1 /* 2 * Server-side XDR for NFSv4 3 * 4 * Copyright (c) 2002 The Regents of the University of Michigan. 5 * All rights reserved. 6 * 7 * Kendrick Smith <kmsmith@umich.edu> 8 * Andy Adamson <andros@umich.edu> 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. Neither the name of the University nor the names of its 20 * contributors may be used to endorse or promote products derived 21 * from this software without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 24 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 25 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 26 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 28 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 29 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR 30 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 31 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 32 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 33 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 34 */ 35 36 #include <linux/file.h> 37 #include <linux/slab.h> 38 #include <linux/namei.h> 39 #include <linux/statfs.h> 40 #include <linux/utsname.h> 41 #include <linux/pagemap.h> 42 #include <linux/sunrpc/svcauth_gss.h> 43 #include <linux/sunrpc/addr.h> 44 #include <linux/xattr.h> 45 #include <uapi/linux/xattr.h> 46 47 #include "idmap.h" 48 #include "acl.h" 49 #include "xdr4.h" 50 #include "vfs.h" 51 #include "state.h" 52 #include "cache.h" 53 #include "netns.h" 54 #include "pnfs.h" 55 #include "filecache.h" 56 57 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 58 #include <linux/security.h> 59 #endif 60 61 62 #define NFSDDBG_FACILITY NFSDDBG_XDR 63 64 const u32 nfsd_suppattrs[3][3] = { 65 {NFSD4_SUPPORTED_ATTRS_WORD0, 66 NFSD4_SUPPORTED_ATTRS_WORD1, 67 NFSD4_SUPPORTED_ATTRS_WORD2}, 68 69 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 70 NFSD4_1_SUPPORTED_ATTRS_WORD1, 71 NFSD4_1_SUPPORTED_ATTRS_WORD2}, 72 73 {NFSD4_1_SUPPORTED_ATTRS_WORD0, 74 NFSD4_1_SUPPORTED_ATTRS_WORD1, 75 NFSD4_2_SUPPORTED_ATTRS_WORD2}, 76 }; 77 78 /* 79 * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing 80 * directory in order to indicate to the client that a filesystem boundary is present 81 * We use a fixed fsid for a referral 82 */ 83 #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL 84 #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL 85 86 static __be32 87 check_filename(char *str, int len) 88 { 89 int i; 90 91 if (len == 0) 92 return nfserr_inval; 93 if (isdotent(str, len)) 94 return nfserr_badname; 95 for (i = 0; i < len; i++) 96 if (str[i] == '/') 97 return nfserr_badname; 98 return 0; 99 } 100 101 #define DECODE_HEAD \ 102 __be32 *p; \ 103 __be32 status 104 #define DECODE_TAIL \ 105 status = 0; \ 106 out: \ 107 return status; \ 108 xdr_error: \ 109 dprintk("NFSD: xdr error (%s:%d)\n", \ 110 __FILE__, __LINE__); \ 111 status = nfserr_bad_xdr; \ 112 goto out 113 114 #define READMEM(x,nbytes) do { \ 115 x = (char *)p; \ 116 p += XDR_QUADLEN(nbytes); \ 117 } while (0) 118 #define SAVEMEM(x,nbytes) do { \ 119 if (!(x = (p==argp->tmp || p == argp->tmpp) ? \ 120 savemem(argp, p, nbytes) : \ 121 (char *)p)) { \ 122 dprintk("NFSD: xdr error (%s:%d)\n", \ 123 __FILE__, __LINE__); \ 124 goto xdr_error; \ 125 } \ 126 p += XDR_QUADLEN(nbytes); \ 127 } while (0) 128 #define COPYMEM(x,nbytes) do { \ 129 memcpy((x), p, nbytes); \ 130 p += XDR_QUADLEN(nbytes); \ 131 } while (0) 132 133 /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */ 134 #define READ_BUF(nbytes) do { \ 135 if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \ 136 p = argp->p; \ 137 argp->p += XDR_QUADLEN(nbytes); \ 138 } else if (!(p = read_buf(argp, nbytes))) { \ 139 dprintk("NFSD: xdr error (%s:%d)\n", \ 140 __FILE__, __LINE__); \ 141 goto xdr_error; \ 142 } \ 143 } while (0) 144 145 static void next_decode_page(struct nfsd4_compoundargs *argp) 146 { 147 argp->p = page_address(argp->pagelist[0]); 148 argp->pagelist++; 149 if (argp->pagelen < PAGE_SIZE) { 150 argp->end = argp->p + XDR_QUADLEN(argp->pagelen); 151 argp->pagelen = 0; 152 } else { 153 argp->end = argp->p + (PAGE_SIZE>>2); 154 argp->pagelen -= PAGE_SIZE; 155 } 156 } 157 158 static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes) 159 { 160 /* We want more bytes than seem to be available. 161 * Maybe we need a new page, maybe we have just run out 162 */ 163 unsigned int avail = (char *)argp->end - (char *)argp->p; 164 __be32 *p; 165 166 if (argp->pagelen == 0) { 167 struct kvec *vec = &argp->rqstp->rq_arg.tail[0]; 168 169 if (!argp->tail) { 170 argp->tail = true; 171 avail = vec->iov_len; 172 argp->p = vec->iov_base; 173 argp->end = vec->iov_base + avail; 174 } 175 176 if (avail < nbytes) 177 return NULL; 178 179 p = argp->p; 180 argp->p += XDR_QUADLEN(nbytes); 181 return p; 182 } 183 184 if (avail + argp->pagelen < nbytes) 185 return NULL; 186 if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */ 187 return NULL; 188 /* ok, we can do it with the current plus the next page */ 189 if (nbytes <= sizeof(argp->tmp)) 190 p = argp->tmp; 191 else { 192 kfree(argp->tmpp); 193 p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL); 194 if (!p) 195 return NULL; 196 197 } 198 /* 199 * The following memcpy is safe because read_buf is always 200 * called with nbytes > avail, and the two cases above both 201 * guarantee p points to at least nbytes bytes. 202 */ 203 memcpy(p, argp->p, avail); 204 next_decode_page(argp); 205 memcpy(((char*)p)+avail, argp->p, (nbytes - avail)); 206 argp->p += XDR_QUADLEN(nbytes - avail); 207 return p; 208 } 209 210 static unsigned int compoundargs_bytes_left(struct nfsd4_compoundargs *argp) 211 { 212 unsigned int this = (char *)argp->end - (char *)argp->p; 213 214 return this + argp->pagelen; 215 } 216 217 static int zero_clientid(clientid_t *clid) 218 { 219 return (clid->cl_boot == 0) && (clid->cl_id == 0); 220 } 221 222 /** 223 * svcxdr_tmpalloc - allocate memory to be freed after compound processing 224 * @argp: NFSv4 compound argument structure 225 * @len: length of buffer to allocate 226 * 227 * Allocates a buffer of size @len to be freed when processing the compound 228 * operation described in @argp finishes. 229 */ 230 static void * 231 svcxdr_tmpalloc(struct nfsd4_compoundargs *argp, u32 len) 232 { 233 struct svcxdr_tmpbuf *tb; 234 235 tb = kmalloc(sizeof(*tb) + len, GFP_KERNEL); 236 if (!tb) 237 return NULL; 238 tb->next = argp->to_free; 239 argp->to_free = tb; 240 return tb->buf; 241 } 242 243 /* 244 * For xdr strings that need to be passed to other kernel api's 245 * as null-terminated strings. 246 * 247 * Note null-terminating in place usually isn't safe since the 248 * buffer might end on a page boundary. 249 */ 250 static char * 251 svcxdr_dupstr(struct nfsd4_compoundargs *argp, void *buf, u32 len) 252 { 253 char *p = svcxdr_tmpalloc(argp, len + 1); 254 255 if (!p) 256 return NULL; 257 memcpy(p, buf, len); 258 p[len] = '\0'; 259 return p; 260 } 261 262 static __be32 263 svcxdr_construct_vector(struct nfsd4_compoundargs *argp, struct kvec *head, 264 struct page ***pagelist, u32 buflen) 265 { 266 int avail; 267 int len; 268 int pages; 269 270 /* Sorry .. no magic macros for this.. * 271 * READ_BUF(write->wr_buflen); 272 * SAVEMEM(write->wr_buf, write->wr_buflen); 273 */ 274 avail = (char *)argp->end - (char *)argp->p; 275 if (avail + argp->pagelen < buflen) { 276 dprintk("NFSD: xdr error (%s:%d)\n", 277 __FILE__, __LINE__); 278 return nfserr_bad_xdr; 279 } 280 head->iov_base = argp->p; 281 head->iov_len = avail; 282 *pagelist = argp->pagelist; 283 284 len = XDR_QUADLEN(buflen) << 2; 285 if (len >= avail) { 286 len -= avail; 287 288 pages = len >> PAGE_SHIFT; 289 argp->pagelist += pages; 290 argp->pagelen -= pages * PAGE_SIZE; 291 len -= pages * PAGE_SIZE; 292 293 next_decode_page(argp); 294 } 295 argp->p += XDR_QUADLEN(len); 296 297 return 0; 298 } 299 300 /** 301 * savemem - duplicate a chunk of memory for later processing 302 * @argp: NFSv4 compound argument structure to be freed with 303 * @p: pointer to be duplicated 304 * @nbytes: length to be duplicated 305 * 306 * Returns a pointer to a copy of @nbytes bytes of memory at @p 307 * that are preserved until processing of the NFSv4 compound 308 * operation described by @argp finishes. 309 */ 310 static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes) 311 { 312 void *ret; 313 314 ret = svcxdr_tmpalloc(argp, nbytes); 315 if (!ret) 316 return NULL; 317 memcpy(ret, p, nbytes); 318 return ret; 319 } 320 321 static __be32 322 nfsd4_decode_time(struct nfsd4_compoundargs *argp, struct timespec64 *tv) 323 { 324 DECODE_HEAD; 325 326 READ_BUF(12); 327 p = xdr_decode_hyper(p, &tv->tv_sec); 328 tv->tv_nsec = be32_to_cpup(p++); 329 if (tv->tv_nsec >= (u32)1000000000) 330 return nfserr_inval; 331 332 DECODE_TAIL; 333 } 334 335 static __be32 336 nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval) 337 { 338 u32 bmlen; 339 DECODE_HEAD; 340 341 bmval[0] = 0; 342 bmval[1] = 0; 343 bmval[2] = 0; 344 345 READ_BUF(4); 346 bmlen = be32_to_cpup(p++); 347 if (bmlen > 1000) 348 goto xdr_error; 349 350 READ_BUF(bmlen << 2); 351 if (bmlen > 0) 352 bmval[0] = be32_to_cpup(p++); 353 if (bmlen > 1) 354 bmval[1] = be32_to_cpup(p++); 355 if (bmlen > 2) 356 bmval[2] = be32_to_cpup(p++); 357 358 DECODE_TAIL; 359 } 360 361 static __be32 362 nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval, 363 struct iattr *iattr, struct nfs4_acl **acl, 364 struct xdr_netobj *label, int *umask) 365 { 366 int expected_len, len = 0; 367 u32 dummy32; 368 char *buf; 369 370 DECODE_HEAD; 371 iattr->ia_valid = 0; 372 if ((status = nfsd4_decode_bitmap(argp, bmval))) 373 return status; 374 375 if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 376 || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 377 || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) { 378 if (nfsd_attrs_supported(argp->minorversion, bmval)) 379 return nfserr_inval; 380 return nfserr_attrnotsupp; 381 } 382 383 READ_BUF(4); 384 expected_len = be32_to_cpup(p++); 385 386 if (bmval[0] & FATTR4_WORD0_SIZE) { 387 READ_BUF(8); 388 len += 8; 389 p = xdr_decode_hyper(p, &iattr->ia_size); 390 iattr->ia_valid |= ATTR_SIZE; 391 } 392 if (bmval[0] & FATTR4_WORD0_ACL) { 393 u32 nace; 394 struct nfs4_ace *ace; 395 396 READ_BUF(4); len += 4; 397 nace = be32_to_cpup(p++); 398 399 if (nace > compoundargs_bytes_left(argp)/20) 400 /* 401 * Even with 4-byte names there wouldn't be 402 * space for that many aces; something fishy is 403 * going on: 404 */ 405 return nfserr_fbig; 406 407 *acl = svcxdr_tmpalloc(argp, nfs4_acl_bytes(nace)); 408 if (*acl == NULL) 409 return nfserr_jukebox; 410 411 (*acl)->naces = nace; 412 for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) { 413 READ_BUF(16); len += 16; 414 ace->type = be32_to_cpup(p++); 415 ace->flag = be32_to_cpup(p++); 416 ace->access_mask = be32_to_cpup(p++); 417 dummy32 = be32_to_cpup(p++); 418 READ_BUF(dummy32); 419 len += XDR_QUADLEN(dummy32) << 2; 420 READMEM(buf, dummy32); 421 ace->whotype = nfs4_acl_get_whotype(buf, dummy32); 422 status = nfs_ok; 423 if (ace->whotype != NFS4_ACL_WHO_NAMED) 424 ; 425 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 426 status = nfsd_map_name_to_gid(argp->rqstp, 427 buf, dummy32, &ace->who_gid); 428 else 429 status = nfsd_map_name_to_uid(argp->rqstp, 430 buf, dummy32, &ace->who_uid); 431 if (status) 432 return status; 433 } 434 } else 435 *acl = NULL; 436 if (bmval[1] & FATTR4_WORD1_MODE) { 437 READ_BUF(4); 438 len += 4; 439 iattr->ia_mode = be32_to_cpup(p++); 440 iattr->ia_mode &= (S_IFMT | S_IALLUGO); 441 iattr->ia_valid |= ATTR_MODE; 442 } 443 if (bmval[1] & FATTR4_WORD1_OWNER) { 444 READ_BUF(4); 445 len += 4; 446 dummy32 = be32_to_cpup(p++); 447 READ_BUF(dummy32); 448 len += (XDR_QUADLEN(dummy32) << 2); 449 READMEM(buf, dummy32); 450 if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid))) 451 return status; 452 iattr->ia_valid |= ATTR_UID; 453 } 454 if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { 455 READ_BUF(4); 456 len += 4; 457 dummy32 = be32_to_cpup(p++); 458 READ_BUF(dummy32); 459 len += (XDR_QUADLEN(dummy32) << 2); 460 READMEM(buf, dummy32); 461 if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid))) 462 return status; 463 iattr->ia_valid |= ATTR_GID; 464 } 465 if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { 466 READ_BUF(4); 467 len += 4; 468 dummy32 = be32_to_cpup(p++); 469 switch (dummy32) { 470 case NFS4_SET_TO_CLIENT_TIME: 471 len += 12; 472 status = nfsd4_decode_time(argp, &iattr->ia_atime); 473 if (status) 474 return status; 475 iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); 476 break; 477 case NFS4_SET_TO_SERVER_TIME: 478 iattr->ia_valid |= ATTR_ATIME; 479 break; 480 default: 481 goto xdr_error; 482 } 483 } 484 if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { 485 READ_BUF(4); 486 len += 4; 487 dummy32 = be32_to_cpup(p++); 488 switch (dummy32) { 489 case NFS4_SET_TO_CLIENT_TIME: 490 len += 12; 491 status = nfsd4_decode_time(argp, &iattr->ia_mtime); 492 if (status) 493 return status; 494 iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); 495 break; 496 case NFS4_SET_TO_SERVER_TIME: 497 iattr->ia_valid |= ATTR_MTIME; 498 break; 499 default: 500 goto xdr_error; 501 } 502 } 503 504 label->len = 0; 505 if (IS_ENABLED(CONFIG_NFSD_V4_SECURITY_LABEL) && 506 bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { 507 READ_BUF(4); 508 len += 4; 509 dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */ 510 READ_BUF(4); 511 len += 4; 512 dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */ 513 READ_BUF(4); 514 len += 4; 515 dummy32 = be32_to_cpup(p++); 516 READ_BUF(dummy32); 517 if (dummy32 > NFS4_MAXLABELLEN) 518 return nfserr_badlabel; 519 len += (XDR_QUADLEN(dummy32) << 2); 520 READMEM(buf, dummy32); 521 label->len = dummy32; 522 label->data = svcxdr_dupstr(argp, buf, dummy32); 523 if (!label->data) 524 return nfserr_jukebox; 525 } 526 if (bmval[2] & FATTR4_WORD2_MODE_UMASK) { 527 if (!umask) 528 goto xdr_error; 529 READ_BUF(8); 530 len += 8; 531 dummy32 = be32_to_cpup(p++); 532 iattr->ia_mode = dummy32 & (S_IFMT | S_IALLUGO); 533 dummy32 = be32_to_cpup(p++); 534 *umask = dummy32 & S_IRWXUGO; 535 iattr->ia_valid |= ATTR_MODE; 536 } 537 if (len != expected_len) 538 goto xdr_error; 539 540 DECODE_TAIL; 541 } 542 543 static __be32 544 nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid) 545 { 546 DECODE_HEAD; 547 548 READ_BUF(sizeof(stateid_t)); 549 sid->si_generation = be32_to_cpup(p++); 550 COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t)); 551 552 DECODE_TAIL; 553 } 554 555 static __be32 556 nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access) 557 { 558 DECODE_HEAD; 559 560 READ_BUF(4); 561 access->ac_req_access = be32_to_cpup(p++); 562 563 DECODE_TAIL; 564 } 565 566 static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) 567 { 568 DECODE_HEAD; 569 struct user_namespace *userns = nfsd_user_namespace(argp->rqstp); 570 u32 dummy, uid, gid; 571 char *machine_name; 572 int i; 573 int nr_secflavs; 574 575 /* callback_sec_params4 */ 576 READ_BUF(4); 577 nr_secflavs = be32_to_cpup(p++); 578 if (nr_secflavs) 579 cbs->flavor = (u32)(-1); 580 else 581 /* Is this legal? Be generous, take it to mean AUTH_NONE: */ 582 cbs->flavor = 0; 583 for (i = 0; i < nr_secflavs; ++i) { 584 READ_BUF(4); 585 dummy = be32_to_cpup(p++); 586 switch (dummy) { 587 case RPC_AUTH_NULL: 588 /* Nothing to read */ 589 if (cbs->flavor == (u32)(-1)) 590 cbs->flavor = RPC_AUTH_NULL; 591 break; 592 case RPC_AUTH_UNIX: 593 READ_BUF(8); 594 /* stamp */ 595 dummy = be32_to_cpup(p++); 596 597 /* machine name */ 598 dummy = be32_to_cpup(p++); 599 READ_BUF(dummy); 600 SAVEMEM(machine_name, dummy); 601 602 /* uid, gid */ 603 READ_BUF(8); 604 uid = be32_to_cpup(p++); 605 gid = be32_to_cpup(p++); 606 607 /* more gids */ 608 READ_BUF(4); 609 dummy = be32_to_cpup(p++); 610 READ_BUF(dummy * 4); 611 if (cbs->flavor == (u32)(-1)) { 612 kuid_t kuid = make_kuid(userns, uid); 613 kgid_t kgid = make_kgid(userns, gid); 614 if (uid_valid(kuid) && gid_valid(kgid)) { 615 cbs->uid = kuid; 616 cbs->gid = kgid; 617 cbs->flavor = RPC_AUTH_UNIX; 618 } else { 619 dprintk("RPC_AUTH_UNIX with invalid" 620 "uid or gid ignoring!\n"); 621 } 622 } 623 break; 624 case RPC_AUTH_GSS: 625 dprintk("RPC_AUTH_GSS callback secflavor " 626 "not supported!