Commit | Line | Data |
---|---|---|
1da177e4 | 1 | /* |
1da177e4 LT |
2 | * Server-side XDR for NFSv4 |
3 | * | |
4 | * Copyright (c) 2002 The Regents of the University of Michigan. | |
5 | * All rights reserved. | |
6 | * | |
7 | * Kendrick Smith <kmsmith@umich.edu> | |
8 | * Andy Adamson <andros@umich.edu> | |
9 | * | |
10 | * Redistribution and use in source and binary forms, with or without | |
11 | * modification, are permitted provided that the following conditions | |
12 | * are met: | |
13 | * | |
14 | * 1. Redistributions of source code must retain the above copyright | |
15 | * notice, this list of conditions and the following disclaimer. | |
16 | * 2. Redistributions in binary form must reproduce the above copyright | |
17 | * notice, this list of conditions and the following disclaimer in the | |
18 | * documentation and/or other materials provided with the distribution. | |
19 | * 3. Neither the name of the University nor the names of its | |
20 | * contributors may be used to endorse or promote products derived | |
21 | * from this software without specific prior written permission. | |
22 | * | |
23 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED | |
24 | * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |
25 | * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
26 | * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
27 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
28 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
29 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR | |
30 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF | |
31 | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING | |
32 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | |
33 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
34 | * | |
35 | * TODO: Neil Brown made the following observation: We currently | |
36 | * initially reserve NFSD_BUFSIZE space on the transmit queue and | |
37 | * never release any of that until the request is complete. | |
38 | * It would be good to calculate a new maximum response size while | |
39 | * decoding the COMPOUND, and call svc_reserve with this number | |
40 | * at the end of nfs4svc_decode_compoundargs. | |
41 | */ | |
42 | ||
5a0e3ad6 | 43 | #include <linux/slab.h> |
1da177e4 | 44 | #include <linux/namei.h> |
341eb184 | 45 | #include <linux/statfs.h> |
0733d213 | 46 | #include <linux/utsname.h> |
17456804 | 47 | #include <linux/pagemap.h> |
4796f457 | 48 | #include <linux/sunrpc/svcauth_gss.h> |
9a74af21 | 49 | |
2ca72e17 BF |
50 | #include "idmap.h" |
51 | #include "acl.h" | |
9a74af21 | 52 | #include "xdr4.h" |
0a3adade | 53 | #include "vfs.h" |
17456804 | 54 | #include "state.h" |
1091006c | 55 | #include "cache.h" |
3d733711 | 56 | #include "netns.h" |
2ca72e17 | 57 | |
18032ca0 DQ |
58 | #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
59 | #include <linux/security.h> | |
60 | #endif | |
61 | ||
62 | ||
1da177e4 LT |
63 | #define NFSDDBG_FACILITY NFSDDBG_XDR |
64 | ||
42ca0993 BF |
65 | /* |
66 | * As per referral draft, the fsid for a referral MUST be different from the fsid of the containing | |
67 | * directory in order to indicate to the client that a filesystem boundary is present | |
68 | * We use a fixed fsid for a referral | |
69 | */ | |
70 | #define NFS4_REFERRAL_FSID_MAJOR 0x8000000ULL | |
71 | #define NFS4_REFERRAL_FSID_MINOR 0x8000000ULL | |
72 | ||
b37ad28b | 73 | static __be32 |
a36b1725 | 74 | check_filename(char *str, int len) |
1da177e4 LT |
75 | { |
76 | int i; | |
77 | ||
78 | if (len == 0) | |
79 | return nfserr_inval; | |
80 | if (isdotent(str, len)) | |
a36b1725 | 81 | return nfserr_badname; |
1da177e4 LT |
82 | for (i = 0; i < len; i++) |
83 | if (str[i] == '/') | |
a36b1725 | 84 | return nfserr_badname; |
1da177e4 LT |
85 | return 0; |
86 | } | |
87 | ||
1da177e4 | 88 | #define DECODE_HEAD \ |
2ebbc012 | 89 | __be32 *p; \ |
b37ad28b | 90 | __be32 status |
1da177e4 LT |
91 | #define DECODE_TAIL \ |
92 | status = 0; \ | |
93 | out: \ | |
94 | return status; \ | |
95 | xdr_error: \ | |
817cb9d4 CL |
96 | dprintk("NFSD: xdr error (%s:%d)\n", \ |
97 | __FILE__, __LINE__); \ | |
1da177e4 LT |
98 | status = nfserr_bad_xdr; \ |
99 | goto out | |
100 | ||
1da177e4 LT |
101 | #define READMEM(x,nbytes) do { \ |
102 | x = (char *)p; \ | |
103 | p += XDR_QUADLEN(nbytes); \ | |
104 | } while (0) | |
105 | #define SAVEMEM(x,nbytes) do { \ | |
106 | if (!(x = (p==argp->tmp || p == argp->tmpp) ? \ | |
107 | savemem(argp, p, nbytes) : \ | |
108 | (char *)p)) { \ | |
817cb9d4 CL |
109 | dprintk("NFSD: xdr error (%s:%d)\n", \ |
110 | __FILE__, __LINE__); \ | |
1da177e4 LT |
111 | goto xdr_error; \ |
112 | } \ | |
113 | p += XDR_QUADLEN(nbytes); \ | |
114 | } while (0) | |
115 | #define COPYMEM(x,nbytes) do { \ | |
116 | memcpy((x), p, nbytes); \ | |
117 | p += XDR_QUADLEN(nbytes); \ | |
118 | } while (0) | |
119 | ||
120 | /* READ_BUF, read_buf(): nbytes must be <= PAGE_SIZE */ | |
121 | #define READ_BUF(nbytes) do { \ | |
122 | if (nbytes <= (u32)((char *)argp->end - (char *)argp->p)) { \ | |
123 | p = argp->p; \ | |
124 | argp->p += XDR_QUADLEN(nbytes); \ | |
125 | } else if (!(p = read_buf(argp, nbytes))) { \ | |
817cb9d4 CL |
126 | dprintk("NFSD: xdr error (%s:%d)\n", \ |
127 | __FILE__, __LINE__); \ | |
1da177e4 LT |
128 | goto xdr_error; \ |
129 | } \ | |
130 | } while (0) | |
131 | ||
590b7431 BF |
132 | static void next_decode_page(struct nfsd4_compoundargs *argp) |
133 | { | |
590b7431 | 134 | argp->p = page_address(argp->pagelist[0]); |
365da4ad | 135 | argp->pagelist++; |
590b7431 BF |
136 | if (argp->pagelen < PAGE_SIZE) { |
137 | argp->end = argp->p + (argp->pagelen>>2); | |
138 | argp->pagelen = 0; | |
139 | } else { | |
140 | argp->end = argp->p + (PAGE_SIZE>>2); | |
141 | argp->pagelen -= PAGE_SIZE; | |
142 | } | |
143 | } | |
144 | ||
ca2a05aa | 145 | static __be32 *read_buf(struct nfsd4_compoundargs *argp, u32 nbytes) |
1da177e4 LT |
146 | { |
147 | /* We want more bytes than seem to be available. | |
148 | * Maybe we need a new page, maybe we have just run out | |
149 | */ | |
ca2a05aa | 150 | unsigned int avail = (char *)argp->end - (char *)argp->p; |
2ebbc012 | 151 | __be32 *p; |
1da177e4 LT |
152 | if (avail + argp->pagelen < nbytes) |
153 | return NULL; | |
154 | if (avail + PAGE_SIZE < nbytes) /* need more than a page !! */ | |
155 | return NULL; | |
156 | /* ok, we can do it with the current plus the next page */ | |
157 | if (nbytes <= sizeof(argp->tmp)) | |
158 | p = argp->tmp; | |
159 | else { | |
f99d49ad | 160 | kfree(argp->tmpp); |
1da177e4 LT |
161 | p = argp->tmpp = kmalloc(nbytes, GFP_KERNEL); |
162 | if (!p) | |
163 | return NULL; | |
164 | ||
165 | } | |
ca2a05aa BF |
166 | /* |
167 | * The following memcpy is safe because read_buf is always | |
168 | * called with nbytes > avail, and the two cases above both | |
169 | * guarantee p points to at least nbytes bytes. | |
170 | */ | |
1da177e4 | 171 | memcpy(p, argp->p, avail); |
590b7431 | 172 | next_decode_page(argp); |
1da177e4 LT |
173 | memcpy(((char*)p)+avail, argp->p, (nbytes - avail)); |
174 | argp->p += XDR_QUADLEN(nbytes - avail); | |
175 | return p; | |
176 | } | |
177 | ||
60adfc50 AA |
178 | static int zero_clientid(clientid_t *clid) |
179 | { | |
180 | return (clid->cl_boot == 0) && (clid->cl_id == 0); | |
181 | } | |
182 | ||
2d8498db CH |
183 | /** |
184 | * defer_free - mark an allocation as deferred freed | |
ce043ac8 BF |
185 | * @argp: NFSv4 compound argument structure |
186 | * @p: pointer to be freed (with kfree()) | |
2d8498db CH |
187 | * |
188 | * Marks @p to be freed when processing the compound operation | |
189 | * described in @argp finishes. | |
190 | */ | |
1da177e4 | 191 | static int |
ce043ac8 | 192 | defer_free(struct nfsd4_compoundargs *argp, void *p) |
1da177e4 LT |
193 | { |
194 | struct tmpbuf *tb; | |
195 | ||
196 | tb = kmalloc(sizeof(*tb), GFP_KERNEL); | |
197 | if (!tb) | |
198 | return -ENOMEM; | |
199 | tb->buf = p; | |
1da177e4 LT |
200 | tb->next = argp->to_free; |
201 | argp->to_free = tb; | |
202 | return 0; | |
203 | } | |
204 | ||
2d8498db CH |
205 | /** |
206 | * savemem - duplicate a chunk of memory for later processing | |
207 | * @argp: NFSv4 compound argument structure to be freed with | |
208 | * @p: pointer to be duplicated | |
209 | * @nbytes: length to be duplicated | |
210 | * | |
211 | * Returns a pointer to a copy of @nbytes bytes of memory at @p | |
212 | * that are preserved until processing of the NFSv4 compound | |
213 | * operation described by @argp finishes. | |
214 | */ | |
2ebbc012 | 215 | static char *savemem(struct nfsd4_compoundargs *argp, __be32 *p, int nbytes) |
1da177e4 | 216 | { |
1da177e4 | 217 | if (p == argp->tmp) { |
67114fe6 | 218 | p = kmemdup(argp->tmp, nbytes, GFP_KERNEL); |
a4db5fe5 BF |
219 | if (!p) |
220 | return NULL; | |
1da177e4 | 221 | } else { |
73dff8be | 222 | BUG_ON(p != argp->tmpp); |
1da177e4 LT |
223 | argp->tmpp = NULL; |
224 | } | |
ce043ac8 | 225 | if (defer_free(argp, p)) { |
a4db5fe5 | 226 | kfree(p); |
1da177e4 LT |
227 | return NULL; |
228 | } else | |
229 | return (char *)p; | |
230 | } | |
231 | ||
b37ad28b | 232 | static __be32 |
1da177e4 LT |
233 | nfsd4_decode_bitmap(struct nfsd4_compoundargs *argp, u32 *bmval) |
234 | { | |
235 | u32 bmlen; | |
236 | DECODE_HEAD; | |
237 | ||
238 | bmval[0] = 0; | |
239 | bmval[1] = 0; | |
7e705706 | 240 | bmval[2] = 0; |
1da177e4 LT |
241 | |
242 | READ_BUF(4); | |
06553991 | 243 | bmlen = be32_to_cpup(p++); |
1da177e4 LT |
244 | if (bmlen > 1000) |
245 | goto xdr_error; | |
246 | ||
247 | READ_BUF(bmlen << 2); | |
248 | if (bmlen > 0) | |
06553991 | 249 | bmval[0] = be32_to_cpup(p++); |
1da177e4 | 250 | if (bmlen > 1) |
06553991 | 251 | bmval[1] = be32_to_cpup(p++); |
7e705706 | 252 | if (bmlen > 2) |
06553991 | 253 | bmval[2] = be32_to_cpup(p++); |
1da177e4 LT |
254 | |
255 | DECODE_TAIL; | |
256 | } | |
257 | ||
b37ad28b | 258 | static __be32 |
3c8e0316 | 259 | nfsd4_decode_fattr(struct nfsd4_compoundargs *argp, u32 *bmval, |
18032ca0 DQ |
260 | struct iattr *iattr, struct nfs4_acl **acl, |
261 | struct xdr_netobj *label) | |
1da177e4 LT |
262 | { |
263 | int expected_len, len = 0; | |
264 | u32 dummy32; | |
542d1ab3 | 265 | u64 sec; |
1da177e4 LT |
266 | char *buf; |
267 | ||
268 | DECODE_HEAD; | |
269 | iattr->ia_valid = 0; | |
270 | if ((status = nfsd4_decode_bitmap(argp, bmval))) | |
271 | return status; | |
272 | ||
1da177e4 | 273 | READ_BUF(4); |
06553991 | 274 | expected_len = be32_to_cpup(p++); |
1da177e4 LT |
275 | |
276 | if (bmval[0] & FATTR4_WORD0_SIZE) { | |
277 | READ_BUF(8); | |
278 | len += 8; | |
542d1ab3 | 279 | p = xdr_decode_hyper(p, &iattr->ia_size); |
1da177e4 LT |
280 | iattr->ia_valid |= ATTR_SIZE; |
281 | } | |
282 | if (bmval[0] & FATTR4_WORD0_ACL) { | |
64a817cf | 283 | u32 nace; |
28e05dd8 | 284 | struct nfs4_ace *ace; |
1da177e4 LT |
285 | |
286 | READ_BUF(4); len += 4; | |
06553991 | 287 | nace = be32_to_cpup(p++); |
1da177e4 | 288 | |
28e05dd8 | 289 | if (nace > NFS4_ACL_MAX) |
798df338 | 290 | return nfserr_fbig; |
28e05dd8 BF |
291 | |
292 | *acl = nfs4_acl_new(nace); | |
eba1c99c KM |
293 | if (*acl == NULL) |
294 | return nfserr_jukebox; | |
295 | ||
ce043ac8 | 296 | defer_free(argp, *acl); |
1da177e4 | 297 | |
28e05dd8 BF |
298 | (*acl)->naces = nace; |
299 | for (ace = (*acl)->aces; ace < (*acl)->aces + nace; ace++) { | |
1da177e4 | 300 | READ_BUF(16); len += 16; |
06553991 BF |
301 | ace->type = be32_to_cpup(p++); |
302 | ace->flag = be32_to_cpup(p++); | |
303 | ace->access_mask = be32_to_cpup(p++); | |
304 | dummy32 = be32_to_cpup(p++); | |
1da177e4 LT |
305 | READ_BUF(dummy32); |
306 | len += XDR_QUADLEN(dummy32) << 2; | |
307 | READMEM(buf, dummy32); | |
28e05dd8 | 308 | ace->whotype = nfs4_acl_get_whotype(buf, dummy32); |
3c726023 | 309 | status = nfs_ok; |
28e05dd8 | 310 | if (ace->whotype != NFS4_ACL_WHO_NAMED) |
ab8e4aee | 311 | ; |
28e05dd8 | 312 | else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) |
3c726023 | 313 | status = nfsd_map_name_to_gid(argp->rqstp, |
ab8e4aee | 314 | buf, dummy32, &ace->who_gid); |
1da177e4 | 315 | else |
3c726023 | 316 | status = nfsd_map_name_to_uid(argp->rqstp, |
ab8e4aee | 317 | buf, dummy32, &ace->who_uid); |
3c726023 BF |
318 | if (status) |
319 | return status; | |
1da177e4 LT |
320 | } |
321 | } else | |
322 | *acl = NULL; | |
323 | if (bmval[1] & FATTR4_WORD1_MODE) { | |
324 | READ_BUF(4); | |
325 | len += 4; | |
06553991 | 326 | iattr->ia_mode = be32_to_cpup(p++); |
1da177e4 LT |
327 | iattr->ia_mode &= (S_IFMT | S_IALLUGO); |
328 | iattr->ia_valid |= ATTR_MODE; | |
329 | } | |
330 | if (bmval[1] & FATTR4_WORD1_OWNER) { | |
331 | READ_BUF(4); | |
332 | len += 4; | |
06553991 | 333 | dummy32 = be32_to_cpup(p++); |
1da177e4 LT |
334 | READ_BUF(dummy32); |
335 | len += (XDR_QUADLEN(dummy32) << 2); | |
336 | READMEM(buf, dummy32); | |
47c85291 N |
337 | if ((status = nfsd_map_name_to_uid(argp->rqstp, buf, dummy32, &iattr->ia_uid))) |
338 | return status; | |
1da177e4 LT |
339 | iattr->ia_valid |= ATTR_UID; |
340 | } | |
341 | if (bmval[1] & FATTR4_WORD1_OWNER_GROUP) { | |
342 | READ_BUF(4); | |
343 | len += 4; | |
06553991 | 344 | dummy32 = be32_to_cpup(p++); |
1da177e4 LT |
345 | READ_BUF(dummy32); |
346 | len += (XDR_QUADLEN(dummy32) << 2); | |
347 | READMEM(buf, dummy32); | |
47c85291 N |
348 | if ((status = nfsd_map_name_to_gid(argp->rqstp, buf, dummy32, &iattr->ia_gid))) |
349 | return status; | |
1da177e4 LT |
350 | iattr->ia_valid |= ATTR_GID; |
351 | } | |
352 | if (bmval[1] & FATTR4_WORD1_TIME_ACCESS_SET) { | |
353 | READ_BUF(4); | |
354 | len += 4; | |
06553991 | 355 | dummy32 = be32_to_cpup(p++); |
1da177e4 LT |
356 | switch (dummy32) { |
357 | case NFS4_SET_TO_CLIENT_TIME: | |
358 | /* We require the high 32 bits of 'seconds' to be 0, and we ignore | |
359 | all 32 bits of 'nseconds'. */ | |
360 | READ_BUF(12); | |
361 | len += 12; | |
542d1ab3 BF |
362 | p = xdr_decode_hyper(p, &sec); |
363 | iattr->ia_atime.tv_sec = (time_t)sec; | |
06553991 | 364 | iattr->ia_atime.tv_nsec = be32_to_cpup(p++); |
1da177e4 LT |
365 | if (iattr->ia_atime.tv_nsec >= (u32)1000000000) |
366 | return nfserr_inval; | |
367 | iattr->ia_valid |= (ATTR_ATIME | ATTR_ATIME_SET); | |
368 | break; | |
369 | case NFS4_SET_TO_SERVER_TIME: | |
370 | iattr->ia_valid |= ATTR_ATIME; | |
371 | break; | |
372 | default: | |
373 | goto xdr_error; | |
374 | } | |
375 | } | |
1da177e4 LT |
376 | if (bmval[1] & FATTR4_WORD1_TIME_MODIFY_SET) { |
377 | READ_BUF(4); | |
378 | len += 4; | |
06553991 | 379 | dummy32 = be32_to_cpup(p++); |
1da177e4 LT |
380 | switch (dummy32) { |
381 | case NFS4_SET_TO_CLIENT_TIME: | |
382 | /* We require the high 32 bits of 'seconds' to be 0, and we ignore | |
383 | all 32 bits of 'nseconds'. */ | |
384 | READ_BUF(12); | |
385 | len += 12; | |
542d1ab3 BF |
386 | p = xdr_decode_hyper(p, &sec); |
387 | iattr->ia_mtime.tv_sec = sec; | |
06553991 | 388 | iattr->ia_mtime.tv_nsec = be32_to_cpup(p++); |
1da177e4 LT |
389 | if (iattr->ia_mtime.tv_nsec >= (u32)1000000000) |
390 | return nfserr_inval; | |
391 | iattr->ia_valid |= (ATTR_MTIME | ATTR_MTIME_SET); | |
392 | break; | |
393 | case NFS4_SET_TO_SERVER_TIME: | |
394 | iattr->ia_valid |= ATTR_MTIME; | |
395 | break; | |
396 | default: | |
397 | goto xdr_error; | |
398 | } | |
399 | } | |
18032ca0 DQ |
400 | |
401 | label->len = 0; | |
402 | #ifdef CONFIG_NFSD_V4_SECURITY_LABEL | |
403 | if (bmval[2] & FATTR4_WORD2_SECURITY_LABEL) { | |
404 | READ_BUF(4); | |
405 | len += 4; | |
06553991 | 406 | dummy32 = be32_to_cpup(p++); /* lfs: we don't use it */ |
18032ca0 DQ |
407 | READ_BUF(4); |
408 | len += 4; | |
06553991 | 409 | dummy32 = be32_to_cpup(p++); /* pi: we don't use it either */ |
18032ca0 DQ |
410 | READ_BUF(4); |
411 | len += 4; | |
06553991 | 412 | dummy32 = be32_to_cpup(p++); |
18032ca0 DQ |
413 | READ_BUF(dummy32); |
414 | if (dummy32 > NFSD4_MAX_SEC_LABEL_LEN) | |
415 | return nfserr_badlabel; | |
416 | len += (XDR_QUADLEN(dummy32) << 2); | |
417 | READMEM(buf, dummy32); | |
418 | label->data = kzalloc(dummy32 + 1, GFP_KERNEL); | |
419 | if (!label->data) | |
420 | return nfserr_jukebox; | |
3378b7f4 | 421 | label->len = dummy32; |
ce043ac8 | 422 | defer_free(argp, label->data); |
18032ca0 DQ |
423 | memcpy(label->data, buf, dummy32); |
424 | } | |
425 | #endif | |
426 | ||
3c8e0316 YZ |
427 | if (bmval[0] & ~NFSD_WRITEABLE_ATTRS_WORD0 |
428 | || bmval[1] & ~NFSD_WRITEABLE_ATTRS_WORD1 | |
429 | || bmval[2] & ~NFSD_WRITEABLE_ATTRS_WORD2) | |
430 | READ_BUF(expected_len - len); | |
431 | else if (len != expected_len) | |
1da177e4 LT |
432 | goto xdr_error; |
433 | ||
434 | DECODE_TAIL; | |
1da177e4 LT |
435 | } |
436 | ||
e31a1b66 BH |
437 | static __be32 |
438 | nfsd4_decode_stateid(struct nfsd4_compoundargs *argp, stateid_t *sid) | |
439 | { | |
440 | DECODE_HEAD; | |
441 | ||
442 | READ_BUF(sizeof(stateid_t)); | |
06553991 | 443 | sid->si_generation = be32_to_cpup(p++); |
e31a1b66 BH |
444 | COPYMEM(&sid->si_opaque, sizeof(stateid_opaque_t)); |
445 | ||
446 | DECODE_TAIL; | |
447 | } | |
448 | ||
b37ad28b | 449 | static __be32 |
1da177e4 LT |
450 | nfsd4_decode_access(struct nfsd4_compoundargs *argp, struct nfsd4_access *access) |
451 | { | |
452 | DECODE_HEAD; | |
453 | ||
454 | READ_BUF(4); | |
06553991 | 455 | access->ac_req_access = be32_to_cpup(p++); |
1da177e4 LT |
456 | |
457 | DECODE_TAIL; | |
458 | } | |
459 | ||
acb2887e BF |
460 | static __be32 nfsd4_decode_cb_sec(struct nfsd4_compoundargs *argp, struct nfsd4_cb_sec *cbs) |
461 | { | |
462 | DECODE_HEAD; | |
12fc3e92 | 463 | u32 dummy, uid, gid; |
acb2887e BF |
464 | char *machine_name; |
465 | int i; | |
466 | int nr_secflavs; | |
467 | ||
468 | /* callback_sec_params4 */ | |
469 | READ_BUF(4); | |
06553991 | 470 | nr_secflavs = be32_to_cpup(p++); |
57569a70 BF |
471 | if (nr_secflavs) |
472 | cbs->flavor = (u32)(-1); | |
473 | else | |
474 | /* Is this legal? Be generous, take it to mean AUTH_NONE: */ | |
475 | cbs->flavor = 0; | |
acb2887e BF |
476 | for (i = 0; i < nr_secflavs; ++i) { |
477 | READ_BUF(4); | |
06553991 | 478 | dummy = be32_to_cpup(p++); |
acb2887e BF |
479 | switch (dummy) { |
480 | case RPC_AUTH_NULL: | |
481 | /* Nothing to read */ | |
12fc3e92 BF |
482 | if (cbs->flavor == (u32)(-1)) |
483 | cbs->flavor = RPC_AUTH_NULL; | |
acb2887e BF |
484 | break; |
485 | case RPC_AUTH_UNIX: | |
486 | READ_BUF(8); | |
487 | /* stamp */ | |
06553991 | 488 | dummy = be32_to_cpup(p++); |
acb2887e BF |
489 | |
490 | /* machine name */ | |
06553991 | 491 | dummy = be32_to_cpup(p++); |
acb2887e BF |
492 | READ_BUF(dummy); |
493 | SAVEMEM(machine_name, dummy); | |
494 | ||
495 | /* uid, gid */ | |
496 | READ_BUF(8); | |
06553991 BF |
497 | uid = be32_to_cpup(p++); |
498 | gid = be32_to_cpup(p++); | |
acb2887e BF |
499 | |
500 | /* more gids */ | |
501 | READ_BUF(4); | |
06553991 | 502 | dummy = be32_to_cpup(p++); |
acb2887e | 503 | READ_BUF(dummy * 4); |
12fc3e92 | 504 | if (cbs->flavor == (u32)(-1)) { |
03bc6d1c EB |
505 | kuid_t kuid = make_kuid(&init_user_ns, uid); |
506 | kgid_t kgid = make_kgid(&init_user_ns, gid); | |
507 | if (uid_valid(kuid) && gid_valid(kgid)) { | |
508 | cbs->uid = kuid; | |
509 | cbs->gid = kgid; | |
510 | cbs->flavor = RPC_AUTH_UNIX; | |
511 | } else { | |
512 | dprintk("RPC_AUTH_UNIX with invalid" | |
513 | "uid or gid ignoring!\n"); | |
514 | } | |
12fc3e92 | 515 | } |
acb2887e BF |
516 | break; |
517 | case RPC_AUTH_GSS: | |
518 | dprintk("RPC_AUTH_GSS callback secflavor " | |
519 | "not supported!\n"); | |
520 | READ_BUF(8); | |
521 | /* gcbp_service */ | |
06553991 | 522 | dummy = be32_to_cpup(p++); |
acb2887e | 523 | /* gcbp_handle_from_server */ |
06553991 | 524 | dummy = be32_to_cpup(p++); |
acb2887e BF |
525 | READ_BUF(dummy); |
526 | p += XDR_QUADLEN(dummy); | |
527 | /* gcbp_handle_from_client */ | |
528 | READ_BUF(4); | |
06553991 | 529 | dummy = be32_to_cpup(p++); |
acb2887e BF |
530 | READ_BUF(dummy); |
