1 /* 2 * Server-side XDR for NFSv4 3 * 4 * Copyright (c) 2002 The Regents of the University of Michigan. 5 * All rights reserved. 6 * 7 * Kendrick Smith <kmsmith@umich.edu> 8 * Andy Adamson <andros@umich.edu> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. Neither the name of the University nor the names of its 20 * contributors may be used to endorse or promote products derived 21 * from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 #include <linux/file.h> 37 #include <linux/slab.h> 38 #include <linux/namei.h> 39 #include <linux/statfs.h> 40 #include <linux/utsname.h> 41 #include <linux/pagemap.h> 42 #include <linux/sunrpc/svcauth_gss.h> 43 #include <linux/sunrpc/addr.h> 44 #include <linux/xattr.h> 45 #include <linux/vmalloc.h> 46 47 #include <uapi/linux/xattr.h> 48 49 #include "idmap.h" 50 #include "acl.h" 51 #include "xdr4.h" 52 #include "vfs.h" 53 #include "state.h" 54 #include "cache.h" 55 #include "netns.h" 56 #include "pnfs.h" 57 #include "filecache.h" 58 59 #include "trace.h" 60 61 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 62 #include <linux/security.h> 63 #endif 64 65 66 #define NFSDDBG_FACILITY NFSDDBG_XDR 67 68 const u32 nfsd_suppattrs[3][3] = { 69 {NFSD4_SUPPORTED_ATTRS_WORD0, 70 NFSD4_SUPPORTED_ATTRS_WORD1, 71 NFSD4_SUPPORTED_ATTRS_WORD2}, 72 73 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 74 NFSD4_1_SUPPORTED_ATTRS_WORD1, 75 NFSD4_1_SUPPORTED_ATTRS_WORD2}, 76 77 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 78 NFSD4_1_SUPPORTED_ATTRS_WORD1, 79 NFSD4_2_SUPPORTED_ATTRS_WORD2}, 80 }; 81 82 /* 83 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing 84 * directory in order to indicate to the client that a filesystem boundary is present 85 * We use a fixed fsid for a referral 86 */ 87 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL 88 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL 89 90 static __be32 91 check_filename(char *str, int len) 92 { 93 int i; 94 95 if (len == 0) 96 return nfserr_inval; 97 if (len > NFS4_MAXNAMLEN) 98 return nfserr_nametoolong; 99 if (isdotent(str, len)) 100 return nfserr_badname; 101 for (i = 0; i < len; i++) 102 if (str[i] == '/') 103 return nfserr_badname; 104 return 0; 105 } 106 107 static int zero_clientid(clientid_t *clid) 108 { 109 return (clid->cl_boot == 0) && (clid->cl_id == 0); 110 } 111 112 /** 113 * svcxdr_tmpalloc - allocate memory to be freed after compound processing 114 * @argp: NFSv4 compound argument structure 115 * @len: length of buffer to allocate 116 * 117 * Allocates a buffer of size @len to be freed when processing the compound 118 * operation described in @argp finishes. 119 */ 120 static void * 121 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len) 122 { 123 struct svcxdr_tmpbuf *tb; 124 125 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL); 126 if (!tb) 127 return NULL; 128 tb->next = argp->to_free; 129 argp->to_free = tb; 130 return tb->buf; 131 } 132 133 /* 134 * For xdr strings that need to be passed to other kernel api's 135 * as null-terminated strings. 136 * 137 * Note null-terminating in place usually isn't safe since the 138 * buffer might end on a page boundary. 139 */ 140 static char * 141 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len) 142 { 143 char *p = svcxdr_tmpalloc(argp, len + 1); 144 145 if (!p) 146 return NULL; 147 memcpy(p, buf, len); 148 p[len] = '\0'; 149 return p; 150 } 151 152 static void * 153 svcxdr_savemem(struct nfsd4_compoundargs *argp, __be32 *p, u32 len) 154 { 155 __be32 *tmp; 156 157 /* 158 * The location of the decoded data item is stable, 159 * so @p is OK to use. This is the common case. 160 */ 161 if (p != argp->xdr->scratch.iov_base) 162 return p; 163 164 tmp = svcxdr_tmpalloc(argp, len); 165 if (!tmp) 166 return NULL; 167 memcpy(tmp, p, len); 168 return tmp; 169 } 170 171 /* 172 * NFSv4 basic data type decoders 173 */ 174 175 /* 176 * This helper handles variable-length opaques which belong to protocol 177 * elements that this implementation does not support. 178 */ 179 static __be32 180 nfsd4_decode_ignored_string(struct nfsd4_compoundargs *argp, u32 maxlen) 181 { 182 u32 len; 183 184 if (xdr_stream_decode_u32(argp->xdr, &len) < 0) 185 return nfserr_bad_xdr; 186 if (maxlen && len > maxlen) 187 return nfserr_bad_xdr; 188 if (!xdr_inline_decode(argp->xdr, len)) 189 return nfserr_bad_xdr; 190 191 return nfs_ok; 192 } 193 194 static __be32 195 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) 196 { 197 __be32 *p; 198 u32 len; 199 200 if (xdr_stream_decode_u32(argp->xdr, &len) < 0) 201 return nfserr_bad_xdr; 202 if (len == 0 || len > NFS4_OPAQUE_LIMIT) 203 return nfserr_bad_xdr; 204 p = xdr_inline_decode(argp->xdr, len); 205 if (!p) 206 return nfserr_bad_xdr; 207 o->data = svcxdr_savemem(argp, p, len); 208 if (!o->data) 209 return nfserr_jukebox; 210 o->len = len; 211 212 return nfs_ok; 213 } 214 215 static __be32 216 nfsd4_decode_component4(struct nfsd4_compoundargs *argp, char **namp, u32 *lenp) 217 { 218 __be32 *p, status; 219 220 if (xdr_stream_decode_u32(argp->xdr, lenp) < 0) 221 return nfserr_bad_xdr; 222 p = xdr_inline_decode(argp->xdr, *lenp); 223 if (!p) 224 return nfserr_bad_xdr; 225 status = check_filename((char *)p, *lenp); 226 if (status) 227 return status; 228 *namp = svcxdr_savemem(argp, p, *lenp); 229 if (!*namp) 230 return nfserr_jukebox; 231 232 return nfs_ok; 233 } 234 235 static __be32 236 nfsd4_decode_nfstime4(struct nfsd4_compoundargs *argp, struct timespec64 *tv) 237 { 238 __be32 *p; 239 240 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 3); 241 if (!p) 242 return nfserr_bad_xdr; 243 p = xdr_decode_hyper(p, &tv->tv_sec); 244 tv->tv_nsec = be32_to_cpup(p++); 245 if (tv->tv_nsec >= (u32)1000000000) 246 return nfserr_inval; 247 return nfs_ok; 248 } 249 250 static __be32 251 nfsd4_decode_verifier4(struct nfsd4_compoundargs *argp, nfs4_verifier *verf) 252 { 253 __be32 *p; 254 255 p = xdr_inline_decode(argp->xdr, NFS4_VERIFIER_SIZE); 256 if (!p) 257 return nfserr_bad_xdr; 258 memcpy(verf->data, p, sizeof(verf->data)); 259 return nfs_ok; 260 } 261 262 /** 263 * nfsd4_decode_bitmap4 - Decode an NFSv4 bitmap4 264 * @argp: NFSv4 compound argument structure 265 * @bmval: pointer to an array of u32's to decode into 266 * @bmlen: size of the @bmval array 267 * 268 * The server needs to return nfs_ok rather than nfserr_bad_xdr when 269 * encountering bitmaps containing bits it does not recognize. This 270 * includes bits in bitmap words past WORDn, where WORDn is the last 271 * bitmap WORD the implementation currently supports. Thus we are 272 * careful here to simply ignore bits in bitmap words that this 273 * implementation has yet to support explicitly. 274 * 275 * Return values: 276 * %nfs_ok: @bmval populated successfully 277 * %nfserr_bad_xdr: the encoded bitmap was invalid 278 */ 279 static __be32 280 nfsd4_decode_bitmap4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen) 281 { 282 ssize_t status; 283 284 status = xdr_stream_decode_uint32_array(argp->xdr, bmval, bmlen); 285 return status == -EBADMSG ? nfserr_bad_xdr : nfs_ok; 286 } 287 288 static __be32 289 nfsd4_decode_nfsace4(struct nfsd4_compoundargs *argp, struct nfs4_ace *ace) 290 { 291 __be32 *p, status; 292 u32 length; 293 294 if (xdr_stream_decode_u32(argp->xdr, &ace->type) < 0) 295 return nfserr_bad_xdr; 296 if (xdr_stream_decode_u32(argp->xdr, &ace->flag) < 0) 297 return nfserr_bad_xdr; 298 if (xdr_stream_decode_u32(argp->xdr, &ace->access_mask) < 0) 299 return nfserr_bad_xdr; 300 301 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 302 return nfserr_bad_xdr; 303 p = xdr_inline_decode(argp->xdr, length); 304 if (!p) 305 return nfserr_bad_xdr; 306 ace->whotype = nfs4_acl_get_whotype((char *)p, length); 307 if (ace->whotype != NFS4_ACL_WHO_NAMED) 308 status = nfs_ok; 309 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 310 status = nfsd_map_name_to_gid(argp->rqstp, 311 (char *)p, length, &ace->who_gid); 312 else 313 status = nfsd_map_name_to_uid(argp->rqstp, 314 (char *)p, length, &ace->who_uid); 315 316 return status; 317 } 318 319 /* A counted array of nfsace4's */ 320 static noinline __be32 321 nfsd4_decode_acl(struct nfsd4_compoundargs *argp, struct nfs4_acl **acl) 322 { 323 struct nfs4_ace *ace; 324 __be32 status; 325 u32 count; 326 327 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 328 return nfserr_bad_xdr; 329 330 if (count > xdr_stream_remaining(argp->xdr) / 20) 331 /* 332 * Even with 4-byte names there wouldn't be 333 * space for that many aces; something fishy is 334 * going on: 335 */ 336 return nfserr_fbig; 337 338 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(count)); 339 if (*acl == NULL) 340 return nfserr_jukebox; 341 342 (*acl)->naces = count; 343 for (ace = (*acl)->aces; ace < (*acl)->aces + count; ace++) { 344 status = nfsd4_decode_nfsace4(argp, ace); 345 if (status) 346 return status; 347 } 348 349 return nfs_ok; 350 } 351 352 static noinline __be32 353 nfsd4_decode_security_label(struct nfsd4_compoundargs *argp, 354 struct xdr_netobj *label) 355 { 356 u32 lfs, pi, length; 357 __be32 *p; 358 359 if (xdr_stream_decode_u32(argp->xdr, &lfs) < 0) 360 return nfserr_bad_xdr; 361 if (xdr_stream_decode_u32(argp->xdr, &pi) < 0) 362 return nfserr_bad_xdr; 363 364 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 365 return nfserr_bad_xdr; 366 if (length > NFS4_MAXLABELLEN) 367 return nfserr_badlabel; 368 p = xdr_inline_decode(argp->xdr, length); 369 if (!p) 370 return nfserr_bad_xdr; 371 label->len = length; 372 label->data = svcxdr_dupstr(argp, p, length); 373 if (!label->data) 374 return nfserr_jukebox; 375 376 return nfs_ok; 377 } 378 379 static __be32 380 nfsd4_decode_fattr4(struct nfsd4_compoundargs *argp, u32 *bmval, u32 bmlen, 381 struct iattr *iattr, struct nfs4_acl **acl, 382 struct xdr_netobj *label, int *umask) 383 { 384 unsigned int starting_pos; 385 u32 attrlist4_count; 386 __be32 *p, status; 387 388 iattr->ia_valid = 0; 389 status = nfsd4_decode_bitmap4(argp, bmval, bmlen); 390 if (status) 391 return nfserr_bad_xdr; 392 393 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 394 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 395 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) { 396 if (nfsd_attrs_supported(argp->minorversion, bmval)) 397 return nfserr_inval; 398 return nfserr_attrnotsupp; 399 } 400 401 if (xdr_stream_decode_u32(argp->xdr, &attrlist4_count) < 0) 402 return nfserr_bad_xdr; 403 starting_pos = xdr_stream_pos(argp->xdr); 404 405 if (bmval[0] & FATTR4_WORD0_SIZE) { 406 u64 size; 407 408 if (xdr_stream_decode_u64(argp->xdr, &size) < 0) 409 return nfserr_bad_xdr; 410 iattr->ia_size = size; 411 iattr->ia_valid |= ATTR_SIZE; 412 } 413 if (bmval[0] & FATTR4_WORD0_ACL) { 414 status = nfsd4_decode_acl(argp, acl); 415 if (status) 416 return status; 417 } else 418 *acl = NULL; 419 if (bmval[1] & FATTR4_WORD1_MODE) { 420 u32 mode; 421 422 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) 423 return nfserr_bad_xdr; 424 iattr->ia_mode = mode; 425 iattr->ia_mode &= (S_IFMT | S_IALLUGO); 426 iattr->ia_valid |= ATTR_MODE; 427 } 428 if (bmval[1] & FATTR4_WORD1_OWNER) { 429 u32 length; 430 431 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 432 return nfserr_bad_xdr; 433 p = xdr_inline_decode(argp->xdr, length); 434 if (!p) 435 return nfserr_bad_xdr; 436 status = nfsd_map_name_to_uid(argp->rqstp, (char *)p, length, 437 &iattr->ia_uid); 438 if (status) 439 return status; 440 iattr->ia_valid |= ATTR_UID; 441 } 442 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { 443 u32 length; 444 445 if (xdr_stream_decode_u32(argp->xdr, &length) < 0) 446 return nfserr_bad_xdr; 447 p = xdr_inline_decode(argp->xdr, length); 448 if (!p) 449 return nfserr_bad_xdr; 450 status = nfsd_map_name_to_gid(argp->rqstp, (char *)p, length, 451 &iattr->ia_gid); 452 if (status) 453 return status; 454 iattr->ia_valid |= ATTR_GID; 455 } 456 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { 457 u32 set_it; 458 459 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) 460 return nfserr_bad_xdr; 461 switch (set_it) { 462 case NFS4_SET_TO_CLIENT_TIME: 463 status = nfsd4_decode_nfstime4(argp, &iattr->ia_atime); 464 if (status) 465 return status; 466 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); 467 break; 468 case NFS4_SET_TO_SERVER_TIME: 469 iattr->ia_valid |= ATTR_ATIME; 470 break; 471 default: 472 return nfserr_bad_xdr; 473 } 474 } 475 if (bmval[1] & FATTR4_WORD1_TIME_CREATE) { 476 struct timespec64 ts; 477 478 /* No Linux filesystem supports setting this attribute. */ 479 bmval[1] &= ~FATTR4_WORD1_TIME_CREATE; 480 status = nfsd4_decode_nfstime4(argp, &ts); 481 if (status) 482 return status; 483 } 484 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { 485 u32 set_it; 486 487 if (xdr_stream_decode_u32(argp->xdr, &set_it) < 0) 488 return nfserr_bad_xdr; 489 switch (set_it) { 490 case NFS4_SET_TO_CLIENT_TIME: 491 status = nfsd4_decode_nfstime4(argp, &iattr->ia_mtime); 492 if (status) 493 return status; 494 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); 495 break; 496 case NFS4_SET_TO_SERVER_TIME: 497 iattr->ia_valid |= ATTR_MTIME; 498 break; 499 default: 500 return nfserr_bad_xdr; 501 } 502 } 503 label->len = 0; 504 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) && 505 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { 506 status = nfsd4_decode_security_label(argp, label); 507 if (status) 508 return status; 509 } 510 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) { 511 u32 mode, mask; 512 513 if (!umask) 514 return nfserr_bad_xdr; 515 if (xdr_stream_decode_u32(argp->xdr, &mode) < 0) 516 return nfserr_bad_xdr; 517 iattr->ia_mode = mode & (S_IFMT | S_IALLUGO); 518 if (xdr_stream_decode_u32(argp->xdr, &mask) < 0) 519 return nfserr_bad_xdr; 520 *umask = mask & S_IRWXUGO; 521 iattr->ia_valid |= ATTR_MODE; 522 } 523 524 /* request sanity: did attrlist4 contain the expected number of words? */ 525 if (attrlist4_count != xdr_stream_pos(argp->xdr) - starting_pos) 526 return nfserr_bad_xdr; 527 528 return nfs_ok; 529 } 530 531 static __be32 532 nfsd4_decode_stateid4(struct nfsd4_compoundargs *argp, stateid_t *sid) 533 { 534 __be32 *p; 535 536 p = xdr_inline_decode(argp->xdr, NFS4_STATEID_SIZE); 537 if (!p) 538 return nfserr_bad_xdr; 539 sid->si_generation = be32_to_cpup(p++); 540 memcpy(&sid->si_opaque, p, sizeof(sid->si_opaque)); 541 return nfs_ok; 542 } 543 544 static __be32 545 nfsd4_decode_clientid4(struct nfsd4_compoundargs *argp, clientid_t *clientid) 546 { 547 __be32 *p; 548 549 p = xdr_inline_decode(argp->xdr, sizeof(__be64)); 550 if (!p) 551 return nfserr_bad_xdr; 552 memcpy(clientid, p, sizeof(*clientid)); 553 return nfs_ok; 554 } 555 556 static __be32 557 nfsd4_decode_state_owner4(struct nfsd4_compoundargs *argp, 558 clientid_t *clientid, struct xdr_netobj *owner) 559 { 560 __be32 status; 561 562 status = nfsd4_decode_clientid4(argp, clientid); 563 if (status) 564 return status; 565 return nfsd4_decode_opaque(argp, owner); 566 } 567 568 #ifdef CONFIG_NFSD_PNFS 569 static __be32 570 nfsd4_decode_deviceid4(struct nfsd4_compoundargs *argp, 571 struct nfsd4_deviceid *devid) 572 { 573 __be32 *p; 574 575 p = xdr_inline_decode(argp->xdr, NFS4_DEVICEID4_SIZE); 576 if (!p) 577 return nfserr_bad_xdr; 578 memcpy(devid, p, sizeof(*devid)); 579 return nfs_ok; 580 } 581 582 static __be32 583 nfsd4_decode_layoutupdate4(struct nfsd4_compoundargs *argp, 584 struct nfsd4_layoutcommit *lcp) 585 { 586 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_layout_type) < 0) 587 return nfserr_bad_xdr; 588 if (lcp->lc_layout_type < LAYOUT_NFSV4_1_FILES) 589 return nfserr_bad_xdr; 590 if (lcp->lc_layout_type >= LAYOUT_TYPE_MAX) 591 return nfserr_bad_xdr; 592 593 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_up_len) < 0) 594 return nfserr_bad_xdr; 595 if (lcp->lc_up_len > 0) { 596 lcp->lc_up_layout = xdr_inline_decode(argp->xdr, lcp->lc_up_len); 597 if (!lcp->lc_up_layout) 598 return nfserr_bad_xdr; 599 } 600 601 return nfs_ok; 602 } 603 604 static __be32 605 nfsd4_decode_layoutreturn4(struct nfsd4_compoundargs *argp, 606 struct nfsd4_layoutreturn *lrp) 607 { 608 __be32 status; 609 610 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_return_type) < 0) 611 return nfserr_bad_xdr; 612 switch (lrp->lr_return_type) { 613 case RETURN_FILE: 614 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.offset) < 0) 615 return nfserr_bad_xdr; 616 if (xdr_stream_decode_u64(argp->xdr, &lrp->lr_seg.length) < 0) 617 return nfserr_bad_xdr; 618 status = nfsd4_decode_stateid4(argp, &lrp->lr_sid); 619 if (status) 620 return status; 621 if (xdr_stream_decode_u32(argp->xdr, &lrp->lrf_body_len) < 0) 622 return nfserr_bad_xdr; 623 if (lrp->lrf_body_len > 0) { 624 lrp->lrf_body = xdr_inline_decode(argp->xdr, lrp->lrf_body_len); 625 if (!lrp->lrf_body) 626 return nfserr_bad_xdr; 627 } 628 break; 629 case RETURN_FSID: 630 case RETURN_ALL: 631 lrp->lr_seg.offset = 0; 632 lrp->lr_seg.length = NFS4_MAX_UINT64; 633 break; 634 default: 635 return nfserr_bad_xdr; 636 } 637 638 return nfs_ok; 639 } 640 641 #endif /* CONFIG_NFSD_PNFS */ 642 643 static __be32 644 nfsd4_decode_sessionid4(struct nfsd4_compoundargs *argp, 645 struct nfs4_sessionid *sessionid) 646 { 647 __be32 *p; 648 649 p = xdr_inline_decode(argp->xdr, NFS4_MAX_SESSIONID_LEN); 650 if (!p) 651 return nfserr_bad_xdr; 652 memcpy(sessionid->data, p, sizeof(sessionid->data)); 653 return nfs_ok; 654 } 655 656 /* Defined in Appendix A of RFC 5531 */ 657 static __be32 658 nfsd4_decode_authsys_parms(struct nfsd4_compoundargs *argp, 659 struct nfsd4_cb_sec *cbs) 660 { 661 u32 stamp, gidcount, uid, gid; 662 __be32 *p, status; 663 664 if (xdr_stream_decode_u32(argp->xdr, &stamp) < 0) 665 return nfserr_bad_xdr; 666 /* machine name */ 667 status = nfsd4_decode_ignored_string(argp, 255); 668 if (status) 669 return status; 670 if (xdr_stream_decode_u32(argp->xdr, &uid) < 0) 671 return nfserr_bad_xdr; 672 if (xdr_stream_decode_u32(argp->xdr, &gid) < 0) 673 return nfserr_bad_xdr; 674 if (xdr_stream_decode_u32(argp->xdr, &gidcount) < 0) 675 return nfserr_bad_xdr; 676 if (gidcount > 16) 677 return nfserr_bad_xdr; 678 p = xdr_inline_decode(argp->xdr, gidcount << 2); 679 if (!p) 680 return nfserr_bad_xdr; 681 if (cbs->flavor == (u32)(-1)) { 682 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp); 683 684 kuid_t kuid = make_kuid(userns, uid); 685 kgid_t kgid = make_kgid(userns, gid); 686 if (uid_valid(kuid) && gid_valid(kgid)) { 687 cbs->uid = kuid; 688 cbs->gid = kgid; 689 cbs->flavor = RPC_AUTH_UNIX; 690 } else { 691 dprintk("RPC_AUTH_UNIX with invalid uid or gid, ignoring!\n"); 692 } 693 } 694 695 return nfs_ok; 696 } 697 698 static __be32 699 nfsd4_decode_gss_cb_handles4(struct nfsd4_compoundargs *argp, 700 struct nfsd4_cb_sec *cbs) 701 { 702 __be32 status; 703 u32 service; 704 705 dprintk("RPC_AUTH_GSS callback secflavor not supported!