1 /* 2 * Server-side XDR for NFSv4 3 * 4 * Copyright (c) 2002 The Regents of the University of Michigan. 5 * All rights reserved. 6 * 7 * Kendrick Smith <kmsmith@umich.edu> 8 * Andy Adamson <andros@umich.edu> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. Neither the name of the University nor the names of its 20 * contributors may be used to endorse or promote products derived 21 * from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 * 35 * TODO: Neil Brown made the following observation: We currently 36 * initially reserve NFSD_BUFSIZE space on the transmit queue and 37 * never release any of that until the request is complete. 38 * It would be good to calculate a new maximum response size while 39 * decoding the COMPOUND, and call svc_reserve with this number 40 * at the end of nfs4svc_decode_compoundargs. 41 */ 42 43 #include <linux/slab.h> 44 #include <linux/namei.h> 45 #include <linux/statfs.h> 46 #include <linux/utsname.h> 47 #include <linux/pagemap.h> 48 #include <linux/sunrpc/svcauth_gss.h> 49 50 #include "idmap.h" 51 #include "acl.h" 52 #include "xdr4.h" 53 #include "vfs.h" 54 #include "state.h" 55 #include "cache.h" 56 #include "netns.h" 57 58 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 59 #include <linux/security.h> 60 #endif 61 62 63 #define NFSDDBG_FACILITY NFSDDBG_XDR 64 65 /* 66 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing 67 * directory in order to indicate to the client that a filesystem boundary is present 68 * We use a fixed fsid for a referral 69 */ 70 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL 71 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL 72 73 static __be32 74 check_filename(char *str, int len) 75 { 76 int i; 77 78 if (len == 0) 79 return nfserr_inval; 80 if (isdotent(str, len)) 81 return nfserr_badname; 82 for (i = 0; i < len; i++) 83 if (str[i] == '/') 84 return nfserr_badname; 85 return 0; 86 } 87 88 #define DECODE_HEAD \ 89 __be32 *p; \ 90 __be32 status 91 #define DECODE_TAIL \ 92 status = 0; \ 93 out: \ 94 return status; \ 95 xdr_error: \ 96 dprintk("NFSD: xdr error (%s:%d)\n", \ 97 __FILE__, __LINE__); \ 98 status = nfserr_bad_xdr; \ 99 goto out 100 101 #define READMEM(x,nbytes) do { \ 102 x = (char *)p; \ 103 p += XDR_QUADLEN(nbytes); \ 104 } while (0) 105 #define SAVEMEM(x,nbytes) do { \ 106 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \ 107 savemem(argp, p, nbytes) : \ 108 (char *)p)) { \ 109 dprintk("NFSD: xdr error (%s:%d)\n", \ 110 __FILE__, __LINE__); \ 111 goto xdr_error; \ 112 } \ 113 p += XDR_QUADLEN(nbytes); \ 114 } while (0) 115 #define COPYMEM(x,nbytes) do { \ 116 memcpy((x), p, nbytes); \ 117 p += XDR_QUADLEN(nbytes); \ 118 } while (0) 119 120 /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */ 121 #define READ_BUF(nbytes) do { \ 122 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \ 123 p = argp->p; \ 124 argp->p += XDR_QUADLEN(nbytes); \ 125 } else if (!(p = read_buf(argp, nbytes))) { \ 126 dprintk("NFSD: xdr error (%s:%d)\n", \ 127 __FILE__, __LINE__); \ 128 goto xdr_error; \ 129 } \ 130 } while (0) 131 132 static void next_decode_page(struct nfsd4_compoundargs *argp) 133 { 134 argp->p = page_address(argp->pagelist[0]); 135 argp->pagelist++; 136 if (argp->pagelen < PAGE_SIZE) { 137 argp->end = argp->p + (argp->pagelen>>2); 138 argp->pagelen = 0; 139 } else { 140 argp->end = argp->p + (PAGE_SIZE>>2); 141 argp->pagelen -= PAGE_SIZE; 142 } 143 } 144 145 static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes) 146 { 147 /* We want more bytes than seem to be available. 148 * Maybe we need a new page, maybe we have just run out 149 */ 150 unsigned int avail = (char *)argp->end - (char *)argp->p; 151 __be32 *p; 152 if (avail + argp->pagelen < nbytes) 153 return NULL; 154 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */ 155 return NULL; 156 /* ok, we can do it with the current plus the next page */ 157 if (nbytes <= sizeof(argp->tmp)) 158 p = argp->tmp; 159 else { 160 kfree(argp->tmpp); 161 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL); 162 if (!p) 163 return NULL; 164 165 } 166 /* 167 * The following memcpy is safe because read_buf is always 168 * called with nbytes > avail, and the two cases above both 169 * guarantee p points to at least nbytes bytes. 170 */ 171 memcpy(p, argp->p, avail); 172 next_decode_page(argp); 173 memcpy(((char*)p)+avail, argp->p, (nbytes - avail)); 174 argp->p += XDR_QUADLEN(nbytes - avail); 175 return p; 176 } 177 178 static int zero_clientid(clientid_t *clid) 179 { 180 return (clid->cl_boot == 0) && (clid->cl_id == 0); 181 } 182 183 /** 184 * defer_free - mark an allocation as deferred freed 185 * @argp: NFSv4 compound argument structure to be freed with 186 * @release: release callback to free @p, typically kfree() 187 * @p: pointer to be freed 188 * 189 * Marks @p to be freed when processing the compound operation 190 * described in @argp finishes. 191 */ 192 static int 193 defer_free(struct nfsd4_compoundargs *argp, 194 void (*release)(const void *), void *p) 195 { 196 struct tmpbuf *tb; 197 198 tb = kmalloc(sizeof(*tb), GFP_KERNEL); 199 if (!tb) 200 return -ENOMEM; 201 tb->buf = p; 202 tb->release = release; 203 tb->next = argp->to_free; 204 argp->to_free = tb; 205 return 0; 206 } 207 208 /** 209 * savemem - duplicate a chunk of memory for later processing 210 * @argp: NFSv4 compound argument structure to be freed with 211 * @p: pointer to be duplicated 212 * @nbytes: length to be duplicated 213 * 214 * Returns a pointer to a copy of @nbytes bytes of memory at @p 215 * that are preserved until processing of the NFSv4 compound 216 * operation described by @argp finishes. 217 */ 218 static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes) 219 { 220 if (p == argp->tmp) { 221 p = kmemdup(argp->tmp, nbytes, GFP_KERNEL); 222 if (!p) 223 return NULL; 224 } else { 225 BUG_ON(p != argp->tmpp); 226 argp->tmpp = NULL; 227 } 228 if (defer_free(argp, kfree, p)) { 229 kfree(p); 230 return NULL; 231 } else 232 return (char *)p; 233 } 234 235 static __be32 236 nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval) 237 { 238 u32 bmlen; 239 DECODE_HEAD; 240 241 bmval[0] = 0; 242 bmval[1] = 0; 243 bmval[2] = 0; 244 245 READ_BUF(4); 246 bmlen = be32_to_cpup(p++); 247 if (bmlen > 1000) 248 goto xdr_error; 249 250 READ_BUF(bmlen << 2); 251 if (bmlen > 0) 252 bmval[0] = be32_to_cpup(p++); 253 if (bmlen > 1) 254 bmval[1] = be32_to_cpup(p++); 255 if (bmlen > 2) 256 bmval[2] = be32_to_cpup(p++); 257 258 DECODE_TAIL; 259 } 260 261 static __be32 262 nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval, 263 struct iattr *iattr, struct nfs4_acl **acl, 264 struct xdr_netobj *label) 265 { 266 int expected_len, len = 0; 267 u32 dummy32; 268 u64 sec; 269 char *buf; 270 271 DECODE_HEAD; 272 iattr->ia_valid = 0; 273 if ((status = nfsd4_decode_bitmap(argp, bmval))) 274 return status; 275 276 READ_BUF(4); 277 expected_len = be32_to_cpup(p++); 278 279 if (bmval[0] & FATTR4_WORD0_SIZE) { 280 READ_BUF(8); 281 len += 8; 282 p = xdr_decode_hyper(p, &iattr->ia_size); 283 iattr->ia_valid |= ATTR_SIZE; 284 } 285 if (bmval[0] & FATTR4_WORD0_ACL) { 286 u32 nace; 287 struct nfs4_ace *ace; 288 289 READ_BUF(4); len += 4; 290 nace = be32_to_cpup(p++); 291 292 if (nace > NFS4_ACL_MAX) 293 return nfserr_fbig; 294 295 *acl = nfs4_acl_new(nace); 296 if (*acl == NULL) 297 return nfserr_jukebox; 298 299 defer_free(argp, kfree, *acl); 300 301 (*acl)->naces = nace; 302 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) { 303 READ_BUF(16); len += 16; 304 ace->type = be32_to_cpup(p++); 305 ace->flag = be32_to_cpup(p++); 306 ace->access_mask = be32_to_cpup(p++); 307 dummy32 = be32_to_cpup(p++); 308 READ_BUF(dummy32); 309 len += XDR_QUADLEN(dummy32) << 2; 310 READMEM(buf, dummy32); 311 ace->whotype = nfs4_acl_get_whotype(buf, dummy32); 312 status = nfs_ok; 313 if (ace->whotype != NFS4_ACL_WHO_NAMED) 314 ; 315 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 316 status = nfsd_map_name_to_gid(argp->rqstp, 317 buf, dummy32, &ace->who_gid); 318 else 319 status = nfsd_map_name_to_uid(argp->rqstp, 320 buf, dummy32, &ace->who_uid); 321 if (status) 322 return status; 323 } 324 } else 325 *acl = NULL; 326 if (bmval[1] & FATTR4_WORD1_MODE) { 327 READ_BUF(4); 328 len += 4; 329 iattr->ia_mode = be32_to_cpup(p++); 330 iattr->ia_mode &= (S_IFMT | S_IALLUGO); 331 iattr->ia_valid |= ATTR_MODE; 332 } 333 if (bmval[1] & FATTR4_WORD1_OWNER) { 334 READ_BUF(4); 335 len += 4; 336 dummy32 = be32_to_cpup(p++); 337 READ_BUF(dummy32); 338 len += (XDR_QUADLEN(dummy32) << 2); 339 READMEM(buf, dummy32); 340 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid))) 341 return status; 342 iattr->ia_valid |= ATTR_UID; 343 } 344 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { 345 READ_BUF(4); 346 len += 4; 347 dummy32 = be32_to_cpup(p++); 348 READ_BUF(dummy32); 349 len += (XDR_QUADLEN(dummy32) << 2); 350 READMEM(buf, dummy32); 351 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid))) 352 return status; 353 iattr->ia_valid |= ATTR_GID; 354 } 355 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { 356 READ_BUF(4); 357 len += 4; 358 dummy32 = be32_to_cpup(p++); 359 switch (dummy32) { 360 case NFS4_SET_TO_CLIENT_TIME: 361 /* We require the high 32 bits of 'seconds' to be 0, and we ignore 362 all 32 bits of 'nseconds'. */ 363 READ_BUF(12); 364 len += 12; 365 p = xdr_decode_hyper(p, &sec); 366 iattr->ia_atime.tv_sec = (time_t)sec; 367 iattr->ia_atime.tv_nsec = be32_to_cpup(p++); 368 if (iattr->ia_atime.tv_nsec >= (u32)1000000000) 369 return nfserr_inval; 370 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); 371 break; 372 case NFS4_SET_TO_SERVER_TIME: 373 iattr->ia_valid |= ATTR_ATIME; 374 break; 375 default: 376 goto xdr_error; 377 } 378 } 379 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { 380 READ_BUF(4); 381 len += 4; 382 dummy32 = be32_to_cpup(p++); 383 switch (dummy32) { 384 case NFS4_SET_TO_CLIENT_TIME: 385 /* We require the high 32 bits of 'seconds' to be 0, and we ignore 386 all 32 bits of 'nseconds'. */ 387 READ_BUF(12); 388 len += 12; 389 p = xdr_decode_hyper(p, &sec); 390 iattr->ia_mtime.tv_sec = sec; 391 iattr->ia_mtime.tv_nsec = be32_to_cpup(p++); 392 if (iattr->ia_mtime.tv_nsec >= (u32)1000000000) 393 return nfserr_inval; 394 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); 395 break; 396 case NFS4_SET_TO_SERVER_TIME: 397 iattr->ia_valid |= ATTR_MTIME; 398 break; 399 default: 400 goto xdr_error; 401 } 402 } 403 404 label->len = 0; 405 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 406 if (bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { 407 READ_BUF(4); 408 len += 4; 409 dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */ 410 READ_BUF(4); 411 len += 4; 412 dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */ 413 READ_BUF(4); 414 len += 4; 415 dummy32 = be32_to_cpup(p++); 416 READ_BUF(dummy32); 417 if (dummy32 > NFSD4_MAX_SEC_LABEL_LEN) 418 return nfserr_badlabel; 419 len += (XDR_QUADLEN(dummy32) << 2); 420 READMEM(buf, dummy32); 421 label->data = kzalloc(dummy32 + 1, GFP_KERNEL); 422 if (!label->data) 423 return nfserr_jukebox; 424 label->len = dummy32; 425 defer_free(argp, kfree, label->data); 426 memcpy(label->data, buf, dummy32); 427 } 428 #endif 429 430 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 431 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 432 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) 433 READ_BUF(expected_len - len); 434 else if (len != expected_len) 435 goto xdr_error; 436 437 DECODE_TAIL; 438 } 439 440 static __be32 441 nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid) 442 { 443 DECODE_HEAD; 444 445 READ_BUF(sizeof(stateid_t)); 446 sid->si_generation = be32_to_cpup(p++); 447 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t)); 448 449 DECODE_TAIL; 450 } 451 452 static __be32 453 nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access) 454 { 455 DECODE_HEAD; 456 457 READ_BUF(4); 458 access->ac_req_access = be32_to_cpup(p++); 459 460 DECODE_TAIL; 461 } 462 463 static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) 464 { 465 DECODE_HEAD; 466 u32 dummy, uid, gid; 467 char *machine_name; 468 int i; 469 int nr_secflavs; 470 471 /* callback_sec_params4 */ 472 READ_BUF(4); 473 nr_secflavs = be32_to_cpup(p++); 474 if (nr_secflavs) 475 cbs->flavor = (u32)(-1); 476 else 477 /* Is this legal? Be generous, take it to mean AUTH_NONE: */ 478 cbs->flavor = 0; 479 for (i = 0; i < nr_secflavs; ++i) { 480 READ_BUF(4); 481 dummy = be32_to_cpup(p++); 482 switch (dummy) { 483 case RPC_AUTH_NULL: 484 /* Nothing to read */ 485 if (cbs->flavor == (u32)(-1)) 486 cbs->flavor = RPC_AUTH_NULL; 487 break; 488 case RPC_AUTH_UNIX: 489 READ_BUF(8); 490 /* stamp */ 491 dummy = be32_to_cpup(p++); 492 493 /* machine name */ 494 dummy = be32_to_cpup(p++); 495 READ_BUF(dummy); 496 SAVEMEM(machine_name, dummy); 497 498 /* uid, gid */ 499 READ_BUF(8); 500 uid = be32_to_cpup(p++); 501 gid = be32_to_cpup(p++); 502 503 /* more gids */ 504 READ_BUF(4); 505 dummy = be32_to_cpup(p++); 506 READ_BUF(dummy * 4); 507 if (cbs->flavor == (u32)(-1)) { 508 kuid_t kuid = make_kuid(&init_user_ns, uid); 509 kgid_t kgid = make_kgid(&init_user_ns, gid); 510 if (uid_valid(kuid) && gid_valid(kgid)) { 511 cbs->uid = kuid; 512 cbs->gid = kgid; 513 cbs->flavor = RPC_AUTH_UNIX; 514 } else { 515 dprintk("RPC_AUTH_UNIX with invalid" 516 "uid or gid ignoring!\n"); 517 } 518 } 519 break; 520 case RPC_AUTH_GSS: 521 dprintk("RPC_AUTH_GSS callback secflavor " 522 "not supported!