531 | break; | |
532 | default: | |
533 | dprintk("Illegal callback secflavor\n"); | |
534 | return nfserr_inval; | |
535 | } | |
536 | } | |
537 | DECODE_TAIL; | |
538 | } | |
539 | ||
cb73a9f4 BF |
540 | static __be32 nfsd4_decode_backchannel_ctl(struct nfsd4_compoundargs *argp, struct nfsd4_backchannel_ctl *bc) |
541 | { | |
542 | DECODE_HEAD; | |
543 | ||
544 | READ_BUF(4); | |
06553991 | 545 | bc->bc_cb_program = be32_to_cpup(p++); |
cb73a9f4 BF |
546 | nfsd4_decode_cb_sec(argp, &bc->bc_cb_sec); |
547 | ||
548 | DECODE_TAIL; | |
549 | } | |
550 | ||
1d1bc8f2 BF |
551 | static __be32 nfsd4_decode_bind_conn_to_session(struct nfsd4_compoundargs *argp, struct nfsd4_bind_conn_to_session *bcts) |
552 | { | |
553 | DECODE_HEAD; | |
1d1bc8f2 BF |
554 | |
555 | READ_BUF(NFS4_MAX_SESSIONID_LEN + 8); | |
556 | COPYMEM(bcts->sessionid.data, NFS4_MAX_SESSIONID_LEN); | |
06553991 | 557 | bcts->dir = be32_to_cpup(p++); |
6ce2357f BS |
558 | /* XXX: skipping ctsa_use_conn_in_rdma_mode. Perhaps Tom Tucker |
559 | * could help us figure out we should be using it. */ | |
1d1bc8f2 BF |
560 | DECODE_TAIL; |
561 | } | |
562 | ||
b37ad28b | 563 | static __be32 |
1da177e4 LT |
564 | nfsd4_decode_close(struct nfsd4_compoundargs *argp, struct nfsd4_close *close) |
565 | { | |
566 | DECODE_HEAD; | |
567 | ||
e31a1b66 | 568 | READ_BUF(4); |
06553991 | 569 | close->cl_seqid = be32_to_cpup(p++); |
e31a1b66 | 570 | return nfsd4_decode_stateid(argp, &close->cl_stateid); |
1da177e4 LT |
571 | |
572 | DECODE_TAIL; | |
573 | } | |
574 | ||
575 | ||
b37ad28b | 576 | static __be32 |
1da177e4 LT |
577 | nfsd4_decode_commit(struct nfsd4_compoundargs *argp, struct nfsd4_commit *commit) |
578 | { | |
579 | DECODE_HEAD; | |
580 | ||
581 | READ_BUF(12); | |
542d1ab3 | 582 | p = xdr_decode_hyper(p, &commit->co_offset); |
06553991 | 583 | commit->co_count = be32_to_cpup(p++); |
1da177e4 LT |
584 | |
585 | DECODE_TAIL; | |
586 | } | |
587 | ||
b37ad28b | 588 | static __be32 |
1da177e4 LT |
589 | nfsd4_decode_create(struct nfsd4_compoundargs *argp, struct nfsd4_create *create) |
590 | { | |
591 | DECODE_HEAD; | |
592 | ||
593 | READ_BUF(4); | |
06553991 | 594 | create->cr_type = be32_to_cpup(p++); |
1da177e4 LT |
595 | switch (create->cr_type) { |
596 | case NF4LNK: | |
597 | READ_BUF(4); | |
7fb84306 BF |
598 | create->cr_datalen = be32_to_cpup(p++); |
599 | READ_BUF(create->cr_datalen); | |
b829e919 BF |
600 | /* |
601 | * The VFS will want a null-terminated string, and | |
602 | * null-terminating in place isn't safe since this might | |
603 | * end on a page boundary: | |
604 | */ | |
7fb84306 BF |
605 | create->cr_data = kmalloc(create->cr_datalen + 1, GFP_KERNEL); |
606 | if (!create->cr_data) | |
b829e919 | 607 | return nfserr_jukebox; |
7fb84306 BF |
608 | memcpy(create->cr_data, p, create->cr_datalen); |
609 | create->cr_data[create->cr_datalen] = '\0'; | |
ce043ac8 | 610 | defer_free(argp, create->cr_data); |
1da177e4 LT |
611 | break; |
612 | case NF4BLK: | |
613 | case NF4CHR: | |
614 | READ_BUF(8); | |
06553991 BF |
615 | create->cr_specdata1 = be32_to_cpup(p++); |
616 | create->cr_specdata2 = be32_to_cpup(p++); | |
1da177e4 LT |
617 | break; |
618 | case NF4SOCK: | |
619 | case NF4FIFO: | |
620 | case NF4DIR: | |
621 | default: | |
622 | break; | |
623 | } | |
624 | ||
625 | READ_BUF(4); | |
06553991 | 626 | create->cr_namelen = be32_to_cpup(p++); |
1da177e4 LT |
627 | READ_BUF(create->cr_namelen); |
628 | SAVEMEM(create->cr_name, create->cr_namelen); | |
a36b1725 | 629 | if ((status = check_filename(create->cr_name, create->cr_namelen))) |
1da177e4 LT |
630 | return status; |
631 | ||
3c8e0316 | 632 | status = nfsd4_decode_fattr(argp, create->cr_bmval, &create->cr_iattr, |
18032ca0 | 633 | &create->cr_acl, &create->cr_label); |
c0d6fc8a | 634 | if (status) |
1da177e4 LT |
635 | goto out; |
636 | ||
637 | DECODE_TAIL; | |
638 | } | |
639 | ||
b37ad28b | 640 | static inline __be32 |
1da177e4 LT |
641 | nfsd4_decode_delegreturn(struct nfsd4_compoundargs *argp, struct nfsd4_delegreturn *dr) |
642 | { | |
e31a1b66 | 643 | return nfsd4_decode_stateid(argp, &dr->dr_stateid); |
1da177e4 LT |
644 | } |
645 | ||
b37ad28b | 646 | static inline __be32 |
1da177e4 LT |
647 | nfsd4_decode_getattr(struct nfsd4_compoundargs *argp, struct nfsd4_getattr *getattr) |
648 | { | |
649 | return nfsd4_decode_bitmap(argp, getattr->ga_bmval); | |
650 | } | |
651 | ||
b37ad28b | 652 | static __be32 |
1da177e4 LT |
653 | nfsd4_decode_link(struct nfsd4_compoundargs *argp, struct nfsd4_link *link) |
654 | { | |
655 | DECODE_HEAD; | |
656 | ||
657 | READ_BUF(4); | |
06553991 | 658 | link->li_namelen = be32_to_cpup(p++); |
1da177e4 LT |
659 | READ_BUF(link->li_namelen); |
660 | SAVEMEM(link->li_name, link->li_namelen); | |
a36b1725 | 661 | if ((status = check_filename(link->li_name, link->li_namelen))) |
1da177e4 LT |
662 | return status; |
663 | ||
664 | DECODE_TAIL; | |
665 | } | |
666 | ||
b37ad28b | 667 | static __be32 |
1da177e4 LT |
668 | nfsd4_decode_lock(struct nfsd4_compoundargs *argp, struct nfsd4_lock *lock) |
669 | { | |
670 | DECODE_HEAD; | |
671 | ||
1da177e4 LT |
672 | /* |
673 | * type, reclaim(boolean), offset, length, new_lock_owner(boolean) | |
674 | */ | |
675 | READ_BUF(28); | |
06553991 | 676 | lock->lk_type = be32_to_cpup(p++); |
1da177e4 LT |
677 | if ((lock->lk_type < NFS4_READ_LT) || (lock->lk_type > NFS4_WRITEW_LT)) |
678 | goto xdr_error; | |
06553991 | 679 | lock->lk_reclaim = be32_to_cpup(p++); |
542d1ab3 BF |
680 | p = xdr_decode_hyper(p, &lock->lk_offset); |
681 | p = xdr_decode_hyper(p, &lock->lk_length); | |
06553991 | 682 | lock->lk_is_new = be32_to_cpup(p++); |
1da177e4 LT |
683 | |
684 | if (lock->lk_is_new) { | |
e31a1b66 | 685 | READ_BUF(4); |
06553991 | 686 | lock->lk_new_open_seqid = be32_to_cpup(p++); |
e31a1b66 BH |
687 | status = nfsd4_decode_stateid(argp, &lock->lk_new_open_stateid); |
688 | if (status) | |
689 | return status; | |
690 | READ_BUF(8 + sizeof(clientid_t)); | |
06553991 | 691 | lock->lk_new_lock_seqid = be32_to_cpup(p++); |
1da177e4 | 692 | COPYMEM(&lock->lk_new_clientid, sizeof(clientid_t)); |
06553991 | 693 | lock->lk_new_owner.len = be32_to_cpup(p++); |
1da177e4 LT |
694 | READ_BUF(lock->lk_new_owner.len); |
695 | READMEM(lock->lk_new_owner.data, lock->lk_new_owner.len); | |
696 | } else { | |
e31a1b66 BH |
697 | status = nfsd4_decode_stateid(argp, &lock->lk_old_lock_stateid); |
698 | if (status) | |
699 | return status; | |
700 | READ_BUF(4); | |
06553991 | 701 | lock->lk_old_lock_seqid = be32_to_cpup(p++); |
1da177e4 LT |
702 | } |
703 | ||
704 | DECODE_TAIL; | |
705 | } | |
706 | ||
b37ad28b | 707 | static __be32 |
1da177e4 LT |
708 | nfsd4_decode_lockt(struct nfsd4_compoundargs *argp, struct nfsd4_lockt *lockt) |
709 | { | |
710 | DECODE_HEAD; | |
711 | ||
712 | READ_BUF(32); | |
06553991 | 713 | lockt->lt_type = be32_to_cpup(p++); |
1da177e4 LT |
714 | if((lockt->lt_type < NFS4_READ_LT) || (lockt->lt_type > NFS4_WRITEW_LT)) |
715 | goto xdr_error; | |
542d1ab3 BF |
716 | p = xdr_decode_hyper(p, &lockt->lt_offset); |
717 | p = xdr_decode_hyper(p, &lockt->lt_length); | |
1da177e4 | 718 | COPYMEM(&lockt->lt_clientid, 8); |
06553991 | 719 | lockt->lt_owner.len = be32_to_cpup(p++); |
1da177e4 LT |
720 | READ_BUF(lockt->lt_owner.len); |
721 | READMEM(lockt->lt_owner.data, lockt->lt_owner.len); | |
722 | ||
723 | DECODE_TAIL; | |
724 | } | |
725 | ||
b37ad28b | 726 | static __be32 |
1da177e4 LT |
727 | nfsd4_decode_locku(struct nfsd4_compoundargs *argp, struct nfsd4_locku *locku) |
728 | { | |
729 | DECODE_HEAD; | |
730 | ||
e31a1b66 | 731 | READ_BUF(8); |
06553991 | 732 | locku->lu_type = be32_to_cpup(p++); |
1da177e4 LT |
733 | if ((locku->lu_type < NFS4_READ_LT) || (locku->lu_type > NFS4_WRITEW_LT)) |
734 | goto xdr_error; | |
06553991 | 735 | locku->lu_seqid = be32_to_cpup(p++); |
e31a1b66 BH |
736 | status = nfsd4_decode_stateid(argp, &locku->lu_stateid); |
737 | if (status) | |
738 | return status; | |
739 | READ_BUF(16); | |
542d1ab3 BF |
740 | p = xdr_decode_hyper(p, &locku->lu_offset); |
741 | p = xdr_decode_hyper(p, &locku->lu_length); | |
1da177e4 LT |
742 | |
743 | DECODE_TAIL; | |
744 | } | |
745 | ||
b37ad28b | 746 | static __be32 |
1da177e4 LT |
747 | nfsd4_decode_lookup(struct nfsd4_compoundargs *argp, struct nfsd4_lookup *lookup) |
748 | { | |
749 | DECODE_HEAD; | |
750 | ||
751 | READ_BUF(4); | |
06553991 | 752 | lookup->lo_len = be32_to_cpup(p++); |
1da177e4 LT |
753 | READ_BUF(lookup->lo_len); |
754 | SAVEMEM(lookup->lo_name, lookup->lo_len); | |
a36b1725 | 755 | if ((status = check_filename(lookup->lo_name, lookup->lo_len))) |
1da177e4 LT |
756 | return status; |
757 | ||
758 | DECODE_TAIL; | |
759 | } | |
760 | ||
2c8bd7e0 | 761 | static __be32 nfsd4_decode_share_access(struct nfsd4_compoundargs *argp, u32 *share_access, u32 *deleg_want, u32 *deleg_when) |
04f9e664 BF |
762 | { |
763 | __be32 *p; | |
764 | u32 w; | |
765 | ||
766 | READ_BUF(4); | |
06553991 | 767 | w = be32_to_cpup(p++); |
2c8bd7e0 BH |
768 | *share_access = w & NFS4_SHARE_ACCESS_MASK; |
769 | *deleg_want = w & NFS4_SHARE_WANT_MASK; | |
770 | if (deleg_when) | |
771 | *deleg_when = w & NFS4_SHARE_WHEN_MASK; | |
772 | ||
04f9e664 BF |
773 | switch (w & NFS4_SHARE_ACCESS_MASK) { |
774 | case NFS4_SHARE_ACCESS_READ: | |
775 | case NFS4_SHARE_ACCESS_WRITE: | |
776 | case NFS4_SHARE_ACCESS_BOTH: | |
777 | break; | |
778 | default: | |
779 | return nfserr_bad_xdr; | |
780 | } | |
fc0d14fe | 781 | w &= ~NFS4_SHARE_ACCESS_MASK; |
04f9e664 BF |
782 | if (!w) |
783 | return nfs_ok; | |
784 | if (!argp->minorversion) | |
785 | return nfserr_bad_xdr; | |
786 | switch (w & NFS4_SHARE_WANT_MASK) { | |
787 | case NFS4_SHARE_WANT_NO_PREFERENCE: | |
788 | case NFS4_SHARE_WANT_READ_DELEG: | |
789 | case NFS4_SHARE_WANT_WRITE_DELEG: | |
790 | case NFS4_SHARE_WANT_ANY_DELEG: | |
791 | case NFS4_SHARE_WANT_NO_DELEG: | |
792 | case NFS4_SHARE_WANT_CANCEL: | |
793 | break; | |
794 | default: | |
795 | return nfserr_bad_xdr; | |
796 | } | |
92bac8c5 | 797 | w &= ~NFS4_SHARE_WANT_MASK; |
04f9e664 BF |
798 | if (!w) |
799 | return nfs_ok; | |
2c8bd7e0 BH |
800 | |
801 | if (!deleg_when) /* open_downgrade */ | |
802 | return nfserr_inval; | |
04f9e664 BF |
803 | switch (w) { |
804 | case NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL: | |
805 | case NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED: | |
c668fc6d BH |
806 | case (NFS4_SHARE_SIGNAL_DELEG_WHEN_RESRC_AVAIL | |
807 | NFS4_SHARE_PUSH_DELEG_WHEN_UNCONTENDED): | |
04f9e664 BF |
808 | return nfs_ok; |
809 | } | |
810 | xdr_error: | |
811 | return nfserr_bad_xdr; | |
812 | } | |
813 | ||
814 | static __be32 nfsd4_decode_share_deny(struct nfsd4_compoundargs *argp, u32 *x) | |
815 | { | |
816 | __be32 *p; | |
817 | ||
818 | READ_BUF(4); | |
06553991 | 819 | *x = be32_to_cpup(p++); |
04f9e664 | 820 | /* Note: unlinke access bits, deny bits may be zero. */ |
01cd4afa | 821 | if (*x & ~NFS4_SHARE_DENY_BOTH) |
04f9e664 BF |
822 | return nfserr_bad_xdr; |
823 | return nfs_ok; | |
824 | xdr_error: | |
825 | return nfserr_bad_xdr; | |
826 | } | |
827 | ||
a084daf5 BF |
828 | static __be32 nfsd4_decode_opaque(struct nfsd4_compoundargs *argp, struct xdr_netobj *o) |
829 | { | |
830 | __be32 *p; | |
831 | ||
832 | READ_BUF(4); | |
06553991 | 833 | o->len = be32_to_cpup(p++); |
a084daf5 BF |
834 | |
835 | if (o->len == 0 || o->len > NFS4_OPAQUE_LIMIT) | |
836 | return nfserr_bad_xdr; | |
837 | ||
838 | READ_BUF(o->len); | |
839 | SAVEMEM(o->data, o->len); | |
840 | return nfs_ok; | |
841 | xdr_error: | |
842 | return nfserr_bad_xdr; | |
843 | } | |
844 | ||
b37ad28b | 845 | static __be32 |
1da177e4 LT |
846 | nfsd4_decode_open(struct nfsd4_compoundargs *argp, struct nfsd4_open *open) |
847 | { | |
848 | DECODE_HEAD; | |
2c8bd7e0 | 849 | u32 dummy; |
1da177e4 LT |
850 | |
851 | memset(open->op_bmval, 0, sizeof(open->op_bmval)); | |
852 | open->op_iattr.ia_valid = 0; | |
fe0750e5 | 853 | open->op_openowner = NULL; |
1da177e4 | 854 | |
9d313b17 | 855 | open->op_xdr_error = 0; |
1da177e4 | 856 | /* seqid, share_access, share_deny, clientid, ownerlen */ |
04f9e664 | 857 | READ_BUF(4); |
06553991 | 858 | open->op_seqid = be32_to_cpup(p++); |
2c8bd7e0 BH |
859 | /* decode, yet ignore deleg_when until supported */ |
860 | status = nfsd4_decode_share_access(argp, &open->op_share_access, | |
861 | &open->op_deleg_want, &dummy); | |
04f9e664 BF |
862 | if (status) |
863 | goto xdr_error; | |
864 | status = nfsd4_decode_share_deny(argp, &open->op_share_deny); | |
865 | if (status) | |
866 | goto xdr_error; | |
a084daf5 | 867 | READ_BUF(sizeof(clientid_t)); |
1da177e4 | 868 | COPYMEM(&open->op_clientid, sizeof(clientid_t)); |
a084daf5 BF |
869 | status = nfsd4_decode_opaque(argp, &open->op_owner); |
870 | if (status) | |
871 | goto xdr_error; | |
872 | READ_BUF(4); | |
06553991 | 873 | open->op_create = be32_to_cpup(p++); |
1da177e4 LT |
874 | switch (open->op_create) { |
875 | case NFS4_OPEN_NOCREATE: | |
876 | break; | |
877 | case NFS4_OPEN_CREATE: | |
878 | READ_BUF(4); | |
06553991 | 879 | open->op_createmode = be32_to_cpup(p++); |
1da177e4 LT |
880 | switch (open->op_createmode) { |
881 | case NFS4_CREATE_UNCHECKED: | |
882 | case NFS4_CREATE_GUARDED: | |
c0d6fc8a | 883 | status = nfsd4_decode_fattr(argp, open->op_bmval, |
18032ca0 | 884 | &open->op_iattr, &open->op_acl, &open->op_label); |
c0d6fc8a | 885 | if (status) |
1da177e4 LT |
886 | goto out; |
887 | break; | |
888 | case NFS4_CREATE_EXCLUSIVE: | |
ab4684d1 CL |
889 | READ_BUF(NFS4_VERIFIER_SIZE); |
890 | COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); | |
1da177e4 | 891 | break; |
79fb54ab BH |
892 | case NFS4_CREATE_EXCLUSIVE4_1: |
893 | if (argp->minorversion < 1) | |
894 | goto xdr_error; | |
ab4684d1 CL |
895 | READ_BUF(NFS4_VERIFIER_SIZE); |
896 | COPYMEM(open->op_verf.data, NFS4_VERIFIER_SIZE); | |
79fb54ab | 897 | status = nfsd4_decode_fattr(argp, open->op_bmval, |
18032ca0 | 898 | &open->op_iattr, &open->op_acl, &open->op_label); |
79fb54ab BH |
899 | if (status) |
900 | goto out; | |
901 | break; | |
1da177e4 LT |
902 | default: |
903 | goto xdr_error; | |
904 | } | |
905 | break; | |
906 | default: | |
907 | goto xdr_error; | |
908 | } | |
909 | ||
910 | /* open_claim */ | |
911 | READ_BUF(4); | |
06553991 | 912 | open->op_claim_type = be32_to_cpup(p++); |
1da177e4 LT |
913 | switch (open->op_claim_type) { |
914 | case NFS4_OPEN_CLAIM_NULL: | |
915 | case NFS4_OPEN_CLAIM_DELEGATE_PREV: | |
916 | READ_BUF(4); | |
06553991 | 917 | open->op_fname.len = be32_to_cpup(p++); |
1da177e4 LT |
918 | READ_BUF(open->op_fname.len); |
919 | SAVEMEM(open->op_fname.data, open->op_fname.len); | |
a36b1725 | 920 | if ((status = check_filename(open->op_fname.data, open->op_fname.len))) |
1da177e4 LT |
921 | return status; |
922 | break; | |
923 | case NFS4_OPEN_CLAIM_PREVIOUS: | |
924 | READ_BUF(4); | |
06553991 | 925 | open->op_delegate_type = be32_to_cpup(p++); |
1da177e4 LT |
926 | break; |
927 | case NFS4_OPEN_CLAIM_DELEGATE_CUR: | |
e31a1b66 BH |
928 | status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); |
929 | if (status) | |
930 | return status; | |
931 | READ_BUF(4); | |
06553991 | 932 | open->op_fname.len = be32_to_cpup(p++); |
1da177e4 LT |
933 | READ_BUF(open->op_fname.len); |
934 | SAVEMEM(open->op_fname.data, open->op_fname.len); | |
a36b1725 | 935 | if ((status = check_filename(open->op_fname.data, open->op_fname.len))) |
1da177e4 LT |
936 | return status; |
937 | break; | |
8b289b2c BF |
938 | case NFS4_OPEN_CLAIM_FH: |
939 | case NFS4_OPEN_CLAIM_DELEG_PREV_FH: | |
940 | if (argp->minorversion < 1) | |
941 | goto xdr_error; | |
942 | /* void */ | |
943 | break; | |
944 | case NFS4_OPEN_CLAIM_DELEG_CUR_FH: | |
945 | if (argp->minorversion < 1) | |
946 | goto xdr_error; | |
947 | status = nfsd4_decode_stateid(argp, &open->op_delegate_stateid); | |
948 | if (status) | |
949 | return status; | |
950 | break; | |
1da177e4 LT |
951 | default: |
952 | goto xdr_error; | |
953 | } | |
954 | ||
955 | DECODE_TAIL; | |
956 | } | |
957 | ||
b37ad28b | 958 | static __be32 |
1da177e4 LT |
959 | nfsd4_decode_open_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_open_confirm *open_conf) |
960 | { | |
961 | DECODE_HEAD; | |
e1a90ebd AS |
962 | |
963 | if (argp->minorversion >= 1) | |
964 | return nfserr_notsupp; | |
965 | ||
e31a1b66 BH |
966 | status = nfsd4_decode_stateid(argp, &open_conf->oc_req_stateid); |
967 | if (status) | |
968 | return status; | |
969 | READ_BUF(4); | |
06553991 | 970 | open_conf->oc_seqid = be32_to_cpup(p++); |
e1a90ebd | 971 | |
1da177e4 LT |
972 | DECODE_TAIL; |
973 | } | |
974 | ||
b37ad28b | 975 | static __be32 |
1da177e4 LT |
976 | nfsd4_decode_open_downgrade(struct nfsd4_compoundargs *argp, struct nfsd4_open_downgrade *open_down) |
977 | { | |
978 | DECODE_HEAD; | |
979 | ||
e31a1b66 BH |
980 | status = nfsd4_decode_stateid(argp, &open_down->od_stateid); |
981 | if (status) | |
982 | return status; | |
04f9e664 | 983 | READ_BUF(4); |
06553991 | 984 | open_down->od_seqid = be32_to_cpup(p++); |
2c8bd7e0 BH |
985 | status = nfsd4_decode_share_access(argp, &open_down->od_share_access, |
986 | &open_down->od_deleg_want, NULL); | |
04f9e664 BF |
987 | if (status) |
988 | return status; | |
989 | status = nfsd4_decode_share_deny(argp, &open_down->od_share_deny); | |
990 | if (status) | |
991 | return status; | |
1da177e4 LT |
992 | DECODE_TAIL; |
993 | } | |
994 | ||
b37ad28b | 995 | static __be32 |
1da177e4 LT |
996 | nfsd4_decode_putfh(struct nfsd4_compoundargs *argp, struct nfsd4_putfh *putfh) |
997 | { | |
998 | DECODE_HEAD; | |
999 | ||
1000 | READ_BUF(4); | |
06553991 | 1001 | putfh->pf_fhlen = be32_to_cpup(p++); |
1da177e4 LT |
1002 | if (putfh->pf_fhlen > NFS4_FHSIZE) |
1003 | goto xdr_error; | |
1004 | READ_BUF(putfh->pf_fhlen); | |
1005 | SAVEMEM(putfh->pf_fhval, putfh->pf_fhlen); | |
1006 | ||
1007 | DECODE_TAIL; | |
1008 | } | |
1009 | ||
e1a90ebd AS |
1010 | static __be32 |
1011 | nfsd4_decode_putpubfh(struct nfsd4_compoundargs *argp, void *p) | |
1012 | { | |
1013 | if (argp->minorversion == 0) | |
1014 | return nfs_ok; | |
1015 | return nfserr_notsupp; | |
1016 | } | |
1017 | ||
b37ad28b | 1018 | static __be32 |
1da177e4 LT |
1019 | nfsd4_decode_read(struct nfsd4_compoundargs *argp, struct nfsd4_read *read) |
1020 | { | |
1021 | DECODE_HEAD; | |
1022 | ||
e31a1b66 BH |
1023 | status = nfsd4_decode_stateid(argp, &read->rd_stateid); |
1024 | if (status) | |
1025 | return status; | |
1026 | READ_BUF(12); | |
542d1ab3 | 1027 | p = xdr_decode_hyper(p, &read->rd_offset); |
06553991 | 1028 | read->rd_length = be32_to_cpup(p++); |
1da177e4 LT |
1029 | |
1030 | DECODE_TAIL; | |
1031 | } | |
1032 | ||
b37ad28b | 1033 | static __be32 |
1da177e4 LT |
1034 | nfsd4_decode_readdir(struct nfsd4_compoundargs *argp, struct nfsd4_readdir *readdir) |
1035 | { | |
1036 | DECODE_HEAD; | |
1037 | ||
1038 | READ_BUF(24); | |
542d1ab3 | 1039 | p = xdr_decode_hyper(p, &readdir->rd_cookie); |
1da177e4 | 1040 | COPYMEM(readdir->rd_verf.data, sizeof(readdir->rd_verf.data)); |
06553991 BF |
1041 | readdir->rd_dircount = be32_to_cpup(p++); |
1042 | readdir->rd_maxcount = be32_to_cpup(p++); | |
1da177e4 LT |
1043 | if ((status = nfsd4_decode_bitmap(argp, readdir->rd_bmval))) |
1044 | goto out; | |
1045 | ||
1046 | DECODE_TAIL; | |
1047 | } | |
1048 | ||
b37ad28b | 1049 | static __be32 |
1da177e4 LT |
1050 | nfsd4_decode_remove(struct nfsd4_compoundargs *argp, struct nfsd4_remove *remove) |
1051 | { | |
1052 | DECODE_HEAD; | |
1053 | ||
1054 | READ_BUF(4); | |
06553991 | 1055 | remove->rm_namelen = be32_to_cpup(p++); |
1da177e4 LT |
1056 | READ_BUF(remove->rm_namelen); |
1057 | SAVEMEM(remove->rm_name, remove->rm_namelen); | |
a36b1725 | 1058 | if ((status = check_filename(remove->rm_name, remove->rm_namelen))) |
1da177e4 LT |
1059 | return status; |
1060 | ||
1061 | DECODE_TAIL; | |
1062 | } | |
1063 | ||
b37ad28b | 1064 | static __be32 |
1da177e4 LT |
