xdr;
298 
299 	if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
300 		return nfserr_bad_xdr;
301 	p = xdr_inline_decode(argp->xdr, length);
302 	if (!p)
303 		return nfserr_bad_xdr;
304 	ace->whotype = nfs4_acl_get_whotype((char *)p, length);
305 	if (ace->whotype != NFS4_ACL_WHO_NAMED)
306 		status = nfs_ok;
307 	else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
308 		status = nfsd_map_name_to_gid(argp->rqstp,
309 				(char *)p, length, &ace->who_gid);
310 	else
311 		status = nfsd_map_name_to_uid(argp->rqstp,
312 				(char *)p, length, &ace->who_uid);
313 
314 	return status;
315 }
316 
317 /* A counted array of nfsace4's */
318 static noinline __be32
319 nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl)
320 {
321 	struct nfs4_ace *ace;
322 	__be32 status;
323 	u32 count;
324 
325 	if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
326 		return nfserr_bad_xdr;
327 
328 	if (count > xdr_stream_remaining(argp->xdr) / 20)
329 		/*
330 		 * Even with 4-byte names there wouldn't be
331 		 * space for that many aces; something fishy is
332 		 * going on:
333 		 */
334 		return nfserr_fbig;
335 
336 	*acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count));
337 	if (*acl == NULL)
338 		return nfserr_jukebox;
339 
340 	(*acl)->naces = count;
341 	for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) {
342 		status = nfsd4_decode_nfsace4(argp, ace);
343 		if (status)
344 			return status;
345 	}
346 
347 	return nfs_ok;
348 }
349 
350 static noinline __be32
351 nfsd4_decode_security_label(struct nfsd4_compoundargs *argp,
352 			    struct xdr_netobj *label)
353 {
354 	u32 lfs, pi, length;
355 	__be32 *p;
356 
357 	if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0)
358 		return nfserr_bad_xdr;
359 	if (xdr_stream_decode_u32(argp->xdr, &pi) < 0)
360 		return nfserr_bad_xdr;
361 
362 	if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
363 		return nfserr_bad_xdr;
364 	if (length > NFS4_MAXLABELLEN)
365 		return nfserr_badlabel;
366 	p = xdr_inline_decode(argp->xdr, length);
367 	if (!p)
368 		return nfserr_bad_xdr;
369 	label->len = length;
370 	label->data = svcxdr_dupstr(argp, p, length);
371 	if (!label->data)
372 		return nfserr_jukebox;
373 
374 	return nfs_ok;
375 }
376 
377 static __be32
378 nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen,
379 		    struct iattr *iattr, struct nfs4_acl **acl,
380 		    struct xdr_netobj *label, int *umask)
381 {
382 	unsigned int starting_pos;
383 	u32 attrlist4_count;
384 	__be32 *p, status;
385 
386 	iattr->ia_valid = 0;
387 	status = nfsd4_decode_bitmap4(argp, bmval, bmlen);
388 	if (status)
389 		return nfserr_bad_xdr;
390 
391 	if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0
392 	    || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1
393 	    || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) {
394 		if (nfsd_attrs_supported(argp->minorversion, bmval))
395 			return nfserr_inval;
396 		return nfserr_attrnotsupp;
397 	}
398 
399 	if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0)
400 		return nfserr_bad_xdr;
401 	starting_pos = xdr_stream_pos(argp->xdr);
402 
403 	if (bmval[0] & FATTR4_WORD0_SIZE) {
404 		u64 size;
405 
406 		if (xdr_stream_decode_u64(argp->xdr, &size) < 0)
407 			return nfserr_bad_xdr;
408 		iattr->ia_size = size;
409 		iattr->ia_valid |= ATTR_SIZE;
410 	}
411 	if (bmval[0] & FATTR4_WORD0_ACL) {
412 		status = nfsd4_decode_acl(argp, acl);
413 		if (status)
414 			return status;
415 	} else
416 		*acl = NULL;
417 	if (bmval[1] & FATTR4_WORD1_MODE) {
418 		u32 mode;
419 
420 		if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
421 			return nfserr_bad_xdr;
422 		iattr->ia_mode = mode;
423 		iattr->ia_mode &= (S_IFMT | S_IALLUGO);
424 		iattr->ia_valid |= ATTR_MODE;
425 	}
426 	if (bmval[1] & FATTR4_WORD1_OWNER) {
427 		u32 length;
428 
429 		if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
430 			return nfserr_bad_xdr;
431 		p = xdr_inline_decode(argp->xdr, length);
432 		if (!p)
433 			return nfserr_bad_xdr;
434 		status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length,
435 					      &iattr->ia_uid);
436 		if (status)
437 			return status;
438 		iattr->ia_valid |= ATTR_UID;
439 	}
440 	if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) {
441 		u32 length;
442 
443 		if (xdr_stream_decode_u32(argp->xdr, &length) < 0)
444 			return nfserr_bad_xdr;
445 		p = xdr_inline_decode(argp->xdr, length);
446 		if (!p)
447 			return nfserr_bad_xdr;
448 		status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length,
449 					      &iattr->ia_gid);
450 		if (status)
451 			return status;
452 		iattr->ia_valid |= ATTR_GID;
453 	}
454 	if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) {
455 		u32 set_it;
456 
457 		if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
458 			return nfserr_bad_xdr;
459 		switch (set_it) {
460 		case NFS4_SET_TO_CLIENT_TIME:
461 			status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime);
462 			if (status)
463 				return status;
464 			iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET);
465 			break;
466 		case NFS4_SET_TO_SERVER_TIME:
467 			iattr->ia_valid |= ATTR_ATIME;
468 			break;
469 		default:
470 			return nfserr_bad_xdr;
471 		}
472 	}
473 	if (bmval[1] & FATTR4_WORD1_TIME_CREATE) {
474 		struct timespec64 ts;
475 
476 		/* No Linux filesystem supports setting this attribute. */
477 		bmval[1] &= ~FATTR4_WORD1_TIME_CREATE;
478 		status = nfsd4_decode_nfstime4(argp, &ts);
479 		if (status)
480 			return status;
481 	}
482 	if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) {
483 		u32 set_it;
484 
485 		if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0)
486 			return nfserr_bad_xdr;
487 		switch (set_it) {
488 		case NFS4_SET_TO_CLIENT_TIME:
489 			status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime);
490 			if (status)
491 				return status;
492 			iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET);
493 			break;
494 		case NFS4_SET_TO_SERVER_TIME:
495 			iattr->ia_valid |= ATTR_MTIME;
496 			break;
497 		default:
498 			return nfserr_bad_xdr;
499 		}
500 	}
501 	label->len = 0;
502 	if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) &&
503 	    bmval[2] & FATTR4_WORD2_SECURITY_LABEL) {
504 		status = nfsd4_decode_security_label(argp, label);
505 		if (status)
506 			return status;
507 	}
508 	if (bmval[2] & FATTR4_WORD2_MODE_UMASK) {
509 		u32 mode, mask;
510 
511 		if (!umask)
512 			return nfserr_bad_xdr;
513 		if (xdr_stream_decode_u32(argp->xdr, &mode) < 0)
514 			return nfserr_bad_xdr;
515 		iattr->ia_mode = mode & (S_IFMT | S_IALLUGO);
516 		if (xdr_stream_decode_u32(argp->xdr, &mask) < 0)
517 			return nfserr_bad_xdr;
518 		*umask = mask & S_IRWXUGO;
519 		iattr->ia_valid |= ATTR_MODE;
520 	}
521 
522 	/* request sanity: did attrlist4 contain the expected number of words? */
523 	if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos)
524 		return nfserr_bad_xdr;
525 
526 	return nfs_ok;
527 }
528 
529 static __be32
530 nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid)
531 {
532 	__be32 *p;
533 
534 	p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE);
535 	if (!p)
536 		return nfserr_bad_xdr;
537 	sid->si_generation = be32_to_cpup(p++);
538 	memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque));
539 	return nfs_ok;
540 }
541 
542 static __be32
543 nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid)
544 {
545 	__be32 *p;
546 
547 	p = xdr_inline_decode(argp->xdr, sizeof(__be64));
548 	if (!p)
549 		return nfserr_bad_xdr;
550 	memcpy(clientid, p, sizeof(*clientid));
551 	return nfs_ok;
552 }
553 
554 static __be32
555 nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp,
556 			  clientid_t *clientid, struct xdr_netobj *owner)
557 {
558 	__be32 status;
559 
560 	status = nfsd4_decode_clientid4(argp, clientid);
561 	if (status)
562 		return status;
563 	return nfsd4_decode_opaque(argp, owner);
564 }
565 
566 #ifdef CONFIG_NFSD_PNFS
567 static __be32
568 nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp,
569 		       struct nfsd4_deviceid *devid)
570 {
571 	__be32 *p;
572 
573 	p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE);
574 	if (!p)
575 		return nfserr_bad_xdr;
576 	memcpy(devid, p, sizeof(*devid));
577 	return nfs_ok;
578 }
579 
580 static __be32
581 nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp,
582 			   struct nfsd4_layoutcommit *lcp)
583 {
584 	if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0)
585 		return nfserr_bad_xdr;
586 	if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES)
587 		return nfserr_bad_xdr;
588 	if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX)
589 		return nfserr_bad_xdr;
590 
591 	if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0)
592 		return nfserr_bad_xdr;
593 	if (lcp->lc_up_len > 0) {
594 		lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len);
595 		if (!lcp->lc_up_layout)
596 			return nfserr_bad_xdr;
597 	}
598 
599 	return nfs_ok;
600 }
601 
602 static __be32
603 nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp,
604 			   struct nfsd4_layoutreturn *lrp)
605 {
606 	__be32 status;
607 
608 	if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0)
609 		return nfserr_bad_xdr;
610 	switch (lrp->lr_return_type) {
611 	case RETURN_FILE:
612 		if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0)
613 			return nfserr_bad_xdr;
614 		if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0)
615 			return nfserr_bad_xdr;
616 		status = nfsd4_decode_stateid4(argp, &lrp->lr_sid);
617 		if (status)
618 			return status;
619 		if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0)
620 			return nfserr_bad_xdr;
621 		if (lrp->lrf_body_len > 0) {
622 			lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len);
623 			if (!lrp->lrf_body)
624 				return nfserr_bad_xdr;
625 		}
626 		break;
627 	case RETURN_FSID:
628 	case RETURN_ALL:
629 		lrp->lr_seg.offset = 0;
630 		lrp->lr_seg.length = NFS4_MAX_UINT64;
631 		break;
632 	default:
633 		return nfserr_bad_xdr;
634 	}
635 
636 	return nfs_ok;
637 }
638 
639 #endif /* CONFIG_NFSD_PNFS */
640 
641 static __be32
642 nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp,
643 			struct nfs4_sessionid *sessionid)
644 {
645 	__be32 *p;
646 
647 	p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN);
648 	if (!p)
649 		return nfserr_bad_xdr;
650 	memcpy(sessionid->data, p, sizeof(sessionid->data));
651 	return nfs_ok;
652 }
653 
654 /* Defined in Appendix A of RFC 5531 */
655 static __be32
656 nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp,
657 			   struct nfsd4_cb_sec *cbs)
658 {
659 	u32 stamp, gidcount, uid, gid;
660 	__be32 *p, status;
661 
662 	if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0)
663 		return nfserr_bad_xdr;
664 	/* machine name */
665 	status = nfsd4_decode_ignored_string(argp, 255);
666 	if (status)
667 		return status;
668 	if (xdr_stream_decode_u32(argp->xdr, &uid) < 0)
669 		return nfserr_bad_xdr;
670 	if (xdr_stream_decode_u32(argp->xdr, &gid) < 0)
671 		return nfserr_bad_xdr;
672 	if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0)
673 		return nfserr_bad_xdr;
674 	if (gidcount > 16)
675 		return nfserr_bad_xdr;
676 	p = xdr_inline_decode(argp->xdr, gidcount << 2);
677 	if (!p)
678 		return nfserr_bad_xdr;
679 	if (cbs->flavor == (u32)(-1)) {
680 		struct user_namespace *userns = nfsd_user_namespace(argp->rqstp);
681 
682 		kuid_t kuid = make_kuid(userns, uid);
683 		kgid_t kgid = make_kgid(userns, gid);
684 		if (uid_valid(kuid) && gid_valid(kgid)) {
685 			cbs->uid = kuid;
686 			cbs->gid = kgid;
687 			cbs->flavor = RPC_AUTH_UNIX;
688 		} else {
689 			dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n");
690 		}
691 	}
692 
693 	return nfs_ok;
694 }
695 
696 static __be32
697 nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp,
698 			     struct nfsd4_cb_sec *cbs)
699 {
700 	__be32 status;
701 	u32 service;
702 
703 	dprintk("RPC_AUTH_GSS callback secflavor not supported!\n");
704 
705 	if (xdr_stream_decode_u32(argp->xdr, &service) < 0)
706 		return nfserr_bad_xdr;
707 	if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY)
708 		return nfserr_bad_xdr;
709 	/* gcbp_handle_from_server */
710 	status = nfsd4_decode_ignored_string(argp, 0);
711 	if (status)
712 		return status;
713 	/* gcbp_handle_from_client */
714 	status = nfsd4_decode_ignored_string(argp, 0);
715 	if (status)
716 		return status;
717 
718 	return nfs_ok;
719 }
720 
721 /* a counted array of callback_sec_parms4 items */
722 static __be32
723 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs)
724 {
725 	u32 i, secflavor, nr_secflavs;
726 	__be32 status;
727 
728 	/* callback_sec_params4 */
729 	if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0)
730 		return nfserr_bad_xdr;
731 	if (nr_secflavs)
732 		cbs->flavor = (u32)(-1);
733 	else
734 		/* Is this legal? Be generous, take it to mean AUTH_NONE: */
735 		cbs->flavor = 0;
736 
737 	for (i = 0; i < nr_secflavs; ++i) {
738 		if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0)
739 			return nfserr_bad_xdr;
740 		switch (secflavor) {
741 		case RPC_AUTH_NULL:
742 			/* void */
743 			if (cbs->flavor == (u32)(-1))
744 				cbs->flavor = RPC_AUTH_NULL;
745 			break;
746 		case RPC_AUTH_UNIX:
747 			status = nfsd4_decode_authsys_parms(argp, cbs);
748 			if (status)
749 				return status;
750 			break;
751 		case RPC_AUTH_GSS:
752 			status = nfsd4_decode_gss_cb_handles4(argp, cbs);
753 			if (status)
754 				return status;
755 			break;
756 		default:
757 			return nfserr_inval;
758 		}
759 	}
760 
761 	return nfs_ok;
762 }
763 
764 
765 /*
766  * NFSv4 operation argument decoders
767  */
768 
769 static __be32
770 nfsd4_decode_access(struct nfsd4_compoundargs *argp,
771 		    struct nfsd4_access *access)
772 {
773 	if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0)
774 		return nfserr_bad_xdr;
775 	return nfs_ok;
776 }
777 
778 static __be32
779 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close)
780 {
781 	if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0)
782 		return nfserr_bad_xdr;
783 	return nfsd4_decode_stateid4(argp, &close->cl_stateid);
784 }
785 
786 
787 static __be32
788 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit)
789 {
790 	if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0)
791 		return nfserr_bad_xdr;
792 	if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0)
793 		return nfserr_bad_xdr;
794 	return nfs_ok;
795 }
796 
797 static __be32
798 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create)
799 {
800 	__be32 *p, status;
801 
802 	if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0)
803 		return nfserr_bad_xdr;
804 	switch (create->cr_type) {
805 	case NF4LNK:
806 		if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0)
807 			return nfserr_bad_xdr;
808 		p = xdr_inline_decode(argp->xdr, create->cr_datalen);
809 		if (!p)
810 			return nfserr_bad_xdr;
811 		create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen);
812 		if (!create->cr_data)
813 			return nfserr_jukebox;
814 		break;
815 	case NF4BLK:
816 	case NF4CHR:
817 		if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0)
818 			return nfserr_bad_xdr;
819 		if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0)
820 			return nfserr_bad_xdr;
821 		break;
822 	case NF4SOCK:
823 	case NF4FIFO:
824 	case NF4DIR:
825 	default:
826 		break;
827 	}
828 	status = nfsd4_decode_component4(argp, &create->cr_name,
829 					 &create->cr_namelen);
830 	if (status)
831 		return status;
832 	status = nfsd4_decode_fattr4(argp, create->cr_bmval,
833 				    ARRAY_SIZE(create->cr_bmval),
834 				    &create->cr_iattr, &create->cr_acl,
835 				    &create->cr_label, &create->cr_umask);
836 	if (status)
837 		return status;
838 
839 	return nfs_ok;
840 }
841 
842 static inline __be32
843 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr)
844 {
845 	return nfsd4_decode_stateid4(argp, &dr->dr_stateid);
846 }
847 
848 static inline __be32
849 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr)
850 {
851 	return nfsd4_decode_bitmap4(argp, getattr->ga_bmval,
852 				    ARRAY_SIZE(getattr->ga_bmval));
853 }
854 
855 static __be32
856 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link)
857 {
858 	return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen);
859 }
860 
861 static __be32
862 nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp,
863 				 struct nfsd4_lock *lock)
864 {
865 	__be32 status;
866 
867 	if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0)
868 		return nfserr_bad_xdr;
869 	status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid);
870 	if (status)
871 		return status;
872 	if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0)
873 		return nfserr_bad_xdr;
874 	return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid,
875 					 &lock->lk_new_owner);
876 }
877 
878 static __be32
879 nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp,
880 			       struct nfsd4_lock *lock)
881 {
882 	__be32 status;
883 
884 	status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid);
885 	if (status)
886 		return status;
887 	if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0)
888 		return nfserr_bad_xdr;
889 
890 	return nfs_ok;
891 }
892 
893 static __be32
894 nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
895 {
896 	if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0)
897 		return nfserr_bad_xdr;
898 	if (lock->lk_is_new)
899 		return nfsd4_decode_open_to_lock_owner4(argp, lock);
900 	return nfsd4_decode_exist_lock_owner4(argp, lock);
901 }
902 
903 static __be32
904 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock)
905 {
906 	if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0)
907 		return nfserr_bad_xdr;
908 	if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT))
909 		return nfserr_bad_xdr;
910 	if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0)
911 		return nfserr_bad_xdr;
912 	if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0)
913 		return nfserr_bad_xdr;
914 	if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0)
915 		return nfserr_bad_xdr;
916 	return nfsd4_decode_locker4(argp, lock);
917 }
918 
919 static __be32
920 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt)
921 {
922 	if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0)
923 		return nfserr_bad_xdr;
924 	if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT))
925 		return nfserr_bad_xdr;
926 	if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0)
927 		return nfserr_bad_xdr;
928 	if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0)
929 		return nfserr_bad_xdr;
930 	return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid,
931 					 &lockt->lt_owner);
932 }
933 
934 static __be32
935 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku)
936 {
937 	__be32 status;
938 
939 	if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0)
940 		return nfserr_bad_xdr;
941 	if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT))
942 		return nfserr_bad_xdr;
943 	if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0)
944 		return nfserr_bad_xdr;
945 	status = nfsd4_decode_stateid4(argp, &locku->lu_stateid);
946 	if (status)
947 		return status;
948 	if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0)
949 		return nfserr_bad_xdr;
950 	if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0)
951 		return nfserr_bad_xdr;
952 
953 	return nfs_ok;
954 }
955 
956 static __be32
957 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup)
958 {
959 	return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len);
960 }
961 
962 static __be32
963 nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
964 {
965 	__be32 status;
966 
967 	if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0)
968 		return nfserr_bad_xdr;
969 	switch (open->op_createmode) {
970 	case NFS4_CREATE_UNCHECKED:
971 	case NFS4_CREATE_GUARDED:
972 		status = nfsd4_decode_fattr4(argp, open->op_bmval,
973 					     ARRAY_SIZE(open->op_bmval),
974 					     &open->op_iattr, &open->op_acl,
975 					     &open->op_label, &open->op_umask);
976 		if (status)
977 			return status;
978 		break;
979 	case NFS4_CREATE_EXCLUSIVE:
980 		status = nfsd4_decode_verifier4(argp, &open->op_verf);
981 		if (status)
982 			return status;
983 		break;
984 	case NFS4_CREATE_EXCLUSIVE4_1:
985 		if (argp->minorversion < 1)
986 			return nfserr_bad_xdr;
987 		status = nfsd4_decode_verifier4(argp, &open->op_verf);
988 		if (status)
989 			return status;
990 		status = nfsd4_decode_fattr4(argp, open->op_bmval,
991 					     ARRAY_SIZE(open->op_bmval),
992 					     &open->op_iattr, &open->op_acl,
993 					     &open->op_label, &open->op_umask);
994 		if (status)
995 			return status;
996 		break;
997 	default:
998 		return nfserr_bad_xdr;
999 	}
1000 
1001 	return nfs_ok;
1002 }
1003 
1004 static __be32
1005 nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1006 {
1007 	__be32 status;
1008 
1009 	if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0)
1010 		return nfserr_bad_xdr;
1011 	switch (open->op_create) {
1012 	case NFS4_OPEN_NOCREATE:
1013 		break;
1014 	case NFS4_OPEN_CREATE:
1015 		status = nfsd4_decode_createhow4(argp, open);
1016 		if (status)
1017 			return status;
1018 		break;
1019 	default:
1020 		return nfserr_bad_xdr;
1021 	}
1022 
1023 	return nfs_ok;
1024 }
1025 
1026 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when)
1027 {
1028 	u32 w;
1029 
1030 	if (xdr_stream_decode_u32(argp->xdr, &w) < 0)
1031 		return nfserr_bad_xdr;
1032 	*share_access = w & NFS4_SHARE_ACCESS_MASK;
1033 	*deleg_want = w & NFS4_SHARE_WANT_MASK;
1034 	if (deleg_when)
1035 		*deleg_when = w & NFS4_SHARE_WHEN_MASK;
1036 
1037 	switch (w & NFS4_SHARE_ACCESS_MASK) {
1038 	case NFS4_SHARE_ACCESS_READ:
1039 	case NFS4_SHARE_ACCESS_WRITE:
1040 	case NFS4_SHARE_ACCESS_BOTH:
1041 		break;
1042 	default:
1043 		return nfserr_bad_xdr;
1044 	}
1045 	w &= ~NFS4_SHARE_ACCESS_MASK;
1046 	if (!w)
1047 		return nfs_ok;
1048 	if (!argp->minorversion)
1049 		return nfserr_bad_xdr;
1050 	switch (w & NFS4_SHARE_WANT_MASK) {
1051 	case NFS4_SHARE_WANT_NO_PREFERENCE:
1052 	case NFS4_SHARE_WANT_READ_DELEG:
1053 	case NFS4_SHARE_WANT_WRITE_DELEG:
1054 	case NFS4_SHARE_WANT_ANY_DELEG:
1055 	case NFS4_SHARE_WANT_NO_DELEG:
1056 	case NFS4_SHARE_WANT_CANCEL:
1057 		break;
1058 	default:
1059 		return nfserr_bad_xdr;
1060 	}
1061 	w &= ~NFS4_SHARE_WANT_MASK;
1062 	if (!w)
1063 		return nfs_ok;
1064 
1065 	if (!deleg_when)	/* open_downgrade */
1066 		return nfserr_inval;
1067 	switch (w) {
1068 	case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL:
1069 	case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED:
1070 	case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL |
1071 	      NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED):
1072 		return nfs_ok;
1073 	}
1074 	return nfserr_bad_xdr;
1075 }
1076 
1077 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x)
1078 {
1079 	if (xdr_stream_decode_u32(argp->xdr, x) < 0)
1080 		return nfserr_bad_xdr;
1081 	/* Note: unlike access bits, deny bits may be zero. */
1082 	if (*x & ~NFS4_SHARE_DENY_BOTH)
1083 		return nfserr_bad_xdr;
1084 
1085 	return nfs_ok;
1086 }
1087 
1088 static __be32
1089 nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp,
1090 			 struct nfsd4_open *open)
1091 {
1092 	__be32 status;
1093 
1094 	if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0)
1095 		return nfserr_bad_xdr;
1096 	switch (open->op_claim_type) {
1097 	case NFS4_OPEN_CLAIM_NULL:
1098 	case NFS4_OPEN_CLAIM_DELEGATE_PREV:
1099 		status = nfsd4_decode_component4(argp, &open->op_fname,
1100 						 &open->op_fnamelen);
1101 		if (status)
1102 			return status;
1103 		break;
1104 	case NFS4_OPEN_CLAIM_PREVIOUS:
1105 		if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0)
1106 			return nfserr_bad_xdr;
1107 		break;
1108 	case NFS4_OPEN_CLAIM_DELEGATE_CUR:
1109 		status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1110 		if (status)
1111 			return status;
1112 		status = nfsd4_decode_component4(argp, &open->op_fname,
1113 						 &open->op_fnamelen);
1114 		if (status)
1115 			return status;
1116 		break;
1117 	case NFS4_OPEN_CLAIM_FH:
1118 	case NFS4_OPEN_CLAIM_DELEG_PREV_FH:
1119 		if (argp->minorversion < 1)
1120 			return nfserr_bad_xdr;
1121 		/* void */
1122 		break;
1123 	case NFS4_OPEN_CLAIM_DELEG_CUR_FH:
1124 		if (argp->minorversion < 1)
1125 			return nfserr_bad_xdr;
1126 		status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid);
1127 		if (status)
1128 			return status;
1129 		break;
1130 	default:
1131 		return nfserr_bad_xdr;
1132 	}
1133 
1134 	return nfs_ok;
1135 }
1136 
1137 static __be32
1138 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open)
1139 {
1140 	__be32 status;
1141 	u32 dummy;
1142 
1143 	memset(open->op_bmval, 0, sizeof(open->op_bmval));
1144 	open->op_iattr.ia_valid = 0;
1145 	open->op_openowner = NULL;
1146 
1147 	open->op_xdr_error = 0;
1148 	if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0)
1149 		return nfserr_bad_xdr;
1150 	/* deleg_want is ignored */
1151 	status = nfsd4_decode_share_access(argp, &open->op_share_access,
1152 					   &open->op_deleg_want, &dummy);
1153 	if (status)
1154 		return status;
1155 	status = nfsd4_decode_share_deny(argp, &open->op_share_deny);
1156 	if (status)
1157 		return status;
1158 	status = nfsd4_decode_state_owner4(argp, &open->op_clientid,
1159 					   &open->op_owner);
1160 	if (status)
1161 		return status;
1162 	status = nfsd4_decode_openflag4(argp, open);
1163 	if (status)
1164 		return status;
1165 	return nfsd4_decode_open_claim4(argp, open);
1166 }
1167 
1168 static __be32
1169 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf)
1170 {
1171 	__be32 status;
1172 
1173 	if (argp->minorversion >= 1)
1174 		return nfserr_notsupp;
1175 
1176 	status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid);
1177 	if (status)
1178 		return status;