\n"); 523 READ_BUF(8); 524 /* gcbp_service */ 525 dummy = be32_to_cpup(p++); 526 /* gcbp_handle_from_server */ 527 dummy = be32_to_cpup(p++); 528 READ_BUF(dummy); 529 p += XDR_QUADLEN(dummy); 530 /* gcbp_handle_from_client */ 531 READ_BUF(4); 532 dummy = be32_to_cpup(p++); 533 READ_BUF(dummy); 534 break; 535 default: 536 dprintk("Illegal callback secflavor\n"); 537 return nfserr_inval; 538 } 539 } 540 DECODE_TAIL; 541 } 542 543 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc) 544 { 545 DECODE_HEAD; 546 547 READ_BUF(4); 548 bc->bc_cb_program = be32_to_cpup(p++); 549 nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); 550 551 DECODE_TAIL; 552 } 553 554 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts) 555 { 556 DECODE_HEAD; 557 558 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8); 559 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN); 560 bcts->dir = be32_to_cpup(p++); 561 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker 562 * could help us figure out we should be using it. */ 563 DECODE_TAIL; 564 } 565 566 static __be32 567 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close) 568 { 569 DECODE_HEAD; 570 571 READ_BUF(4); 572 close->cl_seqid = be32_to_cpup(p++); 573 return nfsd4_decode_stateid(argp, &close->cl_stateid); 574 575 DECODE_TAIL; 576 } 577 578 579 static __be32 580 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit) 581 { 582 DECODE_HEAD; 583 584 READ_BUF(12); 585 p = xdr_decode_hyper(p, &commit->co_offset); 586 commit->co_count = be32_to_cpup(p++); 587 588 DECODE_TAIL; 589 } 590 591 static __be32 592 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create) 593 { 594 DECODE_HEAD; 595 596 READ_BUF(4); 597 create->cr_type = be32_to_cpup(p++); 598 switch (create->cr_type) { 599 case NF4LNK: 600 READ_BUF(4); 601 create->cr_linklen = be32_to_cpup(p++); 602 READ_BUF(create->cr_linklen); 603 SAVEMEM(create->cr_linkname, create->cr_linklen); 604 break; 605 case NF4BLK: 606 case NF4CHR: 607 READ_BUF(8); 608 create->cr_specdata1 = be32_to_cpup(p++); 609 create->cr_specdata2 = be32_to_cpup(p++); 610 break; 611 case NF4SOCK: 612 case NF4FIFO: 613 case NF4DIR: 614 default: 615 break; 616 } 617 618 READ_BUF(4); 619 create->cr_namelen = be32_to_cpup(p++); 620 READ_BUF(create->cr_namelen); 621 SAVEMEM(create->cr_name, create->cr_namelen); 622 if ((status = check_filename(create->cr_name, create->cr_namelen))) 623 return status; 624 625 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr, 626 &create->cr_acl, &create->cr_label); 627 if (status) 628 goto out; 629 630 DECODE_TAIL; 631 } 632 633 static inline __be32 634 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr) 635 { 636 return nfsd4_decode_stateid(argp, &dr->dr_stateid); 637 } 638 639 static inline __be32 640 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr) 641 { 642 return nfsd4_decode_bitmap(argp, getattr->ga_bmval); 643 } 644 645 static __be32 646 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link) 647 { 648 DECODE_HEAD; 649 650 READ_BUF(4); 651 link->li_namelen = be32_to_cpup(p++); 652 READ_BUF(link->li_namelen); 653 SAVEMEM(link->li_name, link->li_namelen); 654 if ((status = check_filename(link->li_name, link->li_namelen))) 655 return status; 656 657 DECODE_TAIL; 658 } 659 660 static __be32 661 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) 662 { 663 DECODE_HEAD; 664 665 /* 666 * type, reclaim(boolean), offset, length, new_lock_owner(boolean) 667 */ 668 READ_BUF(28); 669 lock->lk_type = be32_to_cpup(p++); 670 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) 671 goto xdr_error; 672 lock->lk_reclaim = be32_to_cpup(p++); 673 p = xdr_decode_hyper(p, &lock->lk_offset); 674 p = xdr_decode_hyper(p, &lock->lk_length); 675 lock->lk_is_new = be32_to_cpup(p++); 676 677 if (lock->lk_is_new) { 678 READ_BUF(4); 679 lock->lk_new_open_seqid = be32_to_cpup(p++); 680 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid); 681 if (status) 682 return status; 683 READ_BUF(8 + sizeof(clientid_t)); 684 lock->lk_new_lock_seqid = be32_to_cpup(p++); 685 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t)); 686 lock->lk_new_owner.len = be32_to_cpup(p++); 687 READ_BUF(lock->lk_new_owner.len); 688 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len); 689 } else { 690 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid); 691 if (status) 692 return status; 693 READ_BUF(4); 694 lock->lk_old_lock_seqid = be32_to_cpup(p++); 695 } 696 697 DECODE_TAIL; 698 } 699 700 static __be32 701 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt) 702 { 703 DECODE_HEAD; 704 705 READ_BUF(32); 706 lockt->lt_type = be32_to_cpup(p++); 707 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) 708 goto xdr_error; 709 p = xdr_decode_hyper(p, &lockt->lt_offset); 710 p = xdr_decode_hyper(p, &lockt->lt_length); 711 COPYMEM(&lockt->lt_clientid, 8); 712 lockt->lt_owner.len = be32_to_cpup(p++); 713 READ_BUF(lockt->lt_owner.len); 714 READMEM(lockt->lt_owner.data, lockt->lt_owner.len); 715 716 DECODE_TAIL; 717 } 718 719 static __be32 720 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku) 721 { 722 DECODE_HEAD; 723 724 READ_BUF(8); 725 locku->lu_type = be32_to_cpup(p++); 726 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) 727 goto xdr_error; 728 locku->lu_seqid = be32_to_cpup(p++); 729 status = nfsd4_decode_stateid(argp, &locku->lu_stateid); 730 if (status) 731 return status; 732 READ_BUF(16); 733 p = xdr_decode_hyper(p, &locku->lu_offset); 734 p = xdr_decode_hyper(p, &locku->lu_length); 735 736 DECODE_TAIL; 737 } 738 739 static __be32 740 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup) 741 { 742 DECODE_HEAD; 743 744 READ_BUF(4); 745 lookup->lo_len = be32_to_cpup(p++); 746 READ_BUF(lookup->lo_len); 747 SAVEMEM(lookup->lo_name, lookup->lo_len); 748 if ((status = check_filename(lookup->lo_name, lookup->lo_len))) 749 return status; 750 751 DECODE_TAIL; 752 } 753 754 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) 755 { 756 __be32 *p; 757 u32 w; 758 759 READ_BUF(4); 760 w = be32_to_cpup(p++); 761 *share_access = w & NFS4_SHARE_ACCESS_MASK; 762 *deleg_want = w & NFS4_SHARE_WANT_MASK; 763 if (deleg_when) 764 *deleg_when = w & NFS4_SHARE_WHEN_MASK; 765 766 switch (w & NFS4_SHARE_ACCESS_MASK) { 767 case NFS4_SHARE_ACCESS_READ: 768 case NFS4_SHARE_ACCESS_WRITE: 769 case NFS4_SHARE_ACCESS_BOTH: 770 break; 771 default: 772 return nfserr_bad_xdr; 773 } 774 w &= ~NFS4_SHARE_ACCESS_MASK; 775 if (!w) 776 return nfs_ok; 777 if (!argp->minorversion) 778 return nfserr_bad_xdr; 779 switch (w & NFS4_SHARE_WANT_MASK) { 780 case NFS4_SHARE_WANT_NO_PREFERENCE: 781 case NFS4_SHARE_WANT_READ_DELEG: 782 case NFS4_SHARE_WANT_WRITE_DELEG: 783 case NFS4_SHARE_WANT_ANY_DELEG: 784 case NFS4_SHARE_WANT_NO_DELEG: 785 case NFS4_SHARE_WANT_CANCEL: 786 break; 787 default: 788 return nfserr_bad_xdr; 789 } 790 w &= ~NFS4_SHARE_WANT_MASK; 791 if (!w) 792 return nfs_ok; 793 794 if (!deleg_when) /* open_downgrade */ 795 return nfserr_inval; 796 switch (w) { 797 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: 798 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: 799 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | 800 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): 801 return nfs_ok; 802 } 803 xdr_error: 804 return nfserr_bad_xdr; 805 } 806 807 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) 808 { 809 __be32 *p; 810 811 READ_BUF(4); 812 *x = be32_to_cpup(p++); 813 /* Note: unlinke access bits, deny bits may be zero. */ 814 if (*x & ~NFS4_SHARE_DENY_BOTH) 815 return nfserr_bad_xdr; 816 return nfs_ok; 817 xdr_error: 818 return nfserr_bad_xdr; 819 } 820 821 static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) 822 { 823 __be32 *p; 824 825 READ_BUF(4); 826 o->len = be32_to_cpup(p++); 827 828 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT) 829 return nfserr_bad_xdr; 830 831 READ_BUF(o->len); 832 SAVEMEM(o->data, o->len); 833 return nfs_ok; 834 xdr_error: 835 return nfserr_bad_xdr; 836 } 837 838 static __be32 839 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 840 { 841 DECODE_HEAD; 842 u32 dummy; 843 844 memset(open->op_bmval, 0, sizeof(open->op_bmval)); 845 open->op_iattr.ia_valid = 0; 846 open->op_openowner = NULL; 847 848 open->op_xdr_error = 0; 849 /* seqid, share_access, share_deny, clientid, ownerlen */ 850 READ_BUF(4); 851 open->op_seqid = be32_to_cpup(p++); 852 /* decode, yet ignore deleg_when until supported */ 853 status = nfsd4_decode_share_access(argp, &open->op_share_access, 854 &open->op_deleg_want, &dummy); 855 if (status) 856 goto xdr_error; 857 status = nfsd4_decode_share_deny(argp, &open->op_share_deny); 858 if (status) 859 goto xdr_error; 860 READ_BUF(sizeof(clientid_t)); 861 COPYMEM(&open->op_clientid, sizeof(clientid_t)); 862 status = nfsd4_decode_opaque(argp, &open->op_owner); 863 if (status) 864 goto xdr_error; 865 READ_BUF(4); 866 open->op_create = be32_to_cpup(p++); 867 switch (open->op_create) { 868 case NFS4_OPEN_NOCREATE: 869 break; 870 case NFS4_OPEN_CREATE: 871 READ_BUF(4); 872 open->op_createmode = be32_to_cpup(p++); 873 switch (open->op_createmode) { 874 case NFS4_CREATE_UNCHECKED: 875 case NFS4_CREATE_GUARDED: 876 status = nfsd4_decode_fattr(argp, open->op_bmval, 877 &open->op_iattr, &open->op_acl, &open->op_label); 878 if (status) 879 goto out; 880 break; 881 case NFS4_CREATE_EXCLUSIVE: 882 READ_BUF(NFS4_VERIFIER_SIZE); 883 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); 884 break; 885 case NFS4_CREATE_EXCLUSIVE4_1: 886 if (argp->minorversion < 1) 887 goto xdr_error; 888 READ_BUF(NFS4_VERIFIER_SIZE); 889 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); 890 status = nfsd4_decode_fattr(argp, open->op_bmval, 891 &open->op_iattr, &open->op_acl, &open->op_label); 892 if (status) 893 goto out; 894 break; 895 default: 896 goto xdr_error; 897 } 898 break; 899 default: 900 goto xdr_error; 901 } 902 903 /* open_claim */ 904 READ_BUF(4); 905 open->op_claim_type = be32_to_cpup(p++); 906 switch (open->op_claim_type) { 907 case NFS4_OPEN_CLAIM_NULL: 908 case NFS4_OPEN_CLAIM_DELEGATE_PREV: 909 READ_BUF(4); 910 open->op_fname.len = be32_to_cpup(p++); 911 READ_BUF(open->op_fname.len); 912 SAVEMEM(open->op_fname.data, open->op_fname.len); 913 if ((status = check_filename(open->op_fname.data, open->op_fname.len))) 914 return status; 915 break; 916 case NFS4_OPEN_CLAIM_PREVIOUS: 917 READ_BUF(4); 918 open->op_delegate_type = be32_to_cpup(p++); 919 break; 920 case NFS4_OPEN_CLAIM_DELEGATE_CUR: 921 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); 922 if (status) 923 return status; 924 READ_BUF(4); 925 open->op_fname.len = be32_to_cpup(p++); 926 READ_BUF(open->op_fname.len); 927 SAVEMEM(open->op_fname.data, open->op_fname.len); 928 if ((status = check_filename(open->op_fname.data, open->op_fname.len))) 929 return status; 930 break; 931 case NFS4_OPEN_CLAIM_FH: 932 case NFS4_OPEN_CLAIM_DELEG_PREV_FH: 933 if (argp->minorversion < 1) 934 goto xdr_error; 935 /* void */ 936 break; 937 case NFS4_OPEN_CLAIM_DELEG_CUR_FH: 938 if (argp->minorversion < 1) 939 goto xdr_error; 940 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); 941 if (status) 942 return status; 943 break; 944 default: 945 goto xdr_error; 946 } 947 948 DECODE_TAIL; 949 } 950 951 static __be32 952 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf) 953 { 954 DECODE_HEAD; 955 956 if (argp->minorversion >= 1) 957 return nfserr_notsupp; 958 959 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid); 960 if (status) 961 return status; 962 READ_BUF(4); 963 open_conf->oc_seqid = be32_to_cpup(p++); 964 965 DECODE_TAIL; 966 } 967 968 static __be32 969 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down) 970 { 971 DECODE_HEAD; 972 973 status = nfsd4_decode_stateid(argp, &open_down->od_stateid); 974 if (status) 975 return status; 976 READ_BUF(4); 977 open_down->od_seqid = be32_to_cpup(p++); 978 status = nfsd4_decode_share_access(argp, &open_down->od_share_access, 979 &open_down->od_deleg_want, NULL); 980 if (status) 981 return status; 982 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny); 983 if (status) 984 return status; 985 DECODE_TAIL; 986 } 987 988 static __be32 989 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh) 990 { 991 DECODE_HEAD; 992 993 READ_BUF(4); 994 putfh->pf_fhlen = be32_to_cpup(p++); 995 if (putfh->pf_fhlen > NFS4_FHSIZE) 996 goto xdr_error; 997 READ_BUF(putfh->pf_fhlen); 998 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen); 999 1000 DECODE_TAIL; 1001 } 1002 1003 static __be32 1004 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p) 1005 { 1006 if (argp->minorversion == 0) 1007 return nfs_ok; 1008 return nfserr_notsupp; 1009 } 1010 1011 static __be32 1012 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read) 1013 { 1014 DECODE_HEAD; 1015 1016 status = nfsd4_decode_stateid(argp, &read->rd_stateid); 1017 if (status) 1018 return status; 1019 READ_BUF(12); 1020 p = xdr_decode_hyper(p, &read->rd_offset); 1021 read->rd_length = be32_to_cpup(p++); 1022 1023 DECODE_TAIL; 1024 } 1025 1026 static __be32 1027 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir) 1028 { 1029 DECODE_HEAD; 1030 1031 READ_BUF(24); 1032 p = xdr_decode_hyper(p, &readdir->rd_cookie); 1033 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data)); 1034 readdir->rd_dircount = be32_to_cpup(p++); 1035 readdir->rd_maxcount = be32_to_cpup(p++); 1036 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval))) 1037 goto out; 1038 1039 DECODE_TAIL; 1040 } 1041 1042 static __be32 1043 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove) 1044 { 1045 DECODE_HEAD; 1046 1047 READ_BUF(4); 1048 remove->rm_namelen = be32_to_cpup(p++); 1049 READ_BUF(remove->rm_namelen); 1050 SAVEMEM(remove->rm_name, remove->rm_namelen); 1051 if ((status = check_filename(remove->rm_name, remove->rm_namelen))) 1052 return status; 1053 1054 DECODE_TAIL; 1055 } 1056 1057 static __be32 1058 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename) 1059 { 1060 DECODE_HEAD; 1061 1062 READ_BUF(4); 1063 rename->rn_snamelen = be32_to_cpup(p++); 1064 READ_BUF(rename->rn_snamelen + 4); 1065 SAVEMEM(rename->rn_sname, rename->rn_snamelen); 1066 rename->rn_tnamelen = be32_to_cpup(p++); 1067 READ_BUF(rename->rn_tnamelen); 1068 SAVEMEM(rename->rn_tname, rename->rn_tnamelen); 1069 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen))) 1070 return status; 1071 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen))) 1072 return status; 1073 1074 DECODE_TAIL; 1075 } 1076 1077 static __be32 1078 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid) 1079 { 1080 DECODE_HEAD; 1081 1082 if (argp->minorversion >= 1) 1083 return nfserr_notsupp; 1084 1085 READ_BUF(sizeof(clientid_t)); 1086 COPYMEM(clientid, sizeof(clientid_t)); 1087 1088 DECODE_TAIL; 1089 } 1090 1091 static __be32 1092 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, 1093 struct nfsd4_secinfo *secinfo) 1094 { 1095 DECODE_HEAD; 1096 1097 READ_BUF(4); 1098 secinfo->si_namelen = be32_to_cpup(p++); 1099 READ_BUF(secinfo->si_namelen); 1100 SAVEMEM(secinfo->si_name, secinfo->si_namelen); 1101 status = check_filename(secinfo->si_name, secinfo->si_namelen); 