\n"); 627 READ_BUF(8); 628 /* gcbp_service */ 629 dummy = be32_to_cpup(p++); 630 /* gcbp_handle_from_server */ 631 dummy = be32_to_cpup(p++); 632 READ_BUF(dummy); 633 p += XDR_QUADLEN(dummy); 634 /* gcbp_handle_from_client */ 635 READ_BUF(4); 636 dummy = be32_to_cpup(p++); 637 READ_BUF(dummy); 638 break; 639 default: 640 dprintk("Illegal callback secflavor\n"); 641 return nfserr_inval; 642 } 643 } 644 DECODE_TAIL; 645 } 646 647 static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc) 648 { 649 DECODE_HEAD; 650 651 READ_BUF(4); 652 bc->bc_cb_program = be32_to_cpup(p++); 653 nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); 654 655 DECODE_TAIL; 656 } 657 658 static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts) 659 { 660 DECODE_HEAD; 661 662 READ_BUF(NFS4_MAX_SESSIONID_LEN + 8); 663 COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN); 664 bcts->dir = be32_to_cpup(p++); 665 /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker 666 * could help us figure out we should be using it. */ 667 DECODE_TAIL; 668 } 669 670 static __be32 671 nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close) 672 { 673 DECODE_HEAD; 674 675 READ_BUF(4); 676 close->cl_seqid = be32_to_cpup(p++); 677 return nfsd4_decode_stateid(argp, &close->cl_stateid); 678 679 DECODE_TAIL; 680 } 681 682 683 static __be32 684 nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit) 685 { 686 DECODE_HEAD; 687 688 READ_BUF(12); 689 p = xdr_decode_hyper(p, &commit->co_offset); 690 commit->co_count = be32_to_cpup(p++); 691 692 DECODE_TAIL; 693 } 694 695 static __be32 696 nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create) 697 { 698 DECODE_HEAD; 699 700 READ_BUF(4); 701 create->cr_type = be32_to_cpup(p++); 702 switch (create->cr_type) { 703 case NF4LNK: 704 READ_BUF(4); 705 create->cr_datalen = be32_to_cpup(p++); 706 READ_BUF(create->cr_datalen); 707 create->cr_data = svcxdr_dupstr(argp, p, create->cr_datalen); 708 if (!create->cr_data) 709 return nfserr_jukebox; 710 break; 711 case NF4BLK: 712 case NF4CHR: 713 READ_BUF(8); 714 create->cr_specdata1 = be32_to_cpup(p++); 715 create->cr_specdata2 = be32_to_cpup(p++); 716 break; 717 case NF4SOCK: 718 case NF4FIFO: 719 case NF4DIR: 720 default: 721 break; 722 } 723 724 READ_BUF(4); 725 create->cr_namelen = be32_to_cpup(p++); 726 READ_BUF(create->cr_namelen); 727 SAVEMEM(create->cr_name, create->cr_namelen); 728 if ((status = check_filename(create->cr_name, create->cr_namelen))) 729 return status; 730 731 status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr, 732 &create->cr_acl, &create->cr_label, 733 &create->cr_umask); 734 if (status) 735 goto out; 736 737 DECODE_TAIL; 738 } 739 740 static inline __be32 741 nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr) 742 { 743 return nfsd4_decode_stateid(argp, &dr->dr_stateid); 744 } 745 746 static inline __be32 747 nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr) 748 { 749 return nfsd4_decode_bitmap(argp, getattr->ga_bmval); 750 } 751 752 static __be32 753 nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link) 754 { 755 DECODE_HEAD; 756 757 READ_BUF(4); 758 link->li_namelen = be32_to_cpup(p++); 759 READ_BUF(link->li_namelen); 760 SAVEMEM(link->li_name, link->li_namelen); 761 if ((status = check_filename(link->li_name, link->li_namelen))) 762 return status; 763 764 DECODE_TAIL; 765 } 766 767 static __be32 768 nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) 769 { 770 DECODE_HEAD; 771 772 /* 773 * type, reclaim(boolean), offset, length, new_lock_owner(boolean) 774 */ 775 READ_BUF(28); 776 lock->lk_type = be32_to_cpup(p++); 777 if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) 778 goto xdr_error; 779 lock->lk_reclaim = be32_to_cpup(p++); 780 p = xdr_decode_hyper(p, &lock->lk_offset); 781 p = xdr_decode_hyper(p, &lock->lk_length); 782 lock->lk_is_new = be32_to_cpup(p++); 783 784 if (lock->lk_is_new) { 785 READ_BUF(4); 786 lock->lk_new_open_seqid = be32_to_cpup(p++); 787 status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid); 788 if (status) 789 return status; 790 READ_BUF(8 + sizeof(clientid_t)); 791 lock->lk_new_lock_seqid = be32_to_cpup(p++); 792 COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t)); 793 lock->lk_new_owner.len = be32_to_cpup(p++); 794 READ_BUF(lock->lk_new_owner.len); 795 READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len); 796 } else { 797 status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid); 798 if (status) 799 return status; 800 READ_BUF(4); 801 lock->lk_old_lock_seqid = be32_to_cpup(p++); 802 } 803 804 DECODE_TAIL; 805 } 806 807 static __be32 808 nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt) 809 { 810 DECODE_HEAD; 811 812 READ_BUF(32); 813 lockt->lt_type = be32_to_cpup(p++); 814 if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) 815 goto xdr_error; 816 p = xdr_decode_hyper(p, &lockt->lt_offset); 817 p = xdr_decode_hyper(p, &lockt->lt_length); 818 COPYMEM(&lockt->lt_clientid, 8); 819 lockt->lt_owner.len = be32_to_cpup(p++); 820 READ_BUF(lockt->lt_owner.len); 821 READMEM(lockt->lt_owner.data, lockt->lt_owner.len); 822 823 DECODE_TAIL; 824 } 825 826 static __be32 827 nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku) 828 { 829 DECODE_HEAD; 830 831 READ_BUF(8); 832 locku->lu_type = be32_to_cpup(p++); 833 if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) 834 goto xdr_error; 835 locku->lu_seqid = be32_to_cpup(p++); 836 status = nfsd4_decode_stateid(argp, &locku->lu_stateid); 837 if (status) 838 return status; 839 READ_BUF(16); 840 p = xdr_decode_hyper(p, &locku->lu_offset); 841 p = xdr_decode_hyper(p, &locku->lu_length); 842 843 DECODE_TAIL; 844 } 845 846 static __be32 847 nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup) 848 { 849 DECODE_HEAD; 850 851 READ_BUF(4); 852 lookup->lo_len = be32_to_cpup(p++); 853 READ_BUF(lookup->lo_len); 854 SAVEMEM(lookup->lo_name, lookup->lo_len); 855 if ((status = check_filename(lookup->lo_name, lookup->lo_len))) 856 return status; 857 858 DECODE_TAIL; 859 } 860 861 static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) 862 { 863 __be32 *p; 864 u32 w; 865 866 READ_BUF(4); 867 w = be32_to_cpup(p++); 868 *share_access = w & NFS4_SHARE_ACCESS_MASK; 869 *deleg_want = w & NFS4_SHARE_WANT_MASK; 870 if (deleg_when) 871 *deleg_when = w & NFS4_SHARE_WHEN_MASK; 872 873 switch (w & NFS4_SHARE_ACCESS_MASK) { 874 case NFS4_SHARE_ACCESS_READ: 875 case NFS4_SHARE_ACCESS_WRITE: 876 case NFS4_SHARE_ACCESS_BOTH: 877 break; 878 default: 879 return nfserr_bad_xdr; 880 } 881 w &= ~NFS4_SHARE_ACCESS_MASK; 882 if (!w) 883 return nfs_ok; 884 if (!argp->minorversion) 885 return nfserr_bad_xdr; 886 switch (w & NFS4_SHARE_WANT_MASK) { 887 case NFS4_SHARE_WANT_NO_PREFERENCE: 888 case NFS4_SHARE_WANT_READ_DELEG: 889 case NFS4_SHARE_WANT_WRITE_DELEG: 890 case NFS4_SHARE_WANT_ANY_DELEG: 891 case NFS4_SHARE_WANT_NO_DELEG: 892 case NFS4_SHARE_WANT_CANCEL: 893 break; 894 default: 895 return nfserr_bad_xdr; 896 } 897 w &= ~NFS4_SHARE_WANT_MASK; 898 if (!w) 899 return nfs_ok; 900 901 if (!deleg_when) /* open_downgrade */ 902 return nfserr_inval; 903 switch (w) { 904 case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: 905 case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: 906 case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | 907 NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): 908 return nfs_ok; 909 } 910 xdr_error: 911 return nfserr_bad_xdr; 912 } 913 914 static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) 915 { 916 __be32 *p; 917 918 READ_BUF(4); 919 *x = be32_to_cpup(p++); 920 /* Note: unlinke access bits, deny bits may be zero. */ 921 if (*x & ~NFS4_SHARE_DENY_BOTH) 922 return nfserr_bad_xdr; 923 return nfs_ok; 924 xdr_error: 925 return nfserr_bad_xdr; 926 } 927 928 static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) 929 { 930 __be32 *p; 931 932 READ_BUF(4); 933 o->len = be32_to_cpup(p++); 934 935 if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT) 936 return nfserr_bad_xdr; 937 938 READ_BUF(o->len); 939 SAVEMEM(o->data, o->len); 940 return nfs_ok; 941 xdr_error: 942 return nfserr_bad_xdr; 943 } 944 945 static __be32 946 nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) 947 { 948 DECODE_HEAD; 949 u32 dummy; 950 951 memset(open->op_bmval, 0, sizeof(open->op_bmval)); 952 open->op_iattr.ia_valid = 0; 953 open->op_openowner = NULL; 954 955 open->op_xdr_error = 0; 956 /* seqid, share_access, share_deny, clientid, ownerlen */ 957 READ_BUF(4); 958 open->op_seqid = be32_to_cpup(p++); 959 /* decode, yet ignore deleg_when until supported */ 960 status = nfsd4_decode_share_access(argp, &open->op_share_access, 961 &open->op_deleg_want, &dummy); 962 if (status) 963 goto xdr_error; 964 status = nfsd4_decode_share_deny(argp, &open->op_share_deny); 965 if (status) 966 goto xdr_error; 967 READ_BUF(sizeof(clientid_t)); 968 COPYMEM(&open->op_clientid, sizeof(clientid_t)); 969 status = nfsd4_decode_opaque(argp, &open->op_owner); 970 if (status) 971 goto xdr_error; 972 READ_BUF(4); 973 open->op_create = be32_to_cpup(p++); 974 switch (open->op_create) { 975 case NFS4_OPEN_NOCREATE: 976 break; 977 case NFS4_OPEN_CREATE: 978 READ_BUF(4); 979 open->op_createmode = be32_to_cpup(p++); 980 switch (open->op_createmode) { 981 case NFS4_CREATE_UNCHECKED: 982 case NFS4_CREATE_GUARDED: 983 status = nfsd4_decode_fattr(argp, open->op_bmval, 984 &open->op_iattr, &open->op_acl, &open->op_label, 985 &open->op_umask); 986 if (status) 987 goto out; 988 break; 989 case NFS4_CREATE_EXCLUSIVE: 990 READ_BUF(NFS4_VERIFIER_SIZE); 991 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); 992 break; 993 case NFS4_CREATE_EXCLUSIVE4_1: 994 if (argp->minorversion < 1) 995 goto xdr_error; 996 READ_BUF(NFS4_VERIFIER_SIZE); 997 COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); 998 status = nfsd4_decode_fattr(argp, open->op_bmval, 999 &open->op_iattr, &open->op_acl, &open->op_label, 1000 &open->op_umask); 1001 if (status) 1002 goto out; 1003 break; 1004 default: 1005 goto xdr_error; 1006 } 1007 break; 1008 default: 1009 goto xdr_error; 1010 } 1011 1012 /* open_claim */ 1013 READ_BUF(4); 1014 open->op_claim_type = be32_to_cpup(p++); 1015 switch (open->op_claim_type) { 1016 case NFS4_OPEN_CLAIM_NULL: 1017 case NFS4_OPEN_CLAIM_DELEGATE_PREV: 1018 READ_BUF(4); 1019 open->op_fname.len = be32_to_cpup(p++); 1020 READ_BUF(open->op_fname.len); 1021 SAVEMEM(open->op_fname.data, open->op_fname.len); 1022 if ((status = check_filename(open->op_fname.data, open->op_fname.len))) 1023 return status; 1024 break; 1025 case NFS4_OPEN_CLAIM_PREVIOUS: 1026 READ_BUF(4); 1027 open->op_delegate_type = be32_to_cpup(p++); 1028 break; 1029 case NFS4_OPEN_CLAIM_DELEGATE_CUR: 1030 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); 1031 if (status) 1032 return status; 1033 READ_BUF(4); 1034 open->op_fname.len = be32_to_cpup(p++); 1035 READ_BUF(open->op_fname.len); 1036 SAVEMEM(open->op_fname.data, open->op_fname.len); 1037 if ((status = check_filename(open->op_fname.data, open->op_fname.len))) 1038 return status; 1039 break; 1040 case NFS4_OPEN_CLAIM_FH: 1041 case NFS4_OPEN_CLAIM_DELEG_PREV_FH: 1042 if (argp->minorversion < 1) 1043 goto xdr_error; 1044 /* void */ 1045 break; 1046 case NFS4_OPEN_CLAIM_DELEG_CUR_FH: 1047 if (argp->minorversion < 1) 1048 goto xdr_error; 1049 status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); 1050 if (status) 1051 return status; 1052 break; 1053 default: 1054 goto xdr_error; 1055 } 1056 1057 DECODE_TAIL; 1058 } 1059 1060 static __be32 1061 nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf) 1062 { 1063 DECODE_HEAD; 1064 1065 if (argp->minorversion >= 1) 1066 return nfserr_notsupp; 1067 1068 status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid); 1069 if (status) 1070 return status; 1071 READ_BUF(4); 1072 open_conf->oc_seqid = be32_to_cpup(p++); 1073 1074 DECODE_TAIL; 1075 } 1076 1077 static __be32 1078 nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down) 1079 { 1080 DECODE_HEAD; 1081 1082 status = nfsd4_decode_stateid(argp, &open_down->od_stateid); 1083 if (status) 1084 return status; 1085 READ_BUF(4); 1086 open_down->od_seqid = be32_to_cpup(p++); 1087 status = nfsd4_decode_share_access(argp, &open_down->od_share_access, 1088 &open_down->od_deleg_want, NULL); 1089 if (status) 1090 return status; 1091 status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny); 1092 if (status) 1093 return status; 1094 DECODE_TAIL; 1095 } 1096 1097 static __be32 1098 nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh) 1099 { 1100 DECODE_HEAD; 1101 1102 READ_BUF(4); 1103 putfh->pf_fhlen = be32_to_cpup(p++); 1104 if (putfh->pf_fhlen > NFS4_FHSIZE) 1105 goto xdr_error; 1106 READ_BUF(putfh->pf_fhlen); 1107 SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen); 1108 1109 DECODE_TAIL; 1110 } 1111 1112 static __be32 1113 nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p) 1114 { 1115 if (argp->minorversion == 0) 1116 return nfs_ok; 1117 return nfserr_notsupp; 1118 } 1119 1120 static __be32 1121 nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read) 1122 { 1123 DECODE_HEAD; 1124 1125 status = nfsd4_decode_stateid(argp, &read->rd_stateid); 1126 if (status) 1127 return status; 1128 READ_BUF(12); 1129 p = xdr_decode_hyper(p, &read->rd_offset); 1130 read->rd_length = be32_to_cpup(p++); 1131 1132 DECODE_TAIL; 1133 } 1134 1135 static __be32 1136 nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir) 1137 { 1138 DECODE_HEAD; 1139 1140 READ_BUF(24); 1141 p = xdr_decode_hyper(p, &readdir->rd_cookie); 1142 COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data)); 1143 readdir->rd_dircount = be32_to_cpup(p++); 1144 readdir->rd_maxcount = be32_to_cpup(p++); 1145 if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval))) 1146 goto out; 1147 1148 DECODE_TAIL; 1149 } 1150 1151 static __be32 1152 nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove) 1153 { 1154 DECODE_HEAD; 1155 1156 READ_BUF(4); 1157 remove->rm_namelen = be32_to_cpup(p++); 1158 READ_BUF(remove->rm_namelen); 1159 SAVEMEM(remove->rm_name, remove->rm_namelen); 1160 if ((status = check_filename(remove->rm_name, remove->rm_namelen))) 1161 return status; 1162 1163 DECODE_TAIL; 1164 } 1165 1166 static __be32 1167 nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename) 1168 { 1169 DECODE_HEAD; 1170 1171 READ_BUF(4); 1172 rename->rn_snamelen = be32_to_cpup(p++); 1173 READ_BUF(rename->rn_snamelen); 1174 SAVEMEM(rename->rn_sname, rename->rn_snamelen); 1175 READ_BUF(4); 1176 rename->rn_tnamelen = be32_to_cpup(p++); 1177 READ_BUF(rename->rn_tnamelen); 1178 SAVEMEM(rename->rn_tname, rename->rn_tnamelen); 1179 if ((status = check_filename(rename->rn_sname, rename->rn_snamelen))) 1180 return status; 1181 if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen))) 1182 return status; 1183 1184 DECODE_TAIL; 1185 } 1186 1187 static __be32 1188 nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid) 1189 { 1190 DECODE_HEAD; 1191 1192 if (argp->minorversion >= 1) 1193 return nfserr_notsupp; 1194 1195 READ_BUF(sizeof(clientid_t)); 1196 COPYMEM(clientid, sizeof(clientid_t)); 1197 1198 DECODE_TAIL; 1199 } 1200 1201 static __be32 1202 nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, 1203 struct nfsd4_secinfo *secinfo) 1204 { 1205 DECODE_HEAD; 1206 1207 READ_BUF(4); 1208 secinfo->si_namelen = be32_to_cpup(p++); 1209 READ_BUF(secinfo->si_namelen); 1210 SAVEMEM(secinfo->si_name, secinfo->si_namelen); 1211 status = check_filename(secinfo->si_name, secinfo->si_namelen); 1212 if (status) 1213 return status; 1214 DECODE_TAIL; 1215 } 1216 1217 static __be32 1218 nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, 1219 struct nfsd4_secinfo_no_name *sin) 1220 { 1221 DECODE_HEAD; 1222 1223 READ_BUF(4); 1224 sin->sin_style = be32_to_cpup(p++); 1225 DECODE_TAIL; 1226 } 1227 1228 static __be32 1229 nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr) 1230 { 1231 __be32 status; 1232 1233 status = nfsd4_decode_stateid(argp, &setattr->sa_stateid); 1234 if (status) 1235 return status; 1236 return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr, 1237 &setattr->sa_acl, &setattr->sa_label, NULL); 1238 } 1239 1240 static __be32 1241 nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid) 1242 { 1243 DECODE_HEAD; 1244 1245 if (argp->minorversion >= 1) 1246 return nfserr_notsupp; 1247 1248 READ_BUF(NFS4_VERIFIER_SIZE); 1249 COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE); 1250 1251 status = nfsd4_decode_opaque(argp, &setclientid->se_name); 1252 if (status) 1253 return nfserr_bad_xdr; 1254 READ_BUF(8); 1255 setclientid->se_callback_prog = be32_to_cpup(p++); 1256 setclientid->se_callback_netid_len = be32_to_cpup(p++); 1257 READ_BUF(setclientid->se_callback_netid_len); 1258 SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len); 1259 READ_BUF(4); 1260 setclientid->se_callback_addr_len = be32_to_cpup(p++); 1261 1262 READ_BUF(setclientid->se_callback_addr_len); 1263 SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len); 1264 READ_BUF(4); 1265 setclientid->se_callback_ident = be32_to_cpup(p++); 1266 1267 DECODE_TAIL; 1268 } 1269 1270 static __be32 1271 nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c) 1272 { 1273 DECODE_HEAD; 1274 1275 if (argp->minorversion >= 1) 1276 return nfserr_notsupp; 1277 1278 READ_BUF(8 + NFS4_VERIFIER_SIZE); 1279 COPYMEM(&scd_c->sc_clientid, 8); 1280 COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE); 1281 1282 DECODE_TAIL; 1283 } 1284 1285 /* Also used for NVERIFY */ 1286 static __be32 1287 nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify) 1288 { 1289 DECODE_HEAD; 1290 1291 if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval))) 1292 goto out; 1293 1294 /* For convenience's sake, we compare raw xdr'd attributes in 1295 * nfsd4_proc_verify */ 1296 1297 READ_BUF(4); 1298 verify->ve_attrlen = be32_to_cpup(p++); 1299 READ_BUF(verify->ve_attrlen); 1300 SAVEMEM(verify->ve_attrval, verify->ve_attrlen); 1301 1302 DECODE_TAIL; 1303 } 1304 1305 static __be32 1306 nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write) 1307 { 1308 DECODE_HEAD; 1309 1310 status = nfsd4_decode_stateid(argp, &write->wr_stateid); 1311 if (status) 1312 return status; 1313 READ_BUF(16); 1314 p = xdr_decode_hyper(p, &write->wr_offset); 1315 write->wr_stable_how = be32_to_cpup(p++); 1316 if (write->wr_stable_how > NFS_FILE_SYNC) 1317 goto xdr_error; 1318 write->wr_buflen = be32_to_cpup(p++); 1319 1320 status = svcxdr_construct_vector(argp, &write->wr_head, 1321 &write->wr_pagelist, write->wr_buflen); 1322 if (status) 1323 return status; 1324 1325 DECODE_TAIL; 1326 } 1327 1328 static __be32 1329 nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner) 1330 { 1331 DECODE_HEAD; 1332 1333 if (argp->minorversion >= 1) 1334 return nfserr_notsupp; 1335 1336 READ_BUF(12); 1337 COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t)); 1338 rlockowner->rl_owner.len = be32_to_cpup(p++); 1339 READ_BUF(rlockowner->rl_owner.len); 1340 READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len); 1341 1342 if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) 1343 return nfserr_inval; 1344 DECODE_TAIL; 1345 } 1346 1347 static __be32 1348 nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, 1349 struct nfsd4_exchange_id *exid) 1350 { 1351 int dummy, tmp; 1352 DECODE_HEAD; 1353 1354 READ_BUF(NFS4_VERIFIER_SIZE); 1355 COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE); 1356 1357 status = nfsd4_decode_opaque(argp, &exid->clname); 1358 if (status) 1359 return nfserr_bad_xdr; 1360 1361 READ_BUF(4); 1362 exid->flags = be32_to_cpup(p++); 1363 1364 /* Ignore state_protect4_a */ 1365 READ_BUF(4); 1366 exid->spa_how = be32_to_cpup(p++); 1367 switch (exid->spa_how) { 1368 case SP4_NONE: 1369 break; 1370 case SP4_MACH_CRED: 1371 /* spo_must_enforce */ 1372 status = nfsd4_decode_bitmap(argp, 1373 exid->spo_must_enforce); 1374 if (status) 1375 goto out; 1376 /* spo_must_allow */ 1377 status = nfsd4_decode_bitmap(argp, exid->spo_must_allow); 1378 if (status) 1379 goto out; 1380 break; 1381 case SP4_SSV: 1382 /* ssp_ops */ 1383 READ_BUF(4); 1384 dummy = be32_to_cpup(p++); 1385 READ_BUF(dummy * 4); 1386 p += dummy; 1387 1388 READ_BUF(4); 1389 dummy = be32_to_cpup(p++); 1390 READ_BUF(dummy * 4); 1391 p += dummy; 1392 1393 /* ssp_hash_algs<> */ 1394 READ_BUF(4); 1395 tmp = be32_to_cpup(p++); 1396 while (tmp--) { 1397 READ_BUF(4); 1398 dummy = be32_to_cpup(p++); 1399 READ_BUF(dummy); 1400 p += XDR_QUADLEN(dummy); 1401 } 1402 1403 /* ssp_encr_algs<> */ 1404 READ_BUF(4); 1405 tmp = be32_to_cpup(p++); 1406 while (tmp--) { 1407 READ_BUF(4); 1408 dummy = be32_to_cpup(p++); 1409 READ_BUF(dummy); 1410 p += XDR_QUADLEN(dummy); 1411 } 1412 1413 /* ignore ssp_window and ssp_num_gss_handles: */ 1414 READ_BUF(8); 1415 break; 1416 default: 1417 goto xdr_error; 1418 } 1419 1420 READ_BUF(4); /* nfs_impl_id4 array length */ 1421 dummy = be32_to_cpup(p++); 1422 1423 if (dummy > 1) 1424 goto xdr_error; 1425 1426 if (dummy == 1) { 1427 status = nfsd4_decode_opaque(argp, &exid->nii_domain); 1428 if (status) 1429 goto xdr_error; 1430 1431 /* nii_name */ 1432 status = nfsd4_decode_opaque(argp, &exid->nii_name); 1433 if (status) 1434 goto xdr_error; 1435 1436 /* nii_date */ 1437 status = nfsd4_decode_time(argp, &exid->nii_time); 1438 if (status) 1439 goto xdr_error; 1440 } 1441 DECODE_TAIL; 1442 } 1443 1444 static __be32 1445 nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, 1446 struct nfsd4_create_session *sess) 1447 { 1448 DECODE_HEAD; 1449 1450 READ_BUF(16); 1451 COPYMEM(&sess->clientid, 8); 1452 sess->seqid = be32_to_cpup(p++); 1453 sess->flags = be32_to_cpup(p++); 1454 1455 /* Fore channel attrs */ 1456 READ_BUF(28); 1457 p++; /* headerpadsz is always 0 */ 1458 sess->fore_channel.maxreq_sz = be32_to_cpup(p++); 1459 sess->fore_channel.maxresp_sz = be32_to_cpup(p++); 1460 sess->fore_channel.maxresp_cached = be32_to_cpup(p++); 1461 sess->fore_channel.maxops = be32_to_cpup(p++); 1462 sess->fore_channel.maxreqs = be32_to_cpup(p++); 1463 sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++); 1464 if (sess->fore_channel.nr_rdma_attrs == 1) { 1465 READ_BUF(4); 1466 sess->fore_channel.rdma_attrs = be32_to_cpup(p++); 1467 } else if (sess->fore_channel.nr_rdma_attrs > 1) { 1468 dprintk("Too many fore channel attr bitmaps!