1179 	if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0)
1180 		return nfserr_bad_xdr;
1181 
1182 	return nfs_ok;
1183 }
1184 
1185 static __be32
1186 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down)
1187 {
1188 	__be32 status;
1189 
1190 	status = nfsd4_decode_stateid4(argp, &open_down->od_stateid);
1191 	if (status)
1192 		return status;
1193 	if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0)
1194 		return nfserr_bad_xdr;
1195 	/* deleg_want is ignored */
1196 	status = nfsd4_decode_share_access(argp, &open_down->od_share_access,
1197 					   &open_down->od_deleg_want, NULL);
1198 	if (status)
1199 		return status;
1200 	return nfsd4_decode_share_deny(argp, &open_down->od_share_deny);
1201 }
1202 
1203 static __be32
1204 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh)
1205 {
1206 	__be32 *p;
1207 
1208 	if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0)
1209 		return nfserr_bad_xdr;
1210 	if (putfh->pf_fhlen > NFS4_FHSIZE)
1211 		return nfserr_bad_xdr;
1212 	p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen);
1213 	if (!p)
1214 		return nfserr_bad_xdr;
1215 	putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen);
1216 	if (!putfh->pf_fhval)
1217 		return nfserr_jukebox;
1218 
1219 	return nfs_ok;
1220 }
1221 
1222 static __be32
1223 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p)
1224 {
1225 	if (argp->minorversion == 0)
1226 		return nfs_ok;
1227 	return nfserr_notsupp;
1228 }
1229 
1230 static __be32
1231 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read)
1232 {
1233 	__be32 status;
1234 
1235 	status = nfsd4_decode_stateid4(argp, &read->rd_stateid);
1236 	if (status)
1237 		return status;
1238 	if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0)
1239 		return nfserr_bad_xdr;
1240 	if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0)
1241 		return nfserr_bad_xdr;
1242 
1243 	return nfs_ok;
1244 }
1245 
1246 static __be32
1247 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir)
1248 {
1249 	__be32 status;
1250 
1251 	if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0)
1252 		return nfserr_bad_xdr;
1253 	status = nfsd4_decode_verifier4(argp, &readdir->rd_verf);
1254 	if (status)
1255 		return status;
1256 	if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0)
1257 		return nfserr_bad_xdr;
1258 	if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0)
1259 		return nfserr_bad_xdr;
1260 	if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval,
1261 					   ARRAY_SIZE(readdir->rd_bmval)) < 0)
1262 		return nfserr_bad_xdr;
1263 
1264 	return nfs_ok;
1265 }
1266 
1267 static __be32
1268 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove)
1269 {
1270 	return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen);
1271 }
1272 
1273 static __be32
1274 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename)
1275 {
1276 	__be32 status;
1277 
1278 	status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen);
1279 	if (status)
1280 		return status;
1281 	return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen);
1282 }
1283 
1284 static __be32
1285 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid)
1286 {
1287 	return nfsd4_decode_clientid4(argp, clientid);
1288 }
1289 
1290 static __be32
1291 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp,
1292 		     struct nfsd4_secinfo *secinfo)
1293 {
1294 	return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen);
1295 }
1296 
1297 static __be32
1298 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr)
1299 {
1300 	__be32 status;
1301 
1302 	status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid);
1303 	if (status)
1304 		return status;
1305 	return nfsd4_decode_fattr4(argp, setattr->sa_bmval,
1306 				   ARRAY_SIZE(setattr->sa_bmval),
1307 				   &setattr->sa_iattr, &setattr->sa_acl,
1308 				   &setattr->sa_label, NULL);
1309 }
1310 
1311 static __be32
1312 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid)
1313 {
1314 	__be32 *p, status;
1315 
1316 	if (argp->minorversion >= 1)
1317 		return nfserr_notsupp;
1318 
1319 	status = nfsd4_decode_verifier4(argp, &setclientid->se_verf);
1320 	if (status)
1321 		return status;
1322 	status = nfsd4_decode_opaque(argp, &setclientid->se_name);
1323 	if (status)
1324 		return status;
1325 	if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0)
1326 		return nfserr_bad_xdr;
1327 	if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0)
1328 		return nfserr_bad_xdr;
1329 	p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len);
1330 	if (!p)
1331 		return nfserr_bad_xdr;
1332 	setclientid->se_callback_netid_val = svcxdr_savemem(argp, p,
1333 						setclientid->se_callback_netid_len);
1334 	if (!setclientid->se_callback_netid_val)
1335 		return nfserr_jukebox;
1336 
1337 	if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0)
1338 		return nfserr_bad_xdr;
1339 	p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len);
1340 	if (!p)
1341 		return nfserr_bad_xdr;
1342 	setclientid->se_callback_addr_val = svcxdr_savemem(argp, p,
1343 						setclientid->se_callback_addr_len);
1344 	if (!setclientid->se_callback_addr_val)
1345 		return nfserr_jukebox;
1346 	if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0)
1347 		return nfserr_bad_xdr;
1348 
1349 	return nfs_ok;
1350 }
1351 
1352 static __be32
1353 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c)
1354 {
1355 	__be32 status;
1356 
1357 	if (argp->minorversion >= 1)
1358 		return nfserr_notsupp;
1359 
1360 	status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid);
1361 	if (status)
1362 		return status;
1363 	return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm);
1364 }
1365 
1366 /* Also used for NVERIFY */
1367 static __be32
1368 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify)
1369 {
1370 	__be32 *p, status;
1371 
1372 	status = nfsd4_decode_bitmap4(argp, verify->ve_bmval,
1373 				      ARRAY_SIZE(verify->ve_bmval));
1374 	if (status)
1375 		return status;
1376 
1377 	/* For convenience's sake, we compare raw xdr'd attributes in
1378 	 * nfsd4_proc_verify */
1379 
1380 	if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0)
1381 		return nfserr_bad_xdr;
1382 	p = xdr_inline_decode(argp->xdr, verify->ve_attrlen);
1383 	if (!p)
1384 		return nfserr_bad_xdr;
1385 	verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen);
1386 	if (!verify->ve_attrval)
1387 		return nfserr_jukebox;
1388 
1389 	return nfs_ok;
1390 }
1391 
1392 static __be32
1393 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write)
1394 {
1395 	__be32 status;
1396 
1397 	status = nfsd4_decode_stateid4(argp, &write->wr_stateid);
1398 	if (status)
1399 		return status;
1400 	if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0)
1401 		return nfserr_bad_xdr;
1402 	if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0)
1403 		return nfserr_bad_xdr;
1404 	if (write->wr_stable_how > NFS_FILE_SYNC)
1405 		return nfserr_bad_xdr;
1406 	if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0)
1407 		return nfserr_bad_xdr;
1408 	if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen))
1409 		return nfserr_bad_xdr;
1410 
1411 	return nfs_ok;
1412 }
1413 
1414 static __be32
1415 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner)
1416 {
1417 	__be32 status;
1418 
1419 	if (argp->minorversion >= 1)
1420 		return nfserr_notsupp;
1421 
1422 	status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid,
1423 					   &rlockowner->rl_owner);
1424 	if (status)
1425 		return status;
1426 
1427 	if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid))
1428 		return nfserr_inval;
1429 
1430 	return nfs_ok;
1431 }
1432 
1433 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc)
1434 {
1435 	if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0)
1436 		return nfserr_bad_xdr;
1437 	return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec);
1438 }
1439 
1440 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts)
1441 {
1442 	u32 use_conn_in_rdma_mode;
1443 	__be32 status;
1444 
1445 	status = nfsd4_decode_sessionid4(argp, &bcts->sessionid);
1446 	if (status)
1447 		return status;
1448 	if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0)
1449 		return nfserr_bad_xdr;
1450 	if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0)
1451 		return nfserr_bad_xdr;
1452 
1453 	return nfs_ok;
1454 }
1455 
1456 static __be32
1457 nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp,
1458 			       struct nfsd4_exchange_id *exid)
1459 {
1460 	__be32 status;
1461 
1462 	status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce,
1463 				      ARRAY_SIZE(exid->spo_must_enforce));
1464 	if (status)
1465 		return nfserr_bad_xdr;
1466 	status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow,
1467 				      ARRAY_SIZE(exid->spo_must_allow));
1468 	if (status)
1469 		return nfserr_bad_xdr;
1470 
1471 	return nfs_ok;
1472 }
1473 
1474 /*
1475  * This implementation currently does not support SP4_SSV.
1476  * This decoder simply skips over these arguments.
1477  */
1478 static noinline __be32
1479 nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp,
1480 			  struct nfsd4_exchange_id *exid)
1481 {
1482 	u32 count, window, num_gss_handles;
1483 	__be32 status;
1484 
1485 	/* ssp_ops */
1486 	status = nfsd4_decode_state_protect_ops(argp, exid);
1487 	if (status)
1488 		return status;
1489 
1490 	/* ssp_hash_algs<> */
1491 	if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1492 		return nfserr_bad_xdr;
1493 	while (count--) {
1494 		status = nfsd4_decode_ignored_string(argp, 0);
1495 		if (status)
1496 			return status;
1497 	}
1498 
1499 	/* ssp_encr_algs<> */
1500 	if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1501 		return nfserr_bad_xdr;
1502 	while (count--) {
1503 		status = nfsd4_decode_ignored_string(argp, 0);
1504 		if (status)
1505 			return status;
1506 	}
1507 
1508 	if (xdr_stream_decode_u32(argp->xdr, &window) < 0)
1509 		return nfserr_bad_xdr;
1510 	if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0)
1511 		return nfserr_bad_xdr;
1512 
1513 	return nfs_ok;
1514 }
1515 
1516 static __be32
1517 nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp,
1518 			      struct nfsd4_exchange_id *exid)
1519 {
1520 	__be32 status;
1521 
1522 	if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0)
1523 		return nfserr_bad_xdr;
1524 	switch (exid->spa_how) {
1525 	case SP4_NONE:
1526 		break;
1527 	case SP4_MACH_CRED:
1528 		status = nfsd4_decode_state_protect_ops(argp, exid);
1529 		if (status)
1530 			return status;
1531 		break;
1532 	case SP4_SSV:
1533 		status = nfsd4_decode_ssv_sp_parms(argp, exid);
1534 		if (status)
1535 			return status;
1536 		break;
1537 	default:
1538 		return nfserr_bad_xdr;
1539 	}
1540 
1541 	return nfs_ok;
1542 }
1543 
1544 static __be32
1545 nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp,
1546 			  struct nfsd4_exchange_id *exid)
1547 {
1548 	__be32 status;
1549 	u32 count;
1550 
1551 	if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1552 		return nfserr_bad_xdr;
1553 	switch (count) {
1554 	case 0:
1555 		break;
1556 	case 1:
1557 		/* Note that RFC 8881 places no length limit on
1558 		 * nii_domain, but this implementation permits no
1559 		 * more than NFS4_OPAQUE_LIMIT bytes */
1560 		status = nfsd4_decode_opaque(argp, &exid->nii_domain);
1561 		if (status)
1562 			return status;
1563 		/* Note that RFC 8881 places no length limit on
1564 		 * nii_name, but this implementation permits no
1565 		 * more than NFS4_OPAQUE_LIMIT bytes */
1566 		status = nfsd4_decode_opaque(argp, &exid->nii_name);
1567 		if (status)
1568 			return status;
1569 		status = nfsd4_decode_nfstime4(argp, &exid->nii_time);
1570 		if (status)
1571 			return status;
1572 		break;
1573 	default:
1574 		return nfserr_bad_xdr;
1575 	}
1576 
1577 	return nfs_ok;
1578 }
1579 
1580 static __be32
1581 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp,
1582 			 struct nfsd4_exchange_id *exid)
1583 {
1584 	__be32 status;
1585 
1586 	status = nfsd4_decode_verifier4(argp, &exid->verifier);
1587 	if (status)
1588 		return status;
1589 	status = nfsd4_decode_opaque(argp, &exid->clname);
1590 	if (status)
1591 		return status;
1592 	if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0)
1593 		return nfserr_bad_xdr;
1594 	status = nfsd4_decode_state_protect4_a(argp, exid);
1595 	if (status)
1596 		return status;
1597 	return nfsd4_decode_nfs_impl_id4(argp, exid);
1598 }
1599 
1600 static __be32
1601 nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp,
1602 			    struct nfsd4_channel_attrs *ca)
1603 {
1604 	__be32 *p;
1605 
1606 	p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7);
1607 	if (!p)
1608 		return nfserr_bad_xdr;
1609 
1610 	/* headerpadsz is ignored */
1611 	p++;
1612 	ca->maxreq_sz = be32_to_cpup(p++);
1613 	ca->maxresp_sz = be32_to_cpup(p++);
1614 	ca->maxresp_cached = be32_to_cpup(p++);
1615 	ca->maxops = be32_to_cpup(p++);
1616 	ca->maxreqs = be32_to_cpup(p++);
1617 	ca->nr_rdma_attrs = be32_to_cpup(p);
1618 	switch (ca->nr_rdma_attrs) {
1619 	case 0:
1620 		break;
1621 	case 1:
1622 		if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0)
1623 			return nfserr_bad_xdr;
1624 		break;
1625 	default:
1626 		return nfserr_bad_xdr;
1627 	}
1628 
1629 	return nfs_ok;
1630 }
1631 
1632 static __be32
1633 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp,
1634 			    struct nfsd4_create_session *sess)
1635 {
1636 	__be32 status;
1637 
1638 	status = nfsd4_decode_clientid4(argp, &sess->clientid);
1639 	if (status)
1640 		return status;
1641 	if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0)
1642 		return nfserr_bad_xdr;
1643 	if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0)
1644 		return nfserr_bad_xdr;
1645 	status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel);
1646 	if (status)
1647 		return status;
1648 	status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel);
1649 	if (status)
1650 		return status;
1651 	if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0)
1652 		return nfserr_bad_xdr;
1653 	status = nfsd4_decode_cb_sec(argp, &sess->cb_sec);
1654 	if (status)
1655 		return status;
1656 
1657 	return nfs_ok;
1658 }
1659 
1660 static __be32
1661 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp,
1662 			     struct nfsd4_destroy_session *destroy_session)
1663 {
1664 	return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid);
1665 }
1666 
1667 static __be32
1668 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp,
1669 			  struct nfsd4_free_stateid *free_stateid)
1670 {
1671 	return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid);
1672 }
1673 
1674 #ifdef CONFIG_NFSD_PNFS
1675 static __be32
1676 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp,
1677 		struct nfsd4_getdeviceinfo *gdev)
1678 {
1679 	__be32 status;
1680 
1681 	status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid);
1682 	if (status)
1683 		return status;
1684 	if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0)
1685 		return nfserr_bad_xdr;
1686 	if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0)
1687 		return nfserr_bad_xdr;
1688 	if (xdr_stream_decode_uint32_array(argp->xdr,
1689 					   &gdev->gd_notify_types, 1) < 0)
1690 		return nfserr_bad_xdr;
1691 
1692 	return nfs_ok;
1693 }
1694 
1695 static __be32
1696 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp,
1697 			  struct nfsd4_layoutcommit *lcp)
1698 {
1699 	__be32 *p, status;
1700 
1701 	if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0)
1702 		return nfserr_bad_xdr;
1703 	if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0)
1704 		return nfserr_bad_xdr;
1705 	if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0)
1706 		return nfserr_bad_xdr;
1707 	status = nfsd4_decode_stateid4(argp, &lcp->lc_sid);
1708 	if (status)
1709 		return status;
1710 	if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0)
1711 		return nfserr_bad_xdr;
1712 	if (lcp->lc_newoffset) {
1713 		if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0)
1714 			return nfserr_bad_xdr;
1715 	} else
1716 		lcp->lc_last_wr = 0;
1717 	p = xdr_inline_decode(argp->xdr, XDR_UNIT);
1718 	if (!p)
1719 		return nfserr_bad_xdr;
1720 	if (xdr_item_is_present(p)) {
1721 		status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime);
1722 		if (status)
1723 			return status;
1724 	} else {
1725 		lcp->lc_mtime.tv_nsec = UTIME_NOW;
1726 	}
1727 	return nfsd4_decode_layoutupdate4(argp, lcp);
1728 }
1729 
1730 static __be32
1731 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp,
1732 		struct nfsd4_layoutget *lgp)
1733 {
1734 	__be32 status;
1735 
1736 	if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0)
1737 		return nfserr_bad_xdr;
1738 	if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0)
1739 		return nfserr_bad_xdr;
1740 	if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0)
1741 		return nfserr_bad_xdr;
1742 	if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0)
1743 		return nfserr_bad_xdr;
1744 	if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0)
1745 		return nfserr_bad_xdr;
1746 	if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0)
1747 		return nfserr_bad_xdr;
1748 	status = nfsd4_decode_stateid4(argp, &lgp->lg_sid);
1749 	if (status)
1750 		return status;
1751 	if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0)
1752 		return nfserr_bad_xdr;
1753 
1754 	return nfs_ok;
1755 }
1756 
1757 static __be32
1758 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp,
1759 		struct nfsd4_layoutreturn *lrp)
1760 {
1761 	if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0)
1762 		return nfserr_bad_xdr;
1763 	if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0)
1764 		return nfserr_bad_xdr;
1765 	if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0)
1766 		return nfserr_bad_xdr;
1767 	return nfsd4_decode_layoutreturn4(argp, lrp);
1768 }
1769 #endif /* CONFIG_NFSD_PNFS */
1770 
1771 static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp,
1772 					   struct nfsd4_secinfo_no_name *sin)
1773 {
1774 	if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0)
1775 		return nfserr_bad_xdr;
1776 	return nfs_ok;
1777 }
1778 
1779 static __be32
1780 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp,
1781 		      struct nfsd4_sequence *seq)
1782 {
1783 	__be32 *p, status;
1784 
1785 	status = nfsd4_decode_sessionid4(argp, &seq->sessionid);
1786 	if (status)
1787 		return status;
1788 	p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4);
1789 	if (!p)
1790 		return nfserr_bad_xdr;
1791 	seq->seqid = be32_to_cpup(p++);
1792 	seq->slotid = be32_to_cpup(p++);
1793 	seq->maxslots = be32_to_cpup(p++);
1794 	seq->cachethis = be32_to_cpup(p);
1795 
1796 	return nfs_ok;
1797 }
1798 
1799 static __be32
1800 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid)
1801 {
1802 	struct nfsd4_test_stateid_id *stateid;
1803 	__be32 status;
1804 	u32 i;
1805 
1806 	if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0)
1807 		return nfserr_bad_xdr;
1808 
1809 	INIT_LIST_HEAD(&test_stateid->ts_stateid_list);
1810 	for (i = 0; i < test_stateid->ts_num_ids; i++) {
1811 		stateid = svcxdr_tmpalloc(argp, sizeof(*stateid));
1812 		if (!stateid)
1813 			return nfserr_jukebox;
1814 		INIT_LIST_HEAD(&stateid->ts_id_list);
1815 		list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list);
1816 		status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid);
1817 		if (status)
1818 			return status;
1819 	}
1820 
1821 	return nfs_ok;
1822 }
1823 
1824 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp,
1825 					    struct nfsd4_destroy_clientid *dc)
1826 {
1827 	return nfsd4_decode_clientid4(argp, &dc->clientid);
1828 }
1829 
1830 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp,
1831 					    struct nfsd4_reclaim_complete *rc)
1832 {
1833 	if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0)
1834 		return nfserr_bad_xdr;
1835 	return nfs_ok;
1836 }
1837 
1838 static __be32
1839 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp,
1840 		       struct nfsd4_fallocate *fallocate)
1841 {
1842 	__be32 status;
1843 
1844 	status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid);
1845 	if (status)
1846 		return status;
1847 	if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0)
1848 		return nfserr_bad_xdr;
1849 	if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0)
1850 		return nfserr_bad_xdr;
1851 
1852 	return nfs_ok;
1853 }
1854 
1855 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp,
1856 				      struct nl4_server *ns)
1857 {
1858 	struct nfs42_netaddr *naddr;
1859 	__be32 *p;
1860 
1861 	if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0)
1862 		return nfserr_bad_xdr;
1863 
1864 	/* currently support for 1 inter-server source server */
1865 	switch (ns->nl4_type) {
1866 	case NL4_NETADDR:
1867 		naddr = &ns->u.nl4_addr;
1868 
1869 		if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0)
1870 			return nfserr_bad_xdr;
1871 		if (naddr->netid_len > RPCBIND_MAXNETIDLEN)
1872 			return nfserr_bad_xdr;
1873 
1874 		p = xdr_inline_decode(argp->xdr, naddr->netid_len);
1875 		if (!p)
1876 			return nfserr_bad_xdr;
1877 		memcpy(naddr->netid, p, naddr->netid_len);
1878 
1879 		if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0)
1880 			return nfserr_bad_xdr;
1881 		if (naddr->addr_len > RPCBIND_MAXUADDRLEN)
1882 			return nfserr_bad_xdr;
1883 
1884 		p = xdr_inline_decode(argp->xdr, naddr->addr_len);
1885 		if (!p)
1886 			return nfserr_bad_xdr;
1887 		memcpy(naddr->addr, p, naddr->addr_len);
1888 		break;
1889 	default:
1890 		return nfserr_bad_xdr;
1891 	}
1892 
1893 	return nfs_ok;
1894 }
1895 
1896 static __be32
1897 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, struct nfsd4_copy *copy)
1898 {
1899 	u32 consecutive, i, count, sync;
1900 	struct nl4_server *ns_dummy;
1901 	__be32 status;
1902 
1903 	status = nfsd4_decode_stateid4(argp, &copy->cp_src_stateid);
1904 	if (status)
1905 		return status;
1906 	status = nfsd4_decode_stateid4(argp, &copy->cp_dst_stateid);
1907 	if (status)
1908 		return status;
1909 	if (xdr_stream_decode_u64(argp->xdr, &copy->cp_src_pos) < 0)
1910 		return nfserr_bad_xdr;
1911 	if (xdr_stream_decode_u64(argp->xdr, &copy->cp_dst_pos) < 0)
1912 		return nfserr_bad_xdr;
1913 	if (xdr_stream_decode_u64(argp->xdr, &copy->cp_count) < 0)
1914 		return nfserr_bad_xdr;
1915 	/* ca_consecutive: we always do consecutive copies */
1916 	if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0)
1917 		return nfserr_bad_xdr;
1918 	if (xdr_stream_decode_bool(argp->xdr, &sync) < 0)
1919 		return nfserr_bad_xdr;
1920 	nfsd4_copy_set_sync(copy, sync);
1921 
1922 	if (xdr_stream_decode_u32(argp->xdr, &count) < 0)
1923 		return nfserr_bad_xdr;
1924 	copy->cp_src = svcxdr_tmpalloc(argp, sizeof(*copy->cp_src));
1925 	if (copy->cp_src == NULL)
1926 		return nfserr_jukebox;
1927 	if (count == 0) { /* intra-server copy */
1928 		__set_bit(NFSD4_COPY_F_INTRA, &copy->cp_flags);
1929 		return nfs_ok;
1930 	}
1931 
1932 	/* decode all the supplied server addresses but use only the first */
1933 	status = nfsd4_decode_nl4_server(argp, copy->cp_src);
1934 	if (status)
1935 		return status;
1936 
1937 	ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL);
1938 	if (ns_dummy == NULL)
1939 		return nfserr_jukebox;
1940 	for (i = 0; i < count - 1; i++) {
1941 		status = nfsd4_decode_nl4_server(argp, ns_dummy);
1942 		if (status) {
1943 			kfree(ns_dummy);
1944 			return status;
1945 		}
1946 	}
1947 	kfree(ns_dummy);
1948 
1949 	return nfs_ok;
1950 }
1951 
1952 static __be32
1953 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp,
1954 			 struct nfsd4_copy_notify *cn)
1955 {
1956 	__be32 status;
1957 
1958 	cn->cpn_src = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_src));
1959 	if (cn->cpn_src == NULL)
1960 		return nfserr_jukebox;
1961 	cn->cpn_dst = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_dst));
1962 	if (cn->cpn_dst == NULL)
1963 		return nfserr_jukebox;
1964 
1965 	status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid);
1966 	if (status)
1967 		return status;
1968 	return nfsd4_decode_nl4_server(argp, cn->cpn_dst);
1969 }
1970 
1971 static __be32
1972 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp,
1973 			    struct nfsd4_offload_status *os)
1974 {
1975 	return nfsd4_decode_stateid4(argp, &os->stateid);
1976 }
1977 
1978 static __be32
1979 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, struct nfsd4_seek *seek)
1980 {
1981 	__be32 status;
1982 
1983 	status = nfsd4_decode_stateid4(argp, &seek->seek_stateid);
1984 	if (status)
1985 		return status;
1986 	if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0)
1987 		return nfserr_bad_xdr;
1988 	if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0)
1989 		return nfserr_bad_xdr;
1990 
1991 	return nfs_ok;
1992 }
1993 
1994 static __be32
1995 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, struct nfsd4_clone *clone)
1996 {
1997 	__be32 status;
1998 
1999 	status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid);
2000 	if (status)
2001 		return status;
2002 	status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid);
2003 	if (status)
2004 		return status;
2005 	if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0)
2006 		return nfserr_bad_xdr;
2007 	if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0)
2008 		return nfserr_bad_xdr;
2009 	if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0)
2010 		return nfserr_bad_xdr;
2011 
2012 	return nfs_ok;
2013 }
2014 
2015 /*
2016  * XDR data that is more than PAGE_SIZE in size is normally part of a
2017  * read or write. However, the size of extended attributes is limited
2018  * by the maximum request size, and then further limited by the underlying
2019  * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX
2020  * is 64k). Since there is no kvec- or page-based interface to xattrs,
2021  * and we're not dealing with contiguous pages, we need to do some copying.