1065 | nfsd4_decode_rename(struct nfsd4_compoundargs *argp, struct nfsd4_rename *rename) |
1066 | { | |
1067 | DECODE_HEAD; | |
1068 | ||
1069 | READ_BUF(4); | |
06553991 | 1070 | rename->rn_snamelen = be32_to_cpup(p++); |
1da177e4 LT |
1071 | READ_BUF(rename->rn_snamelen + 4); |
1072 | SAVEMEM(rename->rn_sname, rename->rn_snamelen); | |
06553991 | 1073 | rename->rn_tnamelen = be32_to_cpup(p++); |
1da177e4 LT |
1074 | READ_BUF(rename->rn_tnamelen); |
1075 | SAVEMEM(rename->rn_tname, rename->rn_tnamelen); | |
a36b1725 | 1076 | if ((status = check_filename(rename->rn_sname, rename->rn_snamelen))) |
1da177e4 | 1077 | return status; |
a36b1725 | 1078 | if ((status = check_filename(rename->rn_tname, rename->rn_tnamelen))) |
1da177e4 LT |
1079 | return status; |
1080 | ||
1081 | DECODE_TAIL; | |
1082 | } | |
1083 | ||
b37ad28b | 1084 | static __be32 |
1da177e4 LT |
1085 | nfsd4_decode_renew(struct nfsd4_compoundargs *argp, clientid_t *clientid) |
1086 | { | |
1087 | DECODE_HEAD; | |
1088 | ||
e1a90ebd AS |
1089 | if (argp->minorversion >= 1) |
1090 | return nfserr_notsupp; | |
1091 | ||
1da177e4 LT |
1092 | READ_BUF(sizeof(clientid_t)); |
1093 | COPYMEM(clientid, sizeof(clientid_t)); | |
1094 | ||
1095 | DECODE_TAIL; | |
1096 | } | |
1097 | ||
dcb488a3 AA |
1098 | static __be32 |
1099 | nfsd4_decode_secinfo(struct nfsd4_compoundargs *argp, | |
1100 | struct nfsd4_secinfo *secinfo) | |
1101 | { | |
1102 | DECODE_HEAD; | |
1103 | ||
1104 | READ_BUF(4); | |
06553991 | 1105 | secinfo->si_namelen = be32_to_cpup(p++); |
dcb488a3 AA |
1106 | READ_BUF(secinfo->si_namelen); |
1107 | SAVEMEM(secinfo->si_name, secinfo->si_namelen); | |
a36b1725 | 1108 | status = check_filename(secinfo->si_name, secinfo->si_namelen); |
dcb488a3 AA |
1109 | if (status) |
1110 | return status; | |
1111 | DECODE_TAIL; | |
1112 | } | |
1113 | ||
04f4ad16 BF |
1114 | static __be32 |
1115 | nfsd4_decode_secinfo_no_name(struct nfsd4_compoundargs *argp, | |
1116 | struct nfsd4_secinfo_no_name *sin) | |
1117 | { | |
1118 | DECODE_HEAD; | |
1119 | ||
1120 | READ_BUF(4); | |
06553991 | 1121 | sin->sin_style = be32_to_cpup(p++); |
04f4ad16 BF |
1122 | DECODE_TAIL; |
1123 | } | |
1124 | ||
b37ad28b | 1125 | static __be32 |
1da177e4 LT |
1126 | nfsd4_decode_setattr(struct nfsd4_compoundargs *argp, struct nfsd4_setattr *setattr) |
1127 | { | |
e31a1b66 | 1128 | __be32 status; |
1da177e4 | 1129 | |
e31a1b66 BH |
1130 | status = nfsd4_decode_stateid(argp, &setattr->sa_stateid); |
1131 | if (status) | |
1132 | return status; | |
3c8e0316 | 1133 | return nfsd4_decode_fattr(argp, setattr->sa_bmval, &setattr->sa_iattr, |
18032ca0 | 1134 | &setattr->sa_acl, &setattr->sa_label); |
1da177e4 LT |
1135 | } |
1136 | ||
b37ad28b | 1137 | static __be32 |
1da177e4 LT |
1138 | nfsd4_decode_setclientid(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid *setclientid) |
1139 | { | |
1140 | DECODE_HEAD; | |
1141 | ||
e1a90ebd AS |
1142 | if (argp->minorversion >= 1) |
1143 | return nfserr_notsupp; | |
1144 | ||
ab4684d1 CL |
1145 | READ_BUF(NFS4_VERIFIER_SIZE); |
1146 | COPYMEM(setclientid->se_verf.data, NFS4_VERIFIER_SIZE); | |
1da177e4 | 1147 | |
a084daf5 BF |
1148 | status = nfsd4_decode_opaque(argp, &setclientid->se_name); |
1149 | if (status) | |
1150 | return nfserr_bad_xdr; | |
1151 | READ_BUF(8); | |
06553991 BF |
1152 | setclientid->se_callback_prog = be32_to_cpup(p++); |
1153 | setclientid->se_callback_netid_len = be32_to_cpup(p++); | |
1da177e4 LT |
1154 | |
1155 | READ_BUF(setclientid->se_callback_netid_len + 4); | |
1156 | SAVEMEM(setclientid->se_callback_netid_val, setclientid->se_callback_netid_len); | |
06553991 | 1157 | setclientid->se_callback_addr_len = be32_to_cpup(p++); |
1da177e4 LT |
1158 | |
1159 | READ_BUF(setclientid->se_callback_addr_len + 4); | |
1160 | SAVEMEM(setclientid->se_callback_addr_val, setclientid->se_callback_addr_len); | |
06553991 | 1161 | setclientid->se_callback_ident = be32_to_cpup(p++); |
1da177e4 LT |
1162 | |
1163 | DECODE_TAIL; | |
1164 | } | |
1165 | ||
b37ad28b | 1166 | static __be32 |
1da177e4 LT |
1167 | nfsd4_decode_setclientid_confirm(struct nfsd4_compoundargs *argp, struct nfsd4_setclientid_confirm *scd_c) |
1168 | { | |
1169 | DECODE_HEAD; | |
1170 | ||
e1a90ebd AS |
1171 | if (argp->minorversion >= 1) |
1172 | return nfserr_notsupp; | |
1173 | ||
ab4684d1 | 1174 | READ_BUF(8 + NFS4_VERIFIER_SIZE); |
1da177e4 | 1175 | COPYMEM(&scd_c->sc_clientid, 8); |
ab4684d1 | 1176 | COPYMEM(&scd_c->sc_confirm, NFS4_VERIFIER_SIZE); |
1da177e4 LT |
1177 | |
1178 | DECODE_TAIL; | |
1179 | } | |
1180 | ||
1181 | /* Also used for NVERIFY */ | |
b37ad28b | 1182 | static __be32 |
1da177e4 LT |
1183 | nfsd4_decode_verify(struct nfsd4_compoundargs *argp, struct nfsd4_verify *verify) |
1184 | { | |
1da177e4 LT |
1185 | DECODE_HEAD; |
1186 | ||
1187 | if ((status = nfsd4_decode_bitmap(argp, verify->ve_bmval))) | |
1188 | goto out; | |
1189 | ||
1190 | /* For convenience's sake, we compare raw xdr'd attributes in | |
e5f95703 BF |
1191 | * nfsd4_proc_verify */ |
1192 | ||
1da177e4 | 1193 | READ_BUF(4); |
06553991 | 1194 | verify->ve_attrlen = be32_to_cpup(p++); |
1da177e4 LT |
1195 | READ_BUF(verify->ve_attrlen); |
1196 | SAVEMEM(verify->ve_attrval, verify->ve_attrlen); | |
1197 | ||
1198 | DECODE_TAIL; | |
1199 | } | |
1200 | ||
b37ad28b | 1201 | static __be32 |
1da177e4 LT |
1202 | nfsd4_decode_write(struct nfsd4_compoundargs *argp, struct nfsd4_write *write) |
1203 | { | |
1204 | int avail; | |
1da177e4 LT |
1205 | int len; |
1206 | DECODE_HEAD; | |
1207 | ||
e31a1b66 BH |
1208 | status = nfsd4_decode_stateid(argp, &write->wr_stateid); |
1209 | if (status) | |
1210 | return status; | |
1211 | READ_BUF(16); | |
542d1ab3 | 1212 | p = xdr_decode_hyper(p, &write->wr_offset); |
06553991 | 1213 | write->wr_stable_how = be32_to_cpup(p++); |
1da177e4 LT |
1214 | if (write->wr_stable_how > 2) |
1215 | goto xdr_error; | |
06553991 | 1216 | write->wr_buflen = be32_to_cpup(p++); |
1da177e4 LT |
1217 | |
1218 | /* Sorry .. no magic macros for this.. * | |
1219 | * READ_BUF(write->wr_buflen); | |
1220 | * SAVEMEM(write->wr_buf, write->wr_buflen); | |
1221 | */ | |
1222 | avail = (char*)argp->end - (char*)argp->p; | |
1223 | if (avail + argp->pagelen < write->wr_buflen) { | |
817cb9d4 CL |
1224 | dprintk("NFSD: xdr error (%s:%d)\n", |
1225 | __FILE__, __LINE__); | |
1da177e4 LT |
1226 | goto xdr_error; |
1227 | } | |
70cc7f75 BF |
1228 | write->wr_head.iov_base = p; |
1229 | write->wr_head.iov_len = avail; | |
70cc7f75 | 1230 | write->wr_pagelist = argp->pagelist; |
5a80a54d BF |
1231 | |
1232 | len = XDR_QUADLEN(write->wr_buflen) << 2; | |
1233 | if (len >= avail) { | |
1234 | int pages; | |
1235 | ||
1236 | len -= avail; | |
1237 | ||
1238 | pages = len >> PAGE_SHIFT; | |
1239 | argp->pagelist += pages; | |
1240 | argp->pagelen -= pages * PAGE_SIZE; | |
1241 | len -= pages * PAGE_SIZE; | |
1242 | ||
1243 | argp->p = (__be32 *)page_address(argp->pagelist[0]); | |
365da4ad | 1244 | argp->pagelist++; |
5a80a54d | 1245 | argp->end = argp->p + XDR_QUADLEN(PAGE_SIZE); |
1da177e4 | 1246 | } |
5a80a54d | 1247 | argp->p += XDR_QUADLEN(len); |
1da177e4 LT |
1248 | |
1249 | DECODE_TAIL; | |
1250 | } | |
1251 | ||
b37ad28b | 1252 | static __be32 |
1da177e4 LT |
1253 | nfsd4_decode_release_lockowner(struct nfsd4_compoundargs *argp, struct nfsd4_release_lockowner *rlockowner) |
1254 | { | |
1255 | DECODE_HEAD; | |
1256 | ||
e1a90ebd AS |
1257 | if (argp->minorversion >= 1) |
1258 | return nfserr_notsupp; | |
1259 | ||
1da177e4 LT |
1260 | READ_BUF(12); |
1261 | COPYMEM(&rlockowner->rl_clientid, sizeof(clientid_t)); | |
06553991 | 1262 | rlockowner->rl_owner.len = be32_to_cpup(p++); |
1da177e4 LT |
1263 | READ_BUF(rlockowner->rl_owner.len); |
1264 | READMEM(rlockowner->rl_owner.data, rlockowner->rl_owner.len); | |
1265 | ||
60adfc50 AA |
1266 | if (argp->minorversion && !zero_clientid(&rlockowner->rl_clientid)) |
1267 | return nfserr_inval; | |
1da177e4 LT |
1268 | DECODE_TAIL; |
1269 | } | |
1270 | ||
2db134eb AA |
1271 | static __be32 |
1272 | nfsd4_decode_exchange_id(struct nfsd4_compoundargs *argp, | |
0733d213 | 1273 | struct nfsd4_exchange_id *exid) |
2db134eb | 1274 | { |
5afa040b | 1275 | int dummy, tmp; |
0733d213 AA |
1276 | DECODE_HEAD; |
1277 | ||
1278 | READ_BUF(NFS4_VERIFIER_SIZE); | |
1279 | COPYMEM(exid->verifier.data, NFS4_VERIFIER_SIZE); | |
1280 | ||
a084daf5 BF |
1281 | status = nfsd4_decode_opaque(argp, &exid->clname); |
1282 | if (status) | |
1283 | return nfserr_bad_xdr; | |
0733d213 AA |
1284 | |
1285 | READ_BUF(4); | |
06553991 | 1286 | exid->flags = be32_to_cpup(p++); |
0733d213 AA |
1287 | |
1288 | /* Ignore state_protect4_a */ | |
1289 | READ_BUF(4); | |
06553991 | 1290 | exid->spa_how = be32_to_cpup(p++); |
0733d213 AA |
1291 | switch (exid->spa_how) { |
1292 | case SP4_NONE: | |
1293 | break; | |
1294 | case SP4_MACH_CRED: | |
1295 | /* spo_must_enforce */ | |
1296 | READ_BUF(4); | |
06553991 | 1297 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1298 | READ_BUF(dummy * 4); |
1299 | p += dummy; | |
1300 | ||
1301 | /* spo_must_allow */ | |
1302 | READ_BUF(4); | |
06553991 | 1303 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1304 | READ_BUF(dummy * 4); |
1305 | p += dummy; | |
1306 | break; | |
1307 | case SP4_SSV: | |
1308 | /* ssp_ops */ | |
1309 | READ_BUF(4); | |
06553991 | 1310 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1311 | READ_BUF(dummy * 4); |
1312 | p += dummy; | |
1313 | ||
1314 | READ_BUF(4); | |
06553991 | 1315 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1316 | READ_BUF(dummy * 4); |
1317 | p += dummy; | |
1318 | ||
1319 | /* ssp_hash_algs<> */ | |
1320 | READ_BUF(4); | |
06553991 | 1321 | tmp = be32_to_cpup(p++); |
5afa040b MJ |
1322 | while (tmp--) { |
1323 | READ_BUF(4); | |
06553991 | 1324 | dummy = be32_to_cpup(p++); |
5afa040b MJ |
1325 | READ_BUF(dummy); |
1326 | p += XDR_QUADLEN(dummy); | |
1327 | } | |
0733d213 AA |
1328 | |
1329 | /* ssp_encr_algs<> */ | |
1330 | READ_BUF(4); | |
06553991 | 1331 | tmp = be32_to_cpup(p++); |
5afa040b MJ |
1332 | while (tmp--) { |
1333 | READ_BUF(4); | |
06553991 | 1334 | dummy = be32_to_cpup(p++); |
5afa040b MJ |
1335 | READ_BUF(dummy); |
1336 | p += XDR_QUADLEN(dummy); | |
1337 | } | |
0733d213 AA |
1338 | |
1339 | /* ssp_window and ssp_num_gss_handles */ | |
1340 | READ_BUF(8); | |
06553991 BF |
1341 | dummy = be32_to_cpup(p++); |
1342 | dummy = be32_to_cpup(p++); | |
0733d213 AA |
1343 | break; |
1344 | default: | |
1345 | goto xdr_error; | |
1346 | } | |
1347 | ||
1348 | /* Ignore Implementation ID */ | |
1349 | READ_BUF(4); /* nfs_impl_id4 array length */ | |
06553991 | 1350 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1351 | |
1352 | if (dummy > 1) | |
1353 | goto xdr_error; | |
1354 | ||
1355 | if (dummy == 1) { | |
1356 | /* nii_domain */ | |
1357 | READ_BUF(4); | |
06553991 | 1358 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1359 | READ_BUF(dummy); |
1360 | p += XDR_QUADLEN(dummy); | |
1361 | ||
1362 | /* nii_name */ | |
1363 | READ_BUF(4); | |
06553991 | 1364 | dummy = be32_to_cpup(p++); |
0733d213 AA |
1365 | READ_BUF(dummy); |
1366 | p += XDR_QUADLEN(dummy); | |
1367 | ||
1368 | /* nii_date */ | |
1369 | READ_BUF(12); | |
1370 | p += 3; | |
1371 | } | |
1372 | DECODE_TAIL; | |
2db134eb AA |
1373 | } |
1374 | ||
1375 | static __be32 | |
1376 | nfsd4_decode_create_session(struct nfsd4_compoundargs *argp, | |
1377 | struct nfsd4_create_session *sess) | |
1378 | { | |
ec6b5d7b | 1379 | DECODE_HEAD; |
ec6b5d7b | 1380 | u32 dummy; |
ec6b5d7b AA |
1381 | |
1382 | READ_BUF(16); | |
1383 | COPYMEM(&sess->clientid, 8); | |
06553991 BF |
1384 | sess->seqid = be32_to_cpup(p++); |
1385 | sess->flags = be32_to_cpup(p++); | |
ec6b5d7b AA |
1386 | |
1387 | /* Fore channel attrs */ | |
1388 | READ_BUF(28); | |
06553991 BF |
1389 | dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */ |
1390 | sess->fore_channel.maxreq_sz = be32_to_cpup(p++); | |
1391 | sess->fore_channel.maxresp_sz = be32_to_cpup(p++); | |
1392 | sess->fore_channel.maxresp_cached = be32_to_cpup(p++); | |
1393 | sess->fore_channel.maxops = be32_to_cpup(p++); | |
1394 | sess->fore_channel.maxreqs = be32_to_cpup(p++); | |
1395 | sess->fore_channel.nr_rdma_attrs = be32_to_cpup(p++); | |
ec6b5d7b AA |
1396 | if (sess->fore_channel.nr_rdma_attrs == 1) { |
1397 | READ_BUF(4); | |
06553991 | 1398 | sess->fore_channel.rdma_attrs = be32_to_cpup(p++); |
ec6b5d7b AA |
1399 | } else if (sess->fore_channel.nr_rdma_attrs > 1) { |
1400 | dprintk("Too many fore channel attr bitmaps!\n"); | |
1401 | goto xdr_error; | |
1402 | } | |
1403 | ||
1404 | /* Back channel attrs */ | |
1405 | READ_BUF(28); | |
06553991 BF |
1406 | dummy = be32_to_cpup(p++); /* headerpadsz is always 0 */ |
1407 | sess->back_channel.maxreq_sz = be32_to_cpup(p++); | |
1408 | sess->back_channel.maxresp_sz = be32_to_cpup(p++); | |
1409 | sess->back_channel.maxresp_cached = be32_to_cpup(p++); | |
1410 | sess->back_channel.maxops = be32_to_cpup(p++); | |
1411 | sess->back_channel.maxreqs = be32_to_cpup(p++); | |
1412 | sess->back_channel.nr_rdma_attrs = be32_to_cpup(p++); | |
ec6b5d7b AA |
1413 | if (sess->back_channel.nr_rdma_attrs == 1) { |
1414 | READ_BUF(4); | |
06553991 | 1415 | sess->back_channel.rdma_attrs = be32_to_cpup(p++); |
ec6b5d7b AA |
1416 | } else if (sess->back_channel.nr_rdma_attrs > 1) { |
1417 | dprintk("Too many back channel attr bitmaps!\n"); | |
1418 | goto xdr_error; | |
1419 | } | |
1420 | ||
acb2887e | 1421 | READ_BUF(4); |
06553991 | 1422 | sess->callback_prog = be32_to_cpup(p++); |
acb2887e | 1423 | nfsd4_decode_cb_sec(argp, &sess->cb_sec); |
ec6b5d7b | 1424 | DECODE_TAIL; |
2db134eb AA |
1425 | } |
1426 | ||
1427 | static __be32 | |
1428 | nfsd4_decode_destroy_session(struct nfsd4_compoundargs *argp, | |
1429 | struct nfsd4_destroy_session *destroy_session) | |
1430 | { | |
e10e0cfc BH |
1431 | DECODE_HEAD; |
1432 | READ_BUF(NFS4_MAX_SESSIONID_LEN); | |
1433 | COPYMEM(destroy_session->sessionid.data, NFS4_MAX_SESSIONID_LEN); | |
1434 | ||
1435 | DECODE_TAIL; | |
2db134eb AA |
1436 | } |
1437 | ||
e1ca12df BS |
1438 | static __be32 |
1439 | nfsd4_decode_free_stateid(struct nfsd4_compoundargs *argp, | |
1440 | struct nfsd4_free_stateid *free_stateid) | |
1441 | { | |
1442 | DECODE_HEAD; | |
1443 | ||
1444 | READ_BUF(sizeof(stateid_t)); | |
06553991 | 1445 | free_stateid->fr_stateid.si_generation = be32_to_cpup(p++); |
e1ca12df BS |
1446 | COPYMEM(&free_stateid->fr_stateid.si_opaque, sizeof(stateid_opaque_t)); |
1447 | ||
1448 | DECODE_TAIL; | |
1449 | } | |
1450 | ||
2db134eb AA |
1451 | static __be32 |
1452 | nfsd4_decode_sequence(struct nfsd4_compoundargs *argp, | |
1453 | struct nfsd4_sequence *seq) | |
1454 | { | |
b85d4c01 BH |
1455 | DECODE_HEAD; |
1456 | ||
1457 | READ_BUF(NFS4_MAX_SESSIONID_LEN + 16); | |
1458 | COPYMEM(seq->sessionid.data, NFS4_MAX_SESSIONID_LEN); | |
06553991 BF |
1459 | seq->seqid = be32_to_cpup(p++); |
1460 | seq->slotid = be32_to_cpup(p++); | |
1461 | seq->maxslots = be32_to_cpup(p++); | |
1462 | seq->cachethis = be32_to_cpup(p++); | |
b85d4c01 BH |
1463 | |
1464 | DECODE_TAIL; | |
2db134eb AA |
1465 | } |
1466 | ||
17456804 BS |
1467 | static __be32 |
1468 | nfsd4_decode_test_stateid(struct nfsd4_compoundargs *argp, struct nfsd4_test_stateid *test_stateid) | |
1469 | { | |
17456804 | 1470 | int i; |
03cfb420 BS |
1471 | __be32 *p, status; |
1472 | struct nfsd4_test_stateid_id *stateid; | |
17456804 BS |
1473 | |
1474 | READ_BUF(4); | |
1475 | test_stateid->ts_num_ids = ntohl(*p++); | |
1476 | ||
03cfb420 | 1477 | INIT_LIST_HEAD(&test_stateid->ts_stateid_list); |
17456804 BS |
1478 | |
1479 | for (i = 0; i < test_stateid->ts_num_ids; i++) { | |
03cfb420 BS |
1480 | stateid = kmalloc(sizeof(struct nfsd4_test_stateid_id), GFP_KERNEL); |
1481 | if (!stateid) { | |
afcf6792 | 1482 | status = nfserrno(-ENOMEM); |
03cfb420 BS |
1483 | goto out; |
1484 | } | |
1485 | ||
ce043ac8 | 1486 | defer_free(argp, stateid); |
03cfb420 BS |
1487 | INIT_LIST_HEAD(&stateid->ts_id_list); |
1488 | list_add_tail(&stateid->ts_id_list, &test_stateid->ts_stateid_list); | |
1489 | ||
1490 | status = nfsd4_decode_stateid(argp, &stateid->ts_id_stateid); | |
17456804 | 1491 | if (status) |
03cfb420 | 1492 | goto out; |
17456804 BS |
1493 | } |
1494 | ||
1495 | status = 0; | |
1496 | out: | |
1497 | return status; | |
1498 | xdr_error: | |
1499 | dprintk("NFSD: xdr error (%s:%d)\n", __FILE__, __LINE__); | |
1500 | status = nfserr_bad_xdr; | |
1501 | goto out; | |
1502 | } | |
1503 | ||
345c2842 MJ |
1504 | static __be32 nfsd4_decode_destroy_clientid(struct nfsd4_compoundargs *argp, struct nfsd4_destroy_clientid *dc) |
1505 | { | |
1506 | DECODE_HEAD; | |
1507 | ||
1508 | READ_BUF(8); | |
1509 | COPYMEM(&dc->clientid, 8); | |
1510 | ||
1511 | DECODE_TAIL; | |
1512 | } | |
1513 | ||
4dc6ec00 BF |
1514 | static __be32 nfsd4_decode_reclaim_complete(struct nfsd4_compoundargs *argp, struct nfsd4_reclaim_complete *rc) |
1515 | { | |
1516 | DECODE_HEAD; | |
1517 | ||
1518 | READ_BUF(4); | |
06553991 | 1519 | rc->rca_one_fs = be32_to_cpup(p++); |
4dc6ec00 BF |
1520 | |
1521 | DECODE_TAIL; | |
1522 | } | |
1523 | ||
347e0ad9 BH |
1524 | static __be32 |
1525 | nfsd4_decode_noop(struct nfsd4_compoundargs *argp, void *p) | |
1526 | { | |
1527 | return nfs_ok; | |
1528 | } | |
1529 | ||
3c375c6f BH |
1530 | static __be32 |
1531 | nfsd4_decode_notsupp(struct nfsd4_compoundargs *argp, void *p) | |
1532 | { | |
1e685ec2 | 1533 | return nfserr_notsupp; |
3c375c6f BH |
1534 | } |
1535 | ||
347e0ad9 BH |
1536 | typedef __be32(*nfsd4_dec)(struct nfsd4_compoundargs *argp, void *); |
1537 | ||
1538 | static nfsd4_dec nfsd4_dec_ops[] = { | |
ad1060c8 BF |
1539 | [OP_ACCESS] = (nfsd4_dec)nfsd4_decode_access, |
1540 | [OP_CLOSE] = (nfsd4_dec)nfsd4_decode_close, | |
1541 | [OP_COMMIT] = (nfsd4_dec)nfsd4_decode_commit, | |
1542 | [OP_CREATE] = (nfsd4_dec)nfsd4_decode_create, | |
1543 | [OP_DELEGPURGE] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1544 | [OP_DELEGRETURN] = (nfsd4_dec)nfsd4_decode_delegreturn, | |
1545 | [OP_GETATTR] = (nfsd4_dec)nfsd4_decode_getattr, | |
1546 | [OP_GETFH] = (nfsd4_dec)nfsd4_decode_noop, | |
1547 | [OP_LINK] = (nfsd4_dec)nfsd4_decode_link, | |
1548 | [OP_LOCK] = (nfsd4_dec)nfsd4_decode_lock, | |
1549 | [OP_LOCKT] = (nfsd4_dec)nfsd4_decode_lockt, | |
1550 | [OP_LOCKU] = (nfsd4_dec)nfsd4_decode_locku, | |
1551 | [OP_LOOKUP] = (nfsd4_dec)nfsd4_decode_lookup, | |
1552 | [OP_LOOKUPP] = (nfsd4_dec)nfsd4_decode_noop, | |
1553 | [OP_NVERIFY] = (nfsd4_dec)nfsd4_decode_verify, | |
1554 | [OP_OPEN] = (nfsd4_dec)nfsd4_decode_open, | |
1555 | [OP_OPENATTR] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1556 | [OP_OPEN_CONFIRM] = (nfsd4_dec)nfsd4_decode_open_confirm, | |
1557 | [OP_OPEN_DOWNGRADE] = (nfsd4_dec)nfsd4_decode_open_downgrade, | |
1558 | [OP_PUTFH] = (nfsd4_dec)nfsd4_decode_putfh, | |
e1a90ebd | 1559 | [OP_PUTPUBFH] = (nfsd4_dec)nfsd4_decode_putpubfh, |
ad1060c8 BF |
1560 | [OP_PUTROOTFH] = (nfsd4_dec)nfsd4_decode_noop, |
1561 | [OP_READ] = (nfsd4_dec)nfsd4_decode_read, | |
1562 | [OP_READDIR] = (nfsd4_dec)nfsd4_decode_readdir, | |
1563 | [OP_READLINK] = (nfsd4_dec)nfsd4_decode_noop, | |
1564 | [OP_REMOVE] = (nfsd4_dec)nfsd4_decode_remove, | |
1565 | [OP_RENAME] = (nfsd4_dec)nfsd4_decode_rename, | |
1566 | [OP_RENEW] = (nfsd4_dec)nfsd4_decode_renew, | |
1567 | [OP_RESTOREFH] = (nfsd4_dec)nfsd4_decode_noop, | |
1568 | [OP_SAVEFH] = (nfsd4_dec)nfsd4_decode_noop, | |
1569 | [OP_SECINFO] = (nfsd4_dec)nfsd4_decode_secinfo, | |
1570 | [OP_SETATTR] = (nfsd4_dec)nfsd4_decode_setattr, | |
1571 | [OP_SETCLIENTID] = (nfsd4_dec)nfsd4_decode_setclientid, | |
1572 | [OP_SETCLIENTID_CONFIRM] = (nfsd4_dec)nfsd4_decode_setclientid_confirm, | |
1573 | [OP_VERIFY] = (nfsd4_dec)nfsd4_decode_verify, | |
1574 | [OP_WRITE] = (nfsd4_dec)nfsd4_decode_write, | |
1575 | [OP_RELEASE_LOCKOWNER] = (nfsd4_dec)nfsd4_decode_release_lockowner, | |
2db134eb AA |
1576 | |