\n"); 1469 goto xdr_error; 1470 } 1471 1472 /* Back channel attrs */ 1473 READ_BUF(28); 1474 p++; /* headerpadsz is always 0 */ 1475 sess->back_channel.maxreq_sz = be32_to_cpup(p++); 1476 sess->back_channel.maxresp_sz = be32_to_cpup(p++); 1477 sess->back_channel.maxresp_cached = be32_to_cpup(p++); 1478 sess->back_channel.maxops = be32_to_cpup(p++); 1479 sess->back_channel.maxreqs = be32_to_cpup(p++); 1480 sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++); 1481 if (sess->back_channel.nr_rdma_attrs == 1) { 1482 READ_BUF(4); 1483 sess->back_channel.rdma_attrs = be32_to_cpup(p++); 1484 } else if (sess->back_channel.nr_rdma_attrs > 1) { 1485 dprintk("Too many back channel attr bitmaps!\n"); 1486 goto xdr_error; 1487 } 1488 1489 READ_BUF(4); 1490 sess->callback_prog = be32_to_cpup(p++); 1491 nfsd4_decode_cb_sec(argp, &sess->cb_sec); 1492 DECODE_TAIL; 1493 } 1494 1495 static __be32 1496 nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, 1497 struct nfsd4_destroy_session *destroy_session) 1498 { 1499 DECODE_HEAD; 1500 READ_BUF(NFS4_MAX_SESSIONID_LEN); 1501 COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN); 1502 1503 DECODE_TAIL; 1504 } 1505 1506 static __be32 1507 nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, 1508 struct nfsd4_free_stateid *free_stateid) 1509 { 1510 DECODE_HEAD; 1511 1512 READ_BUF(sizeof(stateid_t)); 1513 free_stateid->fr_stateid.si_generation = be32_to_cpup(p++); 1514 COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t)); 1515 1516 DECODE_TAIL; 1517 } 1518 1519 static __be32 1520 nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, 1521 struct nfsd4_sequence *seq) 1522 { 1523 DECODE_HEAD; 1524 1525 READ_BUF(NFS4_MAX_SESSIONID_LEN + 16); 1526 COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN); 1527 seq->seqid = be32_to_cpup(p++); 1528 seq->slotid = be32_to_cpup(p++); 1529 seq->maxslots = be32_to_cpup(p++); 1530 seq->cachethis = be32_to_cpup(p++); 1531 1532 DECODE_TAIL; 1533 } 1534 1535 static __be32 1536 nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid) 1537 { 1538 int i; 1539 __be32 *p, status; 1540 struct nfsd4_test_stateid_id *stateid; 1541 1542 READ_BUF(4); 1543 test_stateid->ts_num_ids = ntohl(*p++); 1544 1545 INIT_LIST_HEAD(&test_stateid->ts_stateid_list); 1546 1547 for (i = 0; i < test_stateid->ts_num_ids; i++) { 1548 stateid = svcxdr_tmpalloc(argp, sizeof(*stateid)); 1549 if (!stateid) { 1550 status = nfserrno(-ENOMEM); 1551 goto out; 1552 } 1553 1554 INIT_LIST_HEAD(&stateid->ts_id_list); 1555 list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); 1556 1557 status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid); 1558 if (status) 1559 goto out; 1560 } 1561 1562 status = 0; 1563 out: 1564 return status; 1565 xdr_error: 1566 dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__); 1567 status = nfserr_bad_xdr; 1568 goto out; 1569 } 1570 1571 static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc) 1572 { 1573 DECODE_HEAD; 1574 1575 READ_BUF(8); 1576 COPYMEM(&dc->clientid, 8); 1577 1578 DECODE_TAIL; 1579 } 1580 1581 static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc) 1582 { 1583 DECODE_HEAD; 1584 1585 READ_BUF(4); 1586 rc->rca_one_fs = be32_to_cpup(p++); 1587 1588 DECODE_TAIL; 1589 } 1590 1591 #ifdef CONFIG_NFSD_PNFS 1592 static __be32 1593 nfsd4_decode_getdeviceinfo(struct nfsd4_compoundargs *argp, 1594 struct nfsd4_getdeviceinfo *gdev) 1595 { 1596 DECODE_HEAD; 1597 u32 num, i; 1598 1599 READ_BUF(sizeof(struct nfsd4_deviceid) + 3 * 4); 1600 COPYMEM(&gdev->gd_devid, sizeof(struct nfsd4_deviceid)); 1601 gdev->gd_layout_type = be32_to_cpup(p++); 1602 gdev->gd_maxcount = be32_to_cpup(p++); 1603 num = be32_to_cpup(p++); 1604 if (num) { 1605 if (num > 1000) 1606 goto xdr_error; 1607 READ_BUF(4 * num); 1608 gdev->gd_notify_types = be32_to_cpup(p++); 1609 for (i = 1; i < num; i++) { 1610 if (be32_to_cpup(p++)) { 1611 status = nfserr_inval; 1612 goto out; 1613 } 1614 } 1615 } 1616 DECODE_TAIL; 1617 } 1618 1619 static __be32 1620 nfsd4_decode_layoutget(struct nfsd4_compoundargs *argp, 1621 struct nfsd4_layoutget *lgp) 1622 { 1623 DECODE_HEAD; 1624 1625 READ_BUF(36); 1626 lgp->lg_signal = be32_to_cpup(p++); 1627 lgp->lg_layout_type = be32_to_cpup(p++); 1628 lgp->lg_seg.iomode = be32_to_cpup(p++); 1629 p = xdr_decode_hyper(p, &lgp->lg_seg.offset); 1630 p = xdr_decode_hyper(p, &lgp->lg_seg.length); 1631 p = xdr_decode_hyper(p, &lgp->lg_minlength); 1632 1633 status = nfsd4_decode_stateid(argp, &lgp->lg_sid); 1634 if (status) 1635 return status; 1636 1637 READ_BUF(4); 1638 lgp->lg_maxcount = be32_to_cpup(p++); 1639 1640 DECODE_TAIL; 1641 } 1642 1643 static __be32 1644 nfsd4_decode_layoutcommit(struct nfsd4_compoundargs *argp, 1645 struct nfsd4_layoutcommit *lcp) 1646 { 1647 DECODE_HEAD; 1648 u32 timechange; 1649 1650 READ_BUF(20); 1651 p = xdr_decode_hyper(p, &lcp->lc_seg.offset); 1652 p = xdr_decode_hyper(p, &lcp->lc_seg.length); 1653 lcp->lc_reclaim = be32_to_cpup(p++); 1654 1655 status = nfsd4_decode_stateid(argp, &lcp->lc_sid); 1656 if (status) 1657 return status; 1658 1659 READ_BUF(4); 1660 lcp->lc_newoffset = be32_to_cpup(p++); 1661 if (lcp->lc_newoffset) { 1662 READ_BUF(8); 1663 p = xdr_decode_hyper(p, &lcp->lc_last_wr); 1664 } else 1665 lcp->lc_last_wr = 0; 1666 READ_BUF(4); 1667 timechange = be32_to_cpup(p++); 1668 if (timechange) { 1669 status = nfsd4_decode_time(argp, &lcp->lc_mtime); 1670 if (status) 1671 return status; 1672 } else { 1673 lcp->lc_mtime.tv_nsec = UTIME_NOW; 1674 } 1675 READ_BUF(8); 1676 lcp->lc_layout_type = be32_to_cpup(p++); 1677 1678 /* 1679 * Save the layout update in XDR format and let the layout driver deal 1680 * with it later. 1681 */ 1682 lcp->lc_up_len = be32_to_cpup(p++); 1683 if (lcp->lc_up_len > 0) { 1684 READ_BUF(lcp->lc_up_len); 1685 READMEM(lcp->lc_up_layout, lcp->lc_up_len); 1686 } 1687 1688 DECODE_TAIL; 1689 } 1690 1691 static __be32 1692 nfsd4_decode_layoutreturn(struct nfsd4_compoundargs *argp, 1693 struct nfsd4_layoutreturn *lrp) 1694 { 1695 DECODE_HEAD; 1696 1697 READ_BUF(16); 1698 lrp->lr_reclaim = be32_to_cpup(p++); 1699 lrp->lr_layout_type = be32_to_cpup(p++); 1700 lrp->lr_seg.iomode = be32_to_cpup(p++); 1701 lrp->lr_return_type = be32_to_cpup(p++); 1702 if (lrp->lr_return_type == RETURN_FILE) { 1703 READ_BUF(16); 1704 p = xdr_decode_hyper(p, &lrp->lr_seg.offset); 1705 p = xdr_decode_hyper(p, &lrp->lr_seg.length); 1706 1707 status = nfsd4_decode_stateid(argp, &lrp->lr_sid); 1708 if (status) 1709 return status; 1710 1711 READ_BUF(4); 1712 lrp->lrf_body_len = be32_to_cpup(p++); 1713 if (lrp->lrf_body_len > 0) { 1714 READ_BUF(lrp->lrf_body_len); 1715 READMEM(lrp->lrf_body, lrp->lrf_body_len); 1716 } 1717 } else { 1718 lrp->lr_seg.offset = 0; 1719 lrp->lr_seg.length = NFS4_MAX_UINT64; 1720 } 1721 1722 DECODE_TAIL; 1723 } 1724 #endif /* CONFIG_NFSD_PNFS */ 1725 1726 static __be32 1727 nfsd4_decode_fallocate(struct nfsd4_compoundargs *argp, 1728 struct nfsd4_fallocate *fallocate) 1729 { 1730 DECODE_HEAD; 1731 1732 status = nfsd4_decode_stateid(argp, &fallocate->falloc_stateid); 1733 if (status) 1734 return status; 1735 1736 READ_BUF(16); 1737 p = xdr_decode_hyper(p, &fallocate->falloc_offset); 1738 xdr_decode_hyper(p, &fallocate->falloc_length); 1739 1740 DECODE_TAIL; 1741 } 1742 1743 static __be32 1744 nfsd4_decode_clone(struct nfsd4_compoundargs *argp, struct nfsd4_clone *clone) 1745 { 1746 DECODE_HEAD; 1747 1748 status = nfsd4_decode_stateid(argp, &clone->cl_src_stateid); 1749 if (status) 1750 return status; 1751 status = nfsd4_decode_stateid(argp, &clone->cl_dst_stateid); 1752 if (status) 1753 return status; 1754 1755 READ_BUF(8 + 8 + 8); 1756 p = xdr_decode_hyper(p, &clone->cl_src_pos); 1757 p = xdr_decode_hyper(p, &clone->cl_dst_pos); 1758 p = xdr_decode_hyper(p, &clone->cl_count); 1759 DECODE_TAIL; 1760 } 1761 1762 static __be32 nfsd4_decode_nl4_server(struct nfsd4_compoundargs *argp, 1763 struct nl4_server *ns) 1764 { 1765 DECODE_HEAD; 1766 struct nfs42_netaddr *naddr; 1767 1768 READ_BUF(4); 1769 ns->nl4_type = be32_to_cpup(p++); 1770 1771 /* currently support for 1 inter-server source server */ 1772 switch (ns->nl4_type) { 1773 case NL4_NETADDR: 1774 naddr = &ns->u.nl4_addr; 1775 1776 READ_BUF(4); 1777 naddr->netid_len = be32_to_cpup(p++); 1778 if (naddr->netid_len > RPCBIND_MAXNETIDLEN) 1779 goto xdr_error; 1780 1781 READ_BUF(naddr->netid_len + 4); /* 4 for uaddr len */ 1782 COPYMEM(naddr->netid, naddr->netid_len); 1783 1784 naddr->addr_len = be32_to_cpup(p++); 1785 if (naddr->addr_len > RPCBIND_MAXUADDRLEN) 1786 goto xdr_error; 1787 1788 READ_BUF(naddr->addr_len); 1789 COPYMEM(naddr->addr, naddr->addr_len); 1790 break; 1791 default: 1792 goto xdr_error; 1793 } 1794 DECODE_TAIL; 1795 } 1796 1797 static __be32 1798 nfsd4_decode_copy(struct nfsd4_compoundargs *argp, struct nfsd4_copy *copy) 1799 { 1800 DECODE_HEAD; 1801 struct nl4_server *ns_dummy; 1802 int i, count; 1803 1804 status = nfsd4_decode_stateid(argp, ©->cp_src_stateid); 1805 if (status) 1806 return status; 1807 status = nfsd4_decode_stateid(argp, ©->cp_dst_stateid); 1808 if (status) 1809 return status; 1810 1811 READ_BUF(8 + 8 + 8 + 4 + 4 + 4); 1812 p = xdr_decode_hyper(p, ©->cp_src_pos); 1813 p = xdr_decode_hyper(p, ©->cp_dst_pos); 1814 p = xdr_decode_hyper(p, ©->cp_count); 1815 p++; /* ca_consecutive: we always do consecutive copies */ 1816 copy->cp_synchronous = be32_to_cpup(p++); 1817 1818 count = be32_to_cpup(p++); 1819 1820 copy->cp_intra = false; 1821 if (count == 0) { /* intra-server copy */ 1822 copy->cp_intra = true; 1823 goto intra; 1824 } 1825 1826 /* decode all the supplied server addresses but use first */ 1827 status = nfsd4_decode_nl4_server(argp, ©->cp_src); 1828 if (status) 1829 return status; 1830 1831 ns_dummy = kmalloc(sizeof(struct nl4_server), GFP_KERNEL); 1832 if (ns_dummy == NULL) 1833 return nfserrno(-ENOMEM); 1834 for (i = 0; i < count - 1; i++) { 1835 status = nfsd4_decode_nl4_server(argp, ns_dummy); 1836 if (status) { 1837 kfree(ns_dummy); 1838 return status; 1839 } 1840 } 1841 kfree(ns_dummy); 1842 intra: 1843 1844 DECODE_TAIL; 1845 } 1846 1847 static __be32 1848 nfsd4_decode_offload_status(struct nfsd4_compoundargs *argp, 1849 struct nfsd4_offload_status *os) 1850 { 1851 return nfsd4_decode_stateid(argp, &os->stateid); 1852 } 1853 1854 static __be32 1855 nfsd4_decode_copy_notify(struct nfsd4_compoundargs *argp, 1856 struct nfsd4_copy_notify *cn) 1857 { 1858 int status; 1859 1860 status = nfsd4_decode_stateid(argp, &cn->cpn_src_stateid); 1861 if (status) 1862 return status; 1863 return nfsd4_decode_nl4_server(argp, &cn->cpn_dst); 1864 } 1865 1866 static __be32 1867 nfsd4_decode_seek(struct nfsd4_compoundargs *argp, struct nfsd4_seek *seek) 1868 { 1869 DECODE_HEAD; 1870 1871 status = nfsd4_decode_stateid(argp, &seek->seek_stateid); 1872 if (status) 1873 return status; 1874 1875 READ_BUF(8 + 4); 1876 p = xdr_decode_hyper(p, &seek->seek_offset); 1877 seek->seek_whence = be32_to_cpup(p); 1878 1879 DECODE_TAIL; 1880 } 1881 1882 /* 1883 * XDR data that is more than PAGE_SIZE in size is normally part of a 1884 * read or write. However, the size of extended attributes is limited 1885 * by the maximum request size, and then further limited by the underlying 1886 * filesystem limits. This can exceed PAGE_SIZE (currently, XATTR_SIZE_MAX 1887 * is 64k). Since there is no kvec- or page-based interface to xattrs, 1888 * and we're not dealing with contiguous pages, we need to do some copying. 1889 */ 1890 1891 /* 1892 * Decode data into buffer. Uses head and pages constructed by 1893 * svcxdr_construct_vector. 1894 */ 1895 static __be32 1896 nfsd4_vbuf_from_vector(struct nfsd4_compoundargs *argp, struct kvec *head, 1897 struct page **pages, char **bufp, u32 buflen) 1898 { 1899 char *tmp, *dp; 1900 u32 len; 1901 1902 if (buflen <= head->iov_len) { 1903 /* 1904 * We're in luck, the head has enough space. Just return 1905 * the head, no need for copying. 1906 */ 1907 *bufp = head->iov_base; 1908 return 0; 1909 } 1910 1911 tmp = svcxdr_tmpalloc(argp, buflen); 1912 if (tmp == NULL) 1913 return nfserr_jukebox; 1914 1915 dp = tmp; 1916 memcpy(dp, head->iov_base, head->iov_len); 1917 buflen -= head->iov_len; 1918 dp += head->iov_len; 1919 1920 while (buflen > 0) { 1921 len = min_t(u32, buflen, PAGE_SIZE); 1922 memcpy(dp, page_address(*pages), len); 1923 1924 buflen -= len; 1925 dp += len; 1926 pages++; 1927 } 1928 1929 *bufp = tmp; 1930 return 0; 1931 } 1932 1933 /* 1934 * Get a user extended attribute name from the XDR buffer. 1935 * It will not have the "user." prefix, so prepend it. 1936 * Lastly, check for nul characters in the name. 1937 */ 1938 static __be32 1939 nfsd4_decode_xattr_name(struct nfsd4_compoundargs *argp, char **namep) 1940 { 1941 DECODE_HEAD; 1942 char *name, *sp, *dp; 1943 u32 namelen, cnt; 1944 1945 READ_BUF(4); 1946 namelen = be32_to_cpup(p++); 1947 1948 if (namelen > (XATTR_NAME_MAX - XATTR_USER_PREFIX_LEN)) 1949 return nfserr_nametoolong; 1950 1951 if (namelen == 0) 1952 goto xdr_error; 1953 1954 READ_BUF(namelen); 1955 1956 name = svcxdr_tmpalloc(argp, namelen + XATTR_USER_PREFIX_LEN + 1); 1957 if (!name) 1958 return nfserr_jukebox; 1959 1960 memcpy(name, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN); 1961 1962 /* 1963 * Copy the extended attribute name over while checking for 0 1964 * characters. 1965 */ 1966 sp = (char *)p; 1967 dp = name + XATTR_USER_PREFIX_LEN; 1968 cnt = namelen; 1969 1970 while (cnt-- > 0) { 1971 if (*sp == '\0') 1972 goto xdr_error; 1973 *dp++ = *sp++; 1974 } 1975 *dp = '\0'; 1976 1977 *namep = name; 1978 1979 DECODE_TAIL; 1980 } 1981 1982 /* 1983 * A GETXATTR op request comes without a length specifier. We just set the 1984 * maximum length for the reply based on XATTR_SIZE_MAX and the maximum 1985 * channel reply size. nfsd_getxattr will probe the length of the xattr, 1986 * check it against getxa_len, and allocate + return the value. 1987 */ 1988 static __be32 1989 nfsd4_decode_getxattr(struct nfsd4_compoundargs *argp, 1990 struct nfsd4_getxattr *getxattr) 1991 { 1992 __be32 status; 1993 u32 maxcount; 1994 1995 status = nfsd4_decode_xattr_name(argp, &getxattr->getxa_name); 1996 if (status) 1997 return status; 1998 1999 maxcount = svc_max_payload(argp->rqstp); 2000 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2001 2002 getxattr->getxa_len = maxcount; 2003 2004 return status; 2005 } 2006 2007 static __be32 2008 nfsd4_decode_setxattr(struct nfsd4_compoundargs *argp, 2009 struct nfsd4_setxattr *setxattr) 2010 { 2011 DECODE_HEAD; 2012 u32 flags, maxcount, size; 2013 struct kvec head; 2014 struct page **pagelist; 2015 2016 READ_BUF(4); 2017 flags = be32_to_cpup(p++); 2018 2019 if (flags > SETXATTR4_REPLACE) 2020 return nfserr_inval; 2021 setxattr->setxa_flags = flags; 2022 2023 status = nfsd4_decode_xattr_name(argp, &setxattr->setxa_name); 2024 if (status) 2025 return status; 2026 2027 maxcount = svc_max_payload(argp->rqstp); 2028 maxcount = min_t(u32, XATTR_SIZE_MAX, maxcount); 2029 2030 READ_BUF(4); 2031 size = be32_to_cpup(p++); 2032 if (size > maxcount) 2033 return nfserr_xattr2big; 2034 2035 setxattr->setxa_len = size; 2036 if (size > 0) { 2037 status = svcxdr_construct_vector(argp, &head, &pagelist, size); 2038 if (status) 2039 return status; 2040 2041 status = nfsd4_vbuf_from_vector(argp, &head, pagelist, 2042 &setxattr->setxa_buf, size); 2043 } 2044 2045 DECODE_TAIL; 2046 } 2047 2048 static __be32 2049 nfsd4_decode_listxattrs(struct nfsd4_compoundargs *argp, 2050 struct nfsd4_listxattrs *listxattrs) 2051 { 2052 DECODE_HEAD; 2053 u32 maxcount; 2054 2055 READ_BUF(12); 2056 p = xdr_decode_hyper(p, &listxattrs->lsxa_cookie); 2057 2058 /* 2059 * If the cookie is too large to have even one user.x attribute 2060 * plus trailing '\0' left in a maximum size buffer, it's invalid. 