1 /* 2 * Server-side XDR for NFSv4 3 * 4 * Copyright (c) 2002 The Regents of the University of Michigan. 5 * All rights reserved. 6 * 7 * Kendrick Smith <kmsmith@umich.edu> 8 * Andy Adamson <andros@umich.edu> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. Neither the name of the University nor the names of its 20 * contributors may be used to endorse or promote products derived 21 * from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 #include <linux/file.h> 37 #include <linux/slab.h> 38 #include <linux/namei.h> 39 #include <linux/statfs.h> 40 #include <linux/utsname.h> 41 #include <linux/pagemap.h> 42 #include <linux/sunrpc/svcauth_gss.h> 43 #include <linux/sunrpc/addr.h> 44 #include <linux/xattr.h> 45 #include <uapi/linux/xattr.h> 46 47 #include "idmap.h" 48 #include "acl.h" 49 #include "xdr4.h" 50 #include "vfs.h" 51 #include "state.h" 52 #include "cache.h" 53 #include "netns.h" 54 #include "pnfs.h" 55 #include "filecache.h" 56 57 #include "trace.h" 58 59 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 60 #include <linux/security.h> 61 #endif 62 63 64 #define NFSDDBG_FACILITY NFSDDBG_XDR 65 66 const u32 nfsd_suppattrs[3][3] = { 67 {NFSD4_SUPPORTED_ATTRS_WORD0, 68 NFSD4_SUPPORTED_ATTRS_WORD1, 69 NFSD4_SUPPORTED_ATTRS_WORD2}, 70 71 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 72 NFSD4_1_SUPPORTED_ATTRS_WORD1, 73 NFSD4_1_SUPPORTED_ATTRS_WORD2}, 74 75 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 76 NFSD4_1_SUPPORTED_ATTRS_WORD1, 77 NFSD4_2_SUPPORTED_ATTRS_WORD2}, 78 }; 79 80 /* 81 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing 82 * directory in order to indicate to the client that a filesystem boundary is present 83 * We use a fixed fsid for a referral 84 */ 85 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL 86 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL 87 88 static __be32 89 check_filename(char *str, int len) 90 { 91 int i; 92 93 if (len == 0) 94 return nfserr_inval; 95 if (len > NFS4_MAXNAMLEN) 96 return nfserr_nametoolong; 97 if (isdotent(str, len)) 98 return nfserr_badname; 99 for (i = 0; i < len; i++) 100 if (str[i] == '/') 101 return nfserr_badname; 102 return 0; 103 } 104 105 static int zero_clientid(clientid_t *clid) 106 { 107 return (clid->cl_boot == 0) && (clid->cl_id == 0); 108 } 109 110 /** 111 * svcxdr_tmpalloc - allocate memory to be freed after compound processing 112 * @argp: NFSv4 compound argument structure 113 * @len: length of buffer to allocate 114 * 115 * Allocates a buffer of size @len to be freed when processing the compound 116 * operation described in @argp finishes. 117 */ 118 static void * 119 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len) 120 { 121 struct svcxdr_tmpbuf *tb; 122 123 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL); 124 if (!tb) 125 return NULL; 126 tb->next = argp->to_free; 127 argp->to_free = tb; 128 return tb->buf; 129 } 130 131 /* 132 * For xdr strings that need to be passed to other kernel api's 133 * as null-terminated strings. 134 * 135 * Note null-terminating in place usually isn't safe since the 136 * buffer might end on a page boundary. 137 */ 138 static char * 139 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len) 140 { 141 char *p = svcxdr_tmpalloc(argp, len + 1); 142 143 if (!p) 144 return NULL; 145 memcpy(p, buf, len); 146 p[len] = '\0'; 147 return p; 148 } 149 150 static void * 151 svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len) 152 { 153 __be32 *tmp; 154 155 /* 156 * The location of the decoded data item is stable, 157 * so @p is OK to use. This is the common case. 158 */ 159 if (p != argp->xdr->scratch.iov_base) 160 return p; 161 162 tmp = svcxdr_tmpalloc(argp, len); 163 if (!tmp) 164 return NULL; 165 memcpy(tmp, p, len); 166 return tmp; 167 } 168 169 /* 170 * NFSv4 basic data type decoders 171 */ 172 173 /* 174 * This helper handles variable-length opaques which belong to protocol 175 * elements that this implementation does not support. 176 */ 177 static __be32 178 nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen) 179 { 180 u32 len; 181 182 if (xdr_stream_decode_u32(argp->xdr, &len) < 0) 183 return nfserr_bad_xdr; 184 if (maxlen && len > maxlen) 185 return nfserr_bad_xdr; 186 if (!xdr_inline_decode(argp->xdr, len)) 187 return nfserr_bad_xdr; 188 189 return nfs_ok; 190 } 191 192 static __be32 193 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) 194 { 195 __be32 *p; 196 u32 len; 197 198 if (xdr_stream_decode_u32(argp->xdr, &len) < 0) 199 return nfserr_bad_xdr; 200 if (len == 0 || len > NFS4_OPAQUE_LIMIT) 201 return nfserr_bad_xdr; 202 p = xdr_inline_decode(argp->xdr, len); 203 if (!p) 204 return nfserr_bad_xdr; 205 o->data = svcxdr_savemem(argp, p, len); 206 if (!o->data) 207 return nfserr_jukebox; 208 o->len = len; 209 210 return nfs_ok; 211 } 212 213 static __be32 214 nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp) 215 { 216 __be32 *p, status; 217 218 if (xdr_stream_decode_u32(argp->xdr, lenp) < 0) 219 return nfserr_bad_xdr; 220 p = xdr_inline_decode(argp->xdr, *lenp); 221 if (!p) 222 return nfserr_bad_xdr; 223 status = check_filename((char *)p, *lenp); 224 if (status) 225 return status; 226 *namp = svcxdr_savemem(argp, p, *lenp); 227 if (!*namp) 228 return nfserr_jukebox; 229 230 return nfs_ok; 231 } 232 233 static __be32 234 nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv) 235 { 236 __be32 *p; 237 238 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3); 239 if (!p) 240 return nfserr_bad_xdr; 241 p = xdr_decode_hyper(p, &tv->tv_sec); 242 tv->tv_nsec = be32_to_cpup(p++); 243 if (tv->tv_nsec >= (u32)1000000000) 244 return nfserr_inval; 245 return nfs_ok; 246 } 247 248 static __be32 249 nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf) 250 { 251 __be32 *p; 252 253 p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE); 254 if (!p) 255 return nfserr_bad_xdr; 256 memcpy(verf->data, p, sizeof(verf->data)); 257 return nfs_ok; 258 } 259 260 /** 261 * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4 262 * @argp: NFSv4 compound argument structure 263 * @bmval: pointer to an array of u32's to decode into 264 * @bmlen: size of the @bmval array 265 * 266 * The server needs to return nfs_ok rather than nfserr_bad_xdr when 267 * encountering bitmaps containing bits it does not recognize. This 268 * includes bits in bitmap words past WORDn, where WORDn is the last 269 * bitmap WORD the implementation currently supports. Thus we are 270 * careful here to simply ignore bits in bitmap words that this 271 * implementation has yet to support explicitly. 272 * 273 * Return values: 274 * %nfs_ok: @bmval populated successfully 275 * %nfserr_bad_xdr: the encoded bitmap was invalid 276 */ 277 static __be32 278 nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen) 279 { 280 ssize_t status; 281 282 status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen); 283 return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok; 284 } 285 286 static __be32 287 nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace) 288 { 289 __be32 *p, status; 290 u32 length; 291 292 if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0) 293 return nfserr_bad_xdr; 294 if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0) 295 return nfserr_bad_xdr; 296 if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0) 297 return nfserr_bad_xdr; 298 299 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 300 return nfserr_bad_xdr; 301 p = xdr_inline_decode(argp->xdr, length); 302 if (!p) 303 return nfserr_bad_xdr; 304 ace->whotype = nfs4_acl_get_whotype((char *)p, length); 305 if (ace->whotype != NFS4_ACL_WHO_NAMED) 306 status = nfs_ok; 307 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 308 status = nfsd_map_name_to_gid(argp->rqstp, 309 (char *)p, length, &ace->who_gid); 310 else 311 status = nfsd_map_name_to_uid(argp->rqstp, 312 (char *)p, length, &ace->who_uid); 313 314 return status; 315 } 316 317 /* A counted array of nfsace4's */ 318 static noinline __be32 319 nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl) 320 { 321 struct nfs4_ace *ace; 322 __be32 status; 323 u32 count; 324 325 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 326 return nfserr_bad_xdr; 327 328 if (count > xdr_stream_remaining(argp->xdr) / 20) 329 /* 330 * Even with 4-byte names there wouldn't be 331 * space for that many aces; something fishy is 332 * going on: 333 */ 334 return nfserr_fbig; 335 336 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count)); 337 if (*acl == NULL) 338 return nfserr_jukebox; 339 340 (*acl)->naces = count; 341 for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) { 342 status = nfsd4_decode_nfsace4(argp, ace); 343 if (status) 344 return status; 345 } 346 347 return nfs_ok; 348 } 349 350 static noinline __be32 351 nfsd4_decode_security_label(struct nfsd4_compoundargs *argp, 352 struct xdr_netobj *label) 353 { 354 u32 lfs, pi, length; 355 __be32 *p; 356 357 if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0) 358 return nfserr_bad_xdr; 359 if (xdr_stream_decode_u32(argp->xdr, &pi) < 0) 360 return nfserr_bad_xdr; 361 362 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 363 return nfserr_bad_xdr; 364 if (length > NFS4_MAXLABELLEN) 365 return nfserr_badlabel; 366 p = xdr_inline_decode(argp->xdr, length); 367 if (!p) 368 return nfserr_bad_xdr; 369 label->len = length; 370 label->data = svcxdr_dupstr(argp, p, length); 371 if (!label->data) 372 return nfserr_jukebox; 373 374 return nfs_ok; 375 } 376 377 static __be32 378 nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen, 379 struct iattr *iattr, struct nfs4_acl **acl, 380 struct xdr_netobj *label, int *umask) 381 { 382 unsigned int starting_pos; 383 u32 attrlist4_count; 384 __be32 *p, status; 385 386 iattr->ia_valid = 0; 387 status = nfsd4_decode_bitmap4(argp, bmval, bmlen); 388 if (status) 389 return nfserr_bad_xdr; 390 391 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 392 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 393 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) { 394 if (nfsd_attrs_supported(argp->minorversion, bmval)) 395 return nfserr_inval; 396 return nfserr_attrnotsupp; 397 } 398 399 if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0) 400 return nfserr_bad_xdr; 401 starting_pos = xdr_stream_pos(argp->xdr); 402 403 if (bmval[0] & FATTR4_WORD0_SIZE) { 404 u64 size; 405 406 if (xdr_stream_decode_u64(argp->xdr, &size) < 0) 407 return nfserr_bad_xdr; 408 iattr->ia_size = size; 409 iattr->ia_valid |= ATTR_SIZE; 410 } 411 if (bmval[0] & FATTR4_WORD0_ACL) { 412 status = nfsd4_decode_acl(argp, acl); 413 if (status) 414 return status; 415 } else 416 *acl = NULL; 417 if (bmval[1] & FATTR4_WORD1_MODE) { 418 u32 mode; 419 420 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) 421 return nfserr_bad_xdr; 422 iattr->ia_mode = mode; 423 iattr->ia_mode &= (S_IFMT | S_IALLUGO); 424 iattr->ia_valid |= ATTR_MODE; 425 } 426 if (bmval[1] & FATTR4_WORD1_OWNER) { 427 u32 length; 428 429 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 430 return nfserr_bad_xdr; 431 p = xdr_inline_decode(argp->xdr, length); 432 if (!p) 433 return nfserr_bad_xdr; 434 status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length, 435 &iattr->ia_uid); 436 if (status) 437 return status; 438 iattr->ia_valid |= ATTR_UID; 439 } 440 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { 441 u32 length; 442 443 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 444 return nfserr_bad_xdr; 445 p = xdr_inline_decode(argp->xdr, length); 446 if (!p) 447 return nfserr_bad_xdr; 448 status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length, 449 &iattr->ia_gid); 450 if (status) 451 return status; 452 iattr->ia_valid |= ATTR_GID; 453 } 454 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { 455 u32 set_it; 456 457 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) 458 return nfserr_bad_xdr; 459 switch (set_it) { 460 case NFS4_SET_TO_CLIENT_TIME: 461 status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime); 462 if (status) 463 return status; 464 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); 465 break; 466 case NFS4_SET_TO_SERVER_TIME: 467 iattr->ia_valid |= ATTR_ATIME; 468 break; 469 default: 470 return nfserr_bad_xdr; 471 } 472 } 473 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { 474 u32 set_it; 475 476 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) 477 return nfserr_bad_xdr; 478 switch (set_it) { 479 case NFS4_SET_TO_CLIENT_TIME: 480 status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime); 481 if (status) 482 return status; 483 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); 484 break; 485 case NFS4_SET_TO_SERVER_TIME: 486 iattr->ia_valid |= ATTR_MTIME; 487 break; 488 default: 489 return nfserr_bad_xdr; 490 } 491 } 492 label->len = 0; 493 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) && 494 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { 495 status = nfsd4_decode_security_label(argp, label); 496 if (status) 497 return status; 498 } 499 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) { 500 u32 mode, mask; 501 502 if (!umask) 503 return nfserr_bad_xdr; 504 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) 505 return nfserr_bad_xdr; 506 iattr->ia_mode = mode & (S_IFMT | S_IALLUGO); 507 if (xdr_stream_decode_u32(argp->xdr, &mask) < 0) 508 return nfserr_bad_xdr; 509 *umask = mask & S_IRWXUGO; 510 iattr->ia_valid |= ATTR_MODE; 511 } 512 513 /* request sanity: did attrlist4 contain the expected number of words? */ 514 if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos) 515 return nfserr_bad_xdr; 516 517 return nfs_ok; 518 } 519 520 static __be32 521 nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid) 522 { 523 __be32 *p; 524 525 p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE); 526 if (!p) 527 return nfserr_bad_xdr; 528 sid->si_generation = be32_to_cpup(p++); 529 memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque)); 530 return nfs_ok; 531 } 532 533 static __be32 534 nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid) 535 { 536 __be32 *p; 537 538 p = xdr_inline_decode(argp->xdr, sizeof(__be64)); 539 if (!p) 540 return nfserr_bad_xdr; 541 memcpy(clientid, p, sizeof(*clientid)); 542 return nfs_ok; 543 } 544 545 static __be32 546 nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp, 547 clientid_t *clientid, struct xdr_netobj *owner) 548 { 549 __be32 status; 550 551 status = nfsd4_decode_clientid4(argp, clientid); 552 if (status) 553 return status; 554 return nfsd4_decode_opaque(argp, owner); 555 } 556 557 #ifdef CONFIG_NFSD_PNFS 558 static __be32 559 nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp, 560 struct nfsd4_deviceid *devid) 561 { 562 __be32 *p; 563 564 p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE); 565 if (!p) 566 return nfserr_bad_xdr; 567 memcpy(devid, p, sizeof(*devid)); 568 return nfs_ok; 569 } 570 571 static __be32 572 nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp, 573 struct nfsd4_layoutcommit *lcp) 574 { 575 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0) 576 return nfserr_bad_xdr; 577 if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES) 578 return nfserr_bad_xdr; 579 if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX) 580 return nfserr_bad_xdr; 581 582 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0) 583 return nfserr_bad_xdr; 584 if (lcp->lc_up_len > 0) { 585 lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len); 586 if (!lcp->lc_up_layout) 587 return nfserr_bad_xdr; 588 } 589 590 return nfs_ok; 591 } 592 593 static __be32 594 nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp, 595 struct nfsd4_layoutreturn *lrp) 596 { 597 __be32 status; 598 599 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0) 600 return nfserr_bad_xdr; 601 switch (lrp->lr_return_type) { 602 case RETURN_FILE: 603 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0) 604 return nfserr_bad_xdr; 605 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0) 606 return nfserr_bad_xdr; 607 status = nfsd4_decode_stateid4(argp, &lrp->lr_sid); 608 if (status) 609 return status; 610 if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0) 611 return nfserr_bad_xdr; 612 if (lrp->lrf_body_len > 0) { 613 lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len); 614 if (!lrp->lrf_body) 615 return nfserr_bad_xdr; 616 } 617 break; 618 case RETURN_FSID: 619 case RETURN_ALL: 620 lrp->lr_seg.offset = 0; 621 lrp->lr_seg.length = NFS4_MAX_UINT64; 622 break; 623 default: 624 return nfserr_bad_xdr; 625 } 626 627 return nfs_ok; 628 } 629 630 #endif /* CONFIG_NFSD_PNFS */ 631 632 static __be32 633 nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp, 634 struct nfs4_sessionid *sessionid) 635 { 636 __be32 *p; 637 638 p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN); 639 if (!p) 640 return nfserr_bad_xdr; 641 memcpy(sessionid->data, p, sizeof(sessionid->data)); 642 return nfs_ok; 643 } 644 645 /* Defined in Appendix A of RFC 5531 */ 646 static __be32 647 nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp, 648 struct nfsd4_cb_sec *cbs) 649 { 650 u32 stamp, gidcount, uid, gid; 651 __be32 *p, status; 652 653 if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0) 654 return nfserr_bad_xdr; 655 /* machine name */ 656 status = nfsd4_decode_ignored_string(argp, 255); 657 if (status) 658 return status; 659 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0) 660 return nfserr_bad_xdr; 661 if (xdr_stream_decode_u32(argp->xdr, &gid) < 0) 662 return nfserr_bad_xdr; 663 if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0) 664 return nfserr_bad_xdr; 665 if (gidcount > 16) 666 return nfserr_bad_xdr; 667 p = xdr_inline_decode(argp->xdr, gidcount << 2); 668 if (!p) 669 return nfserr_bad_xdr; 670 if (cbs->flavor == (u32)(-1)) { 671 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp); 672 673 kuid_t kuid = make_kuid(userns, uid); 674 kgid_t kgid = make_kgid(userns, gid); 675 if (uid_valid(kuid) && gid_valid(kgid)) { 676 cbs->uid = kuid; 677 cbs->gid = kgid; 678 cbs->flavor = RPC_AUTH_UNIX; 679 } else { 680 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n"); 681 } 682 } 683 684 return nfs_ok; 685 } 686 687 static __be32 688 nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp, 689 struct nfsd4_cb_sec *cbs) 690 { 691 __be32 status; 692 u32 service; 693 694 dprintk("RPC_AUTH_GSS callback secflavor not supported!