1577 | /* new operations for NFSv4.1 */ | |
cb73a9f4 | 1578 | [OP_BACKCHANNEL_CTL] = (nfsd4_dec)nfsd4_decode_backchannel_ctl, |
1d1bc8f2 | 1579 | [OP_BIND_CONN_TO_SESSION]= (nfsd4_dec)nfsd4_decode_bind_conn_to_session, |
9064caae RD |
1580 | [OP_EXCHANGE_ID] = (nfsd4_dec)nfsd4_decode_exchange_id, |
1581 | [OP_CREATE_SESSION] = (nfsd4_dec)nfsd4_decode_create_session, | |
1582 | [OP_DESTROY_SESSION] = (nfsd4_dec)nfsd4_decode_destroy_session, | |
e1ca12df | 1583 | [OP_FREE_STATEID] = (nfsd4_dec)nfsd4_decode_free_stateid, |
9064caae RD |
1584 | [OP_GET_DIR_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, |
1585 | [OP_GETDEVICEINFO] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1586 | [OP_GETDEVICELIST] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1587 | [OP_LAYOUTCOMMIT] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1588 | [OP_LAYOUTGET] = (nfsd4_dec)nfsd4_decode_notsupp, | |
1589 | [OP_LAYOUTRETURN] = (nfsd4_dec)nfsd4_decode_notsupp, | |
04f4ad16 | 1590 | [OP_SECINFO_NO_NAME] = (nfsd4_dec)nfsd4_decode_secinfo_no_name, |
9064caae RD |
1591 | [OP_SEQUENCE] = (nfsd4_dec)nfsd4_decode_sequence, |
1592 | [OP_SET_SSV] = (nfsd4_dec)nfsd4_decode_notsupp, | |
17456804 | 1593 | [OP_TEST_STATEID] = (nfsd4_dec)nfsd4_decode_test_stateid, |
9064caae | 1594 | [OP_WANT_DELEGATION] = (nfsd4_dec)nfsd4_decode_notsupp, |
345c2842 | 1595 | [OP_DESTROY_CLIENTID] = (nfsd4_dec)nfsd4_decode_destroy_clientid, |
4dc6ec00 | 1596 | [OP_RECLAIM_COMPLETE] = (nfsd4_dec)nfsd4_decode_reclaim_complete, |
2db134eb AA |
1597 | }; |
1598 | ||
e1a90ebd AS |
1599 | static inline bool |
1600 | nfsd4_opnum_in_range(struct nfsd4_compoundargs *argp, struct nfsd4_op *op) | |
1601 | { | |
8217d146 | 1602 | if (op->opnum < FIRST_NFS4_OP) |
e1a90ebd | 1603 | return false; |
8217d146 | 1604 | else if (argp->minorversion == 0 && op->opnum > LAST_NFS40_OP) |
e1a90ebd | 1605 | return false; |
8217d146 AS |
1606 | else if (argp->minorversion == 1 && op->opnum > LAST_NFS41_OP) |
1607 | return false; | |
1608 | else if (argp->minorversion == 2 && op->opnum > LAST_NFS42_OP) | |
e1a90ebd AS |
1609 | return false; |
1610 | return true; | |
1611 | } | |
f2feb96b | 1612 | |
b37ad28b | 1613 | static __be32 |
1da177e4 LT |
1614 | nfsd4_decode_compound(struct nfsd4_compoundargs *argp) |
1615 | { | |
1616 | DECODE_HEAD; | |
1617 | struct nfsd4_op *op; | |
1091006c | 1618 | bool cachethis = false; |
a5cddc88 BF |
1619 | int auth_slack= argp->rqstp->rq_auth_slack; |
1620 | int max_reply = auth_slack + 8; /* opcnt, status */ | |
b0e35fda BF |
1621 | int readcount = 0; |
1622 | int readbytes = 0; | |
1da177e4 LT |
1623 | int i; |
1624 | ||
1da177e4 | 1625 | READ_BUF(4); |
06553991 | 1626 | argp->taglen = be32_to_cpup(p++); |
1da177e4 LT |
1627 | READ_BUF(argp->taglen + 8); |
1628 | SAVEMEM(argp->tag, argp->taglen); | |
06553991 BF |
1629 | argp->minorversion = be32_to_cpup(p++); |
1630 | argp->opcnt = be32_to_cpup(p++); | |
4f0cefbf | 1631 | max_reply += 4 + (XDR_QUADLEN(argp->taglen) << 2); |
1da177e4 LT |
1632 | |
1633 | if (argp->taglen > NFSD4_MAX_TAGLEN) | |
1634 | goto xdr_error; | |
1635 | if (argp->opcnt > 100) | |
1636 | goto xdr_error; | |
1637 | ||
e8c96f8c | 1638 | if (argp->opcnt > ARRAY_SIZE(argp->iops)) { |
1da177e4 LT |
1639 | argp->ops = kmalloc(argp->opcnt * sizeof(*argp->ops), GFP_KERNEL); |
1640 | if (!argp->ops) { | |
1641 | argp->ops = argp->iops; | |
817cb9d4 | 1642 | dprintk("nfsd: couldn't allocate room for COMPOUND\n"); |
1da177e4 LT |
1643 | goto xdr_error; |
1644 | } | |
1645 | } | |
1646 | ||
e1a90ebd | 1647 | if (argp->minorversion > NFSD_SUPPORTED_MINOR_VERSION) |
30cff1ff BH |
1648 | argp->opcnt = 0; |
1649 | ||
1da177e4 LT |
1650 | for (i = 0; i < argp->opcnt; i++) { |
1651 | op = &argp->ops[i]; | |
1652 | op->replay = NULL; | |
1653 | ||
8a61b18c | 1654 | READ_BUF(4); |
06553991 | 1655 | op->opnum = be32_to_cpup(p++); |
1da177e4 | 1656 | |
e1a90ebd AS |
1657 | if (nfsd4_opnum_in_range(argp, op)) |
1658 | op->status = nfsd4_dec_ops[op->opnum](argp, &op->u); | |
347e0ad9 | 1659 | else { |
1da177e4 LT |
1660 | op->opnum = OP_ILLEGAL; |
1661 | op->status = nfserr_op_illegal; | |
1da177e4 | 1662 | } |
1091006c BF |
1663 | /* |
1664 | * We'll try to cache the result in the DRC if any one | |
1665 | * op in the compound wants to be cached: | |
1666 | */ | |
1667 | cachethis |= nfsd4_cache_this_op(op); | |
6ff40dec | 1668 | |
b0e35fda BF |
1669 | if (op->opnum == OP_READ) { |
1670 | readcount++; | |
1671 | readbytes += nfsd4_max_reply(argp->rqstp, op); | |
1672 | } else | |
1673 | max_reply += nfsd4_max_reply(argp->rqstp, op); | |
e372ba60 BF |
1674 | |
1675 | if (op->status) { | |
1676 | argp->opcnt = i+1; | |
1677 | break; | |
1678 | } | |
1da177e4 | 1679 | } |
1091006c BF |
1680 | /* Sessions make the DRC unnecessary: */ |
1681 | if (argp->minorversion) | |
1682 | cachethis = false; | |
b0e35fda | 1683 | svc_reserve(argp->rqstp, max_reply + readbytes); |
1091006c | 1684 | argp->rqstp->rq_cachetype = cachethis ? RC_REPLBUFF : RC_NOCACHE; |
1da177e4 | 1685 | |
a5cddc88 | 1686 | if (readcount > 1 || max_reply > PAGE_SIZE - auth_slack) |
b0e35fda BF |
1687 | argp->rqstp->rq_splice_ok = false; |
1688 | ||
1da177e4 LT |
1689 | DECODE_TAIL; |
1690 | } | |
1da177e4 | 1691 | |
d05d5744 | 1692 | static __be32 *encode_change(__be32 *p, struct kstat *stat, struct inode *inode) |
c654b8a9 BF |
1693 | { |
1694 | if (IS_I_VERSION(inode)) { | |
d05d5744 | 1695 | p = xdr_encode_hyper(p, inode->i_version); |
c654b8a9 | 1696 | } else { |
d05d5744 BF |
1697 | *p++ = cpu_to_be32(stat->ctime.tv_sec); |
1698 | *p++ = cpu_to_be32(stat->ctime.tv_nsec); | |
c654b8a9 | 1699 | } |
d05d5744 | 1700 | return p; |
c654b8a9 BF |
1701 | } |
1702 | ||
d05d5744 | 1703 | static __be32 *encode_cinfo(__be32 *p, struct nfsd4_change_info *c) |
c654b8a9 | 1704 | { |
d05d5744 | 1705 | *p++ = cpu_to_be32(c->atomic); |
c654b8a9 | 1706 | if (c->change_supported) { |
d05d5744 BF |
1707 | p = xdr_encode_hyper(p, c->before_change); |
1708 | p = xdr_encode_hyper(p, c->after_change); | |
c654b8a9 | 1709 | } else { |
d05d5744 BF |
1710 | *p++ = cpu_to_be32(c->before_ctime_sec); |
1711 | *p++ = cpu_to_be32(c->before_ctime_nsec); | |
1712 | *p++ = cpu_to_be32(c->after_ctime_sec); | |
1713 | *p++ = cpu_to_be32(c->after_ctime_nsec); | |
c654b8a9 | 1714 | } |
d05d5744 | 1715 | return p; |
c654b8a9 | 1716 | } |
1da177e4 | 1717 | |
81c3f413 | 1718 | /* Encode as an array of strings the string given with components |
e7a0444a | 1719 | * separated @sep, escaped with esc_enter and esc_exit. |
81c3f413 | 1720 | */ |
ddd1ea56 BF |
1721 | static __be32 nfsd4_encode_components_esc(struct xdr_stream *xdr, char sep, |
1722 | char *components, char esc_enter, | |
1723 | char esc_exit) | |
81c3f413 | 1724 | { |
ddd1ea56 | 1725 | __be32 *p; |
082d4bd7 BF |
1726 | __be32 pathlen; |
1727 | int pathlen_offset; | |
81c3f413 | 1728 | int strlen, count=0; |
e7a0444a | 1729 | char *str, *end, *next; |
81c3f413 BF |
1730 | |
1731 | dprintk("nfsd4_encode_components(%s)\n", components); | |
082d4bd7 BF |
1732 | |
1733 | pathlen_offset = xdr->buf->len; | |
ddd1ea56 BF |
1734 | p = xdr_reserve_space(xdr, 4); |
1735 | if (!p) | |
81c3f413 | 1736 | return nfserr_resource; |
082d4bd7 BF |
1737 | p++; /* We will fill this in with @count later */ |
1738 | ||
81c3f413 BF |
1739 | end = str = components; |
1740 | while (*end) { | |
e7a0444a WAA |
1741 | bool found_esc = false; |
1742 | ||
1743 | /* try to parse as esc_start, ..., esc_end, sep */ | |
1744 | if (*str == esc_enter) { | |
1745 | for (; *end && (*end != esc_exit); end++) | |
1746 | /* find esc_exit or end of string */; | |
1747 | next = end + 1; | |
1748 | if (*end && (!*next || *next == sep)) { | |
1749 | str++; | |
1750 | found_esc = true; | |
1751 | } | |
1752 | } | |
1753 | ||
1754 | if (!found_esc) | |
1755 | for (; *end && (*end != sep); end++) | |
1756 | /* find sep or end of string */; | |
1757 | ||
81c3f413 BF |
1758 | strlen = end - str; |
1759 | if (strlen) { | |
ddd1ea56 BF |
1760 | p = xdr_reserve_space(xdr, strlen + 4); |
1761 | if (!p) | |
81c3f413 | 1762 | return nfserr_resource; |
0c0c267b | 1763 | p = xdr_encode_opaque(p, str, strlen); |
81c3f413 BF |
1764 | count++; |
1765 | } | |
1766 | else | |
1767 | end++; | |
1768 | str = end; | |
1769 | } | |
082d4bd7 BF |
1770 | pathlen = htonl(xdr->buf->len - pathlen_offset); |
1771 | write_bytes_to_xdr_buf(xdr->buf, pathlen_offset, &pathlen, 4); | |
81c3f413 BF |
1772 | return 0; |
1773 | } | |
1774 | ||
e7a0444a WAA |
1775 | /* Encode as an array of strings the string given with components |
1776 | * separated @sep. | |
1777 | */ | |
ddd1ea56 BF |
1778 | static __be32 nfsd4_encode_components(struct xdr_stream *xdr, char sep, |
1779 | char *components) | |
e7a0444a | 1780 | { |
ddd1ea56 | 1781 | return nfsd4_encode_components_esc(xdr, sep, components, 0, 0); |
e7a0444a WAA |
1782 | } |
1783 | ||
81c3f413 BF |
1784 | /* |
1785 | * encode a location element of a fs_locations structure | |
1786 | */ | |
ddd1ea56 BF |
1787 | static __be32 nfsd4_encode_fs_location4(struct xdr_stream *xdr, |
1788 | struct nfsd4_fs_location *location) | |
81c3f413 | 1789 | { |
b37ad28b | 1790 | __be32 status; |
81c3f413 | 1791 | |
ddd1ea56 | 1792 | status = nfsd4_encode_components_esc(xdr, ':', location->hosts, |
e7a0444a | 1793 | '[', ']'); |
81c3f413 BF |
1794 | if (status) |
1795 | return status; | |
ddd1ea56 | 1796 | status = nfsd4_encode_components(xdr, '/', location->path); |
81c3f413 BF |
1797 | if (status) |
1798 | return status; | |
81c3f413 BF |
1799 | return 0; |
1800 | } | |
1801 | ||
1802 | /* | |
ed748aac | 1803 | * Encode a path in RFC3530 'pathname4' format |
81c3f413 | 1804 | */ |
ddd1ea56 BF |
1805 | static __be32 nfsd4_encode_path(struct xdr_stream *xdr, |
1806 | const struct path *root, | |
1807 | const struct path *path) | |
81c3f413 | 1808 | { |
301f0268 | 1809 | struct path cur = *path; |
ddd1ea56 | 1810 | __be32 *p; |
ed748aac TM |
1811 | struct dentry **components = NULL; |
1812 | unsigned int ncomponents = 0; | |
1813 | __be32 err = nfserr_jukebox; | |
81c3f413 | 1814 | |
ed748aac | 1815 | dprintk("nfsd4_encode_components("); |
81c3f413 | 1816 | |
ed748aac TM |
1817 | path_get(&cur); |
1818 | /* First walk the path up to the nfsd root, and store the | |
1819 | * dentries/path components in an array. | |
1820 | */ | |
1821 | for (;;) { | |
1822 | if (cur.dentry == root->dentry && cur.mnt == root->mnt) | |
1823 | break; | |
1824 | if (cur.dentry == cur.mnt->mnt_root) { | |
1825 | if (follow_up(&cur)) | |
1826 | continue; | |
1827 | goto out_free; | |
1828 | } | |
1829 | if ((ncomponents & 15) == 0) { | |
1830 | struct dentry **new; | |
1831 | new = krealloc(components, | |
1832 | sizeof(*new) * (ncomponents + 16), | |
1833 | GFP_KERNEL); | |
1834 | if (!new) | |
1835 | goto out_free; | |
1836 | components = new; | |
1837 | } | |
1838 | components[ncomponents++] = cur.dentry; | |
1839 | cur.dentry = dget_parent(cur.dentry); | |
1840 | } | |
ddd1ea56 BF |
1841 | err = nfserr_resource; |
1842 | p = xdr_reserve_space(xdr, 4); | |
1843 | if (!p) | |
ed748aac | 1844 | goto out_free; |
c373b0a4 | 1845 | *p++ = cpu_to_be32(ncomponents); |
ed748aac TM |
1846 | |
1847 | while (ncomponents) { | |
1848 | struct dentry *dentry = components[ncomponents - 1]; | |
301f0268 | 1849 | unsigned int len; |
ed748aac | 1850 | |
301f0268 AV |
1851 | spin_lock(&dentry->d_lock); |
1852 | len = dentry->d_name.len; | |
ddd1ea56 BF |
1853 | p = xdr_reserve_space(xdr, len + 4); |
1854 | if (!p) { | |
301f0268 | 1855 | spin_unlock(&dentry->d_lock); |
ed748aac | 1856 | goto out_free; |
301f0268 | 1857 | } |
0c0c267b | 1858 | p = xdr_encode_opaque(p, dentry->d_name.name, len); |
ed748aac | 1859 | dprintk("/%s", dentry->d_name.name); |
301f0268 | 1860 | spin_unlock(&dentry->d_lock); |
ed748aac TM |
1861 | dput(dentry); |
1862 | ncomponents--; | |
81c3f413 | 1863 | } |
ed748aac | 1864 | |
ed748aac TM |
1865 | err = 0; |
1866 | out_free: | |
1867 | dprintk(")\n"); | |
1868 | while (ncomponents) | |
1869 | dput(components[--ncomponents]); | |
1870 | kfree(components); | |
1871 | path_put(&cur); | |
1872 | return err; | |
1873 | } | |
1874 | ||
ddd1ea56 BF |
1875 | static __be32 nfsd4_encode_fsloc_fsroot(struct xdr_stream *xdr, |
1876 | struct svc_rqst *rqstp, const struct path *path) | |
ed748aac TM |
1877 | { |
1878 | struct svc_export *exp_ps; | |
1879 | __be32 res; | |
1880 | ||
1881 | exp_ps = rqst_find_fsidzero_export(rqstp); | |
1882 | if (IS_ERR(exp_ps)) | |
1883 | return nfserrno(PTR_ERR(exp_ps)); | |
ddd1ea56 | 1884 | res = nfsd4_encode_path(xdr, &exp_ps->ex_path, path); |
ed748aac TM |
1885 | exp_put(exp_ps); |
1886 | return res; | |
81c3f413 BF |
1887 | } |
1888 | ||
1889 | /* | |
1890 | * encode a fs_locations structure | |
1891 | */ | |
ddd1ea56 BF |
1892 | static __be32 nfsd4_encode_fs_locations(struct xdr_stream *xdr, |
1893 | struct svc_rqst *rqstp, struct svc_export *exp) | |
81c3f413 | 1894 | { |
b37ad28b | 1895 | __be32 status; |
cc45f017 | 1896 | int i; |
ddd1ea56 | 1897 | __be32 *p; |
81c3f413 | 1898 | struct nfsd4_fs_locations *fslocs = &exp->ex_fslocs; |
81c3f413 | 1899 | |
ddd1ea56 | 1900 | status = nfsd4_encode_fsloc_fsroot(xdr, rqstp, &exp->ex_path); |
81c3f413 BF |
1901 | if (status) |
1902 | return status; | |
ddd1ea56 BF |
1903 | p = xdr_reserve_space(xdr, 4); |
1904 | if (!p) | |
81c3f413 | 1905 | return nfserr_resource; |
c373b0a4 | 1906 | *p++ = cpu_to_be32(fslocs->locations_count); |
81c3f413 | 1907 | for (i=0; i<fslocs->locations_count; i++) { |
ddd1ea56 | 1908 | status = nfsd4_encode_fs_location4(xdr, &fslocs->locations[i]); |
81c3f413 BF |
1909 | if (status) |
1910 | return status; | |
1911 | } | |
81c3f413 BF |
1912 | return 0; |
1913 | } | |
1da177e4 | 1914 | |
3d2544b1 BF |
1915 | static u32 nfs4_file_type(umode_t mode) |
1916 | { | |
1917 | switch (mode & S_IFMT) { | |
1918 | case S_IFIFO: return NF4FIFO; | |
1919 | case S_IFCHR: return NF4CHR; | |
1920 | case S_IFDIR: return NF4DIR; | |
1921 | case S_IFBLK: return NF4BLK; | |
1922 | case S_IFLNK: return NF4LNK; | |
1923 | case S_IFREG: return NF4REG; | |
1924 | case S_IFSOCK: return NF4SOCK; | |
1925 | default: return NF4BAD; | |
1926 | }; | |
1927 | } | |
1da177e4 | 1928 | |
b37ad28b | 1929 | static inline __be32 |
ddd1ea56 BF |
1930 | nfsd4_encode_aclname(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
1931 | struct nfs4_ace *ace) | |
1da177e4 | 1932 | { |
3554116d | 1933 | if (ace->whotype != NFS4_ACL_WHO_NAMED) |
ddd1ea56 | 1934 | return nfs4_acl_write_who(xdr, ace->whotype); |
3554116d | 1935 | else if (ace->flag & NFS4_ACE_IDENTIFIER_GROUP) |
ddd1ea56 | 1936 | return nfsd4_encode_group(xdr, rqstp, ace->who_gid); |
3554116d | 1937 | else |
ddd1ea56 | 1938 | return nfsd4_encode_user(xdr, rqstp, ace->who_uid); |
1da177e4 LT |
1939 | } |
1940 | ||
42ca0993 BF |
1941 | #define WORD0_ABSENT_FS_ATTRS (FATTR4_WORD0_FS_LOCATIONS | FATTR4_WORD0_FSID | \ |
1942 | FATTR4_WORD0_RDATTR_ERROR) | |
1943 | #define WORD1_ABSENT_FS_ATTRS FATTR4_WORD1_MOUNTED_ON_FILEID | |
1944 | ||
18032ca0 DQ |
1945 | #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
1946 | static inline __be32 | |
ddd1ea56 BF |
1947 | nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
1948 | void *context, int len) | |
18032ca0 | 1949 | { |
ddd1ea56 | 1950 | __be32 *p; |
18032ca0 | 1951 | |
ddd1ea56 BF |
1952 | p = xdr_reserve_space(xdr, len + 4 + 4 + 4); |
1953 | if (!p) | |
18032ca0 DQ |
1954 | return nfserr_resource; |
1955 | ||
1956 | /* | |
1957 | * For now we use a 0 here to indicate the null translation; in | |
1958 | * the future we may place a call to translation code here. | |
1959 | */ | |
c373b0a4 BF |
1960 | *p++ = cpu_to_be32(0); /* lfs */ |
1961 | *p++ = cpu_to_be32(0); /* pi */ | |
18032ca0 | 1962 | p = xdr_encode_opaque(p, context, len); |
18032ca0 DQ |
1963 | return 0; |
1964 | } | |
1965 | #else | |
1966 | static inline __be32 | |
ddd1ea56 BF |
1967 | nfsd4_encode_security_label(struct xdr_stream *xdr, struct svc_rqst *rqstp, |
1968 | void *context, int len) | |
18032ca0 DQ |
1969 | { return 0; } |
1970 | #endif | |
1971 | ||
b37ad28b | 1972 | static __be32 fattr_handle_absent_fs(u32 *bmval0, u32 *bmval1, u32 *rdattr_err) |
42ca0993 BF |
1973 | { |
1974 | /* As per referral draft: */ | |
1975 | if (*bmval0 & ~WORD0_ABSENT_FS_ATTRS || | |
1976 | *bmval1 & ~WORD1_ABSENT_FS_ATTRS) { | |
1977 | if (*bmval0 & FATTR4_WORD0_RDATTR_ERROR || | |
1978 | *bmval0 & FATTR4_WORD0_FS_LOCATIONS) | |
1979 | *rdattr_err = NFSERR_MOVED; | |
1980 | else | |
1981 | return nfserr_moved; | |
1982 | } | |
1983 | *bmval0 &= WORD0_ABSENT_FS_ATTRS; | |
1984 | *bmval1 &= WORD1_ABSENT_FS_ATTRS; | |
1985 | return 0; | |
1986 | } | |
1da177e4 | 1987 | |
ae7095a7 BF |
1988 | |
1989 | static int get_parent_attributes(struct svc_export *exp, struct kstat *stat) | |
1990 | { | |
1991 | struct path path = exp->ex_path; | |
1992 | int err; | |
1993 | ||
1994 | path_get(&path); | |
1995 | while (follow_up(&path)) { | |
1996 | if (path.dentry != path.mnt->mnt_root) | |
1997 | break; | |
1998 | } | |
3dadecce | 1999 | err = vfs_getattr(&path, stat); |
ae7095a7 BF |
2000 | path_put(&path); |
2001 | return err; | |
2002 | } | |
2003 | ||
1da177e4 LT |
2004 | /* |
2005 | * Note: @fhp can be NULL; in this case, we might have to compose the filehandle | |
2006 | * ourselves. | |
1da177e4 | 2007 | */ |
da2ebce6 | 2008 | static __be32 |
d5184658 BF |
2009 | nfsd4_encode_fattr(struct xdr_stream *xdr, struct svc_fh *fhp, |
2010 | struct svc_export *exp, | |
2011 | struct dentry *dentry, u32 *bmval, | |
406a7ea9 | 2012 | struct svc_rqst *rqstp, int ignore_crossmnt) |
1da177e4 LT |
2013 | { |
2014 | u32 bmval0 = bmval[0]; | |
2015 | u32 bmval1 = bmval[1]; | |
7e705706 | 2016 | u32 bmval2 = bmval[2]; |
1da177e4 | 2017 | struct kstat stat; |
d50e6136 | 2018 | struct svc_fh *tempfh = NULL; |
1da177e4 | 2019 | struct kstatfs statfs; |
ddd1ea56 | 2020 | __be32 *p; |
1fcea5b2 | 2021 | int starting_len = xdr->buf->len; |
082d4bd7 BF |
2022 | int attrlen_offset; |
2023 | __be32 attrlen; | |
1da177e4 LT |
2024 | u32 dummy; |
2025 | u64 dummy64; | |
42ca0993 | 2026 | u32 rdattr_err = 0; |
b37ad28b | 2027 | __be32 status; |
b8dd7b9a | 2028 | int err; |
1da177e4 LT |
2029 | int aclsupport = 0; |
2030 | struct nfs4_acl *acl = NULL; | |
18032ca0 DQ |
2031 | void *context = NULL; |
2032 | int contextlen; | |
2033 | bool contextsupport = false; | |
7e705706 AA |
2034 | struct nfsd4_compoundres *resp = rqstp->rq_resp; |
2035 | u32 minorversion = resp->cstate.minorversion; | |
ebabe9a9 CH |
2036 | struct path path = { |
2037 | .mnt = exp->ex_path.mnt, | |
2038 | .dentry = dentry, | |
2039 | }; | |
3d733711 | 2040 | struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); |
1da177e4 LT |
2041 | |
2042 | BUG_ON(bmval1 & NFSD_WRITEONLY_ATTRS_WORD1); | |
7e705706 AA |
2043 | BUG_ON(bmval0 & ~nfsd_suppattrs0(minorversion)); |
2044 | BUG_ON(bmval1 & ~nfsd_suppattrs1(minorversion)); | |
2045 | BUG_ON(bmval2 & ~nfsd_suppattrs2(minorversion)); | |
1da177e4 | 2046 | |
42ca0993 | 2047 | if (exp->ex_fslocs.migrated) { |
7e705706 | 2048 | BUG_ON(bmval[2]); |
42ca0993 BF |
2049 | status = fattr_handle_absent_fs(&bmval0, &bmval1, &rdattr_err); |
2050 | if (status) | |
2051 | goto out; | |
2052 | } | |
2053 | ||
3dadecce | 2054 | err = vfs_getattr(&path, &stat); |
b8dd7b9a | 2055 | if (err) |
1da177e4 | 2056 | goto out_nfserr; |
12337901 CH |
2057 | if ((bmval0 & (FATTR4_WORD0_FILES_AVAIL | FATTR4_WORD0_FILES_FREE | |
2058 | FATTR4_WORD0_FILES_TOTAL | FATTR4_WORD0_MAXNAME)) || | |
1da177e4 LT |
2059 | (bmval1 & (FATTR4_WORD1_SPACE_AVAIL | FATTR4_WORD1_SPACE_FREE | |
2060 | FATTR4_WORD1_SPACE_TOTAL))) { | |
ebabe9a9 | 2061 | err = vfs_statfs(&path, &statfs); |
b8dd7b9a | 2062 | if (err) |
1da177e4 LT |
2063 | goto out_nfserr; |
2064 | } | |
2065 | if ((bmval0 & (FATTR4_WORD0_FILEHANDLE | FATTR4_WORD0_FSID)) && !fhp) { | |
d50e6136 BF |
2066 | tempfh = kmalloc(sizeof(struct svc_fh), GFP_KERNEL); |