2061 */ 2062 if (listxattrs->lsxa_cookie >= 2063 (XATTR_LIST_MAX / (XATTR_USER_PREFIX_LEN + 2))) 2064 return nfserr_badcookie; 2065 2066 maxcount = be32_to_cpup(p++); 2067 if (maxcount < 8) 2068 /* Always need at least 2 words (length and one character) */ 2069 return nfserr_inval; 2070 2071 maxcount = min(maxcount, svc_max_payload(argp->rqstp)); 2072 listxattrs->lsxa_maxcount = maxcount; 2073 2074 DECODE_TAIL; 2075 } 2076 2077 static __be32 2078 nfsd4_decode_removexattr(struct nfsd4_compoundargs *argp, 2079 struct nfsd4_removexattr *removexattr) 2080 { 2081 return nfsd4_decode_xattr_name(argp, &removexattr->rmxa_name); 2082 } 2083 2084 static __be32 2085 nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p) 2086 { 2087 return nfs_ok; 2088 } 2089 2090 static __be32 2091 nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p) 2092 { 2093 return nfserr_notsupp; 2094 } 2095 2096 typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *); 2097 2098 static const nfsd4_dec nfsd4_dec_ops[] = { 2099 [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access, 2100 [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close, 2101 [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit, 2102 [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create, 2103 [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp, 2104 [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn, 2105 [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr, 2106 [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop, 2107 [OP_LINK] = (nfsd4_dec)nfsd4_decode_link, 2108 [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock, 2109 [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt, 2110 [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku, 2111 [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup, 2112 [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop, 2113 [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify, 2114 [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open, 2115 [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp, 2116 [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm, 2117 [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade, 2118 [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh, 2119 [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh, 2120 [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop, 2121 [OP_READ] = (nfsd4_dec)nfsd4_decode_read, 2122 [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir, 2123 [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop, 2124 [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove, 2125 [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename, 2126 [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew, 2127 [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop, 2128 [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop, 2129 [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo, 2130 [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr, 2131 [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid, 2132 [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm, 2133 [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify, 2134 [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write, 2135 [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner, 2136 2137 /* new operations for NFSv4.1 */ 2138 [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl, 2139 [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session, 2140 [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id, 2141 [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session, 2142 [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session, 2143 [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid, 2144 [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 2145 #ifdef CONFIG_NFSD_PNFS 2146 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_getdeviceinfo, 2147 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, 2148 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_layoutcommit, 2149 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_layoutget, 2150 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_layoutreturn, 2151 #else 2152 [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp, 2153 [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, 2154 [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp, 2155 [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp, 2156 [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp, 2157 #endif 2158 [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name, 2159 [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence, 2160 [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp, 2161 [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid, 2162 [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, 2163 [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid, 2164 [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete, 2165 2166 /* new operations for NFSv4.2 */ 2167 [OP_ALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate, 2168 [OP_COPY] = (nfsd4_dec)nfsd4_decode_copy, 2169 [OP_COPY_NOTIFY] = (nfsd4_dec)nfsd4_decode_copy_notify, 2170 [OP_DEALLOCATE] = (nfsd4_dec)nfsd4_decode_fallocate, 2171 [OP_IO_ADVISE] = (nfsd4_dec)nfsd4_decode_notsupp, 2172 [OP_LAYOUTERROR] = (nfsd4_dec)nfsd4_decode_notsupp, 2173 [OP_LAYOUTSTATS] = (nfsd4_dec)nfsd4_decode_notsupp, 2174 [OP_OFFLOAD_CANCEL] = (nfsd4_dec)nfsd4_decode_offload_status, 2175 [OP_OFFLOAD_STATUS] = (nfsd4_dec)nfsd4_decode_offload_status, 2176 [OP_READ_PLUS] = (nfsd4_dec)nfsd4_decode_notsupp, 2177 [OP_SEEK] = (nfsd4_dec)nfsd4_decode_seek, 2178 [OP_WRITE_SAME] = (nfsd4_dec)nfsd4_decode_notsupp, 2179 [OP_CLONE] = (nfsd4_dec)nfsd4_decode_clone, 2180 /* RFC 8276 extended atributes operations */ 2181 [OP_GETXATTR] = (nfsd4_dec)nfsd4_decode_getxattr, 2182 [OP_SETXATTR] = (nfsd4_dec)nfsd4_decode_setxattr, 2183 [OP_LISTXATTRS] = (nfsd4_dec)nfsd4_decode_listxattrs, 2184 [OP_REMOVEXATTR] = (nfsd4_dec)nfsd4_decode_removexattr, 2185 }; 2186 2187 static inline bool 2188 nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) 2189 { 2190 if (op->opnum < FIRST_NFS4_OP) 2191 return false; 2192 else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) 2193 return false; 2194 else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) 2195 return false; 2196 else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) 2197 return false; 2198 return true; 2199 } 2200 2201 static __be32 2202 nfsd4_decode_compound(struct nfsd4_compoundargs *argp) 2203 { 2204 DECODE_HEAD; 2205 struct nfsd4_op *op; 2206 bool cachethis = false; 2207 int auth_slack= argp->rqstp->rq_auth_slack; 2208 int max_reply = auth_slack + 8; /* opcnt, status */ 2209 int readcount = 0; 2210 int readbytes = 0; 2211 int i; 2212 2213 READ_BUF(4); 2214 argp->taglen = be32_to_cpup(p++); 2215 READ_BUF(argp->taglen); 2216 SAVEMEM(argp->tag, argp->taglen); 2217 READ_BUF(8); 2218 argp->minorversion = be32_to_cpup(p++); 2219 argp->opcnt = be32_to_cpup(p++); 2220 max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2); 2221 2222 if (argp->taglen > NFSD4_MAX_TAGLEN) 2223 goto xdr_error; 2224 /* 2225 * NFS4ERR_RESOURCE is a more helpful error than GARBAGE_ARGS 2226 * here, so we return success at the xdr level so that 2227 * nfsd4_proc can handle this is an NFS-level error. 2228 */ 2229 if (argp->opcnt > NFSD_MAX_OPS_PER_COMPOUND) 2230 return 0; 2231 2232 if (argp->opcnt > ARRAY_SIZE(argp->iops)) { 2233 argp->ops = kzalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL); 2234 if (!argp->ops) { 2235 argp->ops = argp->iops; 2236 dprintk("nfsd: couldn't allocate room for COMPOUND\n"); 2237 goto xdr_error; 2238 } 2239 } 2240 2241 if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) 2242 argp->opcnt = 0; 2243 2244 for (i = 0; i < argp->opcnt; i++) { 2245 op = &argp->ops[i]; 2246 op->replay = NULL; 2247 2248 READ_BUF(4); 2249 op->opnum = be32_to_cpup(p++); 2250 2251 if (nfsd4_opnum_in_range(argp, op)) 2252 op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); 2253 else { 2254 op->opnum = OP_ILLEGAL; 2255 op->status = nfserr_op_illegal; 2256 } 2257 op->opdesc = OPDESC(op); 2258 /* 2259 * We'll try to cache the result in the DRC if any one 2260 * op in the compound wants to be cached: 2261 */ 2262 cachethis |= nfsd4_cache_this_op(op); 2263 2264 if (op->opnum == OP_READ) { 2265 readcount++; 2266 readbytes += nfsd4_max_reply(argp->rqstp, op); 2267 } else 2268 max_reply += nfsd4_max_reply(argp->rqstp, op); 2269 /* 2270 * OP_LOCK and OP_LOCKT may return a conflicting lock. 2271 * (Special case because it will just skip encoding this 2272 * if it runs out of xdr buffer space, and it is the only 2273 * operation that behaves this way.) 2274 */ 2275 if (op->opnum == OP_LOCK || op->opnum == OP_LOCKT) 2276 max_reply += NFS4_OPAQUE_LIMIT; 2277 2278 if (op->status) { 2279 argp->opcnt = i+1; 2280 break; 2281 } 2282 } 2283 /* Sessions make the DRC unnecessary: */ 2284 if (argp->minorversion) 2285 cachethis = false; 2286 svc_reserve(argp->rqstp, max_reply + readbytes); 2287 argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; 2288 2289 if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) 2290 clear_bit(RQ_SPLICE_OK, &argp->rqstp->rq_flags); 2291 2292 DECODE_TAIL; 2293 } 2294 2295 static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode, 2296 struct svc_export *exp) 2297 { 2298 if (exp->ex_flags & NFSEXP_V4ROOT) { 2299 *p++ = cpu_to_be32(convert_to_wallclock(exp->cd->flush_time)); 2300 *p++ = 0; 2301 } else if (IS_I_VERSION(inode)) { 2302 p = xdr_encode_hyper(p, nfsd4_change_attribute(stat, inode)); 2303 } else { 2304 *p++ = cpu_to_be32(stat->ctime.tv_sec); 2305 *p++ = cpu_to_be32(stat->ctime.tv_nsec); 2306 } 2307 return p; 2308 } 2309 2310 /* 2311 * ctime (in NFSv4, time_metadata) is not writeable, and the client 2312 * doesn't really care what resolution could theoretically be stored by 2313 * the filesystem. 2314 * 2315 * The client cares how close together changes can be while still 2316 * guaranteeing ctime changes. For most filesystems (which have 2317 * timestamps with nanosecond fields) that is limited by the resolution 2318 * of the time returned from current_time() (which I'm assuming to be 2319 * 1/HZ). 2320 */ 2321 static __be32 *encode_time_delta(__be32 *p, struct inode *inode) 2322 { 2323 struct timespec64 ts; 2324 u32 ns; 2325 2326 ns = max_t(u32, NSEC_PER_SEC/HZ, inode->i_sb->s_time_gran); 2327 ts = ns_to_timespec64(ns); 2328 2329 p = xdr_encode_hyper(p, ts.tv_sec); 2330 *p++ = cpu_to_be32(ts.tv_nsec); 2331 2332 return p; 2333 } 2334 2335 static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c) 2336 { 2337 *p++ = cpu_to_be32(c->atomic); 2338 if (c->change_supported) { 2339 p = xdr_encode_hyper(p, c->before_change); 2340 p = xdr_encode_hyper(p, c->after_change); 2341 } else { 2342 *p++ = cpu_to_be32(c->before_ctime_sec); 2343 *p++ = cpu_to_be32(c->before_ctime_nsec); 2344 *p++ = cpu_to_be32(c->after_ctime_sec); 2345 *p++ = cpu_to_be32(c->after_ctime_nsec); 2346 } 2347 return p; 2348 } 2349 2350 /* Encode as an array of strings the string given with components 2351 * separated @sep, escaped with esc_enter and esc_exit. 2352 */ 2353 static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, 2354 char *components, char esc_enter, 2355 char esc_exit) 2356 { 2357 __be32 *p; 2358 __be32 pathlen; 2359 int pathlen_offset; 2360 int strlen, count=0; 2361 char *str, *end, *next; 2362 2363 dprintk("nfsd4_encode_components(%s)\n", components); 2364 2365 pathlen_offset = xdr->buf->len; 2366 p = xdr_reserve_space(xdr, 4); 2367 if (!p) 2368 return nfserr_resource; 2369 p++; /* We will fill this in with @count later */ 2370 2371 end = str = components; 2372 while (*end) { 2373 bool found_esc = false; 2374 2375 /* try to parse as esc_start, ..., esc_end, sep */ 2376 if (*str == esc_enter) { 2377 for (; *end && (*end != esc_exit); end++) 2378 /* find esc_exit or end of string */; 2379 next = end + 1; 2380 if (*end && (!*next || *next == sep)) { 2381 str++; 2382 found_esc = true; 2383 } 2384 } 2385 2386 if (!found_esc) 2387 for (; *end && (*end != sep); end++) 2388 /* find sep or end of string */; 2389 2390 strlen = end - str; 2391 if (strlen) { 2392 p = xdr_reserve_space(xdr, strlen + 4); 2393 if (!p) 2394 return nfserr_resource; 2395 p = xdr_encode_opaque(p, str, strlen); 2396 count++; 2397 } 2398 else 2399 end++; 2400 if (found_esc) 2401 end = next; 2402 2403 str = end; 2404 } 2405 pathlen = htonl(count); 2406 write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); 2407 return 0; 2408 } 2409 2410 /* Encode as an array of strings the string given with components 2411 * separated @sep. 2412 */ 2413 static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, 2414 char *components) 2415 { 2416 return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); 2417 } 2418 2419 /* 2420 * encode a location element of a fs_locations structure 2421 */ 2422 static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, 2423 struct nfsd4_fs_location *location) 2424 { 2425 __be32 status; 2426 2427 status = nfsd4_encode_components_esc(xdr, ':', location->hosts, 2428 '[', ']'); 2429 if (status) 2430 return status; 2431 status = nfsd4_encode_components(xdr, '/', location->path); 2432 if (status) 2433 return status; 2434 return 0; 2435 } 2436 2437 /* 2438 * Encode a path in RFC3530 'pathname4' format 2439 */ 2440 static __be32 nfsd4_encode_path(struct xdr_stream *xdr, 2441 const struct path *root, 2442 const struct path *path) 2443 { 2444 struct path cur = *path; 2445 __be32 *p; 2446 struct dentry **components = NULL; 2447 unsigned int ncomponents = 0; 2448 __be32 err = nfserr_jukebox; 2449 2450 dprintk("nfsd4_encode_components("); 2451 2452 path_get(&cur); 2453 /* First walk the path up to the nfsd root, and store the 2454 * dentries/path components in an array. 2455 */ 2456 for (;;) { 2457 if (path_equal(&cur, root)) 2458 break; 2459 if (cur.dentry == cur.mnt->mnt_root) { 2460 if (follow_up(&cur)) 2461 continue; 2462 goto out_free; 2463 } 2464 if ((ncomponents & 15) == 0) { 2465 struct dentry **new; 2466 new = krealloc(components, 2467 sizeof(*new) * (ncomponents + 16), 2468 GFP_KERNEL); 2469 if (!new) 2470 goto out_free; 2471 components = new; 2472 } 2473 components[ncomponents++] = cur.dentry; 2474 cur.dentry = dget_parent(cur.dentry); 2475 } 2476 err = nfserr_resource; 2477 p = xdr_reserve_space(xdr, 4); 2478 if (!p) 2479 goto out_free; 2480 *p++ = cpu_to_be32(ncomponents); 2481 2482 while (ncomponents) { 2483 struct dentry *dentry = components[ncomponents - 1]; 2484 unsigned int len; 2485 2486 spin_lock(&dentry->d_lock); 2487 len = dentry->d_name.len; 2488 p = xdr_reserve_space(xdr, len + 4); 2489 if (!p) { 2490 spin_unlock(&dentry->d_lock); 2491 goto out_free; 2492 } 2493 p = xdr_encode_opaque(p, dentry->d_name.name, len); 2494 dprintk("/%pd", dentry); 2495 spin_unlock(&dentry->d_lock); 2496 dput(dentry); 2497 ncomponents--; 2498 } 2499 2500 err = 0; 2501 out_free: 2502 dprintk(")\n"); 2503 while (ncomponents) 2504 dput(components[--ncomponents]); 2505 kfree(components); 2506 path_put(&cur); 2507 return err; 2508 } 2509 2510 static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr, 2511 struct svc_rqst *rqstp, const struct path *path) 2512 { 2513 struct svc_export *exp_ps; 2514 __be32 res; 2515 2516 exp_ps = rqst_find_fsidzero_export(rqstp); 2517 if (IS_ERR(exp_ps)) 2518 return nfserrno(PTR_ERR(exp_ps)); 2519 res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path); 2520 exp_put(exp_ps); 2521 return res; 2522 } 2523 2524 /* 2525 * encode a fs_locations structure 2526 */ 2527 static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr, 2528 struct svc_rqst *rqstp, struct svc_export *exp) 2529 { 2530 __be32 status; 2531 int i; 2532 __be32 *p; 2533 struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; 2534 2535 status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path); 2536 if (status) 2537 return status; 2538 p = xdr_reserve_space(xdr, 4); 2539 if (!p) 2540 return nfserr_resource; 2541 *p++ = cpu_to_be32(fslocs->locations_count); 2542 for (i=0; i<fslocs->locations_count; i++) { 2543 status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); 2544 if (status) 2545 return status; 2546 } 2547 return 0; 2548 } 2549 2550 static u32 nfs4_file_type(umode_t mode) 2551 { 2552 switch (mode & S_IFMT) { 2553 case S_IFIFO: return NF4FIFO; 2554 case S_IFCHR: return NF4CHR; 2555 case S_IFDIR: return NF4DIR; 2556 case S_IFBLK: return NF4BLK; 2557 case S_IFLNK: return NF4LNK; 2558 case S_IFREG: return NF4REG; 2559 case S_IFSOCK: return NF4SOCK; 2560 default: return NF4BAD; 2561 }; 2562 } 2563 2564 static inline __be32 2565 nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2566 struct nfs4_ace *ace) 2567 { 2568 if (ace->whotype != NFS4_ACL_WHO_NAMED) 2569 return nfs4_acl_write_who(xdr, ace->whotype); 2570 else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) 2571 return nfsd4_encode_group(xdr, rqstp, ace->who_gid); 2572 else 2573 return nfsd4_encode_user(xdr, rqstp, ace->who_uid); 2574 } 2575 2576 static inline __be32 2577 nfsd4_encode_layout_types(struct xdr_stream *xdr, u32 layout_types) 2578 { 2579 __be32 *p; 2580 unsigned long i = hweight_long(layout_types); 2581 2582 p = xdr_reserve_space(xdr, 4 + 4 * i); 2583 if (!p) 2584 return nfserr_resource; 2585 2586 *p++ = cpu_to_be32(i); 2587 2588 for (i = LAYOUT_NFSV4_1_FILES; i < LAYOUT_TYPE_MAX; ++i) 2589 if (layout_types & (1 << i)) 2590 *p++ = cpu_to_be32(i); 2591 2592 return 0; 2593 } 2594 2595 #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ 2596 FATTR4_WORD0_RDATTR_ERROR) 2597 #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID 2598 #define WORD2_ABSENT_FS_ATTRS 0 2599 2600 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2601 static inline __be32 2602 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2603 void *context, int len) 2604 { 2605 __be32 *p; 2606 2607 p = xdr_reserve_space(xdr, len + 4 + 4 + 4); 2608 if (!p) 2609 return nfserr_resource; 2610 2611 /* 2612 * For now we use a 0 here to indicate the null translation; in 2613 * the future we may place a call to translation code here. 2614 */ 2615 *p++ = cpu_to_be32(0); /* lfs */ 2616 *p++ = cpu_to_be32(0); /* pi */ 2617 p = xdr_encode_opaque(p, context, len); 2618 return 0; 2619 } 2620 #else 2621 static inline __be32 2622 nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, 2623 void *context, int len) 2624 { return 0; } 2625 #endif 2626 2627 static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *bmval2, u32 *rdattr_err) 2628 { 2629 /* As per referral draft: */ 2630 if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || 2631 *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { 2632 if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || 2633 *bmval0 & FATTR4_WORD0_FS_LOCATIONS) 2634 *rdattr_err = NFSERR_MOVED; 2635 else 2636 return nfserr_moved; 2637 } 2638 *bmval0 &= WORD0_ABSENT_FS_ATTRS; 2639 *bmval1 &= WORD1_ABSENT_FS_ATTRS; 2640 *bmval2 &= WORD2_ABSENT_FS_ATTRS; 2641 return 0; 2642 } 2643 2644 2645 static int get_parent_attributes(struct svc_export *exp, struct kstat *stat) 2646 { 2647 struct path path = exp->ex_path; 2648 int err; 2649 2650 path_get(&path); 2651 while (follow_up(&path)) { 2652 if (path.dentry != path.mnt->mnt_root) 2653 break; 2654 } 2655 err = vfs_getattr(&path, stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT); 2656 path_put(&path); 2657 return err; 2658 } 2659 2660 static __be32 2661 nfsd4_encode_bitmap(struct xdr_stream *xdr, u32 bmval0, u32 bmval1, u32 bmval2) 2662 { 2663 __be32 *p; 2664 2665 if (bmval2) { 2666 p = xdr_reserve_space(xdr, 16); 2667 if (!p) 2668 goto out_resource; 2669 *p++ = cpu_to_be32(3); 2670 *p++ = cpu_to_be32(bmval0); 2671 *p++ = cpu_to_be32(bmval1); 2672 *p++ = cpu_to_be32(bmval2); 2673 } else if (bmval1) { 2674 p = xdr_reserve_space(xdr, 12); 2675 if (!p) 2676 goto out_resource; 2677 *p++ = cpu_to_be32(2); 2678 *p++ = cpu_to_be32(bmval0); 2679 *p++ = cpu_to_be32(bmval1); 2680 } else { 2681 p = xdr_reserve_space(xdr, 8); 2682 if (!p) 2683 goto out_resource; 2684 *p++ = cpu_to_be32(1); 2685 *p++ = cpu_to_be32(bmval0); 2686 } 2687 2688 return 0; 2689 out_resource: 2690 return nfserr_resource; 2691 } 2692 2693 /* 2694 * Note: @fhp can be NULL; in this case, we might have to compose the filehandle 2695 * ourselves. 