\n"); 706 707 if (xdr_stream_decode_u32(argp->xdr, &service) < 0) 708 return nfserr_bad_xdr; 709 if (service < RPC_GSS_SVC_NONE || service > RPC_GSS_SVC_PRIVACY) 710 return nfserr_bad_xdr; 711 /* gcbp_handle_from_server */ 712 status = nfsd4_decode_ignored_string(argp, 0); 713 if (status) 714 return status; 715 /* gcbp_handle_from_client */ 716 status = nfsd4_decode_ignored_string(argp, 0); 717 if (status) 718 return status; 719 720 return nfs_ok; 721 } 722 723 /* a counted array of callback_sec_parms4 items */ 724 static __be32 725 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) 726 { 727 u32 i, secflavor, nr_secflavs; 728 __be32 status; 729 730 /* callback_sec_params4 */ 731 if (xdr_stream_decode_u32(argp->xdr, &nr_secflavs) < 0) 732 return nfserr_bad_xdr; 733 if (nr_secflavs) 734 cbs->flavor = (u32)(-1); 735 else 736 /* Is this legal? Be generous, take it to mean AUTH_NONE: */ 737 cbs->flavor = 0; 738 739 for (i = 0; i < nr_secflavs; ++i) { 740 if (xdr_stream_decode_u32(argp->xdr, &secflavor) < 0) 741 return nfserr_bad_xdr; 742 switch (secflavor) { 743 case RPC_AUTH_NULL: 744 /* void */ 745 if (cbs->flavor == (u32)(-1)) 746 cbs->flavor = RPC_AUTH_NULL; 747 break; 748 case RPC_AUTH_UNIX: 749 status = nfsd4_decode_authsys_parms(argp, cbs); 750 if (status) 751 return status; 752 break; 753 case RPC_AUTH_GSS: 754 status = nfsd4_decode_gss_cb_handles4(argp, cbs); 755 if (status) 756 return status; 757 break; 758 default: 759 return nfserr_inval; 760 } 761 } 762 763 return nfs_ok; 764 } 765 766 767 /* 768 * NFSv4 operation argument decoders 769 */ 770 771 static __be32 772 nfsd4_decode_access(struct nfsd4_compoundargs *argp, 773 union nfsd4_op_u *u) 774 { 775 struct nfsd4_access *access = &u->access; 776 if (xdr_stream_decode_u32(argp->xdr, &access->ac_req_access) < 0) 777 return nfserr_bad_xdr; 778 return nfs_ok; 779 } 780 781 static __be32 782 nfsd4_decode_close(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 783 { 784 struct nfsd4_close *close = &u->close; 785 if (xdr_stream_decode_u32(argp->xdr, &close->cl_seqid) < 0) 786 return nfserr_bad_xdr; 787 return nfsd4_decode_stateid4(argp, &close->cl_stateid); 788 } 789 790 791 static __be32 792 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 793 { 794 struct nfsd4_commit *commit = &u->commit; 795 if (xdr_stream_decode_u64(argp->xdr, &commit->co_offset) < 0) 796 return nfserr_bad_xdr; 797 if (xdr_stream_decode_u32(argp->xdr, &commit->co_count) < 0) 798 return nfserr_bad_xdr; 799 memset(&commit->co_verf, 0, sizeof(commit->co_verf)); 800 return nfs_ok; 801 } 802 803 static __be32 804 nfsd4_decode_create(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 805 { 806 struct nfsd4_create *create = &u->create; 807 __be32 *p, status; 808 809 memset(create, 0, sizeof(*create)); 810 if (xdr_stream_decode_u32(argp->xdr, &create->cr_type) < 0) 811 return nfserr_bad_xdr; 812 switch (create->cr_type) { 813 case NF4LNK: 814 if (xdr_stream_decode_u32(argp->xdr, &create->cr_datalen) < 0) 815 return nfserr_bad_xdr; 816 p = xdr_inline_decode(argp->xdr, create->cr_datalen); 817 if (!p) 818 return nfserr_bad_xdr; 819 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen); 820 if (!create->cr_data) 821 return nfserr_jukebox; 822 break; 823 case NF4BLK: 824 case NF4CHR: 825 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata1) < 0) 826 return nfserr_bad_xdr; 827 if (xdr_stream_decode_u32(argp->xdr, &create->cr_specdata2) < 0) 828 return nfserr_bad_xdr; 829 break; 830 case NF4SOCK: 831 case NF4FIFO: 832 case NF4DIR: 833 default: 834 break; 835 } 836 status = nfsd4_decode_component4(argp, &create->cr_name, 837 &create->cr_namelen); 838 if (status) 839 return status; 840 status = nfsd4_decode_fattr4(argp, create->cr_bmval, 841 ARRAY_SIZE(create->cr_bmval), 842 &create->cr_iattr, &create->cr_acl, 843 &create->cr_label, &create->cr_umask); 844 if (status) 845 return status; 846 847 return nfs_ok; 848 } 849 850 static inline __be32 851 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 852 { 853 struct nfsd4_delegreturn *dr = &u->delegreturn; 854 return nfsd4_decode_stateid4(argp, &dr->dr_stateid); 855 } 856 857 static inline __be32 858 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 859 { 860 struct nfsd4_getattr *getattr = &u->getattr; 861 memset(getattr, 0, sizeof(*getattr)); 862 return nfsd4_decode_bitmap4(argp, getattr->ga_bmval, 863 ARRAY_SIZE(getattr->ga_bmval)); 864 } 865 866 static __be32 867 nfsd4_decode_link(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 868 { 869 struct nfsd4_link *link = &u->link; 870 memset(link, 0, sizeof(*link)); 871 return nfsd4_decode_component4(argp, &link->li_name, &link->li_namelen); 872 } 873 874 static __be32 875 nfsd4_decode_open_to_lock_owner4(struct nfsd4_compoundargs *argp, 876 struct nfsd4_lock *lock) 877 { 878 __be32 status; 879 880 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_open_seqid) < 0) 881 return nfserr_bad_xdr; 882 status = nfsd4_decode_stateid4(argp, &lock->lk_new_open_stateid); 883 if (status) 884 return status; 885 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_new_lock_seqid) < 0) 886 return nfserr_bad_xdr; 887 return nfsd4_decode_state_owner4(argp, &lock->lk_new_clientid, 888 &lock->lk_new_owner); 889 } 890 891 static __be32 892 nfsd4_decode_exist_lock_owner4(struct nfsd4_compoundargs *argp, 893 struct nfsd4_lock *lock) 894 { 895 __be32 status; 896 897 status = nfsd4_decode_stateid4(argp, &lock->lk_old_lock_stateid); 898 if (status) 899 return status; 900 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_old_lock_seqid) < 0) 901 return nfserr_bad_xdr; 902 903 return nfs_ok; 904 } 905 906 static __be32 907 nfsd4_decode_locker4(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) 908 { 909 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_is_new) < 0) 910 return nfserr_bad_xdr; 911 if (lock->lk_is_new) 912 return nfsd4_decode_open_to_lock_owner4(argp, lock); 913 return nfsd4_decode_exist_lock_owner4(argp, lock); 914 } 915 916 static __be32 917 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 918 { 919 struct nfsd4_lock *lock = &u->lock; 920 memset(lock, 0, sizeof(*lock)); 921 if (xdr_stream_decode_u32(argp->xdr, &lock->lk_type) < 0) 922 return nfserr_bad_xdr; 923 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) 924 return nfserr_bad_xdr; 925 if (xdr_stream_decode_bool(argp->xdr, &lock->lk_reclaim) < 0) 926 return nfserr_bad_xdr; 927 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_offset) < 0) 928 return nfserr_bad_xdr; 929 if (xdr_stream_decode_u64(argp->xdr, &lock->lk_length) < 0) 930 return nfserr_bad_xdr; 931 return nfsd4_decode_locker4(argp, lock); 932 } 933 934 static __be32 935 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 936 { 937 struct nfsd4_lockt *lockt = &u->lockt; 938 memset(lockt, 0, sizeof(*lockt)); 939 if (xdr_stream_decode_u32(argp->xdr, &lockt->lt_type) < 0) 940 return nfserr_bad_xdr; 941 if ((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) 942 return nfserr_bad_xdr; 943 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_offset) < 0) 944 return nfserr_bad_xdr; 945 if (xdr_stream_decode_u64(argp->xdr, &lockt->lt_length) < 0) 946 return nfserr_bad_xdr; 947 return nfsd4_decode_state_owner4(argp, &lockt->lt_clientid, 948 &lockt->lt_owner); 949 } 950 951 static __be32 952 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 953 { 954 struct nfsd4_locku *locku = &u->locku; 955 __be32 status; 956 957 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_type) < 0) 958 return nfserr_bad_xdr; 959 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) 960 return nfserr_bad_xdr; 961 if (xdr_stream_decode_u32(argp->xdr, &locku->lu_seqid) < 0) 962 return nfserr_bad_xdr; 963 status = nfsd4_decode_stateid4(argp, &locku->lu_stateid); 964 if (status) 965 return status; 966 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_offset) < 0) 967 return nfserr_bad_xdr; 968 if (xdr_stream_decode_u64(argp->xdr, &locku->lu_length) < 0) 969 return nfserr_bad_xdr; 970 971 return nfs_ok; 972 } 973 974 static __be32 975 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 976 { 977 struct nfsd4_lookup *lookup = &u->lookup; 978 return nfsd4_decode_component4(argp, &lookup->lo_name, &lookup->lo_len); 979 } 980 981 static __be32 982 nfsd4_decode_createhow4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 983 { 984 __be32 status; 985 986 if (xdr_stream_decode_u32(argp->xdr, &open->op_createmode) < 0) 987 return nfserr_bad_xdr; 988 switch (open->op_createmode) { 989 case NFS4_CREATE_UNCHECKED: 990 case NFS4_CREATE_GUARDED: 991 status = nfsd4_decode_fattr4(argp, open->op_bmval, 992 ARRAY_SIZE(open->op_bmval), 993 &open->op_iattr, &open->op_acl, 994 &open->op_label, &open->op_umask); 995 if (status) 996 return status; 997 break; 998 case NFS4_CREATE_EXCLUSIVE: 999 status = nfsd4_decode_verifier4(argp, &open->op_verf); 1000 if (status) 1001 return status; 1002 break; 1003 case NFS4_CREATE_EXCLUSIVE4_1: 1004 if (argp->minorversion < 1) 1005 return nfserr_bad_xdr; 1006 status = nfsd4_decode_verifier4(argp, &open->op_verf); 1007 if (status) 1008 return status; 1009 status = nfsd4_decode_fattr4(argp, open->op_bmval, 1010 ARRAY_SIZE(open->op_bmval), 1011 &open->op_iattr, &open->op_acl, 1012 &open->op_label, &open->op_umask); 1013 if (status) 1014 return status; 1015 break; 1016 default: 1017 return nfserr_bad_xdr; 1018 } 1019 1020 return nfs_ok; 1021 } 1022 1023 static __be32 1024 nfsd4_decode_openflag4(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 1025 { 1026 __be32 status; 1027 1028 if (xdr_stream_decode_u32(argp->xdr, &open->op_create) < 0) 1029 return nfserr_bad_xdr; 1030 switch (open->op_create) { 1031 case NFS4_OPEN_NOCREATE: 1032 break; 1033 case NFS4_OPEN_CREATE: 1034 status = nfsd4_decode_createhow4(argp, open); 1035 if (status) 1036 return status; 1037 break; 1038 default: 1039 return nfserr_bad_xdr; 1040 } 1041 1042 return nfs_ok; 1043 } 1044 1045 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) 1046 { 1047 u32 w; 1048 1049 if (xdr_stream_decode_u32(argp->xdr, &w) < 0) 1050 return nfserr_bad_xdr; 1051 *share_access = w & NFS4_SHARE_ACCESS_MASK; 1052 *deleg_want = w & NFS4_SHARE_WANT_MASK; 1053 if (deleg_when) 1054 *deleg_when = w & NFS4_SHARE_WHEN_MASK; 1055 1056 switch (w & NFS4_SHARE_ACCESS_MASK) { 1057 case NFS4_SHARE_ACCESS_READ: 1058 case NFS4_SHARE_ACCESS_WRITE: 1059 case NFS4_SHARE_ACCESS_BOTH: 1060 break; 1061 default: 1062 return nfserr_bad_xdr; 1063 } 1064 w &= ~NFS4_SHARE_ACCESS_MASK; 1065 if (!w) 1066 return nfs_ok; 1067 if (!argp->minorversion) 1068 return nfserr_bad_xdr; 1069 switch (w & NFS4_SHARE_WANT_MASK) { 1070 case NFS4_SHARE_WANT_NO_PREFERENCE: 1071 case NFS4_SHARE_WANT_READ_DELEG: 1072 case NFS4_SHARE_WANT_WRITE_DELEG: 1073 case NFS4_SHARE_WANT_ANY_DELEG: 1074 case NFS4_SHARE_WANT_NO_DELEG: 1075 case NFS4_SHARE_WANT_CANCEL: 1076 break; 1077 default: 1078 return nfserr_bad_xdr; 1079 } 1080 w &= ~NFS4_SHARE_WANT_MASK; 1081 if (!w) 1082 return nfs_ok; 1083 1084 if (!deleg_when) /* open_downgrade */ 1085 return nfserr_inval; 1086 switch (w) { 1087 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: 1088 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: 1089 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | 1090 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): 1091 return nfs_ok; 1092 } 1093 return nfserr_bad_xdr; 1094 } 1095 1096 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) 1097 { 1098 if (xdr_stream_decode_u32(argp->xdr, x) < 0) 1099 return nfserr_bad_xdr; 1100 /* Note: unlike access bits, deny bits may be zero. */ 1101 if (*x & ~NFS4_SHARE_DENY_BOTH) 1102 return nfserr_bad_xdr; 1103 1104 return nfs_ok; 1105 } 1106 1107 static __be32 1108 nfsd4_decode_open_claim4(struct nfsd4_compoundargs *argp, 1109 struct nfsd4_open *open) 1110 { 1111 __be32 status; 1112 1113 if (xdr_stream_decode_u32(argp->xdr, &open->op_claim_type) < 0) 1114 return nfserr_bad_xdr; 1115 switch (open->op_claim_type) { 1116 case NFS4_OPEN_CLAIM_NULL: 1117 case NFS4_OPEN_CLAIM_DELEGATE_PREV: 1118 status = nfsd4_decode_component4(argp, &open->op_fname, 1119 &open->op_fnamelen); 1120 if (status) 1121 return status; 1122 break; 1123 case NFS4_OPEN_CLAIM_PREVIOUS: 1124 if (xdr_stream_decode_u32(argp->xdr, &open->op_delegate_type) < 0) 1125 return nfserr_bad_xdr; 1126 break; 1127 case NFS4_OPEN_CLAIM_DELEGATE_CUR: 1128 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); 1129 if (status) 1130 return status; 1131 status = nfsd4_decode_component4(argp, &open->op_fname, 1132 &open->op_fnamelen); 1133 if (status) 1134 return status; 1135 break; 1136 case NFS4_OPEN_CLAIM_FH: 1137 case NFS4_OPEN_CLAIM_DELEG_PREV_FH: 1138 if (argp->minorversion < 1) 1139 return nfserr_bad_xdr; 1140 /* void */ 1141 break; 1142 case NFS4_OPEN_CLAIM_DELEG_CUR_FH: 1143 if (argp->minorversion < 1) 1144 return nfserr_bad_xdr; 1145 status = nfsd4_decode_stateid4(argp, &open->op_delegate_stateid); 1146 if (status) 1147 return status; 1148 break; 1149 default: 1150 return nfserr_bad_xdr; 1151 } 1152 1153 return nfs_ok; 1154 } 1155 1156 static __be32 1157 nfsd4_decode_open(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1158 { 1159 struct nfsd4_open *open = &u->open; 1160 __be32 status; 1161 u32 dummy; 1162 1163 memset(open, 0, sizeof(*open)); 1164 1165 if (xdr_stream_decode_u32(argp->xdr, &open->op_seqid) < 0) 1166 return nfserr_bad_xdr; 1167 /* deleg_want is ignored */ 1168 status = nfsd4_decode_share_access(argp, &open->op_share_access, 1169 &open->op_deleg_want, &dummy); 1170 if (status) 1171 return status; 1172 status = nfsd4_decode_share_deny(argp, &open->op_share_deny); 1173 if (status) 1174 return status; 1175 status = nfsd4_decode_state_owner4(argp, &open->op_clientid, 1176 &open->op_owner); 1177 if (status) 1178 return status; 1179 status = nfsd4_decode_openflag4(argp, open); 1180 if (status) 1181 return status; 1182 return nfsd4_decode_open_claim4(argp, open); 1183 } 1184 1185 static __be32 1186 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, 1187 union nfsd4_op_u *u) 1188 { 1189 struct nfsd4_open_confirm *open_conf = &u->open_confirm; 1190 __be32 status; 1191 1192 if (argp->minorversion >= 1) 1193 return nfserr_notsupp; 1194 1195 status = nfsd4_decode_stateid4(argp, &open_conf->oc_req_stateid); 1196 if (status) 1197 return status; 1198 if (xdr_stream_decode_u32(argp->xdr, &open_conf->oc_seqid) < 0) 1199 return nfserr_bad_xdr; 1200 1201 memset(&open_conf->oc_resp_stateid, 0, 1202 sizeof(open_conf->oc_resp_stateid)); 1203 return nfs_ok; 1204 } 1205 1206 static __be32 1207 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, 1208 union nfsd4_op_u *u) 1209 { 1210 struct nfsd4_open_downgrade *open_down = &u->open_downgrade; 1211 __be32 status; 1212 1213 memset(open_down, 0, sizeof(*open_down)); 1214 status = nfsd4_decode_stateid4(argp, &open_down->od_stateid); 1215 if (status) 1216 return status; 1217 if (xdr_stream_decode_u32(argp->xdr, &open_down->od_seqid) < 0) 1218 return nfserr_bad_xdr; 1219 /* deleg_want is ignored */ 1220 status = nfsd4_decode_share_access(argp, &open_down->od_share_access, 1221 &open_down->od_deleg_want, NULL); 1222 if (status) 1223 return status; 1224 return nfsd4_decode_share_deny(argp, &open_down->od_share_deny); 1225 } 1226 1227 static __be32 1228 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1229 { 1230 struct nfsd4_putfh *putfh = &u->putfh; 1231 __be32 *p; 1232 1233 if (xdr_stream_decode_u32(argp->xdr, &putfh->pf_fhlen) < 0) 1234 return nfserr_bad_xdr; 1235 if (putfh->pf_fhlen > NFS4_FHSIZE) 1236 return nfserr_bad_xdr; 1237 p = xdr_inline_decode(argp->xdr, putfh->pf_fhlen); 1238 if (!p) 1239 return nfserr_bad_xdr; 1240 putfh->pf_fhval = svcxdr_savemem(argp, p, putfh->pf_fhlen); 1241 if (!putfh->pf_fhval) 1242 return nfserr_jukebox; 1243 1244 putfh->no_verify = false; 1245 return nfs_ok; 1246 } 1247 1248 static __be32 1249 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p) 1250 { 1251 if (argp->minorversion == 0) 1252 return nfs_ok; 1253 return nfserr_notsupp; 1254 } 1255 1256 static __be32 1257 nfsd4_decode_read(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1258 { 1259 struct nfsd4_read *read = &u->read; 1260 __be32 status; 1261 1262 memset(read, 0, sizeof(*read)); 1263 status = nfsd4_decode_stateid4(argp, &read->rd_stateid); 1264 if (status) 1265 return status; 1266 if (xdr_stream_decode_u64(argp->xdr, &read->rd_offset) < 0) 1267 return nfserr_bad_xdr; 1268 if (xdr_stream_decode_u32(argp->xdr, &read->rd_length) < 0) 1269 return nfserr_bad_xdr; 1270 1271 return nfs_ok; 1272 } 1273 1274 static __be32 1275 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1276 { 1277 struct nfsd4_readdir *readdir = &u->readdir; 1278 __be32 status; 1279 1280 memset(readdir, 0, sizeof(*readdir)); 1281 if (xdr_stream_decode_u64(argp->xdr, &readdir->rd_cookie) < 0) 1282 return nfserr_bad_xdr; 1283 status = nfsd4_decode_verifier4(argp, &readdir->rd_verf); 1284 if (status) 1285 return status; 1286 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_dircount) < 0) 1287 return nfserr_bad_xdr; 1288 if (xdr_stream_decode_u32(argp->xdr, &readdir->rd_maxcount) < 0) 1289 return nfserr_bad_xdr; 1290 if (xdr_stream_decode_uint32_array(argp->xdr, readdir->rd_bmval, 1291 ARRAY_SIZE(readdir->rd_bmval)) < 0) 1292 return nfserr_bad_xdr; 1293 1294 return nfs_ok; 1295 } 1296 1297 static __be32 1298 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1299 { 1300 struct nfsd4_remove *remove = &u->remove; 1301 memset(&remove->rm_cinfo, 0, sizeof(remove->rm_cinfo)); 1302 return nfsd4_decode_component4(argp, &remove->rm_name, &remove->rm_namelen); 1303 } 1304 1305 static __be32 1306 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1307 { 1308 struct nfsd4_rename *rename = &u->rename; 1309 __be32 status; 1310 1311 memset(rename, 0, sizeof(*rename)); 1312 status = nfsd4_decode_component4(argp, &rename->rn_sname, &rename->rn_snamelen); 1313 if (status) 1314 return status; 1315 return nfsd4_decode_component4(argp, &rename->rn_tname, &rename->rn_tnamelen); 1316 } 1317 1318 static __be32 1319 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1320 { 1321 clientid_t *clientid = &u->renew; 1322 return nfsd4_decode_clientid4(argp, clientid); 1323 } 1324 1325 static __be32 1326 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, 1327 union nfsd4_op_u *u) 1328 { 1329 struct nfsd4_secinfo *secinfo = &u->secinfo; 1330 secinfo->si_exp = NULL; 1331 return nfsd4_decode_component4(argp, &secinfo->si_name, &secinfo->si_namelen); 1332 } 1333 1334 static __be32 1335 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1336 { 1337 struct nfsd4_setattr *setattr = &u->setattr; 1338 __be32 status; 1339 1340 memset(setattr, 0, sizeof(*setattr)); 1341 status = nfsd4_decode_stateid4(argp, &setattr->sa_stateid); 1342 if (status) 1343 return status; 1344 return nfsd4_decode_fattr4(argp, setattr->sa_bmval, 1345 ARRAY_SIZE(setattr->sa_bmval), 1346 &setattr->sa_iattr, &setattr->sa_acl, 1347 &setattr->sa_label, NULL); 1348 } 1349 1350 static __be32 1351 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1352 { 1353 struct nfsd4_setclientid *setclientid = &u->setclientid; 1354 __be32 *p, status; 1355 1356 memset(setclientid, 0, sizeof(*setclientid)); 1357 1358 if (argp->minorversion >= 1) 1359 return nfserr_notsupp; 1360 1361 status = nfsd4_decode_verifier4(argp, &setclientid->se_verf); 1362 if (status) 1363 return status; 1364 status = nfsd4_decode_opaque(argp, &setclientid->se_name); 1365 if (status) 1366 return status; 1367 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_prog) < 0) 1368 return nfserr_bad_xdr; 1369 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_netid_len) < 0) 1370 return nfserr_bad_xdr; 1371 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_netid_len); 1372 if (!p) 1373 return nfserr_bad_xdr; 1374 setclientid->se_callback_netid_val = svcxdr_savemem(argp, p, 1375 setclientid->se_callback_netid_len); 1376 if (!setclientid->se_callback_netid_val) 1377 return nfserr_jukebox; 1378 1379 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_addr_len) < 0) 1380 return nfserr_bad_xdr; 1381 p = xdr_inline_decode(argp->xdr, setclientid->se_callback_addr_len); 1382 if (!p) 1383 return nfserr_bad_xdr; 1384 setclientid->se_callback_addr_val = svcxdr_savemem(argp, p, 1385 setclientid->se_callback_addr_len); 1386 if (!setclientid->se_callback_addr_val) 1387 return nfserr_jukebox; 1388 if (xdr_stream_decode_u32(argp->xdr, &setclientid->se_callback_ident) < 0) 1389 return nfserr_bad_xdr; 1390 1391 return nfs_ok; 1392 } 1393 1394 static __be32 1395 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, 1396 union nfsd4_op_u *u) 1397 { 1398 struct nfsd4_setclientid_confirm *scd_c = &u->setclientid_confirm; 1399 __be32 status; 1400 1401 if (argp->minorversion >= 1) 1402 return nfserr_notsupp; 1403 1404 status = nfsd4_decode_clientid4(argp, &scd_c->sc_clientid); 1405 if (status) 1406 return status; 1407 return nfsd4_decode_verifier4(argp, &scd_c->sc_confirm); 1408 } 1409 1410 /* Also used for NVERIFY */ 1411 static __be32 1412 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1413 { 1414 struct nfsd4_verify *verify = &u->verify; 1415 __be32 *p, status; 1416 1417 memset(verify, 0, sizeof(*verify)); 1418 1419 status = nfsd4_decode_bitmap4(argp, verify->ve_bmval, 1420 ARRAY_SIZE(verify->ve_bmval)); 1421 if (status) 1422 return status; 