1102 if (status) 1103 return status; 1104 DECODE_TAIL; 1105 } 1106 1107 static __be32 1108 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, 1109 struct nfsd4_secinfo_no_name *sin) 1110 { 1111 DECODE_HEAD; 1112 1113 READ_BUF(4); 1114 sin->sin_style = be32_to_cpup(p++); 1115 DECODE_TAIL; 1116 } 1117 1118 static __be32 1119 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr) 1120 { 1121 __be32 status; 1122 1123 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid); 1124 if (status) 1125 return status; 1126 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr, 1127 &setattr->sa_acl, &setattr->sa_label); 1128 } 1129 1130 static __be32 1131 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid) 1132 { 1133 DECODE_HEAD; 1134 1135 if (argp->minorversion >= 1) 1136 return nfserr_notsupp; 1137 1138 READ_BUF(NFS4_VERIFIER_SIZE); 1139 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE); 1140 1141 status = nfsd4_decode_opaque(argp, &setclientid->se_name); 1142 if (status) 1143 return nfserr_bad_xdr; 1144 READ_BUF(8); 1145 setclientid->se_callback_prog = be32_to_cpup(p++); 1146 setclientid->se_callback_netid_len = be32_to_cpup(p++); 1147 1148 READ_BUF(setclientid->se_callback_netid_len + 4); 1149 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len); 1150 setclientid->se_callback_addr_len = be32_to_cpup(p++); 1151 1152 READ_BUF(setclientid->se_callback_addr_len + 4); 1153 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len); 1154 setclientid->se_callback_ident = be32_to_cpup(p++); 1155 1156 DECODE_TAIL; 1157 } 1158 1159 static __be32 1160 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c) 1161 { 1162 DECODE_HEAD; 1163 1164 if (argp->minorversion >= 1) 1165 return nfserr_notsupp; 1166 1167 READ_BUF(8 + NFS4_VERIFIER_SIZE); 1168 COPYMEM(&scd_c->sc_clientid, 8); 1169 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE); 1170 1171 DECODE_TAIL; 1172 } 1173 1174 /* Also used for NVERIFY */ 1175 static __be32 1176 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify) 1177 { 1178 DECODE_HEAD; 1179 1180 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval))) 1181 goto out; 1182 1183 /* For convenience's sake, we compare raw xdr'd attributes in 1184 * nfsd4_proc_verify */ 1185 1186 READ_BUF(4); 1187 verify->ve_attrlen = be32_to_cpup(p++); 1188 READ_BUF(verify->ve_attrlen); 1189 SAVEMEM(verify->ve_attrval, verify->ve_attrlen); 1190 1191 DECODE_TAIL; 1192 } 1193 1194 static __be32 1195 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write) 1196 { 1197 int avail; 1198 int len; 1199 DECODE_HEAD; 1200 1201 status = nfsd4_decode_stateid(argp, &write->wr_stateid); 1202 if (status) 1203 return status; 1204 READ_BUF(16); 1205 p = xdr_decode_hyper(p, &write->wr_offset); 1206 write->wr_stable_how = be32_to_cpup(p++); 1207 if (write->wr_stable_how > 2) 1208 goto xdr_error; 1209 write->wr_buflen = be32_to_cpup(p++); 1210 1211 /* Sorry .. no magic macros for this.. * 1212 * READ_BUF(write->wr_buflen); 1213 * SAVEMEM(write->wr_buf, write->wr_buflen); 1214 */ 1215 avail = (char*)argp->end - (char*)argp->p; 1216 if (avail + argp->pagelen < write->wr_buflen) { 1217 dprintk("NFSD: xdr error (%s:%d)\n", 1218 __FILE__, __LINE__); 1219 goto xdr_error; 1220 } 1221 write->wr_head.iov_base = p; 1222 write->wr_head.iov_len = avail; 1223 write->wr_pagelist = argp->pagelist; 1224 1225 len = XDR_QUADLEN(write->wr_buflen) << 2; 1226 if (len >= avail) { 1227 int pages; 1228 1229 len -= avail; 1230 1231 pages = len >> PAGE_SHIFT; 1232 argp->pagelist += pages; 1233 argp->pagelen -= pages * PAGE_SIZE; 1234 len -= pages * PAGE_SIZE; 1235 1236 argp->p = (__be32 *)page_address(argp->pagelist[0]); 1237 argp->pagelist++; 1238 argp->end = argp->p + XDR_QUADLEN(PAGE_SIZE); 1239 } 1240 argp->p += XDR_QUADLEN(len); 1241 1242 DECODE_TAIL; 1243 } 1244 1245 static __be32 1246 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner) 1247 { 1248 DECODE_HEAD; 1249 1250 if (argp->minorversion >= 1) 1251 return nfserr_notsupp; 1252 1253 READ_BUF(12); 1254 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t)); 1255 rlockowner->rl_owner.len = be32_to_cpup(p++); 1256 READ_BUF(rlockowner->rl_owner.len); 1257 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len); 1258 1259 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) 1260 return nfserr_inval; 1261 DECODE_TAIL; 1262 } 1263 1264 static __be32 1265 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, 1266 struct nfsd4_exchange_id *exid) 1267 { 1268 int dummy, tmp; 1269 DECODE_HEAD; 1270 1271 READ_BUF(NFS4_VERIFIER_SIZE); 1272 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE); 1273 1274 status = nfsd4_decode_opaque(argp, &exid->clname); 1275 if (status) 1276 return nfserr_bad_xdr; 1277 1278 READ_BUF(4); 1279 exid->flags = be32_to_cpup(p++); 1280 1281 /* Ignore state_protect4_a */ 1282 READ_BUF(4); 1283 exid->spa_how = be32_to_cpup(p++); 1284 switch (exid->spa_how) { 1285 case SP4_NONE: 1286 break; 1287 case SP4_MACH_CRED: 1288 /* spo_must_enforce */ 1289 READ_BUF(4); 1290 dummy = be32_to_cpup(p++); 1291 READ_BUF(dummy * 4); 1292 p += dummy; 1293 1294 /* spo_must_allow */ 1295 READ_BUF(4); 1296 dummy = be32_to_cpup(p++); 1297 READ_BUF(dummy * 4); 1298 p += dummy; 1299 break; 1300 case SP4_SSV: 1301 /* ssp_ops */ 1302 READ_BUF(4); 1303 dummy = be32_to_cpup(p++); 1304 READ_BUF(dummy * 4); 1305 p += dummy; 1306 1307 READ_BUF(4); 1308 dummy = be32_to_cpup(p++); 1309 READ_BUF(dummy * 4); 1310 p += dummy; 1311 1312 /* ssp_hash_algs<> */ 1313 READ_BUF(4); 1314 tmp = be32_to_cpup(p++); 1315 while (tmp--) { 1316 READ_BUF(4); 1317 dummy = be32_to_cpup(p++); 1318 READ_BUF(dummy); 1319 p += XDR_QUADLEN(dummy); 1320 } 1321 1322 /* ssp_encr_algs<> */ 1323 READ_BUF(4); 1324 tmp = be32_to_cpup(p++); 1325 while (tmp--) { 1326 READ_BUF(4); 1327 dummy = be32_to_cpup(p++); 1328 READ_BUF(dummy); 1329 p += XDR_QUADLEN(dummy); 1330 } 1331 1332 /* ssp_window and ssp_num_gss_handles */ 1333 READ_BUF(8); 1334 dummy = be32_to_cpup(p++); 1335 dummy = be32_to_cpup(p++); 1336 break; 1337 default: 1338 goto xdr_error; 1339 } 1340 1341 /* Ignore Implementation ID */ 1342 READ_BUF(4); /* nfs_impl_id4 array length */ 1343 dummy = be32_to_cpup(p++); 1344 1345 if (dummy > 1) 1346 goto xdr_error; 1347 1348 if (dummy == 1) { 1349 /* nii_domain */ 1350 READ_BUF(4); 1351 dummy = be32_to_cpup(p++); 1352 READ_BUF(dummy); 1353 p += XDR_QUADLEN(dummy); 1354 1355 /* nii_name */ 1356 READ_BUF(4); 1357 dummy = be32_to_cpup(p++); 1358 READ_BUF(dummy); 1359 p += XDR_QUADLEN(dummy); 1360 1361 /* nii_date */ 1362 READ_BUF(12); 1363 p += 3; 1364 } 1365 DECODE_TAIL; 1366 } 1367 1368 static __be32 1369 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, 1370 struct nfsd4_create_session *sess) 1371 { 1372 DECODE_HEAD; 1373 u32 dummy; 1374 1375 READ_BUF(16); 1376 COPYMEM(&sess->clientid, 8); 1377 sess->seqid = be32_to_cpup(p++); 1378 sess->flags = be32_to_cpup(p++); 1379 1380 /* Fore channel attrs */ 1381 READ_BUF(28); 1382 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */ 1383 sess->fore_channel.maxreq_sz = be32_to_cpup(p++); 1384 sess->fore_channel.maxresp_sz = be32_to_cpup(p++); 1385 sess->fore_channel.maxresp_cached = be32_to_cpup(p++); 1386 sess->fore_channel.maxops = be32_to_cpup(p++); 1387 sess->fore_channel.maxreqs = be32_to_cpup(p++); 1388 sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++); 1389 if (sess->fore_channel.nr_rdma_attrs == 1) { 1390 READ_BUF(4); 1391 sess->fore_channel.rdma_attrs = be32_to_cpup(p++); 1392 } else if (sess->fore_channel.nr_rdma_attrs > 1) { 1393 dprintk("Too many fore channel attr bitmaps!\n"); 1394 goto xdr_error; 1395 } 1396 1397 /* Back channel attrs */ 1398 READ_BUF(28); 1399 dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */ 1400 sess->back_channel.maxreq_sz = be32_to_cpup(p++); 1401 sess->back_channel.maxresp_sz = be32_to_cpup(p++); 1402 sess->back_channel.maxresp_cached = be32_to_cpup(p++); 1403 sess->back_channel.maxops = be32_to_cpup(p++); 1404 sess->back_channel.maxreqs = be32_to_cpup(p++); 1405 sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++); 1406 if (sess->back_channel.nr_rdma_attrs == 1) { 1407 READ_BUF(4); 1408 sess->back_channel.rdma_attrs = be32_to_cpup(p++); 1409 } else if (sess->back_channel.nr_rdma_attrs > 1) { 1410 dprintk("Too many back channel attr bitmaps!\n"); 1411 goto xdr_error; 1412 } 1413 1414 READ_BUF(4); 1415 sess->callback_prog = be32_to_cpup(p++); 1416 nfsd4_decode_cb_sec(argp, &sess->cb_sec); 1417 DECODE_TAIL; 1418 } 1419 1420 static __be32 1421 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, 1422 struct nfsd4_destroy_session *destroy_session) 1423 { 1424 DECODE_HEAD; 1425 READ_BUF(NFS4_MAX_SESSIONID_LEN); 1426 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN); 1427 1428 DECODE_TAIL; 1429 } 1430 1431 static __be32 1432 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, 1433 struct nfsd4_free_stateid *free_stateid) 1434 { 1435 DECODE_HEAD; 1436 1437 READ_BUF(sizeof(stateid_t)); 1438 free_stateid->fr_stateid.si_generation = be32_to_cpup(p++); 1439 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t)); 1440 1441 DECODE_TAIL; 1442 } 1443 1444 static __be32 1445 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, 1446 struct nfsd4_sequence *seq) 1447 { 1448 DECODE_HEAD; 1449 1450 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16); 1451 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN); 1452 seq->seqid = be32_to_cpup(p++); 1453 seq->slotid = be32_to_cpup(p++); 1454 seq->maxslots = be32_to_cpup(p++); 1455 seq->cachethis = be32_to_cpup(p++); 1456 1457 DECODE_TAIL; 1458 } 1459 1460 static __be32 1461 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid) 1462 { 1463 int i; 1464 __be32 *p, status; 1465 struct nfsd4_test_stateid_id *stateid; 1466 1467 READ_BUF(4); 1468 test_stateid->ts_num_ids = ntohl(*p++); 1469 1470 INIT_LIST_HEAD(&test_stateid->ts_stateid_list); 1471 1472 for (i = 0; i < test_stateid->ts_num_ids; i++) { 1473 stateid = kmalloc(sizeof(struct nfsd4_test_stateid_id), GFP_KERNEL); 1474 if (!stateid) { 1475 status = nfserrno(-ENOMEM); 1476 goto out; 1477 } 1478 1479 defer_free(argp, kfree, stateid); 1480 INIT_LIST_HEAD(&stateid->ts_id_list); 1481 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); 1482 1483 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid); 1484 if (status) 1485 goto out; 1486 } 1487 1488 status = 0; 1489 out: 1490 return status; 1491 xdr_error: 1492 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__); 1493 status = nfserr_bad_xdr; 1494 goto out; 1495 } 1496 1497 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc) 1498 { 1499 DECODE_HEAD; 1500 1501 READ_BUF(8); 1502 COPYMEM(&dc->clientid, 8); 1503 1504 DECODE_TAIL; 1505 } 1506 1507 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc) 1508 { 1509 DECODE_HEAD; 1510 1511 READ_BUF(4); 1512 rc->rca_one_fs = be32_to_cpup(p++); 1513 1514 DECODE_TAIL; 1515 } 1516 1517 static __be32 1518 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p) 1519 { 1520 return nfs_ok; 1521 } 1522 1523 static __be32 1524 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p) 1525 { 1526 return nfserr_notsupp; 1527 } 1528 1529 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *); 1530 1531 static nfsd4_dec nfsd4_dec_ops[] = { 1532 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access, 1533 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close, 1534 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit, 1535 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create, 1536 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp, 1537 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn, 1538 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr, 1539 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop, 1540 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link, 1541 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock, 1542 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt, 1543 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku, 1544 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup, 1545 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop, 1546 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify, 1547 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open, 1548 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp, 1549 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm, 1550 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade, 1551 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh, 1552 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh, 1553 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop, 1554 [OP_READ] = (nfsd4_dec)nfsd4_decode_read, 1555 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir, 1556 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop, 1557 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove, 1558 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename, 1559 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew, 1560 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop, 1561 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop, 1562 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo, 1563 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr, 1564 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid, 1565 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm, 1566 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify, 1567 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write, 1568 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner, 1569 1570 /* new operations for NFSv4.1 */ 1571 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl, 1572 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session, 1573 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id, 1574 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session, 1575 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session, 1576 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid, 1577 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 1578 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp, 1579 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, 1580 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp, 1581 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp, 1582 