2067 | status = nfserr_jukebox; | |
2068 | if (!tempfh) | |
2069 | goto out; | |
2070 | fh_init(tempfh, NFS4_FHSIZE); | |
2071 | status = fh_compose(tempfh, exp, dentry, NULL); | |
1da177e4 LT |
2072 | if (status) |
2073 | goto out; | |
d50e6136 | 2074 | fhp = tempfh; |
1da177e4 LT |
2075 | } |
2076 | if (bmval0 & (FATTR4_WORD0_ACL | FATTR4_WORD0_ACLSUPPORT | |
2077 | | FATTR4_WORD0_SUPPORTED_ATTRS)) { | |
b8dd7b9a AV |
2078 | err = nfsd4_get_nfs4_acl(rqstp, dentry, &acl); |
2079 | aclsupport = (err == 0); | |
1da177e4 | 2080 | if (bmval0 & FATTR4_WORD0_ACL) { |
b8dd7b9a | 2081 | if (err == -EOPNOTSUPP) |
1da177e4 | 2082 | bmval0 &= ~FATTR4_WORD0_ACL; |
b8dd7b9a | 2083 | else if (err == -EINVAL) { |
1da177e4 LT |
2084 | status = nfserr_attrnotsupp; |
2085 | goto out; | |
b8dd7b9a | 2086 | } else if (err != 0) |
1da177e4 LT |
2087 | goto out_nfserr; |
2088 | } | |
2089 | } | |
1da177e4 | 2090 | |
18032ca0 DQ |
2091 | #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
2092 | if ((bmval[2] & FATTR4_WORD2_SECURITY_LABEL) || | |
2093 | bmval[0] & FATTR4_WORD0_SUPPORTED_ATTRS) { | |
2094 | err = security_inode_getsecctx(dentry->d_inode, | |
2095 | &context, &contextlen); | |
2096 | contextsupport = (err == 0); | |
2097 | if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { | |
2098 | if (err == -EOPNOTSUPP) | |
2099 | bmval2 &= ~FATTR4_WORD2_SECURITY_LABEL; | |
2100 | else if (err) | |
2101 | goto out_nfserr; | |
2102 | } | |
2103 | } | |
2104 | #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ | |
2105 | ||
2b44f1ba | 2106 | if (bmval2) { |
ddd1ea56 BF |
2107 | p = xdr_reserve_space(xdr, 16); |
2108 | if (!p) | |
2b44f1ba | 2109 | goto out_resource; |
c373b0a4 BF |
2110 | *p++ = cpu_to_be32(3); |
2111 | *p++ = cpu_to_be32(bmval0); | |
2112 | *p++ = cpu_to_be32(bmval1); | |
2113 | *p++ = cpu_to_be32(bmval2); | |
2b44f1ba | 2114 | } else if (bmval1) { |
ddd1ea56 BF |
2115 | p = xdr_reserve_space(xdr, 12); |
2116 | if (!p) | |
2b44f1ba | 2117 | goto out_resource; |
c373b0a4 BF |
2118 | *p++ = cpu_to_be32(2); |
2119 | *p++ = cpu_to_be32(bmval0); | |
2120 | *p++ = cpu_to_be32(bmval1); | |
7e705706 | 2121 | } else { |
ddd1ea56 BF |
2122 | p = xdr_reserve_space(xdr, 8); |
2123 | if (!p) | |
2b44f1ba | 2124 | goto out_resource; |
c373b0a4 BF |
2125 | *p++ = cpu_to_be32(1); |
2126 | *p++ = cpu_to_be32(bmval0); | |
7e705706 | 2127 | } |
082d4bd7 BF |
2128 | |
2129 | attrlen_offset = xdr->buf->len; | |
ddd1ea56 BF |
2130 | p = xdr_reserve_space(xdr, 4); |
2131 | if (!p) | |
2132 | goto out_resource; | |
082d4bd7 | 2133 | p++; /* to be backfilled later */ |
1da177e4 LT |
2134 | |
2135 | if (bmval0 & FATTR4_WORD0_SUPPORTED_ATTRS) { | |
7e705706 AA |
2136 | u32 word0 = nfsd_suppattrs0(minorversion); |
2137 | u32 word1 = nfsd_suppattrs1(minorversion); | |
2138 | u32 word2 = nfsd_suppattrs2(minorversion); | |
2139 | ||
42ca0993 BF |
2140 | if (!aclsupport) |
2141 | word0 &= ~FATTR4_WORD0_ACL; | |
18032ca0 DQ |
2142 | if (!contextsupport) |
2143 | word2 &= ~FATTR4_WORD2_SECURITY_LABEL; | |
7e705706 | 2144 | if (!word2) { |
ddd1ea56 BF |
2145 | p = xdr_reserve_space(xdr, 12); |
2146 | if (!p) | |
2b44f1ba | 2147 | goto out_resource; |
c373b0a4 BF |
2148 | *p++ = cpu_to_be32(2); |
2149 | *p++ = cpu_to_be32(word0); | |
2150 | *p++ = cpu_to_be32(word1); | |
7e705706 | 2151 | } else { |
ddd1ea56 BF |
2152 | p = xdr_reserve_space(xdr, 16); |
2153 | if (!p) | |
2b44f1ba | 2154 | goto out_resource; |
c373b0a4 BF |
2155 | *p++ = cpu_to_be32(3); |
2156 | *p++ = cpu_to_be32(word0); | |
2157 | *p++ = cpu_to_be32(word1); | |
2158 | *p++ = cpu_to_be32(word2); | |
7e705706 | 2159 | } |
1da177e4 LT |
2160 | } |
2161 | if (bmval0 & FATTR4_WORD0_TYPE) { | |
ddd1ea56 BF |
2162 | p = xdr_reserve_space(xdr, 4); |
2163 | if (!p) | |
1da177e4 | 2164 | goto out_resource; |
3d2544b1 | 2165 | dummy = nfs4_file_type(stat.mode); |
6b6d8137 BF |
2166 | if (dummy == NF4BAD) { |
2167 | status = nfserr_serverfault; | |
2168 | goto out; | |
2169 | } | |
c373b0a4 | 2170 | *p++ = cpu_to_be32(dummy); |
1da177e4 LT |
2171 | } |
2172 | if (bmval0 & FATTR4_WORD0_FH_EXPIRE_TYPE) { | |
ddd1ea56 BF |
2173 | p = xdr_reserve_space(xdr, 4); |
2174 | if (!p) | |
1da177e4 | 2175 | goto out_resource; |
49640001 | 2176 | if (exp->ex_flags & NFSEXP_NOSUBTREECHECK) |
c373b0a4 | 2177 | *p++ = cpu_to_be32(NFS4_FH_PERSISTENT); |
49640001 | 2178 | else |
c373b0a4 BF |
2179 | *p++ = cpu_to_be32(NFS4_FH_PERSISTENT| |
2180 | NFS4_FH_VOL_RENAME); | |
1da177e4 LT |
2181 | } |
2182 | if (bmval0 & FATTR4_WORD0_CHANGE) { | |
ddd1ea56 BF |
2183 | p = xdr_reserve_space(xdr, 8); |
2184 | if (!p) | |
1da177e4 | 2185 | goto out_resource; |
d05d5744 | 2186 | p = encode_change(p, &stat, dentry->d_inode); |
1da177e4 LT |
2187 | } |
2188 | if (bmval0 & FATTR4_WORD0_SIZE) { | |
ddd1ea56 BF |
2189 | p = xdr_reserve_space(xdr, 8); |
2190 | if (!p) | |
1da177e4 | 2191 | goto out_resource; |
b64c7f3b | 2192 | p = xdr_encode_hyper(p, stat.size); |
1da177e4 LT |
2193 | } |
2194 | if (bmval0 & FATTR4_WORD0_LINK_SUPPORT) { | |
ddd1ea56 BF |
2195 | p = xdr_reserve_space(xdr, 4); |
2196 | if (!p) | |
1da177e4 | 2197 | goto out_resource; |
c373b0a4 | 2198 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2199 | } |
2200 | if (bmval0 & FATTR4_WORD0_SYMLINK_SUPPORT) { | |
ddd1ea56 BF |
2201 | p = xdr_reserve_space(xdr, 4); |
2202 | if (!p) | |
1da177e4 | 2203 | goto out_resource; |
c373b0a4 | 2204 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2205 | } |
2206 | if (bmval0 & FATTR4_WORD0_NAMED_ATTR) { | |
ddd1ea56 BF |
2207 | p = xdr_reserve_space(xdr, 4); |
2208 | if (!p) | |
1da177e4 | 2209 | goto out_resource; |
c373b0a4 | 2210 | *p++ = cpu_to_be32(0); |
1da177e4 LT |
2211 | } |
2212 | if (bmval0 & FATTR4_WORD0_FSID) { | |
ddd1ea56 BF |
2213 | p = xdr_reserve_space(xdr, 16); |
2214 | if (!p) | |
1da177e4 | 2215 | goto out_resource; |
42ca0993 | 2216 | if (exp->ex_fslocs.migrated) { |
b64c7f3b BF |
2217 | p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MAJOR); |
2218 | p = xdr_encode_hyper(p, NFS4_REFERRAL_FSID_MINOR); | |
af6a4e28 N |
2219 | } else switch(fsid_source(fhp)) { |
2220 | case FSIDSOURCE_FSID: | |
b64c7f3b BF |
2221 | p = xdr_encode_hyper(p, (u64)exp->ex_fsid); |
2222 | p = xdr_encode_hyper(p, (u64)0); | |
af6a4e28 N |
2223 | break; |
2224 | case FSIDSOURCE_DEV: | |
c373b0a4 BF |
2225 | *p++ = cpu_to_be32(0); |
2226 | *p++ = cpu_to_be32(MAJOR(stat.dev)); | |
2227 | *p++ = cpu_to_be32(0); | |
2228 | *p++ = cpu_to_be32(MINOR(stat.dev)); | |
af6a4e28 N |
2229 | break; |
2230 | case FSIDSOURCE_UUID: | |
94eb3689 KM |
2231 | p = xdr_encode_opaque_fixed(p, exp->ex_uuid, |
2232 | EX_UUID_LEN); | |
af6a4e28 | 2233 | break; |
1da177e4 LT |
2234 | } |
2235 | } | |
2236 | if (bmval0 & FATTR4_WORD0_UNIQUE_HANDLES) { | |
ddd1ea56 BF |
2237 | p = xdr_reserve_space(xdr, 4); |
2238 | if (!p) | |
1da177e4 | 2239 | goto out_resource; |
c373b0a4 | 2240 | *p++ = cpu_to_be32(0); |
1da177e4 LT |
2241 | } |
2242 | if (bmval0 & FATTR4_WORD0_LEASE_TIME) { | |
ddd1ea56 BF |
2243 | p = xdr_reserve_space(xdr, 4); |
2244 | if (!p) | |
1da177e4 | 2245 | goto out_resource; |
c373b0a4 | 2246 | *p++ = cpu_to_be32(nn->nfsd4_lease); |
1da177e4 LT |
2247 | } |
2248 | if (bmval0 & FATTR4_WORD0_RDATTR_ERROR) { | |
ddd1ea56 BF |
2249 | p = xdr_reserve_space(xdr, 4); |
2250 | if (!p) | |
1da177e4 | 2251 | goto out_resource; |
c373b0a4 | 2252 | *p++ = cpu_to_be32(rdattr_err); |
1da177e4 LT |
2253 | } |
2254 | if (bmval0 & FATTR4_WORD0_ACL) { | |
2255 | struct nfs4_ace *ace; | |
1da177e4 LT |
2256 | |
2257 | if (acl == NULL) { | |
ddd1ea56 BF |
2258 | p = xdr_reserve_space(xdr, 4); |
2259 | if (!p) | |
1da177e4 LT |
2260 | goto out_resource; |
2261 | ||
c373b0a4 | 2262 | *p++ = cpu_to_be32(0); |
1da177e4 LT |
2263 | goto out_acl; |
2264 | } | |
ddd1ea56 BF |
2265 | p = xdr_reserve_space(xdr, 4); |
2266 | if (!p) | |
1da177e4 | 2267 | goto out_resource; |
c373b0a4 | 2268 | *p++ = cpu_to_be32(acl->naces); |
1da177e4 | 2269 | |
28e05dd8 | 2270 | for (ace = acl->aces; ace < acl->aces + acl->naces; ace++) { |
ddd1ea56 BF |
2271 | p = xdr_reserve_space(xdr, 4*3); |
2272 | if (!p) | |
1da177e4 | 2273 | goto out_resource; |
c373b0a4 BF |
2274 | *p++ = cpu_to_be32(ace->type); |
2275 | *p++ = cpu_to_be32(ace->flag); | |
2276 | *p++ = cpu_to_be32(ace->access_mask & | |
2277 | NFS4_ACE_MASK_ALL); | |
ddd1ea56 | 2278 | status = nfsd4_encode_aclname(xdr, rqstp, ace); |
1da177e4 LT |
2279 | if (status) |
2280 | goto out; | |
2281 | } | |
2282 | } | |
2283 | out_acl: | |
2284 | if (bmval0 & FATTR4_WORD0_ACLSUPPORT) { | |
ddd1ea56 BF |
2285 | p = xdr_reserve_space(xdr, 4); |
2286 | if (!p) | |
1da177e4 | 2287 | goto out_resource; |
c373b0a4 | 2288 | *p++ = cpu_to_be32(aclsupport ? |
1da177e4 LT |
2289 | ACL4_SUPPORT_ALLOW_ACL|ACL4_SUPPORT_DENY_ACL : 0); |
2290 | } | |
2291 | if (bmval0 & FATTR4_WORD0_CANSETTIME) { | |
ddd1ea56 BF |
2292 | p = xdr_reserve_space(xdr, 4); |
2293 | if (!p) | |
1da177e4 | 2294 | goto out_resource; |
c373b0a4 | 2295 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2296 | } |
2297 | if (bmval0 & FATTR4_WORD0_CASE_INSENSITIVE) { | |
ddd1ea56 BF |
2298 | p = xdr_reserve_space(xdr, 4); |
2299 | if (!p) | |
1da177e4 | 2300 | goto out_resource; |
c373b0a4 | 2301 | *p++ = cpu_to_be32(0); |
1da177e4 LT |
2302 | } |
2303 | if (bmval0 & FATTR4_WORD0_CASE_PRESERVING) { | |
ddd1ea56 BF |
2304 | p = xdr_reserve_space(xdr, 4); |
2305 | if (!p) | |
1da177e4 | 2306 | goto out_resource; |
c373b0a4 | 2307 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2308 | } |
2309 | if (bmval0 & FATTR4_WORD0_CHOWN_RESTRICTED) { | |
ddd1ea56 BF |
2310 | p = xdr_reserve_space(xdr, 4); |
2311 | if (!p) | |
1da177e4 | 2312 | goto out_resource; |
c373b0a4 | 2313 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2314 | } |
2315 | if (bmval0 & FATTR4_WORD0_FILEHANDLE) { | |
ddd1ea56 BF |
2316 | p = xdr_reserve_space(xdr, fhp->fh_handle.fh_size + 4); |
2317 | if (!p) | |
1da177e4 | 2318 | goto out_resource; |
0c0c267b BF |
2319 | p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, |
2320 | fhp->fh_handle.fh_size); | |
1da177e4 LT |
2321 | } |
2322 | if (bmval0 & FATTR4_WORD0_FILEID) { | |
ddd1ea56 BF |
2323 | p = xdr_reserve_space(xdr, 8); |
2324 | if (!p) | |
1da177e4 | 2325 | goto out_resource; |
b64c7f3b | 2326 | p = xdr_encode_hyper(p, stat.ino); |
1da177e4 LT |
2327 | } |
2328 | if (bmval0 & FATTR4_WORD0_FILES_AVAIL) { | |
ddd1ea56 BF |
2329 | p = xdr_reserve_space(xdr, 8); |
2330 | if (!p) | |
1da177e4 | 2331 | goto out_resource; |
b64c7f3b | 2332 | p = xdr_encode_hyper(p, (u64) statfs.f_ffree); |
1da177e4 LT |
2333 | } |
2334 | if (bmval0 & FATTR4_WORD0_FILES_FREE) { | |
ddd1ea56 BF |
2335 | p = xdr_reserve_space(xdr, 8); |
2336 | if (!p) | |
1da177e4 | 2337 | goto out_resource; |
b64c7f3b | 2338 | p = xdr_encode_hyper(p, (u64) statfs.f_ffree); |
1da177e4 LT |
2339 | } |
2340 | if (bmval0 & FATTR4_WORD0_FILES_TOTAL) { | |
ddd1ea56 BF |
2341 | p = xdr_reserve_space(xdr, 8); |
2342 | if (!p) | |
1da177e4 | 2343 | goto out_resource; |
b64c7f3b | 2344 | p = xdr_encode_hyper(p, (u64) statfs.f_files); |
1da177e4 | 2345 | } |
81c3f413 | 2346 | if (bmval0 & FATTR4_WORD0_FS_LOCATIONS) { |
ddd1ea56 | 2347 | status = nfsd4_encode_fs_locations(xdr, rqstp, exp); |
81c3f413 BF |
2348 | if (status) |
2349 | goto out; | |
2350 | } | |
1da177e4 | 2351 | if (bmval0 & FATTR4_WORD0_HOMOGENEOUS) { |
ddd1ea56 BF |
2352 | p = xdr_reserve_space(xdr, 4); |
2353 | if (!p) | |
1da177e4 | 2354 | goto out_resource; |
c373b0a4 | 2355 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2356 | } |
2357 | if (bmval0 & FATTR4_WORD0_MAXFILESIZE) { | |
ddd1ea56 BF |
2358 | p = xdr_reserve_space(xdr, 8); |
2359 | if (!p) | |
1da177e4 | 2360 | goto out_resource; |
b64c7f3b | 2361 | p = xdr_encode_hyper(p, exp->ex_path.mnt->mnt_sb->s_maxbytes); |
1da177e4 LT |
2362 | } |
2363 | if (bmval0 & FATTR4_WORD0_MAXLINK) { | |
ddd1ea56 BF |
2364 | p = xdr_reserve_space(xdr, 4); |
2365 | if (!p) | |
1da177e4 | 2366 | goto out_resource; |
c373b0a4 | 2367 | *p++ = cpu_to_be32(255); |
1da177e4 LT |
2368 | } |
2369 | if (bmval0 & FATTR4_WORD0_MAXNAME) { | |
ddd1ea56 BF |
2370 | p = xdr_reserve_space(xdr, 4); |
2371 | if (!p) | |
1da177e4 | 2372 | goto out_resource; |
c373b0a4 | 2373 | *p++ = cpu_to_be32(statfs.f_namelen); |
1da177e4 LT |
2374 | } |
2375 | if (bmval0 & FATTR4_WORD0_MAXREAD) { | |
ddd1ea56 BF |
2376 | p = xdr_reserve_space(xdr, 8); |
2377 | if (!p) | |
1da177e4 | 2378 | goto out_resource; |
b64c7f3b | 2379 | p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); |
1da177e4 LT |
2380 | } |
2381 | if (bmval0 & FATTR4_WORD0_MAXWRITE) { | |
ddd1ea56 BF |
2382 | p = xdr_reserve_space(xdr, 8); |
2383 | if (!p) | |
1da177e4 | 2384 | goto out_resource; |
b64c7f3b | 2385 | p = xdr_encode_hyper(p, (u64) svc_max_payload(rqstp)); |
1da177e4 LT |
2386 | } |
2387 | if (bmval1 & FATTR4_WORD1_MODE) { | |
ddd1ea56 BF |
2388 | p = xdr_reserve_space(xdr, 4); |
2389 | if (!p) | |
1da177e4 | 2390 | goto out_resource; |
c373b0a4 | 2391 | *p++ = cpu_to_be32(stat.mode & S_IALLUGO); |
1da177e4 LT |
2392 | } |
2393 | if (bmval1 & FATTR4_WORD1_NO_TRUNC) { | |
ddd1ea56 BF |
2394 | p = xdr_reserve_space(xdr, 4); |
2395 | if (!p) | |
1da177e4 | 2396 | goto out_resource; |
c373b0a4 | 2397 | *p++ = cpu_to_be32(1); |
1da177e4 LT |
2398 | } |
2399 | if (bmval1 & FATTR4_WORD1_NUMLINKS) { | |
ddd1ea56 BF |
2400 | p = xdr_reserve_space(xdr, 4); |
2401 | if (!p) | |
1da177e4 | 2402 | goto out_resource; |
c373b0a4 | 2403 | *p++ = cpu_to_be32(stat.nlink); |
1da177e4 LT |
2404 | } |
2405 | if (bmval1 & FATTR4_WORD1_OWNER) { | |
ddd1ea56 | 2406 | status = nfsd4_encode_user(xdr, rqstp, stat.uid); |
1da177e4 LT |
2407 | if (status) |
2408 | goto out; | |
2409 | } | |
2410 | if (bmval1 & FATTR4_WORD1_OWNER_GROUP) { | |
ddd1ea56 | 2411 | status = nfsd4_encode_group(xdr, rqstp, stat.gid); |
1da177e4 LT |
2412 | if (status) |
2413 | goto out; | |
2414 | } | |
2415 | if (bmval1 & FATTR4_WORD1_RAWDEV) { | |
ddd1ea56 BF |
2416 | p = xdr_reserve_space(xdr, 8); |
2417 | if (!p) | |
1da177e4 | 2418 | goto out_resource; |
c373b0a4 BF |
2419 | *p++ = cpu_to_be32((u32) MAJOR(stat.rdev)); |
2420 | *p++ = cpu_to_be32((u32) MINOR(stat.rdev)); | |
1da177e4 LT |
2421 | } |
2422 | if (bmval1 & FATTR4_WORD1_SPACE_AVAIL) { | |
ddd1ea56 BF |
2423 | p = xdr_reserve_space(xdr, 8); |
2424 | if (!p) | |
1da177e4 LT |
2425 | goto out_resource; |
2426 | dummy64 = (u64)statfs.f_bavail * (u64)statfs.f_bsize; | |
b64c7f3b | 2427 | p = xdr_encode_hyper(p, dummy64); |
1da177e4 LT |
2428 | } |
2429 | if (bmval1 & FATTR4_WORD1_SPACE_FREE) { | |
ddd1ea56 BF |
2430 | p = xdr_reserve_space(xdr, 8); |
2431 | if (!p) | |
1da177e4 LT |
2432 | goto out_resource; |
2433 | dummy64 = (u64)statfs.f_bfree * (u64)statfs.f_bsize; | |
b64c7f3b | 2434 | p = xdr_encode_hyper(p, dummy64); |
1da177e4 LT |
2435 | } |
2436 | if (bmval1 & FATTR4_WORD1_SPACE_TOTAL) { | |
ddd1ea56 BF |
2437 | p = xdr_reserve_space(xdr, 8); |
2438 | if (!p) | |
1da177e4 LT |
2439 | goto out_resource; |
2440 | dummy64 = (u64)statfs.f_blocks * (u64)statfs.f_bsize; | |
b64c7f3b | 2441 | p = xdr_encode_hyper(p, dummy64); |
1da177e4 LT |
2442 | } |
2443 | if (bmval1 & FATTR4_WORD1_SPACE_USED) { | |
ddd1ea56 BF |
2444 | p = xdr_reserve_space(xdr, 8); |
2445 | if (!p) | |
1da177e4 LT |
2446 | goto out_resource; |
2447 | dummy64 = (u64)stat.blocks << 9; | |
b64c7f3b | 2448 | p = xdr_encode_hyper(p, dummy64); |
1da177e4 LT |
2449 | } |
2450 | if (bmval1 & FATTR4_WORD1_TIME_ACCESS) { | |
ddd1ea56 BF |
2451 | p = xdr_reserve_space(xdr, 12); |
2452 | if (!p) | |
1da177e4 | 2453 | goto out_resource; |
b64c7f3b | 2454 | p = xdr_encode_hyper(p, (s64)stat.atime.tv_sec); |
c373b0a4 | 2455 | *p++ = cpu_to_be32(stat.atime.tv_nsec); |
1da177e4 LT |
2456 | } |
2457 | if (bmval1 & FATTR4_WORD1_TIME_DELTA) { | |
ddd1ea56 BF |
2458 | p = xdr_reserve_space(xdr, 12); |
2459 | if (!p) | |
1da177e4 | 2460 | goto out_resource; |
c373b0a4 BF |
2461 | *p++ = cpu_to_be32(0); |
2462 | *p++ = cpu_to_be32(1); | |
2463 | *p++ = cpu_to_be32(0); | |
1da177e4 LT |
2464 | } |
2465 | if (bmval1 & FATTR4_WORD1_TIME_METADATA) { | |
ddd1ea56 BF |
2466 | p = xdr_reserve_space(xdr, 12); |
2467 | if (!p) | |
1da177e4 | 2468 | goto out_resource; |
b64c7f3b | 2469 | p = xdr_encode_hyper(p, (s64)stat.ctime.tv_sec); |
c373b0a4 | 2470 | *p++ = cpu_to_be32(stat.ctime.tv_nsec); |
1da177e4 LT |
2471 | } |
2472 | if (bmval1 & FATTR4_WORD1_TIME_MODIFY) { | |
ddd1ea56 BF |
2473 | p = xdr_reserve_space(xdr, 12); |
2474 | if (!p) | |
1da177e4 | 2475 | goto out_resource; |
b64c7f3b | 2476 | p = xdr_encode_hyper(p, (s64)stat.mtime.tv_sec); |
c373b0a4 | 2477 | *p++ = cpu_to_be32(stat.mtime.tv_nsec); |
1da177e4 LT |
2478 | } |
2479 | if (bmval1 & FATTR4_WORD1_MOUNTED_ON_FILEID) { | |
ddd1ea56 BF |
2480 | p = xdr_reserve_space(xdr, 8); |
2481 | if (!p) | |
1da177e4 | 2482 | goto out_resource; |
406a7ea9 FF |
2483 | /* |
2484 | * Get parent's attributes if not ignoring crossmount | |
2485 | * and this is the root of a cross-mounted filesystem. | |
2486 | */ | |
2487 | if (ignore_crossmnt == 0 && | |
ae7095a7 BF |
2488 | dentry == exp->ex_path.mnt->mnt_root) |
2489 | get_parent_attributes(exp, &stat); | |
b64c7f3b | 2490 | p = xdr_encode_hyper(p, stat.ino); |
1da177e4 | 2491 | } |
18032ca0 | 2492 | if (bmval2 & FATTR4_WORD2_SECURITY_LABEL) { |
ddd1ea56 BF |
2493 | status = nfsd4_encode_security_label(xdr, rqstp, context, |
2494 | contextlen); | |
18032ca0 DQ |
2495 | if (status) |
2496 | goto out; | |
2497 | } | |
8c18f205 | 2498 | if (bmval2 & FATTR4_WORD2_SUPPATTR_EXCLCREAT) { |
ddd1ea56 BF |
2499 | p = xdr_reserve_space(xdr, 16); |
2500 | if (!p) | |
de3997a7 | 2501 | goto out_resource; |
c373b0a4 BF |
2502 | *p++ = cpu_to_be32(3); |
2503 | *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD0); | |
2504 | *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD1); | |
2505 | *p++ = cpu_to_be32(NFSD_SUPPATTR_EXCLCREAT_WORD2); | |
8c18f205 | 2506 | } |
7e705706 | 2507 | |
082d4bd7 BF |
2508 | attrlen = htonl(xdr->buf->len - attrlen_offset - 4); |
2509 | write_bytes_to_xdr_buf(xdr->buf, attrlen_offset, &attrlen, 4); | |
1da177e4 LT |
2510 | status = nfs_ok; |
2511 | ||
2512 | out: | |
ba4e55bb | 2513 | #ifdef CONFIG_NFSD_V4_SECURITY_LABEL |
18032ca0 DQ |
2514 | if (context) |
2515 | security_release_secctx(context, contextlen); | |
ba4e55bb | 2516 | #endif /* CONFIG_NFSD_V4_SECURITY_LABEL */ |
28e05dd8 | 2517 | kfree(acl); |
18df11d0 | 2518 | if (tempfh) { |
d50e6136 | 2519 | fh_put(tempfh); |
18df11d0 YZ |
2520 | kfree(tempfh); |
2521 | } | |
1fcea5b2 BF |
2522 | if (status) |
2523 | xdr_truncate_encode(xdr, starting_len); | |
1da177e4 LT |
2524 | return status; |
2525 | out_nfserr: | |
b8dd7b9a | 2526 | status = nfserrno(err); |
1da177e4 LT |
2527 | goto out; |
2528 | out_resource: | |
1da177e4 LT |
2529 | status = nfserr_resource; |
2530 | goto out; | |
1da177e4 LT |
2531 | } |
2532 | ||
2825a7f9 BF |
2533 | static void svcxdr_init_encode_from_buffer(struct xdr_stream *xdr, |
2534 | struct xdr_buf *buf, __be32 *p, int bytes) | |
2535 | { | |
2536 | xdr->scratch.iov_len = 0; | |
2537 | memset(buf, 0, sizeof(struct xdr_buf)); | |
2538 | buf->head[0].iov_base = p; | |
2539 | buf->head[0].iov_len = 0; | |
2540 | buf->len = 0; | |
2541 | xdr->buf = buf; | |
2542 | xdr->iov = buf->head; | |
2543 | xdr->p = p; | |
2544 | xdr->end = (void *)p + bytes; | |
2545 | buf->buflen = bytes; | |
2546 | } | |
2547 | ||
d5184658 BF |
2548 | __be32 nfsd4_encode_fattr_to_buf(__be32 **p, int words, |
2549 | struct svc_fh *fhp, struct svc_export *exp, | |
2550 | struct dentry *dentry, u32 *bmval, | |
2551 | struct svc_rqst *rqstp, int ignore_crossmnt) | |
2552 | { | |
2825a7f9 | 2553 | struct xdr_buf dummy; |
d5184658 BF |
2554 | struct xdr_stream xdr; |
2555 | __be32 ret; | |
2556 | ||
2825a7f9 | 2557 | svcxdr_init_encode_from_buffer(&xdr, &dummy, *p, words << 2); |
d5184658 BF |
2558 | ret = nfsd4_encode_fattr(&xdr, fhp, exp, dentry, bmval, rqstp, |