\n"); 695 696 if (xdr_stream_decode_u32(argp->xdr, &service) < 0) 697 return nfserr_bad_xdr; 698 if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY) 699 return nfserr_bad_xdr; 700 /* gcbp_handle_from_server */ 701 status = nfsd4_decode_ignored_string(argp, 0); 702 if (status) 703 return status; 704 /* gcbp_handle_from_client */ 705 status = nfsd4_decode_ignored_string(argp, 0); 706 if (status) 707 return status; 708 709 return nfs_ok; 710 } 711 712 /* a counted array of callback_sec_parms4 items */ 713 static __be32 714 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) 715 { 716 u32 i, secflavor, nr_secflavs; 717 __be32 status; 718 719 /* callback_sec_params4 */ 720 if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0) 721 return nfserr_bad_xdr; 722 if (nr_secflavs) 723 cbs->flavor = (u32)(-1); 724 else 725 /* Is this legal? Be generous, take it to mean AUTH_NONE: */ 726 cbs->flavor = 0; 727 728 for (i = 0; i < nr_secflavs; ++i) { 729 if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0) 730 return nfserr_bad_xdr; 731 switch (secflavor) { 732 case RPC_AUTH_NULL: 733 /* void */ 734 if (cbs->flavor == (u32)(-1)) 735 cbs->flavor = RPC_AUTH_NULL; 736 break; 737 case RPC_AUTH_UNIX: 738 status = nfsd4_decode_authsys_parms(argp, cbs); 739 if (status) 740 return status; 741 break; 742 case RPC_AUTH_GSS: 743 status = nfsd4_decode_gss_cb_handles4(argp, cbs); 744 if (status) 745 return status; 746 break; 747 default: 748 return nfserr_inval; 749 } 750 } 751 752 return nfs_ok; 753 } 754 755 756 /* 757 * NFSv4 operation argument decoders 758 */ 759 760 static __be32 761 nfsd4_decode_access(struct nfsd4_compoundargs *argp, 762 struct nfsd4_access *access) 763 { 764 if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0) 765 return nfserr_bad_xdr; 766 return nfs_ok; 767 } 768 769 static __be32 770 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close) 771 { 772 if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0) 773 return nfserr_bad_xdr; 774 return nfsd4_decode_stateid4(argp, &close->cl_stateid); 775 } 776 777 778 static __be32 779 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit) 780 { 781 if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0) 782 return nfserr_bad_xdr; 783 if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0) 784 return nfserr_bad_xdr; 785 return nfs_ok; 786 } 787 788 static __be32 789 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create) 790 { 791 __be32 *p, status; 792 793 if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0) 794 return nfserr_bad_xdr; 795 switch (create->cr_type) { 796 case NF4LNK: 797 if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0) 798 return nfserr_bad_xdr; 799 p = xdr_inline_decode(argp->xdr, create->cr_datalen); 800 if (!p) 801 return nfserr_bad_xdr; 802 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen); 803 if (!create->cr_data) 804 return nfserr_jukebox; 805 break; 806 case NF4BLK: 807 case NF4CHR: 808 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0) 809 return nfserr_bad_xdr; 810 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0) 811 return nfserr_bad_xdr; 812 break; 813 case NF4SOCK: 814 case NF4FIFO: 815 case NF4DIR: 816 default: 817 break; 818 } 819 status = nfsd4_decode_component4(argp, &create->cr_name, 820 &create->cr_namelen); 821 if (status) 822 return status; 823 status = nfsd4_decode_fattr4(argp, create->cr_bmval, 824 ARRAY_SIZE(create->cr_bmval), 825 &create->cr_iattr, &create->cr_acl, 826 &create->cr_label, &create->cr_umask); 827 if (status) 828 return status; 829 830 return nfs_ok; 831 } 832 833 static inline __be32 834 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr) 835 { 836 return nfsd4_decode_stateid4(argp, &dr->dr_stateid); 837 } 838 839 static inline __be32 840 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr) 841 { 842 return nfsd4_decode_bitmap4(argp, getattr->ga_bmval, 843 ARRAY_SIZE(getattr->ga_bmval)); 844 } 845 846 static __be32 847 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link) 848 { 849 return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen); 850 } 851 852 static __be32 853 nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp, 854 struct nfsd4_lock *lock) 855 { 856 __be32 status; 857 858 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0) 859 return nfserr_bad_xdr; 860 status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid); 861 if (status) 862 return status; 863 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0) 864 return nfserr_bad_xdr; 865 return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid, 866 &lock->lk_new_owner); 867 } 868 869 static __be32 870 nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp, 871 struct nfsd4_lock *lock) 872 { 873 __be32 status; 874 875 status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid); 876 if (status) 877 return status; 878 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0) 879 return nfserr_bad_xdr; 880 881 return nfs_ok; 882 } 883 884 static __be32 885 nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) 886 { 887 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0) 888 return nfserr_bad_xdr; 889 if (lock->lk_is_new) 890 return nfsd4_decode_open_to_lock_owner4(argp, lock); 891 return nfsd4_decode_exist_lock_owner4(argp, lock); 892 } 893 894 static __be32 895 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) 896 { 897 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0) 898 return nfserr_bad_xdr; 899 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) 900 return nfserr_bad_xdr; 901 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0) 902 return nfserr_bad_xdr; 903 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0) 904 return nfserr_bad_xdr; 905 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0) 906 return nfserr_bad_xdr; 907 return nfsd4_decode_locker4(argp, lock); 908 } 909 910 static __be32 911 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt) 912 { 913 if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0) 914 return nfserr_bad_xdr; 915 if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) 916 return nfserr_bad_xdr; 917 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0) 918 return nfserr_bad_xdr; 919 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0) 920 return nfserr_bad_xdr; 921 return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid, 922 &lockt->lt_owner); 923 } 924 925 static __be32 926 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku) 927 { 928 __be32 status; 929 930 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0) 931 return nfserr_bad_xdr; 932 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) 933 return nfserr_bad_xdr; 934 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0) 935 return nfserr_bad_xdr; 936 status = nfsd4_decode_stateid4(argp, &locku->lu_stateid); 937 if (status) 938 return status; 939 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0) 940 return nfserr_bad_xdr; 941 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0) 942 return nfserr_bad_xdr; 943 944 return nfs_ok; 945 } 946 947 static __be32 948 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup) 949 { 950 return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len); 951 } 952 953 static __be32 954 nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 955 { 956 __be32 status; 957 958 if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0) 959 return nfserr_bad_xdr; 960 switch (open->op_createmode) { 961 case NFS4_CREATE_UNCHECKED: 962 case NFS4_CREATE_GUARDED: 963 status = nfsd4_decode_fattr4(argp, open->op_bmval, 964 ARRAY_SIZE(open->op_bmval), 965 &open->op_iattr, &open->op_acl, 966 &open->op_label, &open->op_umask); 967 if (status) 968 return status; 969 break; 970 case NFS4_CREATE_EXCLUSIVE: 971 status = nfsd4_decode_verifier4(argp, &open->op_verf); 972 if (status) 973 return status; 974 break; 975 case NFS4_CREATE_EXCLUSIVE4_1: 976 if (argp->minorversion < 1) 977 return nfserr_bad_xdr; 978 status = nfsd4_decode_verifier4(argp, &open->op_verf); 979 if (status) 980 return status; 981 status = nfsd4_decode_fattr4(argp, open->op_bmval, 982 ARRAY_SIZE(open->op_bmval), 983 &open->op_iattr, &open->op_acl, 984 &open->op_label, &open->op_umask); 985 if (status) 986 return status; 987 break; 988 default: 989 return nfserr_bad_xdr; 990 } 991 992 return nfs_ok; 993 } 994 995 static __be32 996 nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 997 { 998 __be32 status; 999 1000 if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0) 1001 return nfserr_bad_xdr; 1002 switch (open->op_create) { 1003 case NFS4_OPEN_NOCREATE: 1004 break; 1005 case NFS4_OPEN_CREATE: 1006 status = nfsd4_decode_createhow4(argp, open); 1007 if (status) 1008 return status; 1009 break; 1010 default: 1011 return nfserr_bad_xdr; 1012 } 1013 1014 return nfs_ok; 1015 } 1016 1017 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) 1018 { 1019 u32 w; 1020 1021 if (xdr_stream_decode_u32(argp->xdr, &w) < 0) 1022 return nfserr_bad_xdr; 1023 *share_access = w & NFS4_SHARE_ACCESS_MASK; 1024 *deleg_want = w & NFS4_SHARE_WANT_MASK; 1025 if (deleg_when) 1026 *deleg_when = w & NFS4_SHARE_WHEN_MASK; 1027 1028 switch (w & NFS4_SHARE_ACCESS_MASK) { 1029 case NFS4_SHARE_ACCESS_READ: 1030 case NFS4_SHARE_ACCESS_WRITE: 1031 case NFS4_SHARE_ACCESS_BOTH: 1032 break; 1033 default: 1034 return nfserr_bad_xdr; 1035 } 1036 w &= ~NFS4_SHARE_ACCESS_MASK; 1037 if (!w) 1038 return nfs_ok; 1039 if (!argp->minorversion) 1040 return nfserr_bad_xdr; 1041 switch (w & NFS4_SHARE_WANT_MASK) { 1042 case NFS4_SHARE_WANT_NO_PREFERENCE: 1043 case NFS4_SHARE_WANT_READ_DELEG: 1044 case NFS4_SHARE_WANT_WRITE_DELEG: 1045 case NFS4_SHARE_WANT_ANY_DELEG: 1046 case NFS4_SHARE_WANT_NO_DELEG: 1047 case NFS4_SHARE_WANT_CANCEL: 1048 break; 1049 default: 1050 return nfserr_bad_xdr; 1051 } 1052 w &= ~NFS4_SHARE_WANT_MASK; 1053 if (!w) 1054 return nfs_ok; 1055 1056 if (!deleg_when) /* open_downgrade */ 1057 return nfserr_inval; 1058 switch (w) { 1059 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: 1060 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: 1061 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | 1062 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): 1063 return nfs_ok; 1064 } 1065 return nfserr_bad_xdr; 1066 } 1067 1068 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) 1069 { 1070 if (xdr_stream_decode_u32(argp->xdr, x) < 0) 1071 return nfserr_bad_xdr; 1072 /* Note: unlike access bits, deny bits may be zero. */ 1073 if (*x & ~NFS4_SHARE_DENY_BOTH) 1074 return nfserr_bad_xdr; 1075 1076 return nfs_ok; 1077 } 1078 1079 static __be32 1080 nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp, 1081 struct nfsd4_open *open) 1082 { 1083 __be32 status; 1084 1085 if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0) 1086 return nfserr_bad_xdr; 1087 switch (open->op_claim_type) { 1088 case NFS4_OPEN_CLAIM_NULL: 1089 case NFS4_OPEN_CLAIM_DELEGATE_PREV: 1090 status = nfsd4_decode_component4(argp, &open->op_fname, 1091 &open->op_fnamelen); 1092 if (status) 1093 return status; 1094 break; 1095 case NFS4_OPEN_CLAIM_PREVIOUS: 1096 if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0) 1097 return nfserr_bad_xdr; 1098 break; 1099 case NFS4_OPEN_CLAIM_DELEGATE_CUR: 1100 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); 1101 if (status) 1102 return status; 1103 status = nfsd4_decode_component4(argp, &open->op_fname, 1104 &open->op_fnamelen); 1105 if (status) 1106 return status; 1107 break; 1108 case NFS4_OPEN_CLAIM_FH: 1109 case NFS4_OPEN_CLAIM_DELEG_PREV_FH: 1110 if (argp->minorversion < 1) 1111 return nfserr_bad_xdr; 1112 /* void */ 1113 break; 1114 case NFS4_OPEN_CLAIM_DELEG_CUR_FH: 1115 if (argp->minorversion < 1) 1116 return nfserr_bad_xdr; 1117 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); 1118 if (status) 1119 return status; 1120 break; 1121 default: 1122 return nfserr_bad_xdr; 1123 } 1124 1125 return nfs_ok; 1126 } 1127 1128 static __be32 1129 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 1130 { 1131 __be32 status; 1132 u32 dummy; 1133 1134 memset(open->op_bmval, 0, sizeof(open->op_bmval)); 1135 open->op_iattr.ia_valid = 0; 1136 open->op_openowner = NULL; 1137 1138 open->op_xdr_error = 0; 1139 if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0) 1140 return nfserr_bad_xdr; 1141 /* deleg_want is ignored */ 1142 status = nfsd4_decode_share_access(argp, &open->op_share_access, 1143 &open->op_deleg_want, &dummy); 1144 if (status) 1145 return status; 1146 status = nfsd4_decode_share_deny(argp, &open->op_share_deny); 1147 if (status) 1148 return status; 1149 status = nfsd4_decode_state_owner4(argp, &open->op_clientid, 1150 &open->op_owner); 1151 if (status) 1152 return status; 1153 status = nfsd4_decode_openflag4(argp, open); 1154 if (status) 1155 return status; 1156 return nfsd4_decode_open_claim4(argp, open); 1157 } 1158 1159 static __be32 1160 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf) 1161 { 1162 __be32 status; 1163 1164 if (argp->minorversion >= 1) 1165 return nfserr_notsupp; 1166 1167 status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid); 1168 if (status) 1169 return status; 1170 if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0) 1171 return nfserr_bad_xdr; 1172 1173 return nfs_ok; 1174 } 1175 1176 static __be32 1177 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down) 1178 { 1179 __be32 status; 1180 1181 status = nfsd4_decode_stateid4(argp, &open_down->od_stateid); 1182 if (status) 1183 return status; 1184 if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0) 1185 return nfserr_bad_xdr; 1186 /* deleg_want is ignored */ 1187 status = nfsd4_decode_share_access(argp, &open_down->od_share_access, 1188 &open_down->od_deleg_want, NULL); 1189 if (status) 1190 return status; 1191 return nfsd4_decode_share_deny(argp, &open_down->od_share_deny); 1192 } 1193 1194 static __be32 1195 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh) 1196 { 1197 __be32 *p; 1198 1199 if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0) 1200 return nfserr_bad_xdr; 1201 if (putfh->pf_fhlen > NFS4_FHSIZE) 1202 return nfserr_bad_xdr; 1203 p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen); 1204 if (!p) 1205 return nfserr_bad_xdr; 1206 putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen); 1207 if (!putfh->pf_fhval) 1208 return nfserr_jukebox; 1209 1210 return nfs_ok; 1211 } 1212 1213 static __be32 1214 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p) 1215 { 1216 if (argp->minorversion == 0) 1217 return nfs_ok; 1218 return nfserr_notsupp; 1219 } 1220 1221 static __be32 1222 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read) 1223 { 1224 __be32 status; 1225 1226 status = nfsd4_decode_stateid4(argp, &read->rd_stateid); 1227 if (status) 1228 return status; 1229 if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0) 1230 return nfserr_bad_xdr; 1231 if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0) 1232 return nfserr_bad_xdr; 1233 1234 return nfs_ok; 1235 } 1236 1237 static __be32 1238 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir) 1239 { 1240 __be32 status; 1241 1242 if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0) 1243 return nfserr_bad_xdr; 1244 status = nfsd4_decode_verifier4(argp, &readdir->rd_verf); 1245 if (status) 1246 return status; 1247 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0) 1248 return nfserr_bad_xdr; 1249 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0) 1250 return nfserr_bad_xdr; 1251 if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval, 1252 ARRAY_SIZE(readdir->rd_bmval)) < 0) 1253 return nfserr_bad_xdr; 1254 1255 return nfs_ok; 1256 } 1257 1258 static __be32 1259 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove) 1260 { 1261 return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen); 1262 } 1263 1264 static __be32 1265 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename) 1266 { 1267 __be32 status; 1268 1269 status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen); 1270 if (status) 1271 return status; 1272 return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen); 1273 } 1274 1275 static __be32 1276 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid) 1277 { 1278 return nfsd4_decode_clientid4(argp, clientid); 1279 } 1280 1281 static __be32 1282 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, 1283 struct nfsd4_secinfo *secinfo) 1284 { 1285 return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen); 1286 } 1287 1288 static __be32 1289 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr) 1290 { 1291 __be32 status; 1292 1293 status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid); 1294 if (status) 1295 return status; 1296 return nfsd4_decode_fattr4(argp, setattr->sa_bmval, 1297 ARRAY_SIZE(setattr->sa_bmval), 1298 &setattr->sa_iattr, &setattr->sa_acl, 1299 &setattr->sa_label, NULL); 1300 } 1301 1302 static __be32 1303 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid) 1304 { 1305 __be32 *p, status; 1306 1307 if (argp->minorversion >= 1) 1308 return nfserr_notsupp; 1309 1310 status = nfsd4_decode_verifier4(argp, &setclientid->se_verf); 1311 if (status) 1312 return status; 1313 status = nfsd4_decode_opaque(argp, &setclientid->se_name); 1314 if (status) 1315 return status; 1316 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0) 1317 return nfserr_bad_xdr; 1318 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0) 1319 return nfserr_bad_xdr; 1320 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len); 1321 if (!p) 1322 return nfserr_bad_xdr; 1323 setclientid->se_callback_netid_val = svcxdr_savemem(argp, p, 1324 setclientid->se_callback_netid_len); 1325 if (!setclientid->se_callback_netid_val) 1326 return nfserr_jukebox; 1327 1328 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0) 1329 return nfserr_bad_xdr; 1330 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len); 1331 if (!p) 1332 return nfserr_bad_xdr; 1333 setclientid->se_callback_addr_val = svcxdr_savemem(argp, p, 1334 setclientid->se_callback_addr_len); 1335 if (!setclientid->se_callback_addr_val) 1336 return nfserr_jukebox; 1337 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0) 1338 return nfserr_bad_xdr; 1339 1340 return nfs_ok; 1341 } 1342 1343 static __be32 1344 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c) 1345 { 1346 __be32 status; 1347 1348 if (argp->minorversion >= 1) 1349 return nfserr_notsupp; 1350 1351 status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid); 1352 if (status) 1353 return status; 1354 return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm); 1355 } 1356 1357 /* Also used for NVERIFY */ 1358 static __be32 1359 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify) 1360 { 1361 __be32 *p, status; 1362 1363 status = nfsd4_decode_bitmap4(argp, verify->ve_bmval, 1364 ARRAY_SIZE(verify->ve_bmval)); 1365 if (status) 1366 return status; 1367 1368 /* For convenience's sake, we compare raw xdr'd attributes in 1369 * nfsd4_proc_verify */ 1370 1371 if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0) 1372 return nfserr_bad_xdr; 1373 p = xdr_inline_decode(argp->xdr, verify->ve_attrlen); 1374 if (!p) 1375 return nfserr_bad_xdr; 1376 verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen); 1377 if (!verify->ve_attrval) 1378 return nfserr_jukebox; 1379 1380 return nfs_ok; 1381 } 1382 1383 static __be32 1384 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write) 1385 { 1386 __be32 status; 1387 1388 status = nfsd4_decode_stateid4(argp, &write->wr_stateid); 1389 if (status) 1390 return status; 1391 if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0) 1392 return nfserr_bad_xdr; 1393 if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0) 1394 return nfserr_bad_xdr; 1395 if (write->wr_stable_how > NFS_FILE_SYNC) 1396 return nfserr_bad_xdr; 1397 if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0) 1398 return nfserr_bad_xdr; 1399 if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen)) 1400 return nfserr_bad_xdr; 1401 1402 return nfs_ok; 1403 } 1404 1405 static __be32 1406 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner) 1407 { 1408 __be32 status; 1409 1410 if (argp->minorversion >= 1) 1411 return nfserr_notsupp; 1412 1413 status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid, 1414 &rlockowner->rl_owner); 1415 if (status) 1416 return status; 1417 1418 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) 1419 return nfserr_inval; 1420 1421 return nfs_ok; 1422 } 1423 1424 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc) 1425 { 1426 if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0) 1427 return nfserr_bad_xdr; 1428 return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); 1429 } 1430 1431 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts) 1432 { 1433 u32 use_conn_in_rdma_mode; 1434 __be32 status; 1435 1436 status = nfsd4_decode_sessionid4(argp, &bcts->sessionid); 1437 if (status) 1438 return status; 1439 if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0) 1440 return nfserr_bad_xdr; 1441 if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0) 1442 return nfserr_bad_xdr; 1443 1444 return nfs_ok; 1445 } 1446 1447 static __be32 1448 nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp, 1449 struct nfsd4_exchange_id *exid) 1450 { 1451 __be32 status; 1452 1453 status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce, 1454 ARRAY_SIZE(exid->spo_must_enforce)); 1455 if (status) 1456 return nfserr_bad_xdr; 1457 status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow, 1458 ARRAY_SIZE(exid->spo_must_allow)); 1459 if (status) 1460 return nfserr_bad_xdr; 1461 1462 return nfs_ok; 1463 } 1464 1465 /* 1466 * This implementation currently does not support SP4_SSV. 1467 * This decoder simply skips over these arguments. 