xref: /linux/fs/lockd/xdr4.c (revision 109d59b900e78834c66657dd4748fcedb9a1fe8d)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * linux/fs/lockd/xdr4.c
4  *
5  * XDR support for lockd and the lock client.
6  *
7  * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
8  * Copyright (C) 1999, Trond Myklebust <trond.myklebust@fys.uio.no>
9  */
10 
11 #include <linux/types.h>
12 #include <linux/sched.h>
13 #include <linux/nfs.h>
14 
15 #include <linux/sunrpc/xdr.h>
16 #include <linux/sunrpc/clnt.h>
17 #include <linux/sunrpc/svc.h>
18 #include <linux/sunrpc/stats.h>
19 #include <linux/lockd/lockd.h>
20 
21 #define NLMDBG_FACILITY		NLMDBG_XDR
22 
23 static inline loff_t
24 s64_to_loff_t(__s64 offset)
25 {
26 	return (loff_t)offset;
27 }
28 
29 
30 static inline s64
31 loff_t_to_s64(loff_t offset)
32 {
33 	s64 res;
34 	if (offset > NLM4_OFFSET_MAX)
35 		res = NLM4_OFFSET_MAX;
36 	else if (offset < -NLM4_OFFSET_MAX)
37 		res = -NLM4_OFFSET_MAX;
38 	else
39 		res = offset;
40 	return res;
41 }
42 
43 /*
44  * XDR functions for basic NLM types
45  */
46 static __be32 *
47 nlm4_decode_cookie(__be32 *p, struct nlm_cookie *c)
48 {
49 	unsigned int	len;
50 
51 	len = ntohl(*p++);
52 
53 	if(len==0)
54 	{
55 		c->len=4;
56 		memset(c->data, 0, 4);	/* hockeypux brain damage */
57 	}
58 	else if(len<=NLM_MAXCOOKIELEN)
59 	{
60 		c->len=len;
61 		memcpy(c->data, p, len);
62 		p+=XDR_QUADLEN(len);
63 	}
64 	else
65 	{
66 		dprintk("lockd: bad cookie size %d (only cookies under "
67 			"%d bytes are supported.)\n",
68 				len, NLM_MAXCOOKIELEN);
69 		return NULL;
70 	}
71 	return p;
72 }
73 
74 static __be32 *
75 nlm4_encode_cookie(__be32 *p, struct nlm_cookie *c)
76 {
77 	*p++ = htonl(c->len);
78 	memcpy(p, c->data, c->len);
79 	p+=XDR_QUADLEN(c->len);
80 	return p;
81 }
82 
83 static __be32 *
84 nlm4_decode_fh(__be32 *p, struct nfs_fh *f)
85 {
86 	memset(f->data, 0, sizeof(f->data));
87 	f->size = ntohl(*p++);
88 	if (f->size > NFS_MAXFHSIZE) {
89 		dprintk("lockd: bad fhandle size %d (should be <=%d)\n",
90 			f->size, NFS_MAXFHSIZE);
91 		return NULL;
92 	}
93       	memcpy(f->data, p, f->size);
94 	return p + XDR_QUADLEN(f->size);
95 }
96 
97 /*
98  * Encode and decode owner handle
99  */
100 static __be32 *
101 nlm4_decode_oh(__be32 *p, struct xdr_netobj *oh)
102 {
103 	return xdr_decode_netobj(p, oh);
104 }
105 
106 static __be32 *
107 nlm4_decode_lock(__be32 *p, struct nlm_lock *lock)
108 {
109 	struct file_lock	*fl = &lock->fl;
110 	__u64			len, start;
111 	__s64			end;
112 
113 	if (!(p = xdr_decode_string_inplace(p, &lock->caller,
114 					    &lock->len, NLM_MAXSTRLEN))
115 	 || !(p = nlm4_decode_fh(p, &lock->fh))
116 	 || !(p = nlm4_decode_oh(p, &lock->oh)))
117 		return NULL;
118 	lock->svid  = ntohl(*p++);
119 
120 	locks_init_lock(fl);
121 	fl->fl_owner = current->files;
122 	fl->fl_pid   = (pid_t)lock->svid;
123 	fl->fl_flags = FL_POSIX;
124 	fl->fl_type  = F_RDLCK;		/* as good as anything else */
125 	p = xdr_decode_hyper(p, &start);
126 	p = xdr_decode_hyper(p, &len);
127 	end = start + len - 1;