2559 | ignore_crossmnt); | |
2560 | *p = xdr.p; | |
2561 | return ret; | |
2562 | } | |
2563 | ||
c0ce6ec8 BF |
2564 | static inline int attributes_need_mount(u32 *bmval) |
2565 | { | |
2566 | if (bmval[0] & ~(FATTR4_WORD0_RDATTR_ERROR | FATTR4_WORD0_LEASE_TIME)) | |
2567 | return 1; | |
2568 | if (bmval[1] & ~FATTR4_WORD1_MOUNTED_ON_FILEID) | |
2569 | return 1; | |
2570 | return 0; | |
2571 | } | |
2572 | ||
b37ad28b | 2573 | static __be32 |
561f0ed4 BF |
2574 | nfsd4_encode_dirent_fattr(struct xdr_stream *xdr, struct nfsd4_readdir *cd, |
2575 | const char *name, int namlen) | |
1da177e4 LT |
2576 | { |
2577 | struct svc_export *exp = cd->rd_fhp->fh_export; | |
2578 | struct dentry *dentry; | |
b37ad28b | 2579 | __be32 nfserr; |
406a7ea9 | 2580 | int ignore_crossmnt = 0; |
1da177e4 LT |
2581 | |
2582 | dentry = lookup_one_len(name, cd->rd_fhp->fh_dentry, namlen); | |
2583 | if (IS_ERR(dentry)) | |
2584 | return nfserrno(PTR_ERR(dentry)); | |
b2c0cea6 BF |
2585 | if (!dentry->d_inode) { |
2586 | /* | |
2587 | * nfsd_buffered_readdir drops the i_mutex between | |
2588 | * readdir and calling this callback, leaving a window | |
2589 | * where this directory entry could have gone away. | |
2590 | */ | |
2591 | dput(dentry); | |
2592 | return nfserr_noent; | |
2593 | } | |
1da177e4 LT |
2594 | |
2595 | exp_get(exp); | |
406a7ea9 FF |
2596 | /* |
2597 | * In the case of a mountpoint, the client may be asking for | |
2598 | * attributes that are only properties of the underlying filesystem | |
2599 | * as opposed to the cross-mounted file system. In such a case, | |
2600 | * we will not follow the cross mount and will fill the attribtutes | |
2601 | * directly from the mountpoint dentry. | |
2602 | */ | |
3227fa41 | 2603 | if (nfsd_mountpoint(dentry, exp)) { |
021d3a72 BF |
2604 | int err; |
2605 | ||
3227fa41 BF |
2606 | if (!(exp->ex_flags & NFSEXP_V4ROOT) |
2607 | && !attributes_need_mount(cd->rd_bmval)) { | |
2608 | ignore_crossmnt = 1; | |
2609 | goto out_encode; | |
2610 | } | |
dcb488a3 AA |
2611 | /* |
2612 | * Why the heck aren't we just using nfsd_lookup?? | |
2613 | * Different "."/".." handling? Something else? | |
2614 | * At least, add a comment here to explain.... | |
2615 | */ | |
021d3a72 BF |
2616 | err = nfsd_cross_mnt(cd->rd_rqstp, &dentry, &exp); |
2617 | if (err) { | |
2618 | nfserr = nfserrno(err); | |
1da177e4 LT |
2619 | goto out_put; |
2620 | } | |
dcb488a3 AA |
2621 | nfserr = check_nfsd_access(exp, cd->rd_rqstp); |
2622 | if (nfserr) | |
2623 | goto out_put; | |
1da177e4 LT |
2624 | |
2625 | } | |
3227fa41 | 2626 | out_encode: |
561f0ed4 | 2627 | nfserr = nfsd4_encode_fattr(xdr, NULL, exp, dentry, cd->rd_bmval, |
406a7ea9 | 2628 | cd->rd_rqstp, ignore_crossmnt); |
1da177e4 LT |
2629 | out_put: |
2630 | dput(dentry); | |
2631 | exp_put(exp); | |
2632 | return nfserr; | |
2633 | } | |
2634 | ||
2ebbc012 | 2635 | static __be32 * |
561f0ed4 | 2636 | nfsd4_encode_rdattr_error(struct xdr_stream *xdr, __be32 nfserr) |
1da177e4 | 2637 | { |
561f0ed4 BF |
2638 | __be32 *p; |
2639 | ||
2640 | p = xdr_reserve_space(xdr, 6); | |
2641 | if (!p) | |
1da177e4 LT |
2642 | return NULL; |
2643 | *p++ = htonl(2); | |
2644 | *p++ = htonl(FATTR4_WORD0_RDATTR_ERROR); /* bmval0 */ | |
2645 | *p++ = htonl(0); /* bmval1 */ | |
2646 | ||
87915c64 | 2647 | *p++ = htonl(4); /* attribute length */ |
1da177e4 | 2648 | *p++ = nfserr; /* no htonl */ |
1da177e4 LT |
2649 | return p; |
2650 | } | |
2651 | ||
2652 | static int | |
a0ad13ef N |
2653 | nfsd4_encode_dirent(void *ccdv, const char *name, int namlen, |
2654 | loff_t offset, u64 ino, unsigned int d_type) | |
1da177e4 | 2655 | { |
a0ad13ef | 2656 | struct readdir_cd *ccd = ccdv; |
1da177e4 | 2657 | struct nfsd4_readdir *cd = container_of(ccd, struct nfsd4_readdir, common); |
561f0ed4 BF |
2658 | struct xdr_stream *xdr = cd->xdr; |
2659 | int start_offset = xdr->buf->len; | |
2660 | int cookie_offset; | |
2661 | int entry_bytes; | |
b37ad28b | 2662 | __be32 nfserr = nfserr_toosmall; |
561f0ed4 BF |
2663 | __be64 wire_offset; |
2664 | __be32 *p; | |
1da177e4 LT |
2665 | |
2666 | /* In nfsv4, "." and ".." never make it onto the wire.. */ | |
2667 | if (name && isdotent(name, namlen)) { | |
2668 | cd->common.err = nfs_ok; | |
2669 | return 0; | |
2670 | } | |
2671 | ||
561f0ed4 BF |
2672 | if (cd->cookie_offset) { |
2673 | wire_offset = cpu_to_be64(offset); | |
2674 | write_bytes_to_xdr_buf(xdr->buf, cd->cookie_offset, | |
2675 | &wire_offset, 8); | |
2676 | } | |
1da177e4 | 2677 | |
561f0ed4 BF |
2678 | p = xdr_reserve_space(xdr, 4); |
2679 | if (!p) | |
1da177e4 | 2680 | goto fail; |
1da177e4 | 2681 | *p++ = xdr_one; /* mark entry present */ |
561f0ed4 BF |
2682 | cookie_offset = xdr->buf->len; |
2683 | p = xdr_reserve_space(xdr, 3*4 + namlen); | |
2684 | if (!p) | |
2685 | goto fail; | |
1da177e4 LT |
2686 | p = xdr_encode_hyper(p, NFS_OFFSET_MAX); /* offset of next entry */ |
2687 | p = xdr_encode_array(p, name, namlen); /* name length & name */ | |
2688 | ||
561f0ed4 | 2689 | nfserr = nfsd4_encode_dirent_fattr(xdr, cd, name, namlen); |
1da177e4 LT |
2690 | switch (nfserr) { |
2691 | case nfs_ok: | |
1da177e4 LT |
2692 | break; |
2693 | case nfserr_resource: | |
2694 | nfserr = nfserr_toosmall; | |
2695 | goto fail; | |
b2c0cea6 | 2696 | case nfserr_noent: |
f41c5ad2 | 2697 | xdr_truncate_encode(xdr, start_offset); |
b2c0cea6 | 2698 | goto skip_entry; |
1da177e4 LT |
2699 | default: |
2700 | /* | |
2701 | * If the client requested the RDATTR_ERROR attribute, | |
2702 | * we stuff the error code into this attribute | |
2703 | * and continue. If this attribute was not requested, | |
2704 | * then in accordance with the spec, we fail the | |
2705 | * entire READDIR operation(!) | |
2706 | */ | |
2707 | if (!(cd->rd_bmval[0] & FATTR4_WORD0_RDATTR_ERROR)) | |
2708 | goto fail; | |
561f0ed4 | 2709 | p = nfsd4_encode_rdattr_error(xdr, nfserr); |
34081efc FI |
2710 | if (p == NULL) { |
2711 | nfserr = nfserr_toosmall; | |
1da177e4 | 2712 | goto fail; |
34081efc | 2713 | } |
1da177e4 | 2714 | } |
561f0ed4 BF |
2715 | nfserr = nfserr_toosmall; |
2716 | entry_bytes = xdr->buf->len - start_offset; | |
2717 | if (entry_bytes > cd->rd_maxcount) | |
2718 | goto fail; | |
2719 | cd->rd_maxcount -= entry_bytes; | |
3b299709 BF |
2720 | if (!cd->rd_dircount) |
2721 | goto fail; | |
2722 | cd->rd_dircount--; | |
561f0ed4 | 2723 | cd->cookie_offset = cookie_offset; |
b2c0cea6 | 2724 | skip_entry: |
1da177e4 LT |
2725 | cd->common.err = nfs_ok; |
2726 | return 0; | |
2727 | fail: | |
561f0ed4 | 2728 | xdr_truncate_encode(xdr, start_offset); |
1da177e4 LT |
2729 | cd->common.err = nfserr; |
2730 | return -EINVAL; | |
2731 | } | |
2732 | ||
d0a381dd BF |
2733 | static __be32 |
2734 | nfsd4_encode_stateid(struct xdr_stream *xdr, stateid_t *sid) | |
e2f282b9 | 2735 | { |
bc749ca4 | 2736 | __be32 *p; |
e2f282b9 | 2737 | |
d0a381dd BF |
2738 | p = xdr_reserve_space(xdr, sizeof(stateid_t)); |
2739 | if (!p) | |
2740 | return nfserr_resource; | |
c373b0a4 | 2741 | *p++ = cpu_to_be32(sid->si_generation); |
0c0c267b BF |
2742 | p = xdr_encode_opaque_fixed(p, &sid->si_opaque, |
2743 | sizeof(stateid_opaque_t)); | |
d0a381dd | 2744 | return 0; |
e2f282b9 BH |
2745 | } |
2746 | ||
695e12f8 | 2747 | static __be32 |
b37ad28b | 2748 | nfsd4_encode_access(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_access *access) |
1da177e4 | 2749 | { |
d0a381dd | 2750 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 2751 | __be32 *p; |
1da177e4 LT |
2752 | |
2753 | if (!nfserr) { | |
d0a381dd BF |
2754 | p = xdr_reserve_space(xdr, 8); |
2755 | if (!p) | |
2756 | return nfserr_resource; | |
c373b0a4 BF |
2757 | *p++ = cpu_to_be32(access->ac_supported); |
2758 | *p++ = cpu_to_be32(access->ac_resp_access); | |
1da177e4 | 2759 | } |
695e12f8 | 2760 | return nfserr; |
1da177e4 LT |
2761 | } |
2762 | ||
1d1bc8f2 BF |
2763 | static __be32 nfsd4_encode_bind_conn_to_session(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_bind_conn_to_session *bcts) |
2764 | { | |
d0a381dd | 2765 | struct xdr_stream *xdr = &resp->xdr; |
1d1bc8f2 BF |
2766 | __be32 *p; |
2767 | ||
2768 | if (!nfserr) { | |
d0a381dd BF |
2769 | p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 8); |
2770 | if (!p) | |
2771 | return nfserr_resource; | |
0c0c267b BF |
2772 | p = xdr_encode_opaque_fixed(p, bcts->sessionid.data, |
2773 | NFS4_MAX_SESSIONID_LEN); | |
c373b0a4 | 2774 | *p++ = cpu_to_be32(bcts->dir); |
6e67b5d1 | 2775 | /* Sorry, we do not yet support RDMA over 4.1: */ |
c373b0a4 | 2776 | *p++ = cpu_to_be32(0); |
1d1bc8f2 BF |
2777 | } |
2778 | return nfserr; | |
2779 | } | |
2780 | ||
695e12f8 | 2781 | static __be32 |
b37ad28b | 2782 | nfsd4_encode_close(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_close *close) |
1da177e4 | 2783 | { |
d0a381dd BF |
2784 | struct xdr_stream *xdr = &resp->xdr; |
2785 | ||
e2f282b9 | 2786 | if (!nfserr) |
d0a381dd | 2787 | nfserr = nfsd4_encode_stateid(xdr, &close->cl_stateid); |
e2f282b9 | 2788 | |
695e12f8 | 2789 | return nfserr; |
1da177e4 LT |
2790 | } |
2791 | ||
2792 | ||
695e12f8 | 2793 | static __be32 |
b37ad28b | 2794 | nfsd4_encode_commit(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_commit *commit) |
1da177e4 | 2795 | { |
d0a381dd | 2796 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 2797 | __be32 *p; |
1da177e4 LT |
2798 | |
2799 | if (!nfserr) { | |
d0a381dd BF |
2800 | p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); |
2801 | if (!p) | |
2802 | return nfserr_resource; | |
0c0c267b BF |
2803 | p = xdr_encode_opaque_fixed(p, commit->co_verf.data, |
2804 | NFS4_VERIFIER_SIZE); | |
1da177e4 | 2805 | } |
695e12f8 | 2806 | return nfserr; |
1da177e4 LT |
2807 | } |
2808 | ||
695e12f8 | 2809 | static __be32 |
b37ad28b | 2810 | nfsd4_encode_create(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_create *create) |
1da177e4 | 2811 | { |
d0a381dd | 2812 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 2813 | __be32 *p; |
1da177e4 LT |
2814 | |
2815 | if (!nfserr) { | |
d0a381dd BF |
2816 | p = xdr_reserve_space(xdr, 32); |
2817 | if (!p) | |
2818 | return nfserr_resource; | |
d05d5744 | 2819 | p = encode_cinfo(p, &create->cr_cinfo); |
c373b0a4 BF |
2820 | *p++ = cpu_to_be32(2); |
2821 | *p++ = cpu_to_be32(create->cr_bmval[0]); | |
2822 | *p++ = cpu_to_be32(create->cr_bmval[1]); | |
1da177e4 | 2823 | } |
695e12f8 | 2824 | return nfserr; |
1da177e4 LT |
2825 | } |
2826 | ||
b37ad28b AV |
2827 | static __be32 |
2828 | nfsd4_encode_getattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_getattr *getattr) | |
1da177e4 LT |
2829 | { |
2830 | struct svc_fh *fhp = getattr->ga_fhp; | |
d5184658 | 2831 | struct xdr_stream *xdr = &resp->xdr; |
1da177e4 LT |
2832 | |
2833 | if (nfserr) | |
2834 | return nfserr; | |
2835 | ||
d5184658 BF |
2836 | nfserr = nfsd4_encode_fattr(xdr, fhp, fhp->fh_export, fhp->fh_dentry, |
2837 | getattr->ga_bmval, | |
406a7ea9 | 2838 | resp->rqstp, 0); |
1da177e4 LT |
2839 | return nfserr; |
2840 | } | |
2841 | ||
695e12f8 BH |
2842 | static __be32 |
2843 | nfsd4_encode_getfh(struct nfsd4_compoundres *resp, __be32 nfserr, struct svc_fh **fhpp) | |
1da177e4 | 2844 | { |
d0a381dd | 2845 | struct xdr_stream *xdr = &resp->xdr; |
695e12f8 | 2846 | struct svc_fh *fhp = *fhpp; |
1da177e4 | 2847 | unsigned int len; |
bc749ca4 | 2848 | __be32 *p; |
1da177e4 LT |
2849 | |
2850 | if (!nfserr) { | |
2851 | len = fhp->fh_handle.fh_size; | |
d0a381dd BF |
2852 | p = xdr_reserve_space(xdr, len + 4); |
2853 | if (!p) | |
2854 | return nfserr_resource; | |
0c0c267b | 2855 | p = xdr_encode_opaque(p, &fhp->fh_handle.fh_base, len); |
1da177e4 | 2856 | } |
695e12f8 | 2857 | return nfserr; |
1da177e4 LT |
2858 | } |
2859 | ||
2860 | /* | |
2861 | * Including all fields other than the name, a LOCK4denied structure requires | |
2862 | * 8(clientid) + 4(namelen) + 8(offset) + 8(length) + 4(type) = 32 bytes. | |
2863 | */ | |
d0a381dd BF |
2864 | static __be32 |
2865 | nfsd4_encode_lock_denied(struct xdr_stream *xdr, struct nfsd4_lock_denied *ld) | |
1da177e4 | 2866 | { |
7c13f344 | 2867 | struct xdr_netobj *conf = &ld->ld_owner; |
bc749ca4 | 2868 | __be32 *p; |
1da177e4 | 2869 | |
8c7424cf | 2870 | again: |
d0a381dd | 2871 | p = xdr_reserve_space(xdr, 32 + XDR_LEN(conf->len)); |
8c7424cf BF |
2872 | if (!p) { |
2873 | /* | |
2874 | * Don't fail to return the result just because we can't | |
2875 | * return the conflicting open: | |
2876 | */ | |
2877 | if (conf->len) { | |
2878 | conf->len = 0; | |
2879 | conf->data = NULL; | |
2880 | goto again; | |
2881 | } | |
d0a381dd | 2882 | return nfserr_resource; |
8c7424cf | 2883 | } |
b64c7f3b BF |
2884 | p = xdr_encode_hyper(p, ld->ld_start); |
2885 | p = xdr_encode_hyper(p, ld->ld_length); | |
c373b0a4 | 2886 | *p++ = cpu_to_be32(ld->ld_type); |
7c13f344 | 2887 | if (conf->len) { |
0c0c267b BF |
2888 | p = xdr_encode_opaque_fixed(p, &ld->ld_clientid, 8); |
2889 | p = xdr_encode_opaque(p, conf->data, conf->len); | |
1da177e4 | 2890 | } else { /* non - nfsv4 lock in conflict, no clientid nor owner */ |
b64c7f3b | 2891 | p = xdr_encode_hyper(p, (u64)0); /* clientid */ |
c373b0a4 | 2892 | *p++ = cpu_to_be32(0); /* length of owner name */ |
1da177e4 | 2893 | } |
d0a381dd | 2894 | return nfserr_denied; |
1da177e4 LT |
2895 | } |
2896 | ||
695e12f8 | 2897 | static __be32 |
b37ad28b | 2898 | nfsd4_encode_lock(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lock *lock) |
1da177e4 | 2899 | { |
d0a381dd BF |
2900 | struct xdr_stream *xdr = &resp->xdr; |
2901 | ||
e2f282b9 | 2902 | if (!nfserr) |
d0a381dd | 2903 | nfserr = nfsd4_encode_stateid(xdr, &lock->lk_resp_stateid); |
e2f282b9 | 2904 | else if (nfserr == nfserr_denied) |
d0a381dd | 2905 | nfserr = nfsd4_encode_lock_denied(xdr, &lock->lk_denied); |
8c7424cf | 2906 | kfree(lock->lk_denied.ld_owner.data); |
695e12f8 | 2907 | return nfserr; |
1da177e4 LT |
2908 | } |
2909 | ||
695e12f8 | 2910 | static __be32 |
b37ad28b | 2911 | nfsd4_encode_lockt(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_lockt *lockt) |
1da177e4 | 2912 | { |
d0a381dd BF |
2913 | struct xdr_stream *xdr = &resp->xdr; |
2914 | ||
1da177e4 | 2915 | if (nfserr == nfserr_denied) |
d0a381dd | 2916 | nfsd4_encode_lock_denied(xdr, &lockt->lt_denied); |
695e12f8 | 2917 | return nfserr; |
1da177e4 LT |
2918 | } |
2919 | ||
695e12f8 | 2920 | static __be32 |
b37ad28b | 2921 | nfsd4_encode_locku(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_locku *locku) |
1da177e4 | 2922 | { |
d0a381dd BF |
2923 | struct xdr_stream *xdr = &resp->xdr; |
2924 | ||
e2f282b9 | 2925 | if (!nfserr) |
d0a381dd | 2926 | nfserr = nfsd4_encode_stateid(xdr, &locku->lu_stateid); |
e2f282b9 | 2927 | |
695e12f8 | 2928 | return nfserr; |
1da177e4 LT |
2929 | } |
2930 | ||
2931 | ||
695e12f8 | 2932 | static __be32 |
b37ad28b | 2933 | nfsd4_encode_link(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_link *link) |
1da177e4 | 2934 | { |
d0a381dd | 2935 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 2936 | __be32 *p; |
1da177e4 LT |
2937 | |
2938 | if (!nfserr) { | |
d0a381dd BF |
2939 | p = xdr_reserve_space(xdr, 20); |
2940 | if (!p) | |
2941 | return nfserr_resource; | |
d05d5744 | 2942 | p = encode_cinfo(p, &link->li_cinfo); |
1da177e4 | 2943 | } |
695e12f8 | 2944 | return nfserr; |
1da177e4 LT |
2945 | } |
2946 | ||
2947 | ||
695e12f8 | 2948 | static __be32 |
b37ad28b | 2949 | nfsd4_encode_open(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open *open) |
1da177e4 | 2950 | { |
d0a381dd | 2951 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 2952 | __be32 *p; |
1da177e4 LT |
2953 | |
2954 | if (nfserr) | |
2955 | goto out; | |
2956 | ||
d0a381dd BF |
2957 | nfserr = nfsd4_encode_stateid(xdr, &open->op_stateid); |
2958 | if (nfserr) | |
2959 | goto out; | |
2960 | p = xdr_reserve_space(xdr, 40); | |
2961 | if (!p) | |
2962 | return nfserr_resource; | |
d05d5744 | 2963 | p = encode_cinfo(p, &open->op_cinfo); |
c373b0a4 BF |
2964 | *p++ = cpu_to_be32(open->op_rflags); |
2965 | *p++ = cpu_to_be32(2); | |
2966 | *p++ = cpu_to_be32(open->op_bmval[0]); | |
2967 | *p++ = cpu_to_be32(open->op_bmval[1]); | |
2968 | *p++ = cpu_to_be32(open->op_delegate_type); | |
1da177e4 LT |
2969 | |
2970 | switch (open->op_delegate_type) { | |
2971 | case NFS4_OPEN_DELEGATE_NONE: | |
2972 | break; | |
2973 | case NFS4_OPEN_DELEGATE_READ: | |
d0a381dd BF |
2974 | nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); |
2975 | if (nfserr) | |
2976 | return nfserr; | |
2977 | p = xdr_reserve_space(xdr, 20); | |
2978 | if (!p) | |
2979 | return nfserr_resource; | |
c373b0a4 | 2980 | *p++ = cpu_to_be32(open->op_recall); |
1da177e4 LT |
2981 | |
2982 | /* | |
2983 | * TODO: ACE's in delegations | |
2984 | */ | |
c373b0a4 BF |
2985 | *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); |
2986 | *p++ = cpu_to_be32(0); | |
2987 | *p++ = cpu_to_be32(0); | |
2988 | *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ | |
1da177e4 LT |
2989 | break; |
2990 | case NFS4_OPEN_DELEGATE_WRITE: | |
d0a381dd BF |
2991 | nfserr = nfsd4_encode_stateid(xdr, &open->op_delegate_stateid); |
2992 | if (nfserr) | |
2993 | return nfserr; | |
2994 | p = xdr_reserve_space(xdr, 32); | |
2995 | if (!p) | |
2996 | return nfserr_resource; | |
c373b0a4 | 2997 | *p++ = cpu_to_be32(0); |
1da177e4 LT |
2998 | |
2999 | /* | |
3000 | * TODO: space_limit's in delegations | |
3001 | */ | |
c373b0a4 BF |
3002 | *p++ = cpu_to_be32(NFS4_LIMIT_SIZE); |
3003 | *p++ = cpu_to_be32(~(u32)0); | |
3004 | *p++ = cpu_to_be32(~(u32)0); | |
1da177e4 LT |
3005 | |
3006 | /* | |
3007 | * TODO: ACE's in delegations | |
3008 | */ | |
c373b0a4 BF |
3009 | *p++ = cpu_to_be32(NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE); |
3010 | *p++ = cpu_to_be32(0); | |
3011 | *p++ = cpu_to_be32(0); | |
3012 | *p++ = cpu_to_be32(0); /* XXX: is NULL principal ok? */ | |
1da177e4 | 3013 | break; |
d24433cd BH |
3014 | case NFS4_OPEN_DELEGATE_NONE_EXT: /* 4.1 */ |
3015 | switch (open->op_why_no_deleg) { | |
3016 | case WND4_CONTENTION: | |
3017 | case WND4_RESOURCE: | |
d0a381dd BF |
3018 | p = xdr_reserve_space(xdr, 8); |
3019 | if (!p) | |
3020 | return nfserr_resource; | |
c373b0a4 BF |
3021 | *p++ = cpu_to_be32(open->op_why_no_deleg); |
3022 | /* deleg signaling not supported yet: */ | |
3023 | *p++ = cpu_to_be32(0); | |
d24433cd BH |
3024 | break; |
3025 | default: | |
d0a381dd BF |
3026 | p = xdr_reserve_space(xdr, 4); |
3027 | if (!p) | |
3028 | return nfserr_resource; | |
c373b0a4 | 3029 | *p++ = cpu_to_be32(open->op_why_no_deleg); |
d24433cd | 3030 | } |
d24433cd | 3031 | break; |
1da177e4 LT |
3032 | default: |
3033 | BUG(); | |
3034 | } | |
3035 | /* XXX save filehandle here */ | |
3036 | out: | |
695e12f8 | 3037 | return nfserr; |
1da177e4 LT |
3038 | } |
3039 | ||
695e12f8 | 3040 | static __be32 |
b37ad28b | 3041 | nfsd4_encode_open_confirm(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_confirm *oc) |
1da177e4 | 3042 | { |
d0a381dd BF |
3043 | struct xdr_stream *xdr = &resp->xdr; |
3044 | ||
e2f282b9 | 3045 | if (!nfserr) |
d0a381dd | 3046 | nfserr = nfsd4_encode_stateid(xdr, &oc->oc_resp_stateid); |
1da177e4 | 3047 | |
695e12f8 | 3048 | return nfserr; |
1da177e4 LT |
3049 | } |
3050 | ||
695e12f8 | 3051 | static __be32 |
b37ad28b | 3052 | nfsd4_encode_open_downgrade(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_open_downgrade *od) |
1da177e4 | 3053 | { |
d0a381dd BF |
3054 | struct xdr_stream *xdr = &resp->xdr; |
3055 | ||
e2f282b9 | 3056 | if (!nfserr) |
d0a381dd | 3057 | nfserr = nfsd4_encode_stateid(xdr, &od->od_stateid); |
1da177e4 | 3058 | |
695e12f8 | 3059 | return nfserr; |
1da177e4 LT |
3060 | } |
3061 | ||
dc97618d BF |
3062 | static __be32 nfsd4_encode_splice_read( |
3063 | struct nfsd4_compoundres *resp, | |
3064 | struct nfsd4_read *read, | |
3065 | struct file *file, unsigned long maxcount) | |
1da177e4 | 3066 | { |
ddd1ea56 | 3067 | struct xdr_stream *xdr = &resp->xdr; |