2022  */
2023 
2024 /*
2025  * Decode data into buffer.
2026  */
2027 static __be32
2028 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr,
2029 		       char **bufp, u32 buflen)
2030 {
2031 	struct page **pages = xdr->pages;
2032 	struct kvec *head = xdr->head;
2033 	char *tmp, *dp;
2034 	u32 len;
2035 
2036 	if (buflen <= head->iov_len) {
2037 		/*
2038 		 * We're in luck, the head has enough space. Just return
2039 		 * the head, no need for copying.
2040 		 */
2041 		*bufp = head->iov_base;
2042 		return 0;
2043 	}
2044 
2045 	tmp = svcxdr_tmpalloc(argp, buflen);
2046 	if (tmp == NULL)
2047 		return nfserr_jukebox;
2048 
2049 	dp = tmp;
2050 	memcpy(dp, head->iov_base, head->iov_len);
2051 	buflen -= head->iov_len;
2052 	dp += head->iov_len;
2053 
2054 	while (buflen > 0) {
2055 		len = min_t(u32, buflen, PAGE_SIZE);
2056 		memcpy(dp, page_address(*pages), len);
2057 
2058 		buflen -= len;
2059 		dp += len;
2060 		pages++;
2061 	}
2062 
2063 	*bufp = tmp;
2064 	return 0;
2065 }
2066 
2067 /*
2068  * Get a user extended attribute name from the XDR buffer.
2069  * It will not have the "user." prefix, so prepend it.
2070  * Lastly, check for nul characters in the name.
2071  */
2072 static __be32
2073 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep)
2074 {
2075 	char *name, *sp, *dp;
2076 	u32 namelen, cnt;
2077 	__be32 *p;
2078 
2079 	if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0)
2080 		return nfserr_bad_xdr;
2081 	if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN))
2082 		return nfserr_nametoolong;
2083 	if (namelen == 0)
2084 		return nfserr_bad_xdr;
2085 	p = xdr_inline_decode(argp->xdr, namelen);
2086 	if (!p)
2087 		return nfserr_bad_xdr;
2088 	name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1);
2089 	if (!name)
2090 		return nfserr_jukebox;
2091 	memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN);
2092 
2093 	/*
2094 	 * Copy the extended attribute name over while checking for 0
2095 	 * characters.
2096 	 */
2097 	sp = (char *)p;
2098 	dp = name + XATTR_USER_PREFIX_LEN;
2099 	cnt = namelen;
2100 
2101 	while (cnt-- > 0) {
2102 		if (*sp == '\0')
2103 			return nfserr_bad_xdr;
2104 		*dp++ = *sp++;
2105 	}
2106 	*dp = '\0';
2107 
2108 	*namep = name;
2109 
2110 	return nfs_ok;
2111 }
2112 
2113 /*
2114  * A GETXATTR op request comes without a length specifier. We just set the
2115  * maximum length for the reply based on XATTR_SIZE_MAX and the maximum
2116  * channel reply size. nfsd_getxattr will probe the length of the xattr,
2117  * check it against getxa_len, and allocate + return the value.
2118  */
2119 static __be32
2120 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp,
2121 		      struct nfsd4_getxattr *getxattr)
2122 {
2123 	__be32 status;
2124 	u32 maxcount;
2125 
2126 	status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name);
2127 	if (status)
2128 		return status;
2129 
2130 	maxcount = svc_max_payload(argp->rqstp);
2131 	maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2132 
2133 	getxattr->getxa_len = maxcount;
2134 
2135 	return status;
2136 }
2137 
2138 static __be32
2139 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp,
2140 		      struct nfsd4_setxattr *setxattr)
2141 {
2142 	u32 flags, maxcount, size;
2143 	__be32 status;
2144 
2145 	if (xdr_stream_decode_u32(argp->xdr, &flags) < 0)
2146 		return nfserr_bad_xdr;
2147 
2148 	if (flags > SETXATTR4_REPLACE)
2149 		return nfserr_inval;
2150 	setxattr->setxa_flags = flags;
2151 
2152 	status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name);
2153 	if (status)
2154 		return status;
2155 
2156 	maxcount = svc_max_payload(argp->rqstp);
2157 	maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount);
2158 
2159 	if (xdr_stream_decode_u32(argp->xdr, &size) < 0)
2160 		return nfserr_bad_xdr;
2161 	if (size > maxcount)
2162 		return nfserr_xattr2big;
2163 
2164 	setxattr->setxa_len = size;
2165 	if (size > 0) {
2166 		struct xdr_buf payload;
2167 
2168 		if (!xdr_stream_subsegment(argp->xdr, &payload, size))
2169 			return nfserr_bad_xdr;
2170 		status = nfsd4_vbuf_from_vector(argp, &payload,
2171 						&setxattr->setxa_buf, size);
2172 	}
2173 
2174 	return nfs_ok;
2175 }
2176 
2177 static __be32
2178 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp,
2179 			struct nfsd4_listxattrs *listxattrs)
2180 {
2181 	u32 maxcount;
2182 
2183 	if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0)
2184 		return nfserr_bad_xdr;
2185 
2186 	/*
2187 	 * If the cookie  is too large to have even one user.x attribute
2188 	 * plus trailing '\0' left in a maximum size buffer, it's invalid.
2189 	 */
2190 	if (listxattrs->lsxa_cookie >=
2191 	    (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2)))
2192 		return nfserr_badcookie;
2193 
2194 	if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0)
2195 		return nfserr_bad_xdr;
2196 	if (maxcount < 8)
2197 		/* Always need at least 2 words (length and one character) */
2198 		return nfserr_inval;
2199 
2200 	maxcount = min(maxcount, svc_max_payload(argp->rqstp));
2201 	listxattrs->lsxa_maxcount = maxcount;
2202 
2203 	return nfs_ok;
2204 }
2205 
2206 static __be32
2207 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp,
2208 			 struct nfsd4_removexattr *removexattr)
2209 {
2210 	return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name);
2211 }
2212 
2213 static __be32
2214 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p)
2215 {
2216 	return nfs_ok;
2217 }
2218 
2219 static __be32
2220 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p)
2221 {
2222 	return nfserr_notsupp;
2223 }
2224 
2225 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *);
2226 
2227 static const nfsd4_dec nfsd4_dec_ops[] = {
2228 	[OP_ACCESS]		= (nfsd4_dec)nfsd4_decode_access,
2229 	[OP_CLOSE]		= (nfsd4_dec)nfsd4_decode_close,
2230 	[OP_COMMIT]		= (nfsd4_dec)nfsd4_decode_commit,
2231 	[OP_CREATE]		= (nfsd4_dec)nfsd4_decode_create,
2232 	[OP_DELEGPURGE]		= (nfsd4_dec)nfsd4_decode_notsupp,
2233 	[OP_DELEGRETURN]	= (nfsd4_dec)nfsd4_decode_delegreturn,
2234 	[OP_GETATTR]		= (nfsd4_dec)nfsd4_decode_getattr,
2235 	[OP_GETFH]		= (nfsd4_dec)nfsd4_decode_noop,
2236 	[OP_LINK]		= (nfsd4_dec)nfsd4_decode_link,
2237 	[OP_LOCK]		= (nfsd4_dec)nfsd4_decode_lock,
2238 	[OP_LOCKT]		= (nfsd4_dec)nfsd4_decode_lockt,
2239 	[OP_LOCKU]		= (nfsd4_dec)nfsd4_decode_locku,
2240 	[OP_LOOKUP]		= (nfsd4_dec)nfsd4_decode_lookup,
2241 	[OP_LOOKUPP]		= (nfsd4_dec)nfsd4_decode_noop,
2242 	[OP_NVERIFY]		= (nfsd4_dec)nfsd4_decode_verify,
2243 	[OP_OPEN]		= (nfsd4_dec)nfsd4_decode_open,
2244 	[OP_OPENATTR]		= (nfsd4_dec)nfsd4_decode_notsupp,
2245 	[OP_OPEN_CONFIRM]	= (nfsd4_dec)nfsd4_decode_open_confirm,
2246 	[OP_OPEN_DOWNGRADE]	= (nfsd4_dec)nfsd4_decode_open_downgrade,
2247 	[OP_PUTFH]		= (nfsd4_dec)nfsd4_decode_putfh,
2248 	[OP_PUTPUBFH]		= (nfsd4_dec)nfsd4_decode_putpubfh,
2249 	[OP_PUTROOTFH]		= (nfsd4_dec)nfsd4_decode_noop,
2250 	[OP_READ]		= (nfsd4_dec)nfsd4_decode_read,
2251 	[OP_READDIR]		= (nfsd4_dec)nfsd4_decode_readdir,
2252 	[OP_READLINK]		= (nfsd4_dec)nfsd4_decode_noop,
2253 	[OP_REMOVE]		= (nfsd4_dec)nfsd4_decode_remove,
2254 	[OP_RENAME]		= (nfsd4_dec)nfsd4_decode_rename,
2255 	[OP_RENEW]		= (nfsd4_dec)nfsd4_decode_renew,
2256 	[OP_RESTOREFH]		= (nfsd4_dec)nfsd4_decode_noop,
2257 	[OP_SAVEFH]		= (nfsd4_dec)nfsd4_decode_noop,
2258 	[OP_SECINFO]		= (nfsd4_dec)nfsd4_decode_secinfo,
2259 	[OP_SETATTR]		= (nfsd4_dec)nfsd4_decode_setattr,
2260 	[OP_SETCLIENTID]	= (nfsd4_dec)nfsd4_decode_setclientid,
2261 	[OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm,
2262 	[OP_VERIFY]		= (nfsd4_dec)nfsd4_decode_verify,
2263 	[OP_WRITE]		= (nfsd4_dec)nfsd4_decode_write,
2264 	[OP_RELEASE_LOCKOWNER]	= (nfsd4_dec)nfsd4_decode_release_lockowner,
2265 
2266 	/* new operations for NFSv4.1 */
2267 	[OP_BACKCHANNEL_CTL]	= (nfsd4_dec)nfsd4_decode_backchannel_ctl,
2268 	[OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session,
2269 	[OP_EXCHANGE_ID]	= (nfsd4_dec)nfsd4_decode_exchange_id,
2270 	[OP_CREATE_SESSION]	= (nfsd4_dec)nfsd4_decode_create_session,
2271 	[OP_DESTROY_SESSION]	= (nfsd4_dec)nfsd4_decode_destroy_session,
2272 	[OP_FREE_STATEID]	= (nfsd4_dec)nfsd4_decode_free_stateid,
2273 	[OP_GET_DIR_DELEGATION]	= (nfsd4_dec)nfsd4_decode_notsupp,
2274 #ifdef CONFIG_NFSD_PNFS
2275 	[OP_GETDEVICEINFO]	= (nfsd4_dec)nfsd4_decode_getdeviceinfo,
2276 	[OP_GETDEVICELIST]	= (nfsd4_dec)nfsd4_decode_notsupp,
2277 	[OP_LAYOUTCOMMIT]	= (nfsd4_dec)nfsd4_decode_layoutcommit,
2278 	[OP_LAYOUTGET]		= (nfsd4_dec)nfsd4_decode_layoutget,
2279 	[OP_LAYOUTRETURN]	= (nfsd4_dec)nfsd4_decode_layoutreturn,
2280 #else
2281 	[OP_GETDEVICEINFO]	= (nfsd4_dec)nfsd4_decode_notsupp,
2282 	[OP_GETDEVICELIST]	= (nfsd4_dec)nfsd4_decode_notsupp,
2283 	[OP_LAYOUTCOMMIT]	= (nfsd4_dec)nfsd4_decode_notsupp,
2284 	[OP_LAYOUTGET]		= (nfsd4_dec)nfsd4_decode_notsupp,
2285 	[OP_LAYOUTRETURN]	= (nfsd4_dec)nfsd4_decode_notsupp,
2286 #endif
2287 	[OP_SECINFO_NO_NAME]	= (nfsd4_dec)nfsd4_decode_secinfo_no_name,
2288 	[OP_SEQUENCE]		= (nfsd4_dec)nfsd4_decode_sequence,
2289 	[OP_SET_SSV]		= (nfsd4_dec)nfsd4_decode_notsupp,
2290 	[OP_TEST_STATEID]	= (nfsd4_dec)nfsd4_decode_test_stateid,
2291 	[OP_WANT_DELEGATION]	= (nfsd4_dec)nfsd4_decode_notsupp,
2292 	[OP_DESTROY_CLIENTID]	= (nfsd4_dec)nfsd4_decode_destroy_clientid,
2293 	[OP_RECLAIM_COMPLETE]	= (nfsd4_dec)nfsd4_decode_reclaim_complete,
2294 
2295 	/* new operations for NFSv4.2 */
2296 	[OP_ALLOCATE]		= (nfsd4_dec)nfsd4_decode_fallocate,
2297 	[OP_COPY]		= (nfsd4_dec)nfsd4_decode_copy,
2298 	[OP_COPY_NOTIFY]	= (nfsd4_dec)nfsd4_decode_copy_notify,
2299 	[OP_DEALLOCATE]		= (nfsd4_dec)nfsd4_decode_fallocate,
2300 	[OP_IO_ADVISE]		= (nfsd4_dec)nfsd4_decode_notsupp,
2301 	[OP_LAYOUTERROR]	= (nfsd4_dec)nfsd4_decode_notsupp,
2302 	[OP_LAYOUTSTATS]	= (nfsd4_dec)nfsd4_decode_notsupp,
2303 	[OP_OFFLOAD_CANCEL]	= (nfsd4_dec)nfsd4_decode_offload_status,
2304 	[OP_OFFLOAD_STATUS]	= (nfsd4_dec)nfsd4_decode_offload_status,
2305 	[OP_READ_PLUS]		= (nfsd4_dec)nfsd4_decode_read,
2306 	[OP_SEEK]		= (nfsd4_dec)nfsd4_decode_seek,
2307 	[OP_WRITE_SAME]		= (nfsd4_dec)nfsd4_decode_notsupp,
2308 	[OP_CLONE]		= (nfsd4_dec)nfsd4_decode_clone,
2309 	/* RFC 8276 extended atributes operations */
2310 	[OP_GETXATTR]		= (nfsd4_dec)nfsd4_decode_getxattr,
2311 	[OP_SETXATTR]		= (nfsd4_dec)nfsd4_decode_setxattr,
2312 	[OP_LISTXATTRS]		= (nfsd4_dec)nfsd4_decode_listxattrs,
2313 	[OP_REMOVEXATTR]	= (nfsd4_dec)nfsd4_decode_removexattr,
2314 };
2315 
2316 static inline bool
2317 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op)
2318 {
2319 	if (op->opnum < FIRST_NFS4_OP)
2320 		return false;
2321 	else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP)
2322 		return false;
2323 	else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP)
2324 		return false;
2325 	else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP)
2326 		return false;
2327 	return true;
2328 }
2329 
2330 static bool
2331 nfsd4_decode_compound(struct nfsd4_compoundargs *argp)
2332 {
2333 	struct nfsd4_op *op;
2334 	bool cachethis = false;
2335 	int auth_slack= argp->rqstp->rq_auth_slack;
2336 	int max_reply = auth_slack + 8; /* opcnt, status */
2337 	int readcount = 0;
2338 	int readbytes = 0;
2339 	__be32 *p;
2340 	int i;
2341 
2342 	if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0)
2343 		return false;
2344 	max_reply += XDR_UNIT;
2345 	argp->tag = NULL;
2346 	if (unlikely(argp->taglen)) {
2347 		if (argp->taglen > NFSD4_MAX_TAGLEN)
2348 			return false;
2349 		p = xdr_inline_decode(argp->xdr, argp->taglen);
2350 		if (!p)
2351 			return false;
2352 		argp->tag = svcxdr_savemem(argp, p, argp->taglen);
2353 		if (!argp->tag)
2354 			return false;
2355 		max_reply += xdr_align_size(argp->taglen);
2356 	}
2357 
2358 	if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0)
2359 		return false;
2360 	if (xdr_stream_decode_u32(argp->xdr, &argp->opcnt) < 0)
2361 		return false;
2362 
2363 	/*
2364 	 * NFS4ERR_RESOURCE is a more helpful error than GARBAGE_ARGS
2365 	 * here, so we return success at the xdr level so that
2366 	 * nfsd4_proc can handle this is an NFS-level error.