1468 */ 1469 static noinline __be32 1470 nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp, 1471 struct nfsd4_exchange_id *exid) 1472 { 1473 u32 count, window, num_gss_handles; 1474 __be32 status; 1475 1476 /* ssp_ops */ 1477 status = nfsd4_decode_state_protect_ops(argp, exid); 1478 if (status) 1479 return status; 1480 1481 /* ssp_hash_algs<> */ 1482 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1483 return nfserr_bad_xdr; 1484 while (count--) { 1485 status = nfsd4_decode_ignored_string(argp, 0); 1486 if (status) 1487 return status; 1488 } 1489 1490 /* ssp_encr_algs<> */ 1491 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1492 return nfserr_bad_xdr; 1493 while (count--) { 1494 status = nfsd4_decode_ignored_string(argp, 0); 1495 if (status) 1496 return status; 1497 } 1498 1499 if (xdr_stream_decode_u32(argp->xdr, &window) < 0) 1500 return nfserr_bad_xdr; 1501 if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0) 1502 return nfserr_bad_xdr; 1503 1504 return nfs_ok; 1505 } 1506 1507 static __be32 1508 nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp, 1509 struct nfsd4_exchange_id *exid) 1510 { 1511 __be32 status; 1512 1513 if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0) 1514 return nfserr_bad_xdr; 1515 switch (exid->spa_how) { 1516 case SP4_NONE: 1517 break; 1518 case SP4_MACH_CRED: 1519 status = nfsd4_decode_state_protect_ops(argp, exid); 1520 if (status) 1521 return status; 1522 break; 1523 case SP4_SSV: 1524 status = nfsd4_decode_ssv_sp_parms(argp, exid); 1525 if (status) 1526 return status; 1527 break; 1528 default: 1529 return nfserr_bad_xdr; 1530 } 1531 1532 return nfs_ok; 1533 } 1534 1535 static __be32 1536 nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp, 1537 struct nfsd4_exchange_id *exid) 1538 { 1539 __be32 status; 1540 u32 count; 1541 1542 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1543 return nfserr_bad_xdr; 1544 switch (count) { 1545 case 0: 1546 break; 1547 case 1: 1548 /* Note that RFC 8881 places no length limit on 1549 * nii_domain, but this implementation permits no 1550 * more than NFS4_OPAQUE_LIMIT bytes */ 1551 status = nfsd4_decode_opaque(argp, &exid->nii_domain); 1552 if (status) 1553 return status; 1554 /* Note that RFC 8881 places no length limit on 1555 * nii_name, but this implementation permits no 1556 * more than NFS4_OPAQUE_LIMIT bytes */ 1557 status = nfsd4_decode_opaque(argp, &exid->nii_name); 1558 if (status) 1559 return status; 1560 status = nfsd4_decode_nfstime4(argp, &exid->nii_time); 1561 if (status) 1562 return status; 1563 break; 1564 default: 1565 return nfserr_bad_xdr; 1566 } 1567 1568 return nfs_ok; 1569 } 1570 1571 static __be32 1572 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, 1573 struct nfsd4_exchange_id *exid) 1574 { 1575 __be32 status; 1576 1577 status = nfsd4_decode_verifier4(argp, &exid->verifier); 1578 if (status) 1579 return status; 1580 status = nfsd4_decode_opaque(argp, &exid->clname); 1581 if (status) 1582 return status; 1583 if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0) 1584 return nfserr_bad_xdr; 1585 status = nfsd4_decode_state_protect4_a(argp, exid); 1586 if (status) 1587 return status; 1588 return nfsd4_decode_nfs_impl_id4(argp, exid); 1589 } 1590 1591 static __be32 1592 nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp, 1593 struct nfsd4_channel_attrs *ca) 1594 { 1595 __be32 *p; 1596 1597 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7); 1598 if (!p) 1599 return nfserr_bad_xdr; 1600 1601 /* headerpadsz is ignored */ 1602 p++; 1603 ca->maxreq_sz = be32_to_cpup(p++); 1604 ca->maxresp_sz = be32_to_cpup(p++); 1605 ca->maxresp_cached = be32_to_cpup(p++); 1606 ca->maxops = be32_to_cpup(p++); 1607 ca->maxreqs = be32_to_cpup(p++); 1608 ca->nr_rdma_attrs = be32_to_cpup(p); 1609 switch (ca->nr_rdma_attrs) { 1610 case 0: 1611 break; 1612 case 1: 1613 if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0) 1614 return nfserr_bad_xdr; 1615 break; 1616 default: 1617 return nfserr_bad_xdr; 1618 } 1619 1620 return nfs_ok; 1621 } 1622 1623 static __be32 1624 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, 1625 struct nfsd4_create_session *sess) 1626 { 1627 __be32 status; 1628 1629 status = nfsd4_decode_clientid4(argp, &sess->clientid); 1630 if (status) 1631 return status; 1632 if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0) 1633 return nfserr_bad_xdr; 1634 if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0) 1635 return nfserr_bad_xdr; 1636 status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel); 1637 if (status) 1638 return status; 1639 status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel); 1640 if (status) 1641 return status; 1642 if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0) 1643 return nfserr_bad_xdr; 1644 status = nfsd4_decode_cb_sec(argp, &sess->cb_sec); 1645 if (status) 1646 return status; 1647 1648 return nfs_ok; 1649 } 1650 1651 static __be32 1652 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, 1653 struct nfsd4_destroy_session *destroy_session) 1654 { 1655 return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid); 1656 } 1657 1658 static __be32 1659 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, 1660 struct nfsd4_free_stateid *free_stateid) 1661 { 1662 return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid); 1663 } 1664 1665 #ifdef CONFIG_NFSD_PNFS 1666 static __be32 1667 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp, 1668 struct nfsd4_getdeviceinfo *gdev) 1669 { 1670 __be32 status; 1671 1672 status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid); 1673 if (status) 1674 return status; 1675 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0) 1676 return nfserr_bad_xdr; 1677 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0) 1678 return nfserr_bad_xdr; 1679 if (xdr_stream_decode_uint32_array(argp->xdr, 1680 &gdev->gd_notify_types, 1) < 0) 1681 return nfserr_bad_xdr; 1682 1683 return nfs_ok; 1684 } 1685 1686 static __be32 1687 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp, 1688 struct nfsd4_layoutcommit *lcp) 1689 { 1690 __be32 *p, status; 1691 1692 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0) 1693 return nfserr_bad_xdr; 1694 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0) 1695 return nfserr_bad_xdr; 1696 if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0) 1697 return nfserr_bad_xdr; 1698 status = nfsd4_decode_stateid4(argp, &lcp->lc_sid); 1699 if (status) 1700 return status; 1701 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0) 1702 return nfserr_bad_xdr; 1703 if (lcp->lc_newoffset) { 1704 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0) 1705 return nfserr_bad_xdr; 1706 } else 1707 lcp->lc_last_wr = 0; 1708 p = xdr_inline_decode(argp->xdr, XDR_UNIT); 1709 if (!p) 1710 return nfserr_bad_xdr; 1711 if (xdr_item_is_present(p)) { 1712 status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime); 1713 if (status) 1714 return status; 1715 } else { 1716 lcp->lc_mtime.tv_nsec = UTIME_NOW; 1717 } 1718 return nfsd4_decode_layoutupdate4(argp, lcp); 1719 } 1720 1721 static __be32 1722 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp, 1723 struct nfsd4_layoutget *lgp) 1724 { 1725 __be32 status; 1726 1727 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0) 1728 return nfserr_bad_xdr; 1729 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0) 1730 return nfserr_bad_xdr; 1731 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0) 1732 return nfserr_bad_xdr; 1733 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0) 1734 return nfserr_bad_xdr; 1735 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0) 1736 return nfserr_bad_xdr; 1737 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0) 1738 return nfserr_bad_xdr; 1739 status = nfsd4_decode_stateid4(argp, &lgp->lg_sid); 1740 if (status) 1741 return status; 1742 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0) 1743 return nfserr_bad_xdr; 1744 1745 return nfs_ok; 1746 } 1747 1748 static __be32 1749 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp, 1750 struct nfsd4_layoutreturn *lrp) 1751 { 1752 if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0) 1753 return nfserr_bad_xdr; 1754 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0) 1755 return nfserr_bad_xdr; 1756 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0) 1757 return nfserr_bad_xdr; 1758 return nfsd4_decode_layoutreturn4(argp, lrp); 1759 } 1760 #endif /* CONFIG_NFSD_PNFS */ 1761 1762 static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, 1763 struct nfsd4_secinfo_no_name *sin) 1764 { 1765 if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0) 1766 return nfserr_bad_xdr; 1767 return nfs_ok; 1768 } 1769 1770 static __be32 1771 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, 1772 struct nfsd4_sequence *seq) 1773 { 1774 __be32 *p, status; 1775 1776 status = nfsd4_decode_sessionid4(argp, &seq->sessionid); 1777 if (status) 1778 return status; 1779 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4); 1780 if (!p) 1781 return nfserr_bad_xdr; 1782 seq->seqid = be32_to_cpup(p++); 1783 seq->slotid = be32_to_cpup(p++); 1784 seq->maxslots = be32_to_cpup(p++); 1785 seq->cachethis = be32_to_cpup(p); 1786 1787 return nfs_ok; 1788 } 1789 1790 static __be32 1791 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid) 1792 { 1793 struct nfsd4_test_stateid_id *stateid; 1794 __be32 status; 1795 u32 i; 1796 1797 if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0) 1798 return nfserr_bad_xdr; 1799 1800 INIT_LIST_HEAD(&test_stateid->ts_stateid_list); 1801 for (i = 0; i < test_stateid->ts_num_ids; i++) { 1802 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid)); 1803 if (!stateid) 1804 return nfserrno(-ENOMEM); /* XXX: not jukebox? */ 1805 INIT_LIST_HEAD(&stateid->ts_id_list); 1806 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); 1807 status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid); 1808 if (status) 1809 return status; 1810 } 1811 1812 return nfs_ok; 1813 } 1814 1815 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, 1816 struct nfsd4_destroy_clientid *dc) 1817 { 1818 return nfsd4_decode_clientid4(argp, &dc->clientid); 1819 } 1820 1821 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, 1822 struct nfsd4_reclaim_complete *rc) 1823 { 1824 if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0) 1825 return nfserr_bad_xdr; 1826 return nfs_ok; 1827 } 1828 1829 static __be32 1830 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp, 1831 struct nfsd4_fallocate *fallocate) 1832 { 1833 __be32 status; 1834 1835 status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid); 1836 if (status) 1837 return status; 1838 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0) 1839 return nfserr_bad_xdr; 1840 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0) 1841 return nfserr_bad_xdr; 1842 1843 return nfs_ok; 1844 } 1845 1846 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp, 1847 struct nl4_server *ns) 1848 { 1849 struct nfs42_netaddr *naddr; 1850 __be32 *p; 1851 1852 if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0) 1853 return nfserr_bad_xdr; 1854 1855 /* currently support for 1 inter-server source server */ 1856 switch (ns->nl4_type) { 1857 case NL4_NETADDR: 1858 naddr = &ns->u.nl4_addr; 1859 1860 if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0) 1861 return nfserr_bad_xdr; 1862 if (naddr->netid_len > RPCBIND_MAXNETIDLEN) 1863 return nfserr_bad_xdr; 1864 1865 p = xdr_inline_decode(argp->xdr, naddr->netid_len); 1866 if (!p) 1867 return nfserr_bad_xdr; 1868 memcpy(naddr->netid, p, naddr->netid_len); 1869 1870 if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0) 1871 return nfserr_bad_xdr; 1872 if (naddr->addr_len > RPCBIND_MAXUADDRLEN) 1873 return nfserr_bad_xdr; 1874 1875 p = xdr_inline_decode(argp->xdr, naddr->addr_len); 1876 if (!p) 1877 return nfserr_bad_xdr; 1878 memcpy(naddr->addr, p, naddr->addr_len); 1879 break; 1880 default: 1881 return nfserr_bad_xdr; 1882 } 1883 1884 return nfs_ok; 1885 } 1886 1887 static __be32 1888 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, struct nfsd4_copy *copy) 1889 { 1890 struct nl4_server *ns_dummy; 1891 u32 consecutive, i, count; 1892 __be32 status; 1893 1894 status = nfsd4_decode_stateid4(argp, ©->cp_src_stateid); 1895 if (status) 1896 return status; 1897 status = nfsd4_decode_stateid4(argp, ©->cp_dst_stateid); 1898 if (status) 1899 return status; 1900 if (xdr_stream_decode_u64(argp->xdr, ©->cp_src_pos) < 0) 1901 return nfserr_bad_xdr; 1902 if (xdr_stream_decode_u64(argp->xdr, ©->cp_dst_pos) < 0) 1903 return nfserr_bad_xdr; 1904 if (xdr_stream_decode_u64(argp->xdr, ©->cp_count) < 0) 1905 return nfserr_bad_xdr; 1906 /* ca_consecutive: we always do consecutive copies */ 1907 if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0) 1908 return nfserr_bad_xdr; 1909 if (xdr_stream_decode_u32(argp->xdr, ©->cp_synchronous) < 0) 1910 return nfserr_bad_xdr; 1911 1912 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1913 return nfserr_bad_xdr; 1914 copy->cp_intra = false; 1915 if (count == 0) { /* intra-server copy */ 1916 copy->cp_intra = true; 1917 return nfs_ok; 1918 } 1919 1920 /* decode all the supplied server addresses but use only the first */ 1921 status = nfsd4_decode_nl4_server(argp, ©->cp_src); 1922 if (status) 1923 return status; 1924 1925 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL); 1926 if (ns_dummy == NULL) 1927 return nfserrno(-ENOMEM); /* XXX: jukebox? */ 1928 for (i = 0; i < count - 1; i++) { 1929 status = nfsd4_decode_nl4_server(argp, ns_dummy); 1930 if (status) { 1931 kfree(ns_dummy); 1932 return status; 1933 } 1934 } 1935 kfree(ns_dummy); 1936 1937 return nfs_ok; 1938 } 1939 1940 static __be32 1941 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp, 1942 struct nfsd4_copy_notify *cn) 1943 { 1944 __be32 status; 1945 1946 status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid); 1947 if (status) 1948 return status; 1949 return nfsd4_decode_nl4_server(argp, &cn->cpn_dst); 1950 } 1951 1952 static __be32 1953 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp, 1954 struct nfsd4_offload_status *os) 1955 { 1956 return nfsd4_decode_stateid4(argp, &os->stateid); 1957 } 1958 1959 static __be32 1960 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, struct nfsd4_seek *seek) 1961 { 1962 __be32 status; 1963 1964 status = nfsd4_decode_stateid4(argp, &seek->seek_stateid); 1965 if (status) 1966 return status; 1967 if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0) 1968 return nfserr_bad_xdr; 1969 if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0) 1970 return nfserr_bad_xdr; 1971 1972 return nfs_ok; 1973 } 1974 1975 static __be32 1976 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, struct nfsd4_clone *clone) 1977 { 1978 __be32 status; 1979 1980 status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid); 1981 if (status) 1982 return status; 1983 status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid); 1984 if (status) 1985 return status; 1986 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0) 1987 return nfserr_bad_xdr; 1988 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0) 1989 return nfserr_bad_xdr; 1990 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0) 1991 return nfserr_bad_xdr; 1992 1993 return nfs_ok; 1994 } 1995 1996 /* 1997 * XDR data that is more than PAGE_SIZE in size is normally part of a 1998 * read or write. However, the size of extended attributes is limited 1999 * by the maximum request size, and then further limited by the underlying 2000 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX 2001 * is 64k). Since there is no kvec- or page-based interface to xattrs, 2002 * and we're not dealing with contiguous pages, we need to do some copying. 2003 */ 2004 2005 /* 2006 * Decode data into buffer. 2007 */ 2008 static __be32 2009 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr, 2010 char **bufp, u32 buflen) 2011 { 2012 struct page **pages = xdr->pages; 2013 struct kvec *head = xdr->head; 2014 char *tmp, *dp; 2015 u32 len; 2016 2017 if (buflen <= head->iov_len) { 2018 /* 2019 * We're in luck, the head has enough space. Just return 2020 * the head, no need for copying. 2021 */ 2022 *bufp = head->iov_base; 2023 return 0; 2024 } 2025 2026 tmp = svcxdr_tmpalloc(argp, buflen); 2027 if (tmp == NULL) 2028 return nfserr_jukebox; 2029 2030 dp = tmp; 2031 memcpy(dp, head->iov_base, head->iov_len); 2032 buflen -= head->iov_len; 2033 dp += head->iov_len; 2034 2035 while (buflen > 0) { 2036 len = min_t(u32, buflen, PAGE_SIZE); 2037 memcpy(dp, page_address(*pages), len); 2038 2039 buflen -= len; 2040 dp += len; 2041 pages++; 2042 } 2043 2044 *bufp = tmp; 2045 return 0; 2046 } 2047 2048 /* 2049 * Get a user extended attribute name from the XDR buffer. 2050 * It will not have the "user." prefix, so prepend it. 2051 * Lastly, check for nul characters in the name. 2052 */ 2053 static __be32 2054 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep) 2055 { 2056 char *name, *sp, *dp; 2057 u32 namelen, cnt; 2058 __be32 *p; 2059 2060 if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0) 2061 return nfserr_bad_xdr; 2062 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN)) 2063 return nfserr_nametoolong; 2064 if (namelen == 0) 2065 return nfserr_bad_xdr; 2066 p = xdr_inline_decode(argp->xdr, namelen); 2067 if (!p) 2068 return nfserr_bad_xdr; 2069 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1); 2070 if (!name) 2071 return nfserr_jukebox; 2072 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); 2073 2074 /* 2075 * Copy the extended attribute name over while checking for 0 2076 * characters. 2077 */ 2078 sp = (char *)p; 2079 dp = name + XATTR_USER_PREFIX_LEN; 2080 cnt = namelen; 2081 2082 while (cnt-- > 0) { 2083 if (*sp == '\0') 2084 return nfserr_bad_xdr; 2085 *dp++ = *sp++; 2086 } 2087 *dp = '\0'; 2088 2089 *namep = name; 2090 2091 return nfs_ok; 2092 } 2093 2094 /* 2095 * A GETXATTR op request comes without a length specifier. We just set the 2096 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum 2097 * channel reply size. nfsd_getxattr will probe the length of the xattr, 2098 * check it against getxa_len, and allocate + return the value. 