34a78b48 | 3068 | struct xdr_buf *buf = xdr->buf; |
dc97618d | 3069 | u32 eof; |
30596768 | 3070 | int space_left; |
dc97618d | 3071 | __be32 nfserr; |
fec25fa4 | 3072 | __be32 *p = xdr->p - 2; |
1da177e4 | 3073 | |
dc97618d BF |
3074 | /* |
3075 | * Don't inline pages unless we know there's room for eof, | |
3076 | * count, and possible padding: | |
3077 | */ | |
3078 | if (xdr->end - xdr->p < 3) | |
d0a381dd | 3079 | return nfserr_resource; |
dc97618d BF |
3080 | |
3081 | nfserr = nfsd_splice_read(read->rd_rqstp, file, | |
3082 | read->rd_offset, &maxcount); | |
3083 | if (nfserr) { | |
3084 | /* | |
3085 | * nfsd_splice_actor may have already messed with the | |
3086 | * page length; reset it so as not to confuse | |
3087 | * xdr_truncate_encode: | |
3088 | */ | |
34a78b48 | 3089 | buf->page_len = 0; |
dc97618d | 3090 | return nfserr; |
b0e35fda | 3091 | } |
1da177e4 | 3092 | |
dc97618d BF |
3093 | eof = (read->rd_offset + maxcount >= |
3094 | read->rd_fhp->fh_dentry->d_inode->i_size); | |
4e21ac4b | 3095 | |
fec25fa4 BF |
3096 | *(p++) = htonl(eof); |
3097 | *(p++) = htonl(maxcount); | |
dc97618d | 3098 | |
34a78b48 BF |
3099 | buf->page_len = maxcount; |
3100 | buf->len += maxcount; | |
dc97618d | 3101 | xdr->page_ptr += (maxcount + PAGE_SIZE - 1) / PAGE_SIZE; |
dc97618d BF |
3102 | |
3103 | /* Use rest of head for padding and remaining ops: */ | |
34a78b48 BF |
3104 | buf->tail[0].iov_base = xdr->p; |
3105 | buf->tail[0].iov_len = 0; | |
fec25fa4 | 3106 | xdr->iov = buf->tail; |
dc97618d | 3107 | if (maxcount&3) { |
fec25fa4 BF |
3108 | int pad = 4 - (maxcount&3); |
3109 | ||
3110 | *(xdr->p++) = 0; | |
3111 | ||
34a78b48 | 3112 | buf->tail[0].iov_base += maxcount&3; |
fec25fa4 BF |
3113 | buf->tail[0].iov_len = pad; |
3114 | buf->len += pad; | |
b0e35fda | 3115 | } |
2825a7f9 | 3116 | |
dc97618d | 3117 | space_left = min_t(int, (void *)xdr->end - (void *)xdr->p, |
34a78b48 BF |
3118 | buf->buflen - buf->len); |
3119 | buf->buflen = buf->len + space_left; | |
dc97618d BF |
3120 | xdr->end = (__be32 *)((void *)xdr->end + space_left); |
3121 | ||
3122 | return 0; | |
3123 | } | |
3124 | ||
3125 | static __be32 nfsd4_encode_readv(struct nfsd4_compoundres *resp, | |
3126 | struct nfsd4_read *read, | |
3127 | struct file *file, unsigned long maxcount) | |
3128 | { | |
3129 | struct xdr_stream *xdr = &resp->xdr; | |
3130 | u32 eof; | |
3131 | int v; | |
dc97618d | 3132 | int starting_len = xdr->buf->len - 8; |
dc97618d | 3133 | long len; |
b0420980 | 3134 | int thislen; |
dc97618d BF |
3135 | __be32 nfserr; |
3136 | __be32 tmp; | |
3137 | __be32 *p; | |
b0420980 BF |
3138 | u32 zzz = 0; |
3139 | int pad; | |
1da177e4 LT |
3140 | |
3141 | len = maxcount; | |
3142 | v = 0; | |
6ff9897d | 3143 | |
3c7aa15d | 3144 | thislen = min(len, ((void *)xdr->end - (void *)xdr->p)); |
b0420980 BF |
3145 | p = xdr_reserve_space(xdr, (thislen+3)&~3); |
3146 | WARN_ON_ONCE(!p); | |
3147 | resp->rqstp->rq_vec[v].iov_base = p; | |
3148 | resp->rqstp->rq_vec[v].iov_len = thislen; | |
3149 | v++; | |
3150 | len -= thislen; | |
3151 | ||
3152 | while (len) { | |
6ff9897d | 3153 | thislen = min_t(long, len, PAGE_SIZE); |
b0420980 BF |
3154 | p = xdr_reserve_space(xdr, (thislen+3)&~3); |
3155 | WARN_ON_ONCE(!p); | |
3156 | resp->rqstp->rq_vec[v].iov_base = p; | |
6ff9897d | 3157 | resp->rqstp->rq_vec[v].iov_len = thislen; |
1da177e4 | 3158 | v++; |
6ff9897d | 3159 | len -= thislen; |
1da177e4 LT |
3160 | } |
3161 | read->rd_vlen = v; | |
3162 | ||
dc97618d BF |
3163 | nfserr = nfsd_readv(file, read->rd_offset, resp->rqstp->rq_vec, |
3164 | read->rd_vlen, &maxcount); | |
3165 | if (nfserr) | |
1da177e4 | 3166 | return nfserr; |
b0420980 | 3167 | xdr_truncate_encode(xdr, starting_len + 8 + ((maxcount+3)&~3)); |
dc97618d | 3168 | |
44524359 N |
3169 | eof = (read->rd_offset + maxcount >= |
3170 | read->rd_fhp->fh_dentry->d_inode->i_size); | |
1da177e4 | 3171 | |
dc97618d BF |
3172 | tmp = htonl(eof); |
3173 | write_bytes_to_xdr_buf(xdr->buf, starting_len , &tmp, 4); | |
3174 | tmp = htonl(maxcount); | |
3175 | write_bytes_to_xdr_buf(xdr->buf, starting_len + 4, &tmp, 4); | |
3176 | ||
b0420980 BF |
3177 | pad = (maxcount&3) ? 4 - (maxcount&3) : 0; |
3178 | write_bytes_to_xdr_buf(xdr->buf, starting_len + 8 + maxcount, | |
3179 | &zzz, pad); | |
1da177e4 | 3180 | return 0; |
dc97618d BF |
3181 | |
3182 | } | |
3183 | ||
3184 | static __be32 | |
3185 | nfsd4_encode_read(struct nfsd4_compoundres *resp, __be32 nfserr, | |
3186 | struct nfsd4_read *read) | |
3187 | { | |
3188 | unsigned long maxcount; | |
3189 | struct xdr_stream *xdr = &resp->xdr; | |
3190 | struct file *file = read->rd_filp; | |
3191 | int starting_len = xdr->buf->len; | |
3192 | struct raparms *ra; | |
3193 | __be32 *p; | |
3194 | __be32 err; | |
3195 | ||
3196 | if (nfserr) | |
3197 | return nfserr; | |
3198 | ||
3199 | p = xdr_reserve_space(xdr, 8); /* eof flag and byte count */ | |
3200 | if (!p) { | |
3201 | WARN_ON_ONCE(resp->rqstp->rq_splice_ok); | |
3202 | return nfserr_resource; | |
3203 | } | |
b0420980 BF |
3204 | if (resp->xdr.buf->page_len && resp->rqstp->rq_splice_ok) { |
3205 | WARN_ON_ONCE(1); | |
dc97618d BF |
3206 | return nfserr_resource; |
3207 | } | |
dc97618d BF |
3208 | xdr_commit_encode(xdr); |
3209 | ||
3210 | maxcount = svc_max_payload(resp->rqstp); | |
3c7aa15d KM |
3211 | maxcount = min_t(unsigned long, maxcount, (xdr->buf->buflen - xdr->buf->len)); |
3212 | maxcount = min_t(unsigned long, maxcount, read->rd_length); | |
dc97618d BF |
3213 | |
3214 | if (!read->rd_filp) { | |
3215 | err = nfsd_get_tmp_read_open(resp->rqstp, read->rd_fhp, | |
3216 | &file, &ra); | |
3217 | if (err) | |
3218 | goto err_truncate; | |
3219 | } | |
3220 | ||
3221 | if (file->f_op->splice_read && resp->rqstp->rq_splice_ok) | |
3222 | err = nfsd4_encode_splice_read(resp, read, file, maxcount); | |
3223 | else | |
3224 | err = nfsd4_encode_readv(resp, read, file, maxcount); | |
3225 | ||
3226 | if (!read->rd_filp) | |
3227 | nfsd_put_tmp_read_open(file, ra); | |
3228 | ||
3229 | err_truncate: | |
3230 | if (err) | |
3231 | xdr_truncate_encode(xdr, starting_len); | |
3232 | return err; | |
1da177e4 LT |
3233 | } |
3234 | ||
b37ad28b AV |
3235 | static __be32 |
3236 | nfsd4_encode_readlink(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readlink *readlink) | |
1da177e4 LT |
3237 | { |
3238 | int maxcount; | |
476a7b1f BF |
3239 | __be32 wire_count; |
3240 | int zero = 0; | |
ddd1ea56 | 3241 | struct xdr_stream *xdr = &resp->xdr; |
1fcea5b2 | 3242 | int length_offset = xdr->buf->len; |
bc749ca4 | 3243 | __be32 *p; |
1da177e4 LT |
3244 | |
3245 | if (nfserr) | |
3246 | return nfserr; | |
2825a7f9 BF |
3247 | |
3248 | p = xdr_reserve_space(xdr, 4); | |
3249 | if (!p) | |
3250 | return nfserr_resource; | |
1da177e4 | 3251 | maxcount = PAGE_SIZE; |
d0a381dd | 3252 | |
476a7b1f BF |
3253 | p = xdr_reserve_space(xdr, maxcount); |
3254 | if (!p) | |
4e21ac4b | 3255 | return nfserr_resource; |
1da177e4 LT |
3256 | /* |
3257 | * XXX: By default, the ->readlink() VFS op will truncate symlinks | |
3258 | * if they would overflow the buffer. Is this kosher in NFSv4? If | |
3259 | * not, one easy fix is: if ->readlink() precisely fills the buffer, | |
3260 | * assume that truncation occurred, and return NFS4ERR_RESOURCE. | |
3261 | */ | |
476a7b1f BF |
3262 | nfserr = nfsd_readlink(readlink->rl_rqstp, readlink->rl_fhp, |
3263 | (char *)p, &maxcount); | |
1da177e4 | 3264 | if (nfserr == nfserr_isdir) |
d3f627c8 BF |
3265 | nfserr = nfserr_inval; |
3266 | if (nfserr) { | |
1fcea5b2 | 3267 | xdr_truncate_encode(xdr, length_offset); |
1da177e4 | 3268 | return nfserr; |
d3f627c8 | 3269 | } |
1da177e4 | 3270 | |
476a7b1f BF |
3271 | wire_count = htonl(maxcount); |
3272 | write_bytes_to_xdr_buf(xdr->buf, length_offset, &wire_count, 4); | |
3273 | xdr_truncate_encode(xdr, length_offset + 4 + maxcount); | |
3274 | if (maxcount & 3) | |
3275 | write_bytes_to_xdr_buf(xdr->buf, length_offset + 4 + maxcount, | |
3276 | &zero, 4 - (maxcount&3)); | |
1da177e4 LT |
3277 | return 0; |
3278 | } | |
3279 | ||
b37ad28b AV |
3280 | static __be32 |
3281 | nfsd4_encode_readdir(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_readdir *readdir) | |
1da177e4 LT |
3282 | { |
3283 | int maxcount; | |
561f0ed4 | 3284 | int bytes_left; |
1da177e4 | 3285 | loff_t offset; |
561f0ed4 | 3286 | __be64 wire_offset; |
ddd1ea56 | 3287 | struct xdr_stream *xdr = &resp->xdr; |
1fcea5b2 | 3288 | int starting_len = xdr->buf->len; |
bc749ca4 | 3289 | __be32 *p; |
1da177e4 LT |
3290 | |
3291 | if (nfserr) | |
3292 | return nfserr; | |
1da177e4 | 3293 | |
d0a381dd BF |
3294 | p = xdr_reserve_space(xdr, NFS4_VERIFIER_SIZE); |
3295 | if (!p) | |
3296 | return nfserr_resource; | |
1da177e4 LT |
3297 | |
3298 | /* XXX: Following NFSv3, we ignore the READDIR verifier for now. */ | |
c373b0a4 BF |
3299 | *p++ = cpu_to_be32(0); |
3300 | *p++ = cpu_to_be32(0); | |
4aea24b2 BF |
3301 | resp->xdr.buf->head[0].iov_len = ((char *)resp->xdr.p) |
3302 | - (char *)resp->xdr.buf->head[0].iov_base; | |
1da177e4 LT |
3303 | |
3304 | /* | |
561f0ed4 BF |
3305 | * Number of bytes left for directory entries allowing for the |
3306 | * final 8 bytes of the readdir and a following failed op: | |
3307 | */ | |
3308 | bytes_left = xdr->buf->buflen - xdr->buf->len | |
3309 | - COMPOUND_ERR_SLACK_SPACE - 8; | |
3310 | if (bytes_left < 0) { | |
3311 | nfserr = nfserr_resource; | |
3312 | goto err_no_verf; | |
3313 | } | |
3314 | maxcount = min_t(u32, readdir->rd_maxcount, INT_MAX); | |
3315 | /* | |
3316 | * Note the rfc defines rd_maxcount as the size of the | |
3317 | * READDIR4resok structure, which includes the verifier above | |
3318 | * and the 8 bytes encoded at the end of this function: | |
1da177e4 | 3319 | */ |
561f0ed4 BF |
3320 | if (maxcount < 16) { |
3321 | nfserr = nfserr_toosmall; | |
1da177e4 LT |
3322 | goto err_no_verf; |
3323 | } | |
561f0ed4 | 3324 | maxcount = min_t(int, maxcount-16, bytes_left); |
1da177e4 | 3325 | |
561f0ed4 BF |
3326 | readdir->xdr = xdr; |
3327 | readdir->rd_maxcount = maxcount; | |
1da177e4 | 3328 | readdir->common.err = 0; |
561f0ed4 | 3329 | readdir->cookie_offset = 0; |
1da177e4 LT |
3330 | |
3331 | offset = readdir->rd_cookie; | |
3332 | nfserr = nfsd_readdir(readdir->rd_rqstp, readdir->rd_fhp, | |
3333 | &offset, | |
3334 | &readdir->common, nfsd4_encode_dirent); | |
3335 | if (nfserr == nfs_ok && | |
3336 | readdir->common.err == nfserr_toosmall && | |
561f0ed4 BF |
3337 | xdr->buf->len == starting_len + 8) { |
3338 | /* nothing encoded; which limit did we hit?: */ | |
3339 | if (maxcount - 16 < bytes_left) | |
3340 | /* It was the fault of rd_maxcount: */ | |
3341 | nfserr = nfserr_toosmall; | |
3342 | else | |
3343 | /* We ran out of buffer space: */ | |
3344 | nfserr = nfserr_resource; | |
3345 | } | |
1da177e4 LT |
3346 | if (nfserr) |
3347 | goto err_no_verf; | |
3348 | ||
561f0ed4 BF |
3349 | if (readdir->cookie_offset) { |
3350 | wire_offset = cpu_to_be64(offset); | |
3351 | write_bytes_to_xdr_buf(xdr->buf, readdir->cookie_offset, | |
3352 | &wire_offset, 8); | |
3353 | } | |
1da177e4 | 3354 | |
561f0ed4 BF |
3355 | p = xdr_reserve_space(xdr, 8); |
3356 | if (!p) { | |
3357 | WARN_ON_ONCE(1); | |
3358 | goto err_no_verf; | |
3359 | } | |
1da177e4 LT |
3360 | *p++ = 0; /* no more entries */ |
3361 | *p++ = htonl(readdir->common.err == nfserr_eof); | |
1da177e4 LT |
3362 | |
3363 | return 0; | |
3364 | err_no_verf: | |
1fcea5b2 | 3365 | xdr_truncate_encode(xdr, starting_len); |
1da177e4 LT |
3366 | return nfserr; |
3367 | } | |
3368 | ||
695e12f8 | 3369 | static __be32 |
b37ad28b | 3370 | nfsd4_encode_remove(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_remove *remove) |
1da177e4 | 3371 | { |
d0a381dd | 3372 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3373 | __be32 *p; |
1da177e4 LT |
3374 | |
3375 | if (!nfserr) { | |
d0a381dd BF |
3376 | p = xdr_reserve_space(xdr, 20); |
3377 | if (!p) | |
3378 | return nfserr_resource; | |
d05d5744 | 3379 | p = encode_cinfo(p, &remove->rm_cinfo); |
1da177e4 | 3380 | } |
695e12f8 | 3381 | return nfserr; |
1da177e4 LT |
3382 | } |
3383 | ||
695e12f8 | 3384 | static __be32 |
b37ad28b | 3385 | nfsd4_encode_rename(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_rename *rename) |
1da177e4 | 3386 | { |
d0a381dd | 3387 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3388 | __be32 *p; |
1da177e4 LT |
3389 | |
3390 | if (!nfserr) { | |
d0a381dd BF |
3391 | p = xdr_reserve_space(xdr, 40); |
3392 | if (!p) | |
3393 | return nfserr_resource; | |
d05d5744 BF |
3394 | p = encode_cinfo(p, &rename->rn_sinfo); |
3395 | p = encode_cinfo(p, &rename->rn_tinfo); | |
1da177e4 | 3396 | } |
695e12f8 | 3397 | return nfserr; |
1da177e4 LT |
3398 | } |
3399 | ||
695e12f8 | 3400 | static __be32 |
d0a381dd | 3401 | nfsd4_do_encode_secinfo(struct xdr_stream *xdr, |
a77c806f | 3402 | __be32 nfserr, struct svc_export *exp) |
dcb488a3 | 3403 | { |
676e4ebd | 3404 | u32 i, nflavs, supported; |
4796f457 BF |
3405 | struct exp_flavor_info *flavs; |
3406 | struct exp_flavor_info def_flavs[2]; | |
676e4ebd CL |
3407 | __be32 *p, *flavorsp; |
3408 | static bool report = true; | |
dcb488a3 AA |
3409 | |
3410 | if (nfserr) | |
3411 | goto out; | |
d0a381dd | 3412 | nfserr = nfserr_resource; |
4796f457 BF |
3413 | if (exp->ex_nflavors) { |
3414 | flavs = exp->ex_flavors; | |
3415 | nflavs = exp->ex_nflavors; | |
3416 | } else { /* Handling of some defaults in absence of real secinfo: */ | |
3417 | flavs = def_flavs; | |
3418 | if (exp->ex_client->flavour->flavour == RPC_AUTH_UNIX) { | |
3419 | nflavs = 2; | |
3420 | flavs[0].pseudoflavor = RPC_AUTH_UNIX; | |
3421 | flavs[1].pseudoflavor = RPC_AUTH_NULL; | |
3422 | } else if (exp->ex_client->flavour->flavour == RPC_AUTH_GSS) { | |
3423 | nflavs = 1; | |
3424 | flavs[0].pseudoflavor | |
3425 | = svcauth_gss_flavor(exp->ex_client); | |
3426 | } else { | |
3427 | nflavs = 1; | |
3428 | flavs[0].pseudoflavor | |
3429 | = exp->ex_client->flavour->flavour; | |
3430 | } | |
3431 | } | |
3432 | ||
676e4ebd | 3433 | supported = 0; |
d0a381dd BF |
3434 | p = xdr_reserve_space(xdr, 4); |
3435 | if (!p) | |
3436 | goto out; | |
676e4ebd | 3437 | flavorsp = p++; /* to be backfilled later */ |
676e4ebd | 3438 | |
4796f457 | 3439 | for (i = 0; i < nflavs; i++) { |
676e4ebd | 3440 | rpc_authflavor_t pf = flavs[i].pseudoflavor; |
a77c806f | 3441 | struct rpcsec_gss_info info; |
dcb488a3 | 3442 | |
676e4ebd CL |
3443 | if (rpcauth_get_gssinfo(pf, &info) == 0) { |
3444 | supported++; | |
d0a381dd BF |
3445 | p = xdr_reserve_space(xdr, 4 + 4 + |
3446 | XDR_LEN(info.oid.len) + 4 + 4); | |
3447 | if (!p) | |
3448 | goto out; | |
c373b0a4 | 3449 | *p++ = cpu_to_be32(RPC_AUTH_GSS); |
0c0c267b | 3450 | p = xdr_encode_opaque(p, info.oid.data, info.oid.len); |
c373b0a4 BF |
3451 | *p++ = cpu_to_be32(info.qop); |
3452 | *p++ = cpu_to_be32(info.service); | |
676e4ebd CL |
3453 | } else if (pf < RPC_AUTH_MAXFLAVOR) { |
3454 | supported++; | |
d0a381dd BF |
3455 | p = xdr_reserve_space(xdr, 4); |
3456 | if (!p) | |
3457 | goto out; | |
c373b0a4 | 3458 | *p++ = cpu_to_be32(pf); |
676e4ebd CL |
3459 | } else { |
3460 | if (report) | |
3461 | pr_warn("NFS: SECINFO: security flavor %u " | |
3462 | "is not supported\n", pf); | |
dcb488a3 AA |
3463 | } |
3464 | } | |
a77c806f | 3465 | |
676e4ebd CL |
3466 | if (nflavs != supported) |
3467 | report = false; | |
3468 | *flavorsp = htonl(supported); | |
d0a381dd | 3469 | nfserr = 0; |
dcb488a3 AA |
3470 | out: |
3471 | if (exp) | |
3472 | exp_put(exp); | |
695e12f8 | 3473 | return nfserr; |
dcb488a3 AA |
3474 | } |
3475 | ||
22b6dee8 MJ |
3476 | static __be32 |
3477 | nfsd4_encode_secinfo(struct nfsd4_compoundres *resp, __be32 nfserr, | |
3478 | struct nfsd4_secinfo *secinfo) | |
3479 | { | |
d0a381dd BF |
3480 | struct xdr_stream *xdr = &resp->xdr; |
3481 | ||
3482 | return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->si_exp); | |
22b6dee8 MJ |
3483 | } |
3484 | ||
3485 | static __be32 | |
3486 | nfsd4_encode_secinfo_no_name(struct nfsd4_compoundres *resp, __be32 nfserr, | |
3487 | struct nfsd4_secinfo_no_name *secinfo) | |
3488 | { | |
d0a381dd BF |
3489 | struct xdr_stream *xdr = &resp->xdr; |
3490 | ||
3491 | return nfsd4_do_encode_secinfo(xdr, nfserr, secinfo->sin_exp); | |
22b6dee8 MJ |
3492 | } |
3493 | ||
1da177e4 LT |
3494 | /* |
3495 | * The SETATTR encode routine is special -- it always encodes a bitmap, | |
3496 | * regardless of the error status. | |
3497 | */ | |
695e12f8 | 3498 | static __be32 |
b37ad28b | 3499 | nfsd4_encode_setattr(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setattr *setattr) |
1da177e4 | 3500 | { |
d0a381dd | 3501 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3502 | __be32 *p; |
1da177e4 | 3503 | |
d0a381dd BF |
3504 | p = xdr_reserve_space(xdr, 16); |
3505 | if (!p) | |
3506 | return nfserr_resource; | |
1da177e4 | 3507 | if (nfserr) { |
c373b0a4 BF |
3508 | *p++ = cpu_to_be32(3); |
3509 | *p++ = cpu_to_be32(0); | |
3510 | *p++ = cpu_to_be32(0); | |
3511 | *p++ = cpu_to_be32(0); | |
1da177e4 LT |
3512 | } |
3513 | else { | |
c373b0a4 BF |
3514 | *p++ = cpu_to_be32(3); |
3515 | *p++ = cpu_to_be32(setattr->sa_bmval[0]); | |
3516 | *p++ = cpu_to_be32(setattr->sa_bmval[1]); | |
3517 | *p++ = cpu_to_be32(setattr->sa_bmval[2]); | |
1da177e4 | 3518 | } |
695e12f8 | 3519 | return nfserr; |
1da177e4 LT |
3520 | } |
3521 | ||
695e12f8 | 3522 | static __be32 |
b37ad28b | 3523 | nfsd4_encode_setclientid(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_setclientid *scd) |
1da177e4 | 3524 | { |
d0a381dd | 3525 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3526 | __be32 *p; |
1da177e4 LT |
3527 | |
3528 | if (!nfserr) { | |
d0a381dd BF |
3529 | p = xdr_reserve_space(xdr, 8 + NFS4_VERIFIER_SIZE); |
3530 | if (!p) | |
3531 | return nfserr_resource; | |
0c0c267b BF |
3532 | p = xdr_encode_opaque_fixed(p, &scd->se_clientid, 8); |
3533 | p = xdr_encode_opaque_fixed(p, &scd->se_confirm, | |
3534 | NFS4_VERIFIER_SIZE); | |
1da177e4 LT |
3535 | } |
3536 | else if (nfserr == nfserr_clid_inuse) { | |
d0a381dd BF |
3537 | p = xdr_reserve_space(xdr, 8); |
3538 | if (!p) | |
3539 | return nfserr_resource; | |
c373b0a4 BF |
3540 | *p++ = cpu_to_be32(0); |
3541 | *p++ = cpu_to_be32(0); | |
1da177e4 | 3542 | } |
695e12f8 | 3543 | return nfserr; |
1da177e4 LT |
3544 | } |
3545 | ||
695e12f8 | 3546 | static __be32 |
b37ad28b | 3547 | nfsd4_encode_write(struct nfsd4_compoundres *resp, __be32 nfserr, struct nfsd4_write *write) |
1da177e4 | 3548 | { |
d0a381dd | 3549 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3550 | __be32 *p; |
1da177e4 LT |
3551 | |
3552 | if (!nfserr) { | |
d0a381dd BF |
3553 | p = xdr_reserve_space(xdr, 16); |
3554 | if (!p) | |
3555 | return nfserr_resource; | |
c373b0a4 BF |
3556 | *p++ = cpu_to_be32(write->wr_bytes_written); |
3557 | *p++ = cpu_to_be32(write->wr_how_written); | |
0c0c267b BF |
3558 | p = xdr_encode_opaque_fixed(p, write->wr_verifier.data, |
3559 | NFS4_VERIFIER_SIZE); | |
1da177e4 | 3560 | } |
695e12f8 | 3561 | return nfserr; |
1da177e4 LT |
3562 | } |
3563 | ||
57266a6e BF |
3564 | static const u32 nfs4_minimal_spo_must_enforce[2] = { |
3565 | [1] = 1 << (OP_BIND_CONN_TO_SESSION - 32) | | |
3566 | 1 << (OP_EXCHANGE_ID - 32) | | |
3567 | 1 << (OP_CREATE_SESSION - 32) | | |
3568 | 1 << (OP_DESTROY_SESSION - 32) | | |
3569 | 1 << (OP_DESTROY_CLIENTID - 32) | |
3570 | }; | |
3571 | ||
2db134eb | 3572 | static __be32 |
57b7b43b | 3573 | nfsd4_encode_exchange_id(struct nfsd4_compoundres *resp, __be32 nfserr, |
2db134eb AA |
3574 | struct nfsd4_exchange_id *exid) |
3575 | { | |
d0a381dd | 3576 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3577 | __be32 *p; |
0733d213 AA |
3578 | char *major_id; |
3579 | char *server_scope; | |
3580 | int major_id_sz; | |
3581 | int server_scope_sz; | |
3582 | uint64_t minor_id = 0; | |
3583 | ||
3584 | if (nfserr) | |
3585 | return nfserr; | |
3586 | ||