2367 	 */
2368 	if (argp->opcnt > NFSD_MAX_OPS_PER_COMPOUND)
2369 		return true;
2370 
2371 	if (argp->opcnt > ARRAY_SIZE(argp->iops)) {
2372 		argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL);
2373 		if (!argp->ops) {
2374 			argp->ops = argp->iops;
2375 			dprintk("nfsd: couldn't allocate room for COMPOUND\n");
2376 			return false;
2377 		}
2378 	}
2379 
2380 	if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION)
2381 		argp->opcnt = 0;
2382 
2383 	for (i = 0; i < argp->opcnt; i++) {
2384 		op = &argp->ops[i];
2385 		op->replay = NULL;
2386 
2387 		if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0)
2388 			return false;
2389 		if (nfsd4_opnum_in_range(argp, op)) {
2390 			op->status = nfsd4_dec_ops[op->opnum](argp, &op->u);
2391 			if (op->status != nfs_ok)
2392 				trace_nfsd_compound_decode_err(argp->rqstp,
2393 							       argp->opcnt, i,
2394 							       op->opnum,
2395 							       op->status);
2396 		} else {
2397 			op->opnum = OP_ILLEGAL;
2398 			op->status = nfserr_op_illegal;
2399 		}
2400 		op->opdesc = OPDESC(op);
2401 		/*
2402 		 * We'll try to cache the result in the DRC if any one
2403 		 * op in the compound wants to be cached:
2404 		 */
2405 		cachethis |= nfsd4_cache_this_op(op);
2406 
2407 		if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) {
2408 			readcount++;
2409 			readbytes += nfsd4_max_reply(argp->rqstp, op);
2410 		} else
2411 			max_reply += nfsd4_max_reply(argp->rqstp, op);
2412 		/*
2413 		 * OP_LOCK and OP_LOCKT may return a conflicting lock.
2414 		 * (Special case because it will just skip encoding this
2415 		 * if it runs out of xdr buffer space, and it is the only
2416 		 * operation that behaves this way.)
2417 		 */
2418 		if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT)
2419 			max_reply += NFS4_OPAQUE_LIMIT;
2420 
2421 		if (op->status) {
2422 			argp->opcnt = i+1;
2423 			break;
2424 		}
2425 	}
2426 	/* Sessions make the DRC unnecessary: */
2427 	if (argp->minorversion)
2428 		cachethis = false;
2429 	svc_reserve(argp->rqstp, max_reply + readbytes);
2430 	argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE;
2431 
2432 	if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack)
2433 		__clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags);
2434 
2435 	return true;
2436 }
2437 
2438 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode,
2439 			     struct svc_export *exp)
2440 {
2441 	if (exp->ex_flags & NFSEXP_V4ROOT) {
2442 		*p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time));
2443 		*p++ = 0;
2444 	} else
2445 		p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode));
2446 	return p;
2447 }
2448 
2449 /*
2450  * ctime (in NFSv4, time_metadata) is not writeable, and the client
2451  * doesn't really care what resolution could theoretically be stored by
2452  * the filesystem.
2453  *
2454  * The client cares how close together changes can be while still
2455  * guaranteeing ctime changes.  For most filesystems (which have
2456  * timestamps with nanosecond fields) that is limited by the resolution
2457  * of the time returned from current_time() (which I'm assuming to be
2458  * 1/HZ).
2459  */
2460 static __be32 *encode_time_delta(__be32 *p, struct inode *inode)
2461 {
2462 	struct timespec64 ts;
2463 	u32 ns;
2464 
2465 	ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran);
2466 	ts = ns_to_timespec64(ns);
2467 
2468 	p = xdr_encode_hyper(p, ts.tv_sec);
2469 	*p++ = cpu_to_be32(ts.tv_nsec);
2470 
2471 	return p;
2472 }
2473 
2474 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c)
2475 {
2476 	*p++ = cpu_to_be32(c->atomic);
2477 	p = xdr_encode_hyper(p, c->before_change);
2478 	p = xdr_encode_hyper(p, c->after_change);
2479 	return p;
2480 }
2481 
2482 /* Encode as an array of strings the string given with components
2483  * separated @sep, escaped with esc_enter and esc_exit.
2484  */
2485 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep,
2486 					  char *components, char esc_enter,
2487 					  char esc_exit)
2488 {
2489 	__be32 *p;
2490 	__be32 pathlen;
2491 	int pathlen_offset;
2492 	int strlen, count=0;
2493 	char *str, *end, *next;
2494 
2495 	dprintk("nfsd4_encode_components(%s)\n", components);
2496 
2497 	pathlen_offset = xdr->buf->len;
2498 	p = xdr_reserve_space(xdr, 4);
2499 	if (!p)
2500 		return nfserr_resource;
2501 	p++; /* We will fill this in with @count later */
2502 
2503 	end = str = components;
2504 	while (*end) {
2505 		bool found_esc = false;
2506 
2507 		/* try to parse as esc_start, ..., esc_end, sep */
2508 		if (*str == esc_enter) {
2509 			for (; *end && (*end != esc_exit); end++)
2510 				/* find esc_exit or end of string */;
2511 			next = end + 1;
2512 			if (*end && (!*next || *next == sep)) {
2513 				str++;
2514 				found_esc = true;
2515 			}
2516 		}
2517 
2518 		if (!found_esc)
2519 			for (; *end && (*end != sep); end++)
2520 				/* find sep or end of string */;
2521 
2522 		strlen = end - str;
2523 		if (strlen) {
2524 			p = xdr_reserve_space(xdr, strlen + 4);
2525 			if (!p)
2526 				return nfserr_resource;
2527 			p = xdr_encode_opaque(p, str, strlen);
2528 			count++;
2529 		}
2530 		else
2531 			end++;
2532 		if (found_esc)
2533 			end = next;
2534 
2535 		str = end;
2536 	}
2537 	pathlen = htonl(count);
2538 	write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4);
2539 	return 0;
2540 }
2541 
2542 /* Encode as an array of strings the string given with components
2543  * separated @sep.
2544  */
2545 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep,
2546 				      char *components)
2547 {
2548 	return nfsd4_encode_components_esc(xdr, sep, components, 0, 0);
2549 }
2550 
2551 /*
2552  * encode a location element of a fs_locations structure
2553  */
2554 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr,
2555 					struct nfsd4_fs_location *location)
2556 {
2557 	__be32 status;
2558 
2559 	status = nfsd4_encode_components_esc(xdr, ':', location->hosts,
2560 						'[', ']');
2561 	if (status)
2562 		return status;
2563 	status = nfsd4_encode_components(xdr, '/', location->path);
2564 	if (status)
2565 		return status;
2566 	return 0;
2567 }
2568 
2569 /*
2570  * Encode a path in RFC3530 'pathname4' format
2571  */
2572 static __be32 nfsd4_encode_path(struct xdr_stream *xdr,
2573 				const struct path *root,
2574 				const struct path *path)
2575 {
2576 	struct path cur = *path;
2577 	__be32 *p;
2578 	struct dentry **components = NULL;
2579 	unsigned int ncomponents = 0;
2580 	__be32 err = nfserr_jukebox;
2581 
2582 	dprintk("nfsd4_encode_components(");
2583 
2584 	path_get(&cur);
2585 	/* First walk the path up to the nfsd root, and store the
2586 	 * dentries/path components in an array.
2587 	 */
2588 	for (;;) {
2589 		if (path_equal(&cur, root))
2590 			break;
2591 		if (cur.dentry == cur.mnt->mnt_root) {
2592 			if (follow_up(&cur))
2593 				continue;
2594 			goto out_free;
2595 		}
2596 		if ((ncomponents & 15) == 0) {
2597 			struct dentry **new;
2598 			new = krealloc(components,
2599 					sizeof(*new) * (ncomponents + 16),
2600 					GFP_KERNEL);
2601 			if (!new)
2602 				goto out_free;
2603 			components = new;
2604 		}
2605 		components[ncomponents++] = cur.dentry;
2606 		cur.dentry = dget_parent(cur.dentry);
2607 	}
2608 	err = nfserr_resource;
2609 	p = xdr_reserve_space(xdr, 4);
2610 	if (!p)
2611 		goto out_free;
2612 	*p++ = cpu_to_be32(ncomponents);
2613 
2614 	while (ncomponents) {
2615 		struct dentry *dentry = components[ncomponents - 1];
2616 		unsigned int len;
2617 
2618 		spin_lock(&dentry->d_lock);
2619 		len = dentry->d_name.len;
2620 		p = xdr_reserve_space(xdr, len + 4);
2621 		if (!p) {
2622 			spin_unlock(&dentry->d_lock);
2623 			goto out_free;
2624 		}
2625 		p = xdr_encode_opaque(p, dentry->d_name.name, len);
2626 		dprintk("/%pd", dentry);
2627 		spin_unlock(&dentry->d_lock);
2628 		dput(dentry);
2629 		ncomponents--;
2630 	}
2631 
2632 	err = 0;
2633 out_free:
2634 	dprintk(")\n");
2635 	while (ncomponents)
2636 		dput(components[--ncomponents]);
2637 	kfree(components);
2638 	path_put(&cur);
2639 	return err;
2640 }
2641 
2642 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr,
2643 			struct svc_rqst *rqstp, const struct path *path)
2644 {
2645 	struct svc_export *exp_ps;
2646 	__be32 res;
2647 
2648 	exp_ps = rqst_find_fsidzero_export(rqstp);
2649 	if (IS_ERR(exp_ps))
2650 		return nfserrno(PTR_ERR(exp_ps));
2651 	res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path);
2652 	exp_put(exp_ps);
2653 	return res;
2654 }
2655 
2656 /*
2657  *  encode a fs_locations structure
2658  */
2659 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr,
2660 			struct svc_rqst *rqstp, struct svc_export *exp)
2661 {
2662 	__be32 status;
2663 	int i;
2664 	__be32 *p;
2665 	struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs;
2666 
2667 	status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path);
2668 	if (status)
2669 		return status;
2670 	p = xdr_reserve_space(xdr, 4);
2671 	if (!p)
2672 		return nfserr_resource;
2673 	*p++ = cpu_to_be32(fslocs->locations_count);
2674 	for (i=0; i<fslocs->locations_count; i++) {
2675 		status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]);
2676 		if (status)
2677 			return status;
2678 	}
2679 	return 0;
2680 }
2681 
2682 static u32 nfs4_file_type(umode_t mode)
2683 {
2684 	switch (mode & S_IFMT) {
2685 	case S_IFIFO:	return NF4FIFO;
2686 	case S_IFCHR:	return NF4CHR;
2687 	case S_IFDIR:	return NF4DIR;
2688 	case S_IFBLK:	return NF4BLK;
2689 	case S_IFLNK:	return NF4LNK;
2690 	case S_IFREG:	return NF4REG;
2691 	case S_IFSOCK:	return NF4SOCK;
2692 	default:	return NF4BAD;
2693 	}
2694 }
2695 
2696 static inline __be32
2697 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2698 		     struct nfs4_ace *ace)
2699 {
2700 	if (ace->whotype != NFS4_ACL_WHO_NAMED)
2701 		return nfs4_acl_write_who(xdr, ace->whotype);
2702 	else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP)
2703 		return nfsd4_encode_group(xdr, rqstp, ace->who_gid);
2704 	else
2705 		return nfsd4_encode_user(xdr, rqstp, ace->who_uid);
2706 }
2707 
2708 static inline __be32
2709 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types)
2710 {
2711 	__be32		*p;
2712 	unsigned long	i = hweight_long(layout_types);
2713 
2714 	p = xdr_reserve_space(xdr, 4 + 4 * i);
2715 	if (!p)
2716 		return nfserr_resource;
2717 
2718 	*p++ = cpu_to_be32(i);
2719 
2720 	for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i)
2721 		if (layout_types & (1 << i))
2722 			*p++ = cpu_to_be32(i);
2723 
2724 	return 0;
2725 }
2726 
2727 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \
2728 			      FATTR4_WORD0_RDATTR_ERROR)
2729 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID
2730 #define WORD2_ABSENT_FS_ATTRS 0
2731 
2732 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2733 static inline __be32
2734 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2735 			    void *context, int len)
2736 {
2737 	__be32 *p;
2738 
2739 	p = xdr_reserve_space(xdr, len + 4 + 4 + 4);
2740 	if (!p)
2741 		return nfserr_resource;
2742 
2743 	/*
2744 	 * For now we use a 0 here to indicate the null translation; in
2745 	 * the future we may place a call to translation code here.
2746 	 */
2747 	*p++ = cpu_to_be32(0); /* lfs */
2748 	*p++ = cpu_to_be32(0); /* pi */
2749 	p = xdr_encode_opaque(p, context, len);
2750 	return 0;
2751 }
2752 #else
2753 static inline __be32
2754 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp,
2755 			    void *context, int len)
2756 { return 0; }
2757 #endif
2758 
2759 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err)
2760 {
2761 	/* As per referral draft:  */
2762 	if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS ||
2763 	    *bmval1 & ~WORD1_ABSENT_FS_ATTRS) {
2764 		if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR ||
2765 	            *bmval0 & FATTR4_WORD0_FS_LOCATIONS)
2766 			*rdattr_err = NFSERR_MOVED;
2767 		else
2768 			return nfserr_moved;
2769 	}
2770 	*bmval0 &= WORD0_ABSENT_FS_ATTRS;
2771 	*bmval1 &= WORD1_ABSENT_FS_ATTRS;
2772 	*bmval2 &= WORD2_ABSENT_FS_ATTRS;
2773 	return 0;
2774 }
2775 
2776 
2777 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat)
2778 {
2779 	struct path path = exp->ex_path;
2780 	int err;
2781 
2782 	path_get(&path);
2783 	while (follow_up(&path)) {
2784 		if (path.dentry != path.mnt->mnt_root)
2785 			break;
2786 	}
2787 	err = vfs_getattr(&path, stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
2788 	path_put(&path);
2789 	return err;
2790 }
2791 
2792 static __be32
2793 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2)
2794 {
2795 	__be32 *p;
2796 
2797 	if (bmval2) {
2798 		p = xdr_reserve_space(xdr, 16);
2799 		if (!p)
2800 			goto out_resource;
2801 		*p++ = cpu_to_be32(3);
2802 		*p++ = cpu_to_be32(bmval0);
2803 		*p++ = cpu_to_be32(bmval1);
2804 		*p++ = cpu_to_be32(bmval2);
2805 	} else if (bmval1) {
2806 		p = xdr_reserve_space(xdr, 12);
2807 		if (!p)
2808 			goto out_resource;
2809 		*p++ = cpu_to_be32(2);
2810 		*p++ = cpu_to_be32(bmval0);
2811 		*p++ = cpu_to_be32(bmval1);
2812 	} else {
2813 		p = xdr_reserve_space(xdr, 8);
2814 		if (!p)
2815 			goto out_resource;
2816 		*p++ = cpu_to_be32(1);
2817 		*p++ = cpu_to_be32(bmval0);
2818 	}
2819 
2820 	return 0;
2821 out_resource:
2822 	return nfserr_resource;
2823 }
2824 
2825 /*
2826  * Note: @fhp can be NULL; in this case, we might have to compose the filehandle
2827  * ourselves.
2828  */
2829 static __be32
2830 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp,
2831 		struct svc_export *exp,
2832 		struct dentry *dentry, u32 *bmval,
2833 		struct svc_rqst *rqstp, int ignore_crossmnt)
2834 {
2835 	u32 bmval0 = bmval[0];
2836 	u32 bmval1 = bmval[1];
2837 	u32 bmval2 = bmval[2];
2838 	struct kstat stat;
2839 	struct svc_fh *tempfh = NULL;
2840 	struct kstatfs statfs;
2841 	__be32 *p, *attrlen_p;
2842 	int starting_len = xdr->buf->len;
2843 	int attrlen_offset;
2844 	u32 dummy;
2845 	u64 dummy64;
2846 	u32 rdattr_err = 0;
2847 	__be32 status;
2848 	int err;
2849 	struct nfs4_acl *acl = NULL;
2850 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2851 	void *context = NULL;
2852 	int contextlen;
2853 #endif
2854 	bool contextsupport = false;
2855 	struct nfsd4_compoundres *resp = rqstp->rq_resp;
2856 	u32 minorversion = resp->cstate.minorversion;
2857 	struct path path = {
2858 		.mnt	= exp->ex_path.mnt,
2859 		.dentry	= dentry,
2860 	};
2861 	struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id);
2862 
2863 	BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1);
2864 	BUG_ON(!nfsd_attrs_supported(minorversion, bmval));
2865 
2866 	if (exp->ex_fslocs.migrated) {
2867 		status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err);
2868 		if (status)
2869 			goto out;
2870 	}
2871 
2872 	err = vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT);
2873 	if (err)
2874 		goto out_nfserr;
2875 	if (!(stat.result_mask & STATX_BTIME))
2876 		/* underlying FS does not offer btime so we can't share it */
2877 		bmval1 &= ~FATTR4_WORD1_TIME_CREATE;
2878 	if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE |
2879 			FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) ||
2880 	    (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE |
2881 		       FATTR4_WORD1_SPACE_TOTAL))) {
2882 		err = vfs_statfs(&path, &statfs);
2883 		if (err)
2884 			goto out_nfserr;
2885 	}
2886 	if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) {
2887 		tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL);
2888 		status = nfserr_jukebox;
2889 		if (!tempfh)
2890 			goto out;
2891 		fh_init(tempfh, NFS4_FHSIZE);
2892 		status = fh_compose(tempfh, exp, dentry, NULL);
2893 		if (status)
2894 			goto out;
2895 		fhp = tempfh;
2896 	}
2897 	if (bmval0 & FATTR4_WORD0_ACL) {
2898 		err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl);
2899 		if (err == -EOPNOTSUPP)
2900 			bmval0 &= ~FATTR4_WORD0_ACL;
2901 		else if (err == -EINVAL) {
2902 			status = nfserr_attrnotsupp;
2903 			goto out;
2904 		} else if (err != 0)
2905 			goto out_nfserr;
2906 	}
2907 
2908 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
2909 	if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) ||
2910 	     bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2911 		if (exp->ex_flags & NFSEXP_SECURITY_LABEL)
2912 			err = security_inode_getsecctx(d_inode(dentry),
2913 						&context, &contextlen);
2914 		else
2915 			err = -EOPNOTSUPP;
2916 		contextsupport = (err == 0);
2917 		if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
2918 			if (err == -EOPNOTSUPP)
2919 				bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL;
2920 			else if (err)
2921 				goto out_nfserr;
2922 		}
2923 	}
2924 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
2925 
2926 	status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2);
2927 	if (status)
2928 		goto out;
2929 
2930 	attrlen_offset = xdr->buf->len;
2931 	attrlen_p = xdr_reserve_space(xdr, XDR_UNIT);
2932 	if (!attrlen_p)
2933 		goto out_resource;
2934 
2935 	if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) {
2936 		u32 supp[3];
2937 
2938 		memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
2939 
2940 		if (!IS_POSIXACL(dentry->d_inode))
2941 			supp[0] &= ~FATTR4_WORD0_ACL;
2942 		if (!contextsupport)
2943 			supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL;
2944 		if (!supp[2]) {
2945 			p = xdr_reserve_space(xdr, 12);
2946 			if (!p)
2947 				goto out_resource;
2948 			*p++ = cpu_to_be32(2);
2949 			*p++ = cpu_to_be32(supp[0]);
2950 			*p++ = cpu_to_be32(supp[1]);
2951 		} else {
2952 			p = xdr_reserve_space(xdr, 16);
2953 			if (!p)
2954 				goto out_resource;
2955 			*p++ = cpu_to_be32(3);
2956 			*p++ = cpu_to_be32(supp[0]);
2957 			*p++ = cpu_to_be32(supp[1]);
2958 			*p++ = cpu_to_be32(supp[2]);
2959 		}
2960 	}
2961 	if (bmval0 & FATTR4_WORD0_TYPE) {
2962 		p = xdr_reserve_space(xdr, 4);
2963 		if (!p)
2964 			goto out_resource;
2965 		dummy = nfs4_file_type(stat.mode);
2966 		if (dummy == NF4BAD) {
2967 			status = nfserr_serverfault;
2968 			goto out;
2969 		}
2970 		*p++ = cpu_to_be32(dummy);
2971 	}
2972 	if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) {
2973 		p = xdr_reserve_space(xdr, 4);
2974 		if (!p)
2975 			goto out_resource;
2976 		if (exp->ex_flags & NFSEXP_NOSUBTREECHECK)
2977 			*p++ = cpu_to_be32(NFS4_FH_PERSISTENT);
2978 		else
2979 			*p++ = cpu_to_be32(NFS4_FH_PERSISTENT|
2980 						NFS4_FH_VOL_RENAME);
2981 	}
2982 	if (bmval0 & FATTR4_WORD0_CHANGE) {
2983 		p = xdr_reserve_space(xdr, 8);
2984 		if (!p)
2985 			goto out_resource;
2986 		p = encode_change(p, &stat, d_inode(dentry), exp);
2987 	}
2988 	if (bmval0 & FATTR4_WORD0_SIZE) {
2989 		p = xdr_reserve_space(xdr, 8);
2990 		if (!p)
2991 			goto out_resource;
2992 		p = xdr_encode_hyper(p, stat.size);
2993 	}
2994 	if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) {
2995 		p = xdr_reserve_space(xdr, 4);
2996 		if (!p)
2997 			goto out_resource;
2998 		*p++ = cpu_to_be32(1);
2999 	}
3000 	if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) {
3001 		p = xdr_reserve_space(xdr, 4);
3002 		if (!p)
3003 			goto out_resource;
3004 		*p++ = cpu_to_be32(1);
3005 	}
3006 	if (bmval0 & FATTR4_WORD0_NAMED_ATTR) {
3007 		p = xdr_reserve_space(xdr, 4);
3008 		if (!p)
3009 			goto out_resource;
3010 		*p++ = cpu_to_be32(0);
3011 	}
3012 	if (bmval0 & FATTR4_WORD0_FSID) {
3013 		p = xdr_reserve_space(xdr, 16);
3014 		if (!p)
3015 			goto out_resource;
3016 		if (exp->ex_fslocs.migrated) {
3017 			p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR);
3018 			p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR);
3019 		} else switch(fsid_source(fhp)) {
3020 		case FSIDSOURCE_FSID:
3021 			p = xdr_encode_hyper(p, (u64)exp->ex_fsid);
3022 			p = xdr_encode_hyper(p, (u64)0);
3023 			break;
3024 		case FSIDSOURCE_DEV:
3025 			*p++ = cpu_to_be32(0);
3026 			*p++ = cpu_to_be32(MAJOR(stat.dev));
3027 			*p++ = cpu_to_be32(0);
3028 			*p++ = cpu_to_be32(MINOR(stat.dev));
3029 			break;
3030 		case FSIDSOURCE_UUID:
3031 			p = xdr_encode_opaque_fixed(p, exp->ex_uuid,
3032 								EX_UUID_LEN);
3033 			break;
3034 		}
3035 	}
3036 	if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) {
3037 		p = xdr_reserve_space(xdr, 4);
3038 		if (!p)
3039 			goto out_resource;
3040 		*p++ = cpu_to_be32(0);
3041 	}
3042 	if (bmval0 & FATTR4_WORD0_LEASE_TIME) {
3043 		p = xdr_reserve_space(xdr, 4);
3044 		if (!p)
3045 			goto out_resource;
3046 		*p++ = cpu_to_be32(nn->nfsd4_lease);
3047 	}
3048 	if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) {
3049 		p = xdr_reserve_space(xdr, 4);
3050 		if (!p)
3051 			goto out_resource;
3052 		*p++ = cpu_to_be32(rdattr_err);
3053 	}
3054 	if (bmval0 & FATTR4_WORD0_ACL) {
3055 		struct nfs4_ace *ace;
3056 
3057 		if (acl == NULL) {
3058 			p = xdr_reserve_space(xdr, 4);
3059 			if (!p)
3060 				goto out_resource;
3061 
3062 			*p++ = cpu_to_be32(0);
3063 			goto out_acl;
3064 		}
3065 		p = xdr_reserve_space(xdr, 4);
3066 		if (!p)
3067 			goto out_resource;
3068 		*p++ = cpu_to_be32(acl->naces);
3069 
3070 		for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) {
3071 			p = xdr_reserve_space(xdr, 4*3);
3072 			if (!p)
3073 				goto out_resource;
3074 			*p++ = cpu_to_be32(ace->type);
3075 			*p++ = cpu_to_be32(ace->flag);
3076 			*p++ = cpu_to_be32(ace->access_mask &
3077 							NFS4_ACE_MASK_ALL);
3078 			status = nfsd4_encode_aclname(xdr, rqstp, ace);
3079 			if (status)
3080 				goto out;
3081 		}
3082 	}
3083 out_acl:
3084 	if (bmval0 & FATTR4_WORD0_ACLSUPPORT) {
3085 		p = xdr_reserve_space(xdr, 4);
3086 		if (!p)
3087 			goto out_resource;
3088 		*p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ?