2696 */ 2697 static __be32 2698 nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, 2699 struct svc_export *exp, 2700 struct dentry *dentry, u32 *bmval, 2701 struct svc_rqst *rqstp, int ignore_crossmnt) 2702 { 2703 u32 bmval0 = bmval[0]; 2704 u32 bmval1 = bmval[1]; 2705 u32 bmval2 = bmval[2]; 2706 struct kstat stat; 2707 struct svc_fh *tempfh = NULL; 2708 struct kstatfs statfs; 2709 __be32 *p; 2710 int starting_len = xdr->buf->len; 2711 int attrlen_offset; 2712 __be32 attrlen; 2713 u32 dummy; 2714 u64 dummy64; 2715 u32 rdattr_err = 0; 2716 __be32 status; 2717 int err; 2718 struct nfs4_acl *acl = NULL; 2719 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2720 void *context = NULL; 2721 int contextlen; 2722 #endif 2723 bool contextsupport = false; 2724 struct nfsd4_compoundres *resp = rqstp->rq_resp; 2725 u32 minorversion = resp->cstate.minorversion; 2726 struct path path = { 2727 .mnt = exp->ex_path.mnt, 2728 .dentry = dentry, 2729 }; 2730 struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); 2731 2732 BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); 2733 BUG_ON(!nfsd_attrs_supported(minorversion, bmval)); 2734 2735 if (exp->ex_fslocs.migrated) { 2736 status = fattr_handle_absent_fs(&bmval0, &bmval1, &bmval2, &rdattr_err); 2737 if (status) 2738 goto out; 2739 } 2740 2741 err = vfs_getattr(&path, &stat, STATX_BASIC_STATS, AT_STATX_SYNC_AS_STAT); 2742 if (err) 2743 goto out_nfserr; 2744 if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE | 2745 FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) || 2746 (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE | 2747 FATTR4_WORD1_SPACE_TOTAL))) { 2748 err = vfs_statfs(&path, &statfs); 2749 if (err) 2750 goto out_nfserr; 2751 } 2752 if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) { 2753 tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); 2754 status = nfserr_jukebox; 2755 if (!tempfh) 2756 goto out; 2757 fh_init(tempfh, NFS4_FHSIZE); 2758 status = fh_compose(tempfh, exp, dentry, NULL); 2759 if (status) 2760 goto out; 2761 fhp = tempfh; 2762 } 2763 if (bmval0 & FATTR4_WORD0_ACL) { 2764 err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl); 2765 if (err == -EOPNOTSUPP) 2766 bmval0 &= ~FATTR4_WORD0_ACL; 2767 else if (err == -EINVAL) { 2768 status = nfserr_attrnotsupp; 2769 goto out; 2770 } else if (err != 0) 2771 goto out_nfserr; 2772 } 2773 2774 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 2775 if ((bmval2 & FATTR4_WORD2_SECURITY_LABEL) || 2776 bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 2777 if (exp->ex_flags & NFSEXP_SECURITY_LABEL) 2778 err = security_inode_getsecctx(d_inode(dentry), 2779 &context, &contextlen); 2780 else 2781 err = -EOPNOTSUPP; 2782 contextsupport = (err == 0); 2783 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 2784 if (err == -EOPNOTSUPP) 2785 bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL; 2786 else if (err) 2787 goto out_nfserr; 2788 } 2789 } 2790 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 2791 2792 status = nfsd4_encode_bitmap(xdr, bmval0, bmval1, bmval2); 2793 if (status) 2794 goto out; 2795 2796 attrlen_offset = xdr->buf->len; 2797 p = xdr_reserve_space(xdr, 4); 2798 if (!p) 2799 goto out_resource; 2800 p++; /* to be backfilled later */ 2801 2802 if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { 2803 u32 supp[3]; 2804 2805 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 2806 2807 if (!IS_POSIXACL(dentry->d_inode)) 2808 supp[0] &= ~FATTR4_WORD0_ACL; 2809 if (!contextsupport) 2810 supp[2] &= ~FATTR4_WORD2_SECURITY_LABEL; 2811 if (!supp[2]) { 2812 p = xdr_reserve_space(xdr, 12); 2813 if (!p) 2814 goto out_resource; 2815 *p++ = cpu_to_be32(2); 2816 *p++ = cpu_to_be32(supp[0]); 2817 *p++ = cpu_to_be32(supp[1]); 2818 } else { 2819 p = xdr_reserve_space(xdr, 16); 2820 if (!p) 2821 goto out_resource; 2822 *p++ = cpu_to_be32(3); 2823 *p++ = cpu_to_be32(supp[0]); 2824 *p++ = cpu_to_be32(supp[1]); 2825 *p++ = cpu_to_be32(supp[2]); 2826 } 2827 } 2828 if (bmval0 & FATTR4_WORD0_TYPE) { 2829 p = xdr_reserve_space(xdr, 4); 2830 if (!p) 2831 goto out_resource; 2832 dummy = nfs4_file_type(stat.mode); 2833 if (dummy == NF4BAD) { 2834 status = nfserr_serverfault; 2835 goto out; 2836 } 2837 *p++ = cpu_to_be32(dummy); 2838 } 2839 if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) { 2840 p = xdr_reserve_space(xdr, 4); 2841 if (!p) 2842 goto out_resource; 2843 if (exp->ex_flags & NFSEXP_NOSUBTREECHECK) 2844 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT); 2845 else 2846 *p++ = cpu_to_be32(NFS4_FH_PERSISTENT| 2847 NFS4_FH_VOL_RENAME); 2848 } 2849 if (bmval0 & FATTR4_WORD0_CHANGE) { 2850 p = xdr_reserve_space(xdr, 8); 2851 if (!p) 2852 goto out_resource; 2853 p = encode_change(p, &stat, d_inode(dentry), exp); 2854 } 2855 if (bmval0 & FATTR4_WORD0_SIZE) { 2856 p = xdr_reserve_space(xdr, 8); 2857 if (!p) 2858 goto out_resource; 2859 p = xdr_encode_hyper(p, stat.size); 2860 } 2861 if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { 2862 p = xdr_reserve_space(xdr, 4); 2863 if (!p) 2864 goto out_resource; 2865 *p++ = cpu_to_be32(1); 2866 } 2867 if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) { 2868 p = xdr_reserve_space(xdr, 4); 2869 if (!p) 2870 goto out_resource; 2871 *p++ = cpu_to_be32(1); 2872 } 2873 if (bmval0 & FATTR4_WORD0_NAMED_ATTR) { 2874 p = xdr_reserve_space(xdr, 4); 2875 if (!p) 2876 goto out_resource; 2877 *p++ = cpu_to_be32(0); 2878 } 2879 if (bmval0 & FATTR4_WORD0_FSID) { 2880 p = xdr_reserve_space(xdr, 16); 2881 if (!p) 2882 goto out_resource; 2883 if (exp->ex_fslocs.migrated) { 2884 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR); 2885 p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR); 2886 } else switch(fsid_source(fhp)) { 2887 case FSIDSOURCE_FSID: 2888 p = xdr_encode_hyper(p, (u64)exp->ex_fsid); 2889 p = xdr_encode_hyper(p, (u64)0); 2890 break; 2891 case FSIDSOURCE_DEV: 2892 *p++ = cpu_to_be32(0); 2893 *p++ = cpu_to_be32(MAJOR(stat.dev)); 2894 *p++ = cpu_to_be32(0); 2895 *p++ = cpu_to_be32(MINOR(stat.dev)); 2896 break; 2897 case FSIDSOURCE_UUID: 2898 p = xdr_encode_opaque_fixed(p, exp->ex_uuid, 2899 EX_UUID_LEN); 2900 break; 2901 } 2902 } 2903 if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) { 2904 p = xdr_reserve_space(xdr, 4); 2905 if (!p) 2906 goto out_resource; 2907 *p++ = cpu_to_be32(0); 2908 } 2909 if (bmval0 & FATTR4_WORD0_LEASE_TIME) { 2910 p = xdr_reserve_space(xdr, 4); 2911 if (!p) 2912 goto out_resource; 2913 *p++ = cpu_to_be32(nn->nfsd4_lease); 2914 } 2915 if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) { 2916 p = xdr_reserve_space(xdr, 4); 2917 if (!p) 2918 goto out_resource; 2919 *p++ = cpu_to_be32(rdattr_err); 2920 } 2921 if (bmval0 & FATTR4_WORD0_ACL) { 2922 struct nfs4_ace *ace; 2923 2924 if (acl == NULL) { 2925 p = xdr_reserve_space(xdr, 4); 2926 if (!p) 2927 goto out_resource; 2928 2929 *p++ = cpu_to_be32(0); 2930 goto out_acl; 2931 } 2932 p = xdr_reserve_space(xdr, 4); 2933 if (!p) 2934 goto out_resource; 2935 *p++ = cpu_to_be32(acl->naces); 2936 2937 for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) { 2938 p = xdr_reserve_space(xdr, 4*3); 2939 if (!p) 2940 goto out_resource; 2941 *p++ = cpu_to_be32(ace->type); 2942 *p++ = cpu_to_be32(ace->flag); 2943 *p++ = cpu_to_be32(ace->access_mask & 2944 NFS4_ACE_MASK_ALL); 2945 status = nfsd4_encode_aclname(xdr, rqstp, ace); 2946 if (status) 2947 goto out; 2948 } 2949 } 2950 out_acl: 2951 if (bmval0 & FATTR4_WORD0_ACLSUPPORT) { 2952 p = xdr_reserve_space(xdr, 4); 2953 if (!p) 2954 goto out_resource; 2955 *p++ = cpu_to_be32(IS_POSIXACL(dentry->d_inode) ? 2956 ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0); 2957 } 2958 if (bmval0 & FATTR4_WORD0_CANSETTIME) { 2959 p = xdr_reserve_space(xdr, 4); 2960 if (!p) 2961 goto out_resource; 2962 *p++ = cpu_to_be32(1); 2963 } 2964 if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) { 2965 p = xdr_reserve_space(xdr, 4); 2966 if (!p) 2967 goto out_resource; 2968 *p++ = cpu_to_be32(0); 2969 } 2970 if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) { 2971 p = xdr_reserve_space(xdr, 4); 2972 if (!p) 2973 goto out_resource; 2974 *p++ = cpu_to_be32(1); 2975 } 2976 if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) { 2977 p = xdr_reserve_space(xdr, 4); 2978 if (!p) 2979 goto out_resource; 2980 *p++ = cpu_to_be32(1); 2981 } 2982 if (bmval0 & FATTR4_WORD0_FILEHANDLE) { 2983 p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4); 2984 if (!p) 2985 goto out_resource; 2986 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, 2987 fhp->fh_handle.fh_size); 2988 } 2989 if (bmval0 & FATTR4_WORD0_FILEID) { 2990 p = xdr_reserve_space(xdr, 8); 2991 if (!p) 2992 goto out_resource; 2993 p = xdr_encode_hyper(p, stat.ino); 2994 } 2995 if (bmval0 & FATTR4_WORD0_FILES_AVAIL) { 2996 p = xdr_reserve_space(xdr, 8); 2997 if (!p) 2998 goto out_resource; 2999 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3000 } 3001 if (bmval0 & FATTR4_WORD0_FILES_FREE) { 3002 p = xdr_reserve_space(xdr, 8); 3003 if (!p) 3004 goto out_resource; 3005 p = xdr_encode_hyper(p, (u64) statfs.f_ffree); 3006 } 3007 if (bmval0 & FATTR4_WORD0_FILES_TOTAL) { 3008 p = xdr_reserve_space(xdr, 8); 3009 if (!p) 3010 goto out_resource; 3011 p = xdr_encode_hyper(p, (u64) statfs.f_files); 3012 } 3013 if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { 3014 status = nfsd4_encode_fs_locations(xdr, rqstp, exp); 3015 if (status) 3016 goto out; 3017 } 3018 if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) { 3019 p = xdr_reserve_space(xdr, 4); 3020 if (!p) 3021 goto out_resource; 3022 *p++ = cpu_to_be32(1); 3023 } 3024 if (bmval0 & FATTR4_WORD0_MAXFILESIZE) { 3025 p = xdr_reserve_space(xdr, 8); 3026 if (!p) 3027 goto out_resource; 3028 p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes); 3029 } 3030 if (bmval0 & FATTR4_WORD0_MAXLINK) { 3031 p = xdr_reserve_space(xdr, 4); 3032 if (!p) 3033 goto out_resource; 3034 *p++ = cpu_to_be32(255); 3035 } 3036 if (bmval0 & FATTR4_WORD0_MAXNAME) { 3037 p = xdr_reserve_space(xdr, 4); 3038 if (!p) 3039 goto out_resource; 3040 *p++ = cpu_to_be32(statfs.f_namelen); 3041 } 3042 if (bmval0 & FATTR4_WORD0_MAXREAD) { 3043 p = xdr_reserve_space(xdr, 8); 3044 if (!p) 3045 goto out_resource; 3046 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3047 } 3048 if (bmval0 & FATTR4_WORD0_MAXWRITE) { 3049 p = xdr_reserve_space(xdr, 8); 3050 if (!p) 3051 goto out_resource; 3052 p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); 3053 } 3054 if (bmval1 & FATTR4_WORD1_MODE) { 3055 p = xdr_reserve_space(xdr, 4); 3056 if (!p) 3057 goto out_resource; 3058 *p++ = cpu_to_be32(stat.mode & S_IALLUGO); 3059 } 3060 if (bmval1 & FATTR4_WORD1_NO_TRUNC) { 3061 p = xdr_reserve_space(xdr, 4); 3062 if (!p) 3063 goto out_resource; 3064 *p++ = cpu_to_be32(1); 3065 } 3066 if (bmval1 & FATTR4_WORD1_NUMLINKS) { 3067 p = xdr_reserve_space(xdr, 4); 3068 if (!p) 3069 goto out_resource; 3070 *p++ = cpu_to_be32(stat.nlink); 3071 } 3072 if (bmval1 & FATTR4_WORD1_OWNER) { 3073 status = nfsd4_encode_user(xdr, rqstp, stat.uid); 3074 if (status) 3075 goto out; 3076 } 3077 if (bmval1 & FATTR4_WORD1_OWNER_GROUP) { 3078 status = nfsd4_encode_group(xdr, rqstp, stat.gid); 3079 if (status) 3080 goto out; 3081 } 3082 if (bmval1 & FATTR4_WORD1_RAWDEV) { 3083 p = xdr_reserve_space(xdr, 8); 3084 if (!p) 3085 goto out_resource; 3086 *p++ = cpu_to_be32((u32) MAJOR(stat.rdev)); 3087 *p++ = cpu_to_be32((u32) MINOR(stat.rdev)); 3088 } 3089 if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) { 3090 p = xdr_reserve_space(xdr, 8); 3091 if (!p) 3092 goto out_resource; 3093 dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize; 3094 p = xdr_encode_hyper(p, dummy64); 3095 } 3096 if (bmval1 & FATTR4_WORD1_SPACE_FREE) { 3097 p = xdr_reserve_space(xdr, 8); 3098 if (!p) 3099 goto out_resource; 3100 dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize; 3101 p = xdr_encode_hyper(p, dummy64); 3102 } 3103 if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) { 3104 p = xdr_reserve_space(xdr, 8); 3105 if (!p) 3106 goto out_resource; 3107 dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize; 3108 p = xdr_encode_hyper(p, dummy64); 3109 } 3110 if (bmval1 & FATTR4_WORD1_SPACE_USED) { 3111 p = xdr_reserve_space(xdr, 8); 3112 if (!p) 3113 goto out_resource; 3114 dummy64 = (u64)stat.blocks << 9; 3115 p = xdr_encode_hyper(p, dummy64); 3116 } 3117 if (bmval1 & FATTR4_WORD1_TIME_ACCESS) { 3118 p = xdr_reserve_space(xdr, 12); 3119 if (!p) 3120 goto out_resource; 3121 p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec); 3122 *p++ = cpu_to_be32(stat.atime.tv_nsec); 3123 } 3124 if (bmval1 & FATTR4_WORD1_TIME_DELTA) { 3125 p = xdr_reserve_space(xdr, 12); 3126 if (!p) 3127 goto out_resource; 3128 p = encode_time_delta(p, d_inode(dentry)); 3129 } 3130 if (bmval1 & FATTR4_WORD1_TIME_METADATA) { 3131 p = xdr_reserve_space(xdr, 12); 3132 if (!p) 3133 goto out_resource; 3134 p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec); 3135 *p++ = cpu_to_be32(stat.ctime.tv_nsec); 3136 } 3137 if (bmval1 & FATTR4_WORD1_TIME_MODIFY) { 3138 p = xdr_reserve_space(xdr, 12); 3139 if (!p) 3140 goto out_resource; 3141 p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec); 3142 *p++ = cpu_to_be32(stat.mtime.tv_nsec); 3143 } 3144 if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) { 3145 struct kstat parent_stat; 3146 u64 ino = stat.ino; 3147 3148 p = xdr_reserve_space(xdr, 8); 3149 if (!p) 3150 goto out_resource; 3151 /* 3152 * Get parent's attributes if not ignoring crossmount 3153 * and this is the root of a cross-mounted filesystem. 3154 */ 3155 if (ignore_crossmnt == 0 && 3156 dentry == exp->ex_path.mnt->mnt_root) { 3157 err = get_parent_attributes(exp, &parent_stat); 3158 if (err) 3159 goto out_nfserr; 3160 ino = parent_stat.ino; 3161 } 3162 p = xdr_encode_hyper(p, ino); 3163 } 3164 #ifdef CONFIG_NFSD_PNFS 3165 if (bmval1 & FATTR4_WORD1_FS_LAYOUT_TYPES) { 3166 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3167 if (status) 3168 goto out; 3169 } 3170 3171 if (bmval2 & FATTR4_WORD2_LAYOUT_TYPES) { 3172 status = nfsd4_encode_layout_types(xdr, exp->ex_layout_types); 3173 if (status) 3174 goto out; 3175 } 3176 3177 if (bmval2 & FATTR4_WORD2_LAYOUT_BLKSIZE) { 3178 p = xdr_reserve_space(xdr, 4); 3179 if (!p) 3180 goto out_resource; 3181 *p++ = cpu_to_be32(stat.blksize); 3182 } 3183 #endif /* CONFIG_NFSD_PNFS */ 3184 if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) { 3185 u32 supp[3]; 3186 3187 memcpy(supp, nfsd_suppattrs[minorversion], sizeof(supp)); 3188 supp[0] &= NFSD_SUPPATTR_EXCLCREAT_WORD0; 3189 supp[1] &= NFSD_SUPPATTR_EXCLCREAT_WORD1; 3190 supp[2] &= NFSD_SUPPATTR_EXCLCREAT_WORD2; 3191 3192 status = nfsd4_encode_bitmap(xdr, supp[0], supp[1], supp[2]); 3193 if (status) 3194 goto out; 3195 } 3196 3197 if (bmval2 & FATTR4_WORD2_CHANGE_ATTR_TYPE) { 3198 p = xdr_reserve_space(xdr, 4); 3199 if (!p) 3200 goto out_resource; 3201 if (IS_I_VERSION(d_inode(dentry))) 3202 *p++ = cpu_to_be32(NFS4_CHANGE_TYPE_IS_MONOTONIC_INCR); 3203 else 3204 *p++ = cpu_to_be32(NFS4_CHANGE_TYPE_IS_TIME_METADATA); 3205 } 3206 3207 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3208 if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { 3209 status = nfsd4_encode_security_label(xdr, rqstp, context, 3210 contextlen); 3211 if (status) 3212 goto out; 3213 } 3214 #endif 3215 3216 if (bmval2 & FATTR4_WORD2_XATTR_SUPPORT) { 3217 p = xdr_reserve_space(xdr, 4); 3218 if (!p) 3219 goto out_resource; 3220 err = xattr_supported_namespace(d_inode(dentry), 3221 XATTR_USER_PREFIX); 3222 *p++ = cpu_to_be32(err == 0); 3223 } 3224 3225 attrlen = htonl(xdr->buf->len - attrlen_offset - 4); 3226 write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4); 3227 status = nfs_ok; 3228 3229 out: 3230 #ifdef CONFIG_NFSD_V4_SECURITY_LABEL 3231 if (context) 3232 security_release_secctx(context, contextlen); 3233 #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ 3234 kfree(acl); 3235 if (tempfh) { 3236 fh_put(tempfh); 3237 kfree(tempfh); 3238 } 3239 if (status) 3240 xdr_truncate_encode(xdr, starting_len); 3241 return status; 3242 out_nfserr: 3243 status = nfserrno(err); 3244 goto out; 3245 out_resource: 3246 status = nfserr_resource; 3247 goto out; 3248 } 3249 3250 static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr, 3251 struct xdr_buf *buf, __be32 *p, int bytes) 3252 { 3253 xdr->scratch.iov_len = 0; 3254 memset(buf, 0, sizeof(struct xdr_buf)); 3255 buf->head[0].iov_base = p; 3256 buf->head[0].iov_len = 0; 3257 buf->len = 0; 3258 xdr->buf = buf; 3259 xdr->iov = buf->head; 3260 xdr->p = p; 3261 xdr->end = (void *)p + bytes; 3262 buf->buflen = bytes; 3263 } 3264 3265 __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words, 3266 struct svc_fh *fhp, struct svc_export *exp, 3267 struct dentry *dentry, u32 *bmval, 3268 struct svc_rqst *rqstp, int ignore_crossmnt) 3269 { 3270 struct xdr_buf dummy; 3271 struct xdr_stream xdr; 3272 __be32 ret; 3273 3274 svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2); 3275 ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp, 3276 ignore_crossmnt); 3277 *p = xdr.p; 3278 return ret; 3279 } 3280 3281 static inline int attributes_need_mount(u32 *bmval) 3282 { 3283 if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME)) 3284 return 1; 3285 if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID) 3286 return 1; 3287 return 0; 3288 } 3289 3290 static __be32 3291 nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd, 3292 const char *name, int namlen) 3293 { 3294 struct svc_export *exp = cd->rd_fhp->fh_export; 3295 struct dentry *dentry; 3296 __be32 nfserr; 3297 int ignore_crossmnt = 0; 3298 3299 dentry = lookup_positive_unlocked(name, cd->rd_fhp->fh_dentry, namlen); 3300 if (IS_ERR(dentry)) 3301 return nfserrno(PTR_ERR(dentry)); 3302 3303 exp_get(exp); 3304 /* 3305 * In the case of a mountpoint, the client may be asking for 3306 * attributes that are only properties of the underlying filesystem 3307 * as opposed to the cross-mounted file system. In such a case, 3308 * we will not follow the cross mount and will fill the attribtutes 3309 * directly from the mountpoint dentry. 