1423 1424 /* For convenience's sake, we compare raw xdr'd attributes in 1425 * nfsd4_proc_verify */ 1426 1427 if (xdr_stream_decode_u32(argp->xdr, &verify->ve_attrlen) < 0) 1428 return nfserr_bad_xdr; 1429 p = xdr_inline_decode(argp->xdr, verify->ve_attrlen); 1430 if (!p) 1431 return nfserr_bad_xdr; 1432 verify->ve_attrval = svcxdr_savemem(argp, p, verify->ve_attrlen); 1433 if (!verify->ve_attrval) 1434 return nfserr_jukebox; 1435 1436 return nfs_ok; 1437 } 1438 1439 static __be32 1440 nfsd4_decode_write(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1441 { 1442 struct nfsd4_write *write = &u->write; 1443 __be32 status; 1444 1445 status = nfsd4_decode_stateid4(argp, &write->wr_stateid); 1446 if (status) 1447 return status; 1448 if (xdr_stream_decode_u64(argp->xdr, &write->wr_offset) < 0) 1449 return nfserr_bad_xdr; 1450 if (xdr_stream_decode_u32(argp->xdr, &write->wr_stable_how) < 0) 1451 return nfserr_bad_xdr; 1452 if (write->wr_stable_how > NFS_FILE_SYNC) 1453 return nfserr_bad_xdr; 1454 if (xdr_stream_decode_u32(argp->xdr, &write->wr_buflen) < 0) 1455 return nfserr_bad_xdr; 1456 if (!xdr_stream_subsegment(argp->xdr, &write->wr_payload, write->wr_buflen)) 1457 return nfserr_bad_xdr; 1458 1459 write->wr_bytes_written = 0; 1460 write->wr_how_written = 0; 1461 memset(&write->wr_verifier, 0, sizeof(write->wr_verifier)); 1462 return nfs_ok; 1463 } 1464 1465 static __be32 1466 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, 1467 union nfsd4_op_u *u) 1468 { 1469 struct nfsd4_release_lockowner *rlockowner = &u->release_lockowner; 1470 __be32 status; 1471 1472 if (argp->minorversion >= 1) 1473 return nfserr_notsupp; 1474 1475 status = nfsd4_decode_state_owner4(argp, &rlockowner->rl_clientid, 1476 &rlockowner->rl_owner); 1477 if (status) 1478 return status; 1479 1480 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) 1481 return nfserr_inval; 1482 1483 return nfs_ok; 1484 } 1485 1486 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, 1487 union nfsd4_op_u *u) 1488 { 1489 struct nfsd4_backchannel_ctl *bc = &u->backchannel_ctl; 1490 memset(bc, 0, sizeof(*bc)); 1491 if (xdr_stream_decode_u32(argp->xdr, &bc->bc_cb_program) < 0) 1492 return nfserr_bad_xdr; 1493 return nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); 1494 } 1495 1496 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, 1497 union nfsd4_op_u *u) 1498 { 1499 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session; 1500 u32 use_conn_in_rdma_mode; 1501 __be32 status; 1502 1503 memset(bcts, 0, sizeof(*bcts)); 1504 status = nfsd4_decode_sessionid4(argp, &bcts->sessionid); 1505 if (status) 1506 return status; 1507 if (xdr_stream_decode_u32(argp->xdr, &bcts->dir) < 0) 1508 return nfserr_bad_xdr; 1509 if (xdr_stream_decode_u32(argp->xdr, &use_conn_in_rdma_mode) < 0) 1510 return nfserr_bad_xdr; 1511 1512 return nfs_ok; 1513 } 1514 1515 static __be32 1516 nfsd4_decode_state_protect_ops(struct nfsd4_compoundargs *argp, 1517 struct nfsd4_exchange_id *exid) 1518 { 1519 __be32 status; 1520 1521 status = nfsd4_decode_bitmap4(argp, exid->spo_must_enforce, 1522 ARRAY_SIZE(exid->spo_must_enforce)); 1523 if (status) 1524 return nfserr_bad_xdr; 1525 status = nfsd4_decode_bitmap4(argp, exid->spo_must_allow, 1526 ARRAY_SIZE(exid->spo_must_allow)); 1527 if (status) 1528 return nfserr_bad_xdr; 1529 1530 return nfs_ok; 1531 } 1532 1533 /* 1534 * This implementation currently does not support SP4_SSV. 1535 * This decoder simply skips over these arguments. 1536 */ 1537 static noinline __be32 1538 nfsd4_decode_ssv_sp_parms(struct nfsd4_compoundargs *argp, 1539 struct nfsd4_exchange_id *exid) 1540 { 1541 u32 count, window, num_gss_handles; 1542 __be32 status; 1543 1544 /* ssp_ops */ 1545 status = nfsd4_decode_state_protect_ops(argp, exid); 1546 if (status) 1547 return status; 1548 1549 /* ssp_hash_algs<> */ 1550 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1551 return nfserr_bad_xdr; 1552 while (count--) { 1553 status = nfsd4_decode_ignored_string(argp, 0); 1554 if (status) 1555 return status; 1556 } 1557 1558 /* ssp_encr_algs<> */ 1559 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1560 return nfserr_bad_xdr; 1561 while (count--) { 1562 status = nfsd4_decode_ignored_string(argp, 0); 1563 if (status) 1564 return status; 1565 } 1566 1567 if (xdr_stream_decode_u32(argp->xdr, &window) < 0) 1568 return nfserr_bad_xdr; 1569 if (xdr_stream_decode_u32(argp->xdr, &num_gss_handles) < 0) 1570 return nfserr_bad_xdr; 1571 1572 return nfs_ok; 1573 } 1574 1575 static __be32 1576 nfsd4_decode_state_protect4_a(struct nfsd4_compoundargs *argp, 1577 struct nfsd4_exchange_id *exid) 1578 { 1579 __be32 status; 1580 1581 if (xdr_stream_decode_u32(argp->xdr, &exid->spa_how) < 0) 1582 return nfserr_bad_xdr; 1583 switch (exid->spa_how) { 1584 case SP4_NONE: 1585 break; 1586 case SP4_MACH_CRED: 1587 status = nfsd4_decode_state_protect_ops(argp, exid); 1588 if (status) 1589 return status; 1590 break; 1591 case SP4_SSV: 1592 status = nfsd4_decode_ssv_sp_parms(argp, exid); 1593 if (status) 1594 return status; 1595 break; 1596 default: 1597 return nfserr_bad_xdr; 1598 } 1599 1600 return nfs_ok; 1601 } 1602 1603 static __be32 1604 nfsd4_decode_nfs_impl_id4(struct nfsd4_compoundargs *argp, 1605 struct nfsd4_exchange_id *exid) 1606 { 1607 __be32 status; 1608 u32 count; 1609 1610 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 1611 return nfserr_bad_xdr; 1612 switch (count) { 1613 case 0: 1614 break; 1615 case 1: 1616 /* Note that RFC 8881 places no length limit on 1617 * nii_domain, but this implementation permits no 1618 * more than NFS4_OPAQUE_LIMIT bytes */ 1619 status = nfsd4_decode_opaque(argp, &exid->nii_domain); 1620 if (status) 1621 return status; 1622 /* Note that RFC 8881 places no length limit on 1623 * nii_name, but this implementation permits no 1624 * more than NFS4_OPAQUE_LIMIT bytes */ 1625 status = nfsd4_decode_opaque(argp, &exid->nii_name); 1626 if (status) 1627 return status; 1628 status = nfsd4_decode_nfstime4(argp, &exid->nii_time); 1629 if (status) 1630 return status; 1631 break; 1632 default: 1633 return nfserr_bad_xdr; 1634 } 1635 1636 return nfs_ok; 1637 } 1638 1639 static __be32 1640 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, 1641 union nfsd4_op_u *u) 1642 { 1643 struct nfsd4_exchange_id *exid = &u->exchange_id; 1644 __be32 status; 1645 1646 memset(exid, 0, sizeof(*exid)); 1647 status = nfsd4_decode_verifier4(argp, &exid->verifier); 1648 if (status) 1649 return status; 1650 status = nfsd4_decode_opaque(argp, &exid->clname); 1651 if (status) 1652 return status; 1653 if (xdr_stream_decode_u32(argp->xdr, &exid->flags) < 0) 1654 return nfserr_bad_xdr; 1655 status = nfsd4_decode_state_protect4_a(argp, exid); 1656 if (status) 1657 return status; 1658 return nfsd4_decode_nfs_impl_id4(argp, exid); 1659 } 1660 1661 static __be32 1662 nfsd4_decode_channel_attrs4(struct nfsd4_compoundargs *argp, 1663 struct nfsd4_channel_attrs *ca) 1664 { 1665 __be32 *p; 1666 1667 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 7); 1668 if (!p) 1669 return nfserr_bad_xdr; 1670 1671 /* headerpadsz is ignored */ 1672 p++; 1673 ca->maxreq_sz = be32_to_cpup(p++); 1674 ca->maxresp_sz = be32_to_cpup(p++); 1675 ca->maxresp_cached = be32_to_cpup(p++); 1676 ca->maxops = be32_to_cpup(p++); 1677 ca->maxreqs = be32_to_cpup(p++); 1678 ca->nr_rdma_attrs = be32_to_cpup(p); 1679 switch (ca->nr_rdma_attrs) { 1680 case 0: 1681 break; 1682 case 1: 1683 if (xdr_stream_decode_u32(argp->xdr, &ca->rdma_attrs) < 0) 1684 return nfserr_bad_xdr; 1685 break; 1686 default: 1687 return nfserr_bad_xdr; 1688 } 1689 1690 return nfs_ok; 1691 } 1692 1693 static __be32 1694 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, 1695 union nfsd4_op_u *u) 1696 { 1697 struct nfsd4_create_session *sess = &u->create_session; 1698 __be32 status; 1699 1700 memset(sess, 0, sizeof(*sess)); 1701 status = nfsd4_decode_clientid4(argp, &sess->clientid); 1702 if (status) 1703 return status; 1704 if (xdr_stream_decode_u32(argp->xdr, &sess->seqid) < 0) 1705 return nfserr_bad_xdr; 1706 if (xdr_stream_decode_u32(argp->xdr, &sess->flags) < 0) 1707 return nfserr_bad_xdr; 1708 status = nfsd4_decode_channel_attrs4(argp, &sess->fore_channel); 1709 if (status) 1710 return status; 1711 status = nfsd4_decode_channel_attrs4(argp, &sess->back_channel); 1712 if (status) 1713 return status; 1714 if (xdr_stream_decode_u32(argp->xdr, &sess->callback_prog) < 0) 1715 return nfserr_bad_xdr; 1716 return nfsd4_decode_cb_sec(argp, &sess->cb_sec); 1717 } 1718 1719 static __be32 1720 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, 1721 union nfsd4_op_u *u) 1722 { 1723 struct nfsd4_destroy_session *destroy_session = &u->destroy_session; 1724 return nfsd4_decode_sessionid4(argp, &destroy_session->sessionid); 1725 } 1726 1727 static __be32 1728 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, 1729 union nfsd4_op_u *u) 1730 { 1731 struct nfsd4_free_stateid *free_stateid = &u->free_stateid; 1732 return nfsd4_decode_stateid4(argp, &free_stateid->fr_stateid); 1733 } 1734 1735 #ifdef CONFIG_NFSD_PNFS 1736 static __be32 1737 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp, 1738 union nfsd4_op_u *u) 1739 { 1740 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo; 1741 __be32 status; 1742 1743 memset(gdev, 0, sizeof(*gdev)); 1744 status = nfsd4_decode_deviceid4(argp, &gdev->gd_devid); 1745 if (status) 1746 return status; 1747 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_layout_type) < 0) 1748 return nfserr_bad_xdr; 1749 if (xdr_stream_decode_u32(argp->xdr, &gdev->gd_maxcount) < 0) 1750 return nfserr_bad_xdr; 1751 if (xdr_stream_decode_uint32_array(argp->xdr, 1752 &gdev->gd_notify_types, 1) < 0) 1753 return nfserr_bad_xdr; 1754 1755 return nfs_ok; 1756 } 1757 1758 static __be32 1759 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp, 1760 union nfsd4_op_u *u) 1761 { 1762 struct nfsd4_layoutcommit *lcp = &u->layoutcommit; 1763 __be32 *p, status; 1764 1765 memset(lcp, 0, sizeof(*lcp)); 1766 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.offset) < 0) 1767 return nfserr_bad_xdr; 1768 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_seg.length) < 0) 1769 return nfserr_bad_xdr; 1770 if (xdr_stream_decode_bool(argp->xdr, &lcp->lc_reclaim) < 0) 1771 return nfserr_bad_xdr; 1772 status = nfsd4_decode_stateid4(argp, &lcp->lc_sid); 1773 if (status) 1774 return status; 1775 if (xdr_stream_decode_u32(argp->xdr, &lcp->lc_newoffset) < 0) 1776 return nfserr_bad_xdr; 1777 if (lcp->lc_newoffset) { 1778 if (xdr_stream_decode_u64(argp->xdr, &lcp->lc_last_wr) < 0) 1779 return nfserr_bad_xdr; 1780 } else 1781 lcp->lc_last_wr = 0; 1782 p = xdr_inline_decode(argp->xdr, XDR_UNIT); 1783 if (!p) 1784 return nfserr_bad_xdr; 1785 if (xdr_item_is_present(p)) { 1786 status = nfsd4_decode_nfstime4(argp, &lcp->lc_mtime); 1787 if (status) 1788 return status; 1789 } else { 1790 lcp->lc_mtime.tv_nsec = UTIME_NOW; 1791 } 1792 return nfsd4_decode_layoutupdate4(argp, lcp); 1793 } 1794 1795 static __be32 1796 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp, 1797 union nfsd4_op_u *u) 1798 { 1799 struct nfsd4_layoutget *lgp = &u->layoutget; 1800 __be32 status; 1801 1802 memset(lgp, 0, sizeof(*lgp)); 1803 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_signal) < 0) 1804 return nfserr_bad_xdr; 1805 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_layout_type) < 0) 1806 return nfserr_bad_xdr; 1807 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_seg.iomode) < 0) 1808 return nfserr_bad_xdr; 1809 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.offset) < 0) 1810 return nfserr_bad_xdr; 1811 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_seg.length) < 0) 1812 return nfserr_bad_xdr; 1813 if (xdr_stream_decode_u64(argp->xdr, &lgp->lg_minlength) < 0) 1814 return nfserr_bad_xdr; 1815 status = nfsd4_decode_stateid4(argp, &lgp->lg_sid); 1816 if (status) 1817 return status; 1818 if (xdr_stream_decode_u32(argp->xdr, &lgp->lg_maxcount) < 0) 1819 return nfserr_bad_xdr; 1820 1821 return nfs_ok; 1822 } 1823 1824 static __be32 1825 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp, 1826 union nfsd4_op_u *u) 1827 { 1828 struct nfsd4_layoutreturn *lrp = &u->layoutreturn; 1829 memset(lrp, 0, sizeof(*lrp)); 1830 if (xdr_stream_decode_bool(argp->xdr, &lrp->lr_reclaim) < 0) 1831 return nfserr_bad_xdr; 1832 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_layout_type) < 0) 1833 return nfserr_bad_xdr; 1834 if (xdr_stream_decode_u32(argp->xdr, &lrp->lr_seg.iomode) < 0) 1835 return nfserr_bad_xdr; 1836 return nfsd4_decode_layoutreturn4(argp, lrp); 1837 } 1838 #endif /* CONFIG_NFSD_PNFS */ 1839 1840 static __be32 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, 1841 union nfsd4_op_u *u) 1842 { 1843 struct nfsd4_secinfo_no_name *sin = &u->secinfo_no_name; 1844 if (xdr_stream_decode_u32(argp->xdr, &sin->sin_style) < 0) 1845 return nfserr_bad_xdr; 1846 1847 sin->sin_exp = NULL; 1848 return nfs_ok; 1849 } 1850 1851 static __be32 1852 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, 1853 union nfsd4_op_u *u) 1854 { 1855 struct nfsd4_sequence *seq = &u->sequence; 1856 __be32 *p, status; 1857 1858 status = nfsd4_decode_sessionid4(argp, &seq->sessionid); 1859 if (status) 1860 return status; 1861 p = xdr_inline_decode(argp->xdr, XDR_UNIT * 4); 1862 if (!p) 1863 return nfserr_bad_xdr; 1864 seq->seqid = be32_to_cpup(p++); 1865 seq->slotid = be32_to_cpup(p++); 1866 seq->maxslots = be32_to_cpup(p++); 1867 seq->cachethis = be32_to_cpup(p); 1868 1869 seq->status_flags = 0; 1870 return nfs_ok; 1871 } 1872 1873 static __be32 1874 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, 1875 union nfsd4_op_u *u) 1876 { 1877 struct nfsd4_test_stateid *test_stateid = &u->test_stateid; 1878 struct nfsd4_test_stateid_id *stateid; 1879 __be32 status; 1880 u32 i; 1881 1882 memset(test_stateid, 0, sizeof(*test_stateid)); 1883 if (xdr_stream_decode_u32(argp->xdr, &test_stateid->ts_num_ids) < 0) 1884 return nfserr_bad_xdr; 1885 1886 INIT_LIST_HEAD(&test_stateid->ts_stateid_list); 1887 for (i = 0; i < test_stateid->ts_num_ids; i++) { 1888 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid)); 1889 if (!stateid) 1890 return nfserr_jukebox; 1891 INIT_LIST_HEAD(&stateid->ts_id_list); 1892 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); 1893 status = nfsd4_decode_stateid4(argp, &stateid->ts_id_stateid); 1894 if (status) 1895 return status; 1896 } 1897 1898 return nfs_ok; 1899 } 1900 1901 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, 1902 union nfsd4_op_u *u) 1903 { 1904 struct nfsd4_destroy_clientid *dc = &u->destroy_clientid; 1905 return nfsd4_decode_clientid4(argp, &dc->clientid); 1906 } 1907 1908 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, 1909 union nfsd4_op_u *u) 1910 { 1911 struct nfsd4_reclaim_complete *rc = &u->reclaim_complete; 1912 if (xdr_stream_decode_bool(argp->xdr, &rc->rca_one_fs) < 0) 1913 return nfserr_bad_xdr; 1914 return nfs_ok; 1915 } 1916 1917 static __be32 1918 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp, 1919 union nfsd4_op_u *u) 1920 { 1921 struct nfsd4_fallocate *fallocate = &u->allocate; 1922 __be32 status; 1923 1924 status = nfsd4_decode_stateid4(argp, &fallocate->falloc_stateid); 1925 if (status) 1926 return status; 1927 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_offset) < 0) 1928 return nfserr_bad_xdr; 1929 if (xdr_stream_decode_u64(argp->xdr, &fallocate->falloc_length) < 0) 1930 return nfserr_bad_xdr; 1931 1932 return nfs_ok; 1933 } 1934 1935 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp, 1936 struct nl4_server *ns) 1937 { 1938 struct nfs42_netaddr *naddr; 1939 __be32 *p; 1940 1941 if (xdr_stream_decode_u32(argp->xdr, &ns->nl4_type) < 0) 1942 return nfserr_bad_xdr; 1943 1944 /* currently support for 1 inter-server source server */ 1945 switch (ns->nl4_type) { 1946 case NL4_NETADDR: 1947 naddr = &ns->u.nl4_addr; 1948 1949 if (xdr_stream_decode_u32(argp->xdr, &naddr->netid_len) < 0) 1950 return nfserr_bad_xdr; 1951 if (naddr->netid_len > RPCBIND_MAXNETIDLEN) 1952 return nfserr_bad_xdr; 1953 1954 p = xdr_inline_decode(argp->xdr, naddr->netid_len); 1955 if (!p) 1956 return nfserr_bad_xdr; 1957 memcpy(naddr->netid, p, naddr->netid_len); 1958 1959 if (xdr_stream_decode_u32(argp->xdr, &naddr->addr_len) < 0) 1960 return nfserr_bad_xdr; 1961 if (naddr->addr_len > RPCBIND_MAXUADDRLEN) 1962 return nfserr_bad_xdr; 1963 1964 p = xdr_inline_decode(argp->xdr, naddr->addr_len); 1965 if (!p) 1966 return nfserr_bad_xdr; 1967 memcpy(naddr->addr, p, naddr->addr_len); 1968 break; 1969 default: 1970 return nfserr_bad_xdr; 1971 } 1972 1973 return nfs_ok; 1974 } 1975 1976 static __be32 1977 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 1978 { 1979 struct nfsd4_copy *copy = &u->copy; 1980 u32 consecutive, i, count, sync; 1981 struct nl4_server *ns_dummy; 1982 __be32 status; 1983 1984 memset(copy, 0, sizeof(*copy)); 1985 status = nfsd4_decode_stateid4(argp, ©->cp_src_stateid); 1986 if (status) 1987 return status; 1988 status = nfsd4_decode_stateid4(argp, ©->cp_dst_stateid); 1989 if (status) 1990 return status; 1991 if (xdr_stream_decode_u64(argp->xdr, ©->cp_src_pos) < 0) 1992 return nfserr_bad_xdr; 1993 if (xdr_stream_decode_u64(argp->xdr, ©->cp_dst_pos) < 0) 1994 return nfserr_bad_xdr; 1995 if (xdr_stream_decode_u64(argp->xdr, ©->cp_count) < 0) 1996 return nfserr_bad_xdr; 1997 /* ca_consecutive: we always do consecutive copies */ 1998 if (xdr_stream_decode_u32(argp->xdr, &consecutive) < 0) 1999 return nfserr_bad_xdr; 2000 if (xdr_stream_decode_bool(argp->xdr, &sync) < 0) 2001 return nfserr_bad_xdr; 2002 nfsd4_copy_set_sync(copy, sync); 2003 2004 if (xdr_stream_decode_u32(argp->xdr, &count) < 0) 2005 return nfserr_bad_xdr; 2006 copy->cp_src = svcxdr_tmpalloc(argp, sizeof(*copy->cp_src)); 2007 if (copy->cp_src == NULL) 2008 return nfserr_jukebox; 2009 if (count == 0) { /* intra-server copy */ 2010 __set_bit(NFSD4_COPY_F_INTRA, ©->cp_flags); 2011 return nfs_ok; 2012 } 2013 2014 /* decode all the supplied server addresses but use only the first */ 2015 status = nfsd4_decode_nl4_server(argp, copy->cp_src); 2016 if (status) 2017 return status; 2018 2019 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL); 2020 if (ns_dummy == NULL) 2021 return nfserr_jukebox; 2022 for (i = 0; i < count - 1; i++) { 2023 status = nfsd4_decode_nl4_server(argp, ns_dummy); 2024 if (status) { 2025 kfree(ns_dummy); 2026 return status; 2027 } 2028 } 2029 kfree(ns_dummy); 2030 2031 return nfs_ok; 2032 } 2033 2034 static __be32 2035 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp, 2036 union nfsd4_op_u *u) 2037 { 2038 struct nfsd4_copy_notify *cn = &u->copy_notify; 2039 __be32 status; 2040 2041 memset(cn, 0, sizeof(*cn)); 2042 cn->cpn_src = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_src)); 2043 if (cn->cpn_src == NULL) 2044 return nfserr_jukebox; 2045 cn->cpn_dst = svcxdr_tmpalloc(argp, sizeof(*cn->cpn_dst)); 2046 if (cn->cpn_dst == NULL) 2047 return nfserr_jukebox; 2048 2049 status = nfsd4_decode_stateid4(argp, &cn->cpn_src_stateid); 2050 if (status) 2051 return status; 2052 return nfsd4_decode_nl4_server(argp, cn->cpn_dst); 2053 } 2054 2055 static __be32 2056 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp, 2057 union nfsd4_op_u *u) 2058 { 2059 struct nfsd4_offload_status *os = &u->offload_status; 2060 os->count = 0; 2061 os->status = 0; 2062 return nfsd4_decode_stateid4(argp, &os->stateid); 2063 } 2064 2065 static __be32 2066 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 2067 { 2068 struct nfsd4_seek *seek = &u->seek; 2069 __be32 status; 2070 2071 status = nfsd4_decode_stateid4(argp, &seek->seek_stateid); 2072 if (status) 2073 return status; 2074 if (xdr_stream_decode_u64(argp->xdr, &seek->seek_offset) < 0) 2075 return nfserr_bad_xdr; 2076 if (xdr_stream_decode_u32(argp->xdr, &seek->seek_whence) < 0) 2077 return nfserr_bad_xdr; 2078 2079 seek->seek_eof = 0; 2080 seek->seek_pos = 0; 2081 return nfs_ok; 2082 } 2083 2084 static __be32 2085 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u) 2086 { 2087 struct nfsd4_clone *clone = &u->clone; 2088 __be32 status; 2089 2090 status = nfsd4_decode_stateid4(argp, &clone->cl_src_stateid); 2091 if (status) 2092 return status; 2093 status = nfsd4_decode_stateid4(argp, &clone->cl_dst_stateid); 2094 if (status) 2095 return status; 2096 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_src_pos) < 0) 2097 return nfserr_bad_xdr; 2098 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_dst_pos) < 0) 2099 return nfserr_bad_xdr; 2100 if (xdr_stream_decode_u64(argp->xdr, &clone->cl_count) < 0) 2101 return nfserr_bad_xdr; 2102 2103 return nfs_ok; 2104 } 2105 2106 /* 2107 * XDR data that is more than PAGE_SIZE in size is normally part of a 2108 * read or write. However, the size of extended attributes is limited 2109 * by the maximum request size, and then further limited by the underlying 2110 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX 2111 * is 64k). Since there is no kvec- or page-based interface to xattrs, 2112 * and we're not dealing with contiguous pages, we need to do some copying. 