2099 */ 2100 static __be32 2101 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp, 2102 struct nfsd4_getxattr *getxattr) 2103 { 2104 __be32 status; 2105 u32 maxcount; 2106 2107 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name); 2108 if (status) 2109 return status; 2110 2111 maxcount = svc_max_payload(argp->rqstp); 2112 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2113 2114 getxattr->getxa_len = maxcount; 2115 2116 return status; 2117 } 2118 2119 static __be32 2120 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp, 2121 struct nfsd4_setxattr *setxattr) 2122 { 2123 u32 flags, maxcount, size; 2124 __be32 status; 2125 2126 if (xdr_stream_decode_u32(argp->xdr, &flags) < 0) 2127 return nfserr_bad_xdr; 2128 2129 if (flags > SETXATTR4_REPLACE) 2130 return nfserr_inval; 2131 setxattr->setxa_flags = flags; 2132 2133 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name); 2134 if (status) 2135 return status; 2136 2137 maxcount = svc_max_payload(argp->rqstp); 2138 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2139 2140 if (xdr_stream_decode_u32(argp->xdr, &size) < 0) 2141 return nfserr_bad_xdr; 2142 if (size > maxcount) 2143 return nfserr_xattr2big; 2144 2145 setxattr->setxa_len = size; 2146 if (size > 0) { 2147 struct xdr_buf payload; 2148 2149 if (!xdr_stream_subsegment(argp->xdr, &payload, size)) 2150 return nfserr_bad_xdr; 2151 status = nfsd4_vbuf_from_vector(argp, &payload, 2152 &setxattr->setxa_buf, size); 2153 } 2154 2155 return nfs_ok; 2156 } 2157 2158 static __be32 2159 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp, 2160 struct nfsd4_listxattrs *listxattrs) 2161 { 2162 u32 maxcount; 2163 2164 if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0) 2165 return nfserr_bad_xdr; 2166 2167 /* 2168 * If the cookie is too large to have even one user.x attribute 2169 * plus trailing '\0' left in a maximum size buffer, it's invalid. 2170 */ 2171 if (listxattrs->lsxa_cookie >= 2172 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2))) 2173 return nfserr_badcookie; 2174 2175 if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0) 2176 return nfserr_bad_xdr; 2177 if (maxcount < 8) 2178 /* Always need at least 2 words (length and one character) */ 2179 return nfserr_inval; 2180 2181 maxcount = min(maxcount, svc_max_payload(argp->rqstp)); 2182 listxattrs->lsxa_maxcount = maxcount; 2183 2184 return nfs_ok; 2185 } 2186 2187 static __be32 2188 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp, 2189 struct nfsd4_removexattr *removexattr) 2190 { 2191 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name); 2192 } 2193 2194 static __be32 2195 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p) 2196 { 2197 return nfs_ok; 2198 } 2199 2200 static __be32 2201 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p) 2202 { 2203 return nfserr_notsupp; 2204 } 2205 2206 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *); 2207 2208 static const nfsd4_dec nfsd4_dec_ops[] = { 2209 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access, 2210 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close, 2211 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit, 2212 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create, 2213 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp, 2214 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn, 2215 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr, 2216 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop, 2217 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link, 2218 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock, 2219 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt, 2220 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku, 2221 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup, 2222 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop, 2223 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify, 2224 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open, 2225 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp, 2226 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm, 2227 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade, 2228 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh, 2229 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh, 2230 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop, 2231 [OP_READ] = (nfsd4_dec)nfsd4_decode_read, 2232 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir, 2233 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop, 2234 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove, 2235 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename, 2236 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew, 2237 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop, 2238 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop, 2239 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo, 2240 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr, 2241 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid, 2242 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm, 2243 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify, 2244 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write, 2245 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner, 2246 2247 /* new operations for NFSv4.1 */ 2248 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl, 2249 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session, 2250 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id, 2251 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session, 2252 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session, 2253 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid, 2254 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 2255 #ifdef CONFIG_NFSD_PNFS 2256 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_getdeviceinfo, 2257 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, 2258 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_layoutcommit, 2259 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_layoutget, 2260 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_layoutreturn, 2261 #else 2262 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp, 2263 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, 2264 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp, 2265 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp, 2266 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp, 2267 #endif 2268 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name, 2269 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence, 2270 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp, 2271 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid, 2272 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 2273 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid, 2274 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete, 2275 2276 /* new operations for NFSv4.2 */ 2277 [OP_ALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate, 2278 [OP_COPY] = (nfsd4_dec)nfsd4_decode_copy, 2279 [OP_COPY_NOTIFY] = (nfsd4_dec)nfsd4_decode_copy_notify, 2280 [OP_DEALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate, 2281 [OP_IO_ADVISE] = (nfsd4_dec)nfsd4_decode_notsupp, 2282 [OP_LAYOUTERROR] = (nfsd4_dec)nfsd4_decode_notsupp, 2283 [OP_LAYOUTSTATS] = (nfsd4_dec)nfsd4_decode_notsupp, 2284 [OP_OFFLOAD_CANCEL] = (nfsd4_dec)nfsd4_decode_offload_status, 2285 [OP_OFFLOAD_STATUS] = (nfsd4_dec)nfsd4_decode_offload_status, 2286 [OP_READ_PLUS] = (nfsd4_dec)nfsd4_decode_read, 2287 [OP_SEEK] = (nfsd4_dec)nfsd4_decode_seek, 2288 [OP_WRITE_SAME] = (nfsd4_dec)nfsd4_decode_notsupp, 2289 [OP_CLONE] = (nfsd4_dec)nfsd4_decode_clone, 2290 /* RFC 8276 extended atributes operations */ 2291 [OP_GETXATTR] = (nfsd4_dec)nfsd4_decode_getxattr, 2292 [OP_SETXATTR] = (nfsd4_dec)nfsd4_decode_setxattr, 2293 [OP_LISTXATTRS] = (nfsd4_dec)nfsd4_decode_listxattrs, 2294 [OP_REMOVEXATTR] = (nfsd4_dec)nfsd4_decode_removexattr, 2295 }; 2296 2297 static inline bool 2298 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) 2299 { 2300 if (op->opnum < FIRST_NFS4_OP) 2301 return false; 2302 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) 2303 return false; 2304 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) 2305 return false; 2306 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) 2307 return false; 2308 return true; 2309 } 2310 2311 static bool 2312 nfsd4_decode_compound(struct nfsd4_compoundargs *argp) 2313 { 2314 struct nfsd4_op *op; 2315 bool cachethis = false; 2316 int auth_slack= argp->rqstp->rq_auth_slack; 2317 int max_reply = auth_slack + 8; /* opcnt, status */ 2318 int readcount = 0; 2319 int readbytes = 0; 2320 __be32 *p; 2321 int i; 2322 2323 if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0) 2324 return false; 2325 max_reply += XDR_UNIT; 2326 argp->tag = NULL; 2327 if (unlikely(argp->taglen)) { 2328 if (argp->taglen > NFSD4_MAX_TAGLEN) 2329 return false; 2330 p = xdr_inline_decode(argp->xdr, argp->taglen); 2331 if (!p) 2332 return false; 2333 argp->tag = svcxdr_savemem(argp, p, argp->taglen); 2334 if (!argp->tag) 2335 return false; 2336 max_reply += xdr_align_size(argp->taglen); 2337 } 2338 2339 if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0) 2340 return false; 2341 if (xdr_stream_decode_u32(argp->xdr, &argp->opcnt) < 0) 2342 return false; 2343 2344 /* 2345 * NFS4ERR_RESOURCE is a more helpful error than GARBAGE_ARGS 2346 * here, so we return success at the xdr level so that 2347 * nfsd4_proc can handle this is an NFS-level error. 2348 */ 2349 if (argp->opcnt > NFSD_MAX_OPS_PER_COMPOUND) 2350 return true; 2351 2352 if (argp->opcnt > ARRAY_SIZE(argp->iops)) { 2353 argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL); 2354 if (!argp->ops) { 2355 argp->ops = argp->iops; 2356 dprintk("nfsd: couldn't allocate room for COMPOUND\n"); 2357 return false; 2358 } 2359 } 2360 2361 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) 2362 argp->opcnt = 0; 2363 2364 for (i = 0; i < argp->opcnt; i++) { 2365 op = &argp->ops[i]; 2366 op->replay = NULL; 2367 2368 if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0) 2369 return false; 2370 if (nfsd4_opnum_in_range(argp, op)) { 2371 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); 2372 if (op->status != nfs_ok) 2373 trace_nfsd_compound_decode_err(argp->rqstp, 2374 argp->opcnt, i, 2375 op->opnum, 2376 op->status); 2377 } else { 2378 op->opnum = OP_ILLEGAL; 2379 op->status = nfserr_op_illegal; 2380 } 2381 op->opdesc = OPDESC(op); 2382 /* 2383 * We'll try to cache the result in the DRC if any one 2384 * op in the compound wants to be cached: 2385 */ 2386 cachethis |= nfsd4_cache_this_op(op); 2387 2388 if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) { 2389 readcount++; 2390 readbytes += nfsd4_max_reply(argp->rqstp, op); 2391 } else 2392 max_reply += nfsd4_max_reply(argp->rqstp, op); 2393 /* 2394 * OP_LOCK and OP_LOCKT may return a conflicting lock. 2395 * (Special case because it will just skip encoding this 2396 * if it runs out of xdr buffer space, and it is the only 2397 * operation that behaves this way.) 2398 */ 2399 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT) 2400 max_reply += NFS4_OPAQUE_LIMIT; 2401 2402 if (op->status) { 2403 argp->opcnt = i+1; 2404 break; 2405 } 2406 } 2407 /* Sessions make the DRC unnecessary: */ 2408 if (argp->minorversion) 2409 cachethis = false; 2410 svc_reserve(argp->rqstp, max_reply + readbytes); 2411 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; 2412 2413 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) 2414 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags); 2415 2416 return true; 2417 } 2418 2419 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode, 2420 struct svc_export *exp) 2421 { 2422 if (exp->ex_flags & NFSEXP_V4ROOT) { 2423 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time)); 2424 *p++ = 0; 2425 } else 2426 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode)); 2427 return p; 2428 } 2429 2430 /* 2431 * ctime (in NFSv4, time_metadata) is not writeable, and the client 2432 * doesn't really care what resolution could theoretically be stored by 2433 * the filesystem. 2434 * 2435 * The client cares how close together changes can be while still 2436 * guaranteeing ctime changes. For most filesystems (which have 2437 * timestamps with nanosecond fields) that is limited by the resolution 2438 * of the time returned from current_time() (which I'm assuming to be 2439 * 1/HZ). 2440 */ 2441 static __be32 *encode_time_delta(__be32 *p, struct inode *inode) 2442 { 2443 struct timespec64 ts; 2444 u32 ns; 2445 2446 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran); 2447 ts = ns_to_timespec64(ns); 2448 2449 p = xdr_encode_hyper(p, ts.tv_sec); 2450 *p++ = cpu_to_be32(ts.tv_nsec); 2451 2452 return p; 2453 } 2454 2455 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c) 2456 { 2457 *p++ = cpu_to_be32(c->atomic); 2458 p = xdr_encode_hyper(p, c->before_change); 2459 p = xdr_encode_hyper(p, c->after_change); 2460 return p; 2461 } 2462 2463 /* Encode as an array of strings the string given with components 2464 * separated @sep, escaped with esc_enter and esc_exit. 2465 */ 2466 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, 2467 char *components, char esc_enter, 2468 char esc_exit) 2469 { 2470 __be32 *p; 2471 __be32 pathlen; 2472 int pathlen_offset; 2473 int strlen, count=0; 2474 char *str, *end, *next; 2475 2476 dprintk("nfsd4_encode_components(%s)\n", components); 2477 2478 pathlen_offset = xdr->buf->len; 2479 p = xdr_reserve_space(xdr, 4); 2480 if (!p) 2481 return nfserr_resource; 2482 p++; /* We will fill this in with @count later */ 2483 2484 end = str = components; 2485 while (*end) { 2486 bool found_esc = false; 2487 2488 /* try to parse as esc_start, ..., esc_end, sep */ 2489 if (*str == esc_enter) { 2490 for (; *end && (*end != esc_exit); end++) 2491 /* find esc_exit or end of string */; 2492 next = end + 1; 2493 if (*end && (!*next || *next == sep)) { 2494 str++; 2495 found_esc = true; 2496 } 2497 } 2498 2499 if (!found_esc) 2500 for (; *end && (*end != sep); end++) 2501 /* find sep or end of string */; 2502 2503 strlen = end - str; 2504 if (strlen) { 2505 p = xdr_reserve_space(xdr, strlen + 4); 2506 if (!p) 2507 return nfserr_resource; 2508 p = xdr_encode_opaque(p, str, strlen); 2509 count++; 2510 } 2511 else 2512 end++; 2513 if (found_esc) 2514 end = next; 2515 2516 str = end; 2517 } 2518 pathlen = htonl(count); 2519 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); 2520 return 0; 2521 } 2522 2523 /* Encode as an array of strings the string given with components 2524 * separated @sep. 2525 */ 2526 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, 2527 char *components) 2528 { 2529 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); 2530 } 2531 2532 /* 2533 * encode a location element of a fs_locations structure 2534 */ 2535 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, 2536 struct nfsd4_fs_location *location) 2537 { 2538 __be32 status; 2539 2540 status = nfsd4_encode_components_esc(xdr, ':', location->hosts, 2541 '[', ']'); 2542 if (status) 2543 return status; 2544 status = nfsd4_encode_components(xdr, '/', location->path); 2545 if (status) 2546 return status; 2547 return 0; 2548 } 2549 2550 /* 2551 * Encode a path in RFC3530 'pathname4' format 2552 */ 2553 static __be32 nfsd4_encode_path(struct xdr_stream *xdr, 2554 const struct path *root, 2555 const struct path *path) 2556 { 2557 struct path cur = *path; 2558 __be32 *p; 2559 struct dentry **components = NULL; 2560 unsigned int ncomponents = 0; 2561 __be32 err = nfserr_jukebox; 2562 2563 dprintk("nfsd4_encode_components("); 2564 2565 path_get(&cur); 2566 /* First walk the path up to the nfsd root, and store the 2567 * dentries/path components in an array. 2568 */ 2569 for (;;) { 2570 if (path_equal(&cur, root)) 2571 break; 2572 if (cur.dentry == cur.mnt->mnt_root) { 2573 if (follow_up(&cur)) 2574 continue; 2575 goto out_free; 2576 } 2577 if ((ncomponents & 15) == 0) { 2578 struct dentry **new; 2579 new = krealloc(components, 2580 sizeof(*new) * (ncomponents + 16), 2581 GFP_KERNEL); 2582 if (!new) 2583 goto out_free; 2584 components = new; 2585 } 2586 components[ncomponents++] = cur.dentry; 2587 cur.dentry = dget_parent(cur.dentry); 2588 } 2589 err = nfserr_resource; 2590 p = xdr_reserve_space(xdr, 4); 2591 if (!p) 2592 goto out_free; 2593 *p++ = cpu_to_be32(ncomponents); 2594 2595 while (ncomponents) { 2596 struct dentry *dentry = components[ncomponents - 1]; 2597 unsigned int len; 2598 2599 spin_lock(&dentry->d_lock); 2600 len = dentry->d_name.len; 2601 p = xdr_reserve_space(xdr, len + 4); 2602 if (!p) { 2603 spin_unlock(&dentry->d_lock); 2604 goto out_free; 2605 } 2606 p = xdr_encode_opaque(p, dentry->d_name.name, len); 2607 dprintk("/%pd", dentry); 2608 spin_unlock(&dentry->d_lock); 2609 dput(dentry); 2610 ncomponents--; 2611 } 2612 2613 err = 0; 2614 out_free: 2615 dprintk(")\n"); 2616 while (ncomponents) 2617 dput(components[--ncomponents]); 2618 kfree(components); 2619 path_put(&cur); 2620 return err; 2621 } 2622 2623 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr, 2624 struct svc_rqst *rqstp, const struct path *path) 2625 { 2626 struct svc_export *exp_ps; 2627 __be32 res; 2628 2629 exp_ps = rqst_find_fsidzero_export(rqstp); 2630 if (IS_ERR(exp_ps)) 2631 return nfserrno(PTR_ERR(exp_ps)); 2632 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path); 2633 exp_put(exp_ps); 2634 return res; 2635 } 2636 2637 /* 2638 * encode a fs_locations structure 2639 */ 2640 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr, 2641 struct svc_rqst *rqstp, struct svc_export *exp) 2642 { 2643 __be32 status; 2644 int i; 2645 __be32 *p; 2646 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; 2647 2648 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path); 2649 if (status) 2650 return status; 2651 p = xdr_reserve_space(xdr, 4); 2652 if (!p) 2653 return nfserr_resource; 2654 *p++ = cpu_to_be32(fslocs->locations_count); 2655 for (i=0; i<fslocs->locations_count; i++) { 2656 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); 2657 if (status) 2658 return status; 2659 } 2660 return 0; 2661 } 2662 2663 static u32 nfs4_file_type(umode_t mode) 2664 { 2665 switch (mode & S_IFMT) { 2666 case S_IFIFO: return NF4FIFO; 2667 case S_IFCHR: return NF4CHR; 2668 case S_IFDIR: return NF4DIR; 2669 case S_IFBLK: return NF4BLK; 2670 case S_IFLNK: return NF4LNK; 2671 case S_IFREG: return NF4REG; 2672 case S_IFSOCK: return NF4SOCK; 2673 default: return NF4BAD; 2674 } 2675 } 2676 2677 static inline __be32 2678 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2679 struct nfs4_ace *ace) 2680 { 2681 if (ace->whotype != NFS4_ACL_WHO_NAMED) 2682 return nfs4_acl_write_who(xdr, ace->whotype); 2683 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 2684 return nfsd4_encode_group(xdr, rqstp, ace->who_gid); 2685 else 2686 return nfsd4_encode_user(xdr, rqstp, ace->who_uid); 2687 } 2688 2689 static inline __be32 2690 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types) 2691 { 2692 __be32 *p; 2693 unsigned long i = hweight_long(layout_types); 2694 2695 p = xdr_reserve_space(xdr, 4 + 4 * i); 2696 if (!p) 2697 return nfserr_resource; 2698 2699 *p++ = cpu_to_be32(i); 2700 2701 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i) 2702 if (layout_types & (1 << i)) 2703 *p++ = cpu_to_be32(i); 2704 2705 return 0; 2706 } 2707 2708 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ 2709 FATTR4_WORD0_RDATTR_ERROR) 2710 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID 2711 #define WORD2_ABSENT_FS_ATTRS 0 2712 2713 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2714 static inline __be32 2715 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2716 void *context, int len) 2717 { 2718 __be32 *p; 2719 2720 p = xdr_reserve_space(xdr, len + 4 + 4 + 4); 2721 if (!p) 2722 return nfserr_resource; 2723 2724 /* 2725 * For now we use a 0 here to indicate the null translation; in 2726 * the future we may place a call to translation code here. 2727 */ 2728 *p++ = cpu_to_be32(0); /* lfs */ 2729 *p++ = cpu_to_be32(0); /* pi */ 2730 p = xdr_encode_opaque(p, context, len); 2731 return 0; 2732 } 2733 #else 2734 static inline __be32 2735 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2736 void *context, int len) 2737 { return 0; } 2738 #endif 2739 2740 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err) 2741 { 2742 /* As per referral draft: */ 2743 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || 2744 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { 2745 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || 2746 *bmval0 & FATTR4_WORD0_FS_LOCATIONS) 2747 *rdattr_err = NFSERR_MOVED; 2748 else 2749 return nfserr_moved; 2750 } 2751 *bmval0 &= WORD0_ABSENT_FS_ATTRS; 2752 *bmval1 &= WORD1_ABSENT_FS_ATTRS; 2753 *bmval2 &= WORD2_ABSENT_FS_ATTRS; 2754 return 0; 2755 } 2756 2757 2758 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat) 2759 { 2760 struct path path = exp->ex_path; 2761 int err; 2762 2763 path_get(&path); 2764 while (follow_up(&path)) { 2765 if (path.dentry != path.mnt->mnt_root) 2766 break; 2767 } 2768 err = vfs_getattr(&path, stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT); 2769 path_put(&path); 2770 return err; 2771 } 2772 2773 static __be32 2774 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2) 2775 { 2776 __be32 *p; 2777 2778 if (bmval2) { 2779 p = xdr_reserve_space(xdr, 16); 2780 if (!p) 2781 goto out_resource; 2782 *p++ = cpu_to_be32(3); 2783 *p++ = cpu_to_be32(bmval0); 2784 *p++ = cpu_to_be32(bmval1); 2785 *p++ = cpu_to_be32(bmval2); 2786 } else if (bmval1) { 2787 p = xdr_reserve_space(xdr, 12); 2788 if (!p) 2789 goto out_resource; 2790 *p++ = cpu_to_be32(2); 2791 *p++ = cpu_to_be32(bmval0); 2792 *p++ = cpu_to_be32(bmval1); 2793 } else { 2794 p = xdr_reserve_space(xdr, 8); 2795 if (!p) 2796 goto out_resource; 2797 *p++ = cpu_to_be32(1); 2798 *p++ = cpu_to_be32(bmval0); 2799 } 2800 2801 return 0; 2802 out_resource: 2803 return nfserr_resource; 2804 } 2805 2806 /* 2807 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle 2808 * ourselves. 