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp, 1583 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name, 1584 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence, 1585 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp, 1586 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid, 1587 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 1588 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid, 1589 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete, 1590 }; 1591 1592 static inline bool 1593 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) 1594 { 1595 if (op->opnum < FIRST_NFS4_OP) 1596 return false; 1597 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) 1598 return false; 1599 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) 1600 return false; 1601 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) 1602 return false; 1603 return true; 1604 } 1605 1606 static __be32 1607 nfsd4_decode_compound(struct nfsd4_compoundargs *argp) 1608 { 1609 DECODE_HEAD; 1610 struct nfsd4_op *op; 1611 bool cachethis = false; 1612 int auth_slack= argp->rqstp->rq_auth_slack; 1613 int max_reply = auth_slack + 8; /* opcnt, status */ 1614 int readcount = 0; 1615 int readbytes = 0; 1616 int i; 1617 1618 READ_BUF(4); 1619 argp->taglen = be32_to_cpup(p++); 1620 READ_BUF(argp->taglen + 8); 1621 SAVEMEM(argp->tag, argp->taglen); 1622 argp->minorversion = be32_to_cpup(p++); 1623 argp->opcnt = be32_to_cpup(p++); 1624 max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2); 1625 1626 if (argp->taglen > NFSD4_MAX_TAGLEN) 1627 goto xdr_error; 1628 if (argp->opcnt > 100) 1629 goto xdr_error; 1630 1631 if (argp->opcnt > ARRAY_SIZE(argp->iops)) { 1632 argp->ops = kmalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL); 1633 if (!argp->ops) { 1634 argp->ops = argp->iops; 1635 dprintk("nfsd: couldn't allocate room for COMPOUND\n"); 1636 goto xdr_error; 1637 } 1638 } 1639 1640 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) 1641 argp->opcnt = 0; 1642 1643 for (i = 0; i < argp->opcnt; i++) { 1644 op = &argp->ops[i]; 1645 op->replay = NULL; 1646 1647 READ_BUF(4); 1648 op->opnum = be32_to_cpup(p++); 1649 1650 if (nfsd4_opnum_in_range(argp, op)) 1651 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); 1652 else { 1653 op->opnum = OP_ILLEGAL; 1654 op->status = nfserr_op_illegal; 1655 } 1656 /* 1657 * We'll try to cache the result in the DRC if any one 1658 * op in the compound wants to be cached: 1659 */ 1660 cachethis |= nfsd4_cache_this_op(op); 1661 1662 if (op->opnum == OP_READ) { 1663 readcount++; 1664 readbytes += nfsd4_max_reply(argp->rqstp, op); 1665 } else 1666 max_reply += nfsd4_max_reply(argp->rqstp, op); 1667 1668 if (op->status) { 1669 argp->opcnt = i+1; 1670 break; 1671 } 1672 } 1673 /* Sessions make the DRC unnecessary: */ 1674 if (argp->minorversion) 1675 cachethis = false; 1676 svc_reserve(argp->rqstp, max_reply + readbytes); 1677 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; 1678 1679 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) 1680 argp->rqstp->rq_splice_ok = false; 1681 1682 DECODE_TAIL; 1683 } 1684 1685 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode) 1686 { 1687 if (IS_I_VERSION(inode)) { 1688 p = xdr_encode_hyper(p, inode->i_version); 1689 } else { 1690 *p++ = cpu_to_be32(stat->ctime.tv_sec); 1691 *p++ = cpu_to_be32(stat->ctime.tv_nsec); 1692 } 1693 return p; 1694 } 1695 1696 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c) 1697 { 1698 *p++ = cpu_to_be32(c->atomic); 1699 if (c->change_supported) { 1700 p = xdr_encode_hyper(p, c->before_change); 1701 p = xdr_encode_hyper(p, c->after_change); 1702 } else { 1703 *p++ = cpu_to_be32(c->before_ctime_sec); 1704 *p++ = cpu_to_be32(c->before_ctime_nsec); 1705 *p++ = cpu_to_be32(c->after_ctime_sec); 1706 *p++ = cpu_to_be32(c->after_ctime_nsec); 1707 } 1708 return p; 1709 } 1710 1711 /* Encode as an array of strings the string given with components 1712 * separated @sep, escaped with esc_enter and esc_exit. 1713 */ 1714 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, 1715 char *components, char esc_enter, 1716 char esc_exit) 1717 { 1718 __be32 *p; 1719 __be32 pathlen; 1720 int pathlen_offset; 1721 int strlen, count=0; 1722 char *str, *end, *next; 1723 1724 dprintk("nfsd4_encode_components(%s)\n", components); 1725 1726 pathlen_offset = xdr->buf->len; 1727 p = xdr_reserve_space(xdr, 4); 1728 if (!p) 1729 return nfserr_resource; 1730 p++; /* We will fill this in with @count later */ 1731 1732 end = str = components; 1733 while (*end) { 1734 bool found_esc = false; 1735 1736 /* try to parse as esc_start, ..., esc_end, sep */ 1737 if (*str == esc_enter) { 1738 for (; *end && (*end != esc_exit); end++) 1739 /* find esc_exit or end of string */; 1740 next = end + 1; 1741 if (*end && (!*next || *next == sep)) { 1742 str++; 1743 found_esc = true; 1744 } 1745 } 1746 1747 if (!found_esc) 1748 for (; *end && (*end != sep); end++) 1749 /* find sep or end of string */; 1750 1751 strlen = end - str; 1752 if (strlen) { 1753 p = xdr_reserve_space(xdr, strlen + 4); 1754 if (!p) 1755 return nfserr_resource; 1756 p = xdr_encode_opaque(p, str, strlen); 1757 count++; 1758 } 1759 else 1760 end++; 1761 str = end; 1762 } 1763 pathlen = htonl(xdr->buf->len - pathlen_offset); 1764 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); 1765 return 0; 1766 } 1767 1768 /* Encode as an array of strings the string given with components 1769 * separated @sep. 1770 */ 1771 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, 1772 char *components) 1773 { 1774 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); 1775 } 1776 1777 /* 1778 * encode a location element of a fs_locations structure 1779 */ 1780 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, 1781 struct nfsd4_fs_location *location) 1782 { 1783 __be32 status; 1784 1785 status = nfsd4_encode_components_esc(xdr, ':', location->hosts, 1786 '[', ']'); 1787 if (status) 1788 return status; 1789 status = nfsd4_encode_components(xdr, '/', location->path); 1790 if (status) 1791 return status; 1792 return 0; 1793 } 1794 1795 /* 1796 * Encode a path in RFC3530 'pathname4' format 1797 */ 1798 static __be32 nfsd4_encode_path(struct xdr_stream *xdr, 1799 const struct path *root, 1800 const struct path *path) 1801 { 1802 struct path cur = *path; 1803 __be32 *p; 1804 struct dentry **components = NULL; 1805 unsigned int ncomponents = 0; 1806 __be32 err = nfserr_jukebox; 1807 1808 dprintk("nfsd4_encode_components("); 1809 1810 path_get(&cur); 1811 /* First walk the path up to the nfsd root, and store the 1812 * dentries/path components in an array. 1813 */ 1814 for (;;) { 1815 if (cur.dentry == root->dentry && cur.mnt == root->mnt) 1816 break; 1817 if (cur.dentry == cur.mnt->mnt_root) { 1818 if (follow_up(&cur)) 1819 continue; 1820 goto out_free; 1821 } 1822 if ((ncomponents & 15) == 0) { 1823 struct dentry **new; 1824 new = krealloc(components, 1825 sizeof(*new) * (ncomponents + 16), 1826 GFP_KERNEL); 1827 if (!new) 1828 goto out_free; 1829 components = new; 1830 } 1831 components[ncomponents++] = cur.dentry; 1832 cur.dentry = dget_parent(cur.dentry); 1833 } 1834 err = nfserr_resource; 1835 p = xdr_reserve_space(xdr, 4); 1836 if (!p) 1837 goto out_free; 1838 *p++ = cpu_to_be32(ncomponents); 1839 1840 while (ncomponents) { 1841 struct dentry *dentry = components[ncomponents - 1]; 1842 unsigned int len; 1843 1844 spin_lock(&dentry->d_lock); 1845 len = dentry->d_name.len; 1846 p = xdr_reserve_space(xdr, len + 4); 1847 if (!p) { 1848 spin_unlock(&dentry->d_lock); 1849 goto out_free; 1850 } 1851 p = xdr_encode_opaque(p, dentry->d_name.name, len); 1852 dprintk("/%s", dentry->d_name.name); 1853 spin_unlock(&dentry->d_lock); 1854 dput(dentry); 1855 ncomponents--; 1856 } 1857 1858 err = 0; 1859 out_free: 1860 dprintk(")\n"); 1861 while (ncomponents) 1862 dput(components[--ncomponents]); 1863 kfree(components); 1864 path_put(&cur); 1865 return err; 1866 } 1867 1868 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr, 1869 struct svc_rqst *rqstp, const struct path *path) 1870 { 1871 struct svc_export *exp_ps; 1872 __be32 res; 1873 1874 exp_ps = rqst_find_fsidzero_export(rqstp); 1875 if (IS_ERR(exp_ps)) 1876 return nfserrno(PTR_ERR(exp_ps)); 1877 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path); 1878 exp_put(exp_ps); 1879 return res; 1880 } 1881 1882 /* 1883 * encode a fs_locations structure 1884 */ 1885 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr, 1886 struct svc_rqst *rqstp, struct svc_export *exp) 1887 { 1888 __be32 status; 1889 int i; 1890 __be32 *p; 1891 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; 1892 1893 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path); 1894 if (status) 1895 return status; 1896 p = xdr_reserve_space(xdr, 4); 1897 if (!p) 1898 return nfserr_resource; 1899 *p++ = cpu_to_be32(fslocs->locations_count); 1900 for (i=0; i<fslocs->locations_count; i++) { 1901 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); 1902 if (status) 1903 return status; 1904 } 1905 return 0; 1906 } 1907 1908 static u32 nfs4_file_type(umode_t mode) 1909 { 1910 switch (mode & S_IFMT) { 1911 case S_IFIFO: return NF4FIFO; 1912 case S_IFCHR: return NF4CHR; 1913 case S_IFDIR: return NF4DIR; 1914 case S_IFBLK: return NF4BLK; 1915 case S_IFLNK: return NF4LNK; 1916 case S_IFREG: return NF4REG; 1917 case S_IFSOCK: return NF4SOCK; 1918 default: return NF4BAD; 1919 }; 1920 } 1921 1922 static inline __be32 1923 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp, 1924 struct nfs4_ace *ace) 1925 { 1926 if (ace->whotype != NFS4_ACL_WHO_NAMED) 1927 return nfs4_acl_write_who(xdr, ace->whotype); 1928 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 1929 return nfsd4_encode_group(xdr, rqstp, ace->who_gid); 1930 else 1931 return nfsd4_encode_user(xdr, rqstp, ace->who_uid); 1932 } 1933 1934 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ 1935 FATTR4_WORD0_RDATTR_ERROR) 1936 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID 1937 1938 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 1939 static inline __be32 1940 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 1941 void *context, int len) 1942 { 1943 __be32 *p; 1944 1945 p = xdr_reserve_space(xdr, len + 4 + 4 + 4); 1946 if (!p) 1947 return nfserr_resource; 1948 1949 /* 1950 * For now we use a 0 here to indicate the null translation; in 1951 * the future we may place a call to translation code here. 1952 */ 1953 *p++ = cpu_to_be32(0); /* lfs */ 1954 *p++ = cpu_to_be32(0); /* pi */ 1955 p = xdr_encode_opaque(p, context, len); 1956 return 0; 1957 } 1958 #else 1959 static inline __be32 1960 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 1961 void *context, int len) 1962 { return 0; } 1963 #endif 1964 1965 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *rdattr_err) 1966 { 1967 /* As per referral draft: */ 1968 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || 1969 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { 1970 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || 1971 *bmval0 & FATTR4_WORD0_FS_LOCATIONS) 1972 *rdattr_err = NFSERR_MOVED; 1973 else 1974 return nfserr_moved; 1975 } 1976 *bmval0 &= WORD0_ABSENT_FS_ATTRS; 1977 *bmval1 &= WORD1_ABSENT_FS_ATTRS; 1978 return 0; 1979 } 1980 1981 1982 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat) 1983 { 1984 struct path path = exp->ex_path; 1985 int err; 1986 1987 path_get(&path); 1988 while (follow_up(&path)) { 1989 if (path.dentry != path.mnt->mnt_root) 1990 break; 1991 } 1992 err = vfs_getattr(&path, stat); 1993 path_put(&path); 1994 return err; 1995 } 1996 1997 /* 1998 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle 1999 * ourselves. 2000 */ 2001 static __be32 2002 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, 2003 struct svc_export *exp, 2004 struct dentry *dentry, u32 *bmval, 2005 struct svc_rqst *rqstp, int ignore_crossmnt) 2006 { 2007 u32 bmval0 = bmval[0]; 2008 u32 bmval1 = bmval[1]; 2009 u32 bmval2 = bmval[2]; 2010 struct kstat stat; 2011 struct svc_fh *tempfh = NULL; 2012 struct kstatfs statfs; 2013 __be32 *p; 2014 int starting_len = xdr->buf->len; 2015 int attrlen_offset; 2016 __be32 attrlen; 2017 u32 dummy; 2018 u64 dummy64; 2019 u32 rdattr_err = 0; 2020 __be32 status; 2021 int err; 2022 int aclsupport = 0; 2023 struct nfs4_acl *acl = NULL; 2024 void *context = NULL; 2025 int contextlen; 2026 bool contextsupport = false; 2027 struct nfsd4_compoundres *resp = rqstp->rq_resp; 2028 u32 minorversion = resp->cstate.minorversion; 2029 struct path path = { 2030 .mnt = exp->ex_path.mnt, 2031 .dentry = dentry, 2032 }; 2033 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2034 2035 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); 2036 BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion)); 2037 BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion)); 2038 BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion)); 2039 2040 if (exp->ex_fslocs.migrated) { 2041 BUG_ON(bmval[2]); 2042 status = fattr_handle_absent_fs(&bmval0, &bmval1, &rdattr_err); 2043 if (status) 2044 goto out; 2045 } 2046 2047 err = vfs_getattr(&path, &stat); 2048 if (err) 2049 goto out_nfserr; 2050 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE | 2051 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) || 2052 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE | 2053 FATTR4_WORD1_SPACE_TOTAL))) { 2054 err = vfs_statfs(&path, &statfs); 2055 if (err) 2056 goto out_nfserr; 2057 } 2058 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) { 2059 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); 2060 status = nfserr_jukebox; 2061 if (!tempfh) 2062 goto out; 2063 fh_init(tempfh, NFS4_FHSIZE); 2064 status = fh_compose(tempfh, exp, dentry, NULL); 2065 if (status) 2066 goto out; 2067 fhp = tempfh; 2068 } 2069 if (bmval0 & (FATTR4_WORD0_ACL | FATTR4_WORD0_ACLSUPPORT 2070 | FATTR4_WORD0_SUPPORTED_ATTRS)) { 2071 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl); 2072 aclsupport = (err == 0); 2073 if (bmval0 & FATTR4_WORD0_ACL) { 2074 if (err == -EOPNOTSUPP) 2075 bmval0 &= ~FATTR4_WORD0_ACL; 2076 else if (err == -EINVAL) { 2077 status = nfserr_attrnotsupp; 2078 goto out; 2079 } else if (err != 0) 2080 goto out_nfserr; 2081 } 2082 } 2083 2084 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2085 