2113 */ 2114 2115 /* 2116 * Decode data into buffer. 2117 */ 2118 static __be32 2119 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct xdr_buf *xdr, 2120 char **bufp, u32 buflen) 2121 { 2122 struct page **pages = xdr->pages; 2123 struct kvec *head = xdr->head; 2124 char *tmp, *dp; 2125 u32 len; 2126 2127 if (buflen <= head->iov_len) { 2128 /* 2129 * We're in luck, the head has enough space. Just return 2130 * the head, no need for copying. 2131 */ 2132 *bufp = head->iov_base; 2133 return 0; 2134 } 2135 2136 tmp = svcxdr_tmpalloc(argp, buflen); 2137 if (tmp == NULL) 2138 return nfserr_jukebox; 2139 2140 dp = tmp; 2141 memcpy(dp, head->iov_base, head->iov_len); 2142 buflen -= head->iov_len; 2143 dp += head->iov_len; 2144 2145 while (buflen > 0) { 2146 len = min_t(u32, buflen, PAGE_SIZE); 2147 memcpy(dp, page_address(*pages), len); 2148 2149 buflen -= len; 2150 dp += len; 2151 pages++; 2152 } 2153 2154 *bufp = tmp; 2155 return 0; 2156 } 2157 2158 /* 2159 * Get a user extended attribute name from the XDR buffer. 2160 * It will not have the "user." prefix, so prepend it. 2161 * Lastly, check for nul characters in the name. 2162 */ 2163 static __be32 2164 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep) 2165 { 2166 char *name, *sp, *dp; 2167 u32 namelen, cnt; 2168 __be32 *p; 2169 2170 if (xdr_stream_decode_u32(argp->xdr, &namelen) < 0) 2171 return nfserr_bad_xdr; 2172 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN)) 2173 return nfserr_nametoolong; 2174 if (namelen == 0) 2175 return nfserr_bad_xdr; 2176 p = xdr_inline_decode(argp->xdr, namelen); 2177 if (!p) 2178 return nfserr_bad_xdr; 2179 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1); 2180 if (!name) 2181 return nfserr_jukebox; 2182 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); 2183 2184 /* 2185 * Copy the extended attribute name over while checking for 0 2186 * characters. 2187 */ 2188 sp = (char *)p; 2189 dp = name + XATTR_USER_PREFIX_LEN; 2190 cnt = namelen; 2191 2192 while (cnt-- > 0) { 2193 if (*sp == '\0') 2194 return nfserr_bad_xdr; 2195 *dp++ = *sp++; 2196 } 2197 *dp = '\0'; 2198 2199 *namep = name; 2200 2201 return nfs_ok; 2202 } 2203 2204 /* 2205 * A GETXATTR op request comes without a length specifier. We just set the 2206 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum 2207 * channel reply size. nfsd_getxattr will probe the length of the xattr, 2208 * check it against getxa_len, and allocate + return the value. 2209 */ 2210 static __be32 2211 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp, 2212 union nfsd4_op_u *u) 2213 { 2214 struct nfsd4_getxattr *getxattr = &u->getxattr; 2215 __be32 status; 2216 u32 maxcount; 2217 2218 memset(getxattr, 0, sizeof(*getxattr)); 2219 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name); 2220 if (status) 2221 return status; 2222 2223 maxcount = svc_max_payload(argp->rqstp); 2224 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2225 2226 getxattr->getxa_len = maxcount; 2227 return nfs_ok; 2228 } 2229 2230 static __be32 2231 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp, 2232 union nfsd4_op_u *u) 2233 { 2234 struct nfsd4_setxattr *setxattr = &u->setxattr; 2235 u32 flags, maxcount, size; 2236 __be32 status; 2237 2238 memset(setxattr, 0, sizeof(*setxattr)); 2239 2240 if (xdr_stream_decode_u32(argp->xdr, &flags) < 0) 2241 return nfserr_bad_xdr; 2242 2243 if (flags > SETXATTR4_REPLACE) 2244 return nfserr_inval; 2245 setxattr->setxa_flags = flags; 2246 2247 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name); 2248 if (status) 2249 return status; 2250 2251 maxcount = svc_max_payload(argp->rqstp); 2252 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2253 2254 if (xdr_stream_decode_u32(argp->xdr, &size) < 0) 2255 return nfserr_bad_xdr; 2256 if (size > maxcount) 2257 return nfserr_xattr2big; 2258 2259 setxattr->setxa_len = size; 2260 if (size > 0) { 2261 struct xdr_buf payload; 2262 2263 if (!xdr_stream_subsegment(argp->xdr, &payload, size)) 2264 return nfserr_bad_xdr; 2265 status = nfsd4_vbuf_from_vector(argp, &payload, 2266 &setxattr->setxa_buf, size); 2267 } 2268 2269 return nfs_ok; 2270 } 2271 2272 static __be32 2273 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp, 2274 union nfsd4_op_u *u) 2275 { 2276 struct nfsd4_listxattrs *listxattrs = &u->listxattrs; 2277 u32 maxcount; 2278 2279 memset(listxattrs, 0, sizeof(*listxattrs)); 2280 2281 if (xdr_stream_decode_u64(argp->xdr, &listxattrs->lsxa_cookie) < 0) 2282 return nfserr_bad_xdr; 2283 2284 /* 2285 * If the cookie is too large to have even one user.x attribute 2286 * plus trailing '\0' left in a maximum size buffer, it's invalid. 2287 */ 2288 if (listxattrs->lsxa_cookie >= 2289 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2))) 2290 return nfserr_badcookie; 2291 2292 if (xdr_stream_decode_u32(argp->xdr, &maxcount) < 0) 2293 return nfserr_bad_xdr; 2294 if (maxcount < 8) 2295 /* Always need at least 2 words (length and one character) */ 2296 return nfserr_inval; 2297 2298 maxcount = min(maxcount, svc_max_payload(argp->rqstp)); 2299 listxattrs->lsxa_maxcount = maxcount; 2300 2301 return nfs_ok; 2302 } 2303 2304 static __be32 2305 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp, 2306 union nfsd4_op_u *u) 2307 { 2308 struct nfsd4_removexattr *removexattr = &u->removexattr; 2309 memset(removexattr, 0, sizeof(*removexattr)); 2310 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name); 2311 } 2312 2313 static __be32 2314 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p) 2315 { 2316 return nfs_ok; 2317 } 2318 2319 static __be32 2320 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, union nfsd4_op_u *p) 2321 { 2322 return nfserr_notsupp; 2323 } 2324 2325 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, union nfsd4_op_u *u); 2326 2327 static const nfsd4_dec nfsd4_dec_ops[] = { 2328 [OP_ACCESS] = nfsd4_decode_access, 2329 [OP_CLOSE] = nfsd4_decode_close, 2330 [OP_COMMIT] = nfsd4_decode_commit, 2331 [OP_CREATE] = nfsd4_decode_create, 2332 [OP_DELEGPURGE] = nfsd4_decode_notsupp, 2333 [OP_DELEGRETURN] = nfsd4_decode_delegreturn, 2334 [OP_GETATTR] = nfsd4_decode_getattr, 2335 [OP_GETFH] = nfsd4_decode_noop, 2336 [OP_LINK] = nfsd4_decode_link, 2337 [OP_LOCK] = nfsd4_decode_lock, 2338 [OP_LOCKT] = nfsd4_decode_lockt, 2339 [OP_LOCKU] = nfsd4_decode_locku, 2340 [OP_LOOKUP] = nfsd4_decode_lookup, 2341 [OP_LOOKUPP] = nfsd4_decode_noop, 2342 [OP_NVERIFY] = nfsd4_decode_verify, 2343 [OP_OPEN] = nfsd4_decode_open, 2344 [OP_OPENATTR] = nfsd4_decode_notsupp, 2345 [OP_OPEN_CONFIRM] = nfsd4_decode_open_confirm, 2346 [OP_OPEN_DOWNGRADE] = nfsd4_decode_open_downgrade, 2347 [OP_PUTFH] = nfsd4_decode_putfh, 2348 [OP_PUTPUBFH] = nfsd4_decode_putpubfh, 2349 [OP_PUTROOTFH] = nfsd4_decode_noop, 2350 [OP_READ] = nfsd4_decode_read, 2351 [OP_READDIR] = nfsd4_decode_readdir, 2352 [OP_READLINK] = nfsd4_decode_noop, 2353 [OP_REMOVE] = nfsd4_decode_remove, 2354 [OP_RENAME] = nfsd4_decode_rename, 2355 [OP_RENEW] = nfsd4_decode_renew, 2356 [OP_RESTOREFH] = nfsd4_decode_noop, 2357 [OP_SAVEFH] = nfsd4_decode_noop, 2358 [OP_SECINFO] = nfsd4_decode_secinfo, 2359 [OP_SETATTR] = nfsd4_decode_setattr, 2360 [OP_SETCLIENTID] = nfsd4_decode_setclientid, 2361 [OP_SETCLIENTID_CONFIRM] = nfsd4_decode_setclientid_confirm, 2362 [OP_VERIFY] = nfsd4_decode_verify, 2363 [OP_WRITE] = nfsd4_decode_write, 2364 [OP_RELEASE_LOCKOWNER] = nfsd4_decode_release_lockowner, 2365 2366 /* new operations for NFSv4.1 */ 2367 [OP_BACKCHANNEL_CTL] = nfsd4_decode_backchannel_ctl, 2368 [OP_BIND_CONN_TO_SESSION] = nfsd4_decode_bind_conn_to_session, 2369 [OP_EXCHANGE_ID] = nfsd4_decode_exchange_id, 2370 [OP_CREATE_SESSION] = nfsd4_decode_create_session, 2371 [OP_DESTROY_SESSION] = nfsd4_decode_destroy_session, 2372 [OP_FREE_STATEID] = nfsd4_decode_free_stateid, 2373 [OP_GET_DIR_DELEGATION] = nfsd4_decode_notsupp, 2374 #ifdef CONFIG_NFSD_PNFS 2375 [OP_GETDEVICEINFO] = nfsd4_decode_getdeviceinfo, 2376 [OP_GETDEVICELIST] = nfsd4_decode_notsupp, 2377 [OP_LAYOUTCOMMIT] = nfsd4_decode_layoutcommit, 2378 [OP_LAYOUTGET] = nfsd4_decode_layoutget, 2379 [OP_LAYOUTRETURN] = nfsd4_decode_layoutreturn, 2380 #else 2381 [OP_GETDEVICEINFO] = nfsd4_decode_notsupp, 2382 [OP_GETDEVICELIST] = nfsd4_decode_notsupp, 2383 [OP_LAYOUTCOMMIT] = nfsd4_decode_notsupp, 2384 [OP_LAYOUTGET] = nfsd4_decode_notsupp, 2385 [OP_LAYOUTRETURN] = nfsd4_decode_notsupp, 2386 #endif 2387 [OP_SECINFO_NO_NAME] = nfsd4_decode_secinfo_no_name, 2388 [OP_SEQUENCE] = nfsd4_decode_sequence, 2389 [OP_SET_SSV] = nfsd4_decode_notsupp, 2390 [OP_TEST_STATEID] = nfsd4_decode_test_stateid, 2391 [OP_WANT_DELEGATION] = nfsd4_decode_notsupp, 2392 [OP_DESTROY_CLIENTID] = nfsd4_decode_destroy_clientid, 2393 [OP_RECLAIM_COMPLETE] = nfsd4_decode_reclaim_complete, 2394 2395 /* new operations for NFSv4.2 */ 2396 [OP_ALLOCATE] = nfsd4_decode_fallocate, 2397 [OP_COPY] = nfsd4_decode_copy, 2398 [OP_COPY_NOTIFY] = nfsd4_decode_copy_notify, 2399 [OP_DEALLOCATE] = nfsd4_decode_fallocate, 2400 [OP_IO_ADVISE] = nfsd4_decode_notsupp, 2401 [OP_LAYOUTERROR] = nfsd4_decode_notsupp, 2402 [OP_LAYOUTSTATS] = nfsd4_decode_notsupp, 2403 [OP_OFFLOAD_CANCEL] = nfsd4_decode_offload_status, 2404 [OP_OFFLOAD_STATUS] = nfsd4_decode_offload_status, 2405 [OP_READ_PLUS] = nfsd4_decode_read, 2406 [OP_SEEK] = nfsd4_decode_seek, 2407 [OP_WRITE_SAME] = nfsd4_decode_notsupp, 2408 [OP_CLONE] = nfsd4_decode_clone, 2409 /* RFC 8276 extended atributes operations */ 2410 [OP_GETXATTR] = nfsd4_decode_getxattr, 2411 [OP_SETXATTR] = nfsd4_decode_setxattr, 2412 [OP_LISTXATTRS] = nfsd4_decode_listxattrs, 2413 [OP_REMOVEXATTR] = nfsd4_decode_removexattr, 2414 }; 2415 2416 static inline bool 2417 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) 2418 { 2419 if (op->opnum < FIRST_NFS4_OP) 2420 return false; 2421 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) 2422 return false; 2423 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) 2424 return false; 2425 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) 2426 return false; 2427 return true; 2428 } 2429 2430 static bool 2431 nfsd4_decode_compound(struct nfsd4_compoundargs *argp) 2432 { 2433 struct nfsd4_op *op; 2434 bool cachethis = false; 2435 int auth_slack= argp->rqstp->rq_auth_slack; 2436 int max_reply = auth_slack + 8; /* opcnt, status */ 2437 int readcount = 0; 2438 int readbytes = 0; 2439 __be32 *p; 2440 int i; 2441 2442 if (xdr_stream_decode_u32(argp->xdr, &argp->taglen) < 0) 2443 return false; 2444 max_reply += XDR_UNIT; 2445 argp->tag = NULL; 2446 if (unlikely(argp->taglen)) { 2447 if (argp->taglen > NFSD4_MAX_TAGLEN) 2448 return false; 2449 p = xdr_inline_decode(argp->xdr, argp->taglen); 2450 if (!p) 2451 return false; 2452 argp->tag = svcxdr_savemem(argp, p, argp->taglen); 2453 if (!argp->tag) 2454 return false; 2455 max_reply += xdr_align_size(argp->taglen); 2456 } 2457 2458 if (xdr_stream_decode_u32(argp->xdr, &argp->minorversion) < 0) 2459 return false; 2460 if (xdr_stream_decode_u32(argp->xdr, &argp->client_opcnt) < 0) 2461 return false; 2462 argp->opcnt = min_t(u32, argp->client_opcnt, 2463 NFSD_MAX_OPS_PER_COMPOUND); 2464 2465 if (argp->opcnt > ARRAY_SIZE(argp->iops)) { 2466 argp->ops = vcalloc(argp->opcnt, sizeof(*argp->ops)); 2467 if (!argp->ops) { 2468 argp->ops = argp->iops; 2469 return false; 2470 } 2471 } 2472 2473 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) 2474 argp->opcnt = 0; 2475 2476 for (i = 0; i < argp->opcnt; i++) { 2477 op = &argp->ops[i]; 2478 op->replay = NULL; 2479 op->opdesc = NULL; 2480 2481 if (xdr_stream_decode_u32(argp->xdr, &op->opnum) < 0) 2482 return false; 2483 if (nfsd4_opnum_in_range(argp, op)) { 2484 op->opdesc = OPDESC(op); 2485 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); 2486 if (op->status != nfs_ok) 2487 trace_nfsd_compound_decode_err(argp->rqstp, 2488 argp->opcnt, i, 2489 op->opnum, 2490 op->status); 2491 } else { 2492 op->opnum = OP_ILLEGAL; 2493 op->status = nfserr_op_illegal; 2494 } 2495 2496 /* 2497 * We'll try to cache the result in the DRC if any one 2498 * op in the compound wants to be cached: 2499 */ 2500 cachethis |= nfsd4_cache_this_op(op); 2501 2502 if (op->opnum == OP_READ || op->opnum == OP_READ_PLUS) { 2503 readcount++; 2504 readbytes += nfsd4_max_reply(argp->rqstp, op); 2505 } else 2506 max_reply += nfsd4_max_reply(argp->rqstp, op); 2507 /* 2508 * OP_LOCK and OP_LOCKT may return a conflicting lock. 2509 * (Special case because it will just skip encoding this 2510 * if it runs out of xdr buffer space, and it is the only 2511 * operation that behaves this way.) 2512 */ 2513 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT) 2514 max_reply += NFS4_OPAQUE_LIMIT; 2515 2516 if (op->status) { 2517 argp->opcnt = i+1; 2518 break; 2519 } 2520 } 2521 /* Sessions make the DRC unnecessary: */ 2522 if (argp->minorversion) 2523 cachethis = false; 2524 svc_reserve(argp->rqstp, max_reply + readbytes); 2525 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; 2526 2527 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) 2528 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags); 2529 2530 return true; 2531 } 2532 2533 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode, 2534 struct svc_export *exp) 2535 { 2536 if (exp->ex_flags & NFSEXP_V4ROOT) { 2537 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time)); 2538 *p++ = 0; 2539 } else 2540 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode)); 2541 return p; 2542 } 2543 2544 /* 2545 * ctime (in NFSv4, time_metadata) is not writeable, and the client 2546 * doesn't really care what resolution could theoretically be stored by 2547 * the filesystem. 2548 * 2549 * The client cares how close together changes can be while still 2550 * guaranteeing ctime changes. For most filesystems (which have 2551 * timestamps with nanosecond fields) that is limited by the resolution 2552 * of the time returned from current_time() (which I'm assuming to be 2553 * 1/HZ). 2554 */ 2555 static __be32 *encode_time_delta(__be32 *p, struct inode *inode) 2556 { 2557 struct timespec64 ts; 2558 u32 ns; 2559 2560 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran); 2561 ts = ns_to_timespec64(ns); 2562 2563 p = xdr_encode_hyper(p, ts.tv_sec); 2564 *p++ = cpu_to_be32(ts.tv_nsec); 2565 2566 return p; 2567 } 2568 2569 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c) 2570 { 2571 *p++ = cpu_to_be32(c->atomic); 2572 p = xdr_encode_hyper(p, c->before_change); 2573 p = xdr_encode_hyper(p, c->after_change); 2574 return p; 2575 } 2576 2577 /* Encode as an array of strings the string given with components 2578 * separated @sep, escaped with esc_enter and esc_exit. 2579 */ 2580 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, 2581 char *components, char esc_enter, 2582 char esc_exit) 2583 { 2584 __be32 *p; 2585 __be32 pathlen; 2586 int pathlen_offset; 2587 int strlen, count=0; 2588 char *str, *end, *next; 2589 2590 dprintk("nfsd4_encode_components(%s)\n", components); 2591 2592 pathlen_offset = xdr->buf->len; 2593 p = xdr_reserve_space(xdr, 4); 2594 if (!p) 2595 return nfserr_resource; 2596 p++; /* We will fill this in with @count later */ 2597 2598 end = str = components; 2599 while (*end) { 2600 bool found_esc = false; 2601 2602 /* try to parse as esc_start, ..., esc_end, sep */ 2603 if (*str == esc_enter) { 2604 for (; *end && (*end != esc_exit); end++) 2605 /* find esc_exit or end of string */; 2606 next = end + 1; 2607 if (*end && (!*next || *next == sep)) { 2608 str++; 2609 found_esc = true; 2610 } 2611 } 2612 2613 if (!found_esc) 2614 for (; *end && (*end != sep); end++) 2615 /* find sep or end of string */; 2616 2617 strlen = end - str; 2618 if (strlen) { 2619 p = xdr_reserve_space(xdr, strlen + 4); 2620 if (!p) 2621 return nfserr_resource; 2622 p = xdr_encode_opaque(p, str, strlen); 2623 count++; 2624 } 2625 else 2626 end++; 2627 if (found_esc) 2628 end = next; 2629 2630 str = end; 2631 } 2632 pathlen = htonl(count); 2633 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); 2634 return 0; 2635 } 2636 2637 /* Encode as an array of strings the string given with components 2638 * separated @sep. 2639 */ 2640 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, 2641 char *components) 2642 { 2643 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); 2644 } 2645 2646 /* 2647 * encode a location element of a fs_locations structure 2648 */ 2649 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, 2650 struct nfsd4_fs_location *location) 2651 { 2652 __be32 status; 2653 2654 status = nfsd4_encode_components_esc(xdr, ':', location->hosts, 2655 '[', ']'); 2656 if (status) 2657 return status; 2658 status = nfsd4_encode_components(xdr, '/', location->path); 2659 if (status) 2660 return status; 2661 return 0; 2662 } 2663 2664 /* 2665 * Encode a path in RFC3530 'pathname4' format 2666 */ 2667 static __be32 nfsd4_encode_path(struct xdr_stream *xdr, 2668 const struct path *root, 2669 const struct path *path) 2670 { 2671 struct path cur = *path; 2672 __be32 *p; 2673 struct dentry **components = NULL; 2674 unsigned int ncomponents = 0; 2675 __be32 err = nfserr_jukebox; 2676 2677 dprintk("nfsd4_encode_components("); 2678 2679 path_get(&cur); 2680 /* First walk the path up to the nfsd root, and store the 2681 * dentries/path components in an array. 