128 
129 	fl->fl_start = s64_to_loff_t(start);
130 
131 	if (len == 0 || end < 0)
132 		fl->fl_end = OFFSET_MAX;
133 	else
134 		fl->fl_end = s64_to_loff_t(end);
135 	return p;
136 }
137 
138 /*
139  * Encode result of a TEST/TEST_MSG call
140  */
141 static __be32 *
142 nlm4_encode_testres(__be32 *p, struct nlm_res *resp)
143 {
144 	s64		start, len;
145 
146 	dprintk("xdr: before encode_testres (p %p resp %p)\n", p, resp);
147 	if (!(p = nlm4_encode_cookie(p, &resp->cookie)))
148 		return NULL;
149 	*p++ = resp->status;
150 
151 	if (resp->status == nlm_lck_denied) {
152 		struct file_lock	*fl = &resp->lock.fl;
153 
154 		*p++ = (fl->fl_type == F_RDLCK)? xdr_zero : xdr_one;
155 		*p++ = htonl(resp->lock.svid);
156 
157 		/* Encode owner handle. */
158 		if (!(p = xdr_encode_netobj(p, &resp->lock.oh)))
159 			return NULL;
160 
161 		start = loff_t_to_s64(fl->fl_start);
162 		if (fl->fl_end == OFFSET_MAX)
163 			len = 0;
164 		else
165 			len = loff_t_to_s64(fl->fl_end - fl->fl_start + 1);
166 
167 		p = xdr_encode_hyper(p, start);
168 		p = xdr_encode_hyper(p, len);
169 		dprintk("xdr: encode_testres (status %u pid %d type %d start %Ld end %Ld)\n",
170 			resp->status, (int)resp->lock.svid, fl->fl_type,
171 			(long long)fl->fl_start,  (long long)fl->fl_end);
172 	}
173 
174 	dprintk("xdr: after encode_testres (p %p resp %p)\n", p, resp);
175 	return p;
176 }
177 
178 
179 /*
180  * First, the server side XDR functions
181  */
182 int
183 nlm4svc_decode_testargs(struct svc_rqst *rqstp, __be32 *p)
184 {
185 	struct nlm_args *argp = rqstp->rq_argp;
186 	u32	exclusive;
187 
188 	if (!(p = nlm4_decode_cookie(p, &argp->cookie)))
189 		return 0;
190 
191 	exclusive = ntohl(*p++);
192 	if (!(p = nlm4_decode_lock(p, &argp->lock)))
193 		return 0;
194 	if (exclusive)
195 		argp->lock.fl.fl_type = F_WRLCK;
196 
197 	return xdr_argsize_check(rqstp, p);
198 }
199 
200 int
201 nlm4svc_encode_testres(struct svc_rqst *rqstp, __be32 *p)
202 {
203 	struct nlm_res *resp = rqstp->rq_resp;
204 
205 	if (!(p = nlm4_encode_testres(p, resp)))
206 		return 0;
207 	return xdr_ressize_check(rqstp, p);
208 }
209 
210 int
211 nlm4svc_decode_lockargs(struct svc_rqst *rqstp, __be32 *p)
212 {
213 	struct nlm_args *argp = rqstp->rq_argp;
214 	u32	exclusive;
215 
216 	if (!(p = nlm4_decode_cookie(p, &argp->cookie)))
217 		return 0;
218 	argp->block  = ntohl(*p++);
219 	exclusive    = ntohl(*p++);
220 	if (!(p = nlm4_decode_lock(p, &argp->lock)))
221 		return 0;
222 	if (exclusive)
223 		argp->lock.fl.fl_type = F_WRLCK;
224 	argp->reclaim = ntohl(*p++);
225 	argp->state   = ntohl(*p++);
226 	argp->monitor = 1;		/* monitor client by default */
227 
228 	return xdr_argsize_check(rqstp, p);
229 }
230 
231 int
232 nlm4svc_decode_cancargs(struct svc_rqst *rqstp, __be32 *p)
233 {
234 	struct nlm_args *argp = rqstp->rq_argp;
235 	u32	exclusive;
236 
237 	if (!(p = nlm4_decode_cookie(p, &argp->cookie)))
238 		return 0;
239 	argp->block = ntohl(*p++);
240 	exclusive = ntohl(*p++);
241 	if (!(p = nlm4_decode_lock(p, &argp->lock)))