3089 			ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0);
3090 	}
3091 	if (bmval0 & FATTR4_WORD0_CANSETTIME) {
3092 		p = xdr_reserve_space(xdr, 4);
3093 		if (!p)
3094 			goto out_resource;
3095 		*p++ = cpu_to_be32(1);
3096 	}
3097 	if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) {
3098 		p = xdr_reserve_space(xdr, 4);
3099 		if (!p)
3100 			goto out_resource;
3101 		*p++ = cpu_to_be32(0);
3102 	}
3103 	if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) {
3104 		p = xdr_reserve_space(xdr, 4);
3105 		if (!p)
3106 			goto out_resource;
3107 		*p++ = cpu_to_be32(1);
3108 	}
3109 	if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) {
3110 		p = xdr_reserve_space(xdr, 4);
3111 		if (!p)
3112 			goto out_resource;
3113 		*p++ = cpu_to_be32(1);
3114 	}
3115 	if (bmval0 & FATTR4_WORD0_FILEHANDLE) {
3116 		p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4);
3117 		if (!p)
3118 			goto out_resource;
3119 		p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw,
3120 					fhp->fh_handle.fh_size);
3121 	}
3122 	if (bmval0 & FATTR4_WORD0_FILEID) {
3123 		p = xdr_reserve_space(xdr, 8);
3124 		if (!p)
3125 			goto out_resource;
3126 		p = xdr_encode_hyper(p, stat.ino);
3127 	}
3128 	if (bmval0 & FATTR4_WORD0_FILES_AVAIL) {
3129 		p = xdr_reserve_space(xdr, 8);
3130 		if (!p)
3131 			goto out_resource;
3132 		p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3133 	}
3134 	if (bmval0 & FATTR4_WORD0_FILES_FREE) {
3135 		p = xdr_reserve_space(xdr, 8);
3136 		if (!p)
3137 			goto out_resource;
3138 		p = xdr_encode_hyper(p, (u64) statfs.f_ffree);
3139 	}
3140 	if (bmval0 & FATTR4_WORD0_FILES_TOTAL) {
3141 		p = xdr_reserve_space(xdr, 8);
3142 		if (!p)
3143 			goto out_resource;
3144 		p = xdr_encode_hyper(p, (u64) statfs.f_files);
3145 	}
3146 	if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) {
3147 		status = nfsd4_encode_fs_locations(xdr, rqstp, exp);
3148 		if (status)
3149 			goto out;
3150 	}
3151 	if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) {
3152 		p = xdr_reserve_space(xdr, 4);
3153 		if (!p)
3154 			goto out_resource;
3155 		*p++ = cpu_to_be32(1);
3156 	}
3157 	if (bmval0 & FATTR4_WORD0_MAXFILESIZE) {
3158 		p = xdr_reserve_space(xdr, 8);
3159 		if (!p)
3160 			goto out_resource;
3161 		p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes);
3162 	}
3163 	if (bmval0 & FATTR4_WORD0_MAXLINK) {
3164 		p = xdr_reserve_space(xdr, 4);
3165 		if (!p)
3166 			goto out_resource;
3167 		*p++ = cpu_to_be32(255);
3168 	}
3169 	if (bmval0 & FATTR4_WORD0_MAXNAME) {
3170 		p = xdr_reserve_space(xdr, 4);
3171 		if (!p)
3172 			goto out_resource;
3173 		*p++ = cpu_to_be32(statfs.f_namelen);
3174 	}
3175 	if (bmval0 & FATTR4_WORD0_MAXREAD) {
3176 		p = xdr_reserve_space(xdr, 8);
3177 		if (!p)
3178 			goto out_resource;
3179 		p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3180 	}
3181 	if (bmval0 & FATTR4_WORD0_MAXWRITE) {
3182 		p = xdr_reserve_space(xdr, 8);
3183 		if (!p)
3184 			goto out_resource;
3185 		p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp));
3186 	}
3187 	if (bmval1 & FATTR4_WORD1_MODE) {
3188 		p = xdr_reserve_space(xdr, 4);
3189 		if (!p)
3190 			goto out_resource;
3191 		*p++ = cpu_to_be32(stat.mode & S_IALLUGO);
3192 	}
3193 	if (bmval1 & FATTR4_WORD1_NO_TRUNC) {
3194 		p = xdr_reserve_space(xdr, 4);
3195 		if (!p)
3196 			goto out_resource;
3197 		*p++ = cpu_to_be32(1);
3198 	}
3199 	if (bmval1 & FATTR4_WORD1_NUMLINKS) {
3200 		p = xdr_reserve_space(xdr, 4);
3201 		if (!p)
3202 			goto out_resource;
3203 		*p++ = cpu_to_be32(stat.nlink);
3204 	}
3205 	if (bmval1 & FATTR4_WORD1_OWNER) {
3206 		status = nfsd4_encode_user(xdr, rqstp, stat.uid);
3207 		if (status)
3208 			goto out;
3209 	}
3210 	if (bmval1 & FATTR4_WORD1_OWNER_GROUP) {
3211 		status = nfsd4_encode_group(xdr, rqstp, stat.gid);
3212 		if (status)
3213 			goto out;
3214 	}
3215 	if (bmval1 & FATTR4_WORD1_RAWDEV) {
3216 		p = xdr_reserve_space(xdr, 8);
3217 		if (!p)
3218 			goto out_resource;
3219 		*p++ = cpu_to_be32((u32) MAJOR(stat.rdev));
3220 		*p++ = cpu_to_be32((u32) MINOR(stat.rdev));
3221 	}
3222 	if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) {
3223 		p = xdr_reserve_space(xdr, 8);
3224 		if (!p)
3225 			goto out_resource;
3226 		dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize;
3227 		p = xdr_encode_hyper(p, dummy64);
3228 	}
3229 	if (bmval1 & FATTR4_WORD1_SPACE_FREE) {
3230 		p = xdr_reserve_space(xdr, 8);
3231 		if (!p)
3232 			goto out_resource;
3233 		dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize;
3234 		p = xdr_encode_hyper(p, dummy64);
3235 	}
3236 	if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) {
3237 		p = xdr_reserve_space(xdr, 8);
3238 		if (!p)
3239 			goto out_resource;
3240 		dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize;
3241 		p = xdr_encode_hyper(p, dummy64);
3242 	}
3243 	if (bmval1 & FATTR4_WORD1_SPACE_USED) {
3244 		p = xdr_reserve_space(xdr, 8);
3245 		if (!p)
3246 			goto out_resource;
3247 		dummy64 = (u64)stat.blocks << 9;
3248 		p = xdr_encode_hyper(p, dummy64);
3249 	}
3250 	if (bmval1 & FATTR4_WORD1_TIME_ACCESS) {
3251 		p = xdr_reserve_space(xdr, 12);
3252 		if (!p)
3253 			goto out_resource;
3254 		p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec);
3255 		*p++ = cpu_to_be32(stat.atime.tv_nsec);
3256 	}
3257 	if (bmval1 & FATTR4_WORD1_TIME_DELTA) {
3258 		p = xdr_reserve_space(xdr, 12);
3259 		if (!p)
3260 			goto out_resource;
3261 		p = encode_time_delta(p, d_inode(dentry));
3262 	}
3263 	if (bmval1 & FATTR4_WORD1_TIME_METADATA) {
3264 		p = xdr_reserve_space(xdr, 12);
3265 		if (!p)
3266 			goto out_resource;
3267 		p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec);
3268 		*p++ = cpu_to_be32(stat.ctime.tv_nsec);
3269 	}
3270 	if (bmval1 & FATTR4_WORD1_TIME_MODIFY) {
3271 		p = xdr_reserve_space(xdr, 12);
3272 		if (!p)
3273 			goto out_resource;
3274 		p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec);
3275 		*p++ = cpu_to_be32(stat.mtime.tv_nsec);
3276 	}
3277 	if (bmval1 & FATTR4_WORD1_TIME_CREATE) {
3278 		p = xdr_reserve_space(xdr, 12);
3279 		if (!p)
3280 			goto out_resource;
3281 		p = xdr_encode_hyper(p, (s64)stat.btime.tv_sec);
3282 		*p++ = cpu_to_be32(stat.btime.tv_nsec);
3283 	}
3284 	if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) {
3285 		struct kstat parent_stat;
3286 		u64 ino = stat.ino;
3287 
3288 		p = xdr_reserve_space(xdr, 8);
3289 		if (!p)
3290                 	goto out_resource;
3291 		/*
3292 		 * Get parent's attributes if not ignoring crossmount
3293 		 * and this is the root of a cross-mounted filesystem.
3294 		 */
3295 		if (ignore_crossmnt == 0 &&
3296 		    dentry == exp->ex_path.mnt->mnt_root) {
3297 			err = get_parent_attributes(exp, &parent_stat);
3298 			if (err)
3299 				goto out_nfserr;
3300 			ino = parent_stat.ino;
3301 		}
3302 		p = xdr_encode_hyper(p, ino);
3303 	}
3304 #ifdef CONFIG_NFSD_PNFS
3305 	if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) {
3306 		status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3307 		if (status)
3308 			goto out;
3309 	}
3310 
3311 	if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) {
3312 		status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types);
3313 		if (status)
3314 			goto out;
3315 	}
3316 
3317 	if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) {
3318 		p = xdr_reserve_space(xdr, 4);
3319 		if (!p)
3320 			goto out_resource;
3321 		*p++ = cpu_to_be32(stat.blksize);
3322 	}
3323 #endif /* CONFIG_NFSD_PNFS */
3324 	if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) {
3325 		u32 supp[3];
3326 
3327 		memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp));
3328 		supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0;
3329 		supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1;
3330 		supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2;
3331 
3332 		status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]);
3333 		if (status)
3334 			goto out;
3335 	}
3336 
3337 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3338 	if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) {
3339 		status = nfsd4_encode_security_label(xdr, rqstp, context,
3340 								contextlen);
3341 		if (status)
3342 			goto out;
3343 	}
3344 #endif
3345 
3346 	if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) {
3347 		p = xdr_reserve_space(xdr, 4);
3348 		if (!p)
3349 			goto out_resource;
3350 		err = xattr_supported_namespace(d_inode(dentry),
3351 						XATTR_USER_PREFIX);
3352 		*p++ = cpu_to_be32(err == 0);
3353 	}
3354 
3355 	*attrlen_p = cpu_to_be32(xdr->buf->len - attrlen_offset - XDR_UNIT);
3356 	status = nfs_ok;
3357 
3358 out:
3359 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL
3360 	if (context)
3361 		security_release_secctx(context, contextlen);
3362 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */
3363 	kfree(acl);
3364 	if (tempfh) {
3365 		fh_put(tempfh);
3366 		kfree(tempfh);
3367 	}
3368 	if (status)
3369 		xdr_truncate_encode(xdr, starting_len);
3370 	return status;
3371 out_nfserr:
3372 	status = nfserrno(err);
3373 	goto out;
3374 out_resource:
3375 	status = nfserr_resource;
3376 	goto out;
3377 }
3378 
3379 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr,
3380 				struct xdr_buf *buf, __be32 *p, int bytes)
3381 {
3382 	xdr->scratch.iov_len = 0;
3383 	memset(buf, 0, sizeof(struct xdr_buf));
3384 	buf->head[0].iov_base = p;
3385 	buf->head[0].iov_len = 0;
3386 	buf->len = 0;
3387 	xdr->buf = buf;
3388 	xdr->iov = buf->head;
3389 	xdr->p = p;
3390 	xdr->end = (void *)p + bytes;
3391 	buf->buflen = bytes;
3392 }
3393 
3394 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words,
3395 			struct svc_fh *fhp, struct svc_export *exp,
3396 			struct dentry *dentry, u32 *bmval,
3397 			struct svc_rqst *rqstp, int ignore_crossmnt)
3398 {
3399 	struct xdr_buf dummy;
3400 	struct xdr_stream xdr;
3401 	__be32 ret;
3402 
3403 	svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2);
3404 	ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp,
3405 							ignore_crossmnt);
3406 	*p = xdr.p;
3407 	return ret;
3408 }
3409 
3410 static inline int attributes_need_mount(u32 *bmval)
3411 {
3412 	if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME))
3413 		return 1;
3414 	if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID)
3415 		return 1;
3416 	return 0;
3417 }
3418 
3419 static __be32
3420 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd,
3421 			const char *name, int namlen)
3422 {
3423 	struct svc_export *exp = cd->rd_fhp->fh_export;
3424 	struct dentry *dentry;
3425 	__be32 nfserr;
3426 	int ignore_crossmnt = 0;
3427 
3428 	dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen);
3429 	if (IS_ERR(dentry))
3430 		return nfserrno(PTR_ERR(dentry));
3431 
3432 	exp_get(exp);
3433 	/*
3434 	 * In the case of a mountpoint, the client may be asking for
3435 	 * attributes that are only properties of the underlying filesystem
3436 	 * as opposed to the cross-mounted file system. In such a case,
3437 	 * we will not follow the cross mount and will fill the attribtutes
3438 	 * directly from the mountpoint dentry.
3439 	 */
3440 	if (nfsd_mountpoint(dentry, exp)) {
3441 		int err;
3442 
3443 		if (!(exp->ex_flags & NFSEXP_V4ROOT)
3444 				&& !attributes_need_mount(cd->rd_bmval)) {
3445 			ignore_crossmnt = 1;
3446 			goto out_encode;
3447 		}
3448 		/*
3449 		 * Why the heck aren't we just using nfsd_lookup??
3450 		 * Different "."/".." handling?  Something else?
3451 		 * At least, add a comment here to explain....
3452 		 */
3453 		err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp);
3454 		if (err) {
3455 			nfserr = nfserrno(err);
3456 			goto out_put;
3457 		}
3458 		nfserr = check_nfsd_access(exp, cd->rd_rqstp);
3459 		if (nfserr)
3460 			goto out_put;
3461 
3462 	}
3463 out_encode:
3464 	nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval,
3465 					cd->rd_rqstp, ignore_crossmnt);
3466 out_put:
3467 	dput(dentry);
3468 	exp_put(exp);
3469 	return nfserr;
3470 }
3471 
3472 static __be32 *
3473 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr)
3474 {
3475 	__be32 *p;
3476 
3477 	p = xdr_reserve_space(xdr, 20);
3478 	if (!p)
3479 		return NULL;
3480 	*p++ = htonl(2);
3481 	*p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */
3482 	*p++ = htonl(0);			 /* bmval1 */
3483 
3484 	*p++ = htonl(4);     /* attribute length */
3485 	*p++ = nfserr;       /* no htonl */
3486 	return p;
3487 }
3488 
3489 static int
3490 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen,
3491 		    loff_t offset, u64 ino, unsigned int d_type)
3492 {
3493 	struct readdir_cd *ccd = ccdv;
3494 	struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common);
3495 	struct xdr_stream *xdr = cd->xdr;
3496 	int start_offset = xdr->buf->len;
3497 	int cookie_offset;
3498 	u32 name_and_cookie;
3499 	int entry_bytes;
3500 	__be32 nfserr = nfserr_toosmall;
3501 	__be64 wire_offset;
3502 	__be32 *p;
3503 
3504 	/* In nfsv4, "." and ".." never make it onto the wire.. */
3505 	if (name && isdotent(name, namlen)) {
3506 		cd->common.err = nfs_ok;
3507 		return 0;
3508 	}
3509 
3510 	if (cd->cookie_offset) {
3511 		wire_offset = cpu_to_be64(offset);
3512 		write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset,
3513 							&wire_offset, 8);
3514 	}
3515 
3516 	p = xdr_reserve_space(xdr, 4);
3517 	if (!p)
3518 		goto fail;
3519 	*p++ = xdr_one;                             /* mark entry present */
3520 	cookie_offset = xdr->buf->len;
3521 	p = xdr_reserve_space(xdr, 3*4 + namlen);
3522 	if (!p)
3523 		goto fail;
3524 	p = xdr_encode_hyper(p, OFFSET_MAX);        /* offset of next entry */
3525 	p = xdr_encode_array(p, name, namlen);      /* name length & name */
3526 
3527 	nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen);
3528 	switch (nfserr) {
3529 	case nfs_ok:
3530 		break;
3531 	case nfserr_resource:
3532 		nfserr = nfserr_toosmall;
3533 		goto fail;
3534 	case nfserr_noent:
3535 		xdr_truncate_encode(xdr, start_offset);
3536 		goto skip_entry;
3537 	default:
3538 		/*
3539 		 * If the client requested the RDATTR_ERROR attribute,
3540 		 * we stuff the error code into this attribute
3541 		 * and continue.  If this attribute was not requested,
3542 		 * then in accordance with the spec, we fail the
3543 		 * entire READDIR operation(!)
3544 		 */
3545 		if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR))
3546 			goto fail;
3547 		p = nfsd4_encode_rdattr_error(xdr, nfserr);
3548 		if (p == NULL) {
3549 			nfserr = nfserr_toosmall;
3550 			goto fail;
3551 		}
3552 	}
3553 	nfserr = nfserr_toosmall;
3554 	entry_bytes = xdr->buf->len - start_offset;
3555 	if (entry_bytes > cd->rd_maxcount)
3556 		goto fail;
3557 	cd->rd_maxcount -= entry_bytes;
3558 	/*
3559 	 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and
3560 	 * notes that it could be zero. If it is zero, then the server
3561 	 * should enforce only the rd_maxcount value.
3562 	 */
3563 	if (cd->rd_dircount) {
3564 		name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8;
3565 		if (name_and_cookie > cd->rd_dircount && cd->cookie_offset)
3566 			goto fail;
3567 		cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie);
3568 		if (!cd->rd_dircount)
3569 			cd->rd_maxcount = 0;
3570 	}
3571 
3572 	cd->cookie_offset = cookie_offset;
3573 skip_entry:
3574 	cd->common.err = nfs_ok;
3575 	return 0;
3576 fail:
3577 	xdr_truncate_encode(xdr, start_offset);
3578 	cd->common.err = nfserr;
3579 	return -EINVAL;
3580 }
3581 
3582 static __be32
3583 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid)
3584 {
3585 	__be32 *p;
3586 
3587 	p = xdr_reserve_space(xdr, sizeof(stateid_t));
3588 	if (!p)
3589 		return nfserr_resource;
3590 	*p++ = cpu_to_be32(sid->si_generation);
3591 	p = xdr_encode_opaque_fixed(p, &sid->si_opaque,
3592 					sizeof(stateid_opaque_t));
3593 	return 0;
3594 }
3595 
3596 static __be32
3597 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access)
3598 {
3599 	struct xdr_stream *xdr = resp->xdr;
3600 	__be32 *p;
3601 
3602 	p = xdr_reserve_space(xdr, 8);
3603 	if (!p)
3604 		return nfserr_resource;
3605 	*p++ = cpu_to_be32(access->ac_supported);
3606 	*p++ = cpu_to_be32(access->ac_resp_access);
3607 	return 0;
3608 }
3609 
3610 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts)
3611 {
3612 	struct xdr_stream *xdr = resp->xdr;
3613 	__be32 *p;
3614 
3615 	p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8);
3616 	if (!p)
3617 		return nfserr_resource;
3618 	p = xdr_encode_opaque_fixed(p, bcts->sessionid.data,
3619 					NFS4_MAX_SESSIONID_LEN);
3620 	*p++ = cpu_to_be32(bcts->dir);
3621 	/* Upshifting from TCP to RDMA is not supported */
3622 	*p++ = cpu_to_be32(0);
3623 	return 0;
3624 }
3625 
3626 static __be32
3627 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close)
3628 {
3629 	struct xdr_stream *xdr = resp->xdr;
3630 
3631 	return nfsd4_encode_stateid(xdr, &close->cl_stateid);
3632 }
3633 
3634 
3635 static __be32
3636 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit)
3637 {
3638 	struct xdr_stream *xdr = resp->xdr;
3639 	__be32 *p;
3640 
3641 	p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
3642 	if (!p)
3643 		return nfserr_resource;
3644 	p = xdr_encode_opaque_fixed(p, commit->co_verf.data,
3645 						NFS4_VERIFIER_SIZE);
3646 	return 0;
3647 }
3648 
3649 static __be32
3650 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create)
3651 {
3652 	struct xdr_stream *xdr = resp->xdr;
3653 	__be32 *p;
3654 
3655 	p = xdr_reserve_space(xdr, 20);
3656 	if (!p)
3657 		return nfserr_resource;
3658 	encode_cinfo(p, &create->cr_cinfo);
3659 	return nfsd4_encode_bitmap(xdr, create->cr_bmval[0],
3660 			create->cr_bmval[1], create->cr_bmval[2]);
3661 }
3662 
3663 static __be32
3664 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr)
3665 {
3666 	struct svc_fh *fhp = getattr->ga_fhp;
3667 	struct xdr_stream *xdr = resp->xdr;
3668 
3669 	return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry,
3670 				    getattr->ga_bmval, resp->rqstp, 0);
3671 }
3672 
3673 static __be32
3674 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp)
3675 {
3676 	struct xdr_stream *xdr = resp->xdr;
3677 	struct svc_fh *fhp = *fhpp;
3678 	unsigned int len;
3679 	__be32 *p;
3680 
3681 	len = fhp->fh_handle.fh_size;
3682 	p = xdr_reserve_space(xdr, len + 4);
3683 	if (!p)
3684 		return nfserr_resource;
3685 	p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, len);
3686 	return 0;
3687 }
3688 
3689 /*
3690 * Including all fields other than the name, a LOCK4denied structure requires
3691 *   8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes.