2682 */ 2683 for (;;) { 2684 if (path_equal(&cur, root)) 2685 break; 2686 if (cur.dentry == cur.mnt->mnt_root) { 2687 if (follow_up(&cur)) 2688 continue; 2689 goto out_free; 2690 } 2691 if ((ncomponents & 15) == 0) { 2692 struct dentry **new; 2693 new = krealloc(components, 2694 sizeof(*new) * (ncomponents + 16), 2695 GFP_KERNEL); 2696 if (!new) 2697 goto out_free; 2698 components = new; 2699 } 2700 components[ncomponents++] = cur.dentry; 2701 cur.dentry = dget_parent(cur.dentry); 2702 } 2703 err = nfserr_resource; 2704 p = xdr_reserve_space(xdr, 4); 2705 if (!p) 2706 goto out_free; 2707 *p++ = cpu_to_be32(ncomponents); 2708 2709 while (ncomponents) { 2710 struct dentry *dentry = components[ncomponents - 1]; 2711 unsigned int len; 2712 2713 spin_lock(&dentry->d_lock); 2714 len = dentry->d_name.len; 2715 p = xdr_reserve_space(xdr, len + 4); 2716 if (!p) { 2717 spin_unlock(&dentry->d_lock); 2718 goto out_free; 2719 } 2720 p = xdr_encode_opaque(p, dentry->d_name.name, len); 2721 dprintk("/%pd", dentry); 2722 spin_unlock(&dentry->d_lock); 2723 dput(dentry); 2724 ncomponents--; 2725 } 2726 2727 err = 0; 2728 out_free: 2729 dprintk(")\n"); 2730 while (ncomponents) 2731 dput(components[--ncomponents]); 2732 kfree(components); 2733 path_put(&cur); 2734 return err; 2735 } 2736 2737 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr, 2738 struct svc_rqst *rqstp, const struct path *path) 2739 { 2740 struct svc_export *exp_ps; 2741 __be32 res; 2742 2743 exp_ps = rqst_find_fsidzero_export(rqstp); 2744 if (IS_ERR(exp_ps)) 2745 return nfserrno(PTR_ERR(exp_ps)); 2746 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path); 2747 exp_put(exp_ps); 2748 return res; 2749 } 2750 2751 /* 2752 * encode a fs_locations structure 2753 */ 2754 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr, 2755 struct svc_rqst *rqstp, struct svc_export *exp) 2756 { 2757 __be32 status; 2758 int i; 2759 __be32 *p; 2760 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; 2761 2762 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path); 2763 if (status) 2764 return status; 2765 p = xdr_reserve_space(xdr, 4); 2766 if (!p) 2767 return nfserr_resource; 2768 *p++ = cpu_to_be32(fslocs->locations_count); 2769 for (i=0; i<fslocs->locations_count; i++) { 2770 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); 2771 if (status) 2772 return status; 2773 } 2774 return 0; 2775 } 2776 2777 static u32 nfs4_file_type(umode_t mode) 2778 { 2779 switch (mode & S_IFMT) { 2780 case S_IFIFO: return NF4FIFO; 2781 case S_IFCHR: return NF4CHR; 2782 case S_IFDIR: return NF4DIR; 2783 case S_IFBLK: return NF4BLK; 2784 case S_IFLNK: return NF4LNK; 2785 case S_IFREG: return NF4REG; 2786 case S_IFSOCK: return NF4SOCK; 2787 default: return NF4BAD; 2788 } 2789 } 2790 2791 static inline __be32 2792 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2793 struct nfs4_ace *ace) 2794 { 2795 if (ace->whotype != NFS4_ACL_WHO_NAMED) 2796 return nfs4_acl_write_who(xdr, ace->whotype); 2797 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 2798 return nfsd4_encode_group(xdr, rqstp, ace->who_gid); 2799 else 2800 return nfsd4_encode_user(xdr, rqstp, ace->who_uid); 2801 } 2802 2803 static inline __be32 2804 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types) 2805 { 2806 __be32 *p; 2807 unsigned long i = hweight_long(layout_types); 2808 2809 p = xdr_reserve_space(xdr, 4 + 4 * i); 2810 if (!p) 2811 return nfserr_resource; 2812 2813 *p++ = cpu_to_be32(i); 2814 2815 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i) 2816 if (layout_types & (1 << i)) 2817 *p++ = cpu_to_be32(i); 2818 2819 return 0; 2820 } 2821 2822 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ 2823 FATTR4_WORD0_RDATTR_ERROR) 2824 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID 2825 #define WORD2_ABSENT_FS_ATTRS 0 2826 2827 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2828 static inline __be32 2829 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2830 void *context, int len) 2831 { 2832 __be32 *p; 2833 2834 p = xdr_reserve_space(xdr, len + 4 + 4 + 4); 2835 if (!p) 2836 return nfserr_resource; 2837 2838 /* 2839 * For now we use a 0 here to indicate the null translation; in 2840 * the future we may place a call to translation code here. 2841 */ 2842 *p++ = cpu_to_be32(0); /* lfs */ 2843 *p++ = cpu_to_be32(0); /* pi */ 2844 p = xdr_encode_opaque(p, context, len); 2845 return 0; 2846 } 2847 #else 2848 static inline __be32 2849 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2850 void *context, int len) 2851 { return 0; } 2852 #endif 2853 2854 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err) 2855 { 2856 /* As per referral draft: */ 2857 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || 2858 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { 2859 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || 2860 *bmval0 & FATTR4_WORD0_FS_LOCATIONS) 2861 *rdattr_err = NFSERR_MOVED; 2862 else 2863 return nfserr_moved; 2864 } 2865 *bmval0 &= WORD0_ABSENT_FS_ATTRS; 2866 *bmval1 &= WORD1_ABSENT_FS_ATTRS; 2867 *bmval2 &= WORD2_ABSENT_FS_ATTRS; 2868 return 0; 2869 } 2870 2871 2872 static int nfsd4_get_mounted_on_ino(struct svc_export *exp, u64 *pino) 2873 { 2874 struct path path = exp->ex_path; 2875 struct kstat stat; 2876 int err; 2877 2878 path_get(&path); 2879 while (follow_up(&path)) { 2880 if (path.dentry != path.mnt->mnt_root) 2881 break; 2882 } 2883 err = vfs_getattr(&path, &stat, STATX_INO, AT_STATX_SYNC_AS_STAT); 2884 path_put(&path); 2885 if (!err) 2886 *pino = stat.ino; 2887 return err; 2888 } 2889 2890 static __be32 2891 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2) 2892 { 2893 __be32 *p; 2894 2895 if (bmval2) { 2896 p = xdr_reserve_space(xdr, 16); 2897 if (!p) 2898 goto out_resource; 2899 *p++ = cpu_to_be32(3); 2900 *p++ = cpu_to_be32(bmval0); 2901 *p++ = cpu_to_be32(bmval1); 2902 *p++ = cpu_to_be32(bmval2); 2903 } else if (bmval1) { 2904 p = xdr_reserve_space(xdr, 12); 2905 if (!p) 2906 goto out_resource; 2907 *p++ = cpu_to_be32(2); 2908 *p++ = cpu_to_be32(bmval0); 2909 *p++ = cpu_to_be32(bmval1); 2910 } else { 2911 p = xdr_reserve_space(xdr, 8); 2912 if (!p) 2913 goto out_resource; 2914 *p++ = cpu_to_be32(1); 2915 *p++ = cpu_to_be32(bmval0); 2916 } 2917 2918 return 0; 2919 out_resource: 2920 return nfserr_resource; 2921 } 2922 2923 /* 2924 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle 2925 * ourselves. 2926 */ 2927 static __be32 2928 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, 2929 struct svc_export *exp, 2930 struct dentry *dentry, u32 *bmval, 2931 struct svc_rqst *rqstp, int ignore_crossmnt) 2932 { 2933 u32 bmval0 = bmval[0]; 2934 u32 bmval1 = bmval[1]; 2935 u32 bmval2 = bmval[2]; 2936 struct kstat stat; 2937 struct svc_fh *tempfh = NULL; 2938 struct kstatfs statfs; 2939 __be32 *p, *attrlen_p; 2940 int starting_len = xdr->buf->len; 2941 int attrlen_offset; 2942 u32 dummy; 2943 u64 dummy64; 2944 u32 rdattr_err = 0; 2945 __be32 status; 2946 int err; 2947 struct nfs4_acl *acl = NULL; 2948 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2949 void *context = NULL; 2950 int contextlen; 2951 #endif 2952 bool contextsupport = false; 2953 struct nfsd4_compoundres *resp = rqstp->rq_resp; 2954 u32 minorversion = resp->cstate.minorversion; 2955 struct path path = { 2956 .mnt = exp->ex_path.mnt, 2957 .dentry = dentry, 2958 }; 2959 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2960 2961 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); 2962 BUG_ON(!nfsd_attrs_supported(minorversion, bmval)); 2963 2964 if (exp->ex_fslocs.migrated) { 2965 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err); 2966 if (status) 2967 goto out; 2968 } 2969 2970 err = vfs_getattr(&path, &stat, 2971 STATX_BASIC_STATS | STATX_BTIME | STATX_CHANGE_COOKIE, 2972 AT_STATX_SYNC_AS_STAT); 2973 if (err) 2974 goto out_nfserr; 2975 if (!(stat.result_mask & STATX_BTIME)) 2976 /* underlying FS does not offer btime so we can't share it */ 2977 bmval1 &= ~FATTR4_WORD1_TIME_CREATE; 2978 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE | 2979 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) || 2980 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE | 2981 FATTR4_WORD1_SPACE_TOTAL))) { 2982 err = vfs_statfs(&path, &statfs); 2983 if (err) 2984 goto out_nfserr; 2985 } 2986 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) { 2987 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); 2988 status = nfserr_jukebox; 2989 if (!tempfh) 2990 goto out; 2991 fh_init(tempfh, NFS4_FHSIZE); 2992 status = fh_compose(tempfh, exp, dentry, NULL); 2993 if (status) 2994 goto out; 2995 fhp = tempfh; 2996 } 2997 if (bmval0 & FATTR4_WORD0_ACL) { 2998 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl); 2999 if (err == -EOPNOTSUPP) 3000 bmval0 &= ~FATTR4_WORD0_ACL; 3001 else if (err == -EINVAL) { 3002 status = nfserr_attrnotsupp; 3003 goto out; 3004 } else if (err != 0) 3005 goto out_nfserr; 3006 } 3007 3008 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3009 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) || 3010 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 3011 if (exp->ex_flags & NFSEXP_SECURITY_LABEL) 3012 err = security_inode_getsecctx(d_inode(dentry), 3013 &context, &contextlen); 3014 else 3015 err = -EOPNOTSUPP; 3016 contextsupport = (err == 0); 3017 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 3018 if (err == -EOPNOTSUPP) 3019 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL; 3020 else if (err) 3021 goto out_nfserr; 3022 } 3023 } 3024 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 3025 3026 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2); 3027 if (status) 3028 goto out; 3029 3030 attrlen_offset = xdr->buf->len; 3031 attrlen_p = xdr_reserve_space(xdr, XDR_UNIT); 3032 if (!attrlen_p) 3033 goto out_resource; 3034 3035 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 3036 u32 supp[3]; 3037 3038 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 3039 3040 if (!IS_POSIXACL(dentry->d_inode)) 3041 supp[0] &= ~FATTR4_WORD0_ACL; 3042 if (!contextsupport) 3043 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL; 3044 if (!supp[2]) { 3045 p = xdr_reserve_space(xdr, 12); 3046 if (!p) 3047 goto out_resource; 3048 *p++ = cpu_to_be32(2); 3049 *p++ = cpu_to_be32(supp[0]); 3050 *p++ = cpu_to_be32(supp[1]); 3051 } else { 3052 p = xdr_reserve_space(xdr, 16); 3053 if (!p) 3054 goto out_resource; 3055 *p++ = cpu_to_be32(3); 3056 *p++ = cpu_to_be32(supp[0]); 3057 *p++ = cpu_to_be32(supp[1]); 3058 *p++ = cpu_to_be32(supp[2]); 3059 } 3060 } 3061 if (bmval0 & FATTR4_WORD0_TYPE) { 3062 p = xdr_reserve_space(xdr, 4); 3063 if (!p) 3064 goto out_resource; 3065 dummy = nfs4_file_type(stat.mode); 3066 if (dummy == NF4BAD) { 3067 status = nfserr_serverfault; 3068 goto out; 3069 } 3070 *p++ = cpu_to_be32(dummy); 3071 } 3072 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) { 3073 p = xdr_reserve_space(xdr, 4); 3074 if (!p) 3075 goto out_resource; 3076 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK) 3077 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT); 3078 else 3079 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT| 3080 NFS4_FH_VOL_RENAME); 3081 } 3082 if (bmval0 & FATTR4_WORD0_CHANGE) { 3083 p = xdr_reserve_space(xdr, 8); 3084 if (!p) 3085 goto out_resource; 3086 p = encode_change(p, &stat, d_inode(dentry), exp); 3087 } 3088 if (bmval0 & FATTR4_WORD0_SIZE) { 3089 p = xdr_reserve_space(xdr, 8); 3090 if (!p) 3091 goto out_resource; 3092 p = xdr_encode_hyper(p, stat.size); 3093 } 3094 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { 3095 p = xdr_reserve_space(xdr, 4); 3096 if (!p) 3097 goto out_resource; 3098 *p++ = cpu_to_be32(1); 3099 } 3100 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) { 3101 p = xdr_reserve_space(xdr, 4); 3102 if (!p) 3103 goto out_resource; 3104 *p++ = cpu_to_be32(1); 3105 } 3106 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) { 3107 p = xdr_reserve_space(xdr, 4); 3108 if (!p) 3109 goto out_resource; 3110 *p++ = cpu_to_be32(0); 3111 } 3112 if (bmval0 & FATTR4_WORD0_FSID) { 3113 p = xdr_reserve_space(xdr, 16); 3114 if (!p) 3115 goto out_resource; 3116 if (exp->ex_fslocs.migrated) { 3117 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR); 3118 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR); 3119 } else switch(fsid_source(fhp)) { 3120 case FSIDSOURCE_FSID: 3121 p = xdr_encode_hyper(p, (u64)exp->ex_fsid); 3122 p = xdr_encode_hyper(p, (u64)0); 3123 break; 3124 case FSIDSOURCE_DEV: 3125 *p++ = cpu_to_be32(0); 3126 *p++ = cpu_to_be32(MAJOR(stat.dev)); 3127 *p++ = cpu_to_be32(0); 3128 *p++ = cpu_to_be32(MINOR(stat.dev)); 3129 break; 3130 case FSIDSOURCE_UUID: 3131 p = xdr_encode_opaque_fixed(p, exp->ex_uuid, 3132 EX_UUID_LEN); 3133 break; 3134 } 3135 } 3136 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) { 3137 p = xdr_reserve_space(xdr, 4); 3138 if (!p) 3139 goto out_resource; 3140 *p++ = cpu_to_be32(0); 3141 } 3142 if (bmval0 & FATTR4_WORD0_LEASE_TIME) { 3143 p = xdr_reserve_space(xdr, 4); 3144 if (!p) 3145 goto out_resource; 3146 *p++ = cpu_to_be32(nn->nfsd4_lease); 3147 } 3148 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) { 3149 p = xdr_reserve_space(xdr, 4); 3150 if (!p) 3151 goto out_resource; 3152 *p++ = cpu_to_be32(rdattr_err); 3153 } 3154 if (bmval0 & FATTR4_WORD0_ACL) { 3155 struct nfs4_ace *ace; 3156 3157 if (acl == NULL) { 3158 p = xdr_reserve_space(xdr, 4); 3159 if (!p) 3160 goto out_resource; 3161 3162 *p++ = cpu_to_be32(0); 3163 goto out_acl; 3164 } 3165 p = xdr_reserve_space(xdr, 4); 3166 if (!p) 3167 goto out_resource; 3168 *p++ = cpu_to_be32(acl->naces); 3169 3170 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) { 3171 p = xdr_reserve_space(xdr, 4*3); 3172 if (!p) 3173 goto out_resource; 3174 *p++ = cpu_to_be32(ace->type); 3175 *p++ = cpu_to_be32(ace->flag); 3176 *p++ = cpu_to_be32(ace->access_mask & 3177 NFS4_ACE_MASK_ALL); 3178 status = nfsd4_encode_aclname(xdr, rqstp, ace); 3179 if (status) 3180 goto out; 3181 } 3182 } 3183 out_acl: 3184 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) { 3185 p = xdr_reserve_space(xdr, 4); 3186 if (!p) 3187 goto out_resource; 3188 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ? 3189 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0); 3190 } 3191 if (bmval0 & FATTR4_WORD0_CANSETTIME) { 3192 p = xdr_reserve_space(xdr, 4); 3193 if (!p) 3194 goto out_resource; 3195 *p++ = cpu_to_be32(1); 3196 } 3197 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) { 3198 p = xdr_reserve_space(xdr, 4); 3199 if (!p) 3200 goto out_resource; 3201 *p++ = cpu_to_be32(0); 3202 } 3203 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) { 3204 p = xdr_reserve_space(xdr, 4); 3205 if (!p) 3206 goto out_resource; 3207 *p++ = cpu_to_be32(1); 3208 } 3209 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) { 3210 p = xdr_reserve_space(xdr, 4); 3211 if (!p) 3212 goto out_resource; 3213 *p++ = cpu_to_be32(1); 3214 } 3215 if (bmval0 & FATTR4_WORD0_FILEHANDLE) { 3216 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4); 3217 if (!p) 3218 goto out_resource; 3219 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, 3220 fhp->fh_handle.fh_size); 3221 } 3222 if (bmval0 & FATTR4_WORD0_FILEID) { 3223 p = xdr_reserve_space(xdr, 8); 3224 if (!p) 3225 goto out_resource; 3226 p = xdr_encode_hyper(p, stat.ino); 3227 } 3228 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) { 3229 p = xdr_reserve_space(xdr, 8); 3230 if (!p) 3231 goto out_resource; 3232 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3233 } 3234 if (bmval0 & FATTR4_WORD0_FILES_FREE) { 3235 p = xdr_reserve_space(xdr, 8); 3236 if (!p) 3237 goto out_resource; 3238 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3239 } 3240 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) { 3241 p = xdr_reserve_space(xdr, 8); 3242 if (!p) 3243 goto out_resource; 3244 p = xdr_encode_hyper(p, (u64) statfs.f_files); 3245 } 3246 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { 3247 status = nfsd4_encode_fs_locations(xdr, rqstp, exp); 3248 if (status) 3249 goto out; 3250 } 3251 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) { 3252 p = xdr_reserve_space(xdr, 4); 3253 if (!p) 3254 goto out_resource; 3255 *p++ = cpu_to_be32(1); 3256 } 3257 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) { 3258 p = xdr_reserve_space(xdr, 8); 3259 if (!p) 3260 goto out_resource; 3261 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes); 3262 } 3263 if (bmval0 & FATTR4_WORD0_MAXLINK) { 3264 p = xdr_reserve_space(xdr, 4); 3265 if (!p) 3266 goto out_resource; 3267 *p++ = cpu_to_be32(255); 3268 } 3269 if (bmval0 & FATTR4_WORD0_MAXNAME) { 3270 p = xdr_reserve_space(xdr, 4); 3271 if (!p) 3272 goto out_resource; 3273 *p++ = cpu_to_be32(statfs.f_namelen); 3274 } 3275 if (bmval0 & FATTR4_WORD0_MAXREAD) { 3276 p = xdr_reserve_space(xdr, 8); 3277 if (!p) 3278 goto out_resource; 3279 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3280 } 3281 if (bmval0 & FATTR4_WORD0_MAXWRITE) { 3282 p = xdr_reserve_space(xdr, 8); 3283 if (!p) 3284 goto out_resource; 3285 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3286 } 3287 if (bmval1 & FATTR4_WORD1_MODE) { 3288 p = xdr_reserve_space(xdr, 4); 3289 if (!p) 3290 goto out_resource; 3291 *p++ = cpu_to_be32(stat.mode & S_IALLUGO); 3292 } 3293 if (bmval1 & FATTR4_WORD1_NO_TRUNC) { 3294 p = xdr_reserve_space(xdr, 4); 3295 if (!p) 3296 goto out_resource; 3297 *p++ = cpu_to_be32(1); 3298 } 3299 if (bmval1 & FATTR4_WORD1_NUMLINKS) { 3300 p = xdr_reserve_space(xdr, 4); 3301 if (!p) 3302 goto out_resource; 3303 *p++ = cpu_to_be32(stat.nlink); 3304 } 3305 if (bmval1 & FATTR4_WORD1_OWNER) { 3306 status = nfsd4_encode_user(xdr, rqstp, stat.uid); 3307 if (status) 3308 goto out; 3309 } 3310 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) { 3311 status = nfsd4_encode_group(xdr, rqstp, stat.gid); 3312 if (status) 3313 goto out; 3314 } 3315 if (bmval1 & FATTR4_WORD1_RAWDEV) { 3316 p = xdr_reserve_space(xdr, 8); 3317 if (!p) 3318 goto out_resource; 3319 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev)); 3320 *p++ = cpu_to_be32((u32) MINOR(stat.rdev)); 3321 } 3322 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) { 3323 p = xdr_reserve_space(xdr, 8); 3324 if (!p) 3325 goto out_resource; 3326 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize; 3327 p = xdr_encode_hyper(p, dummy64); 3328 } 3329 if (bmval1 & FATTR4_WORD1_SPACE_FREE) { 3330 p = xdr_reserve_space(xdr, 8); 3331 if (!p) 3332 goto out_resource; 3333 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize; 3334 p = xdr_encode_hyper(p, dummy64); 3335 } 3336 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) { 3337 p = xdr_reserve_space(xdr, 8); 3338 if (!p) 3339 goto out_resource; 3340 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize; 3341 p = xdr_encode_hyper(p, dummy64); 3342 } 3343 if (bmval1 & FATTR4_WORD1_SPACE_USED) { 3344 p = xdr_reserve_space(xdr, 8); 3345 if (!p) 3346 goto out_resource; 3347 dummy64 = (u64)stat.blocks << 9; 3348 p = xdr_encode_hyper(p, dummy64); 3349 } 3350 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) { 3351 p = xdr_reserve_space(xdr, 12); 3352 if (!p) 3353 goto out_resource; 3354 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec); 3355 *p++ = cpu_to_be32(stat.atime.tv_nsec); 3356 } 3357 if (bmval1 & FATTR4_WORD1_TIME_DELTA) { 3358 p = xdr_reserve_space(xdr, 12); 3359 if (!p) 3360 goto out_resource; 3361 p = encode_time_delta(p, d_inode(dentry)); 3362 } 3363 if (bmval1 & FATTR4_WORD1_TIME_METADATA) { 3364 p = xdr_reserve_space(xdr, 12); 3365 if (!p) 3366 goto out_resource; 3367 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec); 3368 *p++ = cpu_to_be32(stat.ctime.tv_nsec); 3369 } 3370 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) { 3371 p = xdr_reserve_space(xdr, 12); 3372 if (!p) 3373 goto out_resource; 3374 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec); 3375 *p++ = cpu_to_be32(stat.mtime.tv_nsec); 3376 } 3377 if (bmval1 & FATTR4_WORD1_TIME_CREATE) { 3378 p = xdr_reserve_space(xdr, 12); 3379 if (!p) 3380 goto out_resource; 3381 p = xdr_encode_hyper(p, (s64)stat.btime.tv_sec); 3382 *p++ = cpu_to_be32(stat.btime.tv_nsec); 3383 } 3384 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) { 3385 u64 ino = stat.ino; 3386 3387 p = xdr_reserve_space(xdr, 8); 3388 if (!p) 3389 goto out_resource; 3390 /* 3391 * Get ino of mountpoint in parent filesystem, if not ignoring 3392 * crossmount and this is the root of a cross-mounted 3393 * filesystem. 