if ((bmval[2] & FATTR4_WORD2_SECURITY_LABEL) || 2086 bmval[0] & FATTR4_WORD0_SUPPORTED_ATTRS) { 2087 err = security_inode_getsecctx(dentry->d_inode, 2088 &context, &contextlen); 2089 contextsupport = (err == 0); 2090 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 2091 if (err == -EOPNOTSUPP) 2092 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL; 2093 else if (err) 2094 goto out_nfserr; 2095 } 2096 } 2097 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 2098 2099 if (bmval2) { 2100 p = xdr_reserve_space(xdr, 16); 2101 if (!p) 2102 goto out_resource; 2103 *p++ = cpu_to_be32(3); 2104 *p++ = cpu_to_be32(bmval0); 2105 *p++ = cpu_to_be32(bmval1); 2106 *p++ = cpu_to_be32(bmval2); 2107 } else if (bmval1) { 2108 p = xdr_reserve_space(xdr, 12); 2109 if (!p) 2110 goto out_resource; 2111 *p++ = cpu_to_be32(2); 2112 *p++ = cpu_to_be32(bmval0); 2113 *p++ = cpu_to_be32(bmval1); 2114 } else { 2115 p = xdr_reserve_space(xdr, 8); 2116 if (!p) 2117 goto out_resource; 2118 *p++ = cpu_to_be32(1); 2119 *p++ = cpu_to_be32(bmval0); 2120 } 2121 2122 attrlen_offset = xdr->buf->len; 2123 p = xdr_reserve_space(xdr, 4); 2124 if (!p) 2125 goto out_resource; 2126 p++; /* to be backfilled later */ 2127 2128 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 2129 u32 word0 = nfsd_suppattrs0(minorversion); 2130 u32 word1 = nfsd_suppattrs1(minorversion); 2131 u32 word2 = nfsd_suppattrs2(minorversion); 2132 2133 if (!aclsupport) 2134 word0 &= ~FATTR4_WORD0_ACL; 2135 if (!contextsupport) 2136 word2 &= ~FATTR4_WORD2_SECURITY_LABEL; 2137 if (!word2) { 2138 p = xdr_reserve_space(xdr, 12); 2139 if (!p) 2140 goto out_resource; 2141 *p++ = cpu_to_be32(2); 2142 *p++ = cpu_to_be32(word0); 2143 *p++ = cpu_to_be32(word1); 2144 } else { 2145 p = xdr_reserve_space(xdr, 16); 2146 if (!p) 2147 goto out_resource; 2148 *p++ = cpu_to_be32(3); 2149 *p++ = cpu_to_be32(word0); 2150 *p++ = cpu_to_be32(word1); 2151 *p++ = cpu_to_be32(word2); 2152 } 2153 } 2154 if (bmval0 & FATTR4_WORD0_TYPE) { 2155 p = xdr_reserve_space(xdr, 4); 2156 if (!p) 2157 goto out_resource; 2158 dummy = nfs4_file_type(stat.mode); 2159 if (dummy == NF4BAD) { 2160 status = nfserr_serverfault; 2161 goto out; 2162 } 2163 *p++ = cpu_to_be32(dummy); 2164 } 2165 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) { 2166 p = xdr_reserve_space(xdr, 4); 2167 if (!p) 2168 goto out_resource; 2169 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK) 2170 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT); 2171 else 2172 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT| 2173 NFS4_FH_VOL_RENAME); 2174 } 2175 if (bmval0 & FATTR4_WORD0_CHANGE) { 2176 p = xdr_reserve_space(xdr, 8); 2177 if (!p) 2178 goto out_resource; 2179 p = encode_change(p, &stat, dentry->d_inode); 2180 } 2181 if (bmval0 & FATTR4_WORD0_SIZE) { 2182 p = xdr_reserve_space(xdr, 8); 2183 if (!p) 2184 goto out_resource; 2185 p = xdr_encode_hyper(p, stat.size); 2186 } 2187 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { 2188 p = xdr_reserve_space(xdr, 4); 2189 if (!p) 2190 goto out_resource; 2191 *p++ = cpu_to_be32(1); 2192 } 2193 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) { 2194 p = xdr_reserve_space(xdr, 4); 2195 if (!p) 2196 goto out_resource; 2197 *p++ = cpu_to_be32(1); 2198 } 2199 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) { 2200 p = xdr_reserve_space(xdr, 4); 2201 if (!p) 2202 goto out_resource; 2203 *p++ = cpu_to_be32(0); 2204 } 2205 if (bmval0 & FATTR4_WORD0_FSID) { 2206 p = xdr_reserve_space(xdr, 16); 2207 if (!p) 2208 goto out_resource; 2209 if (exp->ex_fslocs.migrated) { 2210 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR); 2211 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR); 2212 } else switch(fsid_source(fhp)) { 2213 case FSIDSOURCE_FSID: 2214 p = xdr_encode_hyper(p, (u64)exp->ex_fsid); 2215 p = xdr_encode_hyper(p, (u64)0); 2216 break; 2217 case FSIDSOURCE_DEV: 2218 *p++ = cpu_to_be32(0); 2219 *p++ = cpu_to_be32(MAJOR(stat.dev)); 2220 *p++ = cpu_to_be32(0); 2221 *p++ = cpu_to_be32(MINOR(stat.dev)); 2222 break; 2223 case FSIDSOURCE_UUID: 2224 p = xdr_encode_opaque_fixed(p, exp->ex_uuid, 2225 EX_UUID_LEN); 2226 break; 2227 } 2228 } 2229 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) { 2230 p = xdr_reserve_space(xdr, 4); 2231 if (!p) 2232 goto out_resource; 2233 *p++ = cpu_to_be32(0); 2234 } 2235 if (bmval0 & FATTR4_WORD0_LEASE_TIME) { 2236 p = xdr_reserve_space(xdr, 4); 2237 if (!p) 2238 goto out_resource; 2239 *p++ = cpu_to_be32(nn->nfsd4_lease); 2240 } 2241 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) { 2242 p = xdr_reserve_space(xdr, 4); 2243 if (!p) 2244 goto out_resource; 2245 *p++ = cpu_to_be32(rdattr_err); 2246 } 2247 if (bmval0 & FATTR4_WORD0_ACL) { 2248 struct nfs4_ace *ace; 2249 2250 if (acl == NULL) { 2251 p = xdr_reserve_space(xdr, 4); 2252 if (!p) 2253 goto out_resource; 2254 2255 *p++ = cpu_to_be32(0); 2256 goto out_acl; 2257 } 2258 p = xdr_reserve_space(xdr, 4); 2259 if (!p) 2260 goto out_resource; 2261 *p++ = cpu_to_be32(acl->naces); 2262 2263 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) { 2264 p = xdr_reserve_space(xdr, 4*3); 2265 if (!p) 2266 goto out_resource; 2267 *p++ = cpu_to_be32(ace->type); 2268 *p++ = cpu_to_be32(ace->flag); 2269 *p++ = cpu_to_be32(ace->access_mask & 2270 NFS4_ACE_MASK_ALL); 2271 status = nfsd4_encode_aclname(xdr, rqstp, ace); 2272 if (status) 2273 goto out; 2274 } 2275 } 2276 out_acl: 2277 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) { 2278 p = xdr_reserve_space(xdr, 4); 2279 if (!p) 2280 goto out_resource; 2281 *p++ = cpu_to_be32(aclsupport ? 2282 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0); 2283 } 2284 if (bmval0 & FATTR4_WORD0_CANSETTIME) { 2285 p = xdr_reserve_space(xdr, 4); 2286 if (!p) 2287 goto out_resource; 2288 *p++ = cpu_to_be32(1); 2289 } 2290 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) { 2291 p = xdr_reserve_space(xdr, 4); 2292 if (!p) 2293 goto out_resource; 2294 *p++ = cpu_to_be32(0); 2295 } 2296 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) { 2297 p = xdr_reserve_space(xdr, 4); 2298 if (!p) 2299 goto out_resource; 2300 *p++ = cpu_to_be32(1); 2301 } 2302 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) { 2303 p = xdr_reserve_space(xdr, 4); 2304 if (!p) 2305 goto out_resource; 2306 *p++ = cpu_to_be32(1); 2307 } 2308 if (bmval0 & FATTR4_WORD0_FILEHANDLE) { 2309 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4); 2310 if (!p) 2311 goto out_resource; 2312 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, 2313 fhp->fh_handle.fh_size); 2314 } 2315 if (bmval0 & FATTR4_WORD0_FILEID) { 2316 p = xdr_reserve_space(xdr, 8); 2317 if (!p) 2318 goto out_resource; 2319 p = xdr_encode_hyper(p, stat.ino); 2320 } 2321 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) { 2322 p = xdr_reserve_space(xdr, 8); 2323 if (!p) 2324 goto out_resource; 2325 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 2326 } 2327 if (bmval0 & FATTR4_WORD0_FILES_FREE) { 2328 p = xdr_reserve_space(xdr, 8); 2329 if (!p) 2330 goto out_resource; 2331 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 2332 } 2333 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) { 2334 p = xdr_reserve_space(xdr, 8); 2335 if (!p) 2336 goto out_resource; 2337 p = xdr_encode_hyper(p, (u64) statfs.f_files); 2338 } 2339 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { 2340 status = nfsd4_encode_fs_locations(xdr, rqstp, exp); 2341 if (status) 2342 goto out; 2343 } 2344 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) { 2345 p = xdr_reserve_space(xdr, 4); 2346 if (!p) 2347 goto out_resource; 2348 *p++ = cpu_to_be32(1); 2349 } 2350 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) { 2351 p = xdr_reserve_space(xdr, 8); 2352 if (!p) 2353 goto out_resource; 2354 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes); 2355 } 2356 if (bmval0 & FATTR4_WORD0_MAXLINK) { 2357 p = xdr_reserve_space(xdr, 4); 2358 if (!p) 2359 goto out_resource; 2360 *p++ = cpu_to_be32(255); 2361 } 2362 if (bmval0 & FATTR4_WORD0_MAXNAME) { 2363 p = xdr_reserve_space(xdr, 4); 2364 if (!p) 2365 goto out_resource; 2366 *p++ = cpu_to_be32(statfs.f_namelen); 2367 } 2368 if (bmval0 & FATTR4_WORD0_MAXREAD) { 2369 p = xdr_reserve_space(xdr, 8); 2370 if (!p) 2371 goto out_resource; 2372 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 2373 } 2374 if (bmval0 & FATTR4_WORD0_MAXWRITE) { 2375 p = xdr_reserve_space(xdr, 8); 2376 if (!p) 2377 goto out_resource; 2378 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 2379 } 2380 if (bmval1 & FATTR4_WORD1_MODE) { 2381 p = xdr_reserve_space(xdr, 4); 2382 if (!p) 2383 goto out_resource; 2384 *p++ = cpu_to_be32(stat.mode & S_IALLUGO); 2385 } 2386 if (bmval1 & FATTR4_WORD1_NO_TRUNC) { 2387 p = xdr_reserve_space(xdr, 4); 2388 if (!p) 2389 goto out_resource; 2390 *p++ = cpu_to_be32(1); 2391 } 2392 if (bmval1 & FATTR4_WORD1_NUMLINKS) { 2393 p = xdr_reserve_space(xdr, 4); 2394 if (!p) 2395 goto out_resource; 2396 *p++ = cpu_to_be32(stat.nlink); 2397 } 2398 if (bmval1 & FATTR4_WORD1_OWNER) { 2399 status = nfsd4_encode_user(xdr, rqstp, stat.uid); 2400 if (status) 2401 goto out; 2402 } 2403 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) { 2404 status = nfsd4_encode_group(xdr, rqstp, stat.gid); 2405 if (status) 2406 goto out; 2407 } 2408 if (bmval1 & FATTR4_WORD1_RAWDEV) { 2409 p = xdr_reserve_space(xdr, 8); 2410 if (!p) 2411 goto out_resource; 2412 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev)); 2413 *p++ = cpu_to_be32((u32) MINOR(stat.rdev)); 2414 } 2415 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) { 2416 p = xdr_reserve_space(xdr, 8); 2417 if (!p) 2418 goto out_resource; 2419 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize; 2420 p = xdr_encode_hyper(p, dummy64); 2421 } 2422 if (bmval1 & FATTR4_WORD1_SPACE_FREE) { 2423 p = xdr_reserve_space(xdr, 8); 2424 if (!p) 2425 goto out_resource; 2426 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize; 2427 p = xdr_encode_hyper(p, dummy64); 2428 } 2429 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) { 2430 p = xdr_reserve_space(xdr, 8); 2431 if (!p) 2432 goto out_resource; 2433 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize; 2434 p = xdr_encode_hyper(p, dummy64); 2435 } 2436 if (bmval1 & FATTR4_WORD1_SPACE_USED) { 2437 p = xdr_reserve_space(xdr, 8); 2438 if (!p) 2439 goto out_resource; 2440 dummy64 = (u64)stat.blocks << 9; 2441 p = xdr_encode_hyper(p, dummy64); 2442 } 2443 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) { 2444 p = xdr_reserve_space(xdr, 12); 2445 if (!p) 2446 goto out_resource; 2447 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec); 2448 *p++ = cpu_to_be32(stat.atime.tv_nsec); 2449 } 2450 if (bmval1 & FATTR4_WORD1_TIME_DELTA) { 2451 p = xdr_reserve_space(xdr, 12); 2452 if (!p) 2453 goto out_resource; 2454 *p++ = cpu_to_be32(0); 2455 *p++ = cpu_to_be32(1); 2456 *p++ = cpu_to_be32(0); 2457 } 2458 if (bmval1 & FATTR4_WORD1_TIME_METADATA) { 2459 p = xdr_reserve_space(xdr, 12); 2460 if (!p) 2461 goto out_resource; 2462 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec); 2463 *p++ = cpu_to_be32(stat.ctime.tv_nsec); 2464 } 2465 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) { 2466 p = xdr_reserve_space(xdr, 12); 2467 if (!p) 2468 goto out_resource; 2469 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec); 2470 *p++ = cpu_to_be32(stat.mtime.tv_nsec); 2471 } 2472 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) { 2473 p = xdr_reserve_space(xdr, 8); 2474 if (!p) 2475 goto out_resource; 2476 /* 2477 * Get parent's attributes if not ignoring crossmount 2478 * and this is the root of a cross-mounted filesystem. 2479 */ 2480 if (ignore_crossmnt == 0 && 2481 dentry == exp->ex_path.mnt->mnt_root) 2482 get_parent_attributes(exp, &stat); 2483 p = xdr_encode_hyper(p, stat.ino); 2484 } 2485 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 2486 status = nfsd4_encode_security_label(xdr, rqstp, context, 2487 contextlen); 2488 if (status) 2489 goto out; 2490 } 2491 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) { 2492 p = xdr_reserve_space(xdr, 16); 2493 if (!p) 2494 goto out_resource; 2495 *p++ = cpu_to_be32(3); 2496 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0); 2497 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1); 2498 *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2); 2499 } 2500 2501 attrlen = htonl(xdr->buf->len - attrlen_offset - 4); 2502 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4); 2503 status = nfs_ok; 2504 2505 out: 2506 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2507 if (context) 2508 security_release_secctx(context, contextlen); 2509 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 2510 kfree(acl); 2511 if (tempfh) { 2512 fh_put(tempfh); 2513 kfree(tempfh); 2514 } 2515 if (status) 2516 xdr_truncate_encode(xdr, starting_len); 2517 return status; 2518 out_nfserr: 2519 status = nfserrno(err); 2520 goto out; 2521 out_resource: 2522 status = nfserr_resource; 2523 goto out; 2524 } 2525 2526 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr, 2527 struct xdr_buf *buf, __be32 *p, int bytes) 2528 { 2529 xdr->scratch.iov_len = 0; 2530 memset(buf, 0, sizeof(struct xdr_buf)); 2531 buf->head[0].iov_base = p; 2532 buf->head[0].iov_len = 0; 2533 buf->len = 0; 2534 xdr->buf = buf; 2535 xdr->iov = buf->head; 2536 xdr->p = p; 2537 xdr->end = (void *)p + bytes; 2538 buf->buflen = bytes; 2539 } 2540 2541 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words, 2542 struct svc_fh *fhp, struct svc_export *exp, 2543 struct dentry *dentry, u32 *bmval, 2544 struct svc_rqst *rqstp, int ignore_crossmnt) 2545 { 2546 struct xdr_buf dummy; 2547 struct xdr_stream xdr; 2548 __be32 ret; 2549 2550 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2); 2551 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp, 2552 ignore_crossmnt); 2553 *p = xdr.p; 2554 return ret; 2555 } 2556 2557 static inline int attributes_need_mount(u32 *bmval) 2558 { 2559 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME)) 2560 return 1; 2561 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID) 2562 return 1; 2563 return 0; 2564 } 2565 2566 static __be32 2567 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd, 2568 const char *name, int namlen) 2569 { 2570 struct svc_export *exp = cd->rd_fhp->fh_export; 2571 struct dentry *dentry; 2572 __be32 nfserr; 2573 int ignore_crossmnt = 0; 2574 2575 dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen); 2576 if (IS_ERR(dentry)) 2577 return nfserrno(PTR_ERR(dentry)); 2578 if (!dentry->d_inode) { 2579 /* 2580 * nfsd_buffered_readdir drops the i_mutex between 2581 * readdir and calling this callback, leaving a window 2582 * where this directory entry could have gone away. 2583 */ 2584 dput(dentry); 2585 return nfserr_noent; 2586 } 2587 2588 exp_get(exp); 2589 /* 2590 * In the case of a mountpoint, the client may be asking for 2591 * attributes that are only properties of the underlying filesystem 2592 * as opposed to the cross-mounted file system. In such a case, 2593 * we will not follow the cross mount and will fill the attribtutes 2594 * directly from the mountpoint dentry. 