3310 */ 3311 if (nfsd_mountpoint(dentry, exp)) { 3312 int err; 3313 3314 if (!(exp->ex_flags & NFSEXP_V4ROOT) 3315 && !attributes_need_mount(cd->rd_bmval)) { 3316 ignore_crossmnt = 1; 3317 goto out_encode; 3318 } 3319 /* 3320 * Why the heck aren't we just using nfsd_lookup?? 3321 * Different "."/".." handling? Something else? 3322 * At least, add a comment here to explain.... 3323 */ 3324 err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp); 3325 if (err) { 3326 nfserr = nfserrno(err); 3327 goto out_put; 3328 } 3329 nfserr = check_nfsd_access(exp, cd->rd_rqstp); 3330 if (nfserr) 3331 goto out_put; 3332 3333 } 3334 out_encode: 3335 nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval, 3336 cd->rd_rqstp, ignore_crossmnt); 3337 out_put: 3338 dput(dentry); 3339 exp_put(exp); 3340 return nfserr; 3341 } 3342 3343 static __be32 * 3344 nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr) 3345 { 3346 __be32 *p; 3347 3348 p = xdr_reserve_space(xdr, 20); 3349 if (!p) 3350 return NULL; 3351 *p++ = htonl(2); 3352 *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */ 3353 *p++ = htonl(0); /* bmval1 */ 3354 3355 *p++ = htonl(4); /* attribute length */ 3356 *p++ = nfserr; /* no htonl */ 3357 return p; 3358 } 3359 3360 static int 3361 nfsd4_encode_dirent(void *ccdv, const char *name, int namlen, 3362 loff_t offset, u64 ino, unsigned int d_type) 3363 { 3364 struct readdir_cd *ccd = ccdv; 3365 struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common); 3366 struct xdr_stream *xdr = cd->xdr; 3367 int start_offset = xdr->buf->len; 3368 int cookie_offset; 3369 u32 name_and_cookie; 3370 int entry_bytes; 3371 __be32 nfserr = nfserr_toosmall; 3372 __be64 wire_offset; 3373 __be32 *p; 3374 3375 /* In nfsv4, "." and ".." never make it onto the wire.. */ 3376 if (name && isdotent(name, namlen)) { 3377 cd->common.err = nfs_ok; 3378 return 0; 3379 } 3380 3381 if (cd->cookie_offset) { 3382 wire_offset = cpu_to_be64(offset); 3383 write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset, 3384 &wire_offset, 8); 3385 } 3386 3387 p = xdr_reserve_space(xdr, 4); 3388 if (!p) 3389 goto fail; 3390 *p++ = xdr_one; /* mark entry present */ 3391 cookie_offset = xdr->buf->len; 3392 p = xdr_reserve_space(xdr, 3*4 + namlen); 3393 if (!p) 3394 goto fail; 3395 p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */ 3396 p = xdr_encode_array(p, name, namlen); /* name length & name */ 3397 3398 nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen); 3399 switch (nfserr) { 3400 case nfs_ok: 3401 break; 3402 case nfserr_resource: 3403 nfserr = nfserr_toosmall; 3404 goto fail; 3405 case nfserr_noent: 3406 xdr_truncate_encode(xdr, start_offset); 3407 goto skip_entry; 3408 default: 3409 /* 3410 * If the client requested the RDATTR_ERROR attribute, 3411 * we stuff the error code into this attribute 3412 * and continue. If this attribute was not requested, 3413 * then in accordance with the spec, we fail the 3414 * entire READDIR operation(!) 3415 */ 3416 if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)) 3417 goto fail; 3418 p = nfsd4_encode_rdattr_error(xdr, nfserr); 3419 if (p == NULL) { 3420 nfserr = nfserr_toosmall; 3421 goto fail; 3422 } 3423 } 3424 nfserr = nfserr_toosmall; 3425 entry_bytes = xdr->buf->len - start_offset; 3426 if (entry_bytes > cd->rd_maxcount) 3427 goto fail; 3428 cd->rd_maxcount -= entry_bytes; 3429 /* 3430 * RFC 3530 14.2.24 describes rd_dircount as only a "hint", so 3431 * let's always let through the first entry, at least: 3432 */ 3433 if (!cd->rd_dircount) 3434 goto fail; 3435 name_and_cookie = 4 + 4 * XDR_QUADLEN(namlen) + 8; 3436 if (name_and_cookie > cd->rd_dircount && cd->cookie_offset) 3437 goto fail; 3438 cd->rd_dircount -= min(cd->rd_dircount, name_and_cookie); 3439 3440 cd->cookie_offset = cookie_offset; 3441 skip_entry: 3442 cd->common.err = nfs_ok; 3443 return 0; 3444 fail: 3445 xdr_truncate_encode(xdr, start_offset); 3446 cd->common.err = nfserr; 3447 return -EINVAL; 3448 } 3449 3450 static __be32 3451 nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid) 3452 { 3453 __be32 *p; 3454 3455 p = xdr_reserve_space(xdr, sizeof(stateid_t)); 3456 if (!p) 3457 return nfserr_resource; 3458 *p++ = cpu_to_be32(sid->si_generation); 3459 p = xdr_encode_opaque_fixed(p, &sid->si_opaque, 3460 sizeof(stateid_opaque_t)); 3461 return 0; 3462 } 3463 3464 static __be32 3465 nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access) 3466 { 3467 struct xdr_stream *xdr = &resp->xdr; 3468 __be32 *p; 3469 3470 p = xdr_reserve_space(xdr, 8); 3471 if (!p) 3472 return nfserr_resource; 3473 *p++ = cpu_to_be32(access->ac_supported); 3474 *p++ = cpu_to_be32(access->ac_resp_access); 3475 return 0; 3476 } 3477 3478 static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts) 3479 { 3480 struct xdr_stream *xdr = &resp->xdr; 3481 __be32 *p; 3482 3483 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8); 3484 if (!p) 3485 return nfserr_resource; 3486 p = xdr_encode_opaque_fixed(p, bcts->sessionid.data, 3487 NFS4_MAX_SESSIONID_LEN); 3488 *p++ = cpu_to_be32(bcts->dir); 3489 /* Upshifting from TCP to RDMA is not supported */ 3490 *p++ = cpu_to_be32(0); 3491 return 0; 3492 } 3493 3494 static __be32 3495 nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close) 3496 { 3497 struct xdr_stream *xdr = &resp->xdr; 3498 3499 return nfsd4_encode_stateid(xdr, &close->cl_stateid); 3500 } 3501 3502 3503 static __be32 3504 nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit) 3505 { 3506 struct xdr_stream *xdr = &resp->xdr; 3507 __be32 *p; 3508 3509 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 3510 if (!p) 3511 return nfserr_resource; 3512 p = xdr_encode_opaque_fixed(p, commit->co_verf.data, 3513 NFS4_VERIFIER_SIZE); 3514 return 0; 3515 } 3516 3517 static __be32 3518 nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create) 3519 { 3520 struct xdr_stream *xdr = &resp->xdr; 3521 __be32 *p; 3522 3523 p = xdr_reserve_space(xdr, 20); 3524 if (!p) 3525 return nfserr_resource; 3526 encode_cinfo(p, &create->cr_cinfo); 3527 return nfsd4_encode_bitmap(xdr, create->cr_bmval[0], 3528 create->cr_bmval[1], create->cr_bmval[2]); 3529 } 3530 3531 static __be32 3532 nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr) 3533 { 3534 struct svc_fh *fhp = getattr->ga_fhp; 3535 struct xdr_stream *xdr = &resp->xdr; 3536 3537 return nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry, 3538 getattr->ga_bmval, resp->rqstp, 0); 3539 } 3540 3541 static __be32 3542 nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp) 3543 { 3544 struct xdr_stream *xdr = &resp->xdr; 3545 struct svc_fh *fhp = *fhpp; 3546 unsigned int len; 3547 __be32 *p; 3548 3549 len = fhp->fh_handle.fh_size; 3550 p = xdr_reserve_space(xdr, len + 4); 3551 if (!p) 3552 return nfserr_resource; 3553 p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len); 3554 return 0; 3555 } 3556 3557 /* 3558 * Including all fields other than the name, a LOCK4denied structure requires 3559 * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. 3560 */ 3561 static __be32 3562 nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) 3563 { 3564 struct xdr_netobj *conf = &ld->ld_owner; 3565 __be32 *p; 3566 3567 again: 3568 p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len)); 3569 if (!p) { 3570 /* 3571 * Don't fail to return the result just because we can't 3572 * return the conflicting open: 3573 */ 3574 if (conf->len) { 3575 kfree(conf->data); 3576 conf->len = 0; 3577 conf->data = NULL; 3578 goto again; 3579 } 3580 return nfserr_resource; 3581 } 3582 p = xdr_encode_hyper(p, ld->ld_start); 3583 p = xdr_encode_hyper(p, ld->ld_length); 3584 *p++ = cpu_to_be32(ld->ld_type); 3585 if (conf->len) { 3586 p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8); 3587 p = xdr_encode_opaque(p, conf->data, conf->len); 3588 kfree(conf->data); 3589 } else { /* non - nfsv4 lock in conflict, no clientid nor owner */ 3590 p = xdr_encode_hyper(p, (u64)0); /* clientid */ 3591 *p++ = cpu_to_be32(0); /* length of owner name */ 3592 } 3593 return nfserr_denied; 3594 } 3595 3596 static __be32 3597 nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock) 3598 { 3599 struct xdr_stream *xdr = &resp->xdr; 3600 3601 if (!nfserr) 3602 nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid); 3603 else if (nfserr == nfserr_denied) 3604 nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); 3605 3606 return nfserr; 3607 } 3608 3609 static __be32 3610 nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt) 3611 { 3612 struct xdr_stream *xdr = &resp->xdr; 3613 3614 if (nfserr == nfserr_denied) 3615 nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); 3616 return nfserr; 3617 } 3618 3619 static __be32 3620 nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku) 3621 { 3622 struct xdr_stream *xdr = &resp->xdr; 3623 3624 return nfsd4_encode_stateid(xdr, &locku->lu_stateid); 3625 } 3626 3627 3628 static __be32 3629 nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link) 3630 { 3631 struct xdr_stream *xdr = &resp->xdr; 3632 __be32 *p; 3633 3634 p = xdr_reserve_space(xdr, 20); 3635 if (!p) 3636 return nfserr_resource; 3637 p = encode_cinfo(p, &link->li_cinfo); 3638 return 0; 3639 } 3640 3641 3642 static __be32 3643 nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open) 3644 { 3645 struct xdr_stream *xdr = &resp->xdr; 3646 __be32 *p; 3647 3648 nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid); 3649 if (nfserr) 3650 return nfserr; 3651 p = xdr_reserve_space(xdr, 24); 3652 if (!p) 3653 return nfserr_resource; 3654 p = encode_cinfo(p, &open->op_cinfo); 3655 *p++ = cpu_to_be32(open->op_rflags); 3656 3657 nfserr = nfsd4_encode_bitmap(xdr, open->op_bmval[0], open->op_bmval[1], 3658 open->op_bmval[2]); 3659 if (nfserr) 3660 return nfserr; 3661 3662 p = xdr_reserve_space(xdr, 4); 3663 if (!p) 3664 return nfserr_resource; 3665 3666 *p++ = cpu_to_be32(open->op_delegate_type); 3667 switch (open->op_delegate_type) { 3668 case NFS4_OPEN_DELEGATE_NONE: 3669 break; 3670 case NFS4_OPEN_DELEGATE_READ: 3671 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3672 if (nfserr) 3673 return nfserr; 3674 p = xdr_reserve_space(xdr, 20); 3675 if (!p) 3676 return nfserr_resource; 3677 *p++ = cpu_to_be32(open->op_recall); 3678 3679 /* 3680 * TODO: ACE's in delegations 3681 */ 3682 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3683 *p++ = cpu_to_be32(0); 3684 *p++ = cpu_to_be32(0); 3685 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3686 break; 3687 case NFS4_OPEN_DELEGATE_WRITE: 3688 nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); 3689 if (nfserr) 3690 return nfserr; 3691 p = xdr_reserve_space(xdr, 32); 3692 if (!p) 3693 return nfserr_resource; 3694 *p++ = cpu_to_be32(0); 3695 3696 /* 3697 * TODO: space_limit's in delegations 3698 */ 3699 *p++ = cpu_to_be32(NFS4_LIMIT_SIZE); 3700 *p++ = cpu_to_be32(~(u32)0); 3701 *p++ = cpu_to_be32(~(u32)0); 3702 3703 /* 3704 * TODO: ACE's in delegations 3705 */ 3706 *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); 3707 *p++ = cpu_to_be32(0); 3708 *p++ = cpu_to_be32(0); 3709 *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ 3710 break; 3711 case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */ 3712 switch (open->op_why_no_deleg) { 3713 case WND4_CONTENTION: 3714 case WND4_RESOURCE: 3715 p = xdr_reserve_space(xdr, 8); 3716 if (!p) 3717 return nfserr_resource; 3718 *p++ = cpu_to_be32(open->op_why_no_deleg); 3719 /* deleg signaling not supported yet: */ 3720 *p++ = cpu_to_be32(0); 3721 break; 3722 default: 3723 p = xdr_reserve_space(xdr, 4); 3724 if (!p) 3725 return nfserr_resource; 3726 *p++ = cpu_to_be32(open->op_why_no_deleg); 3727 } 3728 break; 3729 default: 3730 BUG(); 3731 } 3732 /* XXX save filehandle here */ 3733 return 0; 3734 } 3735 3736 static __be32 3737 nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc) 3738 { 3739 struct xdr_stream *xdr = &resp->xdr; 3740 3741 return nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid); 3742 } 3743 3744 static __be32 3745 nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od) 3746 { 3747 struct xdr_stream *xdr = &resp->xdr; 3748 3749 return nfsd4_encode_stateid(xdr, &od->od_stateid); 3750 } 3751 3752 static __be32 nfsd4_encode_splice_read( 3753 struct nfsd4_compoundres *resp, 3754 struct nfsd4_read *read, 3755 struct file *file, unsigned long maxcount) 3756 { 3757 struct xdr_stream *xdr = &resp->xdr; 3758 struct xdr_buf *buf = xdr->buf; 3759 u32 eof; 3760 int space_left; 3761 __be32 nfserr; 3762 __be32 *p = xdr->p - 2; 3763 3764 /* Make sure there will be room for padding if needed */ 3765 if (xdr->end - xdr->p < 1) 3766 return nfserr_resource; 3767 3768 nfserr = nfsd_splice_read(read->rd_rqstp, read->rd_fhp, 3769 file, read->rd_offset, &maxcount, &eof); 3770 read->rd_length = maxcount; 3771 if (nfserr) { 3772 /* 3773 * nfsd_splice_actor may have already messed with the 3774 * page length; reset it so as not to confuse 3775 * xdr_truncate_encode: 3776 */ 3777 buf->page_len = 0; 3778 return nfserr; 3779 } 3780 3781 *(p++) = htonl(eof); 3782 *(p++) = htonl(maxcount); 3783 3784 buf->page_len = maxcount; 3785 buf->len += maxcount; 3786 xdr->page_ptr += (buf->page_base + maxcount + PAGE_SIZE - 1) 3787 / PAGE_SIZE; 3788 3789 /* Use rest of head for padding and remaining ops: */ 3790 buf->tail[0].iov_base = xdr->p; 3791 buf->tail[0].iov_len = 0; 3792 xdr->iov = buf->tail; 3793 if (maxcount&3) { 3794 int pad = 4 - (maxcount&3); 3795 3796 *(xdr->p++) = 0; 3797 3798 buf->tail[0].iov_base += maxcount&3; 3799 buf->tail[0].iov_len = pad; 3800 buf->len += pad; 3801 } 3802 3803 space_left = min_t(int, (void *)xdr->end - (void *)xdr->p, 3804 buf->buflen - buf->len); 3805 buf->buflen = buf->len + space_left; 3806 xdr->end = (__be32 *)((void *)xdr->end + space_left); 3807 3808 return 0; 3809 } 3810 3811 static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp, 3812 struct nfsd4_read *read, 3813 struct file *file, unsigned long maxcount) 3814 { 3815 struct xdr_stream *xdr = &resp->xdr; 3816 u32 eof; 3817 int v; 3818 int starting_len = xdr->buf->len - 8; 3819 long len; 3820 int thislen; 3821 __be32 nfserr; 3822 __be32 tmp; 3823 __be32 *p; 3824 int pad; 3825 3826 /* 3827 * svcrdma requires every READ payload to start somewhere 3828 * in xdr->pages. 3829 */ 3830 if (xdr->iov == xdr->buf->head) { 3831 xdr->iov = NULL; 3832 xdr->end = xdr->p; 3833 } 3834 3835 len = maxcount; 3836 v = 0; 3837 while (len) { 3838 thislen = min_t(long, len, PAGE_SIZE); 3839 p = xdr_reserve_space(xdr, thislen); 3840 WARN_ON_ONCE(!p); 3841 resp->rqstp->rq_vec[v].iov_base = p; 3842 resp->rqstp->rq_vec[v].iov_len = thislen; 3843 v++; 3844 len -= thislen; 3845 } 3846 read->rd_vlen = v; 3847 3848 nfserr = nfsd_readv(resp->rqstp, read->rd_fhp, file, read->rd_offset, 3849 resp->rqstp->rq_vec, read->rd_vlen, &maxcount, 3850 &eof); 3851 read->rd_length = maxcount; 3852 if (nfserr) 3853 return nfserr; 3854 if (svc_encode_read_payload(resp->rqstp, starting_len + 8, maxcount)) 3855 return nfserr_io; 3856 xdr_truncate_encode(xdr, starting_len + 8 + xdr_align_size(maxcount)); 3857 3858 tmp = htonl(eof); 3859 write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4); 3860 tmp = htonl(maxcount); 3861 write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4); 3862 3863 tmp = xdr_zero; 3864 pad = (maxcount&3) ? 4 - (maxcount&3) : 0; 3865 write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount, 3866 &tmp, pad); 3867 return 0; 3868 3869 } 3870 3871 static __be32 3872 nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr, 3873 struct nfsd4_read *read) 3874 { 3875 unsigned long maxcount; 3876 struct xdr_stream *xdr = &resp->xdr; 3877 struct file *file; 3878 int starting_len = xdr->buf->len; 3879 __be32 *p; 3880 3881 if (nfserr) 3882 return nfserr; 3883 file = read->rd_nf->nf_file; 3884 3885 p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */ 3886 if (!p) { 3887 WARN_ON_ONCE(test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)); 3888 return nfserr_resource; 3889 } 3890 if (resp->xdr.buf->page_len && 3891 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) { 3892 WARN_ON_ONCE(1); 3893 return nfserr_resource; 3894 } 3895 xdr_commit_encode(xdr); 3896 3897 maxcount = svc_max_payload(resp->rqstp); 3898 maxcount = min_t(unsigned long, maxcount, 3899 (xdr->buf->buflen - xdr->buf->len)); 3900 maxcount = min_t(unsigned long, maxcount, read->rd_length); 3901 3902 if (file->f_op->splice_read && 3903 test_bit(RQ_SPLICE_OK, &resp->rqstp->rq_flags)) 3904 nfserr = nfsd4_encode_splice_read(resp, read, file, maxcount); 3905 else 3906 nfserr = nfsd4_encode_readv(resp, read, file, maxcount); 3907 3908 if (nfserr) 3909 xdr_truncate_encode(xdr, starting_len); 3910 3911 return nfserr; 3912 } 3913 3914 static __be32 3915 nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink) 3916 { 3917 int maxcount; 3918 __be32 wire_count; 3919 int zero = 0; 3920 struct xdr_stream *xdr = &resp->xdr; 3921 int length_offset = xdr->buf->len; 3922 __be32 *p; 3923 3924 p = xdr_reserve_space(xdr, 4); 3925 if (!p) 3926 return nfserr_resource; 3927 maxcount = PAGE_SIZE; 3928 3929 p = xdr_reserve_space(xdr, maxcount); 3930 if (!p) 3931 return nfserr_resource; 3932 /* 3933 * XXX: By default, vfs_readlink() will truncate symlinks if they 3934 * would overflow the buffer. Is this kosher in NFSv4? If not, one 3935 * easy fix is: if vfs_readlink() precisely fills the buffer, assume 3936 * that truncation occurred, and return NFS4ERR_RESOURCE. 