3394 */ 3395 if (ignore_crossmnt == 0 && 3396 dentry == exp->ex_path.mnt->mnt_root) { 3397 err = nfsd4_get_mounted_on_ino(exp, &ino); 3398 if (err) 3399 goto out_nfserr; 3400 } 3401 p = xdr_encode_hyper(p, ino); 3402 } 3403 #ifdef CONFIG_NFSD_PNFS 3404 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) { 3405 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3406 if (status) 3407 goto out; 3408 } 3409 3410 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) { 3411 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3412 if (status) 3413 goto out; 3414 } 3415 3416 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) { 3417 p = xdr_reserve_space(xdr, 4); 3418 if (!p) 3419 goto out_resource; 3420 *p++ = cpu_to_be32(stat.blksize); 3421 } 3422 #endif /* CONFIG_NFSD_PNFS */ 3423 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) { 3424 u32 supp[3]; 3425 3426 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 3427 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0; 3428 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1; 3429 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2; 3430 3431 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]); 3432 if (status) 3433 goto out; 3434 } 3435 3436 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3437 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 3438 status = nfsd4_encode_security_label(xdr, rqstp, context, 3439 contextlen); 3440 if (status) 3441 goto out; 3442 } 3443 #endif 3444 3445 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) { 3446 p = xdr_reserve_space(xdr, 4); 3447 if (!p) 3448 goto out_resource; 3449 err = xattr_supported_namespace(d_inode(dentry), 3450 XATTR_USER_PREFIX); 3451 *p++ = cpu_to_be32(err == 0); 3452 } 3453 3454 *attrlen_p = cpu_to_be32(xdr->buf->len - attrlen_offset - XDR_UNIT); 3455 status = nfs_ok; 3456 3457 out: 3458 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3459 if (context) 3460 security_release_secctx(context, contextlen); 3461 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 3462 kfree(acl); 3463 if (tempfh) { 3464 fh_put(tempfh); 3465 kfree(tempfh); 3466 } 3467 if (status) 3468 xdr_truncate_encode(xdr, starting_len); 3469 return status; 3470 out_nfserr: 3471 status = nfserrno(err); 3472 goto out; 3473 out_resource: 3474 status = nfserr_resource; 3475 goto out; 3476 } 3477 3478 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr, 3479 struct xdr_buf *buf, __be32 *p, int bytes) 3480 { 3481 xdr->scratch.iov_len = 0; 3482 memset(buf, 0, sizeof(struct xdr_buf)); 3483 buf->head[0].iov_base = p; 3484 buf->head[0].iov_len = 0; 3485 buf->len = 0; 3486 xdr->buf = buf; 3487 xdr->iov = buf->head; 3488 xdr->p = p; 3489 xdr->end = (void *)p + bytes; 3490 buf->buflen = bytes; 3491 } 3492 3493 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words, 3494 struct svc_fh *fhp, struct svc_export *exp, 3495 struct dentry *dentry, u32 *bmval, 3496 struct svc_rqst *rqstp, int ignore_crossmnt) 3497 { 3498 struct xdr_buf dummy; 3499 struct xdr_stream xdr; 3500 __be32 ret; 3501 3502 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2); 3503 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp, 3504 ignore_crossmnt); 3505 *p = xdr.p; 3506 return ret; 3507 } 3508 3509 static inline int attributes_need_mount(u32 *bmval) 3510 { 3511 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME)) 3512 return 1; 3513 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID) 3514 return 1; 3515 return 0; 3516 } 3517 3518 static __be32 3519 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd, 3520 const char *name, int namlen) 3521 { 3522 struct svc_export *exp = cd->rd_fhp->fh_export; 3523 struct dentry *dentry; 3524 __be32 nfserr; 3525 int ignore_crossmnt = 0; 3526 3527 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen); 3528 if (IS_ERR(dentry)) 3529 return nfserrno(PTR_ERR(dentry)); 3530 3531 exp_get(exp); 3532 /* 3533 * In the case of a mountpoint, the client may be asking for 3534 * attributes that are only properties of the underlying filesystem 3535 * as opposed to the cross-mounted file system. In such a case, 3536 * we will not follow the cross mount and will fill the attribtutes 3537 * directly from the mountpoint dentry. 3538 */ 3539 if (nfsd_mountpoint(dentry, exp)) { 3540 int err; 3541 3542 if (!(exp->ex_flags & NFSEXP_V4ROOT) 3543 && !attributes_need_mount(cd->rd_bmval)) { 3544 ignore_crossmnt = 1; 3545 goto out_encode; 3546 } 3547 /* 3548 * Why the heck aren't we just using nfsd_lookup?? 3549 * Different "."/".." handling? Something else? 3550 * At least, add a comment here to explain.... 3551 */ 3552 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp); 3553 if (err) { 3554 nfserr = nfserrno(err); 3555 goto out_put; 3556 } 3557 nfserr = check_nfsd_access(exp, cd->rd_rqstp); 3558 if (nfserr) 3559 goto out_put; 3560 3561 } 3562 out_encode: 3563 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval, 3564 cd->rd_rqstp, ignore_crossmnt); 3565 out_put: 3566 dput(dentry); 3567 exp_put(exp); 3568 return nfserr; 3569 } 3570 3571 static __be32 * 3572 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr) 3573 { 3574 __be32 *p; 3575 3576 p = xdr_reserve_space(xdr, 20); 3577 if (!p) 3578 return NULL; 3579 *p++ = htonl(2); 3580 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */ 3581 *p++ = htonl(0); /* bmval1 */ 3582 3583 *p++ = htonl(4); /* attribute length */ 3584 *p++ = nfserr; /* no htonl */ 3585 return p; 3586 } 3587 3588 static int 3589 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen, 3590 loff_t offset, u64 ino, unsigned int d_type) 3591 { 3592 struct readdir_cd *ccd = ccdv; 3593 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common); 3594 struct xdr_stream *xdr = cd->xdr; 3595 int start_offset = xdr->buf->len; 3596 int cookie_offset; 3597 u32 name_and_cookie; 3598 int entry_bytes; 3599 __be32 nfserr = nfserr_toosmall; 3600 __be64 wire_offset; 3601 __be32 *p; 3602 3603 /* In nfsv4, "." and ".." never make it onto the wire.. */ 3604 if (name && isdotent(name, namlen)) { 3605 cd->common.err = nfs_ok; 3606 return 0; 3607 } 3608 3609 if (cd->cookie_offset) { 3610 wire_offset = cpu_to_be64(offset); 3611 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset, 3612 &wire_offset, 8); 3613 } 3614 3615 p = xdr_reserve_space(xdr, 4); 3616 if (!p) 3617 goto fail; 3618 *p++ = xdr_one; /* mark entry present */ 3619 cookie_offset = xdr->buf->len; 3620 p = xdr_reserve_space(xdr, 3*4 + namlen); 3621 if (!p) 3622 goto fail; 3623 p = xdr_encode_hyper(p, OFFSET_MAX); /* offset of next entry */ 3624 p = xdr_encode_array(p, name, namlen); /* name length & name */ 3625 3626 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen); 3627 switch (nfserr) { 3628 case nfs_ok: 3629 break; 3630 case nfserr_resource: 3631 nfserr = nfserr_toosmall; 3632 goto fail; 3633 case nfserr_noent: 3634 xdr_truncate_encode(xdr, start_offset); 3635 goto skip_entry; 3636 case nfserr_jukebox: 3637 /* 3638 * The pseudoroot should only display dentries that lead to 3639 * exports. If we get EJUKEBOX here, then we can't tell whether 3640 * this entry should be included. Just fail the whole READDIR 3641 * with NFS4ERR_DELAY in that case, and hope that the situation 3642 * will resolve itself by the client's next attempt. 3643 */ 3644 if (cd->rd_fhp->fh_export->ex_flags & NFSEXP_V4ROOT) 3645 goto fail; 3646 fallthrough; 3647 default: 3648 /* 3649 * If the client requested the RDATTR_ERROR attribute, 3650 * we stuff the error code into this attribute 3651 * and continue. If this attribute was not requested, 3652 * then in accordance with the spec, we fail the 3653 * entire READDIR operation(!) 3654 */ 3655 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)) 3656 goto fail; 3657 p = nfsd4_encode_rdattr_error(xdr, nfserr); 3658 if (p == NULL) { 3659 nfserr = nfserr_toosmall; 3660 goto fail; 3661 } 3662 } 3663 nfserr = nfserr_toosmall; 3664 entry_bytes = xdr->buf->len - start_offset; 3665 if (entry_bytes > cd->rd_maxcount) 3666 goto fail; 3667 cd->rd_maxcount -= entry_bytes; 3668 /* 3669 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", and 3670 * notes that it could be zero. If it is zero, then the server 3671 * should enforce only the rd_maxcount value. 3672 */ 3673 if (cd->rd_dircount) { 3674 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8; 3675 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset) 3676 goto fail; 3677 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie); 3678 if (!cd->rd_dircount) 3679 cd->rd_maxcount = 0; 3680 } 3681 3682 cd->cookie_offset = cookie_offset; 3683 skip_entry: 3684 cd->common.err = nfs_ok; 3685 return 0; 3686 fail: 3687 xdr_truncate_encode(xdr, start_offset); 3688 cd->common.err = nfserr; 3689 return -EINVAL; 3690 } 3691 3692 static __be32 3693 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid) 3694 { 3695 __be32 *p; 3696 3697 p = xdr_reserve_space(xdr, sizeof(stateid_t)); 3698 if (!p) 3699 return nfserr_resource; 3700 *p++ = cpu_to_be32(sid->si_generation); 3701 p = xdr_encode_opaque_fixed(p, &sid->si_opaque, 3702 sizeof(stateid_opaque_t)); 3703 return 0; 3704 } 3705 3706 static __be32 3707 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, 3708 union nfsd4_op_u *u) 3709 { 3710 struct nfsd4_access *access = &u->access; 3711 struct xdr_stream *xdr = resp->xdr; 3712 __be32 *p; 3713 3714 p = xdr_reserve_space(xdr, 8); 3715 if (!p) 3716 return nfserr_resource; 3717 *p++ = cpu_to_be32(access->ac_supported); 3718 *p++ = cpu_to_be32(access->ac_resp_access); 3719 return 0; 3720 } 3721 3722 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, 3723 union nfsd4_op_u *u) 3724 { 3725 struct nfsd4_bind_conn_to_session *bcts = &u->bind_conn_to_session; 3726 struct xdr_stream *xdr = resp->xdr; 3727 __be32 *p; 3728 3729 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8); 3730 if (!p) 3731 return nfserr_resource; 3732 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data, 3733 NFS4_MAX_SESSIONID_LEN); 3734 *p++ = cpu_to_be32(bcts->dir); 3735 /* Upshifting from TCP to RDMA is not supported */ 3736 *p++ = cpu_to_be32(0); 3737 return 0; 3738 } 3739 3740 static __be32 3741 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, 3742 union nfsd4_op_u *u) 3743 { 3744 struct nfsd4_close *close = &u->close; 3745 struct xdr_stream *xdr = resp->xdr; 3746 3747 return nfsd4_encode_stateid(xdr, &close->cl_stateid); 3748 } 3749 3750 3751 static __be32 3752 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, 3753 union nfsd4_op_u *u) 3754 { 3755 struct nfsd4_commit *commit = &u->commit; 3756 struct xdr_stream *xdr = resp->xdr; 3757 __be32 *p; 3758 3759 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 3760 if (!p) 3761 return nfserr_resource; 3762 p = xdr_encode_opaque_fixed(p, commit->co_verf.data, 3763 NFS4_VERIFIER_SIZE); 3764 return 0; 3765 } 3766 3767 static __be32 3768 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, 3769 union nfsd4_op_u *u) 3770 { 3771 struct nfsd4_create *create = &u->create; 3772 struct xdr_stream *xdr = resp->xdr; 3773 __be32 *p; 3774 3775 p = xdr_reserve_space(xdr, 20); 3776 if (!p) 3777 return nfserr_resource; 3778 encode_cinfo(p, &create->cr_cinfo); 3779 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0], 3780 create->cr_bmval[1], create->cr_bmval[2]); 3781 } 3782 3783 static __be32 3784 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, 3785 union nfsd4_op_u *u) 3786 { 3787 struct nfsd4_getattr *getattr = &u->getattr; 3788 struct svc_fh *fhp = getattr->ga_fhp; 3789 struct xdr_stream *xdr = resp->xdr; 3790 3791 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry, 3792 getattr->ga_bmval, resp->rqstp, 0); 3793 } 3794 3795 static __be32 3796 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, 3797 union nfsd4_op_u *u) 3798 { 3799 struct svc_fh **fhpp = &u->getfh; 3800 struct xdr_stream *xdr = resp->xdr; 3801 struct svc_fh *fhp = *fhpp; 3802 unsigned int len; 3803 __be32 *p; 3804 3805 len = fhp->fh_handle.fh_size; 3806 p = xdr_reserve_space(xdr, len + 4); 3807 if (!p) 3808 return nfserr_resource; 3809 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_raw, len); 3810 return 0; 3811 } 3812 3813 /* 3814 * Including all fields other than the name, a LOCK4denied structure requires 3815 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. 3816 */ 3817 static __be32 3818 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) 3819 { 3820 struct xdr_netobj *conf = &ld->ld_owner; 3821 __be32 *p; 3822 3823 again: 3824 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len)); 3825 if (!p) { 3826 /* 3827 * Don't fail to return the result just because we can't 3828 * return the conflicting open: 3829 */ 3830 if (conf->len) { 3831 kfree(conf->data); 3832 conf->len = 0; 3833 conf->data = NULL; 3834 goto again; 3835 } 3836 return nfserr_resource; 3837 } 3838 p = xdr_encode_hyper(p, ld->ld_start); 3839 p = xdr_encode_hyper(p, ld->ld_length); 3840 *p++ = cpu_to_be32(ld->ld_type); 3841 if (conf->len) { 3842 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8); 3843 p = xdr_encode_opaque(p, conf->data, conf->len); 3844 kfree(conf->data); 3845 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */ 3846 p = xdr_encode_hyper(p, (u64)0); /* clientid */ 3847 *p++ = cpu_to_be32(0); /* length of owner name */ 3848 } 3849 return nfserr_denied; 3850 } 3851 3852 static __be32 3853 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, 3854 union nfsd4_op_u *u) 3855 { 3856 struct nfsd4_lock *lock = &u->lock; 3857 struct xdr_stream *xdr = resp->xdr; 3858 3859 if (!nfserr) 3860 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid); 3861 else if (nfserr == nfserr_denied) 3862 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); 3863 3864 return nfserr; 3865 } 3866 3867 static __be32 3868 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, 3869 union nfsd4_op_u *u) 3870 { 3871 struct nfsd4_lockt *lockt = &u->lockt; 3872 struct xdr_stream *xdr = resp->xdr; 3873 3874 if (nfserr == nfserr_denied) 3875 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); 3876 return nfserr; 3877 } 3878 3879 static __be32 3880 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, 3881 union nfsd4_op_u *u) 3882 { 3883 struct nfsd4_locku *locku = &u->locku; 3884 struct xdr_stream *xdr = resp->xdr; 3885 3886 return nfsd4_encode_stateid(xdr, &locku->lu_stateid); 3887 } 3888 3889 3890 static __be32 3891 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, 3892 union nfsd4_op_u *u) 3893 { 3894 struct nfsd4_link *link = &u->link; 3895 struct xdr_stream *xdr = resp->xdr; 3896 __be32 *p; 3897 3898 p = xdr_reserve_space(xdr, 20); 3899 if (!p) 3900 return nfserr_resource; 3901 p = encode_cinfo(p, &link->li_cinfo); 3902 return 0; 3903 } 3904 3905 3906 static __be32 3907 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, 3908 union nfsd4_op_u *u) 3909 { 3910 struct nfsd4_open *open = &u->open; 3911 struct xdr_stream *xdr = resp->xdr; 3912 __be32 *p; 3913 3914 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid); 3915 if (nfserr) 3916 return nfserr; 3917 p = xdr_reserve_space(xdr, 24); 3918 if (!p) 3919 return nfserr_resource; 3920 p = encode_cinfo(p, &open->op_cinfo); 3921 *p++ = cpu_to_be32(open->op_rflags); 3922 3923 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1], 3924 open->op_bmval[2]); 3925 if (nfserr) 3926 return nfserr; 3927 3928 p = xdr_reserve_space(xdr, 4); 3929 if (!p) 3930 return nfserr_resource; 3931 3932 *p++ = cpu_to_be32(open->op_delegate_type); 3933 switch (open->op_delegate_type) { 3934 case NFS4_OPEN_DELEGATE_NONE: 3935 break; 3936 case NFS4_OPEN_DELEGATE_READ: 3937 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3938 if (nfserr) 3939 return nfserr; 3940 p = xdr_reserve_space(xdr, 20); 3941 if (!p) 3942 return nfserr_resource; 3943 *p++ = cpu_to_be32(open->op_recall); 3944 3945 /* 3946 * TODO: ACE's in delegations 3947 */ 3948 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3949 *p++ = cpu_to_be32(0); 3950 *p++ = cpu_to_be32(0); 3951 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3952 break; 3953 case NFS4_OPEN_DELEGATE_WRITE: 3954 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3955 if (nfserr) 3956 return nfserr; 3957 p = xdr_reserve_space(xdr, 32); 3958 if (!p) 3959 return nfserr_resource; 3960 *p++ = cpu_to_be32(0); 3961 3962 /* 3963 * TODO: space_limit's in delegations 3964 */ 3965 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE); 3966 *p++ = cpu_to_be32(~(u32)0); 3967 *p++ = cpu_to_be32(~(u32)0); 3968 3969 /* 3970 * TODO: ACE's in delegations 3971 */ 3972 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3973 *p++ = cpu_to_be32(0); 3974 *p++ = cpu_to_be32(0); 3975 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3976 break; 3977 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */ 3978 switch (open->op_why_no_deleg) { 3979 case WND4_CONTENTION: 3980 case WND4_RESOURCE: 3981 p = xdr_reserve_space(xdr, 8); 3982 if (!p) 3983 return nfserr_resource; 3984 *p++ = cpu_to_be32(open->op_why_no_deleg); 3985 /* deleg signaling not supported yet: */ 3986 *p++ = cpu_to_be32(0); 3987 break; 3988 default: 3989 p = xdr_reserve_space(xdr, 4); 3990 if (!p) 3991 return nfserr_resource; 3992 *p++ = cpu_to_be32(open->op_why_no_deleg); 3993 } 3994 break; 3995 default: 3996 BUG(); 3997 } 3998 /* XXX save filehandle here */ 3999 return 0; 4000 } 4001 4002 static __be32 4003 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, 4004 union nfsd4_op_u *u) 4005 { 4006 struct nfsd4_open_confirm *oc = &u->open_confirm; 4007 struct xdr_stream *xdr = resp->xdr; 4008 4009 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid); 4010 } 4011 4012 static __be32 4013 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, 4014 union nfsd4_op_u *u) 4015 { 4016 struct nfsd4_open_downgrade *od = &u->open_downgrade; 4017 struct xdr_stream *xdr = resp->xdr; 4018 4019 return nfsd4_encode_stateid(xdr, &od->od_stateid); 4020 } 4021 4022 static __be32 nfsd4_encode_splice_read( 4023 struct nfsd4_compoundres *resp, 4024 struct nfsd4_read *read, 4025 struct file *file, unsigned long maxcount) 4026 { 4027 struct xdr_stream *xdr = resp->xdr; 4028 struct xdr_buf *buf = xdr->buf; 4029 int status, space_left; 4030 __be32 nfserr; 4031 4032 /* Make sure there will be room for padding if needed */ 4033 if (xdr->end - xdr->p < 1) 4034 return nfserr_resource; 4035 4036 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp, 4037 file, read->rd_offset, &maxcount, 4038 &read->rd_eof); 4039 read->rd_length = maxcount; 4040 if (nfserr) 4041 goto out_err; 4042 status = svc_encode_result_payload(read->rd_rqstp, 4043 buf->head[0].iov_len, maxcount); 4044 if (status) { 4045 nfserr = nfserrno(status); 4046 goto out_err; 4047 } 4048 4049 buf->page_len = maxcount; 4050 buf->len += maxcount; 4051 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1) 4052 / PAGE_SIZE; 4053 4054 /* Use rest of head for padding and remaining ops: */ 4055 buf->tail[0].iov_base = xdr->p; 4056 buf->tail[0].iov_len = 0; 4057 xdr->iov = buf->tail; 4058 if (maxcount&3) { 4059 int pad = 4 - (maxcount&3); 4060 4061 *(xdr->p++) = 0; 4062 4063 buf->tail[0].iov_base += maxcount&3; 4064 buf->tail[0].iov_len = pad; 4065 buf->len += pad; 4066 } 4067 4068 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p, 4069 buf->buflen - buf->len); 4070 buf->buflen = buf->len + space_left; 4071 xdr->end = (__be32 *)((void *)xdr->end + space_left); 4072 4073 return 0; 4074 4075 out_err: 4076 /* 4077 * nfsd_splice_actor may have already messed with the 4078 * page length; reset it so as not to confuse 4079 * xdr_truncate_encode in our caller. 4080 */ 4081 buf->page_len = 0; 4082 return nfserr; 4083 } 4084 4085 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp, 4086 struct nfsd4_read *read, 4087 struct file *file, unsigned long maxcount) 4088 { 4089 struct xdr_stream *xdr = resp->xdr; 4090 unsigned int starting_len = xdr->buf->len; 4091 __be32 zero = xdr_zero; 4092 __be32 nfserr; 4093 4094 read->rd_vlen = xdr_reserve_space_vec(xdr, resp->rqstp->rq_vec, maxcount); 4095 if (read->rd_vlen < 0) 4096 return nfserr_resource; 4097 4098 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset, 4099 resp->rqstp->rq_vec, read->rd_vlen, &maxcount, 4100 &read->rd_eof); 4101 read->rd_length = maxcount; 4102 if (nfserr) 4103 return nfserr; 4104 if (svc_encode_result_payload(resp->rqstp, starting_len, maxcount)) 4105 return nfserr_io; 4106 xdr_truncate_encode(xdr, starting_len + xdr_align_size(maxcount)); 4107 4108 write_bytes_to_xdr_buf(xdr->buf, starting_len + maxcount, &zero, 4109 xdr_pad_size(maxcount)); 4110 return nfs_ok; 4111 } 4112 4113 static __be32 4114 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr, 4115 union nfsd4_op_u *u) 4116 { 4117 struct nfsd4_read *read = &u->read; 4118 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags); 4119 unsigned long maxcount; 4120 struct xdr_stream *xdr = resp->xdr; 4121 struct file *file; 4122 int starting_len = xdr->buf->len; 4123 __be32 *p; 4124 4125 if (nfserr) 4126 return nfserr; 4127 file = read->rd_nf->nf_file; 4128 4129 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */ 4130 if (!p) { 4131 WARN_ON_ONCE(splice_ok); 4132 return nfserr_resource; 4133 } 4134 if (resp->xdr->buf->page_len && splice_ok) { 4135 WARN_ON_ONCE(1); 4136 return nfserr_serverfault; 4137 } 4138 xdr_commit_encode(xdr); 4139 4140 maxcount = min_t(unsigned long, read->rd_length, 4141 (xdr->buf->buflen - xdr->buf->len)); 4142 4143 if (file->f_op->splice_read && splice_ok) 4144 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount); 4145 else 4146 nfserr = nfsd4_encode_readv(resp, read, file, maxcount); 4147 if (nfserr) { 4148 xdr_truncate_encode(xdr, starting_len); 4149 return nfserr; 4150 } 4151 4152 p = xdr_encode_bool(p, read->rd_eof); 4153 *p = cpu_to_be32(read->rd_length); 4154 return nfs_ok; 4155 } 4156 4157 static __be32 4158 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, 4159 union nfsd4_op_u *u) 4160 { 4161 struct nfsd4_readlink *readlink = &u->readlink; 4162 __be32 *p, *maxcount_p, zero = xdr_zero; 4163 struct xdr_stream *xdr = resp->xdr; 4164 int length_offset = xdr->buf->len; 4165 int maxcount, status; 4166 4167 maxcount_p = xdr_reserve_space(xdr, XDR_UNIT); 4168 if (!maxcount_p) 4169 return nfserr_resource; 4170 maxcount = PAGE_SIZE; 4171 4172 p = xdr_reserve_space(xdr, maxcount); 4173 if (!p) 4174 return nfserr_resource; 4175 /* 4176 * XXX: By default, vfs_readlink() will truncate symlinks if they 4177 * would overflow the buffer. Is this kosher in NFSv4? If not, one 4178 * easy fix is: if vfs_readlink() precisely fills the buffer, assume 4179 * that truncation occurred, and return NFS4ERR_RESOURCE. 