2809 */ 2810 static __be32 2811 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, 2812 struct svc_export *exp, 2813 struct dentry *dentry, u32 *bmval, 2814 struct svc_rqst *rqstp, int ignore_crossmnt) 2815 { 2816 u32 bmval0 = bmval[0]; 2817 u32 bmval1 = bmval[1]; 2818 u32 bmval2 = bmval[2]; 2819 struct kstat stat; 2820 struct svc_fh *tempfh = NULL; 2821 struct kstatfs statfs; 2822 __be32 *p; 2823 int starting_len = xdr->buf->len; 2824 int attrlen_offset; 2825 __be32 attrlen; 2826 u32 dummy; 2827 u64 dummy64; 2828 u32 rdattr_err = 0; 2829 __be32 status; 2830 int err; 2831 struct nfs4_acl *acl = NULL; 2832 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2833 void *context = NULL; 2834 int contextlen; 2835 #endif 2836 bool contextsupport = false; 2837 struct nfsd4_compoundres *resp = rqstp->rq_resp; 2838 u32 minorversion = resp->cstate.minorversion; 2839 struct path path = { 2840 .mnt = exp->ex_path.mnt, 2841 .dentry = dentry, 2842 }; 2843 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2844 2845 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); 2846 BUG_ON(!nfsd_attrs_supported(minorversion, bmval)); 2847 2848 if (exp->ex_fslocs.migrated) { 2849 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err); 2850 if (status) 2851 goto out; 2852 } 2853 2854 err = vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT); 2855 if (err) 2856 goto out_nfserr; 2857 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE | 2858 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) || 2859 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE | 2860 FATTR4_WORD1_SPACE_TOTAL))) { 2861 err = vfs_statfs(&path, &statfs); 2862 if (err) 2863 goto out_nfserr; 2864 } 2865 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) { 2866 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); 2867 status = nfserr_jukebox; 2868 if (!tempfh) 2869 goto out; 2870 fh_init(tempfh, NFS4_FHSIZE); 2871 status = fh_compose(tempfh, exp, dentry, NULL); 2872 if (status) 2873 goto out; 2874 fhp = tempfh; 2875 } 2876 if (bmval0 & FATTR4_WORD0_ACL) { 2877 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl); 2878 if (err == -EOPNOTSUPP) 2879 bmval0 &= ~FATTR4_WORD0_ACL; 2880 else if (err == -EINVAL) { 2881 status = nfserr_attrnotsupp; 2882 goto out; 2883 } else if (err != 0) 2884 goto out_nfserr; 2885 } 2886 2887 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2888 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) || 2889 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 2890 if (exp->ex_flags & NFSEXP_SECURITY_LABEL) 2891 err = security_inode_getsecctx(d_inode(dentry), 2892 &context, &contextlen); 2893 else 2894 err = -EOPNOTSUPP; 2895 contextsupport = (err == 0); 2896 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 2897 if (err == -EOPNOTSUPP) 2898 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL; 2899 else if (err) 2900 goto out_nfserr; 2901 } 2902 } 2903 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 2904 2905 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2); 2906 if (status) 2907 goto out; 2908 2909 attrlen_offset = xdr->buf->len; 2910 p = xdr_reserve_space(xdr, 4); 2911 if (!p) 2912 goto out_resource; 2913 p++; /* to be backfilled later */ 2914 2915 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 2916 u32 supp[3]; 2917 2918 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 2919 2920 if (!IS_POSIXACL(dentry->d_inode)) 2921 supp[0] &= ~FATTR4_WORD0_ACL; 2922 if (!contextsupport) 2923 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL; 2924 if (!supp[2]) { 2925 p = xdr_reserve_space(xdr, 12); 2926 if (!p) 2927 goto out_resource; 2928 *p++ = cpu_to_be32(2); 2929 *p++ = cpu_to_be32(supp[0]); 2930 *p++ = cpu_to_be32(supp[1]); 2931 } else { 2932 p = xdr_reserve_space(xdr, 16); 2933 if (!p) 2934 goto out_resource; 2935 *p++ = cpu_to_be32(3); 2936 *p++ = cpu_to_be32(supp[0]); 2937 *p++ = cpu_to_be32(supp[1]); 2938 *p++ = cpu_to_be32(supp[2]); 2939 } 2940 } 2941 if (bmval0 & FATTR4_WORD0_TYPE) { 2942 p = xdr_reserve_space(xdr, 4); 2943 if (!p) 2944 goto out_resource; 2945 dummy = nfs4_file_type(stat.mode); 2946 if (dummy == NF4BAD) { 2947 status = nfserr_serverfault; 2948 goto out; 2949 } 2950 *p++ = cpu_to_be32(dummy); 2951 } 2952 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) { 2953 p = xdr_reserve_space(xdr, 4); 2954 if (!p) 2955 goto out_resource; 2956 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK) 2957 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT); 2958 else 2959 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT| 2960 NFS4_FH_VOL_RENAME); 2961 } 2962 if (bmval0 & FATTR4_WORD0_CHANGE) { 2963 p = xdr_reserve_space(xdr, 8); 2964 if (!p) 2965 goto out_resource; 2966 p = encode_change(p, &stat, d_inode(dentry), exp); 2967 } 2968 if (bmval0 & FATTR4_WORD0_SIZE) { 2969 p = xdr_reserve_space(xdr, 8); 2970 if (!p) 2971 goto out_resource; 2972 p = xdr_encode_hyper(p, stat.size); 2973 } 2974 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { 2975 p = xdr_reserve_space(xdr, 4); 2976 if (!p) 2977 goto out_resource; 2978 *p++ = cpu_to_be32(1); 2979 } 2980 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) { 2981 p = xdr_reserve_space(xdr, 4); 2982 if (!p) 2983 goto out_resource; 2984 *p++ = cpu_to_be32(1); 2985 } 2986 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) { 2987 p = xdr_reserve_space(xdr, 4); 2988 if (!p) 2989 goto out_resource; 2990 *p++ = cpu_to_be32(0); 2991 } 2992 if (bmval0 & FATTR4_WORD0_FSID) { 2993 p = xdr_reserve_space(xdr, 16); 2994 if (!p) 2995 goto out_resource; 2996 if (exp->ex_fslocs.migrated) { 2997 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR); 2998 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR); 2999 } else switch(fsid_source(fhp)) { 3000 case FSIDSOURCE_FSID: 3001 p = xdr_encode_hyper(p, (u64)exp->ex_fsid); 3002 p = xdr_encode_hyper(p, (u64)0); 3003 break; 3004 case FSIDSOURCE_DEV: 3005 *p++ = cpu_to_be32(0); 3006 *p++ = cpu_to_be32(MAJOR(stat.dev)); 3007 *p++ = cpu_to_be32(0); 3008 *p++ = cpu_to_be32(MINOR(stat.dev)); 3009 break; 3010 case FSIDSOURCE_UUID: 3011 p = xdr_encode_opaque_fixed(p, exp->ex_uuid, 3012 EX_UUID_LEN); 3013 break; 3014 } 3015 } 3016 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) { 3017 p = xdr_reserve_space(xdr, 4); 3018 if (!p) 3019 goto out_resource; 3020 *p++ = cpu_to_be32(0); 3021 } 3022 if (bmval0 & FATTR4_WORD0_LEASE_TIME) { 3023 p = xdr_reserve_space(xdr, 4); 3024 if (!p) 3025 goto out_resource; 3026 *p++ = cpu_to_be32(nn->nfsd4_lease); 3027 } 3028 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) { 3029 p = xdr_reserve_space(xdr, 4); 3030 if (!p) 3031 goto out_resource; 3032 *p++ = cpu_to_be32(rdattr_err); 3033 } 3034 if (bmval0 & FATTR4_WORD0_ACL) { 3035 struct nfs4_ace *ace; 3036 3037 if (acl == NULL) { 3038 p = xdr_reserve_space(xdr, 4); 3039 if (!p) 3040 goto out_resource; 3041 3042 *p++ = cpu_to_be32(0); 3043 goto out_acl; 3044 } 3045 p = xdr_reserve_space(xdr, 4); 3046 if (!p) 3047 goto out_resource; 3048 *p++ = cpu_to_be32(acl->naces); 3049 3050 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) { 3051 p = xdr_reserve_space(xdr, 4*3); 3052 if (!p) 3053 goto out_resource; 3054 *p++ = cpu_to_be32(ace->type); 3055 *p++ = cpu_to_be32(ace->flag); 3056 *p++ = cpu_to_be32(ace->access_mask & 3057 NFS4_ACE_MASK_ALL); 3058 status = nfsd4_encode_aclname(xdr, rqstp, ace); 3059 if (status) 3060 goto out; 3061 } 3062 } 3063 out_acl: 3064 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) { 3065 p = xdr_reserve_space(xdr, 4); 3066 if (!p) 3067 goto out_resource; 3068 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ? 3069 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0); 3070 } 3071 if (bmval0 & FATTR4_WORD0_CANSETTIME) { 3072 p = xdr_reserve_space(xdr, 4); 3073 if (!p) 3074 goto out_resource; 3075 *p++ = cpu_to_be32(1); 3076 } 3077 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) { 3078 p = xdr_reserve_space(xdr, 4); 3079 if (!p) 3080 goto out_resource; 3081 *p++ = cpu_to_be32(0); 3082 } 3083 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) { 3084 p = xdr_reserve_space(xdr, 4); 3085 if (!p) 3086 goto out_resource; 3087 *p++ = cpu_to_be32(1); 3088 } 3089 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) { 3090 p = xdr_reserve_space(xdr, 4); 3091 if (!p) 3092 goto out_resource; 3093 *p++ = cpu_to_be32(1); 3094 } 3095 if (bmval0 & FATTR4_WORD0_FILEHANDLE) { 3096 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4); 3097 if (!p) 3098 goto out_resource; 3099 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, 3100 fhp->fh_handle.fh_size); 3101 } 3102 if (bmval0 & FATTR4_WORD0_FILEID) { 3103 p = xdr_reserve_space(xdr, 8); 3104 if (!p) 3105 goto out_resource; 3106 p = xdr_encode_hyper(p, stat.ino); 3107 } 3108 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) { 3109 p = xdr_reserve_space(xdr, 8); 3110 if (!p) 3111 goto out_resource; 3112 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3113 } 3114 if (bmval0 & FATTR4_WORD0_FILES_FREE) { 3115 p = xdr_reserve_space(xdr, 8); 3116 if (!p) 3117 goto out_resource; 3118 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3119 } 3120 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) { 3121 p = xdr_reserve_space(xdr, 8); 3122 if (!p) 3123 goto out_resource; 3124 p = xdr_encode_hyper(p, (u64) statfs.f_files); 3125 } 3126 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { 3127 status = nfsd4_encode_fs_locations(xdr, rqstp, exp); 3128 if (status) 3129 goto out; 3130 } 3131 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) { 3132 p = xdr_reserve_space(xdr, 4); 3133 if (!p) 3134 goto out_resource; 3135 *p++ = cpu_to_be32(1); 3136 } 3137 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) { 3138 p = xdr_reserve_space(xdr, 8); 3139 if (!p) 3140 goto out_resource; 3141 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes); 3142 } 3143 if (bmval0 & FATTR4_WORD0_MAXLINK) { 3144 p = xdr_reserve_space(xdr, 4); 3145 if (!p) 3146 goto out_resource; 3147 *p++ = cpu_to_be32(255); 3148 } 3149 if (bmval0 & FATTR4_WORD0_MAXNAME) { 3150 p = xdr_reserve_space(xdr, 4); 3151 if (!p) 3152 goto out_resource; 3153 *p++ = cpu_to_be32(statfs.f_namelen); 3154 } 3155 if (bmval0 & FATTR4_WORD0_MAXREAD) { 3156 p = xdr_reserve_space(xdr, 8); 3157 if (!p) 3158 goto out_resource; 3159 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3160 } 3161 if (bmval0 & FATTR4_WORD0_MAXWRITE) { 3162 p = xdr_reserve_space(xdr, 8); 3163 if (!p) 3164 goto out_resource; 3165 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3166 } 3167 if (bmval1 & FATTR4_WORD1_MODE) { 3168 p = xdr_reserve_space(xdr, 4); 3169 if (!p) 3170 goto out_resource; 3171 *p++ = cpu_to_be32(stat.mode & S_IALLUGO); 3172 } 3173 if (bmval1 & FATTR4_WORD1_NO_TRUNC) { 3174 p = xdr_reserve_space(xdr, 4); 3175 if (!p) 3176 goto out_resource; 3177 *p++ = cpu_to_be32(1); 3178 } 3179 if (bmval1 & FATTR4_WORD1_NUMLINKS) { 3180 p = xdr_reserve_space(xdr, 4); 3181 if (!p) 3182 goto out_resource; 3183 *p++ = cpu_to_be32(stat.nlink); 3184 } 3185 if (bmval1 & FATTR4_WORD1_OWNER) { 3186 status = nfsd4_encode_user(xdr, rqstp, stat.uid); 3187 if (status) 3188 goto out; 3189 } 3190 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) { 3191 status = nfsd4_encode_group(xdr, rqstp, stat.gid); 3192 if (status) 3193 goto out; 3194 } 3195 if (bmval1 & FATTR4_WORD1_RAWDEV) { 3196 p = xdr_reserve_space(xdr, 8); 3197 if (!p) 3198 goto out_resource; 3199 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev)); 3200 *p++ = cpu_to_be32((u32) MINOR(stat.rdev)); 3201 } 3202 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) { 3203 p = xdr_reserve_space(xdr, 8); 3204 if (!p) 3205 goto out_resource; 3206 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize; 3207 p = xdr_encode_hyper(p, dummy64); 3208 } 3209 if (bmval1 & FATTR4_WORD1_SPACE_FREE) { 3210 p = xdr_reserve_space(xdr, 8); 3211 if (!p) 3212 goto out_resource; 3213 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize; 3214 p = xdr_encode_hyper(p, dummy64); 3215 } 3216 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) { 3217 p = xdr_reserve_space(xdr, 8); 3218 if (!p) 3219 goto out_resource; 3220 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize; 3221 p = xdr_encode_hyper(p, dummy64); 3222 } 3223 if (bmval1 & FATTR4_WORD1_SPACE_USED) { 3224 p = xdr_reserve_space(xdr, 8); 3225 if (!p) 3226 goto out_resource; 3227 dummy64 = (u64)stat.blocks << 9; 3228 p = xdr_encode_hyper(p, dummy64); 3229 } 3230 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) { 3231 p = xdr_reserve_space(xdr, 12); 3232 if (!p) 3233 goto out_resource; 3234 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec); 3235 *p++ = cpu_to_be32(stat.atime.tv_nsec); 3236 } 3237 if (bmval1 & FATTR4_WORD1_TIME_DELTA) { 3238 p = xdr_reserve_space(xdr, 12); 3239 if (!p) 3240 goto out_resource; 3241 p = encode_time_delta(p, d_inode(dentry)); 3242 } 3243 if (bmval1 & FATTR4_WORD1_TIME_METADATA) { 3244 p = xdr_reserve_space(xdr, 12); 3245 if (!p) 3246 goto out_resource; 3247 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec); 3248 *p++ = cpu_to_be32(stat.ctime.tv_nsec); 3249 } 3250 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) { 3251 p = xdr_reserve_space(xdr, 12); 3252 if (!p) 3253 goto out_resource; 3254 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec); 3255 *p++ = cpu_to_be32(stat.mtime.tv_nsec); 3256 } 3257 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) { 3258 struct kstat parent_stat; 3259 u64 ino = stat.ino; 3260 3261 p = xdr_reserve_space(xdr, 8); 3262 if (!p) 3263 goto out_resource; 3264 /* 3265 * Get parent's attributes if not ignoring crossmount 3266 * and this is the root of a cross-mounted filesystem. 3267 */ 3268 if (ignore_crossmnt == 0 && 3269 dentry == exp->ex_path.mnt->mnt_root) { 3270 err = get_parent_attributes(exp, &parent_stat); 3271 if (err) 3272 goto out_nfserr; 3273 ino = parent_stat.ino; 3274 } 3275 p = xdr_encode_hyper(p, ino); 3276 } 3277 #ifdef CONFIG_NFSD_PNFS 3278 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) { 3279 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3280 if (status) 3281 goto out; 3282 } 3283 3284 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) { 3285 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3286 if (status) 3287 goto out; 3288 } 3289 3290 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) { 3291 p = xdr_reserve_space(xdr, 4); 3292 if (!p) 3293 goto out_resource; 3294 *p++ = cpu_to_be32(stat.blksize); 3295 } 3296 #endif /* CONFIG_NFSD_PNFS */ 3297 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) { 3298 u32 supp[3]; 3299 3300 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 3301 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0; 3302 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1; 3303 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2; 3304 3305 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]); 3306 if (status) 3307 goto out; 3308 } 3309 3310 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3311 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 3312 status = nfsd4_encode_security_label(xdr, rqstp, context, 3313 contextlen); 3314 if (status) 3315 goto out; 3316 } 3317 #endif 3318 3319 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) { 3320 p = xdr_reserve_space(xdr, 4); 3321 if (!p) 3322 goto out_resource; 3323 err = xattr_supported_namespace(d_inode(dentry), 3324 XATTR_USER_PREFIX); 3325 *p++ = cpu_to_be32(err == 0); 3326 } 3327 3328 attrlen = htonl(xdr->buf->len - attrlen_offset - 4); 3329 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4); 3330 status = nfs_ok; 3331 3332 out: 3333 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3334 if (context) 3335 security_release_secctx(context, contextlen); 3336 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 3337 kfree(acl); 3338 if (tempfh) { 3339 fh_put(tempfh); 3340 kfree(tempfh); 3341 } 3342 if (status) 3343 xdr_truncate_encode(xdr, starting_len); 3344 return status; 3345 out_nfserr: 3346 status = nfserrno(err); 3347 goto out; 3348 out_resource: 3349 status = nfserr_resource; 3350 goto out; 3351 } 3352 3353 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr, 3354 struct xdr_buf *buf, __be32 *p, int bytes) 3355 { 3356 xdr->scratch.iov_len = 0; 3357 memset(buf, 0, sizeof(struct xdr_buf)); 3358 buf->head[0].iov_base = p; 3359 buf->head[0].iov_len = 0; 3360 buf->len = 0; 3361 xdr->buf = buf; 3362 xdr->iov = buf->head; 3363 xdr->p = p; 3364 xdr->end = (void *)p + bytes; 3365 buf->buflen = bytes; 3366 } 3367 3368 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words, 3369 struct svc_fh *fhp, struct svc_export *exp, 3370 struct dentry *dentry, u32 *bmval, 3371 struct svc_rqst *rqstp, int ignore_crossmnt) 3372 { 3373 struct xdr_buf dummy; 3374 struct xdr_stream xdr; 3375 __be32 ret; 3376 3377 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2); 3378 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp, 3379 ignore_crossmnt); 3380 *p = xdr.p; 3381 return ret; 3382 } 3383 3384 static inline int attributes_need_mount(u32 *bmval) 3385 { 3386 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME)) 3387 return 1; 3388 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID) 3389 return 1; 3390 return 0; 3391 } 3392 3393 static __be32 3394 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd, 3395 const char *name, int namlen) 3396 { 3397 struct svc_export *exp = cd->rd_fhp->fh_export; 3398 struct dentry *dentry; 3399 __be32 nfserr; 3400 int ignore_crossmnt = 0; 3401 3402 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen); 3403 if (IS_ERR(dentry)) 3404 return nfserrno(PTR_ERR(dentry)); 3405 3406 exp_get(exp); 3407 /* 3408 * In the case of a mountpoint, the client may be asking for 3409 * attributes that are only properties of the underlying filesystem 3410 * as opposed to the cross-mounted file system. In such a case, 3411 * we will not follow the cross mount and will fill the attribtutes 3412 * directly from the mountpoint dentry. 3413 */ 3414 if (nfsd_mountpoint(dentry, exp)) { 3415 int err; 3416 3417 if (!