3937 */ 3938 nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, 3939 (char *)p, &maxcount); 3940 if (nfserr == nfserr_isdir) 3941 nfserr = nfserr_inval; 3942 if (nfserr) { 3943 xdr_truncate_encode(xdr, length_offset); 3944 return nfserr; 3945 } 3946 3947 wire_count = htonl(maxcount); 3948 write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4); 3949 xdr_truncate_encode(xdr, length_offset + 4 + ALIGN(maxcount, 4)); 3950 if (maxcount & 3) 3951 write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, 3952 &zero, 4 - (maxcount&3)); 3953 return 0; 3954 } 3955 3956 static __be32 3957 nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir) 3958 { 3959 int maxcount; 3960 int bytes_left; 3961 loff_t offset; 3962 __be64 wire_offset; 3963 struct xdr_stream *xdr = &resp->xdr; 3964 int starting_len = xdr->buf->len; 3965 __be32 *p; 3966 3967 p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); 3968 if (!p) 3969 return nfserr_resource; 3970 3971 /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */ 3972 *p++ = cpu_to_be32(0); 3973 *p++ = cpu_to_be32(0); 3974 resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p) 3975 - (char *)resp->xdr.buf->head[0].iov_base; 3976 3977 /* 3978 * Number of bytes left for directory entries allowing for the 3979 * final 8 bytes of the readdir and a following failed op: 3980 */ 3981 bytes_left = xdr->buf->buflen - xdr->buf->len 3982 - COMPOUND_ERR_SLACK_SPACE - 8; 3983 if (bytes_left < 0) { 3984 nfserr = nfserr_resource; 3985 goto err_no_verf; 3986 } 3987 maxcount = svc_max_payload(resp->rqstp); 3988 maxcount = min_t(u32, readdir->rd_maxcount, maxcount); 3989 /* 3990 * Note the rfc defines rd_maxcount as the size of the 3991 * READDIR4resok structure, which includes the verifier above 3992 * and the 8 bytes encoded at the end of this function: 3993 */ 3994 if (maxcount < 16) { 3995 nfserr = nfserr_toosmall; 3996 goto err_no_verf; 3997 } 3998 maxcount = min_t(int, maxcount-16, bytes_left); 3999 4000 /* RFC 3530 14.2.24 allows us to ignore dircount when it's 0: */ 4001 if (!readdir->rd_dircount) 4002 readdir->rd_dircount = svc_max_payload(resp->rqstp); 4003 4004 readdir->xdr = xdr; 4005 readdir->rd_maxcount = maxcount; 4006 readdir->common.err = 0; 4007 readdir->cookie_offset = 0; 4008 4009 offset = readdir->rd_cookie; 4010 nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp, 4011 &offset, 4012 &readdir->common, nfsd4_encode_dirent); 4013 if (nfserr == nfs_ok && 4014 readdir->common.err == nfserr_toosmall && 4015 xdr->buf->len == starting_len + 8) { 4016 /* nothing encoded; which limit did we hit?: */ 4017 if (maxcount - 16 < bytes_left) 4018 /* It was the fault of rd_maxcount: */ 4019 nfserr = nfserr_toosmall; 4020 else 4021 /* We ran out of buffer space: */ 4022 nfserr = nfserr_resource; 4023 } 4024 if (nfserr) 4025 goto err_no_verf; 4026 4027 if (readdir->cookie_offset) { 4028 wire_offset = cpu_to_be64(offset); 4029 write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset, 4030 &wire_offset, 8); 4031 } 4032 4033 p = xdr_reserve_space(xdr, 8); 4034 if (!p) { 4035 WARN_ON_ONCE(1); 4036 goto err_no_verf; 4037 } 4038 *p++ = 0; /* no more entries */ 4039 *p++ = htonl(readdir->common.err == nfserr_eof); 4040 4041 return 0; 4042 err_no_verf: 4043 xdr_truncate_encode(xdr, starting_len); 4044 return nfserr; 4045 } 4046 4047 static __be32 4048 nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove) 4049 { 4050 struct xdr_stream *xdr = &resp->xdr; 4051 __be32 *p; 4052 4053 p = xdr_reserve_space(xdr, 20); 4054 if (!p) 4055 return nfserr_resource; 4056 p = encode_cinfo(p, &remove->rm_cinfo); 4057 return 0; 4058 } 4059 4060 static __be32 4061 nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename) 4062 { 4063 struct xdr_stream *xdr = &resp->xdr; 4064 __be32 *p; 4065 4066 p = xdr_reserve_space(xdr, 40); 4067 if (!p) 4068 return nfserr_resource; 4069 p = encode_cinfo(p, &rename->rn_sinfo); 4070 p = encode_cinfo(p, &rename->rn_tinfo); 4071 return 0; 4072 } 4073 4074 static __be32 4075 nfsd4_do_encode_secinfo(struct xdr_stream *xdr, struct svc_export *exp) 4076 { 4077 u32 i, nflavs, supported; 4078 struct exp_flavor_info *flavs; 4079 struct exp_flavor_info def_flavs[2]; 4080 __be32 *p, *flavorsp; 4081 static bool report = true; 4082 4083 if (exp->ex_nflavors) { 4084 flavs = exp->ex_flavors; 4085 nflavs = exp->ex_nflavors; 4086 } else { /* Handling of some defaults in absence of real secinfo: */ 4087 flavs = def_flavs; 4088 if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) { 4089 nflavs = 2; 4090 flavs[0].pseudoflavor = RPC_AUTH_UNIX; 4091 flavs[1].pseudoflavor = RPC_AUTH_NULL; 4092 } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) { 4093 nflavs = 1; 4094 flavs[0].pseudoflavor 4095 = svcauth_gss_flavor(exp->ex_client); 4096 } else { 4097 nflavs = 1; 4098 flavs[0].pseudoflavor 4099 = exp->ex_client->flavour->flavour; 4100 } 4101 } 4102 4103 supported = 0; 4104 p = xdr_reserve_space(xdr, 4); 4105 if (!p) 4106 return nfserr_resource; 4107 flavorsp = p++; /* to be backfilled later */ 4108 4109 for (i = 0; i < nflavs; i++) { 4110 rpc_authflavor_t pf = flavs[i].pseudoflavor; 4111 struct rpcsec_gss_info info; 4112 4113 if (rpcauth_get_gssinfo(pf, &info) == 0) { 4114 supported++; 4115 p = xdr_reserve_space(xdr, 4 + 4 + 4116 XDR_LEN(info.oid.len) + 4 + 4); 4117 if (!p) 4118 return nfserr_resource; 4119 *p++ = cpu_to_be32(RPC_AUTH_GSS); 4120 p = xdr_encode_opaque(p, info.oid.data, info.oid.len); 4121 *p++ = cpu_to_be32(info.qop); 4122 *p++ = cpu_to_be32(info.service); 4123 } else if (pf < RPC_AUTH_MAXFLAVOR) { 4124 supported++; 4125 p = xdr_reserve_space(xdr, 4); 4126 if (!p) 4127 return nfserr_resource; 4128 *p++ = cpu_to_be32(pf); 4129 } else { 4130 if (report) 4131 pr_warn("NFS: SECINFO: security flavor %u " 4132 "is not supported\n", pf); 4133 } 4134 } 4135 4136 if (nflavs != supported) 4137 report = false; 4138 *flavorsp = htonl(supported); 4139 return 0; 4140 } 4141 4142 static __be32 4143 nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4144 struct nfsd4_secinfo *secinfo) 4145 { 4146 struct xdr_stream *xdr = &resp->xdr; 4147 4148 return nfsd4_do_encode_secinfo(xdr, secinfo->si_exp); 4149 } 4150 4151 static __be32 4152 nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr, 4153 struct nfsd4_secinfo_no_name *secinfo) 4154 { 4155 struct xdr_stream *xdr = &resp->xdr; 4156 4157 return nfsd4_do_encode_secinfo(xdr, secinfo->sin_exp); 4158 } 4159 4160 /* 4161 * The SETATTR encode routine is special -- it always encodes a bitmap, 4162 * regardless of the error status. 4163 */ 4164 static __be32 4165 nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr) 4166 { 4167 struct xdr_stream *xdr = &resp->xdr; 4168 __be32 *p; 4169 4170 p = xdr_reserve_space(xdr, 16); 4171 if (!p) 4172 return nfserr_resource; 4173 if (nfserr) { 4174 *p++ = cpu_to_be32(3); 4175 *p++ = cpu_to_be32(0); 4176 *p++ = cpu_to_be32(0); 4177 *p++ = cpu_to_be32(0); 4178 } 4179 else { 4180 *p++ = cpu_to_be32(3); 4181 *p++ = cpu_to_be32(setattr->sa_bmval[0]); 4182 *p++ = cpu_to_be32(setattr->sa_bmval[1]); 4183 *p++ = cpu_to_be32(setattr->sa_bmval[2]); 4184 } 4185 return nfserr; 4186 } 4187 4188 static __be32 4189 nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd) 4190 { 4191 struct xdr_stream *xdr = &resp->xdr; 4192 __be32 *p; 4193 4194 if (!nfserr) { 4195 p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE); 4196 if (!p) 4197 return nfserr_resource; 4198 p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8); 4199 p = xdr_encode_opaque_fixed(p, &scd->se_confirm, 4200 NFS4_VERIFIER_SIZE); 4201 } 4202 else if (nfserr == nfserr_clid_inuse) { 4203 p = xdr_reserve_space(xdr, 8); 4204 if (!p) 4205 return nfserr_resource; 4206 *p++ = cpu_to_be32(0); 4207 *p++ = cpu_to_be32(0); 4208 } 4209 return nfserr; 4210 } 4211 4212 static __be32 4213 nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write) 4214 { 4215 struct xdr_stream *xdr = &resp->xdr; 4216 __be32 *p; 4217 4218 p = xdr_reserve_space(xdr, 16); 4219 if (!p) 4220 return nfserr_resource; 4221 *p++ = cpu_to_be32(write->wr_bytes_written); 4222 *p++ = cpu_to_be32(write->wr_how_written); 4223 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4224 NFS4_VERIFIER_SIZE); 4225 return 0; 4226 } 4227 4228 static __be32 4229 nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr, 4230 struct nfsd4_exchange_id *exid) 4231 { 4232 struct xdr_stream *xdr = &resp->xdr; 4233 __be32 *p; 4234 char *major_id; 4235 char *server_scope; 4236 int major_id_sz; 4237 int server_scope_sz; 4238 uint64_t minor_id = 0; 4239 struct nfsd_net *nn = net_generic(SVC_NET(resp->rqstp), nfsd_net_id); 4240 4241 major_id = nn->nfsd_name; 4242 major_id_sz = strlen(nn->nfsd_name); 4243 server_scope = nn->nfsd_name; 4244 server_scope_sz = strlen(nn->nfsd_name); 4245 4246 p = xdr_reserve_space(xdr, 4247 8 /* eir_clientid */ + 4248 4 /* eir_sequenceid */ + 4249 4 /* eir_flags */ + 4250 4 /* spr_how */); 4251 if (!p) 4252 return nfserr_resource; 4253 4254 p = xdr_encode_opaque_fixed(p, &exid->clientid, 8); 4255 *p++ = cpu_to_be32(exid->seqid); 4256 *p++ = cpu_to_be32(exid->flags); 4257 4258 *p++ = cpu_to_be32(exid->spa_how); 4259 4260 switch (exid->spa_how) { 4261 case SP4_NONE: 4262 break; 4263 case SP4_MACH_CRED: 4264 /* spo_must_enforce bitmap: */ 4265 nfserr = nfsd4_encode_bitmap(xdr, 4266 exid->spo_must_enforce[0], 4267 exid->spo_must_enforce[1], 4268 exid->spo_must_enforce[2]); 4269 if (nfserr) 4270 return nfserr; 4271 /* spo_must_allow bitmap: */ 4272 nfserr = nfsd4_encode_bitmap(xdr, 4273 exid->spo_must_allow[0], 4274 exid->spo_must_allow[1], 4275 exid->spo_must_allow[2]); 4276 if (nfserr) 4277 return nfserr; 4278 break; 4279 default: 4280 WARN_ON_ONCE(1); 4281 } 4282 4283 p = xdr_reserve_space(xdr, 4284 8 /* so_minor_id */ + 4285 4 /* so_major_id.len */ + 4286 (XDR_QUADLEN(major_id_sz) * 4) + 4287 4 /* eir_server_scope.len */ + 4288 (XDR_QUADLEN(server_scope_sz) * 4) + 4289 4 /* eir_server_impl_id.count (0) */); 4290 if (!p) 4291 return nfserr_resource; 4292 4293 /* The server_owner struct */ 4294 p = xdr_encode_hyper(p, minor_id); /* Minor id */ 4295 /* major id */ 4296 p = xdr_encode_opaque(p, major_id, major_id_sz); 4297 4298 /* Server scope */ 4299 p = xdr_encode_opaque(p, server_scope, server_scope_sz); 4300 4301 /* Implementation id */ 4302 *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */ 4303 return 0; 4304 } 4305 4306 static __be32 4307 nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr, 4308 struct nfsd4_create_session *sess) 4309 { 4310 struct xdr_stream *xdr = &resp->xdr; 4311 __be32 *p; 4312 4313 p = xdr_reserve_space(xdr, 24); 4314 if (!p) 4315 return nfserr_resource; 4316 p = xdr_encode_opaque_fixed(p, sess->sessionid.data, 4317 NFS4_MAX_SESSIONID_LEN); 4318 *p++ = cpu_to_be32(sess->seqid); 4319 *p++ = cpu_to_be32(sess->flags); 4320 4321 p = xdr_reserve_space(xdr, 28); 4322 if (!p) 4323 return nfserr_resource; 4324 *p++ = cpu_to_be32(0); /* headerpadsz */ 4325 *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz); 4326 *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz); 4327 *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached); 4328 *p++ = cpu_to_be32(sess->fore_channel.maxops); 4329 *p++ = cpu_to_be32(sess->fore_channel.maxreqs); 4330 *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs); 4331 4332 if (sess->fore_channel.nr_rdma_attrs) { 4333 p = xdr_reserve_space(xdr, 4); 4334 if (!p) 4335 return nfserr_resource; 4336 *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs); 4337 } 4338 4339 p = xdr_reserve_space(xdr, 28); 4340 if (!p) 4341 return nfserr_resource; 4342 *p++ = cpu_to_be32(0); /* headerpadsz */ 4343 *p++ = cpu_to_be32(sess->back_channel.maxreq_sz); 4344 *p++ = cpu_to_be32(sess->back_channel.maxresp_sz); 4345 *p++ = cpu_to_be32(sess->back_channel.maxresp_cached); 4346 *p++ = cpu_to_be32(sess->back_channel.maxops); 4347 *p++ = cpu_to_be32(sess->back_channel.maxreqs); 4348 *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs); 4349 4350 if (sess->back_channel.nr_rdma_attrs) { 4351 p = xdr_reserve_space(xdr, 4); 4352 if (!p) 4353 return nfserr_resource; 4354 *p++ = cpu_to_be32(sess->back_channel.rdma_attrs); 4355 } 4356 return 0; 4357 } 4358 4359 static __be32 4360 nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr, 4361 struct nfsd4_sequence *seq) 4362 { 4363 struct xdr_stream *xdr = &resp->xdr; 4364 __be32 *p; 4365 4366 p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20); 4367 if (!p) 4368 return nfserr_resource; 4369 p = xdr_encode_opaque_fixed(p, seq->sessionid.data, 4370 NFS4_MAX_SESSIONID_LEN); 4371 *p++ = cpu_to_be32(seq->seqid); 4372 *p++ = cpu_to_be32(seq->slotid); 4373 /* Note slotid's are numbered from zero: */ 4374 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */ 4375 *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */ 4376 *p++ = cpu_to_be32(seq->status_flags); 4377 4378 resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */ 4379 return 0; 4380 } 4381 4382 static __be32 4383 nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr, 4384 struct nfsd4_test_stateid *test_stateid) 4385 { 4386 struct xdr_stream *xdr = &resp->xdr; 4387 struct nfsd4_test_stateid_id *stateid, *next; 4388 __be32 *p; 4389 4390 p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids)); 4391 if (!p) 4392 return nfserr_resource; 4393 *p++ = htonl(test_stateid->ts_num_ids); 4394 4395 list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) { 4396 *p++ = stateid->ts_id_status; 4397 } 4398 4399 return 0; 4400 } 4401 4402 #ifdef CONFIG_NFSD_PNFS 4403 static __be32 4404 nfsd4_encode_getdeviceinfo(struct nfsd4_compoundres *resp, __be32 nfserr, 4405 struct nfsd4_getdeviceinfo *gdev) 4406 { 4407 struct xdr_stream *xdr = &resp->xdr; 4408 const struct nfsd4_layout_ops *ops; 4409 u32 starting_len = xdr->buf->len, needed_len; 4410 __be32 *p; 4411 4412 p = xdr_reserve_space(xdr, 4); 4413 if (!p) 4414 return nfserr_resource; 4415 4416 *p++ = cpu_to_be32(gdev->gd_layout_type); 4417 4418 /* If maxcount is 0 then just update notifications */ 4419 if (gdev->gd_maxcount != 0) { 4420 ops = nfsd4_layout_ops[gdev->gd_layout_type]; 4421 nfserr = ops->encode_getdeviceinfo(xdr, gdev); 4422 if (nfserr) { 4423 /* 4424 * We don't bother to burden the layout drivers with 4425 * enforcing gd_maxcount, just tell the client to 4426 * come back with a bigger buffer if it's not enough. 4427 */ 4428 if (xdr->buf->len + 4 > gdev->gd_maxcount) 4429 goto toosmall; 4430 return nfserr; 4431 } 4432 } 4433 4434 if (gdev->gd_notify_types) { 4435 p = xdr_reserve_space(xdr, 4 + 4); 4436 if (!p) 4437 return nfserr_resource; 4438 *p++ = cpu_to_be32(1); /* bitmap length */ 4439 *p++ = cpu_to_be32(gdev->gd_notify_types); 4440 } else { 4441 p = xdr_reserve_space(xdr, 4); 4442 if (!p) 4443 return nfserr_resource; 4444 *p++ = 0; 4445 } 4446 4447 return 0; 4448 toosmall: 4449 dprintk("%s: maxcount too small\n", __func__); 4450 needed_len = xdr->buf->len + 4 /* notifications */; 4451 xdr_truncate_encode(xdr, starting_len); 4452 p = xdr_reserve_space(xdr, 4); 4453 if (!p) 4454 return nfserr_resource; 4455 *p++ = cpu_to_be32(needed_len); 4456 return nfserr_toosmall; 4457 } 4458 4459 static __be32 4460 nfsd4_encode_layoutget(struct nfsd4_compoundres *resp, __be32 nfserr, 4461 struct nfsd4_layoutget *lgp) 4462 { 4463 struct xdr_stream *xdr = &resp->xdr; 4464 const struct nfsd4_layout_ops *ops; 4465 __be32 *p; 4466 4467 p = xdr_reserve_space(xdr, 36 + sizeof(stateid_opaque_t)); 4468 if (!p) 4469 return nfserr_resource; 4470 4471 *p++ = cpu_to_be32(1); /* we always set return-on-close */ 4472 *p++ = cpu_to_be32(lgp->lg_sid.si_generation); 4473 p = xdr_encode_opaque_fixed(p, &lgp->lg_sid.si_opaque, 4474 sizeof(stateid_opaque_t)); 4475 4476 *p++ = cpu_to_be32(1); /* we always return a single layout */ 4477 p = xdr_encode_hyper(p, lgp->lg_seg.offset); 4478 p = xdr_encode_hyper(p, lgp->lg_seg.length); 4479 *p++ = cpu_to_be32(lgp->lg_seg.iomode); 4480 *p++ = cpu_to_be32(lgp->lg_layout_type); 4481 4482 ops = nfsd4_layout_ops[lgp->lg_layout_type]; 4483 return ops->encode_layoutget(xdr, lgp); 4484 } 4485 4486 static __be32 4487 nfsd4_encode_layoutcommit(struct nfsd4_compoundres *resp, __be32 nfserr, 4488 struct nfsd4_layoutcommit *lcp) 4489 { 4490 struct xdr_stream *xdr = &resp->xdr; 4491 __be32 *p; 4492 4493 p = xdr_reserve_space(xdr, 4); 4494 if (!p) 4495 return nfserr_resource; 4496 *p++ = cpu_to_be32(lcp->lc_size_chg); 4497 if (lcp->lc_size_chg) { 4498 p = xdr_reserve_space(xdr, 8); 4499 if (!p) 4500 return nfserr_resource; 4501 p = xdr_encode_hyper(p, lcp->lc_newsize); 4502 } 4503 4504 return 0; 4505 } 4506 4507 static __be32 4508 nfsd4_encode_layoutreturn(struct nfsd4_compoundres *resp, __be32 nfserr, 4509 struct nfsd4_layoutreturn *lrp) 4510 { 4511 struct xdr_stream *xdr = &resp->xdr; 4512 __be32 *p; 4513 4514 p = xdr_reserve_space(xdr, 4); 4515 if (!p) 4516 return nfserr_resource; 4517 *p++ = cpu_to_be32(lrp->lrs_present); 4518 if (lrp->lrs_present) 4519 return nfsd4_encode_stateid(xdr, &lrp->lr_sid); 4520 return 0; 4521 } 4522 #endif /* CONFIG_NFSD_PNFS */ 4523 4524 static __be32 4525 nfsd42_encode_write_res(struct nfsd4_compoundres *resp, 4526 struct nfsd42_write_res *write, bool sync) 4527 { 4528 __be32 *p; 4529 p = xdr_reserve_space(&resp->xdr, 4); 4530 if (!p) 4531 return nfserr_resource; 4532 4533 if (sync) 4534 *p++ = cpu_to_be32(0); 4535 else { 4536 __be32 nfserr; 4537 *p++ = cpu_to_be32(1); 4538 nfserr = nfsd4_encode_stateid(&resp->xdr, &write->cb_stateid); 4539 if (nfserr) 4540 return nfserr; 4541 } 4542 p = xdr_reserve_space(&resp->xdr, 8 + 4 + NFS4_VERIFIER_SIZE); 4543 if (!p) 4544 return nfserr_resource; 4545 4546 p = xdr_encode_hyper(p, write->wr_bytes_written); 4547 *p++ = cpu_to_be32(write->wr_stable_how); 4548 p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, 4549 NFS4_VERIFIER_SIZE); 4550 return nfs_ok; 4551 } 4552 4553 static __be32 4554 nfsd42_encode_nl4_server(struct nfsd4_compoundres *resp, struct nl4_server *ns) 4555 { 4556 struct xdr_stream *xdr = &resp->xdr; 4557 struct nfs42_netaddr *addr; 4558 __be32 *p; 4559 4560 p = xdr_reserve_space(xdr, 4); 4561 *p++ = cpu_to_be32(ns->nl4_type); 4562 4563 switch (ns->nl4_type) { 4564 case NL4_NETADDR: 4565 addr = &ns->u.nl4_addr; 4566 4567 /* netid_len, netid, uaddr_len, uaddr (port included 4568 * in RPCBIND_MAXUADDRLEN) 4569 */ 4570 p = xdr_reserve_space(xdr, 4571 4 /* netid len */ + 4572 (XDR_QUADLEN(addr->netid_len) * 4) + 4573 4 /* uaddr len */ + 4574 (XDR_QUADLEN(addr->addr_len) * 4)); 4575 if (!p) 4576 return nfserr_resource; 4577 4578 *p++ = cpu_to_be32(addr->netid_len); 4579 p = xdr_encode_opaque_fixed(p, addr->netid, 4580 addr->netid_len); 4581 *p++ = cpu_to_be32(addr->addr_len); 4582 p = xdr_encode_opaque_fixed(p, addr->addr, 4583 addr->addr_len); 4584 break; 4585 default: 4586 WARN_ON_ONCE(ns->nl4_type != NL4_NETADDR); 4587 return nfserr_inval; 4588 } 4589 4590 return 0; 4591 } 4592 4593 static __be32 4594 nfsd4_encode_copy(struct nfsd4_compoundres *resp, __be32 nfserr, 4595 struct nfsd4_copy *copy) 4596 { 4597 __be32 *p; 4598 4599 nfserr = nfsd42_encode_write_res(resp, ©->cp_res, 4600 copy->cp_synchronous); 4601 if (nfserr) 4602 return nfserr; 4603 4604 p = xdr_reserve_space(&resp->xdr, 4 + 4); 4605 *p++ = xdr_one; /* cr_consecutive */ 4606 *p++ = cpu_to_be32(copy->cp_synchronous); 4607 return 0; 4608 } 4609 4610 static __be32 4611 nfsd4_encode_offload_status(struct nfsd4_compoundres *resp, __be32 nfserr, 4612 struct nfsd4_offload_status *os) 4613 { 4614 struct xdr_stream *xdr = &resp->xdr; 4615 __be32 *p; 4616 4617 p = xdr_reserve_space(xdr, 8 + 4); 4618 if (!p) 4619 return nfserr_resource; 4620 p = xdr_encode_hyper(p, os->count); 4621 *p++ = cpu_to_be32(0); 4622 4623 return nfserr; 4624 } 4625 4626 static __be32 4627 nfsd4_encode_copy_notify(struct nfsd4_compoundres *resp, __be32 nfserr, 4628 struct nfsd4_copy_notify *cn) 4629 { 4630 struct xdr_stream *xdr = &resp->xdr; 4631 __be32 *p; 4632 4633 if (nfserr) 4634 return nfserr; 4635 4636 /* 8 sec, 4 nsec */ 4637 p = xdr_reserve_space(xdr, 12); 4638 if (!p) 4639 return nfserr_resource; 4640 4641 /* cnr_lease_time */ 4642 p = xdr_encode_hyper(p, cn->cpn_sec); 4643 *p++ = cpu_to_be32(cn->cpn_nsec); 4644 4645 /* cnr_stateid */ 4646 nfserr = nfsd4_encode_stateid(xdr, &cn->cpn_cnr_stateid); 4647 if (nfserr) 4648 return nfserr; 4649 4650 /* cnr_src.nl_nsvr */ 4651 p = xdr_reserve_space(xdr, 4); 4652 if (!p) 4653 return nfserr_resource; 4654 4655 *p++ = cpu_to_be32(1); 4656 4657 return nfsd42_encode_nl4_server(resp, &cn->cpn_src); 4658 } 4659 4660 static __be32 4661 nfsd4_encode_seek(struct nfsd4_compoundres *resp, __be32 nfserr, 4662 struct nfsd4_seek *seek) 4663 { 4664 __be32 *p; 4665 4666 p = xdr_reserve_space(&resp->xdr, 4 + 8); 4667 *p++ = cpu_to_be32(seek->seek_eof); 4668 p = xdr_encode_hyper(p, seek->seek_pos); 4669 4670 return 0; 4671 } 4672 4673 static __be32 4674 nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p) 4675 { 4676 return nfserr; 4677 } 4678 4679 /* 4680 * Encode kmalloc-ed buffer in to XDR stream. 