4180 */ 4181 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, 4182 (char *)p, &maxcount); 4183 if (nfserr == nfserr_isdir) 4184 nfserr = nfserr_inval; 4185 if (nfserr) 4186 goto out_err; 4187 status = svc_encode_result_payload(readlink->rl_rqstp, length_offset, 4188 maxcount); 4189 if (status) { 4190 nfserr = nfserrno(status); 4191 goto out_err; 4192 } 4193 *maxcount_p = cpu_to_be32(maxcount); 4194 xdr_truncate_encode(xdr, length_offset + 4 + xdr_align_size(maxcount)); 4195 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, &zero, 4196 xdr_pad_size(maxcount)); 4197 return nfs_ok; 4198 4199 out_err: 4200 xdr_truncate_encode(xdr, length_offset); 4201 return nfserr; 4202 } 4203 4204 static __be32 4205 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, 4206 union nfsd4_op_u *u) 4207 { 4208 struct nfsd4_readdir *readdir = &u->readdir; 4209 int maxcount; 4210 int bytes_left; 4211 loff_t offset; 4212 __be64 wire_offset; 4213 struct xdr_stream *xdr = resp->xdr; 4214 int starting_len = xdr->buf->len; 4215 __be32 *p; 4216 4217 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 4218 if (!p) 4219 return nfserr_resource; 4220 4221 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */ 4222 *p++ = cpu_to_be32(0); 4223 *p++ = cpu_to_be32(0); 4224 xdr->buf->head[0].iov_len = (char *)xdr->p - 4225 (char *)xdr->buf->head[0].iov_base; 4226 4227 /* 4228 * Number of bytes left for directory entries allowing for the 4229 * final 8 bytes of the readdir and a following failed op: 4230 */ 4231 bytes_left = xdr->buf->buflen - xdr->buf->len 4232 - COMPOUND_ERR_SLACK_SPACE - 8; 4233 if (bytes_left < 0) { 4234 nfserr = nfserr_resource; 4235 goto err_no_verf; 4236 } 4237 maxcount = svc_max_payload(resp->rqstp); 4238 maxcount = min_t(u32, readdir->rd_maxcount, maxcount); 4239 /* 4240 * Note the rfc defines rd_maxcount as the size of the 4241 * READDIR4resok structure, which includes the verifier above 4242 * and the 8 bytes encoded at the end of this function: 4243 */ 4244 if (maxcount < 16) { 4245 nfserr = nfserr_toosmall; 4246 goto err_no_verf; 4247 } 4248 maxcount = min_t(int, maxcount-16, bytes_left); 4249 4250 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */ 4251 if (!readdir->rd_dircount) 4252 readdir->rd_dircount = svc_max_payload(resp->rqstp); 4253 4254 readdir->xdr = xdr; 4255 readdir->rd_maxcount = maxcount; 4256 readdir->common.err = 0; 4257 readdir->cookie_offset = 0; 4258 4259 offset = readdir->rd_cookie; 4260 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp, 4261 &offset, 4262 &readdir->common, nfsd4_encode_dirent); 4263 if (nfserr == nfs_ok && 4264 readdir->common.err == nfserr_toosmall && 4265 xdr->buf->len == starting_len + 8) { 4266 /* nothing encoded; which limit did we hit?: */ 4267 if (maxcount - 16 < bytes_left) 4268 /* It was the fault of rd_maxcount: */ 4269 nfserr = nfserr_toosmall; 4270 else 4271 /* We ran out of buffer space: */ 4272 nfserr = nfserr_resource; 4273 } 4274 if (nfserr) 4275 goto err_no_verf; 4276 4277 if (readdir->cookie_offset) { 4278 wire_offset = cpu_to_be64(offset); 4279 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset, 4280 &wire_offset, 8); 4281 } 4282 4283 p = xdr_reserve_space(xdr, 8); 4284 if (!p) { 4285 WARN_ON_ONCE(1); 4286 goto err_no_verf; 4287 } 4288 *p++ = 0; /* no more entries */ 4289 *p++ = htonl(readdir->common.err == nfserr_eof); 4290 4291 return 0; 4292 err_no_verf: 4293 xdr_truncate_encode(xdr, starting_len); 4294 return nfserr; 4295 } 4296 4297 static __be32 4298 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, 4299 union nfsd4_op_u *u) 4300 { 4301 struct nfsd4_remove *remove = &u->remove; 4302 struct xdr_stream *xdr = resp->xdr; 4303 __be32 *p; 4304 4305 p = xdr_reserve_space(xdr, 20); 4306 if (!p) 4307 return nfserr_resource; 4308 p = encode_cinfo(p, &remove->rm_cinfo); 4309 return 0; 4310 } 4311 4312 static __be32 4313 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, 4314 union nfsd4_op_u *u) 4315 { 4316 struct nfsd4_rename *rename = &u->rename; 4317 struct xdr_stream *xdr = resp->xdr; 4318 __be32 *p; 4319 4320 p = xdr_reserve_space(xdr, 40); 4321 if (!p) 4322 return nfserr_resource; 4323 p = encode_cinfo(p, &rename->rn_sinfo); 4324 p = encode_cinfo(p, &rename->rn_tinfo); 4325 return 0; 4326 } 4327 4328 static __be32 4329 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp) 4330 { 4331 u32 i, nflavs, supported; 4332 struct exp_flavor_info *flavs; 4333 struct exp_flavor_info def_flavs[2]; 4334 __be32 *p, *flavorsp; 4335 static bool report = true; 4336 4337 if (exp->ex_nflavors) { 4338 flavs = exp->ex_flavors; 4339 nflavs = exp->ex_nflavors; 4340 } else { /* Handling of some defaults in absence of real secinfo: */ 4341 flavs = def_flavs; 4342 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) { 4343 nflavs = 2; 4344 flavs[0].pseudoflavor = RPC_AUTH_UNIX; 4345 flavs[1].pseudoflavor = RPC_AUTH_NULL; 4346 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) { 4347 nflavs = 1; 4348 flavs[0].pseudoflavor 4349 = svcauth_gss_flavor(exp->ex_client); 4350 } else { 4351 nflavs = 1; 4352 flavs[0].pseudoflavor 4353 = exp->ex_client->flavour->flavour; 4354 } 4355 } 4356 4357 supported = 0; 4358 p = xdr_reserve_space(xdr, 4); 4359 if (!p) 4360 return nfserr_resource; 4361 flavorsp = p++; /* to be backfilled later */ 4362 4363 for (i = 0; i < nflavs; i++) { 4364 rpc_authflavor_t pf = flavs[i].pseudoflavor; 4365 struct rpcsec_gss_info info; 4366 4367 if (rpcauth_get_gssinfo(pf, &info) == 0) { 4368 supported++; 4369 p = xdr_reserve_space(xdr, 4 + 4 + 4370 XDR_LEN(info.oid.len) + 4 + 4); 4371 if (!p) 4372 return nfserr_resource; 4373 *p++ = cpu_to_be32(RPC_AUTH_GSS); 4374 p = xdr_encode_opaque(p, info.oid.data, info.oid.len); 4375 *p++ = cpu_to_be32(info.qop); 4376 *p++ = cpu_to_be32(info.service); 4377 } else if (pf < RPC_AUTH_MAXFLAVOR) { 4378 supported++; 4379 p = xdr_reserve_space(xdr, 4); 4380 if (!p) 4381 return nfserr_resource; 4382 *p++ = cpu_to_be32(pf); 4383 } else { 4384 if (report) 4385 pr_warn("NFS: SECINFO: security flavor %u " 4386 "is not supported\n", pf); 4387 } 4388 } 4389 4390 if (nflavs != supported) 4391 report = false; 4392 *flavorsp = htonl(supported); 4393 return 0; 4394 } 4395 4396 static __be32 4397 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4398 union nfsd4_op_u *u) 4399 { 4400 struct nfsd4_secinfo *secinfo = &u->secinfo; 4401 struct xdr_stream *xdr = resp->xdr; 4402 4403 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp); 4404 } 4405 4406 static __be32 4407 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr, 4408 union nfsd4_op_u *u) 4409 { 4410 struct nfsd4_secinfo_no_name *secinfo = &u->secinfo_no_name; 4411 struct xdr_stream *xdr = resp->xdr; 4412 4413 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp); 4414 } 4415 4416 /* 4417 * The SETATTR encode routine is special -- it always encodes a bitmap, 4418 * regardless of the error status. 4419 */ 4420 static __be32 4421 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4422 union nfsd4_op_u *u) 4423 { 4424 struct nfsd4_setattr *setattr = &u->setattr; 4425 struct xdr_stream *xdr = resp->xdr; 4426 __be32 *p; 4427 4428 p = xdr_reserve_space(xdr, 16); 4429 if (!p) 4430 return nfserr_resource; 4431 if (nfserr) { 4432 *p++ = cpu_to_be32(3); 4433 *p++ = cpu_to_be32(0); 4434 *p++ = cpu_to_be32(0); 4435 *p++ = cpu_to_be32(0); 4436 } 4437 else { 4438 *p++ = cpu_to_be32(3); 4439 *p++ = cpu_to_be32(setattr->sa_bmval[0]); 4440 *p++ = cpu_to_be32(setattr->sa_bmval[1]); 4441 *p++ = cpu_to_be32(setattr->sa_bmval[2]); 4442 } 4443 return nfserr; 4444 } 4445 4446 static __be32 4447 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, 4448 union nfsd4_op_u *u) 4449 { 4450 struct nfsd4_setclientid *scd = &u->setclientid; 4451 struct xdr_stream *xdr = resp->xdr; 4452 __be32 *p; 4453 4454 if (!nfserr) { 4455 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE); 4456 if (!p) 4457 return nfserr_resource; 4458 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8); 4459 p = xdr_encode_opaque_fixed(p, &scd->se_confirm, 4460 NFS4_VERIFIER_SIZE); 4461 } 4462 else if (nfserr == nfserr_clid_inuse) { 4463 p = xdr_reserve_space(xdr, 8); 4464 if (!p) 4465 return nfserr_resource; 4466 *p++ = cpu_to_be32(0); 4467 *p++ = cpu_to_be32(0); 4468 } 4469 return nfserr; 4470 } 4471 4472 static __be32 4473 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, 4474 union nfsd4_op_u *u) 4475 { 4476 struct nfsd4_write *write = &u->write; 4477 struct xdr_stream *xdr = resp->xdr; 4478 __be32 *p; 4479 4480 p = xdr_reserve_space(xdr, 16); 4481 if (!p) 4482 return nfserr_resource; 4483 *p++ = cpu_to_be32(write->wr_bytes_written); 4484 *p++ = cpu_to_be32(write->wr_how_written); 4485 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4486 NFS4_VERIFIER_SIZE); 4487 return 0; 4488 } 4489 4490 static __be32 4491 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr, 4492 union nfsd4_op_u *u) 4493 { 4494 struct nfsd4_exchange_id *exid = &u->exchange_id; 4495 struct xdr_stream *xdr = resp->xdr; 4496 __be32 *p; 4497 char *major_id; 4498 char *server_scope; 4499 int major_id_sz; 4500 int server_scope_sz; 4501 uint64_t minor_id = 0; 4502 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id); 4503 4504 major_id = nn->nfsd_name; 4505 major_id_sz = strlen(nn->nfsd_name); 4506 server_scope = nn->nfsd_name; 4507 server_scope_sz = strlen(nn->nfsd_name); 4508 4509 p = xdr_reserve_space(xdr, 4510 8 /* eir_clientid */ + 4511 4 /* eir_sequenceid */ + 4512 4 /* eir_flags */ + 4513 4 /* spr_how */); 4514 if (!p) 4515 return nfserr_resource; 4516 4517 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8); 4518 *p++ = cpu_to_be32(exid->seqid); 4519 *p++ = cpu_to_be32(exid->flags); 4520 4521 *p++ = cpu_to_be32(exid->spa_how); 4522 4523 switch (exid->spa_how) { 4524 case SP4_NONE: 4525 break; 4526 case SP4_MACH_CRED: 4527 /* spo_must_enforce bitmap: */ 4528 nfserr = nfsd4_encode_bitmap(xdr, 4529 exid->spo_must_enforce[0], 4530 exid->spo_must_enforce[1], 4531 exid->spo_must_enforce[2]); 4532 if (nfserr) 4533 return nfserr; 4534 /* spo_must_allow bitmap: */ 4535 nfserr = nfsd4_encode_bitmap(xdr, 4536 exid->spo_must_allow[0], 4537 exid->spo_must_allow[1], 4538 exid->spo_must_allow[2]); 4539 if (nfserr) 4540 return nfserr; 4541 break; 4542 default: 4543 WARN_ON_ONCE(1); 4544 } 4545 4546 p = xdr_reserve_space(xdr, 4547 8 /* so_minor_id */ + 4548 4 /* so_major_id.len */ + 4549 (XDR_QUADLEN(major_id_sz) * 4) + 4550 4 /* eir_server_scope.len */ + 4551 (XDR_QUADLEN(server_scope_sz) * 4) + 4552 4 /* eir_server_impl_id.count (0) */); 4553 if (!p) 4554 return nfserr_resource; 4555 4556 /* The server_owner struct */ 4557 p = xdr_encode_hyper(p, minor_id); /* Minor id */ 4558 /* major id */ 4559 p = xdr_encode_opaque(p, major_id, major_id_sz); 4560 4561 /* Server scope */ 4562 p = xdr_encode_opaque(p, server_scope, server_scope_sz); 4563 4564 /* Implementation id */ 4565 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */ 4566 return 0; 4567 } 4568 4569 static __be32 4570 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr, 4571 union nfsd4_op_u *u) 4572 { 4573 struct nfsd4_create_session *sess = &u->create_session; 4574 struct xdr_stream *xdr = resp->xdr; 4575 __be32 *p; 4576 4577 p = xdr_reserve_space(xdr, 24); 4578 if (!p) 4579 return nfserr_resource; 4580 p = xdr_encode_opaque_fixed(p, sess->sessionid.data, 4581 NFS4_MAX_SESSIONID_LEN); 4582 *p++ = cpu_to_be32(sess->seqid); 4583 *p++ = cpu_to_be32(sess->flags); 4584 4585 p = xdr_reserve_space(xdr, 28); 4586 if (!p) 4587 return nfserr_resource; 4588 *p++ = cpu_to_be32(0); /* headerpadsz */ 4589 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz); 4590 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz); 4591 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached); 4592 *p++ = cpu_to_be32(sess->fore_channel.maxops); 4593 *p++ = cpu_to_be32(sess->fore_channel.maxreqs); 4594 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs); 4595 4596 if (sess->fore_channel.nr_rdma_attrs) { 4597 p = xdr_reserve_space(xdr, 4); 4598 if (!p) 4599 return nfserr_resource; 4600 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs); 4601 } 4602 4603 p = xdr_reserve_space(xdr, 28); 4604 if (!p) 4605 return nfserr_resource; 4606 *p++ = cpu_to_be32(0); /* headerpadsz */ 4607 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz); 4608 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz); 4609 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached); 4610 *p++ = cpu_to_be32(sess->back_channel.maxops); 4611 *p++ = cpu_to_be32(sess->back_channel.maxreqs); 4612 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs); 4613 4614 if (sess->back_channel.nr_rdma_attrs) { 4615 p = xdr_reserve_space(xdr, 4); 4616 if (!p) 4617 return nfserr_resource; 4618 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs); 4619 } 4620 return 0; 4621 } 4622 4623 static __be32 4624 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr, 4625 union nfsd4_op_u *u) 4626 { 4627 struct nfsd4_sequence *seq = &u->sequence; 4628 struct xdr_stream *xdr = resp->xdr; 4629 __be32 *p; 4630 4631 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20); 4632 if (!p) 4633 return nfserr_resource; 4634 p = xdr_encode_opaque_fixed(p, seq->sessionid.data, 4635 NFS4_MAX_SESSIONID_LEN); 4636 *p++ = cpu_to_be32(seq->seqid); 4637 *p++ = cpu_to_be32(seq->slotid); 4638 /* Note slotid's are numbered from zero: */ 4639 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */ 4640 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */ 4641 *p++ = cpu_to_be32(seq->status_flags); 4642 4643 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */ 4644 return 0; 4645 } 4646 4647 static __be32 4648 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr, 4649 union nfsd4_op_u *u) 4650 { 4651 struct nfsd4_test_stateid *test_stateid = &u->test_stateid; 4652 struct xdr_stream *xdr = resp->xdr; 4653 struct nfsd4_test_stateid_id *stateid, *next; 4654 __be32 *p; 4655 4656 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids)); 4657 if (!p) 4658 return nfserr_resource; 4659 *p++ = htonl(test_stateid->ts_num_ids); 4660 4661 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) { 4662 *p++ = stateid->ts_id_status; 4663 } 4664 4665 return 0; 4666 } 4667 4668 #ifdef CONFIG_NFSD_PNFS 4669 static __be32 4670 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4671 union nfsd4_op_u *u) 4672 { 4673 struct nfsd4_getdeviceinfo *gdev = &u->getdeviceinfo; 4674 struct xdr_stream *xdr = resp->xdr; 4675 const struct nfsd4_layout_ops *ops; 4676 u32 starting_len = xdr->buf->len, needed_len; 4677 __be32 *p; 4678 4679 p = xdr_reserve_space(xdr, 4); 4680 if (!p) 4681 return nfserr_resource; 4682 4683 *p++ = cpu_to_be32(gdev->gd_layout_type); 4684 4685 /* If maxcount is 0 then just update notifications */ 4686 if (gdev->gd_maxcount != 0) { 4687 ops = nfsd4_layout_ops[gdev->gd_layout_type]; 4688 nfserr = ops->encode_getdeviceinfo(xdr, gdev); 4689 if (nfserr) { 4690 /* 4691 * We don't bother to burden the layout drivers with 4692 * enforcing gd_maxcount, just tell the client to 4693 * come back with a bigger buffer if it's not enough. 4694 */ 4695 if (xdr->buf->len + 4 > gdev->gd_maxcount) 4696 goto toosmall; 4697 return nfserr; 4698 } 4699 } 4700 4701 if (gdev->gd_notify_types) { 4702 p = xdr_reserve_space(xdr, 4 + 4); 4703 if (!p) 4704 return nfserr_resource; 4705 *p++ = cpu_to_be32(1); /* bitmap length */ 4706 *p++ = cpu_to_be32(gdev->gd_notify_types); 4707 } else { 4708 p = xdr_reserve_space(xdr, 4); 4709 if (!p) 4710 return nfserr_resource; 4711 *p++ = 0; 4712 } 4713 4714 return 0; 4715 toosmall: 4716 dprintk("%s: maxcount too small\n", __func__); 4717 needed_len = xdr->buf->len + 4 /* notifications */; 4718 xdr_truncate_encode(xdr, starting_len); 4719 p = xdr_reserve_space(xdr, 4); 4720 if (!p) 4721 return nfserr_resource; 4722 *p++ = cpu_to_be32(needed_len); 4723 return nfserr_toosmall; 4724 } 4725 4726 static __be32 4727 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr, 4728 union nfsd4_op_u *u) 4729 { 4730 struct nfsd4_layoutget *lgp = &u->layoutget; 4731 struct xdr_stream *xdr = resp->xdr; 4732 const struct nfsd4_layout_ops *ops; 4733 __be32 *p; 4734 4735 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t)); 4736 if (!p) 4737 return nfserr_resource; 4738 4739 *p++ = cpu_to_be32(1); /* we always set return-on-close */ 4740 *p++ = cpu_to_be32(lgp->lg_sid.si_generation); 4741 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque, 4742 sizeof(stateid_opaque_t)); 4743 4744 *p++ = cpu_to_be32(1); /* we always return a single layout */ 4745 p = xdr_encode_hyper(p, lgp->lg_seg.offset); 4746 p = xdr_encode_hyper(p, lgp->lg_seg.length); 4747 *p++ = cpu_to_be32(lgp->lg_seg.iomode); 4748 *p++ = cpu_to_be32(lgp->lg_layout_type); 4749 4750 ops = nfsd4_layout_ops[lgp->lg_layout_type]; 4751 return ops->encode_layoutget(xdr, lgp); 4752 } 4753 4754 static __be32 4755 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr, 4756 union nfsd4_op_u *u) 4757 { 4758 struct nfsd4_layoutcommit *lcp = &u->layoutcommit; 4759 struct xdr_stream *xdr = resp->xdr; 4760 __be32 *p; 4761 4762 p = xdr_reserve_space(xdr, 4); 4763 if (!p) 4764 return nfserr_resource; 4765 *p++ = cpu_to_be32(lcp->lc_size_chg); 4766 if (lcp->lc_size_chg) { 4767 p = xdr_reserve_space(xdr, 8); 4768 if (!p) 4769 return nfserr_resource; 4770 p = xdr_encode_hyper(p, lcp->lc_newsize); 4771 } 4772 4773 return 0; 4774 } 4775 4776 static __be32 4777 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr, 4778 union nfsd4_op_u *u) 4779 { 4780 struct nfsd4_layoutreturn *lrp = &u->layoutreturn; 4781 struct xdr_stream *xdr = resp->xdr; 4782 __be32 *p; 4783 4784 p = xdr_reserve_space(xdr, 4); 4785 if (!p) 4786 return nfserr_resource; 4787 *p++ = cpu_to_be32(lrp->lrs_present); 4788 if (lrp->lrs_present) 4789 return nfsd4_encode_stateid(xdr, &lrp->lr_sid); 4790 return 0; 4791 } 4792 #endif /* CONFIG_NFSD_PNFS */ 4793 4794 static __be32 4795 nfsd42_encode_write_res(struct nfsd4_compoundres *resp, 4796 struct nfsd42_write_res *write, bool sync) 4797 { 4798 __be32 *p; 4799 p = xdr_reserve_space(resp->xdr, 4); 4800 if (!p) 4801 return nfserr_resource; 4802 4803 if (sync) 4804 *p++ = cpu_to_be32(0); 4805 else { 4806 __be32 nfserr; 4807 *p++ = cpu_to_be32(1); 4808 nfserr = nfsd4_encode_stateid(resp->xdr, &write->cb_stateid); 4809 if (nfserr) 4810 return nfserr; 4811 } 4812 p = xdr_reserve_space(resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE); 4813 if (!p) 4814 return nfserr_resource; 4815 4816 p = xdr_encode_hyper(p, write->wr_bytes_written); 4817 *p++ = cpu_to_be32(write->wr_stable_how); 4818 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4819 NFS4_VERIFIER_SIZE); 4820 return nfs_ok; 4821 } 4822 4823 static __be32 4824 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns) 4825 { 4826 struct xdr_stream *xdr = resp->xdr; 4827 struct nfs42_netaddr *addr; 4828 __be32 *p; 4829 4830 p = xdr_reserve_space(xdr, 4); 4831 *p++ = cpu_to_be32(ns->nl4_type); 4832 4833 switch (ns->nl4_type) { 4834 case NL4_NETADDR: 4835 