3692 */
3693 static __be32
3694 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld)
3695 {
3696 	struct xdr_netobj *conf = &ld->ld_owner;
3697 	__be32 *p;
3698 
3699 again:
3700 	p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len));
3701 	if (!p) {
3702 		/*
3703 		 * Don't fail to return the result just because we can't
3704 		 * return the conflicting open:
3705 		 */
3706 		if (conf->len) {
3707 			kfree(conf->data);
3708 			conf->len = 0;
3709 			conf->data = NULL;
3710 			goto again;
3711 		}
3712 		return nfserr_resource;
3713 	}
3714 	p = xdr_encode_hyper(p, ld->ld_start);
3715 	p = xdr_encode_hyper(p, ld->ld_length);
3716 	*p++ = cpu_to_be32(ld->ld_type);
3717 	if (conf->len) {
3718 		p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8);
3719 		p = xdr_encode_opaque(p, conf->data, conf->len);
3720 		kfree(conf->data);
3721 	}  else {  /* non - nfsv4 lock in conflict, no clientid nor owner */
3722 		p = xdr_encode_hyper(p, (u64)0); /* clientid */
3723 		*p++ = cpu_to_be32(0); /* length of owner name */
3724 	}
3725 	return nfserr_denied;
3726 }
3727 
3728 static __be32
3729 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock)
3730 {
3731 	struct xdr_stream *xdr = resp->xdr;
3732 
3733 	if (!nfserr)
3734 		nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid);
3735 	else if (nfserr == nfserr_denied)
3736 		nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied);
3737 
3738 	return nfserr;
3739 }
3740 
3741 static __be32
3742 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt)
3743 {
3744 	struct xdr_stream *xdr = resp->xdr;
3745 
3746 	if (nfserr == nfserr_denied)
3747 		nfsd4_encode_lock_denied(xdr, &lockt->lt_denied);
3748 	return nfserr;
3749 }
3750 
3751 static __be32
3752 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku)
3753 {
3754 	struct xdr_stream *xdr = resp->xdr;
3755 
3756 	return nfsd4_encode_stateid(xdr, &locku->lu_stateid);
3757 }
3758 
3759 
3760 static __be32
3761 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link)
3762 {
3763 	struct xdr_stream *xdr = resp->xdr;
3764 	__be32 *p;
3765 
3766 	p = xdr_reserve_space(xdr, 20);
3767 	if (!p)
3768 		return nfserr_resource;
3769 	p = encode_cinfo(p, &link->li_cinfo);
3770 	return 0;
3771 }
3772 
3773 
3774 static __be32
3775 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open)
3776 {
3777 	struct xdr_stream *xdr = resp->xdr;
3778 	__be32 *p;
3779 
3780 	nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid);
3781 	if (nfserr)
3782 		return nfserr;
3783 	p = xdr_reserve_space(xdr, 24);
3784 	if (!p)
3785 		return nfserr_resource;
3786 	p = encode_cinfo(p, &open->op_cinfo);
3787 	*p++ = cpu_to_be32(open->op_rflags);
3788 
3789 	nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1],
3790 					open->op_bmval[2]);
3791 	if (nfserr)
3792 		return nfserr;
3793 
3794 	p = xdr_reserve_space(xdr, 4);
3795 	if (!p)
3796 		return nfserr_resource;
3797 
3798 	*p++ = cpu_to_be32(open->op_delegate_type);
3799 	switch (open->op_delegate_type) {
3800 	case NFS4_OPEN_DELEGATE_NONE:
3801 		break;
3802 	case NFS4_OPEN_DELEGATE_READ:
3803 		nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3804 		if (nfserr)
3805 			return nfserr;
3806 		p = xdr_reserve_space(xdr, 20);
3807 		if (!p)
3808 			return nfserr_resource;
3809 		*p++ = cpu_to_be32(open->op_recall);
3810 
3811 		/*
3812 		 * TODO: ACE's in delegations
3813 		 */
3814 		*p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3815 		*p++ = cpu_to_be32(0);
3816 		*p++ = cpu_to_be32(0);
3817 		*p++ = cpu_to_be32(0);   /* XXX: is NULL principal ok? */
3818 		break;
3819 	case NFS4_OPEN_DELEGATE_WRITE:
3820 		nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid);
3821 		if (nfserr)
3822 			return nfserr;
3823 		p = xdr_reserve_space(xdr, 32);
3824 		if (!p)
3825 			return nfserr_resource;
3826 		*p++ = cpu_to_be32(0);
3827 
3828 		/*
3829 		 * TODO: space_limit's in delegations
3830 		 */
3831 		*p++ = cpu_to_be32(NFS4_LIMIT_SIZE);
3832 		*p++ = cpu_to_be32(~(u32)0);
3833 		*p++ = cpu_to_be32(~(u32)0);
3834 
3835 		/*
3836 		 * TODO: ACE's in delegations
3837 		 */
3838 		*p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE);
3839 		*p++ = cpu_to_be32(0);
3840 		*p++ = cpu_to_be32(0);
3841 		*p++ = cpu_to_be32(0);   /* XXX: is NULL principal ok? */
3842 		break;
3843 	case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */
3844 		switch (open->op_why_no_deleg) {
3845 		case WND4_CONTENTION:
3846 		case WND4_RESOURCE:
3847 			p = xdr_reserve_space(xdr, 8);
3848 			if (!p)
3849 				return nfserr_resource;
3850 			*p++ = cpu_to_be32(open->op_why_no_deleg);
3851 			/* deleg signaling not supported yet: */
3852 			*p++ = cpu_to_be32(0);
3853 			break;
3854 		default:
3855 			p = xdr_reserve_space(xdr, 4);
3856 			if (!p)
3857 				return nfserr_resource;
3858 			*p++ = cpu_to_be32(open->op_why_no_deleg);
3859 		}
3860 		break;
3861 	default:
3862 		BUG();
3863 	}
3864 	/* XXX save filehandle here */
3865 	return 0;
3866 }
3867 
3868 static __be32
3869 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc)
3870 {
3871 	struct xdr_stream *xdr = resp->xdr;
3872 
3873 	return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid);
3874 }
3875 
3876 static __be32
3877 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od)
3878 {
3879 	struct xdr_stream *xdr = resp->xdr;
3880 
3881 	return nfsd4_encode_stateid(xdr, &od->od_stateid);
3882 }
3883 
3884 static __be32 nfsd4_encode_splice_read(
3885 				struct nfsd4_compoundres *resp,
3886 				struct nfsd4_read *read,
3887 				struct file *file, unsigned long maxcount)
3888 {
3889 	struct xdr_stream *xdr = resp->xdr;
3890 	struct xdr_buf *buf = xdr->buf;
3891 	int status, space_left;
3892 	__be32 nfserr;
3893 
3894 	/* Make sure there will be room for padding if needed */
3895 	if (xdr->end - xdr->p < 1)
3896 		return nfserr_resource;
3897 
3898 	nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp,
3899 				  file, read->rd_offset, &maxcount,
3900 				  &read->rd_eof);
3901 	read->rd_length = maxcount;
3902 	if (nfserr)
3903 		goto out_err;
3904 	status = svc_encode_result_payload(read->rd_rqstp,
3905 					   buf->head[0].iov_len, maxcount);
3906 	if (status) {
3907 		nfserr = nfserrno(status);
3908 		goto out_err;
3909 	}
3910 
3911 	buf->page_len = maxcount;
3912 	buf->len += maxcount;
3913 	xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1)
3914 							/ PAGE_SIZE;
3915 
3916 	/* Use rest of head for padding and remaining ops: */
3917 	buf->tail[0].iov_base = xdr->p;
3918 	buf->tail[0].iov_len = 0;
3919 	xdr->iov = buf->tail;
3920 	if (maxcount&3) {
3921 		int pad = 4 - (maxcount&3);
3922 
3923 		*(xdr->p++) = 0;
3924 
3925 		buf->tail[0].iov_base += maxcount&3;
3926 		buf->tail[0].iov_len = pad;
3927 		buf->len += pad;
3928 	}
3929 
3930 	space_left = min_t(int, (void *)xdr->end - (void *)xdr->p,
3931 				buf->buflen - buf->len);
3932 	buf->buflen = buf->len + space_left;
3933 	xdr->end = (__be32 *)((void *)xdr->end + space_left);
3934 
3935 	return 0;
3936 
3937 out_err:
3938 	/*
3939 	 * nfsd_splice_actor may have already messed with the
3940 	 * page length; reset it so as not to confuse
3941 	 * xdr_truncate_encode in our caller.
3942 	 */
3943 	buf->page_len = 0;
3944 	return nfserr;
3945 }
3946 
3947 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp,
3948 				 struct nfsd4_read *read,
3949 				 struct file *file, unsigned long maxcount)
3950 {
3951 	struct xdr_stream *xdr = resp->xdr;
3952 	unsigned int starting_len = xdr->buf->len;
3953 	__be32 zero = xdr_zero;
3954 	__be32 nfserr;
3955 
3956 	read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount);
3957 	if (read->rd_vlen < 0)
3958 		return nfserr_resource;
3959 
3960 	nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
3961 			    resp->rqstp->rq_vec, read->rd_vlen, &maxcount,
3962 			    &read->rd_eof);
3963 	read->rd_length = maxcount;
3964 	if (nfserr)
3965 		return nfserr;
3966 	if (svc_encode_result_payload(resp->rqstp, starting_len, maxcount))
3967 		return nfserr_io;
3968 	xdr_truncate_encode(xdr, starting_len + xdr_align_size(maxcount));
3969 
3970 	write_bytes_to_xdr_buf(xdr->buf, starting_len + maxcount, &zero,
3971 			       xdr_pad_size(maxcount));
3972 	return nfs_ok;
3973 }
3974 
3975 static __be32
3976 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr,
3977 		  struct nfsd4_read *read)
3978 {
3979 	bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags);
3980 	unsigned long maxcount;
3981 	struct xdr_stream *xdr = resp->xdr;
3982 	struct file *file;
3983 	int starting_len = xdr->buf->len;
3984 	__be32 *p;
3985 
3986 	if (nfserr)
3987 		return nfserr;
3988 	file = read->rd_nf->nf_file;
3989 
3990 	p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */
3991 	if (!p) {
3992 		WARN_ON_ONCE(splice_ok);
3993 		return nfserr_resource;
3994 	}
3995 	if (resp->xdr->buf->page_len && splice_ok) {
3996 		WARN_ON_ONCE(1);
3997 		return nfserr_resource;
3998 	}
3999 	xdr_commit_encode(xdr);
4000 
4001 	maxcount = min_t(unsigned long, read->rd_length,
4002 			 (xdr->buf->buflen - xdr->buf->len));
4003 
4004 	if (file->f_op->splice_read && splice_ok)
4005 		nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount);
4006 	else
4007 		nfserr = nfsd4_encode_readv(resp, read, file, maxcount);
4008 	if (nfserr) {
4009 		xdr_truncate_encode(xdr, starting_len);
4010 		return nfserr;
4011 	}
4012 
4013 	p = xdr_encode_bool(p, read->rd_eof);
4014 	*p = cpu_to_be32(read->rd_length);
4015 	return nfs_ok;
4016 }
4017 
4018 static __be32
4019 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink)
4020 {
4021 	__be32 *p, *maxcount_p, zero = xdr_zero;
4022 	struct xdr_stream *xdr = resp->xdr;
4023 	int length_offset = xdr->buf->len;
4024 	int maxcount, status;
4025 
4026 	maxcount_p = xdr_reserve_space(xdr, XDR_UNIT);
4027 	if (!maxcount_p)
4028 		return nfserr_resource;
4029 	maxcount = PAGE_SIZE;
4030 
4031 	p = xdr_reserve_space(xdr, maxcount);
4032 	if (!p)
4033 		return nfserr_resource;
4034 	/*
4035 	 * XXX: By default, vfs_readlink() will truncate symlinks if they
4036 	 * would overflow the buffer.  Is this kosher in NFSv4?  If not, one
4037 	 * easy fix is: if vfs_readlink() precisely fills the buffer, assume
4038 	 * that truncation occurred, and return NFS4ERR_RESOURCE.
4039 	 */
4040 	nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp,
4041 						(char *)p, &maxcount);
4042 	if (nfserr == nfserr_isdir)
4043 		nfserr = nfserr_inval;
4044 	if (nfserr)
4045 		goto out_err;
4046 	status = svc_encode_result_payload(readlink->rl_rqstp, length_offset,
4047 					   maxcount);
4048 	if (status) {
4049 		nfserr = nfserrno(status);
4050 		goto out_err;
4051 	}
4052 	*maxcount_p = cpu_to_be32(maxcount);
4053 	xdr_truncate_encode(xdr, length_offset + 4 + xdr_align_size(maxcount));
4054 	write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, &zero,
4055 			       xdr_pad_size(maxcount));
4056 	return nfs_ok;
4057 
4058 out_err:
4059 	xdr_truncate_encode(xdr, length_offset);
4060 	return nfserr;
4061 }
4062 
4063 static __be32
4064 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir)
4065 {
4066 	int maxcount;
4067 	int bytes_left;
4068 	loff_t offset;
4069 	__be64 wire_offset;
4070 	struct xdr_stream *xdr = resp->xdr;
4071 	int starting_len = xdr->buf->len;
4072 	__be32 *p;
4073 
4074 	p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE);
4075 	if (!p)
4076 		return nfserr_resource;
4077 
4078 	/* XXX: Following NFSv3, we ignore the READDIR verifier for now. */
4079 	*p++ = cpu_to_be32(0);
4080 	*p++ = cpu_to_be32(0);
4081 	xdr->buf->head[0].iov_len = (char *)xdr->p -
4082 				    (char *)xdr->buf->head[0].iov_base;
4083 
4084 	/*
4085 	 * Number of bytes left for directory entries allowing for the
4086 	 * final 8 bytes of the readdir and a following failed op:
4087 	 */
4088 	bytes_left = xdr->buf->buflen - xdr->buf->len
4089 			- COMPOUND_ERR_SLACK_SPACE - 8;
4090 	if (bytes_left < 0) {
4091 		nfserr = nfserr_resource;
4092 		goto err_no_verf;
4093 	}
4094 	maxcount = svc_max_payload(resp->rqstp);
4095 	maxcount = min_t(u32, readdir->rd_maxcount, maxcount);
4096 	/*
4097 	 * Note the rfc defines rd_maxcount as the size of the
4098 	 * READDIR4resok structure, which includes the verifier above
4099 	 * and the 8 bytes encoded at the end of this function:
4100 	 */
4101 	if (maxcount < 16) {
4102 		nfserr = nfserr_toosmall;
4103 		goto err_no_verf;
4104 	}
4105 	maxcount = min_t(int, maxcount-16, bytes_left);
4106 
4107 	/* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */
4108 	if (!readdir->rd_dircount)
4109 		readdir->rd_dircount = svc_max_payload(resp->rqstp);
4110 
4111 	readdir->xdr = xdr;
4112 	readdir->rd_maxcount = maxcount;
4113 	readdir->common.err = 0;
4114 	readdir->cookie_offset = 0;
4115 
4116 	offset = readdir->rd_cookie;
4117 	nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp,
4118 			      &offset,
4119 			      &readdir->common, nfsd4_encode_dirent);
4120 	if (nfserr == nfs_ok &&
4121 	    readdir->common.err == nfserr_toosmall &&
4122 	    xdr->buf->len == starting_len + 8) {
4123 		/* nothing encoded; which limit did we hit?: */
4124 		if (maxcount - 16 < bytes_left)
4125 			/* It was the fault of rd_maxcount: */
4126 			nfserr = nfserr_toosmall;
4127 		else
4128 			/* We ran out of buffer space: */
4129 			nfserr = nfserr_resource;
4130 	}
4131 	if (nfserr)
4132 		goto err_no_verf;
4133 
4134 	if (readdir->cookie_offset) {
4135 		wire_offset = cpu_to_be64(offset);
4136 		write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset,
4137 							&wire_offset, 8);
4138 	}
4139 
4140 	p = xdr_reserve_space(xdr, 8);
4141 	if (!p) {
4142 		WARN_ON_ONCE(1);
4143 		goto err_no_verf;
4144 	}
4145 	*p++ = 0;	/* no more entries */
4146 	*p++ = htonl(readdir->common.err == nfserr_eof);
4147 
4148 	return 0;
4149 err_no_verf:
4150 	xdr_truncate_encode(xdr, starting_len);
4151 	return nfserr;
4152 }
4153 
4154 static __be32
4155 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove)
4156 {
4157 	struct xdr_stream *xdr = resp->xdr;
4158 	__be32 *p;
4159 
4160 	p = xdr_reserve_space(xdr, 20);
4161 	if (!p)
4162 		return nfserr_resource;
4163 	p = encode_cinfo(p, &remove->rm_cinfo);
4164 	return 0;
4165 }
4166 
4167 static __be32
4168 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename)
4169 {
4170 	struct xdr_stream *xdr = resp->xdr;
4171 	__be32 *p;
4172 
4173 	p = xdr_reserve_space(xdr, 40);
4174 	if (!p)
4175 		return nfserr_resource;
4176 	p = encode_cinfo(p, &rename->rn_sinfo);
4177 	p = encode_cinfo(p, &rename->rn_tinfo);
4178 	return 0;
4179 }
4180 
4181 static __be32
4182 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp)
4183 {
4184 	u32 i, nflavs, supported;
4185 	struct exp_flavor_info *flavs;
4186 	struct exp_flavor_info def_flavs[2];
4187 	__be32 *p, *flavorsp;
4188 	static bool report = true;
4189 
4190 	if (exp->ex_nflavors) {
4191 		flavs = exp->ex_flavors;
4192 		nflavs = exp->ex_nflavors;
4193 	} else { /* Handling of some defaults in absence of real secinfo: */
4194 		flavs = def_flavs;
4195 		if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) {
4196 			nflavs = 2;
4197 			flavs[0].pseudoflavor = RPC_AUTH_UNIX;
4198 			flavs[1].pseudoflavor = RPC_AUTH_NULL;
4199 		} else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) {
4200 			nflavs = 1;
4201 			flavs[0].pseudoflavor
4202 					= svcauth_gss_flavor(exp->ex_client);
4203 		} else {
4204 			nflavs = 1;
4205 			flavs[0].pseudoflavor
4206 					= exp->ex_client->flavour->flavour;
4207 		}
4208 	}
4209 
4210 	supported = 0;
4211 	p = xdr_reserve_space(xdr, 4);
4212 	if (!p)
4213 		return nfserr_resource;
4214 	flavorsp = p++;		/* to be backfilled later */
4215 
4216 	for (i = 0; i < nflavs; i++) {
4217 		rpc_authflavor_t pf = flavs[i].pseudoflavor;
4218 		struct rpcsec_gss_info info;
4219 
4220 		if (rpcauth_get_gssinfo(pf, &info) == 0) {
4221 			supported++;
4222 			p = xdr_reserve_space(xdr, 4 + 4 +
4223 					      XDR_LEN(info.oid.len) + 4 + 4);
4224 			if (!p)
4225 				return nfserr_resource;
4226 			*p++ = cpu_to_be32(RPC_AUTH_GSS);
4227 			p = xdr_encode_opaque(p,  info.oid.data, info.oid.len);
4228 			*p++ = cpu_to_be32(info.qop);
4229 			*p++ = cpu_to_be32(info.service);
4230 		} else if (pf < RPC_AUTH_MAXFLAVOR) {
4231 			supported++;
4232 			p = xdr_reserve_space(xdr, 4);
4233 			if (!p)
4234 				return nfserr_resource;
4235 			*p++ = cpu_to_be32(pf);
4236 		} else {
4237 			if (report)
4238 				pr_warn("NFS: SECINFO: security flavor %u "
4239 					"is not supported\n", pf);
4240 		}
4241 	}
4242 
4243 	if (nflavs != supported)
4244 		report = false;
4245 	*flavorsp = htonl(supported);
4246 	return 0;
4247 }
4248 
4249 static __be32
4250 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4251 		     struct nfsd4_secinfo *secinfo)
4252 {
4253 	struct xdr_stream *xdr = resp->xdr;
4254 
4255 	return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp);
4256 }
4257 
4258 static __be32
4259 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr,
4260 		     struct nfsd4_secinfo_no_name *secinfo)
4261 {
4262 	struct xdr_stream *xdr = resp->xdr;
4263 
4264 	return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp);
4265 }
4266 
4267 /*
4268  * The SETATTR encode routine is special -- it always encodes a bitmap,
4269  * regardless of the error status.