(exp->ex_flags & NFSEXP_V4ROOT) 3418 && !attributes_need_mount(cd->rd_bmval)) { 3419 ignore_crossmnt = 1; 3420 goto out_encode; 3421 } 3422 /* 3423 * Why the heck aren't we just using nfsd_lookup?? 3424 * Different "."/".." handling? Something else? 3425 * At least, add a comment here to explain.... 3426 */ 3427 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp); 3428 if (err) { 3429 nfserr = nfserrno(err); 3430 goto out_put; 3431 } 3432 nfserr = check_nfsd_access(exp, cd->rd_rqstp); 3433 if (nfserr) 3434 goto out_put; 3435 3436 } 3437 out_encode: 3438 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval, 3439 cd->rd_rqstp, ignore_crossmnt); 3440 out_put: 3441 dput(dentry); 3442 exp_put(exp); 3443 return nfserr; 3444 } 3445 3446 static __be32 * 3447 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr) 3448 { 3449 __be32 *p; 3450 3451 p = xdr_reserve_space(xdr, 20); 3452 if (!p) 3453 return NULL; 3454 *p++ = htonl(2); 3455 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */ 3456 *p++ = htonl(0); /* bmval1 */ 3457 3458 *p++ = htonl(4); /* attribute length */ 3459 *p++ = nfserr; /* no htonl */ 3460 return p; 3461 } 3462 3463 static int 3464 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen, 3465 loff_t offset, u64 ino, unsigned int d_type) 3466 { 3467 struct readdir_cd *ccd = ccdv; 3468 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common); 3469 struct xdr_stream *xdr = cd->xdr; 3470 int start_offset = xdr->buf->len; 3471 int cookie_offset; 3472 u32 name_and_cookie; 3473 int entry_bytes; 3474 __be32 nfserr = nfserr_toosmall; 3475 __be64 wire_offset; 3476 __be32 *p; 3477 3478 /* In nfsv4, "." and ".." never make it onto the wire.. */ 3479 if (name && isdotent(name, namlen)) { 3480 cd->common.err = nfs_ok; 3481 return 0; 3482 } 3483 3484 if (cd->cookie_offset) { 3485 wire_offset = cpu_to_be64(offset); 3486 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset, 3487 &wire_offset, 8); 3488 } 3489 3490 p = xdr_reserve_space(xdr, 4); 3491 if (!p) 3492 goto fail; 3493 *p++ = xdr_one; /* mark entry present */ 3494 cookie_offset = xdr->buf->len; 3495 p = xdr_reserve_space(xdr, 3*4 + namlen); 3496 if (!p) 3497 goto fail; 3498 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */ 3499 p = xdr_encode_array(p, name, namlen); /* name length & name */ 3500 3501 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen); 3502 switch (nfserr) { 3503 case nfs_ok: 3504 break; 3505 case nfserr_resource: 3506 nfserr = nfserr_toosmall; 3507 goto fail; 3508 case nfserr_noent: 3509 xdr_truncate_encode(xdr, start_offset); 3510 goto skip_entry; 3511 default: 3512 /* 3513 * If the client requested the RDATTR_ERROR attribute, 3514 * we stuff the error code into this attribute 3515 * and continue. If this attribute was not requested, 3516 * then in accordance with the spec, we fail the 3517 * entire READDIR operation(!) 3518 */ 3519 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)) 3520 goto fail; 3521 p = nfsd4_encode_rdattr_error(xdr, nfserr); 3522 if (p == NULL) { 3523 nfserr = nfserr_toosmall; 3524 goto fail; 3525 } 3526 } 3527 nfserr = nfserr_toosmall; 3528 entry_bytes = xdr->buf->len - start_offset; 3529 if (entry_bytes > cd->rd_maxcount) 3530 goto fail; 3531 cd->rd_maxcount -= entry_bytes; 3532 /* 3533 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and 3534 * notes that it could be zero. If it is zero, then the server 3535 * should enforce only the rd_maxcount value. 3536 */ 3537 if (cd->rd_dircount) { 3538 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8; 3539 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset) 3540 goto fail; 3541 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie); 3542 if (!cd->rd_dircount) 3543 cd->rd_maxcount = 0; 3544 } 3545 3546 cd->cookie_offset = cookie_offset; 3547 skip_entry: 3548 cd->common.err = nfs_ok; 3549 return 0; 3550 fail: 3551 xdr_truncate_encode(xdr, start_offset); 3552 cd->common.err = nfserr; 3553 return -EINVAL; 3554 } 3555 3556 static __be32 3557 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid) 3558 { 3559 __be32 *p; 3560 3561 p = xdr_reserve_space(xdr, sizeof(stateid_t)); 3562 if (!p) 3563 return nfserr_resource; 3564 *p++ = cpu_to_be32(sid->si_generation); 3565 p = xdr_encode_opaque_fixed(p, &sid->si_opaque, 3566 sizeof(stateid_opaque_t)); 3567 return 0; 3568 } 3569 3570 static __be32 3571 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access) 3572 { 3573 struct xdr_stream *xdr = resp->xdr; 3574 __be32 *p; 3575 3576 p = xdr_reserve_space(xdr, 8); 3577 if (!p) 3578 return nfserr_resource; 3579 *p++ = cpu_to_be32(access->ac_supported); 3580 *p++ = cpu_to_be32(access->ac_resp_access); 3581 return 0; 3582 } 3583 3584 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts) 3585 { 3586 struct xdr_stream *xdr = resp->xdr; 3587 __be32 *p; 3588 3589 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8); 3590 if (!p) 3591 return nfserr_resource; 3592 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data, 3593 NFS4_MAX_SESSIONID_LEN); 3594 *p++ = cpu_to_be32(bcts->dir); 3595 /* Upshifting from TCP to RDMA is not supported */ 3596 *p++ = cpu_to_be32(0); 3597 return 0; 3598 } 3599 3600 static __be32 3601 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close) 3602 { 3603 struct xdr_stream *xdr = resp->xdr; 3604 3605 return nfsd4_encode_stateid(xdr, &close->cl_stateid); 3606 } 3607 3608 3609 static __be32 3610 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit) 3611 { 3612 struct xdr_stream *xdr = resp->xdr; 3613 __be32 *p; 3614 3615 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 3616 if (!p) 3617 return nfserr_resource; 3618 p = xdr_encode_opaque_fixed(p, commit->co_verf.data, 3619 NFS4_VERIFIER_SIZE); 3620 return 0; 3621 } 3622 3623 static __be32 3624 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create) 3625 { 3626 struct xdr_stream *xdr = resp->xdr; 3627 __be32 *p; 3628 3629 p = xdr_reserve_space(xdr, 20); 3630 if (!p) 3631 return nfserr_resource; 3632 encode_cinfo(p, &create->cr_cinfo); 3633 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0], 3634 create->cr_bmval[1], create->cr_bmval[2]); 3635 } 3636 3637 static __be32 3638 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr) 3639 { 3640 struct svc_fh *fhp = getattr->ga_fhp; 3641 struct xdr_stream *xdr = resp->xdr; 3642 3643 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry, 3644 getattr->ga_bmval, resp->rqstp, 0); 3645 } 3646 3647 static __be32 3648 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp) 3649 { 3650 struct xdr_stream *xdr = resp->xdr; 3651 struct svc_fh *fhp = *fhpp; 3652 unsigned int len; 3653 __be32 *p; 3654 3655 len = fhp->fh_handle.fh_size; 3656 p = xdr_reserve_space(xdr, len + 4); 3657 if (!p) 3658 return nfserr_resource; 3659 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, len); 3660 return 0; 3661 } 3662 3663 /* 3664 * Including all fields other than the name, a LOCK4denied structure requires 3665 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. 3666 */ 3667 static __be32 3668 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) 3669 { 3670 struct xdr_netobj *conf = &ld->ld_owner; 3671 __be32 *p; 3672 3673 again: 3674 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len)); 3675 if (!p) { 3676 /* 3677 * Don't fail to return the result just because we can't 3678 * return the conflicting open: 3679 */ 3680 if (conf->len) { 3681 kfree(conf->data); 3682 conf->len = 0; 3683 conf->data = NULL; 3684 goto again; 3685 } 3686 return nfserr_resource; 3687 } 3688 p = xdr_encode_hyper(p, ld->ld_start); 3689 p = xdr_encode_hyper(p, ld->ld_length); 3690 *p++ = cpu_to_be32(ld->ld_type); 3691 if (conf->len) { 3692 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8); 3693 p = xdr_encode_opaque(p, conf->data, conf->len); 3694 kfree(conf->data); 3695 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */ 3696 p = xdr_encode_hyper(p, (u64)0); /* clientid */ 3697 *p++ = cpu_to_be32(0); /* length of owner name */ 3698 } 3699 return nfserr_denied; 3700 } 3701 3702 static __be32 3703 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock) 3704 { 3705 struct xdr_stream *xdr = resp->xdr; 3706 3707 if (!nfserr) 3708 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid); 3709 else if (nfserr == nfserr_denied) 3710 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); 3711 3712 return nfserr; 3713 } 3714 3715 static __be32 3716 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt) 3717 { 3718 struct xdr_stream *xdr = resp->xdr; 3719 3720 if (nfserr == nfserr_denied) 3721 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); 3722 return nfserr; 3723 } 3724 3725 static __be32 3726 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku) 3727 { 3728 struct xdr_stream *xdr = resp->xdr; 3729 3730 return nfsd4_encode_stateid(xdr, &locku->lu_stateid); 3731 } 3732 3733 3734 static __be32 3735 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link) 3736 { 3737 struct xdr_stream *xdr = resp->xdr; 3738 __be32 *p; 3739 3740 p = xdr_reserve_space(xdr, 20); 3741 if (!p) 3742 return nfserr_resource; 3743 p = encode_cinfo(p, &link->li_cinfo); 3744 return 0; 3745 } 3746 3747 3748 static __be32 3749 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open) 3750 { 3751 struct xdr_stream *xdr = resp->xdr; 3752 __be32 *p; 3753 3754 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid); 3755 if (nfserr) 3756 return nfserr; 3757 p = xdr_reserve_space(xdr, 24); 3758 if (!p) 3759 return nfserr_resource; 3760 p = encode_cinfo(p, &open->op_cinfo); 3761 *p++ = cpu_to_be32(open->op_rflags); 3762 3763 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1], 3764 open->op_bmval[2]); 3765 if (nfserr) 3766 return nfserr; 3767 3768 p = xdr_reserve_space(xdr, 4); 3769 if (!p) 3770 return nfserr_resource; 3771 3772 *p++ = cpu_to_be32(open->op_delegate_type); 3773 switch (open->op_delegate_type) { 3774 case NFS4_OPEN_DELEGATE_NONE: 3775 break; 3776 case NFS4_OPEN_DELEGATE_READ: 3777 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3778 if (nfserr) 3779 return nfserr; 3780 p = xdr_reserve_space(xdr, 20); 3781 if (!p) 3782 return nfserr_resource; 3783 *p++ = cpu_to_be32(open->op_recall); 3784 3785 /* 3786 * TODO: ACE's in delegations 3787 */ 3788 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3789 *p++ = cpu_to_be32(0); 3790 *p++ = cpu_to_be32(0); 3791 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3792 break; 3793 case NFS4_OPEN_DELEGATE_WRITE: 3794 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3795 if (nfserr) 3796 return nfserr; 3797 p = xdr_reserve_space(xdr, 32); 3798 if (!p) 3799 return nfserr_resource; 3800 *p++ = cpu_to_be32(0); 3801 3802 /* 3803 * TODO: space_limit's in delegations 3804 */ 3805 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE); 3806 *p++ = cpu_to_be32(~(u32)0); 3807 *p++ = cpu_to_be32(~(u32)0); 3808 3809 /* 3810 * TODO: ACE's in delegations 3811 */ 3812 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3813 *p++ = cpu_to_be32(0); 3814 *p++ = cpu_to_be32(0); 3815 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3816 break; 3817 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */ 3818 switch (open->op_why_no_deleg) { 3819 case WND4_CONTENTION: 3820 case WND4_RESOURCE: 3821 p = xdr_reserve_space(xdr, 8); 3822 if (!p) 3823 return nfserr_resource; 3824 *p++ = cpu_to_be32(open->op_why_no_deleg); 3825 /* deleg signaling not supported yet: */ 3826 *p++ = cpu_to_be32(0); 3827 break; 3828 default: 3829 p = xdr_reserve_space(xdr, 4); 3830 if (!p) 3831 return nfserr_resource; 3832 *p++ = cpu_to_be32(open->op_why_no_deleg); 3833 } 3834 break; 3835 default: 3836 BUG(); 3837 } 3838 /* XXX save filehandle here */ 3839 return 0; 3840 } 3841 3842 static __be32 3843 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc) 3844 { 3845 struct xdr_stream *xdr = resp->xdr; 3846 3847 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid); 3848 } 3849 3850 static __be32 3851 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od) 3852 { 3853 struct xdr_stream *xdr = resp->xdr; 3854 3855 return nfsd4_encode_stateid(xdr, &od->od_stateid); 3856 } 3857 3858 static __be32 nfsd4_encode_splice_read( 3859 struct nfsd4_compoundres *resp, 3860 struct nfsd4_read *read, 3861 struct file *file, unsigned long maxcount) 3862 { 3863 struct xdr_stream *xdr = resp->xdr; 3864 struct xdr_buf *buf = xdr->buf; 3865 int status, space_left; 3866 u32 eof; 3867 __be32 nfserr; 3868 __be32 *p = xdr->p - 2; 3869 3870 /* Make sure there will be room for padding if needed */ 3871 if (xdr->end - xdr->p < 1) 3872 return nfserr_resource; 3873 3874 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp, 3875 file, read->rd_offset, &maxcount, &eof); 3876 read->rd_length = maxcount; 3877 if (nfserr) 3878 goto out_err; 3879 status = svc_encode_result_payload(read->rd_rqstp, 3880 buf->head[0].iov_len, maxcount); 3881 if (status) { 3882 nfserr = nfserrno(status); 3883 goto out_err; 3884 } 3885 3886 *(p++) = htonl(eof); 3887 *(p++) = htonl(maxcount); 3888 3889 buf->page_len = maxcount; 3890 buf->len += maxcount; 3891 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1) 3892 / PAGE_SIZE; 3893 3894 /* Use rest of head for padding and remaining ops: */ 3895 buf->tail[0].iov_base = xdr->p; 3896 buf->tail[0].iov_len = 0; 3897 xdr->iov = buf->tail; 3898 if (maxcount&3) { 3899 int pad = 4 - (maxcount&3); 3900 3901 *(xdr->p++) = 0; 3902 3903 buf->tail[0].iov_base += maxcount&3; 3904 buf->tail[0].iov_len = pad; 3905 buf->len += pad; 3906 } 3907 3908 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p, 3909 buf->buflen - buf->len); 3910 buf->buflen = buf->len + space_left; 3911 xdr->end = (__be32 *)((void *)xdr->end + space_left); 3912 3913 return 0; 3914 3915 out_err: 3916 /* 3917 * nfsd_splice_actor may have already messed with the 3918 * page length; reset it so as not to confuse 3919 * xdr_truncate_encode in our caller. 3920 */ 3921 buf->page_len = 0; 3922 return nfserr; 3923 } 3924 3925 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp, 3926 struct nfsd4_read *read, 3927 struct file *file, unsigned long maxcount) 3928 { 3929 struct xdr_stream *xdr = resp->xdr; 3930 u32 eof; 3931 int starting_len = xdr->buf->len - 8; 3932 __be32 nfserr; 3933 __be32 tmp; 3934 int pad; 3935 3936 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount); 3937 if (read->rd_vlen < 0) 3938 return nfserr_resource; 3939 3940 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset, 3941 resp->rqstp->rq_vec, read->rd_vlen, &maxcount, 3942 &eof); 3943 read->rd_length = maxcount; 3944 if (nfserr) 3945 return nfserr; 3946 if (svc_encode_result_payload(resp->rqstp, starting_len + 8, maxcount)) 3947 return nfserr_io; 3948 xdr_truncate_encode(xdr, starting_len + 8 + xdr_align_size(maxcount)); 3949 3950 tmp = htonl(eof); 3951 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4); 3952 tmp = htonl(maxcount); 3953 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4); 3954 3955 tmp = xdr_zero; 3956 pad = (maxcount&3) ? 4 - (maxcount&3) : 0; 3957 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount, 3958 &tmp, pad); 3959 return 0; 3960 3961 } 3962 3963 static __be32 3964 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr, 3965 struct nfsd4_read *read) 3966 { 3967 unsigned long maxcount; 3968 struct xdr_stream *xdr = resp->xdr; 3969 struct file *file; 3970 int starting_len = xdr->buf->len; 3971 __be32 *p; 3972 3973 if (nfserr) 3974 return nfserr; 3975 file = read->rd_nf->nf_file; 3976 3977 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */ 3978 if (!p) { 3979 WARN_ON_ONCE(test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)); 3980 return nfserr_resource; 3981 } 3982 if (resp->xdr->buf->page_len && 3983 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) { 3984 WARN_ON_ONCE(1); 3985 return nfserr_resource; 3986 } 3987 xdr_commit_encode(xdr); 3988 3989 maxcount = svc_max_payload(resp->rqstp); 3990 maxcount = min_t(unsigned long, maxcount, 3991 (xdr->buf->buflen - xdr->buf->len)); 3992 maxcount = min_t(unsigned long, maxcount, read->rd_length); 3993 3994 if (file->f_op->splice_read && 3995 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) 3996 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount); 3997 else 3998 nfserr = nfsd4_encode_readv(resp, read, file, maxcount); 3999 4000 if (nfserr) 4001 xdr_truncate_encode(xdr, starting_len); 4002 4003 return nfserr; 4004 } 4005 4006 static __be32 4007 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink) 4008 { 4009 int maxcount; 4010 __be32 wire_count; 4011 int zero = 0; 4012 struct xdr_stream *xdr = resp->xdr; 4013 int length_offset = xdr->buf->len; 4014 int status; 4015 __be32 *p; 4016 4017 p = xdr_reserve_space(xdr, 4); 4018 if (!p) 4019 return nfserr_resource; 4020 maxcount = PAGE_SIZE; 4021 4022 p = xdr_reserve_space(xdr, maxcount); 4023 if (!p) 4024 return nfserr_resource; 4025 /* 4026 * XXX: By default, vfs_readlink() will truncate symlinks if they 4027 * would overflow the buffer. Is this kosher in NFSv4? If not, one 4028 * easy fix is: if vfs_readlink() precisely fills the buffer, assume 4029 * that truncation occurred, and return NFS4ERR_RESOURCE. 