2595 */ 2596 if (nfsd_mountpoint(dentry, exp)) { 2597 int err; 2598 2599 if (!(exp->ex_flags & NFSEXP_V4ROOT) 2600 && !attributes_need_mount(cd->rd_bmval)) { 2601 ignore_crossmnt = 1; 2602 goto out_encode; 2603 } 2604 /* 2605 * Why the heck aren't we just using nfsd_lookup?? 2606 * Different "."/".." handling? Something else? 2607 * At least, add a comment here to explain.... 2608 */ 2609 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp); 2610 if (err) { 2611 nfserr = nfserrno(err); 2612 goto out_put; 2613 } 2614 nfserr = check_nfsd_access(exp, cd->rd_rqstp); 2615 if (nfserr) 2616 goto out_put; 2617 2618 } 2619 out_encode: 2620 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval, 2621 cd->rd_rqstp, ignore_crossmnt); 2622 out_put: 2623 dput(dentry); 2624 exp_put(exp); 2625 return nfserr; 2626 } 2627 2628 static __be32 * 2629 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr) 2630 { 2631 __be32 *p; 2632 2633 p = xdr_reserve_space(xdr, 6); 2634 if (!p) 2635 return NULL; 2636 *p++ = htonl(2); 2637 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */ 2638 *p++ = htonl(0); /* bmval1 */ 2639 2640 *p++ = htonl(4); /* attribute length */ 2641 *p++ = nfserr; /* no htonl */ 2642 return p; 2643 } 2644 2645 static int 2646 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen, 2647 loff_t offset, u64 ino, unsigned int d_type) 2648 { 2649 struct readdir_cd *ccd = ccdv; 2650 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common); 2651 struct xdr_stream *xdr = cd->xdr; 2652 int start_offset = xdr->buf->len; 2653 int cookie_offset; 2654 int entry_bytes; 2655 __be32 nfserr = nfserr_toosmall; 2656 __be64 wire_offset; 2657 __be32 *p; 2658 2659 /* In nfsv4, "." and ".." never make it onto the wire.. */ 2660 if (name && isdotent(name, namlen)) { 2661 cd->common.err = nfs_ok; 2662 return 0; 2663 } 2664 2665 if (cd->cookie_offset) { 2666 wire_offset = cpu_to_be64(offset); 2667 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset, 2668 &wire_offset, 8); 2669 } 2670 2671 p = xdr_reserve_space(xdr, 4); 2672 if (!p) 2673 goto fail; 2674 *p++ = xdr_one; /* mark entry present */ 2675 cookie_offset = xdr->buf->len; 2676 p = xdr_reserve_space(xdr, 3*4 + namlen); 2677 if (!p) 2678 goto fail; 2679 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */ 2680 p = xdr_encode_array(p, name, namlen); /* name length & name */ 2681 2682 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen); 2683 switch (nfserr) { 2684 case nfs_ok: 2685 break; 2686 case nfserr_resource: 2687 nfserr = nfserr_toosmall; 2688 goto fail; 2689 case nfserr_noent: 2690 xdr_truncate_encode(xdr, start_offset); 2691 goto skip_entry; 2692 default: 2693 /* 2694 * If the client requested the RDATTR_ERROR attribute, 2695 * we stuff the error code into this attribute 2696 * and continue. If this attribute was not requested, 2697 * then in accordance with the spec, we fail the 2698 * entire READDIR operation(!) 2699 */ 2700 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)) 2701 goto fail; 2702 p = nfsd4_encode_rdattr_error(xdr, nfserr); 2703 if (p == NULL) { 2704 nfserr = nfserr_toosmall; 2705 goto fail; 2706 } 2707 } 2708 nfserr = nfserr_toosmall; 2709 entry_bytes = xdr->buf->len - start_offset; 2710 if (entry_bytes > cd->rd_maxcount) 2711 goto fail; 2712 cd->rd_maxcount -= entry_bytes; 2713 if (!cd->rd_dircount) 2714 goto fail; 2715 cd->rd_dircount--; 2716 cd->cookie_offset = cookie_offset; 2717 skip_entry: 2718 cd->common.err = nfs_ok; 2719 return 0; 2720 fail: 2721 xdr_truncate_encode(xdr, start_offset); 2722 cd->common.err = nfserr; 2723 return -EINVAL; 2724 } 2725 2726 static __be32 2727 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid) 2728 { 2729 __be32 *p; 2730 2731 p = xdr_reserve_space(xdr, sizeof(stateid_t)); 2732 if (!p) 2733 return nfserr_resource; 2734 *p++ = cpu_to_be32(sid->si_generation); 2735 p = xdr_encode_opaque_fixed(p, &sid->si_opaque, 2736 sizeof(stateid_opaque_t)); 2737 return 0; 2738 } 2739 2740 static __be32 2741 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access) 2742 { 2743 struct xdr_stream *xdr = &resp->xdr; 2744 __be32 *p; 2745 2746 if (!nfserr) { 2747 p = xdr_reserve_space(xdr, 8); 2748 if (!p) 2749 return nfserr_resource; 2750 *p++ = cpu_to_be32(access->ac_supported); 2751 *p++ = cpu_to_be32(access->ac_resp_access); 2752 } 2753 return nfserr; 2754 } 2755 2756 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts) 2757 { 2758 struct xdr_stream *xdr = &resp->xdr; 2759 __be32 *p; 2760 2761 if (!nfserr) { 2762 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8); 2763 if (!p) 2764 return nfserr_resource; 2765 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data, 2766 NFS4_MAX_SESSIONID_LEN); 2767 *p++ = cpu_to_be32(bcts->dir); 2768 /* Sorry, we do not yet support RDMA over 4.1: */ 2769 *p++ = cpu_to_be32(0); 2770 } 2771 return nfserr; 2772 } 2773 2774 static __be32 2775 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close) 2776 { 2777 struct xdr_stream *xdr = &resp->xdr; 2778 2779 if (!nfserr) 2780 nfserr = nfsd4_encode_stateid(xdr, &close->cl_stateid); 2781 2782 return nfserr; 2783 } 2784 2785 2786 static __be32 2787 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit) 2788 { 2789 struct xdr_stream *xdr = &resp->xdr; 2790 __be32 *p; 2791 2792 if (!nfserr) { 2793 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 2794 if (!p) 2795 return nfserr_resource; 2796 p = xdr_encode_opaque_fixed(p, commit->co_verf.data, 2797 NFS4_VERIFIER_SIZE); 2798 } 2799 return nfserr; 2800 } 2801 2802 static __be32 2803 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create) 2804 { 2805 struct xdr_stream *xdr = &resp->xdr; 2806 __be32 *p; 2807 2808 if (!nfserr) { 2809 p = xdr_reserve_space(xdr, 32); 2810 if (!p) 2811 return nfserr_resource; 2812 p = encode_cinfo(p, &create->cr_cinfo); 2813 *p++ = cpu_to_be32(2); 2814 *p++ = cpu_to_be32(create->cr_bmval[0]); 2815 *p++ = cpu_to_be32(create->cr_bmval[1]); 2816 } 2817 return nfserr; 2818 } 2819 2820 static __be32 2821 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr) 2822 { 2823 struct svc_fh *fhp = getattr->ga_fhp; 2824 struct xdr_stream *xdr = &resp->xdr; 2825 2826 if (nfserr) 2827 return nfserr; 2828 2829 nfserr = nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry, 2830 getattr->ga_bmval, 2831 resp->rqstp, 0); 2832 return nfserr; 2833 } 2834 2835 static __be32 2836 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp) 2837 { 2838 struct xdr_stream *xdr = &resp->xdr; 2839 struct svc_fh *fhp = *fhpp; 2840 unsigned int len; 2841 __be32 *p; 2842 2843 if (!nfserr) { 2844 len = fhp->fh_handle.fh_size; 2845 p = xdr_reserve_space(xdr, len + 4); 2846 if (!p) 2847 return nfserr_resource; 2848 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len); 2849 } 2850 return nfserr; 2851 } 2852 2853 /* 2854 * Including all fields other than the name, a LOCK4denied structure requires 2855 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. 2856 */ 2857 static __be32 2858 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) 2859 { 2860 struct xdr_netobj *conf = &ld->ld_owner; 2861 __be32 *p; 2862 2863 again: 2864 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len)); 2865 if (!p) { 2866 /* 2867 * Don't fail to return the result just because we can't 2868 * return the conflicting open: 2869 */ 2870 if (conf->len) { 2871 conf->len = 0; 2872 conf->data = NULL; 2873 goto again; 2874 } 2875 return nfserr_resource; 2876 } 2877 p = xdr_encode_hyper(p, ld->ld_start); 2878 p = xdr_encode_hyper(p, ld->ld_length); 2879 *p++ = cpu_to_be32(ld->ld_type); 2880 if (conf->len) { 2881 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8); 2882 p = xdr_encode_opaque(p, conf->data, conf->len); 2883 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */ 2884 p = xdr_encode_hyper(p, (u64)0); /* clientid */ 2885 *p++ = cpu_to_be32(0); /* length of owner name */ 2886 } 2887 return nfserr_denied; 2888 } 2889 2890 static __be32 2891 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock) 2892 { 2893 struct xdr_stream *xdr = &resp->xdr; 2894 2895 if (!nfserr) 2896 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid); 2897 else if (nfserr == nfserr_denied) 2898 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); 2899 kfree(lock->lk_denied.ld_owner.data); 2900 return nfserr; 2901 } 2902 2903 static __be32 2904 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt) 2905 { 2906 struct xdr_stream *xdr = &resp->xdr; 2907 2908 if (nfserr == nfserr_denied) 2909 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); 2910 return nfserr; 2911 } 2912 2913 static __be32 2914 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku) 2915 { 2916 struct xdr_stream *xdr = &resp->xdr; 2917 2918 if (!nfserr) 2919 nfserr = nfsd4_encode_stateid(xdr, &locku->lu_stateid); 2920 2921 return nfserr; 2922 } 2923 2924 2925 static __be32 2926 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link) 2927 { 2928 struct xdr_stream *xdr = &resp->xdr; 2929 __be32 *p; 2930 2931 if (!nfserr) { 2932 p = xdr_reserve_space(xdr, 20); 2933 if (!p) 2934 return nfserr_resource; 2935 p = encode_cinfo(p, &link->li_cinfo); 2936 } 2937 return nfserr; 2938 } 2939 2940 2941 static __be32 2942 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open) 2943 { 2944 struct xdr_stream *xdr = &resp->xdr; 2945 __be32 *p; 2946 2947 if (nfserr) 2948 goto out; 2949 2950 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid); 2951 if (nfserr) 2952 goto out; 2953 p = xdr_reserve_space(xdr, 40); 2954 if (!p) 2955 return nfserr_resource; 2956 p = encode_cinfo(p, &open->op_cinfo); 2957 *p++ = cpu_to_be32(open->op_rflags); 2958 *p++ = cpu_to_be32(2); 2959 *p++ = cpu_to_be32(open->op_bmval[0]); 2960 *p++ = cpu_to_be32(open->op_bmval[1]); 2961 *p++ = cpu_to_be32(open->op_delegate_type); 2962 2963 switch (open->op_delegate_type) { 2964 case NFS4_OPEN_DELEGATE_NONE: 2965 break; 2966 case NFS4_OPEN_DELEGATE_READ: 2967 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 2968 if (nfserr) 2969 return nfserr; 2970 p = xdr_reserve_space(xdr, 20); 2971 if (!p) 2972 return nfserr_resource; 2973 *p++ = cpu_to_be32(open->op_recall); 2974 2975 /* 2976 * TODO: ACE's in delegations 2977 */ 2978 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 2979 *p++ = cpu_to_be32(0); 2980 *p++ = cpu_to_be32(0); 2981 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 2982 break; 2983 case NFS4_OPEN_DELEGATE_WRITE: 2984 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 2985 if (nfserr) 2986 return nfserr; 2987 p = xdr_reserve_space(xdr, 32); 2988 if (!p) 2989 return nfserr_resource; 2990 *p++ = cpu_to_be32(0); 2991 2992 /* 2993 * TODO: space_limit's in delegations 2994 */ 2995 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE); 2996 *p++ = cpu_to_be32(~(u32)0); 2997 *p++ = cpu_to_be32(~(u32)0); 2998 2999 /* 3000 * TODO: ACE's in delegations 3001 */ 3002 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3003 *p++ = cpu_to_be32(0); 3004 *p++ = cpu_to_be32(0); 3005 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3006 break; 3007 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */ 3008 switch (open->op_why_no_deleg) { 3009 case WND4_CONTENTION: 3010 case WND4_RESOURCE: 3011 p = xdr_reserve_space(xdr, 8); 3012 if (!p) 3013 return nfserr_resource; 3014 *p++ = cpu_to_be32(open->op_why_no_deleg); 3015 /* deleg signaling not supported yet: */ 3016 *p++ = cpu_to_be32(0); 3017 break; 3018 default: 3019 p = xdr_reserve_space(xdr, 4); 3020 if (!p) 3021 return nfserr_resource; 3022 *p++ = cpu_to_be32(open->op_why_no_deleg); 3023 } 3024 break; 3025 default: 3026 BUG(); 3027 } 3028 /* XXX save filehandle here */ 3029 out: 3030 return nfserr; 3031 } 3032 3033 static __be32 3034 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc) 3035 { 3036 struct xdr_stream *xdr = &resp->xdr; 3037 3038 if (!nfserr) 3039 nfserr = nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid); 3040 3041 return nfserr; 3042 } 3043 3044 static __be32 3045 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od) 3046 { 3047 struct xdr_stream *xdr = &resp->xdr; 3048 3049 if (!nfserr) 3050 nfserr = nfsd4_encode_stateid(xdr, &od->od_stateid); 3051 3052 return nfserr; 3053 } 3054 3055 static __be32 nfsd4_encode_splice_read( 3056 struct nfsd4_compoundres *resp, 3057 struct nfsd4_read *read, 3058 struct file *file, unsigned long maxcount) 3059 { 3060 struct xdr_stream *xdr = &resp->xdr; 3061 struct xdr_buf *buf = xdr->buf; 3062 u32 eof; 3063 int space_left; 3064 __be32 nfserr; 3065 __be32 *p = xdr->p - 2; 3066 3067 /* 3068 * Don't inline pages unless we know there's room for eof, 3069 * count, and possible padding: 3070 */ 3071 if (xdr->end - xdr->p < 3) 3072 return nfserr_resource; 3073 3074 nfserr = nfsd_splice_read(read->rd_rqstp, file, 3075 read->rd_offset, &maxcount); 3076 if (nfserr) { 3077 /* 3078 * nfsd_splice_actor may have already messed with the 3079 * page length; reset it so as not to confuse 3080 * xdr_truncate_encode: 3081 */ 3082 buf->page_len = 0; 3083 return nfserr; 3084 } 3085 3086 eof = (read->rd_offset + maxcount >= 3087 read->rd_fhp->fh_dentry->d_inode->i_size); 3088 3089 *(p++) = htonl(eof); 3090 *(p++) = htonl(maxcount); 3091 3092 buf->page_len = maxcount; 3093 buf->len += maxcount; 3094 xdr->page_ptr += (maxcount + PAGE_SIZE - 1) / PAGE_SIZE; 3095 3096 /* Use rest of head for padding and remaining ops: */ 3097 buf->tail[0].iov_base = xdr->p; 3098 buf->tail[0].iov_len = 0; 3099 xdr->iov = buf->tail; 3100 if (maxcount&3) { 3101 int pad = 4 - (maxcount&3); 3102 3103 *(xdr->p++) = 0; 3104 3105 buf->tail[0].iov_base += maxcount&3; 3106 buf->tail[0].iov_len = pad; 3107 buf->len += pad; 3108 } 3109 3110 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p, 3111 buf->buflen - buf->len); 3112 buf->buflen = buf->len + space_left; 3113 xdr->end = (__be32 *)((void *)xdr->end + space_left); 3114 3115 return 0; 3116 } 3117 3118 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp, 3119 struct nfsd4_read *read, 3120 struct file *file, unsigned long maxcount) 3121 { 3122 struct xdr_stream *xdr = &resp->xdr; 3123 u32 eof; 3124 int v; 3125 int starting_len = xdr->buf->len - 8; 3126 long len; 3127 int thislen; 3128 __be32 nfserr; 3129 __be32 tmp; 3130 __be32 *p; 3131 u32 zzz = 0; 3132 int pad; 3133 3134 len = maxcount; 3135 v = 0; 3136 3137 thislen = (void *)xdr->end - (void *)xdr->p; 3138 if (len < thislen) 3139 thislen = len; 3140 p = xdr_reserve_space(xdr, (thislen+3)&~3); 3141 WARN_ON_ONCE(!p); 3142 resp->rqstp->rq_vec[v].iov_base = p; 3143 resp->rqstp->rq_vec[v].iov_len = thislen; 3144 v++; 3145 len -= thislen; 3146 3147 while (len) { 3148 thislen = min_t(long, len, PAGE_SIZE); 3149 p = xdr_reserve_space(xdr, (thislen+3)&~3); 3150 WARN_ON_ONCE(!p); 3151 resp->rqstp->rq_vec[v].iov_base = p; 3152 resp->rqstp->rq_vec[v].iov_len = thislen; 3153 v++; 3154 len -= thislen; 3155 } 3156 read->rd_vlen = v; 3157 3158 nfserr = nfsd_readv(file, read->rd_offset, resp->rqstp->rq_vec, 3159 read->rd_vlen, &maxcount); 3160 if (nfserr) 3161 return nfserr; 3162 xdr_truncate_encode(xdr, starting_len + 8 + ((maxcount+3)&~3)); 3163 3164 eof = (read->rd_offset + maxcount >= 3165 read->rd_fhp->fh_dentry->d_inode->i_size); 3166 3167 tmp = htonl(eof); 3168 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4); 3169 tmp = htonl(maxcount); 3170 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4); 3171 3172 pad = (maxcount&3) ? 