addr = &ns->u.nl4_addr; 4836 4837 /* netid_len, netid, uaddr_len, uaddr (port included 4838 * in RPCBIND_MAXUADDRLEN) 4839 */ 4840 p = xdr_reserve_space(xdr, 4841 4 /* netid len */ + 4842 (XDR_QUADLEN(addr->netid_len) * 4) + 4843 4 /* uaddr len */ + 4844 (XDR_QUADLEN(addr->addr_len) * 4)); 4845 if (!p) 4846 return nfserr_resource; 4847 4848 *p++ = cpu_to_be32(addr->netid_len); 4849 p = xdr_encode_opaque_fixed(p, addr->netid, 4850 addr->netid_len); 4851 *p++ = cpu_to_be32(addr->addr_len); 4852 p = xdr_encode_opaque_fixed(p, addr->addr, 4853 addr->addr_len); 4854 break; 4855 default: 4856 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR); 4857 return nfserr_inval; 4858 } 4859 4860 return 0; 4861 } 4862 4863 static __be32 4864 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr, 4865 union nfsd4_op_u *u) 4866 { 4867 struct nfsd4_copy *copy = &u->copy; 4868 __be32 *p; 4869 4870 nfserr = nfsd42_encode_write_res(resp, ©->cp_res, 4871 nfsd4_copy_is_sync(copy)); 4872 if (nfserr) 4873 return nfserr; 4874 4875 p = xdr_reserve_space(resp->xdr, 4 + 4); 4876 *p++ = xdr_one; /* cr_consecutive */ 4877 *p = nfsd4_copy_is_sync(copy) ? xdr_one : xdr_zero; 4878 return 0; 4879 } 4880 4881 static __be32 4882 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr, 4883 union nfsd4_op_u *u) 4884 { 4885 struct nfsd4_offload_status *os = &u->offload_status; 4886 struct xdr_stream *xdr = resp->xdr; 4887 __be32 *p; 4888 4889 p = xdr_reserve_space(xdr, 8 + 4); 4890 if (!p) 4891 return nfserr_resource; 4892 p = xdr_encode_hyper(p, os->count); 4893 *p++ = cpu_to_be32(0); 4894 return nfserr; 4895 } 4896 4897 static __be32 4898 nfsd4_encode_read_plus_data(struct nfsd4_compoundres *resp, 4899 struct nfsd4_read *read) 4900 { 4901 bool splice_ok = test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags); 4902 struct file *file = read->rd_nf->nf_file; 4903 struct xdr_stream *xdr = resp->xdr; 4904 unsigned long maxcount; 4905 __be32 nfserr, *p; 4906 4907 /* Content type, offset, byte count */ 4908 p = xdr_reserve_space(xdr, 4 + 8 + 4); 4909 if (!p) 4910 return nfserr_io; 4911 if (resp->xdr->buf->page_len && splice_ok) { 4912 WARN_ON_ONCE(splice_ok); 4913 return nfserr_serverfault; 4914 } 4915 4916 maxcount = min_t(unsigned long, read->rd_length, 4917 (xdr->buf->buflen - xdr->buf->len)); 4918 4919 if (file->f_op->splice_read && splice_ok) 4920 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount); 4921 else 4922 nfserr = nfsd4_encode_readv(resp, read, file, maxcount); 4923 if (nfserr) 4924 return nfserr; 4925 4926 *p++ = cpu_to_be32(NFS4_CONTENT_DATA); 4927 p = xdr_encode_hyper(p, read->rd_offset); 4928 *p = cpu_to_be32(read->rd_length); 4929 4930 return nfs_ok; 4931 } 4932 4933 static __be32 4934 nfsd4_encode_read_plus(struct nfsd4_compoundres *resp, __be32 nfserr, 4935 union nfsd4_op_u *u) 4936 { 4937 struct nfsd4_read *read = &u->read; 4938 struct file *file = read->rd_nf->nf_file; 4939 struct xdr_stream *xdr = resp->xdr; 4940 int starting_len = xdr->buf->len; 4941 u32 segments = 0; 4942 __be32 *p; 4943 4944 if (nfserr) 4945 return nfserr; 4946 4947 /* eof flag, segment count */ 4948 p = xdr_reserve_space(xdr, 4 + 4); 4949 if (!p) 4950 return nfserr_io; 4951 xdr_commit_encode(xdr); 4952 4953 read->rd_eof = read->rd_offset >= i_size_read(file_inode(file)); 4954 if (read->rd_eof) 4955 goto out; 4956 4957 nfserr = nfsd4_encode_read_plus_data(resp, read); 4958 if (nfserr) { 4959 xdr_truncate_encode(xdr, starting_len); 4960 return nfserr; 4961 } 4962 4963 segments++; 4964 4965 out: 4966 p = xdr_encode_bool(p, read->rd_eof); 4967 *p = cpu_to_be32(segments); 4968 return nfserr; 4969 } 4970 4971 static __be32 4972 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr, 4973 union nfsd4_op_u *u) 4974 { 4975 struct nfsd4_copy_notify *cn = &u->copy_notify; 4976 struct xdr_stream *xdr = resp->xdr; 4977 __be32 *p; 4978 4979 if (nfserr) 4980 return nfserr; 4981 4982 /* 8 sec, 4 nsec */ 4983 p = xdr_reserve_space(xdr, 12); 4984 if (!p) 4985 return nfserr_resource; 4986 4987 /* cnr_lease_time */ 4988 p = xdr_encode_hyper(p, cn->cpn_sec); 4989 *p++ = cpu_to_be32(cn->cpn_nsec); 4990 4991 /* cnr_stateid */ 4992 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid); 4993 if (nfserr) 4994 return nfserr; 4995 4996 /* cnr_src.nl_nsvr */ 4997 p = xdr_reserve_space(xdr, 4); 4998 if (!p) 4999 return nfserr_resource; 5000 5001 *p++ = cpu_to_be32(1); 5002 5003 nfserr = nfsd42_encode_nl4_server(resp, cn->cpn_src); 5004 return nfserr; 5005 } 5006 5007 static __be32 5008 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr, 5009 union nfsd4_op_u *u) 5010 { 5011 struct nfsd4_seek *seek = &u->seek; 5012 __be32 *p; 5013 5014 p = xdr_reserve_space(resp->xdr, 4 + 8); 5015 *p++ = cpu_to_be32(seek->seek_eof); 5016 p = xdr_encode_hyper(p, seek->seek_pos); 5017 5018 return 0; 5019 } 5020 5021 static __be32 5022 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, 5023 union nfsd4_op_u *p) 5024 { 5025 return nfserr; 5026 } 5027 5028 /* 5029 * Encode kmalloc-ed buffer in to XDR stream. 5030 */ 5031 static __be32 5032 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen) 5033 { 5034 u32 cplen; 5035 __be32 *p; 5036 5037 cplen = min_t(unsigned long, buflen, 5038 ((void *)xdr->end - (void *)xdr->p)); 5039 p = xdr_reserve_space(xdr, cplen); 5040 if (!p) 5041 return nfserr_resource; 5042 5043 memcpy(p, buf, cplen); 5044 buf += cplen; 5045 buflen -= cplen; 5046 5047 while (buflen) { 5048 cplen = min_t(u32, buflen, PAGE_SIZE); 5049 p = xdr_reserve_space(xdr, cplen); 5050 if (!p) 5051 return nfserr_resource; 5052 5053 memcpy(p, buf, cplen); 5054 5055 if (cplen < PAGE_SIZE) { 5056 /* 5057 * We're done, with a length that wasn't page 5058 * aligned, so possibly not word aligned. Pad 5059 * any trailing bytes with 0. 5060 */ 5061 xdr_encode_opaque_fixed(p, NULL, cplen); 5062 break; 5063 } 5064 5065 buflen -= PAGE_SIZE; 5066 buf += PAGE_SIZE; 5067 } 5068 5069 return 0; 5070 } 5071 5072 static __be32 5073 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 5074 union nfsd4_op_u *u) 5075 { 5076 struct nfsd4_getxattr *getxattr = &u->getxattr; 5077 struct xdr_stream *xdr = resp->xdr; 5078 __be32 *p, err; 5079 5080 p = xdr_reserve_space(xdr, 4); 5081 if (!p) 5082 return nfserr_resource; 5083 5084 *p = cpu_to_be32(getxattr->getxa_len); 5085 5086 if (getxattr->getxa_len == 0) 5087 return 0; 5088 5089 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf, 5090 getxattr->getxa_len); 5091 5092 kvfree(getxattr->getxa_buf); 5093 5094 return err; 5095 } 5096 5097 static __be32 5098 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 5099 union nfsd4_op_u *u) 5100 { 5101 struct nfsd4_setxattr *setxattr = &u->setxattr; 5102 struct xdr_stream *xdr = resp->xdr; 5103 __be32 *p; 5104 5105 p = xdr_reserve_space(xdr, 20); 5106 if (!p) 5107 return nfserr_resource; 5108 5109 encode_cinfo(p, &setxattr->setxa_cinfo); 5110 5111 return 0; 5112 } 5113 5114 /* 5115 * See if there are cookie values that can be rejected outright. 5116 */ 5117 static __be32 5118 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs, 5119 u32 *offsetp) 5120 { 5121 u64 cookie = listxattrs->lsxa_cookie; 5122 5123 /* 5124 * If the cookie is larger than the maximum number we can fit 5125 * in either the buffer we just got back from vfs_listxattr, or, 5126 * XDR-encoded, in the return buffer, it's invalid. 5127 */ 5128 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2)) 5129 return nfserr_badcookie; 5130 5131 if (cookie > (listxattrs->lsxa_maxcount / 5132 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4))) 5133 return nfserr_badcookie; 5134 5135 *offsetp = (u32)cookie; 5136 return 0; 5137 } 5138 5139 static __be32 5140 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr, 5141 union nfsd4_op_u *u) 5142 { 5143 struct nfsd4_listxattrs *listxattrs = &u->listxattrs; 5144 struct xdr_stream *xdr = resp->xdr; 5145 u32 cookie_offset, count_offset, eof; 5146 u32 left, xdrleft, slen, count; 5147 u32 xdrlen, offset; 5148 u64 cookie; 5149 char *sp; 5150 __be32 status, tmp; 5151 __be32 *p; 5152 u32 nuser; 5153 5154 eof = 1; 5155 5156 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset); 5157 if (status) 5158 goto out; 5159 5160 /* 5161 * Reserve space for the cookie and the name array count. Record 5162 * the offsets to save them later. 5163 */ 5164 cookie_offset = xdr->buf->len; 5165 count_offset = cookie_offset + 8; 5166 p = xdr_reserve_space(xdr, 12); 5167 if (!p) { 5168 status = nfserr_resource; 5169 goto out; 5170 } 5171 5172 count = 0; 5173 left = listxattrs->lsxa_len; 5174 sp = listxattrs->lsxa_buf; 5175 nuser = 0; 5176 5177 xdrleft = listxattrs->lsxa_maxcount; 5178 5179 while (left > 0 && xdrleft > 0) { 5180 slen = strlen(sp); 5181 5182 /* 5183 * Check if this is a "user." attribute, skip it if not. 5184 */ 5185 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 5186 goto contloop; 5187 5188 slen -= XATTR_USER_PREFIX_LEN; 5189 xdrlen = 4 + ((slen + 3) & ~3); 5190 if (xdrlen > xdrleft) { 5191 if (count == 0) { 5192 /* 5193 * Can't even fit the first attribute name. 5194 */ 5195 status = nfserr_toosmall; 5196 goto out; 5197 } 5198 eof = 0; 5199 goto wreof; 5200 } 5201 5202 left -= XATTR_USER_PREFIX_LEN; 5203 sp += XATTR_USER_PREFIX_LEN; 5204 if (nuser++ < offset) 5205 goto contloop; 5206 5207 5208 p = xdr_reserve_space(xdr, xdrlen); 5209 if (!p) { 5210 status = nfserr_resource; 5211 goto out; 5212 } 5213 5214 xdr_encode_opaque(p, sp, slen); 5215 5216 xdrleft -= xdrlen; 5217 count++; 5218 contloop: 5219 sp += slen + 1; 5220 left -= slen + 1; 5221 } 5222 5223 /* 5224 * If there were user attributes to copy, but we didn't copy 5225 * any, the offset was too large (e.g. the cookie was invalid). 5226 */ 5227 if (nuser > 0 && count == 0) { 5228 status = nfserr_badcookie; 5229 goto out; 5230 } 5231 5232 wreof: 5233 p = xdr_reserve_space(xdr, 4); 5234 if (!p) { 5235 status = nfserr_resource; 5236 goto out; 5237 } 5238 *p = cpu_to_be32(eof); 5239 5240 cookie = offset + count; 5241 5242 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8); 5243 tmp = cpu_to_be32(count); 5244 write_bytes_to_xdr_buf(xdr->buf, count_offset, &tmp, 4); 5245 out: 5246 if (listxattrs->lsxa_len) 5247 kvfree(listxattrs->lsxa_buf); 5248 return status; 5249 } 5250 5251 static __be32 5252 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr, 5253 union nfsd4_op_u *u) 5254 { 5255 struct nfsd4_removexattr *removexattr = &u->removexattr; 5256 struct xdr_stream *xdr = resp->xdr; 5257 __be32 *p; 5258 5259 p = xdr_reserve_space(xdr, 20); 5260 if (!p) 5261 return nfserr_resource; 5262 5263 p = encode_cinfo(p, &removexattr->rmxa_cinfo); 5264 return 0; 5265 } 5266 5267 typedef __be32(*nfsd4_enc)(struct nfsd4_compoundres *, __be32, union nfsd4_op_u *u); 5268 5269 /* 5270 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1 5271 * since we don't need to filter out obsolete ops as this is 5272 * done in the decoding phase. 5273 */ 5274 static const nfsd4_enc nfsd4_enc_ops[] = { 5275 [OP_ACCESS] = nfsd4_encode_access, 5276 [OP_CLOSE] = nfsd4_encode_close, 5277 [OP_COMMIT] = nfsd4_encode_commit, 5278 [OP_CREATE] = nfsd4_encode_create, 5279 [OP_DELEGPURGE] = nfsd4_encode_noop, 5280 [OP_DELEGRETURN] = nfsd4_encode_noop, 5281 [OP_GETATTR] = nfsd4_encode_getattr, 5282 [OP_GETFH] = nfsd4_encode_getfh, 5283 [OP_LINK] = nfsd4_encode_link, 5284 [OP_LOCK] = nfsd4_encode_lock, 5285 [OP_LOCKT] = nfsd4_encode_lockt, 5286 [OP_LOCKU] = nfsd4_encode_locku, 5287 [OP_LOOKUP] = nfsd4_encode_noop, 5288 [OP_LOOKUPP] = nfsd4_encode_noop, 5289 [OP_NVERIFY] = nfsd4_encode_noop, 5290 [OP_OPEN] = nfsd4_encode_open, 5291 [OP_OPENATTR] = nfsd4_encode_noop, 5292 [OP_OPEN_CONFIRM] = nfsd4_encode_open_confirm, 5293 [OP_OPEN_DOWNGRADE] = nfsd4_encode_open_downgrade, 5294 [OP_PUTFH] = nfsd4_encode_noop, 5295 [OP_PUTPUBFH] = nfsd4_encode_noop, 5296 [OP_PUTROOTFH] = nfsd4_encode_noop, 5297 [OP_READ] = nfsd4_encode_read, 5298 [OP_READDIR] = nfsd4_encode_readdir, 5299 [OP_READLINK] = nfsd4_encode_readlink, 5300 [OP_REMOVE] = nfsd4_encode_remove, 5301 [OP_RENAME] = nfsd4_encode_rename, 5302 [OP_RENEW] = nfsd4_encode_noop, 5303 [OP_RESTOREFH] = nfsd4_encode_noop, 5304 [OP_SAVEFH] = nfsd4_encode_noop, 5305 [OP_SECINFO] = nfsd4_encode_secinfo, 5306 [OP_SETATTR] = nfsd4_encode_setattr, 5307 [OP_SETCLIENTID] = nfsd4_encode_setclientid, 5308 [OP_SETCLIENTID_CONFIRM] = nfsd4_encode_noop, 5309 [OP_VERIFY] = nfsd4_encode_noop, 5310 [OP_WRITE] = nfsd4_encode_write, 5311 [OP_RELEASE_LOCKOWNER] = nfsd4_encode_noop, 5312 5313 /* NFSv4.1 operations */ 5314 [OP_BACKCHANNEL_CTL] = nfsd4_encode_noop, 5315 [OP_BIND_CONN_TO_SESSION] = nfsd4_encode_bind_conn_to_session, 5316 [OP_EXCHANGE_ID] = nfsd4_encode_exchange_id, 5317 [OP_CREATE_SESSION] = nfsd4_encode_create_session, 5318 [OP_DESTROY_SESSION] = nfsd4_encode_noop, 5319 [OP_FREE_STATEID] = nfsd4_encode_noop, 5320 [OP_GET_DIR_DELEGATION] = nfsd4_encode_noop, 5321 #ifdef CONFIG_NFSD_PNFS 5322 [OP_GETDEVICEINFO] = nfsd4_encode_getdeviceinfo, 5323 [OP_GETDEVICELIST] = nfsd4_encode_noop, 5324 [OP_LAYOUTCOMMIT] = nfsd4_encode_layoutcommit, 5325 [OP_LAYOUTGET] = nfsd4_encode_layoutget, 5326 [OP_LAYOUTRETURN] = nfsd4_encode_layoutreturn, 5327 #else 5328 [OP_GETDEVICEINFO] = nfsd4_encode_noop, 5329 [OP_GETDEVICELIST] = nfsd4_encode_noop, 5330 [OP_LAYOUTCOMMIT] = nfsd4_encode_noop, 5331 [OP_LAYOUTGET] = nfsd4_encode_noop, 5332 [OP_LAYOUTRETURN] = nfsd4_encode_noop, 5333 #endif 5334 [OP_SECINFO_NO_NAME] = nfsd4_encode_secinfo_no_name, 5335 [OP_SEQUENCE] = nfsd4_encode_sequence, 5336 [OP_SET_SSV] = nfsd4_encode_noop, 5337 [OP_TEST_STATEID] = nfsd4_encode_test_stateid, 5338 [OP_WANT_DELEGATION] = nfsd4_encode_noop, 5339 [OP_DESTROY_CLIENTID] = nfsd4_encode_noop, 5340 [OP_RECLAIM_COMPLETE] = nfsd4_encode_noop, 5341 5342 /* NFSv4.2 operations */ 5343 [OP_ALLOCATE] = nfsd4_encode_noop, 5344 [OP_COPY] = nfsd4_encode_copy, 5345 [OP_COPY_NOTIFY] = nfsd4_encode_copy_notify, 5346 [OP_DEALLOCATE] = nfsd4_encode_noop, 5347 [OP_IO_ADVISE] = nfsd4_encode_noop, 5348 [OP_LAYOUTERROR] = nfsd4_encode_noop, 5349 [OP_LAYOUTSTATS] = nfsd4_encode_noop, 5350 [OP_OFFLOAD_CANCEL] = nfsd4_encode_noop, 5351 [OP_OFFLOAD_STATUS] = nfsd4_encode_offload_status, 5352 [OP_READ_PLUS] = nfsd4_encode_read_plus, 5353 [OP_SEEK] = nfsd4_encode_seek, 5354 [OP_WRITE_SAME] = nfsd4_encode_noop, 5355 [OP_CLONE] = nfsd4_encode_noop, 5356 5357 /* RFC 8276 extended atributes operations */ 5358 [OP_GETXATTR] = nfsd4_encode_getxattr, 5359 [OP_SETXATTR] = nfsd4_encode_setxattr, 5360 [OP_LISTXATTRS] = nfsd4_encode_listxattrs, 5361 [OP_REMOVEXATTR] = nfsd4_encode_removexattr, 5362 }; 5363 5364 /* 5365 * Calculate whether we still have space to encode repsize bytes. 5366 * There are two considerations: 5367 * - For NFS versions >=4.1, the size of the reply must stay within 5368 * session limits 5369 * - For all NFS versions, we must stay within limited preallocated 5370 * buffer space. 5371 * 5372 * This is called before the operation is processed, so can only provide 5373 * an upper estimate. For some nonidempotent operations (such as 5374 * getattr), it's not necessarily a problem if that estimate is wrong, 5375 * as we can fail it after processing without significant side effects. 5376 */ 5377 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize) 5378 { 5379 struct xdr_buf *buf = &resp->rqstp->rq_res; 5380 struct nfsd4_slot *slot = resp->cstate.slot; 5381 5382 if (buf->len + respsize <= buf->buflen) 5383 return nfs_ok; 5384 if (!nfsd4_has_session(&resp->cstate)) 5385 return nfserr_resource; 5386 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) { 5387 WARN_ON_ONCE(1); 5388 return nfserr_rep_too_big_to_cache; 5389 } 5390 return nfserr_rep_too_big; 5391 } 5392 5393 void 5394 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op) 5395 { 5396 struct xdr_stream *xdr = resp->xdr; 5397 struct nfs4_stateowner *so = resp->cstate.replay_owner; 5398 struct svc_rqst *rqstp = resp->rqstp; 5399 const struct nfsd4_operation *opdesc = op->opdesc; 5400 int post_err_offset; 5401 nfsd4_enc encoder; 5402 __be32 *p; 5403 5404 p = xdr_reserve_space(xdr, 8); 5405 if (!p) 5406 goto release; 5407 *p++ = cpu_to_be32(op->opnum); 5408 post_err_offset = xdr->buf->len; 5409 5410 if (op->opnum == OP_ILLEGAL) 5411 goto status; 5412 if (op->status && opdesc && 5413 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE)) 5414 goto status; 5415 BUG_ON(op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) || 5416 !nfsd4_enc_ops[op->opnum]); 5417 encoder = nfsd4_enc_ops[op->opnum]; 5418 op->status = encoder(resp, op->status, &op->u); 5419 if (op->status) 5420 trace_nfsd_compound_encode_err(rqstp, op->opnum, op->status); 5421 xdr_commit_encode(xdr); 5422 5423 /* nfsd4_check_resp_size guarantees enough room for error status */ 5424 if (!op->status) { 5425 int space_needed = 0; 5426 if (!nfsd4_last_compound_op(rqstp)) 5427 space_needed = COMPOUND_ERR_SLACK_SPACE; 5428 op->status = nfsd4_check_resp_size(resp, space_needed); 5429 } 5430 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) { 5431 struct nfsd4_slot *slot = resp->cstate.slot; 5432 5433 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) 5434 op->status = nfserr_rep_too_big_to_cache; 5435 else 5436 op->status = nfserr_rep_too_big; 5437 } 5438 if (op->status == nfserr_resource || 5439 op->status == nfserr_rep_too_big || 5440 op->status == nfserr_rep_too_big_to_cache) { 5441 /* 5442 * The operation may have already been encoded or 5443 * partially encoded. No op returns anything additional 5444 * in the case of one of these three errors, so we can 5445 * just truncate back to after the status. But it's a 5446 * bug if we had to do this on a non-idempotent op: 5447 */ 5448 warn_on_nonidempotent_op(op); 5449 xdr_truncate_encode(xdr, post_err_offset); 5450 } 5451 if (so) { 5452 int len = xdr->buf->len - post_err_offset; 5453 5454 so->so_replay.rp_status = op->status; 5455 so->so_replay.rp_buflen = len; 5456 read_bytes_from_xdr_buf(xdr->buf, post_err_offset, 5457 so->so_replay.rp_buf, len); 5458 } 5459 status: 5460 *p = op->status; 5461 release: 5462 if (opdesc && opdesc->op_release) 5463 opdesc->op_release(&op->u); 5464 } 5465 5466 /* 5467 * Encode the reply stored in the stateowner reply cache 5468 * 5469 * XDR note: do not encode rp->rp_buflen: the buffer contains the 5470 * previously sent already encoded operation. 5471 */ 5472 void 5473 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op) 5474 { 5475 __be32 *p; 5476 struct nfs4_replay *rp = op->replay; 5477 5478 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen); 5479 if (!p) { 5480 WARN_ON_ONCE(1); 5481 return; 5482 } 5483 *p++ = cpu_to_be32(op->opnum); 5484 *p++ = rp->rp_status; /* already xdr'ed */ 5485 5486 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen); 5487 } 5488 5489 void nfsd4_release_compoundargs(struct svc_rqst *rqstp) 5490 { 5491 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5492 5493 if (args->ops != args->iops) { 5494 vfree(args->ops); 5495 args->ops = args->iops; 5496 } 5497 while (args->to_free) { 5498 struct svcxdr_tmpbuf *tb = args->to_free; 5499 args->to_free = tb->next; 5500 kfree(tb); 5501 } 5502 } 5503 5504 bool 5505 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, struct xdr_stream *xdr) 5506 { 5507 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5508 5509 /* svcxdr_tmp_alloc */ 5510 args->to_free = NULL; 5511 5512 args->xdr = xdr; 5513 args->ops = args->iops; 5514 args->rqstp = rqstp; 5515 5516 return nfsd4_decode_compound(args); 5517 } 5518 5519 bool 5520 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, struct xdr_stream *xdr) 5521 { 5522 struct nfsd4_compoundres *resp = rqstp->rq_resp; 5523 __be32 *p; 5524 5525 /* 5526 * Send buffer space for the following items is reserved 5527 * at the top of nfsd4_proc_compound(). 5528 */ 5529 p = resp->statusp; 5530 5531 *p++ = resp->cstate.status; 5532 5533 rqstp->rq_next_page = xdr->page_ptr + 1; 5534 5535 *p++ = htonl(resp->taglen); 5536 memcpy(p, resp->tag, resp->taglen); 5537 p += XDR_QUADLEN(resp->taglen); 5538 *p++ = htonl(resp->opcnt); 5539 5540 nfsd4_sequence_done(resp); 5541 return true; 5542 } 5543