3587 | major_id = utsname()->nodename; | |
3588 | major_id_sz = strlen(major_id); | |
3589 | server_scope = utsname()->nodename; | |
3590 | server_scope_sz = strlen(server_scope); | |
3591 | ||
d0a381dd | 3592 | p = xdr_reserve_space(xdr, |
0733d213 AA |
3593 | 8 /* eir_clientid */ + |
3594 | 4 /* eir_sequenceid */ + | |
3595 | 4 /* eir_flags */ + | |
a8bb84bc | 3596 | 4 /* spr_how */); |
d0a381dd BF |
3597 | if (!p) |
3598 | return nfserr_resource; | |
0733d213 | 3599 | |
0c0c267b | 3600 | p = xdr_encode_opaque_fixed(p, &exid->clientid, 8); |
c373b0a4 BF |
3601 | *p++ = cpu_to_be32(exid->seqid); |
3602 | *p++ = cpu_to_be32(exid->flags); | |
0733d213 | 3603 | |
c373b0a4 | 3604 | *p++ = cpu_to_be32(exid->spa_how); |
a8bb84bc | 3605 | |
57266a6e BF |
3606 | switch (exid->spa_how) { |
3607 | case SP4_NONE: | |
3608 | break; | |
3609 | case SP4_MACH_CRED: | |
a8bb84bc | 3610 | /* spo_must_enforce, spo_must_allow */ |
d0a381dd BF |
3611 | p = xdr_reserve_space(xdr, 16); |
3612 | if (!p) | |
3613 | return nfserr_resource; | |
a8bb84bc | 3614 | |
57266a6e | 3615 | /* spo_must_enforce bitmap: */ |
c373b0a4 BF |
3616 | *p++ = cpu_to_be32(2); |
3617 | *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[0]); | |
3618 | *p++ = cpu_to_be32(nfs4_minimal_spo_must_enforce[1]); | |
57266a6e | 3619 | /* empty spo_must_allow bitmap: */ |
c373b0a4 | 3620 | *p++ = cpu_to_be32(0); |
a8bb84bc | 3621 | |
57266a6e BF |
3622 | break; |
3623 | default: | |
3624 | WARN_ON_ONCE(1); | |
3625 | } | |
0733d213 | 3626 | |
d0a381dd | 3627 | p = xdr_reserve_space(xdr, |
a8bb84bc KM |
3628 | 8 /* so_minor_id */ + |
3629 | 4 /* so_major_id.len */ + | |
3630 | (XDR_QUADLEN(major_id_sz) * 4) + | |
3631 | 4 /* eir_server_scope.len */ + | |
3632 | (XDR_QUADLEN(server_scope_sz) * 4) + | |
3633 | 4 /* eir_server_impl_id.count (0) */); | |
d0a381dd BF |
3634 | if (!p) |
3635 | return nfserr_resource; | |
a8bb84bc | 3636 | |
0733d213 | 3637 | /* The server_owner struct */ |
b64c7f3b | 3638 | p = xdr_encode_hyper(p, minor_id); /* Minor id */ |
0733d213 | 3639 | /* major id */ |
0c0c267b | 3640 | p = xdr_encode_opaque(p, major_id, major_id_sz); |
0733d213 AA |
3641 | |
3642 | /* Server scope */ | |
0c0c267b | 3643 | p = xdr_encode_opaque(p, server_scope, server_scope_sz); |
0733d213 AA |
3644 | |
3645 | /* Implementation id */ | |
c373b0a4 | 3646 | *p++ = cpu_to_be32(0); /* zero length nfs_impl_id4 array */ |
0733d213 | 3647 | return 0; |
2db134eb AA |
3648 | } |
3649 | ||
3650 | static __be32 | |
57b7b43b | 3651 | nfsd4_encode_create_session(struct nfsd4_compoundres *resp, __be32 nfserr, |
2db134eb AA |
3652 | struct nfsd4_create_session *sess) |
3653 | { | |
d0a381dd | 3654 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3655 | __be32 *p; |
ec6b5d7b AA |
3656 | |
3657 | if (nfserr) | |
3658 | return nfserr; | |
3659 | ||
d0a381dd BF |
3660 | p = xdr_reserve_space(xdr, 24); |
3661 | if (!p) | |
3662 | return nfserr_resource; | |
0c0c267b BF |
3663 | p = xdr_encode_opaque_fixed(p, sess->sessionid.data, |
3664 | NFS4_MAX_SESSIONID_LEN); | |
c373b0a4 BF |
3665 | *p++ = cpu_to_be32(sess->seqid); |
3666 | *p++ = cpu_to_be32(sess->flags); | |
ec6b5d7b | 3667 | |
d0a381dd BF |
3668 | p = xdr_reserve_space(xdr, 28); |
3669 | if (!p) | |
3670 | return nfserr_resource; | |
c373b0a4 BF |
3671 | *p++ = cpu_to_be32(0); /* headerpadsz */ |
3672 | *p++ = cpu_to_be32(sess->fore_channel.maxreq_sz); | |
3673 | *p++ = cpu_to_be32(sess->fore_channel.maxresp_sz); | |
3674 | *p++ = cpu_to_be32(sess->fore_channel.maxresp_cached); | |
3675 | *p++ = cpu_to_be32(sess->fore_channel.maxops); | |
3676 | *p++ = cpu_to_be32(sess->fore_channel.maxreqs); | |
3677 | *p++ = cpu_to_be32(sess->fore_channel.nr_rdma_attrs); | |
ec6b5d7b AA |
3678 | |
3679 | if (sess->fore_channel.nr_rdma_attrs) { | |
d0a381dd BF |
3680 | p = xdr_reserve_space(xdr, 4); |
3681 | if (!p) | |
3682 | return nfserr_resource; | |
c373b0a4 | 3683 | *p++ = cpu_to_be32(sess->fore_channel.rdma_attrs); |
ec6b5d7b AA |
3684 | } |
3685 | ||
d0a381dd BF |
3686 | p = xdr_reserve_space(xdr, 28); |
3687 | if (!p) | |
3688 | return nfserr_resource; | |
c373b0a4 BF |
3689 | *p++ = cpu_to_be32(0); /* headerpadsz */ |
3690 | *p++ = cpu_to_be32(sess->back_channel.maxreq_sz); | |
3691 | *p++ = cpu_to_be32(sess->back_channel.maxresp_sz); | |
3692 | *p++ = cpu_to_be32(sess->back_channel.maxresp_cached); | |
3693 | *p++ = cpu_to_be32(sess->back_channel.maxops); | |
3694 | *p++ = cpu_to_be32(sess->back_channel.maxreqs); | |
3695 | *p++ = cpu_to_be32(sess->back_channel.nr_rdma_attrs); | |
ec6b5d7b AA |
3696 | |
3697 | if (sess->back_channel.nr_rdma_attrs) { | |
d0a381dd BF |
3698 | p = xdr_reserve_space(xdr, 4); |
3699 | if (!p) | |
3700 | return nfserr_resource; | |
c373b0a4 | 3701 | *p++ = cpu_to_be32(sess->back_channel.rdma_attrs); |
ec6b5d7b AA |
3702 | } |
3703 | return 0; | |
2db134eb AA |
3704 | } |
3705 | ||
c47d832b | 3706 | static __be32 |
57b7b43b | 3707 | nfsd4_encode_sequence(struct nfsd4_compoundres *resp, __be32 nfserr, |
2db134eb AA |
3708 | struct nfsd4_sequence *seq) |
3709 | { | |
d0a381dd | 3710 | struct xdr_stream *xdr = &resp->xdr; |
bc749ca4 | 3711 | __be32 *p; |
b85d4c01 BH |
3712 | |
3713 | if (nfserr) | |
3714 | return nfserr; | |
3715 | ||
d0a381dd BF |
3716 | p = xdr_reserve_space(xdr, NFS4_MAX_SESSIONID_LEN + 20); |
3717 | if (!p) | |
3718 | return nfserr_resource; | |
0c0c267b BF |
3719 | p = xdr_encode_opaque_fixed(p, seq->sessionid.data, |
3720 | NFS4_MAX_SESSIONID_LEN); | |
c373b0a4 BF |
3721 | *p++ = cpu_to_be32(seq->seqid); |
3722 | *p++ = cpu_to_be32(seq->slotid); | |
b7d7ca35 | 3723 | /* Note slotid's are numbered from zero: */ |
c373b0a4 BF |
3724 | *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_highest_slotid */ |
3725 | *p++ = cpu_to_be32(seq->maxslots - 1); /* sr_target_highest_slotid */ | |
3726 | *p++ = cpu_to_be32(seq->status_flags); | |
b85d4c01 | 3727 | |
f5236013 | 3728 | resp->cstate.data_offset = xdr->buf->len; /* DRC cache data pointer */ |
b85d4c01 | 3729 | return 0; |
2db134eb AA |
3730 | } |
3731 | ||
2355c596 | 3732 | static __be32 |
57b7b43b | 3733 | nfsd4_encode_test_stateid(struct nfsd4_compoundres *resp, __be32 nfserr, |
17456804 BS |
3734 | struct nfsd4_test_stateid *test_stateid) |
3735 | { | |
d0a381dd | 3736 | struct xdr_stream *xdr = &resp->xdr; |
03cfb420 | 3737 | struct nfsd4_test_stateid_id *stateid, *next; |
17456804 | 3738 | __be32 *p; |
17456804 | 3739 | |
a11fcce1 BF |
3740 | if (nfserr) |
3741 | return nfserr; | |
3742 | ||
d0a381dd BF |
3743 | p = xdr_reserve_space(xdr, 4 + (4 * test_stateid->ts_num_ids)); |
3744 | if (!p) | |
3745 | return nfserr_resource; | |
17456804 | 3746 | *p++ = htonl(test_stateid->ts_num_ids); |
17456804 | 3747 | |
03cfb420 | 3748 | list_for_each_entry_safe(stateid, next, &test_stateid->ts_stateid_list, ts_id_list) { |
02f5fde5 | 3749 | *p++ = stateid->ts_id_status; |
17456804 | 3750 | } |
17456804 BS |
3751 | |
3752 | return nfserr; | |
3753 | } | |
3754 | ||
695e12f8 BH |
3755 | static __be32 |
3756 | nfsd4_encode_noop(struct nfsd4_compoundres *resp, __be32 nfserr, void *p) | |
3757 | { | |
3758 | return nfserr; | |
3759 | } | |
3760 | ||
3761 | typedef __be32(* nfsd4_enc)(struct nfsd4_compoundres *, __be32, void *); | |
3762 | ||
2db134eb AA |
3763 | /* |
3764 | * Note: nfsd4_enc_ops vector is shared for v4.0 and v4.1 | |
3765 | * since we don't need to filter out obsolete ops as this is | |
3766 | * done in the decoding phase. | |
3767 | */ | |
695e12f8 | 3768 | static nfsd4_enc nfsd4_enc_ops[] = { |
ad1060c8 BF |
3769 | [OP_ACCESS] = (nfsd4_enc)nfsd4_encode_access, |
3770 | [OP_CLOSE] = (nfsd4_enc)nfsd4_encode_close, | |
3771 | [OP_COMMIT] = (nfsd4_enc)nfsd4_encode_commit, | |
3772 | [OP_CREATE] = (nfsd4_enc)nfsd4_encode_create, | |
3773 | [OP_DELEGPURGE] = (nfsd4_enc)nfsd4_encode_noop, | |
3774 | [OP_DELEGRETURN] = (nfsd4_enc)nfsd4_encode_noop, | |
3775 | [OP_GETATTR] = (nfsd4_enc)nfsd4_encode_getattr, | |
3776 | [OP_GETFH] = (nfsd4_enc)nfsd4_encode_getfh, | |
3777 | [OP_LINK] = (nfsd4_enc)nfsd4_encode_link, | |
3778 | [OP_LOCK] = (nfsd4_enc)nfsd4_encode_lock, | |
3779 | [OP_LOCKT] = (nfsd4_enc)nfsd4_encode_lockt, | |
3780 | [OP_LOCKU] = (nfsd4_enc)nfsd4_encode_locku, | |
3781 | [OP_LOOKUP] = (nfsd4_enc)nfsd4_encode_noop, | |
3782 | [OP_LOOKUPP] = (nfsd4_enc)nfsd4_encode_noop, | |
3783 | [OP_NVERIFY] = (nfsd4_enc)nfsd4_encode_noop, | |
3784 | [OP_OPEN] = (nfsd4_enc)nfsd4_encode_open, | |
84f09f46 | 3785 | [OP_OPENATTR] = (nfsd4_enc)nfsd4_encode_noop, |
ad1060c8 BF |
3786 | [OP_OPEN_CONFIRM] = (nfsd4_enc)nfsd4_encode_open_confirm, |
3787 | [OP_OPEN_DOWNGRADE] = (nfsd4_enc)nfsd4_encode_open_downgrade, | |
3788 | [OP_PUTFH] = (nfsd4_enc)nfsd4_encode_noop, | |
3789 | [OP_PUTPUBFH] = (nfsd4_enc)nfsd4_encode_noop, | |
3790 | [OP_PUTROOTFH] = (nfsd4_enc)nfsd4_encode_noop, | |
3791 | [OP_READ] = (nfsd4_enc)nfsd4_encode_read, | |
3792 | [OP_READDIR] = (nfsd4_enc)nfsd4_encode_readdir, | |
3793 | [OP_READLINK] = (nfsd4_enc)nfsd4_encode_readlink, | |
3794 | [OP_REMOVE] = (nfsd4_enc)nfsd4_encode_remove, | |
3795 | [OP_RENAME] = (nfsd4_enc)nfsd4_encode_rename, | |
3796 | [OP_RENEW] = (nfsd4_enc)nfsd4_encode_noop, | |
3797 | [OP_RESTOREFH] = (nfsd4_enc)nfsd4_encode_noop, | |
3798 | [OP_SAVEFH] = (nfsd4_enc)nfsd4_encode_noop, | |
3799 | [OP_SECINFO] = (nfsd4_enc)nfsd4_encode_secinfo, | |
3800 | [OP_SETATTR] = (nfsd4_enc)nfsd4_encode_setattr, | |
3801 | [OP_SETCLIENTID] = (nfsd4_enc)nfsd4_encode_setclientid, | |
3802 | [OP_SETCLIENTID_CONFIRM] = (nfsd4_enc)nfsd4_encode_noop, | |
3803 | [OP_VERIFY] = (nfsd4_enc)nfsd4_encode_noop, | |
3804 | [OP_WRITE] = (nfsd4_enc)nfsd4_encode_write, | |
3805 | [OP_RELEASE_LOCKOWNER] = (nfsd4_enc)nfsd4_encode_noop, | |
2db134eb AA |
3806 | |
3807 | /* NFSv4.1 operations */ | |
3808 | [OP_BACKCHANNEL_CTL] = (nfsd4_enc)nfsd4_encode_noop, | |
1d1bc8f2 | 3809 | [OP_BIND_CONN_TO_SESSION] = (nfsd4_enc)nfsd4_encode_bind_conn_to_session, |
2db134eb AA |
3810 | [OP_EXCHANGE_ID] = (nfsd4_enc)nfsd4_encode_exchange_id, |
3811 | [OP_CREATE_SESSION] = (nfsd4_enc)nfsd4_encode_create_session, | |
43212cc7 KM |
3812 | [OP_DESTROY_SESSION] = (nfsd4_enc)nfsd4_encode_noop, |
3813 | [OP_FREE_STATEID] = (nfsd4_enc)nfsd4_encode_noop, | |
2db134eb AA |
3814 | [OP_GET_DIR_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, |
3815 | [OP_GETDEVICEINFO] = (nfsd4_enc)nfsd4_encode_noop, | |
3816 | [OP_GETDEVICELIST] = (nfsd4_enc)nfsd4_encode_noop, | |
3817 | [OP_LAYOUTCOMMIT] = (nfsd4_enc)nfsd4_encode_noop, | |
3818 | [OP_LAYOUTGET] = (nfsd4_enc)nfsd4_encode_noop, | |
3819 | [OP_LAYOUTRETURN] = (nfsd4_enc)nfsd4_encode_noop, | |
22b6dee8 | 3820 | [OP_SECINFO_NO_NAME] = (nfsd4_enc)nfsd4_encode_secinfo_no_name, |
2db134eb AA |
3821 | [OP_SEQUENCE] = (nfsd4_enc)nfsd4_encode_sequence, |
3822 | [OP_SET_SSV] = (nfsd4_enc)nfsd4_encode_noop, | |
17456804 | 3823 | [OP_TEST_STATEID] = (nfsd4_enc)nfsd4_encode_test_stateid, |
2db134eb AA |
3824 | [OP_WANT_DELEGATION] = (nfsd4_enc)nfsd4_encode_noop, |
3825 | [OP_DESTROY_CLIENTID] = (nfsd4_enc)nfsd4_encode_noop, | |
3826 | [OP_RECLAIM_COMPLETE] = (nfsd4_enc)nfsd4_encode_noop, | |
695e12f8 BH |
3827 | }; |
3828 | ||
496c262c | 3829 | /* |
a8095f7e BF |
3830 | * Calculate whether we still have space to encode repsize bytes. |
3831 | * There are two considerations: | |
3832 | * - For NFS versions >=4.1, the size of the reply must stay within | |
3833 | * session limits | |
3834 | * - For all NFS versions, we must stay within limited preallocated | |
3835 | * buffer space. | |
496c262c | 3836 | * |
a8095f7e BF |
3837 | * This is called before the operation is processed, so can only provide |
3838 | * an upper estimate. For some nonidempotent operations (such as | |
3839 | * getattr), it's not necessarily a problem if that estimate is wrong, | |
3840 | * as we can fail it after processing without significant side effects. | |
496c262c | 3841 | */ |
a8095f7e | 3842 | __be32 nfsd4_check_resp_size(struct nfsd4_compoundres *resp, u32 respsize) |
496c262c | 3843 | { |
67492c99 | 3844 | struct xdr_buf *buf = &resp->rqstp->rq_res; |
47ee5298 | 3845 | struct nfsd4_slot *slot = resp->cstate.slot; |
496c262c | 3846 | |
47ee5298 BF |
3847 | if (buf->len + respsize <= buf->buflen) |
3848 | return nfs_ok; | |
3849 | if (!nfsd4_has_session(&resp->cstate)) | |
ea8d7720 | 3850 | return nfserr_resource; |
47ee5298 BF |
3851 | if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) { |
3852 | WARN_ON_ONCE(1); | |
3853 | return nfserr_rep_too_big_to_cache; | |
ea8d7720 | 3854 | } |
47ee5298 | 3855 | return nfserr_rep_too_big; |
496c262c AA |
3856 | } |
3857 | ||
1da177e4 LT |
3858 | void |
3859 | nfsd4_encode_operation(struct nfsd4_compoundres *resp, struct nfsd4_op *op) | |
3860 | { | |
082d4bd7 | 3861 | struct xdr_stream *xdr = &resp->xdr; |
9411b1d4 | 3862 | struct nfs4_stateowner *so = resp->cstate.replay_owner; |
5f4ab945 | 3863 | struct svc_rqst *rqstp = resp->rqstp; |
082d4bd7 | 3864 | int post_err_offset; |
07d1f802 | 3865 | nfsd4_enc encoder; |
bc749ca4 | 3866 | __be32 *p; |
1da177e4 | 3867 | |
d0a381dd BF |
3868 | p = xdr_reserve_space(xdr, 8); |
3869 | if (!p) { | |
3870 | WARN_ON_ONCE(1); | |
3871 | return; | |
3872 | } | |
c373b0a4 | 3873 | *p++ = cpu_to_be32(op->opnum); |
082d4bd7 | 3874 | post_err_offset = xdr->buf->len; |
1da177e4 | 3875 | |
695e12f8 BH |
3876 | if (op->opnum == OP_ILLEGAL) |
3877 | goto status; | |
3878 | BUG_ON(op->opnum < 0 || op->opnum >= ARRAY_SIZE(nfsd4_enc_ops) || | |
3879 | !nfsd4_enc_ops[op->opnum]); | |
07d1f802 BF |
3880 | encoder = nfsd4_enc_ops[op->opnum]; |
3881 | op->status = encoder(resp, op->status, &op->u); | |
2825a7f9 BF |
3882 | xdr_commit_encode(xdr); |
3883 | ||
067e1ace | 3884 | /* nfsd4_check_resp_size guarantees enough room for error status */ |
5f4ab945 BF |
3885 | if (!op->status) { |
3886 | int space_needed = 0; | |
3887 | if (!nfsd4_last_compound_op(rqstp)) | |
3888 | space_needed = COMPOUND_ERR_SLACK_SPACE; | |
3889 | op->status = nfsd4_check_resp_size(resp, space_needed); | |
3890 | } | |
c8f13d97 BF |
3891 | if (op->status == nfserr_resource && nfsd4_has_session(&resp->cstate)) { |
3892 | struct nfsd4_slot *slot = resp->cstate.slot; | |
3893 | ||
3894 | if (slot->sl_flags & NFSD4_SLOT_CACHETHIS) | |
3895 | op->status = nfserr_rep_too_big_to_cache; | |
3896 | else | |
3897 | op->status = nfserr_rep_too_big; | |
3898 | } | |
07d1f802 BF |
3899 | if (op->status == nfserr_resource || |
3900 | op->status == nfserr_rep_too_big || | |
3901 | op->status == nfserr_rep_too_big_to_cache) { | |
3902 | /* | |
3903 | * The operation may have already been encoded or | |
3904 | * partially encoded. No op returns anything additional | |
3905 | * in the case of one of these three errors, so we can | |
3906 | * just truncate back to after the status. But it's a | |
3907 | * bug if we had to do this on a non-idempotent op: | |
3908 | */ | |
3909 | warn_on_nonidempotent_op(op); | |
082d4bd7 | 3910 | xdr_truncate_encode(xdr, post_err_offset); |
07d1f802 | 3911 | } |
9411b1d4 | 3912 | if (so) { |
082d4bd7 BF |
3913 | int len = xdr->buf->len - post_err_offset; |
3914 | ||
9411b1d4 | 3915 | so->so_replay.rp_status = op->status; |
082d4bd7 BF |
3916 | so->so_replay.rp_buflen = len; |
3917 | read_bytes_from_xdr_buf(xdr->buf, post_err_offset, | |
3918 | so->so_replay.rp_buf, len); | |
9411b1d4 | 3919 | } |
695e12f8 | 3920 | status: |
082d4bd7 BF |
3921 | /* Note that op->status is already in network byte order: */ |
3922 | write_bytes_to_xdr_buf(xdr->buf, post_err_offset - 4, &op->status, 4); | |
1da177e4 LT |
3923 | } |
3924 | ||
3925 | /* | |
3926 | * Encode the reply stored in the stateowner reply cache | |
3927 | * | |
3928 | * XDR note: do not encode rp->rp_buflen: the buffer contains the | |
3929 | * previously sent already encoded operation. | |
3930 | * | |
3931 | * called with nfs4_lock_state() held | |
3932 | */ | |
3933 | void | |
d0a381dd | 3934 | nfsd4_encode_replay(struct xdr_stream *xdr, struct nfsd4_op *op) |
1da177e4 | 3935 | { |
bc749ca4 | 3936 | __be32 *p; |
1da177e4 LT |
3937 | struct nfs4_replay *rp = op->replay; |
3938 | ||
3939 | BUG_ON(!rp); | |
3940 | ||
d0a381dd BF |
3941 | p = xdr_reserve_space(xdr, 8 + rp->rp_buflen); |
3942 | if (!p) { | |
3943 | WARN_ON_ONCE(1); | |
3944 | return; | |
3945 | } | |
c373b0a4 | 3946 | *p++ = cpu_to_be32(op->opnum); |
1da177e4 | 3947 | *p++ = rp->rp_status; /* already xdr'ed */ |
1da177e4 | 3948 | |
0c0c267b | 3949 | p = xdr_encode_opaque_fixed(p, rp->rp_buf, rp->rp_buflen); |
1da177e4 LT |
3950 | } |
3951 | ||
1da177e4 | 3952 | int |
2ebbc012 | 3953 | nfs4svc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy) |
1da177e4 LT |
3954 | { |
3955 | return xdr_ressize_check(rqstp, p); | |
3956 | } | |
3957 | ||
3e98abff | 3958 | int nfsd4_release_compoundargs(void *rq, __be32 *p, void *resp) |
1da177e4 | 3959 | { |
3e98abff BF |
3960 | struct svc_rqst *rqstp = rq; |
3961 | struct nfsd4_compoundargs *args = rqstp->rq_argp; | |
3962 | ||
1da177e4 LT |
3963 | if (args->ops != args->iops) { |
3964 | kfree(args->ops); | |
3965 | args->ops = args->iops; | |
3966 | } | |
f99d49ad JJ |
3967 | kfree(args->tmpp); |
3968 | args->tmpp = NULL; | |
1da177e4 LT |
3969 | while (args->to_free) { |
3970 | struct tmpbuf *tb = args->to_free; | |
3971 | args->to_free = tb->next; | |
ce043ac8 | 3972 | kfree(tb->buf); |
1da177e4 LT |
3973 | kfree(tb); |
3974 | } | |
3e98abff | 3975 | return 1; |
1da177e4 LT |
3976 | } |
3977 | ||
3978 | int | |
2ebbc012 | 3979 | nfs4svc_decode_compoundargs(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundargs *args) |
1da177e4 | 3980 | { |
e874f9f8 JL |
3981 | if (rqstp->rq_arg.head[0].iov_len % 4) { |
3982 | /* client is nuts */ | |
3983 | dprintk("%s: compound not properly padded! (peeraddr=%pISc xid=0x%x)", | |
3984 | __func__, svc_addr(rqstp), be32_to_cpu(rqstp->rq_xid)); | |
3985 | return 0; | |
3986 | } | |
1da177e4 LT |
3987 | args->p = p; |
3988 | args->end = rqstp->rq_arg.head[0].iov_base + rqstp->rq_arg.head[0].iov_len; | |
3989 | args->pagelist = rqstp->rq_arg.pages; | |
3990 | args->pagelen = rqstp->rq_arg.page_len; | |
3991 | args->tmpp = NULL; | |
3992 | args->to_free = NULL; | |
3993 | args->ops = args->iops; | |
3994 | args->rqstp = rqstp; | |
3995 | ||
3e98abff | 3996 | return !nfsd4_decode_compound(args); |
1da177e4 LT |
3997 | } |
3998 | ||
3999 | int | |
2ebbc012 | 4000 | nfs4svc_encode_compoundres(struct svc_rqst *rqstp, __be32 *p, struct nfsd4_compoundres *resp) |
1da177e4 LT |
4001 | { |
4002 | /* | |
4003 | * All that remains is to write the tag and operation count... | |
4004 | */ | |
557ce264 | 4005 | struct nfsd4_compound_state *cs = &resp->cstate; |
6ac90391 BF |
4006 | struct xdr_buf *buf = resp->xdr.buf; |
4007 | ||
4008 | WARN_ON_ONCE(buf->len != buf->head[0].iov_len + buf->page_len + | |
4009 | buf->tail[0].iov_len); | |
dd97fdde | 4010 | |
2825a7f9 BF |
4011 | rqstp->rq_next_page = resp->xdr.page_ptr + 1; |
4012 | ||
1da177e4 LT |
4013 | p = resp->tagp; |
4014 | *p++ = htonl(resp->taglen); | |
4015 | memcpy(p, resp->tag, resp->taglen); | |
4016 | p += XDR_QUADLEN(resp->taglen); | |
4017 | *p++ = htonl(resp->opcnt); | |
4018 | ||
26c0c75e | 4019 | if (nfsd4_has_session(cs)) { |
f0f51f5c BF |
4020 | struct nfsd_net *nn = net_generic(SVC_NET(rqstp), nfsd_net_id); |
4021 | struct nfs4_client *clp = cs->session->se_client; | |
26c0c75e BF |
4022 | if (cs->status != nfserr_replay_cache) { |
4023 | nfsd4_store_cache_entry(resp); | |
73e79482 | 4024 | cs->slot->sl_flags &= ~NFSD4_SLOT_INUSE; |
26c0c75e | 4025 | } |
d7682988 | 4026 | /* Renew the clientid on success and on replay */ |
f0f51f5c | 4027 | spin_lock(&nn->client_lock); |
221a6876 | 4028 | nfsd4_put_session(cs->session); |
f0f51f5c BF |
4029 | spin_unlock(&nn->client_lock); |
4030 | put_client_renew(clp); | |
da3846a2 | 4031 | } |
1da177e4 LT |
4032 | return 1; |
4033 | } | |
4034 | ||
4035 | /* | |
4036 | * Local variables: | |
4037 | * c-basic-offset: 8 | |
4038 | * End: | |
4039 | */ |