242 		return 0;
243 	if (exclusive)
244 		argp->lock.fl.fl_type = F_WRLCK;
245 	return xdr_argsize_check(rqstp, p);
246 }
247 
248 int
249 nlm4svc_decode_unlockargs(struct svc_rqst *rqstp, __be32 *p)
250 {
251 	struct nlm_args *argp = rqstp->rq_argp;
252 
253 	if (!(p = nlm4_decode_cookie(p, &argp->cookie))
254 	 || !(p = nlm4_decode_lock(p, &argp->lock)))
255 		return 0;
256 	argp->lock.fl.fl_type = F_UNLCK;
257 	return xdr_argsize_check(rqstp, p);
258 }
259 
260 int
261 nlm4svc_decode_shareargs(struct svc_rqst *rqstp, __be32 *p)
262 {
263 	struct nlm_args *argp = rqstp->rq_argp;
264 	struct nlm_lock	*lock = &argp->lock;
265 
266 	memset(lock, 0, sizeof(*lock));
267 	locks_init_lock(&lock->fl);
268 	lock->svid = ~(u32) 0;
269 	lock->fl.fl_pid = (pid_t)lock->svid;
270 
271 	if (!(p = nlm4_decode_cookie(p, &argp->cookie))
272 	 || !(p = xdr_decode_string_inplace(p, &lock->caller,
273 					    &lock->len, NLM_MAXSTRLEN))
274 	 || !(p = nlm4_decode_fh(p, &lock->fh))
275 	 || !(p = nlm4_decode_oh(p, &lock->oh)))
276 		return 0;
277 	argp->fsm_mode = ntohl(*p++);
278 	argp->fsm_access = ntohl(*p++);
279 	return xdr_argsize_check(rqstp, p);
280 }
281 
282 int
283 nlm4svc_encode_shareres(struct svc_rqst *rqstp, __be32 *p)
284 {
285 	struct nlm_res *resp = rqstp->rq_resp;
286 
287 	if (!(p = nlm4_encode_cookie(p, &resp->cookie)))
288 		return 0;
289 	*p++ = resp->status;
290 	*p++ = xdr_zero;		/* sequence argument */
291 	return xdr_ressize_check(rqstp, p);
292 }
293 
294 int
295 nlm4svc_encode_res(struct svc_rqst *rqstp, __be32 *p)
296 {
297 	struct nlm_res *resp = rqstp->rq_resp;
298 
299 	if (!(p = nlm4_encode_cookie(p, &resp->cookie)))
300 		return 0;
301 	*p++ = resp->status;
302 	return xdr_ressize_check(rqstp, p);
303 }
304 
305 int
306 nlm4svc_decode_notify(struct svc_rqst *rqstp, __be32 *p)
307 {
308 	struct nlm_args *argp = rqstp->rq_argp;
309 	struct nlm_lock	*lock = &argp->lock;
310 
311 	if (!(p = xdr_decode_string_inplace(p, &lock->caller,
312 					    &lock->len, NLM_MAXSTRLEN)))
313 		return 0;
314 	argp->state = ntohl(*p++);
315 	return xdr_argsize_check(rqstp, p);
316 }
317 
318 int
319 nlm4svc_decode_reboot(struct svc_rqst *rqstp, __be32 *p)
320 {
321 	struct nlm_reboot *argp = rqstp->rq_argp;
322 
323 	if (!(p = xdr_decode_string_inplace(p, &argp->mon, &argp->len, SM_MAXSTRLEN)))
324 		return 0;
325 	argp->state = ntohl(*p++);
326 	memcpy(&argp->priv.data, p, sizeof(argp->priv.data));
327 	p += XDR_QUADLEN(SM_PRIV_SIZE);
328 	return xdr_argsize_check(rqstp, p);
329 }
330 
331 int
332 nlm4svc_decode_res(struct svc_rqst *rqstp, __be32 *p)
333 {
334 	struct nlm_res *resp = rqstp->rq_argp;
335 
336 	if (!(p = nlm4_decode_cookie(p, &resp->cookie)))
337 		return 0;
338 	resp->status = *p++;
339 	return xdr_argsize_check(rqstp, p);
340 }
341 
342 int
343 nlm4svc_decode_void(struct svc_rqst *rqstp, __be32 *p)
344 {
345 	return xdr_argsize_check(rqstp, p);
346 }
347 
348 int
349 nlm4svc_encode_void(struct svc_rqst *rqstp, __be32 *p)
350 {
351 	return xdr_ressize_check(rqstp, p);
352 }
353