4270  */
4271 static __be32
4272 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr)
4273 {
4274 	struct xdr_stream *xdr = resp->xdr;
4275 	__be32 *p;
4276 
4277 	p = xdr_reserve_space(xdr, 16);
4278 	if (!p)
4279 		return nfserr_resource;
4280 	if (nfserr) {
4281 		*p++ = cpu_to_be32(3);
4282 		*p++ = cpu_to_be32(0);
4283 		*p++ = cpu_to_be32(0);
4284 		*p++ = cpu_to_be32(0);
4285 	}
4286 	else {
4287 		*p++ = cpu_to_be32(3);
4288 		*p++ = cpu_to_be32(setattr->sa_bmval[0]);
4289 		*p++ = cpu_to_be32(setattr->sa_bmval[1]);
4290 		*p++ = cpu_to_be32(setattr->sa_bmval[2]);
4291 	}
4292 	return nfserr;
4293 }
4294 
4295 static __be32
4296 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd)
4297 {
4298 	struct xdr_stream *xdr = resp->xdr;
4299 	__be32 *p;
4300 
4301 	if (!nfserr) {
4302 		p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE);
4303 		if (!p)
4304 			return nfserr_resource;
4305 		p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8);
4306 		p = xdr_encode_opaque_fixed(p, &scd->se_confirm,
4307 						NFS4_VERIFIER_SIZE);
4308 	}
4309 	else if (nfserr == nfserr_clid_inuse) {
4310 		p = xdr_reserve_space(xdr, 8);
4311 		if (!p)
4312 			return nfserr_resource;
4313 		*p++ = cpu_to_be32(0);
4314 		*p++ = cpu_to_be32(0);
4315 	}
4316 	return nfserr;
4317 }
4318 
4319 static __be32
4320 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write)
4321 {
4322 	struct xdr_stream *xdr = resp->xdr;
4323 	__be32 *p;
4324 
4325 	p = xdr_reserve_space(xdr, 16);
4326 	if (!p)
4327 		return nfserr_resource;
4328 	*p++ = cpu_to_be32(write->wr_bytes_written);
4329 	*p++ = cpu_to_be32(write->wr_how_written);
4330 	p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4331 						NFS4_VERIFIER_SIZE);
4332 	return 0;
4333 }
4334 
4335 static __be32
4336 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr,
4337 			 struct nfsd4_exchange_id *exid)
4338 {
4339 	struct xdr_stream *xdr = resp->xdr;
4340 	__be32 *p;
4341 	char *major_id;
4342 	char *server_scope;
4343 	int major_id_sz;
4344 	int server_scope_sz;
4345 	uint64_t minor_id = 0;
4346 	struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id);
4347 
4348 	major_id = nn->nfsd_name;
4349 	major_id_sz = strlen(nn->nfsd_name);
4350 	server_scope = nn->nfsd_name;
4351 	server_scope_sz = strlen(nn->nfsd_name);
4352 
4353 	p = xdr_reserve_space(xdr,
4354 		8 /* eir_clientid */ +
4355 		4 /* eir_sequenceid */ +
4356 		4 /* eir_flags */ +
4357 		4 /* spr_how */);
4358 	if (!p)
4359 		return nfserr_resource;
4360 
4361 	p = xdr_encode_opaque_fixed(p, &exid->clientid, 8);
4362 	*p++ = cpu_to_be32(exid->seqid);
4363 	*p++ = cpu_to_be32(exid->flags);
4364 
4365 	*p++ = cpu_to_be32(exid->spa_how);
4366 
4367 	switch (exid->spa_how) {
4368 	case SP4_NONE:
4369 		break;
4370 	case SP4_MACH_CRED:
4371 		/* spo_must_enforce bitmap: */
4372 		nfserr = nfsd4_encode_bitmap(xdr,
4373 					exid->spo_must_enforce[0],
4374 					exid->spo_must_enforce[1],
4375 					exid->spo_must_enforce[2]);
4376 		if (nfserr)
4377 			return nfserr;
4378 		/* spo_must_allow bitmap: */
4379 		nfserr = nfsd4_encode_bitmap(xdr,
4380 					exid->spo_must_allow[0],
4381 					exid->spo_must_allow[1],
4382 					exid->spo_must_allow[2]);
4383 		if (nfserr)
4384 			return nfserr;
4385 		break;
4386 	default:
4387 		WARN_ON_ONCE(1);
4388 	}
4389 
4390 	p = xdr_reserve_space(xdr,
4391 		8 /* so_minor_id */ +
4392 		4 /* so_major_id.len */ +
4393 		(XDR_QUADLEN(major_id_sz) * 4) +
4394 		4 /* eir_server_scope.len */ +
4395 		(XDR_QUADLEN(server_scope_sz) * 4) +
4396 		4 /* eir_server_impl_id.count (0) */);
4397 	if (!p)
4398 		return nfserr_resource;
4399 
4400 	/* The server_owner struct */
4401 	p = xdr_encode_hyper(p, minor_id);      /* Minor id */
4402 	/* major id */
4403 	p = xdr_encode_opaque(p, major_id, major_id_sz);
4404 
4405 	/* Server scope */
4406 	p = xdr_encode_opaque(p, server_scope, server_scope_sz);
4407 
4408 	/* Implementation id */
4409 	*p++ = cpu_to_be32(0);	/* zero length nfs_impl_id4 array */
4410 	return 0;
4411 }
4412 
4413 static __be32
4414 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr,
4415 			    struct nfsd4_create_session *sess)
4416 {
4417 	struct xdr_stream *xdr = resp->xdr;
4418 	__be32 *p;
4419 
4420 	p = xdr_reserve_space(xdr, 24);
4421 	if (!p)
4422 		return nfserr_resource;
4423 	p = xdr_encode_opaque_fixed(p, sess->sessionid.data,
4424 					NFS4_MAX_SESSIONID_LEN);
4425 	*p++ = cpu_to_be32(sess->seqid);
4426 	*p++ = cpu_to_be32(sess->flags);
4427 
4428 	p = xdr_reserve_space(xdr, 28);
4429 	if (!p)
4430 		return nfserr_resource;
4431 	*p++ = cpu_to_be32(0); /* headerpadsz */
4432 	*p++ = cpu_to_be32(sess->fore_channel.maxreq_sz);
4433 	*p++ = cpu_to_be32(sess->fore_channel.maxresp_sz);
4434 	*p++ = cpu_to_be32(sess->fore_channel.maxresp_cached);
4435 	*p++ = cpu_to_be32(sess->fore_channel.maxops);
4436 	*p++ = cpu_to_be32(sess->fore_channel.maxreqs);
4437 	*p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs);
4438 
4439 	if (sess->fore_channel.nr_rdma_attrs) {
4440 		p = xdr_reserve_space(xdr, 4);
4441 		if (!p)
4442 			return nfserr_resource;
4443 		*p++ = cpu_to_be32(sess->fore_channel.rdma_attrs);
4444 	}
4445 
4446 	p = xdr_reserve_space(xdr, 28);
4447 	if (!p)
4448 		return nfserr_resource;
4449 	*p++ = cpu_to_be32(0); /* headerpadsz */
4450 	*p++ = cpu_to_be32(sess->back_channel.maxreq_sz);
4451 	*p++ = cpu_to_be32(sess->back_channel.maxresp_sz);
4452 	*p++ = cpu_to_be32(sess->back_channel.maxresp_cached);
4453 	*p++ = cpu_to_be32(sess->back_channel.maxops);
4454 	*p++ = cpu_to_be32(sess->back_channel.maxreqs);
4455 	*p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs);
4456 
4457 	if (sess->back_channel.nr_rdma_attrs) {
4458 		p = xdr_reserve_space(xdr, 4);
4459 		if (!p)
4460 			return nfserr_resource;
4461 		*p++ = cpu_to_be32(sess->back_channel.rdma_attrs);
4462 	}
4463 	return 0;
4464 }
4465 
4466 static __be32
4467 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr,
4468 		      struct nfsd4_sequence *seq)
4469 {
4470 	struct xdr_stream *xdr = resp->xdr;
4471 	__be32 *p;
4472 
4473 	p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20);
4474 	if (!p)
4475 		return nfserr_resource;
4476 	p = xdr_encode_opaque_fixed(p, seq->sessionid.data,
4477 					NFS4_MAX_SESSIONID_LEN);
4478 	*p++ = cpu_to_be32(seq->seqid);
4479 	*p++ = cpu_to_be32(seq->slotid);
4480 	/* Note slotid's are numbered from zero: */
4481 	*p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */
4482 	*p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */
4483 	*p++ = cpu_to_be32(seq->status_flags);
4484 
4485 	resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */
4486 	return 0;
4487 }
4488 
4489 static __be32
4490 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr,
4491 			  struct nfsd4_test_stateid *test_stateid)
4492 {
4493 	struct xdr_stream *xdr = resp->xdr;
4494 	struct nfsd4_test_stateid_id *stateid, *next;
4495 	__be32 *p;
4496 
4497 	p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids));
4498 	if (!p)
4499 		return nfserr_resource;
4500 	*p++ = htonl(test_stateid->ts_num_ids);
4501 
4502 	list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) {
4503 		*p++ = stateid->ts_id_status;
4504 	}
4505 
4506 	return 0;
4507 }
4508 
4509 #ifdef CONFIG_NFSD_PNFS
4510 static __be32
4511 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr,
4512 		struct nfsd4_getdeviceinfo *gdev)
4513 {
4514 	struct xdr_stream *xdr = resp->xdr;
4515 	const struct nfsd4_layout_ops *ops;
4516 	u32 starting_len = xdr->buf->len, needed_len;
4517 	__be32 *p;
4518 
4519 	p = xdr_reserve_space(xdr, 4);
4520 	if (!p)
4521 		return nfserr_resource;
4522 
4523 	*p++ = cpu_to_be32(gdev->gd_layout_type);
4524 
4525 	/* If maxcount is 0 then just update notifications */
4526 	if (gdev->gd_maxcount != 0) {
4527 		ops = nfsd4_layout_ops[gdev->gd_layout_type];
4528 		nfserr = ops->encode_getdeviceinfo(xdr, gdev);
4529 		if (nfserr) {
4530 			/*
4531 			 * We don't bother to burden the layout drivers with
4532 			 * enforcing gd_maxcount, just tell the client to
4533 			 * come back with a bigger buffer if it's not enough.
4534 			 */
4535 			if (xdr->buf->len + 4 > gdev->gd_maxcount)
4536 				goto toosmall;
4537 			return nfserr;
4538 		}
4539 	}
4540 
4541 	if (gdev->gd_notify_types) {
4542 		p = xdr_reserve_space(xdr, 4 + 4);
4543 		if (!p)
4544 			return nfserr_resource;
4545 		*p++ = cpu_to_be32(1);			/* bitmap length */
4546 		*p++ = cpu_to_be32(gdev->gd_notify_types);
4547 	} else {
4548 		p = xdr_reserve_space(xdr, 4);
4549 		if (!p)
4550 			return nfserr_resource;
4551 		*p++ = 0;
4552 	}
4553 
4554 	return 0;
4555 toosmall:
4556 	dprintk("%s: maxcount too small\n", __func__);
4557 	needed_len = xdr->buf->len + 4 /* notifications */;
4558 	xdr_truncate_encode(xdr, starting_len);
4559 	p = xdr_reserve_space(xdr, 4);
4560 	if (!p)
4561 		return nfserr_resource;
4562 	*p++ = cpu_to_be32(needed_len);
4563 	return nfserr_toosmall;
4564 }
4565 
4566 static __be32
4567 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr,
4568 		struct nfsd4_layoutget *lgp)
4569 {
4570 	struct xdr_stream *xdr = resp->xdr;
4571 	const struct nfsd4_layout_ops *ops;
4572 	__be32 *p;
4573 
4574 	p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t));
4575 	if (!p)
4576 		return nfserr_resource;
4577 
4578 	*p++ = cpu_to_be32(1);	/* we always set return-on-close */
4579 	*p++ = cpu_to_be32(lgp->lg_sid.si_generation);
4580 	p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque,
4581 				    sizeof(stateid_opaque_t));
4582 
4583 	*p++ = cpu_to_be32(1);	/* we always return a single layout */
4584 	p = xdr_encode_hyper(p, lgp->lg_seg.offset);
4585 	p = xdr_encode_hyper(p, lgp->lg_seg.length);
4586 	*p++ = cpu_to_be32(lgp->lg_seg.iomode);
4587 	*p++ = cpu_to_be32(lgp->lg_layout_type);
4588 
4589 	ops = nfsd4_layout_ops[lgp->lg_layout_type];
4590 	return ops->encode_layoutget(xdr, lgp);
4591 }
4592 
4593 static __be32
4594 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr,
4595 			  struct nfsd4_layoutcommit *lcp)
4596 {
4597 	struct xdr_stream *xdr = resp->xdr;
4598 	__be32 *p;
4599 
4600 	p = xdr_reserve_space(xdr, 4);
4601 	if (!p)
4602 		return nfserr_resource;
4603 	*p++ = cpu_to_be32(lcp->lc_size_chg);
4604 	if (lcp->lc_size_chg) {
4605 		p = xdr_reserve_space(xdr, 8);
4606 		if (!p)
4607 			return nfserr_resource;
4608 		p = xdr_encode_hyper(p, lcp->lc_newsize);
4609 	}
4610 
4611 	return 0;
4612 }
4613 
4614 static __be32
4615 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr,
4616 		struct nfsd4_layoutreturn *lrp)
4617 {
4618 	struct xdr_stream *xdr = resp->xdr;
4619 	__be32 *p;
4620 
4621 	p = xdr_reserve_space(xdr, 4);
4622 	if (!p)
4623 		return nfserr_resource;
4624 	*p++ = cpu_to_be32(lrp->lrs_present);
4625 	if (lrp->lrs_present)
4626 		return nfsd4_encode_stateid(xdr, &lrp->lr_sid);
4627 	return 0;
4628 }
4629 #endif /* CONFIG_NFSD_PNFS */
4630 
4631 static __be32
4632 nfsd42_encode_write_res(struct nfsd4_compoundres *resp,
4633 		struct nfsd42_write_res *write, bool sync)
4634 {
4635 	__be32 *p;
4636 	p = xdr_reserve_space(resp->xdr, 4);
4637 	if (!p)
4638 		return nfserr_resource;
4639 
4640 	if (sync)
4641 		*p++ = cpu_to_be32(0);
4642 	else {
4643 		__be32 nfserr;
4644 		*p++ = cpu_to_be32(1);
4645 		nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid);
4646 		if (nfserr)
4647 			return nfserr;
4648 	}
4649 	p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE);
4650 	if (!p)
4651 		return nfserr_resource;
4652 
4653 	p = xdr_encode_hyper(p, write->wr_bytes_written);
4654 	*p++ = cpu_to_be32(write->wr_stable_how);
4655 	p = xdr_encode_opaque_fixed(p, write->wr_verifier.data,
4656 				    NFS4_VERIFIER_SIZE);
4657 	return nfs_ok;
4658 }
4659 
4660 static __be32
4661 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns)
4662 {
4663 	struct xdr_stream *xdr = resp->xdr;
4664 	struct nfs42_netaddr *addr;
4665 	__be32 *p;
4666 
4667 	p = xdr_reserve_space(xdr, 4);
4668 	*p++ = cpu_to_be32(ns->nl4_type);
4669 
4670 	switch (ns->nl4_type) {
4671 	case NL4_NETADDR:
4672 		addr = &ns->u.nl4_addr;
4673 
4674 		/* netid_len, netid, uaddr_len, uaddr (port included
4675 		 * in RPCBIND_MAXUADDRLEN)
4676 		 */
4677 		p = xdr_reserve_space(xdr,
4678 			4 /* netid len */ +
4679 			(XDR_QUADLEN(addr->netid_len) * 4) +
4680 			4 /* uaddr len */ +
4681 			(XDR_QUADLEN(addr->addr_len) * 4));
4682 		if (!p)
4683 			return nfserr_resource;
4684 
4685 		*p++ = cpu_to_be32(addr->netid_len);
4686 		p = xdr_encode_opaque_fixed(p, addr->netid,
4687 					    addr->netid_len);
4688 		*p++ = cpu_to_be32(addr->addr_len);
4689 		p = xdr_encode_opaque_fixed(p, addr->addr,
4690 					addr->addr_len);
4691 		break;
4692 	default:
4693 		WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR);
4694 		return nfserr_inval;
4695 	}
4696 
4697 	return 0;
4698 }
4699 
4700 static __be32
4701 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr,
4702 		  struct nfsd4_copy *copy)
4703 {
4704 	__be32 *p;
4705 
4706 	nfserr = nfsd42_encode_write_res(resp, &copy->cp_res,
4707 					 nfsd4_copy_is_sync(copy));
4708 	if (nfserr)
4709 		return nfserr;
4710 
4711 	p = xdr_reserve_space(resp->xdr, 4 + 4);
4712 	*p++ = xdr_one; /* cr_consecutive */
4713 	*p = nfsd4_copy_is_sync(copy) ? xdr_one : xdr_zero;
4714 	return 0;
4715 }
4716 
4717 static __be32
4718 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr,
4719 			    struct nfsd4_offload_status *os)
4720 {
4721 	struct xdr_stream *xdr = resp->xdr;
4722 	__be32 *p;
4723 
4724 	p = xdr_reserve_space(xdr, 8 + 4);
4725 	if (!p)
4726 		return nfserr_resource;
4727 	p = xdr_encode_hyper(p, os->count);
4728 	*p++ = cpu_to_be32(0);
4729 	return nfserr;
4730 }
4731 
4732 static __be32
4733 nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp,
4734 			    struct nfsd4_read *read,
4735 			    unsigned long *maxcount, u32 *eof,
4736 			    loff_t *pos)
4737 {
4738 	struct xdr_stream *xdr = resp->xdr;
4739 	struct file *file = read->rd_nf->nf_file;
4740 	int starting_len = xdr->buf->len;
4741 	loff_t hole_pos;
4742 	__be32 nfserr;
4743 	__be32 *p, tmp;
4744 	__be64 tmp64;
4745 
4746 	hole_pos = pos ? *pos : vfs_llseek(file, read->rd_offset, SEEK_HOLE);
4747 	if (hole_pos > read->rd_offset)
4748 		*maxcount = min_t(unsigned long, *maxcount, hole_pos - read->rd_offset);
4749 	*maxcount = min_t(unsigned long, *maxcount, (xdr->buf->buflen - xdr->buf->len));
4750 
4751 	/* Content type, offset, byte count */
4752 	p = xdr_reserve_space(xdr, 4 + 8 + 4);
4753 	if (!p)
4754 		return nfserr_resource;
4755 
4756 	read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, *maxcount);
4757 	if (read->rd_vlen < 0)
4758 		return nfserr_resource;
4759 
4760 	nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset,
4761 			    resp->rqstp->rq_vec, read->rd_vlen, maxcount, eof);
4762 	if (nfserr)
4763 		return nfserr;
4764 	xdr_truncate_encode(xdr, starting_len + 16 + xdr_align_size(*maxcount));
4765 
4766 	tmp = htonl(NFS4_CONTENT_DATA);
4767 	write_bytes_to_xdr_buf(xdr->buf, starting_len,      &tmp,   4);
4768 	tmp64 = cpu_to_be64(read->rd_offset);
4769 	write_bytes_to_xdr_buf(xdr->buf, starting_len + 4,  &tmp64, 8);
4770 	tmp = htonl(*maxcount);
4771 	write_bytes_to_xdr_buf(xdr->buf, starting_len + 12, &tmp,   4);
4772 
4773 	tmp = xdr_zero;
4774 	write_bytes_to_xdr_buf(xdr->buf, starting_len + 16 + *maxcount, &tmp,
4775 			       xdr_pad_size(*maxcount));
4776 	return nfs_ok;
4777 }
4778 
4779 static __be32
4780 nfsd4_encode_read_plus_hole(struct nfsd4_compoundres *resp,
4781 			    struct nfsd4_read *read,
4782 			    unsigned long *maxcount, u32 *eof)
4783 {
4784 	struct file *file = read->rd_nf->nf_file;
4785 	loff_t data_pos = vfs_llseek(file, read->rd_offset, SEEK_DATA);
4786 	loff_t f_size = i_size_read(file_inode(file));
4787 	unsigned long count;
4788 	__be32 *p;
4789 
4790 	if (data_pos == -ENXIO)
4791 		data_pos = f_size;
4792 	else if (data_pos <= read->rd_offset || (data_pos < f_size && data_pos % PAGE_SIZE))
4793 		return nfsd4_encode_read_plus_data(resp, read, maxcount, eof, &f_size);
4794 	count = data_pos - read->rd_offset;
4795 
4796 	/* Content type, offset, byte count */
4797 	p = xdr_reserve_space(resp->xdr, 4 + 8 + 8);
4798 	if (!p)
4799 		return nfserr_resource;
4800 
4801 	*p++ = htonl(NFS4_CONTENT_HOLE);
4802 	p = xdr_encode_hyper(p, read->rd_offset);
4803 	p = xdr_encode_hyper(p, count);
4804 
4805 	*eof = (read->rd_offset + count) >= f_size;
4806 	*maxcount = min_t(unsigned long, count, *maxcount);
4807 	return nfs_ok;
4808 }
4809 
4810 static __be32
4811 nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr,
4812 		       struct nfsd4_read *read)
4813 {
4814 	unsigned long maxcount, count;
4815 	struct xdr_stream *xdr = resp->xdr;
4816 	struct file *file;
4817 	int starting_len = xdr->buf->len;
4818 	int last_segment = xdr->buf->len;
4819 	int segments = 0;
4820 	__be32 *p, tmp;
4821 	bool is_data;
4822 	loff_t pos;
4823 	u32 eof;
4824 
4825 	if (nfserr)
4826 		return nfserr;
4827 	file = read->rd_nf->nf_file;
4828 
4829 	/* eof flag, segment count */
4830 	p = xdr_reserve_space(xdr, 4 + 4);
4831 	if (!p)
4832 		return nfserr_resource;
4833 	xdr_commit_encode(xdr);
4834 
4835 	maxcount = min_t(unsigned long, read->rd_length,
4836 			 (xdr->buf->buflen - xdr->buf->len));
4837 	count    = maxcount;
4838 
4839 	eof = read->rd_offset >= i_size_read(file_inode(file));
4840 	if (eof)
4841 		goto out;
4842 
4843 	pos = vfs_llseek(file, read->rd_offset, SEEK_HOLE);
4844 	is_data = pos > read->rd_offset;
4845 
4846 	while (count > 0 && !eof) {
4847 		maxcount = count;
4848 		if (is_data)
4849 			nfserr = nfsd4_encode_read_plus_data(resp, read, &maxcount, &eof,
4850 						segments == 0 ? &pos : NULL);
4851 		else
4852 			nfserr = nfsd4_encode_read_plus_hole(resp, read, &maxcount, &eof);
4853 		if (nfserr)
4854 			goto out;
4855 		count -= maxcount;
4856 		read->rd_offset += maxcount;
4857 		is_data = !is_data;
4858 		last_segment = xdr->buf->len;
4859 		segments++;
4860 	}
4861 
4862 out:
4863 	if (nfserr && segments == 0)
4864 		xdr_truncate_encode(xdr, starting_len);
4865 	else {
4866 		if (nfserr) {
4867 			xdr_truncate_encode(xdr, last_segment);
4868 			nfserr = nfs_ok;
4869 			eof = 0;
4870 		}
4871 		tmp = htonl(eof);
4872 		write_bytes_to_xdr_buf(xdr->buf, starting_len,     &tmp, 4);
4873 		tmp = htonl(segments);
4874 		write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4);
4875 	}
4876 
4877 	return nfserr;
4878 }
4879 
4880 static __be32
4881 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr,
4882 			 struct nfsd4_copy_notify *cn)
4883 {
4884 	struct xdr_stream *xdr = resp->xdr;
4885 	__be32 *p;
4886 
4887 	if (nfserr)
4888 		return nfserr;
4889 
4890 	/* 8 sec, 4 nsec */
4891 	p = xdr_reserve_space(xdr, 12);
4892 	if (!p)
4893 		return nfserr_resource;
4894 
4895 	/* cnr_lease_time */
4896 	p = xdr_encode_hyper(p, cn->cpn_sec);
4897 	*p++ = cpu_to_be32(cn->cpn_nsec);
4898 
4899 	/* cnr_stateid */
4900 	nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid);
4901 	if (nfserr)
4902 		return nfserr;
4903 
4904 	/* cnr_src.nl_nsvr */
4905 	p = xdr_reserve_space(xdr, 4);
4906 	if (!p)
4907 		return nfserr_resource;
4908 
4909 	*p++ = cpu_to_be32(1);
4910 
4911 	nfserr = nfsd42_encode_nl4_server(resp, cn->cpn_src);
4912 	return nfserr;
4913 }
4914 
4915 static __be32
4916 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr,
4917 		  struct nfsd4_seek *seek)
4918 {
4919 	__be32 *p;
4920 
4921 	p = xdr_reserve_space(resp->xdr, 4 + 8);
4922 	*p++ = cpu_to_be32(seek->seek_eof);
4923 	p = xdr_encode_hyper(p, seek->seek_pos);
4924 
4925 	return 0;
4926 }
4927 
4928 static __be32
4929 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p)
4930 {
4931 	return nfserr;
4932 }
4933 
4934 /*
4935  * Encode kmalloc-ed buffer in to XDR stream.