4030 */ 4031 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, 4032 (char *)p, &maxcount); 4033 if (nfserr == nfserr_isdir) 4034 nfserr = nfserr_inval; 4035 if (nfserr) 4036 goto out_err; 4037 status = svc_encode_result_payload(readlink->rl_rqstp, length_offset, 4038 maxcount); 4039 if (status) { 4040 nfserr = nfserrno(status); 4041 goto out_err; 4042 } 4043 4044 wire_count = htonl(maxcount); 4045 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4); 4046 xdr_truncate_encode(xdr, length_offset + 4 + ALIGN(maxcount, 4)); 4047 if (maxcount & 3) 4048 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, 4049 &zero, 4 - (maxcount&3)); 4050 return 0; 4051 4052 out_err: 4053 xdr_truncate_encode(xdr, length_offset); 4054 return nfserr; 4055 } 4056 4057 static __be32 4058 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir) 4059 { 4060 int maxcount; 4061 int bytes_left; 4062 loff_t offset; 4063 __be64 wire_offset; 4064 struct xdr_stream *xdr = resp->xdr; 4065 int starting_len = xdr->buf->len; 4066 __be32 *p; 4067 4068 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 4069 if (!p) 4070 return nfserr_resource; 4071 4072 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */ 4073 *p++ = cpu_to_be32(0); 4074 *p++ = cpu_to_be32(0); 4075 xdr->buf->head[0].iov_len = (char *)xdr->p - 4076 (char *)xdr->buf->head[0].iov_base; 4077 4078 /* 4079 * Number of bytes left for directory entries allowing for the 4080 * final 8 bytes of the readdir and a following failed op: 4081 */ 4082 bytes_left = xdr->buf->buflen - xdr->buf->len 4083 - COMPOUND_ERR_SLACK_SPACE - 8; 4084 if (bytes_left < 0) { 4085 nfserr = nfserr_resource; 4086 goto err_no_verf; 4087 } 4088 maxcount = svc_max_payload(resp->rqstp); 4089 maxcount = min_t(u32, readdir->rd_maxcount, maxcount); 4090 /* 4091 * Note the rfc defines rd_maxcount as the size of the 4092 * READDIR4resok structure, which includes the verifier above 4093 * and the 8 bytes encoded at the end of this function: 4094 */ 4095 if (maxcount < 16) { 4096 nfserr = nfserr_toosmall; 4097 goto err_no_verf; 4098 } 4099 maxcount = min_t(int, maxcount-16, bytes_left); 4100 4101 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */ 4102 if (!readdir->rd_dircount) 4103 readdir->rd_dircount = svc_max_payload(resp->rqstp); 4104 4105 readdir->xdr = xdr; 4106 readdir->rd_maxcount = maxcount; 4107 readdir->common.err = 0; 4108 readdir->cookie_offset = 0; 4109 4110 offset = readdir->rd_cookie; 4111 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp, 4112 &offset, 4113 &readdir->common, nfsd4_encode_dirent); 4114 if (nfserr == nfs_ok && 4115 readdir->common.err == nfserr_toosmall && 4116 xdr->buf->len == starting_len + 8) { 4117 /* nothing encoded; which limit did we hit?: */ 4118 if (maxcount - 16 < bytes_left) 4119 /* It was the fault of rd_maxcount: */ 4120 nfserr = nfserr_toosmall; 4121 else 4122 /* We ran out of buffer space: */ 4123 nfserr = nfserr_resource; 4124 } 4125 if (nfserr) 4126 goto err_no_verf; 4127 4128 if (readdir->cookie_offset) { 4129 wire_offset = cpu_to_be64(offset); 4130 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset, 4131 &wire_offset, 8); 4132 } 4133 4134 p = xdr_reserve_space(xdr, 8); 4135 if (!p) { 4136 WARN_ON_ONCE(1); 4137 goto err_no_verf; 4138 } 4139 *p++ = 0; /* no more entries */ 4140 *p++ = htonl(readdir->common.err == nfserr_eof); 4141 4142 return 0; 4143 err_no_verf: 4144 xdr_truncate_encode(xdr, starting_len); 4145 return nfserr; 4146 } 4147 4148 static __be32 4149 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove) 4150 { 4151 struct xdr_stream *xdr = resp->xdr; 4152 __be32 *p; 4153 4154 p = xdr_reserve_space(xdr, 20); 4155 if (!p) 4156 return nfserr_resource; 4157 p = encode_cinfo(p, &remove->rm_cinfo); 4158 return 0; 4159 } 4160 4161 static __be32 4162 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename) 4163 { 4164 struct xdr_stream *xdr = resp->xdr; 4165 __be32 *p; 4166 4167 p = xdr_reserve_space(xdr, 40); 4168 if (!p) 4169 return nfserr_resource; 4170 p = encode_cinfo(p, &rename->rn_sinfo); 4171 p = encode_cinfo(p, &rename->rn_tinfo); 4172 return 0; 4173 } 4174 4175 static __be32 4176 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp) 4177 { 4178 u32 i, nflavs, supported; 4179 struct exp_flavor_info *flavs; 4180 struct exp_flavor_info def_flavs[2]; 4181 __be32 *p, *flavorsp; 4182 static bool report = true; 4183 4184 if (exp->ex_nflavors) { 4185 flavs = exp->ex_flavors; 4186 nflavs = exp->ex_nflavors; 4187 } else { /* Handling of some defaults in absence of real secinfo: */ 4188 flavs = def_flavs; 4189 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) { 4190 nflavs = 2; 4191 flavs[0].pseudoflavor = RPC_AUTH_UNIX; 4192 flavs[1].pseudoflavor = RPC_AUTH_NULL; 4193 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) { 4194 nflavs = 1; 4195 flavs[0].pseudoflavor 4196 = svcauth_gss_flavor(exp->ex_client); 4197 } else { 4198 nflavs = 1; 4199 flavs[0].pseudoflavor 4200 = exp->ex_client->flavour->flavour; 4201 } 4202 } 4203 4204 supported = 0; 4205 p = xdr_reserve_space(xdr, 4); 4206 if (!p) 4207 return nfserr_resource; 4208 flavorsp = p++; /* to be backfilled later */ 4209 4210 for (i = 0; i < nflavs; i++) { 4211 rpc_authflavor_t pf = flavs[i].pseudoflavor; 4212 struct rpcsec_gss_info info; 4213 4214 if (rpcauth_get_gssinfo(pf, &info) == 0) { 4215 supported++; 4216 p = xdr_reserve_space(xdr, 4 + 4 + 4217 XDR_LEN(info.oid.len) + 4 + 4); 4218 if (!p) 4219 return nfserr_resource; 4220 *p++ = cpu_to_be32(RPC_AUTH_GSS); 4221 p = xdr_encode_opaque(p, info.oid.data, info.oid.len); 4222 *p++ = cpu_to_be32(info.qop); 4223 *p++ = cpu_to_be32(info.service); 4224 } else if (pf < RPC_AUTH_MAXFLAVOR) { 4225 supported++; 4226 p = xdr_reserve_space(xdr, 4); 4227 if (!p) 4228 return nfserr_resource; 4229 *p++ = cpu_to_be32(pf); 4230 } else { 4231 if (report) 4232 pr_warn("NFS: SECINFO: security flavor %u " 4233 "is not supported\n", pf); 4234 } 4235 } 4236 4237 if (nflavs != supported) 4238 report = false; 4239 *flavorsp = htonl(supported); 4240 return 0; 4241 } 4242 4243 static __be32 4244 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4245 struct nfsd4_secinfo *secinfo) 4246 { 4247 struct xdr_stream *xdr = resp->xdr; 4248 4249 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp); 4250 } 4251 4252 static __be32 4253 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr, 4254 struct nfsd4_secinfo_no_name *secinfo) 4255 { 4256 struct xdr_stream *xdr = resp->xdr; 4257 4258 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp); 4259 } 4260 4261 /* 4262 * The SETATTR encode routine is special -- it always encodes a bitmap, 4263 * regardless of the error status. 4264 */ 4265 static __be32 4266 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr) 4267 { 4268 struct xdr_stream *xdr = resp->xdr; 4269 __be32 *p; 4270 4271 p = xdr_reserve_space(xdr, 16); 4272 if (!p) 4273 return nfserr_resource; 4274 if (nfserr) { 4275 *p++ = cpu_to_be32(3); 4276 *p++ = cpu_to_be32(0); 4277 *p++ = cpu_to_be32(0); 4278 *p++ = cpu_to_be32(0); 4279 } 4280 else { 4281 *p++ = cpu_to_be32(3); 4282 *p++ = cpu_to_be32(setattr->sa_bmval[0]); 4283 *p++ = cpu_to_be32(setattr->sa_bmval[1]); 4284 *p++ = cpu_to_be32(setattr->sa_bmval[2]); 4285 } 4286 return nfserr; 4287 } 4288 4289 static __be32 4290 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd) 4291 { 4292 struct xdr_stream *xdr = resp->xdr; 4293 __be32 *p; 4294 4295 if (!nfserr) { 4296 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE); 4297 if (!p) 4298 return nfserr_resource; 4299 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8); 4300 p = xdr_encode_opaque_fixed(p, &scd->se_confirm, 4301 NFS4_VERIFIER_SIZE); 4302 } 4303 else if (nfserr == nfserr_clid_inuse) { 4304 p = xdr_reserve_space(xdr, 8); 4305 if (!p) 4306 return nfserr_resource; 4307 *p++ = cpu_to_be32(0); 4308 *p++ = cpu_to_be32(0); 4309 } 4310 return nfserr; 4311 } 4312 4313 static __be32 4314 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write) 4315 { 4316 struct xdr_stream *xdr = resp->xdr; 4317 __be32 *p; 4318 4319 p = xdr_reserve_space(xdr, 16); 4320 if (!p) 4321 return nfserr_resource; 4322 *p++ = cpu_to_be32(write->wr_bytes_written); 4323 *p++ = cpu_to_be32(write->wr_how_written); 4324 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4325 NFS4_VERIFIER_SIZE); 4326 return 0; 4327 } 4328 4329 static __be32 4330 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr, 4331 struct nfsd4_exchange_id *exid) 4332 { 4333 struct xdr_stream *xdr = resp->xdr; 4334 __be32 *p; 4335 char *major_id; 4336 char *server_scope; 4337 int major_id_sz; 4338 int server_scope_sz; 4339 uint64_t minor_id = 0; 4340 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id); 4341 4342 major_id = nn->nfsd_name; 4343 major_id_sz = strlen(nn->nfsd_name); 4344 server_scope = nn->nfsd_name; 4345 server_scope_sz = strlen(nn->nfsd_name); 4346 4347 p = xdr_reserve_space(xdr, 4348 8 /* eir_clientid */ + 4349 4 /* eir_sequenceid */ + 4350 4 /* eir_flags */ + 4351 4 /* spr_how */); 4352 if (!p) 4353 return nfserr_resource; 4354 4355 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8); 4356 *p++ = cpu_to_be32(exid->seqid); 4357 *p++ = cpu_to_be32(exid->flags); 4358 4359 *p++ = cpu_to_be32(exid->spa_how); 4360 4361 switch (exid->spa_how) { 4362 case SP4_NONE: 4363 break; 4364 case SP4_MACH_CRED: 4365 /* spo_must_enforce bitmap: */ 4366 nfserr = nfsd4_encode_bitmap(xdr, 4367 exid->spo_must_enforce[0], 4368 exid->spo_must_enforce[1], 4369 exid->spo_must_enforce[2]); 4370 if (nfserr) 4371 return nfserr; 4372 /* spo_must_allow bitmap: */ 4373 nfserr = nfsd4_encode_bitmap(xdr, 4374 exid->spo_must_allow[0], 4375 exid->spo_must_allow[1], 4376 exid->spo_must_allow[2]); 4377 if (nfserr) 4378 return nfserr; 4379 break; 4380 default: 4381 WARN_ON_ONCE(1); 4382 } 4383 4384 p = xdr_reserve_space(xdr, 4385 8 /* so_minor_id */ + 4386 4 /* so_major_id.len */ + 4387 (XDR_QUADLEN(major_id_sz) * 4) + 4388 4 /* eir_server_scope.len */ + 4389 (XDR_QUADLEN(server_scope_sz) * 4) + 4390 4 /* eir_server_impl_id.count (0) */); 4391 if (!p) 4392 return nfserr_resource; 4393 4394 /* The server_owner struct */ 4395 p = xdr_encode_hyper(p, minor_id); /* Minor id */ 4396 /* major id */ 4397 p = xdr_encode_opaque(p, major_id, major_id_sz); 4398 4399 /* Server scope */ 4400 p = xdr_encode_opaque(p, server_scope, server_scope_sz); 4401 4402 /* Implementation id */ 4403 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */ 4404 return 0; 4405 } 4406 4407 static __be32 4408 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr, 4409 struct nfsd4_create_session *sess) 4410 { 4411 struct xdr_stream *xdr = resp->xdr; 4412 __be32 *p; 4413 4414 p = xdr_reserve_space(xdr, 24); 4415 if (!p) 4416 return nfserr_resource; 4417 p = xdr_encode_opaque_fixed(p, sess->sessionid.data, 4418 NFS4_MAX_SESSIONID_LEN); 4419 *p++ = cpu_to_be32(sess->seqid); 4420 *p++ = cpu_to_be32(sess->flags); 4421 4422 p = xdr_reserve_space(xdr, 28); 4423 if (!p) 4424 return nfserr_resource; 4425 *p++ = cpu_to_be32(0); /* headerpadsz */ 4426 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz); 4427 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz); 4428 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached); 4429 *p++ = cpu_to_be32(sess->fore_channel.maxops); 4430 *p++ = cpu_to_be32(sess->fore_channel.maxreqs); 4431 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs); 4432 4433 if (sess->fore_channel.nr_rdma_attrs) { 4434 p = xdr_reserve_space(xdr, 4); 4435 if (!p) 4436 return nfserr_resource; 4437 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs); 4438 } 4439 4440 p = xdr_reserve_space(xdr, 28); 4441 if (!p) 4442 return nfserr_resource; 4443 *p++ = cpu_to_be32(0); /* headerpadsz */ 4444 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz); 4445 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz); 4446 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached); 4447 *p++ = cpu_to_be32(sess->back_channel.maxops); 4448 *p++ = cpu_to_be32(sess->back_channel.maxreqs); 4449 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs); 4450 4451 if (sess->back_channel.nr_rdma_attrs) { 4452 p = xdr_reserve_space(xdr, 4); 4453 if (!p) 4454 return nfserr_resource; 4455 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs); 4456 } 4457 return 0; 4458 } 4459 4460 static __be32 4461 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr, 4462 struct nfsd4_sequence *seq) 4463 { 4464 struct xdr_stream *xdr = resp->xdr; 4465 __be32 *p; 4466 4467 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20); 4468 if (!p) 4469 return nfserr_resource; 4470 p = xdr_encode_opaque_fixed(p, seq->sessionid.data, 4471 NFS4_MAX_SESSIONID_LEN); 4472 *p++ = cpu_to_be32(seq->seqid); 4473 *p++ = cpu_to_be32(seq->slotid); 4474 /* Note slotid's are numbered from zero: */ 4475 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */ 4476 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */ 4477 *p++ = cpu_to_be32(seq->status_flags); 4478 4479 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */ 4480 return 0; 4481 } 4482 4483 static __be32 4484 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr, 4485 struct nfsd4_test_stateid *test_stateid) 4486 { 4487 struct xdr_stream *xdr = resp->xdr; 4488 struct nfsd4_test_stateid_id *stateid, *next; 4489 __be32 *p; 4490 4491 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids)); 4492 if (!p) 4493 return nfserr_resource; 4494 *p++ = htonl(test_stateid->ts_num_ids); 4495 4496 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) { 4497 *p++ = stateid->ts_id_status; 4498 } 4499 4500 return 0; 4501 } 4502 4503 #ifdef CONFIG_NFSD_PNFS 4504 static __be32 4505 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4506 struct nfsd4_getdeviceinfo *gdev) 4507 { 4508 struct xdr_stream *xdr = resp->xdr; 4509 const struct nfsd4_layout_ops *ops; 4510 u32 starting_len = xdr->buf->len, needed_len; 4511 __be32 *p; 4512 4513 p = xdr_reserve_space(xdr, 4); 4514 if (!p) 4515 return nfserr_resource; 4516 4517 *p++ = cpu_to_be32(gdev->gd_layout_type); 4518 4519 /* If maxcount is 0 then just update notifications */ 4520 if (gdev->gd_maxcount != 0) { 4521 ops = nfsd4_layout_ops[gdev->gd_layout_type]; 4522 nfserr = ops->encode_getdeviceinfo(xdr, gdev); 4523 if (nfserr) { 4524 /* 4525 * We don't bother to burden the layout drivers with 4526 * enforcing gd_maxcount, just tell the client to 4527 * come back with a bigger buffer if it's not enough. 4528 */ 4529 if (xdr->buf->len + 4 > gdev->gd_maxcount) 4530 goto toosmall; 4531 return nfserr; 4532 } 4533 } 4534 4535 if (gdev->gd_notify_types) { 4536 p = xdr_reserve_space(xdr, 4 + 4); 4537 if (!p) 4538 return nfserr_resource; 4539 *p++ = cpu_to_be32(1); /* bitmap length */ 4540 *p++ = cpu_to_be32(gdev->gd_notify_types); 4541 } else { 4542 p = xdr_reserve_space(xdr, 4); 4543 if (!p) 4544 return nfserr_resource; 4545 *p++ = 0; 4546 } 4547 4548 return 0; 4549 toosmall: 4550 dprintk("%s: maxcount too small\n", __func__); 4551 needed_len = xdr->buf->len + 4 /* notifications */; 4552 xdr_truncate_encode(xdr, starting_len); 4553 p = xdr_reserve_space(xdr, 4); 4554 if (!p) 4555 return nfserr_resource; 4556 *p++ = cpu_to_be32(needed_len); 4557 return nfserr_toosmall; 4558 } 4559 4560 static __be32 4561 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr, 4562 struct nfsd4_layoutget *lgp) 4563 { 4564 struct xdr_stream *xdr = resp->xdr; 4565 const struct nfsd4_layout_ops *ops; 4566 __be32 *p; 4567 4568 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t)); 4569 if (!p) 4570 return nfserr_resource; 4571 4572 *p++ = cpu_to_be32(1); /* we always set return-on-close */ 4573 *p++ = cpu_to_be32(lgp->lg_sid.si_generation); 4574 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque, 4575 sizeof(stateid_opaque_t)); 4576 4577 *p++ = cpu_to_be32(1); /* we always return a single layout */ 4578 p = xdr_encode_hyper(p, lgp->lg_seg.offset); 4579 p = xdr_encode_hyper(p, lgp->lg_seg.length); 4580 *p++ = cpu_to_be32(lgp->lg_seg.iomode); 4581 *p++ = cpu_to_be32(lgp->lg_layout_type); 4582 4583 ops = nfsd4_layout_ops[lgp->lg_layout_type]; 4584 return ops->encode_layoutget(xdr, lgp); 4585 } 4586 4587 static __be32 4588 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr, 4589 struct nfsd4_layoutcommit *lcp) 4590 { 4591 struct xdr_stream *xdr = resp->xdr; 4592 __be32 *p; 4593 4594 p = xdr_reserve_space(xdr, 4); 4595 if (!p) 4596 return nfserr_resource; 4597 *p++ = cpu_to_be32(lcp->lc_size_chg); 4598 if (lcp->lc_size_chg) { 4599 p = xdr_reserve_space(xdr, 8); 4600 if (!p) 4601 return nfserr_resource; 4602 p = xdr_encode_hyper(p, lcp->lc_newsize); 4603 } 4604 4605 return 0; 4606 } 4607 4608 static __be32 4609 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr, 4610 struct nfsd4_layoutreturn *lrp) 4611 { 4612 struct xdr_stream *xdr = resp->xdr; 4613 __be32 *p; 4614 4615 p = xdr_reserve_space(xdr, 4); 4616 if (!p) 4617 return nfserr_resource; 4618 *p++ = cpu_to_be32(lrp->lrs_present); 4619 if (lrp->lrs_present) 4620 return nfsd4_encode_stateid(xdr, &lrp->lr_sid); 4621 return 0; 4622 } 4623 #endif /* CONFIG_NFSD_PNFS */ 4624 4625 static __be32 4626 nfsd42_encode_write_res(struct nfsd4_compoundres *resp, 4627 struct nfsd42_write_res *write, bool sync) 4628 { 4629 __be32 *p; 4630 p = xdr_reserve_space(resp->xdr, 4); 4631 if (!p) 4632 return nfserr_resource; 4633 4634 if (sync) 4635 *p++ = cpu_to_be32(0); 4636 else { 4637 __be32 nfserr; 4638 *p++ = cpu_to_be32(1); 4639 nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid); 4640 if (nfserr) 4641 return nfserr; 4642 } 4643 p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE); 4644 if (!p) 4645 return nfserr_resource; 4646 4647 p = xdr_encode_hyper(p, write->wr_bytes_written); 4648 *p++ = cpu_to_be32(write->wr_stable_how); 4649 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4650 NFS4_VERIFIER_SIZE); 4651 return nfs_ok; 4652 } 4653 4654 static __be32 4655 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns) 4656 { 4657 struct xdr_stream *xdr = resp->xdr; 4658 struct nfs42_netaddr *addr; 4659 __be32 *p; 4660 4661 p = xdr_reserve_space(xdr, 4); 4662 *p++ = cpu_to_be32(ns->nl4_type); 4663 4664 switch (ns->nl4_type) { 4665 case NL4_NETADDR: 4666 addr = &ns->u.nl4_addr; 4667 4668 /* netid_len, netid, uaddr_len, uaddr (port included 4669 * in RPCBIND_MAXUADDRLEN) 4670 */ 4671 p = xdr_reserve_space(xdr, 4672 4 /* netid len */ + 4673 (XDR_QUADLEN(addr->netid_len) * 4) + 4674 4 /* uaddr len */ + 4675 (XDR_QUADLEN(addr->addr_len) * 4)); 4676 if (!p) 4677 return nfserr_resource; 4678 4679 *p++ = cpu_to_be32(addr->netid_len); 4680 p = xdr_encode_opaque_fixed(p, addr->netid, 4681 addr->netid_len); 4682 *p++ = cpu_to_be32(addr->addr_len); 4683 p = xdr_encode_opaque_fixed(p, addr->addr, 4684 addr->addr_len); 4685 break; 4686 default: 4687 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR); 4688 return nfserr_inval; 4689 } 4690 4691 return 0; 4692 } 4693 4694 static __be32 4695 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr, 4696 struct nfsd4_copy *copy) 4697 { 4698 __be32 *p; 4699 4700 nfserr = nfsd42_encode_write_res(resp, ©->cp_res, 4701 !!copy->cp_synchronous); 4702 if (nfserr) 4703 return nfserr; 4704 4705 p = xdr_reserve_space(resp->xdr, 4 + 4); 4706 *p++ = xdr_one; /* cr_consecutive */ 4707 *p++ = cpu_to_be32(copy->cp_synchronous); 4708 return 0; 4709 } 4710 4711 static __be32 4712 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr, 4713 struct nfsd4_offload_status *os) 4714 { 4715 struct xdr_stream *xdr = resp->xdr; 4716 __be32 *p; 4717 4718 p = xdr_reserve_space(xdr, 8 + 4); 4719 if (!p) 4720 return nfserr_resource; 4721 p = xdr_encode_hyper(p, os->count); 4722 *p++ = cpu_to_be32(0); 4723 return nfserr; 4724 } 4725 4726 static __be32 4727 nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp, 4728 struct nfsd4_read *read, 4729 unsigned long *maxcount, u32 *eof, 4730 loff_t *pos) 4731 { 4732 struct xdr_stream *xdr = resp->xdr; 4733 struct file *file = read->rd_nf->nf_file; 4734 int starting_len = xdr->buf->len; 4735 loff_t hole_pos; 4736 __be32 nfserr; 4737 __be32 *p, tmp; 4738 __be64 tmp64; 4739 4740 hole_pos = pos ? *pos : vfs_llseek(file, read->rd_offset, SEEK_HOLE); 4741 if (hole_pos > read->rd_offset) 4742 *maxcount = min_t(unsigned long, *maxcount, hole_pos - read->rd_offset); 4743 *maxcount = min_t(unsigned long, *maxcount, (xdr->buf->buflen - xdr->buf->len)); 4744 4745 /* Content type, offset, byte count */ 4746 p = xdr_reserve_space(xdr, 4 + 8 + 4); 4747 if (!p) 4748 return nfserr_resource; 4749 4750 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, *maxcount); 4751 if (read->rd_vlen < 0) 4752 return nfserr_resource; 4753 4754 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset, 4755 resp->rqstp->rq_vec, read->rd_vlen, maxcount, eof); 4756 if (nfserr) 4757 return nfserr; 4758 xdr_truncate_encode(xdr, starting_len + 16 + xdr_align_size(*maxcount)); 4759 4760 tmp = htonl(NFS4_CONTENT_DATA); 4761 write_bytes_to_xdr_buf(xdr->buf, starting_len, &tmp, 4); 4762 tmp64 = cpu_to_be64(read->rd_offset); 4763 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp64, 8); 4764 tmp = htonl(*maxcount); 4765 write_bytes_to_xdr_buf(xdr->buf, starting_len + 12, &tmp, 4); 4766 4767 tmp = xdr_zero; 4768 write_bytes_to_xdr_buf(xdr->buf, starting_len + 16 + *maxcount, &tmp, 4769 xdr_pad_size(*maxcount)); 4770 return nfs_ok; 4771 } 4772 4773 static __be32 4774 nfsd4_encode_read_plus_hole(struct nfsd4_compoundres *resp, 4775 struct nfsd4_read *read, 4776 unsigned long *maxcount, u32 *eof) 4777 { 4778 struct file *file = read->rd_nf->nf_file; 4779 loff_t data_pos = vfs_llseek(file, read->rd_offset, SEEK_DATA); 4780 loff_t f_size = i_size_read(file_inode(file)); 4781 unsigned long count; 4782 __be32 *p; 4783 4784 if (data_pos == -ENXIO) 4785 data_pos = f_size; 4786 else if (data_pos <= read->rd_offset || (data_pos < f_size && data_pos % PAGE_SIZE)) 4787 return nfsd4_encode_read_plus_data(resp, read, maxcount, eof, &f_size); 4788 count = data_pos - read->rd_offset; 4789 4790 /* Content type, offset, byte count */ 4791 p = xdr_reserve_space(resp->xdr, 4 + 8 + 8); 4792 if (!p) 4793 return nfserr_resource; 4794 4795 *p++ = htonl(NFS4_CONTENT_HOLE); 4796 p = xdr_encode_hyper(p, read->rd_offset); 4797 p = xdr_encode_hyper(p, count); 4798 4799 *eof = (read->rd_offset + count) >= f_size; 