4 - (maxcount&3) : 0; 3173 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount, 3174 &zzz, pad); 3175 return 0; 3176 3177 } 3178 3179 static __be32 3180 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr, 3181 struct nfsd4_read *read) 3182 { 3183 unsigned long maxcount; 3184 struct xdr_stream *xdr = &resp->xdr; 3185 struct file *file = read->rd_filp; 3186 int starting_len = xdr->buf->len; 3187 struct raparms *ra; 3188 __be32 *p; 3189 __be32 err; 3190 3191 if (nfserr) 3192 return nfserr; 3193 3194 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */ 3195 if (!p) { 3196 WARN_ON_ONCE(resp->rqstp->rq_splice_ok); 3197 return nfserr_resource; 3198 } 3199 if (resp->xdr.buf->page_len && resp->rqstp->rq_splice_ok) { 3200 WARN_ON_ONCE(1); 3201 return nfserr_resource; 3202 } 3203 xdr_commit_encode(xdr); 3204 3205 maxcount = svc_max_payload(resp->rqstp); 3206 if (maxcount > xdr->buf->buflen - xdr->buf->len) 3207 maxcount = xdr->buf->buflen - xdr->buf->len; 3208 if (maxcount > read->rd_length) 3209 maxcount = read->rd_length; 3210 3211 if (!read->rd_filp) { 3212 err = nfsd_get_tmp_read_open(resp->rqstp, read->rd_fhp, 3213 &file, &ra); 3214 if (err) 3215 goto err_truncate; 3216 } 3217 3218 if (file->f_op->splice_read && resp->rqstp->rq_splice_ok) 3219 err = nfsd4_encode_splice_read(resp, read, file, maxcount); 3220 else 3221 err = nfsd4_encode_readv(resp, read, file, maxcount); 3222 3223 if (!read->rd_filp) 3224 nfsd_put_tmp_read_open(file, ra); 3225 3226 err_truncate: 3227 if (err) 3228 xdr_truncate_encode(xdr, starting_len); 3229 return err; 3230 } 3231 3232 static __be32 3233 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink) 3234 { 3235 int maxcount; 3236 __be32 wire_count; 3237 int zero = 0; 3238 struct xdr_stream *xdr = &resp->xdr; 3239 int length_offset = xdr->buf->len; 3240 __be32 *p; 3241 3242 if (nfserr) 3243 return nfserr; 3244 3245 p = xdr_reserve_space(xdr, 4); 3246 if (!p) 3247 return nfserr_resource; 3248 maxcount = PAGE_SIZE; 3249 3250 p = xdr_reserve_space(xdr, maxcount); 3251 if (!p) 3252 return nfserr_resource; 3253 /* 3254 * XXX: By default, the ->readlink() VFS op will truncate symlinks 3255 * if they would overflow the buffer. Is this kosher in NFSv4? If 3256 * not, one easy fix is: if ->readlink() precisely fills the buffer, 3257 * assume that truncation occurred, and return NFS4ERR_RESOURCE. 3258 */ 3259 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, 3260 (char *)p, &maxcount); 3261 if (nfserr == nfserr_isdir) 3262 nfserr = nfserr_inval; 3263 if (nfserr) { 3264 xdr_truncate_encode(xdr, length_offset); 3265 return nfserr; 3266 } 3267 3268 wire_count = htonl(maxcount); 3269 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4); 3270 xdr_truncate_encode(xdr, length_offset + 4 + maxcount); 3271 if (maxcount & 3) 3272 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, 3273 &zero, 4 - (maxcount&3)); 3274 return 0; 3275 } 3276 3277 static __be32 3278 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir) 3279 { 3280 int maxcount; 3281 int bytes_left; 3282 loff_t offset; 3283 __be64 wire_offset; 3284 struct xdr_stream *xdr = &resp->xdr; 3285 int starting_len = xdr->buf->len; 3286 __be32 *p; 3287 3288 if (nfserr) 3289 return nfserr; 3290 3291 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 3292 if (!p) 3293 return nfserr_resource; 3294 3295 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */ 3296 *p++ = cpu_to_be32(0); 3297 *p++ = cpu_to_be32(0); 3298 resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p) 3299 - (char *)resp->xdr.buf->head[0].iov_base; 3300 3301 /* 3302 * Number of bytes left for directory entries allowing for the 3303 * final 8 bytes of the readdir and a following failed op: 3304 */ 3305 bytes_left = xdr->buf->buflen - xdr->buf->len 3306 - COMPOUND_ERR_SLACK_SPACE - 8; 3307 if (bytes_left < 0) { 3308 nfserr = nfserr_resource; 3309 goto err_no_verf; 3310 } 3311 maxcount = min_t(u32, readdir->rd_maxcount, INT_MAX); 3312 /* 3313 * Note the rfc defines rd_maxcount as the size of the 3314 * READDIR4resok structure, which includes the verifier above 3315 * and the 8 bytes encoded at the end of this function: 3316 */ 3317 if (maxcount < 16) { 3318 nfserr = nfserr_toosmall; 3319 goto err_no_verf; 3320 } 3321 maxcount = min_t(int, maxcount-16, bytes_left); 3322 3323 readdir->xdr = xdr; 3324 readdir->rd_maxcount = maxcount; 3325 readdir->common.err = 0; 3326 readdir->cookie_offset = 0; 3327 3328 offset = readdir->rd_cookie; 3329 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp, 3330 &offset, 3331 &readdir->common, nfsd4_encode_dirent); 3332 if (nfserr == nfs_ok && 3333 readdir->common.err == nfserr_toosmall && 3334 xdr->buf->len == starting_len + 8) { 3335 /* nothing encoded; which limit did we hit?: */ 3336 if (maxcount - 16 < bytes_left) 3337 /* It was the fault of rd_maxcount: */ 3338 nfserr = nfserr_toosmall; 3339 else 3340 /* We ran out of buffer space: */ 3341 nfserr = nfserr_resource; 3342 } 3343 if (nfserr) 3344 goto err_no_verf; 3345 3346 if (readdir->cookie_offset) { 3347 wire_offset = cpu_to_be64(offset); 3348 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset, 3349 &wire_offset, 8); 3350 } 3351 3352 p = xdr_reserve_space(xdr, 8); 3353 if (!p) { 3354 WARN_ON_ONCE(1); 3355 goto err_no_verf; 3356 } 3357 *p++ = 0; /* no more entries */ 3358 *p++ = htonl(readdir->common.err == nfserr_eof); 3359 3360 return 0; 3361 err_no_verf: 3362 xdr_truncate_encode(xdr, starting_len); 3363 return nfserr; 3364 } 3365 3366 static __be32 3367 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove) 3368 { 3369 struct xdr_stream *xdr = &resp->xdr; 3370 __be32 *p; 3371 3372 if (!nfserr) { 3373 p = xdr_reserve_space(xdr, 20); 3374 if (!p) 3375 return nfserr_resource; 3376 p = encode_cinfo(p, &remove->rm_cinfo); 3377 } 3378 return nfserr; 3379 } 3380 3381 static __be32 3382 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename) 3383 { 3384 struct xdr_stream *xdr = &resp->xdr; 3385 __be32 *p; 3386 3387 if (!nfserr) { 3388 p = xdr_reserve_space(xdr, 40); 3389 if (!p) 3390 return nfserr_resource; 3391 p = encode_cinfo(p, &rename->rn_sinfo); 3392 p = encode_cinfo(p, &rename->rn_tinfo); 3393 } 3394 return nfserr; 3395 } 3396 3397 static __be32 3398 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, 3399 __be32 nfserr, struct svc_export *exp) 3400 { 3401 u32 i, nflavs, supported; 3402 struct exp_flavor_info *flavs; 3403 struct exp_flavor_info def_flavs[2]; 3404 __be32 *p, *flavorsp; 3405 static bool report = true; 3406 3407 if (nfserr) 3408 goto out; 3409 nfserr = nfserr_resource; 3410 if (exp->ex_nflavors) { 3411 flavs = exp->ex_flavors; 3412 nflavs = exp->ex_nflavors; 3413 } else { /* Handling of some defaults in absence of real secinfo: */ 3414 flavs = def_flavs; 3415 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) { 3416 nflavs = 2; 3417 flavs[0].pseudoflavor = RPC_AUTH_UNIX; 3418 flavs[1].pseudoflavor = RPC_AUTH_NULL; 3419 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) { 3420 nflavs = 1; 3421 flavs[0].pseudoflavor 3422 = svcauth_gss_flavor(exp->ex_client); 3423 } else { 3424 nflavs = 1; 3425 flavs[0].pseudoflavor 3426 = exp->ex_client->flavour->flavour; 3427 } 3428 } 3429 3430 supported = 0; 3431 p = xdr_reserve_space(xdr, 4); 3432 if (!p) 3433 goto out; 3434 flavorsp = p++; /* to be backfilled later */ 3435 3436 for (i = 0; i < nflavs; i++) { 3437 rpc_authflavor_t pf = flavs[i].pseudoflavor; 3438 struct rpcsec_gss_info info; 3439 3440 if (rpcauth_get_gssinfo(pf, &info) == 0) { 3441 supported++; 3442 p = xdr_reserve_space(xdr, 4 + 4 + 3443 XDR_LEN(info.oid.len) + 4 + 4); 3444 if (!p) 3445 goto out; 3446 *p++ = cpu_to_be32(RPC_AUTH_GSS); 3447 p = xdr_encode_opaque(p, info.oid.data, info.oid.len); 3448 *p++ = cpu_to_be32(info.qop); 3449 *p++ = cpu_to_be32(info.service); 3450 } else if (pf < RPC_AUTH_MAXFLAVOR) { 3451 supported++; 3452 p = xdr_reserve_space(xdr, 4); 3453 if (!p) 3454 goto out; 3455 *p++ = cpu_to_be32(pf); 3456 } else { 3457 if (report) 3458 pr_warn("NFS: SECINFO: security flavor %u " 3459 "is not supported\n", pf); 3460 } 3461 } 3462 3463 if (nflavs != supported) 3464 report = false; 3465 *flavorsp = htonl(supported); 3466 nfserr = 0; 3467 out: 3468 if (exp) 3469 exp_put(exp); 3470 return nfserr; 3471 } 3472 3473 static __be32 3474 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 3475 struct nfsd4_secinfo *secinfo) 3476 { 3477 struct xdr_stream *xdr = &resp->xdr; 3478 3479 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->si_exp); 3480 } 3481 3482 static __be32 3483 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr, 3484 struct nfsd4_secinfo_no_name *secinfo) 3485 { 3486 struct xdr_stream *xdr = &resp->xdr; 3487 3488 return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->sin_exp); 3489 } 3490 3491 /* 3492 * The SETATTR encode routine is special -- it always encodes a bitmap, 3493 * regardless of the error status. 3494 */ 3495 static __be32 3496 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr) 3497 { 3498 struct xdr_stream *xdr = &resp->xdr; 3499 __be32 *p; 3500 3501 p = xdr_reserve_space(xdr, 16); 3502 if (!p) 3503 return nfserr_resource; 3504 if (nfserr) { 3505 *p++ = cpu_to_be32(3); 3506 *p++ = cpu_to_be32(0); 3507 *p++ = cpu_to_be32(0); 3508 *p++ = cpu_to_be32(0); 3509 } 3510 else { 3511 *p++ = cpu_to_be32(3); 3512 *p++ = cpu_to_be32(setattr->sa_bmval[0]); 3513 *p++ = cpu_to_be32(setattr->sa_bmval[1]); 3514 *p++ = cpu_to_be32(setattr->sa_bmval[2]); 3515 } 3516 return nfserr; 3517 } 3518 3519 static __be32 3520 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd) 3521 { 3522 struct xdr_stream *xdr = &resp->xdr; 3523 __be32 *p; 3524 3525 if (!nfserr) { 3526 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE); 3527 if (!p) 3528 return nfserr_resource; 3529 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8); 3530 p = xdr_encode_opaque_fixed(p, &scd->se_confirm, 3531 NFS4_VERIFIER_SIZE); 3532 } 3533 else if (nfserr == nfserr_clid_inuse) { 3534 p = xdr_reserve_space(xdr, 8); 3535 if (!p) 3536 return nfserr_resource; 3537 *p++ = cpu_to_be32(0); 3538 *p++ = cpu_to_be32(0); 3539 } 3540 return nfserr; 3541 } 3542 3543 static __be32 3544 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write) 3545 { 3546 struct xdr_stream *xdr = &resp->xdr; 3547 __be32 *p; 3548 3549 if (!nfserr) { 3550 p = xdr_reserve_space(xdr, 16); 3551 if (!p) 3552 return nfserr_resource; 3553 *p++ = cpu_to_be32(write->wr_bytes_written); 3554 *p++ = cpu_to_be32(write->wr_how_written); 3555 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 3556 NFS4_VERIFIER_SIZE); 3557 } 3558 return nfserr; 3559 } 3560 3561 static const u32 nfs4_minimal_spo_must_enforce[2] = { 3562 [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) | 3563 1 << (OP_EXCHANGE_ID - 32) | 3564 1 << (OP_CREATE_SESSION - 32) | 3565 1 << (OP_DESTROY_SESSION - 32) | 3566 1 << (OP_DESTROY_CLIENTID - 32) 3567 }; 3568 3569 static __be32 3570 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr, 3571 struct nfsd4_exchange_id *exid) 3572 { 3573 struct xdr_stream *xdr = &resp->xdr; 3574 __be32 *p; 3575 char *major_id; 3576 char *server_scope; 3577 int major_id_sz; 3578 int server_scope_sz; 3579 uint64_t minor_id = 0; 3580 3581 if (nfserr) 3582 return nfserr; 3583 3584 major_id = utsname()->nodename; 3585 major_id_sz = strlen(major_id); 3586 server_scope = utsname()->nodename; 3587 server_scope_sz = strlen(server_scope); 3588 3589 p = xdr_reserve_space(xdr, 3590 8 /* eir_clientid */ + 3591 4 /* eir_sequenceid */ + 3592 4 /* eir_flags */ + 3593 4 /* spr_how */); 3594 if (!p) 3595 return nfserr_resource; 3596 3597 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8); 3598 *p++ = cpu_to_be32(exid->seqid); 3599 *p++ = cpu_to_be32(exid->flags); 3600 3601 *p++ = cpu_to_be32(exid->spa_how); 3602 3603 switch (exid->spa_how) { 3604 case SP4_NONE: 3605 break; 3606 case SP4_MACH_CRED: 3607 /* spo_must_enforce, spo_must_allow */ 3608 p = xdr_reserve_space(xdr, 16); 3609 if (!p) 3610 return nfserr_resource; 3611 3612 /* spo_must_enforce bitmap: */ 3613 *p++ = cpu_to_be32(2); 3614 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[0]); 3615 *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[1]); 3616 /* empty spo_must_allow bitmap: */ 3617 *p++ = cpu_to_be32(0); 3618 3619 break; 3620 default: 3621 WARN_ON_ONCE(1); 3622 } 3623 3624 p = xdr_reserve_space(xdr, 