4936  */
4937 static __be32
4938 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen)
4939 {
4940 	u32 cplen;
4941 	__be32 *p;
4942 
4943 	cplen = min_t(unsigned long, buflen,
4944 		      ((void *)xdr->end - (void *)xdr->p));
4945 	p = xdr_reserve_space(xdr, cplen);
4946 	if (!p)
4947 		return nfserr_resource;
4948 
4949 	memcpy(p, buf, cplen);
4950 	buf += cplen;
4951 	buflen -= cplen;
4952 
4953 	while (buflen) {
4954 		cplen = min_t(u32, buflen, PAGE_SIZE);
4955 		p = xdr_reserve_space(xdr, cplen);
4956 		if (!p)
4957 			return nfserr_resource;
4958 
4959 		memcpy(p, buf, cplen);
4960 
4961 		if (cplen < PAGE_SIZE) {
4962 			/*
4963 			 * We're done, with a length that wasn't page
4964 			 * aligned, so possibly not word aligned. Pad
4965 			 * any trailing bytes with 0.
4966 			 */
4967 			xdr_encode_opaque_fixed(p, NULL, cplen);
4968 			break;
4969 		}
4970 
4971 		buflen -= PAGE_SIZE;
4972 		buf += PAGE_SIZE;
4973 	}
4974 
4975 	return 0;
4976 }
4977 
4978 static __be32
4979 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
4980 		      struct nfsd4_getxattr *getxattr)
4981 {
4982 	struct xdr_stream *xdr = resp->xdr;
4983 	__be32 *p, err;
4984 
4985 	p = xdr_reserve_space(xdr, 4);
4986 	if (!p)
4987 		return nfserr_resource;
4988 
4989 	*p = cpu_to_be32(getxattr->getxa_len);
4990 
4991 	if (getxattr->getxa_len == 0)
4992 		return 0;
4993 
4994 	err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf,
4995 				    getxattr->getxa_len);
4996 
4997 	kvfree(getxattr->getxa_buf);
4998 
4999 	return err;
5000 }
5001 
5002 static __be32
5003 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5004 		      struct nfsd4_setxattr *setxattr)
5005 {
5006 	struct xdr_stream *xdr = resp->xdr;
5007 	__be32 *p;
5008 
5009 	p = xdr_reserve_space(xdr, 20);
5010 	if (!p)
5011 		return nfserr_resource;
5012 
5013 	encode_cinfo(p, &setxattr->setxa_cinfo);
5014 
5015 	return 0;
5016 }
5017 
5018 /*
5019  * See if there are cookie values that can be rejected outright.
5020  */
5021 static __be32
5022 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs,
5023 				u32 *offsetp)
5024 {
5025 	u64 cookie = listxattrs->lsxa_cookie;
5026 
5027 	/*
5028 	 * If the cookie is larger than the maximum number we can fit
5029 	 * in either the buffer we just got back from vfs_listxattr, or,
5030 	 * XDR-encoded, in the return buffer, it's invalid.
5031 	 */
5032 	if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2))
5033 		return nfserr_badcookie;
5034 
5035 	if (cookie > (listxattrs->lsxa_maxcount /
5036 		      (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4)))
5037 		return nfserr_badcookie;
5038 
5039 	*offsetp = (u32)cookie;
5040 	return 0;
5041 }
5042 
5043 static __be32
5044 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr,
5045 			struct nfsd4_listxattrs *listxattrs)
5046 {
5047 	struct xdr_stream *xdr = resp->xdr;
5048 	u32 cookie_offset, count_offset, eof;
5049 	u32 left, xdrleft, slen, count;
5050 	u32 xdrlen, offset;
5051 	u64 cookie;
5052 	char *sp;
5053 	__be32 status, tmp;
5054 	__be32 *p;
5055 	u32 nuser;
5056 
5057 	eof = 1;
5058 
5059 	status = nfsd4_listxattr_validate_cookie(listxattrs, &offset);
5060 	if (status)
5061 		goto out;
5062 
5063 	/*
5064 	 * Reserve space for the cookie and the name array count. Record
5065 	 * the offsets to save them later.
5066 	 */
5067 	cookie_offset = xdr->buf->len;
5068 	count_offset = cookie_offset + 8;
5069 	p = xdr_reserve_space(xdr, 12);
5070 	if (!p) {
5071 		status = nfserr_resource;
5072 		goto out;
5073 	}
5074 
5075 	count = 0;
5076 	left = listxattrs->lsxa_len;
5077 	sp = listxattrs->lsxa_buf;
5078 	nuser = 0;
5079 
5080 	xdrleft = listxattrs->lsxa_maxcount;
5081 
5082 	while (left > 0 && xdrleft > 0) {
5083 		slen = strlen(sp);
5084 
5085 		/*
5086 		 * Check if this is a "user." attribute, skip it if not.
5087 		 */
5088 		if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN))
5089 			goto contloop;
5090 
5091 		slen -= XATTR_USER_PREFIX_LEN;
5092 		xdrlen = 4 + ((slen + 3) & ~3);
5093 		if (xdrlen > xdrleft) {
5094 			if (count == 0) {
5095 				/*
5096 				 * Can't even fit the first attribute name.
5097 				 */
5098 				status = nfserr_toosmall;
5099 				goto out;
5100 			}
5101 			eof = 0;
5102 			goto wreof;
5103 		}
5104 
5105 		left -= XATTR_USER_PREFIX_LEN;
5106 		sp += XATTR_USER_PREFIX_LEN;
5107 		if (nuser++ < offset)
5108 			goto contloop;
5109 
5110 
5111 		p = xdr_reserve_space(xdr, xdrlen);
5112 		if (!p) {
5113 			status = nfserr_resource;
5114 			goto out;
5115 		}
5116 
5117 		xdr_encode_opaque(p, sp, slen);
5118 
5119 		xdrleft -= xdrlen;
5120 		count++;
5121 contloop:
5122 		sp += slen + 1;
5123 		left -= slen + 1;
5124 	}
5125 
5126 	/*
5127 	 * If there were user attributes to copy, but we didn't copy
5128 	 * any, the offset was too large (e.g. the cookie was invalid).
5129 	 */
5130 	if (nuser > 0 && count == 0) {
5131 		status = nfserr_badcookie;
5132 		goto out;
5133 	}
5134 
5135 wreof:
5136 	p = xdr_reserve_space(xdr, 4);
5137 	if (!p) {
5138 		status = nfserr_resource;
5139 		goto out;
5140 	}
5141 	*p = cpu_to_be32(eof);
5142 
5143 	cookie = offset + count;
5144 
5145 	write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8);
5146 	tmp = cpu_to_be32(count);
5147 	write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4);
5148 out:
5149 	if (listxattrs->lsxa_len)
5150 		kvfree(listxattrs->lsxa_buf);
5151 	return status;
5152 }
5153 
5154 static __be32
5155 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr,
5156 			 struct nfsd4_removexattr *removexattr)
5157 {
5158 	struct xdr_stream *xdr = resp->xdr;
5159 	__be32 *p;
5160 
5161 	p = xdr_reserve_space(xdr, 20);
5162 	if (!p)
5163 		return nfserr_resource;
5164 
5165 	p = encode_cinfo(p, &removexattr->rmxa_cinfo);
5166 	return 0;
5167 }
5168 
5169 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *);
5170 
5171 /*
5172  * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1
5173  * since we don't need to filter out obsolete ops as this is
5174  * done in the decoding phase.
5175  */
5176 static const nfsd4_enc nfsd4_enc_ops[] = {
5177 	[OP_ACCESS]		= (nfsd4_enc)nfsd4_encode_access,
5178 	[OP_CLOSE]		= (nfsd4_enc)nfsd4_encode_close,
5179 	[OP_COMMIT]		= (nfsd4_enc)nfsd4_encode_commit,
5180 	[OP_CREATE]		= (nfsd4_enc)nfsd4_encode_create,
5181 	[OP_DELEGPURGE]		= (nfsd4_enc)nfsd4_encode_noop,
5182 	[OP_DELEGRETURN]	= (nfsd4_enc)nfsd4_encode_noop,
5183 	[OP_GETATTR]		= (nfsd4_enc)nfsd4_encode_getattr,
5184 	[OP_GETFH]		= (nfsd4_enc)nfsd4_encode_getfh,
5185 	[OP_LINK]		= (nfsd4_enc)nfsd4_encode_link,
5186 	[OP_LOCK]		= (nfsd4_enc)nfsd4_encode_lock,
5187 	[OP_LOCKT]		= (nfsd4_enc)nfsd4_encode_lockt,
5188 	[OP_LOCKU]		= (nfsd4_enc)nfsd4_encode_locku,
5189 	[OP_LOOKUP]		= (nfsd4_enc)nfsd4_encode_noop,
5190 	[OP_LOOKUPP]		= (nfsd4_enc)nfsd4_encode_noop,
5191 	[OP_NVERIFY]		= (nfsd4_enc)nfsd4_encode_noop,
5192 	[OP_OPEN]		= (nfsd4_enc)nfsd4_encode_open,
5193 	[OP_OPENATTR]		= (nfsd4_enc)nfsd4_encode_noop,
5194 	[OP_OPEN_CONFIRM]	= (nfsd4_enc)nfsd4_encode_open_confirm,
5195 	[OP_OPEN_DOWNGRADE]	= (nfsd4_enc)nfsd4_encode_open_downgrade,
5196 	[OP_PUTFH]		= (nfsd4_enc)nfsd4_encode_noop,
5197 	[OP_PUTPUBFH]		= (nfsd4_enc)nfsd4_encode_noop,
5198 	[OP_PUTROOTFH]		= (nfsd4_enc)nfsd4_encode_noop,
5199 	[OP_READ]		= (nfsd4_enc)nfsd4_encode_read,
5200 	[OP_READDIR]		= (nfsd4_enc)nfsd4_encode_readdir,
5201 	[OP_READLINK]		= (nfsd4_enc)nfsd4_encode_readlink,
5202 	[OP_REMOVE]		= (nfsd4_enc)nfsd4_encode_remove,
5203 	[OP_RENAME]		= (nfsd4_enc)nfsd4_encode_rename,
5204 	[OP_RENEW]		= (nfsd4_enc)nfsd4_encode_noop,
5205 	[OP_RESTOREFH]		= (nfsd4_enc)nfsd4_encode_noop,
5206 	[OP_SAVEFH]		= (nfsd4_enc)nfsd4_encode_noop,
5207 	[OP_SECINFO]		= (nfsd4_enc)nfsd4_encode_secinfo,
5208 	[OP_SETATTR]		= (nfsd4_enc)nfsd4_encode_setattr,
5209 	[OP_SETCLIENTID]	= (nfsd4_enc)nfsd4_encode_setclientid,
5210 	[OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop,
5211 	[OP_VERIFY]		= (nfsd4_enc)nfsd4_encode_noop,
5212 	[OP_WRITE]		= (nfsd4_enc)nfsd4_encode_write,
5213 	[OP_RELEASE_LOCKOWNER]	= (nfsd4_enc)nfsd4_encode_noop,
5214 
5215 	/* NFSv4.1 operations */
5216 	[OP_BACKCHANNEL_CTL]	= (nfsd4_enc)nfsd4_encode_noop,
5217 	[OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session,
5218 	[OP_EXCHANGE_ID]	= (nfsd4_enc)nfsd4_encode_exchange_id,
5219 	[OP_CREATE_SESSION]	= (nfsd4_enc)nfsd4_encode_create_session,
5220 	[OP_DESTROY_SESSION]	= (nfsd4_enc)nfsd4_encode_noop,
5221 	[OP_FREE_STATEID]	= (nfsd4_enc)nfsd4_encode_noop,
5222 	[OP_GET_DIR_DELEGATION]	= (nfsd4_enc)nfsd4_encode_noop,
5223 #ifdef CONFIG_NFSD_PNFS
5224 	[OP_GETDEVICEINFO]	= (nfsd4_enc)nfsd4_encode_getdeviceinfo,
5225 	[OP_GETDEVICELIST]	= (nfsd4_enc)nfsd4_encode_noop,
5226 	[OP_LAYOUTCOMMIT]	= (nfsd4_enc)nfsd4_encode_layoutcommit,
5227 	[OP_LAYOUTGET]		= (nfsd4_enc)nfsd4_encode_layoutget,
5228 	[OP_LAYOUTRETURN]	= (nfsd4_enc)nfsd4_encode_layoutreturn,
5229 #else
5230 	[OP_GETDEVICEINFO]	= (nfsd4_enc)nfsd4_encode_noop,
5231 	[OP_GETDEVICELIST]	= (nfsd4_enc)nfsd4_encode_noop,
5232 	[OP_LAYOUTCOMMIT]	= (nfsd4_enc)nfsd4_encode_noop,
5233 	[OP_LAYOUTGET]		= (nfsd4_enc)nfsd4_encode_noop,
5234 	[OP_LAYOUTRETURN]	= (nfsd4_enc)nfsd4_encode_noop,
5235 #endif
5236 	[OP_SECINFO_NO_NAME]	= (nfsd4_enc)nfsd4_encode_secinfo_no_name,
5237 	[OP_SEQUENCE]		= (nfsd4_enc)nfsd4_encode_sequence,
5238 	[OP_SET_SSV]		= (nfsd4_enc)nfsd4_encode_noop,
5239 	[OP_TEST_STATEID]	= (nfsd4_enc)nfsd4_encode_test_stateid,
5240 	[OP_WANT_DELEGATION]	= (nfsd4_enc)nfsd4_encode_noop,
5241 	[OP_DESTROY_CLIENTID]	= (nfsd4_enc)nfsd4_encode_noop,
5242 	[OP_RECLAIM_COMPLETE]	= (nfsd4_enc)nfsd4_encode_noop,
5243 
5244 	/* NFSv4.2 operations */
5245 	[OP_ALLOCATE]		= (nfsd4_enc)nfsd4_encode_noop,
5246 	[OP_COPY]		= (nfsd4_enc)nfsd4_encode_copy,
5247 	[OP_COPY_NOTIFY]	= (nfsd4_enc)nfsd4_encode_copy_notify,
5248 	[OP_DEALLOCATE]		= (nfsd4_enc)nfsd4_encode_noop,
5249 	[OP_IO_ADVISE]		= (nfsd4_enc)nfsd4_encode_noop,
5250 	[OP_LAYOUTERROR]	= (nfsd4_enc)nfsd4_encode_noop,
5251 	[OP_LAYOUTSTATS]	= (nfsd4_enc)nfsd4_encode_noop,
5252 	[OP_OFFLOAD_CANCEL]	= (nfsd4_enc)nfsd4_encode_noop,
5253 	[OP_OFFLOAD_STATUS]	= (nfsd4_enc)nfsd4_encode_offload_status,
5254 	[OP_READ_PLUS]		= (nfsd4_enc)nfsd4_encode_read_plus,
5255 	[OP_SEEK]		= (nfsd4_enc)nfsd4_encode_seek,
5256 	[OP_WRITE_SAME]		= (nfsd4_enc)nfsd4_encode_noop,
5257 	[OP_CLONE]		= (nfsd4_enc)nfsd4_encode_noop,
5258 
5259 	/* RFC 8276 extended atributes operations */
5260 	[OP_GETXATTR]		= (nfsd4_enc)nfsd4_encode_getxattr,
5261 	[OP_SETXATTR]		= (nfsd4_enc)nfsd4_encode_setxattr,
5262 	[OP_LISTXATTRS]		= (nfsd4_enc)nfsd4_encode_listxattrs,
5263 	[OP_REMOVEXATTR]	= (nfsd4_enc)nfsd4_encode_removexattr,
5264 };
5265 
5266 /*
5267  * Calculate whether we still have space to encode repsize bytes.
5268  * There are two considerations:
5269  *     - For NFS versions >=4.1, the size of the reply must stay within
5270  *       session limits
5271  *     - For all NFS versions, we must stay within limited preallocated
5272  *       buffer space.
5273  *
5274  * This is called before the operation is processed, so can only provide
5275  * an upper estimate.  For some nonidempotent operations (such as
5276  * getattr), it's not necessarily a problem if that estimate is wrong,
5277  * as we can fail it after processing without significant side effects.
5278  */
5279 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize)
5280 {
5281 	struct xdr_buf *buf = &resp->rqstp->rq_res;
5282 	struct nfsd4_slot *slot = resp->cstate.slot;
5283 
5284 	if (buf->len + respsize <= buf->buflen)
5285 		return nfs_ok;
5286 	if (!nfsd4_has_session(&resp->cstate))
5287 		return nfserr_resource;
5288 	if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) {
5289 		WARN_ON_ONCE(1);
5290 		return nfserr_rep_too_big_to_cache;
5291 	}
5292 	return nfserr_rep_too_big;
5293 }
5294 
5295 void
5296 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op)
5297 {
5298 	struct xdr_stream *xdr = resp->xdr;
5299 	struct nfs4_stateowner *so = resp->cstate.replay_owner;
5300 	struct svc_rqst *rqstp = resp->rqstp;
5301 	const struct nfsd4_operation *opdesc = op->opdesc;
5302 	int post_err_offset;
5303 	nfsd4_enc encoder;
5304 	__be32 *p;
5305 
5306 	p = xdr_reserve_space(xdr, 8);
5307 	if (!p) {
5308 		WARN_ON_ONCE(1);
5309 		return;
5310 	}
5311 	*p++ = cpu_to_be32(op->opnum);
5312 	post_err_offset = xdr->buf->len;
5313 
5314 	if (op->opnum == OP_ILLEGAL)
5315 		goto status;
5316 	if (op->status && opdesc &&
5317 			!(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE))
5318 		goto status;
5319 	BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) ||
5320 	       !nfsd4_enc_ops[op->opnum]);
5321 	encoder = nfsd4_enc_ops[op->opnum];
5322 	op->status = encoder(resp, op->status, &op->u);
5323 	if (op->status)
5324 		trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status);
5325 	if (opdesc && opdesc->op_release)
5326 		opdesc->op_release(&op->u);
5327 	xdr_commit_encode(xdr);
5328 
5329 	/* nfsd4_check_resp_size guarantees enough room for error status */
5330 	if (!op->status) {
5331 		int space_needed = 0;
5332 		if (!nfsd4_last_compound_op(rqstp))
5333 			space_needed = COMPOUND_ERR_SLACK_SPACE;
5334 		op->status = nfsd4_check_resp_size(resp, space_needed);
5335 	}
5336 	if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) {
5337 		struct nfsd4_slot *slot = resp->cstate.slot;
5338 
5339 		if (slot->sl_flags & NFSD4_SLOT_CACHETHIS)
5340 			op->status = nfserr_rep_too_big_to_cache;
5341 		else
5342 			op->status = nfserr_rep_too_big;
5343 	}
5344 	if (op->status == nfserr_resource ||
5345 	    op->status == nfserr_rep_too_big ||
5346 	    op->status == nfserr_rep_too_big_to_cache) {
5347 		/*
5348 		 * The operation may have already been encoded or
5349 		 * partially encoded.  No op returns anything additional
5350 		 * in the case of one of these three errors, so we can
5351 		 * just truncate back to after the status.  But it's a
5352 		 * bug if we had to do this on a non-idempotent op:
5353 		 */
5354 		warn_on_nonidempotent_op(op);
5355 		xdr_truncate_encode(xdr, post_err_offset);
5356 	}
5357 	if (so) {
5358 		int len = xdr->buf->len - post_err_offset;
5359 
5360 		so->so_replay.rp_status = op->status;
5361 		so->so_replay.rp_buflen = len;
5362 		read_bytes_from_xdr_buf(xdr->buf, post_err_offset,
5363 						so->so_replay.rp_buf, len);
5364 	}
5365 status:
5366 	*p = op->status;
5367 }
5368 
5369 /*
5370  * Encode the reply stored in the stateowner reply cache
5371  *
5372  * XDR note: do not encode rp->rp_buflen: the buffer contains the
5373  * previously sent already encoded operation.
5374  */
5375 void
5376 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op)
5377 {
5378 	__be32 *p;
5379 	struct nfs4_replay *rp = op->replay;
5380 
5381 	p = xdr_reserve_space(xdr, 8 + rp->rp_buflen);
5382 	if (!p) {
5383 		WARN_ON_ONCE(1);
5384 		return;
5385 	}
5386 	*p++ = cpu_to_be32(op->opnum);
5387 	*p++ = rp->rp_status;  /* already xdr'ed */
5388 
5389 	p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen);
5390 }
5391 
5392 void nfsd4_release_compoundargs(struct svc_rqst *rqstp)
5393 {
5394 	struct nfsd4_compoundargs *args = rqstp->rq_argp;
5395 
5396 	if (args->ops != args->iops) {
5397 		kfree(args->ops);
5398 		args->ops = args->iops;
5399 	}
5400 	while (args->to_free) {
5401 		struct svcxdr_tmpbuf *tb = args->to_free;
5402 		args->to_free = tb->next;
5403 		kfree(tb);
5404 	}
5405 }
5406 
5407 bool
5408 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5409 {
5410 	struct nfsd4_compoundargs *args = rqstp->rq_argp;
5411 
5412 	/* svcxdr_tmp_alloc */
5413 	args->to_free = NULL;
5414 
5415 	args->xdr = xdr;
5416 	args->ops = args->iops;
5417 	args->rqstp = rqstp;
5418 
5419 	return nfsd4_decode_compound(args);
5420 }
5421 
5422 bool
5423 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, struct xdr_stream *xdr)
5424 {
5425 	struct nfsd4_compoundres *resp = rqstp->rq_resp;
5426 	struct xdr_buf *buf = xdr->buf;
5427 	__be32 *p;
5428 
5429 	WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len +
5430 				 buf->tail[0].iov_len);
5431 
5432 	/*
5433 	 * Send buffer space for the following items is reserved
5434 	 * at the top of nfsd4_proc_compound().
5435 	 */
5436 	p = resp->statusp;
5437 
5438 	*p++ = resp->cstate.status;
5439 
5440 	rqstp->rq_next_page = xdr->page_ptr + 1;
5441 
5442 	*p++ = htonl(resp->taglen);
5443 	memcpy(p, resp->tag, resp->taglen);
5444 	p += XDR_QUADLEN(resp->taglen);
5445 	*p++ = htonl(resp->opcnt);
5446 
5447 	nfsd4_sequence_done(resp);
5448 	return true;
5449 }
5450