4800 *maxcount = min_t(unsigned long, count, *maxcount); 4801 return nfs_ok; 4802 } 4803 4804 static __be32 4805 nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr, 4806 struct nfsd4_read *read) 4807 { 4808 unsigned long maxcount, count; 4809 struct xdr_stream *xdr = resp->xdr; 4810 struct file *file; 4811 int starting_len = xdr->buf->len; 4812 int last_segment = xdr->buf->len; 4813 int segments = 0; 4814 __be32 *p, tmp; 4815 bool is_data; 4816 loff_t pos; 4817 u32 eof; 4818 4819 if (nfserr) 4820 return nfserr; 4821 file = read->rd_nf->nf_file; 4822 4823 /* eof flag, segment count */ 4824 p = xdr_reserve_space(xdr, 4 + 4); 4825 if (!p) 4826 return nfserr_resource; 4827 xdr_commit_encode(xdr); 4828 4829 maxcount = svc_max_payload(resp->rqstp); 4830 maxcount = min_t(unsigned long, maxcount, 4831 (xdr->buf->buflen - xdr->buf->len)); 4832 maxcount = min_t(unsigned long, maxcount, read->rd_length); 4833 count = maxcount; 4834 4835 eof = read->rd_offset >= i_size_read(file_inode(file)); 4836 if (eof) 4837 goto out; 4838 4839 pos = vfs_llseek(file, read->rd_offset, SEEK_HOLE); 4840 is_data = pos > read->rd_offset; 4841 4842 while (count > 0 && !eof) { 4843 maxcount = count; 4844 if (is_data) 4845 nfserr = nfsd4_encode_read_plus_data(resp, read, &maxcount, &eof, 4846 segments == 0 ? &pos : NULL); 4847 else 4848 nfserr = nfsd4_encode_read_plus_hole(resp, read, &maxcount, &eof); 4849 if (nfserr) 4850 goto out; 4851 count -= maxcount; 4852 read->rd_offset += maxcount; 4853 is_data = !is_data; 4854 last_segment = xdr->buf->len; 4855 segments++; 4856 } 4857 4858 out: 4859 if (nfserr && segments == 0) 4860 xdr_truncate_encode(xdr, starting_len); 4861 else { 4862 if (nfserr) { 4863 xdr_truncate_encode(xdr, last_segment); 4864 nfserr = nfs_ok; 4865 eof = 0; 4866 } 4867 tmp = htonl(eof); 4868 write_bytes_to_xdr_buf(xdr->buf, starting_len, &tmp, 4); 4869 tmp = htonl(segments); 4870 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4); 4871 } 4872 4873 return nfserr; 4874 } 4875 4876 static __be32 4877 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr, 4878 struct nfsd4_copy_notify *cn) 4879 { 4880 struct xdr_stream *xdr = resp->xdr; 4881 __be32 *p; 4882 4883 if (nfserr) 4884 return nfserr; 4885 4886 /* 8 sec, 4 nsec */ 4887 p = xdr_reserve_space(xdr, 12); 4888 if (!p) 4889 return nfserr_resource; 4890 4891 /* cnr_lease_time */ 4892 p = xdr_encode_hyper(p, cn->cpn_sec); 4893 *p++ = cpu_to_be32(cn->cpn_nsec); 4894 4895 /* cnr_stateid */ 4896 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid); 4897 if (nfserr) 4898 return nfserr; 4899 4900 /* cnr_src.nl_nsvr */ 4901 p = xdr_reserve_space(xdr, 4); 4902 if (!p) 4903 return nfserr_resource; 4904 4905 *p++ = cpu_to_be32(1); 4906 4907 return nfsd42_encode_nl4_server(resp, &cn->cpn_src); 4908 } 4909 4910 static __be32 4911 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr, 4912 struct nfsd4_seek *seek) 4913 { 4914 __be32 *p; 4915 4916 p = xdr_reserve_space(resp->xdr, 4 + 8); 4917 *p++ = cpu_to_be32(seek->seek_eof); 4918 p = xdr_encode_hyper(p, seek->seek_pos); 4919 4920 return 0; 4921 } 4922 4923 static __be32 4924 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p) 4925 { 4926 return nfserr; 4927 } 4928 4929 /* 4930 * Encode kmalloc-ed buffer in to XDR stream. 4931 */ 4932 static __be32 4933 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen) 4934 { 4935 u32 cplen; 4936 __be32 *p; 4937 4938 cplen = min_t(unsigned long, buflen, 4939 ((void *)xdr->end - (void *)xdr->p)); 4940 p = xdr_reserve_space(xdr, cplen); 4941 if (!p) 4942 return nfserr_resource; 4943 4944 memcpy(p, buf, cplen); 4945 buf += cplen; 4946 buflen -= cplen; 4947 4948 while (buflen) { 4949 cplen = min_t(u32, buflen, PAGE_SIZE); 4950 p = xdr_reserve_space(xdr, cplen); 4951 if (!p) 4952 return nfserr_resource; 4953 4954 memcpy(p, buf, cplen); 4955 4956 if (cplen < PAGE_SIZE) { 4957 /* 4958 * We're done, with a length that wasn't page 4959 * aligned, so possibly not word aligned. Pad 4960 * any trailing bytes with 0. 4961 */ 4962 xdr_encode_opaque_fixed(p, NULL, cplen); 4963 break; 4964 } 4965 4966 buflen -= PAGE_SIZE; 4967 buf += PAGE_SIZE; 4968 } 4969 4970 return 0; 4971 } 4972 4973 static __be32 4974 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4975 struct nfsd4_getxattr *getxattr) 4976 { 4977 struct xdr_stream *xdr = resp->xdr; 4978 __be32 *p, err; 4979 4980 p = xdr_reserve_space(xdr, 4); 4981 if (!p) 4982 return nfserr_resource; 4983 4984 *p = cpu_to_be32(getxattr->getxa_len); 4985 4986 if (getxattr->getxa_len == 0) 4987 return 0; 4988 4989 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf, 4990 getxattr->getxa_len); 4991 4992 kvfree(getxattr->getxa_buf); 4993 4994 return err; 4995 } 4996 4997 static __be32 4998 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4999 struct nfsd4_setxattr *setxattr) 5000 { 5001 struct xdr_stream *xdr = resp->xdr; 5002 __be32 *p; 5003 5004 p = xdr_reserve_space(xdr, 20); 5005 if (!p) 5006 return nfserr_resource; 5007 5008 encode_cinfo(p, &setxattr->setxa_cinfo); 5009 5010 return 0; 5011 } 5012 5013 /* 5014 * See if there are cookie values that can be rejected outright. 5015 */ 5016 static __be32 5017 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs, 5018 u32 *offsetp) 5019 { 5020 u64 cookie = listxattrs->lsxa_cookie; 5021 5022 /* 5023 * If the cookie is larger than the maximum number we can fit 5024 * in either the buffer we just got back from vfs_listxattr, or, 5025 * XDR-encoded, in the return buffer, it's invalid. 5026 */ 5027 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2)) 5028 return nfserr_badcookie; 5029 5030 if (cookie > (listxattrs->lsxa_maxcount / 5031 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4))) 5032 return nfserr_badcookie; 5033 5034 *offsetp = (u32)cookie; 5035 return 0; 5036 } 5037 5038 static __be32 5039 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr, 5040 struct nfsd4_listxattrs *listxattrs) 5041 { 5042 struct xdr_stream *xdr = resp->xdr; 5043 u32 cookie_offset, count_offset, eof; 5044 u32 left, xdrleft, slen, count; 5045 u32 xdrlen, offset; 5046 u64 cookie; 5047 char *sp; 5048 __be32 status, tmp; 5049 __be32 *p; 5050 u32 nuser; 5051 5052 eof = 1; 5053 5054 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset); 5055 if (status) 5056 goto out; 5057 5058 /* 5059 * Reserve space for the cookie and the name array count. Record 5060 * the offsets to save them later. 5061 */ 5062 cookie_offset = xdr->buf->len; 5063 count_offset = cookie_offset + 8; 5064 p = xdr_reserve_space(xdr, 12); 5065 if (!p) { 5066 status = nfserr_resource; 5067 goto out; 5068 } 5069 5070 count = 0; 5071 left = listxattrs->lsxa_len; 5072 sp = listxattrs->lsxa_buf; 5073 nuser = 0; 5074 5075 xdrleft = listxattrs->lsxa_maxcount; 5076 5077 while (left > 0 && xdrleft > 0) { 5078 slen = strlen(sp); 5079 5080 /* 5081 * Check if this is a "user." attribute, skip it if not. 5082 */ 5083 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 5084 goto contloop; 5085 5086 slen -= XATTR_USER_PREFIX_LEN; 5087 xdrlen = 4 + ((slen + 3) & ~3); 5088 if (xdrlen > xdrleft) { 5089 if (count == 0) { 5090 /* 5091 * Can't even fit the first attribute name. 5092 */ 5093 status = nfserr_toosmall; 5094 goto out; 5095 } 5096 eof = 0; 5097 goto wreof; 5098 } 5099 5100 left -= XATTR_USER_PREFIX_LEN; 5101 sp += XATTR_USER_PREFIX_LEN; 5102 if (nuser++ < offset) 5103 goto contloop; 5104 5105 5106 p = xdr_reserve_space(xdr, xdrlen); 5107 if (!p) { 5108 status = nfserr_resource; 5109 goto out; 5110 } 5111 5112 xdr_encode_opaque(p, sp, slen); 5113 5114 xdrleft -= xdrlen; 5115 count++; 5116 contloop: 5117 sp += slen + 1; 5118 left -= slen + 1; 5119 } 5120 5121 /* 5122 * If there were user attributes to copy, but we didn't copy 5123 * any, the offset was too large (e.g. the cookie was invalid). 5124 */ 5125 if (nuser > 0 && count == 0) { 5126 status = nfserr_badcookie; 5127 goto out; 5128 } 5129 5130 wreof: 5131 p = xdr_reserve_space(xdr, 4); 5132 if (!p) { 5133 status = nfserr_resource; 5134 goto out; 5135 } 5136 *p = cpu_to_be32(eof); 5137 5138 cookie = offset + count; 5139 5140 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8); 5141 tmp = cpu_to_be32(count); 5142 write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4); 5143 out: 5144 if (listxattrs->lsxa_len) 5145 kvfree(listxattrs->lsxa_buf); 5146 return status; 5147 } 5148 5149 static __be32 5150 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr, 5151 struct nfsd4_removexattr *removexattr) 5152 { 5153 struct xdr_stream *xdr = resp->xdr; 5154 __be32 *p; 5155 5156 p = xdr_reserve_space(xdr, 20); 5157 if (!p) 5158 return nfserr_resource; 5159 5160 p = encode_cinfo(p, &removexattr->rmxa_cinfo); 5161 return 0; 5162 } 5163 5164 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *); 5165 5166 /* 5167 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1 5168 * since we don't need to filter out obsolete ops as this is 5169 * done in the decoding phase. 5170 */ 5171 static const nfsd4_enc nfsd4_enc_ops[] = { 5172 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access, 5173 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close, 5174 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit, 5175 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create, 5176 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop, 5177 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop, 5178 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr, 5179 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh, 5180 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link, 5181 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock, 5182 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt, 5183 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku, 5184 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop, 5185 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop, 5186 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop, 5187 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open, 5188 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop, 5189 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm, 5190 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade, 5191 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop, 5192 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop, 5193 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop, 5194 [OP_READ] = (nfsd4_enc)nfsd4_encode_read, 5195 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir, 5196 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink, 5197 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove, 5198 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename, 5199 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop, 5200 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop, 5201 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop, 5202 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo, 5203 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr, 5204 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid, 5205 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop, 5206 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop, 5207 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write, 5208 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop, 5209 5210 /* NFSv4.1 operations */ 5211 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop, 5212 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session, 5213 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id, 5214 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session, 5215 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop, 5216 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop, 5217 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 5218 #ifdef CONFIG_NFSD_PNFS 5219 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_getdeviceinfo, 5220 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, 5221 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_layoutcommit, 5222 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_layoutget, 5223 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_layoutreturn, 5224 #else 5225 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop, 5226 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, 5227 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop, 5228 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop, 5229 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop, 5230 #endif 5231 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name, 5232 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence, 5233 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop, 5234 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid, 5235 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 5236 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop, 5237 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop, 5238 5239 /* NFSv4.2 operations */ 5240 [OP_ALLOCATE] = (nfsd4_enc)nfsd4_encode_noop, 5241 [OP_COPY] = (nfsd4_enc)nfsd4_encode_copy, 5242 [OP_COPY_NOTIFY] = (nfsd4_enc)nfsd4_encode_copy_notify, 5243 [OP_DEALLOCATE] = (nfsd4_enc)nfsd4_encode_noop, 5244 [OP_IO_ADVISE] = (nfsd4_enc)nfsd4_encode_noop, 5245 [OP_LAYOUTERROR] = (nfsd4_enc)nfsd4_encode_noop, 5246 [OP_LAYOUTSTATS] = (nfsd4_enc)nfsd4_encode_noop, 5247 [OP_OFFLOAD_CANCEL] = (nfsd4_enc)nfsd4_encode_noop, 5248 [OP_OFFLOAD_STATUS] = (nfsd4_enc)nfsd4_encode_offload_status, 5249 [OP_READ_PLUS] = (nfsd4_enc)nfsd4_encode_read_plus, 5250 [OP_SEEK] = (nfsd4_enc)nfsd4_encode_seek, 5251 [OP_WRITE_SAME] = (nfsd4_enc)nfsd4_encode_noop, 5252 [OP_CLONE] = (nfsd4_enc)nfsd4_encode_noop, 5253 5254 /* RFC 8276 extended atributes operations */ 5255 [OP_GETXATTR] = (nfsd4_enc)nfsd4_encode_getxattr, 5256 [OP_SETXATTR] = (nfsd4_enc)nfsd4_encode_setxattr, 5257 [OP_LISTXATTRS] = (nfsd4_enc)nfsd4_encode_listxattrs, 5258 [OP_REMOVEXATTR] = (nfsd4_enc)nfsd4_encode_removexattr, 5259 }; 5260 5261 /* 5262 * Calculate whether we still have space to encode repsize bytes. 5263 * There are two considerations: 5264 * - For NFS versions >=4.1, the size of the reply must stay within 5265 * session limits 5266 * - For all NFS versions, we must stay within limited preallocated 5267 * buffer space. 5268 * 5269 * This is called before the operation is processed, so can only provide 5270 * an upper estimate. For some nonidempotent operations (such as 5271 * getattr), it's not necessarily a problem if that estimate is wrong, 5272 * as we can fail it after processing without significant side effects. 5273 */ 5274 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize) 5275 { 5276 struct xdr_buf *buf = &resp->rqstp->rq_res; 5277 struct nfsd4_slot *slot = resp->cstate.slot; 5278 5279 if (buf->len + respsize <= buf->buflen) 5280 return nfs_ok; 5281 if (!nfsd4_has_session(&resp->cstate)) 5282 return nfserr_resource; 5283 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) { 5284 WARN_ON_ONCE(1); 5285 return nfserr_rep_too_big_to_cache; 5286 } 5287 return nfserr_rep_too_big; 5288 } 5289 5290 void 5291 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op) 5292 { 5293 struct xdr_stream *xdr = resp->xdr; 5294 struct nfs4_stateowner *so = resp->cstate.replay_owner; 5295 struct svc_rqst *rqstp = resp->rqstp; 5296 const struct nfsd4_operation *opdesc = op->opdesc; 5297 int post_err_offset; 5298 nfsd4_enc encoder; 5299 __be32 *p; 5300 5301 p = xdr_reserve_space(xdr, 8); 5302 if (!p) { 5303 WARN_ON_ONCE(1); 5304 return; 5305 } 5306 *p++ = cpu_to_be32(op->opnum); 5307 post_err_offset = xdr->buf->len; 5308 5309 if (op->opnum == OP_ILLEGAL) 5310 goto status; 5311 if (op->status && opdesc && 5312 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE)) 5313 goto status; 5314 BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) || 5315 !nfsd4_enc_ops[op->opnum]); 5316 encoder = nfsd4_enc_ops[op->opnum]; 5317 op->status = encoder(resp, op->status, &op->u); 5318 if (op->status) 5319 trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status); 5320 if (opdesc && opdesc->op_release) 5321 opdesc->op_release(&op->u); 5322 xdr_commit_encode(xdr); 5323 5324 /* nfsd4_check_resp_size guarantees enough room for error status */ 5325 if (!op->status) { 5326 int space_needed = 0; 5327 if (!nfsd4_last_compound_op(rqstp)) 5328 space_needed = COMPOUND_ERR_SLACK_SPACE; 5329 op->status = nfsd4_check_resp_size(resp, space_needed); 5330 } 5331 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) { 5332 struct nfsd4_slot *slot = resp->cstate.slot; 5333 5334 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) 5335 op->status = nfserr_rep_too_big_to_cache; 5336 else 5337 op->status = nfserr_rep_too_big; 5338 } 5339 if (op->status == nfserr_resource || 5340 op->status == nfserr_rep_too_big || 5341 op->status == nfserr_rep_too_big_to_cache) { 5342 /* 5343 * The operation may have already been encoded or 5344 * partially encoded. No op returns anything additional 5345 * in the case of one of these three errors, so we can 5346 * just truncate back to after the status. But it's a 5347 * bug if we had to do this on a non-idempotent op: 5348 */ 5349 warn_on_nonidempotent_op(op); 5350 xdr_truncate_encode(xdr, post_err_offset); 5351 } 5352 if (so) { 5353 int len = xdr->buf->len - post_err_offset; 5354 5355 so->so_replay.rp_status = op->status; 5356 so->so_replay.rp_buflen = len; 5357 read_bytes_from_xdr_buf(xdr->buf, post_err_offset, 5358 so->so_replay.rp_buf, len); 5359 } 5360 status: 5361 /* Note that op->status is already in network byte order: */ 5362 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4); 5363 } 5364 5365 /* 5366 * Encode the reply stored in the stateowner reply cache 5367 * 5368 * XDR note: do not encode rp->rp_buflen: the buffer contains the 5369 * previously sent already encoded operation. 5370 */ 5371 void 5372 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op) 5373 { 5374 __be32 *p; 5375 struct nfs4_replay *rp = op->replay; 5376 5377 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen); 5378 if (!p) { 5379 WARN_ON_ONCE(1); 5380 return; 5381 } 5382 *p++ = cpu_to_be32(op->opnum); 5383 *p++ = rp->rp_status; /* already xdr'ed */ 5384 5385 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen); 5386 } 5387 5388 void nfsd4_release_compoundargs(struct svc_rqst *rqstp) 5389 { 5390 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5391 5392 if (args->ops != args->iops) { 5393 kfree(args->ops); 5394 args->ops = args->iops; 5395 } 5396 while (args->to_free) { 5397 struct svcxdr_tmpbuf *tb = args->to_free; 5398 args->to_free = tb->next; 5399 kfree(tb); 5400 } 5401 } 5402 5403 bool 5404 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, struct xdr_stream *xdr) 5405 { 5406 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5407 5408 /* svcxdr_tmp_alloc */ 5409 args->to_free = NULL; 5410 5411 args->xdr = xdr; 5412 args->ops = args->iops; 5413 args->rqstp = rqstp; 5414 5415 return nfsd4_decode_compound(args); 5416 } 5417 5418 bool 5419 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, struct xdr_stream *xdr) 5420 { 5421 struct nfsd4_compoundres *resp = rqstp->rq_resp; 5422 struct xdr_buf *buf = xdr->buf; 5423 __be32 *p; 5424 5425 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len + 5426 buf->tail[0].iov_len); 5427 5428 /* 5429 * Send buffer space for the following items is reserved 5430 * at the top of nfsd4_proc_compound(). 5431 */ 5432 p = resp->statusp; 5433 5434 *p++ = resp->cstate.status; 5435 5436 rqstp->rq_next_page = xdr->page_ptr + 1; 5437 5438 *p++ = htonl(resp->taglen); 5439 memcpy(p, resp->tag, resp->taglen); 5440 p += XDR_QUADLEN(resp->taglen); 5441 *p++ = htonl(resp->opcnt); 5442 5443 nfsd4_sequence_done(resp); 5444 return true; 5445 } 5446