3625 8 /* so_minor_id */ + 3626 4 /* so_major_id.len */ + 3627 (XDR_QUADLEN(major_id_sz) * 4) + 3628 4 /* eir_server_scope.len */ + 3629 (XDR_QUADLEN(server_scope_sz) * 4) + 3630 4 /* eir_server_impl_id.count (0) */); 3631 if (!p) 3632 return nfserr_resource; 3633 3634 /* The server_owner struct */ 3635 p = xdr_encode_hyper(p, minor_id); /* Minor id */ 3636 /* major id */ 3637 p = xdr_encode_opaque(p, major_id, major_id_sz); 3638 3639 /* Server scope */ 3640 p = xdr_encode_opaque(p, server_scope, server_scope_sz); 3641 3642 /* Implementation id */ 3643 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */ 3644 return 0; 3645 } 3646 3647 static __be32 3648 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr, 3649 struct nfsd4_create_session *sess) 3650 { 3651 struct xdr_stream *xdr = &resp->xdr; 3652 __be32 *p; 3653 3654 if (nfserr) 3655 return nfserr; 3656 3657 p = xdr_reserve_space(xdr, 24); 3658 if (!p) 3659 return nfserr_resource; 3660 p = xdr_encode_opaque_fixed(p, sess->sessionid.data, 3661 NFS4_MAX_SESSIONID_LEN); 3662 *p++ = cpu_to_be32(sess->seqid); 3663 *p++ = cpu_to_be32(sess->flags); 3664 3665 p = xdr_reserve_space(xdr, 28); 3666 if (!p) 3667 return nfserr_resource; 3668 *p++ = cpu_to_be32(0); /* headerpadsz */ 3669 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz); 3670 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz); 3671 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached); 3672 *p++ = cpu_to_be32(sess->fore_channel.maxops); 3673 *p++ = cpu_to_be32(sess->fore_channel.maxreqs); 3674 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs); 3675 3676 if (sess->fore_channel.nr_rdma_attrs) { 3677 p = xdr_reserve_space(xdr, 4); 3678 if (!p) 3679 return nfserr_resource; 3680 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs); 3681 } 3682 3683 p = xdr_reserve_space(xdr, 28); 3684 if (!p) 3685 return nfserr_resource; 3686 *p++ = cpu_to_be32(0); /* headerpadsz */ 3687 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz); 3688 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz); 3689 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached); 3690 *p++ = cpu_to_be32(sess->back_channel.maxops); 3691 *p++ = cpu_to_be32(sess->back_channel.maxreqs); 3692 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs); 3693 3694 if (sess->back_channel.nr_rdma_attrs) { 3695 p = xdr_reserve_space(xdr, 4); 3696 if (!p) 3697 return nfserr_resource; 3698 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs); 3699 } 3700 return 0; 3701 } 3702 3703 static __be32 3704 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr, 3705 struct nfsd4_sequence *seq) 3706 { 3707 struct xdr_stream *xdr = &resp->xdr; 3708 __be32 *p; 3709 3710 if (nfserr) 3711 return nfserr; 3712 3713 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20); 3714 if (!p) 3715 return nfserr_resource; 3716 p = xdr_encode_opaque_fixed(p, seq->sessionid.data, 3717 NFS4_MAX_SESSIONID_LEN); 3718 *p++ = cpu_to_be32(seq->seqid); 3719 *p++ = cpu_to_be32(seq->slotid); 3720 /* Note slotid's are numbered from zero: */ 3721 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */ 3722 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */ 3723 *p++ = cpu_to_be32(seq->status_flags); 3724 3725 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */ 3726 return 0; 3727 } 3728 3729 static __be32 3730 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr, 3731 struct nfsd4_test_stateid *test_stateid) 3732 { 3733 struct xdr_stream *xdr = &resp->xdr; 3734 struct nfsd4_test_stateid_id *stateid, *next; 3735 __be32 *p; 3736 3737 if (nfserr) 3738 return nfserr; 3739 3740 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids)); 3741 if (!p) 3742 return nfserr_resource; 3743 *p++ = htonl(test_stateid->ts_num_ids); 3744 3745 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) { 3746 *p++ = stateid->ts_id_status; 3747 } 3748 3749 return nfserr; 3750 } 3751 3752 static __be32 3753 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p) 3754 { 3755 return nfserr; 3756 } 3757 3758 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *); 3759 3760 /* 3761 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1 3762 * since we don't need to filter out obsolete ops as this is 3763 * done in the decoding phase. 3764 */ 3765 static nfsd4_enc nfsd4_enc_ops[] = { 3766 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access, 3767 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close, 3768 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit, 3769 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create, 3770 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop, 3771 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop, 3772 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr, 3773 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh, 3774 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link, 3775 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock, 3776 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt, 3777 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku, 3778 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop, 3779 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop, 3780 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop, 3781 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open, 3782 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop, 3783 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm, 3784 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade, 3785 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop, 3786 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop, 3787 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop, 3788 [OP_READ] = (nfsd4_enc)nfsd4_encode_read, 3789 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir, 3790 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink, 3791 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove, 3792 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename, 3793 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop, 3794 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop, 3795 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop, 3796 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo, 3797 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr, 3798 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid, 3799 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop, 3800 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop, 3801 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write, 3802 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop, 3803 3804 /* NFSv4.1 operations */ 3805 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop, 3806 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session, 3807 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id, 3808 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session, 3809 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop, 3810 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop, 3811 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 3812 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop, 3813 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, 3814 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop, 3815 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop, 3816 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop, 3817 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name, 3818 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence, 3819 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop, 3820 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid, 3821 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 3822 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop, 3823 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop, 3824 }; 3825 3826 /* 3827 * Calculate whether we still have space to encode repsize bytes. 3828 * There are two considerations: 3829 * - For NFS versions >=4.1, the size of the reply must stay within 3830 * session limits 3831 * - For all NFS versions, we must stay within limited preallocated 3832 * buffer space. 3833 * 3834 * This is called before the operation is processed, so can only provide 3835 * an upper estimate. For some nonidempotent operations (such as 3836 * getattr), it's not necessarily a problem if that estimate is wrong, 3837 * as we can fail it after processing without significant side effects. 3838 */ 3839 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize) 3840 { 3841 struct xdr_buf *buf = &resp->rqstp->rq_res; 3842 struct nfsd4_slot *slot = resp->cstate.slot; 3843 3844 if (buf->len + respsize <= buf->buflen) 3845 return nfs_ok; 3846 if (!nfsd4_has_session(&resp->cstate)) 3847 return nfserr_resource; 3848 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) { 3849 WARN_ON_ONCE(1); 3850 return nfserr_rep_too_big_to_cache; 3851 } 3852 return nfserr_rep_too_big; 3853 } 3854 3855 void 3856 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op) 3857 { 3858 struct xdr_stream *xdr = &resp->xdr; 3859 struct nfs4_stateowner *so = resp->cstate.replay_owner; 3860 struct svc_rqst *rqstp = resp->rqstp; 3861 int post_err_offset; 3862 nfsd4_enc encoder; 3863 __be32 *p; 3864 3865 p = xdr_reserve_space(xdr, 8); 3866 if (!p) { 3867 WARN_ON_ONCE(1); 3868 return; 3869 } 3870 *p++ = cpu_to_be32(op->opnum); 3871 post_err_offset = xdr->buf->len; 3872 3873 if (op->opnum == OP_ILLEGAL) 3874 goto status; 3875 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) || 3876 !nfsd4_enc_ops[op->opnum]); 3877 encoder = nfsd4_enc_ops[op->opnum]; 3878 op->status = encoder(resp, op->status, &op->u); 3879 xdr_commit_encode(xdr); 3880 3881 /* nfsd4_check_resp_size guarantees enough room for error status */ 3882 if (!op->status) { 3883 int space_needed = 0; 3884 if (!nfsd4_last_compound_op(rqstp)) 3885 space_needed = COMPOUND_ERR_SLACK_SPACE; 3886 op->status = nfsd4_check_resp_size(resp, space_needed); 3887 } 3888 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) { 3889 struct nfsd4_slot *slot = resp->cstate.slot; 3890 3891 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) 3892 op->status = nfserr_rep_too_big_to_cache; 3893 else 3894 op->status = nfserr_rep_too_big; 3895 } 3896 if (op->status == nfserr_resource || 3897 op->status == nfserr_rep_too_big || 3898 op->status == nfserr_rep_too_big_to_cache) { 3899 /* 3900 * The operation may have already been encoded or 3901 * partially encoded. No op returns anything additional 3902 * in the case of one of these three errors, so we can 3903 * just truncate back to after the status. But it's a 3904 * bug if we had to do this on a non-idempotent op: 3905 */ 3906 warn_on_nonidempotent_op(op); 3907 xdr_truncate_encode(xdr, post_err_offset); 3908 } 3909 if (so) { 3910 int len = xdr->buf->len - post_err_offset; 3911 3912 so->so_replay.rp_status = op->status; 3913 so->so_replay.rp_buflen = len; 3914 read_bytes_from_xdr_buf(xdr->buf, post_err_offset, 3915 so->so_replay.rp_buf, len); 3916 } 3917 status: 3918 /* Note that op->status is already in network byte order: */ 3919 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4); 3920 } 3921 3922 /* 3923 * Encode the reply stored in the stateowner reply cache 3924 * 3925 * XDR note: do not encode rp->rp_buflen: the buffer contains the 3926 * previously sent already encoded operation. 3927 * 3928 * called with nfs4_lock_state() held 3929 */ 3930 void 3931 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op) 3932 { 3933 __be32 *p; 3934 struct nfs4_replay *rp = op->replay; 3935 3936 BUG_ON(!rp); 3937 3938 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen); 3939 if (!p) { 3940 WARN_ON_ONCE(1); 3941 return; 3942 } 3943 *p++ = cpu_to_be32(op->opnum); 3944 *p++ = rp->rp_status; /* already xdr'ed */ 3945 3946 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen); 3947 } 3948 3949 int 3950 nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy) 3951 { 3952 return xdr_ressize_check(rqstp, p); 3953 } 3954 3955 int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp) 3956 { 3957 struct svc_rqst *rqstp = rq; 3958 struct nfsd4_compoundargs *args = rqstp->rq_argp; 3959 3960 if (args->ops != args->iops) { 3961 kfree(args->ops); 3962 args->ops = args->iops; 3963 } 3964 kfree(args->tmpp); 3965 args->tmpp = NULL; 3966 while (args->to_free) { 3967 struct tmpbuf *tb = args->to_free; 3968 args->to_free = tb->next; 3969 tb->release(tb->buf); 3970 kfree(tb); 3971 } 3972 return 1; 3973 } 3974 3975 int 3976 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args) 3977 { 3978 if (rqstp->rq_arg.head[0].iov_len % 4) { 3979 /* client is nuts */ 3980 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)", 3981 __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid)); 3982 return 0; 3983 } 3984 args->p = p; 3985 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len; 3986 args->pagelist = rqstp->rq_arg.pages; 3987 args->pagelen = rqstp->rq_arg.page_len; 3988 args->tmpp = NULL; 3989 args->to_free = NULL; 3990 args->ops = args->iops; 3991 args->rqstp = rqstp; 3992 3993 return !nfsd4_decode_compound(args); 3994 } 3995 3996 int 3997 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp) 3998 { 3999 /* 4000 * All that remains is to write the tag and operation count... 4001 */ 4002 struct nfsd4_compound_state *cs = &resp->cstate; 4003 struct xdr_buf *buf = resp->xdr.buf; 4004 4005 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len + 4006 buf->tail[0].iov_len); 4007 4008 rqstp->rq_next_page = resp->xdr.page_ptr + 1; 4009 4010 p = resp->tagp; 4011 *p++ = htonl(resp->taglen); 4012 memcpy(p, resp->tag, resp->taglen); 4013 p += XDR_QUADLEN(resp->taglen); 4014 *p++ = htonl(resp->opcnt); 4015 4016 if (nfsd4_has_session(cs)) { 4017 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 4018 struct nfs4_client *clp = cs->session->se_client; 4019 if (cs->status != nfserr_replay_cache) { 4020 nfsd4_store_cache_entry(resp); 4021 cs->slot->sl_flags &= ~NFSD4_SLOT_INUSE; 4022 } 4023 /* Renew the clientid on success and on replay */ 4024 spin_lock(&nn->client_lock); 4025 nfsd4_put_session(cs->session); 4026 spin_unlock(&nn->client_lock); 4027 put_client_renew(clp); 4028 } 4029 return 1; 4030 } 4031 4032 /* 4033 * Local variables: 4034 * c-basic-offset: 8 4035 * End: 4036 */ 4037