4681 */ 4682 static int 4683 nfsd4_vbuf_to_stream(struct xdr_stream *xdr, char *buf, u32 buflen) 4684 { 4685 u32 cplen; 4686 __be32 *p; 4687 4688 cplen = min_t(unsigned long, buflen, 4689 ((void *)xdr->end - (void *)xdr->p)); 4690 p = xdr_reserve_space(xdr, cplen); 4691 if (!p) 4692 return nfserr_resource; 4693 4694 memcpy(p, buf, cplen); 4695 buf += cplen; 4696 buflen -= cplen; 4697 4698 while (buflen) { 4699 cplen = min_t(u32, buflen, PAGE_SIZE); 4700 p = xdr_reserve_space(xdr, cplen); 4701 if (!p) 4702 return nfserr_resource; 4703 4704 memcpy(p, buf, cplen); 4705 4706 if (cplen < PAGE_SIZE) { 4707 /* 4708 * We're done, with a length that wasn't page 4709 * aligned, so possibly not word aligned. Pad 4710 * any trailing bytes with 0. 4711 */ 4712 xdr_encode_opaque_fixed(p, NULL, cplen); 4713 break; 4714 } 4715 4716 buflen -= PAGE_SIZE; 4717 buf += PAGE_SIZE; 4718 } 4719 4720 return 0; 4721 } 4722 4723 static __be32 4724 nfsd4_encode_getxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4725 struct nfsd4_getxattr *getxattr) 4726 { 4727 struct xdr_stream *xdr = &resp->xdr; 4728 __be32 *p, err; 4729 4730 p = xdr_reserve_space(xdr, 4); 4731 if (!p) 4732 return nfserr_resource; 4733 4734 *p = cpu_to_be32(getxattr->getxa_len); 4735 4736 if (getxattr->getxa_len == 0) 4737 return 0; 4738 4739 err = nfsd4_vbuf_to_stream(xdr, getxattr->getxa_buf, 4740 getxattr->getxa_len); 4741 4742 kvfree(getxattr->getxa_buf); 4743 4744 return err; 4745 } 4746 4747 static __be32 4748 nfsd4_encode_setxattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4749 struct nfsd4_setxattr *setxattr) 4750 { 4751 struct xdr_stream *xdr = &resp->xdr; 4752 __be32 *p; 4753 4754 p = xdr_reserve_space(xdr, 20); 4755 if (!p) 4756 return nfserr_resource; 4757 4758 encode_cinfo(p, &setxattr->setxa_cinfo); 4759 4760 return 0; 4761 } 4762 4763 /* 4764 * See if there are cookie values that can be rejected outright. 4765 */ 4766 static __be32 4767 nfsd4_listxattr_validate_cookie(struct nfsd4_listxattrs *listxattrs, 4768 u32 *offsetp) 4769 { 4770 u64 cookie = listxattrs->lsxa_cookie; 4771 4772 /* 4773 * If the cookie is larger than the maximum number we can fit 4774 * in either the buffer we just got back from vfs_listxattr, or, 4775 * XDR-encoded, in the return buffer, it's invalid. 4776 */ 4777 if (cookie > (listxattrs->lsxa_len) / (XATTR_USER_PREFIX_LEN + 2)) 4778 return nfserr_badcookie; 4779 4780 if (cookie > (listxattrs->lsxa_maxcount / 4781 (XDR_QUADLEN(XATTR_USER_PREFIX_LEN + 2) + 4))) 4782 return nfserr_badcookie; 4783 4784 *offsetp = (u32)cookie; 4785 return 0; 4786 } 4787 4788 static __be32 4789 nfsd4_encode_listxattrs(struct nfsd4_compoundres *resp, __be32 nfserr, 4790 struct nfsd4_listxattrs *listxattrs) 4791 { 4792 struct xdr_stream *xdr = &resp->xdr; 4793 u32 cookie_offset, count_offset, eof; 4794 u32 left, xdrleft, slen, count; 4795 u32 xdrlen, offset; 4796 u64 cookie; 4797 char *sp; 4798 __be32 status; 4799 __be32 *p; 4800 u32 nuser; 4801 4802 eof = 1; 4803 4804 status = nfsd4_listxattr_validate_cookie(listxattrs, &offset); 4805 if (status) 4806 goto out; 4807 4808 /* 4809 * Reserve space for the cookie and the name array count. Record 4810 * the offsets to save them later. 4811 */ 4812 cookie_offset = xdr->buf->len; 4813 count_offset = cookie_offset + 8; 4814 p = xdr_reserve_space(xdr, 12); 4815 if (!p) { 4816 status = nfserr_resource; 4817 goto out; 4818 } 4819 4820 count = 0; 4821 left = listxattrs->lsxa_len; 4822 sp = listxattrs->lsxa_buf; 4823 nuser = 0; 4824 4825 xdrleft = listxattrs->lsxa_maxcount; 4826 4827 while (left > 0 && xdrleft > 0) { 4828 slen = strlen(sp); 4829 4830 /* 4831 * Check if this a user. attribute, skip it if not. 4832 */ 4833 if (strncmp(sp, XATTR_USER_PREFIX, XATTR_USER_PREFIX_LEN)) 4834 goto contloop; 4835 4836 slen -= XATTR_USER_PREFIX_LEN; 4837 xdrlen = 4 + ((slen + 3) & ~3); 4838 if (xdrlen > xdrleft) { 4839 if (count == 0) { 4840 /* 4841 * Can't even fit the first attribute name. 4842 */ 4843 status = nfserr_toosmall; 4844 goto out; 4845 } 4846 eof = 0; 4847 goto wreof; 4848 } 4849 4850 left -= XATTR_USER_PREFIX_LEN; 4851 sp += XATTR_USER_PREFIX_LEN; 4852 if (nuser++ < offset) 4853 goto contloop; 4854 4855 4856 p = xdr_reserve_space(xdr, xdrlen); 4857 if (!p) { 4858 status = nfserr_resource; 4859 goto out; 4860 } 4861 4862 p = xdr_encode_opaque(p, sp, slen); 4863 4864 xdrleft -= xdrlen; 4865 count++; 4866 contloop: 4867 sp += slen + 1; 4868 left -= slen + 1; 4869 } 4870 4871 /* 4872 * If there were user attributes to copy, but we didn't copy 4873 * any, the offset was too large (e.g. the cookie was invalid). 4874 */ 4875 if (nuser > 0 && count == 0) { 4876 status = nfserr_badcookie; 4877 goto out; 4878 } 4879 4880 wreof: 4881 p = xdr_reserve_space(xdr, 4); 4882 if (!p) { 4883 status = nfserr_resource; 4884 goto out; 4885 } 4886 *p = cpu_to_be32(eof); 4887 4888 cookie = offset + count; 4889 4890 write_bytes_to_xdr_buf(xdr->buf, cookie_offset, &cookie, 8); 4891 count = htonl(count); 4892 write_bytes_to_xdr_buf(xdr->buf, count_offset, &count, 4); 4893 out: 4894 if (listxattrs->lsxa_len) 4895 kvfree(listxattrs->lsxa_buf); 4896 return status; 4897 } 4898 4899 static __be32 4900 nfsd4_encode_removexattr(struct nfsd4_compoundres *resp, __be32 nfserr, 4901 struct nfsd4_removexattr *removexattr) 4902 { 4903 struct xdr_stream *xdr = &resp->xdr; 4904 __be32 *p; 4905 4906 p = xdr_reserve_space(xdr, 20); 4907 if (!p) 4908 return nfserr_resource; 4909 4910 p = encode_cinfo(p, &removexattr->rmxa_cinfo); 4911 return 0; 4912 } 4913 4914 typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *); 4915 4916 /* 4917 * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1 4918 * since we don't need to filter out obsolete ops as this is 4919 * done in the decoding phase. 4920 */ 4921 static const nfsd4_enc nfsd4_enc_ops[] = { 4922 [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access, 4923 [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close, 4924 [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit, 4925 [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create, 4926 [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop, 4927 [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop, 4928 [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr, 4929 [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh, 4930 [OP_LINK] = (nfsd4_enc)nfsd4_encode_link, 4931 [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock, 4932 [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt, 4933 [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku, 4934 [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop, 4935 [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop, 4936 [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop, 4937 [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open, 4938 [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop, 4939 [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm, 4940 [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade, 4941 [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop, 4942 [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop, 4943 [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop, 4944 [OP_READ] = (nfsd4_enc)nfsd4_encode_read, 4945 [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir, 4946 [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink, 4947 [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove, 4948 [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename, 4949 [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop, 4950 [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop, 4951 [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop, 4952 [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo, 4953 [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr, 4954 [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid, 4955 [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop, 4956 [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop, 4957 [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write, 4958 [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop, 4959 4960 /* NFSv4.1 operations */ 4961 [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop, 4962 [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session, 4963 [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id, 4964 [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session, 4965 [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop, 4966 [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop, 4967 [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 4968 #ifdef CONFIG_NFSD_PNFS 4969 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_getdeviceinfo, 4970 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, 4971 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_layoutcommit, 4972 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_layoutget, 4973 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_layoutreturn, 4974 #else 4975 [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop, 4976 [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, 4977 [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop, 4978 [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop, 4979 [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop, 4980 #endif 4981 [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name, 4982 [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence, 4983 [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop, 4984 [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid, 4985 [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, 4986 [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop, 4987 [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop, 4988 4989 /* NFSv4.2 operations */ 4990 [OP_ALLOCATE] = (nfsd4_enc)nfsd4_encode_noop, 4991 [OP_COPY] = (nfsd4_enc)nfsd4_encode_copy, 4992 [OP_COPY_NOTIFY] = (nfsd4_enc)nfsd4_encode_copy_notify, 4993 [OP_DEALLOCATE] = (nfsd4_enc)nfsd4_encode_noop, 4994 [OP_IO_ADVISE] = (nfsd4_enc)nfsd4_encode_noop, 4995 [OP_LAYOUTERROR] = (nfsd4_enc)nfsd4_encode_noop, 4996 [OP_LAYOUTSTATS] = (nfsd4_enc)nfsd4_encode_noop, 4997 [OP_OFFLOAD_CANCEL] = (nfsd4_enc)nfsd4_encode_noop, 4998 [OP_OFFLOAD_STATUS] = (nfsd4_enc)nfsd4_encode_offload_status, 4999 [OP_READ_PLUS] = (nfsd4_enc)nfsd4_encode_noop, 5000 [OP_SEEK] = (nfsd4_enc)nfsd4_encode_seek, 5001 [OP_WRITE_SAME] = (nfsd4_enc)nfsd4_encode_noop, 5002 [OP_CLONE] = (nfsd4_enc)nfsd4_encode_noop, 5003 5004 /* RFC 8276 extended atributes operations */ 5005 [OP_GETXATTR] = (nfsd4_enc)nfsd4_encode_getxattr, 5006 [OP_SETXATTR] = (nfsd4_enc)nfsd4_encode_setxattr, 5007 [OP_LISTXATTRS] = (nfsd4_enc)nfsd4_encode_listxattrs, 5008 [OP_REMOVEXATTR] = (nfsd4_enc)nfsd4_encode_removexattr, 5009 }; 5010 5011 /* 5012 * Calculate whether we still have space to encode repsize bytes. 5013 * There are two considerations: 5014 * - For NFS versions >=4.1, the size of the reply must stay within 5015 * session limits 5016 * - For all NFS versions, we must stay within limited preallocated 5017 * buffer space. 5018 * 5019 * This is called before the operation is processed, so can only provide 5020 * an upper estimate. For some nonidempotent operations (such as 5021 * getattr), it's not necessarily a problem if that estimate is wrong, 5022 * as we can fail it after processing without significant side effects. 5023 */ 5024 __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize) 5025 { 5026 struct xdr_buf *buf = &resp->rqstp->rq_res; 5027 struct nfsd4_slot *slot = resp->cstate.slot; 5028 5029 if (buf->len + respsize <= buf->buflen) 5030 return nfs_ok; 5031 if (!nfsd4_has_session(&resp->cstate)) 5032 return nfserr_resource; 5033 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) { 5034 WARN_ON_ONCE(1); 5035 return nfserr_rep_too_big_to_cache; 5036 } 5037 return nfserr_rep_too_big; 5038 } 5039 5040 void 5041 nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op) 5042 { 5043 struct xdr_stream *xdr = &resp->xdr; 5044 struct nfs4_stateowner *so = resp->cstate.replay_owner; 5045 struct svc_rqst *rqstp = resp->rqstp; 5046 const struct nfsd4_operation *opdesc = op->opdesc; 5047 int post_err_offset; 5048 nfsd4_enc encoder; 5049 __be32 *p; 5050 5051 p = xdr_reserve_space(xdr, 8); 5052 if (!p) { 5053 WARN_ON_ONCE(1); 5054 return; 5055 } 5056 *p++ = cpu_to_be32(op->opnum); 5057 post_err_offset = xdr->buf->len; 5058 5059 if (op->opnum == OP_ILLEGAL) 5060 goto status; 5061 if (op->status && opdesc && 5062 !(opdesc->op_flags & OP_NONTRIVIAL_ERROR_ENCODE)) 5063 goto status; 5064 BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) || 5065 !nfsd4_enc_ops[op->opnum]); 5066 encoder = nfsd4_enc_ops[op->opnum]; 5067 op->status = encoder(resp, op->status, &op->u); 5068 if (opdesc && opdesc->op_release) 5069 opdesc->op_release(&op->u); 5070 xdr_commit_encode(xdr); 5071 5072 /* nfsd4_check_resp_size guarantees enough room for error status */ 5073 if (!op->status) { 5074 int space_needed = 0; 5075 if (!nfsd4_last_compound_op(rqstp)) 5076 space_needed = COMPOUND_ERR_SLACK_SPACE; 5077 op->status = nfsd4_check_resp_size(resp, space_needed); 5078 } 5079 if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) { 5080 struct nfsd4_slot *slot = resp->cstate.slot; 5081 5082 if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) 5083 op->status = nfserr_rep_too_big_to_cache; 5084 else 5085 op->status = nfserr_rep_too_big; 5086 } 5087 if (op->status == nfserr_resource || 5088 op->status == nfserr_rep_too_big || 5089 op->status == nfserr_rep_too_big_to_cache) { 5090 /* 5091 * The operation may have already been encoded or 5092 * partially encoded. No op returns anything additional 5093 * in the case of one of these three errors, so we can 5094 * just truncate back to after the status. But it's a 5095 * bug if we had to do this on a non-idempotent op: 5096 */ 5097 warn_on_nonidempotent_op(op); 5098 xdr_truncate_encode(xdr, post_err_offset); 5099 } 5100 if (so) { 5101 int len = xdr->buf->len - post_err_offset; 5102 5103 so->so_replay.rp_status = op->status; 5104 so->so_replay.rp_buflen = len; 5105 read_bytes_from_xdr_buf(xdr->buf, post_err_offset, 5106 so->so_replay.rp_buf, len); 5107 } 5108 status: 5109 /* Note that op->status is already in network byte order: */ 5110 write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4); 5111 } 5112 5113 /* 5114 * Encode the reply stored in the stateowner reply cache 5115 * 5116 * XDR note: do not encode rp->rp_buflen: the buffer contains the 5117 * previously sent already encoded operation. 5118 */ 5119 void 5120 nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op) 5121 { 5122 __be32 *p; 5123 struct nfs4_replay *rp = op->replay; 5124 5125 p = xdr_reserve_space(xdr, 8 + rp->rp_buflen); 5126 if (!p) { 5127 WARN_ON_ONCE(1); 5128 return; 5129 } 5130 *p++ = cpu_to_be32(op->opnum); 5131 *p++ = rp->rp_status; /* already xdr'ed */ 5132 5133 p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen); 5134 } 5135 5136 int 5137 nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p) 5138 { 5139 return xdr_ressize_check(rqstp, p); 5140 } 5141 5142 void nfsd4_release_compoundargs(struct svc_rqst *rqstp) 5143 { 5144 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5145 5146 if (args->ops != args->iops) { 5147 kfree(args->ops); 5148 args->ops = args->iops; 5149 } 5150 kfree(args->tmpp); 5151 args->tmpp = NULL; 5152 while (args->to_free) { 5153 struct svcxdr_tmpbuf *tb = args->to_free; 5154 args->to_free = tb->next; 5155 kfree(tb); 5156 } 5157 } 5158 5159 int 5160 nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p) 5161 { 5162 struct nfsd4_compoundargs *args = rqstp->rq_argp; 5163 5164 if (rqstp->rq_arg.head[0].iov_len % 4) { 5165 /* client is nuts */ 5166 dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)", 5167 __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid)); 5168 return 0; 5169 } 5170 args->p = p; 5171 args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len; 5172 args->pagelist = rqstp->rq_arg.pages; 5173 args->pagelen = rqstp->rq_arg.page_len; 5174 args->tail = false; 5175 args->tmpp = NULL; 5176 args->to_free = NULL; 5177 args->ops = args->iops; 5178 args->rqstp = rqstp; 5179 5180 return !nfsd4_decode_compound(args); 5181 } 5182 5183 int 5184 nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p) 5185 { 5186 /* 5187 * All that remains is to write the tag and operation count... 5188 */ 5189 struct nfsd4_compoundres *resp = rqstp->rq_resp; 5190 struct xdr_buf *buf = resp->xdr.buf; 5191 5192 WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len + 5193 buf->tail[0].iov_len); 5194 5195 rqstp->rq_next_page = resp->xdr.page_ptr + 1; 5196 5197 p = resp->tagp; 5198 *p++ = htonl(resp->taglen); 5199 memcpy(p, resp->tag, resp->taglen); 5200 p += XDR_QUADLEN(resp->taglen); 5201 *p++ = htonl(resp->opcnt); 5202 5203 nfsd4_sequence_done(resp); 5204 return 1; 5205 } 5206 5207 /* 5208 * Local variables: 5209 * c-basic-offset: 8 5210 * End: 5211 */ 5212